[pbs-devel] [PATCH proxmox-backup v8 02/45] config: introduce s3 object store client configuration
Lukas Wagner
l.wagner at proxmox.com
Fri Jul 18 09:22:09 CEST 2025
With my minor complaints fixed:
Reviewed-by: Lukas Wagner <l.wagner at proxmox.com>
On 2025-07-15 14:52, Christian Ebner wrote:
> Adds the client configuration for s3 object store as dedicated
> configuration files, with secrets being stored separately from the
> regular configuration and excluded from api responses for security
> reasons.
>
> Signed-off-by: Christian Ebner <c.ebner at proxmox.com>
> ---
> changes since version 7:
> - no changes
>
> pbs-config/Cargo.toml | 1 +
> pbs-config/src/lib.rs | 1 +
> pbs-config/src/s3.rs | 83 +++++++++++++++++++++++++++++++++++++++++++
> 3 files changed, 85 insertions(+)
> create mode 100644 pbs-config/src/s3.rs
>
> diff --git a/pbs-config/Cargo.toml b/pbs-config/Cargo.toml
> index 284149658..74afb3c64 100644
> --- a/pbs-config/Cargo.toml
> +++ b/pbs-config/Cargo.toml
> @@ -19,6 +19,7 @@ serde_json.workspace = true
>
> proxmox-notify.workspace = true
> proxmox-router = { workspace = true, default-features = false }
> +proxmox-s3-client.workspace = true
> proxmox-schema.workspace = true
> proxmox-section-config.workspace = true
> proxmox-shared-memory.workspace = true
> diff --git a/pbs-config/src/lib.rs b/pbs-config/src/lib.rs
> index 9c4d77c24..d03c079ab 100644
> --- a/pbs-config/src/lib.rs
> +++ b/pbs-config/src/lib.rs
> @@ -10,6 +10,7 @@ pub mod network;
> pub mod notifications;
> pub mod prune;
> pub mod remote;
> +pub mod s3;
> pub mod sync;
> pub mod tape_job;
> pub mod token_shadow;
> diff --git a/pbs-config/src/s3.rs b/pbs-config/src/s3.rs
> new file mode 100644
> index 000000000..ec3998834
> --- /dev/null
> +++ b/pbs-config/src/s3.rs
> @@ -0,0 +1,83 @@
> +use std::collections::HashMap;
> +use std::sync::LazyLock;
> +
> +use anyhow::Error;
> +
> +use proxmox_s3_client::{S3ClientConfig, S3ClientSecretsConfig};
> +use proxmox_schema::*;
> +use proxmox_section_config::{SectionConfig, SectionConfigData, SectionConfigPlugin};
> +
> +use pbs_api_types::JOB_ID_SCHEMA;
> +
> +use crate::{open_backup_lockfile, replace_backup_config, BackupLockGuard};
> +
> +pub static CONFIG: LazyLock<SectionConfig> = LazyLock::new(init);
> +
> +fn init() -> SectionConfig {
> + let obj_schema = match S3ClientConfig::API_SCHEMA {
> + Schema::Object(ref obj_schema) => obj_schema,
> + _ => unreachable!(),
> + };
> + let secrets_obj_schema = match S3ClientSecretsConfig::API_SCHEMA {
> + Schema::Object(ref obj_schema) => obj_schema,
> + _ => unreachable!(),
> + };
You can use API_SCHEMA::unwrap_object_schema here, that's a bit nicer to read :)
> +
> + let plugin =
> + SectionConfigPlugin::new("s3client".to_string(), Some(String::from("id")), obj_schema);
> + let secrets_plugin = SectionConfigPlugin::new(
> + "s3secrets".to_string(),
> + Some(String::from("secrets-id")),
> + secrets_obj_schema,
> + );
> + let mut config = SectionConfig::new(&JOB_ID_SCHEMA);
> + config.register_plugin(plugin);
> + config.register_plugin(secrets_plugin);
> +
> + config
> +}
> +
> +pub const S3_CFG_FILENAME: &str = "/etc/proxmox-backup/s3.cfg";
> +pub const S3_SECRETS_CFG_FILENAME: &str = "/etc/proxmox-backup/s3-secrets.cfg";
> +pub const S3_CFG_LOCKFILE: &str = "/etc/proxmox-backup/.s3.lck";
You can use the pbs_buildcfg::configdir macro to build these paths. Also please
add some docstrings to public consts like these.
> +
> +/// Get exclusive lock
> +pub fn lock_config() -> Result<BackupLockGuard, Error> {
> + open_backup_lockfile(S3_CFG_LOCKFILE, None, true)
> +}
> +
> +pub fn config() -> Result<(SectionConfigData, [u8; 32]), Error> {
> + parse_config(S3_CFG_FILENAME)
> +}
> +
> +pub fn secrets_config() -> Result<(SectionConfigData, [u8; 32]), Error> {
> + parse_config(S3_SECRETS_CFG_FILENAME)
> +}
> +
> +pub fn save_config(config: &SectionConfigData, secrets: &SectionConfigData) -> Result<(), Error> {
> + let raw = CONFIG.write(S3_CFG_FILENAME, config)?;
> + replace_backup_config(S3_CFG_FILENAME, raw.as_bytes())?;
> +
> + let secrets_raw = CONFIG.write(S3_SECRETS_CFG_FILENAME, secrets)?;
> + // Secrets are stored with `backup` permissions to allow reading from
> + // not protected api endpoints as well.
> + replace_backup_config(S3_SECRETS_CFG_FILENAME, secrets_raw.as_bytes())?;
> +
> + Ok(())
> +}
^ These public functions lack docstrings
> +
> +// shell completion helper
> +pub fn complete_s3_client_id(_arg: &str, _param: &HashMap<String, String>) -> Vec<String> {
> + match config() {
> + Ok((data, _digest)) => data.sections.keys().map(|id| id.to_string()).collect(),
> + Err(_) => Vec::new(),
> + }
> +}
> +
> +fn parse_config(path: &str) -> Result<(SectionConfigData, [u8; 32]), Error> {
> + let content = proxmox_sys::fs::file_read_optional_string(path)?;
> + let content = content.unwrap_or_default();
> + let digest = openssl::sha::sha256(content.as_bytes());
> + let data = CONFIG.parse(path, &content)?;
> + Ok((data, digest))
> +}
--
- Lukas
More information about the pbs-devel
mailing list