Commit Graph

9 Commits

Author SHA1 Message Date
778afc16d9 feat: Week 3 Phase 4 - Point-in-Time Restore
- Created internal/pitr/recovery_target.go (330 lines)
  - ParseRecoveryTarget: Parse all target types (time/xid/lsn/name/immediate)
  - Validate: Full validation for each target type
  - ToPostgreSQLConfig: Convert to postgresql.conf format
  - Support timestamp, XID, LSN, restore point name, immediate recovery

- Created internal/pitr/recovery_config.go (320 lines)
  - RecoveryConfigGenerator for PostgreSQL 12+ and legacy
  - Generate recovery.signal + postgresql.auto.conf (PG 12+)
  - Generate recovery.conf (PG < 12)
  - Auto-detect PostgreSQL version from PG_VERSION
  - Validate data directory before restore
  - Backup existing recovery config
  - Smart restore_command with multi-extension support (.gz.enc, .enc, .gz)

- Created internal/pitr/restore.go (400 lines)
  - RestoreOrchestrator for complete PITR workflow
  - Extract base backup (.tar.gz, .tar, directory)
  - Generate recovery configuration
  - Optional auto-start PostgreSQL
  - Optional recovery progress monitoring
  - Comprehensive validation
  - Clear user instructions

- Added 'restore pitr' command to cmd/restore.go
  - All recovery target flags (--target-time, --target-xid, --target-lsn, --target-name, --target-immediate)
  - Action control (--target-action: promote/pause/shutdown)
  - Timeline selection (--timeline)
  - Auto-start and monitoring options
  - Skip extraction for existing data directories

Features:
- Support all PostgreSQL recovery targets
- PostgreSQL version detection (12+ vs legacy)
- Comprehensive validation before restore
- User-friendly output with clear next steps
- Safe defaults (promote after recovery)

Total new code: ~1050 lines
Build:  Successful
Tests:  Help and validation working

Example usage:
  dbbackup restore pitr \
    --base-backup /backups/base.tar.gz \
    --wal-archive /backups/wal/ \
    --target-time "2024-11-26 12:00:00" \
    --target-dir /var/lib/postgresql/14/main
2025-11-26 12:00:46 +00:00
3ef57bb2f5 polish: Week 2 improvements - error messages, progress, performance
## Error Message Improvements (Phase 1)
-  Cluster backup: Added database type context to error messages
-  Rate limiting: Show specific host and wait time in errors
-  Connection failures: Added troubleshooting steps (3-point checklist)
-  Encryption errors: Include backup location in failure messages
-  Archive not found: Suggest cloud:// URI for remote backups
-  Decryption: Hint about wrong key verification
-  Backup directory: Include permission hints and --backup-dir suggestion
-  Backup execution: Show database name and diagnostic checklist
-  Incremental: Better base backup path guidance
-  File verification: Indicate silent command failure possibility

## Progress Indicator Enhancements (Phase 2)
-  ETA calculations: Real-time estimation based on transfer speed
-  Speed formatting: formatSpeed() helper (B/KB/MB/GB per second)
-  Byte formatting: formatBytes() with proper unit scaling
-  Duration display: Improved to show Xm Ys format vs decimal
-  Progress updates: Show [%] bytes/total (speed, ETA: time) format

## Performance Optimization (Phase 3)
-  Buffer sizes: Increased stderr read buffers from 4KB to 64KB
-  Scanner buffers: 64KB initial, 1MB max for command output
-  I/O throughput: Better buffer alignment for streaming operations

## Code Cleanup (Phase 4)
-  TODO comments: Converted to descriptive comments
-  Method calls: Fixed GetDatabaseType() -> DisplayDatabaseType()
-  Build verification: All changes compile successfully

## Summary
Time: ~1.5h (2-4h estimated)
Changed: 4 files (cmd/backup_impl.go, cmd/restore.go, internal/backup/engine.go, internal/progress/detailed.go)
Impact: Better UX, clearer errors, faster I/O, cleaner code
2025-11-26 10:30:29 +00:00
6c15cd6019 feat: Phase 4 Task 6 - Restore decryption integration
- Added encryption flags to restore commands (--encryption-key-file, --encryption-key-env)
- Integrated DecryptBackupFile() into runRestoreSingle and runRestoreCluster
- Auto-detects encrypted backups via IsBackupEncrypted()
- Decrypts in-place before restore begins
- Tested: Encryption/decryption roundtrip validated successfully
- Phase 4 (AES-256-GCM encryption) now COMPLETE

All encryption features working:
 Backup encryption with --encrypt flag
 Restore decryption with --encryption-key-file flag
 Key loading from file or environment variable
 Metadata tracking (Encrypted bool, EncryptionAlgorithm)
 Roundtrip test passed: Original ≡ Decrypted
2025-11-26 08:25:28 +00:00
bdf9af0650 feat: v2.0 Sprint 3 - Cloud URI Support & Command Integration (Part 1)
Sprint 3 Implementation - Cloud URI Support:

New Features:
 Cloud URI parser (s3://bucket/path)
 Backup command with --cloud URI flag
 Restore from cloud URIs
 Verify cloud backups
 Cleanup cloud storage with retention policy

New Files:
- internal/cloud/uri.go - Cloud URI parser
- internal/restore/ - Cloud download module
- internal/restore/cloud_download.go - Download & verify helper

Modified Commands:
- cmd/backup.go - Added --cloud s3://bucket/path flag
- cmd/restore.go - Auto-detect & download from cloud URIs
- cmd/verify.go - Verify backups from cloud storage
- cmd/cleanup.go - Apply retention policy to cloud storage

URI Support:
- s3://bucket/path/file.dump - AWS S3
- minio://bucket/path/file.dump - MinIO
- b2://bucket/path/file.dump - Backblaze B2
- gs://bucket/path/file.dump - Google Cloud Storage

Examples:
  # Backup with cloud URI
  dbbackup backup single mydb --cloud s3://my-bucket/backups/

  # Restore from cloud
  dbbackup restore single s3://my-bucket/backups/mydb.dump --confirm

  # Verify cloud backup
  dbbackup verify-backup s3://my-bucket/backups/mydb.dump

  # Cleanup old cloud backups
  dbbackup cleanup s3://my-bucket/backups/ --retention-days 30

Features:
- Automatic download to temp directory
- SHA-256 verification after download
- Automatic temp file cleanup
- Progress tracking for downloads
- Metadata synchronization
- Retention policy for cloud storage

Sprint 3 Part 1 COMPLETE!
2025-11-25 20:30:28 +00:00
0cf21cd893 feat: Complete MEDIUM priority security features with testing
- Implemented TUI auto-select for automated testing
- Fixed TUI automation: autoSelectMsg handling in Update()
- Auto-database selection in DatabaseSelector
- Created focused test suite (test_as_postgres.sh)
- Created retention policy test (test_retention.sh)
- All 10 security tests passing

Features validated:
 Backup retention policy (30 days, min backups)
 Rate limiting (exponential backoff)
 Privilege checks (root detection)
 Resource limit validation
 Path sanitization
 Checksum verification (SHA-256)
 Audit logging
 Secure permissions
 Configuration persistence
 TUI automation framework

Test results: 10/10 passed
Backup files created with .dump, .sha256, .info
Retention cleanup verified (old files removed)
2025-11-25 15:25:56 +00:00
a0e7fd71de security: Implement HIGH priority security improvements
HIGH Priority Security Features:
- Path sanitization with filepath.Clean() for all user paths
- Path traversal attack prevention in backup/restore operations
- Secure config file permissions (0600 instead of 0644)
- SHA-256 checksum generation for all backup archives
- Checksum verification during restore operations
- Comprehensive audit logging for compliance

New Security Module (internal/security/):
- paths.go: ValidateBackupPath() and ValidateArchivePath()
- checksum.go: ChecksumFile(), VerifyChecksum(), LoadAndVerifyChecksum()
- audit.go: AuditLogger with structured event tracking

Integration Points:
- Backup engine: Path validation, checksum generation
- Restore engine: Path validation, checksum verification
- All backup/restore operations: Audit logging
- Configuration saves: Audit logging

Security Enhancements:
- .dbbackup.conf now created with 0600 permissions (owner-only)
- All archive files get .sha256 checksum files
- Restore warns if checksum verification fails but continues
- Audit events logged for all administrative operations
- User tracking via $USER/$USERNAME environment variables

Compliance Features:
- Audit trail for backups, restores, config changes
- Structured logging with timestamps, users, actions, results
- Event details include paths, sizes, durations, errors

Testing:
- All code compiles successfully
- Cross-platform build verified
- Ready for integration testing
2025-11-25 12:03:21 +00:00
2722ff782d Perf: Major performance improvements - parallel cluster operations and optimized goroutines
1. Parallel Cluster Operations (3-5x speedup):
   - Added ClusterParallelism config option (default: 2 concurrent operations)
   - Implemented worker pool pattern for cluster backup/restore
   - Thread-safe progress tracking with sync.Mutex and atomic counters
   - Configurable via CLUSTER_PARALLELISM env var

2. Progress Indicator Optimizations:
   - Replaced busy-wait select+sleep with time.Ticker in Spinner
   - Replaced busy-wait select+sleep with time.Ticker in Dots
   - More CPU-efficient, cleaner shutdown pattern

3. Signal Handler Cleanup:
   - Added signal.Stop() to properly deregister signal handlers
   - Prevents goroutine leaks on long-running operations
   - Applied to both single and cluster restore commands

Benefits:
- Cluster backup/restore 3-5x faster with 2-4 workers
- Reduced CPU usage in progress spinners
- Cleaner goroutine lifecycle management
- No breaking changes - sequential by default if parallelism=1
2025-11-12 13:07:41 +00:00
2ad9032b19 Fix: Strip file extensions from target database names to prevent double extensions
- Created stripFileExtensions() helper that loops until all extensions removed
- Applied to both --target flag values and extracted archive names
- Handles cases like .sql.gz.sql.gz by repeatedly stripping until clean
- Updated both cmd/restore.go and internal/tui/archive_browser.go
- Ensures database names never contain .sql, .dump, .tar.gz etc extensions
2025-11-12 10:26:15 +00:00
97be6564ef feat: implement full restore functionality with TUI integration
- Add complete restore engine (internal/restore/)
  - RestoreSingle() for single database restore
  - RestoreCluster() for full cluster restore
  - Archive format detection (7 formats supported)
  - Safety validation (integrity, disk space, tools)
  - Streaming decompression with pigz support

- Add CLI restore commands (cmd/restore.go)
  - restore single: restore single database backup
  - restore cluster: restore full cluster backup
  - restore list: list available backup archives
  - Safety-first design: dry-run by default, --confirm required

- Add TUI restore integration (internal/tui/)
  - Archive browser: browse and select backups
  - Restore preview: safety checks and confirmation
  - Restore execution: real-time progress tracking
  - Backup manager: comprehensive archive management

- Features:
  - Format auto-detection (.dump, .dump.gz, .sql, .sql.gz, .tar.gz)
  - Archive validation before restore
  - Disk space verification
  - Tool availability checks
  - Target database configuration
  - Clean-first and create-if-missing options
  - Parallel decompression support
  - Progress tracking with phases

Phase 1 (Core Functionality) complete and tested
2025-11-07 09:41:44 +00:00