mirror of
https://github.com/zulip/zulip.git
synced 2025-11-03 21:43:21 +00:00
Fixes #2665. Regenerated by tabbott with `lint --fix` after a rebase and change in parameters. Note from tabbott: In a few cases, this converts technical debt in the form of unsorted imports into different technical debt in the form of our largest files having very long, ugly import sequences at the start. I expect this change will increase pressure for us to split those files, which isn't a bad thing. Signed-off-by: Anders Kaseorg <anders@zulip.com>
152 lines
5.5 KiB
Python
Executable File
152 lines
5.5 KiB
Python
Executable File
#!/usr/bin/env python3
|
|
import argparse
|
|
import os
|
|
import re
|
|
import subprocess
|
|
import sys
|
|
import tempfile
|
|
from typing import IO
|
|
|
|
BASE_DIR = os.path.dirname(os.path.dirname(os.path.dirname(os.path.abspath(__file__))))
|
|
sys.path.append(BASE_DIR)
|
|
from scripts.lib.zulip_tools import run, su_to_zulip
|
|
|
|
POSTGRES_USER = "postgres"
|
|
|
|
parser = argparse.ArgumentParser()
|
|
parser.add_argument("tarball", help="Filename of input tarball")
|
|
|
|
|
|
def restore_backup(tarball_file: IO[bytes]) -> None:
|
|
|
|
su_to_zulip(save_suid=True)
|
|
|
|
from scripts.lib.setup_path import setup_path
|
|
|
|
setup_path()
|
|
|
|
# First, we unpack the /etc/zulip configuration, so we know how
|
|
# this server is supposed to be configured (and can import
|
|
# /etc/zulip/settings.py via `from django.conf import settings`,
|
|
# next). Ignore errors if zulip-backup/settings is not present
|
|
# (E.g. because this is a development backup).
|
|
tarball_file.seek(0, 0)
|
|
subprocess.call(
|
|
[
|
|
"tar",
|
|
"-C",
|
|
"/etc/zulip",
|
|
"--strip-components=2",
|
|
"-xz",
|
|
"zulip-backup/settings",
|
|
],
|
|
stdin=tarball_file,
|
|
)
|
|
|
|
os.environ["DJANGO_SETTINGS_MODULE"] = "zproject.settings"
|
|
from django.conf import settings
|
|
|
|
paths = [
|
|
("settings", "/etc/zulip"),
|
|
# zproject will only be present for development environment backups.
|
|
("zproject", os.path.join(settings.DEPLOY_ROOT, "zproject")),
|
|
]
|
|
if settings.LOCAL_UPLOADS_DIR is not None:
|
|
# We only need to restore LOCAL_UPLOADS_DIR if the system is
|
|
# configured to locally host uploads.
|
|
paths.append(("uploads", os.path.join(settings.DEPLOY_ROOT, settings.LOCAL_UPLOADS_DIR)))
|
|
|
|
with tempfile.TemporaryDirectory(prefix="zulip-restore-backup-") as tmp:
|
|
uid = os.getuid()
|
|
gid = os.getgid()
|
|
os.setresuid(0, 0, 0)
|
|
for name, path in paths:
|
|
os.makedirs(path, exist_ok=True)
|
|
os.chown(path, uid, gid)
|
|
os.setresuid(uid, uid, 0)
|
|
|
|
assert not any("|" in name or "|" in path for name, path in paths)
|
|
transform_args = [
|
|
r"--transform=s|^zulip-backup/{}(/.*)?$|{}\1|x".format(
|
|
re.escape(name), path.replace("\\", r"\\"),
|
|
)
|
|
for name, path in paths
|
|
]
|
|
|
|
os.mkdir(os.path.join(tmp, "zulip-backup"))
|
|
tarball_file.seek(0, 0)
|
|
run(["tar", "-C", tmp] + transform_args + ["-xPz"], stdin=tarball_file)
|
|
|
|
# Now, extract the the database backup, destroy the old
|
|
# database, and create a new, empty database.
|
|
db_name = settings.DATABASES["default"]["NAME"]
|
|
assert isinstance(db_name, str)
|
|
db_dir = os.path.join(tmp, "zulip-backup", "database")
|
|
os.setresuid(0, 0, 0)
|
|
run(["chown", "-R", POSTGRES_USER, "--", tmp])
|
|
run(
|
|
[
|
|
os.path.join(
|
|
settings.DEPLOY_ROOT, "scripts", "setup", "terminate-psql-sessions",
|
|
),
|
|
"zulip",
|
|
"zulip",
|
|
"zulip_base",
|
|
],
|
|
)
|
|
as_postgres = ["su", "-s", "/usr/bin/env", "-", "--", POSTGRES_USER]
|
|
run(as_postgres + ["dropdb", "--if-exists", "--", db_name])
|
|
run(as_postgres + ["createdb", "-O", "zulip", "-T", "template0", "--", db_name])
|
|
|
|
if settings.PRODUCTION:
|
|
# In case we are restoring a backup from an older Zulip
|
|
# version, there may be new secrets to generate.
|
|
subprocess.check_call([
|
|
os.path.join(settings.DEPLOY_ROOT, "scripts", "setup", "generate_secrets.py"),
|
|
"--production",
|
|
])
|
|
|
|
# If there is a local rabbitmq, we need to reconfigure it
|
|
# to ensure the rabbitmq password matches the value in the
|
|
# restored zulip-secrets.conf. We need to be careful to
|
|
# only do this if rabbitmq is configured to run locally on
|
|
# the system.
|
|
rabbitmq_host = subprocess.check_output(
|
|
[os.path.join(settings.DEPLOY_ROOT,
|
|
"scripts", "get-django-setting"),
|
|
"RABBITMQ_HOST"]).strip().decode("utf-8")
|
|
if rabbitmq_host in ["127.0.0.1", "::1", "localhost", "localhost6"]:
|
|
run([os.path.join(settings.DEPLOY_ROOT,
|
|
"scripts", "setup", "configure-rabbitmq")])
|
|
|
|
# In production, we also need to do a `zulip-puppet-apply`
|
|
# in order to apply any configuration from
|
|
# /etc/zulip/zulip.conf to this system, since it was
|
|
# originally installed without the restored copy of that
|
|
# file.
|
|
run(
|
|
[
|
|
os.path.join(settings.DEPLOY_ROOT, "scripts", "zulip-puppet-apply"),
|
|
"-f",
|
|
],
|
|
)
|
|
|
|
# Now, restore the the database backup using pg_restore. This
|
|
# needs to run after zulip-puppet-apply to ensure full-text
|
|
# search extensions are available and installed.
|
|
run(as_postgres + ["pg_restore", "-d", db_name, "--", db_dir])
|
|
run(["chown", "-R", str(uid), "--", tmp])
|
|
os.setresuid(uid, uid, 0)
|
|
|
|
if settings.PRODUCTION:
|
|
run(["supervisorctl", "restart", "all"])
|
|
|
|
run([os.path.join(settings.DEPLOY_ROOT, "scripts", "setup", "flush-memcached")])
|
|
|
|
|
|
if __name__ == "__main__":
|
|
args = parser.parse_args()
|
|
|
|
with open(args.tarball, "rb") as tarball_file:
|
|
restore_backup(tarball_file)
|