2019-07-25 01:21:37 -04:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2016-12-07 07:39:19 -05:00
|
|
|
require 'spec_helper'
|
|
|
|
|
2020-06-24 05:08:32 -04:00
|
|
|
RSpec.describe Backup::Manager do
|
2017-01-09 12:38:53 -05:00
|
|
|
include StubENV
|
|
|
|
|
|
|
|
let(:progress) { StringIO.new }
|
|
|
|
|
2018-05-24 10:58:25 -04:00
|
|
|
subject { described_class.new(progress) }
|
|
|
|
|
2017-01-09 12:38:53 -05:00
|
|
|
before do
|
|
|
|
allow(progress).to receive(:puts)
|
|
|
|
allow(progress).to receive(:print)
|
|
|
|
|
|
|
|
@old_progress = $progress # rubocop:disable Style/GlobalVars
|
|
|
|
$progress = progress # rubocop:disable Style/GlobalVars
|
|
|
|
end
|
|
|
|
|
|
|
|
after do
|
|
|
|
$progress = @old_progress # rubocop:disable Style/GlobalVars
|
|
|
|
end
|
2016-12-07 07:39:19 -05:00
|
|
|
|
2019-09-23 14:06:14 -04:00
|
|
|
describe '#pack' do
|
|
|
|
let(:backup_contents) { ['backup_contents'] }
|
|
|
|
let(:tar_system_options) { { out: [tar_file, 'w', Gitlab.config.backup.archive_permissions] } }
|
|
|
|
let(:tar_cmdline) { ['tar', '-cf', '-', *backup_contents, tar_system_options] }
|
|
|
|
|
|
|
|
let(:backup_information) do
|
|
|
|
{
|
|
|
|
backup_created_at: Time.zone.parse('2019-01-01'),
|
|
|
|
gitlab_version: '12.3'
|
|
|
|
}
|
|
|
|
end
|
|
|
|
|
|
|
|
before do
|
|
|
|
allow(ActiveRecord::Base.connection).to receive(:reconnect!)
|
|
|
|
allow(Kernel).to receive(:system).and_return(true)
|
|
|
|
|
|
|
|
allow(subject).to receive(:backup_contents).and_return(backup_contents)
|
|
|
|
allow(subject).to receive(:backup_information).and_return(backup_information)
|
|
|
|
allow(subject).to receive(:upload)
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when BACKUP is not set' do
|
|
|
|
let(:tar_file) { '1546300800_2019_01_01_12.3_gitlab_backup.tar' }
|
|
|
|
|
|
|
|
it 'uses the default tar file name' do
|
|
|
|
subject.pack
|
|
|
|
|
|
|
|
expect(Kernel).to have_received(:system).with(*tar_cmdline)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when BACKUP is set' do
|
|
|
|
let(:tar_file) { 'custom_gitlab_backup.tar' }
|
|
|
|
|
|
|
|
it 'uses the given value as tar file name' do
|
|
|
|
stub_env('BACKUP', '/ignored/path/custom')
|
|
|
|
subject.pack
|
|
|
|
|
|
|
|
expect(Kernel).to have_received(:system).with(*tar_cmdline)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-01-09 12:38:53 -05:00
|
|
|
describe '#remove_old' do
|
2016-12-07 07:39:19 -05:00
|
|
|
let(:files) do
|
|
|
|
[
|
2017-05-23 07:34:22 -04:00
|
|
|
'1451606400_2016_01_01_1.2.3_gitlab_backup.tar',
|
|
|
|
'1451520000_2015_12_31_4.5.6_gitlab_backup.tar',
|
2017-09-18 06:50:09 -04:00
|
|
|
'1451520000_2015_12_31_4.5.6-pre_gitlab_backup.tar',
|
|
|
|
'1451520000_2015_12_31_4.5.6-rc1_gitlab_backup.tar',
|
2017-09-21 08:00:58 -04:00
|
|
|
'1451520000_2015_12_31_4.5.6-pre-ee_gitlab_backup.tar',
|
2017-05-23 07:34:22 -04:00
|
|
|
'1451510000_2015_12_30_gitlab_backup.tar',
|
2016-12-07 07:39:19 -05:00
|
|
|
'1450742400_2015_12_22_gitlab_backup.tar',
|
|
|
|
'1449878400_gitlab_backup.tar',
|
|
|
|
'1449014400_gitlab_backup.tar',
|
|
|
|
'manual_gitlab_backup.tar'
|
|
|
|
]
|
|
|
|
end
|
|
|
|
|
|
|
|
before do
|
|
|
|
allow(Dir).to receive(:chdir).and_yield
|
|
|
|
allow(Dir).to receive(:glob).and_return(files)
|
|
|
|
allow(FileUtils).to receive(:rm)
|
2017-05-23 07:34:22 -04:00
|
|
|
allow(Time).to receive(:now).and_return(Time.utc(2016))
|
2016-12-07 07:39:19 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
context 'when keep_time is zero' do
|
|
|
|
before do
|
|
|
|
allow(Gitlab.config.backup).to receive(:keep_time).and_return(0)
|
|
|
|
|
|
|
|
subject.remove_old
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'removes no files' do
|
|
|
|
expect(FileUtils).not_to have_received(:rm)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'prints a skipped message' do
|
|
|
|
expect(progress).to have_received(:puts).with('skipping')
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-09-18 06:50:09 -04:00
|
|
|
context 'when no valid file is found' do
|
|
|
|
let(:files) do
|
|
|
|
[
|
|
|
|
'14516064000_2016_01_01_1.2.3_gitlab_backup.tar',
|
|
|
|
'foo_1451520000_2015_12_31_4.5.6_gitlab_backup.tar',
|
|
|
|
'1451520000_2015_12_31_4.5.6-foo_gitlab_backup.tar'
|
|
|
|
]
|
|
|
|
end
|
|
|
|
|
|
|
|
before do
|
|
|
|
allow(Gitlab.config.backup).to receive(:keep_time).and_return(1)
|
|
|
|
|
|
|
|
subject.remove_old
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'removes no files' do
|
|
|
|
expect(FileUtils).not_to have_received(:rm)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'prints a done message' do
|
|
|
|
expect(progress).to have_received(:puts).with('done. (0 removed)')
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2016-12-07 07:39:19 -05:00
|
|
|
context 'when there are no files older than keep_time' do
|
|
|
|
before do
|
2017-05-23 07:34:22 -04:00
|
|
|
# Set to 30 days
|
2016-12-07 07:39:19 -05:00
|
|
|
allow(Gitlab.config.backup).to receive(:keep_time).and_return(2592000)
|
|
|
|
|
|
|
|
subject.remove_old
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'removes no files' do
|
|
|
|
expect(FileUtils).not_to have_received(:rm)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'prints a done message' do
|
|
|
|
expect(progress).to have_received(:puts).with('done. (0 removed)')
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when keep_time is set to remove files' do
|
|
|
|
before do
|
2017-05-23 07:34:22 -04:00
|
|
|
# Set to 1 second
|
2016-12-07 07:39:19 -05:00
|
|
|
allow(Gitlab.config.backup).to receive(:keep_time).and_return(1)
|
|
|
|
|
|
|
|
subject.remove_old
|
|
|
|
end
|
|
|
|
|
2017-05-23 05:15:05 -04:00
|
|
|
it 'removes matching files with a human-readable versioned timestamp' do
|
2016-12-07 07:39:19 -05:00
|
|
|
expect(FileUtils).to have_received(:rm).with(files[1])
|
2017-05-23 07:34:22 -04:00
|
|
|
expect(FileUtils).to have_received(:rm).with(files[2])
|
2016-12-07 07:39:19 -05:00
|
|
|
expect(FileUtils).to have_received(:rm).with(files[3])
|
|
|
|
end
|
|
|
|
|
2017-09-21 08:00:58 -04:00
|
|
|
it 'removes matching files with a human-readable versioned timestamp with tagged EE' do
|
2017-05-23 07:34:22 -04:00
|
|
|
expect(FileUtils).to have_received(:rm).with(files[4])
|
2017-09-21 08:00:58 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'removes matching files with a human-readable non-versioned timestamp' do
|
2017-05-23 05:15:05 -04:00
|
|
|
expect(FileUtils).to have_received(:rm).with(files[5])
|
2017-09-21 08:00:58 -04:00
|
|
|
expect(FileUtils).to have_received(:rm).with(files[6])
|
2017-05-23 05:15:05 -04:00
|
|
|
end
|
|
|
|
|
2017-09-18 06:50:09 -04:00
|
|
|
it 'removes matching files without a human-readable timestamp' do
|
|
|
|
expect(FileUtils).to have_received(:rm).with(files[7])
|
2017-09-21 08:00:58 -04:00
|
|
|
expect(FileUtils).to have_received(:rm).with(files[8])
|
2017-09-18 06:50:09 -04:00
|
|
|
end
|
|
|
|
|
2016-12-07 07:39:19 -05:00
|
|
|
it 'does not remove files that are not old enough' do
|
|
|
|
expect(FileUtils).not_to have_received(:rm).with(files[0])
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'does not remove non-matching files' do
|
2017-09-21 08:00:58 -04:00
|
|
|
expect(FileUtils).not_to have_received(:rm).with(files[9])
|
2016-12-07 07:39:19 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'prints a done message' do
|
2017-09-21 08:00:58 -04:00
|
|
|
expect(progress).to have_received(:puts).with('done. (8 removed)')
|
2016-12-07 07:39:19 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when removing a file fails' do
|
|
|
|
let(:file) { files[1] }
|
|
|
|
let(:message) { "Permission denied @ unlink_internal - #{file}" }
|
|
|
|
|
|
|
|
before do
|
|
|
|
allow(Gitlab.config.backup).to receive(:keep_time).and_return(1)
|
|
|
|
allow(FileUtils).to receive(:rm).with(file).and_raise(Errno::EACCES, message)
|
|
|
|
|
|
|
|
subject.remove_old
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'removes the remaining expected files' do
|
|
|
|
expect(FileUtils).to have_received(:rm).with(files[4])
|
2017-05-23 07:34:22 -04:00
|
|
|
expect(FileUtils).to have_received(:rm).with(files[5])
|
2017-09-18 06:50:09 -04:00
|
|
|
expect(FileUtils).to have_received(:rm).with(files[6])
|
|
|
|
expect(FileUtils).to have_received(:rm).with(files[7])
|
2017-09-21 08:00:58 -04:00
|
|
|
expect(FileUtils).to have_received(:rm).with(files[8])
|
2016-12-07 07:39:19 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'sets the correct removed count' do
|
2017-09-21 08:00:58 -04:00
|
|
|
expect(progress).to have_received(:puts).with('done. (7 removed)')
|
2016-12-07 07:39:19 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'prints the error from file that could not be removed' do
|
|
|
|
expect(progress).to have_received(:puts).with(a_string_matching(message))
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2017-01-09 12:38:53 -05:00
|
|
|
|
2020-03-04 19:07:49 -05:00
|
|
|
describe 'verify_backup_version' do
|
|
|
|
context 'on version mismatch' do
|
|
|
|
let(:gitlab_version) { Gitlab::VERSION }
|
|
|
|
|
|
|
|
it 'stops the process' do
|
|
|
|
allow(YAML).to receive(:load_file)
|
|
|
|
.and_return({ gitlab_version: "not #{gitlab_version}" })
|
|
|
|
|
|
|
|
expect { subject.verify_backup_version }.to raise_error SystemExit
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'on version match' do
|
|
|
|
let(:gitlab_version) { Gitlab::VERSION }
|
|
|
|
|
|
|
|
it 'does nothing' do
|
|
|
|
allow(YAML).to receive(:load_file)
|
|
|
|
.and_return({ gitlab_version: "#{gitlab_version}" })
|
|
|
|
|
|
|
|
expect { subject.verify_backup_version }.not_to raise_error
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-01-09 12:38:53 -05:00
|
|
|
describe '#unpack' do
|
|
|
|
context 'when there are no backup files in the directory' do
|
|
|
|
before do
|
|
|
|
allow(Dir).to receive(:glob).and_return([])
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'fails the operation and prints an error' do
|
|
|
|
expect { subject.unpack }.to raise_error SystemExit
|
|
|
|
expect(progress).to have_received(:puts)
|
|
|
|
.with(a_string_matching('No backups found'))
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when there are two backup files in the directory and BACKUP variable is not set' do
|
|
|
|
before do
|
|
|
|
allow(Dir).to receive(:glob).and_return(
|
|
|
|
[
|
2017-05-23 07:34:22 -04:00
|
|
|
'1451606400_2016_01_01_1.2.3_gitlab_backup.tar',
|
2017-05-03 07:22:03 -04:00
|
|
|
'1451520000_2015_12_31_gitlab_backup.tar'
|
2017-01-09 12:38:53 -05:00
|
|
|
]
|
|
|
|
)
|
|
|
|
end
|
|
|
|
|
2018-01-15 10:03:35 -05:00
|
|
|
it 'prints the list of available backups' do
|
2018-01-16 07:14:43 -05:00
|
|
|
expect { subject.unpack }.to raise_error SystemExit
|
2018-01-15 10:03:35 -05:00
|
|
|
expect(progress).to have_received(:puts)
|
2018-01-16 09:25:05 -05:00
|
|
|
.with(a_string_matching('1451606400_2016_01_01_1.2.3\n 1451520000_2015_12_31'))
|
2018-01-15 10:03:35 -05:00
|
|
|
end
|
|
|
|
|
2017-01-09 12:38:53 -05:00
|
|
|
it 'fails the operation and prints an error' do
|
|
|
|
expect { subject.unpack }.to raise_error SystemExit
|
|
|
|
expect(progress).to have_received(:puts)
|
|
|
|
.with(a_string_matching('Found more than one backup'))
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when BACKUP variable is set to a non-existing file' do
|
|
|
|
before do
|
|
|
|
allow(Dir).to receive(:glob).and_return(
|
|
|
|
[
|
|
|
|
'1451606400_2016_01_01_gitlab_backup.tar'
|
|
|
|
]
|
|
|
|
)
|
|
|
|
allow(File).to receive(:exist?).and_return(false)
|
|
|
|
|
|
|
|
stub_env('BACKUP', 'wrong')
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'fails the operation and prints an error' do
|
|
|
|
expect { subject.unpack }.to raise_error SystemExit
|
|
|
|
expect(File).to have_received(:exist?).with('wrong_gitlab_backup.tar')
|
|
|
|
expect(progress).to have_received(:puts)
|
|
|
|
.with(a_string_matching('The backup file wrong_gitlab_backup.tar does not exist'))
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when BACKUP variable is set to a correct file' do
|
|
|
|
before do
|
|
|
|
allow(Dir).to receive(:glob).and_return(
|
|
|
|
[
|
2017-05-23 07:34:22 -04:00
|
|
|
'1451606400_2016_01_01_1.2.3_gitlab_backup.tar'
|
2017-01-09 12:38:53 -05:00
|
|
|
]
|
|
|
|
)
|
|
|
|
allow(File).to receive(:exist?).and_return(true)
|
|
|
|
allow(Kernel).to receive(:system).and_return(true)
|
|
|
|
allow(YAML).to receive(:load_file).and_return(gitlab_version: Gitlab::VERSION)
|
|
|
|
|
2019-09-23 14:06:14 -04:00
|
|
|
stub_env('BACKUP', '/ignored/path/1451606400_2016_01_01_1.2.3')
|
2017-01-09 12:38:53 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'unpacks the file' do
|
|
|
|
subject.unpack
|
|
|
|
|
|
|
|
expect(Kernel).to have_received(:system)
|
2017-05-23 07:34:22 -04:00
|
|
|
.with("tar", "-xf", "1451606400_2016_01_01_1.2.3_gitlab_backup.tar")
|
2017-01-09 12:38:53 -05:00
|
|
|
expect(progress).to have_received(:puts).with(a_string_matching('done'))
|
|
|
|
end
|
|
|
|
end
|
2020-03-04 19:07:49 -05:00
|
|
|
|
|
|
|
context 'when there is a non-tarred backup in the directory' do
|
|
|
|
before do
|
2020-03-06 10:08:05 -05:00
|
|
|
allow(Dir).to receive(:glob).and_return(
|
2020-03-04 19:07:49 -05:00
|
|
|
[
|
|
|
|
'backup_information.yml'
|
|
|
|
]
|
|
|
|
)
|
2020-03-06 10:08:05 -05:00
|
|
|
allow(File).to receive(:exist?).and_return(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'selects the non-tarred backup to restore from' do
|
|
|
|
expect(Kernel).not_to receive(:system)
|
2020-03-04 19:07:49 -05:00
|
|
|
|
2020-03-06 10:08:05 -05:00
|
|
|
subject.unpack
|
|
|
|
|
|
|
|
expect(progress).to have_received(:puts)
|
|
|
|
.with(a_string_matching('Non tarred backup found '))
|
2020-03-04 19:07:49 -05:00
|
|
|
end
|
|
|
|
end
|
2017-01-09 12:38:53 -05:00
|
|
|
end
|
2017-07-20 04:50:07 -04:00
|
|
|
|
|
|
|
describe '#upload' do
|
|
|
|
let(:backup_file) { Tempfile.new('backup', Gitlab.config.backup.path) }
|
|
|
|
let(:backup_filename) { File.basename(backup_file.path) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
allow(subject).to receive(:tar_file).and_return(backup_filename)
|
|
|
|
|
|
|
|
stub_backup_setting(
|
|
|
|
upload: {
|
|
|
|
connection: {
|
|
|
|
provider: 'AWS',
|
|
|
|
aws_access_key_id: 'id',
|
|
|
|
aws_secret_access_key: 'secret'
|
|
|
|
},
|
|
|
|
remote_directory: 'directory',
|
|
|
|
multipart_chunk_size: 104857600,
|
|
|
|
encryption: nil,
|
2019-01-09 11:39:20 -05:00
|
|
|
encryption_key: nil,
|
2017-07-20 04:50:07 -04:00
|
|
|
storage_class: nil
|
|
|
|
}
|
|
|
|
)
|
|
|
|
|
|
|
|
Fog.mock!
|
2018-06-05 10:17:04 -04:00
|
|
|
|
|
|
|
# the Fog mock only knows about directories we create explicitly
|
2017-07-20 04:50:07 -04:00
|
|
|
connection = ::Fog::Storage.new(Gitlab.config.backup.upload.connection.symbolize_keys)
|
|
|
|
connection.directories.create(key: Gitlab.config.backup.upload.remote_directory)
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'target path' do
|
|
|
|
it 'uses the tar filename by default' do
|
|
|
|
expect_any_instance_of(Fog::Collection).to receive(:create)
|
2019-11-20 19:06:02 -05:00
|
|
|
.with(hash_including(key: backup_filename, public: false))
|
2017-07-20 04:50:07 -04:00
|
|
|
.and_return(true)
|
|
|
|
|
2020-03-04 19:07:49 -05:00
|
|
|
subject.upload
|
2017-07-20 04:50:07 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'adds the DIRECTORY environment variable if present' do
|
|
|
|
stub_env('DIRECTORY', 'daily')
|
|
|
|
|
|
|
|
expect_any_instance_of(Fog::Collection).to receive(:create)
|
2019-11-20 19:06:02 -05:00
|
|
|
.with(hash_including(key: "daily/#{backup_filename}", public: false))
|
|
|
|
.and_return(true)
|
|
|
|
|
2020-03-04 19:07:49 -05:00
|
|
|
subject.upload
|
2019-11-20 19:06:02 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with Google provider' do
|
|
|
|
before do
|
|
|
|
stub_backup_setting(
|
|
|
|
upload: {
|
|
|
|
connection: {
|
|
|
|
provider: 'Google',
|
|
|
|
google_storage_access_key_id: 'test-access-id',
|
|
|
|
google_storage_secret_access_key: 'secret'
|
|
|
|
},
|
|
|
|
remote_directory: 'directory',
|
|
|
|
multipart_chunk_size: Gitlab.config.backup.upload.multipart_chunk_size,
|
|
|
|
encryption: nil,
|
|
|
|
encryption_key: nil,
|
|
|
|
storage_class: nil
|
|
|
|
}
|
|
|
|
)
|
|
|
|
|
|
|
|
connection = ::Fog::Storage.new(Gitlab.config.backup.upload.connection.symbolize_keys)
|
|
|
|
connection.directories.create(key: Gitlab.config.backup.upload.remote_directory)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'does not attempt to set ACL' do
|
|
|
|
expect_any_instance_of(Fog::Collection).to receive(:create)
|
|
|
|
.with(hash_excluding(public: false))
|
2017-07-20 04:50:07 -04:00
|
|
|
.and_return(true)
|
|
|
|
|
2020-03-04 19:07:49 -05:00
|
|
|
subject.upload
|
2017-07-20 04:50:07 -04:00
|
|
|
end
|
|
|
|
end
|
2020-09-09 17:08:33 -04:00
|
|
|
|
|
|
|
context 'with AzureRM provider' do
|
|
|
|
before do
|
|
|
|
stub_backup_setting(
|
|
|
|
upload: {
|
|
|
|
connection: {
|
|
|
|
provider: 'AzureRM',
|
|
|
|
azure_storage_account_name: 'test-access-id',
|
|
|
|
azure_storage_access_key: 'secret'
|
|
|
|
},
|
|
|
|
remote_directory: 'directory',
|
|
|
|
multipart_chunk_size: nil,
|
|
|
|
encryption: nil,
|
|
|
|
encryption_key: nil,
|
|
|
|
storage_class: nil
|
|
|
|
}
|
|
|
|
)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'loads the provider' do
|
|
|
|
expect { subject.upload }.not_to raise_error
|
|
|
|
end
|
|
|
|
end
|
2017-07-20 04:50:07 -04:00
|
|
|
end
|
2016-12-07 07:39:19 -05:00
|
|
|
end
|