api: allow ova upload/download

introducing a separate regex that only contains ova, since
upload/downloading ovfs does not make sense (since the disks are then
missing).

Signed-off-by: Dominik Csapak <d.csapak@proxmox.com>
This commit is contained in:
Dominik Csapak
2024-11-18 16:29:11 +01:00
committed by Thomas Lamprecht
parent 0fdbc2845a
commit 40df25db17
2 changed files with 62 additions and 4 deletions

View File

@ -41,6 +41,24 @@ __PACKAGE__->register_method ({
path => '{storage}/file-restore', path => '{storage}/file-restore',
}); });
my sub assert_ova_contents {
my ($file) = @_;
# test if it's really a tar file with an ovf file inside
my $hasOvf = 0;
run_command(['tar', '-t', '-f', $file], outfunc => sub {
my ($line) = @_;
if ($line =~ m/\.ovf$/) {
$hasOvf = 1;
}
});
die "ova archive has no .ovf file inside\n" if !$hasOvf;
return 1;
}
__PACKAGE__->register_method ({ __PACKAGE__->register_method ({
name => 'index', name => 'index',
path => '', path => '',
@ -369,7 +387,7 @@ __PACKAGE__->register_method ({
name => 'upload', name => 'upload',
path => '{storage}/upload', path => '{storage}/upload',
method => 'POST', method => 'POST',
description => "Upload templates and ISO images.", description => "Upload templates, ISO images and OVAs.",
permissions => { permissions => {
check => ['perm', '/storage/{storage}', ['Datastore.AllocateTemplate']], check => ['perm', '/storage/{storage}', ['Datastore.AllocateTemplate']],
}, },
@ -382,7 +400,7 @@ __PACKAGE__->register_method ({
content => { content => {
description => "Content type.", description => "Content type.",
type => 'string', format => 'pve-storage-content', type => 'string', format => 'pve-storage-content',
enum => ['iso', 'vztmpl'], enum => ['iso', 'vztmpl', 'import'],
}, },
filename => { filename => {
description => "The name of the file to create. Caution: This will be normalized!", description => "The name of the file to create. Caution: This will be normalized!",
@ -437,6 +455,7 @@ __PACKAGE__->register_method ({
my $filename = PVE::Storage::normalize_content_filename($param->{filename}); my $filename = PVE::Storage::normalize_content_filename($param->{filename});
my $path; my $path;
my $isOva = 0;
if ($content eq 'iso') { if ($content eq 'iso') {
if ($filename !~ m![^/]+$PVE::Storage::ISO_EXT_RE_0$!) { if ($filename !~ m![^/]+$PVE::Storage::ISO_EXT_RE_0$!) {
@ -448,6 +467,13 @@ __PACKAGE__->register_method ({
raise_param_exc({ filename => "wrong file extension" }); raise_param_exc({ filename => "wrong file extension" });
} }
$path = PVE::Storage::get_vztmpl_dir($cfg, $param->{storage}); $path = PVE::Storage::get_vztmpl_dir($cfg, $param->{storage});
} elsif ($content eq 'import') {
if ($filename !~ m!${PVE::Storage::SAFE_CHAR_CLASS_RE}+$PVE::Storage::UPLOAD_IMPORT_EXT_RE_1$!) {
raise_param_exc({ filename => "invalid filename or wrong extension" });
}
$isOva = 1;
$path = PVE::Storage::get_import_dir($cfg, $param->{storage});
} else { } else {
raise_param_exc({ content => "upload content type '$content' not allowed" }); raise_param_exc({ content => "upload content type '$content' not allowed" });
} }
@ -514,6 +540,10 @@ __PACKAGE__->register_method ({
if ($content eq 'iso') { if ($content eq 'iso') {
PVE::Storage::assert_iso_content($tmpfilename); PVE::Storage::assert_iso_content($tmpfilename);
} }
if ($isOva) {
assert_ova_contents($tmpfilename);
}
}; };
if (my $err = $@) { if (my $err = $@) {
# unlinks only the temporary file from the http server # unlinks only the temporary file from the http server
@ -548,7 +578,7 @@ __PACKAGE__->register_method({
name => 'download_url', name => 'download_url',
path => '{storage}/download-url', path => '{storage}/download-url',
method => 'POST', method => 'POST',
description => "Download templates and ISO images by using an URL.", description => "Download templates, ISO images and OVAs by using an URL.",
proxyto => 'node', proxyto => 'node',
permissions => { permissions => {
description => 'Requires allocation access on the storage and as this allows one to probe' description => 'Requires allocation access on the storage and as this allows one to probe'
@ -576,7 +606,7 @@ __PACKAGE__->register_method({
content => { content => {
description => "Content type.", # TODO: could be optional & detected in most cases description => "Content type.", # TODO: could be optional & detected in most cases
type => 'string', format => 'pve-storage-content', type => 'string', format => 'pve-storage-content',
enum => ['iso', 'vztmpl'], enum => ['iso', 'vztmpl', 'import'],
}, },
filename => { filename => {
description => "The name of the file to create. Caution: This will be normalized!", description => "The name of the file to create. Caution: This will be normalized!",
@ -636,6 +666,8 @@ __PACKAGE__->register_method({
my $filename = PVE::Storage::normalize_content_filename($param->{filename}); my $filename = PVE::Storage::normalize_content_filename($param->{filename});
my $path; my $path;
my $isOva = 0;
if ($content eq 'iso') { if ($content eq 'iso') {
if ($filename !~ m![^/]+$PVE::Storage::ISO_EXT_RE_0$!) { if ($filename !~ m![^/]+$PVE::Storage::ISO_EXT_RE_0$!) {
raise_param_exc({ filename => "wrong file extension" }); raise_param_exc({ filename => "wrong file extension" });
@ -646,6 +678,16 @@ __PACKAGE__->register_method({
raise_param_exc({ filename => "wrong file extension" }); raise_param_exc({ filename => "wrong file extension" });
} }
$path = PVE::Storage::get_vztmpl_dir($cfg, $storage); $path = PVE::Storage::get_vztmpl_dir($cfg, $storage);
} elsif ($content eq 'import') {
if ($filename !~ m!${PVE::Storage::SAFE_CHAR_CLASS_RE}+$PVE::Storage::UPLOAD_IMPORT_EXT_RE_1$!) {
raise_param_exc({ filename => "invalid filename or wrong extension" });
}
if ($filename =~ m/\.ova$/) {
$isOva = 1;
}
$path = PVE::Storage::get_import_dir($cfg, $param->{storage});
} else { } else {
raise_param_exc({ content => "upload content-type '$content' is not allowed" }); raise_param_exc({ content => "upload content-type '$content' is not allowed" });
} }
@ -672,6 +714,10 @@ __PACKAGE__->register_method({
if ($content eq 'iso') { if ($content eq 'iso') {
PVE::Storage::assert_iso_content($tmp_path); PVE::Storage::assert_iso_content($tmp_path);
} }
if ($isOva) {
assert_ova_contents($tmp_path);
}
}; };
my $worker = sub { my $worker = sub {
@ -681,6 +727,7 @@ __PACKAGE__->register_method({
die "no decompression method found\n" if !$info->{decompressor}; die "no decompression method found\n" if !$info->{decompressor};
$opts->{decompression_command} = $info->{decompressor}; $opts->{decompression_command} = $info->{decompressor};
} }
PVE::Tools::download_file_from_url("$path/$filename", $url, $opts); PVE::Tools::download_file_from_url("$path/$filename", $url, $opts);
}; };

View File

@ -116,6 +116,8 @@ our $BACKUP_EXT_RE_2 = qr/\.(tgz|(?:tar|vma)(?:\.(${\PVE::Storage::Plugin::COMPR
our $IMPORT_EXT_RE_1 = qr/\.(ova|ovf|qcow2|raw|vmdk)/; our $IMPORT_EXT_RE_1 = qr/\.(ova|ovf|qcow2|raw|vmdk)/;
our $UPLOAD_IMPORT_EXT_RE_1 = qr/\.(ova)/;
our $SAFE_CHAR_CLASS_RE = qr/[a-zA-Z0-9\-\.\+\=\_]/; our $SAFE_CHAR_CLASS_RE = qr/[a-zA-Z0-9\-\.\+\=\_]/;
our $OVA_CONTENT_RE_1 = qr/${SAFE_CHAR_CLASS_RE}+\.(qcow2|raw|vmdk)/; our $OVA_CONTENT_RE_1 = qr/${SAFE_CHAR_CLASS_RE}+\.(qcow2|raw|vmdk)/;
@ -466,6 +468,15 @@ sub get_iso_dir {
return $plugin->get_subdir($scfg, 'iso'); return $plugin->get_subdir($scfg, 'iso');
} }
sub get_import_dir {
my ($cfg, $storeid) = @_;
my $scfg = storage_config($cfg, $storeid);
my $plugin = PVE::Storage::Plugin->lookup($scfg->{type});
return $plugin->get_subdir($scfg, 'import');
}
sub get_vztmpl_dir { sub get_vztmpl_dir {
my ($cfg, $storeid) = @_; my ($cfg, $storeid) = @_;