2015-06-21 11:02:56 +00:00
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
"io"
|
|
|
|
"os"
|
2015-11-04 21:05:36 +00:00
|
|
|
"strings"
|
2016-02-13 17:29:26 +00:00
|
|
|
"syscall"
|
2015-06-21 11:02:56 +00:00
|
|
|
|
2016-02-14 14:29:28 +00:00
|
|
|
"restic/backend"
|
|
|
|
"restic/backend/local"
|
2016-02-21 14:24:46 +00:00
|
|
|
"restic/backend/rest"
|
2016-02-14 14:29:28 +00:00
|
|
|
"restic/backend/s3"
|
|
|
|
"restic/backend/sftp"
|
|
|
|
"restic/debug"
|
|
|
|
"restic/location"
|
|
|
|
"restic/repository"
|
2016-02-21 14:24:46 +00:00
|
|
|
|
|
|
|
"github.com/jessevdk/go-flags"
|
|
|
|
"golang.org/x/crypto/ssh/terminal"
|
2015-06-21 11:02:56 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
var version = "compiled manually"
|
2015-06-24 15:59:31 +00:00
|
|
|
var compiledAt = "unknown time"
|
2015-06-21 11:02:56 +00:00
|
|
|
|
2016-01-17 15:59:03 +00:00
|
|
|
// GlobalOptions holds all those options that can be set for every command.
|
2015-06-21 11:02:56 +00:00
|
|
|
type GlobalOptions struct {
|
2016-01-17 15:59:03 +00:00
|
|
|
Repo string `short:"r" long:"repo" description:"Repository directory to backup to/restore from"`
|
|
|
|
CacheDir string ` long:"cache-dir" description:"Directory to use as a local cache"`
|
|
|
|
Quiet bool `short:"q" long:"quiet" default:"false" description:"Do not output comprehensive progress report"`
|
|
|
|
NoLock bool ` long:"no-lock" default:"false" description:"Do not lock the repo, this allows some operations on read-only repos."`
|
|
|
|
Options []string `short:"o" long:"option" description:"Specify options in the form 'foo.key=value'"`
|
2015-06-21 11:02:56 +00:00
|
|
|
|
|
|
|
password string
|
|
|
|
stdout io.Writer
|
2015-06-21 13:20:54 +00:00
|
|
|
stderr io.Writer
|
2015-06-21 11:02:56 +00:00
|
|
|
}
|
|
|
|
|
2016-02-13 17:29:26 +00:00
|
|
|
func init() {
|
|
|
|
restoreTerminal()
|
|
|
|
}
|
|
|
|
|
|
|
|
// checkErrno returns nil when err is set to syscall.Errno(0), since this is no
|
|
|
|
// error condition.
|
|
|
|
func checkErrno(err error) error {
|
|
|
|
e, ok := err.(syscall.Errno)
|
|
|
|
if !ok {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if e == 0 {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// restoreTerminal installs a cleanup handler that restores the previous
|
|
|
|
// terminal state on exit.
|
|
|
|
func restoreTerminal() {
|
|
|
|
fd := int(os.Stdout.Fd())
|
|
|
|
if !terminal.IsTerminal(fd) {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
state, err := terminal.GetState(fd)
|
|
|
|
if err != nil {
|
|
|
|
fmt.Fprintf(os.Stderr, "unable to get terminal state: %v\n", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
AddCleanupHandler(func() error {
|
|
|
|
err := checkErrno(terminal.Restore(fd, state))
|
|
|
|
if err != nil {
|
|
|
|
fmt.Fprintf(os.Stderr, "unable to get restore terminal state: %#+v\n", err)
|
|
|
|
}
|
|
|
|
return err
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2015-06-21 13:20:54 +00:00
|
|
|
var globalOpts = GlobalOptions{stdout: os.Stdout, stderr: os.Stderr}
|
2016-01-17 15:59:03 +00:00
|
|
|
var parser = flags.NewParser(&globalOpts, flags.HelpFlag|flags.PassDoubleDash)
|
2015-06-21 11:02:56 +00:00
|
|
|
|
2016-01-17 15:59:03 +00:00
|
|
|
// Printf writes the message to the configured stdout stream.
|
2015-06-21 11:02:56 +00:00
|
|
|
func (o GlobalOptions) Printf(format string, args ...interface{}) {
|
|
|
|
_, err := fmt.Fprintf(o.stdout, format, args...)
|
|
|
|
if err != nil {
|
|
|
|
fmt.Fprintf(os.Stderr, "unable to write to stdout: %v\n", err)
|
|
|
|
os.Exit(100)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-01-17 15:59:03 +00:00
|
|
|
// Verbosef calls Printf to write the message when the verbose flag is set.
|
2015-06-21 11:25:26 +00:00
|
|
|
func (o GlobalOptions) Verbosef(format string, args ...interface{}) {
|
|
|
|
if o.Quiet {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
o.Printf(format, args...)
|
|
|
|
}
|
|
|
|
|
2016-01-17 15:59:03 +00:00
|
|
|
// ShowProgress returns true iff the progress status should be written, i.e.
|
|
|
|
// the quiet flag is not set and the output is a terminal.
|
2015-06-21 11:02:56 +00:00
|
|
|
func (o GlobalOptions) ShowProgress() bool {
|
|
|
|
if o.Quiet {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
if !terminal.IsTerminal(int(os.Stdout.Fd())) {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2016-01-17 15:59:03 +00:00
|
|
|
// Warnf writes the message to the configured stderr stream.
|
2015-06-21 11:02:56 +00:00
|
|
|
func (o GlobalOptions) Warnf(format string, args ...interface{}) {
|
2015-06-21 13:20:54 +00:00
|
|
|
_, err := fmt.Fprintf(o.stderr, format, args...)
|
2015-06-21 11:02:56 +00:00
|
|
|
if err != nil {
|
|
|
|
fmt.Fprintf(os.Stderr, "unable to write to stderr: %v\n", err)
|
|
|
|
os.Exit(100)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-01-17 15:59:03 +00:00
|
|
|
// Exitf uses Warnf to write the message and then calls os.Exit(exitcode).
|
2015-06-21 11:02:56 +00:00
|
|
|
func (o GlobalOptions) Exitf(exitcode int, format string, args ...interface{}) {
|
|
|
|
if format[len(format)-1] != '\n' {
|
|
|
|
format += "\n"
|
|
|
|
}
|
|
|
|
|
|
|
|
o.Warnf(format, args...)
|
|
|
|
os.Exit(exitcode)
|
|
|
|
}
|
|
|
|
|
2015-11-04 21:05:36 +00:00
|
|
|
// readPassword reads the password from the given reader directly.
|
|
|
|
func readPassword(in io.Reader) (password string, err error) {
|
|
|
|
buf := make([]byte, 1000)
|
|
|
|
n, err := io.ReadFull(in, buf)
|
|
|
|
buf = buf[:n]
|
|
|
|
|
|
|
|
if err != nil && err != io.ErrUnexpectedEOF {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
return strings.TrimRight(string(buf), "\r\n"), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// readPasswordTerminal reads the password from the given reader which must be a
|
|
|
|
// tty. Prompt is printed on the writer out before attempting to read the
|
|
|
|
// password.
|
|
|
|
func readPasswordTerminal(in *os.File, out io.Writer, prompt string) (password string, err error) {
|
|
|
|
fmt.Fprint(out, prompt)
|
|
|
|
buf, err := terminal.ReadPassword(int(in.Fd()))
|
|
|
|
fmt.Fprintln(out)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
password = string(buf)
|
|
|
|
return password, nil
|
|
|
|
}
|
|
|
|
|
2016-01-17 15:59:03 +00:00
|
|
|
// ReadPassword reads the password from stdin.
|
2015-06-21 11:02:56 +00:00
|
|
|
func (o GlobalOptions) ReadPassword(prompt string) string {
|
2015-11-04 21:05:36 +00:00
|
|
|
var (
|
|
|
|
password string
|
|
|
|
err error
|
|
|
|
)
|
|
|
|
|
|
|
|
if terminal.IsTerminal(int(os.Stdin.Fd())) {
|
|
|
|
password, err = readPasswordTerminal(os.Stdin, os.Stderr, prompt)
|
|
|
|
} else {
|
|
|
|
password, err = readPassword(os.Stdin)
|
|
|
|
}
|
|
|
|
|
2015-06-21 11:02:56 +00:00
|
|
|
if err != nil {
|
|
|
|
o.Exitf(2, "unable to read password: %v", err)
|
|
|
|
}
|
|
|
|
|
2015-11-04 21:05:36 +00:00
|
|
|
if len(password) == 0 {
|
2015-06-21 13:01:52 +00:00
|
|
|
o.Exitf(1, "an empty password is not a password")
|
|
|
|
}
|
|
|
|
|
2015-11-04 21:05:36 +00:00
|
|
|
return password
|
2015-06-21 11:02:56 +00:00
|
|
|
}
|
|
|
|
|
2016-01-17 15:59:03 +00:00
|
|
|
// ReadPasswordTwice calls ReadPassword two times and returns an error when the
|
|
|
|
// passwords don't match.
|
2015-06-21 11:02:56 +00:00
|
|
|
func (o GlobalOptions) ReadPasswordTwice(prompt1, prompt2 string) string {
|
|
|
|
pw1 := o.ReadPassword(prompt1)
|
|
|
|
pw2 := o.ReadPassword(prompt2)
|
|
|
|
if pw1 != pw2 {
|
|
|
|
o.Exitf(1, "passwords do not match")
|
|
|
|
}
|
|
|
|
|
|
|
|
return pw1
|
|
|
|
}
|
|
|
|
|
2016-08-21 11:09:31 +00:00
|
|
|
const maxKeys = 20
|
|
|
|
|
2016-01-17 15:59:03 +00:00
|
|
|
// OpenRepository reads the password and opens the repository.
|
2015-06-21 11:02:56 +00:00
|
|
|
func (o GlobalOptions) OpenRepository() (*repository.Repository, error) {
|
|
|
|
if o.Repo == "" {
|
|
|
|
return nil, errors.New("Please specify repository location (-r)")
|
|
|
|
}
|
|
|
|
|
|
|
|
be, err := open(o.Repo)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
s := repository.New(be)
|
|
|
|
|
|
|
|
if o.password == "" {
|
|
|
|
o.password = o.ReadPassword("enter password for repository: ")
|
|
|
|
}
|
|
|
|
|
2016-08-21 11:09:31 +00:00
|
|
|
err = s.SearchKey(o.password, maxKeys)
|
2015-06-21 11:02:56 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("unable to open repo: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return s, nil
|
|
|
|
}
|
|
|
|
|
2015-12-28 17:23:20 +00:00
|
|
|
// Open the backend specified by a location config.
|
|
|
|
func open(s string) (backend.Backend, error) {
|
2015-12-28 17:55:15 +00:00
|
|
|
debug.Log("open", "parsing location %v", s)
|
2015-12-28 17:23:20 +00:00
|
|
|
loc, err := location.Parse(s)
|
2015-06-21 11:02:56 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2015-12-28 17:23:20 +00:00
|
|
|
switch loc.Scheme {
|
|
|
|
case "local":
|
2015-12-28 17:55:15 +00:00
|
|
|
debug.Log("open", "opening local repository at %#v", loc.Config)
|
2015-12-28 17:23:20 +00:00
|
|
|
return local.Open(loc.Config.(string))
|
|
|
|
case "sftp":
|
2015-12-28 17:55:15 +00:00
|
|
|
debug.Log("open", "opening sftp repository at %#v", loc.Config)
|
2015-12-28 17:23:20 +00:00
|
|
|
return sftp.OpenWithConfig(loc.Config.(sftp.Config))
|
|
|
|
case "s3":
|
|
|
|
cfg := loc.Config.(s3.Config)
|
|
|
|
if cfg.KeyID == "" {
|
|
|
|
cfg.KeyID = os.Getenv("AWS_ACCESS_KEY_ID")
|
2015-08-14 13:39:16 +00:00
|
|
|
|
2015-12-28 17:23:20 +00:00
|
|
|
}
|
|
|
|
if cfg.Secret == "" {
|
|
|
|
cfg.Secret = os.Getenv("AWS_SECRET_ACCESS_KEY")
|
|
|
|
}
|
2015-08-14 13:39:16 +00:00
|
|
|
|
2015-12-28 17:55:15 +00:00
|
|
|
debug.Log("open", "opening s3 repository at %#v", cfg)
|
|
|
|
return s3.Open(cfg)
|
2016-02-21 14:24:46 +00:00
|
|
|
case "rest":
|
|
|
|
return rest.Open(loc.Config.(rest.Config))
|
2015-06-21 11:02:56 +00:00
|
|
|
}
|
|
|
|
|
2015-12-28 17:55:15 +00:00
|
|
|
debug.Log("open", "invalid repository location: %v", s)
|
2015-12-28 17:23:20 +00:00
|
|
|
return nil, fmt.Errorf("invalid scheme %q", loc.Scheme)
|
2015-06-21 11:02:56 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Create the backend specified by URI.
|
2015-12-28 17:23:20 +00:00
|
|
|
func create(s string) (backend.Backend, error) {
|
2015-12-28 17:55:15 +00:00
|
|
|
debug.Log("open", "parsing location %v", s)
|
2015-12-28 17:23:20 +00:00
|
|
|
loc, err := location.Parse(s)
|
2015-06-21 11:02:56 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2015-12-28 17:23:20 +00:00
|
|
|
switch loc.Scheme {
|
|
|
|
case "local":
|
2015-12-28 17:55:15 +00:00
|
|
|
debug.Log("open", "create local repository at %#v", loc.Config)
|
2015-12-28 17:23:20 +00:00
|
|
|
return local.Create(loc.Config.(string))
|
|
|
|
case "sftp":
|
2015-12-28 17:55:15 +00:00
|
|
|
debug.Log("open", "create sftp repository at %#v", loc.Config)
|
2015-12-28 17:23:20 +00:00
|
|
|
return sftp.CreateWithConfig(loc.Config.(sftp.Config))
|
|
|
|
case "s3":
|
|
|
|
cfg := loc.Config.(s3.Config)
|
|
|
|
if cfg.KeyID == "" {
|
|
|
|
cfg.KeyID = os.Getenv("AWS_ACCESS_KEY_ID")
|
2015-08-14 13:39:16 +00:00
|
|
|
|
2015-12-28 17:23:20 +00:00
|
|
|
}
|
|
|
|
if cfg.Secret == "" {
|
|
|
|
cfg.Secret = os.Getenv("AWS_SECRET_ACCESS_KEY")
|
|
|
|
}
|
2015-08-14 13:39:16 +00:00
|
|
|
|
2015-12-28 17:55:15 +00:00
|
|
|
debug.Log("open", "create s3 repository at %#v", loc.Config)
|
|
|
|
return s3.Open(cfg)
|
2016-02-21 14:24:46 +00:00
|
|
|
case "rest":
|
|
|
|
return rest.Open(loc.Config.(rest.Config))
|
2015-06-21 11:02:56 +00:00
|
|
|
}
|
|
|
|
|
2015-12-28 17:55:15 +00:00
|
|
|
debug.Log("open", "invalid repository scheme: %v", s)
|
2015-12-28 17:23:20 +00:00
|
|
|
return nil, fmt.Errorf("invalid scheme %q", loc.Scheme)
|
2015-06-21 11:02:56 +00:00
|
|
|
}
|