Files
cloudron-box/src/backupintegrity.js
T

77 lines
3.2 KiB
JavaScript
Raw Normal View History

import assert from 'assert';
import backups from './backups.js';
2026-02-14 15:43:24 +01:00
import backupFormats from './backupformats.js';
import backupSites from './backupsites.js';
import BoxError from './boxerror.js';
import consumers from 'node:stream/consumers';
import crypto from 'node:crypto';
import debugModule from 'debug';
import safe from 'safetydance';
2025-08-15 16:09:58 +05:30
const debug = debugModule('box:backupintegrity');
async function downloadBackupInfo(backupSite, backup) {
2025-09-12 09:48:37 +02:00
const stream = await backupSites.storageApi(backupSite).download(backupSite.config, `${backup.remotePath}.backupinfo`);
2025-08-15 16:09:58 +05:30
const buffer = await consumers.buffer(stream);
return buffer;
}
async function verify(backup, backupSite, progressCallback) {
assert.strictEqual(typeof backup, 'object');
assert.strictEqual(typeof backupSite, 'object');
assert.strictEqual(typeof progressCallback, 'function');
2025-08-15 16:09:58 +05:30
if (backup === null) return [`${backup.id} is missing in database`];
const [downloadError, backupInfoBuffer] = await safe(downloadBackupInfo(backupSite, backup));
if (downloadError) {
const messages = [`Failed to download ${backup.remotePath}.backupinfo: ${downloadError.message}`];
await backups.setIntegrityResult(backup, 'failed', { messages });
return;
}
const validSignature = crypto.verify(null /* algo */, backupInfoBuffer, backupSite.integrityKeyPair.publicKey, Buffer.from(backup.integrity.signature, 'hex'));
2025-08-15 16:09:58 +05:30
progressCallback({ message: `Signature valid? ${validSignature}`});
const backupInfo = JSON.parse(backupInfoBuffer.toString('utf8'));
2025-08-15 16:09:58 +05:30
const integrityMap = new Map(Object.entries(backupInfo));
const [verifyError, verifyMessages] = await safe(backupFormats.api(backupSite.format).verify(backupSite, backup.remotePath, integrityMap, progressCallback));
2025-08-15 16:09:58 +05:30
progressCallback({ message: 'Verification done' });
const messages = [];
if (!validSignature) messages.push(`${backup.remotePath}.backupinfo has invalid signature`);
if (verifyError) messages.push(`Failed to verify ${backup.remotePath}: ${verifyError.message}`);
if (verifyMessages) messages.push(...verifyMessages);
debug(`verified: ${JSON.stringify(verifyMessages, null, 4)}`);
return messages;
2025-08-15 16:09:58 +05:30
}
2025-10-07 18:42:51 +02:00
async function check(backupId, progressCallback) {
const backup = await backups.get(backupId);
if (!backup) throw new BoxError(BoxError.BAD_FIELD, 'Backup not found');
const backupSite = await backupSites.get(backup.siteId);
if (!backupSite) throw new BoxError(BoxError.BAD_FIELD, 'Backup site not found');
const aggregatedMessages = [];
for (const depId of backup.dependsOn) {
const depBackup = await backups.get(depId);
const messages = await verify(depBackup, backupSite, progressCallback);
await backups.setIntegrityResult(backup, messages.length === 0 ? 'passed' : 'failed', { messages });
if (messages.length) aggregatedMessages.push(`Integrity check of dependent backup ${depBackup.remotePath} failed`);
}
const messages = await verify(backup, backupSite, progressCallback);
aggregatedMessages.push(...messages);
await backups.setIntegrityResult(backup, aggregatedMessages.length === 0 ? 'passed' : 'failed', { messages: aggregatedMessages });
}
2026-02-14 15:43:24 +01:00
export default {
check
};