Compare commits
1 Commits
backups
...
1.1.2+0.26
Author | SHA1 | Date | |
---|---|---|---|
e4ea91688c |
@ -9,4 +9,3 @@ LETS_ENCRYPT_ENV=production
|
|||||||
|
|
||||||
SECRET_DB_PASSWORD_VERSION=v1
|
SECRET_DB_PASSWORD_VERSION=v1
|
||||||
SECRET_NC_DB_URL_VERSION=v1
|
SECRET_NC_DB_URL_VERSION=v1
|
||||||
ENABLE_BACKUPS=true
|
|
||||||
|
@ -8,7 +8,7 @@
|
|||||||
* **Status**: 0
|
* **Status**: 0
|
||||||
* **Image**: [`nocodb`](https://hub.docker.com/r/nocodb), 4, upstream
|
* **Image**: [`nocodb`](https://hub.docker.com/r/nocodb), 4, upstream
|
||||||
* **Healthcheck**: No
|
* **Healthcheck**: No
|
||||||
* **Backups**: Yes
|
* **Backups**: No
|
||||||
* **Email**: No
|
* **Email**: No
|
||||||
* **Tests**: No
|
* **Tests**: No
|
||||||
* **SSO**: No
|
* **SSO**: No
|
||||||
|
17
compose.yml
17
compose.yml
@ -28,8 +28,7 @@ services:
|
|||||||
#- "traefik.http.routers.${STACK_NAME}.middlewares=${STACK_NAME}-redirect"
|
#- "traefik.http.routers.${STACK_NAME}.middlewares=${STACK_NAME}-redirect"
|
||||||
#- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLForceHost=true"
|
#- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLForceHost=true"
|
||||||
#- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLHost=${DOMAIN}"
|
#- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLHost=${DOMAIN}"
|
||||||
- "backupbot.backup=${ENABLE_BACKUPS:-true}"
|
- "coop-cloud.${STACK_NAME}.version=1.1.2+0.263.1"
|
||||||
- "coop-cloud.${STACK_NAME}.version=1.1.1+0.263.0"
|
|
||||||
|
|
||||||
db:
|
db:
|
||||||
image: postgres:13.2-alpine
|
image: postgres:13.2-alpine
|
||||||
@ -48,16 +47,6 @@ services:
|
|||||||
interval: 10s
|
interval: 10s
|
||||||
timeout: 2s
|
timeout: 2s
|
||||||
retries: 10
|
retries: 10
|
||||||
deploy:
|
|
||||||
labels:
|
|
||||||
backupbot.backup: "${ENABLE_BACKUPS:-true}"
|
|
||||||
backupbot.backup.pre-hook: "/pg_backup.sh backup"
|
|
||||||
backupbot.backup.volumes.db.path: "backup.sql"
|
|
||||||
backupbot.restore.post-hook: '/pg_backup.sh restore'
|
|
||||||
configs:
|
|
||||||
- source: pg_backup
|
|
||||||
target: /pg_backup.sh
|
|
||||||
mode: 0555
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
data:
|
data:
|
||||||
@ -76,7 +65,3 @@ secrets:
|
|||||||
nc_db_url:
|
nc_db_url:
|
||||||
external: true
|
external: true
|
||||||
name: ${STACK_NAME}_nc_db_url_${SECRET_NC_DB_URL_VERSION}
|
name: ${STACK_NAME}_nc_db_url_${SECRET_NC_DB_URL_VERSION}
|
||||||
configs:
|
|
||||||
pg_backup:
|
|
||||||
name: ${STACK_NAME}_pg_backup_${PG_BACKUP_VERSION}
|
|
||||||
file: pg_backup.sh
|
|
||||||
|
34
pg_backup.sh
34
pg_backup.sh
@ -1,34 +0,0 @@
|
|||||||
#!/bin/bash
|
|
||||||
|
|
||||||
set -e
|
|
||||||
|
|
||||||
BACKUP_FILE='/var/lib/postgresql/data/backup.sql'
|
|
||||||
|
|
||||||
function backup {
|
|
||||||
export PGPASSWORD=$(cat /run/secrets/db_password)
|
|
||||||
pg_dump -U ${POSTGRES_USER} ${POSTGRES_DB} > $BACKUP_FILE
|
|
||||||
}
|
|
||||||
|
|
||||||
function restore {
|
|
||||||
cd /var/lib/postgresql/data/
|
|
||||||
restore_config(){
|
|
||||||
# Restore allowed connections
|
|
||||||
cat pg_hba.conf.bak > pg_hba.conf
|
|
||||||
su postgres -c 'pg_ctl reload'
|
|
||||||
}
|
|
||||||
# Don't allow any other connections than local
|
|
||||||
cp pg_hba.conf pg_hba.conf.bak
|
|
||||||
echo "local all all trust" > pg_hba.conf
|
|
||||||
su postgres -c 'pg_ctl reload'
|
|
||||||
trap restore_config EXIT INT TERM
|
|
||||||
|
|
||||||
# Recreate Database
|
|
||||||
psql -U ${POSTGRES_USER} -d postgres -c "DROP DATABASE ${POSTGRES_DB} WITH (FORCE);"
|
|
||||||
createdb -U ${POSTGRES_USER} ${POSTGRES_DB}
|
|
||||||
psql -U ${POSTGRES_USER} -d ${POSTGRES_DB} -1 -f $BACKUP_FILE
|
|
||||||
|
|
||||||
trap - EXIT INT TERM
|
|
||||||
restore_config
|
|
||||||
}
|
|
||||||
|
|
||||||
$@
|
|
Reference in New Issue
Block a user