diff options
Diffstat (limited to 'src')
-rw-r--r-- | src/bin/Makefile | 2 | ||||
-rw-r--r-- | src/bin/pg_validatebackup/.gitignore | 2 | ||||
-rw-r--r-- | src/bin/pg_verifybackup/.gitignore | 2 | ||||
-rw-r--r-- | src/bin/pg_verifybackup/Makefile (renamed from src/bin/pg_validatebackup/Makefile) | 18 | ||||
-rw-r--r-- | src/bin/pg_verifybackup/parse_manifest.c (renamed from src/bin/pg_validatebackup/parse_manifest.c) | 4 | ||||
-rw-r--r-- | src/bin/pg_verifybackup/parse_manifest.h (renamed from src/bin/pg_validatebackup/parse_manifest.h) | 2 | ||||
-rw-r--r-- | src/bin/pg_verifybackup/pg_verifybackup.c (renamed from src/bin/pg_validatebackup/pg_validatebackup.c) | 96 | ||||
-rw-r--r-- | src/bin/pg_verifybackup/t/001_basic.pl (renamed from src/bin/pg_validatebackup/t/001_basic.pl) | 18 | ||||
-rw-r--r-- | src/bin/pg_verifybackup/t/002_algorithm.pl (renamed from src/bin/pg_validatebackup/t/002_algorithm.pl) | 10 | ||||
-rw-r--r-- | src/bin/pg_verifybackup/t/003_corruption.pl (renamed from src/bin/pg_validatebackup/t/003_corruption.pl) | 14 | ||||
-rw-r--r-- | src/bin/pg_verifybackup/t/004_options.pl (renamed from src/bin/pg_validatebackup/t/004_options.pl) | 28 | ||||
-rw-r--r-- | src/bin/pg_verifybackup/t/005_bad_manifest.pl (renamed from src/bin/pg_validatebackup/t/005_bad_manifest.pl) | 4 | ||||
-rw-r--r-- | src/bin/pg_verifybackup/t/006_encoding.pl (renamed from src/bin/pg_validatebackup/t/006_encoding.pl) | 6 | ||||
-rw-r--r-- | src/bin/pg_verifybackup/t/007_wal.pl (renamed from src/bin/pg_validatebackup/t/007_wal.pl) | 14 |
14 files changed, 110 insertions, 110 deletions
diff --git a/src/bin/Makefile b/src/bin/Makefile index 77bceea4fe6..8b870357a14 100644 --- a/src/bin/Makefile +++ b/src/bin/Makefile @@ -27,7 +27,7 @@ SUBDIRS = \ pg_test_fsync \ pg_test_timing \ pg_upgrade \ - pg_validatebackup \ + pg_verifybackup \ pg_waldump \ pgbench \ psql \ diff --git a/src/bin/pg_validatebackup/.gitignore b/src/bin/pg_validatebackup/.gitignore deleted file mode 100644 index 21e0a92429c..00000000000 --- a/src/bin/pg_validatebackup/.gitignore +++ /dev/null @@ -1,2 +0,0 @@ -/pg_validatebackup -/tmp_check/ diff --git a/src/bin/pg_verifybackup/.gitignore b/src/bin/pg_verifybackup/.gitignore new file mode 100644 index 00000000000..910b227ce99 --- /dev/null +++ b/src/bin/pg_verifybackup/.gitignore @@ -0,0 +1,2 @@ +/pg_verifybackup +/tmp_check/ diff --git a/src/bin/pg_validatebackup/Makefile b/src/bin/pg_verifybackup/Makefile index b1c2b7c1be3..c07643b1297 100644 --- a/src/bin/pg_validatebackup/Makefile +++ b/src/bin/pg_verifybackup/Makefile @@ -1,9 +1,9 @@ -# src/bin/pg_validatebackup/Makefile +# src/bin/pg_verifybackup/Makefile -PGFILEDESC = "pg_validatebackup - validate a backup against a backup manifest" +PGFILEDESC = "pg_verifybackup - verify a backup against using a backup manifest" PGAPPICON = win32 -subdir = src/bin/pg_validatebackup +subdir = src/bin/pg_verifybackup top_builddir = ../../.. include $(top_builddir)/src/Makefile.global @@ -13,24 +13,24 @@ LDFLAGS_INTERNAL += -L$(top_builddir)/src/fe_utils -lpgfeutils $(libpq_pgport) OBJS = \ $(WIN32RES) \ parse_manifest.o \ - pg_validatebackup.o + pg_verifybackup.o -all: pg_validatebackup +all: pg_verifybackup -pg_validatebackup: $(OBJS) | submake-libpq submake-libpgport submake-libpgfeutils +pg_verifybackup: $(OBJS) | submake-libpq submake-libpgport submake-libpgfeutils $(CC) $(CFLAGS) $^ $(LDFLAGS) $(LDFLAGS_EX) $(LIBS) -o $@$(X) install: all installdirs - $(INSTALL_PROGRAM) pg_validatebackup$(X) '$(DESTDIR)$(bindir)/pg_validatebackup$(X)' + $(INSTALL_PROGRAM) pg_verifybackup$(X) '$(DESTDIR)$(bindir)/pg_verifybackup$(X)' installdirs: $(MKDIR_P) '$(DESTDIR)$(bindir)' uninstall: - rm -f '$(DESTDIR)$(bindir)/pg_validatebackup$(X)' + rm -f '$(DESTDIR)$(bindir)/pg_verifybackup$(X)' clean distclean maintainer-clean: - rm -f pg_validatebackup$(X) $(OBJS) + rm -f pg_verifybackup$(X) $(OBJS) rm -rf tmp_check check: diff --git a/src/bin/pg_validatebackup/parse_manifest.c b/src/bin/pg_verifybackup/parse_manifest.c index 0ec9dd6a13f..faee423c7ec 100644 --- a/src/bin/pg_validatebackup/parse_manifest.c +++ b/src/bin/pg_verifybackup/parse_manifest.c @@ -6,7 +6,7 @@ * Portions Copyright (c) 1996-2020, PostgreSQL Global Development Group * Portions Copyright (c) 1994, Regents of the University of California * - * src/bin/pg_validatebackup/parse_manifest.c + * src/bin/pg_verifybackup/parse_manifest.c * *------------------------------------------------------------------------- */ @@ -151,7 +151,7 @@ json_parse_manifest(JsonManifestParseContext *context, char *buffer, if (parse.state != JM_EXPECT_EOF) json_manifest_parse_failure(context, "manifest ended unexpectedly"); - /* Validate the checksum. */ + /* Verify the manifest checksum. */ verify_manifest_checksum(&parse, buffer, size); } diff --git a/src/bin/pg_validatebackup/parse_manifest.h b/src/bin/pg_verifybackup/parse_manifest.h index f0a4fac36bc..49254bfb324 100644 --- a/src/bin/pg_validatebackup/parse_manifest.h +++ b/src/bin/pg_verifybackup/parse_manifest.h @@ -6,7 +6,7 @@ * Portions Copyright (c) 1996-2020, PostgreSQL Global Development Group * Portions Copyright (c) 1994, Regents of the University of California * - * src/bin/pg_validatebackup/parse_manifest.h + * src/bin/pg_verifybackup/parse_manifest.h * *------------------------------------------------------------------------- */ diff --git a/src/bin/pg_validatebackup/pg_validatebackup.c b/src/bin/pg_verifybackup/pg_verifybackup.c index f2746385005..9c0a8c55507 100644 --- a/src/bin/pg_validatebackup/pg_validatebackup.c +++ b/src/bin/pg_verifybackup/pg_verifybackup.c @@ -1,12 +1,12 @@ /*------------------------------------------------------------------------- * - * pg_validatebackup.c - * Validate a backup against a backup manifest. + * pg_verifybackup.c + * Verify a backup against a backup manifest. * * Portions Copyright (c) 1996-2020, PostgreSQL Global Development Group * Portions Copyright (c) 1994, Regents of the University of California * - * src/bin/pg_validatebackup/pg_validatebackup.c + * src/bin/pg_verifybackup/pg_verifybackup.c * *------------------------------------------------------------------------- */ @@ -101,14 +101,14 @@ typedef struct parser_context /* * All of the context information we need while checking a backup manifest. */ -typedef struct validator_context +typedef struct verifier_context { manifest_files_hash *ht; char *backup_directory; SimpleStringList ignore_list; bool exit_on_error; bool saw_any_error; -} validator_context; +} verifier_context; static void parse_manifest_file(char *manifest_path, manifest_files_hash **ht_p, @@ -127,25 +127,25 @@ static void report_manifest_error(JsonManifestParseContext *context, char *fmt,...) pg_attribute_printf(2, 3) pg_attribute_noreturn(); -static void validate_backup_directory(validator_context *context, - char *relpath, char *fullpath); -static void validate_backup_file(validator_context *context, - char *relpath, char *fullpath); -static void report_extra_backup_files(validator_context *context); -static void validate_backup_checksums(validator_context *context); -static void validate_file_checksum(validator_context *context, - manifest_file *m, char *pathname); -static void parse_required_wal(validator_context *context, +static void verify_backup_directory(verifier_context *context, + char *relpath, char *fullpath); +static void verify_backup_file(verifier_context *context, + char *relpath, char *fullpath); +static void report_extra_backup_files(verifier_context *context); +static void verify_backup_checksums(verifier_context *context); +static void verify_file_checksum(verifier_context *context, + manifest_file *m, char *pathname); +static void parse_required_wal(verifier_context *context, char *pg_waldump_path, char *wal_directory, manifest_wal_range *first_wal_range); -static void report_backup_error(validator_context *context, +static void report_backup_error(verifier_context *context, const char *pg_restrict fmt,...) pg_attribute_printf(2, 3); static void report_fatal_error(const char *pg_restrict fmt,...) pg_attribute_printf(1, 2) pg_attribute_noreturn(); -static bool should_ignore_relpath(validator_context *context, char *relpath); +static bool should_ignore_relpath(verifier_context *context, char *relpath); static void usage(void); @@ -170,7 +170,7 @@ main(int argc, char **argv) }; int c; - validator_context context; + verifier_context context; manifest_wal_range *first_wal_range; char *manifest_path = NULL; bool no_parse_wal = false; @@ -180,7 +180,7 @@ main(int argc, char **argv) char *pg_waldump_path = NULL; pg_logging_init(argv[0]); - set_pglocale_pgservice(argv[0], PG_TEXTDOMAIN("pg_validatebackup")); + set_pglocale_pgservice(argv[0], PG_TEXTDOMAIN("pg_verifybackup")); progname = get_progname(argv[0]); memset(&context, 0, sizeof(context)); @@ -194,7 +194,7 @@ main(int argc, char **argv) } if (strcmp(argv[1], "--version") == 0 || strcmp(argv[1], "-V") == 0) { - puts("pg_validatebackup (PostgreSQL) " PG_VERSION); + puts("pg_verifybackup (PostgreSQL) " PG_VERSION); exit(0); } } @@ -207,7 +207,7 @@ main(int argc, char **argv) * * Ignore the pg_wal directory, because those files are not included in * the backup manifest either, since they are fetched separately from the - * backup itself, and validated via a separate mechanism. + * backup itself, and verified via a separate mechanism. * * Ignore postgresql.auto.conf, recovery.signal, and standby.signal, * because we expect that those files may sometimes be created or changed @@ -299,12 +299,12 @@ main(int argc, char **argv) pg_log_fatal("The program \"%s\" is needed by %s but was\n" "not found in the same directory as \"%s\".\n" "Check your installation.", - "pg_waldump", "pg_validatebackup", full_path); + "pg_waldump", "pg_verifybackup", full_path); else pg_log_fatal("The program \"%s\" was found by \"%s\" but was\n" "not the same version as %s.\n" "Check your installation.", - "pg_waldump", full_path, "pg_validatebackup"); + "pg_waldump", full_path, "pg_verifybackup"); } } @@ -320,7 +320,7 @@ main(int argc, char **argv) /* * Try to read the manifest. We treat any errors encountered while parsing * the manifest as fatal; there doesn't seem to be much point in trying to - * validate the backup directory against a corrupted manifest. + * verify the backup directory against a corrupted manifest. */ parse_manifest_file(manifest_path, &context.ht, &first_wal_range); @@ -330,7 +330,7 @@ main(int argc, char **argv) * match. We also set the "matched" flag on every manifest entry that * corresponds to a file on disk. */ - validate_backup_directory(&context, NULL, context.backup_directory); + verify_backup_directory(&context, NULL, context.backup_directory); /* * The "matched" flag should now be set on every entry in the hash table. @@ -344,7 +344,7 @@ main(int argc, char **argv) * told to skip it. */ if (!skip_checksums) - validate_backup_checksums(&context); + verify_backup_checksums(&context); /* * Try to parse the required ranges of WAL records, unless we were told @@ -512,17 +512,17 @@ record_manifest_details_for_wal_range(JsonManifestParseContext *context, } /* - * Validate one directory. + * Verify one directory. * - * 'relpath' is NULL if we are to validate the top-level backup directory, - * and otherwise the relative path to the directory that is to be validated. + * 'relpath' is NULL if we are to verify the top-level backup directory, + * and otherwise the relative path to the directory that is to be verified. * * 'fullpath' is the backup directory with 'relpath' appended; i.e. the actual * filesystem path at which it can be found. */ static void -validate_backup_directory(validator_context *context, char *relpath, - char *fullpath) +verify_backup_directory(verifier_context *context, char *relpath, + char *fullpath) { DIR *dir; struct dirent *dirent; @@ -565,7 +565,7 @@ validate_backup_directory(validator_context *context, char *relpath, newrelpath = psprintf("%s/%s", relpath, filename); if (!should_ignore_relpath(context, newrelpath)) - validate_backup_file(context, newrelpath, newfullpath); + verify_backup_file(context, newrelpath, newfullpath); pfree(newfullpath); pfree(newrelpath); @@ -580,13 +580,13 @@ validate_backup_directory(validator_context *context, char *relpath, } /* - * Validate one file (which might actually be a directory or a symlink). + * Verify one file (which might actually be a directory or a symlink). * * The arguments to this function have the same meaning as the arguments to - * validate_backup_directory. + * verify_backup_directory. */ static void -validate_backup_file(validator_context *context, char *relpath, char *fullpath) +verify_backup_file(verifier_context *context, char *relpath, char *fullpath) { struct stat sb; manifest_file *m; @@ -609,7 +609,7 @@ validate_backup_file(validator_context *context, char *relpath, char *fullpath) /* If it's a directory, just recurse. */ if (S_ISDIR(sb.st_mode)) { - validate_backup_directory(context, relpath, fullpath); + verify_backup_directory(context, relpath, fullpath); return; } @@ -645,7 +645,7 @@ validate_backup_file(validator_context *context, char *relpath, char *fullpath) } /* - * We don't validate checksums at this stage. We first finish validating + * We don't verify checksums at this stage. We first finish verifying * that we have the expected set of files with the expected sizes, and * only afterwards verify the checksums. That's because computing * checksums may take a while, and we'd like to report more obvious @@ -658,7 +658,7 @@ validate_backup_file(validator_context *context, char *relpath, char *fullpath) * that such files are present in the manifest but not on disk. */ static void -report_extra_backup_files(validator_context *context) +report_extra_backup_files(verifier_context *context) { manifest_files_iterator it; manifest_file *m; @@ -672,12 +672,12 @@ report_extra_backup_files(validator_context *context) } /* - * Validate checksums for hash table entries that are otherwise unproblematic. + * Verify checksums for hash table entries that are otherwise unproblematic. * If we've already reported some problem related to a hash table entry, or * if it has no checksum, just skip it. */ static void -validate_backup_checksums(validator_context *context) +verify_backup_checksums(verifier_context *context) { manifest_files_iterator it; manifest_file *m; @@ -694,8 +694,8 @@ validate_backup_checksums(validator_context *context) fullpath = psprintf("%s/%s", context->backup_directory, m->pathname); - /* Do the actual checksum validation. */ - validate_file_checksum(context, m, fullpath); + /* Do the actual checksum verification. */ + verify_file_checksum(context, m, fullpath); /* Avoid leaking memory. */ pfree(fullpath); @@ -704,10 +704,10 @@ validate_backup_checksums(validator_context *context) } /* - * Validate the checksum of a single file. + * Verify the checksum of a single file. */ static void -validate_file_checksum(validator_context *context, manifest_file *m, +verify_file_checksum(verifier_context *context, manifest_file *m, char *fullpath) { pg_checksum_context checksum_ctx; @@ -754,7 +754,7 @@ validate_file_checksum(validator_context *context, manifest_file *m, /* * Double-check that we read the expected number of bytes from the file. - * Normally, a file size mismatch would be caught in validate_backup_file + * Normally, a file size mismatch would be caught in verify_backup_file * and this check would never be reached, but this provides additional * safety and clarity in the event of concurrent modifications or * filesystem misbehavior. @@ -786,7 +786,7 @@ validate_file_checksum(validator_context *context, manifest_file *m, * pg_waldump. */ static void -parse_required_wal(validator_context *context, char *pg_waldump_path, +parse_required_wal(verifier_context *context, char *pg_waldump_path, char *wal_directory, manifest_wal_range *first_wal_range) { manifest_wal_range *this_wal_range = first_wal_range; @@ -817,7 +817,7 @@ parse_required_wal(validator_context *context, char *pg_waldump_path, * context says we should. */ static void -report_backup_error(validator_context *context, const char *pg_restrict fmt,...) +report_backup_error(verifier_context *context, const char *pg_restrict fmt,...) { va_list ap; @@ -853,7 +853,7 @@ report_fatal_error(const char *pg_restrict fmt,...) * "aa/bb" is not a prefix of "aa/bbb", but it is a prefix of "aa/bb/cc". */ static bool -should_ignore_relpath(validator_context *context, char *relpath) +should_ignore_relpath(verifier_context *context, char *relpath) { SimpleStringListCell *cell; @@ -889,7 +889,7 @@ hash_string_pointer(char *s) static void usage(void) { - printf(_("%s validates a backup against the backup manifest.\n\n"), progname); + printf(_("%s verifies a backup against the backup manifest.\n\n"), progname); printf(_("Usage:\n %s [OPTION]... BACKUPDIR\n\n"), progname); printf(_("Options:\n")); printf(_(" -e, --exit-on-error exit immediately on error\n")); diff --git a/src/bin/pg_validatebackup/t/001_basic.pl b/src/bin/pg_verifybackup/t/001_basic.pl index 6d4b8ea01a6..0d4d71aaa10 100644 --- a/src/bin/pg_validatebackup/t/001_basic.pl +++ b/src/bin/pg_verifybackup/t/001_basic.pl @@ -5,17 +5,17 @@ use Test::More tests => 16; my $tempdir = TestLib::tempdir; -program_help_ok('pg_validatebackup'); -program_version_ok('pg_validatebackup'); -program_options_handling_ok('pg_validatebackup'); +program_help_ok('pg_verifybackup'); +program_version_ok('pg_verifybackup'); +program_options_handling_ok('pg_verifybackup'); -command_fails_like(['pg_validatebackup'], +command_fails_like(['pg_verifybackup'], qr/no backup directory specified/, 'target directory must be specified'); -command_fails_like(['pg_validatebackup', $tempdir], +command_fails_like(['pg_verifybackup', $tempdir], qr/could not open file.*\/backup_manifest\"/, - 'pg_validatebackup requires a manifest'); -command_fails_like(['pg_validatebackup', $tempdir, $tempdir], + 'pg_verifybackup requires a manifest'); +command_fails_like(['pg_verifybackup', $tempdir, $tempdir], qr/too many command-line arguments/, 'multiple target directories not allowed'); @@ -24,7 +24,7 @@ open(my $fh, '>', "$tempdir/backup_manifest") || die "open: $!"; close($fh); # but then try to use an alternate, nonexisting manifest -command_fails_like(['pg_validatebackup', '-m', "$tempdir/not_the_manifest", +command_fails_like(['pg_verifybackup', '-m', "$tempdir/not_the_manifest", $tempdir], qr/could not open file.*\/not_the_manifest\"/, - 'pg_validatebackup respects -m flag'); + 'pg_verifybackup respects -m flag'); diff --git a/src/bin/pg_validatebackup/t/002_algorithm.pl b/src/bin/pg_verifybackup/t/002_algorithm.pl index 98871e12a5e..ee82dcee376 100644 --- a/src/bin/pg_validatebackup/t/002_algorithm.pl +++ b/src/bin/pg_verifybackup/t/002_algorithm.pl @@ -1,4 +1,4 @@ -# Verify that we can take and validate backups with various checksum types. +# Verify that we can take and verify backups with various checksum types. use strict; use warnings; @@ -19,7 +19,7 @@ for my $algorithm (qw(bogus none crc32c sha224 sha256 sha384 sha512)) my @backup = ('pg_basebackup', '-D', $backup_path, '--manifest-checksums', $algorithm, '--no-sync'); - my @validate = ('pg_validatebackup', '-e', $backup_path); + my @verify = ('pg_verifybackup', '-e', $backup_path); # A backup with a bogus algorithm should fail. if ($algorithm eq 'bogus') @@ -49,9 +49,9 @@ for my $algorithm (qw(bogus none crc32c sha224 sha256 sha384 sha512)) "$algorithm is mentioned many times in the manifest"); } - # Make sure that it validates OK. - $master->command_ok(\@validate, - "validate backup with algorithm \"$algorithm\""); + # Make sure that it verifies OK. + $master->command_ok(\@verify, + "verify backup with algorithm \"$algorithm\""); # Remove backup immediately to save disk space. rmtree($backup_path); diff --git a/src/bin/pg_validatebackup/t/003_corruption.pl b/src/bin/pg_verifybackup/t/003_corruption.pl index 09f8b982504..113959420ee 100644 --- a/src/bin/pg_validatebackup/t/003_corruption.pl +++ b/src/bin/pg_verifybackup/t/003_corruption.pl @@ -1,4 +1,4 @@ -# Verify that various forms of corruption are detected by pg_validatebackup. +# Verify that various forms of corruption are detected by pg_verifybackup. use strict; use warnings; @@ -105,7 +105,7 @@ for my $scenario (@scenario) skip "unix-style permissions not supported on Windows", 4 if $scenario->{'skip_on_windows'} && $windows_os; - # Take a backup and check that it validates OK. + # Take a backup and check that it verifies OK. my $backup_path = $master->backup_dir . '/' . $name; my $backup_ts_path = TestLib::perl2host(TestLib::tempdir_short()); # The tablespace map parameter confuses Msys2, which tries to mangle @@ -115,16 +115,16 @@ for my $scenario (@scenario) $master->command_ok(['pg_basebackup', '-D', $backup_path, '--no-sync', '-T', "${source_ts_path}=${backup_ts_path}"], "base backup ok"); - command_ok(['pg_validatebackup', $backup_path ], - "intact backup validated"); + command_ok(['pg_verifybackup', $backup_path ], + "intact backup verified"); # Mutilate the backup in some way. $scenario->{'mutilate'}->($backup_path); - # Now check that the backup no longer validates. - command_fails_like(['pg_validatebackup', $backup_path ], + # Now check that the backup no longer verifies. + command_fails_like(['pg_verifybackup', $backup_path ], $scenario->{'fails_like'}, - "corrupt backup fails validation: $name"); + "corrupt backup fails verification: $name"); # Run cleanup hook, if provided. $scenario->{'cleanup'}->($backup_path) diff --git a/src/bin/pg_validatebackup/t/004_options.pl b/src/bin/pg_verifybackup/t/004_options.pl index 8f185626ed6..9bae8eb565b 100644 --- a/src/bin/pg_validatebackup/t/004_options.pl +++ b/src/bin/pg_verifybackup/t/004_options.pl @@ -1,4 +1,4 @@ -# Verify the behavior of assorted pg_validatebackup options. +# Verify the behavior of assorted pg_verifybackup options. use strict; use warnings; @@ -17,10 +17,10 @@ my $backup_path = $master->backup_dir . '/test_options'; $master->command_ok(['pg_basebackup', '-D', $backup_path, '--no-sync' ], "base backup ok"); -# Verify that pg_validatebackup -q succeeds and produces no output. +# Verify that pg_verifybackup -q succeeds and produces no output. my $stdout; my $stderr; -my $result = IPC::Run::run ['pg_validatebackup', '-q', $backup_path ], +my $result = IPC::Run::run ['pg_verifybackup', '-q', $backup_path ], '>', \$stdout, '2>', \$stderr; ok($result, "-q succeeds: exit code 0"); is($stdout, '', "-q succeeds: no stdout"); @@ -33,19 +33,19 @@ open(my $fh, '>', $version_pathname) || die "open $version_pathname: $!"; print $fh 'q' x length($version_contents); close($fh); -# Verify that pg_validatebackup -q now fails. -command_fails_like(['pg_validatebackup', '-q', $backup_path ], +# Verify that pg_verifybackup -q now fails. +command_fails_like(['pg_verifybackup', '-q', $backup_path ], qr/checksum mismatch for file \"PG_VERSION\"/, '-q checksum mismatch'); -# Since we didn't change the length of the file, validation should succeed +# Since we didn't change the length of the file, verification should succeed # if we ignore checksums. Check that we get the right message, too. -command_like(['pg_validatebackup', '-s', $backup_path ], +command_like(['pg_verifybackup', '-s', $backup_path ], qr/backup successfully verified/, '-s skips checksumming'); # Validation should succeed if we ignore the problem file. -command_like(['pg_validatebackup', '-i', 'PG_VERSION', $backup_path ], +command_like(['pg_verifybackup', '-i', 'PG_VERSION', $backup_path ], qr/backup successfully verified/, '-i ignores problem file'); @@ -53,19 +53,19 @@ command_like(['pg_validatebackup', '-i', 'PG_VERSION', $backup_path ], rmtree($backup_path . "/pg_xact"); # We're ignoring the problem with PG_VERSION, but not the problem with -# pg_xact, so validation should fail here. -command_fails_like(['pg_validatebackup', '-i', 'PG_VERSION', $backup_path ], +# pg_xact, so verification should fail here. +command_fails_like(['pg_verifybackup', '-i', 'PG_VERSION', $backup_path ], qr/pg_xact.*is present in the manifest but not on disk/, '-i does not ignore all problems'); # If we use -i twice, we should be able to ignore all of the problems. -command_like(['pg_validatebackup', '-i', 'PG_VERSION', '-i', 'pg_xact', +command_like(['pg_verifybackup', '-i', 'PG_VERSION', '-i', 'pg_xact', $backup_path ], qr/backup successfully verified/, 'multiple -i options work'); # Verify that when -i is not used, both problems are reported. -$result = IPC::Run::run ['pg_validatebackup', $backup_path ], +$result = IPC::Run::run ['pg_verifybackup', $backup_path ], '>', \$stdout, '2>', \$stderr; ok(!$result, "multiple problems: fails"); like($stderr, qr/pg_xact.*is present in the manifest but not on disk/, @@ -74,7 +74,7 @@ like($stderr, qr/checksum mismatch for file \"PG_VERSION\"/, "multiple problems: checksum mismatch reported"); # Verify that when -e is used, only the problem detected first is reported. -$result = IPC::Run::run ['pg_validatebackup', '-e', $backup_path ], +$result = IPC::Run::run ['pg_verifybackup', '-e', $backup_path ], '>', \$stdout, '2>', \$stderr; ok(!$result, "-e reports 1 error: fails"); like($stderr, qr/pg_xact.*is present in the manifest but not on disk/, @@ -83,7 +83,7 @@ unlike($stderr, qr/checksum mismatch for file \"PG_VERSION\"/, "-e reports 1 error: checksum mismatch not reported"); # Test valid manifest with nonexistent backup directory. -command_fails_like(['pg_validatebackup', '-m', "$backup_path/backup_manifest", +command_fails_like(['pg_verifybackup', '-m', "$backup_path/backup_manifest", "$backup_path/fake" ], qr/could not open directory/, 'nonexistent backup directory'); diff --git a/src/bin/pg_validatebackup/t/005_bad_manifest.pl b/src/bin/pg_verifybackup/t/005_bad_manifest.pl index f52a8b71ea9..3dd2b5a20df 100644 --- a/src/bin/pg_validatebackup/t/005_bad_manifest.pl +++ b/src/bin/pg_verifybackup/t/005_bad_manifest.pl @@ -1,4 +1,4 @@ -# Test the behavior of pg_validatebackup when the backup manifest has +# Test the behavior of pg_verifybackup when the backup manifest has # problems. use strict; @@ -198,7 +198,7 @@ sub test_bad_manifest print $fh $manifest_contents; close($fh); - command_fails_like(['pg_validatebackup', $tempdir], $regexp, + command_fails_like(['pg_verifybackup', $tempdir], $regexp, $test_name); return; } diff --git a/src/bin/pg_validatebackup/t/006_encoding.pl b/src/bin/pg_verifybackup/t/006_encoding.pl index 5e3e7152a52..3c6b57adcd4 100644 --- a/src/bin/pg_validatebackup/t/006_encoding.pl +++ b/src/bin/pg_verifybackup/t/006_encoding.pl @@ -1,4 +1,4 @@ -# Verify that pg_validatebackup handles hex-encoded filenames correctly. +# Verify that pg_verifybackup handles hex-encoded filenames correctly. use strict; use warnings; @@ -22,6 +22,6 @@ my $count_of_encoded_path_in_manifest = cmp_ok($count_of_encoded_path_in_manifest, '>', 100, "many paths are encoded in the manifest"); -command_like(['pg_validatebackup', '-s', $backup_path ], +command_like(['pg_verifybackup', '-s', $backup_path ], qr/backup successfully verified/, - 'backup with forced encoding validated'); + 'backup with forced encoding verified'); diff --git a/src/bin/pg_validatebackup/t/007_wal.pl b/src/bin/pg_verifybackup/t/007_wal.pl index b755e0f5e7f..5e891d1b6f4 100644 --- a/src/bin/pg_validatebackup/t/007_wal.pl +++ b/src/bin/pg_verifybackup/t/007_wal.pl @@ -1,4 +1,4 @@ -# Test pg_validatebackup's WAL validation. +# Test pg_verifybackup's WAL verification. use strict; use warnings; @@ -22,17 +22,17 @@ my $original_pg_wal = $backup_path . '/pg_wal'; my $relocated_pg_wal = $master->backup_dir . '/relocated_pg_wal'; rename($original_pg_wal, $relocated_pg_wal) || die "rename pg_wal: $!"; -# WAL validation should fail. -command_fails_like(['pg_validatebackup', $backup_path ], +# WAL verification should fail. +command_fails_like(['pg_verifybackup', $backup_path ], qr/WAL parsing failed for timeline 1/, 'missing pg_wal causes failure'); # Should work if we skip WAL verification. -command_ok(['pg_validatebackup', '-n', $backup_path ], +command_ok(['pg_verifybackup', '-n', $backup_path ], 'missing pg_wal OK if not verifying WAL'); # Should also work if we specify the correct WAL location. -command_ok(['pg_validatebackup', '-w', $relocated_pg_wal, $backup_path ], +command_ok(['pg_verifybackup', '-w', $relocated_pg_wal, $backup_path ], '-w can be used to specify WAL directory'); # Move directory back to original location. @@ -49,7 +49,7 @@ open(my $fh, '>', $wal_corruption_target) print $fh 'w' x $wal_size; close($fh); -# WAL validation should fail. -command_fails_like(['pg_validatebackup', $backup_path ], +# WAL verification should fail. +command_fails_like(['pg_verifybackup', $backup_path ], qr/WAL parsing failed for timeline 1/, 'corrupt WAL file causes failure'); |