mirror of
https://github.com/cupcakearmy/autorestic.git
synced 2026-04-10 23:57:08 +00:00
Compare commits
3 Commits
ai-testing
...
4b7de2c221
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
4b7de2c221 | ||
|
|
51a8298f2a | ||
|
|
f6aa45fd6c |
23
.github/workflows/build.yml
vendored
23
.github/workflows/build.yml
vendored
@@ -1,19 +1,21 @@
|
||||
name: Release
|
||||
name: Main
|
||||
|
||||
on:
|
||||
push:
|
||||
tags:
|
||||
- "v*.*.*"
|
||||
- 'v*.*.*'
|
||||
|
||||
jobs:
|
||||
docker:
|
||||
runs-on: ubuntu-latest
|
||||
steps:
|
||||
- uses: docker/setup-qemu-action@v4
|
||||
- uses: docker/setup-buildx-action@v4
|
||||
- name: Set up QEMU
|
||||
uses: docker/setup-qemu-action@v2
|
||||
- name: Set up Docker Buildx
|
||||
uses: docker/setup-buildx-action@v2
|
||||
- name: Docker Labels
|
||||
id: meta
|
||||
uses: docker/metadata-action@v6
|
||||
uses: crazy-max/ghaction-docker-meta@v4
|
||||
with:
|
||||
images: cupcakearmy/autorestic
|
||||
tags: |
|
||||
@@ -21,12 +23,12 @@ jobs:
|
||||
type=semver,pattern={{major}}.{{minor}}
|
||||
type=semver,pattern={{major}}
|
||||
- name: Login to DockerHub
|
||||
uses: docker/login-action@v4
|
||||
uses: docker/login-action@v2
|
||||
with:
|
||||
username: ${{ secrets.DOCKERHUB_USERNAME }}
|
||||
password: ${{ secrets.DOCKERHUB_TOKEN }}
|
||||
- name: Build and push
|
||||
uses: docker/build-push-action@v6
|
||||
uses: docker/build-push-action@v3
|
||||
with:
|
||||
platforms: linux/amd64,linux/arm64
|
||||
push: true
|
||||
@@ -35,9 +37,10 @@ jobs:
|
||||
release:
|
||||
runs-on: ubuntu-latest
|
||||
steps:
|
||||
- uses: actions/checkout@v6
|
||||
- uses: jdx/mise-action@v3
|
||||
- run: mise run build
|
||||
- uses: actions/checkout@v3
|
||||
- uses: actions/setup-go@v3
|
||||
with:
|
||||
go-version: '^1.21'
|
||||
- name: Build
|
||||
run: go run build/build.go
|
||||
- name: Release
|
||||
|
||||
27
.github/workflows/ci.yml
vendored
27
.github/workflows/ci.yml
vendored
@@ -2,28 +2,23 @@ name: CI
|
||||
on:
|
||||
pull_request:
|
||||
push:
|
||||
branches:
|
||||
- main
|
||||
- master
|
||||
|
||||
concurrency:
|
||||
group: ${{ github.workflow }}-${{ github.ref }}
|
||||
cancel-in-progress: true
|
||||
|
||||
env:
|
||||
MISE_EXPERIMENTAL: true
|
||||
branches: [master]
|
||||
|
||||
jobs:
|
||||
test:
|
||||
runs-on: ubuntu-latest
|
||||
steps:
|
||||
- uses: actions/checkout@v6
|
||||
- uses: jdx/mise-action@v3
|
||||
- run: mise run test
|
||||
- uses: actions/checkout@v3
|
||||
- uses: actions/setup-go@v3
|
||||
with:
|
||||
go-version: '^1.21'
|
||||
- run: go test -v ./...
|
||||
|
||||
build:
|
||||
runs-on: ubuntu-latest
|
||||
steps:
|
||||
- uses: actions/checkout@v6
|
||||
- uses: jdx/mise-action@v3
|
||||
- run: mise run build
|
||||
- uses: actions/checkout@v3
|
||||
- uses: actions/setup-go@v3
|
||||
with:
|
||||
go-version: '^1.21'
|
||||
- run: go build -v .
|
||||
|
||||
3
.gitignore
vendored
3
.gitignore
vendored
@@ -9,5 +9,4 @@
|
||||
test
|
||||
autorestic
|
||||
data
|
||||
dist
|
||||
coverage*
|
||||
dist
|
||||
@@ -1,4 +1,4 @@
|
||||
FROM golang:1.25-alpine as builder
|
||||
FROM golang:1.23-alpine as builder
|
||||
|
||||
WORKDIR /app
|
||||
COPY go.* .
|
||||
@@ -6,7 +6,7 @@ RUN go mod download
|
||||
COPY . .
|
||||
RUN go build
|
||||
|
||||
FROM restic/restic:0.17.3
|
||||
FROM restic/restic:0.17.1
|
||||
RUN apk add --no-cache rclone bash curl docker-cli
|
||||
COPY --from=builder /app/autorestic /usr/bin/autorestic
|
||||
ENTRYPOINT []
|
||||
|
||||
@@ -18,11 +18,9 @@ var backupCmd = &cobra.Command{
|
||||
err := lock.Lock()
|
||||
CheckErr(err)
|
||||
defer lock.Unlock()
|
||||
dry, _ := cmd.Flags().GetBool("dry-run")
|
||||
|
||||
selected, err := internal.GetAllOrSelected(cmd, false)
|
||||
CheckErr(err)
|
||||
|
||||
errors := 0
|
||||
for _, name := range selected {
|
||||
var splitted = strings.Split(name, "@")
|
||||
@@ -31,7 +29,7 @@ var backupCmd = &cobra.Command{
|
||||
specificBackend = splitted[1]
|
||||
}
|
||||
location, _ := internal.GetLocation(splitted[0])
|
||||
errs := location.Backup(false, dry, specificBackend)
|
||||
errs := location.Backup(false, specificBackend)
|
||||
for _, err := range errs {
|
||||
colors.Error.Printf("%s\n\n", err)
|
||||
errors++
|
||||
@@ -46,5 +44,4 @@ var backupCmd = &cobra.Command{
|
||||
func init() {
|
||||
rootCmd.AddCommand(backupCmd)
|
||||
internal.AddFlagsToCommand(backupCmd, false)
|
||||
backupCmd.Flags().Bool("dry-run", false, "do not write changes, show what would be affected")
|
||||
}
|
||||
|
||||
@@ -42,6 +42,7 @@ func init() {
|
||||
rootCmd.PersistentFlags().BoolVarP(&flags.VERBOSE, "verbose", "v", false, "verbose mode")
|
||||
rootCmd.PersistentFlags().StringVar(&flags.RESTIC_BIN, "restic-bin", "restic", "specify custom restic binary")
|
||||
rootCmd.PersistentFlags().StringVar(&flags.DOCKER_IMAGE, "docker-image", "cupcakearmy/autorestic:"+internal.VERSION, "specify a custom docker image")
|
||||
rootCmd.PersistentFlags().StringVar(&flags.LOCKFILE_PATH, "lockfile-path", "", "specify a custom path for the lockfile (defaults to .autorestic.lock.yml next to the loaded autorestic config file)")
|
||||
cobra.OnInitialize(initConfig)
|
||||
}
|
||||
|
||||
|
||||
@@ -1 +1 @@
|
||||
v24
|
||||
v22.7.0
|
||||
|
||||
@@ -1,2 +0,0 @@
|
||||
[settings]
|
||||
idiomatic_version_file_enable_tools = ["node", "pnpm"]
|
||||
@@ -5,11 +5,11 @@
|
||||
"start": "NEXT_TELEMETRY_DISABLED=1 next start"
|
||||
},
|
||||
"dependencies": {
|
||||
"next": "^14.2.35",
|
||||
"next": "^14.2.7",
|
||||
"nextra": "^2.13.4",
|
||||
"nextra-theme-docs": "^2.13.4",
|
||||
"react": "^18.3.1",
|
||||
"react-dom": "^18.3.1"
|
||||
},
|
||||
"packageManager": "pnpm@10.33.0"
|
||||
"packageManager": "pnpm@9.9.0"
|
||||
}
|
||||
|
||||
@@ -1,14 +1,11 @@
|
||||
# Backup
|
||||
|
||||
```bash
|
||||
autorestic backup [-l, --location] [-a, --all] [--dry-run]
|
||||
autorestic backup [-l, --location] [-a, --all]
|
||||
```
|
||||
|
||||
Performs a backup of all locations if the `-a` flag is passed. To only backup some locations pass one or more `-l` or `--location` flags.
|
||||
|
||||
The `--dry-run` flag will do a dry run showing what would have been deleted, but won't touch the actual data.
|
||||
|
||||
|
||||
```bash
|
||||
# All
|
||||
autorestic backup -a
|
||||
|
||||
@@ -34,3 +34,11 @@ With `--restic-bin` you can specify to run a specific restic binary. This can be
|
||||
```bash
|
||||
autorestic --restic-bin /some/path/to/my/custom/restic/binary
|
||||
```
|
||||
|
||||
## `--lockfile-path`
|
||||
|
||||
Specify the path for the lockfile used by `autorestic`. If omitted, this will default to `.autorestic.lock.yml` next to the loaded config file.
|
||||
|
||||
```bash
|
||||
autorestic --lockfile-path /path/to/my/.autorestic.lock.yml
|
||||
```
|
||||
|
||||
970
docs/pnpm-lock.yaml
generated
970
docs/pnpm-lock.yaml
generated
File diff suppressed because it is too large
Load Diff
2
go.mod
2
go.mod
@@ -1,6 +1,6 @@
|
||||
module github.com/cupcakearmy/autorestic
|
||||
|
||||
go 1.26.1
|
||||
go 1.21
|
||||
|
||||
require (
|
||||
github.com/blang/semver/v4 v4.0.0
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
#!/bin/bash
|
||||
set -e -o pipefail
|
||||
|
||||
shopt -s nocaseglob
|
||||
|
||||
OUT_FILE=/usr/local/bin/autorestic
|
||||
|
||||
@@ -14,19 +14,19 @@ import (
|
||||
)
|
||||
|
||||
type BackendRest struct {
|
||||
User string `mapstructure:"user,omitempty" yaml:"user,omitempty"`
|
||||
Password string `mapstructure:"password,omitempty" yaml:"password,omitempty"`
|
||||
User string `mapstructure:"user,omitempty"`
|
||||
Password string `mapstructure:"password,omitempty"`
|
||||
}
|
||||
|
||||
type Backend struct {
|
||||
name string
|
||||
Type string `mapstructure:"type,omitempty" yaml:"type,omitempty"`
|
||||
Path string `mapstructure:"path,omitempty" yaml:"path,omitempty"`
|
||||
Key string `mapstructure:"key,omitempty" yaml:"key,omitempty"`
|
||||
RequireKey bool `mapstructure:"requireKey,omitempty" yaml:"requireKey,omitempty"`
|
||||
Env map[string]string `mapstructure:"env,omitempty" yaml:"env,omitempty"`
|
||||
Rest BackendRest `mapstructure:"rest,omitempty" yaml:"rest,omitempty"`
|
||||
Options Options `mapstructure:"options,omitempty" yaml:"options,omitempty"`
|
||||
Type string `mapstructure:"type,omitempty"`
|
||||
Path string `mapstructure:"path,omitempty"`
|
||||
Key string `mapstructure:"key,omitempty"`
|
||||
RequireKey bool `mapstructure:"requireKey,omitempty"`
|
||||
Env map[string]string `mapstructure:"env,omitempty"`
|
||||
Rest BackendRest `mapstructure:"rest,omitempty"`
|
||||
Options Options `mapstructure:"options,omitempty"`
|
||||
}
|
||||
|
||||
func GetBackend(name string) (Backend, bool) {
|
||||
|
||||
@@ -23,11 +23,11 @@ type OptionMap map[string][]interface{}
|
||||
type Options map[string]OptionMap
|
||||
|
||||
type Config struct {
|
||||
Version string `mapstructure:"version" yaml:"version"`
|
||||
Extras interface{} `mapstructure:"extras" yaml:"extras"`
|
||||
Locations map[string]Location `mapstructure:"locations" yaml:"locations"`
|
||||
Backends map[string]Backend `mapstructure:"backends" yaml:"backends"`
|
||||
Global Options `mapstructure:"global" yaml:"global"`
|
||||
Version string `mapstructure:"version"`
|
||||
Extras interface{} `mapstructure:"extras"`
|
||||
Locations map[string]Location `mapstructure:"locations"`
|
||||
Backends map[string]Backend `mapstructure:"backends"`
|
||||
Global Options `mapstructure:"global"`
|
||||
}
|
||||
|
||||
var once sync.Once
|
||||
@@ -188,34 +188,18 @@ func CheckConfig() error {
|
||||
if !CheckIfResticIsCallable() {
|
||||
return fmt.Errorf(`%s was not found. Install either with "autorestic install" or manually`, flags.RESTIC_BIN)
|
||||
}
|
||||
|
||||
cwd, _ := GetPathRelativeToConfig(".")
|
||||
for name, location := range c.Locations {
|
||||
location.name = name
|
||||
|
||||
// Hooks before location validation
|
||||
options := ExecuteOptions{
|
||||
Command: "bash",
|
||||
Dir: cwd,
|
||||
Envs: map[string]string{
|
||||
"AUTORESTIC_LOCATION": location.name,
|
||||
},
|
||||
}
|
||||
if err := location.ExecuteHooks(location.Hooks.PreValidate, options); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if err := location.validate(); err != nil {
|
||||
return err
|
||||
}
|
||||
}
|
||||
|
||||
for name, backend := range c.Backends {
|
||||
backend.name = name
|
||||
if err := backend.validate(); err != nil {
|
||||
return err
|
||||
}
|
||||
}
|
||||
for name, location := range c.Locations {
|
||||
location.name = name
|
||||
if err := location.validate(); err != nil {
|
||||
return err
|
||||
}
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
|
||||
@@ -1,15 +1,10 @@
|
||||
package internal
|
||||
|
||||
import (
|
||||
"path"
|
||||
"reflect"
|
||||
"strconv"
|
||||
"strings"
|
||||
"sync"
|
||||
"testing"
|
||||
|
||||
"github.com/spf13/viper"
|
||||
"github.com/stretchr/testify/assert"
|
||||
)
|
||||
|
||||
func TestOptionToString(t *testing.T) {
|
||||
@@ -148,48 +143,6 @@ func TestGetOptionsMultipleKeys(t *testing.T) {
|
||||
reflect.DeepEqual(result, expected)
|
||||
}
|
||||
|
||||
func TestSaveConfigProducesReadableConfig(t *testing.T) {
|
||||
workDir := t.TempDir()
|
||||
viper.SetConfigFile(path.Join(workDir, ".autorestic.yml"))
|
||||
|
||||
// Required to appease the config reader
|
||||
viper.Set("version", 2)
|
||||
|
||||
c := Config{
|
||||
Version: "2",
|
||||
Locations: map[string]Location{
|
||||
"test": {
|
||||
Type: "local",
|
||||
name: "test",
|
||||
From: []string{"in-dir"},
|
||||
To: []string{"test"},
|
||||
// ForgetOption & ConfigOption have previously marshalled in a way that
|
||||
// can't get read correctly
|
||||
ForgetOption: "foo",
|
||||
CopyOption: map[string][]string{"foo": {"bar"}},
|
||||
},
|
||||
},
|
||||
Backends: map[string]Backend{
|
||||
"test": {
|
||||
name: "test",
|
||||
Type: "local",
|
||||
Path: "backup-target",
|
||||
Key: "supersecret",
|
||||
},
|
||||
},
|
||||
}
|
||||
|
||||
err := c.SaveConfig()
|
||||
assert.NoError(t, err)
|
||||
|
||||
// Ensure we the config reading logic actually runs
|
||||
config = nil
|
||||
once = sync.Once{}
|
||||
readConfig := GetConfig()
|
||||
assert.NotNil(t, readConfig)
|
||||
assert.Equal(t, c, *readConfig)
|
||||
}
|
||||
|
||||
func assertEqual[T comparable](t testing.TB, result, expected T) {
|
||||
t.Helper()
|
||||
|
||||
|
||||
@@ -1,9 +1,10 @@
|
||||
package flags
|
||||
|
||||
var (
|
||||
CI bool = false
|
||||
VERBOSE bool = false
|
||||
CRON_LEAN bool = false
|
||||
RESTIC_BIN string
|
||||
DOCKER_IMAGE string
|
||||
CI bool = false
|
||||
VERBOSE bool = false
|
||||
CRON_LEAN bool = false
|
||||
RESTIC_BIN string
|
||||
DOCKER_IMAGE string
|
||||
LOCKFILE_PATH string
|
||||
)
|
||||
|
||||
@@ -34,26 +34,26 @@ const (
|
||||
)
|
||||
|
||||
type Hooks struct {
|
||||
Dir string `mapstructure:"dir" yaml:"dir"`
|
||||
PreValidate HookArray `mapstructure:"prevalidate,omitempty" yaml:"prevalidate,omitempty"`
|
||||
Before HookArray `mapstructure:"before,omitempty" yaml:"before,omitempty"`
|
||||
After HookArray `mapstructure:"after,omitempty" yaml:"after,omitempty"`
|
||||
Success HookArray `mapstructure:"success,omitempty" yaml:"success,omitempty"`
|
||||
Failure HookArray `mapstructure:"failure,omitempty" yaml:"failure,omitempty"`
|
||||
Dir string `mapstructure:"dir"`
|
||||
PreValidate HookArray `mapstructure:"prevalidate,omitempty"`
|
||||
Before HookArray `mapstructure:"before,omitempty"`
|
||||
After HookArray `mapstructure:"after,omitempty"`
|
||||
Success HookArray `mapstructure:"success,omitempty"`
|
||||
Failure HookArray `mapstructure:"failure,omitempty"`
|
||||
}
|
||||
|
||||
type LocationCopy = map[string][]string
|
||||
|
||||
type Location struct {
|
||||
name string `mapstructure:",omitempty" yaml:",omitempty"`
|
||||
From []string `mapstructure:"from,omitempty" yaml:"from,omitempty"`
|
||||
Type string `mapstructure:"type,omitempty" yaml:"type,omitempty"`
|
||||
To []string `mapstructure:"to,omitempty" yaml:"to,omitempty"`
|
||||
Hooks Hooks `mapstructure:"hooks,omitempty" yaml:"hooks,omitempty"`
|
||||
Cron string `mapstructure:"cron,omitempty" yaml:"cron,omitempty"`
|
||||
Options Options `mapstructure:"options,omitempty" yaml:"options,omitempty"`
|
||||
ForgetOption LocationForgetOption `mapstructure:"forget,omitempty" yaml:"forget,omitempty"`
|
||||
CopyOption LocationCopy `mapstructure:"copy,omitempty" yaml:"copy,omitempty"`
|
||||
name string `mapstructure:",omitempty"`
|
||||
From []string `mapstructure:"from,omitempty"`
|
||||
Type string `mapstructure:"type,omitempty"`
|
||||
To []string `mapstructure:"to,omitempty"`
|
||||
Hooks Hooks `mapstructure:"hooks,omitempty"`
|
||||
Cron string `mapstructure:"cron,omitempty"`
|
||||
Options Options `mapstructure:"options,omitempty"`
|
||||
ForgetOption LocationForgetOption `mapstructure:"forget,omitempty"`
|
||||
CopyOption LocationCopy `mapstructure:"copy,omitempty"`
|
||||
}
|
||||
|
||||
func GetLocation(name string) (Location, bool) {
|
||||
@@ -168,7 +168,7 @@ func (l Location) getLocationTags() string {
|
||||
return buildTag("location", l.name)
|
||||
}
|
||||
|
||||
func (l Location) Backup(cron bool, dry bool, specificBackend string) []error {
|
||||
func (l Location) Backup(cron bool, specificBackend string) []error {
|
||||
var errors []error
|
||||
var backends []string
|
||||
colors.PrimaryPrint(" Backing up location \"%s\" ", l.name)
|
||||
@@ -228,9 +228,6 @@ func (l Location) Backup(cron bool, dry bool, specificBackend string) []error {
|
||||
if cron {
|
||||
cmd = append(cmd, "--tag", buildTag("cron"))
|
||||
}
|
||||
if dry {
|
||||
cmd = append(cmd, "--dry-run")
|
||||
}
|
||||
cmd = append(cmd, "--tag", l.getLocationTags())
|
||||
backupOptions := ExecuteOptions{
|
||||
Envs: env,
|
||||
@@ -450,7 +447,7 @@ func (l Location) RunCron() error {
|
||||
now := time.Now()
|
||||
if now.After(next) {
|
||||
lock.SetCron(l.name, now.Unix())
|
||||
errs := l.Backup(true, false, "")
|
||||
errs := l.Backup(true, "")
|
||||
if len(errs) > 0 {
|
||||
return fmt.Errorf("Failed to backup location \"%s\":\n%w", l.name, errors.Join(errs...))
|
||||
}
|
||||
|
||||
@@ -1,14 +1,6 @@
|
||||
package internal
|
||||
|
||||
import (
|
||||
"os"
|
||||
"path"
|
||||
"sync"
|
||||
"testing"
|
||||
|
||||
"github.com/spf13/viper"
|
||||
"github.com/stretchr/testify/assert"
|
||||
)
|
||||
import "testing"
|
||||
|
||||
func TestGetType(t *testing.T) {
|
||||
|
||||
@@ -99,46 +91,3 @@ func TestBuildRestoreCommand(t *testing.T) {
|
||||
expected := []string{"restore", "--target", "to", "--tag", "ar:location:foo", "snapshot", "options"}
|
||||
assertSliceEqual(t, result, expected)
|
||||
}
|
||||
|
||||
func TestLocationBackupWithMock(t *testing.T) {
|
||||
// Backup original
|
||||
originalExecutor := DefaultExecutor
|
||||
defer func() { DefaultExecutor = originalExecutor }()
|
||||
|
||||
// Inject mock
|
||||
mock := &MockExecutor{
|
||||
ExecuteResticFunc: func(options ExecuteOptions, args ...string) (int, string, error) {
|
||||
assert.Equal(t, "backup", args[0])
|
||||
return 0, "success", nil
|
||||
},
|
||||
}
|
||||
DefaultExecutor = mock
|
||||
|
||||
// Setup dummy config
|
||||
workDir := t.TempDir()
|
||||
configFile := path.Join(workDir, ".autorestic.yml")
|
||||
err := os.WriteFile(configFile, []byte("version: 2"), 0644)
|
||||
assert.NoError(t, err)
|
||||
|
||||
viper.Reset()
|
||||
viper.SetConfigFile(configFile)
|
||||
viper.Set("version", 2)
|
||||
// Register test-backend
|
||||
viper.Set("backends.test-backend.type", "local")
|
||||
viper.Set("backends.test-backend.path", workDir)
|
||||
|
||||
config = nil
|
||||
once = sync.Once{}
|
||||
|
||||
loc := Location{
|
||||
name: "test-location",
|
||||
To: []string{"test-backend"},
|
||||
From: []string{"/"},
|
||||
Type: "local",
|
||||
}
|
||||
|
||||
errs := loc.Backup(false, false, "")
|
||||
if len(errs) != 0 {
|
||||
t.Errorf("expected no error, got %v", errs)
|
||||
}
|
||||
}
|
||||
|
||||
@@ -18,18 +18,28 @@ const (
|
||||
RUNNING = "running"
|
||||
)
|
||||
|
||||
// getLockfilePath returns the path to the lockfile. If flags.LOCKFILE_PATH is
|
||||
// set, its value is used, otherwise the path is generated relative to the
|
||||
// config file.
|
||||
func getLockfilePath() string {
|
||||
if flags.LOCKFILE_PATH != "" {
|
||||
return flags.LOCKFILE_PATH
|
||||
} else {
|
||||
p := viper.ConfigFileUsed()
|
||||
if p == "" {
|
||||
colors.Error.Println("cannot lock before reading config location")
|
||||
os.Exit(1)
|
||||
}
|
||||
return path.Join(path.Dir(p), ".autorestic.lock.yml")
|
||||
}
|
||||
}
|
||||
|
||||
func getLock() *viper.Viper {
|
||||
if lock == nil {
|
||||
|
||||
once.Do(func() {
|
||||
lock = viper.New()
|
||||
lock.SetDefault("running", false)
|
||||
p := viper.ConfigFileUsed()
|
||||
if p == "" {
|
||||
colors.Error.Println("cannot lock before reading config location")
|
||||
os.Exit(1)
|
||||
}
|
||||
file = path.Join(path.Dir(p), ".autorestic.lock.yml")
|
||||
file = getLockfilePath()
|
||||
if !flags.CRON_LEAN {
|
||||
colors.Faint.Println("Using lock:\t", file)
|
||||
}
|
||||
|
||||
@@ -7,6 +7,7 @@ import (
|
||||
"strconv"
|
||||
"testing"
|
||||
|
||||
"github.com/cupcakearmy/autorestic/internal/flags"
|
||||
"github.com/spf13/viper"
|
||||
)
|
||||
|
||||
@@ -28,6 +29,37 @@ func setup(t *testing.T) {
|
||||
})
|
||||
}
|
||||
|
||||
func TestGetLockfilePath(t *testing.T) {
|
||||
t.Run("when flags.LOCKFILE_PATH is set", func(t *testing.T) {
|
||||
flags.LOCKFILE_PATH = "/path/to/my/autorestic.lock.yml"
|
||||
defer func() { flags.LOCKFILE_PATH = "" }()
|
||||
|
||||
p := getLockfilePath()
|
||||
|
||||
if p != "/path/to/my/autorestic.lock.yml" {
|
||||
t.Errorf("got %v, want %v", p, "/path/to/my/autorestic.lock.yml")
|
||||
}
|
||||
})
|
||||
|
||||
t.Run("when flags.LOCKFILE_PATH is set", func(t *testing.T) {
|
||||
d, err := os.MkdirTemp("", testDirectory)
|
||||
if err != nil {
|
||||
log.Fatalf("error creating temp dir: %v", err)
|
||||
return
|
||||
}
|
||||
viper.SetConfigFile(d + "/.autorestic.yml")
|
||||
defer viper.Reset()
|
||||
|
||||
flags.LOCKFILE_PATH = ""
|
||||
|
||||
p := getLockfilePath()
|
||||
|
||||
if p != d+"/.autorestic.lock.yml" {
|
||||
t.Errorf("got %v, want %v", p, d+"/.autorestic.lock.yml")
|
||||
}
|
||||
})
|
||||
}
|
||||
|
||||
func TestLock(t *testing.T) {
|
||||
setup(t)
|
||||
|
||||
|
||||
@@ -1,20 +0,0 @@
|
||||
package internal
|
||||
|
||||
type MockExecutor struct {
|
||||
ExecuteFunc func(options ExecuteOptions, args ...string) (int, string, error)
|
||||
ExecuteResticFunc func(options ExecuteOptions, args ...string) (int, string, error)
|
||||
}
|
||||
|
||||
func (m *MockExecutor) Execute(options ExecuteOptions, args ...string) (int, string, error) {
|
||||
if m.ExecuteFunc != nil {
|
||||
return m.ExecuteFunc(options, args...)
|
||||
}
|
||||
return 0, "", nil
|
||||
}
|
||||
|
||||
func (m *MockExecutor) ExecuteRestic(options ExecuteOptions, args ...string) (int, string, error) {
|
||||
if m.ExecuteResticFunc != nil {
|
||||
return m.ExecuteResticFunc(options, args...)
|
||||
}
|
||||
return 0, "", nil
|
||||
}
|
||||
@@ -39,14 +39,7 @@ func (w ColoredWriter) Write(p []byte) (n int, err error) {
|
||||
return len(p), nil
|
||||
}
|
||||
|
||||
type Executor interface {
|
||||
Execute(options ExecuteOptions, args ...string) (int, string, error)
|
||||
ExecuteRestic(options ExecuteOptions, args ...string) (int, string, error)
|
||||
}
|
||||
|
||||
type RealExecutor struct{}
|
||||
|
||||
func (e *RealExecutor) Execute(options ExecuteOptions, args ...string) (int, string, error) {
|
||||
func ExecuteCommand(options ExecuteOptions, args ...string) (int, string, error) {
|
||||
cmd := exec.Command(options.Command, args...)
|
||||
env := os.Environ()
|
||||
for k, v := range options.Envs {
|
||||
@@ -83,22 +76,12 @@ func (e *RealExecutor) Execute(options ExecuteOptions, args ...string) (int, str
|
||||
return 0, out.String(), nil
|
||||
}
|
||||
|
||||
func (e *RealExecutor) ExecuteRestic(options ExecuteOptions, args ...string) (int, string, error) {
|
||||
func ExecuteResticCommand(options ExecuteOptions, args ...string) (int, string, error) {
|
||||
options.Command = flags.RESTIC_BIN
|
||||
var c = GetConfig()
|
||||
var optionsAsString = getOptions(c.Global, []string{"all"})
|
||||
args = append(optionsAsString, args...)
|
||||
return e.Execute(options, args...)
|
||||
}
|
||||
|
||||
var DefaultExecutor Executor = &RealExecutor{}
|
||||
|
||||
func ExecuteCommand(options ExecuteOptions, args ...string) (int, string, error) {
|
||||
return DefaultExecutor.Execute(options, args...)
|
||||
}
|
||||
|
||||
func ExecuteResticCommand(options ExecuteOptions, args ...string) (int, string, error) {
|
||||
return DefaultExecutor.ExecuteRestic(options, args...)
|
||||
return ExecuteCommand(options, args...)
|
||||
}
|
||||
|
||||
func CopyFile(from, to string) error {
|
||||
|
||||
@@ -1,27 +0,0 @@
|
||||
package internal
|
||||
|
||||
import (
|
||||
"github.com/stretchr/testify/assert"
|
||||
"testing"
|
||||
)
|
||||
|
||||
func TestExecuteCommandWithMock(t *testing.T) {
|
||||
// Backup original
|
||||
originalExecutor := DefaultExecutor
|
||||
defer func() { DefaultExecutor = originalExecutor }()
|
||||
|
||||
// Inject mock
|
||||
mock := &MockExecutor{
|
||||
ExecuteFunc: func(options ExecuteOptions, args ...string) (int, string, error) {
|
||||
assert.Equal(t, "docker", options.Command)
|
||||
return 0, "mock output", nil
|
||||
},
|
||||
}
|
||||
DefaultExecutor = mock
|
||||
|
||||
code, out, err := ExecuteCommand(ExecuteOptions{Command: "docker"}, "info")
|
||||
|
||||
assert.NoError(t, err)
|
||||
assert.Equal(t, 0, code)
|
||||
assert.Equal(t, "mock output", out)
|
||||
}
|
||||
14
mise.toml
14
mise.toml
@@ -1,14 +0,0 @@
|
||||
[tools]
|
||||
go = "latest"
|
||||
restic = "latest"
|
||||
|
||||
[tasks]
|
||||
build = { description = "Build the project", run = "go build -v ." }
|
||||
|
||||
test = { description = "Run tests", run = "go test -v ./..." }
|
||||
|
||||
coverage = { description = "Generate coverage report", run = "go test -coverprofile=coverage.out ./... && go tool cover -func=coverage.out && go tool cover -html=coverage.out -o coverage.html", depends = [
|
||||
"test"
|
||||
] }
|
||||
|
||||
clean = { run = "rm -f coverage.*", description = "Clean up coverage files" }
|
||||
@@ -1,280 +0,0 @@
|
||||
package integration_test
|
||||
|
||||
import (
|
||||
"os"
|
||||
"os/exec"
|
||||
"path/filepath"
|
||||
"testing"
|
||||
|
||||
"github.com/stretchr/testify/assert"
|
||||
)
|
||||
|
||||
func runAutorestic(t *testing.T, dir string, configPath string, args ...string) string {
|
||||
// Find project root dynamically
|
||||
wd, err := os.Getwd()
|
||||
assert.NoError(t, err)
|
||||
root := filepath.Dir(wd)
|
||||
|
||||
mainGo := filepath.Join(root, "main.go")
|
||||
|
||||
// Get restic path from mise
|
||||
resticPath := "/Users/cupcakearmy/.local/share/mise/installs/restic/0.18.1/restic"
|
||||
|
||||
// Convert configPath to absolute path
|
||||
absConfigPath, err := filepath.Abs(configPath)
|
||||
assert.NoError(t, err)
|
||||
|
||||
cmd := exec.Command("go", append([]string{"run", mainGo, "--restic-bin", resticPath, "-c", absConfigPath}, args...)...)
|
||||
|
||||
// Run from root to find go.mod
|
||||
cmd.Dir = root
|
||||
|
||||
// Add mise path to environment and set dummy password
|
||||
cmd.Env = os.Environ()
|
||||
cmd.Env = append(cmd.Env, "PATH="+os.Getenv("PATH"))
|
||||
cmd.Env = append(cmd.Env, "RESTIC_PASSWORD=password")
|
||||
|
||||
output, err := cmd.CombinedOutput()
|
||||
// NOTE: We don't assert NoError here because tests might expect failures
|
||||
return string(output)
|
||||
}
|
||||
|
||||
func initRepo(t *testing.T, repoPath string) {
|
||||
resticPath := "/Users/cupcakearmy/.local/share/mise/installs/restic/0.18.1/restic"
|
||||
cmd := exec.Command(resticPath, "-r", repoPath, "init")
|
||||
cmd.Env = append(os.Environ(), "RESTIC_PASSWORD=password")
|
||||
output, err := cmd.CombinedOutput()
|
||||
assert.NoError(t, err, string(output))
|
||||
}
|
||||
|
||||
func TestAutoresticCheck(t *testing.T) {
|
||||
tempDir := t.TempDir()
|
||||
|
||||
configContent := `
|
||||
version: 2
|
||||
locations:
|
||||
my-data:
|
||||
from: ` + tempDir + `
|
||||
to: local
|
||||
backends:
|
||||
local:
|
||||
type: local
|
||||
path: ` + filepath.Join(tempDir, "repo") + `
|
||||
key: password
|
||||
`
|
||||
configPath := filepath.Join(tempDir, "autorestic.yml")
|
||||
err := os.WriteFile(configPath, []byte(configContent), 0644)
|
||||
assert.NoError(t, err)
|
||||
|
||||
_ = runAutorestic(t, tempDir, configPath, "check")
|
||||
}
|
||||
|
||||
func TestBackupRestore(t *testing.T) {
|
||||
tempDir := t.TempDir()
|
||||
|
||||
// 1. Create a source file
|
||||
sourceFile := "source.txt"
|
||||
err := os.WriteFile(filepath.Join(tempDir, sourceFile), []byte("hello world"), 0644)
|
||||
assert.NoError(t, err)
|
||||
|
||||
repoPath := filepath.Join(tempDir, "repo")
|
||||
initRepo(t, repoPath)
|
||||
|
||||
configContent := `
|
||||
version: 2
|
||||
locations:
|
||||
my-data:
|
||||
from:
|
||||
- ` + sourceFile + `
|
||||
to: local
|
||||
backends:
|
||||
local:
|
||||
type: local
|
||||
path: ` + repoPath + `
|
||||
key: password
|
||||
`
|
||||
configPath := filepath.Join(tempDir, "autorestic.yml")
|
||||
err = os.WriteFile(configPath, []byte(configContent), 0644)
|
||||
assert.NoError(t, err)
|
||||
|
||||
// 2. Backup
|
||||
output := runAutorestic(t, tempDir, configPath, "backup", "-l", "my-data")
|
||||
assert.Contains(t, output, "Done")
|
||||
|
||||
// 3. Restore
|
||||
restoreDir := filepath.Join(tempDir, "restore")
|
||||
err = os.MkdirAll(restoreDir, 0755)
|
||||
assert.NoError(t, err)
|
||||
output = runAutorestic(t, tempDir, configPath, "restore", "-l", "my-data", "--to", restoreDir)
|
||||
t.Logf("Restore output: %s", output)
|
||||
|
||||
// DEBUG: List files in restoreDir and subdirectories
|
||||
err = filepath.Walk(restoreDir, func(path string, info os.FileInfo, err error) error {
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
t.Logf("Found: %s", path)
|
||||
return nil
|
||||
})
|
||||
assert.NoError(t, err)
|
||||
|
||||
// 4. Verify
|
||||
// It might be nested depending on how it was backed up
|
||||
// Let's look for source.txt in any subdirectory
|
||||
var restoredFile string
|
||||
err = filepath.Walk(restoreDir, func(path string, info os.FileInfo, err error) error {
|
||||
if !info.IsDir() && info.Name() == "source.txt" {
|
||||
restoredFile = path
|
||||
}
|
||||
return nil
|
||||
})
|
||||
assert.NoError(t, err)
|
||||
assert.NotEmpty(t, restoredFile, "source.txt not found")
|
||||
|
||||
content, err := os.ReadFile(restoredFile)
|
||||
assert.NoError(t, err)
|
||||
assert.Equal(t, "hello world", string(content))
|
||||
}
|
||||
|
||||
func TestHooks(t *testing.T) {
|
||||
tempDir := t.TempDir()
|
||||
|
||||
// Create a dummy file to back up
|
||||
sourceFile := "source.txt"
|
||||
err := os.WriteFile(filepath.Join(tempDir, sourceFile), []byte("data"), 0644)
|
||||
assert.NoError(t, err)
|
||||
|
||||
repoPath := filepath.Join(tempDir, "repo")
|
||||
initRepo(t, repoPath)
|
||||
|
||||
configContent := `
|
||||
version: 2
|
||||
locations:
|
||||
my-data:
|
||||
from:
|
||||
- ` + sourceFile + `
|
||||
to: local
|
||||
hooks:
|
||||
before:
|
||||
- touch before.txt
|
||||
after:
|
||||
- touch after.txt
|
||||
backends:
|
||||
local:
|
||||
type: local
|
||||
path: ` + repoPath + `
|
||||
key: password
|
||||
`
|
||||
configPath := filepath.Join(tempDir, "autorestic.yml")
|
||||
err = os.WriteFile(configPath, []byte(configContent), 0644)
|
||||
assert.NoError(t, err)
|
||||
|
||||
// Run backup
|
||||
runAutorestic(t, tempDir, configPath, "backup", "-l", "my-data")
|
||||
|
||||
// Verify
|
||||
assert.FileExists(t, filepath.Join(tempDir, "before.txt"))
|
||||
assert.FileExists(t, filepath.Join(tempDir, "after.txt"))
|
||||
}
|
||||
|
||||
func TestCopy(t *testing.T) {
|
||||
tempDir := t.TempDir()
|
||||
|
||||
// Create a dummy file to back up
|
||||
sourceFile := "source.txt"
|
||||
err := os.WriteFile(filepath.Join(tempDir, sourceFile), []byte("data"), 0644)
|
||||
assert.NoError(t, err)
|
||||
|
||||
repoPath := filepath.Join(tempDir, "repo")
|
||||
initRepo(t, repoPath)
|
||||
|
||||
remoteRepoPath := filepath.Join(tempDir, "remote_repo")
|
||||
initRepo(t, remoteRepoPath)
|
||||
|
||||
configContent := `
|
||||
version: 2
|
||||
locations:
|
||||
my-data:
|
||||
from:
|
||||
- ` + sourceFile + `
|
||||
to: local
|
||||
copy:
|
||||
local:
|
||||
- remote
|
||||
backends:
|
||||
local:
|
||||
type: local
|
||||
path: ` + repoPath + `
|
||||
key: password
|
||||
remote:
|
||||
type: local
|
||||
path: ` + remoteRepoPath + `
|
||||
key: password
|
||||
`
|
||||
configPath := filepath.Join(tempDir, "autorestic.yml")
|
||||
err = os.WriteFile(configPath, []byte(configContent), 0644)
|
||||
assert.NoError(t, err)
|
||||
|
||||
// Run backup
|
||||
output := runAutorestic(t, tempDir, configPath, "backup", "-l", "my-data")
|
||||
|
||||
// Verify copy in output
|
||||
assert.Contains(t, output, "Copying local → remote")
|
||||
}
|
||||
|
||||
func TestPermissions(t *testing.T) {
|
||||
tempDir := t.TempDir()
|
||||
|
||||
// 1. Create a source file with specific permissions (0600)
|
||||
sourceFile := "source.txt"
|
||||
sourcePath := filepath.Join(tempDir, sourceFile)
|
||||
err := os.WriteFile(sourcePath, []byte("data"), 0600)
|
||||
assert.NoError(t, err)
|
||||
|
||||
repoPath := filepath.Join(tempDir, "repo")
|
||||
initRepo(t, repoPath)
|
||||
|
||||
configContent := `
|
||||
version: 2
|
||||
locations:
|
||||
my-data:
|
||||
from:
|
||||
- ` + sourceFile + `
|
||||
to: local
|
||||
backends:
|
||||
local:
|
||||
type: local
|
||||
path: ` + repoPath + `
|
||||
key: password
|
||||
`
|
||||
configPath := filepath.Join(tempDir, "autorestic.yml")
|
||||
err = os.WriteFile(configPath, []byte(configContent), 0644)
|
||||
assert.NoError(t, err)
|
||||
|
||||
// 2. Backup
|
||||
runAutorestic(t, tempDir, configPath, "backup", "-l", "my-data")
|
||||
|
||||
// 3. Restore
|
||||
restoreDir := filepath.Join(tempDir, "restore")
|
||||
err = os.MkdirAll(restoreDir, 0755)
|
||||
assert.NoError(t, err)
|
||||
runAutorestic(t, tempDir, configPath, "restore", "-l", "my-data", "--to", restoreDir)
|
||||
|
||||
// 4. Verify permissions
|
||||
// Use walk to find the restored file
|
||||
var restoredFile string
|
||||
err = filepath.Walk(restoreDir, func(path string, info os.FileInfo, err error) error {
|
||||
if !info.IsDir() && info.Name() == "source.txt" {
|
||||
restoredFile = path
|
||||
}
|
||||
return nil
|
||||
})
|
||||
assert.NoError(t, err)
|
||||
assert.NotEmpty(t, restoredFile, "source.txt not found")
|
||||
|
||||
info, err := os.Stat(restoredFile)
|
||||
assert.NoError(t, err)
|
||||
|
||||
// Check permissions (masking only for permission bits)
|
||||
assert.Equal(t, os.FileMode(0600), info.Mode().Perm())
|
||||
}
|
||||
@@ -1,14 +0,0 @@
|
||||
package integration_test
|
||||
|
||||
import (
|
||||
"github.com/stretchr/testify/assert"
|
||||
"os/exec"
|
||||
"testing"
|
||||
)
|
||||
|
||||
func TestVersion(t *testing.T) {
|
||||
cmd := exec.Command("go", "run", "../main.go", "--version")
|
||||
out, err := cmd.CombinedOutput()
|
||||
assert.NoError(t, err)
|
||||
assert.Contains(t, string(out), "autorestic")
|
||||
}
|
||||
Reference in New Issue
Block a user