340 lines
12 KiB
JavaScript
340 lines
12 KiB
JavaScript
'use strict';
|
|
|
|
exports = module.exports = {
|
|
backup: backup,
|
|
restore: restore,
|
|
copyBackup: copyBackup,
|
|
removeBackup: removeBackup,
|
|
|
|
getDownloadStream: getDownloadStream,
|
|
|
|
backupDone: backupDone,
|
|
|
|
testConfig: testConfig,
|
|
|
|
// Used to mock AWS
|
|
_mockInject: mockInject,
|
|
_mockRestore: mockRestore
|
|
};
|
|
|
|
var assert = require('assert'),
|
|
AWS = require('aws-sdk'),
|
|
BackupsError = require('../backups.js').BackupsError,
|
|
crypto = require('crypto'),
|
|
debug = require('debug')('box:storage/s3'),
|
|
mkdirp = require('mkdirp'),
|
|
once = require('once'),
|
|
path = require('path'),
|
|
SettingsError = require('../settings.js').SettingsError,
|
|
tar = require('tar-fs'),
|
|
zlib = require('zlib');
|
|
|
|
var FILE_TYPE = '.tar.gz';
|
|
|
|
// test only
|
|
var originalAWS;
|
|
function mockInject(mock) {
|
|
originalAWS = AWS;
|
|
AWS = mock;
|
|
}
|
|
|
|
function mockRestore() {
|
|
AWS = originalAWS;
|
|
}
|
|
|
|
// internal only
|
|
function getBackupCredentials(apiConfig, callback) {
|
|
assert.strictEqual(typeof apiConfig, 'object');
|
|
assert.strictEqual(typeof callback, 'function');
|
|
|
|
assert(apiConfig.accessKeyId && apiConfig.secretAccessKey);
|
|
|
|
var credentials = {
|
|
signatureVersion: 'v4',
|
|
s3ForcePathStyle: true,
|
|
accessKeyId: apiConfig.accessKeyId,
|
|
secretAccessKey: apiConfig.secretAccessKey,
|
|
region: apiConfig.region || 'us-east-1'
|
|
};
|
|
|
|
if (apiConfig.endpoint) credentials.endpoint = apiConfig.endpoint;
|
|
|
|
callback(null, credentials);
|
|
}
|
|
|
|
function getBackupFilePath(apiConfig, backupId) {
|
|
assert.strictEqual(typeof apiConfig, 'object');
|
|
assert.strictEqual(typeof backupId, 'string');
|
|
|
|
return path.join(apiConfig.prefix, backupId.endsWith(FILE_TYPE) ? backupId : backupId+FILE_TYPE);
|
|
}
|
|
|
|
// storage api
|
|
function backup(apiConfig, backupId, sourceDirectories, callback) {
|
|
assert.strictEqual(typeof apiConfig, 'object');
|
|
assert.strictEqual(typeof backupId, 'string');
|
|
assert(Array.isArray(sourceDirectories));
|
|
assert.strictEqual(typeof callback, 'function');
|
|
|
|
callback = once(callback);
|
|
|
|
var backupFilePath = getBackupFilePath(apiConfig, backupId);
|
|
|
|
debug('[%s] backup: %j -> %s', backupId, sourceDirectories, backupFilePath);
|
|
|
|
getBackupCredentials(apiConfig, function (error, credentials) {
|
|
if (error) return callback(error);
|
|
|
|
var pack = tar.pack('/', {
|
|
entries: sourceDirectories.map(function (m) { return m.source; }),
|
|
map: function(header) {
|
|
sourceDirectories.forEach(function (m) {
|
|
header.name = header.name.replace(new RegExp('^' + m.source + '(/?)'), m.destination + '$1');
|
|
});
|
|
return header;
|
|
}
|
|
});
|
|
|
|
var gzip = zlib.createGzip({});
|
|
var encrypt = crypto.createCipher('aes-256-cbc', apiConfig.key || '');
|
|
|
|
pack.on('error', function (error) {
|
|
console.error('[%s] backup: tar stream error.', backupId, error);
|
|
callback(new BackupsError(BackupsError.INTERNAL_ERROR, error));
|
|
});
|
|
|
|
gzip.on('error', function (error) {
|
|
console.error('[%s] backup: gzip stream error.', backupId, error);
|
|
callback(new BackupsError(BackupsError.INTERNAL_ERROR, error));
|
|
});
|
|
|
|
encrypt.on('error', function (error) {
|
|
console.error('[%s] backup: encrypt stream error.', backupId, error);
|
|
callback(new BackupsError(BackupsError.INTERNAL_ERROR, error));
|
|
});
|
|
|
|
pack.pipe(gzip).pipe(encrypt);
|
|
|
|
var params = {
|
|
Bucket: apiConfig.bucket,
|
|
Key: backupFilePath,
|
|
Body: encrypt
|
|
};
|
|
|
|
var s3 = new AWS.S3(credentials);
|
|
s3.upload(params, function (error) {
|
|
if (error) {
|
|
console.error('[%s] backup: s3 upload error.', backupId, error);
|
|
return callback(new BackupsError(BackupsError.EXTERNAL_ERROR, error));
|
|
}
|
|
|
|
callback(null);
|
|
});
|
|
});
|
|
}
|
|
|
|
function restore(apiConfig, backupId, destination, callback) {
|
|
assert.strictEqual(typeof apiConfig, 'object');
|
|
assert.strictEqual(typeof backupId, 'string');
|
|
assert.strictEqual(typeof destination, 'string');
|
|
assert.strictEqual(typeof callback, 'function');
|
|
|
|
var backupFilePath = getBackupFilePath(apiConfig, backupId);
|
|
|
|
debug('[%s] restore: %s -> %s', backupId, backupFilePath, destination);
|
|
|
|
getBackupCredentials(apiConfig, function (error, credentials) {
|
|
if (error) return callback(error);
|
|
|
|
mkdirp(destination, function (error) {
|
|
if (error) return callback(error);
|
|
|
|
var params = {
|
|
Bucket: apiConfig.bucket,
|
|
Key: backupFilePath
|
|
};
|
|
|
|
var s3 = new AWS.S3(credentials);
|
|
|
|
var s3get = s3.getObject(params).createReadStream();
|
|
var decrypt = crypto.createDecipher('aes-256-cbc', apiConfig.key || '');
|
|
var gunzip = zlib.createGunzip({});
|
|
var extract = tar.extract(destination);
|
|
|
|
s3get.on('error', function (error) {
|
|
// TODO ENOENT for the mock, fix upstream!
|
|
if (error.code === 'NoSuchKey' || error.code === 'ENOENT') return callback(new BackupsError(BackupsError.NOT_FOUND));
|
|
|
|
console.error('[%s] restore: s3 stream error.', backupId, error);
|
|
callback(new BackupsError(BackupsError.EXTERNAL_ERROR, error));
|
|
});
|
|
|
|
decrypt.on('error', function (error) {
|
|
console.error('[%s] restore: decipher stream error.', error);
|
|
callback(new BackupsError(BackupsError.INTERNAL_ERROR, error));
|
|
});
|
|
|
|
gunzip.on('error', function (error) {
|
|
console.error('[%s] restore: gunzip stream error.', error);
|
|
callback(new BackupsError(BackupsError.INTERNAL_ERROR, error));
|
|
});
|
|
|
|
extract.on('error', function (error) {
|
|
console.error('[%s] restore: extract stream error.', error);
|
|
callback(new BackupsError(BackupsError.INTERNAL_ERROR, error));
|
|
});
|
|
|
|
extract.on('finish', function () {
|
|
debug('[%s] restore: done.', backupId);
|
|
callback();
|
|
});
|
|
|
|
s3get.pipe(decrypt).pipe(gunzip).pipe(extract);
|
|
});
|
|
});
|
|
}
|
|
|
|
function copyBackup(apiConfig, oldBackupId, newBackupId, callback) {
|
|
assert.strictEqual(typeof apiConfig, 'object');
|
|
assert.strictEqual(typeof oldBackupId, 'string');
|
|
assert.strictEqual(typeof newBackupId, 'string');
|
|
assert.strictEqual(typeof callback, 'function');
|
|
|
|
getBackupCredentials(apiConfig, function (error, credentials) {
|
|
if (error) return callback(error);
|
|
|
|
var params = {
|
|
Bucket: apiConfig.bucket,
|
|
Key: getBackupFilePath(apiConfig, newBackupId),
|
|
CopySource: path.join(apiConfig.bucket, getBackupFilePath(apiConfig, oldBackupId))
|
|
};
|
|
|
|
var s3 = new AWS.S3(credentials);
|
|
s3.copyObject(params, function (error) {
|
|
if (error && error.code === 'NoSuchKey') return callback(new BackupsError(BackupsError.NOT_FOUND));
|
|
if (error) {
|
|
console.error('copyBackup: s3 copy error.', error);
|
|
return callback(new BackupsError(BackupsError.EXTERNAL_ERROR, error));
|
|
}
|
|
|
|
callback(null);
|
|
});
|
|
});
|
|
}
|
|
|
|
function removeBackup(apiConfig, backupId, appBackupIds, callback) {
|
|
assert.strictEqual(typeof apiConfig, 'object');
|
|
assert.strictEqual(typeof backupId, 'string');
|
|
assert(Array.isArray(appBackupIds));
|
|
assert.strictEqual(typeof callback, 'function');
|
|
|
|
getBackupCredentials(apiConfig, function (error, credentials) {
|
|
if (error) return callback(error);
|
|
|
|
var params = {
|
|
Bucket: apiConfig.bucket,
|
|
Key: getBackupFilePath(apiConfig, backupId)
|
|
};
|
|
|
|
var s3 = new AWS.S3(credentials);
|
|
s3.deleteObject(params, function (error) {
|
|
if (error) console.error('Unable to remove %s. Not fatal.', params.Key, error);
|
|
callback(null);
|
|
});
|
|
});
|
|
}
|
|
|
|
function getDownloadStream(apiConfig, backupId, callback) {
|
|
assert.strictEqual(typeof apiConfig, 'object');
|
|
assert.strictEqual(typeof backupId, 'string');
|
|
assert.strictEqual(typeof callback, 'function');
|
|
|
|
callback = once(callback);
|
|
|
|
var backupFilePath = getBackupFilePath(apiConfig, backupId);
|
|
|
|
debug('[%s] getDownloadStream: %s %s', backupId, backupId, backupFilePath);
|
|
|
|
getBackupCredentials(apiConfig, function (error, credentials) {
|
|
if (error) return callback(error);
|
|
|
|
var params = {
|
|
Bucket: apiConfig.bucket,
|
|
Key: backupFilePath
|
|
};
|
|
|
|
var s3 = new AWS.S3(credentials);
|
|
|
|
s3.headObject(params, function (error) {
|
|
// TODO ENOENT for the mock, fix upstream!
|
|
if (error && (error.code === 'NotFound' || error.code === 'ENOENT')) return callback(new BackupsError(BackupsError.NOT_FOUND));
|
|
if (error) return callback(new BackupsError(BackupsError.EXTERNAL_ERROR, error));
|
|
|
|
var s3get = s3.getObject(params).createReadStream();
|
|
var decrypt = crypto.createDecipher('aes-256-cbc', apiConfig.key || '');
|
|
|
|
s3get.on('error', function (error) {
|
|
if (error.code === 'NoSuchKey') return callback(new BackupsError(BackupsError.NOT_FOUND));
|
|
|
|
console.error('[%s] getDownloadStream: s3 stream error.', backupId, error);
|
|
callback(new BackupsError(BackupsError.EXTERNAL_ERROR, error));
|
|
});
|
|
|
|
decrypt.on('error', function (error) {
|
|
console.error('[%s] getDownloadStream: decipher stream error.', error);
|
|
callback(new BackupsError(BackupsError.INTERNAL_ERROR, error));
|
|
});
|
|
|
|
s3get.pipe(decrypt);
|
|
|
|
callback(null, decrypt);
|
|
});
|
|
});
|
|
}
|
|
|
|
function testConfig(apiConfig, callback) {
|
|
assert.strictEqual(typeof apiConfig, 'object');
|
|
assert.strictEqual(typeof callback, 'function');
|
|
|
|
if (typeof apiConfig.accessKeyId !== 'string') return callback(new SettingsError(SettingsError.BAD_FIELD, 'accessKeyId must be a string'));
|
|
if (typeof apiConfig.secretAccessKey !== 'string') return callback(new SettingsError(SettingsError.BAD_FIELD, 'secretAccessKey must be a string'));
|
|
if (typeof apiConfig.bucket !== 'string') return callback(new SettingsError(SettingsError.BAD_FIELD, 'bucket must be a string'));
|
|
if (typeof apiConfig.prefix !== 'string') return callback(new SettingsError(SettingsError.BAD_FIELD, 'prefix must be a string'));
|
|
|
|
// attempt to upload and delete a file with new credentials
|
|
getBackupCredentials(apiConfig, function (error, credentials) {
|
|
if (error) return callback(error);
|
|
|
|
var params = {
|
|
Bucket: apiConfig.bucket,
|
|
Key: apiConfig.prefix + '/cloudron-testfile',
|
|
Body: 'testcontent'
|
|
};
|
|
|
|
var s3 = new AWS.S3(credentials);
|
|
s3.putObject(params, function (error) {
|
|
if (error) return callback(new SettingsError(SettingsError.EXTERNAL_ERROR, error.message));
|
|
|
|
var params = {
|
|
Bucket: apiConfig.bucket,
|
|
Key: apiConfig.prefix + '/cloudron-testfile'
|
|
};
|
|
|
|
s3.deleteObject(params, function (error) {
|
|
if (error) return callback(new SettingsError(SettingsError.EXTERNAL_ERROR, error.message));
|
|
|
|
callback();
|
|
});
|
|
});
|
|
});
|
|
}
|
|
|
|
function backupDone(filename, app, appBackupIds, callback) {
|
|
assert.strictEqual(typeof filename, 'string');
|
|
assert(!app || typeof app === 'object');
|
|
assert(!appBackupIds || Array.isArray(appBackupIds));
|
|
assert.strictEqual(typeof callback, 'function');
|
|
|
|
callback();
|
|
}
|