debian-mirror-gitlab/lib/backup/manager.rb

622 lines
20 KiB
Ruby
Raw Normal View History

2018-12-05 23:21:45 +05:30
# frozen_string_literal: true
2014-09-02 18:07:02 +05:30
module Backup
class Manager
2019-12-04 20:38:33 +05:30
FILE_NAME_SUFFIX = '_gitlab_backup.tar'
2022-05-07 20:08:51 +05:30
MANIFEST_NAME = 'backup_information.yml'
2022-06-21 17:19:12 +05:30
# pages used to deploy tmp files to this path
# if some of these files are still there, we don't need them in the backup
LEGACY_PAGES_TMP_PATH = '@pages.tmp'
2022-07-16 23:28:13 +05:30
LIST_ENVS = {
skipped: 'SKIP',
2022-07-23 23:45:48 +05:30
repositories_storages: 'REPOSITORIES_STORAGES',
repositories_paths: 'REPOSITORIES_PATHS'
2022-07-16 23:28:13 +05:30
}.freeze
2023-06-20 00:43:36 +05:30
YAML_PERMITTED_CLASSES = [
ActiveSupport::TimeWithZone, ActiveSupport::TimeZone, Symbol, Time
].freeze
2022-05-07 20:08:51 +05:30
TaskDefinition = Struct.new(
2022-06-21 17:19:12 +05:30
:enabled, # `true` if the task can be used. Treated as `true` when not specified.
:human_name, # Name of the task used for logging.
2022-05-07 20:08:51 +05:30
:destination_path, # Where the task should put its backup file/dir.
:destination_optional, # `true` if the destination might not exist on a successful backup.
:cleanup_path, # Path to remove after a successful backup. Uses `destination_path` when not specified.
:task,
keyword_init: true
2022-06-21 17:19:12 +05:30
) do
def enabled?
enabled.nil? || enabled
end
end
2016-06-02 11:05:42 +05:30
2018-11-08 19:23:39 +05:30
attr_reader :progress
2022-05-07 20:08:51 +05:30
def initialize(progress, definitions: nil)
2018-11-08 19:23:39 +05:30
@progress = progress
2022-08-27 11:52:29 +05:30
@incremental = Gitlab::Utils.to_boolean(ENV['INCREMENTAL'], default: false)
2022-07-16 23:28:13 +05:30
@definitions = definitions
2022-04-04 11:22:00 +05:30
end
def create
2022-07-23 23:45:48 +05:30
unpack(ENV.fetch('PREVIOUS_BACKUP', ENV['BACKUP'])) if incremental?
run_all_create_tasks
2022-04-04 11:22:00 +05:30
2022-06-21 17:19:12 +05:30
puts_time "Warning: Your gitlab.rb and gitlab-secrets.json files contain sensitive data \n" \
2022-04-04 11:22:00 +05:30
"and are not included in this backup. You will need these files to restore a backup.\n" \
"Please back them up manually.".color(:red)
2022-06-21 17:19:12 +05:30
puts_time "Backup #{backup_id} is done."
2022-04-04 11:22:00 +05:30
end
def run_create_task(task_name)
2022-05-07 20:08:51 +05:30
build_backup_information
2022-04-04 11:22:00 +05:30
2022-07-16 23:28:13 +05:30
definition = definitions[task_name]
2022-06-21 17:19:12 +05:30
unless definition.enabled?
puts_time "Dumping #{definition.human_name} ... ".color(:blue) + "[DISABLED]".color(:cyan)
2022-04-04 11:22:00 +05:30
return
end
2022-05-07 20:08:51 +05:30
if skipped?(task_name)
2022-06-21 17:19:12 +05:30
puts_time "Dumping #{definition.human_name} ... ".color(:blue) + "[SKIPPED]".color(:cyan)
2022-04-04 11:22:00 +05:30
return
end
2022-06-21 17:19:12 +05:30
puts_time "Dumping #{definition.human_name} ... ".color(:blue)
2022-07-16 23:28:13 +05:30
definition.task.dump(File.join(Gitlab.config.backup.path, definition.destination_path), full_backup_id)
2022-06-21 17:19:12 +05:30
puts_time "Dumping #{definition.human_name} ... ".color(:blue) + "done".color(:green)
2022-04-04 11:22:00 +05:30
rescue Backup::DatabaseBackupError, Backup::FileBackupError => e
2022-06-21 17:19:12 +05:30
puts_time "Dumping #{definition.human_name} failed: #{e.message}".color(:red)
2022-04-04 11:22:00 +05:30
end
def restore
2022-07-23 23:45:48 +05:30
unpack(ENV['BACKUP'])
run_all_restore_tasks
2022-04-04 11:22:00 +05:30
2022-06-21 17:19:12 +05:30
puts_time "Warning: Your gitlab.rb and gitlab-secrets.json files contain sensitive data \n" \
"and are not included in this backup. You will need to restore these files manually.".color(:red)
puts_time "Restore task is done."
2022-04-04 11:22:00 +05:30
end
def run_restore_task(task_name)
2022-07-16 23:28:13 +05:30
read_backup_information
definition = definitions[task_name]
2022-04-04 11:22:00 +05:30
2022-06-21 17:19:12 +05:30
unless definition.enabled?
puts_time "Restoring #{definition.human_name} ... ".color(:blue) + "[DISABLED]".color(:cyan)
2022-04-04 11:22:00 +05:30
return
end
2022-06-21 17:19:12 +05:30
puts_time "Restoring #{definition.human_name} ... ".color(:blue)
2022-05-07 20:08:51 +05:30
warning = definition.task.pre_restore_warning
if warning.present?
puts_time warning.color(:red)
Gitlab::TaskHelpers.ask_to_continue
end
definition.task.restore(File.join(Gitlab.config.backup.path, definition.destination_path))
2022-06-21 17:19:12 +05:30
puts_time "Restoring #{definition.human_name} ... ".color(:blue) + "done".color(:green)
2022-05-07 20:08:51 +05:30
warning = definition.task.post_restore_warning
if warning.present?
puts_time warning.color(:red)
Gitlab::TaskHelpers.ask_to_continue
end
rescue Gitlab::TaskAbortedByUserError
puts_time "Quitting...".color(:red)
exit 1
2018-11-08 19:23:39 +05:30
end
2022-05-07 20:08:51 +05:30
private
2022-07-16 23:28:13 +05:30
def definitions
@definitions ||= build_definitions
end
2022-08-27 11:52:29 +05:30
def build_definitions # rubocop:disable Metrics/AbcSize
2022-06-21 17:19:12 +05:30
{
2023-04-23 21:23:45 +05:30
'db' => TaskDefinition.new(
human_name: _('database'),
destination_path: 'db',
2022-06-21 17:19:12 +05:30
cleanup_path: 'db',
2023-04-23 21:23:45 +05:30
task: build_db_task
2022-06-21 17:19:12 +05:30
),
'repositories' => TaskDefinition.new(
human_name: _('repositories'),
destination_path: 'repositories',
destination_optional: true,
task: build_repositories_task
),
'uploads' => TaskDefinition.new(
human_name: _('uploads'),
destination_path: 'uploads.tar.gz',
task: build_files_task(File.join(Gitlab.config.uploads.storage_path, 'uploads'), excludes: ['tmp'])
),
'builds' => TaskDefinition.new(
human_name: _('builds'),
destination_path: 'builds.tar.gz',
task: build_files_task(Settings.gitlab_ci.builds_path)
),
'artifacts' => TaskDefinition.new(
human_name: _('artifacts'),
destination_path: 'artifacts.tar.gz',
task: build_files_task(JobArtifactUploader.root, excludes: ['tmp'])
),
'pages' => TaskDefinition.new(
human_name: _('pages'),
destination_path: 'pages.tar.gz',
task: build_files_task(Gitlab.config.pages.path, excludes: [LEGACY_PAGES_TMP_PATH])
),
'lfs' => TaskDefinition.new(
human_name: _('lfs objects'),
destination_path: 'lfs.tar.gz',
task: build_files_task(Settings.lfs.storage_path)
),
'terraform_state' => TaskDefinition.new(
human_name: _('terraform states'),
destination_path: 'terraform_state.tar.gz',
task: build_files_task(Settings.terraform_state.storage_path, excludes: ['tmp'])
),
'registry' => TaskDefinition.new(
enabled: Gitlab.config.registry.enabled,
human_name: _('container registry images'),
destination_path: 'registry.tar.gz',
task: build_files_task(Settings.registry.path)
),
'packages' => TaskDefinition.new(
human_name: _('packages'),
destination_path: 'packages.tar.gz',
task: build_files_task(Settings.packages.storage_path, excludes: ['tmp'])
)
}.freeze
end
2023-04-23 21:23:45 +05:30
def build_db_task
2022-08-27 11:52:29 +05:30
force = Gitlab::Utils.to_boolean(ENV['force'], default: false)
2023-04-23 21:23:45 +05:30
Database.new(progress, force: force)
2022-06-21 17:19:12 +05:30
end
def build_repositories_task
2023-04-23 21:23:45 +05:30
max_concurrency = ENV['GITLAB_BACKUP_MAX_CONCURRENCY'].presence&.to_i
max_storage_concurrency = ENV['GITLAB_BACKUP_MAX_STORAGE_CONCURRENCY'].presence&.to_i
2022-06-21 17:19:12 +05:30
strategy = Backup::GitalyBackup.new(progress, incremental: incremental?, max_parallelism: max_concurrency, storage_parallelism: max_storage_concurrency)
2022-07-23 23:45:48 +05:30
Repositories.new(progress,
strategy: strategy,
storages: list_env(:repositories_storages),
paths: list_env(:repositories_paths)
)
2022-06-21 17:19:12 +05:30
end
def build_files_task(app_files_dir, excludes: [])
Files.new(progress, app_files_dir, excludes: excludes)
end
2022-07-23 23:45:48 +05:30
def run_all_create_tasks
if incremental?
read_backup_information
verify_backup_version
update_backup_information
end
build_backup_information
2023-03-04 22:38:38 +05:30
definitions.each_key do |task_name|
2022-07-23 23:45:48 +05:30
run_create_task(task_name)
end
write_backup_information
unless skipped?('tar')
pack
upload
remove_old
end
ensure
cleanup unless skipped?('tar')
remove_tmp
end
def run_all_restore_tasks
read_backup_information
verify_backup_version
2023-03-04 22:38:38 +05:30
definitions.each_key do |task_name|
2022-08-27 11:52:29 +05:30
if !skipped?(task_name) && enabled_task?(task_name)
run_restore_task(task_name)
end
2022-07-23 23:45:48 +05:30
end
Rake::Task['gitlab:shell:setup'].invoke
Rake::Task['cache:clear'].invoke
ensure
cleanup unless skipped?('tar')
remove_tmp
end
2022-06-21 17:19:12 +05:30
def incremental?
@incremental
end
2022-05-07 20:08:51 +05:30
def read_backup_information
2023-06-20 00:43:36 +05:30
@backup_information ||= YAML.safe_load_file(
File.join(backup_path, MANIFEST_NAME),
permitted_classes: YAML_PERMITTED_CLASSES)
2022-05-07 20:08:51 +05:30
end
def write_backup_information
2016-04-02 18:10:28 +05:30
# Make sure there is a connection
2023-03-04 22:38:38 +05:30
::Gitlab::Database.database_base_models.each_value do |base_model|
2022-08-27 11:52:29 +05:30
base_model.connection.reconnect!
end
2016-04-02 18:10:28 +05:30
2017-08-17 22:00:37 +05:30
Dir.chdir(backup_path) do
2022-05-07 20:08:51 +05:30
File.open("#{backup_path}/#{MANIFEST_NAME}", "w+") do |file|
2017-09-10 17:25:29 +05:30
file << backup_information.to_yaml.gsub(/^---\n/, '')
2015-04-26 12:48:37 +05:30
end
2020-04-08 14:13:33 +05:30
end
end
2015-04-26 12:48:37 +05:30
2022-05-07 20:08:51 +05:30
def build_backup_information
@backup_information ||= {
db_version: ActiveRecord::Migrator.current_version.to_s,
2023-03-04 22:38:38 +05:30
backup_created_at: Time.current,
2022-05-07 20:08:51 +05:30
gitlab_version: Gitlab::VERSION,
tar_version: tar_version,
installation_type: Gitlab::INSTALLATION_TYPE,
2022-07-16 23:28:13 +05:30
skipped: ENV['SKIP'],
2022-07-23 23:45:48 +05:30
repositories_storages: ENV['REPOSITORIES_STORAGES'],
repositories_paths: ENV['REPOSITORIES_PATHS']
2022-05-07 20:08:51 +05:30
}
end
2022-07-16 23:28:13 +05:30
def update_backup_information
@backup_information.merge!(
full_backup_id: full_backup_id,
db_version: ActiveRecord::Migrator.current_version.to_s,
2023-03-04 22:38:38 +05:30
backup_created_at: Time.current,
2022-07-16 23:28:13 +05:30
gitlab_version: Gitlab::VERSION,
tar_version: tar_version,
installation_type: Gitlab::INSTALLATION_TYPE,
skipped: list_env(:skipped).join(','),
2022-07-23 23:45:48 +05:30
repositories_storages: list_env(:repositories_storages).join(','),
repositories_paths: list_env(:repositories_paths).join(',')
2022-07-16 23:28:13 +05:30
)
end
2022-05-07 20:08:51 +05:30
def backup_information
raise Backup::Error, "#{MANIFEST_NAME} not yet loaded" unless @backup_information
@backup_information
end
2020-04-08 14:13:33 +05:30
def pack
Dir.chdir(backup_path) do
2015-04-26 12:48:37 +05:30
# create archive
2022-06-21 17:19:12 +05:30
puts_time "Creating backup archive: #{tar_file} ... ".color(:blue)
2015-09-11 14:41:01 +05:30
# Set file permissions on open to prevent chmod races.
2017-08-17 22:00:37 +05:30
tar_system_options = { out: [tar_file, 'w', Gitlab.config.backup.archive_permissions] }
2015-09-11 14:41:01 +05:30
if Kernel.system('tar', '-cf', '-', *backup_contents, tar_system_options)
2022-06-21 17:19:12 +05:30
puts_time "Creating backup archive: #{tar_file} ... ".color(:blue) + 'done'.color(:green)
2015-04-26 12:48:37 +05:30
else
2022-06-21 17:19:12 +05:30
puts_time "Creating archive #{tar_file} failed".color(:red)
2018-11-08 19:23:39 +05:30
raise Backup::Error, 'Backup failed'
2015-04-26 12:48:37 +05:30
end
2014-09-02 18:07:02 +05:30
end
2015-04-26 12:48:37 +05:30
end
2017-09-10 17:25:29 +05:30
def upload
2015-04-26 12:48:37 +05:30
connection_settings = Gitlab.config.backup.upload.connection
2022-07-23 23:45:48 +05:30
if connection_settings.blank? || skipped?('remote') || skipped?('tar')
2022-06-21 17:19:12 +05:30
puts_time "Uploading backup archive to remote storage #{remote_directory} ... ".color(:blue) + "[SKIPPED]".color(:cyan)
2015-04-26 12:48:37 +05:30
return
end
2022-06-21 17:19:12 +05:30
puts_time "Uploading backup archive to remote storage #{remote_directory} ... ".color(:blue)
2021-11-11 11:23:49 +05:30
directory = connect_to_remote_directory
upload = directory.files.create(create_attributes)
2015-04-26 12:48:37 +05:30
2021-11-11 11:23:49 +05:30
if upload
2022-05-07 20:08:51 +05:30
if upload.respond_to?(:encryption) && upload.encryption
2022-06-21 17:19:12 +05:30
puts_time "Uploading backup archive to remote storage #{remote_directory} ... ".color(:blue) + "done (encrypted with #{upload.encryption})".color(:green)
2022-05-07 20:08:51 +05:30
else
2022-06-21 17:19:12 +05:30
puts_time "Uploading backup archive to remote storage #{remote_directory} ... ".color(:blue) + "done".color(:green)
2022-05-07 20:08:51 +05:30
end
2014-09-02 18:07:02 +05:30
else
2022-06-21 17:19:12 +05:30
puts_time "Uploading backup to #{remote_directory} failed".color(:red)
2018-11-08 19:23:39 +05:30
raise Backup::Error, 'Backup failed'
2014-09-02 18:07:02 +05:30
end
end
def cleanup
2022-06-21 17:19:12 +05:30
puts_time "Deleting tar staging files ... ".color(:blue)
2015-10-24 18:46:33 +05:30
2022-05-07 20:08:51 +05:30
remove_backup_path(MANIFEST_NAME)
2022-07-16 23:28:13 +05:30
definitions.each do |_, definition|
2022-05-07 20:08:51 +05:30
remove_backup_path(definition.cleanup_path || definition.destination_path)
2014-09-02 18:07:02 +05:30
end
2022-06-21 17:19:12 +05:30
puts_time "Deleting tar staging files ... ".color(:blue) + 'done'.color(:green)
2014-09-02 18:07:02 +05:30
end
2022-05-07 20:08:51 +05:30
def remove_backup_path(path)
2022-06-21 17:19:12 +05:30
absolute_path = File.join(backup_path, path)
return unless File.exist?(absolute_path)
2022-05-07 20:08:51 +05:30
2022-06-21 17:19:12 +05:30
puts_time "Cleaning up #{absolute_path}"
FileUtils.rm_rf(absolute_path)
2022-05-07 20:08:51 +05:30
end
2021-10-27 15:23:28 +05:30
def remove_tmp
# delete tmp inside backups
2022-06-21 17:19:12 +05:30
puts_time "Deleting backups/tmp ... ".color(:blue)
2021-10-27 15:23:28 +05:30
2022-06-21 17:19:12 +05:30
FileUtils.rm_rf(File.join(backup_path, "tmp"))
puts_time "Deleting backups/tmp ... ".color(:blue) + "done".color(:green)
2021-10-27 15:23:28 +05:30
end
2014-09-02 18:07:02 +05:30
def remove_old
# delete backups
keep_time = Gitlab.config.backup.keep_time.to_i
2022-06-21 17:19:12 +05:30
if keep_time <= 0
puts_time "Deleting old backups ... ".color(:blue) + "[SKIPPED]".color(:cyan)
return
end
puts_time "Deleting old backups ... ".color(:blue)
removed = 0
Dir.chdir(backup_path) do
backup_file_list.each do |file|
# For backward compatibility, there are 3 names the backups can have:
# - 1495527122_gitlab_backup.tar
# - 1495527068_2017_05_23_gitlab_backup.tar
# - 1495527097_2017_05_23_9.3.0-pre_gitlab_backup.tar
matched = backup_file?(file)
next unless matched
timestamp = matched[1].to_i
2023-03-04 22:38:38 +05:30
next unless Time.zone.at(timestamp) < (Time.current - keep_time)
2023-01-13 00:05:48 +05:30
begin
FileUtils.rm(file)
removed += 1
rescue StandardError => e
puts_time "Deleting #{file} failed: #{e.message}".color(:red)
2014-09-02 18:07:02 +05:30
end
end
end
2022-06-21 17:19:12 +05:30
puts_time "Deleting old backups ... ".color(:blue) + "done. (#{removed} removed)".color(:green)
2014-09-02 18:07:02 +05:30
end
2020-04-08 14:13:33 +05:30
def verify_backup_version
Dir.chdir(backup_path) do
# restoring mismatching backups can lead to unexpected problems
2022-05-07 20:08:51 +05:30
if backup_information[:gitlab_version] != Gitlab::VERSION
2020-04-08 14:13:33 +05:30
progress.puts(<<~HEREDOC.color(:red))
GitLab version mismatch:
Your current GitLab version (#{Gitlab::VERSION}) differs from the GitLab version in the backup!
Please switch to the following version and try again:
2022-05-07 20:08:51 +05:30
version: #{backup_information[:gitlab_version]}
2020-04-08 14:13:33 +05:30
HEREDOC
progress.puts
2022-05-07 20:08:51 +05:30
progress.puts "Hint: git checkout v#{backup_information[:gitlab_version]}"
2020-04-08 14:13:33 +05:30
exit 1
end
end
end
2023-06-20 00:43:36 +05:30
def puts_available_timestamps
available_timestamps.each do |available_timestamp|
puts_time " " + available_timestamp
end
end
2022-07-16 23:28:13 +05:30
def unpack(source_backup_id)
if source_backup_id.blank? && non_tarred_backup?
2022-06-21 17:19:12 +05:30
puts_time "Non tarred backup found in #{backup_path}, using that"
2022-07-23 23:45:48 +05:30
return
2020-04-08 14:13:33 +05:30
end
2018-03-17 18:26:18 +05:30
Dir.chdir(backup_path) do
# check for existing backups in the backup dir
if backup_file_list.empty?
2022-06-21 17:19:12 +05:30
puts_time "No backups found in #{backup_path}"
puts_time "Please make sure that file name ends with #{FILE_NAME_SUFFIX}"
2018-03-17 18:26:18 +05:30
exit 1
2022-07-16 23:28:13 +05:30
elsif backup_file_list.many? && source_backup_id.nil?
2022-06-21 17:19:12 +05:30
puts_time 'Found more than one backup:'
2018-03-17 18:26:18 +05:30
# print list of available backups
2023-06-20 00:43:36 +05:30
puts_available_timestamps
2022-06-21 17:19:12 +05:30
if incremental?
puts_time 'Please specify which one you want to create an incremental backup for:'
2022-07-16 23:28:13 +05:30
puts_time 'rake gitlab:backup:create INCREMENTAL=true PREVIOUS_BACKUP=timestamp_of_backup'
2022-06-21 17:19:12 +05:30
else
puts_time 'Please specify which one you want to restore:'
puts_time 'rake gitlab:backup:restore BACKUP=timestamp_of_backup'
end
2018-03-17 18:26:18 +05:30
exit 1
end
2014-09-02 18:07:02 +05:30
2022-07-16 23:28:13 +05:30
tar_file = if source_backup_id.present?
File.basename(source_backup_id) + FILE_NAME_SUFFIX
2018-03-17 18:26:18 +05:30
else
backup_file_list.first
end
2014-09-02 18:07:02 +05:30
2018-03-17 18:26:18 +05:30
unless File.exist?(tar_file)
2022-06-21 17:19:12 +05:30
puts_time "The backup file #{tar_file} does not exist!"
2018-03-17 18:26:18 +05:30
exit 1
end
2014-09-02 18:07:02 +05:30
2022-06-21 17:19:12 +05:30
puts_time 'Unpacking backup ... '.color(:blue)
2015-04-26 12:48:37 +05:30
2020-03-13 15:44:24 +05:30
if Kernel.system(*%W(tar -xf #{tar_file}))
2022-06-21 17:19:12 +05:30
puts_time 'Unpacking backup ... '.color(:blue) + 'done'.color(:green)
2020-03-13 15:44:24 +05:30
else
2022-06-21 17:19:12 +05:30
puts_time 'Unpacking backup failed'.color(:red)
2018-03-17 18:26:18 +05:30
exit 1
end
2014-09-02 18:07:02 +05:30
end
end
def tar_version
2017-08-17 22:00:37 +05:30
tar_version, _ = Gitlab::Popen.popen(%w(tar --version))
2018-12-13 13:39:08 +05:30
tar_version.dup.force_encoding('locale').split("\n").first
2014-09-02 18:07:02 +05:30
end
2015-04-26 12:48:37 +05:30
def skipped?(item)
2023-04-23 21:23:45 +05:30
skipped.include?(item)
2022-07-16 23:28:13 +05:30
end
def skipped
@skipped ||= list_env(:skipped)
end
def list_env(name)
list = ENV.fetch(LIST_ENVS[name], '').split(',')
list += backup_information[name].split(',') if backup_information[name]
list.uniq!
2022-08-27 11:52:29 +05:30
list.compact!
2022-07-16 23:28:13 +05:30
list
2015-04-26 12:48:37 +05:30
end
2022-04-04 11:22:00 +05:30
def enabled_task?(task_name)
2022-07-16 23:28:13 +05:30
definitions[task_name].enabled?
2022-04-04 11:22:00 +05:30
end
2021-12-11 22:18:48 +05:30
def backup_file?(file)
file.match(/^(\d{10})(?:_\d{4}_\d{2}_\d{2}(_\d+\.\d+\.\d+((-|\.)(pre|rc\d))?(-ee)?)?)?_gitlab_backup\.tar$/)
end
2020-04-08 14:13:33 +05:30
def non_tarred_backup?
2022-05-07 20:08:51 +05:30
File.exist?(File.join(backup_path, MANIFEST_NAME))
2020-04-08 14:13:33 +05:30
end
2017-08-17 22:00:37 +05:30
def backup_path
Gitlab.config.backup.path
end
def backup_file_list
@backup_file_list ||= Dir.glob("*#{FILE_NAME_SUFFIX}")
end
2018-03-17 18:26:18 +05:30
def available_timestamps
2022-08-27 11:52:29 +05:30
@backup_file_list.map { |item| item.gsub("#{FILE_NAME_SUFFIX}", "") }
2018-03-17 18:26:18 +05:30
end
2021-11-11 11:23:49 +05:30
def object_storage_config
2023-03-04 22:38:38 +05:30
@object_storage_config ||= ObjectStorage::Config.new(Gitlab.config.backup.upload)
2021-11-11 11:23:49 +05:30
end
2020-11-24 15:15:51 +05:30
2021-11-11 11:23:49 +05:30
def connect_to_remote_directory
connection = ::Fog::Storage.new(object_storage_config.credentials)
# We only attempt to create the directory for local backups. For AWS
# and other cloud providers, we cannot guarantee the user will have
# permission to create the bucket.
if connection.service == ::Fog::Storage::Local
connection.directories.create(key: remote_directory)
else
2019-02-15 15:39:39 +05:30
connection.directories.new(key: remote_directory)
end
end
def remote_directory
Gitlab.config.backup.upload.remote_directory
end
2017-09-10 17:25:29 +05:30
def remote_target
if ENV['DIRECTORY']
File.join(ENV['DIRECTORY'], tar_file)
else
tar_file
end
end
2015-04-26 12:48:37 +05:30
def backup_contents
2022-07-16 23:28:13 +05:30
[MANIFEST_NAME] + definitions.reject do |name, definition|
2022-05-07 20:08:51 +05:30
skipped?(name) || !enabled_task?(name) ||
(definition.destination_optional && !File.exist?(File.join(backup_path, definition.destination_path)))
end.values.map(&:destination_path)
2015-04-26 12:48:37 +05:30
end
2017-09-10 17:25:29 +05:30
def tar_file
2022-06-21 17:19:12 +05:30
@tar_file ||= "#{backup_id}#{FILE_NAME_SUFFIX}"
end
2022-07-16 23:28:13 +05:30
def full_backup_id
full_backup_id = backup_information[:full_backup_id]
full_backup_id ||= File.basename(ENV['PREVIOUS_BACKUP']) if ENV['PREVIOUS_BACKUP'].present?
full_backup_id ||= backup_id
full_backup_id
end
2022-06-21 17:19:12 +05:30
def backup_id
2022-07-16 23:28:13 +05:30
if ENV['BACKUP'].present?
File.basename(ENV['BACKUP'])
else
"#{backup_information[:backup_created_at].strftime('%s_%Y_%m_%d_')}#{backup_information[:gitlab_version]}"
end
2017-09-10 17:25:29 +05:30
end
2020-01-01 13:55:28 +05:30
def create_attributes
attrs = {
key: remote_target,
2020-04-08 14:13:33 +05:30
body: File.open(File.join(backup_path, tar_file)),
2020-01-01 13:55:28 +05:30
multipart_chunk_size: Gitlab.config.backup.upload.multipart_chunk_size,
storage_class: Gitlab.config.backup.upload.storage_class
2021-11-11 11:23:49 +05:30
}.merge(encryption_attributes)
2020-01-01 13:55:28 +05:30
# Google bucket-only policies prevent setting an ACL. In any case, by default,
# all objects are set to the default ACL, which is project-private:
# https://cloud.google.com/storage/docs/json_api/v1/defaultObjectAccessControls
attrs[:public] = false unless google_provider?
attrs
end
2021-11-11 11:23:49 +05:30
def encryption_attributes
return object_storage_config.fog_attributes if object_storage_config.aws_server_side_encryption_enabled?
# Use customer-managed keys. Also, this preserves
# backward-compatibility for existing usages of `SSE-S3` that
# don't set `backup.upload.storage_options.server_side_encryption`
# to `'AES256'`.
{
encryption_key: Gitlab.config.backup.upload.encryption_key,
encryption: Gitlab.config.backup.upload.encryption
}
end
2020-01-01 13:55:28 +05:30
def google_provider?
Gitlab.config.backup.upload.connection&.provider&.downcase == 'google'
end
2022-04-04 11:22:00 +05:30
def puts_time(msg)
2023-03-04 22:38:38 +05:30
progress.puts "#{Time.current} -- #{msg}"
2022-04-04 11:22:00 +05:30
Gitlab::BackupLogger.info(message: "#{Rainbow.uncolor(msg)}")
end
2014-09-02 18:07:02 +05:30
end
end
2021-12-11 22:18:48 +05:30
Backup::Manager.prepend_mod