mirror of
https://github.com/restic/restic.git
synced 2025-03-16 00:00:05 +01:00
463 lines
12 KiB
Go
463 lines
12 KiB
Go
package smb
|
|
|
|
import (
|
|
"context"
|
|
"crypto/rand"
|
|
"encoding/hex"
|
|
"hash"
|
|
"io"
|
|
"os"
|
|
"path"
|
|
"path/filepath"
|
|
"sync"
|
|
"syscall"
|
|
"time"
|
|
|
|
"github.com/cenkalti/backoff/v4"
|
|
"github.com/hirochachacha/go-smb2"
|
|
"github.com/restic/restic/internal/backend"
|
|
"github.com/restic/restic/internal/backend/layout"
|
|
"github.com/restic/restic/internal/backend/limiter"
|
|
"github.com/restic/restic/internal/backend/location"
|
|
"github.com/restic/restic/internal/debug"
|
|
"github.com/restic/restic/internal/errors"
|
|
"github.com/restic/restic/internal/restic"
|
|
)
|
|
|
|
// Parts of this code have been adapted from Rclone (https://github.com/rclone)
|
|
// Copyright (C) 2012 by Nick Craig-Wood http://www.craig-wood.com/nick/
|
|
|
|
// Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
// of this software and associated documentation files (the "Software"), to deal
|
|
// in the Software without restriction, including without limitation the rights
|
|
// to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
|
// copies of the Software, and to permit persons to whom the Software is
|
|
// furnished to do so, subject to the following conditions:
|
|
|
|
// The above copyright notice and this permission notice shall be included in
|
|
// all copies or substantial portions of the Software.
|
|
|
|
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
// IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
// FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
|
// AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
// LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
|
// OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
|
// THE SOFTWARE.
|
|
|
|
// Backend stores data on an SMB endpoint.
|
|
type Backend struct {
|
|
Config
|
|
layout.Layout
|
|
backend.Modes
|
|
|
|
sessions int32
|
|
poolMu sync.Mutex
|
|
pool []*conn
|
|
drain *time.Timer // used to drain the pool when we stop using the connections
|
|
}
|
|
|
|
// make sure that *Backend implements backend.Backend
|
|
var _ restic.Backend = &Backend{}
|
|
|
|
func NewFactory() location.Factory {
|
|
return location.NewLimitedBackendFactory("smb", ParseConfig, location.NoPassword, limiter.WrapBackendConstructor(Create), limiter.WrapBackendConstructor(Open))
|
|
}
|
|
|
|
const (
|
|
defaultLayout = "default"
|
|
)
|
|
|
|
func open(ctx context.Context, cfg Config) (*Backend, error) {
|
|
|
|
l, err := layout.ParseLayout(ctx, &layout.LocalFilesystem{}, cfg.Layout, defaultLayout, cfg.Path)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
b := &Backend{
|
|
Config: cfg,
|
|
Layout: l,
|
|
}
|
|
|
|
debug.Log("open, config %#v", cfg)
|
|
|
|
// set the pool drainer timer going
|
|
if b.Config.IdleTimeout > 0 {
|
|
b.drain = time.AfterFunc(b.Config.IdleTimeout, func() { _ = b.drainPool() })
|
|
}
|
|
|
|
cn, err := b.getConnection(ctx, b.ShareName)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
defer b.putConnection(cn)
|
|
|
|
stat, err := cn.smbShare.Stat(l.Filename(restic.Handle{Type: restic.ConfigFile}))
|
|
m := backend.DeriveModesFromFileInfo(stat, err)
|
|
debug.Log("using (%03O file, %03O dir) permissions", m.File, m.Dir)
|
|
|
|
b.Modes = m
|
|
|
|
return b, nil
|
|
}
|
|
|
|
// Open opens the local backend as specified by config.
|
|
func Open(ctx context.Context, cfg Config) (*Backend, error) {
|
|
debug.Log("open local backend at %v (layout %q)", cfg.Path, cfg.Layout)
|
|
return open(ctx, cfg)
|
|
}
|
|
|
|
// Create creates all the necessary files and directories for a new local
|
|
// backend at dir. Afterwards a new config blob should be created.
|
|
func Create(ctx context.Context, cfg Config) (*Backend, error) {
|
|
debug.Log("create local backend at %v (layout %q)", cfg.Path, cfg.Layout)
|
|
|
|
b, err := open(ctx, cfg)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
cn, err := b.getConnection(ctx, cfg.ShareName)
|
|
if err != nil {
|
|
return b, err
|
|
}
|
|
defer b.putConnection(cn)
|
|
|
|
// test if config file already exists
|
|
_, err = cn.smbShare.Lstat(b.Filename(restic.Handle{Type: restic.ConfigFile}))
|
|
if err == nil {
|
|
return nil, errors.New("config file already exists")
|
|
}
|
|
|
|
// create paths for data and refs
|
|
for _, d := range b.Paths() {
|
|
err := cn.smbShare.MkdirAll(d, b.Modes.Dir)
|
|
if err != nil {
|
|
return nil, errors.WithStack(err)
|
|
}
|
|
}
|
|
|
|
return b, nil
|
|
}
|
|
|
|
func (b *Backend) Connections() uint {
|
|
return b.Config.Connections
|
|
}
|
|
|
|
// Location returns this backend's location (the directory name).
|
|
func (b *Backend) Location() string {
|
|
return b.Join(b.ShareName, b.Path)
|
|
}
|
|
|
|
// Hasher may return a hash function for calculating a content hash for the backend
|
|
func (b *Backend) Hasher() hash.Hash {
|
|
return nil
|
|
}
|
|
|
|
// HasAtomicReplace returns whether Save() can atomically replace files
|
|
func (b *Backend) HasAtomicReplace() bool {
|
|
return true
|
|
}
|
|
|
|
// IsNotExist returns true if the error is caused by a non existing file.
|
|
func (b *Backend) IsNotExist(err error) bool {
|
|
return errors.Is(err, os.ErrNotExist)
|
|
}
|
|
|
|
// Join combines path components with slashes.
|
|
func (b *Backend) Join(p ...string) string {
|
|
return path.Join(p...)
|
|
}
|
|
|
|
// Save stores data in the backend at the handle.
|
|
func (b *Backend) Save(ctx context.Context, h restic.Handle, rd restic.RewindReader) (err error) {
|
|
filename := b.Filename(h)
|
|
tmpFilename := filename + "-restic-temp-" + tempSuffix()
|
|
dir := filepath.Dir(tmpFilename)
|
|
|
|
defer func() {
|
|
// Mark non-retriable errors as such
|
|
if errors.Is(err, syscall.ENOSPC) || os.IsPermission(err) {
|
|
err = backoff.Permanent(err)
|
|
}
|
|
}()
|
|
|
|
b.addSession() // Show session in use
|
|
defer b.removeSession()
|
|
|
|
cn, err := b.getConnection(ctx, b.ShareName)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer b.putConnection(cn)
|
|
|
|
// create new file
|
|
f, err := cn.smbShare.OpenFile(tmpFilename, os.O_CREATE|os.O_EXCL|os.O_WRONLY, 0600)
|
|
|
|
if b.IsNotExist(err) {
|
|
debug.Log("error %v: creating dir", err)
|
|
|
|
// error is caused by a missing directory, try to create it
|
|
mkdirErr := cn.smbShare.MkdirAll(dir, b.Modes.Dir)
|
|
if mkdirErr != nil {
|
|
debug.Log("error creating dir %v: %v", dir, mkdirErr)
|
|
} else {
|
|
// try again
|
|
f, err = cn.smbShare.OpenFile(tmpFilename, os.O_CREATE|os.O_EXCL|os.O_WRONLY, 0600)
|
|
}
|
|
}
|
|
|
|
if err != nil {
|
|
return errors.WithStack(err)
|
|
}
|
|
|
|
defer func(f *smb2.File) {
|
|
if err != nil {
|
|
_ = f.Close() // Double Close is harmless.
|
|
// Remove after Rename is harmless: we embed the final name in the
|
|
// temporary's name and no other goroutine will get the same data to
|
|
// Save, so the temporary name should never be reused by another
|
|
// goroutine.
|
|
_ = cn.smbShare.Remove(f.Name())
|
|
}
|
|
}(f)
|
|
|
|
// save data, then sync
|
|
wbytes, err := io.Copy(f, rd)
|
|
if err != nil {
|
|
return errors.WithStack(err)
|
|
}
|
|
// sanity check
|
|
if wbytes != rd.Length() {
|
|
return errors.Errorf("wrote %d bytes instead of the expected %d bytes", wbytes, rd.Length())
|
|
}
|
|
|
|
// Ignore error if filesystem does not support fsync.
|
|
// In this case the sync call is on the smb client's file.
|
|
err = f.Sync()
|
|
syncNotSup := err != nil && (errors.Is(err, syscall.ENOTSUP))
|
|
if err != nil && !syncNotSup {
|
|
return errors.WithStack(err)
|
|
}
|
|
|
|
// Close, then rename. Windows doesn't like the reverse order.
|
|
if err = f.Close(); err != nil {
|
|
return errors.WithStack(err)
|
|
}
|
|
if err = cn.smbShare.Rename(f.Name(), filename); err != nil {
|
|
return errors.WithStack(err)
|
|
}
|
|
|
|
// try to mark file as read-only to avoid accidential modifications
|
|
// ignore if the operation fails as some filesystems don't allow the chmod call
|
|
// e.g. exfat and network file systems with certain mount options
|
|
err = cn.setFileReadonly(filename, b.Modes.File)
|
|
if err != nil && !os.IsPermission(err) {
|
|
return errors.WithStack(err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// set file to readonly
|
|
func (cn *conn) setFileReadonly(f string, mode os.FileMode) error {
|
|
return cn.smbShare.Chmod(f, mode&^0222)
|
|
}
|
|
|
|
// Load runs fn with a reader that yields the contents of the file at h at the
|
|
// given offset.
|
|
func (b *Backend) Load(ctx context.Context, h restic.Handle, length int, offset int64, fn func(rd io.Reader) error) error {
|
|
return backend.DefaultLoad(ctx, h, length, offset, b.openReader, fn)
|
|
}
|
|
|
|
func (b *Backend) openReader(ctx context.Context, h restic.Handle, length int, offset int64) (io.ReadCloser, error) {
|
|
b.addSession() // Show session in use
|
|
defer b.removeSession()
|
|
cn, err := b.getConnection(ctx, b.ShareName)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
defer b.putConnection(cn)
|
|
|
|
f, err := cn.smbShare.Open(b.Filename(h))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if offset > 0 {
|
|
_, err = f.Seek(offset, 0)
|
|
if err != nil {
|
|
_ = f.Close()
|
|
return nil, err
|
|
}
|
|
}
|
|
|
|
if length > 0 {
|
|
return backend.LimitReadCloser(f, int64(length)), nil
|
|
}
|
|
|
|
return f, nil
|
|
}
|
|
|
|
// Stat returns information about a blob.
|
|
func (b *Backend) Stat(ctx context.Context, h restic.Handle) (restic.FileInfo, error) {
|
|
cn, err := b.getConnection(ctx, b.ShareName)
|
|
if err != nil {
|
|
return restic.FileInfo{}, err
|
|
}
|
|
defer b.putConnection(cn)
|
|
|
|
fi, err := cn.smbShare.Stat(b.Filename(h))
|
|
if err != nil {
|
|
return restic.FileInfo{}, errors.WithStack(err)
|
|
}
|
|
|
|
return restic.FileInfo{Size: fi.Size(), Name: h.Name}, nil
|
|
}
|
|
|
|
// Remove removes the blob with the given name and type.
|
|
func (b *Backend) Remove(ctx context.Context, h restic.Handle) error {
|
|
fn := b.Filename(h)
|
|
|
|
cn, err := b.getConnection(ctx, b.ShareName)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer b.putConnection(cn)
|
|
|
|
// reset read-only flag
|
|
err = cn.smbShare.Chmod(fn, 0666)
|
|
if err != nil && !os.IsPermission(err) {
|
|
return errors.WithStack(err)
|
|
}
|
|
|
|
return cn.smbShare.Remove(fn)
|
|
}
|
|
|
|
// List runs fn for each file in the backend which has the type t. When an
|
|
// error occurs (or fn returns an error), List stops and returns it.
|
|
func (b *Backend) List(ctx context.Context, t restic.FileType, fn func(restic.FileInfo) error) (err error) {
|
|
cn, err := b.getConnection(ctx, b.ShareName)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer b.putConnection(cn)
|
|
|
|
basedir, subdirs := b.Basedir(t)
|
|
if subdirs {
|
|
err = b.visitDirs(ctx, cn, basedir, fn)
|
|
} else {
|
|
err = b.visitFiles(ctx, cn, basedir, fn, false)
|
|
}
|
|
|
|
if b.IsNotExist(err) {
|
|
debug.Log("ignoring non-existing directory")
|
|
return nil
|
|
}
|
|
|
|
return err
|
|
}
|
|
|
|
// The following two functions are like filepath.Walk, but visit only one or
|
|
// two levels of directory structure (including dir itself as the first level).
|
|
// Also, visitDirs assumes it sees a directory full of directories, while
|
|
// visitFiles wants a directory full or regular files.
|
|
func (b *Backend) visitDirs(ctx context.Context, cn *conn, dir string, fn func(restic.FileInfo) error) error {
|
|
d, err := cn.smbShare.Open(dir)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
sub, err := d.Readdirnames(-1)
|
|
if err != nil {
|
|
// ignore subsequent errors
|
|
_ = d.Close()
|
|
return err
|
|
}
|
|
|
|
err = d.Close()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
for _, f := range sub {
|
|
err = b.visitFiles(ctx, cn, filepath.Join(dir, f), fn, true)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return ctx.Err()
|
|
}
|
|
|
|
func (b *Backend) visitFiles(ctx context.Context, cn *conn, dir string, fn func(restic.FileInfo) error, ignoreNotADirectory bool) error {
|
|
d, err := cn.smbShare.Open(dir)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if ignoreNotADirectory {
|
|
fi, err := d.Stat()
|
|
if err != nil || !fi.IsDir() {
|
|
// ignore subsequent errors
|
|
_ = d.Close()
|
|
return err
|
|
}
|
|
}
|
|
|
|
sub, err := d.Readdir(-1)
|
|
if err != nil {
|
|
// ignore subsequent errors
|
|
_ = d.Close()
|
|
return err
|
|
}
|
|
|
|
err = d.Close()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
for _, fi := range sub {
|
|
select {
|
|
case <-ctx.Done():
|
|
return ctx.Err()
|
|
default:
|
|
}
|
|
|
|
err := fn(restic.FileInfo{
|
|
Name: fi.Name(),
|
|
Size: fi.Size(),
|
|
})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Delete removes the repository and all files.
|
|
func (b *Backend) Delete(ctx context.Context) error {
|
|
cn, err := b.getConnection(ctx, b.ShareName)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer b.putConnection(cn)
|
|
return cn.smbShare.RemoveAll(b.Location())
|
|
}
|
|
|
|
// Close closes all open files.
|
|
func (b *Backend) Close() error {
|
|
err := b.drainPool()
|
|
return err
|
|
}
|
|
|
|
// tempSuffix generates a random string suffix that should be sufficiently long
|
|
// to avoid accidental conflicts.
|
|
func tempSuffix() string {
|
|
var nonce [16]byte
|
|
_, err := rand.Read(nonce[:])
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
return hex.EncodeToString(nonce[:])
|
|
}
|