public inbox for pve-devel@lists.proxmox.com
 help / color / mirror / Atom feed
From: Fiona Ebner <f.ebner@proxmox.com>
To: "Proxmox VE development discussion" <pve-devel@lists.proxmox.com>,
	"Fabian Grünbichler" <f.gruenbichler@proxmox.com>
Subject: Re: [pve-devel] [POC storage v3 15/34] WIP Borg plugin
Date: Tue, 11 Mar 2025 15:15:22 +0100	[thread overview]
Message-ID: <0ae8397c-7edd-41ff-a525-b46deeabd22e@proxmox.com> (raw)
In-Reply-To: <1731489757.shva7ho8xr.astroid@yuna.none>

Am 13.11.24 um 11:52 schrieb Fabian Grünbichler:
> On November 7, 2024 5:51 pm, Fiona Ebner wrote:
>> +my sub prepare_run_dir {
>> +    my ($archive, $operation) = @_;
>> +
>> +    my $run_dir = "/run/pve-storage-borg-plugin/${archive}.${operation}";
>> +    _remove_tree($run_dir);
>> +    make_path($run_dir);
>> +    die "unable to create directory $run_dir\n" if !-d $run_dir;
> 
> this is used as part of restoring - what if I restore the same archive
> in parallel into two different VMIDs?

Right, I'll suffix the run_dir path with the current PID.

---snip 8<---

>> +my sub file_contents_from_archive {
>> +    my ($self, $archive, $file) = @_;
>> +
>> +    my $run_dir = prepare_run_dir($archive, "file-contents");
>> +
>> +    my $raw;
>> +
>> +    eval {
>> +	local $CWD = $run_dir;
>> +
>> +	$self->{'storage-plugin'}->borg_cmd_extract(
>> +	    $self->{scfg},
>> +	    $self->{storeid},
>> +	    $archive,
>> +	    [$file],
>> +	);
> 
> borg extract has `--stdout`, which would save writing to the FS here
> (since this is only used to extract config file, it should be okay)?

Will change it in v5.

---snip 8<---

>> +sub job_hook {
>> +    my ($self, $phase, $info) = @_;
>> +
>> +    if ($phase eq 'start') {
>> +	$self->{'job-id'} = $info->{'start-time'};
>> +	$self->{password} = $self->{'storage-plugin'}->borg_get_password(
>> +	    $self->{scfg}, $self->{storeid});
>> +	$self->{'ssh-key-fh'} = $self->{'storage-plugin'}->borg_open_ssh_key(
>> +	    $self->{scfg}, $self->{storeid});
>> +    } else {
>> +	delete $self->{password};
> 
> why do we delete this, but don't close the ssh-key-fh ?

Will close it in v5.

> 
>> +    }
>> +
>> +    return;
>> +}
>> +
>> +sub backup_hook {
>> +    my ($self, $phase, $vmid, $vmtype, $info) = @_;
>> +
>> +    if ($phase eq 'start') {
>> +	$self->{$vmid}->{'task-size'} = 0;
>> +    } elsif ($phase eq 'prepare') {
>> +	if ($vmtype eq 'lxc') {
>> +	    my $archive = $self->{$vmid}->{archive};
>> +	    my $run_dir = prepare_run_dir($archive, "backup-container");
>> +	    $self->{$vmid}->{'run-dir'} = $run_dir;
>> +
>> +	    my $create_dir = sub {
>> +		my $dir = shift;
>> +		make_path($dir);
>> +		die "unable to create directory $dir\n" if !-d $dir;
>> +		chown($info->{'backup-user-id'}, -1, $dir)
>> +		    or die "unable to change owner for $dir\n";
>> +	    };
>> +
>> +	    $create_dir->("${run_dir}/backup/");
>> +	    $create_dir->("${run_dir}/backup/filesystem");
>> +	    $create_dir->("${run_dir}/ssh");
>> +	    $create_dir->("${run_dir}/.config");
>> +	    $create_dir->("${run_dir}/.cache");
> 
> so this is a bit tricky.. we need unpriv access (to do the backup), but
> we store sensitive things here that we don't actually want to hand out
> to everyone..
I'll change the run dir and other dirs to be 0700 in v5.

> 
>> +
>> +	    for my $subdir ($info->{sources}->@*) {
>> +		PVE::Tools::run_command([
>> +		    'mount',
>> +		    '-o', 'bind,ro',
>> +		    "$info->{directory}/${subdir}",
>> +		    "${run_dir}/backup/filesystem/${subdir}",
>> +		]);
>> +	    }
>> +	}
>> +    } elsif ($phase eq 'end' || $phase eq 'abort') {
>> +	if ($vmtype eq 'lxc') {
>> +	    my $run_dir = $self->{$vmid}->{'run-dir'};
>> +	    eval {
>> +		eval { PVE::Tools::run_command(['umount', "${run_dir}/ssh"]); };
> 
> this might warrant a comment ;) a tmpfs is mounted there in
> backup_container..

Will add a comment in v5.

---snip 8<---

>> +sub restore_vm_init {
>> +    my ($self, $volname, $storeid) = @_;
>> +
>> +    my $res = {};
>> +
>> +    my (undef, $archive, $vmid) = $self->{'storage-plugin'}->parse_volname($volname);
>> +    my $mount_point = prepare_run_dir($archive, "restore-vm");
>> +
>> +    $self->{'storage-plugin'}->borg_cmd_mount(
>> +	$self->{scfg},
>> +	$self->{storeid},
>> +	$archive,
>> +	$mount_point,
>> +    );
> 
> haven't actually tested this code, but what are the permissions like for
> this mounted backup archive contents? we don't want to expose guest
> volumes as world-readable either..
> 

From a quick test, while it shows as world-readable when looking at it
via the root user, it's a fuse mount not actually accessible by other
users. Still, I decided to do the mount in a subdirectory in v5 just to
be sure.

---snip 8<---

>> +sub properties {
>> +    return {
>> +	'repository-path' => {
>> +	    description => "Path to the backup repository",
>> +	    type => 'string',
>> +	},
>> +	'ssh-key' => {
>> +	    description => "FIXME", # FIXME
>> +	    type => 'string',
>> +	},
>> +	'ssh-fingerprint' => {
>> +	    description => "FIXME", # FIXME
>> +	    type => 'string',
>> +	},
> 
> these should probably get descriptions and formats, but this is titled
> WIP :)

As discussed of list, will fix these up, using better names and using
'pem-string' format and PVE::Tools::validate_ssh_public_keys()

---snip 8<---

>> diff --git a/src/PVE/Storage/Makefile b/src/PVE/Storage/Makefile
>> index acd37f4..9fe2c66 100644
>> --- a/src/PVE/Storage/Makefile
>> +++ b/src/PVE/Storage/Makefile
>> @@ -14,6 +14,7 @@ SOURCES= \
>>  	PBSPlugin.pm \
>>  	BTRFSPlugin.pm \
>>  	LvmThinPlugin.pm \
>> +	BorgBackupPlugin.pm \
> 
> do we want this one here, while the other one is in Custom?
> 

Ah no, or at least not yet. Moved to Custom in v5.


_______________________________________________
pve-devel mailing list
pve-devel@lists.proxmox.com
https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel

  reply	other threads:[~2025-03-11 14:15 UTC|newest]

Thread overview: 65+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2024-11-07 16:51 [pve-devel] [RFC qemu/common/storage/qemu-server/container/manager v3 00/34] backup provider API Fiona Ebner
2024-11-07 16:51 ` [pve-devel] [PATCH qemu v3 01/34] block/reqlist: allow adding overlapping requests Fiona Ebner
2024-11-07 16:51 ` [pve-devel] [PATCH qemu v3 02/34] PVE backup: fixup error handling for fleecing Fiona Ebner
2024-11-07 16:51 ` [pve-devel] [PATCH qemu v3 03/34] PVE backup: factor out setting up snapshot access " Fiona Ebner
2024-11-07 16:51 ` [pve-devel] [PATCH qemu v3 04/34] PVE backup: save device name in device info structure Fiona Ebner
2024-11-07 16:51 ` [pve-devel] [PATCH qemu v3 05/34] PVE backup: include device name in error when setting up snapshot access fails Fiona Ebner
2024-11-07 16:51 ` [pve-devel] [RFC qemu v3 06/34] PVE backup: add target ID in backup state Fiona Ebner
2024-11-12 16:46   ` Fabian Grünbichler
2024-11-13  9:22     ` Fiona Ebner
2024-11-13  9:33       ` Fiona Ebner
2024-11-13 11:16       ` Fabian Grünbichler
2024-11-13 11:40         ` Fiona Ebner
2024-11-13 12:03           ` Fabian Grünbichler
2024-11-07 16:51 ` [pve-devel] [RFC qemu v3 07/34] PVE backup: get device info: allow caller to specify filter for which devices use fleecing Fiona Ebner
2024-11-07 16:51 ` [pve-devel] [RFC qemu v3 08/34] PVE backup: implement backup access setup and teardown API for external providers Fiona Ebner
2024-11-07 16:51 ` [pve-devel] [RFC qemu v3 09/34] PVE backup: implement bitmap support for external backup access Fiona Ebner
2024-11-07 16:51 ` [pve-devel] [RFC common v3 10/34] env: add module with helpers to run a Perl subroutine in a user namespace Fiona Ebner
2024-11-11 18:33   ` Thomas Lamprecht
2024-11-12 10:19     ` Fiona Ebner
2024-11-12 14:20   ` Fabian Grünbichler
2024-11-13 10:08     ` Fiona Ebner
2024-11-13 11:15       ` Fabian Grünbichler
2024-11-07 16:51 ` [pve-devel] [RFC storage v3 11/34] add storage_has_feature() helper function Fiona Ebner
2024-11-07 16:51 ` [pve-devel] [RFC storage v3 12/34] plugin: introduce new_backup_provider() method Fiona Ebner
2024-11-07 16:51 ` [pve-devel] [RFC storage v3 13/34] extract backup config: delegate to backup provider for storages that support it Fiona Ebner
2024-11-07 16:51 ` [pve-devel] [POC storage v3 14/34] add backup provider example Fiona Ebner
2024-11-13 10:52   ` Fabian Grünbichler
2025-03-12 13:05     ` Fiona Ebner
2024-11-07 16:51 ` [pve-devel] [POC storage v3 15/34] WIP Borg plugin Fiona Ebner
2024-11-13 10:52   ` Fabian Grünbichler
2025-03-11 14:15     ` Fiona Ebner [this message]
2024-11-07 16:51 ` [pve-devel] [PATCH qemu-server v3 16/34] move nbd_stop helper to QMPHelpers module Fiona Ebner
2024-11-11 13:55   ` [pve-devel] applied: " Fabian Grünbichler
2024-11-07 16:51 ` [pve-devel] [PATCH qemu-server v3 17/34] backup: move cleanup of fleecing images to cleanup method Fiona Ebner
2024-11-12  9:26   ` [pve-devel] applied: " Fabian Grünbichler
2024-11-07 16:51 ` [pve-devel] [PATCH qemu-server v3 18/34] backup: cleanup: check if VM is running before issuing QMP commands Fiona Ebner
2024-11-12  9:26   ` [pve-devel] applied: " Fabian Grünbichler
2024-11-07 16:51 ` [pve-devel] [PATCH qemu-server v3 19/34] backup: keep track of block-node size for fleecing Fiona Ebner
2024-11-11 14:22   ` Fabian Grünbichler
2024-11-12  9:50     ` Fiona Ebner
2024-11-07 16:51 ` [pve-devel] [RFC qemu-server v3 20/34] backup: allow adding fleecing images also for EFI and TPM Fiona Ebner
2024-11-12  9:26   ` Fabian Grünbichler
2024-11-07 16:51 ` [pve-devel] [RFC qemu-server v3 21/34] backup: implement backup for external providers Fiona Ebner
2024-11-12 12:27   ` Fabian Grünbichler
2024-11-12 14:35     ` Fiona Ebner
2024-11-12 15:17       ` Fabian Grünbichler
2024-11-07 16:51 ` [pve-devel] [PATCH qemu-server v3 22/34] restore: die early when there is no size for a device Fiona Ebner
2024-11-12  9:28   ` [pve-devel] applied: " Fabian Grünbichler
2024-11-07 16:51 ` [pve-devel] [RFC qemu-server v3 23/34] backup: implement restore for external providers Fiona Ebner
2024-11-07 16:51 ` [pve-devel] [RFC qemu-server v3 24/34] backup restore: external: hardening check for untrusted source image Fiona Ebner
2024-11-07 16:51 ` [pve-devel] [PATCH container v3 25/34] create: add missing include of PVE::Storage::Plugin Fiona Ebner
2024-11-12 15:22   ` [pve-devel] applied: " Fabian Grünbichler
2024-11-07 16:51 ` [pve-devel] [RFC container v3 26/34] backup: implement backup for external providers Fiona Ebner
2024-11-07 16:51 ` [pve-devel] [RFC container v3 27/34] create: factor out tar restore command helper Fiona Ebner
2024-11-12 16:28   ` Fabian Grünbichler
2024-11-12 17:08   ` [pve-devel] applied: " Thomas Lamprecht
2024-11-07 16:51 ` [pve-devel] [RFC container v3 28/34] backup: implement restore for external providers Fiona Ebner
2024-11-12 16:27   ` Fabian Grünbichler
2024-11-07 16:51 ` [pve-devel] [RFC container v3 29/34] external restore: don't use 'one-file-system' tar flag when restoring from a directory Fiona Ebner
2024-11-07 16:51 ` [pve-devel] [RFC container v3 30/34] create: factor out compression option helper Fiona Ebner
2024-11-07 16:51 ` [pve-devel] [RFC container v3 31/34] restore tar archive: check potentially untrusted archive Fiona Ebner
2024-11-07 16:51 ` [pve-devel] [RFC container v3 32/34] api: add early check against restoring privileged container from external source Fiona Ebner
2024-11-07 16:51 ` [pve-devel] [PATCH manager v3 33/34] ui: backup: also check for backup subtype to classify archive Fiona Ebner
2024-11-07 16:51 ` [pve-devel] [RFC manager v3 34/34] backup: implement backup for external providers Fiona Ebner
2024-11-12 15:50 ` [pve-devel] partially-applied: [RFC qemu/common/storage/qemu-server/container/manager v3 00/34] backup provider API Thomas Lamprecht

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=0ae8397c-7edd-41ff-a525-b46deeabd22e@proxmox.com \
    --to=f.ebner@proxmox.com \
    --cc=f.gruenbichler@proxmox.com \
    --cc=pve-devel@lists.proxmox.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox
Service provided by Proxmox Server Solutions GmbH | Privacy | Legal