[pbs-devel] [PATCH proxmox-backup 2/2] datastore: check s3 bucket access before create datastore task

Christian Ebner c.ebner at proxmox.com
Tue Jul 22 18:36:03 CEST 2025


In order to give immediate feedback to the caller, so it is not
required to re-enter all the datastore configuration if the bucket
cannot be accessed.

Signed-off-by: Christian Ebner <c.ebner at proxmox.com>
---
 src/api2/config/datastore.rs | 78 ++++++++++++++++++++++++------------
 1 file changed, 53 insertions(+), 25 deletions(-)

diff --git a/src/api2/config/datastore.rs b/src/api2/config/datastore.rs
index 2702c7db3..f7b852cb7 100644
--- a/src/api2/config/datastore.rs
+++ b/src/api2/config/datastore.rs
@@ -137,31 +137,28 @@ pub(crate) fn do_create_datastore(
         match backend_config.ty.unwrap_or_default() {
             DatastoreBackendType::Filesystem => (),
             DatastoreBackendType::S3 => {
-                let s3_client_id = backend_config
-                    .client
-                    .as_ref()
-                    .ok_or_else(|| format_err!("missing required client"))?;
-                let bucket = backend_config
-                    .bucket
-                    .clone()
-                    .ok_or_else(|| format_err!("missing required bucket"))?;
-                let (config, _config_digest) =
-                    pbs_config::s3::config().context("failed to get s3 config")?;
-                let config: S3ClientConf = config
-                    .lookup(S3_CFG_TYPE_ID, s3_client_id)
-                    .with_context(|| format!("no '{s3_client_id}' in config"))?;
-                let options = S3ClientOptions::from_config(
-                    config.config,
-                    config.secret_key,
-                    bucket,
-                    datastore.name.to_owned(),
-                );
-                let s3_client = S3Client::new(options).context("failed to create s3 client")?;
-                // Fine to block since this runs in worker task
-                proxmox_async::runtime::block_on(s3_client.head_bucket())
-                    .context("failed to access bucket")?;
-
                 if !overwrite_in_use {
+                    let s3_client_id = backend_config
+                        .client
+                        .as_ref()
+                        .ok_or_else(|| format_err!("missing required client"))?;
+                    let bucket = backend_config
+                        .bucket
+                        .clone()
+                        .ok_or_else(|| format_err!("missing required bucket"))?;
+                    let (config, _config_digest) =
+                        pbs_config::s3::config().context("failed to get s3 config")?;
+                    let config: S3ClientConf = config
+                        .lookup(S3_CFG_TYPE_ID, s3_client_id)
+                        .with_context(|| format!("no '{s3_client_id}' in config"))?;
+                    let options = S3ClientOptions::from_config(
+                        config.config,
+                        config.secret_key,
+                        bucket,
+                        datastore.name.to_owned(),
+                    );
+                    let s3_client = S3Client::new(options).context("failed to create s3 client")?;
+
                     let object_key = S3ObjectKey::try_from(S3_DATASTORE_IN_USE_MARKER)
                         .context("failed to generate s3 object key")?;
                     if let Some(response) =
@@ -180,8 +177,8 @@ pub(crate) fn do_create_datastore(
                             bail!("Bucket already contains datastore in use");
                         }
                     }
+                    backend_s3_client = Some(Arc::new(s3_client));
                 }
-                backend_s3_client = Some(Arc::new(s3_client));
             }
         }
     }
@@ -352,6 +349,37 @@ pub fn create_datastore(
     };
 
     let store_name = config.name.to_string();
+
+    let backend_config: DatastoreBackendConfig = config.backend.as_deref().unwrap_or("").parse()?;
+    match backend_config.ty.unwrap_or_default() {
+        DatastoreBackendType::Filesystem => (),
+        DatastoreBackendType::S3 => {
+            let s3_client_id = backend_config
+                .client
+                .as_ref()
+                .ok_or_else(|| format_err!("missing required client"))?;
+            let bucket = backend_config
+                .bucket
+                .clone()
+                .ok_or_else(|| format_err!("missing required bucket"))?;
+            let (config, _config_digest) =
+                pbs_config::s3::config().context("failed to get s3 config")?;
+            let config: S3ClientConf = config
+                .lookup(S3_CFG_TYPE_ID, s3_client_id)
+                .with_context(|| format!("no '{s3_client_id}' in config"))?;
+            let options = S3ClientOptions::from_config(
+                config.config,
+                config.secret_key,
+                bucket,
+                store_name.clone(),
+            );
+            let s3_client = S3Client::new(options).context("failed to create s3 client")?;
+            // Fine to block since this runs in worker task
+            proxmox_async::runtime::block_on(s3_client.head_bucket())
+                .context("failed to access bucket")?;
+        }
+    }
+
     WorkerTask::new_thread(
         "create-datastore",
         Some(store_name.clone()),
-- 
2.47.2





More information about the pbs-devel mailing list