1
0
mirror of https://github.com/deajan/obackup.git synced 2024-11-15 04:03:41 +01:00
obackup/dev/n_obackup.sh

2119 lines
74 KiB
Bash
Raw Normal View History

2015-11-12 01:26:38 +01:00
#!/usr/bin/env bash
2016-12-27 12:53:35 +01:00
#TODO: do we rotate encrypted files too or only temp files in storage dir (pull / local question)
2015-11-12 01:26:38 +01:00
###### Remote push/pull (or local) backup script for files & databases
PROGRAM="obackup"
2019-01-03 10:09:29 +01:00
AUTHOR="(C) 2013-2019 by Orsiris de Jong"
2015-11-12 01:26:38 +01:00
CONTACT="http://www.netpower.fr/obackup - ozy@netpower.fr"
2019-05-21 12:14:35 +02:00
PROGRAM_VERSION=2.1-dev-postRC1
2020-05-04 11:57:27 +02:00
PROGRAM_BUILD=2020050401
2019-02-08 13:22:37 +01:00
IS_STABLE=true
2015-11-12 01:26:38 +01:00
2019-05-21 12:13:48 +02:00
CONFIG_FILE_REVISION_REQUIRED=2.1
2017-02-10 10:34:40 +01:00
#### Execution order #__WITH_PARANOIA_DEBUG
2017-01-02 22:35:30 +01:00
# GetLocalOS #__WITH_PARANOIA_DEBUG
# InitLocalOSDependingSettings #__WITH_PARANOIA_DEBUG
# CheckRunningInstances #__WITH_PARANOIA_DEBUG
# PreInit #__WITH_PARANOIA_DEBUG
# Init #__WITH_PARANOIA_DEBUG
# CheckEnvironment #__WITH_PARANOIA_DEBUG
# Postinit #__WITH_PARANOIA_DEBUG
# CheckCurrentConfig #__WITH_PARANOIA_DEBUG
# GetRemoteOS #__WITH_PARANOIA_DEBUG
# InitRemoteOSDependingSettings #__WITH_PARANOIA_DEBUG
# RunBeforeHook #__WITH_PARANOIA_DEBUG
# Main #__WITH_PARANOIA_DEBUG
# ListDatabases #__WITH_PARANOIA_DEBUG
# ListRecursiveBackupDirectories #__WITH_PARANOIA_DEBUG
# GetDirectoriesSize #__WITH_PARANOIA_DEBUG
# CreateSrorageDirectories #__WITH_PARANOIA_DEBUG
# CheckDiskSpace #__WITH_PARANOIA_DEBUG
# RotateBackups #__WITH_PARANOIA_DEBUG
# BackupDatabases #__WITH_PARANOIA_DEBUG
# RotateBackups #__WITH_PARANOIA_DEBUG
# RsyncPatterns #__WITH_PARANOIA_DEBUG
# FilesBackup #__WITH_PARANOIA_DEBUG
2016-12-20 22:53:22 +01:00
include #### OFUNCTIONS FULL SUBSET ####
2017-01-03 11:25:24 +01:00
# If using "include" statements, make sure the script does not get executed unless it's loaded by bootstrap
include #### _OFUNCTIONS_BOOTSTRAP SUBSET ####
[ "$_OFUNCTIONS_BOOTSTRAP" != true ] && echo "Please use bootstrap.sh to load this dev version of $(basename $0)" && exit 1
2016-08-06 13:53:12 +02:00
_LOGGER_PREFIX="time"
2015-11-12 01:26:38 +01:00
## Working directory for partial downloads
PARTIAL_DIR=".obackup_workdir_partial"
## File extension for encrypted files
2016-12-24 15:41:28 +01:00
CRYPT_FILE_EXTENSION=".$PROGRAM.gpg"
2015-11-12 01:26:38 +01:00
# List of runtime created global variables
# $SQL_DISK_SPACE, disk space available on target for sql backups
# $FILE_DISK_SPACE, disk space available on target for file backups
# $SQL_BACKUP_TASKS, list of all databases to backup, space separated
# $SQL_EXCLUDED_TASKS, list of all database to exclude from backup, space separated
# $FILE_BACKUP_TASKS list of directories to backup, found in config file
# $FILE_RECURSIVE_BACKUP_TASKS, list of directories to backup, computed from config file recursive list
# $FILE_RECURSIVE_EXCLUDED_TASKS, list of all directories excluded from recursive list
# $FILE_SIZE_LIST, list of all directories to include in GetDirectoriesSize, enclosed by escaped doublequotes
2015-11-12 01:26:38 +01:00
2016-12-24 15:41:28 +01:00
# Assume that anything can be backed up unless proven otherwise
2016-08-29 18:27:12 +02:00
CAN_BACKUP_SQL=true
CAN_BACKUP_FILES=true
2015-11-12 01:26:38 +01:00
function TrapStop {
2016-03-03 16:33:59 +01:00
Logger "/!\ Manual exit of backup script. Backups may be in inconsistent state." "WARN"
2016-08-17 10:01:27 +02:00
exit 2
2015-11-12 01:26:38 +01:00
}
function TrapQuit {
2016-02-19 22:14:13 +01:00
local exitcode
2016-11-30 13:59:15 +01:00
# Get ERROR / WARN alert flags from subprocesses that call Logger
2016-12-19 23:02:19 +01:00
if [ -f "$RUN_DIR/$PROGRAM.Logger.warn.$SCRIPT_PID.$TSTAMP" ]; then
WARN_ALERT=true
2016-11-30 13:59:15 +01:00
fi
2016-12-19 23:02:19 +01:00
if [ -f "$RUN_DIR/$PROGRAM.Logger.error.$SCRIPT_PID.$TSTAMP" ]; then
ERROR_ALERT=true
2016-11-30 13:59:15 +01:00
fi
2016-08-29 18:27:12 +02:00
if [ $ERROR_ALERT == true ]; then
2019-02-08 13:22:37 +01:00
if [ "$RUN_AFTER_CMD_ON_ERROR" == true ]; then
RunAfterHook
fi
Logger "$PROGRAM finished with errors." "ERROR"
2016-08-26 15:09:01 +02:00
SendAlert
2016-02-19 22:14:13 +01:00
exitcode=1
2016-08-29 18:27:12 +02:00
elif [ $WARN_ALERT == true ]; then
2019-02-08 13:22:37 +01:00
if [ "$RUN_AFTER_CMD_ON_ERROR" == true ]; then
RunAfterHook
fi
Logger "$PROGRAM finished with warnings." "WARN"
2016-08-26 15:09:01 +02:00
SendAlert
2016-02-19 22:14:13 +01:00
exitcode=2
2015-11-12 01:26:38 +01:00
else
RunAfterHook
Logger "$PROGRAM finshed." "ALWAYS"
2016-02-19 22:14:13 +01:00
exitcode=0
2015-11-12 01:26:38 +01:00
fi
2016-03-03 16:06:27 +01:00
if [ -f "$RUN_DIR/$PROGRAM.$INSTANCE_ID" ]; then
rm -f "$RUN_DIR/$PROGRAM.$INSTANCE_ID"
fi
2016-11-17 21:05:07 +01:00
CleanUp
2015-11-12 01:26:38 +01:00
KillChilds $$ > /dev/null 2>&1
2016-02-19 22:14:13 +01:00
exit $exitcode
2015-11-12 01:26:38 +01:00
}
function CheckEnvironment {
2016-12-23 17:51:57 +01:00
__CheckArguments 0 $# "$@" #__WITH_PARANOIA_DEBUG
2015-11-12 01:26:38 +01:00
2019-02-08 13:22:37 +01:00
if [ "$REMOTE_OPERATION" == true ]; then
2015-11-12 01:26:38 +01:00
if ! type ssh > /dev/null 2>&1 ; then
Logger "ssh not present. Cannot start backup." "CRITICAL"
exit 1
fi
2016-12-27 12:53:35 +01:00
if [ "$SSH_PASSWORD_FILE" != "" ] && ! type sshpass > /dev/null 2>&1 ; then
Logger "sshpass not present. Cannot use password authentication." "CRITICAL"
exit 1
fi
else
2019-02-08 13:22:37 +01:00
if [ "$SQL_BACKUP" != false ]; then
2015-11-12 01:26:38 +01:00
if ! type mysqldump > /dev/null 2>&1 ; then
Logger "mysqldump not present. Cannot backup SQL." "CRITICAL"
2016-08-29 18:27:12 +02:00
CAN_BACKUP_SQL=false
2015-11-12 01:26:38 +01:00
fi
if ! type mysql > /dev/null 2>&1 ; then
Logger "mysql not present. Cannot backup SQL." "CRITICAL"
2016-08-29 18:27:12 +02:00
CAN_BACKUP_SQL=false
2015-11-12 01:26:38 +01:00
fi
fi
fi
2019-02-08 13:22:37 +01:00
if [ "$FILE_BACKUP" != false ]; then
2016-08-31 23:32:21 +02:00
if ! type rsync > /dev/null 2>&1 ; then
Logger "rsync not present. Cannot backup files." "CRITICAL"
CAN_BACKUP_FILES=false
fi
fi
2019-02-08 13:22:37 +01:00
if [ "$ENCRYPTION" == true ]; then
CheckCryptEnvironnment
2016-08-31 23:32:21 +02:00
fi
2017-01-04 09:08:23 +01:00
if ! type pgrep > /dev/null 2>&1 ; then
Logger "pgrep not present. $0 cannot start." "CRITICAL"
exit 1
fi
2016-08-31 23:32:21 +02:00
}
function CheckCryptEnvironnment {
2016-08-31 23:32:21 +02:00
if ! type gpg2 > /dev/null 2>&1 ; then
if ! type gpg > /dev/null 2>&1; then
Logger "Programs gpg2 nor gpg not present. Cannot encrypt backup files." "CRITICAL"
2016-08-31 23:32:21 +02:00
CAN_BACKUP_FILES=false
2015-11-12 01:26:38 +01:00
else
Logger "Program gpg2 not present, falling back to gpg." "NOTICE"
CRYPT_TOOL=gpg
2015-11-12 01:26:38 +01:00
fi
2016-08-31 23:32:21 +02:00
else
CRYPT_TOOL=gpg2
2015-11-12 01:26:38 +01:00
fi
}
function CheckCurrentConfig {
2016-12-23 17:51:57 +01:00
__CheckArguments 0 $# "$@" #__WITH_PARANOIA_DEBUG
2015-11-12 01:26:38 +01:00
2019-02-08 13:22:37 +01:00
local test
local booleans
local num_vars
2015-11-12 01:26:38 +01:00
if [ "$INSTANCE_ID" == "" ]; then
Logger "No INSTANCE_ID defined in config file." "CRITICAL"
exit 1
fi
2019-02-08 13:22:37 +01:00
# v2 config will use true / false instead of yes / no
# Check all variables that should contain "yes" or "no", true or false
declare -a booleans=(SQL_BACKUP FILE_BACKUP ENCRYPTION CREATE_DIRS KEEP_ABSOLUTE_PATHS GET_BACKUP_SIZE SSH_COMPRESSION SSH_IGNORE_KNOWN_HOSTS REMOTE_HOST_PING SUDO_EXEC DATABASES_ALL PRESERVE_PERMISSIONS PRESERVE_OWNER PRESERVE_GROUP PRESERVE_EXECUTABILITY PRESERVE_ACL PRESERVE_XATTR COPY_SYMLINKS KEEP_DIRLINKS PRESERVE_HARDLINKS RSYNC_COMPRESS PARTIAL DELETE_VANISHED_FILES DELTA_COPIES ROTATE_SQL_BACKUPS ROTATE_FILE_BACKUPS STOP_ON_CMD_ERROR RUN_AFTER_CMD_ON_ERROR)
for i in "${booleans[@]}"; do
test="if [ \"\$$i\" != \"yes\" ] && [ \"\$$i\" != \"no\" ] && [ \"\$$i\" != true ] && [ \"\$$i\" != false ]; then Logger \"Bogus $i value [\$$i] defined in config file. Correct your config file or update it with the update script if using and old version.\" \"CRITICAL\"; exit 1; fi"
2015-11-12 01:26:38 +01:00
eval "$test"
done
if [ "$BACKUP_TYPE" != "local" ] && [ "$BACKUP_TYPE" != "pull" ] && [ "$BACKUP_TYPE" != "push" ]; then
Logger "Bogus BACKUP_TYPE value in config file." "CRITICAL"
exit 1
fi
# Check all variables that should contain a numerical value >= 0
2016-08-17 09:14:09 +02:00
declare -a num_vars=(BACKUP_SIZE_MINIMUM SQL_WARN_MIN_SPACE FILE_WARN_MIN_SPACE SOFT_MAX_EXEC_TIME_DB_TASK HARD_MAX_EXEC_TIME_DB_TASK COMPRESSION_LEVEL SOFT_MAX_EXEC_TIME_FILE_TASK HARD_MAX_EXEC_TIME_FILE_TASK BANDWIDTH SOFT_MAX_EXEC_TIME_TOTAL HARD_MAX_EXEC_TIME_TOTAL ROTATE_SQL_COPIES ROTATE_FILE_COPIES KEEP_LOGGING MAX_EXEC_TIME_PER_CMD_BEFORE MAX_EXEC_TIME_PER_CMD_AFTER)
2016-02-19 22:14:13 +01:00
for i in "${num_vars[@]}"; do
test="if [ $(IsNumericExpand \"\$$i\") -eq 0 ]; then Logger \"Bogus $i value [\$$i] defined in config file. Correct your config file or update it with the update script if using and old version.\" \"CRITICAL\"; exit 1; fi"
2015-11-12 01:26:38 +01:00
eval "$test"
done
2019-02-08 13:22:37 +01:00
if [ "$FILE_BACKUP" == true ]; then
if [ "$DIRECTORY_LIST" == "" ] && [ "$RECURSIVE_DIRECTORY_LIST" == "" ]; then
Logger "No directories specified in config file, no files to backup." "ERROR"
2016-08-29 18:27:12 +02:00
CAN_BACKUP_FILES=false
fi
fi
2019-02-08 13:22:37 +01:00
if [ "$REMOTE_OPERATION" == true ] && [ ! -f "$SSH_RSA_PRIVATE_KEY" ]; then
2016-08-26 11:55:58 +02:00
Logger "Cannot find rsa private key [$SSH_RSA_PRIVATE_KEY]. Cannot connect to remote system." "CRITICAL"
exit 1
fi
2016-09-04 09:30:12 +02:00
#WIP: Encryption use key file instead of recipient ?
#if [ ! -f "$ENCRYPT_GPG_PYUBKEY" ]; then
# Logger "Cannot find gpg pubkey [$ENCRYPT_GPG_PUBKEY]. Cannot encrypt backup files." "CRITICAL"
# exit 1
#fi
2016-09-01 20:32:38 +02:00
2019-02-08 13:22:37 +01:00
if [ "$SQL_BACKUP" == true ] && [ "$SQL_STORAGE" == "" ]; then
2016-09-01 20:32:38 +02:00
Logger "SQL_STORAGE not defined." "CRITICAL"
exit 1
fi
2019-02-08 13:22:37 +01:00
if [ "$FILE_BACKUP" == true ] && [ "$FILE_STORAGE" == "" ]; then
2016-09-01 20:32:38 +02:00
Logger "FILE_STORAGE not defined." "CRITICAL"
exit 1
fi
2019-02-08 13:22:37 +01:00
if [ "$ENCRYPTION" == true ]; then
if [ "$CRYPT_STORAGE" == "" ]; then
Logger "CRYPT_STORAGE not defined." "CRITICAL"
exit 1
2016-09-09 08:31:16 +02:00
fi
if [ "$GPG_RECIPIENT" == "" ]; then
Logger "No GPG recipient defined." "CRITICAL"
exit 1
fi
2016-09-01 20:32:38 +02:00
fi
2019-02-08 13:22:37 +01:00
if [ "$REMOTE_OPERATION" == true ] && ([ ! -f "$SSH_RSA_PRIVATE_KEY" ] && [ ! -f "$SSH_PASSWORD_FILE" ]); then
2016-10-23 18:04:39 +02:00
Logger "Cannot find rsa private key [$SSH_RSA_PRIVATE_KEY] nor password file [$SSH_PASSWORD_FILE]. No authentication method provided." "CRITICAL"
exit 1
fi
2015-11-12 01:26:38 +01:00
}
2019-02-08 13:22:37 +01:00
# Change all booleans with "yes" or "no" to true / false for v2 config syntax compatibility
function UpdateBooleans {
local update
local booleans
declare -a booleans=(SQL_BACKUP FILE_BACKUP ENCRYPTION CREATE_DIRS KEEP_ABSOLUTE_PATHS GET_BACKUP_SIZE SSH_COMPRESSION SSH_IGNORE_KNOWN_HOSTS REMOTE_HOST_PING SUDO_EXEC DATABASES_ALL PRESERVE_PERMISSIONS PRESERVE_OWNER PRESERVE_GROUP PRESERVE_EXECUTABILITY PRESERVE_ACL PRESERVE_XATTR COPY_SYMLINKS KEEP_DIRLINKS PRESERVE_HARDLINKS RSYNC_COMPRESS PARTIAL DELETE_VANISHED_FILES DELTA_COPIES ROTATE_SQL_BACKUPS ROTATE_FILE_BACKUPS STOP_ON_CMD_ERROR RUN_AFTER_CMD_ON_ERROR)
for i in "${booleans[@]}"; do
update="if [ \"\$$i\" == \"yes\" ]; then $i=true; fi; if [ \"\$$i\" == \"no\" ]; then $i=false; fi"
eval "$update"
done
}
2016-03-03 16:06:27 +01:00
function CheckRunningInstances {
2016-12-23 17:51:57 +01:00
__CheckArguments 0 $# "$@" #__WITH_PARANOIA_DEBUG
2016-03-03 16:06:27 +01:00
if [ -f "$RUN_DIR/$PROGRAM.$INSTANCE_ID" ]; then
pid="$(head -c16384 "$RUN_DIR/$PROGRAM.$INSTANCE_ID")"
2016-03-03 16:06:27 +01:00
if ps aux | awk '{print $2}' | grep $pid > /dev/null; then
Logger "Another instance [$INSTANCE_ID] of obackup is already running." "CRITICAL"
exit 1
fi
fi
echo $SCRIPT_PID > "$RUN_DIR/$PROGRAM.$INSTANCE_ID"
}
2015-11-12 01:26:38 +01:00
function _ListDatabasesLocal {
2016-12-23 17:51:57 +01:00
__CheckArguments 0 $# "$@" #__WITH_PARANOIA_DEBUG
2016-02-19 22:14:13 +01:00
local retval
local sqlCmd
2015-11-12 01:26:38 +01:00
2020-05-03 10:14:59 +02:00
sqlCmd="mysql -u $SQL_USER -Bse 'SELECT table_schema, round(sum( data_length + index_length ) / 1024) FROM information_schema.TABLES GROUP by table_schema;' > \"$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP\" 2>&1"
2017-01-03 13:01:18 +01:00
Logger "Launching command [$sqlCmd]." "DEBUG"
eval "$sqlCmd" &
2018-03-15 20:14:18 +01:00
ExecTasks $! "${FUNCNAME[0]}" false 0 0 $SOFT_MAX_EXEC_TIME_TOTAL $HARD_MAX_EXEC_TIME_TOTAL true $SLEEP_TIME $KEEP_LOGGING
retval=$?
if [ $retval -eq 0 ]; then
2015-11-12 01:26:38 +01:00
Logger "Listing databases succeeded." "NOTICE"
else
Logger "Listing databases failed." "ERROR"
_LOGGER_SILENT=true Logger "Command was [$sqlCmd]." "WARN"
2016-12-19 23:02:19 +01:00
if [ -f "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP" ]; then
2020-05-03 10:05:27 +02:00
Logger "Truncated output:\n$(head -c16384 "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP")" "ERROR"
2015-11-12 01:26:38 +01:00
fi
return 1
fi
}
function _ListDatabasesRemote {
2016-12-23 17:51:57 +01:00
__CheckArguments 0 $# "$@" #__WITH_PARANOIA_DEBUG
2016-02-19 22:14:13 +01:00
2017-01-02 17:08:39 +01:00
local sqlCmd
local retval
2015-11-12 01:26:38 +01:00
CheckConnectivity3rdPartyHosts
CheckConnectivityRemoteHost
sqlCmd="$SSH_CMD \"env _REMOTE_TOKEN=$_REMOTE_TOKEN mysql -u $SQL_USER -Bse 'SELECT table_schema, round(sum( data_length + index_length ) / 1024) FROM information_schema.TABLES GROUP by table_schema;'\" > \"$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP\" 2>&1"
2017-01-03 13:01:18 +01:00
Logger "Command output: $sqlCmd" "DEBUG"
eval "$sqlCmd" &
2018-03-15 20:14:18 +01:00
ExecTasks $! "${FUNCNAME[0]}" false 0 0 $SOFT_MAX_EXEC_TIME_TOTAL $HARD_MAX_EXEC_TIME_TOTAL true $SLEEP_TIME $KEEP_LOGGING
2017-01-02 17:08:39 +01:00
retval=$?
if [ $retval -eq 0 ]; then
2015-11-12 01:26:38 +01:00
Logger "Listing databases succeeded." "NOTICE"
else
Logger "Listing databases failed." "ERROR"
2017-01-03 13:01:18 +01:00
Logger "Command output: $sqlCmd" "WARN"
2016-12-19 23:02:19 +01:00
if [ -f "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP" ]; then
2020-05-03 10:05:27 +02:00
Logger "Truncated output:\n$(head -c16384 "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP")" "ERROR"
2015-11-12 01:26:38 +01:00
fi
2017-01-02 17:08:39 +01:00
return $retval
2015-11-12 01:26:38 +01:00
fi
}
function ListDatabases {
2016-12-23 17:51:57 +01:00
__CheckArguments 0 $# "$@" #__WITH_PARANOIA_DEBUG
2015-11-12 01:26:38 +01:00
2016-08-08 18:43:35 +02:00
local outputFile # Return of subfunction
local dbName
local dbSize
local dbBackup
local missingDatabases=false
2016-08-08 18:43:35 +02:00
local dbArray
2015-11-12 01:26:38 +01:00
2016-08-29 18:27:12 +02:00
if [ $CAN_BACKUP_SQL == false ]; then
2015-11-12 01:26:38 +01:00
Logger "Cannot list databases." "ERROR"
return 1
fi
Logger "Listing databases." "NOTICE"
if [ "$BACKUP_TYPE" == "local" ] || [ "$BACKUP_TYPE" == "push" ]; then
_ListDatabasesLocal
2017-01-02 17:08:39 +01:00
if [ $? -ne 0 ]; then
2016-08-08 18:43:35 +02:00
outputFile=""
2015-11-12 01:26:38 +01:00
else
2016-12-19 23:02:19 +01:00
outputFile="$RUN_DIR/$PROGRAM._ListDatabasesLocal.$SCRIPT_PID.$TSTAMP"
2015-11-12 01:26:38 +01:00
fi
elif [ "$BACKUP_TYPE" == "pull" ]; then
_ListDatabasesRemote
2017-01-02 17:08:39 +01:00
if [ $? -ne 0 ]; then
2016-08-08 18:43:35 +02:00
outputFile=""
2015-11-12 01:26:38 +01:00
else
2016-12-19 23:02:19 +01:00
outputFile="$RUN_DIR/$PROGRAM._ListDatabasesRemote.$SCRIPT_PID.$TSTAMP"
2015-11-12 01:26:38 +01:00
fi
fi
2016-08-29 18:27:12 +02:00
if [ -f "$outputFile" ] && [ $CAN_BACKUP_SQL == true ]; then
2016-08-08 18:43:35 +02:00
while read -r line; do
while read -r name size; do dbName=$name; dbSize=$size; done <<< "$line"
2015-11-12 01:26:38 +01:00
2019-02-08 13:22:37 +01:00
if [ "$DATABASES_ALL" == true ]; then
dbBackup=true
2016-08-18 11:05:30 +02:00
IFS=$PATH_SEPARATOR_CHAR read -r -a dbArray <<< "$DATABASES_ALL_EXCLUDE_LIST"
2016-08-08 18:43:35 +02:00
for j in "${dbArray[@]}"; do
if [ "$dbName" == "$j" ]; then
dbBackup=false
2015-11-12 01:26:38 +01:00
fi
done
else
dbBackup=false
2016-08-18 11:05:30 +02:00
IFS=$PATH_SEPARATOR_CHAR read -r -a dbArray <<< "$DATABASES_LIST"
2016-08-08 18:43:35 +02:00
for j in "${dbArray[@]}"; do
if [ "$dbName" == "$j" ]; then
dbBackup=true
2015-11-12 01:26:38 +01:00
fi
done
if [ $dbBackup == false ]; then
missingDatabases=true
fi
2015-11-12 01:26:38 +01:00
fi
if [ $dbBackup == true ]; then
2015-11-12 01:26:38 +01:00
if [ "$SQL_BACKUP_TASKS" != "" ]; then
2016-08-08 18:43:35 +02:00
SQL_BACKUP_TASKS="$SQL_BACKUP_TASKS $dbName"
2015-11-12 01:26:38 +01:00
else
2016-08-08 18:43:35 +02:00
SQL_BACKUP_TASKS="$dbName"
2015-11-12 01:26:38 +01:00
fi
2016-12-27 12:53:35 +01:00
TOTAL_DATABASES_SIZE=$((TOTAL_DATABASES_SIZE+dbSize))
2015-11-12 01:26:38 +01:00
else
2016-08-08 18:43:35 +02:00
SQL_EXCLUDED_TASKS="$SQL_EXCLUDED_TASKS $dbName"
2015-11-12 01:26:38 +01:00
fi
2016-08-08 18:43:35 +02:00
done < "$outputFile"
2015-11-12 01:26:38 +01:00
if [ $missingDatabases == true ]; then
IFS=$PATH_SEPARATOR_CHAR read -r -a dbArray <<< "$DATABASES_LIST"
for i in "${dbArray[@]}"; do
if ! grep "$i" "$outputFile" > /dev/null 2>&1; then
Logger "Missing database [$i]." "CRITICAL"
fi
done
fi
2015-11-12 01:26:38 +01:00
Logger "Database backup list: $SQL_BACKUP_TASKS" "DEBUG"
Logger "Database exclude list: $SQL_EXCLUDED_TASKS" "DEBUG"
else
Logger "Will not execute database backup." "ERROR"
2016-08-29 18:27:12 +02:00
CAN_BACKUP_SQL=false
2015-11-12 01:26:38 +01:00
fi
}
function _ListRecursiveBackupDirectoriesLocal {
2016-12-23 17:51:57 +01:00
__CheckArguments 0 $# "$@" #__WITH_PARANOIA_DEBUG
2016-02-19 22:14:13 +01:00
local cmd
2016-08-06 14:02:52 +02:00
local directories
local directory
2016-12-27 12:53:35 +01:00
local retval
local successfulRun=false
local failuresPresent=false
2015-11-12 01:26:38 +01:00
2016-08-08 18:43:35 +02:00
IFS=$PATH_SEPARATOR_CHAR read -r -a directories <<< "$RECURSIVE_DIRECTORY_LIST"
2016-08-06 14:02:52 +02:00
for directory in "${directories[@]}"; do
# Make sure there is only one trailing slash
directory="${directory%/}/"
# No sudo here, assuming you should have all necessary rights for local checks
2020-05-03 10:14:59 +02:00
cmd="$FIND_CMD -L $directory -mindepth 1 -maxdepth 1 -type d >> \"$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP\" 2> \"$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.error.$SCRIPT_PID.$TSTAMP\""
2017-01-03 13:01:18 +01:00
Logger "Launching command [$cmd]." "DEBUG"
2016-12-27 12:53:35 +01:00
eval "$cmd"
retval=$?
2017-01-02 17:08:39 +01:00
if [ $retval -ne 0 ]; then
2015-11-12 01:26:38 +01:00
Logger "Could not enumerate directories in [$directory]." "ERROR"
_LOGGER_SILENT=true Logger "Command was [$cmd]." "WARN"
2020-05-03 10:05:27 +02:00
if [ -f "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP" ]; then
Logger "Truncated output:\n$(head -c16384 "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP")" "ERROR"
2015-11-12 01:26:38 +01:00
fi
2020-05-03 10:05:27 +02:00
if [ -f "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.error.$SCRIPT_PID.$TSTAMP" ]; then
Logger "Truncated error output:\n$(head -c16384 "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.error.$SCRIPT_PID.$TSTAMP")" "ERROR"
2015-11-12 01:26:38 +01:00
fi
2016-12-27 12:53:35 +01:00
failuresPresent=true
else
successfulRun=true
2015-11-12 01:26:38 +01:00
fi
done
2016-12-27 12:53:35 +01:00
if [ $successfulRun == true ] && [ $failuresPresent == true ]; then
return 2
elif [ $successfulRun == true ] && [ $failuresPresent == false ]; then
return 0
else
return 1
fi
2015-11-12 01:26:38 +01:00
}
function _ListRecursiveBackupDirectoriesRemote {
2016-12-23 17:51:57 +01:00
__CheckArguments 0 $# "$@" #__WITH_PARANOIA_DEBUG
2016-02-19 22:14:13 +01:00
2017-01-02 16:58:21 +01:00
local retval
$SSH_CMD env _REMOTE_TOKEN=$_REMOTE_TOKEN \
env _DEBUG="'$_DEBUG'" env _PARANOIA_DEBUG="'$_PARANOIA_DEBUG'" env _LOGGER_SILENT="'$_LOGGER_SILENT'" env _LOGGER_VERBOSE="'$_LOGGER_VERBOSE'" env _LOGGER_PREFIX="'$_LOGGER_PREFIX'" env _LOGGER_ERR_ONLY="'$_LOGGER_ERR_ONLY'" \
2018-11-06 15:17:24 +01:00
env _REMOTE_EXECUTION="true" env PROGRAM="'$PROGRAM'" env SCRIPT_PID="'$SCRIPT_PID'" env TSTAMP="'$TSTAMP'" \
2016-12-23 18:23:13 +01:00
env RECURSIVE_DIRECTORY_LIST="'$RECURSIVE_DIRECTORY_LIST'" env PATH_SEPARATOR_CHAR="'$PATH_SEPARATOR_CHAR'" \
env REMOTE_FIND_CMD="'$REMOTE_FIND_CMD'" $COMMAND_SUDO' bash -s' << 'ENDSSH' > "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP" 2> "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.error.$SCRIPT_PID.$TSTAMP"
2019-08-09 10:13:59 +02:00
_REMOTE_TOKEN="(o_0)"
2016-12-20 22:53:22 +01:00
include #### DEBUG SUBSET ####
include #### TrapError SUBSET ####
include #### RemoteLogger SUBSET ####
function _ListRecursiveBackupDirectoriesRemoteSub {
2016-08-06 14:02:52 +02:00
local directories
local directory
2016-12-27 12:53:35 +01:00
local retval
local successfulRun=false
local failuresPresent=false
2017-01-03 13:01:18 +01:00
local cmd
2015-11-12 01:26:38 +01:00
2016-08-08 18:43:35 +02:00
IFS=$PATH_SEPARATOR_CHAR read -r -a directories <<< "$RECURSIVE_DIRECTORY_LIST"
2016-08-06 14:02:52 +02:00
for directory in "${directories[@]}"; do
# Make sure there is only one trailing slash
directory="${directory%/}/"
cmd="$REMOTE_FIND_CMD -L \"$directory\" -mindepth 1 -maxdepth 1 -type d"
Logger "Launching command [$cmd]." "DEBUG"
eval $cmd
2016-12-27 12:53:35 +01:00
retval=$?
2017-01-02 17:08:39 +01:00
if [ $retval -ne 0 ]; then
2016-12-20 22:53:22 +01:00
RemoteLogger "Could not enumerate directories in [$directory]." "ERROR"
2017-01-03 13:01:18 +01:00
RemoteLogger "Command was [$cmd]." "WARN"
2016-12-27 12:53:35 +01:00
failuresPresent=true
else
successfulRun=true
2015-11-12 01:26:38 +01:00
fi
done
2016-12-27 12:53:35 +01:00
if [ $successfulRun == true ] && [ $failuresPresent == true ]; then
return 2
elif [ $successfulRun == true ] && [ $failuresPresent == false ]; then
return 0
else
return 1
fi
2016-12-20 22:53:22 +01:00
}
_ListRecursiveBackupDirectoriesRemoteSub
exit $?
2016-12-20 22:53:22 +01:00
ENDSSH
2017-01-02 16:58:21 +01:00
retval=$?
if [ $retval -ne 0 ]; then
2020-05-03 10:05:27 +02:00
if [ -f "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP" ]; then
Logger "Truncated output:\n$(head -c16384 "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP")" "ERROR"
2017-01-02 16:58:21 +01:00
fi
2020-05-03 10:05:27 +02:00
if [ -f "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.error.$SCRIPT_PID.$TSTAMP" ]; then
Logger "Truncated error output:\n$(head -c16384 "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.error.$SCRIPT_PID.$TSTAMP")" "ERROR"
2017-01-02 16:58:21 +01:00
fi
fi
return $retval
2015-11-12 01:26:38 +01:00
}
function ListRecursiveBackupDirectories {
2016-12-23 17:51:57 +01:00
__CheckArguments 0 $# "$@" #__WITH_PARANOIA_DEBUG
2016-02-19 22:14:13 +01:00
local output_file
local file_exclude
2016-08-30 18:11:54 +02:00
local excluded
2016-08-08 18:43:35 +02:00
local fileArray
if [ "$RECURSIVE_DIRECTORY_LIST" != "" ]; then
# Return values from subfunctions can be 0 (no error), 1 (only errors) or 2 (some errors). Do process output except on 1 return code
Logger "Listing directories to backup." "NOTICE"
if [ "$BACKUP_TYPE" == "local" ] || [ "$BACKUP_TYPE" == "push" ]; then
_ListRecursiveBackupDirectoriesLocal &
2018-02-24 17:41:33 +01:00
ExecTasks $! "${FUNCNAME[0]}" false 0 0 $SOFT_MAX_EXEC_TIME_TOTAL $HARD_MAX_EXEC_TIME_TOTAL true $SLEEP_TIME $KEEP_LOGGING
if [ $? -eq 1 ]; then
output_file=""
else
output_file="$RUN_DIR/$PROGRAM._ListRecursiveBackupDirectoriesLocal.$SCRIPT_PID.$TSTAMP"
fi
elif [ "$BACKUP_TYPE" == "pull" ]; then
_ListRecursiveBackupDirectoriesRemote &
2018-02-24 17:41:33 +01:00
ExecTasks $! "${FUNCNAME[0]}" false 0 0 $SOFT_MAX_EXEC_TIME_TOTAL $HARD_MAX_EXEC_TIME_TOTAL true $SLEEP_TIME $KEEP_LOGGING
if [ $? -eq 1 ]; then
output_file=""
else
output_file="$RUN_DIR/$PROGRAM._ListRecursiveBackupDirectoriesRemote.$SCRIPT_PID.$TSTAMP"
fi
2015-11-12 01:26:38 +01:00
fi
if [ -f "$output_file" ]; then
while read -r line; do
file_exclude=0
IFS=$PATH_SEPARATOR_CHAR read -r -a fileArray <<< "$RECURSIVE_EXCLUDE_LIST"
for excluded in "${fileArray[@]}"; do
if [ "$excluded" == "$line" ]; then
file_exclude=1
fi
done
2015-11-12 01:26:38 +01:00
if [ $file_exclude -eq 0 ]; then
if [ "$FILE_RECURSIVE_BACKUP_TASKS" == "" ]; then
2020-05-04 11:57:27 +02:00
FILE_SIZE_LIST="'$line'"
FILE_RECURSIVE_BACKUP_TASKS="$line"
else
2020-05-04 11:57:27 +02:00
FILE_SIZE_LIST="$FILE_SIZE_LIST '$line'"
FILE_RECURSIVE_BACKUP_TASKS="$FILE_RECURSIVE_BACKUP_TASKS$PATH_SEPARATOR_CHAR$line"
fi
else
FILE_RECURSIVE_EXCLUDED_TASKS="$FILE_RECURSIVE_EXCLUDED_TASKS$PATH_SEPARATOR_CHAR$line"
2015-11-12 01:26:38 +01:00
fi
done < "$output_file"
fi
2015-11-12 01:26:38 +01:00
fi
if [ "$DIRECTORY_LIST" != "" ]; then
2016-08-18 10:18:56 +02:00
IFS=$PATH_SEPARATOR_CHAR read -r -a fileArray <<< "$DIRECTORY_LIST"
for directory in "${fileArray[@]}"; do
if [ "$FILE_SIZE_LIST" == "" ]; then
2020-05-04 11:57:27 +02:00
FILE_SIZE_LIST="'$directory'"
else
2020-05-04 11:57:27 +02:00
FILE_SIZE_LIST="$FILE_SIZE_LIST '$directory'"
fi
if [ "$FILE_BACKUP_TASKS" == "" ]; then
FILE_BACKUP_TASKS="$directory"
else
FILE_BACKUP_TASKS="$FILE_BACKUP_TASKS$PATH_SEPARATOR_CHAR$directory"
fi
done
fi
2015-11-12 01:26:38 +01:00
}
function _GetDirectoriesSizeLocal {
2016-12-27 12:53:35 +01:00
local dirList="${1}"
2016-12-23 17:51:57 +01:00
__CheckArguments 1 $# "$@" #__WITH_PARANOIA_DEBUG
2016-02-19 22:14:13 +01:00
local cmd
2017-01-02 17:08:39 +01:00
local retval
2015-11-12 01:26:38 +01:00
# No sudo here, assuming you should have all the necessary rights
2016-08-18 10:18:56 +02:00
# This is not pretty, but works with all supported systems
2020-05-04 12:08:08 +02:00
cmd="du -cs $dirList | tail -n1 | cut -f1 > \"$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP\" 2> \"$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.error.$SCRIPT_PID.$TSTAMP\""
2017-01-03 13:01:18 +01:00
Logger "Launching command [$cmd]." "DEBUG"
2015-11-12 01:26:38 +01:00
eval "$cmd" &
2018-02-24 17:41:33 +01:00
ExecTasks $! "${FUNCNAME[0]}" false 0 0 $SOFT_MAX_EXEC_TIME_TOTAL $HARD_MAX_EXEC_TIME_TOTAL true $SLEEP_TIME $KEEP_LOGGING
2015-11-12 01:26:38 +01:00
# $cmd will return 0 even if some errors found, so we need to check if there is an error output
2017-01-02 17:08:39 +01:00
retval=$?
2018-01-03 17:50:40 +01:00
if [ $retval -ne 0 ] || [ -s "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.error.$SCRIPT_PID.$TSTAMP" ]; then
2017-01-03 12:32:24 +01:00
Logger "Could not get files size for some or all local directories." "ERROR"
_LOGGER_SILENT=true Logger "Command was [$cmd]." "WARN"
2016-12-19 23:02:19 +01:00
if [ -f "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP" ]; then
2020-05-03 10:05:27 +02:00
Logger "Truncated output:\n$(head -c16384 "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP")" "ERROR"
2015-11-12 01:26:38 +01:00
fi
2016-12-19 23:02:19 +01:00
if [ -f "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.error.$SCRIPT_PID.$TSTAMP" ]; then
2020-05-03 10:05:27 +02:00
Logger "Truncated error output:\n$(head -c16384 "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.error.$SCRIPT_PID.$TSTAMP")" "ERROR"
2015-11-12 01:26:38 +01:00
fi
2017-02-09 12:35:33 +01:00
else
2015-11-12 01:26:38 +01:00
Logger "File size fetched successfully." "NOTICE"
fi
2016-12-19 23:02:19 +01:00
if [ -s "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP" ]; then
2020-05-03 10:05:27 +02:00
TOTAL_FILES_SIZE="$(head -c16384 "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP")"
if [ $(IsInteger "$TOTAL_FILES_SIZE") -eq 0 ]; then
TOTAL_FILES_SIZE="$(HumanToNumeric "$TOTAL_FILES_SIZE")"
2016-10-23 13:27:02 +02:00
fi
2015-11-12 01:26:38 +01:00
else
TOTAL_FILES_SIZE=-1
fi
}
function _GetDirectoriesSizeRemote {
2016-12-27 12:53:35 +01:00
local dirList="${1}"
2016-12-23 17:51:57 +01:00
__CheckArguments 1 $# "$@" #__WITH_PARANOIA_DEBUG
2016-02-19 22:14:13 +01:00
local cmd
2017-01-02 17:08:39 +01:00
local retval
2015-11-12 01:26:38 +01:00
# Error output is different from stdout because not all files in list may fail at once
$SSH_CMD env _REMOTE_TOKEN=$_REMOTE_TOKEN \
env _DEBUG="'$_DEBUG'" env _PARANOIA_DEBUG="'$_PARANOIA_DEBUG'" env _LOGGER_SILENT="'$_LOGGER_SILENT'" env _LOGGER_VERBOSE="'$_LOGGER_VERBOSE'" env _LOGGER_PREFIX="'$_LOGGER_PREFIX'" env _LOGGER_ERR_ONLY="'$_LOGGER_ERR_ONLY'" \
2018-11-06 15:17:24 +01:00
env _REMOTE_EXECUTION="true" env PROGRAM="'$PROGRAM'" env SCRIPT_PID="'$SCRIPT_PID'" env TSTAMP="'$TSTAMP'" \
dirList="'$dirList'" \
$COMMAND_SUDO' bash -s' << 'ENDSSH' > "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP" 2> "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.error.$SCRIPT_PID.$TSTAMP" &
2019-08-09 10:13:59 +02:00
_REMOTE_TOKEN="(o_0)"
2016-12-27 12:53:35 +01:00
include #### DEBUG SUBSET ####
include #### TrapError SUBSET ####
2017-01-02 22:48:59 +01:00
include #### RemoteLogger SUBSET ####
2016-12-27 12:53:35 +01:00
2020-05-04 12:08:08 +02:00
cmd="du -cs $dirList | tail -n1 | cut -f1"
2016-12-27 12:53:35 +01:00
eval "$cmd"
retval=$?
if [ $retval != 0 ]; then
2017-01-03 13:01:18 +01:00
RemoteLogger "Command was [$cmd]." "WARN"
2017-01-03 13:17:43 +01:00
fi
exit $retval
2016-12-27 12:53:35 +01:00
ENDSSH
2015-11-12 01:26:38 +01:00
# $cmd will return 0 even if some errors found, so we need to check if there is an error output
2018-02-24 17:41:33 +01:00
ExecTasks $! "${FUNCNAME[0]}" false 0 0 $SOFT_MAX_EXEC_TIME_TOTAL $HARD_MAX_EXEC_TIME_TOTAL true $SLEEP_TIME $KEEP_LOGGING
2017-01-02 17:08:39 +01:00
retval=$?
2018-01-03 17:50:40 +01:00
if [ $retval -ne 0 ] || [ -s "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.error.$SCRIPT_PID.$TSTAMP" ]; then
2017-01-03 12:32:24 +01:00
Logger "Could not get files size for some or all remote directories." "ERROR"
2016-12-19 23:02:19 +01:00
if [ -f "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP" ]; then
2020-05-03 10:05:27 +02:00
Logger "Truncated output:\n$(head -c16384 "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP")" "ERROR"
2015-11-12 01:26:38 +01:00
fi
2016-12-19 23:02:19 +01:00
if [ -f "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.error.$SCRIPT_PID.$TSTAMP" ]; then
2020-05-03 10:05:27 +02:00
Logger "Truncated error output:\n$(head -c16384 "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.error.$SCRIPT_PID.$TSTAMP")" "ERROR"
2015-11-12 01:26:38 +01:00
fi
else
2017-01-02 22:48:59 +01:00
Logger "File size fetched successfully." "NOTICE"
2015-11-12 01:26:38 +01:00
fi
2016-12-19 23:02:19 +01:00
if [ -s "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP" ]; then
2020-05-03 10:05:27 +02:00
TOTAL_FILES_SIZE="$(head -c16384 "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP")"
if [ $(IsInteger "$TOTAL_FILES_SIZE") -eq 0 ]; then
TOTAL_FILES_SIZE="$(HumanToNumeric "$TOTAL_FILES_SIZE")"
2016-10-23 13:27:02 +02:00
fi
2015-11-12 01:26:38 +01:00
else
TOTAL_FILES_SIZE=-1
fi
}
function GetDirectoriesSize {
2016-12-23 17:51:57 +01:00
__CheckArguments 0 $# "$@" #__WITH_PARANOIA_DEBUG
2015-11-12 01:26:38 +01:00
Logger "Getting files size" "NOTICE"
if [ "$BACKUP_TYPE" == "local" ] || [ "$BACKUP_TYPE" == "push" ]; then
2019-02-08 13:22:37 +01:00
if [ "$FILE_BACKUP" != false ]; then
_GetDirectoriesSizeLocal "$FILE_SIZE_LIST"
2015-11-12 01:26:38 +01:00
fi
elif [ "$BACKUP_TYPE" == "pull" ]; then
2019-02-08 13:22:37 +01:00
if [ "$FILE_BACKUP" != false ]; then
_GetDirectoriesSizeRemote "$FILE_SIZE_LIST"
2015-11-12 01:26:38 +01:00
fi
fi
}
function _CreateDirectoryLocal {
2016-12-27 12:53:35 +01:00
local dirToCreate="${1}"
2016-12-23 17:51:57 +01:00
__CheckArguments 1 $# "$@" #__WITH_PARANOIA_DEBUG
2015-11-12 01:26:38 +01:00
2017-01-02 17:08:39 +01:00
local retval
2016-12-27 12:53:35 +01:00
if [ ! -d "$dirToCreate" ]; then
# No sudo, you should have all necessary rights
2020-05-03 10:05:27 +02:00
mkdir -p "$dirToCreate" > "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP" 2>&1 &
2018-02-24 17:41:33 +01:00
ExecTasks $! "${FUNCNAME[0]}" false 0 0 720 1800 true $SLEEP_TIME $KEEP_LOGGING
2017-01-02 17:08:39 +01:00
retval=$?
if [ $retval -ne 0 ]; then
2016-12-27 12:53:35 +01:00
Logger "Cannot create directory [$dirToCreate]" "CRITICAL"
2020-05-03 10:05:27 +02:00
if [ -f "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP" ]; then
Logger "Truncated output: $(head -c16384 "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP")" "ERROR"
2015-11-12 01:26:38 +01:00
fi
2017-01-02 17:08:39 +01:00
return $retval
2015-11-12 01:26:38 +01:00
fi
fi
}
function _CreateDirectoryRemote {
2016-12-27 12:53:35 +01:00
local dirToCreate="${1}"
2016-12-23 17:51:57 +01:00
__CheckArguments 1 $# "$@" #__WITH_PARANOIA_DEBUG
2016-02-19 22:14:13 +01:00
local cmd
2017-01-02 17:08:39 +01:00
local retval
2015-11-12 01:26:38 +01:00
CheckConnectivity3rdPartyHosts
CheckConnectivityRemoteHost
2016-12-27 12:53:35 +01:00
$SSH_CMD env _REMOTE_TOKEN=$_REMOTE_TOKEN \
env _DEBUG="'$_DEBUG'" env _PARANOIA_DEBUG="'$_PARANOIA_DEBUG'" env _LOGGER_SILENT="'$_LOGGER_SILENT'" env _LOGGER_VERBOSE="'$_LOGGER_VERBOSE'" env _LOGGER_PREFIX="'$_LOGGER_PREFIX'" env _LOGGER_ERR_ONLY="'$_LOGGER_ERR_ONLY'" \
env _REMOTE_EXECUTION="true" env PROGRAM="'$PROGRAM'" env SCRIPT_PID="'$SCRIPT_PID'" env TSTAMP="'$TSTAMP'" \
2016-12-28 23:28:47 +01:00
env dirToCreate="'$dirToCreate'" $COMMAND_SUDO' bash -s' << 'ENDSSH' > "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP" 2>&1 &
2019-08-09 10:13:59 +02:00
_REMOTE_TOKEN="(o_0)"
2016-12-27 12:53:35 +01:00
include #### DEBUG SUBSET ####
include #### TrapError SUBSET ####
include #### RemoteLogger SUBSET ####
if [ ! -d "$dirToCreate" ]; then
# No sudo, you should have all necessary rights
2016-12-28 23:25:11 +01:00
mkdir -p "$dirToCreate"
2017-01-02 17:08:39 +01:00
retval=$?
if [ $retval -ne 0 ]; then
2016-12-27 12:53:35 +01:00
RemoteLogger "Cannot create directory [$dirToCreate]" "CRITICAL"
2017-01-03 14:24:47 +01:00
exit $retval
2016-12-27 12:53:35 +01:00
fi
fi
2017-01-03 14:24:47 +01:00
exit 0
2016-12-27 12:53:35 +01:00
ENDSSH
2018-02-24 17:41:33 +01:00
ExecTasks $! "${FUNCNAME[0]}" false 0 0 720 1800 true $SLEEP_TIME $KEEP_LOGGING
2017-01-02 17:08:39 +01:00
retval=$?
if [ $retval -ne 0 ]; then
2020-05-03 10:05:27 +02:00
Logger "Truncated output:\n$(head -c16384 "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP")" "ERROR"
2017-01-02 17:08:39 +01:00
return $retval
2015-11-12 01:26:38 +01:00
fi
}
function CreateStorageDirectories {
2016-12-23 17:51:57 +01:00
__CheckArguments 0 $# "$@" #__WITH_PARANOIA_DEBUG
2015-11-12 01:26:38 +01:00
if [ "$BACKUP_TYPE" == "local" ] || [ "$BACKUP_TYPE" == "pull" ]; then
2019-02-08 13:22:37 +01:00
if [ "$SQL_BACKUP" != false ]; then
_CreateDirectoryLocal "$SQL_STORAGE"
2017-01-02 17:08:39 +01:00
if [ $? -ne 0 ]; then
2016-08-29 18:27:12 +02:00
CAN_BACKUP_SQL=false
2015-11-12 01:26:38 +01:00
fi
fi
2019-02-08 13:22:37 +01:00
if [ "$FILE_BACKUP" != false ]; then
_CreateDirectoryLocal "$FILE_STORAGE"
2017-01-02 17:08:39 +01:00
if [ $? -ne 0 ]; then
2016-08-29 18:27:12 +02:00
CAN_BACKUP_FILES=false
2015-11-12 01:26:38 +01:00
fi
fi
2019-02-08 13:22:37 +01:00
if [ "$ENCRYPTION" == true ]; then
2016-09-01 17:27:53 +02:00
_CreateDirectoryLocal "$CRYPT_STORAGE"
2017-01-02 17:08:39 +01:00
if [ $? -ne 0 ]; then
2016-09-01 17:27:53 +02:00
CAN_BACKUP_FILES=false
fi
fi
2015-11-12 01:26:38 +01:00
elif [ "$BACKUP_TYPE" == "push" ]; then
2019-02-08 13:22:37 +01:00
if [ "$SQL_BACKUP" != false ]; then
_CreateDirectoryRemote "$SQL_STORAGE"
2017-01-02 17:08:39 +01:00
if [ $? -ne 0 ]; then
2016-08-29 18:27:12 +02:00
CAN_BACKUP_SQL=false
2015-11-12 01:26:38 +01:00
fi
fi
2019-02-08 13:22:37 +01:00
if [ "$FILE_BACKUP" != false ]; then
_CreateDirectoryRemote "$FILE_STORAGE"
2017-01-02 17:08:39 +01:00
if [ $? -ne 0 ]; then
2016-08-29 18:27:12 +02:00
CAN_BACKUP_FILES=false
2015-11-12 01:26:38 +01:00
fi
fi
2019-02-08 13:22:37 +01:00
if [ "$ENCRYPTION" == true ]; then
2016-09-02 15:53:39 +02:00
_CreateDirectoryLocal "$CRYPT_STORAGE"
2017-01-02 17:08:39 +01:00
if [ $? -ne 0 ]; then
2016-09-02 15:53:39 +02:00
CAN_BACKUP_FILES=false
fi
fi
2015-11-12 01:26:38 +01:00
fi
}
function GetDiskSpaceLocal {
# GLOBAL VARIABLE DISK_SPACE to pass variable to parent function
# GLOBAL VARIABLE DRIVE to pass variable to parent function
2016-12-27 12:53:35 +01:00
local pathToCheck="${1}"
2017-01-02 17:08:39 +01:00
2016-12-23 17:51:57 +01:00
__CheckArguments 1 $# "$@" #__WITH_PARANOIA_DEBUG
2015-11-12 01:26:38 +01:00
2017-01-02 17:08:39 +01:00
local retval
2016-12-27 12:53:35 +01:00
if [ -d "$pathToCheck" ]; then
2015-11-12 01:26:38 +01:00
# Not elegant solution to make df silent on errors
# No sudo on local commands, assuming you should have all the necesarry rights to check backup directories sizes
2018-01-03 22:31:21 +01:00
$DF_CMD "$pathToCheck" > "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP" 2>&1 &
2018-02-24 17:41:33 +01:00
ExecTasks $! "${FUNCNAME[0]}" false 0 0 $SOFT_MAX_EXEC_TIME_TOTAL $HARD_MAX_EXEC_TIME_TOTAL true $SLEEP_TIME $KEEP_LOGGING
2017-01-02 17:08:39 +01:00
retval=$?
if [ $retval -ne 0 ]; then
2015-11-12 01:26:38 +01:00
DISK_SPACE=0
2016-12-27 12:53:35 +01:00
Logger "Cannot get disk space in [$pathToCheck] on local system." "ERROR"
2020-05-03 10:05:27 +02:00
Logger "Truncated output:\n$(head -c16384 "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP")" "ERROR"
2015-11-12 01:26:38 +01:00
else
2016-12-19 23:02:19 +01:00
DISK_SPACE=$(tail -1 "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP" | awk '{print $4}')
DRIVE=$(tail -1 "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP" | awk '{print $1}')
2020-05-03 10:05:27 +02:00
if [ $(IsInteger "$DISK_SPACE") -eq 0 ]; then
DISK_SPACE="$(HumanToNumeric "$DISK_SPACE")"
2016-10-23 13:27:02 +02:00
fi
2015-11-12 01:26:38 +01:00
fi
else
2016-12-27 12:53:35 +01:00
Logger "Storage path [$pathToCheck] does not exist." "CRITICAL"
2015-11-12 01:26:38 +01:00
return 1
fi
}
function GetDiskSpaceRemote {
# USE GLOBAL VARIABLE DISK_SPACE to pass variable to parent function
2016-12-27 12:53:35 +01:00
local pathToCheck="${1}"
2017-01-02 17:08:39 +01:00
2016-12-23 17:51:57 +01:00
__CheckArguments 1 $# "$@" #__WITH_PARANOIA_DEBUG
2015-11-12 01:26:38 +01:00
2016-02-19 22:14:13 +01:00
local cmd
2017-01-02 17:08:39 +01:00
local retval
2016-02-19 22:14:13 +01:00
$SSH_CMD env _REMOTE_TOKEN=$_REMOTE_TOKEN \
env _DEBUG="'$_DEBUG'" env _PARANOIA_DEBUG="'$_PARANOIA_DEBUG'" env _LOGGER_SILENT="'$_LOGGER_SILENT'" env _LOGGER_VERBOSE="'$_LOGGER_VERBOSE'" env _LOGGER_PREFIX="'$_LOGGER_PREFIX'" env _LOGGER_ERR_ONLY="'$_LOGGER_ERR_ONLY'" \
env _REMOTE_EXECUTION="true" env PROGRAM="'$PROGRAM'" env SCRIPT_PID="'$SCRIPT_PID'" env TSTAMP="'$TSTAMP'" \
2016-12-27 12:53:35 +01:00
env DF_CMD="'$DF_CMD'" \
env pathToCheck="'$pathToCheck'" $COMMAND_SUDO' bash -s' << 'ENDSSH' > "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP" 2> "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.error.$SCRIPT_PID.$TSTAMP" &
2019-08-09 10:13:59 +02:00
_REMOTE_TOKEN="(o_0)"
2016-12-27 12:53:35 +01:00
include #### DEBUG SUBSET ####
include #### TrapError SUBSET ####
include #### RemoteLogger SUBSET ####
function _GetDiskSpaceRemoteSub {
if [ -d "$pathToCheck" ]; then
# Not elegant solution to make df silent on errors
# No sudo on local commands, assuming you should have all the necesarry rights to check backup directories sizes
cmd="$DF_CMD \"$pathToCheck\""
2017-01-03 14:30:52 +01:00
eval $cmd
if [ $? != 0 ]; then
RemoteLogger "Error getting [$pathToCheck] size." "CRITICAL"
RemoteLogger "Command was [$cmd]." "WARN"
return 1
else
return 0
fi
2016-12-27 12:53:35 +01:00
else
RemoteLogger "Storage path [$pathToCheck] does not exist." "CRITICAL"
return 1
fi
}
_GetDiskSpaceRemoteSub
exit $?
ENDSSH
2018-02-24 17:41:33 +01:00
ExecTasks $! "${FUNCNAME[0]}" false 0 0 $SOFT_MAX_EXEC_TIME_TOTAL $HARD_MAX_EXEC_TIME_TOTAL true $SLEEP_TIME $KEEP_LOGGING
2017-01-02 17:08:39 +01:00
retval=$?
if [ $retval -ne 0 ]; then
2015-11-12 01:26:38 +01:00
DISK_SPACE=0
2016-12-27 12:53:35 +01:00
Logger "Cannot get disk space in [$pathToCheck] on remote system." "ERROR"
2020-05-03 10:05:27 +02:00
Logger "Truncated output:\n$(head -c16384 "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP")" "ERROR"
Logger "Truncated output:\n$(head -c16384 "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.error.$SCRIPT_PID.$TSTAMP")" "ERROR"
2017-01-02 17:08:39 +01:00
return $retval
2015-11-12 01:26:38 +01:00
else
2016-12-19 23:02:19 +01:00
DISK_SPACE=$(tail -1 "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP" | awk '{print $4}')
DRIVE=$(tail -1 "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP" | awk '{print $1}')
2020-05-03 10:05:27 +02:00
if [ $(IsInteger "$DISK_SPACE") -eq 0 ]; then
DISK_SPACE="$(HumanToNumeric "$DISK_SPACE")"
2016-10-23 13:27:02 +02:00
fi
2015-11-12 01:26:38 +01:00
fi
}
function CheckDiskSpace {
# USE OF GLOBAL VARIABLES TOTAL_DATABASES_SIZE, TOTAL_FILES_SIZE, BACKUP_SIZE_MINIMUM, STORAGE_WARN_SIZE, STORAGE_SPACE
2016-12-23 17:51:57 +01:00
__CheckArguments 0 $# "$@" #__WITH_PARANOIA_DEBUG
2015-11-12 01:26:38 +01:00
if [ "$BACKUP_TYPE" == "local" ] || [ "$BACKUP_TYPE" == "pull" ]; then
2019-02-08 13:22:37 +01:00
if [ "$SQL_BACKUP" != false ]; then
2015-11-12 01:26:38 +01:00
GetDiskSpaceLocal "$SQL_STORAGE"
2017-01-02 17:08:39 +01:00
if [ $? -ne 0 ]; then
2015-11-12 01:26:38 +01:00
SQL_DISK_SPACE=0
2016-08-29 18:27:12 +02:00
CAN_BACKUP_SQL=false
2015-11-12 01:26:38 +01:00
else
SQL_DISK_SPACE=$DISK_SPACE
SQL_DRIVE=$DRIVE
fi
fi
2019-02-08 13:22:37 +01:00
if [ "$FILE_BACKUP" != false ]; then
2015-11-12 01:26:38 +01:00
GetDiskSpaceLocal "$FILE_STORAGE"
2017-01-02 17:08:39 +01:00
if [ $? -ne 0 ]; then
2015-11-12 01:26:38 +01:00
FILE_DISK_SPACE=0
2016-08-29 18:27:12 +02:00
CAN_BACKUP_FILES=false
2015-11-12 01:26:38 +01:00
else
FILE_DISK_SPACE=$DISK_SPACE
FILE_DRIVE=$DRIVE
fi
fi
2019-02-08 13:22:37 +01:00
if [ "$ENCRYPTION" != false ]; then
2016-09-01 15:11:56 +02:00
GetDiskSpaceLocal "$CRYPT_STORAGE"
2017-01-02 17:08:39 +01:00
if [ $? -ne 0 ]; then
2016-09-01 15:11:56 +02:00
CRYPT_DISK_SPACE=0
CAN_BACKUP_FILES=false
CAN_BACKUP_SQL=false
else
CRYPT_DISK_SPACE=$DISK_SPACE
CRYPT_DRIVE=$DRIVE
fi
fi
2015-11-12 01:26:38 +01:00
elif [ "$BACKUP_TYPE" == "push" ]; then
2019-02-08 13:22:37 +01:00
if [ "$SQL_BACKUP" != false ]; then
2015-11-12 01:26:38 +01:00
GetDiskSpaceRemote "$SQL_STORAGE"
2017-01-02 17:08:39 +01:00
if [ $? -ne 0 ]; then
2015-11-12 01:26:38 +01:00
SQL_DISK_SPACE=0
else
SQL_DISK_SPACE=$DISK_SPACE
SQL_DRIVE=$DRIVE
fi
fi
2019-02-08 13:22:37 +01:00
if [ "$FILE_BACKUP" != false ]; then
2015-11-12 01:26:38 +01:00
GetDiskSpaceRemote "$FILE_STORAGE"
2017-01-02 17:08:39 +01:00
if [ $? -ne 0 ]; then
2015-11-12 01:26:38 +01:00
FILE_DISK_SPACE=0
else
FILE_DISK_SPACE=$DISK_SPACE
FILE_DRIVE=$DRIVE
fi
fi
2019-02-08 13:22:37 +01:00
if [ "$ENCRYPTION" != false ]; then
2016-09-02 15:53:39 +02:00
GetDiskSpaceLocal "$CRYPT_STORAGE"
2017-01-02 17:08:39 +01:00
if [ $? -ne 0 ]; then
2016-09-01 16:07:20 +02:00
CRYPT_DISK_SPACE=0
CAN_BACKUP_FILES=false
CAN_BACKUP_SQL=false
else
CRYPT_DISK_SPACE=$DISK_SPACE
CRYPT_DRIVE=$DRIVE
fi
fi
2015-11-12 01:26:38 +01:00
fi
if [ "$TOTAL_DATABASES_SIZE" == "" ]; then
TOTAL_DATABASES_SIZE=-1
fi
if [ "$TOTAL_FILES_SIZE" == "" ]; then
TOTAL_FILES_SIZE=-1
fi
2019-02-08 13:22:37 +01:00
if [ "$SQL_BACKUP" != false ] && [ $CAN_BACKUP_SQL == true ]; then
2015-11-12 01:26:38 +01:00
if [ $SQL_DISK_SPACE -eq 0 ]; then
Logger "Storage space in [$SQL_STORAGE] reported to be 0Ko." "WARN"
fi
if [ $SQL_DISK_SPACE -lt $TOTAL_DATABASES_SIZE ]; then
Logger "Disk space in [$SQL_STORAGE] may be insufficient to backup SQL ($SQL_DISK_SPACE Ko available in $SQL_DRIVE) (non compressed databases calculation)." "WARN"
fi
if [ $SQL_DISK_SPACE -lt $SQL_WARN_MIN_SPACE ]; then
Logger "Disk space in [$SQL_STORAGE] is lower than warning value [$SQL_WARN_MIN_SPACE Ko]." "WARN"
fi
Logger "SQL storage Space: $SQL_DISK_SPACE Ko - Databases size: $TOTAL_DATABASES_SIZE Ko" "NOTICE"
fi
2019-02-08 13:22:37 +01:00
if [ "$FILE_BACKUP" != false ] && [ $CAN_BACKUP_FILES == true ]; then
2015-11-12 01:26:38 +01:00
if [ $FILE_DISK_SPACE -eq 0 ]; then
Logger "Storage space in [$FILE_STORAGE] reported to be 0 Ko." "WARN"
fi
if [ $FILE_DISK_SPACE -lt $TOTAL_FILES_SIZE ]; then
Logger "Disk space in [$FILE_STORAGE] may be insufficient to backup files ($FILE_DISK_SPACE Ko available in $FILE_DRIVE)." "WARN"
fi
if [ $FILE_DISK_SPACE -lt $FILE_WARN_MIN_SPACE ]; then
Logger "Disk space in [$FILE_STORAGE] is lower than warning value [$FILE_WARN_MIN_SPACE Ko]." "WARN"
fi
Logger "File storage space: $FILE_DISK_SPACE Ko - Files size: $TOTAL_FILES_SIZE Ko" "NOTICE"
fi
2019-02-08 13:22:37 +01:00
if [ "$ENCRYPTION" == true ]; then
if [ "$SQL_BACKUP" != false ]; then
2016-09-01 15:11:56 +02:00
if [ "$SQL_DRIVE" == "$CRYPT_DRIVE" ]; then
if [ $((SQL_DISK_SPACE/2)) -lt $((TOTAL_DATABASES_SIZE)) ]; then
Logger "Disk space in [$SQL_STORAGE] and [$CRYPT_STORAGE] may be insufficient to backup SQL ($SQL_DISK_SPACE Ko available in $SQL_DRIVE) (non compressed databases calculation + crypt storage space)." "WARN"
fi
else
if [ $((CRYPT_DISK_SPACE)) -lt $((TOTAL_DATABASES_SIZE)) ]; then
2016-09-01 17:27:53 +02:00
Logger "Disk space in [$CRYPT_STORAGE] may be insufficient to encrypt SQL ($CRYPT_DISK_SPACE Ko available in $CRYPT_DRIVE) (non compressed databases calculation)." "WARN"
2016-09-01 15:11:56 +02:00
fi
fi
fi
2019-02-08 13:22:37 +01:00
if [ "$FILE_BACKUP" != false ]; then
2016-09-01 15:11:56 +02:00
if [ "$FILE_DRIVE" == "$CRYPT_DRIVE" ]; then
if [ $((FILE_DISK_SPACE/2)) -lt $((TOTAL_FILES_SIZE)) ]; then
2016-09-01 22:15:16 +02:00
Logger "Disk space in [$FILE_STORAGE] and [$CRYPT_STORAGE] may be insufficient to encrypt Sfiles ($FILE_DISK_SPACE Ko available in $FILE_DRIVE)." "WARN"
2016-09-01 15:11:56 +02:00
fi
else
if [ $((CRYPT_DISK_SPACE)) -lt $((TOTAL_FILES_SIZE)) ]; then
2016-09-01 17:27:53 +02:00
Logger "Disk space in [$CRYPT_STORAGE] may be insufficient to encrypt files ($CRYPT_DISK_SPACE Ko available in $CRYPT_DRIVE)." "WARN"
2016-09-01 15:11:56 +02:00
fi
fi
fi
Logger "Crypt storage space: $CRYPT_DISK_SPACE Ko" "NOTICE"
fi
2019-02-08 13:22:37 +01:00
if [ $BACKUP_SIZE_MINIMUM -gt $((TOTAL_DATABASES_SIZE+TOTAL_FILES_SIZE)) ] && [ "$GET_BACKUP_SIZE" != false ]; then
2015-11-12 01:26:38 +01:00
Logger "Backup size is smaller than expected." "WARN"
fi
}
function _BackupDatabaseLocalToLocal {
local database="${1}" # Database to backup
local exportOptions="${2}" # export options
local encrypt="${3:-false}" # Does the file need to be encrypted ?
2015-11-12 01:26:38 +01:00
local encryptOptions
local drySqlCmd
local sqlCmd
2016-07-19 12:58:05 +02:00
local retval
2016-02-19 22:14:13 +01:00
2016-12-23 17:51:57 +01:00
__CheckArguments 3 $# "$@" #__WITH_PARANOIA_DEBUG
if [ $encrypt == true ]; then
encryptOptions="| $CRYPT_TOOL --encrypt --recipient=\"$GPG_RECIPIENT\""
encryptExtension="$CRYPT_FILE_EXTENSION"
fi
2015-11-12 01:26:38 +01:00
2020-05-03 10:14:59 +02:00
local drySqlCmd="mysqldump -u $SQL_USER $exportOptions --databases $database $COMPRESSION_PROGRAM $COMPRESSION_OPTIONS $encryptOptions > /dev/null 2> \"$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.error.$SCRIPT_PID.$TSTAMP\""
local sqlCmd="mysqldump -u $SQL_USER $exportOptions --databases $database $COMPRESSION_PROGRAM $COMPRESSION_OPTIONS $encryptOptions > \"$SQL_STORAGE/$database.sql$COMPRESSION_EXTENSION$encryptExtension\" 2> \"$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.error.$SCRIPT_PID.$TSTAMP\""
2015-11-12 01:26:38 +01:00
2016-08-29 18:27:12 +02:00
if [ $_DRYRUN == false ]; then
2017-01-03 13:01:18 +01:00
Logger "Launching command [$sqlCmd]." "DEBUG"
eval "$sqlCmd" &
2015-11-12 01:26:38 +01:00
else
2017-01-03 13:01:18 +01:00
Logger "Launching command [$drySqlCmd]." "DEBUG"
eval "$drySqlCmd" &
2015-11-12 01:26:38 +01:00
fi
2018-03-15 20:14:18 +01:00
ExecTasks $! "${FUNCNAME[0]}" false 0 0 $SOFT_MAX_EXEC_TIME_DB_TASK $HARD_MAX_EXEC_TIME_DB_TASK true $SLEEP_TIME $KEEP_LOGGING
2016-07-19 12:58:05 +02:00
retval=$?
2016-12-19 23:02:19 +01:00
if [ -s "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.error.$SCRIPT_PID.$TSTAMP" ]; then
2017-01-03 13:01:18 +01:00
if [ $_DRYRUN == false ]; then
_LOGGER_SILENT=true Logger "Command was [$sqlCmd]." "WARN"
2017-01-03 13:01:18 +01:00
else
_LOGGER_SILENT=true Logger "Command was [$drySqlCmd]." "WARN"
2017-01-03 13:01:18 +01:00
fi
2020-05-03 10:05:27 +02:00
Logger "Truncated error output:\n$(head -c16384 "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.error.$SCRIPT_PID.$TSTAMP")" "ERROR"
# Dirty fix for mysqldump return code not honored
retval=1
2015-11-12 01:26:38 +01:00
fi
return $retval
}
function _BackupDatabaseLocalToRemote {
local database="${1}" # Database to backup
local exportOptions="${2}" # export options
local encrypt="${3:-false}" # Does the file need to be encrypted
2015-11-12 01:26:38 +01:00
2016-12-23 17:51:57 +01:00
__CheckArguments 3 $# "$@" #__WITH_PARANOIA_DEBUG
2016-02-19 22:14:13 +01:00
local encryptOptions
local encryptExtension
local drySqlCmd
local sqlCmd
2016-07-19 12:58:05 +02:00
local retval
2015-11-12 01:26:38 +01:00
CheckConnectivity3rdPartyHosts
CheckConnectivityRemoteHost
if [ $encrypt == true ]; then
encryptOptions="| $CRYPT_TOOL --encrypt --recipient=\"$GPG_RECIPIENT\""
encryptExtension="$CRYPT_FILE_EXTENSION"
fi
2020-05-03 10:14:59 +02:00
local drySqlCmd="mysqldump -u $SQL_USER $exportOptions --databases $database $COMPRESSION_PROGRAM $COMPRESSION_OPTIONS $encryptOptions > /dev/null 2> \"$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.error.$SCRIPT_PID.$TSTAMP\""
local sqlCmd="mysqldump -u $SQL_USER $exportOptions --databases $database $COMPRESSION_PROGRAM $COMPRESSION_OPTIONS $encryptOptions | $SSH_CMD 'env _REMOTE_TOKEN=$_REMOTE_TOKEN $COMMAND_SUDO tee \"$SQL_STORAGE/$database.sql$COMPRESSION_EXTENSION$encryptExtension\" > /dev/null' 2> \"$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.error.$SCRIPT_PID.$TSTAMP\""
2015-11-12 01:26:38 +01:00
2016-08-29 18:27:12 +02:00
if [ $_DRYRUN == false ]; then
2017-01-03 13:01:18 +01:00
Logger "Launching command [$sqlCmd]." "DEBUG"
eval "$sqlCmd" &
2015-11-12 01:26:38 +01:00
else
2017-01-03 13:01:18 +01:00
Logger "Launching command [$drySqlCmd]." "DEBUG"
eval "$drySqlCmd" &
2015-11-12 01:26:38 +01:00
fi
2018-03-15 20:14:18 +01:00
ExecTasks $! "${FUNCNAME[0]}" false 0 0 $SOFT_MAX_EXEC_TIME_DB_TASK $HARD_MAX_EXEC_TIME_DB_TASK true $SLEEP_TIME $KEEP_LOGGING
2016-07-19 12:58:05 +02:00
retval=$?
2016-12-19 23:02:19 +01:00
if [ -s "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.error.$SCRIPT_PID.$TSTAMP" ]; then
2017-01-03 13:01:18 +01:00
if [ $_DRYRUN == false ]; then
_LOGGER_SILENT=true Logger "Command was [$sqlCmd]." "WARN"
2017-01-03 13:01:18 +01:00
else
_LOGGER_SILENT=true Logger "Command was [$drySqlCmd]." "WARN"
2017-01-03 13:01:18 +01:00
fi
2020-05-03 10:05:27 +02:00
Logger "Truncated error output:\n$(head -c16384 "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.error.$SCRIPT_PID.$TSTAMP")" "ERROR"
# Dirty fix for mysqldump return code not honored
retval=1
2015-11-12 01:26:38 +01:00
fi
return $retval
}
function _BackupDatabaseRemoteToLocal {
local database="${1}" # Database to backup
local exportOptions="${2}" # export options
local encrypt="${3:-false}" # Does the file need to be encrypted ?
2015-11-12 01:26:38 +01:00
__CheckArguments 3 $# "$@" #__WITH_PARANOIA_DEBUG
2016-02-19 22:14:13 +01:00
local encryptOptions
local encryptExtension
local drySqlCmd
local sqlCmd
2016-02-19 22:14:13 +01:00
local retval
2015-11-12 01:26:38 +01:00
CheckConnectivity3rdPartyHosts
CheckConnectivityRemoteHost
if [ $encrypt == true ]; then
2016-09-01 22:15:16 +02:00
encryptOptions="| $CRYPT_TOOL --encrypt --recipient=\\\"$GPG_RECIPIENT\\\""
encryptExtension="$CRYPT_FILE_EXTENSION"
fi
local drySqlCmd=$SSH_CMD' "env _REMOTE_TOKEN=$_REMOTE_TOKEN mysqldump -u '$SQL_USER' '$exportOptions' --databases '$database' '$COMPRESSION_PROGRAM' '$COMPRESSION_OPTIONS' '$encryptOptions'" > /dev/null 2> "'$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.error.$SCRIPT_PID.$TSTAMP'"'
local sqlCmd=$SSH_CMD' "env _REMOTE_TOKEN=$_REMOTE_TOKEN mysqldump -u '$SQL_USER' '$exportOptions' --databases '$database' '$COMPRESSION_PROGRAM' '$COMPRESSION_OPTIONS' '$encryptOptions'" > "'$SQL_STORAGE/$database.sql$COMPRESSION_EXTENSION$encryptExtension'" 2> "'$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.error.$SCRIPT_PID.$TSTAMP'"'
2015-11-12 01:26:38 +01:00
2016-08-29 18:27:12 +02:00
if [ $_DRYRUN == false ]; then
2017-01-03 13:01:18 +01:00
Logger "Launching command [$sqlCmd]." "DEBUG"
eval "$sqlCmd" &
2015-11-12 01:26:38 +01:00
else
2017-01-03 13:01:18 +01:00
Logger "Launching command [$drySqlCmd]." "DEBUG"
eval "$drySqlCmd" &
2015-11-12 01:26:38 +01:00
fi
2018-03-15 20:14:18 +01:00
ExecTasks $! "${FUNCNAME[0]}" false 0 0 $SOFT_MAX_EXEC_TIME_DB_TASK $HARD_MAX_EXEC_TIME_DB_TASK true $SLEEP_TIME $KEEP_LOGGING
2016-02-19 22:14:13 +01:00
retval=$?
2016-12-19 23:02:19 +01:00
if [ -s "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.error.$SCRIPT_PID.$TSTAMP" ]; then
2017-01-03 13:01:18 +01:00
if [ $_DRYRUN == false ]; then
_LOGGER_SILENT=true Logger "Command was [$sqlCmd]." "WARN"
2017-01-03 13:01:18 +01:00
else
_LOGGER_SILENT=true Logger "Command was [$drySqlCmd]." "WARN"
2017-01-03 13:01:18 +01:00
fi
2020-05-03 10:05:27 +02:00
Logger "Truncated error output:\n$(head -c16384 "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.error.$SCRIPT_PID.$TSTAMP")" "ERROR"
# Dirty fix for mysqldump return code not honored
retval=1
2015-11-12 01:26:38 +01:00
fi
return $retval
}
function BackupDatabase {
local database="${1}"
2016-12-23 17:51:57 +01:00
__CheckArguments 1 $# "$@" #__WITH_PARANOIA_DEBUG
2016-02-19 22:14:13 +01:00
local mysqlOptions
local encrypt=false
2015-11-12 01:26:38 +01:00
# Hack to prevent warning on table mysql.events, some mysql versions don't support --skip-events, prefer using --ignore-table
if [ "$database" == "mysql" ]; then
mysqlOptions="$MYSQLDUMP_OPTIONS --ignore-table=mysql.event"
2015-11-12 01:26:38 +01:00
else
mysqlOptions="$MYSQLDUMP_OPTIONS"
fi
2019-02-08 13:22:37 +01:00
if [ "$ENCRYPTION" == true ]; then
encrypt=true
2016-09-01 15:50:29 +02:00
Logger "Backing up encrypted database [$database]." "NOTICE"
else
Logger "Backing up database [$database]." "NOTICE"
2015-11-12 01:26:38 +01:00
fi
if [ "$BACKUP_TYPE" == "local" ]; then
_BackupDatabaseLocalToLocal "$database" "$mysqlOptions" $encrypt
2015-11-12 01:26:38 +01:00
elif [ "$BACKUP_TYPE" == "pull" ]; then
_BackupDatabaseRemoteToLocal "$database" "$mysqlOptions" $encrypt
2015-11-12 01:26:38 +01:00
elif [ "$BACKUP_TYPE" == "push" ]; then
_BackupDatabaseLocalToRemote "$database" "$mysqlOptions" $encrypt
2015-11-12 01:26:38 +01:00
fi
if [ $? -ne 0 ]; then
Logger "Backup failed." "ERROR"
else
Logger "Backup succeeded." "NOTICE"
fi
}
function BackupDatabases {
2016-12-23 17:51:57 +01:00
__CheckArguments 0 $# "$@" #__WITH_PARANOIA_DEBUG
2015-11-12 01:26:38 +01:00
local database
for database in $SQL_BACKUP_TASKS
do
BackupDatabase $database
2015-11-12 01:26:38 +01:00
CheckTotalExecutionTime
done
}
function EncryptFiles {
local filePath="${1}" # Path of files to encrypt
2016-09-02 12:16:25 +02:00
local destPath="${2}" # Path to store encrypted files
local recipient="${3}" # GPG recipient
local recursive="${4:-true}" # Is recursive ?
2016-09-02 12:16:25 +02:00
local keepFullPath="${5:-false}" # Should destpath become destpath + sourcepath ?
2016-12-23 17:51:57 +01:00
__CheckArguments 5 $# "$@" #__WITH_PARANOIA_DEBUG
local successCounter=0
local errorCounter=0
local cryptFileExtension="$CRYPT_FILE_EXTENSION"
local recursiveArgs=""
if [ ! -d "$destPath" ]; then
mkdir -p "$destPath"
if [ $? -ne 0 ]; then
Logger "Cannot create crypt storage path [$destPath]." "ERROR"
return 1
fi
fi
2016-09-02 12:16:25 +02:00
if [ ! -w "$destPath" ]; then
Logger "Cannot write to crypt storage path [$destPath]." "ERROR"
return 1
fi
if [ $recursive == false ]; then
recursiveArgs="-mindepth 1 -maxdepth 1"
fi
2017-01-02 14:08:21 +01:00
Logger "Encrypting files in [$filePath]." "NOTICE"
while IFS= read -r -d $'\0' sourceFile; do
2016-09-02 12:16:25 +02:00
# Get path of sourcefile
path="$(dirname "$sourceFile")"
if [ $keepFullPath == false ]; then
# Remove source path part
path="${path#$filePath}"
fi
# Remove ending slash if there is one
path="${path%/}"
2016-09-02 12:16:25 +02:00
# Add new path
path="$destPath/$path"
# Get filename
file="$(basename "$sourceFile")"
if [ ! -d "$path" ]; then
mkdir -p "$path"
fi
2017-01-02 14:08:21 +01:00
Logger "Encrypting file [$sourceFile] to [$path/$file$cryptFileExtension]." "VERBOSE"
2020-05-03 10:05:27 +02:00
if [ $(IsNumeric "$PARALLEL_ENCRYPTION_PROCESSES") -eq 1 ] && [ "$PARALLEL_ENCRYPTION_PROCESSES" != "1" ]; then
2017-01-02 13:15:33 +01:00
echo "$CRYPT_TOOL --batch --yes --out \"$path/$file$cryptFileExtension\" --recipient=\"$recipient\" --encrypt \"$sourceFile\" >> \"$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP\" 2>&1" >> "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.parallel.$SCRIPT_PID.$TSTAMP"
else
2017-01-02 13:15:33 +01:00
$CRYPT_TOOL --batch --yes --out "$path/$file$cryptFileExtension" --recipient="$recipient" --encrypt "$sourceFile" > "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP" 2>&1
2017-01-02 17:08:39 +01:00
if [ $? -ne 0 ]; then
2017-01-02 13:15:33 +01:00
Logger "Cannot encrypt [$sourceFile]." "ERROR"
2020-05-03 10:05:27 +02:00
Logger "Truncated output:\n$(head -c16384 "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP")" "DEBUG"
2017-01-02 13:15:33 +01:00
errorCounter=$((errorCounter+1))
else
successCounter=$((successCounter+1))
fi
fi
2018-06-04 14:14:24 +02:00
#TODO: This redirection does not work with busybox since there is no subshell support
2016-12-27 12:53:35 +01:00
done < <($FIND_CMD "$filePath" $recursiveArgs -type f ! -name "*$cryptFileExtension" -print0)
2020-05-03 10:05:27 +02:00
if [ $(IsNumeric "$PARALLEL_ENCRYPTION_PROCESSES") -eq 1 ] && [ "$PARALLEL_ENCRYPTION_PROCESSES" != "1" ]; then
2017-01-02 14:08:21 +01:00
# Handle batch mode where SOFT /HARD MAX EXEC TIME TOTAL is not defined
2020-05-03 10:05:27 +02:00
if [ $(IsNumeric "$SOFT_MAX_EXEC_TIME_TOTAL") -eq 1 ]; then
softMaxExecTime="$SOFT_MAX_EXEC_TIME_TOTAL"
2017-01-02 14:08:21 +01:00
else
softMaxExecTime=0
fi
2020-05-03 10:05:27 +02:00
if [ $(IsNumeric "$HARD_MAX_EXEC_TIME_TOTAL") -eq 1 ]; then
hardMaxExecTime="$HARD_MAX_EXEC_TIME_TOTAL"
2017-01-02 14:08:21 +01:00
else
hardMaxExecTime=0
fi
2018-02-24 17:41:33 +01:00
ExecTasks $! "${FUNCNAME[0]}" false 0 0 $SOFT_MAX_EXEC_TIME_TOTAL $HARD_MAX_EXEC_TIME_TOTAL true $SLEEP_TIME $KEEP_LOGGING true false false $PARALLEL_ENCRYPTION_PROCESSES "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.parallel.$SCRIPT_PID.$TSTAMP"
2017-01-02 13:15:33 +01:00
retval=$?
2017-01-02 17:08:39 +01:00
if [ $retval -ne 0 ]; then
2017-01-09 12:30:38 +01:00
Logger "Encryption error." "ERROR"
2017-01-02 14:08:21 +01:00
# Output file is defined in ParallelExec
2020-05-03 10:05:27 +02:00
Logger "Truncated output:\n$(head -c16384 "$RUN_DIR/$PROGRAM.ExecTasks.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP")" "DEBUG"
2017-01-02 13:15:33 +01:00
fi
2017-01-02 14:08:21 +01:00
successCounter=$(($(wc -l < "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.parallel.$SCRIPT_PID.$TSTAMP") - retval))
2017-01-02 13:15:33 +01:00
errorCounter=$retval
fi
2016-12-27 12:53:35 +01:00
if [ $successCounter -gt 0 ]; then
Logger "Encrypted [$successCounter] files successfully." "NOTICE"
elif [ $successCounter -eq 0 ] && [ $errorCounter -eq 0 ]; then
Logger "There were no files to encrypt." "WARN"
fi
2017-01-02 13:15:33 +01:00
if [ $errorCounter -gt 0 ]; then
2016-09-01 15:50:29 +02:00
Logger "Failed to encrypt [$errorCounter] files." "CRITICAL"
fi
return $errorCounter
}
2016-08-31 23:32:21 +02:00
function DecryptFiles {
local filePath="${1}" # Path to files to decrypt
local passphraseFile="${2}" # Passphrase file to decrypt files
local passphrase="${3}" # Passphrase to decrypt files
2016-12-23 17:51:57 +01:00
__CheckArguments 3 $# "$@" #__WITH_PARANOIA_DEBUG
2016-08-31 23:32:21 +02:00
local options
2016-08-31 23:32:21 +02:00
local secret
local successCounter=0
local errorCounter=0
2016-12-29 00:44:33 +01:00
local cryptToolVersion
local cryptToolMajorVersion
local cryptToolSubVersion
local cryptFileExtension="$CRYPT_FILE_EXTENSION"
2016-08-31 23:32:21 +02:00
2016-12-31 12:20:50 +01:00
local retval
2016-08-31 23:32:21 +02:00
if [ ! -w "$filePath" ]; then
2016-12-31 12:20:50 +01:00
Logger "Path [$filePath] is not writable or does not exist. Cannot decrypt files." "CRITICAL"
2016-08-31 23:32:21 +02:00
exit 1
fi
2016-12-29 00:44:33 +01:00
# Detect if GnuPG >= 2.1 that does not allow automatic pin entry anymore
2020-05-03 10:05:27 +02:00
cryptToolVersion=$("$CRYPT_TOOL" --version | head -1 | awk '{print $3}')
2016-12-29 00:47:48 +01:00
cryptToolMajorVersion=${cryptToolVersion%%.*}
2016-12-29 00:44:33 +01:00
cryptToolSubVersion=${cryptToolVersion#*.}
cryptToolSubVersion=${cryptToolSubVersion%.*}
2016-12-29 00:47:48 +01:00
if [ $cryptToolMajorVersion -eq 2 ] && [ $cryptToolSubVersion -ge 1 ]; then
2020-05-04 12:35:16 +02:00
if [ $cryptToolMinorVersion -gt 11 ]; then
additionalParameters="--pinentry-mode loopback"
elif [ $cryptToolMinorVersion -eq 11 ]; then
Logger "GPG automatism via --pinentry-mode loopback not supported in gpg version 2.1.11. Please add allow-loopback-pinentry to your gpg-agent.conf file." "NOTICE"
fi
2016-12-29 00:44:33 +01:00
fi
if [ -f "$passphraseFile" ]; then
secret="--passphrase-file $passphraseFile"
2016-08-31 23:32:21 +02:00
elif [ "$passphrase" != "" ]; then
secret="--passphrase $passphrase"
else
2016-09-04 21:51:26 +02:00
Logger "The given passphrase file or passphrase are inexistent." "CRITICAL"
2016-08-31 23:32:21 +02:00
exit 1
fi
if [ "$CRYPT_TOOL" == "gpg2" ]; then
options="--batch --yes"
elif [ "$CRYPT_TOOL" == "gpg" ]; then
options="--no-use-agent --batch"
fi
while IFS= read -r -d $'\0' encryptedFile; do
2016-08-31 23:32:21 +02:00
Logger "Decrypting [$encryptedFile]." "VERBOSE"
2017-01-02 14:08:21 +01:00
2020-05-03 10:05:27 +02:00
if [ $(IsNumeric "$PARALLEL_ENCRYPTION_PROCESSES") -eq 1 ] && [ "$PARALLEL_ENCRYPTION_PROCESSES" != "1" ]; then
2017-01-02 14:08:21 +01:00
echo "$CRYPT_TOOL $options --out \"${encryptedFile%%$cryptFileExtension}\" $additionalParameters $secret --decrypt \"$encryptedFile\" >> \"$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP\" 2>&1" >> "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.parallel.$SCRIPT_PID.$TSTAMP"
else
2017-01-02 16:47:07 +01:00
$CRYPT_TOOL $options --out "${encryptedFile%%$cryptFileExtension}" $additionalParameters $secret --decrypt "$encryptedFile" > "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP" 2>&1
retval=$?
2017-01-02 17:08:39 +01:00
if [ $retval -ne 0 ]; then
2017-01-02 16:47:07 +01:00
Logger "Cannot decrypt [$encryptedFile]." "ERROR"
2020-05-03 10:05:27 +02:00
Logger "Truncated output\n$(head -c16384 "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP")" "NOTICE"
2017-01-02 16:47:07 +01:00
errorCounter=$((errorCounter+1))
else
successCounter=$((successCounter+1))
rm -f "$encryptedFile"
2017-01-02 17:08:39 +01:00
if [ $? -ne 0 ]; then
2017-01-02 16:47:07 +01:00
Logger "Cannot delete original file [$encryptedFile] after decryption." "ERROR"
fi
2016-08-31 23:32:21 +02:00
fi
fi
2016-12-27 12:53:35 +01:00
done < <($FIND_CMD "$filePath" -type f -name "*$cryptFileExtension" -print0)
2020-05-03 10:05:27 +02:00
if [ $(IsNumeric "$PARALLEL_ENCRYPTION_PROCESSES") -eq 1 ] && [ "$PARALLEL_ENCRYPTION_PROCESSES" != "1" ]; then
2017-01-02 14:08:21 +01:00
# Handle batch mode where SOFT /HARD MAX EXEC TIME TOTAL is not defined
2020-05-03 10:05:27 +02:00
if [ $(IsNumeric "$SOFT_MAX_EXEC_TIME_TOTAL") -eq 1 ]; then
2017-01-02 14:08:21 +01:00
softMaxExecTime=$SOFT_MAX_EXEC_TIME_TOTAL
else
softMaxExecTime=0
fi
2020-05-03 10:05:27 +02:00
if [ $(IsNumeric "$HARD_MAX_EXEC_TIME_TOTAL") -eq 1 ]; then
2017-01-02 14:08:21 +01:00
hardMaxExecTime=$HARD_MAX_EXEC_TIME_TOTAL
else
hardMaxExecTime=0
fi
2018-02-24 17:41:33 +01:00
ExecTasks "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.parallel.$SCRIPT_PID.$TSTAMP" "${FUNCNAME[0]}" true 0 0 $softMaxExecTime $hardMaxExecTime true $SLEEP_TIME $KEEP_LOGGING true false $PARALLEL_ENCRYPTION_PROCESSES
2017-01-02 14:08:21 +01:00
retval=$?
2017-01-02 17:08:39 +01:00
if [ $retval -ne 0 ]; then
2017-01-02 14:08:21 +01:00
Logger "Decrypting error.." "ERROR"
# Output file is defined in ParallelExec
2020-05-03 10:05:27 +02:00
Logger "Truncated output:\n$(head -c16384 "$RUN_DIR/$PROGRAM.ParallelExec.EncryptFiles.$SCRIPT_PID.$TSTAMP")" "DEBUG"
2017-01-02 14:08:21 +01:00
fi
successCounter=$(($(wc -l < "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.parallel.$SCRIPT_PID.$TSTAMP") - retval))
errorCounter=$retval
fi
2016-12-27 12:53:35 +01:00
if [ $successCounter -gt 0 ]; then
Logger "Decrypted [$successCounter] files successfully." "NOTICE"
elif [ $successCounter -eq 0 ] && [ $errorCounter -eq 0 ]; then
Logger "There were no files to decrypt." "WARN"
fi
2016-09-01 15:50:29 +02:00
if [ $errorCounter -gt 0 ]; then
Logger "Failed to decrypt [$errorCounter] files." "CRITICAL"
fi
return $errorCounter
2016-08-31 23:32:21 +02:00
}
2015-11-12 01:26:38 +01:00
function Rsync {
local sourceDir="${1}" # Source directory
local destinationDir="${2}" # Destination directory
local recursive="${3:-true}" # Backup only files at toplevel of directory
2015-11-12 01:26:38 +01:00
2017-01-03 12:32:24 +01:00
__CheckArguments 3 $# "$@" #__WITH_PARANOIA_DEBUG
2016-02-19 22:14:13 +01:00
2016-09-01 15:50:29 +02:00
local rsyncCmd
2016-09-01 16:07:20 +02:00
local retval
2015-11-12 01:26:38 +01:00
2018-09-30 13:55:34 +02:00
local rsyncArgs
2015-11-12 01:26:38 +01:00
## Manage to backup recursive directories lists files only (not recursing into subdirectories)
2016-09-01 17:27:53 +02:00
if [ $recursive == false ]; then
2018-09-30 13:55:34 +02:00
# Fixes symlinks to directories in target cannot be deleted when backing up root directory without recursion
2018-11-05 21:04:20 +01:00
rsyncArgs="$RSYNC_DEFAULT_ARGS -f '- /*/*/'"
2015-11-12 01:26:38 +01:00
else
2018-09-30 13:55:34 +02:00
rsyncArgs="$RSYNC_DEFAULT_ARGS"
2015-11-12 01:26:38 +01:00
fi
# Creating subdirectories because rsync cannot handle multiple subdirectory creation
2015-11-12 01:26:38 +01:00
if [ "$BACKUP_TYPE" == "local" ]; then
_CreateDirectoryLocal "$destinationDir"
2019-05-21 12:03:35 +02:00
rsyncCmd="$(type -p $RSYNC_EXECUTABLE) $rsyncArgs $RSYNC_DRY_ARG $RSYNC_ATTR_ARGS $RSYNC_TYPE_ARGS $RSYNC_NO_RECURSE_ARGS $RSYNC_DELETE $RSYNC_PATTERNS $RSYNC_PARTIAL_EXCLUDE --rsync-path=\"$RSYNC_PATH\" \"$sourceDir\" \"$destinationDir\" > \"$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP\" 2>&1"
2015-11-12 01:26:38 +01:00
elif [ "$BACKUP_TYPE" == "pull" ]; then
_CreateDirectoryLocal "$destinationDir"
2015-11-12 01:26:38 +01:00
CheckConnectivity3rdPartyHosts
CheckConnectivityRemoteHost
rsyncCmd="$(type -p $RSYNC_EXECUTABLE) $rsyncArgs $RSYNC_DRY_ARG $RSYNC_ATTR_ARGS $RSYNC_TYPE_ARGS $RSYNC_NO_RECURSE_ARGS $RSYNC_DELETE $RSYNC_PATTERNS $RSYNC_PARTIAL_EXCLUDE --rsync-path=\"env _REMOTE_TOKEN=$_REMOTE_TOKEN $RSYNC_PATH\" -e \"$RSYNC_SSH_CMD\" \"$REMOTE_USER@$REMOTE_HOST:'$sourceDir'\" \"$destinationDir\" > \"$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP\" 2>&1"
2015-11-12 01:26:38 +01:00
elif [ "$BACKUP_TYPE" == "push" ]; then
_CreateDirectoryRemote "$destinationDir"
2016-08-31 23:32:21 +02:00
CheckConnectivity3rdPartyHosts
CheckConnectivityRemoteHost
rsyncCmd="$(type -p $RSYNC_EXECUTABLE) $rsyncArgs $RSYNC_DRY_ARG $RSYNC_ATTR_ARGS $RSYNC_TYPE_ARGS $RSYNC_NO_RECURSE_ARGS $RSYNC_DELETE $RSYNC_PATTERNS $RSYNC_PARTIAL_EXCLUDE --rsync-path=\"env _REMOTE_TOKEN=$_REMOTE_TOKEN $RSYNC_PATH\" -e \"$RSYNC_SSH_CMD\" \"$sourceDir\" \"$REMOTE_USER@$REMOTE_HOST:'$destinationDir'\" > \"$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP\" 2>&1"
2015-11-12 01:26:38 +01:00
fi
2017-01-03 13:01:18 +01:00
Logger "Launching command [$rsyncCmd]." "DEBUG"
2016-09-01 15:50:29 +02:00
eval "$rsyncCmd" &
2018-02-24 17:41:33 +01:00
ExecTasks $! "${FUNCNAME[0]}" false 0 0 $SOFT_MAX_EXEC_TIME_FILE_TASK $HARD_MAX_EXEC_TIME_FILE_TASK true $SLEEP_TIME $KEEP_LOGGING
2016-09-01 16:07:20 +02:00
retval=$?
2017-01-02 17:08:39 +01:00
if [ $retval -ne 0 ]; then
Logger "Failed to backup [$sourceDir] to [$destinationDir]." "ERROR"
_LOGGER_SILENT=true Logger "Command was [$rsyncCmd]." "WARN"
2020-05-03 10:05:27 +02:00
Logger "Truncated output:\n$(head -c16384 "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP")" "ERROR"
2015-11-12 01:26:38 +01:00
else
Logger "Truncated output:\n$(head -c16384 "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP")" "VERBOSE"
2015-11-12 01:26:38 +01:00
Logger "File backup succeed." "NOTICE"
fi
2016-09-01 16:07:20 +02:00
return $retval
2015-11-12 01:26:38 +01:00
}
function FilesBackup {
2016-12-23 17:51:57 +01:00
__CheckArguments 0 $# "$@" #__WITH_PARANOIA_DEBUG
2015-11-12 01:26:38 +01:00
2016-08-06 14:02:52 +02:00
local backupTask
local backupTasks
local destinationDir
2018-11-05 21:43:40 +01:00
local encryptDir
2016-08-06 14:02:52 +02:00
2016-08-08 18:43:35 +02:00
IFS=$PATH_SEPARATOR_CHAR read -r -a backupTasks <<< "$FILE_BACKUP_TASKS"
2016-08-06 14:02:52 +02:00
for backupTask in "${backupTasks[@]}"; do
2017-01-02 13:15:33 +01:00
# Backup directories from simple list
2019-02-08 13:22:37 +01:00
if [ "$KEEP_ABSOLUTE_PATHS" != false ]; then
# Fix for backup of '/'
2018-07-30 16:28:12 +02:00
if [ "${backupTask#/}/" == "/" ]; then
2018-07-30 16:38:59 +02:00
destinationDir="$FILE_STORAGE/"
else
2018-07-30 16:28:12 +02:00
destinationDir=$(dirname "$FILE_STORAGE/${backupTask#/}/")
fi
2018-11-05 21:43:40 +01:00
encryptDir="$FILE_STORAGE/${backupTask#/}"
else
destinationDir="$FILE_STORAGE"
encryptDir="$FILE_STORAGE"
fi
2018-09-12 20:55:45 +02:00
Logger "Beginning file backup of [$backupTask] to [$destinationDir] as $BACKUP_TYPE backup." "NOTICE"
2019-02-08 13:22:37 +01:00
if [ "$ENCRYPTION" == true ] && ([ "$BACKUP_TYPE" == "local" ] || [ "$BACKUP_TYPE" == "push" ]); then
2016-09-02 12:16:25 +02:00
EncryptFiles "$backupTask" "$CRYPT_STORAGE" "$GPG_RECIPIENT" true true
2017-01-02 17:08:39 +01:00
if [ $? -eq 0 ]; then
Rsync "$CRYPT_STORAGE/$backupTask" "$destinationDir" true
else
Logger "backup failed." "ERROR"
fi
2019-02-08 13:22:37 +01:00
elif [ "$ENCRYPTION" == true ] && [ "$BACKUP_TYPE" == "pull" ]; then
Rsync "$backupTask" "$destinationDir" true
2017-01-02 17:08:39 +01:00
if [ $? -eq 0 ]; then
EncryptFiles "$encryptDir" "$CRYPT_STORAGE/$backupTask" "$GPG_RECIPIENT" true false
2016-09-01 16:07:20 +02:00
fi
else
Rsync "$backupTask" "$destinationDir" true
2015-11-12 01:26:38 +01:00
fi
CheckTotalExecutionTime
done
2016-08-08 18:43:35 +02:00
IFS=$PATH_SEPARATOR_CHAR read -r -a backupTasks <<< "$RECURSIVE_DIRECTORY_LIST"
2016-08-06 14:02:52 +02:00
for backupTask in "${backupTasks[@]}"; do
2018-11-05 21:04:20 +01:00
# Backup recursive directories without recursion
2019-02-08 13:22:37 +01:00
if [ "$KEEP_ABSOLUTE_PATHS" != false ]; then
# Fix for backup of '/'
2018-07-30 16:28:12 +02:00
if [ "${backupTask#/}/" == "/" ]; then
2018-07-30 16:38:59 +02:00
destinationDir="$FILE_STORAGE/"
else
2018-07-30 16:28:12 +02:00
destinationDir=$(dirname "$FILE_STORAGE/${backupTask#/}/")
fi
encryptDir="$FILE_STORAGE/${backupTask#/}"
else
destinationDir="$FILE_STORAGE"
encryptDir="$FILE_STORAGE"
fi
2018-09-30 16:16:57 +02:00
Logger "Beginning non recursive file backup of [$backupTask] to [$destinationDir] as $BACKUP_TYPE backup." "NOTICE"
2019-02-08 13:22:37 +01:00
if [ "$ENCRYPTION" == true ] && ([ "$BACKUP_TYPE" == "local" ] || [ "$BACKUP_TYPE" == "push" ]); then
2016-09-02 12:16:25 +02:00
EncryptFiles "$backupTask" "$CRYPT_STORAGE" "$GPG_RECIPIENT" false true
2017-01-02 17:08:39 +01:00
if [ $? -eq 0 ]; then
Rsync "$CRYPT_STORAGE/$backupTask" "$destinationDir" false
else
Logger "backup failed." "ERROR"
fi
2019-02-08 13:22:37 +01:00
elif [ "$ENCRYPTION" == true ] && [ "$BACKUP_TYPE" == "pull" ]; then
Rsync "$backupTask" "$destinationDir" false
2017-01-02 17:08:39 +01:00
if [ $? -eq 0 ]; then
EncryptFiles "$encryptDir" "$CRYPT_STORAGE/$backupTask" "$GPG_RECIPIENT" false false
2016-09-01 16:07:20 +02:00
fi
else
Rsync "$backupTask" "$destinationDir" false
2015-11-12 01:26:38 +01:00
fi
CheckTotalExecutionTime
done
2016-08-08 18:43:35 +02:00
IFS=$PATH_SEPARATOR_CHAR read -r -a backupTasks <<< "$FILE_RECURSIVE_BACKUP_TASKS"
2016-08-06 14:02:52 +02:00
for backupTask in "${backupTasks[@]}"; do
2015-11-12 01:26:38 +01:00
# Backup sub directories of recursive directories
2019-02-08 13:22:37 +01:00
if [ "$KEEP_ABSOLUTE_PATHS" != false ]; then
# Fix for backup of '/'
2018-07-30 16:28:12 +02:00
if [ "${backupTask#/}/" == "/" ]; then
2018-07-30 16:38:59 +02:00
destinationDir="$FILE_STORAGE/"
else
2018-07-30 16:28:12 +02:00
destinationDir=$(dirname "$FILE_STORAGE/${backupTask#/}/")
fi
2018-11-05 21:43:40 +01:00
encryptDir="$FILE_STORAGE/${backupTask#/}"
else
destinationDir="$FILE_STORAGE"
encryptDir="$FILE_STORAGE"
fi
2018-09-30 16:16:57 +02:00
Logger "Beginning recursive child file backup of [$backupTask] to [$destinationDir] as $BACKUP_TYPE backup." "NOTICE"
2019-02-08 13:22:37 +01:00
if [ "$ENCRYPTION" == true ] && ([ "$BACKUP_TYPE" == "local" ] || [ "$BACKUP_TYPE" == "push" ]); then
2016-09-02 12:16:25 +02:00
EncryptFiles "$backupTask" "$CRYPT_STORAGE" "$GPG_RECIPIENT" true true
2017-01-02 17:08:39 +01:00
if [ $? -eq 0 ]; then
Rsync "$CRYPT_STORAGE/$backupTask" "$destinationDir" true
else
Logger "backup failed." "ERROR"
fi
2019-02-08 13:22:37 +01:00
elif [ "$ENCRYPTION" == true ] && [ "$BACKUP_TYPE" == "pull" ]; then
Rsync "$backupTask" "$destinationDir" true
2017-01-02 17:08:39 +01:00
if [ $? -eq 0 ]; then
EncryptFiles "$encryptDir" "$CRYPT_STORAGE/$backupTask" "$GPG_RECIPIENT" true false
2016-09-01 16:07:20 +02:00
fi
else
Rsync "$backupTask" "$destinationDir" true
2015-11-12 01:26:38 +01:00
fi
CheckTotalExecutionTime
done
}
function CheckTotalExecutionTime {
2016-12-23 17:51:57 +01:00
__CheckArguments 0 $# "$@" #__WITH_PARANOIA_DEBUG
2015-11-12 01:26:38 +01:00
#### Check if max execution time of whole script as been reached
if [ $SECONDS -gt $SOFT_MAX_EXEC_TIME_TOTAL ]; then
Logger "Max soft execution time of the whole backup exceeded." "WARN"
2016-08-26 12:28:53 +02:00
SendAlert true
fi
if [ $SECONDS -gt $HARD_MAX_EXEC_TIME_TOTAL ] && [ $HARD_MAX_EXEC_TIME_TOTAL -ne 0 ]; then
Logger "Max hard execution time of the whole backup exceeded, stopping backup process." "CRITICAL"
exit 1
2015-11-12 01:26:38 +01:00
fi
}
function _RotateBackupsLocal {
2016-12-24 15:41:28 +01:00
local backupPath="${1}"
local rotateCopies="${2}"
2016-12-23 17:51:57 +01:00
__CheckArguments 2 $# "$@" #__WITH_PARANOIA_DEBUG
2016-02-19 22:14:13 +01:00
local backup
local copy
local cmd
local path
2015-11-12 01:26:38 +01:00
2016-12-27 12:53:35 +01:00
$FIND_CMD "$backupPath" -mindepth 1 -maxdepth 1 ! -regex ".*\.$PROGRAM\.[0-9]+" -print0 | while IFS= read -r -d $'\0' backup; do
2016-12-24 15:41:28 +01:00
copy=$rotateCopies
2016-08-08 18:43:35 +02:00
while [ $copy -gt 1 ]; do
2016-12-24 15:41:28 +01:00
if [ $copy -eq $rotateCopies ]; then
path="$backup.$PROGRAM.$copy"
if [ -f "$path" ] || [ -d "$path" ]; then
cmd="rm -rf \"$path\""
2017-01-03 13:01:18 +01:00
Logger "Launching command [$cmd]." "DEBUG"
eval "$cmd" &
2019-07-23 11:07:27 +02:00
ExecTasks $! "${FUNCNAME[0]}" false 0 0 3600 0 true $SLEEP_TIME $KEEP_LOGGING
2017-01-02 17:08:39 +01:00
if [ $? -ne 0 ]; then
Logger "Cannot delete oldest copy [$path]." "ERROR"
2019-07-23 11:07:27 +02:00
_LOGGER_SILENT=true Logger "Command was [$cmd]." "WARN"
fi
2015-11-12 01:26:38 +01:00
fi
fi
2016-12-27 12:53:35 +01:00
path="$backup.$PROGRAM.$((copy-1))"
if [ -f "$path" ] || [ -d "$path" ]; then
cmd="mv \"$path\" \"$backup.$PROGRAM.$copy\""
2017-01-03 13:01:18 +01:00
Logger "Launching command [$cmd]." "DEBUG"
2015-11-12 01:26:38 +01:00
eval "$cmd" &
2018-02-24 17:41:33 +01:00
ExecTasks $! "${FUNCNAME[0]}" false 0 0 3600 0 true $SLEEP_TIME $KEEP_LOGGING
2017-01-02 17:08:39 +01:00
if [ $? -ne 0 ]; then
Logger "Cannot move [$path] to [$backup.$PROGRAM.$copy]." "ERROR"
2019-07-23 11:07:27 +02:00
_LOGGER_SILENT=true Logger "Command was [$cmd]." "WARN"
2015-11-12 01:26:38 +01:00
fi
fi
2016-12-27 12:53:35 +01:00
copy=$((copy-1))
2015-11-12 01:26:38 +01:00
done
# TODO: Describe new behavior: Always copy instead of move in order to make delta copies
2015-11-12 01:26:38 +01:00
# Latest file backup will not be moved if script configured for remote backup so next rsync execution will only do delta copy instead of full one
# Whereas sql files will always be moved because we don't do deltas on sql files
2015-11-12 01:26:38 +01:00
if [[ $backup == *.sql.* ]]; then
cmd="mv \"$backup\" \"$backup.$PROGRAM.1\""
2017-01-03 13:01:18 +01:00
Logger "Launching command [$cmd]." "DEBUG"
2015-11-12 01:26:38 +01:00
eval "$cmd" &
2018-02-24 17:41:33 +01:00
ExecTasks $! "${FUNCNAME[0]}" false 0 0 3600 0 true $SLEEP_TIME $KEEP_LOGGING
2017-01-02 17:08:39 +01:00
if [ $? -ne 0 ]; then
Logger "Cannot move [$backup] to [$backup.$PROGRAM.1]." "ERROR"
_LOGGER_SILENT=true Logger "Command was [$cmd]." "WARN"
2015-11-12 01:26:38 +01:00
fi
else
2019-02-08 13:22:37 +01:00
#elif [ "$REMOTE_OPERATION" == true ]; then
cmd="cp -R \"$backup\" \"$backup.$PROGRAM.1\""
2017-01-03 13:01:18 +01:00
Logger "Launching command [$cmd]." "DEBUG"
2015-11-12 01:26:38 +01:00
eval "$cmd" &
2018-02-24 17:41:33 +01:00
ExecTasks $! "${FUNCNAME[0]}" false 0 0 3600 0 true $SLEEP_TIME $KEEP_LOGGING
2017-01-02 17:08:39 +01:00
if [ $? -ne 0 ]; then
Logger "Cannot copy [$backup] to [$backup.$PROGRAM.1]." "ERROR"
_LOGGER_SILENT=true Logger "Command was [$cmd]." "WARN"
2015-11-12 01:26:38 +01:00
fi
#else
# cmd="mv \"$backup\" \"$backup.$PROGRAM.1\""
# Logger "Launching command [$cmd]." "DEBUG"
# eval "$cmd" &
# ExecTasks $! "${FUNCNAME[0]}" false 0 0 3600 0 true $SLEEP_TIME $KEEP_LOGGING
# if [ $? -ne 0 ]; then
# Logger "Cannot move [$backup] to [$backup.$PROGRAM.1]." "ERROR"
# _LOGGER_SILENT=true Logger "Command was [$cmd]." "WARN"
# fi
2015-11-12 01:26:38 +01:00
fi
done
}
function _RotateBackupsRemote {
2016-12-24 15:41:28 +01:00
local backupPath="${1}"
local rotateCopies="${2}"
2016-12-23 17:51:57 +01:00
__CheckArguments 2 $# "$@" #__WITH_PARANOIA_DEBUG
2016-02-19 22:14:13 +01:00
$SSH_CMD env _REMOTE_TOKEN=$_REMOTE_TOKEN \
env _DEBUG="'$_DEBUG'" env _PARANOIA_DEBUG="'$_PARANOIA_DEBUG'" env _LOGGER_SILENT="'$_LOGGER_SILENT'" env _LOGGER_VERBOSE="'$_LOGGER_VERBOSE'" env _LOGGER_PREFIX="'$_LOGGER_PREFIX'" env _LOGGER_ERR_ONLY="'$_LOGGER_ERR_ONLY'" \
env _REMOTE_EXECUTION="true" env PROGRAM="'$PROGRAM'" env SCRIPT_PID="'$SCRIPT_PID'" env TSTAMP="'$TSTAMP'" \
2016-12-27 12:53:35 +01:00
env REMOTE_FIND_CMD="'$REMOTE_FIND_CMD'" env rotateCopies="'$rotateCopies'" env backupPath="'$backupPath'" \
2016-12-24 15:41:28 +01:00
$COMMAND_SUDO' bash -s' << 'ENDSSH' > "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP" 2> "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.error.$SCRIPT_PID.$TSTAMP"
2019-08-09 10:13:59 +02:00
_REMOTE_TOKEN="(o_0)"
2016-12-24 15:41:28 +01:00
include #### DEBUG SUBSET ####
include #### TrapError SUBSET ####
include #### RemoteLogger SUBSET ####
2015-11-12 01:26:38 +01:00
function _RotateBackupsRemoteSSH {
2018-09-30 17:17:45 +02:00
local backup
local copy
local cmd
local path
2016-12-27 12:53:35 +01:00
$REMOTE_FIND_CMD "$backupPath" -mindepth 1 -maxdepth 1 ! -regex ".*\.$PROGRAM\.[0-9]+" -print0 | while IFS= read -r -d $'\0' backup; do
2016-12-24 15:41:28 +01:00
copy=$rotateCopies
2016-08-08 18:43:35 +02:00
while [ $copy -gt 1 ]; do
2016-12-24 15:41:28 +01:00
if [ $copy -eq $rotateCopies ]; then
path="$backup.$PROGRAM.$copy"
if [ -f "$path" ] || [ -d "$path" ]; then
cmd="rm -rf \"$path\""
2017-01-03 13:01:18 +01:00
RemoteLogger "Launching command [$cmd]." "DEBUG"
eval "$cmd"
2017-01-02 17:08:39 +01:00
if [ $? -ne 0 ]; then
RemoteLogger "Cannot delete oldest copy [$path]." "ERROR"
2017-01-03 13:01:18 +01:00
RemoteLogger "Command was [$cmd]." "WARN"
fi
2015-11-12 01:26:38 +01:00
fi
fi
2016-12-27 12:53:35 +01:00
path="$backup.$PROGRAM.$((copy-1))"
if [ -f "$path" ] || [ -d "$path" ]; then
cmd="mv \"$path\" \"$backup.$PROGRAM.$copy\""
2017-01-03 13:01:18 +01:00
RemoteLogger "Launching command [$cmd]." "DEBUG"
2015-11-12 01:26:38 +01:00
eval "$cmd"
2017-01-02 17:08:39 +01:00
if [ $? -ne 0 ]; then
RemoteLogger "Cannot move [$path] to [$backup.$PROGRAM.$copy]." "ERROR"
2017-01-03 13:01:18 +01:00
RemoteLogger "Command was [$cmd]." "WARN"
2015-11-12 01:26:38 +01:00
fi
fi
2018-09-30 17:17:45 +02:00
copy=$((copy-1))
2015-11-12 01:26:38 +01:00
done
# Latest file backup will not be moved if script configured for remote backup so next rsync execution will only do delta copy instead of full one
if [[ $backup == *.sql.* ]]; then
cmd="mv \"$backup\" \"$backup.$PROGRAM.1\""
2017-01-03 13:01:18 +01:00
RemoteLogger "Launching command [$cmd]." "DEBUG"
2015-11-12 01:26:38 +01:00
eval "$cmd"
2017-01-02 17:08:39 +01:00
if [ $? -ne 0 ]; then
RemoteLogger "Cannot move [$backup] to [$backup.$PROGRAM.1]." "ERROR"
2017-01-03 13:01:18 +01:00
RemoteLogger "Command was [$cmd]." "WARN"
2015-11-12 01:26:38 +01:00
fi
else
2019-02-08 13:22:37 +01:00
#elif [ "$REMOTE_OPERATION" == true ]; then
cmd="cp -R \"$backup\" \"$backup.$PROGRAM.1\""
2017-01-03 13:01:18 +01:00
RemoteLogger "Launching command [$cmd]." "DEBUG"
2015-11-12 01:26:38 +01:00
eval "$cmd"
2017-01-02 17:08:39 +01:00
if [ $? -ne 0 ]; then
RemoteLogger "Cannot copy [$backup] to [$backup.$PROGRAM.1]." "ERROR"
2017-01-03 13:01:18 +01:00
RemoteLogger "Command was [$cmd]." "WARN"
2015-11-12 01:26:38 +01:00
fi
#else
# cmd="mv \"$backup\" \"$backup.$PROGRAM.1\""
# RemoteLogger "Launching command [$cmd]." "DEBUG"
# eval "$cmd"
# if [ $? -ne 0 ]; then
# RemoteLogger "Cannot move [$backup] to [$backup.$PROGRAM.1]." "ERROR"
# RemoteLogger "Command was [$cmd]." "WARN"
# fi
2015-11-12 01:26:38 +01:00
fi
done
}
_RotateBackupsRemoteSSH
ENDSSH
2018-02-24 17:41:33 +01:00
ExecTasks $! "${FUNCNAME[0]}" false 0 0 1800 0 true $SLEEP_TIME $KEEP_LOGGING
2017-01-02 17:08:39 +01:00
if [ $? -ne 0 ]; then
2016-12-24 15:41:28 +01:00
Logger "Could not rotate backups in [$backupPath]." "ERROR"
2020-05-03 10:05:27 +02:00
Logger "Truncated output:\n$(head -c16384 "$RUN_DIR/$PROGRAM.${FUNCNAME[0]}.$SCRIPT_PID.$TSTAMP")" "ERROR"
2015-11-12 01:26:38 +01:00
else
Logger "Remote rotation succeed." "NOTICE"
fi ## Need to add a trivial sleep time to give ssh time to log to local file
#sleep 5
}
#TODO: test find cmd for backup rotation with regex on busybox / mac
2015-11-12 01:26:38 +01:00
function RotateBackups {
2016-12-24 15:41:28 +01:00
local backupPath="${1}"
local rotateCopies="${2}"
2016-12-27 12:53:35 +01:00
2016-12-23 17:51:57 +01:00
__CheckArguments 2 $# "$@" #__WITH_PARANOIA_DEBUG
2015-11-12 01:26:38 +01:00
if [ "$BACKUP_TYPE" == "local" ] || [ "$BACKUP_TYPE" == "pull" ]; then
2018-09-30 17:11:18 +02:00
Logger "Rotating local backups in [$backupPath] for [$rotateCopies] copies." "NOTICE"
2016-12-24 15:41:28 +01:00
_RotateBackupsLocal "$backupPath" "$rotateCopies"
2015-11-12 01:26:38 +01:00
elif [ "$BACKUP_TYPE" == "push" ]; then
2018-09-30 17:11:18 +02:00
Logger "Rotating remote backups in [$backupPath] for [$rotateCopies] copies." "NOTICE"
2016-12-24 15:41:28 +01:00
_RotateBackupsRemote "$backupPath" "$rotateCopies"
2015-11-12 01:26:38 +01:00
fi
}
function Init {
2016-12-23 17:51:57 +01:00
__CheckArguments 0 $# "$@" #__WITH_PARANOIA_DEBUG
2015-11-12 01:26:38 +01:00
2016-02-19 22:14:13 +01:00
local uri
local hosturiandpath
local hosturi
## Test if target dir is a ssh uri, and if yes, break it down it its values
if [ "${REMOTE_SYSTEM_URI:0:6}" == "ssh://" ] && [ "$BACKUP_TYPE" != "local" ]; then
2019-02-08 13:22:37 +01:00
REMOTE_OPERATION=true
# remove leadng 'ssh://'
uri=${REMOTE_SYSTEM_URI#ssh://*}
if [[ "$uri" == *"@"* ]]; then
# remove everything after '@'
REMOTE_USER=${uri%@*}
else
REMOTE_USER=$LOCAL_USER
fi
2015-11-12 01:26:38 +01:00
if [ "$SSH_RSA_PRIVATE_KEY" == "" ]; then
if [ ! -f "$SSH_PASSWORD_FILE" ]; then
# Assume that there might exist a standard rsa key
SSH_RSA_PRIVATE_KEY=~/.ssh/id_rsa
fi
fi
2015-11-12 01:26:38 +01:00
# remove everything before '@'
hosturiandpath=${uri#*@}
# remove everything after first '/'
hosturi=${hosturiandpath%%/*}
if [[ "$hosturi" == *":"* ]]; then
REMOTE_PORT=${hosturi##*:}
else
REMOTE_PORT=22
fi
REMOTE_HOST=${hosturi%%:*}
2015-11-12 01:26:38 +01:00
fi
2017-06-20 16:20:44 +02:00
## Add update to default RSYNC_TYPE_ARGS
RSYNC_TYPE_ARGS=$RSYNC_TYPE_ARGS" -u"
2015-11-12 01:26:38 +01:00
if [ $_LOGGER_VERBOSE == true ]; then
2017-06-20 16:20:44 +02:00
RSYNC_TYPE_ARGS=$RSYNC_TYPE_ARGS" -i"
2015-11-12 01:26:38 +01:00
fi
2019-02-08 13:22:37 +01:00
if [ "$DELETE_VANISHED_FILES" == true ]; then
2017-06-20 16:20:44 +02:00
RSYNC_TYPE_ARGS=$RSYNC_TYPE_ARGS" --delete"
2015-11-12 01:26:38 +01:00
fi
2016-08-29 18:27:12 +02:00
if [ $stats == true ]; then
2017-06-20 16:20:44 +02:00
RSYNC_TYPE_ARGS=$RSYNC_TYPE_ARGS" --stats"
2015-11-12 01:26:38 +01:00
fi
## Fix for symlink to directories on target cannot get updated
2017-06-20 16:20:44 +02:00
RSYNC_TYPE_ARGS=$RSYNC_TYPE_ARGS" --force"
2015-11-12 01:26:38 +01:00
}
function Main {
2016-12-23 17:51:57 +01:00
__CheckArguments 0 $# "$@" #__WITH_PARANOIA_DEBUG
2015-11-12 01:26:38 +01:00
2019-02-08 13:22:37 +01:00
if [ "$SQL_BACKUP" != false ] && [ $CAN_BACKUP_SQL == true ]; then
2015-11-12 01:26:38 +01:00
ListDatabases
fi
2019-02-08 13:22:37 +01:00
if [ "$FILE_BACKUP" != false ] && [ $CAN_BACKUP_FILES == true ]; then
2015-11-12 01:26:38 +01:00
ListRecursiveBackupDirectories
2019-02-08 13:22:37 +01:00
if [ "$GET_BACKUP_SIZE" != false ]; then
2015-11-12 01:26:38 +01:00
GetDirectoriesSize
else
TOTAL_FILES_SIZE=-1
2015-11-12 01:26:38 +01:00
fi
fi
2016-08-30 15:36:08 +02:00
# Expand ~ if exists
FILE_STORAGE="${FILE_STORAGE/#\~/$HOME}"
SQL_STORAGE="${SQL_STORAGE/#\~/$HOME}"
SSH_RSA_PRIVATE_KEY="${SSH_RSA_PRIVATE_KEY/#\~/$HOME}"
2016-10-23 18:04:39 +02:00
SSH_PASSWORD_FILE="${SSH_PASSWORD_FILE/#\~/$HOME}"
ENCRYPT_PUBKEY="${ENCRYPT_PUBKEY/#\~/$HOME}"
2016-08-30 15:36:08 +02:00
2019-02-08 13:22:37 +01:00
if [ "$CREATE_DIRS" != false ]; then
2015-11-12 01:26:38 +01:00
CreateStorageDirectories
fi
CheckDiskSpace
# Actual backup process
2019-02-08 13:22:37 +01:00
if [ "$SQL_BACKUP" != false ] && [ $CAN_BACKUP_SQL == true ]; then
if [ $_DRYRUN == false ] && [ "$ROTATE_SQL_BACKUPS" == true ]; then
RotateBackups "$SQL_STORAGE" "$ROTATE_SQL_COPIES"
2015-11-12 01:26:38 +01:00
fi
BackupDatabases
fi
2019-02-08 13:22:37 +01:00
if [ "$FILE_BACKUP" != false ] && [ $CAN_BACKUP_FILES == true ]; then
if [ $_DRYRUN == false ] && [ "$ROTATE_FILE_BACKUPS" == true ]; then
RotateBackups "$FILE_STORAGE" "$ROTATE_FILE_COPIES"
2015-11-12 01:26:38 +01:00
fi
2015-11-28 12:48:19 +01:00
## Add Rsync include / exclude patterns
RsyncPatterns
2015-11-12 01:26:38 +01:00
FilesBackup
fi
}
function Usage {
2016-12-23 17:51:57 +01:00
__CheckArguments 0 $# "$@" #__WITH_PARANOIA_DEBUG
2015-11-12 01:26:38 +01:00
2019-02-08 13:22:37 +01:00
if [ "$IS_STABLE" != true ]; then
2015-11-12 01:26:38 +01:00
echo -e "\e[93mThis is an unstable dev build. Please use with caution.\e[0m"
fi
echo "$PROGRAM $PROGRAM_VERSION $PROGRAM_BUILD"
echo "$AUTHOR"
echo "$CONTACT"
echo ""
echo "General usage: $0 /path/to/backup.conf [OPTIONS]"
2015-11-12 01:26:38 +01:00
echo ""
echo "OPTIONS:"
2016-12-24 15:41:28 +01:00
echo "--dry will run $PROGRAM without actually doing anything, just testing"
2016-12-23 21:51:34 +01:00
echo "--no-prefix Will suppress time / date suffix from output"
2016-12-24 15:41:28 +01:00
echo "--silent will run $PROGRAM without any output to stdout, usefull for cron backups"
2016-11-15 13:13:05 +01:00
echo "--errors-only Output only errors (can be combined with silent or verbose)"
2016-02-16 21:09:57 +01:00
echo "--verbose adds command outputs"
2015-11-12 01:26:38 +01:00
echo "--stats Adds rsync transfer statistics to verbose output"
echo "--partial Allows rsync to keep partial downloads that can be resumed later (experimental)"
echo "--no-maxtime disables any soft and hard execution time checks"
echo "--delete Deletes files on destination that vanished on source"
echo "--dontgetsize Does not try to evaluate backup size"
2017-01-02 13:15:33 +01:00
echo "--parallel=ncpu Use n cpus to encrypt / decrypt files. Works in normal and batch processing mode."
2016-08-31 23:32:21 +02:00
echo ""
echo "Batch processing usage:"
echo -e "\e[93mDecrypt\e[0m a backup encrypted with $PROGRAM"
echo "$0 --decrypt=/path/to/encrypted_backup --passphrase-file=/path/to/passphrase"
echo "$0 --decrypt=/path/to/encrypted_backup --passphrase=MySecretPassPhrase (security risk)"
echo ""
echo "Batch encrypt directories in separate gpg files"
echo "$0 --encrypt=/path/to/files --destination=/path/to/encrypted/files --recipient=\"Your Name\""
2015-11-12 01:26:38 +01:00
exit 128
}
2018-10-10 00:08:49 +02:00
#### SCRIPT ENTRY POINT ####
trap TrapQuit EXIT
2015-11-12 01:26:38 +01:00
# Command line argument flags
2016-08-29 18:27:12 +02:00
_DRYRUN=false
no_maxtime=false
stats=false
partial_transfers=false
delete_vanished=false
dont_get_backup_size=false
2016-08-31 23:32:21 +02:00
_DECRYPT_MODE=false
DECRYPT_PATH=""
2016-09-01 22:15:16 +02:00
_ENCRYPT_MODE=false
2015-11-12 01:26:38 +01:00
function GetCommandlineArguments {
2017-06-20 15:56:07 +02:00
local isFirstArgument=true
2015-11-12 01:26:38 +01:00
if [ $# -eq 0 ]; then
Usage
fi
2016-08-08 18:43:35 +02:00
for i in "$@"; do
case "$i" in
2015-11-12 01:26:38 +01:00
--dry)
2016-08-29 18:27:12 +02:00
_DRYRUN=true
2015-11-12 01:26:38 +01:00
;;
--silent)
_LOGGER_SILENT=true
2015-11-12 01:26:38 +01:00
;;
--verbose)
_LOGGER_VERBOSE=true
2015-11-12 01:26:38 +01:00
;;
--stats)
2019-05-21 12:03:35 +02:00
stats=true
2015-11-12 01:26:38 +01:00
;;
--partial)
partial_transfers=true
2015-11-12 01:26:38 +01:00
;;
--no-maxtime)
2016-08-29 18:27:12 +02:00
no_maxtime=true
2015-11-12 01:26:38 +01:00
;;
--delete)
delete_vanished=true
2015-11-12 01:26:38 +01:00
;;
--dontgetsize)
dont_get_backup_size=true
2015-11-12 01:26:38 +01:00
;;
--help|-h|--version|-v)
Usage
;;
2016-08-31 23:32:21 +02:00
--decrypt=*)
_DECRYPT_MODE=true
DECRYPT_PATH="${i##*=}"
;;
--passphrase=*)
PASSPHRASE="${i##*=}"
;;
--passphrase-file=*)
PASSPHRASE_FILE="${i##*=}"
;;
--encrypt=*)
_ENCRYPT_MODE=true
CRYPT_SOURCE="${i##*=}"
;;
--destination=*)
CRYPT_STORAGE="${i##*=}"
;;
--recipient=*)
GPG_RECIPIENT="${i##*=}"
;;
2016-11-15 13:13:05 +01:00
--errors-only)
_LOGGER_ERR_ONLY=true
2016-11-14 17:17:29 +01:00
;;
2016-12-23 21:51:34 +01:00
--no-prefix)
_LOGGER_PREFIX=""
;;
2017-01-02 13:15:33 +01:00
--parallel=*)
PARALLEL_ENCRYPTION_PROCESSES="${i##*=}"
2020-05-03 10:05:27 +02:00
if [ $(IsNumeric "$PARALLEL_ENCRYPTION_PROCESSES") -ne 1 ]; then
2017-01-02 13:15:33 +01:00
Logger "Bogus --parallel value. Using only one CPU." "WARN"
fi
2017-06-20 15:56:07 +02:00
;;
*)
if [ $isFirstArgument == false ]; then
Logger "Unknown option '$i'" "CRITICAL"
Usage
fi
;;
2015-11-12 01:26:38 +01:00
esac
2017-06-20 15:56:07 +02:00
isFirstArgument=false
2015-11-12 01:26:38 +01:00
done
}
GetCommandlineArguments "$@"
2016-08-31 23:32:21 +02:00
if [ "$_DECRYPT_MODE" == true ]; then
CheckCryptEnvironnment
2016-12-27 12:53:35 +01:00
GetLocalOS
InitLocalOSDependingSettings
Logger "$DRY_WARNING$PROGRAM v$PROGRAM_VERSION decrypt mode begin." "ALWAYS"
2016-08-31 23:32:21 +02:00
DecryptFiles "$DECRYPT_PATH" "$PASSPHRASE_FILE" "$PASSPHRASE"
exit $?
fi
if [ "$_ENCRYPT_MODE" == true ]; then
CheckCryptEnvironnment
2016-12-27 12:53:35 +01:00
GetLocalOS
InitLocalOSDependingSettings
Logger "$DRY_WARNING$PROGRAM v$PROGRAM_VERSION encrypt mode begin." "ALWAYS"
2016-12-29 00:20:01 +01:00
EncryptFiles "$CRYPT_SOURCE" "$CRYPT_STORAGE" "$GPG_RECIPIENT" true false
exit $?
2016-08-31 23:32:21 +02:00
fi
2015-11-12 01:26:38 +01:00
LoadConfigFile "$1"
# Reload GetCommandlineArguments to override config file with runtime arguments
GetCommandlineArguments "$@"
2015-11-12 01:26:38 +01:00
if [ "$LOGFILE" == "" ]; then
if [ -w /var/log ]; then
2016-04-06 20:40:20 +02:00
LOG_FILE="/var/log/$PROGRAM.$INSTANCE_ID.log"
2019-05-21 14:32:46 +02:00
elif ([ "${HOME}" != "" ] && [ -w "${HOME}" ]); then
2016-08-30 18:11:54 +02:00
LOG_FILE="${HOME}/$PROGRAM.$INSTANCE_ID.log"
2015-11-12 01:26:38 +01:00
else
LOG_FILE=./$PROGRAM.$INSTANCE_ID.log
fi
else
LOG_FILE="$LOGFILE"
fi
2019-02-08 13:22:37 +01:00
# v2.3 config syntax compatibility
UpdateBooleans
2020-05-03 10:05:27 +02:00
if [ ! -w "$(dirname "$LOG_FILE")" ]; then
echo "Cannot write to log [$(dirname "$LOG_FILE")]."
2016-11-10 16:18:29 +01:00
else
Logger "Script begin, logging to [$LOG_FILE]." "DEBUG"
fi
2016-08-29 18:27:12 +02:00
if [ $no_maxtime == true ]; then
2015-11-12 01:26:38 +01:00
SOFT_MAX_EXEC_TIME_DB_TASK=0
SOFT_MAX_EXEC_TIME_FILE_TASK=0
HARD_MAX_EXEC_TIME_DB_TASK=0
HARD_MAX_EXEC_TIME_FILE_TASK=0
HARD_MAX_EXEC_TIME_TOTAL=0
fi
if [ $partial_transfers == true ]; then
2019-02-08 13:22:37 +01:00
PARTIAL=true
fi
if [ $delete_vanished == true ]; then
2019-02-08 13:22:37 +01:00
DELETE_VANISHED_FILES=true
fi
if [ $dont_get_backup_size == true ]; then
2019-02-08 13:22:37 +01:00
GET_BACKUP_SIZE=false
2017-06-20 14:53:12 +02:00
fi
2019-02-08 13:22:37 +01:00
if [ "$IS_STABLE" != true ]; then
2017-06-20 16:23:14 +02:00
Logger "This is an unstable dev build [$PROGRAM_BUILD]. Please use with caution." "WARN"
fi
DATE=$(date)
Logger "--------------------------------------------------------------------" "NOTICE"
Logger "$DRY_WARNING$DATE - $PROGRAM v$PROGRAM_VERSION $BACKUP_TYPE script begin." "ALWAYS"
Logger "--------------------------------------------------------------------" "NOTICE"
Logger "Backup instance [$INSTANCE_ID] launched as $LOCAL_USER@$LOCAL_HOST (PID $SCRIPT_PID)" "NOTICE"
GetLocalOS
InitLocalOSDependingSettings
CheckRunningInstances
PreInit
Init
CheckEnvironment
PostInit
CheckCurrentConfig
GetRemoteOS
InitRemoteOSDependingSettings
2015-11-12 01:26:38 +01:00
RunBeforeHook
Main