Files
cloudron-box/src/backupsites.js

599 lines
25 KiB
JavaScript
Raw Normal View History

'use strict';
exports = module.exports = {
2025-07-24 19:02:02 +02:00
get,
list,
listByContentForUpdates,
2025-07-24 19:02:02 +02:00
add,
addDefault,
2025-07-24 19:02:02 +02:00
del,
2025-07-24 19:02:02 +02:00
setConfig,
setLimits,
setSchedule,
setRetention,
setEncryption,
setEnabledForUpdates,
2025-08-04 14:19:49 +02:00
setName,
setContents,
removePrivateFields,
2025-07-24 19:02:02 +02:00
startBackupTask,
startCleanupTask,
2021-07-14 11:07:19 -07:00
getSnapshotInfo,
setSnapshotInfo,
hasContent,
remount,
2025-08-04 10:47:00 +02:00
getStatus,
ensureMounted,
storageApi,
createPseudo,
reinitAll
};
const assert = require('node:assert'),
2025-08-15 16:09:58 +05:30
backupFormats = require('./backupformats.js'),
2019-10-22 20:36:20 -07:00
BoxError = require('./boxerror.js'),
constants = require('./constants.js'),
2023-08-04 11:24:28 +05:30
cron = require('./cron.js'),
{ CronTime } = require('cron'),
crypto = require('node:crypto'),
database = require('./database.js'),
2021-09-10 12:10:10 -07:00
debug = require('debug')('box:backups'),
eventlog = require('./eventlog.js'),
2025-07-24 19:02:02 +02:00
hush = require('./hush.js'),
remove global lock Currently, the update/apptask/fullbackup/platformstart take a global lock and cannot run in parallel. This causes situations where when a user tries to trigger an apptask, it says "waiting for backup to finish..." etc The solution is to let them run in parallel. We need a lock at the app level as app operations running in parallel would be bad (tm). In addition, the update task needs a lock just for the update part. We also need multi-process locks. Running tasks as processes is core to our "kill" strategy. Various inter process locks were explored: * node's IPC mechanism with process.send(). But this only works for direct node.js children. taskworker is run via sudo and the IPC does not work. * File lock using O_EXCL. Basic ideas to create lock files. While file creation can be done atomically, it becomes complicated to clean up lock files when the tasks crash. We need a way to know what locks were held by the crashing task. flock and friends are not built-into node.js * sqlite/redis were options but introduce additional deps * Settled on MySQL based locking. Initial plan was to have row locks or table locks. Each row is a kind of lock. While implementing, it was found that we need many types of locks (and not just update lock and app locks). For example, we need locks for each task type, so that only one task type is active at a time. * Instead of rows, we can just lock table and have a json blob in it. This hit a road block that LOCK TABLE is per session and our db layer cannot handle this easily! i.e when issing two db.query() it might use two different connections from the pool. We have to expose the connection, release connection etc. * Next idea was atomic blob update of the blob checking if old blob was same. This approach, was finally refined into a version field. Phew!
2024-12-07 14:35:45 +01:00
locks = require('./locks.js'),
path = require('node:path'),
paths = require('./paths.js'),
safe = require('safetydance'),
tasks = require('./tasks.js');
2025-07-24 19:02:02 +02:00
// format: rsync or tgz
// provider: used to determine the api provider
// config: depends on the 'provider' field. 'provider' is not stored in config object. but it is injected when calling the api backends
// s3 providers - accessKeyId, secretAccessKey, bucket, prefix etc . see s3.js
// gcs - bucket, prefix, projectId, credentials . see gcs.js
// ext4/xfs/disk (managed providers) - mountOptions (diskPath), prefix, noHardlinks. disk is legacy.
// nfs/cifs/sshfs (managed providers) - mountOptions (host/username/password/seal/privateKey etc), prefix, noHardlinks
// filesystem - backupDir, noHardlinks
// mountpoint - mountPoint, prefix, noHardlinks
// encryption: 'encryptionPassword' and 'encryptedFilenames' is converted into an 'encryption' object using hush.js. Password is lost forever after conversion.
const BACKUP_TARGET_FIELDS = [ 'id', 'name', 'provider', 'configJson', 'limitsJson', 'retentionJson', 'schedule', 'encryptionJson', 'format', 'enableForUpdates', 'contentsJson', 'creationTime', 'ts', 'integrityKeyPairJson' ].join(',');
2025-07-24 19:02:02 +02:00
2025-09-12 09:48:37 +02:00
function storageApi(backupSite) {
assert.strictEqual(typeof backupSite, 'object');
2025-09-12 09:48:37 +02:00
switch (backupSite.provider) {
case 'nfs': return require('./storage/filesystem.js');
case 'cifs': return require('./storage/filesystem.js');
case 'sshfs': return require('./storage/filesystem.js');
case 'mountpoint': return require('./storage/filesystem.js');
case 'disk': return require('./storage/filesystem.js');
case 'ext4': return require('./storage/filesystem.js');
case 'xfs': return require('./storage/filesystem.js');
case 's3': return require('./storage/s3.js');
case 'gcs': return require('./storage/gcs.js');
case 'filesystem': return require('./storage/filesystem.js');
case 'minio': return require('./storage/s3.js');
case 's3-v4-compat': return require('./storage/s3.js');
case 'digitalocean-spaces': return require('./storage/s3.js');
case 'exoscale-sos': return require('./storage/s3.js');
case 'wasabi': return require('./storage/s3.js');
case 'scaleway-objectstorage': return require('./storage/s3.js');
case 'backblaze-b2': return require('./storage/s3.js');
case 'cloudflare-r2': return require('./storage/s3.js');
case 'linode-objectstorage': return require('./storage/s3.js');
case 'ovh-objectstorage': return require('./storage/s3.js');
case 'ionos-objectstorage': return require('./storage/s3.js');
case 'idrive-e2': return require('./storage/s3.js');
case 'vultr-objectstorage': return require('./storage/s3.js');
case 'upcloud-objectstorage': return require('./storage/s3.js');
case 'contabo-objectstorage': return require('./storage/s3.js');
case 'hetzner-objectstorage': return require('./storage/s3.js');
2025-09-12 09:48:37 +02:00
default: throw new BoxError(BoxError.BAD_FIELD, `Unknown provider: ${backupSite.provider}`);
}
}
2021-07-14 11:07:19 -07:00
function postProcess(result) {
assert.strictEqual(typeof result, 'object');
2025-07-24 13:19:27 +02:00
result.config = result.configJson ? safe.JSON.parse(result.configJson) : {};
delete result.configJson;
result.limits = safe.JSON.parse(result.limitsJson) || {};
2025-07-24 13:19:27 +02:00
delete result.limitsJson;
result.retention = safe.JSON.parse(result.retentionJson) || {};
2025-07-24 13:19:27 +02:00
delete result.retentionJson;
result.encryption = result.encryptionJson ? safe.JSON.parse(result.encryptionJson) : null;
delete result.encryptionJson;
result.integrityKeyPair = result.integrityKeyPairJson ? safe.JSON.parse(result.integrityKeyPairJson) : null;
delete result.integrityKeyPairJson;
result.enableForUpdates = !!result.enableForUpdates;
2025-07-24 13:19:27 +02:00
result.contents = safe.JSON.parse(result.contentsJson) || null;
delete result.contentsJson;
2025-07-24 13:19:27 +02:00
return result;
}
2025-09-12 09:48:37 +02:00
function removePrivateFields(site) {
assert.strictEqual(typeof site, 'object');
2025-07-24 19:02:02 +02:00
2025-09-12 09:48:37 +02:00
site.encrypted = site.encryption !== null;
site.encryptedFilenames = site.encryption?.encryptedFilenames || false;
site.encryptionPasswordHint = site.encryption?.encryptionPasswordHint || null;
delete site.encryption;
2025-07-28 11:45:10 +02:00
2025-09-12 09:48:37 +02:00
delete site.integrityKeyPair.privateKey;
2025-09-12 09:48:37 +02:00
site.config = storageApi(site).removePrivateFields(site.config);
return site;
}
2025-08-04 14:19:49 +02:00
function validateName(name) {
assert.strictEqual(typeof name, 'string');
2025-08-04 15:00:21 +02:00
if (name.length === 0) return new BoxError(BoxError.BAD_FIELD, 'name cannot be empty');
2025-08-26 07:40:58 +02:00
if (name.length > 100) return new BoxError(BoxError.BAD_FIELD, 'name too long');
2025-07-24 19:02:02 +02:00
}
function validateContents(contents) {
assert.strictEqual(typeof contents, 'object');
// if you change the structure of contents, look into app.js:del as well
if (contents === null) return null;
if ('exclude' in contents) {
if (!Array.isArray(contents.exclude)) return new BoxError(BoxError.BAD_FIELD, 'exclude should be an array of strings');
if (!contents.exclude.every(item => typeof item === 'string')) return new BoxError(BoxError.BAD_FIELD, 'exclude should be an array of strings');
} else if ('include' in contents) {
if (!Array.isArray(contents.include)) return new BoxError(BoxError.BAD_FIELD, 'include should be an array of strings');
if (!contents.include.every(item => typeof item === 'string')) return new BoxError(BoxError.BAD_FIELD, 'include should be an array of strings');
}
return null;
}
2025-07-24 19:02:02 +02:00
function validateSchedule(schedule) {
assert.strictEqual(typeof schedule, 'string');
if (schedule === constants.CRON_PATTERN_NEVER) return null;
const job = safe.safeCall(function () { return new CronTime(schedule); });
if (!job) return new BoxError(BoxError.BAD_FIELD, 'Invalid schedule pattern');
2025-07-24 19:02:02 +02:00
return null;
}
function validateRetention(retention) {
assert.strictEqual(typeof retention, 'object');
if (!retention) return new BoxError(BoxError.BAD_FIELD, 'retention is required');
if (!['keepWithinSecs','keepDaily','keepWeekly','keepMonthly','keepYearly'].find(k => !!retention[k])) return new BoxError(BoxError.BAD_FIELD, 'retention properties missing');
if ('keepWithinSecs' in retention && typeof retention.keepWithinSecs !== 'number') return new BoxError(BoxError.BAD_FIELD, 'retention.keepWithinSecs must be a number');
if ('keepDaily' in retention && typeof retention.keepDaily !== 'number') return new BoxError(BoxError.BAD_FIELD, 'retention.keepDaily must be a number');
if ('keepWeekly' in retention && typeof retention.keepWeekly !== 'number') return new BoxError(BoxError.BAD_FIELD, 'retention.keepWeekly must be a number');
if ('keepMonthly' in retention && typeof retention.keepMonthly !== 'number') return new BoxError(BoxError.BAD_FIELD, 'retention.keepMonthly must be a number');
if ('keepYearly' in retention && typeof retention.keepYearly !== 'number') return new BoxError(BoxError.BAD_FIELD, 'retention.keepYearly must be a number');
2025-07-24 19:02:02 +02:00
return null;
}
function validateEncryptionPassword(password) {
assert.strictEqual(typeof password, 'string');
if (password.length < 8) return new BoxError(BoxError.BAD_FIELD, 'password must be atleast 8 characters');
}
2025-09-29 14:44:42 +02:00
async function list() {
const results = await database.query(`SELECT ${BACKUP_TARGET_FIELDS} FROM backupSites ORDER BY name DESC`, []);
2025-07-24 19:02:02 +02:00
results.forEach(function (result) { postProcess(result); });
return results;
}
function hasContent({ contents }, id) {
// if you change the structure of contents, look into app.js:del as well
if (!contents) return true;
if (contents.include && !contents.include.includes(id)) return false;
if (contents.exclude?.includes(id)) return false;
return true;
2025-07-24 19:02:02 +02:00
}
async function listByContentForUpdates(id) {
assert.strictEqual(typeof id, 'string');
const results = await database.query(`SELECT ${BACKUP_TARGET_FIELDS} FROM backupSites WHERE enableForUpdates=?`, [ true ]);
results.forEach(function (result) { postProcess(result); });
return results.filter(r => hasContent(r, id));
}
async function get(id) {
const results = await database.query(`SELECT ${BACKUP_TARGET_FIELDS} FROM backupSites WHERE id=?`, [ id ]);
2025-07-25 12:55:14 +02:00
if (results.length === 0) return null;
return postProcess(results[0]);
}
2025-09-12 09:48:37 +02:00
async function update(site, data) {
assert.strictEqual(typeof site, 'object');
2025-07-24 19:02:02 +02:00
assert(data && typeof data === 'object');
const args = [];
const fields = [];
for (const k in data) {
if (k === 'name' || k === 'schedule' || k === 'enableForUpdates') { // format, provider cannot be updated
2025-07-24 19:02:02 +02:00
fields.push(k + ' = ?');
args.push(data[k]);
} else if (k === 'config' || k === 'limits' || k === 'retention' || k === 'contents') { // encryption cannot be updated
2025-07-24 19:02:02 +02:00
fields.push(`${k}JSON = ?`);
args.push(JSON.stringify(data[k]));
}
}
2025-09-12 09:48:37 +02:00
args.push(site.id);
2025-07-24 19:02:02 +02:00
2025-09-12 09:48:37 +02:00
const [updateError, result] = await safe(database.query('UPDATE backupSites SET ' + fields.join(', ') + ' WHERE id = ?', args));
2025-07-24 19:02:02 +02:00
if (updateError) throw updateError;
if (result.affectedRows !== 1) throw new BoxError(BoxError.NOT_FOUND, 'Target not found');
}
2025-09-12 09:48:37 +02:00
async function setSchedule(backupSite, schedule, auditSource) {
assert.strictEqual(typeof backupSite, 'object');
2025-07-24 19:02:02 +02:00
assert.strictEqual(typeof schedule, 'string');
2025-07-25 12:08:33 +02:00
assert.strictEqual(typeof auditSource, 'object');
2025-07-24 19:02:02 +02:00
2025-11-13 10:09:34 +01:00
const error = validateSchedule(schedule);
2025-07-24 19:02:02 +02:00
if (error) throw error;
2025-09-12 09:48:37 +02:00
await update(backupSite, { schedule });
await cron.handleBackupScheduleChanged(Object.assign({}, backupSite, { schedule }));
await eventlog.add(eventlog.ACTION_BACKUP_SITE_UPDATE, auditSource, { name: backupSite.name, schedule });
2025-07-24 19:02:02 +02:00
}
2025-09-12 09:48:37 +02:00
async function setLimits(backupSite, limits, auditSource) {
assert.strictEqual(typeof backupSite, 'object');
2025-07-24 19:02:02 +02:00
assert.strictEqual(typeof limits, 'object');
2025-07-25 12:08:33 +02:00
assert.strictEqual(typeof auditSource, 'object');
2025-07-24 19:02:02 +02:00
2025-09-12 09:48:37 +02:00
await update(backupSite, { limits });
await eventlog.add(eventlog.ACTION_BACKUP_SITE_UPDATE, auditSource, { name: backupSite.name, limits });
2025-07-24 19:02:02 +02:00
}
2025-09-12 09:48:37 +02:00
async function setRetention(backupSite, retention, auditSource) {
assert.strictEqual(typeof backupSite, 'object');
2025-07-24 19:02:02 +02:00
assert.strictEqual(typeof retention, 'object');
2025-07-25 12:08:33 +02:00
assert.strictEqual(typeof auditSource, 'object');
2025-07-24 19:02:02 +02:00
2025-11-13 10:09:34 +01:00
const error = validateRetention(retention);
2025-07-24 19:02:02 +02:00
if (error) throw error;
2025-09-12 09:48:37 +02:00
await update(backupSite, { retention });
await eventlog.add(eventlog.ACTION_BACKUP_SITE_UPDATE, auditSource, { name: backupSite.name, retention });
2025-07-24 19:02:02 +02:00
}
async function setEnabledForUpdates(backupSite, enableForUpdates, auditSource) {
2025-09-12 09:48:37 +02:00
assert.strictEqual(typeof backupSite, 'object');
assert.strictEqual(typeof enableForUpdates, 'boolean');
2025-07-25 12:08:33 +02:00
assert.strictEqual(typeof auditSource, 'object');
2025-07-25 09:43:26 +02:00
await update(backupSite, { enableForUpdates });
await eventlog.add(eventlog.ACTION_BACKUP_SITE_UPDATE, auditSource, { name: backupSite.name, enableForUpdates });
2025-07-25 09:43:26 +02:00
}
2025-09-12 09:48:37 +02:00
async function setEncryption(backupSite, data, auditSource) {
assert.strictEqual(typeof backupSite, 'object');
assert.strictEqual(typeof data, 'object');
assert.strictEqual(typeof auditSource, 'object');
let encryption = null;
if (data.encryptionPassword) {
const encryptionPasswordError = validateEncryptionPassword(data.encryptionPassword);
if (encryptionPasswordError) throw encryptionPasswordError;
if (data.encryptionPassword === data.encryptionPasswordHint) throw new BoxError(BoxError.BAD_FIELD, 'password hint cannot be the same as password');
encryption = hush.generateEncryptionKeysSync(data.encryptionPassword);
encryption.encryptedFilenames = !!data.encryptedFilenames;
encryption.encryptionPasswordHint = data.encryptionPasswordHint || '';
}
const queries = [
2025-09-12 09:48:37 +02:00
{ query: 'DELETE FROM backups WHERE siteId=?', args: [ backupSite.id ] },
{ query: 'UPDATE backupSites SET encryptionJson=? WHERE id=?', args: [ encryption ? JSON.stringify(encryption) : null, backupSite.id ] },
];
const [error, result] = await safe(database.transaction(queries));
if (error) throw error;
if (result[1].affectedRows !== 1) throw new BoxError(BoxError.NOT_FOUND, 'Target not found');
await eventlog.add(eventlog.ACTION_BACKUP_SITE_UPDATE, auditSource, { name: backupSite.name, encryption: !!encryption });
}
2025-09-12 09:48:37 +02:00
async function setName(backupSite, name, auditSource) {
assert.strictEqual(typeof backupSite, 'object');
2025-08-04 14:19:49 +02:00
assert.strictEqual(typeof name, 'string');
assert.strictEqual(typeof auditSource, 'object');
const nameError = validateName(name);
if (nameError) throw nameError;
2025-09-12 09:48:37 +02:00
await update(backupSite, { name });
await eventlog.add(eventlog.ACTION_BACKUP_SITE_UPDATE, auditSource, { name, oldName: backupSite.name });
2025-08-04 14:19:49 +02:00
}
async function setContents(backupSite, contents, auditSource) {
assert.strictEqual(typeof backupSite, 'object');
assert.strictEqual(typeof contents, 'object');
assert.strictEqual(typeof auditSource, 'object');
const contentsError = validateContents(contents);
if (contentsError) throw contentsError;
await update(backupSite, { contents });
await eventlog.add(eventlog.ACTION_BACKUP_SITE_UPDATE, auditSource, { name: backupSite.name, contents });
}
2025-09-12 09:48:37 +02:00
async function del(backupSite, auditSource) {
assert.strictEqual(typeof backupSite, 'object');
2025-07-25 12:08:33 +02:00
assert.strictEqual(typeof auditSource, 'object');
2025-07-24 19:02:02 +02:00
2025-09-12 09:48:37 +02:00
await safe(storageApi(backupSite).teardown(backupSite.config), { debug }); // ignore error
2025-07-25 09:43:26 +02:00
const queries = [
2025-09-12 09:48:37 +02:00
{ query: 'DELETE FROM archives WHERE backupId IN (SELECT id FROM backups WHERE siteId=?)', args: [ backupSite.id ] },
{ query: 'DELETE FROM backups WHERE siteId=?', args: [ backupSite.id ] },
2025-09-22 20:02:13 +02:00
{ query: 'DELETE FROM backupSites WHERE id=?', args: [ backupSite.id ] }
2025-07-25 09:43:26 +02:00
];
2025-07-24 19:02:02 +02:00
const [error, result] = await safe(database.transaction(queries));
2025-09-29 11:55:15 +02:00
if (error && error.sqlCode === 'ER_NO_REFERENCED_ROW_2') throw new BoxError(BoxError.NOT_FOUND, error);
2025-07-24 19:02:02 +02:00
if (error) throw error;
if (result[2].affectedRows !== 1) throw new BoxError(BoxError.NOT_FOUND, 'Target not found');
await eventlog.add(eventlog.ACTION_BACKUP_SITE_REMOVE, auditSource, { name: backupSite.name, backupSite: removePrivateFields(backupSite) });
2025-07-24 19:02:02 +02:00
2025-09-12 09:48:37 +02:00
backupSite.schedule = constants.CRON_PATTERN_NEVER;
await cron.handleBackupScheduleChanged(backupSite);
2025-07-25 08:36:09 +02:00
2025-09-12 09:48:37 +02:00
const infoDir = path.join(paths.BACKUP_INFO_DIR, backupSite.id);
safe.fs.rmSync(infoDir, { recursive: true });
2025-07-24 19:02:02 +02:00
}
2025-09-12 09:48:37 +02:00
async function startBackupTask(site, auditSource) {
assert.strictEqual(typeof site, 'object');
2025-07-24 19:02:02 +02:00
2025-09-12 09:48:37 +02:00
const [error] = await safe(locks.acquire(`${locks.TYPE_FULL_BACKUP_TASK_PREFIX}${site.id}`));
remove global lock Currently, the update/apptask/fullbackup/platformstart take a global lock and cannot run in parallel. This causes situations where when a user tries to trigger an apptask, it says "waiting for backup to finish..." etc The solution is to let them run in parallel. We need a lock at the app level as app operations running in parallel would be bad (tm). In addition, the update task needs a lock just for the update part. We also need multi-process locks. Running tasks as processes is core to our "kill" strategy. Various inter process locks were explored: * node's IPC mechanism with process.send(). But this only works for direct node.js children. taskworker is run via sudo and the IPC does not work. * File lock using O_EXCL. Basic ideas to create lock files. While file creation can be done atomically, it becomes complicated to clean up lock files when the tasks crash. We need a way to know what locks were held by the crashing task. flock and friends are not built-into node.js * sqlite/redis were options but introduce additional deps * Settled on MySQL based locking. Initial plan was to have row locks or table locks. Each row is a kind of lock. While implementing, it was found that we need many types of locks (and not just update lock and app locks). For example, we need locks for each task type, so that only one task type is active at a time. * Instead of rows, we can just lock table and have a json blob in it. This hit a road block that LOCK TABLE is per session and our db layer cannot handle this easily! i.e when issing two db.query() it might use two different connections from the pool. We have to expose the connection, release connection etc. * Next idea was atomic blob update of the blob checking if old blob was same. This approach, was finally refined into a version field. Phew!
2024-12-07 14:35:45 +01:00
if (error) throw new BoxError(BoxError.BAD_STATE, `Another backup task is in progress: ${error.message}`);
2025-09-12 09:48:37 +02:00
const memoryLimit = site.limits?.memoryLimit ? Math.max(site.limits.memoryLimit/1024/1024, 1024) : 1024;
2025-09-12 09:48:37 +02:00
const taskId = await tasks.add(`${tasks.TASK_FULL_BACKUP_PREFIX}${site.id}`, [ site.id, { /* options */ } ]);
2025-10-09 17:24:43 +02:00
await eventlog.add(eventlog.ACTION_BACKUP_START, auditSource, { taskId, siteId: site.id, siteName: site.name });
// background
tasks.startTask(taskId, { timeout: 24 * 60 * 60 * 1000 /* 24 hours */, nice: 15, memoryLimit, oomScoreAdjust: -999 })
.then(async (result) => { // this can be the an array or string depending on site.contents
2025-10-09 17:24:43 +02:00
await eventlog.add(eventlog.ACTION_BACKUP_FINISH, auditSource, { taskId, result, siteId: site.id, siteName: site.name });
})
.catch(async (error) => {
const timedOut = error.code === tasks.ETIMEOUT;
2025-10-09 17:24:43 +02:00
await safe(eventlog.add(eventlog.ACTION_BACKUP_FINISH, auditSource, { taskId, errorMessage: error.message, timedOut, siteId: site.id, siteName: site.name }));
})
.finally(async () => {
2025-09-12 09:48:37 +02:00
await locks.release(`${locks.TYPE_FULL_BACKUP_TASK_PREFIX}${site.id}`);
await locks.releaseByTaskId(taskId);
});
2021-09-10 12:10:10 -07:00
return taskId;
2021-07-14 11:07:19 -07:00
}
// keeps track of contents of the snapshot directory. this provides a way to clean up backups of uninstalled apps
2025-09-12 09:48:37 +02:00
async function getSnapshotInfo(backupSite) {
assert.strictEqual(typeof backupSite, 'object');
2025-09-12 09:48:37 +02:00
const snapshotFilePath = path.join(paths.BACKUP_INFO_DIR, backupSite.id, constants.SNAPSHOT_INFO_FILENAME);
const contents = safe.fs.readFileSync(snapshotFilePath, 'utf8');
2021-07-14 11:07:19 -07:00
const info = safe.JSON.parse(contents);
return info || {};
2017-09-22 14:40:37 -07:00
}
// keeps track of contents of the snapshot directory. this provides a way to clean up backups of uninstalled apps
2025-09-12 09:48:37 +02:00
async function setSnapshotInfo(backupSite, id, info) {
assert.strictEqual(typeof backupSite, 'object');
assert.strictEqual(typeof id, 'string'); // 'box', 'mail' or appId
2021-07-14 11:07:19 -07:00
assert.strictEqual(typeof info, 'object');
2017-09-22 14:40:37 -07:00
2025-09-12 09:48:37 +02:00
const infoDir = path.join(paths.BACKUP_INFO_DIR, backupSite.id);
const snapshotFilePath = path.join(infoDir, constants.SNAPSHOT_INFO_FILENAME);
const contents = safe.fs.readFileSync(snapshotFilePath, 'utf8');
const data = safe.JSON.parse(contents) || {};
2021-07-14 11:07:19 -07:00
if (info) data[id] = info; else delete data[id];
if (!safe.fs.writeFileSync(snapshotFilePath, JSON.stringify(data, null, 4), 'utf8')) {
2021-09-16 13:59:03 -07:00
throw new BoxError(BoxError.FS_ERROR, safe.error.message);
}
if (!info) { // unlink the cache files
safe.fs.unlinkSync(path.join(infoDir, `${id}.sync.cache`));
safe.fs.unlinkSync(path.join(infoDir, `${id}.sync.cache.new`));
}
2017-09-22 14:40:37 -07:00
}
2025-09-12 09:48:37 +02:00
async function startCleanupTask(backupSite, auditSource) {
assert.strictEqual(typeof backupSite, 'object');
2021-07-14 11:07:19 -07:00
assert.strictEqual(typeof auditSource, 'object');
2025-09-12 09:48:37 +02:00
const taskId = await tasks.add(`${tasks.TASK_CLEAN_BACKUPS_PREFIX}${backupSite.id}`, [ backupSite.id ]);
// background
tasks.startTask(taskId, {})
.then(async (result) => { // { removedBoxBackupPaths, removedAppBackupPaths, removedMailBackupPaths, missingBackupPaths }
await eventlog.add(eventlog.ACTION_BACKUP_CLEANUP_FINISH, auditSource, { taskId, errorMessage: null, ...result });
})
.catch(async (error) => {
await eventlog.add(eventlog.ACTION_BACKUP_CLEANUP_FINISH, auditSource, { taskId, errorMessage: error.message });
});
2021-07-14 11:07:19 -07:00
return taskId;
}
2025-09-12 09:48:37 +02:00
async function remount(site) {
assert.strictEqual(typeof site, 'object');
2025-09-12 09:48:37 +02:00
await storageApi(site).setup(site.config);
}
2025-09-12 09:48:37 +02:00
async function getStatus(site) {
assert.strictEqual(typeof site, 'object');
return await storageApi(site).getStatus(site.config); // { state, message }
}
2023-08-04 11:24:28 +05:30
2025-09-12 09:48:37 +02:00
async function ensureMounted(site) {
assert.strictEqual(typeof site, 'object');
2025-07-24 19:02:02 +02:00
2025-09-12 09:48:37 +02:00
const status = await getStatus(site);
if (status.state === 'active') return status;
2025-10-06 11:10:08 +02:00
await remount(site);
2025-09-12 09:48:37 +02:00
return await getStatus(site);
2023-08-04 11:24:28 +05:30
}
2025-09-12 09:48:37 +02:00
async function setConfig(backupSite, newConfig, auditSource) {
assert.strictEqual(typeof backupSite, 'object');
2025-07-24 19:02:02 +02:00
assert.strictEqual(typeof newConfig, 'object');
2025-07-25 12:08:33 +02:00
assert.strictEqual(typeof auditSource, 'object');
2023-08-04 11:24:28 +05:30
2025-07-24 19:02:02 +02:00
if (constants.DEMO) throw new BoxError(BoxError.BAD_STATE, 'Not allowed in demo mode');
2025-09-12 09:48:37 +02:00
const oldConfig = backupSite.config;
newConfig = structuredClone(newConfig); // make a copy
2025-09-12 09:48:37 +02:00
storageApi(backupSite).injectPrivateFields(newConfig, oldConfig);
2025-07-24 19:02:02 +02:00
debug('setConfig: validating new storage configuration');
2025-09-12 09:48:37 +02:00
const sanitizedConfig = await storageApi(backupSite).verifyConfig({ id: backupSite.id, provider: backupSite.provider, config: newConfig });
2025-09-12 09:48:37 +02:00
await update(backupSite, { config: sanitizedConfig });
debug('setConfig: setting up new storage configuration');
2025-09-12 09:48:37 +02:00
await storageApi(backupSite).setup(sanitizedConfig);
await eventlog.add(eventlog.ACTION_BACKUP_SITE_UPDATE, auditSource, { name: backupSite.name, config: storageApi(backupSite).removePrivateFields(newConfig) });
}
2025-07-25 12:08:33 +02:00
async function add(data, auditSource) {
2025-07-24 19:02:02 +02:00
assert.strictEqual(typeof data, 'object');
2025-07-25 12:08:33 +02:00
assert.strictEqual(typeof auditSource, 'object');
if (constants.DEMO) throw new BoxError(BoxError.BAD_STATE, 'Not allowed in demo mode');
2025-09-23 10:21:43 +02:00
const { provider, name, config, format, contents, retention, schedule, enableForUpdates } = data; // required
2025-07-24 19:02:02 +02:00
const limits = data.limits || null,
encryptionPassword = data.encryptionPassword || null,
encryptedFilenames = data.encryptedFilenames || false,
encryptionPasswordHint = data.encryptionPasswordHint || '';
2023-08-04 11:24:28 +05:30
const formatError = backupFormats.validateFormat(format);
if (formatError) throw formatError;
2025-08-04 14:19:49 +02:00
const nameError = validateName(name);
if (nameError) throw nameError;
const contentsError = validateContents(contents);
if (contentsError) throw contentsError;
2025-07-24 19:02:02 +02:00
let encryption = null;
if (encryptionPassword) {
const encryptionPasswordError = validateEncryptionPassword(encryptionPassword);
if (encryptionPasswordError) throw encryptionPasswordError;
if (data.encryptionPassword === data.encryptionPasswordHint) throw new BoxError(BoxError.BAD_FIELD, 'Password hint cannot be the same as password');
2025-07-24 19:02:02 +02:00
encryption = hush.generateEncryptionKeysSync(encryptionPassword);
encryption.encryptedFilenames = !!encryptedFilenames;
encryption.encryptionPasswordHint = encryptionPasswordHint;
}
2023-08-15 18:37:21 +05:30
const integrityKeyPair = crypto.generateKeyPairSync('ed25519', {
publicKeyEncoding: { type: 'spki', format: 'pem' },
privateKeyEncoding: { type: 'pkcs8', format: 'pem' }
});
2025-10-01 10:27:14 +02:00
const id = crypto.randomUUID();
if (!safe.fs.mkdirSync(`${paths.BACKUP_INFO_DIR}/${id}`)) throw new BoxError(BoxError.FS_ERROR, `Failed to create info dir: ${safe.error.message}`);
debug('add: validating new storage configuration');
const sanitizedConfig = await storageApi({ provider }).verifyConfig({id, provider, config });
await database.query('INSERT INTO backupSites (id, name, provider, configJson, contentsJson, limitsJson, integrityKeyPairJson, retentionJson, schedule, encryptionJson, format, enableForUpdates) VALUES (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?)',
2025-09-23 10:21:43 +02:00
[ id, name, provider, JSON.stringify(sanitizedConfig), JSON.stringify(contents), JSON.stringify(limits), JSON.stringify(integrityKeyPair), JSON.stringify(retention), schedule, JSON.stringify(encryption), format, enableForUpdates ]);
2025-07-25 12:08:33 +02:00
debug('add: setting up new storage configuration');
await storageApi({ provider }).setup(sanitizedConfig);
await eventlog.add(eventlog.ACTION_BACKUP_SITE_ADD, auditSource, { id, name, provider, contents, schedule, format });
2025-07-25 12:08:33 +02:00
2025-07-24 19:02:02 +02:00
return id;
}
async function addDefault(auditSource) {
assert.strictEqual(typeof auditSource, 'object');
2025-09-12 09:48:37 +02:00
debug('addDefault: adding default backup site');
const defaultBackupSite = {
name: 'Default',
provider: 'filesystem',
config: { backupDir: paths.DEFAULT_BACKUP_DIR },
retention: { keepWithinSecs: 2 * 24 * 60 * 60 },
schedule: '00 00 23 * * *',
format: 'tgz',
2025-09-22 20:02:13 +02:00
contents: null,
enableForUpdates: true
};
return await add(defaultBackupSite, auditSource);
}
2025-09-12 09:48:37 +02:00
// creates a backup site object that is not in the database
async function createPseudo(data) {
assert.strictEqual(typeof data, 'object');
const { id, provider, config, format } = data; // required
2025-08-05 14:13:39 +02:00
const encryptionPassword = data.encryptionPassword ?? null,
encryptedFilenames = !!data.encryptedFilenames;
const formatError = backupFormats.validateFormat(format);
if (formatError) throw formatError;
let encryption = null;
if (encryptionPassword) { // intentionally do not validate password!
encryption = hush.generateEncryptionKeysSync(encryptionPassword);
encryption.encryptedFilenames = !!encryptedFilenames;
encryption.encryptionPasswordHint = '';
}
debug('add: validating new storage configuration');
const sanitizedConfig = await storageApi({ provider }).verifyConfig({id, provider, config });
return { id, format, provider, config: sanitizedConfig, encryption };
}
// after a restore, this recreates the working directories of the sites
async function reinitAll() {
for (const site of await list()) {
if (!safe.fs.mkdirSync(`${paths.BACKUP_INFO_DIR}/${site.id}`, { recursive: true })) throw new BoxError(BoxError.FS_ERROR, `Failed to create info dir: ${safe.error.message}`);
2025-11-26 15:36:33 +01:00
const status = await getStatus(site);
if (status.state === 'active') continue;
safe(remount(site), { debug }); // background
}
}