1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747 |
- from binascii import unhexlify, b2a_base64
- from configparser import ConfigParser
- import errno
- import os
- from datetime import datetime
- from datetime import timedelta
- from io import StringIO
- import random
- import stat
- import subprocess
- import sys
- import shutil
- import tempfile
- import time
- import unittest
- from unittest.mock import patch
- from hashlib import sha256
- import msgpack
- import pytest
- from .. import xattr
- from ..archive import Archive, ChunkBuffer, CHUNK_MAX_EXP, flags_noatime, flags_normal
- from ..archiver import Archiver
- from ..cache import Cache
- from ..crypto import bytes_to_long, num_aes_blocks
- from ..helpers import Manifest, PatternMatcher, parse_pattern, EXIT_SUCCESS, EXIT_WARNING, EXIT_ERROR, bin_to_hex, \
- get_security_dir
- from ..key import RepoKey, KeyfileKey, Passphrase, TAMRequiredError
- from ..keymanager import RepoIdMismatch, NotABorgKeyFile
- from ..remote import RemoteRepository, PathNotAllowed
- from ..repository import Repository
- from . import BaseTestCase, changedir, environment_variable, no_selinux
- from .platform import fakeroot_detected
- from . import key
- try:
- import llfuse
- has_llfuse = True or llfuse # avoids "unused import"
- except ImportError:
- has_llfuse = False
- has_lchflags = hasattr(os, 'lchflags')
- src_dir = os.path.abspath(os.path.join(os.path.dirname(__file__), '..'))
- def exec_cmd(*args, archiver=None, fork=False, exe=None, **kw):
- if fork:
- try:
- if exe is None:
- borg = (sys.executable, '-m', 'borg.archiver')
- elif isinstance(exe, str):
- borg = (exe, )
- elif not isinstance(exe, tuple):
- raise ValueError('exe must be None, a tuple or a str')
- output = subprocess.check_output(borg + args, stderr=subprocess.STDOUT)
- ret = 0
- except subprocess.CalledProcessError as e:
- output = e.output
- ret = e.returncode
- return ret, os.fsdecode(output)
- else:
- stdin, stdout, stderr = sys.stdin, sys.stdout, sys.stderr
- try:
- sys.stdin = StringIO()
- sys.stdout = sys.stderr = output = StringIO()
- if archiver is None:
- archiver = Archiver()
- archiver.exit_code = EXIT_SUCCESS
- args = archiver.parse_args(list(args))
- ret = archiver.run(args)
- return ret, output.getvalue()
- finally:
- sys.stdin, sys.stdout, sys.stderr = stdin, stdout, stderr
- # check if the binary "borg.exe" is available (for local testing a symlink to virtualenv/bin/borg should do)
- try:
- exec_cmd('help', exe='borg.exe', fork=True)
- BORG_EXES = ['python', 'binary', ]
- except FileNotFoundError:
- BORG_EXES = ['python', ]
- @pytest.fixture(params=BORG_EXES)
- def cmd(request):
- if request.param == 'python':
- exe = None
- elif request.param == 'binary':
- exe = 'borg.exe'
- else:
- raise ValueError("param must be 'python' or 'binary'")
- def exec_fn(*args, **kw):
- return exec_cmd(*args, exe=exe, fork=True, **kw)
- return exec_fn
- def test_return_codes(cmd, tmpdir):
- repo = tmpdir.mkdir('repo')
- input = tmpdir.mkdir('input')
- output = tmpdir.mkdir('output')
- input.join('test_file').write('content')
- rc, out = cmd('init', '--encryption=none', '%s' % str(repo))
- assert rc == EXIT_SUCCESS
- rc, out = cmd('create', '%s::archive' % repo, str(input))
- assert rc == EXIT_SUCCESS
- with changedir(str(output)):
- rc, out = cmd('extract', '%s::archive' % repo)
- assert rc == EXIT_SUCCESS
- rc, out = cmd('extract', '%s::archive' % repo, 'does/not/match')
- assert rc == EXIT_WARNING # pattern did not match
- rc, out = cmd('create', '%s::archive' % repo, str(input))
- assert rc == EXIT_ERROR # duplicate archive name
- """
- test_disk_full is very slow and not recommended to be included in daily testing.
- for this test, an empty, writable 16MB filesystem mounted on DF_MOUNT is required.
- for speed and other reasons, it is recommended that the underlying block device is
- in RAM, not a magnetic or flash disk.
- assuming /tmp is a tmpfs (in memory filesystem), one can use this:
- dd if=/dev/zero of=/tmp/borg-disk bs=16M count=1
- mkfs.ext4 /tmp/borg-disk
- mkdir /tmp/borg-mount
- sudo mount /tmp/borg-disk /tmp/borg-mount
- if the directory does not exist, the test will be skipped.
- """
- DF_MOUNT = '/tmp/borg-mount'
- @pytest.mark.skipif(not os.path.exists(DF_MOUNT), reason="needs a 16MB fs mounted on %s" % DF_MOUNT)
- def test_disk_full(cmd):
- def make_files(dir, count, size, rnd=True):
- shutil.rmtree(dir, ignore_errors=True)
- os.mkdir(dir)
- if rnd:
- count = random.randint(1, count)
- if size > 1:
- size = random.randint(1, size)
- for i in range(count):
- fn = os.path.join(dir, "file%03d" % i)
- with open(fn, 'wb') as f:
- data = os.urandom(size)
- f.write(data)
- with environment_variable(BORG_CHECK_I_KNOW_WHAT_I_AM_DOING='YES'):
- mount = DF_MOUNT
- assert os.path.exists(mount)
- repo = os.path.join(mount, 'repo')
- input = os.path.join(mount, 'input')
- reserve = os.path.join(mount, 'reserve')
- for j in range(100):
- shutil.rmtree(repo, ignore_errors=True)
- shutil.rmtree(input, ignore_errors=True)
- # keep some space and some inodes in reserve that we can free up later:
- make_files(reserve, 80, 100000, rnd=False)
- rc, out = cmd('init', repo)
- if rc != EXIT_SUCCESS:
- print('init', rc, out)
- assert rc == EXIT_SUCCESS
- try:
- success, i = True, 0
- while success:
- i += 1
- try:
- make_files(input, 20, 200000)
- except OSError as err:
- if err.errno == errno.ENOSPC:
- # already out of space
- break
- raise
- try:
- rc, out = cmd('create', '%s::test%03d' % (repo, i), input)
- success = rc == EXIT_SUCCESS
- if not success:
- print('create', rc, out)
- finally:
- # make sure repo is not locked
- shutil.rmtree(os.path.join(repo, 'lock.exclusive'), ignore_errors=True)
- os.remove(os.path.join(repo, 'lock.roster'))
- finally:
- # now some error happened, likely we are out of disk space.
- # free some space so we can expect borg to be able to work normally:
- shutil.rmtree(reserve, ignore_errors=True)
- rc, out = cmd('list', repo)
- if rc != EXIT_SUCCESS:
- print('list', rc, out)
- rc, out = cmd('check', '--repair', repo)
- if rc != EXIT_SUCCESS:
- print('check', rc, out)
- assert rc == EXIT_SUCCESS
- class ArchiverTestCaseBase(BaseTestCase):
- EXE = None # python source based
- FORK_DEFAULT = False
- prefix = ''
- def setUp(self):
- os.environ['BORG_CHECK_I_KNOW_WHAT_I_AM_DOING'] = 'YES'
- os.environ['BORG_DELETE_I_KNOW_WHAT_I_AM_DOING'] = 'YES'
- os.environ['BORG_PASSPHRASE'] = 'waytooeasyonlyfortests'
- self.archiver = not self.FORK_DEFAULT and Archiver() or None
- self.tmpdir = tempfile.mkdtemp()
- self.repository_path = os.path.join(self.tmpdir, 'repository')
- self.repository_location = self.prefix + self.repository_path
- self.input_path = os.path.join(self.tmpdir, 'input')
- self.output_path = os.path.join(self.tmpdir, 'output')
- self.keys_path = os.path.join(self.tmpdir, 'keys')
- self.cache_path = os.path.join(self.tmpdir, 'cache')
- self.exclude_file_path = os.path.join(self.tmpdir, 'excludes')
- os.environ['BORG_KEYS_DIR'] = self.keys_path
- os.environ['BORG_CACHE_DIR'] = self.cache_path
- os.mkdir(self.input_path)
- os.chmod(self.input_path, 0o777) # avoid troubles with fakeroot / FUSE
- os.mkdir(self.output_path)
- os.mkdir(self.keys_path)
- os.mkdir(self.cache_path)
- with open(self.exclude_file_path, 'wb') as fd:
- fd.write(b'input/file2\n# A comment line, then a blank line\n\n')
- self._old_wd = os.getcwd()
- os.chdir(self.tmpdir)
- def tearDown(self):
- os.chdir(self._old_wd)
- # note: ignore_errors=True as workaround for issue #862
- shutil.rmtree(self.tmpdir, ignore_errors=True)
- def cmd(self, *args, **kw):
- exit_code = kw.pop('exit_code', 0)
- fork = kw.pop('fork', None)
- if fork is None:
- fork = self.FORK_DEFAULT
- ret, output = exec_cmd(*args, fork=fork, exe=self.EXE, archiver=self.archiver, **kw)
- if ret != exit_code:
- print(output)
- self.assert_equal(ret, exit_code)
- return output
- def create_src_archive(self, name):
- self.cmd('create', self.repository_location + '::' + name, src_dir)
- def open_archive(self, name):
- repository = Repository(self.repository_path, exclusive=True)
- with repository:
- manifest, key = Manifest.load(repository)
- archive = Archive(repository, key, manifest, name)
- return archive, repository
- class ArchiverTestCase(ArchiverTestCaseBase):
- def create_regular_file(self, name, size=0, contents=None):
- filename = os.path.join(self.input_path, name)
- if not os.path.exists(os.path.dirname(filename)):
- os.makedirs(os.path.dirname(filename))
- with open(filename, 'wb') as fd:
- if contents is None:
- contents = b'X' * size
- fd.write(contents)
- def create_test_files(self):
- """Create a minimal test case including all supported file types
- """
- # File
- self.create_regular_file('empty', size=0)
- # next code line raises OverflowError on 32bit cpu (raspberry pi 2):
- # 2600-01-01 > 2**64 ns
- # os.utime('input/empty', (19880895600, 19880895600))
- # thus, we better test with something not that far in future:
- # 2038-01-19 (1970 + 2^31 - 1 seconds) is the 32bit "deadline":
- os.utime('input/empty', (2**31 - 1, 2**31 - 1))
- self.create_regular_file('file1', size=1024 * 80)
- self.create_regular_file('flagfile', size=1024)
- # Directory
- self.create_regular_file('dir2/file2', size=1024 * 80)
- # File mode
- os.chmod('input/file1', 0o4755)
- # Hard link
- os.link(os.path.join(self.input_path, 'file1'),
- os.path.join(self.input_path, 'hardlink'))
- # Symlink
- os.symlink('somewhere', os.path.join(self.input_path, 'link1'))
- self.create_regular_file('fusexattr', size=1)
- if not xattr.XATTR_FAKEROOT and xattr.is_enabled(self.input_path):
- # ironically, due to the way how fakeroot works, comparing fuse file xattrs to orig file xattrs
- # will FAIL if fakeroot supports xattrs, thus we only set the xattr if XATTR_FAKEROOT is False.
- # This is because fakeroot with xattr-support does not propagate xattrs of the underlying file
- # into "fakeroot space". Because the xattrs exposed by borgfs are these of an underlying file
- # (from fakeroots point of view) they are invisible to the test process inside the fakeroot.
- xattr.setxattr(os.path.join(self.input_path, 'fusexattr'), 'user.foo', b'bar')
- # XXX this always fails for me
- # ubuntu 14.04, on a TMP dir filesystem with user_xattr, using fakeroot
- # same for newer ubuntu and centos.
- # if this is supported just on specific platform, platform should be checked first,
- # so that the test setup for all tests using it does not fail here always for others.
- # xattr.setxattr(os.path.join(self.input_path, 'link1'), 'user.foo_symlink', b'bar_symlink', follow_symlinks=False)
- # FIFO node
- os.mkfifo(os.path.join(self.input_path, 'fifo1'))
- if has_lchflags:
- os.lchflags(os.path.join(self.input_path, 'flagfile'), stat.UF_NODUMP)
- try:
- # Block device
- os.mknod('input/bdev', 0o600 | stat.S_IFBLK, os.makedev(10, 20))
- # Char device
- os.mknod('input/cdev', 0o600 | stat.S_IFCHR, os.makedev(30, 40))
- # File mode
- os.chmod('input/dir2', 0o555) # if we take away write perms, we need root to remove contents
- # File owner
- os.chown('input/file1', 100, 200) # raises OSError invalid argument on cygwin
- have_root = True # we have (fake)root
- except PermissionError:
- have_root = False
- except OSError as e:
- # Note: ENOSYS "Function not implemented" happens as non-root on Win 10 Linux Subsystem.
- if e.errno not in (errno.EINVAL, errno.ENOSYS):
- raise
- have_root = False
- return have_root
- def test_basic_functionality(self):
- have_root = self.create_test_files()
- self.cmd('init', self.repository_location)
- self.cmd('create', self.repository_location + '::test', 'input')
- self.cmd('create', '--stats', self.repository_location + '::test.2', 'input')
- with changedir('output'):
- self.cmd('extract', self.repository_location + '::test')
- list_output = self.cmd('list', '--short', self.repository_location)
- self.assert_in('test', list_output)
- self.assert_in('test.2', list_output)
- expected = [
- 'input',
- 'input/bdev',
- 'input/cdev',
- 'input/dir2',
- 'input/dir2/file2',
- 'input/empty',
- 'input/fifo1',
- 'input/file1',
- 'input/flagfile',
- 'input/hardlink',
- 'input/link1',
- ]
- if not have_root:
- # we could not create these device files without (fake)root
- expected.remove('input/bdev')
- expected.remove('input/cdev')
- if has_lchflags:
- # remove the file we did not backup, so input and output become equal
- expected.remove('input/flagfile') # this file is UF_NODUMP
- os.remove(os.path.join('input', 'flagfile'))
- list_output = self.cmd('list', '--short', self.repository_location + '::test')
- for name in expected:
- self.assert_in(name, list_output)
- self.assert_dirs_equal('input', 'output/input')
- info_output = self.cmd('info', self.repository_location + '::test')
- item_count = 4 if has_lchflags else 5 # one file is UF_NODUMP
- self.assert_in('Number of files: %d' % item_count, info_output)
- shutil.rmtree(self.cache_path)
- with environment_variable(BORG_UNKNOWN_UNENCRYPTED_REPO_ACCESS_IS_OK='yes'):
- info_output2 = self.cmd('info', self.repository_location + '::test')
- def filter(output):
- # filter for interesting "info" output, ignore cache rebuilding related stuff
- prefixes = ['Name:', 'Fingerprint:', 'Number of files:', 'This archive:',
- 'All archives:', 'Chunk index:', ]
- result = []
- for line in output.splitlines():
- for prefix in prefixes:
- if line.startswith(prefix):
- result.append(line)
- return '\n'.join(result)
- # the interesting parts of info_output2 and info_output should be same
- self.assert_equal(filter(info_output), filter(info_output2))
- # Search for O_NOATIME there: https://www.gnu.org/software/hurd/contributing.html - we just
- # skip the test on Hurd, it is not critical anyway, just testing a performance optimization.
- @pytest.mark.skipif(sys.platform == 'gnu0', reason="O_NOATIME is strangely broken on GNU Hurd")
- def test_atime(self):
- def has_noatime(some_file):
- atime_before = os.stat(some_file).st_atime_ns
- try:
- os.close(os.open(some_file, flags_noatime))
- except PermissionError:
- return False
- else:
- atime_after = os.stat(some_file).st_atime_ns
- noatime_used = flags_noatime != flags_normal
- return noatime_used and atime_before == atime_after
- self.create_test_files()
- atime, mtime = 123456780, 234567890
- have_noatime = has_noatime('input/file1')
- os.utime('input/file1', (atime, mtime))
- self.cmd('init', self.repository_location)
- self.cmd('create', self.repository_location + '::test', 'input')
- with changedir('output'):
- self.cmd('extract', self.repository_location + '::test')
- sti = os.stat('input/file1')
- sto = os.stat('output/input/file1')
- assert sti.st_mtime_ns == sto.st_mtime_ns == mtime * 1e9
- if have_noatime:
- assert sti.st_atime_ns == sto.st_atime_ns == atime * 1e9
- else:
- # it touched the input file's atime while backing it up
- assert sto.st_atime_ns == atime * 1e9
- def _extract_repository_id(self, path):
- with Repository(self.repository_path) as repository:
- return repository.id
- def _set_repository_id(self, path, id):
- config = ConfigParser(interpolation=None)
- config.read(os.path.join(path, 'config'))
- config.set('repository', 'id', bin_to_hex(id))
- with open(os.path.join(path, 'config'), 'w') as fd:
- config.write(fd)
- with Repository(self.repository_path) as repository:
- return repository.id
- def test_sparse_file(self):
- def is_sparse(fn, total_size, hole_size):
- st = os.stat(fn)
- assert st.st_size == total_size
- sparse = True
- if sparse and hasattr(st, 'st_blocks') and st.st_blocks * 512 >= st.st_size:
- sparse = False
- if sparse and hasattr(os, 'SEEK_HOLE') and hasattr(os, 'SEEK_DATA'):
- with open(fn, 'rb') as fd:
- # only check if the first hole is as expected, because the 2nd hole check
- # is problematic on xfs due to its "dynamic speculative EOF preallocation
- try:
- if fd.seek(0, os.SEEK_HOLE) != 0:
- sparse = False
- if fd.seek(0, os.SEEK_DATA) != hole_size:
- sparse = False
- except OSError:
- # OS/FS does not really support SEEK_HOLE/SEEK_DATA
- sparse = False
- return sparse
- filename = os.path.join(self.input_path, 'sparse')
- content = b'foobar'
- hole_size = 5 * (1 << CHUNK_MAX_EXP) # 5 full chunker buffers
- total_size = hole_size + len(content) + hole_size
- with open(filename, 'wb') as fd:
- # create a file that has a hole at the beginning and end (if the
- # OS and filesystem supports sparse files)
- fd.seek(hole_size, 1)
- fd.write(content)
- fd.seek(hole_size, 1)
- pos = fd.tell()
- fd.truncate(pos)
- # we first check if we could create a sparse input file:
- sparse_support = is_sparse(filename, total_size, hole_size)
- if sparse_support:
- # we could create a sparse input file, so creating a backup of it and
- # extracting it again (as sparse) should also work:
- self.cmd('init', self.repository_location)
- self.cmd('create', self.repository_location + '::test', 'input')
- with changedir(self.output_path):
- self.cmd('extract', '--sparse', self.repository_location + '::test')
- self.assert_dirs_equal('input', 'output/input')
- filename = os.path.join(self.output_path, 'input', 'sparse')
- with open(filename, 'rb') as fd:
- # check if file contents are as expected
- self.assert_equal(fd.read(hole_size), b'\0' * hole_size)
- self.assert_equal(fd.read(len(content)), content)
- self.assert_equal(fd.read(hole_size), b'\0' * hole_size)
- self.assert_true(is_sparse(filename, total_size, hole_size))
- def test_unusual_filenames(self):
- filenames = ['normal', 'with some blanks', '(with_parens)', ]
- for filename in filenames:
- filename = os.path.join(self.input_path, filename)
- with open(filename, 'wb'):
- pass
- self.cmd('init', self.repository_location)
- self.cmd('create', self.repository_location + '::test', 'input')
- for filename in filenames:
- with changedir('output'):
- self.cmd('extract', self.repository_location + '::test', os.path.join('input', filename))
- assert os.path.exists(os.path.join('output', 'input', filename))
- def test_repository_swap_detection(self):
- self.create_test_files()
- os.environ['BORG_PASSPHRASE'] = 'passphrase'
- self.cmd('init', '--encryption=repokey', self.repository_location)
- repository_id = self._extract_repository_id(self.repository_path)
- self.cmd('create', self.repository_location + '::test', 'input')
- shutil.rmtree(self.repository_path)
- self.cmd('init', '--encryption=none', self.repository_location)
- self._set_repository_id(self.repository_path, repository_id)
- self.assert_equal(repository_id, self._extract_repository_id(self.repository_path))
- if self.FORK_DEFAULT:
- self.cmd('create', self.repository_location + '::test.2', 'input', exit_code=EXIT_ERROR)
- else:
- self.assert_raises(Cache.EncryptionMethodMismatch, lambda: self.cmd('create', self.repository_location + '::test.2', 'input'))
- def test_repository_swap_detection2(self):
- self.create_test_files()
- self.cmd('init', '--encryption=none', self.repository_location + '_unencrypted')
- os.environ['BORG_PASSPHRASE'] = 'passphrase'
- self.cmd('init', '--encryption=repokey', self.repository_location + '_encrypted')
- self.cmd('create', self.repository_location + '_encrypted::test', 'input')
- shutil.rmtree(self.repository_path + '_encrypted')
- os.rename(self.repository_path + '_unencrypted', self.repository_path + '_encrypted')
- if self.FORK_DEFAULT:
- self.cmd('create', self.repository_location + '_encrypted::test.2', 'input', exit_code=EXIT_ERROR)
- else:
- self.assert_raises(Cache.RepositoryAccessAborted, lambda: self.cmd('create', self.repository_location + '_encrypted::test.2', 'input'))
- def test_strip_components(self):
- self.cmd('init', self.repository_location)
- self.create_regular_file('dir/file')
- self.cmd('create', self.repository_location + '::test', 'input')
- with changedir('output'):
- self.cmd('extract', self.repository_location + '::test', '--strip-components', '3')
- self.assert_true(not os.path.exists('file'))
- with self.assert_creates_file('file'):
- self.cmd('extract', self.repository_location + '::test', '--strip-components', '2')
- with self.assert_creates_file('dir/file'):
- self.cmd('extract', self.repository_location + '::test', '--strip-components', '1')
- with self.assert_creates_file('input/dir/file'):
- self.cmd('extract', self.repository_location + '::test', '--strip-components', '0')
- def test_extract_include_exclude(self):
- self.cmd('init', self.repository_location)
- self.create_regular_file('file1', size=1024 * 80)
- self.create_regular_file('file2', size=1024 * 80)
- self.create_regular_file('file3', size=1024 * 80)
- self.create_regular_file('file4', size=1024 * 80)
- self.cmd('create', '--exclude=input/file4', self.repository_location + '::test', 'input')
- with changedir('output'):
- self.cmd('extract', self.repository_location + '::test', 'input/file1', )
- self.assert_equal(sorted(os.listdir('output/input')), ['file1'])
- with changedir('output'):
- self.cmd('extract', '--exclude=input/file2', self.repository_location + '::test')
- self.assert_equal(sorted(os.listdir('output/input')), ['file1', 'file3'])
- with changedir('output'):
- self.cmd('extract', '--exclude-from=' + self.exclude_file_path, self.repository_location + '::test')
- self.assert_equal(sorted(os.listdir('output/input')), ['file1', 'file3'])
- def test_extract_include_exclude_regex(self):
- self.cmd('init', self.repository_location)
- self.create_regular_file('file1', size=1024 * 80)
- self.create_regular_file('file2', size=1024 * 80)
- self.create_regular_file('file3', size=1024 * 80)
- self.create_regular_file('file4', size=1024 * 80)
- self.create_regular_file('file333', size=1024 * 80)
- # Create with regular expression exclusion for file4
- self.cmd('create', '--exclude=re:input/file4$', self.repository_location + '::test', 'input')
- with changedir('output'):
- self.cmd('extract', self.repository_location + '::test')
- self.assert_equal(sorted(os.listdir('output/input')), ['file1', 'file2', 'file3', 'file333'])
- shutil.rmtree('output/input')
- # Extract with regular expression exclusion
- with changedir('output'):
- self.cmd('extract', '--exclude=re:file3+', self.repository_location + '::test')
- self.assert_equal(sorted(os.listdir('output/input')), ['file1', 'file2'])
- shutil.rmtree('output/input')
- # Combine --exclude with fnmatch and regular expression
- with changedir('output'):
- self.cmd('extract', '--exclude=input/file2', '--exclude=re:file[01]', self.repository_location + '::test')
- self.assert_equal(sorted(os.listdir('output/input')), ['file3', 'file333'])
- shutil.rmtree('output/input')
- # Combine --exclude-from and regular expression exclusion
- with changedir('output'):
- self.cmd('extract', '--exclude-from=' + self.exclude_file_path, '--exclude=re:file1',
- '--exclude=re:file(\\d)\\1\\1$', self.repository_location + '::test')
- self.assert_equal(sorted(os.listdir('output/input')), ['file3'])
- def test_extract_include_exclude_regex_from_file(self):
- self.cmd('init', self.repository_location)
- self.create_regular_file('file1', size=1024 * 80)
- self.create_regular_file('file2', size=1024 * 80)
- self.create_regular_file('file3', size=1024 * 80)
- self.create_regular_file('file4', size=1024 * 80)
- self.create_regular_file('file333', size=1024 * 80)
- self.create_regular_file('aa:something', size=1024 * 80)
- # Create while excluding using mixed pattern styles
- with open(self.exclude_file_path, 'wb') as fd:
- fd.write(b're:input/file4$\n')
- fd.write(b'fm:*aa:*thing\n')
- self.cmd('create', '--exclude-from=' + self.exclude_file_path, self.repository_location + '::test', 'input')
- with changedir('output'):
- self.cmd('extract', self.repository_location + '::test')
- self.assert_equal(sorted(os.listdir('output/input')), ['file1', 'file2', 'file3', 'file333'])
- shutil.rmtree('output/input')
- # Exclude using regular expression
- with open(self.exclude_file_path, 'wb') as fd:
- fd.write(b're:file3+\n')
- with changedir('output'):
- self.cmd('extract', '--exclude-from=' + self.exclude_file_path, self.repository_location + '::test')
- self.assert_equal(sorted(os.listdir('output/input')), ['file1', 'file2'])
- shutil.rmtree('output/input')
- # Mixed exclude pattern styles
- with open(self.exclude_file_path, 'wb') as fd:
- fd.write(b're:file(\\d)\\1\\1$\n')
- fd.write(b'fm:nothingwillmatchthis\n')
- fd.write(b'*/file1\n')
- fd.write(b're:file2$\n')
- with changedir('output'):
- self.cmd('extract', '--exclude-from=' + self.exclude_file_path, self.repository_location + '::test')
- self.assert_equal(sorted(os.listdir('output/input')), ['file3'])
- def test_extract_with_pattern(self):
- self.cmd("init", self.repository_location)
- self.create_regular_file("file1", size=1024 * 80)
- self.create_regular_file("file2", size=1024 * 80)
- self.create_regular_file("file3", size=1024 * 80)
- self.create_regular_file("file4", size=1024 * 80)
- self.create_regular_file("file333", size=1024 * 80)
- self.cmd("create", self.repository_location + "::test", "input")
- # Extract everything with regular expression
- with changedir("output"):
- self.cmd("extract", self.repository_location + "::test", "re:.*")
- self.assert_equal(sorted(os.listdir("output/input")), ["file1", "file2", "file3", "file333", "file4"])
- shutil.rmtree("output/input")
- # Extract with pattern while also excluding files
- with changedir("output"):
- self.cmd("extract", "--exclude=re:file[34]$", self.repository_location + "::test", r"re:file\d$")
- self.assert_equal(sorted(os.listdir("output/input")), ["file1", "file2"])
- shutil.rmtree("output/input")
- # Combine --exclude with pattern for extraction
- with changedir("output"):
- self.cmd("extract", "--exclude=input/file1", self.repository_location + "::test", "re:file[12]$")
- self.assert_equal(sorted(os.listdir("output/input")), ["file2"])
- shutil.rmtree("output/input")
- # Multiple pattern
- with changedir("output"):
- self.cmd("extract", self.repository_location + "::test", "fm:input/file1", "fm:*file33*", "input/file2")
- self.assert_equal(sorted(os.listdir("output/input")), ["file1", "file2", "file333"])
- def test_create_without_root(self):
- """test create without a root"""
- self.cmd('init', self.repository_location)
- args = [ 'create', self.repository_location + '::test' ]
- if self.FORK_DEFAULT:
- output = self.cmd(*args, exit_code=2)
- else:
- self.assert_raises(SystemExit, lambda: self.cmd(*args))
- def test_create_pattern_root(self):
- """test create with only a root pattern"""
- self.cmd('init', self.repository_location)
- self.create_regular_file('file1', size=1024 * 80)
- self.create_regular_file('file2', size=1024 * 80)
- output = self.cmd('create', '-v', '--list', '--pattern=R input', self.repository_location + '::test')
- self.assert_in("A input/file1", output)
- self.assert_in("A input/file2", output)
- def test_create_pattern(self):
- """test file patterns during create"""
- self.cmd('init', self.repository_location)
- self.create_regular_file('file1', size=1024 * 80)
- self.create_regular_file('file2', size=1024 * 80)
- self.create_regular_file('file_important', size=1024 * 80)
- output = self.cmd('create', '-v', '--list',
- '--pattern=+input/file_important', '--pattern=-input/file*',
- self.repository_location + '::test', 'input')
- self.assert_in("A input/file_important", output)
- self.assert_in("A input/file_important", output)
- self.assert_not_in('file1', output)
- self.assert_not_in('file2', output)
- def test_extract_pattern_opt(self):
- self.cmd('init', self.repository_location)
- self.create_regular_file('file1', size=1024 * 80)
- self.create_regular_file('file2', size=1024 * 80)
- self.create_regular_file('file_important', size=1024 * 80)
- self.cmd('create', self.repository_location + '::test', 'input')
- with changedir('output'):
- self.cmd('extract',
- '--pattern=+input/file_important', '--pattern=-input/file*',
- self.repository_location + '::test')
- self.assert_equal(sorted(os.listdir('output/input')), ['file_important'])
- def test_exclude_caches(self):
- self.cmd('init', self.repository_location)
- self.create_regular_file('file1', size=1024 * 80)
- self.create_regular_file('cache1/CACHEDIR.TAG', contents=b'Signature: 8a477f597d28d172789f06886806bc55 extra stuff')
- self.create_regular_file('cache2/CACHEDIR.TAG', contents=b'invalid signature')
- self.cmd('create', '--exclude-caches', self.repository_location + '::test', 'input')
- with changedir('output'):
- self.cmd('extract', self.repository_location + '::test')
- self.assert_equal(sorted(os.listdir('output/input')), ['cache2', 'file1'])
- self.assert_equal(sorted(os.listdir('output/input/cache2')), ['CACHEDIR.TAG'])
- def test_exclude_tagged(self):
- self.cmd('init', self.repository_location)
- self.create_regular_file('file1', size=1024 * 80)
- self.create_regular_file('tagged1/.NOBACKUP')
- self.create_regular_file('tagged2/00-NOBACKUP')
- self.create_regular_file('tagged3/.NOBACKUP/file2')
- self.cmd('create', '--exclude-if-present', '.NOBACKUP', '--exclude-if-present', '00-NOBACKUP', self.repository_location + '::test', 'input')
- with changedir('output'):
- self.cmd('extract', self.repository_location + '::test')
- self.assert_equal(sorted(os.listdir('output/input')), ['file1', 'tagged3'])
- def test_exclude_keep_tagged(self):
- self.cmd('init', self.repository_location)
- self.create_regular_file('file0', size=1024)
- self.create_regular_file('tagged1/.NOBACKUP1')
- self.create_regular_file('tagged1/file1', size=1024)
- self.create_regular_file('tagged2/.NOBACKUP2')
- self.create_regular_file('tagged2/file2', size=1024)
- self.create_regular_file('tagged3/CACHEDIR.TAG', contents=b'Signature: 8a477f597d28d172789f06886806bc55 extra stuff')
- self.create_regular_file('tagged3/file3', size=1024)
- self.create_regular_file('taggedall/.NOBACKUP1')
- self.create_regular_file('taggedall/.NOBACKUP2')
- self.create_regular_file('taggedall/CACHEDIR.TAG', contents=b'Signature: 8a477f597d28d172789f06886806bc55 extra stuff')
- self.create_regular_file('taggedall/file4', size=1024)
- self.cmd('create', '--exclude-if-present', '.NOBACKUP1', '--exclude-if-present', '.NOBACKUP2',
- '--exclude-caches', '--keep-tag-files', self.repository_location + '::test', 'input')
- with changedir('output'):
- self.cmd('extract', self.repository_location + '::test')
- self.assert_equal(sorted(os.listdir('output/input')), ['file0', 'tagged1', 'tagged2', 'tagged3', 'taggedall'])
- self.assert_equal(os.listdir('output/input/tagged1'), ['.NOBACKUP1'])
- self.assert_equal(os.listdir('output/input/tagged2'), ['.NOBACKUP2'])
- self.assert_equal(os.listdir('output/input/tagged3'), ['CACHEDIR.TAG'])
- self.assert_equal(sorted(os.listdir('output/input/taggedall')),
- ['.NOBACKUP1', '.NOBACKUP2', 'CACHEDIR.TAG', ])
- @pytest.mark.skipif(not xattr.XATTR_FAKEROOT, reason='Linux capabilities test, requires fakeroot >= 1.20.2')
- def test_extract_capabilities(self):
- fchown = os.fchown
- # We need to manually patch chown to get the behaviour Linux has, since fakeroot does not
- # accurately model the interaction of chown(2) and Linux capabilities, i.e. it does not remove them.
- def patched_fchown(fd, uid, gid):
- xattr.setxattr(fd, 'security.capability', None, follow_symlinks=False)
- fchown(fd, uid, gid)
- # The capability descriptor used here is valid and taken from a /usr/bin/ping
- capabilities = b'\x01\x00\x00\x02\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'
- self.create_regular_file('file')
- xattr.setxattr('input/file', 'security.capability', capabilities)
- self.cmd('init', self.repository_location)
- self.cmd('create', self.repository_location + '::test', 'input')
- with changedir('output'):
- with patch.object(os, 'fchown', patched_fchown):
- self.cmd('extract', self.repository_location + '::test')
- assert xattr.getxattr('input/file', 'security.capability') == capabilities
- def test_path_normalization(self):
- self.cmd('init', self.repository_location)
- self.create_regular_file('dir1/dir2/file', size=1024 * 80)
- with changedir('input/dir1/dir2'):
- self.cmd('create', self.repository_location + '::test', '../../../input/dir1/../dir1/dir2/..')
- output = self.cmd('list', self.repository_location + '::test')
- self.assert_not_in('..', output)
- self.assert_in(' input/dir1/dir2/file', output)
- def test_exclude_normalization(self):
- self.cmd('init', self.repository_location)
- self.create_regular_file('file1', size=1024 * 80)
- self.create_regular_file('file2', size=1024 * 80)
- with changedir('input'):
- self.cmd('create', '--exclude=file1', self.repository_location + '::test1', '.')
- with changedir('output'):
- self.cmd('extract', self.repository_location + '::test1')
- self.assert_equal(sorted(os.listdir('output')), ['file2'])
- with changedir('input'):
- self.cmd('create', '--exclude=./file1', self.repository_location + '::test2', '.')
- with changedir('output'):
- self.cmd('extract', self.repository_location + '::test2')
- self.assert_equal(sorted(os.listdir('output')), ['file2'])
- self.cmd('create', '--exclude=input/./file1', self.repository_location + '::test3', 'input')
- with changedir('output'):
- self.cmd('extract', self.repository_location + '::test3')
- self.assert_equal(sorted(os.listdir('output/input')), ['file2'])
- def test_repeated_files(self):
- self.create_regular_file('file1', size=1024 * 80)
- self.cmd('init', self.repository_location)
- self.cmd('create', self.repository_location + '::test', 'input', 'input')
- def test_overwrite(self):
- self.create_regular_file('file1', size=1024 * 80)
- self.create_regular_file('dir2/file2', size=1024 * 80)
- self.cmd('init', self.repository_location)
- self.cmd('create', self.repository_location + '::test', 'input')
- # Overwriting regular files and directories should be supported
- os.mkdir('output/input')
- os.mkdir('output/input/file1')
- os.mkdir('output/input/dir2')
- with changedir('output'):
- self.cmd('extract', self.repository_location + '::test')
- self.assert_dirs_equal('input', 'output/input')
- # But non-empty dirs should fail
- os.unlink('output/input/file1')
- os.mkdir('output/input/file1')
- os.mkdir('output/input/file1/dir')
- with changedir('output'):
- self.cmd('extract', self.repository_location + '::test', exit_code=1)
- def test_rename(self):
- self.create_regular_file('file1', size=1024 * 80)
- self.create_regular_file('dir2/file2', size=1024 * 80)
- self.cmd('init', self.repository_location)
- self.cmd('create', self.repository_location + '::test', 'input')
- self.cmd('create', self.repository_location + '::test.2', 'input')
- self.cmd('extract', '--dry-run', self.repository_location + '::test')
- self.cmd('extract', '--dry-run', self.repository_location + '::test.2')
- self.cmd('rename', self.repository_location + '::test', 'test.3')
- self.cmd('extract', '--dry-run', self.repository_location + '::test.2')
- self.cmd('rename', self.repository_location + '::test.2', 'test.4')
- self.cmd('extract', '--dry-run', self.repository_location + '::test.3')
- self.cmd('extract', '--dry-run', self.repository_location + '::test.4')
- # Make sure both archives have been renamed
- with Repository(self.repository_path) as repository:
- manifest, key = Manifest.load(repository)
- self.assert_equal(len(manifest.archives), 2)
- self.assert_in('test.3', manifest.archives)
- self.assert_in('test.4', manifest.archives)
- def test_delete(self):
- self.create_regular_file('file1', size=1024 * 80)
- self.create_regular_file('dir2/file2', size=1024 * 80)
- self.cmd('init', self.repository_location)
- self.cmd('create', self.repository_location + '::test', 'input')
- self.cmd('create', self.repository_location + '::test.2', 'input')
- self.cmd('extract', '--dry-run', self.repository_location + '::test')
- self.cmd('extract', '--dry-run', self.repository_location + '::test.2')
- self.cmd('delete', self.repository_location + '::test')
- self.cmd('extract', '--dry-run', self.repository_location + '::test.2')
- self.cmd('delete', '--stats', self.repository_location + '::test.2')
- # Make sure all data except the manifest has been deleted
- with Repository(self.repository_path) as repository:
- self.assert_equal(len(repository), 1)
- def test_delete_repo(self):
- self.create_regular_file('file1', size=1024 * 80)
- self.create_regular_file('dir2/file2', size=1024 * 80)
- self.cmd('init', self.repository_location)
- self.cmd('create', self.repository_location + '::test', 'input')
- self.cmd('create', self.repository_location + '::test.2', 'input')
- os.environ['BORG_DELETE_I_KNOW_WHAT_I_AM_DOING'] = 'no'
- self.cmd('delete', self.repository_location, exit_code=2)
- assert os.path.exists(self.repository_path)
- os.environ['BORG_DELETE_I_KNOW_WHAT_I_AM_DOING'] = 'YES'
- self.cmd('delete', self.repository_location)
- # Make sure the repo is gone
- self.assertFalse(os.path.exists(self.repository_path))
- def test_corrupted_repository(self):
- self.cmd('init', self.repository_location)
- self.create_src_archive('test')
- self.cmd('extract', '--dry-run', self.repository_location + '::test')
- self.cmd('check', self.repository_location)
- name = sorted(os.listdir(os.path.join(self.tmpdir, 'repository', 'data', '0')), reverse=True)[0]
- with open(os.path.join(self.tmpdir, 'repository', 'data', '0', name), 'r+b') as fd:
- fd.seek(100)
- fd.write(b'XXXX')
- self.cmd('check', self.repository_location, exit_code=1)
- # we currently need to be able to create a lock directory inside the repo:
- @pytest.mark.xfail(reason="we need to be able to create the lock directory inside the repo")
- def test_readonly_repository(self):
- self.cmd('init', self.repository_location)
- self.create_src_archive('test')
- os.system('chmod -R ugo-w ' + self.repository_path)
- try:
- self.cmd('extract', '--dry-run', self.repository_location + '::test')
- finally:
- # Restore permissions so shutil.rmtree is able to delete it
- os.system('chmod -R u+w ' + self.repository_path)
- def test_umask(self):
- self.create_regular_file('file1', size=1024 * 80)
- self.cmd('init', self.repository_location)
- self.cmd('create', self.repository_location + '::test', 'input')
- mode = os.stat(self.repository_path).st_mode
- self.assertEqual(stat.S_IMODE(mode), 0o700)
- def test_create_dry_run(self):
- self.cmd('init', self.repository_location)
- self.cmd('create', '--dry-run', self.repository_location + '::test', 'input')
- # Make sure no archive has been created
- with Repository(self.repository_path) as repository:
- manifest, key = Manifest.load(repository)
- self.assert_equal(len(manifest.archives), 0)
- def test_progress(self):
- self.create_regular_file('file1', size=1024 * 80)
- self.cmd('init', self.repository_location)
- # progress forced on
- output = self.cmd('create', '--progress', self.repository_location + '::test4', 'input')
- self.assert_in("\r", output)
- # progress forced off
- output = self.cmd('create', self.repository_location + '::test5', 'input')
- self.assert_not_in("\r", output)
- def test_file_status(self):
- """test that various file status show expected results
- clearly incomplete: only tests for the weird "unchanged" status for now"""
- now = time.time()
- self.create_regular_file('file1', size=1024 * 80)
- os.utime('input/file1', (now - 5, now - 5)) # 5 seconds ago
- self.create_regular_file('file2', size=1024 * 80)
- self.cmd('init', self.repository_location)
- output = self.cmd('create', '-v', '--list', self.repository_location + '::test', 'input')
- self.assert_in("A input/file1", output)
- self.assert_in("A input/file2", output)
- # should find first file as unmodified
- output = self.cmd('create', '-v', '--list', self.repository_location + '::test1', 'input')
- self.assert_in("U input/file1", output)
- # this is expected, although surprising, for why, see:
- # https://borgbackup.readthedocs.org/en/latest/faq.html#i-am-seeing-a-added-status-for-a-unchanged-file
- self.assert_in("A input/file2", output)
- def test_create_topical(self):
- now = time.time()
- self.create_regular_file('file1', size=1024 * 80)
- os.utime('input/file1', (now-5, now-5))
- self.create_regular_file('file2', size=1024 * 80)
- self.cmd('init', self.repository_location)
- # no listing by default
- output = self.cmd('create', self.repository_location + '::test', 'input')
- self.assert_not_in('file1', output)
- # shouldn't be listed even if unchanged
- output = self.cmd('create', self.repository_location + '::test0', 'input')
- self.assert_not_in('file1', output)
- # should list the file as unchanged
- output = self.cmd('create', '-v', '--list', '--filter=U', self.repository_location + '::test1', 'input')
- self.assert_in('file1', output)
- # should *not* list the file as changed
- output = self.cmd('create', '-v', '--filter=AM', self.repository_location + '::test2', 'input')
- self.assert_not_in('file1', output)
- # change the file
- self.create_regular_file('file1', size=1024 * 100)
- # should list the file as changed
- output = self.cmd('create', '-v', '--list', '--filter=AM', self.repository_location + '::test3', 'input')
- self.assert_in('file1', output)
- def test_create_read_special_broken_symlink(self):
- os.symlink('somewhere doesnt exist', os.path.join(self.input_path, 'link'))
- self.cmd('init', self.repository_location)
- archive = self.repository_location + '::test'
- self.cmd('create', '--read-special', archive, 'input')
- output = self.cmd('list', archive)
- assert 'input/link -> somewhere doesnt exist' in output
- # def test_cmdline_compatibility(self):
- # self.create_regular_file('file1', size=1024 * 80)
- # self.cmd('init', self.repository_location)
- # self.cmd('create', self.repository_location + '::test', 'input')
- # output = self.cmd('foo', self.repository_location, '--old')
- # self.assert_in('"--old" has been deprecated. Use "--new" instead', output)
- def test_prune_repository(self):
- self.cmd('init', self.repository_location)
- self.cmd('create', self.repository_location + '::test1', src_dir)
- self.cmd('create', self.repository_location + '::test2', src_dir)
- # these are not really a checkpoints, but they look like some:
- self.cmd('create', self.repository_location + '::test3.checkpoint', src_dir)
- self.cmd('create', self.repository_location + '::test3.checkpoint.1', src_dir)
- output = self.cmd('prune', '-v', '--list', '--dry-run', self.repository_location, '--keep-daily=2')
- self.assert_in('Would prune: test1', output)
- # must keep the latest non-checkpoint archive:
- self.assert_in('Keeping archive: test2', output)
- output = self.cmd('list', self.repository_location)
- self.assert_in('test1', output)
- self.assert_in('test2', output)
- self.assert_in('test3.checkpoint', output)
- self.assert_in('test3.checkpoint.1', output)
- self.cmd('prune', self.repository_location, '--keep-daily=2')
- output = self.cmd('list', self.repository_location)
- self.assert_not_in('test1', output)
- # the latest non-checkpoint archive must be still there:
- self.assert_in('test2', output)
- def test_prune_repository_save_space(self):
- self.cmd('init', self.repository_location)
- self.cmd('create', self.repository_location + '::test1', src_dir)
- self.cmd('create', self.repository_location + '::test2', src_dir)
- output = self.cmd('prune', '-v', '--list', '--dry-run', self.repository_location, '--keep-daily=2')
- self.assert_in('Keeping archive: test2', output)
- self.assert_in('Would prune: test1', output)
- output = self.cmd('list', self.repository_location)
- self.assert_in('test1', output)
- self.assert_in('test2', output)
- self.cmd('prune', '--save-space', self.repository_location, '--keep-daily=2')
- output = self.cmd('list', self.repository_location)
- self.assert_not_in('test1', output)
- self.assert_in('test2', output)
- def test_prune_repository_prefix(self):
- self.cmd('init', self.repository_location)
- self.cmd('create', self.repository_location + '::foo-2015-08-12-10:00', src_dir)
- self.cmd('create', self.repository_location + '::foo-2015-08-12-20:00', src_dir)
- self.cmd('create', self.repository_location + '::bar-2015-08-12-10:00', src_dir)
- self.cmd('create', self.repository_location + '::bar-2015-08-12-20:00', src_dir)
- output = self.cmd('prune', '-v', '--list', '--dry-run', self.repository_location, '--keep-daily=2', '--prefix=foo-')
- self.assert_in('Keeping archive: foo-2015-08-12-20:00', output)
- self.assert_in('Would prune: foo-2015-08-12-10:00', output)
- output = self.cmd('list', self.repository_location)
- self.assert_in('foo-2015-08-12-10:00', output)
- self.assert_in('foo-2015-08-12-20:00', output)
- self.assert_in('bar-2015-08-12-10:00', output)
- self.assert_in('bar-2015-08-12-20:00', output)
- self.cmd('prune', self.repository_location, '--keep-daily=2', '--prefix=foo-')
- output = self.cmd('list', self.repository_location)
- self.assert_not_in('foo-2015-08-12-10:00', output)
- self.assert_in('foo-2015-08-12-20:00', output)
- self.assert_in('bar-2015-08-12-10:00', output)
- self.assert_in('bar-2015-08-12-20:00', output)
- def test_list_prefix(self):
- self.cmd('init', self.repository_location)
- self.cmd('create', self.repository_location + '::test-1', src_dir)
- self.cmd('create', self.repository_location + '::something-else-than-test-1', src_dir)
- self.cmd('create', self.repository_location + '::test-2', src_dir)
- output = self.cmd('list', '--prefix=test-', self.repository_location)
- self.assert_in('test-1', output)
- self.assert_in('test-2', output)
- self.assert_not_in('something-else', output)
- def test_list_list_format(self):
- self.cmd('init', self.repository_location)
- test_archive = self.repository_location + '::test'
- self.cmd('create', test_archive, src_dir)
- output_1 = self.cmd('list', test_archive)
- output_2 = self.cmd('list', '--list-format', '{mode} {user:6} {group:6} {size:8d} {isomtime} {path}{extra}{NEWLINE}', test_archive)
- output_3 = self.cmd('list', '--list-format', '{mtime:%s} {path}{NEWLINE}', test_archive)
- self.assertEqual(output_1, output_2)
- self.assertNotEqual(output_1, output_3)
- def test_break_lock(self):
- self.cmd('init', self.repository_location)
- self.cmd('break-lock', self.repository_location)
- def test_usage(self):
- if self.FORK_DEFAULT:
- self.cmd(exit_code=0)
- self.cmd('-h', exit_code=0)
- else:
- self.assert_raises(SystemExit, lambda: self.cmd())
- self.assert_raises(SystemExit, lambda: self.cmd('-h'))
- def test_help(self):
- assert 'Borg' in self.cmd('help')
- assert 'patterns' in self.cmd('help', 'patterns')
- assert 'Initialize' in self.cmd('help', 'init')
- assert 'positional arguments' not in self.cmd('help', 'init', '--epilog-only')
- assert 'This command initializes' not in self.cmd('help', 'init', '--usage-only')
- @unittest.skipUnless(has_llfuse, 'llfuse not installed')
- def test_fuse(self):
- def has_noatime(some_file):
- atime_before = os.stat(some_file).st_atime_ns
- try:
- os.close(os.open(some_file, flags_noatime))
- except PermissionError:
- return False
- else:
- atime_after = os.stat(some_file).st_atime_ns
- noatime_used = flags_noatime != flags_normal
- return noatime_used and atime_before == atime_after
- self.cmd('init', self.repository_location)
- self.create_test_files()
- have_noatime = has_noatime('input/file1')
- self.cmd('create', self.repository_location + '::archive', 'input')
- self.cmd('create', self.repository_location + '::archive2', 'input')
- if has_lchflags:
- # remove the file we did not backup, so input and mount become equal
- os.remove(os.path.join('input', 'flagfile'))
- mountpoint = os.path.join(self.tmpdir, 'mountpoint')
- # mount the whole repository, archive contents shall show up in archivename subdirs of mountpoint:
- with self.fuse_mount(self.repository_location, mountpoint):
- # bsdflags are not supported by the FUSE mount
- # we also ignore xattrs here, they are tested separately
- self.assert_dirs_equal(self.input_path, os.path.join(mountpoint, 'archive', 'input'),
- ignore_bsdflags=True, ignore_xattrs=True)
- self.assert_dirs_equal(self.input_path, os.path.join(mountpoint, 'archive2', 'input'),
- ignore_bsdflags=True, ignore_xattrs=True)
- # mount only 1 archive, its contents shall show up directly in mountpoint:
- with self.fuse_mount(self.repository_location + '::archive', mountpoint):
- self.assert_dirs_equal(self.input_path, os.path.join(mountpoint, 'input'),
- ignore_bsdflags=True, ignore_xattrs=True)
- # regular file
- in_fn = 'input/file1'
- out_fn = os.path.join(mountpoint, 'input', 'file1')
- # stat
- sti1 = os.stat(in_fn)
- sto1 = os.stat(out_fn)
- assert sti1.st_mode == sto1.st_mode
- assert sti1.st_uid == sto1.st_uid
- assert sti1.st_gid == sto1.st_gid
- assert sti1.st_size == sto1.st_size
- if have_noatime:
- assert sti1.st_atime == sto1.st_atime
- assert sti1.st_ctime == sto1.st_ctime
- assert sti1.st_mtime == sto1.st_mtime
- # note: there is another hardlink to this, see below
- assert sti1.st_nlink == sto1.st_nlink == 2
- # read
- with open(in_fn, 'rb') as in_f, open(out_fn, 'rb') as out_f:
- assert in_f.read() == out_f.read()
- # hardlink (to 'input/file1')
- in_fn = 'input/hardlink'
- out_fn = os.path.join(mountpoint, 'input', 'hardlink')
- sti2 = os.stat(in_fn)
- sto2 = os.stat(out_fn)
- assert sti2.st_nlink == sto2.st_nlink == 2
- assert sto1.st_ino == sto2.st_ino
- # symlink
- in_fn = 'input/link1'
- out_fn = os.path.join(mountpoint, 'input', 'link1')
- sti = os.stat(in_fn, follow_symlinks=False)
- sto = os.stat(out_fn, follow_symlinks=False)
- assert stat.S_ISLNK(sti.st_mode)
- assert stat.S_ISLNK(sto.st_mode)
- assert os.readlink(in_fn) == os.readlink(out_fn)
- # FIFO
- out_fn = os.path.join(mountpoint, 'input', 'fifo1')
- sto = os.stat(out_fn)
- assert stat.S_ISFIFO(sto.st_mode)
- # list/read xattrs
- try:
- in_fn = 'input/fusexattr'
- out_fn = os.path.join(mountpoint, 'input', 'fusexattr')
- if not xattr.XATTR_FAKEROOT and xattr.is_enabled(self.input_path):
- assert no_selinux(xattr.listxattr(out_fn)) == ['user.foo', ]
- assert xattr.getxattr(out_fn, 'user.foo') == b'bar'
- else:
- assert xattr.listxattr(out_fn) == []
- try:
- xattr.getxattr(out_fn, 'user.foo')
- except OSError as e:
- assert e.errno == llfuse.ENOATTR
- else:
- assert False, "expected OSError(ENOATTR), but no error was raised"
- except OSError as err:
- if sys.platform.startswith(('freebsd', )) and err.errno == errno.ENOTSUP:
- # some systems have no xattr support on FUSE
- pass
- else:
- raise
- @unittest.skipUnless(has_llfuse, 'llfuse not installed')
- def test_fuse_allow_damaged_files(self):
- self.cmd('init', self.repository_location)
- self.create_src_archive('archive')
- # Get rid of a chunk and repair it
- archive, repository = self.open_archive('archive')
- with repository:
- for item in archive.iter_items():
- if item[b'path'].endswith('testsuite/archiver.py'):
- repository.delete(item[b'chunks'][-1][0])
- path = item[b'path'] # store full path for later
- break
- else:
- assert False # missed the file
- repository.commit()
- self.cmd('check', '--repair', self.repository_location, exit_code=0)
- mountpoint = os.path.join(self.tmpdir, 'mountpoint')
- with self.fuse_mount(self.repository_location + '::archive', mountpoint):
- with pytest.raises(OSError) as excinfo:
- open(os.path.join(mountpoint, path))
- assert excinfo.value.errno == errno.EIO
- with self.fuse_mount(self.repository_location + '::archive', mountpoint, '-o', 'allow_damaged_files'):
- open(os.path.join(mountpoint, path)).close()
- def verify_aes_counter_uniqueness(self, method):
- seen = set() # Chunks already seen
- used = set() # counter values already used
- def verify_uniqueness():
- with Repository(self.repository_path) as repository:
- for id, _ in repository.open_index(repository.get_transaction_id()).iteritems():
- data = repository.get(id)
- hash = sha256(data).digest()
- if hash not in seen:
- seen.add(hash)
- num_blocks = num_aes_blocks(len(data) - 41)
- nonce = bytes_to_long(data[33:41])
- for counter in range(nonce, nonce + num_blocks):
- self.assert_not_in(counter, used)
- used.add(counter)
- self.create_test_files()
- os.environ['BORG_PASSPHRASE'] = 'passphrase'
- self.cmd('init', '--encryption=' + method, self.repository_location)
- verify_uniqueness()
- self.cmd('create', self.repository_location + '::test', 'input')
- verify_uniqueness()
- self.cmd('create', self.repository_location + '::test.2', 'input')
- verify_uniqueness()
- self.cmd('delete', self.repository_location + '::test.2')
- verify_uniqueness()
- self.assert_equal(used, set(range(len(used))))
- def test_aes_counter_uniqueness_keyfile(self):
- self.verify_aes_counter_uniqueness('keyfile')
- def test_aes_counter_uniqueness_passphrase(self):
- self.verify_aes_counter_uniqueness('repokey')
- def test_debug_dump_archive_items(self):
- self.create_test_files()
- self.cmd('init', self.repository_location)
- self.cmd('create', self.repository_location + '::test', 'input')
- with changedir('output'):
- output = self.cmd('debug-dump-archive-items', self.repository_location + '::test')
- output_dir = sorted(os.listdir('output'))
- assert len(output_dir) > 0 and output_dir[0].startswith('000000_')
- assert 'Done.' in output
- def test_debug_dump_repo_objs(self):
- self.create_test_files()
- self.cmd('init', self.repository_location)
- self.cmd('create', self.repository_location + '::test', 'input')
- with changedir('output'):
- output = self.cmd('debug-dump-repo-objs', self.repository_location)
- output_dir = sorted(os.listdir('output'))
- assert len(output_dir) > 0 and output_dir[0].startswith('000000_')
- assert 'Done.' in output
- def test_debug_put_get_delete_obj(self):
- self.cmd('init', self.repository_location)
- data = b'some data'
- hexkey = sha256(data).hexdigest()
- self.create_regular_file('file', contents=data)
- output = self.cmd('debug-put-obj', self.repository_location, 'input/file')
- assert hexkey in output
- output = self.cmd('debug-get-obj', self.repository_location, hexkey, 'output/file')
- assert hexkey in output
- with open('output/file', 'rb') as f:
- data_read = f.read()
- assert data == data_read
- output = self.cmd('debug-delete-obj', self.repository_location, hexkey)
- assert "deleted" in output
- output = self.cmd('debug-delete-obj', self.repository_location, hexkey)
- assert "not found" in output
- output = self.cmd('debug-delete-obj', self.repository_location, 'invalid')
- assert "is invalid" in output
- def test_key_export_keyfile(self):
- export_file = self.output_path + '/exported'
- self.cmd('init', self.repository_location, '--encryption', 'keyfile')
- repo_id = self._extract_repository_id(self.repository_path)
- self.cmd('key', 'export', self.repository_location, export_file)
- with open(export_file, 'r') as fd:
- export_contents = fd.read()
- assert export_contents.startswith('BORG_KEY ' + bin_to_hex(repo_id) + '\n')
- key_file = self.keys_path + '/' + os.listdir(self.keys_path)[0]
- with open(key_file, 'r') as fd:
- key_contents = fd.read()
- assert key_contents == export_contents
- os.unlink(key_file)
- self.cmd('key', 'import', self.repository_location, export_file)
- with open(key_file, 'r') as fd:
- key_contents2 = fd.read()
- assert key_contents2 == key_contents
- def test_key_export_repokey(self):
- export_file = self.output_path + '/exported'
- self.cmd('init', self.repository_location, '--encryption', 'repokey')
- repo_id = self._extract_repository_id(self.repository_path)
- self.cmd('key', 'export', self.repository_location, export_file)
- with open(export_file, 'r') as fd:
- export_contents = fd.read()
- assert export_contents.startswith('BORG_KEY ' + bin_to_hex(repo_id) + '\n')
- with Repository(self.repository_path) as repository:
- repo_key = RepoKey(repository)
- repo_key.load(None, Passphrase.env_passphrase())
- backup_key = KeyfileKey(key.KeyTestCase.MockRepository())
- backup_key.load(export_file, Passphrase.env_passphrase())
- assert repo_key.enc_key == backup_key.enc_key
- with Repository(self.repository_path) as repository:
- repository.save_key(b'')
- self.cmd('key', 'import', self.repository_location, export_file)
- with Repository(self.repository_path) as repository:
- repo_key2 = RepoKey(repository)
- repo_key2.load(None, Passphrase.env_passphrase())
- assert repo_key2.enc_key == repo_key2.enc_key
- def test_key_import_errors(self):
- export_file = self.output_path + '/exported'
- self.cmd('init', self.repository_location, '--encryption', 'keyfile')
- self.cmd('key', 'import', self.repository_location, export_file, exit_code=EXIT_ERROR)
- with open(export_file, 'w') as fd:
- fd.write('something not a key\n')
- if self.FORK_DEFAULT:
- self.cmd('key', 'import', self.repository_location, export_file, exit_code=2)
- else:
- self.assert_raises(NotABorgKeyFile, lambda: self.cmd('key', 'import', self.repository_location, export_file))
- with open(export_file, 'w') as fd:
- fd.write('BORG_KEY a0a0a0\n')
- if self.FORK_DEFAULT:
- self.cmd('key', 'import', self.repository_location, export_file, exit_code=2)
- else:
- self.assert_raises(RepoIdMismatch, lambda: self.cmd('key', 'import', self.repository_location, export_file))
- def test_key_export_paperkey(self):
- repo_id = 'e294423506da4e1ea76e8dcdf1a3919624ae3ae496fddf905610c351d3f09239'
- export_file = self.output_path + '/exported'
- self.cmd('init', self.repository_location, '--encryption', 'keyfile')
- self._set_repository_id(self.repository_path, unhexlify(repo_id))
- key_file = self.keys_path + '/' + os.listdir(self.keys_path)[0]
- with open(key_file, 'w') as fd:
- fd.write(KeyfileKey.FILE_ID + ' ' + repo_id + '\n')
- fd.write(b2a_base64(b'abcdefghijklmnopqrstu').decode())
- self.cmd('key', 'export', '--paper', self.repository_location, export_file)
- with open(export_file, 'r') as fd:
- export_contents = fd.read()
- assert export_contents == """To restore key use borg key import --paper /path/to/repo
- BORG PAPER KEY v1
- id: 2 / e29442 3506da 4e1ea7 / 25f62a 5a3d41 - 02
- 1: 616263 646566 676869 6a6b6c 6d6e6f 707172 - 6d
- 2: 737475 - 88
- """
- @unittest.skipUnless('binary' in BORG_EXES, 'no borg.exe available')
- class ArchiverTestCaseBinary(ArchiverTestCase):
- EXE = 'borg.exe'
- FORK_DEFAULT = True
- @unittest.skip('test_basic_functionality seems incompatible with fakeroot and/or the binary.')
- def test_basic_functionality(self):
- pass
- @unittest.skip('test_overwrite seems incompatible with fakeroot and/or the binary.')
- def test_overwrite(self):
- pass
- def test_fuse(self):
- if fakeroot_detected():
- unittest.skip('test_fuse with the binary is not compatible with fakeroot')
- else:
- super().test_fuse()
- class ArchiverCheckTestCase(ArchiverTestCaseBase):
- def setUp(self):
- super().setUp()
- with patch.object(ChunkBuffer, 'BUFFER_SIZE', 10):
- self.cmd('init', self.repository_location)
- self.create_src_archive('archive1')
- self.create_src_archive('archive2')
- def test_check_usage(self):
- output = self.cmd('check', '-v', self.repository_location, exit_code=0)
- self.assert_in('Starting repository check', output)
- self.assert_in('Starting archive consistency check', output)
- output = self.cmd('check', '-v', '--repository-only', self.repository_location, exit_code=0)
- self.assert_in('Starting repository check', output)
- self.assert_not_in('Starting archive consistency check', output)
- output = self.cmd('check', '-v', '--archives-only', self.repository_location, exit_code=0)
- self.assert_not_in('Starting repository check', output)
- self.assert_in('Starting archive consistency check', output)
- output = self.cmd('check', '-v', '--archives-only', '--prefix=archive2', self.repository_location, exit_code=0)
- self.assert_not_in('archive1', output)
- def test_missing_file_chunk(self):
- archive, repository = self.open_archive('archive1')
- with repository:
- for item in archive.iter_items():
- if item[b'path'].endswith('testsuite/archiver.py'):
- valid_chunks = item[b'chunks']
- killed_chunk = valid_chunks[-1]
- repository.delete(killed_chunk[0])
- break
- else:
- self.assert_true(False) # should not happen
- repository.commit()
- self.cmd('check', self.repository_location, exit_code=1)
- output = self.cmd('check', '--repair', self.repository_location, exit_code=0)
- self.assert_in('New missing file chunk detected', output)
- self.cmd('check', self.repository_location, exit_code=0)
- # check that the file in the old archives has now a different chunk list without the killed chunk
- for archive_name in ('archive1', 'archive2'):
- archive, repository = self.open_archive(archive_name)
- with repository:
- for item in archive.iter_items():
- if item[b'path'].endswith('testsuite/archiver.py'):
- self.assert_not_equal(valid_chunks, item[b'chunks'])
- self.assert_not_in(killed_chunk, item[b'chunks'])
- break
- else:
- self.assert_true(False) # should not happen
- # do a fresh backup (that will include the killed chunk)
- with patch.object(ChunkBuffer, 'BUFFER_SIZE', 10):
- self.create_src_archive('archive3')
- # check should be able to heal the file now:
- output = self.cmd('check', '-v', '--repair', self.repository_location, exit_code=0)
- self.assert_in('Healed previously missing file chunk', output)
- self.assert_in('testsuite/archiver.py: Completely healed previously damaged file!', output)
- # check that the file in the old archives has the correct chunks again
- for archive_name in ('archive1', 'archive2'):
- archive, repository = self.open_archive(archive_name)
- with repository:
- for item in archive.iter_items():
- if item[b'path'].endswith('testsuite/archiver.py'):
- self.assert_equal(valid_chunks, item[b'chunks'])
- break
- else:
- self.assert_true(False) # should not happen
- def test_missing_archive_item_chunk(self):
- archive, repository = self.open_archive('archive1')
- with repository:
- repository.delete(archive.metadata[b'items'][-5])
- repository.commit()
- self.cmd('check', self.repository_location, exit_code=1)
- self.cmd('check', '--repair', self.repository_location, exit_code=0)
- self.cmd('check', self.repository_location, exit_code=0)
- def test_missing_archive_metadata(self):
- archive, repository = self.open_archive('archive1')
- with repository:
- repository.delete(archive.id)
- repository.commit()
- self.cmd('check', self.repository_location, exit_code=1)
- self.cmd('check', '--repair', self.repository_location, exit_code=0)
- self.cmd('check', self.repository_location, exit_code=0)
- def test_missing_manifest(self):
- archive, repository = self.open_archive('archive1')
- with repository:
- repository.delete(Manifest.MANIFEST_ID)
- repository.commit()
- self.cmd('check', self.repository_location, exit_code=1)
- output = self.cmd('check', '-v', '--repair', self.repository_location, exit_code=0)
- self.assert_in('archive1', output)
- self.assert_in('archive2', output)
- self.cmd('check', self.repository_location, exit_code=0)
- def test_corrupted_manifest(self):
- archive, repository = self.open_archive('archive1')
- with repository:
- manifest = repository.get(Manifest.MANIFEST_ID)
- corrupted_manifest = manifest + b'corrupted!'
- repository.put(Manifest.MANIFEST_ID, corrupted_manifest)
- repository.commit()
- self.cmd('check', self.repository_location, exit_code=1)
- output = self.cmd('check', '-v', '--repair', self.repository_location, exit_code=0)
- self.assert_in('archive1', output)
- self.assert_in('archive2', output)
- self.cmd('check', self.repository_location, exit_code=0)
- def test_manifest_rebuild_corrupted_chunk(self):
- archive, repository = self.open_archive('archive1')
- with repository:
- manifest = repository.get(Manifest.MANIFEST_ID)
- corrupted_manifest = manifest + b'corrupted!'
- repository.put(Manifest.MANIFEST_ID, corrupted_manifest)
- chunk = repository.get(archive.id)
- corrupted_chunk = chunk + b'corrupted!'
- repository.put(archive.id, corrupted_chunk)
- repository.commit()
- self.cmd('check', self.repository_location, exit_code=1)
- output = self.cmd('check', '-v', '--repair', self.repository_location, exit_code=0)
- self.assert_in('archive2', output)
- self.cmd('check', self.repository_location, exit_code=0)
- def test_manifest_rebuild_duplicate_archive(self):
- archive, repository = self.open_archive('archive1')
- key = archive.key
- with repository:
- manifest = repository.get(Manifest.MANIFEST_ID)
- corrupted_manifest = manifest + b'corrupted!'
- repository.put(Manifest.MANIFEST_ID, corrupted_manifest)
- archive = msgpack.packb({
- 'cmdline': [],
- 'items': [],
- 'hostname': 'foo',
- 'username': 'bar',
- 'name': 'archive1',
- 'time': '2016-12-15T18:49:51.849711',
- 'version': 1,
- })
- archive_id = key.id_hash(archive)
- repository.put(archive_id, key.encrypt(archive))
- repository.commit()
- self.cmd('check', self.repository_location, exit_code=1)
- self.cmd('check', '--repair', self.repository_location, exit_code=0)
- output = self.cmd('list', self.repository_location)
- self.assert_in('archive1', output)
- self.assert_in('archive1.1', output)
- self.assert_in('archive2', output)
- def test_extra_chunks(self):
- self.cmd('check', self.repository_location, exit_code=0)
- with Repository(self.repository_location, exclusive=True) as repository:
- repository.put(b'01234567890123456789012345678901', b'xxxx')
- repository.commit()
- self.cmd('check', self.repository_location, exit_code=1)
- self.cmd('check', self.repository_location, exit_code=1)
- self.cmd('check', '--repair', self.repository_location, exit_code=0)
- self.cmd('check', self.repository_location, exit_code=0)
- self.cmd('extract', '--dry-run', self.repository_location + '::archive1', exit_code=0)
- def test_empty_repository(self):
- with Repository(self.repository_location, exclusive=True) as repository:
- for id_ in repository.list():
- repository.delete(id_)
- repository.commit()
- self.cmd('check', self.repository_location, exit_code=1)
- def test_attic013_acl_bug(self):
- # Attic up to release 0.13 contained a bug where every item unintentionally received
- # a b'acl'=None key-value pair.
- # This bug can still live on in Borg repositories (through borg upgrade).
- archive, repository = self.open_archive('archive1')
- with repository:
- manifest, key = Manifest.load(repository)
- with Cache(repository, key, manifest) as cache:
- archive = Archive(repository, key, manifest, '0.13', cache=cache, create=True)
- archive.items_buffer.add({
- # path and mtime are required.
- b'path': '1234',
- b'mtime': 0,
- # acl is the offending key.
- b'acl': None
- })
- archive.save()
- self.cmd('check', self.repository_location, exit_code=0)
- class ManifestAuthenticationTest(ArchiverTestCaseBase):
- def spoof_manifest(self, repository):
- with repository:
- _, key = Manifest.load(repository)
- repository.put(Manifest.MANIFEST_ID, key.encrypt(msgpack.packb({
- 'version': 1,
- 'archives': {},
- 'config': {},
- 'timestamp': (datetime.utcnow() + timedelta(days=1)).isoformat(),
- })))
- repository.commit()
- def test_fresh_init_tam_required(self):
- self.cmd('init', self.repository_location)
- repository = Repository(self.repository_path, exclusive=True)
- with repository:
- manifest, key = Manifest.load(repository)
- repository.put(Manifest.MANIFEST_ID, key.encrypt(msgpack.packb({
- 'version': 1,
- 'archives': {},
- 'timestamp': (datetime.utcnow() + timedelta(days=1)).isoformat(),
- })))
- repository.commit()
- with pytest.raises(TAMRequiredError):
- self.cmd('list', self.repository_location)
- def test_not_required(self):
- self.cmd('init', self.repository_location)
- self.create_src_archive('archive1234')
- repository = Repository(self.repository_path, exclusive=True)
- with repository:
- shutil.rmtree(get_security_dir(bin_to_hex(repository.id)))
- _, key = Manifest.load(repository)
- key.tam_required = False
- key.change_passphrase(key._passphrase)
- manifest = msgpack.unpackb(key.decrypt(None, repository.get(Manifest.MANIFEST_ID)))
- del manifest[b'tam']
- repository.put(Manifest.MANIFEST_ID, key.encrypt(msgpack.packb(manifest)))
- repository.commit()
- output = self.cmd('list', '--debug', self.repository_location)
- assert 'archive1234' in output
- assert 'TAM not found and not required' in output
- # Run upgrade
- self.cmd('upgrade', '--tam', self.repository_location)
- # Manifest must be authenticated now
- output = self.cmd('list', '--debug', self.repository_location)
- assert 'archive1234' in output
- assert 'TAM-verified manifest' in output
- # Try to spoof / modify pre-1.0.9
- self.spoof_manifest(repository)
- # Fails
- with pytest.raises(TAMRequiredError):
- self.cmd('list', self.repository_location)
- # Force upgrade
- self.cmd('upgrade', '--tam', '--force', self.repository_location)
- self.cmd('list', self.repository_location)
- def test_disable(self):
- self.cmd('init', self.repository_location)
- self.create_src_archive('archive1234')
- self.cmd('upgrade', '--disable-tam', self.repository_location)
- repository = Repository(self.repository_path, exclusive=True)
- self.spoof_manifest(repository)
- assert not self.cmd('list', self.repository_location)
- def test_disable2(self):
- self.cmd('init', self.repository_location)
- self.create_src_archive('archive1234')
- repository = Repository(self.repository_path, exclusive=True)
- self.spoof_manifest(repository)
- self.cmd('upgrade', '--disable-tam', self.repository_location)
- assert not self.cmd('list', self.repository_location)
- @pytest.mark.skipif(sys.platform == 'cygwin', reason='remote is broken on cygwin and hangs')
- class RemoteArchiverTestCase(ArchiverTestCase):
- prefix = '__testsuite__:'
- def test_remote_repo_restrict_to_path(self):
- # restricted to repo directory itself:
- with patch.object(RemoteRepository, 'extra_test_args', ['--restrict-to-path', self.repository_path]):
- self.cmd('init', self.repository_location)
- # restricted to repo directory itself, fail for other directories with same prefix:
- with patch.object(RemoteRepository, 'extra_test_args', ['--restrict-to-path', self.repository_path]):
- self.assert_raises(PathNotAllowed, lambda: self.cmd('init', self.repository_location + '_0'))
- # restricted to a completely different path:
- with patch.object(RemoteRepository, 'extra_test_args', ['--restrict-to-path', '/foo']):
- self.assert_raises(PathNotAllowed, lambda: self.cmd('init', self.repository_location + '_1'))
- path_prefix = os.path.dirname(self.repository_path)
- # restrict to repo directory's parent directory:
- with patch.object(RemoteRepository, 'extra_test_args', ['--restrict-to-path', path_prefix]):
- self.cmd('init', self.repository_location + '_2')
- # restrict to repo directory's parent directory and another directory:
- with patch.object(RemoteRepository, 'extra_test_args', ['--restrict-to-path', '/foo', '--restrict-to-path', path_prefix]):
- self.cmd('init', self.repository_location + '_3')
- @unittest.skip('only works locally')
- def test_debug_put_get_delete_obj(self):
- pass
- def test_strip_components_doesnt_leak(self):
- self.cmd('init', self.repository_location)
- self.create_regular_file('dir/file', contents=b"test file contents 1")
- self.create_regular_file('dir/file2', contents=b"test file contents 2")
- self.create_regular_file('skipped-file1', contents=b"test file contents 3")
- self.create_regular_file('skipped-file2', contents=b"test file contents 4")
- self.create_regular_file('skipped-file3', contents=b"test file contents 5")
- self.cmd('create', self.repository_location + '::test', 'input')
- marker = 'cached responses left in RemoteRepository'
- with changedir('output'):
- res = self.cmd('extract', "--debug", self.repository_location + '::test', '--strip-components', '3')
- self.assert_true(marker not in res)
- with self.assert_creates_file('file'):
- res = self.cmd('extract', "--debug", self.repository_location + '::test', '--strip-components', '2')
- self.assert_true(marker not in res)
- with self.assert_creates_file('dir/file'):
- res = self.cmd('extract', "--debug", self.repository_location + '::test', '--strip-components', '1')
- self.assert_true(marker not in res)
- with self.assert_creates_file('input/dir/file'):
- res = self.cmd('extract', "--debug", self.repository_location + '::test', '--strip-components', '0')
- self.assert_true(marker not in res)
- def test_get_args():
- archiver = Archiver()
- # everything normal:
- # first param is argv as produced by ssh forced command,
- # second param is like from SSH_ORIGINAL_COMMAND env variable
- args = archiver.get_args(['borg', 'serve', '--restrict-to-path=/p1', '--restrict-to-path=/p2', ],
- 'borg serve --info --umask=0027')
- assert args.func == archiver.do_serve
- assert args.restrict_to_paths == ['/p1', '/p2']
- assert args.umask == 0o027
- assert args.log_level == 'info'
- # trying to cheat - break out of path restriction
- args = archiver.get_args(['borg', 'serve', '--restrict-to-path=/p1', '--restrict-to-path=/p2', ],
- 'borg serve --restrict-to-path=/')
- assert args.restrict_to_paths == ['/p1', '/p2']
- # trying to cheat - try to execute different subcommand
- args = archiver.get_args(['borg', 'serve', '--restrict-to-path=/p1', '--restrict-to-path=/p2', ],
- 'borg init /')
- assert args.func == archiver.do_serve
- class TestBuildFilter:
- def test_basic(self):
- matcher = PatternMatcher()
- matcher.add([parse_pattern('included')], True)
- filter = Archiver.build_filter(matcher)
- assert filter({b'path': 'included'})
- assert filter({b'path': 'included/file'})
- assert not filter({b'path': 'something else'})
- def test_empty(self):
- matcher = PatternMatcher(fallback=True)
- filter = Archiver.build_filter(matcher)
- assert filter({b'path': 'anything'})
- def test_strip_components(self):
- matcher = PatternMatcher(fallback=True)
- filter = Archiver.build_filter(matcher, strip_components=1)
- assert not filter({b'path': 'shallow'})
- assert not filter({b'path': 'shallow/'}) # can this even happen? paths are normalized...
- assert filter({b'path': 'deep enough/file'})
- assert filter({b'path': 'something/dir/file'})
|