From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: <pbs-devel-bounces@lists.proxmox.com> Received: from firstgate.proxmox.com (firstgate.proxmox.com [212.224.123.68]) by lore.proxmox.com (Postfix) with ESMTPS id 6EA681FF168 for <inbox@lore.proxmox.com>; Tue, 18 Mar 2025 12:49:59 +0100 (CET) Received: from firstgate.proxmox.com (localhost [127.0.0.1]) by firstgate.proxmox.com (Proxmox) with ESMTP id 962271DD15; Tue, 18 Mar 2025 12:49:48 +0100 (CET) From: Christian Ebner <c.ebner@proxmox.com> To: pbs-devel@lists.proxmox.com Date: Tue, 18 Mar 2025 12:39:08 +0100 Message-Id: <20250318113912.335359-3-c.ebner@proxmox.com> X-Mailer: git-send-email 2.39.5 In-Reply-To: <20250318113912.335359-1-c.ebner@proxmox.com> References: <20250318113912.335359-1-c.ebner@proxmox.com> MIME-Version: 1.0 X-SPAM-LEVEL: Spam detection results: 0 AWL -0.020 Adjusted score from AWL reputation of From: address BAYES_00 -1.9 Bayes spam probability is 0 to 1% DMARC_MISSING 0.1 Missing DMARC policy KAM_DMARC_STATUS 0.01 Test Rule for DKIM or SPF Failure with Strict Alignment PROLO_LEO1 0.1 Meta Catches all Leo drug variations so far RCVD_IN_VALIDITY_CERTIFIED_BLOCKED 0.001 ADMINISTRATOR NOTICE: The query to Validity was blocked. See https://knowledge.validity.com/hc/en-us/articles/20961730681243 for more information. RCVD_IN_VALIDITY_RPBL_BLOCKED 0.001 ADMINISTRATOR NOTICE: The query to Validity was blocked. See https://knowledge.validity.com/hc/en-us/articles/20961730681243 for more information. RCVD_IN_VALIDITY_SAFE_BLOCKED 0.001 ADMINISTRATOR NOTICE: The query to Validity was blocked. See https://knowledge.validity.com/hc/en-us/articles/20961730681243 for more information. SPF_HELO_NONE 0.001 SPF: HELO does not publish an SPF Record SPF_PASS -0.001 SPF: sender matches SPF record URIBL_BLOCKED 0.001 ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [pull.rs] Subject: [pbs-devel] [PATCH v2 proxmox-backup 2/6] server: pull: refactor snapshot pull logic X-BeenThere: pbs-devel@lists.proxmox.com X-Mailman-Version: 2.1.29 Precedence: list List-Id: Proxmox Backup Server development discussion <pbs-devel.lists.proxmox.com> List-Unsubscribe: <https://lists.proxmox.com/cgi-bin/mailman/options/pbs-devel>, <mailto:pbs-devel-request@lists.proxmox.com?subject=unsubscribe> List-Archive: <http://lists.proxmox.com/pipermail/pbs-devel/> List-Post: <mailto:pbs-devel@lists.proxmox.com> List-Help: <mailto:pbs-devel-request@lists.proxmox.com?subject=help> List-Subscribe: <https://lists.proxmox.com/cgi-bin/mailman/listinfo/pbs-devel>, <mailto:pbs-devel-request@lists.proxmox.com?subject=subscribe> Reply-To: Proxmox Backup Server development discussion <pbs-devel@lists.proxmox.com> Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Errors-To: pbs-devel-bounces@lists.proxmox.com Sender: "pbs-devel" <pbs-devel-bounces@lists.proxmox.com> In preparation for skipping over snapshots when synchronizing with encrypted/verified only flags set. In these cases, the manifest has to be fetched from the remote and it's status checked. If the snapshot should be skipped, the snapshot directory including the temporary manifest file has to be cleaned up, given the snapshot directory has been newly created. By reorganizing the current snapshot pull logic, this can be achieved more easily. The `corrupt` flag will be set to `false` in the snapshot prefiltering, so the previous explicit distinction for newly created snapshot directories must not be preserved. No functional changes intended. Signed-off-by: Christian Ebner <c.ebner@proxmox.com> --- changes since version 1: - no changes src/server/pull.rs | 33 ++++++++++++++++----------------- 1 file changed, 16 insertions(+), 17 deletions(-) diff --git a/src/server/pull.rs b/src/server/pull.rs index 516abfe5d..2c0ad9e1e 100644 --- a/src/server/pull.rs +++ b/src/server/pull.rs @@ -338,7 +338,16 @@ async fn pull_snapshot<'a>( snapshot: &'a pbs_datastore::BackupDir, downloaded_chunks: Arc<Mutex<HashSet<[u8; 32]>>>, corrupt: bool, + is_new: bool, ) -> Result<SyncStats, Error> { + if is_new { + info!("sync snapshot {}", snapshot.dir()); + } else if corrupt { + info!("re-sync snapshot {} due to corruption", snapshot.dir()); + } else { + info!("re-sync snapshot {}", snapshot.dir()); + } + let mut sync_stats = SyncStats::default(); let mut manifest_name = snapshot.full_path(); manifest_name.push(MANIFEST_BLOB_NAME.as_ref()); @@ -456,11 +465,11 @@ async fn pull_snapshot_from<'a>( .datastore() .create_locked_backup_dir(snapshot.backup_ns(), snapshot.as_ref())?; - let sync_stats = if is_new { - info!("sync snapshot {}", snapshot.dir()); + let result = pull_snapshot(reader, snapshot, downloaded_chunks, corrupt, is_new).await; - // this snapshot is new, so it can never be corrupt - match pull_snapshot(reader, snapshot, downloaded_chunks, false).await { + if is_new { + // Cleanup directory on error if snapshot was not present before + match result { Err(err) => { if let Err(cleanup_err) = snapshot.datastore().remove_backup_dir( snapshot.backup_ns(), @@ -471,21 +480,11 @@ async fn pull_snapshot_from<'a>( } return Err(err); } - Ok(sync_stats) => { - info!("sync snapshot {} done", snapshot.dir()); - sync_stats - } + Ok(_) => info!("sync snapshot {} done", snapshot.dir()), } - } else { - if corrupt { - info!("re-sync snapshot {} due to corruption", snapshot.dir()); - } else { - info!("re-sync snapshot {}", snapshot.dir()); - } - pull_snapshot(reader, snapshot, downloaded_chunks, corrupt).await? - }; + } - Ok(sync_stats) + result } /// Pulls a group according to `params`. -- 2.39.5 _______________________________________________ pbs-devel mailing list pbs-devel@lists.proxmox.com https://lists.proxmox.com/cgi-bin/mailman/listinfo/pbs-devel