From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from firstgate.proxmox.com (firstgate.proxmox.com [212.224.123.68]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by lists.proxmox.com (Postfix) with ESMTPS id 564056133C for ; Tue, 13 Oct 2020 11:33:20 +0200 (CEST) Received: from firstgate.proxmox.com (localhost [127.0.0.1]) by firstgate.proxmox.com (Proxmox) with ESMTP id 3C5EECDF0 for ; Tue, 13 Oct 2020 11:33:20 +0200 (CEST) Received: from proxmox-new.maurer-it.com (proxmox-new.maurer-it.com [212.186.127.180]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by firstgate.proxmox.com (Proxmox) with ESMTPS id 2A9CBCD8E for ; Tue, 13 Oct 2020 11:33:18 +0200 (CEST) Received: from proxmox-new.maurer-it.com (localhost.localdomain [127.0.0.1]) by proxmox-new.maurer-it.com (Proxmox) with ESMTP id E123E45D31 for ; Tue, 13 Oct 2020 11:33:17 +0200 (CEST) From: Hannes Laimer To: pbs-devel@lists.proxmox.com Date: Tue, 13 Oct 2020 11:32:59 +0200 Message-Id: <20201013093309.14917-5-h.laimer@proxmox.com> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20201013093309.14917-1-h.laimer@proxmox.com> References: <20201013093309.14917-1-h.laimer@proxmox.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-SPAM-LEVEL: Spam detection results: 0 KAM_DMARC_STATUS 0.01 Test Rule for DKIM or SPF Failure with Strict Alignment RCVD_IN_DNSWL_MED -2.3 Sender listed at https://www.dnswl.org/, medium trust SPF_HELO_NONE 0.001 SPF: HELO does not publish an SPF Record SPF_PASS -0.001 SPF: sender matches SPF record URIBL_BLOCKED 0.001 ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [verify.rs] Subject: [pbs-devel] [PATCH v3 proxmox-backup 04/14] add do_verification_job function to verify.rs X-BeenThere: pbs-devel@lists.proxmox.com X-Mailman-Version: 2.1.29 Precedence: list List-Id: Proxmox Backup Server development discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 13 Oct 2020 09:33:20 -0000 Signed-off-by: Hannes Laimer --- src/backup/verify.rs | 94 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 94 insertions(+) diff --git a/src/backup/verify.rs b/src/backup/verify.rs index 0c55305f..fc711d54 100644 --- a/src/backup/verify.rs +++ b/src/backup/verify.rs @@ -8,6 +8,8 @@ use anyhow::{bail, format_err, Error}; use crate::{ server::WorkerTask, api2::types::*, + config::jobstate::Job, + config::verify::VerificationJobConfig, tools::ParallelHandler, backup::{ DataStore, @@ -419,3 +421,95 @@ pub fn verify_all_backups(datastore: Arc, worker: Arc) -> Ok(errors) } + +/// Runs a verification job. +pub fn do_verification_job( + mut job: Job, + verification_job: VerificationJobConfig, + userid: &Userid, + schedule: Option, +) -> Result { + let datastore = DataStore::lookup_datastore(&verification_job.store)?; + + let mut backups_to_verify = BackupInfo::list_backups(&datastore.base_path())?; + if verification_job.ignore_verified.unwrap_or(true) { + backups_to_verify.retain(|backup_info| { + let manifest = match datastore.load_manifest(&backup_info.backup_dir) { + Ok((manifest, _)) => manifest, + Err(_) => return false, + }; + + let raw_verify_state = manifest.unprotected["verify_state"].clone(); + let last_state = match serde_json::from_value::(raw_verify_state) { + Ok(last_state) => last_state, + Err(_) => return true, + }; + + let now = proxmox::tools::time::epoch_i64(); + let days_since_last_verify = (now - last_state.upid.starttime) / 86400; + verification_job.outdated_after.is_some() + && days_since_last_verify > verification_job.outdated_after.unwrap() + }) + } + + let job_id = job.jobname().to_string(); + let worker_type = job.jobtype().to_string(); + let upid_str = WorkerTask::new_thread( + &worker_type, + Some(job.jobname().to_string()), + userid.clone(), + false, + move |worker| { + job.start(&worker.upid().to_string())?; + + worker.log(format!("Starting datastore verify job '{}'", job_id)); + worker.log(format!("verifying {} backups", backups_to_verify.len())); + if let Some(event_str) = schedule { + worker.log(format!("task triggered by schedule '{}'", event_str)); + } + + let verified_chunks = Arc::new(Mutex::new(HashSet::with_capacity(1024 * 16))); + let corrupt_chunks = Arc::new(Mutex::new(HashSet::with_capacity(64))); + let result = proxmox::try_block!({ + let mut failed_dirs: Vec = Vec::new(); + + for backup_info in backups_to_verify { + let verification_result = verify_backup_dir( + datastore.clone(), + &backup_info.backup_dir, + verified_chunks.clone(), + corrupt_chunks.clone(), + worker.clone(), + ); + + if let Ok(false) = verification_result { + failed_dirs.push(backup_info.backup_dir.to_string()); + } // otherwise successful or aborted + } + + if !failed_dirs.is_empty() { + worker.log("Failed to verify following snapshots:"); + for dir in failed_dirs { + worker.log(format!("\t{}", dir)); + } + bail!("verification failed - please check the log for details"); + } + Ok(()) + }); + + let status = worker.create_state(&result); + + match job.finish(status) { + Err(err) => eprintln!( + "could not finish job state for {}: {}", + job.jobtype().to_string(), + err + ), + Ok(_) => (), + } + + result + }, + )?; + Ok(upid_str) +} -- 2.20.1