|
|
|
|
@@ -6,11 +6,11 @@ bootstrap_filesystem() {
|
|
|
|
|
mkdir -p "${backup_job_filesystem_path}"
|
|
|
|
|
fi
|
|
|
|
|
if [ "$(stat -c %U "${backup_job_filesystem_path}")" != "${DBBACKUP_USER}" ] ; then chown -R "${DBBACKUP_USER}":"${DBBACKUP_GROUP}" "${backup_job_filesystem_path}" ; fi
|
|
|
|
|
if [ "$(stat -c %a "${backup_job_filesystem_path}")" != "${backup_job_filesystem_permission}" ] ; then chmod -R "${backup_job_filesystem_permission}" "${backup_job_filesystem_path}" ; fi
|
|
|
|
|
if [ "$(stat -c %a "${backup_job_filesystem_path}")" != "${backup_job_filesystem_path_permission}" ] ; then chmod "${backup_job_filesystem_path_permission}" "${backup_job_filesystem_path}" ; fi
|
|
|
|
|
|
|
|
|
|
if [ -d "${backup_job_filesystem_archive_path}" ]; then
|
|
|
|
|
if [ "$(stat -c %U "${backup_job_filesystem_archive_path}")" != "${DBBACKUP_USER}" ] ; then chown -R "${DBBACKUP_USER}":"${DBBACKUP_GROUP}" "${backup_job_filesystem_archive_path}" ; fi
|
|
|
|
|
if [ "$(stat -c %a "${backup_job_filesystem_archive_path}")" != "${backup_job_filesystem_permission}" ] ; then chmod -R "${backup_job_filesystem_permission}" "${backup_job_filesystem_archive_path}" ; fi
|
|
|
|
|
if [ "$(stat -c %a "${backup_job_filesystem_archive_path}")" != "${backup_job_filesystem_path_permission}" ] ; then chmod "${backup_job_filesystem_path_permission}" "${backup_job_filesystem_archive_path}" ; fi
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
if [ ! -d "${LOG_PATH}" ]; then
|
|
|
|
|
@@ -48,7 +48,8 @@ bootstrap_variables() {
|
|
|
|
|
DEFAULT_USER \
|
|
|
|
|
DEFAULT_PASS \
|
|
|
|
|
DEFAULT_ENCRYPT_PASSPHRASE \
|
|
|
|
|
DEFAULT_ENCRYPT_PUBKEY \
|
|
|
|
|
DEFAULT_ENCRYPT_PUBLIC_KEY \
|
|
|
|
|
DEFAULT_ENCRYPT_PRIVATE_KEY \
|
|
|
|
|
DEFAULT_MONGO_CUSTOM_URI \
|
|
|
|
|
DEFAULT_MYSQL_TLS_CA_FILE \
|
|
|
|
|
DEFAULT_MYSQL_TLS_CERT_FILE \
|
|
|
|
|
@@ -74,7 +75,8 @@ bootstrap_variables() {
|
|
|
|
|
DB"${backup_instance_number}"_USER \
|
|
|
|
|
DB"${backup_instance_number}"_PASS \
|
|
|
|
|
DB"${backup_instance_number}"_ENCRYPT_PASSPHRASE \
|
|
|
|
|
DB"${backup_instance_number}"_ENCRYPT_PUBKEY \
|
|
|
|
|
DB"${backup_instance_number}"_ENCRYPT_PUBLIC_KEY \
|
|
|
|
|
DB"${backup_instance_number}"_ENCRYPT_PRIVATE_KEY \
|
|
|
|
|
DB"${backup_instance_number}"_MONGO_CUSTOM_URI \
|
|
|
|
|
DB"${backup_instance_number}"_MYSQL_TLS_CA_FILE \
|
|
|
|
|
DB"${backup_instance_number}"_MYSQL_TLS_CERT_FILE \
|
|
|
|
|
@@ -151,18 +153,28 @@ bootstrap_variables() {
|
|
|
|
|
fi
|
|
|
|
|
##
|
|
|
|
|
|
|
|
|
|
if grep -qo ".*_PASS='.*'" "${backup_instance_vars}"; then
|
|
|
|
|
print_debug "[bootstrap_variables] [backup_init] Found _PASS variable with quotes"
|
|
|
|
|
sed -i "s|_PASS='\(.*\)'|_PASS=\1|g" "${backup_instance_vars}"
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
if grep -qo "MONGO_CUSTOM_URI='.*'" "${backup_instance_vars}"; then
|
|
|
|
|
print_debug "[bootstrap_variables] [backup_init] Found _MONGO_CUSTOM_URI variable with quotes"
|
|
|
|
|
sed -i "s|MONGO_CUSTOM_URI='\(.*\)'|MONGO_CUSTOM_URI=\1|g" "${backup_instance_vars}"
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
transform_backup_instance_variable() {
|
|
|
|
|
if grep -q "^DB${1}_${2}=" "${backup_instance_vars}" && [ "$(grep "^DB${1}_${2}=" "${backup_instance_vars}" | cut -d = -f2)" != "unset" ]; then
|
|
|
|
|
export "$3"="$(grep "^DB${1}_${2}=" "${backup_instance_vars}" | cut -d = -f2)"
|
|
|
|
|
export "$3"="$(grep "^DB${1}_${2}=" "${backup_instance_vars}" | cut -d = -f2-)"
|
|
|
|
|
elif grep -q "^DB_${2}=" "${backup_instance_vars}" && [ "$(grep "^DB_${2}=" "${backup_instance_vars}" | cut -d = -f2)" != "unset" ]; then
|
|
|
|
|
# Allow old legacy work, perhaps remove old DB_ functionality in future? This should allow for seamless upgrades
|
|
|
|
|
#print_warn "Legacy Variable 'DB_${2}'' detected - Please upgrade your variables as they will be removed in version 4.3.0"
|
|
|
|
|
export "$3"="$(grep "^DB_${2}=" "${backup_instance_vars}" | cut -d = -f2)"
|
|
|
|
|
export "$3"="$(grep "^DB_${2}=" "${backup_instance_vars}" | cut -d = -f2-)"
|
|
|
|
|
elif grep -q "^${2}=" "${backup_instance_vars}" && [ "$(grep "^${2}=" "${backup_instance_vars}" | cut -d = -f2)" != "unset" ]; then
|
|
|
|
|
print_warn "Legacy unsupported variable '${2}' detected - Please upgrade your variables as they will be removed in version 4.3.0"
|
|
|
|
|
export "$3"="$(grep "^${2}=" "${backup_instance_vars}" | cut -d = -f2)"
|
|
|
|
|
export "$3"="$(grep "^${2}=" "${backup_instance_vars}" | cut -d = -f2-)"
|
|
|
|
|
elif grep -q "^DEFAULT_${2}=" "${backup_instance_vars}" && [ "$(grep "^DEFAULT_${2}=" "${backup_instance_vars}" | cut -d = -f2)" != "unset" ]; then
|
|
|
|
|
export "$3"="$(grep "^DEFAULT_${2}=" "${backup_instance_vars}" | cut -d = -f2)"
|
|
|
|
|
export "$3"="$(grep "^DEFAULT_${2}=" "${backup_instance_vars}" | cut -d = -f2-)"
|
|
|
|
|
fi
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
@@ -185,12 +197,14 @@ bootstrap_variables() {
|
|
|
|
|
transform_backup_instance_variable "${backup_instance_number}" ENABLE_PARALLEL_COMPRESSION backup_job_parallel_compression
|
|
|
|
|
transform_backup_instance_variable "${backup_instance_number}" ENCRYPT backup_job_encrypt
|
|
|
|
|
transform_backup_instance_variable "${backup_instance_number}" ENCRYPT_PASSPHRASE backup_job_encrypt_passphrase
|
|
|
|
|
transform_backup_instance_variable "${backup_instance_number}" ENCRYPT_PUBKEY backup_job_encrypt_pubkey
|
|
|
|
|
transform_backup_instance_variable "${backup_instance_number}" ENCRYPT_PRIVATE_KEY backup_job_encrypt_private_key
|
|
|
|
|
transform_backup_instance_variable "${backup_instance_number}" ENCRYPT_PUBLIC_KEY backup_job_encrypt_public_key
|
|
|
|
|
transform_backup_instance_variable "${backup_instance_number}" EXTRA_DUMP_OPTS backup_job_extra_dump_opts
|
|
|
|
|
transform_backup_instance_variable "${backup_instance_number}" EXTRA_ENUMERATION_OPTS backup_job_extra_enumeration_opts
|
|
|
|
|
transform_backup_instance_variable "${backup_instance_number}" EXTRA_OPTS backup_job_extra_opts
|
|
|
|
|
transform_backup_instance_variable "${backup_instance_number}" FILESYSTEM_ARCHIVE_PATH backup_job_filesystem_archive_path
|
|
|
|
|
transform_backup_instance_variable "${backup_instance_number}" FILESYSTEM_PATH backup_job_filesystem_path
|
|
|
|
|
transform_backup_instance_variable "${backup_instance_number}" FILESYSTEM_PATH_PERMISSION backup_job_filesystem_path_permission
|
|
|
|
|
transform_backup_instance_variable "${backup_instance_number}" FILESYSTEM_PERMISSION backup_job_filesystem_permission
|
|
|
|
|
transform_backup_instance_variable "${backup_instance_number}" GZ_RSYNCABLE backup_job_gz_rsyncable
|
|
|
|
|
transform_backup_instance_variable "${backup_instance_number}" HOST backup_job_db_host
|
|
|
|
|
@@ -459,12 +473,7 @@ backup_couch() {
|
|
|
|
|
prepare_dbbackup
|
|
|
|
|
backup_job_filename=couch_${backup_job_db_name}_${backup_job_db_host#*//}_${now}.txt
|
|
|
|
|
backup_job_filename_base=couch_${backup_job_db_name}_${backup_job_db_host#*//}
|
|
|
|
|
compression
|
|
|
|
|
pre_dbbackup ${backup_job_db_name}
|
|
|
|
|
write_log notice "Dumping CouchDB database: '${backup_job_db_name}' ${compression_string}"
|
|
|
|
|
if var_true "${DEBUG_BACKUP_COUCH}" ; then debug on; fi
|
|
|
|
|
run_as_user curl -sSL -X GET ${backup_job_db_host}:${backup_job_db_port}/${backup_job_db_name}/_all_docs?include_docs=true | ${compress_cmd} | run_as_user tee "${TEMP_PATH}"/"${backup_job_filename}" > /dev/null
|
|
|
|
|
exit_code=$?
|
|
|
|
|
compressionzyclonite
|
|
|
|
|
if var_true "${DEBUG_BACKUP_COUCH}" ; then debug off; fi
|
|
|
|
|
check_exit_code backup "${backup_job_filename}"
|
|
|
|
|
timer backup finish
|
|
|
|
|
@@ -730,7 +739,7 @@ backup_pgsql() {
|
|
|
|
|
fi
|
|
|
|
|
if [ "${backup_job_db_name,,}" = "all" ] ; then
|
|
|
|
|
write_log debug "Preparing to back up all databases"
|
|
|
|
|
db_names=$(run_as_user psql -h ${backup_job_db_host} -U ${backup_job_db_user} -p ${backup_job_db_port} -d ${authdb} -c 'COPY (SELECT datname FROM pg_database WHERE datistemplate = false) TO STDOUT;' )
|
|
|
|
|
db_names=$(psql -h ${backup_job_db_host} -U ${backup_job_db_user} -p ${backup_job_db_port} -d ${authdb} -c 'COPY (SELECT datname FROM pg_database WHERE datistemplate = false) TO STDOUT;' )
|
|
|
|
|
if [ -n "${backup_job_db_name_exclude}" ] ; then
|
|
|
|
|
db_names_exclusions=$(echo "${backup_job_db_name_exclude}" | tr ',' '\n')
|
|
|
|
|
for db_exclude in ${db_names_exclusions} ; do
|
|
|
|
|
@@ -778,7 +787,7 @@ backup_pgsql() {
|
|
|
|
|
pre_dbbackup all
|
|
|
|
|
write_log notice "Dumping all PostgreSQL databases: '$(echo ${db_names} | xargs | tr ' ' ',')' ${compression_string}"
|
|
|
|
|
if var_true "${DEBUG_BACKUP_PGSQL}" ; then debug on; fi
|
|
|
|
|
tmp_db_names=$(run_as_user psql -h ${backup_job_db_host} -p ${backup_job_db_port} -U ${backup_job_db_user} -d ${authdb} -c 'COPY (SELECT datname FROM pg_database WHERE datistemplate = false) TO STDOUT;' )
|
|
|
|
|
tmp_db_names=$(psql -h ${backup_job_db_host} -p ${backup_job_db_port} -U ${backup_job_db_user} -d ${authdb} -c 'COPY (SELECT datname FROM pg_database WHERE datistemplate = false) TO STDOUT;' )
|
|
|
|
|
for r_db_name in $(echo $db_names | xargs); do
|
|
|
|
|
tmp_db_names=$(echo "$tmp_db_names" | xargs | sed "s|${r_db_name}||g" )
|
|
|
|
|
done
|
|
|
|
|
@@ -843,16 +852,21 @@ backup_sqlite3() {
|
|
|
|
|
db="${db%.*}"
|
|
|
|
|
backup_job_filename=sqlite3_${db}_${now}.sqlite3
|
|
|
|
|
backup_job_filename_base=sqlite3_${db}.sqlite3
|
|
|
|
|
compression
|
|
|
|
|
pre_dbbackup "${db}"
|
|
|
|
|
write_log notice "Dumping sqlite3 database: '${backup_job_db_host}' ${compression_string}"
|
|
|
|
|
if var_true "${DEBUG_BACKUP_SQLITE3}" ; then debug on; fi
|
|
|
|
|
silent run_as_user ${play_fair} sqlite3 "${backup_job_db_host}" ".backup '${TEMP_PATH}/backup.sqlite3'"
|
|
|
|
|
silent ${play_fair} sqlite3 "${backup_job_db_host}" ".backup '${TEMP_PATH}/backup_${now}.sqlite3'"
|
|
|
|
|
exit_code=$?
|
|
|
|
|
check_exit_code backup "${backup_job_filename}"
|
|
|
|
|
run_as_user ${play_fair} cat "${TEMP_PATH}"/backup.sqlite3 | ${dir_compress_cmd} | run_as_user tee "${TEMP_PATH}/${backup_job_filename}" > /dev/null
|
|
|
|
|
timer backup finish
|
|
|
|
|
if [ ! -f "${TEMP_PATH}"/backup_${now}.sqlite3 ] ; then
|
|
|
|
|
print_error "SQLite3 backup failed! Exitting"
|
|
|
|
|
return 1
|
|
|
|
|
fi
|
|
|
|
|
compression
|
|
|
|
|
run_as_user ${play_fair} cat "${TEMP_PATH}"/backup_${now}.sqlite3 | ${dir_compress_cmd} | run_as_user tee "${TEMP_PATH}/${backup_job_filename}" > /dev/null
|
|
|
|
|
rm -rf "${TEMP_PATH}"/backup_${now}.sqlite3
|
|
|
|
|
if var_true "${DEBUG_BACKUP_SQLITE3}" ; then debug off; fi
|
|
|
|
|
timer backup finish
|
|
|
|
|
file_encryption
|
|
|
|
|
generate_checksum
|
|
|
|
|
move_dbbackup
|
|
|
|
|
@@ -1132,10 +1146,11 @@ create_archive() {
|
|
|
|
|
|
|
|
|
|
create_schedulers() {
|
|
|
|
|
if var_true "${DEBUG_CREATE_SCHEDULERS}" ; then debug on; fi
|
|
|
|
|
|
|
|
|
|
backup() {
|
|
|
|
|
bootstrap_variables upgrade BACKUP
|
|
|
|
|
local backup_instances=$(printenv | sort | grep -c "^DB[0-9]._HOST")
|
|
|
|
|
local backup_instances=$(set -o posix ; set | grep -Pc "^(DB[0-9]._HOST=|.*MONGO_CUSTOM_URI=)")
|
|
|
|
|
print_debug "[create_schedulers] Found '${backup_instances}' DB_HOST instances"
|
|
|
|
|
|
|
|
|
|
if [ -n "${DB_HOST}" ] && [ "${backup_instances}" ]; then
|
|
|
|
|
backup_instances=1;
|
|
|
|
|
print_debug "[create_schedulers] Detected using old DB_ variables"
|
|
|
|
|
@@ -1179,7 +1194,7 @@ EOF
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
ctrl_c() {
|
|
|
|
|
sed -i "/^{{BACKUP_NUMBER}}/d" /tmp/.container/db-backup-backups
|
|
|
|
|
sed -i "/^${backup_instance_number}/d" /tmp/.container/db-backup-backups
|
|
|
|
|
symlink_log
|
|
|
|
|
print_warn "User aborted"
|
|
|
|
|
exit
|
|
|
|
|
@@ -1194,7 +1209,11 @@ db_backup_container_init() {
|
|
|
|
|
debug() {
|
|
|
|
|
case "${1}" in
|
|
|
|
|
off)
|
|
|
|
|
backup_job_log_level=$_original_job_log_level}
|
|
|
|
|
CONTAINER_LOG_LEVEL=${_original_container_log_level}
|
|
|
|
|
DEBUG_MODE=${_original_debug_mode}
|
|
|
|
|
SHOW_OUTPUT=${_original_show_output}
|
|
|
|
|
|
|
|
|
|
if var_true "${DEBUG_MODE}" ; then
|
|
|
|
|
set -x
|
|
|
|
|
else
|
|
|
|
|
@@ -1202,9 +1221,25 @@ debug() {
|
|
|
|
|
fi
|
|
|
|
|
;;
|
|
|
|
|
on)
|
|
|
|
|
if [ -z "${_original_container_log_level}" ]; then
|
|
|
|
|
_original_container_log_level="${CONTAINER_LOG_LEVEL}"
|
|
|
|
|
fi
|
|
|
|
|
if [ -z "${_original_job_log_level}" ]; then
|
|
|
|
|
_original_job_log_level="${backup_job_log_level}"
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
if [ -z "${_original_debug_mode}" ]; then
|
|
|
|
|
_original_debug_mode="${DEBUG_MODE}"
|
|
|
|
|
fi
|
|
|
|
|
if [ -z "${_original_show_output}" ]; then
|
|
|
|
|
_original_show_output="${SHOW_OUTPUT}"
|
|
|
|
|
if ! [[ "${_original_show_output,,}" =~ true|false ]]; then
|
|
|
|
|
__original_show_output="FALSE"
|
|
|
|
|
fi
|
|
|
|
|
fi
|
|
|
|
|
backup_job_log_level=DEBUG
|
|
|
|
|
CONTAINER_LOG_LEVEL=DEBUG
|
|
|
|
|
SHOW_OUTPUT=TRUE
|
|
|
|
|
set -x
|
|
|
|
|
;;
|
|
|
|
|
esac
|
|
|
|
|
@@ -1216,21 +1251,26 @@ file_encryption() {
|
|
|
|
|
if [ "${exit_code}" = "0" ] ; then
|
|
|
|
|
print_debug "[file_encryption] Encrypting"
|
|
|
|
|
output_off
|
|
|
|
|
if [ -n "${backup_job_encrypt_passphrase}" ] && [ -n "${backup_job_encrypt_pubkey}" ]; then
|
|
|
|
|
if [ -n "${backup_job_encrypt_passphrase}" ] && [ -n "${backup_job_encrypt_public_key}" ]; then
|
|
|
|
|
print_error "Can't encrypt as both ENCRYPT_PASSPHRASE and ENCRYPT_PUBKEY exist!"
|
|
|
|
|
return
|
|
|
|
|
elif [ -n "${backup_job_encrypt_passphrase}" ] && [ -z "${backup_job_encrypt_pubkey}" ]; then
|
|
|
|
|
elif [ -n "${backup_job_encrypt_passphrase}" ] && [ -z "${backup_job_encrypt_public_key}" ]; then
|
|
|
|
|
print_notice "Encrypting with GPG Passphrase"
|
|
|
|
|
encrypt_routines_start_time=$(date +'%s')
|
|
|
|
|
encrypt_tmp_dir=$(run_as_user mktemp -d)
|
|
|
|
|
echo "${backup_job_encrypt_passphrase}" | silent run_as_user ${play_fair} gpg --batch --home ${encrypt_tmp_dir} --yes --passphrase-fd 0 -c "${TEMP_PATH}"/"${backup_job_filename}"
|
|
|
|
|
rm -rf "${encrypt_tmp_dir}"
|
|
|
|
|
elif [ -z "${backup_job_encrypt_passphrase}" ] && [ -n "${backup_job_encrypt_pubkey}" ]; then
|
|
|
|
|
if [ -f "${backup_job_encrypt_pubkey}" ]; then
|
|
|
|
|
elif [ -z "${backup_job_encrypt_passphrase}" ] && [ -n "${backup_job_encrypt_public_key}" ] && [ -n "${backup_job_encrypt_private_key}" ]; then
|
|
|
|
|
if [ -f "${backup_job_encrypt_private_key}" ]; then
|
|
|
|
|
encrypt_routines_start_time=$(date +'%s')
|
|
|
|
|
print_notice "Encrypting with GPG Public Key"
|
|
|
|
|
print_notice "Encrypting with GPG Private Key"
|
|
|
|
|
encrypt_tmp_dir=$(run_as_user mktemp -d)
|
|
|
|
|
silent run_as_user ${play_fair} gpg --batch --yes --home "${encrypt_tmp_dir}" --recipient-file "${backup_job_encrypt_pubkey}" -c "${TEMP_PATH}"/"${backup_job_filename}"
|
|
|
|
|
cat "${backup_job_encrypt_private_key}" | run_as_user tee "${encrypt_tmp_dir}"/private_key.asc > /dev/null
|
|
|
|
|
print_debug "[file_encryption] [key] Importing Private Key"
|
|
|
|
|
silent run_as_user gpg --home ${encrypt_tmp_dir} --batch --import "${encrypt_tmp_dir}"/private_key.asc
|
|
|
|
|
print_debug "[file_encryption] [key] Encrypting to Public Key"
|
|
|
|
|
cat "${backup_job_encrypt_public_key}" | run_as_user tee "${encrypt_tmp_dir}"/public_key.asc > /dev/null
|
|
|
|
|
silent run_as_user ${play_fair} gpg --batch --yes --home "${encrypt_tmp_dir}" --encrypt --recipient-file "${encrypt_tmp_dir}"/public_key.asc "${TEMP_PATH}"/"${backup_job_filename}"
|
|
|
|
|
rm -rf "${encrypt_tmp_dir}"
|
|
|
|
|
fi
|
|
|
|
|
fi
|
|
|
|
|
@@ -1245,6 +1285,9 @@ file_encryption() {
|
|
|
|
|
- dbbackup.backup.encrypt.duration.[${backup_job_db_host}.${backup_job_db_name}] ${encrypt_routines_total_time}
|
|
|
|
|
EOF
|
|
|
|
|
)
|
|
|
|
|
else
|
|
|
|
|
print_error "Encryption failed! Could not detect encrypted file"
|
|
|
|
|
return 99
|
|
|
|
|
fi
|
|
|
|
|
else
|
|
|
|
|
write_log error "Skipping encryption because backup did not complete successfully"
|
|
|
|
|
@@ -1589,19 +1632,19 @@ pre_dbbackup() {
|
|
|
|
|
### Pre Backup Custom Script Support
|
|
|
|
|
if [ -d "/assets/custom-scripts/pre" ] && dir_notempty "/assets/custom-scripts/pre" ; then
|
|
|
|
|
write_log warning "Found Custom Post Scripts in /assets/custom-scripts/pre - Automatically moving them to '${backup_job_script_location_pre}'"
|
|
|
|
|
run_as_user mkdir -p "${backup_job_script_location_pre}"
|
|
|
|
|
silent run_as_user cp /assets/custom-scripts/pre/* "${backup_job_script_location_pre}"
|
|
|
|
|
mkdir -p "${backup_job_script_location_pre}"
|
|
|
|
|
silent cp -aR /assets/custom-scripts/pre/* "${backup_job_script_location_pre}"
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
if [ -d "${backup_job_script_location_pre}" ] && dir_notempty "${backup_job_script_location_pre}" ; then
|
|
|
|
|
for f in $(find ${backup_job_script_location_pre} -name \*.sh -type f); do
|
|
|
|
|
if var_true "${backup_job_pre_script_x_verify}" ; then
|
|
|
|
|
run_as_user ${f} "${dbtype}" "${backup_job_db_host}" "${1}" "${dbbackup_start_time}" "${backup_job_filename}"
|
|
|
|
|
${f} "${dbtype}" "${backup_job_db_host}" "${1}" "${dbbackup_start_time}" "${backup_job_filename}"
|
|
|
|
|
else
|
|
|
|
|
if [ -x "${f}" ] ; then
|
|
|
|
|
write_log notice "Executing pre backup custom script : '${f}'"
|
|
|
|
|
## script DB_TYPE DB_HOST DB_NAME STARTEPOCH BACKUP_FILENAME
|
|
|
|
|
run_as_user ${f} "${dbtype}" "${backup_job_db_host}" "${1}" "${dbbackup_start_time}" "${backup_job_filename}"
|
|
|
|
|
${f} "${dbtype}" "${backup_job_db_host}" "${1}" "${dbbackup_start_time}" "${backup_job_filename}"
|
|
|
|
|
else
|
|
|
|
|
write_log error "Can't run pre backup custom script: '${f}' as its filesystem bit is not executible!"
|
|
|
|
|
fi
|
|
|
|
|
@@ -1644,11 +1687,11 @@ EOZP
|
|
|
|
|
### Post Script Support
|
|
|
|
|
if [ -n "${backup_job_post_script}" ] ; then
|
|
|
|
|
if var_true "${backup_job_post_script_x_verify}" ; then
|
|
|
|
|
run_as_user eval "${backup_job_post_script}" "${exit_code}" "${dbtype}" "${backup_job_db_host}" "${1}" "${dbbackup_start_time}" "${dbbackup_finish_time}" "${dbbackup_total_time}" "${backup_job_filename}" "${filesize}" "${checksum_value}" "${move_exit_code}"
|
|
|
|
|
eval "${backup_job_post_script}" "${exit_code}" "${dbtype}" "${backup_job_db_host}" "${1}" "${dbbackup_start_time}" "${dbbackup_finish_time}" "${dbbackup_total_time}" "${backup_job_filename}" "${filesize}" "${checksum_value}" "${move_exit_code}"
|
|
|
|
|
else
|
|
|
|
|
if [ -x "${backup_job_post_script}" ] ; then
|
|
|
|
|
write_log notice "Found POST_SCRIPT environment variable. Executing '${backup_job_post_script}"
|
|
|
|
|
run_as_user eval "${backup_job_post_script}" "${exit_code}" "${dbtype}" "${backup_job_db_host}" "${1}" "${dbbackup_start_time}" "${dbbackup_finish_time}" "${dbbackup_total_time}" "${backup_job_filename}" "${filesize}" "${checksum_value}" "${move_exit_code}"
|
|
|
|
|
eval "${backup_job_post_script}" "${exit_code}" "${dbtype}" "${backup_job_db_host}" "${1}" "${dbbackup_start_time}" "${dbbackup_finish_time}" "${dbbackup_total_time}" "${backup_job_filename}" "${filesize}" "${checksum_value}" "${move_exit_code}"
|
|
|
|
|
else
|
|
|
|
|
write_log error "Can't execute POST_SCRIPT environment variable '${backup_job_post_script}' as its filesystem bit is not executible!"
|
|
|
|
|
fi
|
|
|
|
|
@@ -1658,19 +1701,19 @@ EOZP
|
|
|
|
|
### Post Backup Custom Script Support
|
|
|
|
|
if [ -d "/assets/custom-scripts/" ] && dir_notempty "/assets/custom-scripts" ; then
|
|
|
|
|
write_log warning "Found Custom Post Scripts in /assets/custom-scripts/ - Automatically moving them to '${backup_job_script_location_post}'"
|
|
|
|
|
run_as_user mkdir -p "${backup_job_script_location_post}"
|
|
|
|
|
silent run_as_user cp /assets/custom-scripts/* "${backup_job_script_location_post}"
|
|
|
|
|
mkdir -p "${backup_job_script_location_post}"
|
|
|
|
|
cp -aR /assets/custom-scripts/* "${backup_job_script_location_post}"
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
if [ -d "${backup_job_script_location_post}" ] && dir_notempty "${backup_job_script_location_post}" ; then
|
|
|
|
|
for f in $(run_as_user find "${backup_job_script_location_post}" -name \*.sh -type f); do
|
|
|
|
|
if var_true "${backup_job_post_script_x_verify}" ; then
|
|
|
|
|
run_as_user ${f} "${exit_code}" "${dbtype}" "${backup_job_db_host}" "${1}" "${dbbackup_start_time}" "${dbbackup_finish_time}" "${dbbackup_total_time}" "${backup_job_filename}" "${filesize}" "${checksum_value}" "${move_exit_code}"
|
|
|
|
|
${f} "${exit_code}" "${dbtype}" "${backup_job_db_host}" "${1}" "${dbbackup_start_time}" "${dbbackup_finish_time}" "${dbbackup_total_time}" "${backup_job_filename}" "${filesize}" "${checksum_value}" "${move_exit_code}"
|
|
|
|
|
else
|
|
|
|
|
if [ -x "${f}" ] ; then
|
|
|
|
|
write_log notice "Executing post backup custom script : '${f}'"
|
|
|
|
|
## script EXIT_CODE DB_TYPE DB_HOST DB_NAME STARTEPOCH FINISHEPOCH DURATIONEPOCH BACKUP_FILENAME FILESIZE CHECKSUMVALUE
|
|
|
|
|
run_as_user ${f} "${exit_code}" "${dbtype}" "${backup_job_db_host}" "${1}" "${dbbackup_start_time}" "${dbbackup_finish_time}" "${dbbackup_total_time}" "${backup_job_filename}" "${filesize}" "${checksum_value}" "${move_exit_code}"
|
|
|
|
|
${f} "${exit_code}" "${dbtype}" "${backup_job_db_host}" "${1}" "${dbbackup_start_time}" "${dbbackup_finish_time}" "${dbbackup_total_time}" "${backup_job_filename}" "${filesize}" "${checksum_value}" "${move_exit_code}"
|
|
|
|
|
else
|
|
|
|
|
write_log error "Can't run post backup custom script: '${f}' as its filesystem bit is not executible!"
|
|
|
|
|
fi
|
|
|
|
|
@@ -1706,7 +1749,7 @@ process_limiter() {
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
run_as_user() {
|
|
|
|
|
sudo -u "${DBBACKUP_USER}" $@
|
|
|
|
|
sudo -Eu "${DBBACKUP_USER}" "$@"
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
setup_mode() {
|
|
|
|
|
|