aboutsummaryrefslogtreecommitdiff
path: root/src/api/admin.rs
diff options
context:
space:
mode:
authorMathijs van Veluw <[email protected]>2024-09-01 15:52:29 +0200
committerGitHub <[email protected]>2024-09-01 15:52:29 +0200
commite9acd8bd3c3142cccb021ab5759a8410ef335aaa (patch)
tree0395c5f9ba57ab7368211d0d200ff4dea2107196 /src/api/admin.rs
parent544b7229e8cc49436d3872ba2022e09231552fa7 (diff)
downloadvaultwarden-e9acd8bd3c3142cccb021ab5759a8410ef335aaa.tar.gz
vaultwarden-e9acd8bd3c3142cccb021ab5759a8410ef335aaa.zip
Add a CLI feature to backup the SQLite DB (#4906)
* Add a CLI feature to backup the SQLite DB Many users request to add the sqlite3 binary to the container image. This isn't really ideal as that might bring in other dependencies and will only bloat the image. There main reason is to create a backup of the database. While there already was a feature within the admin interface to do so (or by using the admin API call), this might not be easy. This PR adds several ways to generate a backup. 1. By calling the Vaultwarden binary with the `backup` command like: - `/vaultwarden backup` - `docker exec -it vaultwarden /vaultwarden backup` 2. By sending the USR1 signal to the running process like: - `kill -s USR1 $(pidof vaultwarden) - `killall -s USR1 vaultwarden) This should help users to more easily create backups of there SQLite database. Also added the Web-Vault version number when using `-v/--version` to the output. Signed-off-by: BlackDex <[email protected]> * Spelling and small adjustments Signed-off-by: BlackDex <[email protected]> --------- Signed-off-by: BlackDex <[email protected]>
Diffstat (limited to 'src/api/admin.rs')
-rw-r--r--src/api/admin.rs32
1 files changed, 11 insertions, 21 deletions
diff --git a/src/api/admin.rs b/src/api/admin.rs
index e6be3783..03d86920 100644
--- a/src/api/admin.rs
+++ b/src/api/admin.rs
@@ -25,7 +25,8 @@ use crate::{
http_client::make_http_request,
mail,
util::{
- container_base_image, format_naive_datetime_local, get_display_size, is_running_in_container, NumberOrString,
+ container_base_image, format_naive_datetime_local, get_display_size, get_web_vault_version,
+ is_running_in_container, NumberOrString,
},
CONFIG, VERSION,
};
@@ -576,11 +577,6 @@ async fn delete_organization(uuid: &str, _token: AdminToken, mut conn: DbConn) -
}
#[derive(Deserialize)]
-struct WebVaultVersion {
- version: String,
-}
-
-#[derive(Deserialize)]
struct GitRelease {
tag_name: String,
}
@@ -679,18 +675,6 @@ async fn diagnostics(_token: AdminToken, ip_header: IpHeader, mut conn: DbConn)
use chrono::prelude::*;
use std::net::ToSocketAddrs;
- // Get current running versions
- let web_vault_version: WebVaultVersion =
- match std::fs::read_to_string(format!("{}/{}", CONFIG.web_vault_folder(), "vw-version.json")) {
- Ok(s) => serde_json::from_str(&s)?,
- _ => match std::fs::read_to_string(format!("{}/{}", CONFIG.web_vault_folder(), "version.json")) {
- Ok(s) => serde_json::from_str(&s)?,
- _ => WebVaultVersion {
- version: String::from("Version file missing"),
- },
- },
- };
-
// Execute some environment checks
let running_within_container = is_running_in_container();
let has_http_access = has_http_access().await;
@@ -710,13 +694,16 @@ async fn diagnostics(_token: AdminToken, ip_header: IpHeader, mut conn: DbConn)
let ip_header_name = &ip_header.0.unwrap_or_default();
+ // Get current running versions
+ let web_vault_version = get_web_vault_version();
+
let diagnostics_json = json!({
"dns_resolved": dns_resolved,
"current_release": VERSION,
"latest_release": latest_release,
"latest_commit": latest_commit,
"web_vault_enabled": &CONFIG.web_vault_enabled(),
- "web_vault_version": web_vault_version.version.trim_start_matches('v'),
+ "web_vault_version": web_vault_version,
"latest_web_build": latest_web_build,
"running_within_container": running_within_container,
"container_base_image": if running_within_container { container_base_image() } else { "Not applicable" },
@@ -765,9 +752,12 @@ fn delete_config(_token: AdminToken) -> EmptyResult {
}
#[post("/config/backup_db")]
-async fn backup_db(_token: AdminToken, mut conn: DbConn) -> EmptyResult {
+async fn backup_db(_token: AdminToken, mut conn: DbConn) -> ApiResult<String> {
if *CAN_BACKUP {
- backup_database(&mut conn).await
+ match backup_database(&mut conn).await {
+ Ok(f) => Ok(format!("Backup to '{f}' was successful")),
+ Err(e) => err!(format!("Backup was unsuccessful {e}")),
+ }
} else {
err!("Can't back up current DB (Only SQLite supports this feature)");
}