public inbox for pbs-devel@lists.proxmox.com
 help / color / mirror / Atom feed
From: Lukas Wagner <l.wagner@proxmox.com>
To: Proxmox Backup Server development discussion
	<pbs-devel@lists.proxmox.com>,
	Christian Ebner <c.ebner@proxmox.com>
Subject: Re: [pbs-devel] [PATCH proxmox-backup v8 07/45] api: backup: store datastore backend in runtime environment
Date: Fri, 18 Jul 2025 09:54:47 +0200	[thread overview]
Message-ID: <db82b803-8e53-4841-991f-8a9b05e68129@proxmox.com> (raw)
In-Reply-To: <20250715125332.954494-17-c.ebner@proxmox.com>

Reviewed-by: Lukas Wagner <l.wagner@proxmox.com>


On  2025-07-15 14:52, Christian Ebner wrote:
> Get and store the datastore's backend during creation of the backup
> runtime environment and upload the chunks to the local filesystem or
> s3 object store based on the backend variant.
> 
> By storing the backend variant in the environment the s3 client is
> instantiated only once and reused for all api calls in the same
> backup http/2 connection.
> 
> Refactor the upgrade method by moving all logic into the async block,
> such that the now possible error on backup environment creation gets
> propagated to the thread spawn call side.
> 
> Signed-off-by: Christian Ebner <c.ebner@proxmox.com>
> ---
> changes since version 7:
> - no changes
> 
>  src/api2/backup/environment.rs |  11 +--
>  src/api2/backup/mod.rs         | 128 ++++++++++++++++-----------------
>  2 files changed, 71 insertions(+), 68 deletions(-)
> 
> diff --git a/src/api2/backup/environment.rs b/src/api2/backup/environment.rs
> index 1d8f64aa0..7bd86f39c 100644
> --- a/src/api2/backup/environment.rs
> +++ b/src/api2/backup/environment.rs
> @@ -16,7 +16,7 @@ use pbs_api_types::Authid;
>  use pbs_datastore::backup_info::{BackupDir, BackupInfo};
>  use pbs_datastore::dynamic_index::DynamicIndexWriter;
>  use pbs_datastore::fixed_index::FixedIndexWriter;
> -use pbs_datastore::{DataBlob, DataStore};
> +use pbs_datastore::{DataBlob, DataStore, DatastoreBackend};
>  use proxmox_rest_server::{formatter::*, WorkerTask};
>  
>  use crate::backup::VerifyWorker;
> @@ -116,6 +116,7 @@ pub struct BackupEnvironment {
>      pub datastore: Arc<DataStore>,
>      pub backup_dir: BackupDir,
>      pub last_backup: Option<BackupInfo>,
> +    pub backend: DatastoreBackend,
>      state: Arc<Mutex<SharedBackupState>>,
>  }
>  
> @@ -126,7 +127,7 @@ impl BackupEnvironment {
>          worker: Arc<WorkerTask>,
>          datastore: Arc<DataStore>,
>          backup_dir: BackupDir,
> -    ) -> Self {
> +    ) -> Result<Self, Error> {
>          let state = SharedBackupState {
>              finished: false,
>              uid_counter: 0,
> @@ -138,7 +139,8 @@ impl BackupEnvironment {
>              backup_stat: UploadStatistic::new(),
>          };
>  
> -        Self {
> +        let backend = datastore.backend()?;
> +        Ok(Self {
>              result_attributes: json!({}),
>              env_type,
>              auth_id,
> @@ -148,8 +150,9 @@ impl BackupEnvironment {
>              formatter: JSON_FORMATTER,
>              backup_dir,
>              last_backup: None,
> +            backend,
>              state: Arc::new(Mutex::new(state)),
> -        }
> +        })
>      }
>  
>      /// Register a Chunk with associated length.
> diff --git a/src/api2/backup/mod.rs b/src/api2/backup/mod.rs
> index a723e7cb0..026f1f106 100644
> --- a/src/api2/backup/mod.rs
> +++ b/src/api2/backup/mod.rs
> @@ -187,7 +187,8 @@ fn upgrade_to_backup_protocol(
>              }
>  
>              // lock last snapshot to prevent forgetting/pruning it during backup
> -            let guard = last.backup_dir
> +            let guard = last
> +                .backup_dir
>                  .lock_shared()
>                  .with_context(|| format!("while locking last snapshot during backup '{last:?}'"))?;
>              Some(guard)
> @@ -206,14 +207,14 @@ fn upgrade_to_backup_protocol(
>              Some(worker_id),
>              auth_id.to_string(),
>              true,
> -            move |worker| {
> +            move |worker| async move {
>                  let mut env = BackupEnvironment::new(
>                      env_type,
>                      auth_id,
>                      worker.clone(),
>                      datastore,
>                      backup_dir,
> -                );
> +                )?;
>  
>                  env.debug = debug;
>                  env.last_backup = last_backup;
> @@ -247,74 +248,73 @@ fn upgrade_to_backup_protocol(
>                          http.max_frame_size(4 * 1024 * 1024);
>  
>                          let env3 = env2.clone();
> -                        http.serve_connection(conn, TowerToHyperService::new(service)).map(move |result| {
> -                            match result {
> -                                Err(err) => {
> -                                    // Avoid  Transport endpoint is not connected (os error 107)
> -                                    // fixme: find a better way to test for that error
> -                                    if err.to_string().starts_with("connection error")
> -                                        && env3.finished()
> -                                    {
> -                                        Ok(())
> -                                    } else {
> -                                        Err(Error::from(err))
> +                        http.serve_connection(conn, TowerToHyperService::new(service))
> +                            .map(move |result| {
> +                                match result {
> +                                    Err(err) => {
> +                                        // Avoid  Transport endpoint is not connected (os error 107)
> +                                        // fixme: find a better way to test for that error
> +                                        if err.to_string().starts_with("connection error")
> +                                            && env3.finished()
> +                                        {
> +                                            Ok(())
> +                                        } else {
> +                                            Err(Error::from(err))
> +                                        }
>                                      }
> +                                    Ok(()) => Ok(()),
>                                  }
> -                                Ok(()) => Ok(()),
> -                            }
> -                        })
> +                            })
>                      });
>                  let mut abort_future = abort_future.map(|_| Err(format_err!("task aborted")));
>  
> -                async move {
> -                    // keep flock until task ends
> -                    let _group_guard = _group_guard;
> -                    let snap_guard = snap_guard;
> -                    let _last_guard = _last_guard;
> -
> -                    let res = select! {
> -                        req = req_fut => req,
> -                        abrt = abort_future => abrt,
> -                    };
> -                    if benchmark {
> -                        env.log("benchmark finished successfully");
> -                        proxmox_async::runtime::block_in_place(|| env.remove_backup())?;
> -                        return Ok(());
> +                // keep flock until task ends
> +                let _group_guard = _group_guard;
> +                let snap_guard = snap_guard;
> +                let _last_guard = _last_guard;
> +
> +                let res = select! {
> +                    req = req_fut => req,
> +                    abrt = abort_future => abrt,
> +                };
> +                if benchmark {
> +                    env.log("benchmark finished successfully");
> +                    proxmox_async::runtime::block_in_place(|| env.remove_backup())?;
> +                    return Ok(());
> +                }
> +
> +                let verify = |env: BackupEnvironment| {
> +                    if let Err(err) = env.verify_after_complete(snap_guard) {
> +                        env.log(format!(
> +                            "backup finished, but starting the requested verify task failed: {}",
> +                            err
> +                        ));
>                      }
> +                };
>  
> -                    let verify = |env: BackupEnvironment| {
> -                        if let Err(err) = env.verify_after_complete(snap_guard) {
> -                            env.log(format!(
> -                                "backup finished, but starting the requested verify task failed: {}",
> -                                err
> -                            ));
> -                        }
> -                    };
> -
> -                    match (res, env.ensure_finished()) {
> -                        (Ok(_), Ok(())) => {
> -                            env.log("backup finished successfully");
> -                            verify(env);
> -                            Ok(())
> -                        }
> -                        (Err(err), Ok(())) => {
> -                            // ignore errors after finish
> -                            env.log(format!("backup had errors but finished: {}", err));
> -                            verify(env);
> -                            Ok(())
> -                        }
> -                        (Ok(_), Err(err)) => {
> -                            env.log(format!("backup ended and finish failed: {}", err));
> -                            env.log("removing unfinished backup");
> -                            proxmox_async::runtime::block_in_place(|| env.remove_backup())?;
> -                            Err(err)
> -                        }
> -                        (Err(err), Err(_)) => {
> -                            env.log(format!("backup failed: {}", err));
> -                            env.log("removing failed backup");
> -                            proxmox_async::runtime::block_in_place(|| env.remove_backup())?;
> -                            Err(err)
> -                        }
> +                match (res, env.ensure_finished()) {
> +                    (Ok(_), Ok(())) => {
> +                        env.log("backup finished successfully");
> +                        verify(env);
> +                        Ok(())
> +                    }
> +                    (Err(err), Ok(())) => {
> +                        // ignore errors after finish
> +                        env.log(format!("backup had errors but finished: {}", err));
> +                        verify(env);
> +                        Ok(())
> +                    }
> +                    (Ok(_), Err(err)) => {
> +                        env.log(format!("backup ended and finish failed: {}", err));
> +                        env.log("removing unfinished backup");
> +                        proxmox_async::runtime::block_in_place(|| env.remove_backup())?;
> +                        Err(err)
> +                    }
> +                    (Err(err), Err(_)) => {
> +                        env.log(format!("backup failed: {}", err));
> +                        env.log("removing failed backup");
> +                        proxmox_async::runtime::block_in_place(|| env.remove_backup())?;
> +                        Err(err)
>                      }
>                  }
>              },

-- 
- Lukas



_______________________________________________
pbs-devel mailing list
pbs-devel@lists.proxmox.com
https://lists.proxmox.com/cgi-bin/mailman/listinfo/pbs-devel


  reply	other threads:[~2025-07-18  7:53 UTC|newest]

Thread overview: 108+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-07-15 12:52 [pbs-devel] [PATCH proxmox{, -backup} v8 00/54] fix #2943: S3 storage backend for datastores Christian Ebner
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox v8 1/9] s3 client: add crate for AWS s3 compatible object store client Christian Ebner
2025-07-15 21:13   ` [pbs-devel] partially-applied-series: " Thomas Lamprecht
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox v8 2/9] s3 client: implement AWS signature v4 request authentication Christian Ebner
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox v8 3/9] s3 client: add dedicated type for s3 object keys Christian Ebner
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox v8 4/9] s3 client: add type for last modified timestamp in responses Christian Ebner
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox v8 5/9] s3 client: add helper to parse http date headers Christian Ebner
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox v8 6/9] s3 client: implement methods to operate on s3 objects in bucket Christian Ebner
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox v8 7/9] s3 client: add example usage for basic operations Christian Ebner
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox v8 8/9] pbs-api-types: extend datastore config by backend config enum Christian Ebner
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox v8 9/9] pbs-api-types: maintenance: add new maintenance mode S3 refresh Christian Ebner
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox-backup v8 01/45] datastore: add helpers for path/digest to s3 object key conversion Christian Ebner
2025-07-18  7:24   ` Lukas Wagner
2025-07-18  8:34     ` Christian Ebner
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox-backup v8 02/45] config: introduce s3 object store client configuration Christian Ebner
2025-07-18  7:22   ` Lukas Wagner
2025-07-18  8:37     ` Christian Ebner
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox-backup v8 03/45] api: config: implement endpoints to manipulate and list s3 configs Christian Ebner
2025-07-18  7:32   ` Lukas Wagner
2025-07-18  8:40     ` Christian Ebner
2025-07-18  9:07       ` Lukas Wagner
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox-backup v8 04/45] api: datastore: check s3 backend bucket access on datastore create Christian Ebner
2025-07-18  7:40   ` Lukas Wagner
2025-07-18  8:55     ` Christian Ebner
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox-backup v8 05/45] api/cli: add endpoint and command to check s3 client connection Christian Ebner
2025-07-18  7:43   ` Lukas Wagner
2025-07-18  9:04     ` Christian Ebner
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox-backup v8 06/45] datastore: allow to get the backend for a datastore Christian Ebner
2025-07-18  7:52   ` Lukas Wagner
2025-07-18  9:10     ` Christian Ebner
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox-backup v8 07/45] api: backup: store datastore backend in runtime environment Christian Ebner
2025-07-18  7:54   ` Lukas Wagner [this message]
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox-backup v8 08/45] api: backup: conditionally upload chunks to s3 object store backend Christian Ebner
2025-07-18  8:11   ` Lukas Wagner
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox-backup v8 09/45] api: backup: conditionally upload blobs " Christian Ebner
2025-07-18  8:13   ` Lukas Wagner
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox-backup v8 10/45] api: backup: conditionally upload indices " Christian Ebner
2025-07-18  8:20   ` Lukas Wagner
2025-07-18  9:24     ` Christian Ebner
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox-backup v8 11/45] api: backup: conditionally upload manifest " Christian Ebner
2025-07-18  8:26   ` Lukas Wagner
2025-07-18  9:33     ` Christian Ebner
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox-backup v8 12/45] api: datastore: conditionally upload client log to s3 backend Christian Ebner
2025-07-18  8:28   ` Lukas Wagner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 13/45] sync: pull: conditionally upload content " Christian Ebner
2025-07-18  8:35   ` Lukas Wagner
2025-07-18  9:43     ` Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 14/45] api: reader: fetch chunks based on datastore backend Christian Ebner
2025-07-18  8:38   ` Lukas Wagner
2025-07-18  9:58     ` Christian Ebner
2025-07-18 10:03       ` Lukas Wagner
2025-07-18 10:10         ` Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 15/45] datastore: local chunk reader: read chunks based on backend Christian Ebner
2025-07-18  8:45   ` Lukas Wagner
2025-07-18 10:11     ` Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 16/45] verify worker: add datastore backed to verify worker Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 17/45] verify: implement chunk verification for stores with s3 backend Christian Ebner
2025-07-18  8:56   ` Lukas Wagner
2025-07-18 11:45     ` Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 18/45] datastore: create namespace marker in " Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 19/45] datastore: create/delete protected marker file on s3 storage backend Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 20/45] datastore: prune groups/snapshots from s3 object store backend Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 21/45] datastore: get and set owner for s3 " Christian Ebner
2025-07-18  9:25   ` Lukas Wagner
2025-07-18 12:12     ` Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 22/45] datastore: implement garbage collection for s3 backend Christian Ebner
2025-07-18  9:47   ` Lukas Wagner
2025-07-18 14:31     ` Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 23/45] ui: add datastore type selector and reorganize component layout Christian Ebner
2025-07-18  9:55   ` Lukas Wagner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 24/45] ui: add s3 client edit window for configuration create/edit Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 25/45] ui: add s3 client view for configuration Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 26/45] ui: expose the s3 client view in the navigation tree Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 27/45] ui: add s3 client selector and bucket field for s3 backend setup Christian Ebner
2025-07-18 10:02   ` Lukas Wagner
2025-07-19 12:28     ` Christian Ebner
2025-07-22  9:25       ` Lukas Wagner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 28/45] tools: lru cache: add removed callback for evicted cache nodes Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 29/45] tools: async lru cache: implement insert, remove and contains methods Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 30/45] datastore: add local datastore cache for network attached storages Christian Ebner
2025-07-18 11:24   ` Lukas Wagner
2025-07-18 14:59     ` Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 31/45] api: backup: use local datastore cache on s3 backend chunk upload Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 32/45] api: reader: use local datastore cache on s3 backend chunk fetching Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 33/45] datastore: local chunk reader: get cached chunk from local cache store Christian Ebner
2025-07-18 11:36   ` Lukas Wagner
2025-07-18 15:04     ` Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 34/45] api: backup: add no-cache flag to bypass local datastore cache Christian Ebner
2025-07-18 11:41   ` Lukas Wagner
2025-07-18 15:37     ` Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 35/45] api/datastore: implement refresh endpoint for stores with s3 backend Christian Ebner
2025-07-18 12:01   ` Lukas Wagner
2025-07-18 15:51     ` Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 36/45] cli: add dedicated subcommand for datastore s3 refresh Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 37/45] ui: render s3 refresh as valid maintenance type and task description Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 38/45] ui: expose s3 refresh button for datastores backed by object store Christian Ebner
2025-07-18 12:46   ` Lukas Wagner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 39/45] datastore: conditionally upload atime marker chunk to s3 backend Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 40/45] bin: implement client subcommands for s3 configuration manipulation Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 41/45] bin: expose reuse-datastore flag for proxmox-backup-manager Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 42/45] datastore: mark store as in-use by setting marker on s3 backend Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 43/45] datastore: run s3-refresh when reusing a datastore with " Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 44/45] api/ui: add flag to allow overwriting in-use marker for " Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 45/45] docs: Add section describing how to setup s3 backed datastore Christian Ebner
2025-07-18 13:14   ` Maximiliano Sandoval
2025-07-18 14:38     ` Christian Ebner
2025-07-18 13:16 ` [pbs-devel] [PATCH proxmox{, -backup} v8 00/54] fix #2943: S3 storage backend for datastores Lukas Wagner
2025-07-19 12:52 ` [pbs-devel] superseded: " Christian Ebner

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=db82b803-8e53-4841-991f-8a9b05e68129@proxmox.com \
    --to=l.wagner@proxmox.com \
    --cc=c.ebner@proxmox.com \
    --cc=pbs-devel@lists.proxmox.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox
Service provided by Proxmox Server Solutions GmbH | Privacy | Legal