mirror of
https://github.com/pocketbase/pocketbase.git
synced 2024-11-21 13:35:49 +02:00
215 lines
6.0 KiB
Go
215 lines
6.0 KiB
Go
package apis
|
|
|
|
import (
|
|
"context"
|
|
"net/http"
|
|
"path/filepath"
|
|
"time"
|
|
|
|
"github.com/labstack/echo/v5"
|
|
"github.com/pocketbase/pocketbase/core"
|
|
"github.com/pocketbase/pocketbase/forms"
|
|
"github.com/pocketbase/pocketbase/models"
|
|
"github.com/pocketbase/pocketbase/tools/filesystem"
|
|
"github.com/pocketbase/pocketbase/tools/rest"
|
|
"github.com/pocketbase/pocketbase/tools/types"
|
|
"github.com/spf13/cast"
|
|
)
|
|
|
|
// bindBackupApi registers the file api endpoints and the corresponding handlers.
|
|
//
|
|
// @todo add hooks once the app hooks api restructuring is finalized
|
|
func bindBackupApi(app core.App, rg *echo.Group) {
|
|
api := backupApi{app: app}
|
|
|
|
subGroup := rg.Group("/backups", ActivityLogger(app))
|
|
subGroup.GET("", api.list, RequireAdminAuth())
|
|
subGroup.POST("", api.create, RequireAdminAuth())
|
|
subGroup.POST("/upload", api.upload, RequireAdminAuth())
|
|
subGroup.GET("/:key", api.download)
|
|
subGroup.DELETE("/:key", api.delete, RequireAdminAuth())
|
|
subGroup.POST("/:key/restore", api.restore, RequireAdminAuth())
|
|
}
|
|
|
|
type backupApi struct {
|
|
app core.App
|
|
}
|
|
|
|
func (api *backupApi) list(c echo.Context) error {
|
|
ctx, cancel := context.WithTimeout(context.Background(), 30*time.Second)
|
|
defer cancel()
|
|
|
|
fsys, err := api.app.NewBackupsFilesystem()
|
|
if err != nil {
|
|
return NewBadRequestError("Failed to load backups filesystem.", err)
|
|
}
|
|
defer fsys.Close()
|
|
|
|
fsys.SetContext(ctx)
|
|
|
|
backups, err := fsys.List("")
|
|
if err != nil {
|
|
return NewBadRequestError("Failed to retrieve backup items. Raw error: \n"+err.Error(), nil)
|
|
}
|
|
|
|
result := make([]models.BackupFileInfo, len(backups))
|
|
|
|
for i, obj := range backups {
|
|
modified, _ := types.ParseDateTime(obj.ModTime)
|
|
|
|
result[i] = models.BackupFileInfo{
|
|
Key: obj.Key,
|
|
Size: obj.Size,
|
|
Modified: modified,
|
|
}
|
|
}
|
|
|
|
return c.JSON(http.StatusOK, result)
|
|
}
|
|
|
|
func (api *backupApi) create(c echo.Context) error {
|
|
if api.app.Store().Has(core.StoreKeyActiveBackup) {
|
|
return NewBadRequestError("Try again later - another backup/restore process has already been started", nil)
|
|
}
|
|
|
|
form := forms.NewBackupCreate(api.app)
|
|
if err := c.Bind(form); err != nil {
|
|
return NewBadRequestError("An error occurred while loading the submitted data.", err)
|
|
}
|
|
|
|
return form.Submit(func(next forms.InterceptorNextFunc[string]) forms.InterceptorNextFunc[string] {
|
|
return func(name string) error {
|
|
if err := next(name); err != nil {
|
|
return NewBadRequestError("Failed to create backup.", err)
|
|
}
|
|
|
|
// we don't retrieve the generated backup file because it may not be
|
|
// available yet due to the eventually consistent nature of some S3 providers
|
|
return c.NoContent(http.StatusNoContent)
|
|
}
|
|
})
|
|
}
|
|
|
|
func (api *backupApi) upload(c echo.Context) error {
|
|
files, err := rest.FindUploadedFiles(c.Request(), "file")
|
|
if err != nil {
|
|
return NewBadRequestError("Missing or invalid uploaded file.", err)
|
|
}
|
|
|
|
form := forms.NewBackupUpload(api.app)
|
|
form.File = files[0]
|
|
|
|
return form.Submit(func(next forms.InterceptorNextFunc[*filesystem.File]) forms.InterceptorNextFunc[*filesystem.File] {
|
|
return func(file *filesystem.File) error {
|
|
if err := next(file); err != nil {
|
|
return NewBadRequestError("Failed to upload backup.", err)
|
|
}
|
|
|
|
// we don't retrieve the generated backup file because it may not be
|
|
// available yet due to the eventually consistent nature of some S3 providers
|
|
return c.NoContent(http.StatusNoContent)
|
|
}
|
|
})
|
|
}
|
|
|
|
func (api *backupApi) download(c echo.Context) error {
|
|
fileToken := c.QueryParam("token")
|
|
|
|
_, err := api.app.Dao().FindAdminByToken(
|
|
fileToken,
|
|
api.app.Settings().AdminFileToken.Secret,
|
|
)
|
|
if err != nil {
|
|
return NewForbiddenError("Insufficient permissions to access the resource.", err)
|
|
}
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 10*time.Minute)
|
|
defer cancel()
|
|
|
|
fsys, err := api.app.NewBackupsFilesystem()
|
|
if err != nil {
|
|
return NewBadRequestError("Failed to load backups filesystem.", err)
|
|
}
|
|
defer fsys.Close()
|
|
|
|
fsys.SetContext(ctx)
|
|
|
|
key := c.PathParam("key")
|
|
|
|
br, err := fsys.GetFile(key)
|
|
if err != nil {
|
|
return NewBadRequestError("Failed to retrieve backup item. Raw error: \n"+err.Error(), nil)
|
|
}
|
|
defer br.Close()
|
|
|
|
return fsys.Serve(
|
|
c.Response(),
|
|
c.Request(),
|
|
key,
|
|
filepath.Base(key), // without the path prefix (if any)
|
|
)
|
|
}
|
|
|
|
func (api *backupApi) restore(c echo.Context) error {
|
|
if api.app.Store().Has(core.StoreKeyActiveBackup) {
|
|
return NewBadRequestError("Try again later - another backup/restore process has already been started.", nil)
|
|
}
|
|
|
|
key := c.PathParam("key")
|
|
|
|
existsCtx, cancel := context.WithTimeout(context.Background(), 30*time.Second)
|
|
defer cancel()
|
|
|
|
fsys, err := api.app.NewBackupsFilesystem()
|
|
if err != nil {
|
|
return NewBadRequestError("Failed to load backups filesystem.", err)
|
|
}
|
|
defer fsys.Close()
|
|
|
|
fsys.SetContext(existsCtx)
|
|
|
|
if exists, err := fsys.Exists(key); !exists {
|
|
return NewBadRequestError("Missing or invalid backup file.", err)
|
|
}
|
|
|
|
go func() {
|
|
// wait max 15 minutes to fetch the backup
|
|
ctx, cancel := context.WithTimeout(context.Background(), 15*time.Minute)
|
|
defer cancel()
|
|
|
|
// give some optimistic time to write the response
|
|
time.Sleep(1 * time.Second)
|
|
|
|
if err := api.app.RestoreBackup(ctx, key); err != nil {
|
|
api.app.Logger().Error("Failed to restore backup", "key", key, "error", err.Error())
|
|
}
|
|
}()
|
|
|
|
return c.NoContent(http.StatusNoContent)
|
|
}
|
|
|
|
func (api *backupApi) delete(c echo.Context) error {
|
|
ctx, cancel := context.WithTimeout(context.Background(), 30*time.Second)
|
|
defer cancel()
|
|
|
|
fsys, err := api.app.NewBackupsFilesystem()
|
|
if err != nil {
|
|
return NewBadRequestError("Failed to load backups filesystem.", err)
|
|
}
|
|
defer fsys.Close()
|
|
|
|
fsys.SetContext(ctx)
|
|
|
|
key := c.PathParam("key")
|
|
|
|
if key != "" && cast.ToString(api.app.Store().Get(core.StoreKeyActiveBackup)) == key {
|
|
return NewBadRequestError("The backup is currently being used and cannot be deleted.", nil)
|
|
}
|
|
|
|
if err := fsys.Delete(key); err != nil {
|
|
return NewBadRequestError("Invalid or already deleted backup file. Raw error: \n"+err.Error(), nil)
|
|
}
|
|
|
|
return c.NoContent(http.StatusNoContent)
|
|
}
|