[pbs-devel] [PATCH proxmox-backup v8 02/45] config: introduce s3 object store client configuration
Christian Ebner
c.ebner at proxmox.com
Fri Jul 18 10:37:15 CEST 2025
On 7/18/25 9:22 AM, Lukas Wagner wrote:
> With my minor complaints fixed:
>
> Reviewed-by: Lukas Wagner <l.wagner at proxmox.com>
>
> On 2025-07-15 14:52, Christian Ebner wrote:
>> Adds the client configuration for s3 object store as dedicated
>> configuration files, with secrets being stored separately from the
>> regular configuration and excluded from api responses for security
>> reasons.
>>
>> Signed-off-by: Christian Ebner <c.ebner at proxmox.com>
>> ---
>> changes since version 7:
>> - no changes
>>
>> pbs-config/Cargo.toml | 1 +
>> pbs-config/src/lib.rs | 1 +
>> pbs-config/src/s3.rs | 83 +++++++++++++++++++++++++++++++++++++++++++
>> 3 files changed, 85 insertions(+)
>> create mode 100644 pbs-config/src/s3.rs
>>
>> diff --git a/pbs-config/Cargo.toml b/pbs-config/Cargo.toml
>> index 284149658..74afb3c64 100644
>> --- a/pbs-config/Cargo.toml
>> +++ b/pbs-config/Cargo.toml
>> @@ -19,6 +19,7 @@ serde_json.workspace = true
>>
>> proxmox-notify.workspace = true
>> proxmox-router = { workspace = true, default-features = false }
>> +proxmox-s3-client.workspace = true
>> proxmox-schema.workspace = true
>> proxmox-section-config.workspace = true
>> proxmox-shared-memory.workspace = true
>> diff --git a/pbs-config/src/lib.rs b/pbs-config/src/lib.rs
>> index 9c4d77c24..d03c079ab 100644
>> --- a/pbs-config/src/lib.rs
>> +++ b/pbs-config/src/lib.rs
>> @@ -10,6 +10,7 @@ pub mod network;
>> pub mod notifications;
>> pub mod prune;
>> pub mod remote;
>> +pub mod s3;
>> pub mod sync;
>> pub mod tape_job;
>> pub mod token_shadow;
>> diff --git a/pbs-config/src/s3.rs b/pbs-config/src/s3.rs
>> new file mode 100644
>> index 000000000..ec3998834
>> --- /dev/null
>> +++ b/pbs-config/src/s3.rs
>> @@ -0,0 +1,83 @@
>> +use std::collections::HashMap;
>> +use std::sync::LazyLock;
>> +
>> +use anyhow::Error;
>> +
>> +use proxmox_s3_client::{S3ClientConfig, S3ClientSecretsConfig};
>> +use proxmox_schema::*;
>> +use proxmox_section_config::{SectionConfig, SectionConfigData, SectionConfigPlugin};
>> +
>> +use pbs_api_types::JOB_ID_SCHEMA;
>> +
>> +use crate::{open_backup_lockfile, replace_backup_config, BackupLockGuard};
>> +
>> +pub static CONFIG: LazyLock<SectionConfig> = LazyLock::new(init);
>> +
>> +fn init() -> SectionConfig {
>> + let obj_schema = match S3ClientConfig::API_SCHEMA {
>> + Schema::Object(ref obj_schema) => obj_schema,
>> + _ => unreachable!(),
>> + };
>> + let secrets_obj_schema = match S3ClientSecretsConfig::API_SCHEMA {
>> + Schema::Object(ref obj_schema) => obj_schema,
>> + _ => unreachable!(),
>> + };
>
> You can use API_SCHEMA::unwrap_object_schema here, that's a bit nicer to read :)
agreed, incorporated this for the next iteration of the patches
>> +
>> + let plugin =
>> + SectionConfigPlugin::new("s3client".to_string(), Some(String::from("id")), obj_schema);
>> + let secrets_plugin = SectionConfigPlugin::new(
>> + "s3secrets".to_string(),
>> + Some(String::from("secrets-id")),
>> + secrets_obj_schema,
>> + );
>> + let mut config = SectionConfig::new(&JOB_ID_SCHEMA);
>> + config.register_plugin(plugin);
>> + config.register_plugin(secrets_plugin);
>> +
>> + config
>> +}
>> +
>> +pub const S3_CFG_FILENAME: &str = "/etc/proxmox-backup/s3.cfg";
>> +pub const S3_SECRETS_CFG_FILENAME: &str = "/etc/proxmox-backup/s3-secrets.cfg";
>> +pub const S3_CFG_LOCKFILE: &str = "/etc/proxmox-backup/.s3.lck";
>
> You can use the pbs_buildcfg::configdir macro to build these paths. Also please
> add some docstrings to public consts like these.
same, added the helper so we always use the configured path from
buildcfg as base path for these constans.
>
>> +
>> +/// Get exclusive lock
>> +pub fn lock_config() -> Result<BackupLockGuard, Error> {
>> + open_backup_lockfile(S3_CFG_LOCKFILE, None, true)
>> +}
>> +
>> +pub fn config() -> Result<(SectionConfigData, [u8; 32]), Error> {
>> + parse_config(S3_CFG_FILENAME)
>> +}
>> +
>> +pub fn secrets_config() -> Result<(SectionConfigData, [u8; 32]), Error> {
>> + parse_config(S3_SECRETS_CFG_FILENAME)
>> +}
>> +
>> +pub fn save_config(config: &SectionConfigData, secrets: &SectionConfigData) -> Result<(), Error> {
>> + let raw = CONFIG.write(S3_CFG_FILENAME, config)?;
>> + replace_backup_config(S3_CFG_FILENAME, raw.as_bytes())?;
>> +
>> + let secrets_raw = CONFIG.write(S3_SECRETS_CFG_FILENAME, secrets)?;
>> + // Secrets are stored with `backup` permissions to allow reading from
>> + // not protected api endpoints as well.
>> + replace_backup_config(S3_SECRETS_CFG_FILENAME, secrets_raw.as_bytes())?;
>> +
>> + Ok(())
>> +}
>
> ^ These public functions lack docstrings
added these as well ...
>
>> +
>> +// shell completion helper
... and expanded a bit on this one since already at it.
>> +pub fn complete_s3_client_id(_arg: &str, _param: &HashMap<String, String>) -> Vec<String> {
>> + match config() {
>> + Ok((data, _digest)) => data.sections.keys().map(|id| id.to_string()).collect(),
>> + Err(_) => Vec::new(),
>> + }
>> +}
>> +
>> +fn parse_config(path: &str) -> Result<(SectionConfigData, [u8; 32]), Error> {
>> + let content = proxmox_sys::fs::file_read_optional_string(path)?;
>> + let content = content.unwrap_or_default();
>> + let digest = openssl::sha::sha256(content.as_bytes());
>> + let data = CONFIG.parse(path, &content)?;
>> + Ok((data, digest))
>> +}
>
More information about the pbs-devel
mailing list