mod args; mod logger; mod algotest; use prelude::*; use chrono::prelude::*; use regex::{self, RegexSet}; use std::collections::HashMap; use std::io::{BufReader, BufRead}; use std::fs::File; use std::env; use std::str; use std::path::{Path, PathBuf}; use self::args::Arguments; pub enum ErrorCode { UnsafeArgs, InvalidArgs, InitializeLogger, CreateRepository, LoadRepository, SaveBackup, LoadBackup, LoadInode, LoadBundle, NoSuchBackup, BackupAlreadyExists, AddKey, LoadKey, SaveKey, SaveConfig, LoadExcludes, InvalidExcludes, BackupRun, RestoreRun, RemoveRun, PruneRun, VacuumRun, CheckRun, AnalyzeRun, DiffRun, VersionsRun, ImportRun, FuseMount } impl ErrorCode { pub fn code(&self) -> i32 { match *self { // Crazy stuff ErrorCode::InitializeLogger | ErrorCode::InvalidExcludes => -1, // Arguments ErrorCode::InvalidArgs => 1, ErrorCode::UnsafeArgs => 2, // Load things ErrorCode::LoadRepository => 3, ErrorCode::LoadBackup => 4, ErrorCode::LoadInode => 5, ErrorCode::LoadBundle => 6, ErrorCode::LoadKey => 7, ErrorCode::LoadExcludes => 8, // Minor operations ErrorCode::SaveBackup => 9, ErrorCode::AddKey => 10, ErrorCode::SaveKey => 11, ErrorCode::SaveConfig => 12, // Main operation ErrorCode::CreateRepository => 13, ErrorCode::BackupRun => 14, ErrorCode::RestoreRun => 15, ErrorCode::RemoveRun => 16, ErrorCode::PruneRun => 17, ErrorCode::VacuumRun => 18, ErrorCode::CheckRun => 19, ErrorCode::AnalyzeRun => 20, ErrorCode::DiffRun => 21, ErrorCode::VersionsRun => 22, ErrorCode::ImportRun => 23, ErrorCode::FuseMount => 24, // ErrorCode::NoSuchBackup => 25, ErrorCode::BackupAlreadyExists => 26, } } } pub const DEFAULT_CHUNKER: &'static str = "fastcdc/16"; pub const DEFAULT_HASH: &'static str = "blake2"; pub const DEFAULT_COMPRESSION: &'static str = "brotli/3"; pub const DEFAULT_BUNDLE_SIZE_STR: &'static str = "25"; pub const DEFAULT_VACUUM_RATIO_STR: &'static str = "0"; lazy_static! { pub static ref ZVAULT_FOLDER: PathBuf = { env::home_dir().unwrap().join(".zvault") }; } macro_rules! checked { ($expr:expr, $msg:expr, $code:expr) => { match $expr { Ok(val) => val, Err(err) => { error!("Failed to {}\n\tcaused by: {}", $msg, err); return Err($code) } } }; } fn open_repository(path: &Path) -> Result { Ok(checked!( Repository::open(path), "load repository", ErrorCode::LoadRepository )) } fn get_backup(repo: &Repository, backup_name: &str) -> Result { if !repo.has_backup(backup_name) { error!("A backup with that name does not exist"); return Err(ErrorCode::NoSuchBackup); } Ok(checked!( repo.get_backup(backup_name), "load backup", ErrorCode::LoadBackup )) } fn find_reference_backup( repo: &Repository, path: &str, ) -> Result, ErrorCode> { let mut matching = Vec::new(); let hostname = match get_hostname() { Ok(hostname) => hostname, Err(_) => return Ok(None), }; let backup_map = match repo.get_all_backups() { Ok(backup_map) => backup_map, Err(RepositoryError::BackupFile(BackupFileError::PartialBackupsList(backup_map, _failed))) => { warn!("Some backups could not be read, ignoring them"); backup_map } Err(err) => { error!("Failed to load backup files: {}", err); return Err(ErrorCode::LoadBackup); } }; for (name, backup) in backup_map { if backup.host == hostname && backup.path == path { matching.push((name, backup)); } } matching.sort_by_key(|&(_, ref b)| b.timestamp); Ok(matching.pop()) } fn print_backup(backup: &Backup) { if backup.modified { warn!("This backup has been modified"); } println!( "Date: {}", Local.timestamp(backup.timestamp, 0).to_rfc2822() ); println!("Source: {}:{}", backup.host, backup.path); println!("Duration: {}", to_duration(backup.duration)); println!( "Entries: {} files, {} dirs", backup.file_count, backup.dir_count ); println!( "Total backup size: {}", to_file_size(backup.total_data_size) ); println!( "Modified data size: {}", to_file_size(backup.changed_data_size) ); let dedup_ratio = backup.deduplicated_data_size as f32 / backup.changed_data_size as f32; println!( "Deduplicated size: {}, {:.1}% saved", to_file_size(backup.deduplicated_data_size), (1.0 - dedup_ratio) * 100.0 ); let compress_ratio = backup.encoded_data_size as f32 / backup.deduplicated_data_size as f32; println!( "Compressed size: {} in {} bundles, {:.1}% saved", to_file_size(backup.encoded_data_size), backup.bundle_count, (1.0 - compress_ratio) * 100.0 ); println!( "Chunk count: {}, avg size: {}", backup.chunk_count, to_file_size(backup.avg_chunk_size as u64) ); } pub fn format_inode_one_line(inode: &Inode) -> String { match inode.file_type { FileType::Directory => { format!( "{:25}\t{} entries", format!("{}/", inode.name), inode.children.as_ref().map(|c| c.len()).unwrap_or(0) ) } FileType::File => { format!( "{:25}\t{:>10}\t{}", inode.name, to_file_size(inode.size), Local.timestamp(inode.timestamp, 0).to_rfc2822() ) } FileType::Symlink => { format!( "{:25}\t -> {}", inode.name, inode.symlink_target.as_ref().map(|s| s as &str).unwrap_or( "?" ) ) } FileType::BlockDevice | FileType::CharDevice => { let device = inode.device.unwrap_or((0, 0)); format!( "{:25}\t{:12}\t{}:{}", inode.name, inode.file_type, device.0, device.1 ) } FileType::NamedPipe => format!("{:25}\t fifo", inode.name), } } fn print_inode(inode: &Inode) { println!("Name: {}", inode.name); println!("Type: {}", inode.file_type); println!("Size: {}", to_file_size(inode.size)); println!("Permissions: {:3o}", inode.mode); println!("User: {}", inode.user); println!("Group: {}", inode.group); println!( "Timestamp: {}", Local.timestamp(inode.timestamp, 0).to_rfc2822() ); if let Some(ref target) = inode.symlink_target { println!("Symlink target: {}", target); } println!("Cumulative size: {}", to_file_size(inode.cum_size)); println!("Cumulative file count: {}", inode.cum_files); println!("Cumulative directory count: {}", inode.cum_dirs); if let Some(ref children) = inode.children { println!("Children:"); for name in children.keys() { println!(" - {}", name); } } if !inode.xattrs.is_empty() { println!("Extended attributes:"); for (key, value) in &inode.xattrs { if let Ok(value) = str::from_utf8(value) { println!(" - {} = '{}'", key, value); } else { println!(" - {} = 0x{}", key, to_hex(value)); } } } } fn print_backups(backup_map: &HashMap) { let mut backups: Vec<_> = backup_map.into_iter().collect(); backups.sort_by_key(|b| b.0); for (name, backup) in backups { println!( "{:40} {:>32} {:7} files, {:6} dirs, {:>10}", name, Local.timestamp(backup.timestamp, 0).to_rfc2822(), backup.file_count, backup.dir_count, to_file_size(backup.total_data_size) ); } } fn print_repoinfo(info: &RepositoryInfo) { println!("Bundles: {}", info.bundle_count); println!("Total size: {}", to_file_size(info.encoded_data_size)); println!("Uncompressed size: {}", to_file_size(info.raw_data_size)); println!("Compression ratio: {:.1}%", info.compression_ratio * 100.0); println!("Chunk count: {}", info.chunk_count); println!( "Average chunk size: {}", to_file_size(info.avg_chunk_size as u64) ); let index_usage = info.index_entries as f32 / info.index_capacity as f32; println!( "Index: {}, {:.0}% full", to_file_size(info.index_size as u64), index_usage * 100.0 ); } fn print_bundle(bundle: &StoredBundle) { println!("Bundle {}", bundle.info.id); println!(" - Mode: {:?}", bundle.info.mode); println!(" - Path: {:?}", bundle.path); println!( " - Date: {}", Local.timestamp(bundle.info.timestamp, 0).to_rfc2822() ); println!(" - Hash method: {:?}", bundle.info.hash_method); let encryption = if let Some((_, ref key)) = bundle.info.encryption { to_hex(key) } else { "none".to_string() }; println!(" - Encryption: {}", encryption); println!(" - Chunks: {}", bundle.info.chunk_count); println!( " - Size: {}", to_file_size(bundle.info.encoded_size as u64) ); println!( " - Data size: {}", to_file_size(bundle.info.raw_size as u64) ); let ratio = bundle.info.encoded_size as f32 / bundle.info.raw_size as f32; let compression = if let Some(ref c) = bundle.info.compression { c.to_string() } else { "none".to_string() }; println!( " - Compression: {}, ratio: {:.1}%", compression, ratio * 100.0 ); } fn print_bundle_one_line(bundle: &BundleInfo) { println!( "{}: {:8?}, {:5} chunks, {:8}", bundle.id, bundle.mode, bundle.chunk_count, to_file_size(bundle.encoded_size as u64) ) } fn print_config(config: &Config) { println!("Bundle size: {}", to_file_size(config.bundle_size as u64)); println!("Chunker: {}", config.chunker.to_string()); if let Some(ref compression) = config.compression { println!("Compression: {}", compression.to_string()); } else { println!("Compression: none"); } if let Some(ref encryption) = config.encryption { println!("Encryption: {}", to_hex(&encryption.1[..])); } else { println!("Encryption: none"); } println!("Hash method: {}", config.hash.name()); } fn print_analysis(analysis: &HashMap) { let mut reclaim_space = [0; 11]; let mut rewrite_size = [0; 11]; let mut data_total = 0; for bundle in analysis.values() { data_total += bundle.info.encoded_size; #[allow(unknown_lints, needless_range_loop)] for i in 0..11 { if bundle.get_usage_ratio() <= i as f32 * 0.1 { reclaim_space[i] += bundle.get_unused_size(); rewrite_size[i] += bundle.get_used_size(); } } } println!("Total bundle size: {}", to_file_size(data_total as u64)); let used = data_total - reclaim_space[10]; println!( "Space used: {}, {:.1} %", to_file_size(used as u64), used as f32 / data_total as f32 * 100.0 ); println!("Reclaimable space (depending on vacuum ratio)"); #[allow(unknown_lints, needless_range_loop)] for i in 0..11 { println!( " - ratio={:3}: {:>10}, {:4.1} %, rewriting {:>10}", i * 10, to_file_size(reclaim_space[i] as u64), reclaim_space[i] as f32 / data_total as f32 * 100.0, to_file_size(rewrite_size[i] as u64) ); } } #[allow(unknown_lints, cyclomatic_complexity)] pub fn run() -> Result<(), ErrorCode> { let (log_level, args) = try!(args::parse()); if let Err(err) = logger::init(log_level) { println!("Failed to initialize the logger: {}", err); return Err(ErrorCode::InitializeLogger); } match args { Arguments::Init { repo_path, bundle_size, chunker, compression, encryption, hash, remote_path } => { if !Path::new(&remote_path).is_absolute() { error!("The remote path of a repository must be absolute."); return Err(ErrorCode::InvalidArgs); } let mut repo = checked!( Repository::create( repo_path, Config { bundle_size: bundle_size, chunker: chunker, compression: compression, encryption: None, hash: hash }, remote_path ), "create repository", ErrorCode::CreateRepository ); if encryption { let (public, secret) = Crypto::gen_keypair(); info!("Created the following key pair"); println!("public: {}", to_hex(&public[..])); println!("secret: {}", to_hex(&secret[..])); repo.set_encryption(Some(&public)); checked!( repo.register_key(public, secret), "add key", ErrorCode::AddKey ); checked!(repo.save_config(), "save config", ErrorCode::SaveConfig); warn!( "Please store this key pair in a secure location before using the repository" ); println!(); } print_config(&repo.config); } Arguments::Backup { repo_path, backup_name, src_path, full, reference, same_device, mut excludes, excludes_from, no_default_excludes, tar } => { let mut repo = try!(open_repository(&repo_path)); if repo.has_backup(&backup_name) { error!("A backup with that name already exists"); return Err(ErrorCode::BackupAlreadyExists); } if src_path == "-" && !tar { error!("Reading from stdin requires --tar"); return Err(ErrorCode::InvalidArgs); } let mut reference_backup = None; if !full && !tar { reference_backup = match reference { Some(r) => { let b = try!(get_backup(&repo, &r)); Some((r, b)) } None => None, }; if reference_backup.is_none() { reference_backup = try!(find_reference_backup(&repo, &src_path)); } if let Some(&(ref name, _)) = reference_backup.as_ref() { info!("Using backup {} as reference", name); } else { info!("No reference backup found, doing a full scan instead"); } } let reference_backup = reference_backup.map(|(_, backup)| backup); if !no_default_excludes && !tar { for line in BufReader::new(checked!( File::open(&repo.layout.excludes_path()), "open default excludes file", ErrorCode::LoadExcludes )).lines() { excludes.push(checked!( line, "read default excludes file", ErrorCode::LoadExcludes )); } } if let Some(excludes_from) = excludes_from { for line in BufReader::new(checked!( File::open(excludes_from), "open excludes file", ErrorCode::LoadExcludes )).lines() { excludes.push(checked!( line, "read excludes file", ErrorCode::LoadExcludes )); } } let mut excludes_parsed = Vec::with_capacity(excludes.len()); for mut exclude in excludes { if exclude.starts_with('#') || exclude.is_empty() { continue; } exclude = regex::escape(&exclude) .replace('?', ".") .replace(r"\*\*", ".*") .replace(r"\*", "[^/]*"); excludes_parsed.push(if exclude.starts_with('/') { format!(r"^{}($|/)", exclude) } else { format!(r"/{}($|/)", exclude) }); } let excludes = if excludes_parsed.is_empty() { None } else { Some(checked!( RegexSet::new(excludes_parsed), "parse exclude patterns", ErrorCode::InvalidExcludes )) }; let options = BackupOptions { same_device: same_device, excludes: excludes }; let result = if tar { repo.import_tarfile(&src_path) } else { repo.create_backup_recursively(&src_path, reference_backup.as_ref(), &options) }; let backup = match result { Ok(backup) => { info!("Backup finished"); backup } Err(RepositoryError::Backup(BackupError::FailedPaths(backup, _failed_paths))) => { warn!("Some files are missing from the backup"); backup } Err(err) => { error!("Backup failed: {}", err); return Err(ErrorCode::BackupRun); } }; checked!( repo.save_backup(&backup, &backup_name), "save backup file", ErrorCode::SaveBackup ); print_backup(&backup); } Arguments::Restore { repo_path, backup_name, inode, dst_path, tar } => { let mut repo = try!(open_repository(&repo_path)); let backup = try!(get_backup(&repo, &backup_name)); let inode = if let Some(inode) = inode { checked!( repo.get_backup_inode(&backup, &inode), "load subpath inode", ErrorCode::LoadInode ) } else { checked!( repo.get_inode(&backup.root), "load root inode", ErrorCode::LoadInode ) }; if tar { checked!( repo.export_tarfile(&backup, inode, &dst_path), "restore backup", ErrorCode::RestoreRun ); } else { checked!( repo.restore_inode_tree(&backup, inode, &dst_path), "restore backup", ErrorCode::RestoreRun ); } info!("Restore finished"); } Arguments::Copy { repo_path_src, backup_name_src, repo_path_dst, backup_name_dst } => { if repo_path_src != repo_path_dst { error!("Can only run copy on same repository"); return Err(ErrorCode::InvalidArgs); } let mut repo = try!(open_repository(&repo_path_src)); if repo.has_backup(&backup_name_dst) { error!("A backup with that name already exists"); return Err(ErrorCode::BackupAlreadyExists); } let backup = try!(get_backup(&repo, &backup_name_src)); checked!( repo.save_backup(&backup, &backup_name_dst), "save backup file", ErrorCode::SaveBackup ); } Arguments::Remove { repo_path, backup_name, inode, force } => { let mut repo = try!(open_repository(&repo_path)); if let Some(inode) = inode { let mut backup = try!(get_backup(&repo, &backup_name)); checked!( repo.remove_backup_path(&mut backup, inode), "remove backup subpath", ErrorCode::RemoveRun ); checked!( repo.save_backup(&backup, &backup_name), "save backup file", ErrorCode::SaveBackup ); info!("The backup subpath has been deleted, run vacuum to reclaim space"); } else if repo.layout.backups_path().join(&backup_name).is_dir() { let backups = checked!( repo.get_backups(&backup_name), "retrieve backups", ErrorCode::RemoveRun ); if force { for name in backups.keys() { checked!( repo.delete_backup(&format!("{}/{}", &backup_name, name)), "delete backup", ErrorCode::RemoveRun ); } } else { error!("Denying to remove multiple backups (use --force):"); for name in backups.keys() { println!(" - {}/{}", backup_name, name); } } } else { checked!( repo.delete_backup(&backup_name), "delete backup", ErrorCode::RemoveRun ); info!("The backup has been deleted, run vacuum to reclaim space"); } } Arguments::Prune { repo_path, prefix, daily, weekly, monthly, yearly, force } => { let mut repo = try!(open_repository(&repo_path)); if daily + weekly + monthly + yearly == 0 { error!("This would remove all those backups"); return Err(ErrorCode::UnsafeArgs); } checked!( repo.prune_backups(&prefix, daily, weekly, monthly, yearly, force), "prune backups", ErrorCode::PruneRun ); if !force { info!("Run with --force to actually execute this command"); } } Arguments::Vacuum { repo_path, ratio, force, combine } => { let mut repo = try!(open_repository(&repo_path)); let info_before = repo.info(); checked!( repo.vacuum(ratio, combine, force), "vacuum", ErrorCode::VacuumRun ); if !force { info!("Run with --force to actually execute this command"); } else { let info_after = repo.info(); info!( "Reclaimed {}", to_file_size(info_before.encoded_data_size - info_after.encoded_data_size) ); } } Arguments::Check { repo_path, backup_name, inode, bundles, index, bundle_data, repair } => { let mut repo = try!(open_repository(&repo_path)); checked!( repo.check_repository(repair), "check repository", ErrorCode::CheckRun ); if bundles { checked!( repo.check_bundles(bundle_data, repair), "check bundles", ErrorCode::CheckRun ); } if index { checked!(repo.check_index(repair), "check index", ErrorCode::CheckRun); } if let Some(backup_name) = backup_name { let mut backup = try!(get_backup(&repo, &backup_name)); if let Some(path) = inode { checked!( repo.check_backup_inode(&backup_name, &mut backup, Path::new(&path), repair), "check inode", ErrorCode::CheckRun ) } else { checked!( repo.check_backup(&backup_name, &mut backup, repair), "check backup", ErrorCode::CheckRun ) } } else { checked!( repo.check_backups(repair), "check repository", ErrorCode::CheckRun ) } repo.set_clean(); info!("Integrity verified") } Arguments::List { repo_path, backup_name, inode } => { let mut repo = try!(open_repository(&repo_path)); let backup_map = if let Some(backup_name) = backup_name { if repo.layout.backups_path().join(&backup_name).is_dir() { repo.get_backups(&backup_name) } else { let backup = try!(get_backup(&repo, &backup_name)); let inode = checked!( repo.get_backup_inode( &backup, inode.as_ref().map(|v| v as &str).unwrap_or("/") ), "load subpath inode", ErrorCode::LoadInode ); println!("{}", format_inode_one_line(&inode)); if let Some(children) = inode.children { for chunks in children.values() { let inode = checked!( repo.get_inode(chunks), "load child inode", ErrorCode::LoadInode ); println!("- {}", format_inode_one_line(&inode)); } } return Ok(()); } } else { repo.get_all_backups() }; let backup_map = match backup_map { Ok(backup_map) => backup_map, Err(RepositoryError::BackupFile(BackupFileError::PartialBackupsList(backup_map, _failed))) => { warn!("Some backups could not be read, ignoring them"); backup_map } Err(err) => { error!("Failed to load backup files: {}", err); return Err(ErrorCode::LoadBackup); } }; print_backups(&backup_map); } Arguments::Info { repo_path, backup_name, inode } => { let mut repo = try!(open_repository(&repo_path)); if let Some(backup_name) = backup_name { let backup = try!(get_backup(&repo, &backup_name)); if let Some(inode) = inode { let inode = checked!( repo.get_backup_inode(&backup, inode), "load subpath inode", ErrorCode::LoadInode ); print_inode(&inode); } else { print_backup(&backup); } } else { print_repoinfo(&repo.info()); } } Arguments::Mount { repo_path, backup_name, inode, mount_point } => { let mut repo = try!(open_repository(&repo_path)); let fs = if let Some(backup_name) = backup_name { if repo.layout.backups_path().join(&backup_name).is_dir() { checked!( FuseFilesystem::from_repository(&mut repo, Some(&backup_name)), "create fuse filesystem", ErrorCode::FuseMount ) } else { let backup = try!(get_backup(&repo, &backup_name)); if let Some(inode) = inode { let inode = checked!( repo.get_backup_inode(&backup, inode), "load subpath inode", ErrorCode::LoadInode ); checked!( FuseFilesystem::from_inode(&mut repo, backup, inode), "create fuse filesystem", ErrorCode::FuseMount ) } else { checked!( FuseFilesystem::from_backup(&mut repo, backup), "create fuse filesystem", ErrorCode::FuseMount ) } } } else { checked!( FuseFilesystem::from_repository(&mut repo, None), "create fuse filesystem", ErrorCode::FuseMount ) }; info!("Mounting the filesystem..."); info!( "Please unmount the filesystem via 'fusermount -u {}' when done.", mount_point ); checked!( fs.mount(&mount_point), "mount filesystem", ErrorCode::FuseMount ); } Arguments::Analyze { repo_path } => { let mut repo = try!(open_repository(&repo_path)); print_analysis(&checked!( repo.analyze_usage(), "analyze repository", ErrorCode::AnalyzeRun )); } Arguments::BundleList { repo_path } => { let repo = try!(open_repository(&repo_path)); for bundle in repo.list_bundles() { print_bundle_one_line(bundle); } } Arguments::BundleInfo { repo_path, bundle_id } => { let repo = try!(open_repository(&repo_path)); if let Some(bundle) = repo.get_bundle(&bundle_id) { print_bundle(bundle); } else { error!("No such bundle"); return Err(ErrorCode::LoadBundle); } } Arguments::Import { repo_path, remote_path, key_files } => { checked!( Repository::import(repo_path, remote_path, key_files), "import repository", ErrorCode::ImportRun ); info!("Import finished"); } Arguments::Versions { repo_path, path } => { let mut repo = try!(open_repository(&repo_path)); let mut found = false; for (name, mut inode) in checked!( repo.find_versions(&path), "find versions", ErrorCode::VersionsRun ) { inode.name = format!("{}::{}", name, &path); println!("{}", format_inode_one_line(&inode)); found = true; } if !found { info!("No versions of that file were found."); } } Arguments::Diff { repo_path_old, backup_name_old, inode_old, repo_path_new, backup_name_new, inode_new } => { if repo_path_old != repo_path_new { error!("Can only run diff on same repository"); return Err(ErrorCode::InvalidArgs); } let mut repo = try!(open_repository(&repo_path_old)); let backup_old = try!(get_backup(&repo, &backup_name_old)); let backup_new = try!(get_backup(&repo, &backup_name_new)); let inode1 = checked!( repo.get_backup_inode(&backup_old, inode_old.unwrap_or_else(|| "/".to_string())), "load subpath inode", ErrorCode::LoadInode ); let inode2 = checked!( repo.get_backup_inode(&backup_new, inode_new.unwrap_or_else(|| "/".to_string())), "load subpath inode", ErrorCode::LoadInode ); let diffs = checked!( repo.find_differences(&inode1, &inode2), "find differences", ErrorCode::DiffRun ); for diff in &diffs { println!( "{} {:?}", match diff.0 { DiffType::Add => "add", DiffType::Mod => "mod", DiffType::Del => "del", }, diff.1 ); } if diffs.is_empty() { info!("No differences found"); } } Arguments::Config { repo_path, bundle_size, chunker, compression, encryption, hash } => { let mut repo = try!(open_repository(&repo_path)); let mut changed = false; if let Some(bundle_size) = bundle_size { repo.config.bundle_size = bundle_size; changed = true; } if let Some(chunker) = chunker { warn!( "Changing the chunker makes it impossible to use existing data for deduplication" ); repo.config.chunker = chunker; changed = true; } if let Some(compression) = compression { repo.config.compression = compression; changed = true; } if let Some(encryption) = encryption { repo.set_encryption(encryption.as_ref()); changed = true; } if let Some(hash) = hash { warn!( "Changing the hash makes it impossible to use existing data for deduplication" ); repo.config.hash = hash; changed = true; } if changed { checked!(repo.save_config(), "save config", ErrorCode::SaveConfig); info!("The configuration has been updated."); } else { print_config(&repo.config); } } Arguments::GenKey { file, password } => { let (public, secret) = match password { None => Crypto::gen_keypair(), Some(ref password) => Crypto::keypair_from_password(password), }; info!("Created the following key pair"); println!("public: {}", to_hex(&public[..])); println!("secret: {}", to_hex(&secret[..])); if let Some(file) = file { checked!( Crypto::save_keypair_to_file(&public, &secret, file), "save key pair", ErrorCode::SaveKey ); } } Arguments::AddKey { repo_path, set_default, password, file } => { let mut repo = try!(open_repository(&repo_path)); let (public, secret) = if let Some(file) = file { checked!( Crypto::load_keypair_from_file(file), "load key pair", ErrorCode::LoadKey ) } else { info!("Created the following key pair"); let (public, secret) = match password { None => Crypto::gen_keypair(), Some(ref password) => Crypto::keypair_from_password(password), }; println!("public: {}", to_hex(&public[..])); println!("secret: {}", to_hex(&secret[..])); (public, secret) }; checked!( repo.register_key(public, secret), "add key pair", ErrorCode::AddKey ); if set_default { repo.set_encryption(Some(&public)); checked!(repo.save_config(), "save config", ErrorCode::SaveConfig); warn!( "Please store this key pair in a secure location before using the repository" ); } } Arguments::AlgoTest { bundle_size, chunker, compression, encrypt, hash, file } => { algotest::run(&file, bundle_size, chunker, compression, encrypt, hash); } } Ok(()) }