|
|
|
@@ -442,16 +442,18 @@ func (e *Engine) restorePostgreSQLSQL(ctx context.Context, archivePath, targetDB
|
|
|
|
var cmd []string
|
|
|
|
var cmd []string
|
|
|
|
|
|
|
|
|
|
|
|
// For localhost, omit -h to use Unix socket (avoids Ident auth issues)
|
|
|
|
// For localhost, omit -h to use Unix socket (avoids Ident auth issues)
|
|
|
|
|
|
|
|
// But always include -p for port (in case of non-standard port)
|
|
|
|
hostArg := ""
|
|
|
|
hostArg := ""
|
|
|
|
|
|
|
|
portArg := fmt.Sprintf("-p %d", e.cfg.Port)
|
|
|
|
if e.cfg.Host != "localhost" && e.cfg.Host != "" {
|
|
|
|
if e.cfg.Host != "localhost" && e.cfg.Host != "" {
|
|
|
|
hostArg = fmt.Sprintf("-h %s -p %d", e.cfg.Host, e.cfg.Port)
|
|
|
|
hostArg = fmt.Sprintf("-h %s", e.cfg.Host)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
if compressed {
|
|
|
|
if compressed {
|
|
|
|
// Use ON_ERROR_STOP=1 to fail fast on first error (prevents millions of errors on truncated dumps)
|
|
|
|
// Use ON_ERROR_STOP=1 to fail fast on first error (prevents millions of errors on truncated dumps)
|
|
|
|
psqlCmd := fmt.Sprintf("psql -U %s -d %s -v ON_ERROR_STOP=1", e.cfg.User, targetDB)
|
|
|
|
psqlCmd := fmt.Sprintf("psql %s -U %s -d %s -v ON_ERROR_STOP=1", portArg, e.cfg.User, targetDB)
|
|
|
|
if hostArg != "" {
|
|
|
|
if hostArg != "" {
|
|
|
|
psqlCmd = fmt.Sprintf("psql %s -U %s -d %s -v ON_ERROR_STOP=1", hostArg, e.cfg.User, targetDB)
|
|
|
|
psqlCmd = fmt.Sprintf("psql %s %s -U %s -d %s -v ON_ERROR_STOP=1", hostArg, portArg, e.cfg.User, targetDB)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// Set PGPASSWORD in the bash command for password-less auth
|
|
|
|
// Set PGPASSWORD in the bash command for password-less auth
|
|
|
|
cmd = []string{
|
|
|
|
cmd = []string{
|
|
|
|
@@ -472,6 +474,7 @@ func (e *Engine) restorePostgreSQLSQL(ctx context.Context, archivePath, targetDB
|
|
|
|
} else {
|
|
|
|
} else {
|
|
|
|
cmd = []string{
|
|
|
|
cmd = []string{
|
|
|
|
"psql",
|
|
|
|
"psql",
|
|
|
|
|
|
|
|
"-p", fmt.Sprintf("%d", e.cfg.Port),
|
|
|
|
"-U", e.cfg.User,
|
|
|
|
"-U", e.cfg.User,
|
|
|
|
"-d", targetDB,
|
|
|
|
"-d", targetDB,
|
|
|
|
"-v", "ON_ERROR_STOP=1",
|
|
|
|
"-v", "ON_ERROR_STOP=1",
|
|
|
|
@@ -1084,6 +1087,16 @@ func (e *Engine) RestoreCluster(ctx context.Context, archivePath string) error {
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
}()
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
// Check for context cancellation before starting
|
|
|
|
|
|
|
|
if ctx.Err() != nil {
|
|
|
|
|
|
|
|
e.log.Warn("Context cancelled - skipping database restore", "file", filename)
|
|
|
|
|
|
|
|
atomic.AddInt32(&failCount, 1)
|
|
|
|
|
|
|
|
restoreErrorsMu.Lock()
|
|
|
|
|
|
|
|
restoreErrors = multierror.Append(restoreErrors, fmt.Errorf("%s: restore skipped (context cancelled)", strings.TrimSuffix(strings.TrimSuffix(filename, ".dump"), ".sql.gz")))
|
|
|
|
|
|
|
|
restoreErrorsMu.Unlock()
|
|
|
|
|
|
|
|
return
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// Track timing for this database restore
|
|
|
|
// Track timing for this database restore
|
|
|
|
dbRestoreStart := time.Now()
|
|
|
|
dbRestoreStart := time.Now()
|
|
|
|
|
|
|
|
|
|
|
|
@@ -1201,6 +1214,24 @@ func (e *Engine) RestoreCluster(ctx context.Context, archivePath string) error {
|
|
|
|
successCountFinal := int(atomic.LoadInt32(&successCount))
|
|
|
|
successCountFinal := int(atomic.LoadInt32(&successCount))
|
|
|
|
failCountFinal := int(atomic.LoadInt32(&failCount))
|
|
|
|
failCountFinal := int(atomic.LoadInt32(&failCount))
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
// SANITY CHECK: Verify all databases were accounted for
|
|
|
|
|
|
|
|
// This catches any goroutine that exited without updating counters
|
|
|
|
|
|
|
|
accountedFor := successCountFinal + failCountFinal
|
|
|
|
|
|
|
|
if accountedFor != totalDBs {
|
|
|
|
|
|
|
|
missingCount := totalDBs - accountedFor
|
|
|
|
|
|
|
|
e.log.Error("INTERNAL ERROR: Some database restore goroutines did not report status",
|
|
|
|
|
|
|
|
"expected", totalDBs,
|
|
|
|
|
|
|
|
"success", successCountFinal,
|
|
|
|
|
|
|
|
"failed", failCountFinal,
|
|
|
|
|
|
|
|
"unaccounted", missingCount)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
// Treat unaccounted databases as failures
|
|
|
|
|
|
|
|
failCountFinal += missingCount
|
|
|
|
|
|
|
|
restoreErrorsMu.Lock()
|
|
|
|
|
|
|
|
restoreErrors = multierror.Append(restoreErrors, fmt.Errorf("%d database(s) did not complete (possible goroutine crash or deadlock)", missingCount))
|
|
|
|
|
|
|
|
restoreErrorsMu.Unlock()
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// CRITICAL: Check if no databases were restored at all
|
|
|
|
// CRITICAL: Check if no databases were restored at all
|
|
|
|
if successCountFinal == 0 {
|
|
|
|
if successCountFinal == 0 {
|
|
|
|
e.progress.Fail(fmt.Sprintf("Cluster restore FAILED: 0 of %d databases restored", totalDBs))
|
|
|
|
e.progress.Fail(fmt.Sprintf("Cluster restore FAILED: 0 of %d databases restored", totalDBs))
|
|
|
|
@@ -1431,6 +1462,8 @@ func (e *Engine) extractArchiveShell(ctx context.Context, archivePath, destDir s
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// restoreGlobals restores global objects (roles, tablespaces)
|
|
|
|
// restoreGlobals restores global objects (roles, tablespaces)
|
|
|
|
|
|
|
|
// Note: psql returns 0 even when some statements fail (e.g., role already exists)
|
|
|
|
|
|
|
|
// We track errors but only fail on FATAL errors that would prevent restore
|
|
|
|
func (e *Engine) restoreGlobals(ctx context.Context, globalsFile string) error {
|
|
|
|
func (e *Engine) restoreGlobals(ctx context.Context, globalsFile string) error {
|
|
|
|
args := []string{
|
|
|
|
args := []string{
|
|
|
|
"-p", fmt.Sprintf("%d", e.cfg.Port),
|
|
|
|
"-p", fmt.Sprintf("%d", e.cfg.Port),
|
|
|
|
@@ -1460,6 +1493,8 @@ func (e *Engine) restoreGlobals(ctx context.Context, globalsFile string) error {
|
|
|
|
|
|
|
|
|
|
|
|
// Read stderr in chunks in goroutine
|
|
|
|
// Read stderr in chunks in goroutine
|
|
|
|
var lastError string
|
|
|
|
var lastError string
|
|
|
|
|
|
|
|
var errorCount int
|
|
|
|
|
|
|
|
var fatalError bool
|
|
|
|
stderrDone := make(chan struct{})
|
|
|
|
stderrDone := make(chan struct{})
|
|
|
|
go func() {
|
|
|
|
go func() {
|
|
|
|
defer close(stderrDone)
|
|
|
|
defer close(stderrDone)
|
|
|
|
@@ -1468,9 +1503,23 @@ func (e *Engine) restoreGlobals(ctx context.Context, globalsFile string) error {
|
|
|
|
n, err := stderr.Read(buf)
|
|
|
|
n, err := stderr.Read(buf)
|
|
|
|
if n > 0 {
|
|
|
|
if n > 0 {
|
|
|
|
chunk := string(buf[:n])
|
|
|
|
chunk := string(buf[:n])
|
|
|
|
if strings.Contains(chunk, "ERROR") || strings.Contains(chunk, "FATAL") {
|
|
|
|
// Track different error types
|
|
|
|
|
|
|
|
if strings.Contains(chunk, "FATAL") {
|
|
|
|
|
|
|
|
fatalError = true
|
|
|
|
lastError = chunk
|
|
|
|
lastError = chunk
|
|
|
|
e.log.Warn("Globals restore stderr", "output", chunk)
|
|
|
|
e.log.Error("Globals restore FATAL error", "output", chunk)
|
|
|
|
|
|
|
|
} else if strings.Contains(chunk, "ERROR") {
|
|
|
|
|
|
|
|
errorCount++
|
|
|
|
|
|
|
|
lastError = chunk
|
|
|
|
|
|
|
|
// Only log first few errors to avoid spam
|
|
|
|
|
|
|
|
if errorCount <= 5 {
|
|
|
|
|
|
|
|
// Check if it's an ignorable "already exists" error
|
|
|
|
|
|
|
|
if strings.Contains(chunk, "already exists") {
|
|
|
|
|
|
|
|
e.log.Debug("Globals restore: object already exists (expected)", "output", chunk)
|
|
|
|
|
|
|
|
} else {
|
|
|
|
|
|
|
|
e.log.Warn("Globals restore error", "output", chunk)
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
if err != nil {
|
|
|
|
@@ -1498,10 +1547,23 @@ func (e *Engine) restoreGlobals(ctx context.Context, globalsFile string) error {
|
|
|
|
|
|
|
|
|
|
|
|
<-stderrDone
|
|
|
|
<-stderrDone
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
// Only fail on actual command errors or FATAL PostgreSQL errors
|
|
|
|
|
|
|
|
// Regular ERROR messages (like "role already exists") are expected
|
|
|
|
if cmdErr != nil {
|
|
|
|
if cmdErr != nil {
|
|
|
|
return fmt.Errorf("failed to restore globals: %w (last error: %s)", cmdErr, lastError)
|
|
|
|
return fmt.Errorf("failed to restore globals: %w (last error: %s)", cmdErr, lastError)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
// If we had FATAL errors, those are real problems
|
|
|
|
|
|
|
|
if fatalError {
|
|
|
|
|
|
|
|
return fmt.Errorf("globals restore had FATAL error: %s", lastError)
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
// Log summary if there were errors (but don't fail)
|
|
|
|
|
|
|
|
if errorCount > 0 {
|
|
|
|
|
|
|
|
e.log.Info("Globals restore completed with some errors (usually 'already exists' - expected)",
|
|
|
|
|
|
|
|
"error_count", errorCount)
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
return nil
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
@@ -1569,6 +1631,7 @@ func (e *Engine) terminateConnections(ctx context.Context, dbName string) error
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// dropDatabaseIfExists drops a database completely (clean slate)
|
|
|
|
// dropDatabaseIfExists drops a database completely (clean slate)
|
|
|
|
|
|
|
|
// Uses PostgreSQL 13+ WITH (FORCE) option to forcefully drop even with active connections
|
|
|
|
func (e *Engine) dropDatabaseIfExists(ctx context.Context, dbName string) error {
|
|
|
|
func (e *Engine) dropDatabaseIfExists(ctx context.Context, dbName string) error {
|
|
|
|
// First terminate all connections
|
|
|
|
// First terminate all connections
|
|
|
|
if err := e.terminateConnections(ctx, dbName); err != nil {
|
|
|
|
if err := e.terminateConnections(ctx, dbName); err != nil {
|
|
|
|
@@ -1578,28 +1641,69 @@ func (e *Engine) dropDatabaseIfExists(ctx context.Context, dbName string) error
|
|
|
|
// Wait a moment for connections to terminate
|
|
|
|
// Wait a moment for connections to terminate
|
|
|
|
time.Sleep(500 * time.Millisecond)
|
|
|
|
time.Sleep(500 * time.Millisecond)
|
|
|
|
|
|
|
|
|
|
|
|
// Drop the database
|
|
|
|
// Try to revoke new connections (prevents race condition)
|
|
|
|
|
|
|
|
// This only works if we have the privilege to do so
|
|
|
|
|
|
|
|
revokeArgs := []string{
|
|
|
|
|
|
|
|
"-p", fmt.Sprintf("%d", e.cfg.Port),
|
|
|
|
|
|
|
|
"-U", e.cfg.User,
|
|
|
|
|
|
|
|
"-d", "postgres",
|
|
|
|
|
|
|
|
"-c", fmt.Sprintf("REVOKE CONNECT ON DATABASE \"%s\" FROM PUBLIC", dbName),
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
if e.cfg.Host != "localhost" && e.cfg.Host != "127.0.0.1" && e.cfg.Host != "" {
|
|
|
|
|
|
|
|
revokeArgs = append([]string{"-h", e.cfg.Host}, revokeArgs...)
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
revokeCmd := exec.CommandContext(ctx, "psql", revokeArgs...)
|
|
|
|
|
|
|
|
revokeCmd.Env = append(os.Environ(), fmt.Sprintf("PGPASSWORD=%s", e.cfg.Password))
|
|
|
|
|
|
|
|
revokeCmd.Run() // Ignore errors - database might not exist
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
// Terminate connections again after revoking connect privilege
|
|
|
|
|
|
|
|
e.terminateConnections(ctx, dbName)
|
|
|
|
|
|
|
|
time.Sleep(200 * time.Millisecond)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
// Try DROP DATABASE WITH (FORCE) first (PostgreSQL 13+)
|
|
|
|
|
|
|
|
// This forcefully terminates connections and drops the database atomically
|
|
|
|
|
|
|
|
forceArgs := []string{
|
|
|
|
|
|
|
|
"-p", fmt.Sprintf("%d", e.cfg.Port),
|
|
|
|
|
|
|
|
"-U", e.cfg.User,
|
|
|
|
|
|
|
|
"-d", "postgres",
|
|
|
|
|
|
|
|
"-c", fmt.Sprintf("DROP DATABASE IF EXISTS \"%s\" WITH (FORCE)", dbName),
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
if e.cfg.Host != "localhost" && e.cfg.Host != "127.0.0.1" && e.cfg.Host != "" {
|
|
|
|
|
|
|
|
forceArgs = append([]string{"-h", e.cfg.Host}, forceArgs...)
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
forceCmd := exec.CommandContext(ctx, "psql", forceArgs...)
|
|
|
|
|
|
|
|
forceCmd.Env = append(os.Environ(), fmt.Sprintf("PGPASSWORD=%s", e.cfg.Password))
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
output, err := forceCmd.CombinedOutput()
|
|
|
|
|
|
|
|
if err == nil {
|
|
|
|
|
|
|
|
e.log.Info("Dropped existing database (with FORCE)", "name", dbName)
|
|
|
|
|
|
|
|
return nil
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
// If FORCE option failed (PostgreSQL < 13), try regular drop
|
|
|
|
|
|
|
|
if strings.Contains(string(output), "syntax error") || strings.Contains(string(output), "WITH (FORCE)") {
|
|
|
|
|
|
|
|
e.log.Debug("WITH (FORCE) not supported, using standard DROP", "name", dbName)
|
|
|
|
|
|
|
|
|
|
|
|
args := []string{
|
|
|
|
args := []string{
|
|
|
|
"-p", fmt.Sprintf("%d", e.cfg.Port),
|
|
|
|
"-p", fmt.Sprintf("%d", e.cfg.Port),
|
|
|
|
"-U", e.cfg.User,
|
|
|
|
"-U", e.cfg.User,
|
|
|
|
"-d", "postgres",
|
|
|
|
"-d", "postgres",
|
|
|
|
"-c", fmt.Sprintf("DROP DATABASE IF EXISTS \"%s\"", dbName),
|
|
|
|
"-c", fmt.Sprintf("DROP DATABASE IF EXISTS \"%s\"", dbName),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// Only add -h flag if host is not localhost (to use Unix socket for peer auth)
|
|
|
|
|
|
|
|
if e.cfg.Host != "localhost" && e.cfg.Host != "127.0.0.1" && e.cfg.Host != "" {
|
|
|
|
if e.cfg.Host != "localhost" && e.cfg.Host != "127.0.0.1" && e.cfg.Host != "" {
|
|
|
|
args = append([]string{"-h", e.cfg.Host}, args...)
|
|
|
|
args = append([]string{"-h", e.cfg.Host}, args...)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
cmd := exec.CommandContext(ctx, "psql", args...)
|
|
|
|
cmd := exec.CommandContext(ctx, "psql", args...)
|
|
|
|
|
|
|
|
|
|
|
|
// Always set PGPASSWORD (empty string is fine for peer/ident auth)
|
|
|
|
|
|
|
|
cmd.Env = append(os.Environ(), fmt.Sprintf("PGPASSWORD=%s", e.cfg.Password))
|
|
|
|
cmd.Env = append(os.Environ(), fmt.Sprintf("PGPASSWORD=%s", e.cfg.Password))
|
|
|
|
|
|
|
|
|
|
|
|
output, err := cmd.CombinedOutput()
|
|
|
|
output, err = cmd.CombinedOutput()
|
|
|
|
if err != nil {
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("failed to drop database '%s': %w\nOutput: %s", dbName, err, string(output))
|
|
|
|
return fmt.Errorf("failed to drop database '%s': %w\nOutput: %s", dbName, err, string(output))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
} else if err != nil {
|
|
|
|
|
|
|
|
return fmt.Errorf("failed to drop database '%s': %w\nOutput: %s", dbName, err, string(output))
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
e.log.Info("Dropped existing database", "name", dbName)
|
|
|
|
e.log.Info("Dropped existing database", "name", dbName)
|
|
|
|
return nil
|
|
|
|
return nil
|
|
|
|
@@ -1640,12 +1744,14 @@ func (e *Engine) ensureMySQLDatabaseExists(ctx context.Context, dbName string) e
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// ensurePostgresDatabaseExists checks if a PostgreSQL database exists and creates it if not
|
|
|
|
// ensurePostgresDatabaseExists checks if a PostgreSQL database exists and creates it if not
|
|
|
|
|
|
|
|
// It attempts to extract encoding/locale from the dump file to preserve original settings
|
|
|
|
func (e *Engine) ensurePostgresDatabaseExists(ctx context.Context, dbName string) error {
|
|
|
|
func (e *Engine) ensurePostgresDatabaseExists(ctx context.Context, dbName string) error {
|
|
|
|
// Skip creation for postgres and template databases - they should already exist
|
|
|
|
// Skip creation for postgres and template databases - they should already exist
|
|
|
|
if dbName == "postgres" || dbName == "template0" || dbName == "template1" {
|
|
|
|
if dbName == "postgres" || dbName == "template0" || dbName == "template1" {
|
|
|
|
e.log.Info("Skipping create for system database (assume exists)", "name", dbName)
|
|
|
|
e.log.Info("Skipping create for system database (assume exists)", "name", dbName)
|
|
|
|
return nil
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// Build psql command with authentication
|
|
|
|
// Build psql command with authentication
|
|
|
|
buildPsqlCmd := func(ctx context.Context, database, query string) *exec.Cmd {
|
|
|
|
buildPsqlCmd := func(ctx context.Context, database, query string) *exec.Cmd {
|
|
|
|
args := []string{
|
|
|
|
args := []string{
|
|
|
|
@@ -1685,14 +1791,31 @@ func (e *Engine) ensurePostgresDatabaseExists(ctx context.Context, dbName string
|
|
|
|
|
|
|
|
|
|
|
|
// Database doesn't exist, create it
|
|
|
|
// Database doesn't exist, create it
|
|
|
|
// IMPORTANT: Use template0 to avoid duplicate definition errors from local additions to template1
|
|
|
|
// IMPORTANT: Use template0 to avoid duplicate definition errors from local additions to template1
|
|
|
|
|
|
|
|
// Also use UTF8 encoding explicitly as it's the most common and safest choice
|
|
|
|
// See PostgreSQL docs: https://www.postgresql.org/docs/current/app-pgrestore.html#APP-PGRESTORE-NOTES
|
|
|
|
// See PostgreSQL docs: https://www.postgresql.org/docs/current/app-pgrestore.html#APP-PGRESTORE-NOTES
|
|
|
|
e.log.Info("Creating database from template0", "name", dbName)
|
|
|
|
e.log.Info("Creating database from template0 with UTF8 encoding", "name", dbName)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
// Get server's default locale for LC_COLLATE and LC_CTYPE
|
|
|
|
|
|
|
|
// This ensures compatibility while using the correct encoding
|
|
|
|
|
|
|
|
localeCmd := buildPsqlCmd(ctx, "postgres", "SHOW lc_collate")
|
|
|
|
|
|
|
|
localeOutput, _ := localeCmd.CombinedOutput()
|
|
|
|
|
|
|
|
serverLocale := strings.TrimSpace(string(localeOutput))
|
|
|
|
|
|
|
|
if serverLocale == "" {
|
|
|
|
|
|
|
|
serverLocale = "en_US.UTF-8" // Fallback to common default
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
// Build CREATE DATABASE command with encoding and locale
|
|
|
|
|
|
|
|
// Using ENCODING 'UTF8' explicitly ensures the dump can be restored
|
|
|
|
|
|
|
|
createSQL := fmt.Sprintf(
|
|
|
|
|
|
|
|
"CREATE DATABASE \"%s\" WITH TEMPLATE template0 ENCODING 'UTF8' LC_COLLATE '%s' LC_CTYPE '%s'",
|
|
|
|
|
|
|
|
dbName, serverLocale, serverLocale,
|
|
|
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
|
|
createArgs := []string{
|
|
|
|
createArgs := []string{
|
|
|
|
"-p", fmt.Sprintf("%d", e.cfg.Port),
|
|
|
|
"-p", fmt.Sprintf("%d", e.cfg.Port),
|
|
|
|
"-U", e.cfg.User,
|
|
|
|
"-U", e.cfg.User,
|
|
|
|
"-d", "postgres",
|
|
|
|
"-d", "postgres",
|
|
|
|
"-c", fmt.Sprintf("CREATE DATABASE \"%s\" WITH TEMPLATE template0", dbName),
|
|
|
|
"-c", createSQL,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// Only add -h flag if host is not localhost (to use Unix socket for peer auth)
|
|
|
|
// Only add -h flag if host is not localhost (to use Unix socket for peer auth)
|
|
|
|
@@ -1707,10 +1830,28 @@ func (e *Engine) ensurePostgresDatabaseExists(ctx context.Context, dbName string
|
|
|
|
|
|
|
|
|
|
|
|
output, err = createCmd.CombinedOutput()
|
|
|
|
output, err = createCmd.CombinedOutput()
|
|
|
|
if err != nil {
|
|
|
|
if err != nil {
|
|
|
|
// Log the error and include the psql output in the returned error to aid debugging
|
|
|
|
// If encoding/locale fails, try simpler CREATE DATABASE
|
|
|
|
|
|
|
|
e.log.Warn("Database creation with encoding failed, trying simple create", "name", dbName, "error", err)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
simpleArgs := []string{
|
|
|
|
|
|
|
|
"-p", fmt.Sprintf("%d", e.cfg.Port),
|
|
|
|
|
|
|
|
"-U", e.cfg.User,
|
|
|
|
|
|
|
|
"-d", "postgres",
|
|
|
|
|
|
|
|
"-c", fmt.Sprintf("CREATE DATABASE \"%s\" WITH TEMPLATE template0", dbName),
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
if e.cfg.Host != "localhost" && e.cfg.Host != "127.0.0.1" && e.cfg.Host != "" {
|
|
|
|
|
|
|
|
simpleArgs = append([]string{"-h", e.cfg.Host}, simpleArgs...)
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
simpleCmd := exec.CommandContext(ctx, "psql", simpleArgs...)
|
|
|
|
|
|
|
|
simpleCmd.Env = append(os.Environ(), fmt.Sprintf("PGPASSWORD=%s", e.cfg.Password))
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
output, err = simpleCmd.CombinedOutput()
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
e.log.Warn("Database creation failed", "name", dbName, "error", err, "output", string(output))
|
|
|
|
e.log.Warn("Database creation failed", "name", dbName, "error", err, "output", string(output))
|
|
|
|
return fmt.Errorf("failed to create database '%s': %w (output: %s)", dbName, err, strings.TrimSpace(string(output)))
|
|
|
|
return fmt.Errorf("failed to create database '%s': %w (output: %s)", dbName, err, strings.TrimSpace(string(output)))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
e.log.Info("Successfully created database from template0", "name", dbName)
|
|
|
|
e.log.Info("Successfully created database from template0", "name", dbName)
|
|
|
|
return nil
|
|
|
|
return nil
|
|
|
|
@@ -2049,28 +2190,65 @@ func (e *Engine) boostPostgreSQLSettings(ctx context.Context, lockBoostValue int
|
|
|
|
// Wait for PostgreSQL to be ready
|
|
|
|
// Wait for PostgreSQL to be ready
|
|
|
|
time.Sleep(3 * time.Second)
|
|
|
|
time.Sleep(3 * time.Second)
|
|
|
|
} else {
|
|
|
|
} else {
|
|
|
|
// Cannot restart - warn user loudly
|
|
|
|
// Cannot restart - warn user but continue
|
|
|
|
e.log.Error("=" + strings.Repeat("=", 70))
|
|
|
|
// The setting is written to postgresql.auto.conf and will take effect on next restart
|
|
|
|
e.log.Error("WARNING: max_locks_per_transaction change requires PostgreSQL restart!")
|
|
|
|
e.log.Warn("=" + strings.Repeat("=", 70))
|
|
|
|
e.log.Error("Current value: " + strconv.Itoa(original.MaxLocks) + ", needed: " + strconv.Itoa(lockBoostValue))
|
|
|
|
e.log.Warn("NOTE: max_locks_per_transaction change requires PostgreSQL restart")
|
|
|
|
e.log.Error("Restore may fail with 'out of shared memory' error on BLOB-heavy databases.")
|
|
|
|
e.log.Warn("Current value: " + strconv.Itoa(original.MaxLocks) + ", target: " + strconv.Itoa(lockBoostValue))
|
|
|
|
e.log.Error("")
|
|
|
|
e.log.Warn("")
|
|
|
|
e.log.Error("To fix manually:")
|
|
|
|
e.log.Warn("The setting has been saved to postgresql.auto.conf and will take")
|
|
|
|
e.log.Error(" 1. sudo systemctl restart postgresql")
|
|
|
|
e.log.Warn("effect on the next PostgreSQL restart. If restore fails with")
|
|
|
|
e.log.Error(" 2. Or: sudo -u postgres pg_ctl restart -D $PGDATA")
|
|
|
|
e.log.Warn("'out of shared memory' errors, ask your DBA to restart PostgreSQL.")
|
|
|
|
e.log.Error(" 3. Then re-run the restore")
|
|
|
|
e.log.Warn("")
|
|
|
|
e.log.Error("=" + strings.Repeat("=", 70))
|
|
|
|
e.log.Warn("Continuing with restore - this may succeed if your databases")
|
|
|
|
// Continue anyway - might work for small restores
|
|
|
|
e.log.Warn("don't have many large objects (BLOBs).")
|
|
|
|
|
|
|
|
e.log.Warn("=" + strings.Repeat("=", 70))
|
|
|
|
|
|
|
|
// Continue anyway - might work for small restores or DBs without BLOBs
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
return original, nil
|
|
|
|
return original, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
// canRestartPostgreSQL checks if we have the ability to restart PostgreSQL
|
|
|
|
|
|
|
|
// Returns false if running in a restricted environment (e.g., su postgres on enterprise systems)
|
|
|
|
|
|
|
|
func (e *Engine) canRestartPostgreSQL() bool {
|
|
|
|
|
|
|
|
// Check if we're running as postgres user - if so, we likely can't restart
|
|
|
|
|
|
|
|
// because PostgreSQL is managed by init/systemd, not directly by pg_ctl
|
|
|
|
|
|
|
|
currentUser := os.Getenv("USER")
|
|
|
|
|
|
|
|
if currentUser == "" {
|
|
|
|
|
|
|
|
currentUser = os.Getenv("LOGNAME")
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
// If we're the postgres user, check if we have sudo access
|
|
|
|
|
|
|
|
if currentUser == "postgres" {
|
|
|
|
|
|
|
|
// Try a quick sudo check - if this fails, we can't restart
|
|
|
|
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 2*time.Second)
|
|
|
|
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
cmd := exec.CommandContext(ctx, "sudo", "-n", "true")
|
|
|
|
|
|
|
|
cmd.Stdin = nil
|
|
|
|
|
|
|
|
if err := cmd.Run(); err != nil {
|
|
|
|
|
|
|
|
e.log.Info("Running as postgres user without sudo access - cannot restart PostgreSQL",
|
|
|
|
|
|
|
|
"user", currentUser,
|
|
|
|
|
|
|
|
"hint", "Ask system administrator to restart PostgreSQL if needed")
|
|
|
|
|
|
|
|
return false
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
return true
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// tryRestartPostgreSQL attempts to restart PostgreSQL using various methods
|
|
|
|
// tryRestartPostgreSQL attempts to restart PostgreSQL using various methods
|
|
|
|
// Returns true if restart was successful
|
|
|
|
// Returns true if restart was successful
|
|
|
|
// IMPORTANT: Uses short timeouts and non-interactive sudo to avoid blocking on password prompts
|
|
|
|
// IMPORTANT: Uses short timeouts and non-interactive sudo to avoid blocking on password prompts
|
|
|
|
|
|
|
|
// NOTE: This function will return false immediately if running as postgres without sudo
|
|
|
|
func (e *Engine) tryRestartPostgreSQL(ctx context.Context) bool {
|
|
|
|
func (e *Engine) tryRestartPostgreSQL(ctx context.Context) bool {
|
|
|
|
|
|
|
|
// First check if we can even attempt a restart
|
|
|
|
|
|
|
|
if !e.canRestartPostgreSQL() {
|
|
|
|
|
|
|
|
e.log.Info("Skipping PostgreSQL restart attempt (no privileges)")
|
|
|
|
|
|
|
|
return false
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
e.progress.Update("Attempting PostgreSQL restart for lock settings...")
|
|
|
|
e.progress.Update("Attempting PostgreSQL restart for lock settings...")
|
|
|
|
|
|
|
|
|
|
|
|
// Use short timeout for each restart attempt (don't block on sudo password prompts)
|
|
|
|
// Use short timeout for each restart attempt (don't block on sudo password prompts)
|
|
|
|
|