From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from firstgate.proxmox.com (firstgate.proxmox.com [212.224.123.68]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by lists.proxmox.com (Postfix) with ESMTPS id 9AB3B6094A for ; Tue, 15 Dec 2020 09:17:04 +0100 (CET) Received: from firstgate.proxmox.com (localhost [127.0.0.1]) by firstgate.proxmox.com (Proxmox) with ESMTP id 90573EF27 for ; Tue, 15 Dec 2020 09:16:34 +0100 (CET) Received: from proxmox-new.maurer-it.com (proxmox-new.maurer-it.com [212.186.127.180]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by firstgate.proxmox.com (Proxmox) with ESMTPS id ADEF3EF08 for ; Tue, 15 Dec 2020 09:16:32 +0100 (CET) Received: from proxmox-new.maurer-it.com (localhost.localdomain [127.0.0.1]) by proxmox-new.maurer-it.com (Proxmox) with ESMTP id 7ABB543BB6 for ; Tue, 15 Dec 2020 09:16:32 +0100 (CET) From: Hannes Laimer To: pbs-devel@lists.proxmox.com Date: Tue, 15 Dec 2020 09:16:25 +0100 Message-Id: <20201215081626.73888-3-h.laimer@proxmox.com> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20201215081626.73888-1-h.laimer@proxmox.com> References: <20201215081626.73888-1-h.laimer@proxmox.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-SPAM-LEVEL: Spam detection results: 0 KAM_DMARC_STATUS 0.01 Test Rule for DKIM or SPF Failure with Strict Alignment RCVD_IN_DNSWL_MED -2.3 Sender listed at https://www.dnswl.org/, medium trust SPF_HELO_NONE 0.001 SPF: HELO does not publish an SPF Record SPF_PASS -0.001 SPF: sender matches SPF record URIBL_BLOCKED 0.001 ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [inspect.rs] Subject: [pbs-devel] [PATCH proxmox-backup 2/3] add inspection of .blob, .fidx and .didx files X-BeenThere: pbs-devel@lists.proxmox.com X-Mailman-Version: 2.1.29 Precedence: list List-Id: Proxmox Backup Server development discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 15 Dec 2020 08:17:04 -0000 Signed-off-by: Hannes Laimer --- Adds possibility to inspect .blob, .fidx and .didx files. For index files a list of the chunks referenced will be printed in addition to some other inforation. .blob files can be decoded into file or directly into stdout. Options: - file: path to the file - [opt] decode: path to a file or stdout(-), if specidied, the file will be decoded into the specified location [only for blob files, no effect with index files] - [opt] keyfile: path to a keyfile, needed if decode is specified and the data was encrypted src/bin/proxmox_backup_recovery/inspect.rs | 115 ++++++++++++++++++++- 1 file changed, 114 insertions(+), 1 deletion(-) diff --git a/src/bin/proxmox_backup_recovery/inspect.rs b/src/bin/proxmox_backup_recovery/inspect.rs index 6bf4a0a3..0b8d8e48 100644 --- a/src/bin/proxmox_backup_recovery/inspect.rs +++ b/src/bin/proxmox_backup_recovery/inspect.rs @@ -188,8 +188,121 @@ fn inspect_chunk(param: Value, _rpcenv: &mut dyn RpcEnvironment) -> Result Result { + let path = tools::required_string_param(¶m, "file")?; + let output_format = get_output_format(¶m); + + let val; + if path.ends_with(".blob") { + let decode_output_param = param["decode"].as_str(); + let key_file_param = param["keyfile"].as_str(); + + let mut file = std::fs::File::open(&path)?; + let data_blob = DataBlob::load_from_reader(&mut file)?; + + let mut decode_output_path = None; + let mut key_file_path = None; + + if let Some(path) = decode_output_param { + decode_output_path = Some(Path::new(path)) + }; + + if let Some(path) = key_file_param { + key_file_path = Some(Path::new(path)) + }; + + let crypt_mode = data_blob.crypt_mode()?; + val = json!({ + "encryption": crypt_mode, + "raw_size": data_blob.raw_size(), + }); + + if decode_output_path.is_some() { + if decode_output_param.unwrap().eq("-") { + decode_blob(None, key_file_path, None, &data_blob)?; + } else { + decode_blob(decode_output_path, key_file_path, None, &data_blob)?; + } + } + } else if path.ends_with(".fidx") { + let index = FixedIndexReader::open(Path::new(path))?; + + let mut ctime_str = index.ctime.to_string(); + if let Ok(s) = proxmox::tools::time::strftime_local("%c", index.ctime) { + ctime_str = s; + } + + let mut chunk_digests = HashSet::new(); + + for pos in 0..index.index_count() { + let digest = index.index_digest(pos).unwrap(); + chunk_digests.insert(proxmox::tools::digest_to_hex(digest)); + } + + val = json!({ + "size": index.size, + "ctime": ctime_str, + "chunk-digests": chunk_digests + + }) + } else if path.ends_with("didx") { + let index = DynamicIndexReader::open(Path::new(path))?; + + let mut ctime_str = index.ctime.to_string(); + if let Ok(s) = proxmox::tools::time::strftime_local("%c", index.ctime) { + ctime_str = s; + } + + let mut chunk_digests = HashSet::new(); + + for pos in 0..index.index_count() { + let digest = index.index_digest(pos).unwrap(); + chunk_digests.insert(proxmox::tools::digest_to_hex(digest)); + } + + val = json!({ + "size": index.size, + "ctime": ctime_str, + "chunk-digests": chunk_digests + }) + } else { + val = Value::Null; + println!("Only .blob, .fidx and .didx files may be inspected"); + } + + if !val.is_null() { + format_and_print_result(&val, &output_format); + } + + Ok(Value::Null) +} + pub fn inspect_commands() -> CommandLineInterface { - let cmd_def = CliCommandMap::new().insert("chunk", CliCommand::new(&API_METHOD_INSPECT_CHUNK)); + let cmd_def = CliCommandMap::new() + .insert("file", CliCommand::new(&API_METHOD_INSPECT_FILE)) + .insert("chunk", CliCommand::new(&API_METHOD_INSPECT_CHUNK)); cmd_def.into() } -- 2.20.1