mirror of
https://github.com/kevinveenbirkenbach/docker-volume-backup.git
synced 2025-12-27 02:56:36 +00:00
refactor: migrate to src/ package + add DinD-based E2E runner with debug artifacts
- Replace legacy standalone scripts with a proper src-layout Python package (baudolo backup/restore/configure entrypoints via pyproject.toml) - Remove old scripts/files (backup-docker-to-local.py, recover-docker-from-local.sh, databases.csv.tpl, Todo.md) - Add Dockerfile to build the project image for local/E2E usage - Update Makefile: build image and run E2E via external runner script - Add scripts/test-e2e.sh: - start DinD + dedicated network - recreate DinD data volume (and shared /tmp volume) - pre-pull helper images (alpine-rsync, alpine) - load local baudolo:local image into DinD - run unittest E2E suite inside DinD and abort on first failure - on failure: dump host+DinD diagnostics and archive shared /tmp into artifacts/ - Add artifacts/ debug outputs produced by failing E2E runs (logs, events, tmp archive) https://chatgpt.com/share/694ec23f-0794-800f-9a59-8365bc80f435
This commit is contained in:
34
Dockerfile
Normal file
34
Dockerfile
Normal file
@@ -0,0 +1,34 @@
|
|||||||
|
# syntax=docker/dockerfile:1
|
||||||
|
FROM python:3.11-slim
|
||||||
|
|
||||||
|
WORKDIR /app
|
||||||
|
|
||||||
|
# Runtime + build essentials:
|
||||||
|
# - rsync: required for file backup/restore
|
||||||
|
# - ca-certificates: TLS
|
||||||
|
# - docker-cli: needed if you want to control the host Docker engine (via /var/run/docker.sock mount)
|
||||||
|
# - make: to delegate install logic to Makefile
|
||||||
|
#
|
||||||
|
# Notes:
|
||||||
|
# - On Debian slim, the docker client package is typically "docker.io".
|
||||||
|
# - If you only want restore-without-docker, you can drop docker.io later.
|
||||||
|
RUN apt-get update && apt-get install -y --no-install-recommends \
|
||||||
|
make \
|
||||||
|
rsync \
|
||||||
|
ca-certificates \
|
||||||
|
docker-cli \
|
||||||
|
&& rm -rf /var/lib/apt/lists/*
|
||||||
|
|
||||||
|
# Fail fast if docker client is missing
|
||||||
|
RUN command -v docker
|
||||||
|
|
||||||
|
COPY . .
|
||||||
|
|
||||||
|
# All install decisions are handled by the Makefile.
|
||||||
|
RUN make install
|
||||||
|
|
||||||
|
# Sensible defaults (can be overridden at runtime)
|
||||||
|
ENV PYTHONUNBUFFERED=1
|
||||||
|
|
||||||
|
# Default: show CLI help
|
||||||
|
CMD ["baudolo", "--help"]
|
||||||
47
Makefile
47
Makefile
@@ -1,12 +1,41 @@
|
|||||||
.PHONY: test
|
.PHONY: install build test-e2e
|
||||||
|
|
||||||
test:
|
# Default python if no venv is active
|
||||||
python -m unittest discover -s tests/unit -p "test_*.py"
|
PY_DEFAULT ?= python3
|
||||||
|
|
||||||
|
IMAGE_NAME ?= baudolo
|
||||||
|
IMAGE_TAG ?= local
|
||||||
|
IMAGE := $(IMAGE_NAME):$(IMAGE_TAG)
|
||||||
|
|
||||||
install:
|
install:
|
||||||
@echo ">> Installation instructions:"
|
@set -eu; \
|
||||||
@echo " This software can be installed with pkgmgr under the alias 'baudolo':"
|
PY="$(PY_DEFAULT)"; \
|
||||||
@echo " pkgmgr install baudolo"
|
if [ -n "$${VIRTUAL_ENV:-}" ] && [ -x "$${VIRTUAL_ENV}/bin/python" ]; then \
|
||||||
@echo ""
|
PY="$${VIRTUAL_ENV}/bin/python"; \
|
||||||
@echo " 📦 pkgmgr project page:"
|
fi; \
|
||||||
@echo " https://github.com/kevinveenbirkenbach/package-manager"
|
echo ">>> Using python: $$PY"; \
|
||||||
|
"$$PY" -m pip install --upgrade pip; \
|
||||||
|
"$$PY" -m pip install -e .; \
|
||||||
|
command -v baudolo >/dev/null 2>&1 || { \
|
||||||
|
echo "ERROR: baudolo not found on PATH after install"; \
|
||||||
|
exit 2; \
|
||||||
|
}; \
|
||||||
|
baudolo --help >/dev/null 2>&1 || true
|
||||||
|
|
||||||
|
# ------------------------------------------------------------
|
||||||
|
# Build the baudolo Docker image
|
||||||
|
# ------------------------------------------------------------
|
||||||
|
build:
|
||||||
|
@echo ">> Building Docker image $(IMAGE)"
|
||||||
|
docker build -t $(IMAGE) .
|
||||||
|
|
||||||
|
# ------------------------------------------------------------
|
||||||
|
# Run E2E tests inside the container (Docker socket required)
|
||||||
|
# ------------------------------------------------------------
|
||||||
|
# E2E via isolated Docker-in-Docker (DinD)
|
||||||
|
# - depends on local image build
|
||||||
|
# - starts a DinD daemon container on a dedicated network
|
||||||
|
# - loads the freshly built image into DinD
|
||||||
|
# - runs the unittest suite inside a container that talks to DinD via DOCKER_HOST
|
||||||
|
test-e2e: build
|
||||||
|
@bash scripts/test-e2e.sh
|
||||||
35
artifacts/debug-dind-20251226141235.txt
Normal file
35
artifacts/debug-dind-20251226141235.txt
Normal file
@@ -0,0 +1,35 @@
|
|||||||
|
=== docker -H ps -a ===
|
||||||
|
CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES
|
||||||
|
18ef5793cfc5 postgres:16 "docker-entrypoint.s…" 4 seconds ago Up 3 seconds 5432/tcp baudolo-e2e-postgres-nocopy-15d1e23327-pg
|
||||||
|
875008fe1e9e postgres:16 "docker-entrypoint.s…" 7 seconds ago Up 6 seconds 5432/tcp baudolo-e2e-postgres-full-e9784b8d4b-pg
|
||||||
|
0b87b8fdc76b mariadb:11 "docker-entrypoint.s…" 44 seconds ago Up 43 seconds 3306/tcp baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb
|
||||||
|
c5ac9491eae2 mariadb:11 "docker-entrypoint.s…" 54 seconds ago Up 53 seconds 3306/tcp baudolo-e2e-mariadb-full-0790ca5d41-mariadb
|
||||||
|
|
||||||
|
=== docker -H images ===
|
||||||
|
WARNING: This output is designed for human readability. For machine-readable output, please use --format.
|
||||||
|
IMAGE ID DISK USAGE CONTENT SIZE EXTRA
|
||||||
|
alpine:3.20 765942a40399 12.2MB 3.71MB
|
||||||
|
baudolo:local 4fb7be431f63 763MB 368MB
|
||||||
|
ghcr.io/kevinveenbirkenbach/alpine-rsync:latest 049c6ec3dad7 21.1MB 7.53MB
|
||||||
|
mariadb:11 1cac8492bd78 465MB 111MB U
|
||||||
|
postgres:16 d4c3314b2dd7 612MB 136MB U
|
||||||
|
|
||||||
|
=== docker -H network ls ===
|
||||||
|
NETWORK ID NAME DRIVER SCOPE
|
||||||
|
273bd12dbccf bridge bridge local
|
||||||
|
6077eae1cce0 host host local
|
||||||
|
2e037141bfd4 none null local
|
||||||
|
|
||||||
|
=== docker -H volume ls ===
|
||||||
|
DRIVER VOLUME NAME
|
||||||
|
local baudolo-e2e-mariadb-full-0790ca5d41-mariadb-vol
|
||||||
|
local baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb-vol
|
||||||
|
local baudolo-e2e-postgres-full-e9784b8d4b-pg-vol
|
||||||
|
local baudolo-e2e-postgres-nocopy-15d1e23327-pg-vol
|
||||||
|
|
||||||
|
=== docker -H system df ===
|
||||||
|
TYPE TOTAL ACTIVE SIZE RECLAIMABLE
|
||||||
|
Images 5 2 1.785GB 1.076GB (60%)
|
||||||
|
Containers 4 4 90.11kB 0B (0%)
|
||||||
|
Local Volumes 4 4 433MB 0B (0%)
|
||||||
|
Build Cache 0 0 0B 0B
|
||||||
25
artifacts/debug-dind-20251226180030.txt
Normal file
25
artifacts/debug-dind-20251226180030.txt
Normal file
@@ -0,0 +1,25 @@
|
|||||||
|
=== docker -H ps -a ===
|
||||||
|
CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES
|
||||||
|
|
||||||
|
=== docker -H images ===
|
||||||
|
WARNING: This output is designed for human readability. For machine-readable output, please use --format.
|
||||||
|
IMAGE ID DISK USAGE CONTENT SIZE EXTRA
|
||||||
|
alpine:3.20 765942a40399 12.2MB 3.71MB
|
||||||
|
baudolo:local 0bc9b158f3e8 763MB 368MB
|
||||||
|
ghcr.io/kevinveenbirkenbach/alpine-rsync:latest 049c6ec3dad7 21.1MB 7.53MB
|
||||||
|
|
||||||
|
=== docker -H network ls ===
|
||||||
|
NETWORK ID NAME DRIVER SCOPE
|
||||||
|
43f0f11bd281 bridge bridge local
|
||||||
|
2390bc99b893 host host local
|
||||||
|
0f26ae890b2e none null local
|
||||||
|
|
||||||
|
=== docker -H volume ls ===
|
||||||
|
DRIVER VOLUME NAME
|
||||||
|
|
||||||
|
=== docker -H system df ===
|
||||||
|
TYPE TOTAL ACTIVE SIZE RECLAIMABLE
|
||||||
|
Images 3 0 796.2MB 10.82kB (0%)
|
||||||
|
Containers 0 0 0B 0B
|
||||||
|
Local Volumes 0 0 0B 0B
|
||||||
|
Build Cache 0 0 0B 0B
|
||||||
25
artifacts/debug-dind-20251226180450.txt
Normal file
25
artifacts/debug-dind-20251226180450.txt
Normal file
@@ -0,0 +1,25 @@
|
|||||||
|
=== docker -H ps -a ===
|
||||||
|
CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES
|
||||||
|
|
||||||
|
=== docker -H images ===
|
||||||
|
WARNING: This output is designed for human readability. For machine-readable output, please use --format.
|
||||||
|
IMAGE ID DISK USAGE CONTENT SIZE EXTRA
|
||||||
|
alpine:3.20 765942a40399 12.2MB 3.71MB
|
||||||
|
baudolo:local 84e1ce4363e7 763MB 368MB
|
||||||
|
ghcr.io/kevinveenbirkenbach/alpine-rsync:latest 049c6ec3dad7 21.1MB 7.53MB
|
||||||
|
|
||||||
|
=== docker -H network ls ===
|
||||||
|
NETWORK ID NAME DRIVER SCOPE
|
||||||
|
f9303d265b7c bridge bridge local
|
||||||
|
5bb6398b93ad host host local
|
||||||
|
bf26d6f0dd45 none null local
|
||||||
|
|
||||||
|
=== docker -H volume ls ===
|
||||||
|
DRIVER VOLUME NAME
|
||||||
|
|
||||||
|
=== docker -H system df ===
|
||||||
|
TYPE TOTAL ACTIVE SIZE RECLAIMABLE
|
||||||
|
Images 3 0 796.3MB 10.82kB (0%)
|
||||||
|
Containers 0 0 0B 0B
|
||||||
|
Local Volumes 0 0 0B 0B
|
||||||
|
Build Cache 0 0 0B 0B
|
||||||
121
artifacts/debug-host-20251226141235.txt
Normal file
121
artifacts/debug-host-20251226141235.txt
Normal file
@@ -0,0 +1,121 @@
|
|||||||
|
=== Host docker version ===
|
||||||
|
Client:
|
||||||
|
Version: 29.1.1
|
||||||
|
API version: 1.52
|
||||||
|
Go version: go1.25.4 X:nodwarf5
|
||||||
|
Git commit: 0aedba58c2
|
||||||
|
Built: Fri Nov 28 14:28:26 2025
|
||||||
|
OS/Arch: linux/amd64
|
||||||
|
Context: default
|
||||||
|
|
||||||
|
Server:
|
||||||
|
Engine:
|
||||||
|
Version: 29.1.1
|
||||||
|
API version: 1.52 (minimum version 1.44)
|
||||||
|
Go version: go1.25.4 X:nodwarf5
|
||||||
|
Git commit: 9a84135d52
|
||||||
|
Built: Fri Nov 28 14:28:26 2025
|
||||||
|
OS/Arch: linux/amd64
|
||||||
|
Experimental: false
|
||||||
|
containerd:
|
||||||
|
Version: v2.2.0
|
||||||
|
GitCommit: 1c4457e00facac03ce1d75f7b6777a7a851e5c41.m
|
||||||
|
runc:
|
||||||
|
Version: 1.4.0
|
||||||
|
GitCommit:
|
||||||
|
docker-init:
|
||||||
|
Version: 0.19.0
|
||||||
|
GitCommit: de40ad0
|
||||||
|
|
||||||
|
=== Host docker info ===
|
||||||
|
Client:
|
||||||
|
Version: 29.1.1
|
||||||
|
Context: default
|
||||||
|
Debug Mode: false
|
||||||
|
Plugins:
|
||||||
|
compose: Docker Compose (Docker Inc.)
|
||||||
|
Version: 2.40.3
|
||||||
|
Path: /usr/lib/docker/cli-plugins/docker-compose
|
||||||
|
|
||||||
|
Server:
|
||||||
|
Containers: 18
|
||||||
|
Running: 17
|
||||||
|
Paused: 0
|
||||||
|
Stopped: 1
|
||||||
|
Images: 79
|
||||||
|
Server Version: 29.1.1
|
||||||
|
Storage Driver: overlay2
|
||||||
|
Backing Filesystem: extfs
|
||||||
|
Supports d_type: true
|
||||||
|
Using metacopy: true
|
||||||
|
Native Overlay Diff: false
|
||||||
|
userxattr: false
|
||||||
|
Logging Driver: json-file
|
||||||
|
Cgroup Driver: systemd
|
||||||
|
Cgroup Version: 2
|
||||||
|
Plugins:
|
||||||
|
Volume: local
|
||||||
|
Network: bridge host ipvlan macvlan null overlay
|
||||||
|
Log: awslogs fluentd gcplogs gelf journald json-file local splunk syslog
|
||||||
|
CDI spec directories:
|
||||||
|
/etc/cdi
|
||||||
|
/var/run/cdi
|
||||||
|
Swarm: inactive
|
||||||
|
Runtimes: runc io.containerd.runc.v2
|
||||||
|
Default Runtime: runc
|
||||||
|
Init Binary: docker-init
|
||||||
|
containerd version: 1c4457e00facac03ce1d75f7b6777a7a851e5c41.m
|
||||||
|
runc version:
|
||||||
|
init version: de40ad0
|
||||||
|
Security Options:
|
||||||
|
apparmor
|
||||||
|
seccomp
|
||||||
|
Profile: builtin
|
||||||
|
cgroupns
|
||||||
|
Kernel Version: 6.12.62-1-MANJARO
|
||||||
|
Operating System: Manjaro Linux
|
||||||
|
OSType: linux
|
||||||
|
Architecture: x86_64
|
||||||
|
CPUs: 20
|
||||||
|
Total Memory: 62.5GiB
|
||||||
|
Name: msi-stealth-gs66
|
||||||
|
ID: f68c344d-ed27-440f-8f77-fb048e1a4ea4
|
||||||
|
Docker Root Dir: /var/lib/docker
|
||||||
|
Debug Mode: false
|
||||||
|
Experimental: false
|
||||||
|
Insecure Registries:
|
||||||
|
127.0.0.0/8
|
||||||
|
::1/128
|
||||||
|
Live Restore Enabled: false
|
||||||
|
Firewall Backend: iptables
|
||||||
|
|
||||||
|
|
||||||
|
=== DinD reachable? (docker -H tcp://127.0.0.1:2375 version) ===
|
||||||
|
Client:
|
||||||
|
Version: 29.1.1
|
||||||
|
API version: 1.52
|
||||||
|
Go version: go1.25.4 X:nodwarf5
|
||||||
|
Git commit: 0aedba58c2
|
||||||
|
Built: Fri Nov 28 14:28:26 2025
|
||||||
|
OS/Arch: linux/amd64
|
||||||
|
Context: default
|
||||||
|
|
||||||
|
Server: Docker Engine - Community
|
||||||
|
Engine:
|
||||||
|
Version: 29.1.3
|
||||||
|
API version: 1.52 (minimum version 1.44)
|
||||||
|
Go version: go1.25.5
|
||||||
|
Git commit: fbf3ed2
|
||||||
|
Built: Fri Dec 12 14:51:14 2025
|
||||||
|
OS/Arch: linux/amd64
|
||||||
|
Experimental: false
|
||||||
|
containerd:
|
||||||
|
Version: v2.2.0
|
||||||
|
GitCommit: 1c4457e00facac03ce1d75f7b6777a7a851e5c41
|
||||||
|
runc:
|
||||||
|
Version: 1.3.4
|
||||||
|
GitCommit: v1.3.4-0-gd6d73eb
|
||||||
|
docker-init:
|
||||||
|
Version: 0.19.0
|
||||||
|
GitCommit: de40ad0
|
||||||
|
|
||||||
121
artifacts/debug-host-20251226180030.txt
Normal file
121
artifacts/debug-host-20251226180030.txt
Normal file
@@ -0,0 +1,121 @@
|
|||||||
|
=== Host docker version ===
|
||||||
|
Client:
|
||||||
|
Version: 29.1.1
|
||||||
|
API version: 1.52
|
||||||
|
Go version: go1.25.4 X:nodwarf5
|
||||||
|
Git commit: 0aedba58c2
|
||||||
|
Built: Fri Nov 28 14:28:26 2025
|
||||||
|
OS/Arch: linux/amd64
|
||||||
|
Context: default
|
||||||
|
|
||||||
|
Server:
|
||||||
|
Engine:
|
||||||
|
Version: 29.1.1
|
||||||
|
API version: 1.52 (minimum version 1.44)
|
||||||
|
Go version: go1.25.4 X:nodwarf5
|
||||||
|
Git commit: 9a84135d52
|
||||||
|
Built: Fri Nov 28 14:28:26 2025
|
||||||
|
OS/Arch: linux/amd64
|
||||||
|
Experimental: false
|
||||||
|
containerd:
|
||||||
|
Version: v2.2.0
|
||||||
|
GitCommit: 1c4457e00facac03ce1d75f7b6777a7a851e5c41.m
|
||||||
|
runc:
|
||||||
|
Version: 1.4.0
|
||||||
|
GitCommit:
|
||||||
|
docker-init:
|
||||||
|
Version: 0.19.0
|
||||||
|
GitCommit: de40ad0
|
||||||
|
|
||||||
|
=== Host docker info ===
|
||||||
|
Client:
|
||||||
|
Version: 29.1.1
|
||||||
|
Context: default
|
||||||
|
Debug Mode: false
|
||||||
|
Plugins:
|
||||||
|
compose: Docker Compose (Docker Inc.)
|
||||||
|
Version: 2.40.3
|
||||||
|
Path: /usr/lib/docker/cli-plugins/docker-compose
|
||||||
|
|
||||||
|
Server:
|
||||||
|
Containers: 18
|
||||||
|
Running: 17
|
||||||
|
Paused: 0
|
||||||
|
Stopped: 1
|
||||||
|
Images: 83
|
||||||
|
Server Version: 29.1.1
|
||||||
|
Storage Driver: overlay2
|
||||||
|
Backing Filesystem: extfs
|
||||||
|
Supports d_type: true
|
||||||
|
Using metacopy: true
|
||||||
|
Native Overlay Diff: false
|
||||||
|
userxattr: false
|
||||||
|
Logging Driver: json-file
|
||||||
|
Cgroup Driver: systemd
|
||||||
|
Cgroup Version: 2
|
||||||
|
Plugins:
|
||||||
|
Volume: local
|
||||||
|
Network: bridge host ipvlan macvlan null overlay
|
||||||
|
Log: awslogs fluentd gcplogs gelf journald json-file local splunk syslog
|
||||||
|
CDI spec directories:
|
||||||
|
/etc/cdi
|
||||||
|
/var/run/cdi
|
||||||
|
Swarm: inactive
|
||||||
|
Runtimes: io.containerd.runc.v2 runc
|
||||||
|
Default Runtime: runc
|
||||||
|
Init Binary: docker-init
|
||||||
|
containerd version: 1c4457e00facac03ce1d75f7b6777a7a851e5c41.m
|
||||||
|
runc version:
|
||||||
|
init version: de40ad0
|
||||||
|
Security Options:
|
||||||
|
apparmor
|
||||||
|
seccomp
|
||||||
|
Profile: builtin
|
||||||
|
cgroupns
|
||||||
|
Kernel Version: 6.12.62-1-MANJARO
|
||||||
|
Operating System: Manjaro Linux
|
||||||
|
OSType: linux
|
||||||
|
Architecture: x86_64
|
||||||
|
CPUs: 20
|
||||||
|
Total Memory: 62.5GiB
|
||||||
|
Name: msi-stealth-gs66
|
||||||
|
ID: f68c344d-ed27-440f-8f77-fb048e1a4ea4
|
||||||
|
Docker Root Dir: /var/lib/docker
|
||||||
|
Debug Mode: false
|
||||||
|
Experimental: false
|
||||||
|
Insecure Registries:
|
||||||
|
127.0.0.0/8
|
||||||
|
::1/128
|
||||||
|
Live Restore Enabled: false
|
||||||
|
Firewall Backend: iptables
|
||||||
|
|
||||||
|
|
||||||
|
=== DinD reachable? (docker -H tcp://127.0.0.1:2375 version) ===
|
||||||
|
Client:
|
||||||
|
Version: 29.1.1
|
||||||
|
API version: 1.52
|
||||||
|
Go version: go1.25.4 X:nodwarf5
|
||||||
|
Git commit: 0aedba58c2
|
||||||
|
Built: Fri Nov 28 14:28:26 2025
|
||||||
|
OS/Arch: linux/amd64
|
||||||
|
Context: default
|
||||||
|
|
||||||
|
Server: Docker Engine - Community
|
||||||
|
Engine:
|
||||||
|
Version: 29.1.3
|
||||||
|
API version: 1.52 (minimum version 1.44)
|
||||||
|
Go version: go1.25.5
|
||||||
|
Git commit: fbf3ed2
|
||||||
|
Built: Fri Dec 12 14:51:14 2025
|
||||||
|
OS/Arch: linux/amd64
|
||||||
|
Experimental: false
|
||||||
|
containerd:
|
||||||
|
Version: v2.2.0
|
||||||
|
GitCommit: 1c4457e00facac03ce1d75f7b6777a7a851e5c41
|
||||||
|
runc:
|
||||||
|
Version: 1.3.4
|
||||||
|
GitCommit: v1.3.4-0-gd6d73eb
|
||||||
|
docker-init:
|
||||||
|
Version: 0.19.0
|
||||||
|
GitCommit: de40ad0
|
||||||
|
|
||||||
121
artifacts/debug-host-20251226180450.txt
Normal file
121
artifacts/debug-host-20251226180450.txt
Normal file
@@ -0,0 +1,121 @@
|
|||||||
|
=== Host docker version ===
|
||||||
|
Client:
|
||||||
|
Version: 29.1.1
|
||||||
|
API version: 1.52
|
||||||
|
Go version: go1.25.4 X:nodwarf5
|
||||||
|
Git commit: 0aedba58c2
|
||||||
|
Built: Fri Nov 28 14:28:26 2025
|
||||||
|
OS/Arch: linux/amd64
|
||||||
|
Context: default
|
||||||
|
|
||||||
|
Server:
|
||||||
|
Engine:
|
||||||
|
Version: 29.1.1
|
||||||
|
API version: 1.52 (minimum version 1.44)
|
||||||
|
Go version: go1.25.4 X:nodwarf5
|
||||||
|
Git commit: 9a84135d52
|
||||||
|
Built: Fri Nov 28 14:28:26 2025
|
||||||
|
OS/Arch: linux/amd64
|
||||||
|
Experimental: false
|
||||||
|
containerd:
|
||||||
|
Version: v2.2.0
|
||||||
|
GitCommit: 1c4457e00facac03ce1d75f7b6777a7a851e5c41.m
|
||||||
|
runc:
|
||||||
|
Version: 1.4.0
|
||||||
|
GitCommit:
|
||||||
|
docker-init:
|
||||||
|
Version: 0.19.0
|
||||||
|
GitCommit: de40ad0
|
||||||
|
|
||||||
|
=== Host docker info ===
|
||||||
|
Client:
|
||||||
|
Version: 29.1.1
|
||||||
|
Context: default
|
||||||
|
Debug Mode: false
|
||||||
|
Plugins:
|
||||||
|
compose: Docker Compose (Docker Inc.)
|
||||||
|
Version: 2.40.3
|
||||||
|
Path: /usr/lib/docker/cli-plugins/docker-compose
|
||||||
|
|
||||||
|
Server:
|
||||||
|
Containers: 18
|
||||||
|
Running: 17
|
||||||
|
Paused: 0
|
||||||
|
Stopped: 1
|
||||||
|
Images: 87
|
||||||
|
Server Version: 29.1.1
|
||||||
|
Storage Driver: overlay2
|
||||||
|
Backing Filesystem: extfs
|
||||||
|
Supports d_type: true
|
||||||
|
Using metacopy: true
|
||||||
|
Native Overlay Diff: false
|
||||||
|
userxattr: false
|
||||||
|
Logging Driver: json-file
|
||||||
|
Cgroup Driver: systemd
|
||||||
|
Cgroup Version: 2
|
||||||
|
Plugins:
|
||||||
|
Volume: local
|
||||||
|
Network: bridge host ipvlan macvlan null overlay
|
||||||
|
Log: awslogs fluentd gcplogs gelf journald json-file local splunk syslog
|
||||||
|
CDI spec directories:
|
||||||
|
/etc/cdi
|
||||||
|
/var/run/cdi
|
||||||
|
Swarm: inactive
|
||||||
|
Runtimes: io.containerd.runc.v2 runc
|
||||||
|
Default Runtime: runc
|
||||||
|
Init Binary: docker-init
|
||||||
|
containerd version: 1c4457e00facac03ce1d75f7b6777a7a851e5c41.m
|
||||||
|
runc version:
|
||||||
|
init version: de40ad0
|
||||||
|
Security Options:
|
||||||
|
apparmor
|
||||||
|
seccomp
|
||||||
|
Profile: builtin
|
||||||
|
cgroupns
|
||||||
|
Kernel Version: 6.12.62-1-MANJARO
|
||||||
|
Operating System: Manjaro Linux
|
||||||
|
OSType: linux
|
||||||
|
Architecture: x86_64
|
||||||
|
CPUs: 20
|
||||||
|
Total Memory: 62.5GiB
|
||||||
|
Name: msi-stealth-gs66
|
||||||
|
ID: f68c344d-ed27-440f-8f77-fb048e1a4ea4
|
||||||
|
Docker Root Dir: /var/lib/docker
|
||||||
|
Debug Mode: false
|
||||||
|
Experimental: false
|
||||||
|
Insecure Registries:
|
||||||
|
127.0.0.0/8
|
||||||
|
::1/128
|
||||||
|
Live Restore Enabled: false
|
||||||
|
Firewall Backend: iptables
|
||||||
|
|
||||||
|
|
||||||
|
=== DinD reachable? (docker -H tcp://127.0.0.1:2375 version) ===
|
||||||
|
Client:
|
||||||
|
Version: 29.1.1
|
||||||
|
API version: 1.52
|
||||||
|
Go version: go1.25.4 X:nodwarf5
|
||||||
|
Git commit: 0aedba58c2
|
||||||
|
Built: Fri Nov 28 14:28:26 2025
|
||||||
|
OS/Arch: linux/amd64
|
||||||
|
Context: default
|
||||||
|
|
||||||
|
Server: Docker Engine - Community
|
||||||
|
Engine:
|
||||||
|
Version: 29.1.3
|
||||||
|
API version: 1.52 (minimum version 1.44)
|
||||||
|
Go version: go1.25.5
|
||||||
|
Git commit: fbf3ed2
|
||||||
|
Built: Fri Dec 12 14:51:14 2025
|
||||||
|
OS/Arch: linux/amd64
|
||||||
|
Experimental: false
|
||||||
|
containerd:
|
||||||
|
Version: v2.2.0
|
||||||
|
GitCommit: 1c4457e00facac03ce1d75f7b6777a7a851e5c41
|
||||||
|
runc:
|
||||||
|
Version: 1.3.4
|
||||||
|
GitCommit: v1.3.4-0-gd6d73eb
|
||||||
|
docker-init:
|
||||||
|
Version: 0.19.0
|
||||||
|
GitCommit: de40ad0
|
||||||
|
|
||||||
125
artifacts/dind-events-20251226141235.txt
Normal file
125
artifacts/dind-events-20251226141235.txt
Normal file
@@ -0,0 +1,125 @@
|
|||||||
|
2025-12-26T14:12:41.198580901+01:00 image pull ghcr.io/kevinveenbirkenbach/alpine-rsync:latest (name=ghcr.io/kevinveenbirkenbach/alpine-rsync, org.opencontainers.image.created=2025-12-26T11:16:41.250Z, org.opencontainers.image.description=alpine image with rsync, org.opencontainers.image.licenses=AGPL-3.0, org.opencontainers.image.revision=44d48fb12106e82de8e0bb9c374f6a2c0c2b542c, org.opencontainers.image.source=https://github.com/kevinveenbirkenbach/alpine-rsync, org.opencontainers.image.title=alpine-rsync, org.opencontainers.image.url=https://github.com/kevinveenbirkenbach/alpine-rsync, org.opencontainers.image.version=main)
|
||||||
|
2025-12-26T14:12:45.133326142+01:00 image pull alpine:3.20 (name=alpine)
|
||||||
|
2025-12-26T14:12:49.461261470+01:00 image load sha256:4fb7be431f6313dc97e12fe2b3b4bae98a938f28fe12d44ff5214c9ec78b3f25 (name=sha256:4fb7be431f6313dc97e12fe2b3b4bae98a938f28fe12d44ff5214c9ec78b3f25)
|
||||||
|
2025-12-26T14:12:50.069197321+01:00 volume create baudolo-e2e-files-full-f0b22fe71a-vol-src (driver=local)
|
||||||
|
2025-12-26T14:12:50.235055365+01:00 container create 972154cc8d0901f81a054f0e5e3ddc210b2b0708d9676d0f3ec509318798c6a1 (image=alpine:3.20, name=zen_northcutt)
|
||||||
|
2025-12-26T14:12:50.237279995+01:00 container attach 972154cc8d0901f81a054f0e5e3ddc210b2b0708d9676d0f3ec509318798c6a1 (image=alpine:3.20, name=zen_northcutt)
|
||||||
|
2025-12-26T14:12:50.255948524+01:00 volume mount baudolo-e2e-files-full-f0b22fe71a-vol-src (container=972154cc8d0901f81a054f0e5e3ddc210b2b0708d9676d0f3ec509318798c6a1, destination=/data, driver=local, propagation=, read/write=true)
|
||||||
|
2025-12-26T14:12:50.446943898+01:00 network connect 273bd12dbccf26e307a64aef5eecef0cb72c68114f8193cfb35919f5b256bdcb (container=972154cc8d0901f81a054f0e5e3ddc210b2b0708d9676d0f3ec509318798c6a1, name=bridge, type=bridge)
|
||||||
|
2025-12-26T14:12:50.482329463+01:00 container start 972154cc8d0901f81a054f0e5e3ddc210b2b0708d9676d0f3ec509318798c6a1 (image=alpine:3.20, name=zen_northcutt)
|
||||||
|
2025-12-26T14:12:50.643601381+01:00 network disconnect 273bd12dbccf26e307a64aef5eecef0cb72c68114f8193cfb35919f5b256bdcb (container=972154cc8d0901f81a054f0e5e3ddc210b2b0708d9676d0f3ec509318798c6a1, name=bridge, type=bridge)
|
||||||
|
2025-12-26T14:12:50.665142404+01:00 volume unmount baudolo-e2e-files-full-f0b22fe71a-vol-src (container=972154cc8d0901f81a054f0e5e3ddc210b2b0708d9676d0f3ec509318798c6a1, driver=local)
|
||||||
|
2025-12-26T14:12:50.686339473+01:00 container die 972154cc8d0901f81a054f0e5e3ddc210b2b0708d9676d0f3ec509318798c6a1 (execDuration=0, exitCode=0, image=alpine:3.20, name=zen_northcutt)
|
||||||
|
2025-12-26T14:12:50.753769595+01:00 container destroy 972154cc8d0901f81a054f0e5e3ddc210b2b0708d9676d0f3ec509318798c6a1 (image=alpine:3.20, name=zen_northcutt)
|
||||||
|
2025-12-26T14:12:51.102070909+01:00 volume destroy baudolo-e2e-files-full-f0b22fe71a-vol-src (driver=local)
|
||||||
|
2025-12-26T14:12:51.141802271+01:00 volume create baudolo-e2e-files-nocopy-1a172b8088-vol-src (driver=local)
|
||||||
|
2025-12-26T14:12:51.275100676+01:00 container create 6603444bf2ed97d313096c400af3d5c8e925db35486e3ae3964592de58753334 (image=alpine:3.20, name=frosty_booth)
|
||||||
|
2025-12-26T14:12:51.277163983+01:00 container attach 6603444bf2ed97d313096c400af3d5c8e925db35486e3ae3964592de58753334 (image=alpine:3.20, name=frosty_booth)
|
||||||
|
2025-12-26T14:12:51.295769885+01:00 volume mount baudolo-e2e-files-nocopy-1a172b8088-vol-src (container=6603444bf2ed97d313096c400af3d5c8e925db35486e3ae3964592de58753334, destination=/data, driver=local, propagation=, read/write=true)
|
||||||
|
2025-12-26T14:12:51.448766298+01:00 network connect 273bd12dbccf26e307a64aef5eecef0cb72c68114f8193cfb35919f5b256bdcb (container=6603444bf2ed97d313096c400af3d5c8e925db35486e3ae3964592de58753334, name=bridge, type=bridge)
|
||||||
|
2025-12-26T14:12:51.485884843+01:00 container start 6603444bf2ed97d313096c400af3d5c8e925db35486e3ae3964592de58753334 (image=alpine:3.20, name=frosty_booth)
|
||||||
|
2025-12-26T14:12:51.660953012+01:00 network disconnect 273bd12dbccf26e307a64aef5eecef0cb72c68114f8193cfb35919f5b256bdcb (container=6603444bf2ed97d313096c400af3d5c8e925db35486e3ae3964592de58753334, name=bridge, type=bridge)
|
||||||
|
2025-12-26T14:12:51.682098008+01:00 volume unmount baudolo-e2e-files-nocopy-1a172b8088-vol-src (container=6603444bf2ed97d313096c400af3d5c8e925db35486e3ae3964592de58753334, driver=local)
|
||||||
|
2025-12-26T14:12:51.703353364+01:00 container die 6603444bf2ed97d313096c400af3d5c8e925db35486e3ae3964592de58753334 (execDuration=0, exitCode=0, image=alpine:3.20, name=frosty_booth)
|
||||||
|
2025-12-26T14:12:51.763171429+01:00 container destroy 6603444bf2ed97d313096c400af3d5c8e925db35486e3ae3964592de58753334 (image=alpine:3.20, name=frosty_booth)
|
||||||
|
2025-12-26T14:12:52.049154745+01:00 volume destroy baudolo-e2e-files-nocopy-1a172b8088-vol-src (driver=local)
|
||||||
|
2025-12-26T14:12:52.089068641+01:00 volume create baudolo-e2e-mariadb-full-0790ca5d41-mariadb-vol (driver=local)
|
||||||
|
2025-12-26T14:13:13.530756972+01:00 image pull mariadb:11 (name=mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:13.887062438+01:00 container create c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:13.906656801+01:00 volume mount baudolo-e2e-mariadb-full-0790ca5d41-mariadb-vol (container=c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b, destination=/var/lib/mysql, driver=local, propagation=, read/write=true)
|
||||||
|
2025-12-26T14:13:14.088244508+01:00 network connect 273bd12dbccf26e307a64aef5eecef0cb72c68114f8193cfb35919f5b256bdcb (container=c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b, name=bridge, type=bridge)
|
||||||
|
2025-12-26T14:13:14.124633552+01:00 container start c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:14.136103009+01:00 container exec_create: sh -lc mariadb-admin -uroot -prootpw ping -h localhost c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=25c368895719afe0d698bcf4a98509c797574c568e38ada08e00bf0f6664ce2e, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:14.136886083+01:00 container exec_start: sh -lc mariadb-admin -uroot -prootpw ping -h localhost c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=25c368895719afe0d698bcf4a98509c797574c568e38ada08e00bf0f6664ce2e, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:14.192400683+01:00 container exec_die c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=25c368895719afe0d698bcf4a98509c797574c568e38ada08e00bf0f6664ce2e, exitCode=1, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:15.203778795+01:00 container exec_create: sh -lc mariadb-admin -uroot -prootpw ping -h localhost c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=6db98dd0a7a6739018bfae6e772472e1d24a70614bb990810327b94e7d69a304, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:15.204313114+01:00 container exec_start: sh -lc mariadb-admin -uroot -prootpw ping -h localhost c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=6db98dd0a7a6739018bfae6e772472e1d24a70614bb990810327b94e7d69a304, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:15.298707655+01:00 container exec_die c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=6db98dd0a7a6739018bfae6e772472e1d24a70614bb990810327b94e7d69a304, exitCode=1, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:16.308880522+01:00 container exec_create: sh -lc mariadb-admin -uroot -prootpw ping -h localhost c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=dda886689926a5733b6d26abb50ccb9fac6c36cd94a1f2072dfce9819c3ae2f4, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:16.309586271+01:00 container exec_start: sh -lc mariadb-admin -uroot -prootpw ping -h localhost c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=dda886689926a5733b6d26abb50ccb9fac6c36cd94a1f2072dfce9819c3ae2f4, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:16.398480757+01:00 container exec_die c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=dda886689926a5733b6d26abb50ccb9fac6c36cd94a1f2072dfce9819c3ae2f4, exitCode=1, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:17.409340865+01:00 container exec_create: sh -lc mariadb-admin -uroot -prootpw ping -h localhost c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=0bfa22af92cc123a356dd4d3aafb5fc50c458b9cec0ad748ceac46368acd0230, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:17.410031002+01:00 container exec_start: sh -lc mariadb-admin -uroot -prootpw ping -h localhost c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=0bfa22af92cc123a356dd4d3aafb5fc50c458b9cec0ad748ceac46368acd0230, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:17.498639004+01:00 container exec_die c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=0bfa22af92cc123a356dd4d3aafb5fc50c458b9cec0ad748ceac46368acd0230, exitCode=1, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:18.509268972+01:00 container exec_create: sh -lc mariadb-admin -uroot -prootpw ping -h localhost c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=aa19a25f00ce6be43ade4aa09af6d2f89243bb626aa167d69fdf675beae727eb, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:18.510125815+01:00 container exec_start: sh -lc mariadb-admin -uroot -prootpw ping -h localhost c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=aa19a25f00ce6be43ade4aa09af6d2f89243bb626aa167d69fdf675beae727eb, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:18.573652137+01:00 container exec_die c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=aa19a25f00ce6be43ade4aa09af6d2f89243bb626aa167d69fdf675beae727eb, exitCode=1, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:19.585570745+01:00 container exec_create: sh -lc mariadb-admin -uroot -prootpw ping -h localhost c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=edfebcae144b529f4466136c11213a95d52f9afa92c1fa75feedb42dee400105, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:19.586032588+01:00 container exec_start: sh -lc mariadb-admin -uroot -prootpw ping -h localhost c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=edfebcae144b529f4466136c11213a95d52f9afa92c1fa75feedb42dee400105, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:19.647530562+01:00 container exec_die c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=edfebcae144b529f4466136c11213a95d52f9afa92c1fa75feedb42dee400105, exitCode=1, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:20.659543769+01:00 container exec_create: sh -lc mariadb-admin -uroot -prootpw ping -h localhost c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=4fe17b5868bdde99633ca6048f72583cd1e649d0fe3d1c4d89e4403119cf4895, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:20.660269360+01:00 container exec_start: sh -lc mariadb-admin -uroot -prootpw ping -h localhost c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=4fe17b5868bdde99633ca6048f72583cd1e649d0fe3d1c4d89e4403119cf4895, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:20.738212597+01:00 container exec_die c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=4fe17b5868bdde99633ca6048f72583cd1e649d0fe3d1c4d89e4403119cf4895, exitCode=1, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:21.749334016+01:00 container exec_create: sh -lc mariadb-admin -uroot -prootpw ping -h localhost c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=f8179f3a975fe3e2b1824def3e1535a304f8e017e4b9554874f84899cbd43290, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:21.750064184+01:00 container exec_start: sh -lc mariadb-admin -uroot -prootpw ping -h localhost c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=f8179f3a975fe3e2b1824def3e1535a304f8e017e4b9554874f84899cbd43290, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:21.821784307+01:00 container exec_die c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=f8179f3a975fe3e2b1824def3e1535a304f8e017e4b9554874f84899cbd43290, exitCode=1, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:22.832155681+01:00 container exec_create: sh -lc mariadb-admin -uroot -prootpw ping -h localhost c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=b0f1ff5b4b8b4f36b08306bb6f3c363dd550a1e15322ae995c834fa3451b1828, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:22.832953999+01:00 container exec_start: sh -lc mariadb-admin -uroot -prootpw ping -h localhost c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=b0f1ff5b4b8b4f36b08306bb6f3c363dd550a1e15322ae995c834fa3451b1828, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:22.905555595+01:00 container exec_die c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=b0f1ff5b4b8b4f36b08306bb6f3c363dd550a1e15322ae995c834fa3451b1828, exitCode=0, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:22.915870140+01:00 container exec_create: sh -lc mariadb -uroot -prootpw -e "CREATE DATABASE appdb; CREATE TABLE appdb.t (id INT PRIMARY KEY, v VARCHAR(50)); INSERT INTO appdb.t VALUES (1,'ok');" c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=12daffe77867c29f0c7d14e64a9eda5706cd46ece5d5dec53cbb13c5e24e00ad, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:22.916786809+01:00 container exec_start: sh -lc mariadb -uroot -prootpw -e "CREATE DATABASE appdb; CREATE TABLE appdb.t (id INT PRIMARY KEY, v VARCHAR(50)); INSERT INTO appdb.t VALUES (1,'ok');" c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=12daffe77867c29f0c7d14e64a9eda5706cd46ece5d5dec53cbb13c5e24e00ad, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:22.987238735+01:00 container exec_die c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=12daffe77867c29f0c7d14e64a9eda5706cd46ece5d5dec53cbb13c5e24e00ad, exitCode=1, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:23.022997879+01:00 volume create baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb-vol (driver=local)
|
||||||
|
2025-12-26T14:13:23.211777653+01:00 container create 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:23.234973354+01:00 volume mount baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb-vol (container=0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f, destination=/var/lib/mysql, driver=local, propagation=, read/write=true)
|
||||||
|
2025-12-26T14:13:23.434394198+01:00 network connect 273bd12dbccf26e307a64aef5eecef0cb72c68114f8193cfb35919f5b256bdcb (container=0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f, name=bridge, type=bridge)
|
||||||
|
2025-12-26T14:13:23.483918185+01:00 container start 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:23.495865358+01:00 container exec_create: sh -lc mariadb-admin -uroot -prootpw ping -h localhost 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=bce663783b34f1cd8ff5dc38563da7aced57a21c74f85101882ebe1cc1f4bc3d, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:23.496563367+01:00 container exec_start: sh -lc mariadb-admin -uroot -prootpw ping -h localhost 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=bce663783b34f1cd8ff5dc38563da7aced57a21c74f85101882ebe1cc1f4bc3d, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:23.563402365+01:00 container exec_die 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=bce663783b34f1cd8ff5dc38563da7aced57a21c74f85101882ebe1cc1f4bc3d, exitCode=1, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:24.575320221+01:00 container exec_create: sh -lc mariadb-admin -uroot -prootpw ping -h localhost 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=9505e1a8c580f650758aebc0625a1b99d4ed46d84bf5a4628ed81503ebe9be07, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:24.575997988+01:00 container exec_start: sh -lc mariadb-admin -uroot -prootpw ping -h localhost 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=9505e1a8c580f650758aebc0625a1b99d4ed46d84bf5a4628ed81503ebe9be07, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:24.655874626+01:00 container exec_die 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=9505e1a8c580f650758aebc0625a1b99d4ed46d84bf5a4628ed81503ebe9be07, exitCode=1, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:25.665903138+01:00 container exec_create: sh -lc mariadb-admin -uroot -prootpw ping -h localhost 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=73096c64d7deabeeefe0445b73f037617acd8fbdfbacd7dc98662c05135c3017, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:25.666433841+01:00 container exec_start: sh -lc mariadb-admin -uroot -prootpw ping -h localhost 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=73096c64d7deabeeefe0445b73f037617acd8fbdfbacd7dc98662c05135c3017, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:25.737265107+01:00 container exec_die 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=73096c64d7deabeeefe0445b73f037617acd8fbdfbacd7dc98662c05135c3017, exitCode=1, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:26.747973203+01:00 container exec_create: sh -lc mariadb-admin -uroot -prootpw ping -h localhost 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=8bb42d9bb85effda41dba69913fe5cd5c97fb9cf35a0c31444ef44711691847a, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:26.748696717+01:00 container exec_start: sh -lc mariadb-admin -uroot -prootpw ping -h localhost 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=8bb42d9bb85effda41dba69913fe5cd5c97fb9cf35a0c31444ef44711691847a, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:26.802608451+01:00 container exec_die 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=8bb42d9bb85effda41dba69913fe5cd5c97fb9cf35a0c31444ef44711691847a, exitCode=1, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:27.813334836+01:00 container exec_create: sh -lc mariadb-admin -uroot -prootpw ping -h localhost 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=e7c0e3b0f937b37addd50791d893f39dfded5b045debe2906820d7649338cd9e, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:27.814178343+01:00 container exec_start: sh -lc mariadb-admin -uroot -prootpw ping -h localhost 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=e7c0e3b0f937b37addd50791d893f39dfded5b045debe2906820d7649338cd9e, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:27.899145142+01:00 container exec_die 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=e7c0e3b0f937b37addd50791d893f39dfded5b045debe2906820d7649338cd9e, exitCode=1, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:28.909816912+01:00 container exec_create: sh -lc mariadb-admin -uroot -prootpw ping -h localhost 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=0ff7490c0d56be23728fd1d089d52de46e6f811f9125e9033cd9d371c7ac17a3, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:28.910597354+01:00 container exec_start: sh -lc mariadb-admin -uroot -prootpw ping -h localhost 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=0ff7490c0d56be23728fd1d089d52de46e6f811f9125e9033cd9d371c7ac17a3, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:28.975385649+01:00 container exec_die 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=0ff7490c0d56be23728fd1d089d52de46e6f811f9125e9033cd9d371c7ac17a3, exitCode=1, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:29.985969275+01:00 container exec_create: sh -lc mariadb-admin -uroot -prootpw ping -h localhost 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=95e541df0d7495e0e317e2f7032906c23be450e78e3544db6aa5bc14a1f5f6b7, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:29.986716701+01:00 container exec_start: sh -lc mariadb-admin -uroot -prootpw ping -h localhost 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=95e541df0d7495e0e317e2f7032906c23be450e78e3544db6aa5bc14a1f5f6b7, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:30.086972407+01:00 container exec_die 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=95e541df0d7495e0e317e2f7032906c23be450e78e3544db6aa5bc14a1f5f6b7, exitCode=0, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:30.096237769+01:00 container exec_create: sh -lc mariadb -uroot -prootpw -e "CREATE DATABASE appdb; CREATE TABLE appdb.t (id INT PRIMARY KEY, v VARCHAR(50)); INSERT INTO appdb.t VALUES (1,'ok');" 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=d94252b163f8ea17f17f901859837ecdc80327c05dfca36503b4fddfdf6b5823, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:30.096993155+01:00 container exec_start: sh -lc mariadb -uroot -prootpw -e "CREATE DATABASE appdb; CREATE TABLE appdb.t (id INT PRIMARY KEY, v VARCHAR(50)); INSERT INTO appdb.t VALUES (1,'ok');" 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=d94252b163f8ea17f17f901859837ecdc80327c05dfca36503b4fddfdf6b5823, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:30.164696413+01:00 container exec_die 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=d94252b163f8ea17f17f901859837ecdc80327c05dfca36503b4fddfdf6b5823, exitCode=1, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5)
|
||||||
|
2025-12-26T14:13:30.195960077+01:00 volume create baudolo-e2e-postgres-full-e9784b8d4b-pg-vol (driver=local)
|
||||||
|
2025-12-26T14:14:00.555389090+01:00 image pull postgres:16 (name=postgres)
|
||||||
|
2025-12-26T14:14:00.854940131+01:00 container create 875008fe1e9e58e18eed4d14e13feeba1424ebcace789a038abc308df88b8a3f (image=postgres:16, name=baudolo-e2e-postgres-full-e9784b8d4b-pg)
|
||||||
|
2025-12-26T14:14:00.874215442+01:00 volume mount baudolo-e2e-postgres-full-e9784b8d4b-pg-vol (container=875008fe1e9e58e18eed4d14e13feeba1424ebcace789a038abc308df88b8a3f, destination=/var/lib/postgresql/data, driver=local, propagation=, read/write=true)
|
||||||
|
2025-12-26T14:14:01.057089403+01:00 network connect 273bd12dbccf26e307a64aef5eecef0cb72c68114f8193cfb35919f5b256bdcb (container=875008fe1e9e58e18eed4d14e13feeba1424ebcace789a038abc308df88b8a3f, name=bridge, type=bridge)
|
||||||
|
2025-12-26T14:14:01.090659145+01:00 container start 875008fe1e9e58e18eed4d14e13feeba1424ebcace789a038abc308df88b8a3f (image=postgres:16, name=baudolo-e2e-postgres-full-e9784b8d4b-pg)
|
||||||
|
2025-12-26T14:14:01.102872260+01:00 container exec_create: sh -lc pg_isready -U postgres -h localhost 875008fe1e9e58e18eed4d14e13feeba1424ebcace789a038abc308df88b8a3f (execID=440cd4f2d6c371430480b9cfed773ad5f398dc2e51c290ef5965d7053207f92f, image=postgres:16, name=baudolo-e2e-postgres-full-e9784b8d4b-pg)
|
||||||
|
2025-12-26T14:14:01.103435051+01:00 container exec_start: sh -lc pg_isready -U postgres -h localhost 875008fe1e9e58e18eed4d14e13feeba1424ebcace789a038abc308df88b8a3f (execID=440cd4f2d6c371430480b9cfed773ad5f398dc2e51c290ef5965d7053207f92f, image=postgres:16, name=baudolo-e2e-postgres-full-e9784b8d4b-pg)
|
||||||
|
2025-12-26T14:14:01.174777107+01:00 container exec_die 875008fe1e9e58e18eed4d14e13feeba1424ebcace789a038abc308df88b8a3f (execID=440cd4f2d6c371430480b9cfed773ad5f398dc2e51c290ef5965d7053207f92f, exitCode=2, image=postgres:16, name=baudolo-e2e-postgres-full-e9784b8d4b-pg)
|
||||||
|
2025-12-26T14:14:02.184795425+01:00 container exec_create: sh -lc pg_isready -U postgres -h localhost 875008fe1e9e58e18eed4d14e13feeba1424ebcace789a038abc308df88b8a3f (execID=b6c2bf961069d25c7521efbceb97c68b582384d27e7657350a182d224aa27fd2, image=postgres:16, name=baudolo-e2e-postgres-full-e9784b8d4b-pg)
|
||||||
|
2025-12-26T14:14:02.185507858+01:00 container exec_start: sh -lc pg_isready -U postgres -h localhost 875008fe1e9e58e18eed4d14e13feeba1424ebcace789a038abc308df88b8a3f (execID=b6c2bf961069d25c7521efbceb97c68b582384d27e7657350a182d224aa27fd2, image=postgres:16, name=baudolo-e2e-postgres-full-e9784b8d4b-pg)
|
||||||
|
2025-12-26T14:14:02.235002365+01:00 container exec_die 875008fe1e9e58e18eed4d14e13feeba1424ebcace789a038abc308df88b8a3f (execID=b6c2bf961069d25c7521efbceb97c68b582384d27e7657350a182d224aa27fd2, exitCode=2, image=postgres:16, name=baudolo-e2e-postgres-full-e9784b8d4b-pg)
|
||||||
|
2025-12-26T14:14:03.245410693+01:00 container exec_create: sh -lc pg_isready -U postgres -h localhost 875008fe1e9e58e18eed4d14e13feeba1424ebcace789a038abc308df88b8a3f (execID=6991766e6e74a1386b16f77dd3b83b075ae8bceddcaf1eaa5edb9f6210e51fb9, image=postgres:16, name=baudolo-e2e-postgres-full-e9784b8d4b-pg)
|
||||||
|
2025-12-26T14:14:03.246196281+01:00 container exec_start: sh -lc pg_isready -U postgres -h localhost 875008fe1e9e58e18eed4d14e13feeba1424ebcace789a038abc308df88b8a3f (execID=6991766e6e74a1386b16f77dd3b83b075ae8bceddcaf1eaa5edb9f6210e51fb9, image=postgres:16, name=baudolo-e2e-postgres-full-e9784b8d4b-pg)
|
||||||
|
2025-12-26T14:14:03.309711403+01:00 container exec_die 875008fe1e9e58e18eed4d14e13feeba1424ebcace789a038abc308df88b8a3f (execID=6991766e6e74a1386b16f77dd3b83b075ae8bceddcaf1eaa5edb9f6210e51fb9, exitCode=0, image=postgres:16, name=baudolo-e2e-postgres-full-e9784b8d4b-pg)
|
||||||
|
2025-12-26T14:14:03.319880835+01:00 container exec_create: sh -lc psql -U postgres -d appdb -c "CREATE TABLE t (id int primary key, v text); INSERT INTO t VALUES (1,'ok');" 875008fe1e9e58e18eed4d14e13feeba1424ebcace789a038abc308df88b8a3f (execID=17ff3881b175cd2e7ffcd0dc1994bd2eb4b6a725871b6428743af4178bbc9c13, image=postgres:16, name=baudolo-e2e-postgres-full-e9784b8d4b-pg)
|
||||||
|
2025-12-26T14:14:03.320618670+01:00 container exec_start: sh -lc psql -U postgres -d appdb -c "CREATE TABLE t (id int primary key, v text); INSERT INTO t VALUES (1,'ok');" 875008fe1e9e58e18eed4d14e13feeba1424ebcace789a038abc308df88b8a3f (execID=17ff3881b175cd2e7ffcd0dc1994bd2eb4b6a725871b6428743af4178bbc9c13, image=postgres:16, name=baudolo-e2e-postgres-full-e9784b8d4b-pg)
|
||||||
|
2025-12-26T14:14:03.447110110+01:00 container exec_die 875008fe1e9e58e18eed4d14e13feeba1424ebcace789a038abc308df88b8a3f (execID=17ff3881b175cd2e7ffcd0dc1994bd2eb4b6a725871b6428743af4178bbc9c13, exitCode=0, image=postgres:16, name=baudolo-e2e-postgres-full-e9784b8d4b-pg)
|
||||||
|
2025-12-26T14:14:03.758176891+01:00 volume create baudolo-e2e-postgres-nocopy-15d1e23327-pg-vol (driver=local)
|
||||||
|
2025-12-26T14:14:03.920079355+01:00 container create 18ef5793cfc5ea0e4c4d95344b5c3589d9e679c120b9ff142a59e9de880d5702 (image=postgres:16, name=baudolo-e2e-postgres-nocopy-15d1e23327-pg)
|
||||||
|
2025-12-26T14:14:03.940018672+01:00 volume mount baudolo-e2e-postgres-nocopy-15d1e23327-pg-vol (container=18ef5793cfc5ea0e4c4d95344b5c3589d9e679c120b9ff142a59e9de880d5702, destination=/var/lib/postgresql/data, driver=local, propagation=, read/write=true)
|
||||||
|
2025-12-26T14:14:04.108324382+01:00 network connect 273bd12dbccf26e307a64aef5eecef0cb72c68114f8193cfb35919f5b256bdcb (container=18ef5793cfc5ea0e4c4d95344b5c3589d9e679c120b9ff142a59e9de880d5702, name=bridge, type=bridge)
|
||||||
|
2025-12-26T14:14:04.142411599+01:00 container start 18ef5793cfc5ea0e4c4d95344b5c3589d9e679c120b9ff142a59e9de880d5702 (image=postgres:16, name=baudolo-e2e-postgres-nocopy-15d1e23327-pg)
|
||||||
|
2025-12-26T14:14:04.154193197+01:00 container exec_create: sh -lc pg_isready -U postgres -h localhost 18ef5793cfc5ea0e4c4d95344b5c3589d9e679c120b9ff142a59e9de880d5702 (execID=0d800e458aa1e871f9bb8b7f323593d38cd20b063113d79cf80f05892ddbd217, image=postgres:16, name=baudolo-e2e-postgres-nocopy-15d1e23327-pg)
|
||||||
|
2025-12-26T14:14:04.154831705+01:00 container exec_start: sh -lc pg_isready -U postgres -h localhost 18ef5793cfc5ea0e4c4d95344b5c3589d9e679c120b9ff142a59e9de880d5702 (execID=0d800e458aa1e871f9bb8b7f323593d38cd20b063113d79cf80f05892ddbd217, image=postgres:16, name=baudolo-e2e-postgres-nocopy-15d1e23327-pg)
|
||||||
|
2025-12-26T14:14:04.234431100+01:00 container exec_die 18ef5793cfc5ea0e4c4d95344b5c3589d9e679c120b9ff142a59e9de880d5702 (execID=0d800e458aa1e871f9bb8b7f323593d38cd20b063113d79cf80f05892ddbd217, exitCode=2, image=postgres:16, name=baudolo-e2e-postgres-nocopy-15d1e23327-pg)
|
||||||
|
2025-12-26T14:14:05.246575645+01:00 container exec_create: sh -lc pg_isready -U postgres -h localhost 18ef5793cfc5ea0e4c4d95344b5c3589d9e679c120b9ff142a59e9de880d5702 (execID=d8176dffa8a2185e6a3ddfd134d9ba4cf6186bab4b36088df4bed3376c278ff4, image=postgres:16, name=baudolo-e2e-postgres-nocopy-15d1e23327-pg)
|
||||||
|
2025-12-26T14:14:05.247199022+01:00 container exec_start: sh -lc pg_isready -U postgres -h localhost 18ef5793cfc5ea0e4c4d95344b5c3589d9e679c120b9ff142a59e9de880d5702 (execID=d8176dffa8a2185e6a3ddfd134d9ba4cf6186bab4b36088df4bed3376c278ff4, image=postgres:16, name=baudolo-e2e-postgres-nocopy-15d1e23327-pg)
|
||||||
|
2025-12-26T14:14:05.304014067+01:00 container exec_die 18ef5793cfc5ea0e4c4d95344b5c3589d9e679c120b9ff142a59e9de880d5702 (execID=d8176dffa8a2185e6a3ddfd134d9ba4cf6186bab4b36088df4bed3376c278ff4, exitCode=2, image=postgres:16, name=baudolo-e2e-postgres-nocopy-15d1e23327-pg)
|
||||||
|
2025-12-26T14:14:06.315732563+01:00 container exec_create: sh -lc pg_isready -U postgres -h localhost 18ef5793cfc5ea0e4c4d95344b5c3589d9e679c120b9ff142a59e9de880d5702 (execID=95d21955662aac0b324739e40cddfb071e5339a3f907b1e59312ccb4b3048122, image=postgres:16, name=baudolo-e2e-postgres-nocopy-15d1e23327-pg)
|
||||||
|
2025-12-26T14:14:06.316395085+01:00 container exec_start: sh -lc pg_isready -U postgres -h localhost 18ef5793cfc5ea0e4c4d95344b5c3589d9e679c120b9ff142a59e9de880d5702 (execID=95d21955662aac0b324739e40cddfb071e5339a3f907b1e59312ccb4b3048122, image=postgres:16, name=baudolo-e2e-postgres-nocopy-15d1e23327-pg)
|
||||||
|
2025-12-26T14:14:06.391285156+01:00 container exec_die 18ef5793cfc5ea0e4c4d95344b5c3589d9e679c120b9ff142a59e9de880d5702 (execID=95d21955662aac0b324739e40cddfb071e5339a3f907b1e59312ccb4b3048122, exitCode=0, image=postgres:16, name=baudolo-e2e-postgres-nocopy-15d1e23327-pg)
|
||||||
|
2025-12-26T14:14:06.401297303+01:00 container exec_create: sh -lc psql -U postgres -d appdb -c "CREATE TABLE t (id int primary key, v text); INSERT INTO t VALUES (1,'ok');" 18ef5793cfc5ea0e4c4d95344b5c3589d9e679c120b9ff142a59e9de880d5702 (execID=b98057fde637245f1458cee7e5490afc371851c2d442304ba928231d77f32324, image=postgres:16, name=baudolo-e2e-postgres-nocopy-15d1e23327-pg)
|
||||||
|
2025-12-26T14:14:06.402103207+01:00 container exec_start: sh -lc psql -U postgres -d appdb -c "CREATE TABLE t (id int primary key, v text); INSERT INTO t VALUES (1,'ok');" 18ef5793cfc5ea0e4c4d95344b5c3589d9e679c120b9ff142a59e9de880d5702 (execID=b98057fde637245f1458cee7e5490afc371851c2d442304ba928231d77f32324, image=postgres:16, name=baudolo-e2e-postgres-nocopy-15d1e23327-pg)
|
||||||
|
2025-12-26T14:14:06.520047896+01:00 container exec_die 18ef5793cfc5ea0e4c4d95344b5c3589d9e679c120b9ff142a59e9de880d5702 (execID=b98057fde637245f1458cee7e5490afc371851c2d442304ba928231d77f32324, exitCode=0, image=postgres:16, name=baudolo-e2e-postgres-nocopy-15d1e23327-pg)
|
||||||
13
artifacts/dind-events-20251226180030.txt
Normal file
13
artifacts/dind-events-20251226180030.txt
Normal file
@@ -0,0 +1,13 @@
|
|||||||
|
2025-12-26T18:00:43.105600680+01:00 image pull ghcr.io/kevinveenbirkenbach/alpine-rsync:latest (name=ghcr.io/kevinveenbirkenbach/alpine-rsync, org.opencontainers.image.created=2025-12-26T11:16:41.250Z, org.opencontainers.image.description=alpine image with rsync, org.opencontainers.image.licenses=AGPL-3.0, org.opencontainers.image.revision=44d48fb12106e82de8e0bb9c374f6a2c0c2b542c, org.opencontainers.image.source=https://github.com/kevinveenbirkenbach/alpine-rsync, org.opencontainers.image.title=alpine-rsync, org.opencontainers.image.url=https://github.com/kevinveenbirkenbach/alpine-rsync, org.opencontainers.image.version=main)
|
||||||
|
2025-12-26T18:00:48.233210218+01:00 image pull alpine:3.20 (name=alpine)
|
||||||
|
2025-12-26T18:00:52.495680501+01:00 image load sha256:0bc9b158f3e8edb2e5a131a12d51edba2b2954e1edc626c4ad989581fd8bb562 (name=sha256:0bc9b158f3e8edb2e5a131a12d51edba2b2954e1edc626c4ad989581fd8bb562)
|
||||||
|
2025-12-26T18:00:53.087729138+01:00 volume create baudolo-e2e-files-full-45d7677d08-vol-src (driver=local)
|
||||||
|
2025-12-26T18:00:53.236672233+01:00 container create debae25e9efdf3852a3a80174d33276bc78d40964c126972a2d9baa6fc637b45 (image=alpine:3.20, name=elated_snyder)
|
||||||
|
2025-12-26T18:00:53.238392166+01:00 container attach debae25e9efdf3852a3a80174d33276bc78d40964c126972a2d9baa6fc637b45 (image=alpine:3.20, name=elated_snyder)
|
||||||
|
2025-12-26T18:00:53.257319926+01:00 volume mount baudolo-e2e-files-full-45d7677d08-vol-src (container=debae25e9efdf3852a3a80174d33276bc78d40964c126972a2d9baa6fc637b45, destination=/data, driver=local, propagation=, read/write=true)
|
||||||
|
2025-12-26T18:00:53.434210509+01:00 network connect 43f0f11bd2813c28b15d0f2b1d59875b2457c70aaef10ff7a309d57279bcf39e (container=debae25e9efdf3852a3a80174d33276bc78d40964c126972a2d9baa6fc637b45, name=bridge, type=bridge)
|
||||||
|
2025-12-26T18:00:53.469302289+01:00 container start debae25e9efdf3852a3a80174d33276bc78d40964c126972a2d9baa6fc637b45 (image=alpine:3.20, name=elated_snyder)
|
||||||
|
2025-12-26T18:00:53.625702613+01:00 network disconnect 43f0f11bd2813c28b15d0f2b1d59875b2457c70aaef10ff7a309d57279bcf39e (container=debae25e9efdf3852a3a80174d33276bc78d40964c126972a2d9baa6fc637b45, name=bridge, type=bridge)
|
||||||
|
2025-12-26T18:00:53.636946550+01:00 volume unmount baudolo-e2e-files-full-45d7677d08-vol-src (container=debae25e9efdf3852a3a80174d33276bc78d40964c126972a2d9baa6fc637b45, driver=local)
|
||||||
|
2025-12-26T18:00:53.657329988+01:00 container die debae25e9efdf3852a3a80174d33276bc78d40964c126972a2d9baa6fc637b45 (execDuration=0, exitCode=0, image=alpine:3.20, name=elated_snyder)
|
||||||
|
2025-12-26T18:00:53.724058321+01:00 container destroy debae25e9efdf3852a3a80174d33276bc78d40964c126972a2d9baa6fc637b45 (image=alpine:3.20, name=elated_snyder)
|
||||||
14
artifacts/dind-events-20251226180450.txt
Normal file
14
artifacts/dind-events-20251226180450.txt
Normal file
@@ -0,0 +1,14 @@
|
|||||||
|
2025-12-26T18:04:57.729650330+01:00 image pull ghcr.io/kevinveenbirkenbach/alpine-rsync:latest (name=ghcr.io/kevinveenbirkenbach/alpine-rsync, org.opencontainers.image.created=2025-12-26T11:16:41.250Z, org.opencontainers.image.description=alpine image with rsync, org.opencontainers.image.licenses=AGPL-3.0, org.opencontainers.image.revision=44d48fb12106e82de8e0bb9c374f6a2c0c2b542c, org.opencontainers.image.source=https://github.com/kevinveenbirkenbach/alpine-rsync, org.opencontainers.image.title=alpine-rsync, org.opencontainers.image.url=https://github.com/kevinveenbirkenbach/alpine-rsync, org.opencontainers.image.version=main)
|
||||||
|
2025-12-26T18:05:02.774379357+01:00 image pull alpine:3.20 (name=alpine)
|
||||||
|
2025-12-26T18:05:07.091956837+01:00 image load sha256:84e1ce4363e7f6880bbc55dce81bd8bc3d0cd35db78f6b625f6693eb28f26d46 (name=sha256:84e1ce4363e7f6880bbc55dce81bd8bc3d0cd35db78f6b625f6693eb28f26d46)
|
||||||
|
2025-12-26T18:05:07.706443392+01:00 volume create baudolo-e2e-files-full-468c9a54be-vol-src (driver=local)
|
||||||
|
2025-12-26T18:05:07.876060673+01:00 container create f606f132edfe329a81b3ec57a35a707f957409c387c10e7b8e78f984cbbef72f (image=alpine:3.20, name=eloquent_solomon)
|
||||||
|
2025-12-26T18:05:07.878097650+01:00 container attach f606f132edfe329a81b3ec57a35a707f957409c387c10e7b8e78f984cbbef72f (image=alpine:3.20, name=eloquent_solomon)
|
||||||
|
2025-12-26T18:05:07.897098146+01:00 volume mount baudolo-e2e-files-full-468c9a54be-vol-src (container=f606f132edfe329a81b3ec57a35a707f957409c387c10e7b8e78f984cbbef72f, destination=/data, driver=local, propagation=, read/write=true)
|
||||||
|
2025-12-26T18:05:08.083750320+01:00 network connect f9303d265b7c4eadd53194f11a7203398a0fb64cacedec113668cea7448632a3 (container=f606f132edfe329a81b3ec57a35a707f957409c387c10e7b8e78f984cbbef72f, name=bridge, type=bridge)
|
||||||
|
2025-12-26T18:05:08.117011831+01:00 container start f606f132edfe329a81b3ec57a35a707f957409c387c10e7b8e78f984cbbef72f (image=alpine:3.20, name=eloquent_solomon)
|
||||||
|
2025-12-26T18:05:08.286072714+01:00 network disconnect f9303d265b7c4eadd53194f11a7203398a0fb64cacedec113668cea7448632a3 (container=f606f132edfe329a81b3ec57a35a707f957409c387c10e7b8e78f984cbbef72f, name=bridge, type=bridge)
|
||||||
|
2025-12-26T18:05:08.306579097+01:00 volume unmount baudolo-e2e-files-full-468c9a54be-vol-src (container=f606f132edfe329a81b3ec57a35a707f957409c387c10e7b8e78f984cbbef72f, driver=local)
|
||||||
|
2025-12-26T18:05:08.326825706+01:00 container die f606f132edfe329a81b3ec57a35a707f957409c387c10e7b8e78f984cbbef72f (execDuration=0, exitCode=0, image=alpine:3.20, name=eloquent_solomon)
|
||||||
|
2025-12-26T18:05:08.391069360+01:00 container destroy f606f132edfe329a81b3ec57a35a707f957409c387c10e7b8e78f984cbbef72f (image=alpine:3.20, name=eloquent_solomon)
|
||||||
|
2025-12-26T18:05:08.792526442+01:00 volume destroy baudolo-e2e-files-full-468c9a54be-vol-src (driver=local)
|
||||||
134
artifacts/dind-logs-20251226141235.txt
Normal file
134
artifacts/dind-logs-20251226141235.txt
Normal file
@@ -0,0 +1,134 @@
|
|||||||
|
cat: can't open '/proc/net/ip6_tables_names': No such file or directory
|
||||||
|
cat: can't open '/proc/net/arp_tables_names': No such file or directory
|
||||||
|
iptables v1.8.11 (nf_tables)
|
||||||
|
time="2025-12-26T13:12:35.607239802Z" level=info msg="Starting up"
|
||||||
|
time="2025-12-26T13:12:35.607448321Z" level=warning msg="Binding to IP address without --tlsverify is insecure and gives root access on this machine to everyone who has access to your network." host="tcp://0.0.0.0:2375"
|
||||||
|
time="2025-12-26T13:12:35.607454883Z" level=warning msg="Binding to an IP address, even on localhost, can also give access to scripts run in a browser. Be safe out there!" host="tcp://0.0.0.0:2375"
|
||||||
|
time="2025-12-26T13:12:35.607457761Z" level=warning msg="[DEPRECATION NOTICE] In future versions this will be a hard failure preventing the daemon from starting! Learn more at: https://docs.docker.com/go/api-security/" host="tcp://0.0.0.0:2375"
|
||||||
|
time="2025-12-26T13:12:36.607996436Z" level=info msg="containerd not running, starting managed containerd"
|
||||||
|
time="2025-12-26T13:12:36.608758080Z" level=info msg="started new containerd process" address=/var/run/docker/containerd/containerd.sock module=libcontainerd pid=38
|
||||||
|
time="2025-12-26T13:12:36.617804077Z" level=info msg="starting containerd" revision=1c4457e00facac03ce1d75f7b6777a7a851e5c41 version=v2.2.0
|
||||||
|
time="2025-12-26T13:12:36.622418653Z" level=warning msg="Configuration migrated from version 2, use `containerd config migrate` to avoid migration" t="2.104µs"
|
||||||
|
time="2025-12-26T13:12:36.622438034Z" level=info msg="loading plugin" id=io.containerd.content.v1.content type=io.containerd.content.v1
|
||||||
|
time="2025-12-26T13:12:36.622465608Z" level=info msg="loading plugin" id=io.containerd.image-verifier.v1.bindir type=io.containerd.image-verifier.v1
|
||||||
|
time="2025-12-26T13:12:36.622474615Z" level=info msg="loading plugin" id=io.containerd.internal.v1.opt type=io.containerd.internal.v1
|
||||||
|
time="2025-12-26T13:12:36.622633460Z" level=info msg="loading plugin" id=io.containerd.warning.v1.deprecations type=io.containerd.warning.v1
|
||||||
|
time="2025-12-26T13:12:36.622646333Z" level=info msg="loading plugin" id=io.containerd.mount-handler.v1.erofs type=io.containerd.mount-handler.v1
|
||||||
|
time="2025-12-26T13:12:36.622653404Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.blockfile type=io.containerd.snapshotter.v1
|
||||||
|
time="2025-12-26T13:12:36.622691099Z" level=info msg="skip loading plugin" error="no scratch file generator: skip plugin" id=io.containerd.snapshotter.v1.blockfile type=io.containerd.snapshotter.v1
|
||||||
|
time="2025-12-26T13:12:36.622699155Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.devmapper type=io.containerd.snapshotter.v1
|
||||||
|
time="2025-12-26T13:12:36.622720446Z" level=info msg="skip loading plugin" error="devmapper not configured: skip plugin" id=io.containerd.snapshotter.v1.devmapper type=io.containerd.snapshotter.v1
|
||||||
|
time="2025-12-26T13:12:36.622726589Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.erofs type=io.containerd.snapshotter.v1
|
||||||
|
time="2025-12-26T13:12:36.622839203Z" level=info msg="skip loading plugin" error="EROFS unsupported, please `modprobe erofs`: skip plugin" id=io.containerd.snapshotter.v1.erofs type=io.containerd.snapshotter.v1
|
||||||
|
time="2025-12-26T13:12:36.622850172Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.native type=io.containerd.snapshotter.v1
|
||||||
|
time="2025-12-26T13:12:36.622903679Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.overlayfs type=io.containerd.snapshotter.v1
|
||||||
|
time="2025-12-26T13:12:36.623020836Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.zfs type=io.containerd.snapshotter.v1
|
||||||
|
time="2025-12-26T13:12:36.623045341Z" level=info msg="skip loading plugin" error="lstat /var/lib/docker/containerd/daemon/io.containerd.snapshotter.v1.zfs: no such file or directory: skip plugin" id=io.containerd.snapshotter.v1.zfs type=io.containerd.snapshotter.v1
|
||||||
|
time="2025-12-26T13:12:36.623053379Z" level=info msg="loading plugin" id=io.containerd.event.v1.exchange type=io.containerd.event.v1
|
||||||
|
time="2025-12-26T13:12:36.623071367Z" level=info msg="loading plugin" id=io.containerd.monitor.task.v1.cgroups type=io.containerd.monitor.task.v1
|
||||||
|
time="2025-12-26T13:12:36.623184820Z" level=info msg="loading plugin" id=io.containerd.metadata.v1.bolt type=io.containerd.metadata.v1
|
||||||
|
time="2025-12-26T13:12:36.623223325Z" level=info msg="metadata content store policy set" policy=shared
|
||||||
|
time="2025-12-26T13:12:36.669034596Z" level=info msg="loading plugin" id=io.containerd.gc.v1.scheduler type=io.containerd.gc.v1
|
||||||
|
time="2025-12-26T13:12:36.669104777Z" level=info msg="loading plugin" id=io.containerd.nri.v1.nri type=io.containerd.nri.v1
|
||||||
|
time="2025-12-26T13:12:36.669134319Z" level=info msg="built-in NRI default validator is disabled"
|
||||||
|
time="2025-12-26T13:12:36.669139961Z" level=info msg="runtime interface created"
|
||||||
|
time="2025-12-26T13:12:36.669143234Z" level=info msg="created NRI interface"
|
||||||
|
time="2025-12-26T13:12:36.669149993Z" level=info msg="loading plugin" id=io.containerd.differ.v1.erofs type=io.containerd.differ.v1
|
||||||
|
time="2025-12-26T13:12:36.669265965Z" level=info msg="skip loading plugin" error="failed to check mkfs.erofs availability: failed to run mkfs.erofs --help: exec: \"mkfs.erofs\": executable file not found in $PATH: skip plugin" id=io.containerd.differ.v1.erofs type=io.containerd.differ.v1
|
||||||
|
time="2025-12-26T13:12:36.669276775Z" level=info msg="loading plugin" id=io.containerd.differ.v1.walking type=io.containerd.differ.v1
|
||||||
|
time="2025-12-26T13:12:36.669286109Z" level=info msg="loading plugin" id=io.containerd.lease.v1.manager type=io.containerd.lease.v1
|
||||||
|
time="2025-12-26T13:12:36.669293623Z" level=info msg="loading plugin" id=io.containerd.mount-manager.v1.bolt type=io.containerd.mount-manager.v1
|
||||||
|
time="2025-12-26T13:12:36.680202251Z" level=info msg="loading plugin" id=io.containerd.service.v1.containers-service type=io.containerd.service.v1
|
||||||
|
time="2025-12-26T13:12:36.680236484Z" level=info msg="loading plugin" id=io.containerd.service.v1.content-service type=io.containerd.service.v1
|
||||||
|
time="2025-12-26T13:12:36.680245733Z" level=info msg="loading plugin" id=io.containerd.service.v1.diff-service type=io.containerd.service.v1
|
||||||
|
time="2025-12-26T13:12:36.680257639Z" level=info msg="loading plugin" id=io.containerd.service.v1.images-service type=io.containerd.service.v1
|
||||||
|
time="2025-12-26T13:12:36.680272631Z" level=info msg="loading plugin" id=io.containerd.service.v1.introspection-service type=io.containerd.service.v1
|
||||||
|
time="2025-12-26T13:12:36.680281754Z" level=info msg="loading plugin" id=io.containerd.service.v1.namespaces-service type=io.containerd.service.v1
|
||||||
|
time="2025-12-26T13:12:36.680289097Z" level=info msg="loading plugin" id=io.containerd.service.v1.snapshots-service type=io.containerd.service.v1
|
||||||
|
time="2025-12-26T13:12:36.680296494Z" level=info msg="loading plugin" id=io.containerd.shim.v1.manager type=io.containerd.shim.v1
|
||||||
|
time="2025-12-26T13:12:36.680304796Z" level=info msg="loading plugin" id=io.containerd.runtime.v2.task type=io.containerd.runtime.v2
|
||||||
|
time="2025-12-26T13:12:36.680492159Z" level=info msg="loading plugin" id=io.containerd.service.v1.tasks-service type=io.containerd.service.v1
|
||||||
|
time="2025-12-26T13:12:36.680510697Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.containers type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T13:12:36.680519856Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.content type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T13:12:36.680527108Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.diff type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T13:12:36.680538702Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.events type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T13:12:36.680545781Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.images type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T13:12:36.680553487Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.introspection type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T13:12:36.680560942Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.leases type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T13:12:36.680569212Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.mounts type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T13:12:36.680576118Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.namespaces type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T13:12:36.680584646Z" level=info msg="loading plugin" id=io.containerd.sandbox.store.v1.local type=io.containerd.sandbox.store.v1
|
||||||
|
time="2025-12-26T13:12:36.680591336Z" level=info msg="loading plugin" id=io.containerd.transfer.v1.local type=io.containerd.transfer.v1
|
||||||
|
time="2025-12-26T13:12:36.680616357Z" level=info msg="loading plugin" id=io.containerd.cri.v1.images type=io.containerd.cri.v1
|
||||||
|
time="2025-12-26T13:12:36.680648761Z" level=info msg="Get image filesystem path \"/var/lib/docker/containerd/daemon/io.containerd.snapshotter.v1.overlayfs\" for snapshotter \"overlayfs\""
|
||||||
|
time="2025-12-26T13:12:36.680657983Z" level=info msg="Start snapshots syncer"
|
||||||
|
time="2025-12-26T13:12:36.680676626Z" level=info msg="loading plugin" id=io.containerd.cri.v1.runtime type=io.containerd.cri.v1
|
||||||
|
time="2025-12-26T13:12:36.680840549Z" level=info msg="starting cri plugin" config="{\"containerd\":{\"defaultRuntimeName\":\"runc\",\"runtimes\":{\"runc\":{\"runtimeType\":\"io.containerd.runc.v2\",\"runtimePath\":\"\",\"PodAnnotations\":null,\"ContainerAnnotations\":null,\"options\":{\"BinaryName\":\"\",\"CriuImagePath\":\"\",\"CriuWorkPath\":\"\",\"IoGid\":0,\"IoUid\":0,\"NoNewKeyring\":false,\"Root\":\"\",\"ShimCgroup\":\"\",\"SystemdCgroup\":false},\"privileged_without_host_devices\":false,\"privileged_without_host_devices_all_devices_allowed\":false,\"cgroupWritable\":false,\"baseRuntimeSpec\":\"\",\"cniConfDir\":\"\",\"cniMaxConfNum\":0,\"snapshotter\":\"\",\"sandboxer\":\"podsandbox\",\"io_type\":\"\"}},\"ignoreBlockIONotEnabledErrors\":false,\"ignoreRdtNotEnabledErrors\":false},\"cni\":{\"binDir\":\"\",\"binDirs\":[\"/opt/cni/bin\"],\"confDir\":\"/etc/cni/net.d\",\"maxConfNum\":1,\"setupSerially\":false,\"confTemplate\":\"\",\"ipPref\":\"\",\"useInternalLoopback\":false},\"enableSelinux\":false,\"selinuxCategoryRange\":1024,\"maxContainerLogLineSize\":16384,\"disableApparmor\":false,\"restrictOOMScoreAdj\":false,\"disableProcMount\":false,\"unsetSeccompProfile\":\"\",\"tolerateMissingHugetlbController\":true,\"disableHugetlbController\":true,\"device_ownership_from_security_context\":false,\"ignoreImageDefinedVolumes\":false,\"netnsMountsUnderStateDir\":false,\"enableUnprivilegedPorts\":true,\"enableUnprivilegedICMP\":true,\"enableCDI\":true,\"cdiSpecDirs\":[\"/etc/cdi\",\"/var/run/cdi\"],\"drainExecSyncIOTimeout\":\"0s\",\"ignoreDeprecationWarnings\":null,\"containerdRootDir\":\"/var/lib/docker/containerd/daemon\",\"containerdEndpoint\":\"/var/run/docker/containerd/containerd.sock\",\"rootDir\":\"/var/lib/docker/containerd/daemon/io.containerd.grpc.v1.cri\",\"stateDir\":\"/var/run/docker/containerd/daemon/io.containerd.grpc.v1.cri\"}"
|
||||||
|
time="2025-12-26T13:12:36.680887507Z" level=info msg="loading plugin" id=io.containerd.podsandbox.controller.v1.podsandbox type=io.containerd.podsandbox.controller.v1
|
||||||
|
time="2025-12-26T13:12:36.680919435Z" level=info msg="loading plugin" id=io.containerd.sandbox.controller.v1.shim type=io.containerd.sandbox.controller.v1
|
||||||
|
time="2025-12-26T13:12:36.681022329Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.sandbox-controllers type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T13:12:36.681039655Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.sandboxes type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T13:12:36.681047783Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.snapshots type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T13:12:36.681063337Z" level=info msg="loading plugin" id=io.containerd.streaming.v1.manager type=io.containerd.streaming.v1
|
||||||
|
time="2025-12-26T13:12:36.681071624Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.streaming type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T13:12:36.681079067Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.tasks type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T13:12:36.681086621Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.transfer type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T13:12:36.681096033Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.version type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T13:12:36.681103407Z" level=info msg="loading plugin" id=io.containerd.monitor.container.v1.restart type=io.containerd.monitor.container.v1
|
||||||
|
time="2025-12-26T13:12:36.681128288Z" level=info msg="loading plugin" id=io.containerd.tracing.processor.v1.otlp type=io.containerd.tracing.processor.v1
|
||||||
|
time="2025-12-26T13:12:36.681139875Z" level=info msg="skip loading plugin" error="skip plugin: tracing endpoint not configured" id=io.containerd.tracing.processor.v1.otlp type=io.containerd.tracing.processor.v1
|
||||||
|
time="2025-12-26T13:12:36.681146627Z" level=info msg="loading plugin" id=io.containerd.internal.v1.tracing type=io.containerd.internal.v1
|
||||||
|
time="2025-12-26T13:12:36.681153149Z" level=info msg="skip loading plugin" error="skip plugin: tracing endpoint not configured" id=io.containerd.internal.v1.tracing type=io.containerd.internal.v1
|
||||||
|
time="2025-12-26T13:12:36.681159434Z" level=info msg="loading plugin" id=io.containerd.ttrpc.v1.otelttrpc type=io.containerd.ttrpc.v1
|
||||||
|
time="2025-12-26T13:12:36.681167042Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.healthcheck type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T13:12:36.681336396Z" level=info msg=serving... address=/var/run/docker/containerd/containerd-debug.sock
|
||||||
|
time="2025-12-26T13:12:36.681387990Z" level=info msg=serving... address=/var/run/docker/containerd/containerd.sock.ttrpc
|
||||||
|
time="2025-12-26T13:12:36.681425600Z" level=info msg=serving... address=/var/run/docker/containerd/containerd.sock
|
||||||
|
time="2025-12-26T13:12:36.681440829Z" level=info msg="containerd successfully booted in 0.064165s"
|
||||||
|
time="2025-12-26T13:12:36.684626150Z" level=info msg="OTEL tracing is not configured, using no-op tracer provider"
|
||||||
|
time="2025-12-26T13:12:36.684700068Z" level=info msg="CDI directory does not exist, skipping: failed to monitor for changes: no such file or directory" dir=/var/run/cdi
|
||||||
|
time="2025-12-26T13:12:36.684708372Z" level=info msg="CDI directory does not exist, skipping: failed to monitor for changes: no such file or directory" dir=/etc/cdi
|
||||||
|
time="2025-12-26T13:12:36.690649847Z" level=info msg="Creating a containerd client" address=/var/run/docker/containerd/containerd.sock timeout=1m0s
|
||||||
|
time="2025-12-26T13:12:36.744755094Z" level=info msg="Loading containers: start."
|
||||||
|
time="2025-12-26T13:12:36.744783313Z" level=info msg="Starting daemon with containerd snapshotter integration enabled"
|
||||||
|
time="2025-12-26T13:12:36.746236880Z" level=info msg="Restoring containers: start."
|
||||||
|
time="2025-12-26T13:12:36.757742895Z" level=info msg="Deleting nftables IPv4 rules" error="exec: \"nft\": executable file not found in $PATH"
|
||||||
|
time="2025-12-26T13:12:36.757766237Z" level=info msg="Deleting nftables IPv6 rules" error="exec: \"nft\": executable file not found in $PATH"
|
||||||
|
time="2025-12-26T13:12:36.947985615Z" level=info msg="Loading containers: done."
|
||||||
|
time="2025-12-26T13:12:36.952727549Z" level=warning msg="[DEPRECATION NOTICE]: API is accessible on http://0.0.0.0:2375 without encryption.\n Access to the remote API is equivalent to root access on the host. Refer\n to the 'Docker daemon attack surface' section in the documentation for\n more information: https://docs.docker.com/go/attack-surface/\nIn future versions this will be a hard failure preventing the daemon from starting! Learn more at: https://docs.docker.com/go/api-security/"
|
||||||
|
time="2025-12-26T13:12:36.952745839Z" level=info msg="Docker daemon" commit=fbf3ed2 containerd-snapshotter=true storage-driver=overlayfs version=29.1.3
|
||||||
|
time="2025-12-26T13:12:36.952799028Z" level=info msg="Initializing buildkit"
|
||||||
|
time="2025-12-26T13:12:37.022912976Z" level=info msg="Completed buildkit initialization"
|
||||||
|
time="2025-12-26T13:12:37.025103241Z" level=info msg="Daemon has completed initialization"
|
||||||
|
time="2025-12-26T13:12:37.025175858Z" level=info msg="API listen on /var/run/docker.sock"
|
||||||
|
time="2025-12-26T13:12:37.025188808Z" level=info msg="API listen on [::]:2375"
|
||||||
|
time="2025-12-26T13:12:41.193081246Z" level=info msg="image pulled" digest="sha256:049c6ec3dad73daa72a97d8031862bb66cd07ae65db661c82b9a739cdc3fc294" remote="ghcr.io/kevinveenbirkenbach/alpine-rsync:latest"
|
||||||
|
time="2025-12-26T13:12:45.126313735Z" level=info msg="image pulled" digest="sha256:765942a4039992336de8dd5db680586e1a206607dd06170ff0a37267a9e01958" remote="docker.io/library/alpine:3.20"
|
||||||
|
time="2025-12-26T13:12:50.299948198Z" level=info msg="connecting to shim 972154cc8d0901f81a054f0e5e3ddc210b2b0708d9676d0f3ec509318798c6a1" address="unix:///run/containerd/s/fc3ad1eeddab1ec96fdb9926086343c235f3e670360186e882cc05677fe69f38" namespace=moby protocol=ttrpc version=3
|
||||||
|
time="2025-12-26T13:12:50.412014169Z" level=info msg="No non-localhost DNS nameservers are left in resolv.conf. Using default external servers"
|
||||||
|
time="2025-12-26T13:12:50.430354220Z" level=info msg="sbJoin: gwep4 ''->'7d5c918912ea', gwep6 ''->''" eid=7d5c918912ea ep=zen_northcutt net=bridge nid=273bd12dbccf
|
||||||
|
time="2025-12-26T13:12:50.488045137Z" level=info msg="ignoring event" container=972154cc8d0901f81a054f0e5e3ddc210b2b0708d9676d0f3ec509318798c6a1 module=libcontainerd namespace=moby topic=/tasks/delete type="*events.TaskDelete"
|
||||||
|
time="2025-12-26T13:12:50.488095870Z" level=info msg="shim disconnected" id=972154cc8d0901f81a054f0e5e3ddc210b2b0708d9676d0f3ec509318798c6a1 namespace=moby
|
||||||
|
time="2025-12-26T13:12:50.488117693Z" level=info msg="cleaning up after shim disconnected" id=972154cc8d0901f81a054f0e5e3ddc210b2b0708d9676d0f3ec509318798c6a1 namespace=moby
|
||||||
|
time="2025-12-26T13:12:50.488122051Z" level=info msg="cleaning up dead shim" id=972154cc8d0901f81a054f0e5e3ddc210b2b0708d9676d0f3ec509318798c6a1 namespace=moby
|
||||||
|
time="2025-12-26T13:12:51.324794894Z" level=info msg="connecting to shim 6603444bf2ed97d313096c400af3d5c8e925db35486e3ae3964592de58753334" address="unix:///run/containerd/s/90adb363b22d54ffc63ff01f8efbb54e3c6b6211b7d5f79e0a196bd74836f1f1" namespace=moby protocol=ttrpc version=3
|
||||||
|
time="2025-12-26T13:12:51.415903351Z" level=info msg="No non-localhost DNS nameservers are left in resolv.conf. Using default external servers"
|
||||||
|
time="2025-12-26T13:12:51.432443828Z" level=info msg="sbJoin: gwep4 ''->'bc84305bbcdd', gwep6 ''->''" eid=bc84305bbcdd ep=frosty_booth net=bridge nid=273bd12dbccf
|
||||||
|
time="2025-12-26T13:12:51.491912087Z" level=info msg="shim disconnected" id=6603444bf2ed97d313096c400af3d5c8e925db35486e3ae3964592de58753334 namespace=moby
|
||||||
|
time="2025-12-26T13:12:51.491933510Z" level=info msg="cleaning up after shim disconnected" id=6603444bf2ed97d313096c400af3d5c8e925db35486e3ae3964592de58753334 namespace=moby
|
||||||
|
time="2025-12-26T13:12:51.491939839Z" level=info msg="cleaning up dead shim" id=6603444bf2ed97d313096c400af3d5c8e925db35486e3ae3964592de58753334 namespace=moby
|
||||||
|
time="2025-12-26T13:12:51.492007924Z" level=info msg="ignoring event" container=6603444bf2ed97d313096c400af3d5c8e925db35486e3ae3964592de58753334 module=libcontainerd namespace=moby topic=/tasks/delete type="*events.TaskDelete"
|
||||||
|
time="2025-12-26T13:13:13.522436498Z" level=info msg="image pulled" digest="sha256:1cac8492bd78b1ec693238dc600be173397efd7b55eabc725abc281dc855b482" remote="docker.io/library/mariadb:11"
|
||||||
|
time="2025-12-26T13:13:13.949236937Z" level=info msg="connecting to shim c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b" address="unix:///run/containerd/s/9630f7225dc2a2122064ccc65f2f0087cdfb4109efa46c6bcfd990ede6ea19ce" namespace=moby protocol=ttrpc version=3
|
||||||
|
time="2025-12-26T13:13:14.054875143Z" level=info msg="No non-localhost DNS nameservers are left in resolv.conf. Using default external servers"
|
||||||
|
time="2025-12-26T13:13:14.071547528Z" level=info msg="sbJoin: gwep4 ''->'597a400c9b0e', gwep6 ''->''" eid=597a400c9b0e ep=baudolo-e2e-mariadb-full-0790ca5d41-mariadb net=bridge nid=273bd12dbccf
|
||||||
|
time="2025-12-26T13:13:23.286724224Z" level=info msg="connecting to shim 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f" address="unix:///run/containerd/s/f8d1041b5d1ed7817faf358db9bb1b596840a75c0604a14f8b36b3677e3d9bf2" namespace=moby protocol=ttrpc version=3
|
||||||
|
time="2025-12-26T13:13:23.388684715Z" level=info msg="No non-localhost DNS nameservers are left in resolv.conf. Using default external servers"
|
||||||
|
time="2025-12-26T13:13:23.411947042Z" level=info msg="sbJoin: gwep4 ''->'8253bf043b58', gwep6 ''->''" eid=8253bf043b58 ep=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb net=bridge nid=273bd12dbccf
|
||||||
|
time="2025-12-26T13:14:00.542854374Z" level=info msg="image pulled" digest="sha256:d4c3314b2dd74ff23cd6cd07e4d7e737cb6ef791c22a7cbd744cfbfb4815df72" remote="docker.io/library/postgres:16"
|
||||||
|
time="2025-12-26T13:14:00.901578914Z" level=info msg="connecting to shim 875008fe1e9e58e18eed4d14e13feeba1424ebcace789a038abc308df88b8a3f" address="unix:///run/containerd/s/afbe754b0641b7b82689d5d935c09c3911c999580a8cd466eef5cd345d218376" namespace=moby protocol=ttrpc version=3
|
||||||
|
time="2025-12-26T13:14:01.016704015Z" level=info msg="No non-localhost DNS nameservers are left in resolv.conf. Using default external servers"
|
||||||
|
time="2025-12-26T13:14:01.040324806Z" level=info msg="sbJoin: gwep4 ''->'5a2f1953c3f0', gwep6 ''->''" eid=5a2f1953c3f0 ep=baudolo-e2e-postgres-full-e9784b8d4b-pg net=bridge nid=273bd12dbccf
|
||||||
|
time="2025-12-26T13:14:03.968249238Z" level=info msg="connecting to shim 18ef5793cfc5ea0e4c4d95344b5c3589d9e679c120b9ff142a59e9de880d5702" address="unix:///run/containerd/s/a03b9519bbae0d99bb4256cfda3177c795e58ac0c5f85c23f75a9b029bbf9fa5" namespace=moby protocol=ttrpc version=3
|
||||||
|
time="2025-12-26T13:14:04.076486784Z" level=info msg="No non-localhost DNS nameservers are left in resolv.conf. Using default external servers"
|
||||||
|
time="2025-12-26T13:14:04.092748669Z" level=info msg="sbJoin: gwep4 ''->'8b1d894976ab', gwep6 ''->''" eid=8b1d894976ab ep=baudolo-e2e-postgres-nocopy-15d1e23327-pg net=bridge nid=273bd12dbccf
|
||||||
113
artifacts/dind-logs-20251226180030.txt
Normal file
113
artifacts/dind-logs-20251226180030.txt
Normal file
@@ -0,0 +1,113 @@
|
|||||||
|
cat: can't open '/proc/net/ip6_tables_names': No such file or directory
|
||||||
|
cat: can't open '/proc/net/arp_tables_names': No such file or directory
|
||||||
|
iptables v1.8.11 (nf_tables)
|
||||||
|
time="2025-12-26T17:00:30.670240834Z" level=info msg="Starting up"
|
||||||
|
time="2025-12-26T17:00:30.670483375Z" level=warning msg="Binding to IP address without --tlsverify is insecure and gives root access on this machine to everyone who has access to your network." host="tcp://0.0.0.0:2375"
|
||||||
|
time="2025-12-26T17:00:30.670490199Z" level=warning msg="Binding to an IP address, even on localhost, can also give access to scripts run in a browser. Be safe out there!" host="tcp://0.0.0.0:2375"
|
||||||
|
time="2025-12-26T17:00:30.670493463Z" level=warning msg="[DEPRECATION NOTICE] In future versions this will be a hard failure preventing the daemon from starting! Learn more at: https://docs.docker.com/go/api-security/" host="tcp://0.0.0.0:2375"
|
||||||
|
time="2025-12-26T17:00:31.671142252Z" level=info msg="containerd not running, starting managed containerd"
|
||||||
|
time="2025-12-26T17:00:31.671816629Z" level=info msg="started new containerd process" address=/var/run/docker/containerd/containerd.sock module=libcontainerd pid=38
|
||||||
|
time="2025-12-26T17:00:31.679174629Z" level=info msg="starting containerd" revision=1c4457e00facac03ce1d75f7b6777a7a851e5c41 version=v2.2.0
|
||||||
|
time="2025-12-26T17:00:31.686162725Z" level=warning msg="Configuration migrated from version 2, use `containerd config migrate` to avoid migration" t="3.13µs"
|
||||||
|
time="2025-12-26T17:00:31.686190065Z" level=info msg="loading plugin" id=io.containerd.content.v1.content type=io.containerd.content.v1
|
||||||
|
time="2025-12-26T17:00:31.686235899Z" level=info msg="loading plugin" id=io.containerd.image-verifier.v1.bindir type=io.containerd.image-verifier.v1
|
||||||
|
time="2025-12-26T17:00:31.686250875Z" level=info msg="loading plugin" id=io.containerd.internal.v1.opt type=io.containerd.internal.v1
|
||||||
|
time="2025-12-26T17:00:31.686450438Z" level=info msg="loading plugin" id=io.containerd.warning.v1.deprecations type=io.containerd.warning.v1
|
||||||
|
time="2025-12-26T17:00:31.686467644Z" level=info msg="loading plugin" id=io.containerd.mount-handler.v1.erofs type=io.containerd.mount-handler.v1
|
||||||
|
time="2025-12-26T17:00:31.686479124Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.blockfile type=io.containerd.snapshotter.v1
|
||||||
|
time="2025-12-26T17:00:31.686532605Z" level=info msg="skip loading plugin" error="no scratch file generator: skip plugin" id=io.containerd.snapshotter.v1.blockfile type=io.containerd.snapshotter.v1
|
||||||
|
time="2025-12-26T17:00:31.686544650Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.devmapper type=io.containerd.snapshotter.v1
|
||||||
|
time="2025-12-26T17:00:31.686555001Z" level=info msg="skip loading plugin" error="devmapper not configured: skip plugin" id=io.containerd.snapshotter.v1.devmapper type=io.containerd.snapshotter.v1
|
||||||
|
time="2025-12-26T17:00:31.686562710Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.erofs type=io.containerd.snapshotter.v1
|
||||||
|
time="2025-12-26T17:00:31.686697989Z" level=info msg="skip loading plugin" error="EROFS unsupported, please `modprobe erofs`: skip plugin" id=io.containerd.snapshotter.v1.erofs type=io.containerd.snapshotter.v1
|
||||||
|
time="2025-12-26T17:00:31.686709462Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.native type=io.containerd.snapshotter.v1
|
||||||
|
time="2025-12-26T17:00:31.686769573Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.overlayfs type=io.containerd.snapshotter.v1
|
||||||
|
time="2025-12-26T17:00:31.686909801Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.zfs type=io.containerd.snapshotter.v1
|
||||||
|
time="2025-12-26T17:00:31.686945246Z" level=info msg="skip loading plugin" error="lstat /var/lib/docker/containerd/daemon/io.containerd.snapshotter.v1.zfs: no such file or directory: skip plugin" id=io.containerd.snapshotter.v1.zfs type=io.containerd.snapshotter.v1
|
||||||
|
time="2025-12-26T17:00:31.686956789Z" level=info msg="loading plugin" id=io.containerd.event.v1.exchange type=io.containerd.event.v1
|
||||||
|
time="2025-12-26T17:00:31.686981832Z" level=info msg="loading plugin" id=io.containerd.monitor.task.v1.cgroups type=io.containerd.monitor.task.v1
|
||||||
|
time="2025-12-26T17:00:31.687563537Z" level=info msg="loading plugin" id=io.containerd.metadata.v1.bolt type=io.containerd.metadata.v1
|
||||||
|
time="2025-12-26T17:00:31.687705806Z" level=info msg="metadata content store policy set" policy=shared
|
||||||
|
time="2025-12-26T17:00:31.720537850Z" level=info msg="loading plugin" id=io.containerd.gc.v1.scheduler type=io.containerd.gc.v1
|
||||||
|
time="2025-12-26T17:00:31.720581316Z" level=info msg="loading plugin" id=io.containerd.nri.v1.nri type=io.containerd.nri.v1
|
||||||
|
time="2025-12-26T17:00:31.720628516Z" level=info msg="built-in NRI default validator is disabled"
|
||||||
|
time="2025-12-26T17:00:31.720631468Z" level=info msg="runtime interface created"
|
||||||
|
time="2025-12-26T17:00:31.720633477Z" level=info msg="created NRI interface"
|
||||||
|
time="2025-12-26T17:00:31.720637569Z" level=info msg="loading plugin" id=io.containerd.differ.v1.erofs type=io.containerd.differ.v1
|
||||||
|
time="2025-12-26T17:00:31.720688284Z" level=info msg="skip loading plugin" error="failed to check mkfs.erofs availability: failed to run mkfs.erofs --help: exec: \"mkfs.erofs\": executable file not found in $PATH: skip plugin" id=io.containerd.differ.v1.erofs type=io.containerd.differ.v1
|
||||||
|
time="2025-12-26T17:00:31.720694077Z" level=info msg="loading plugin" id=io.containerd.differ.v1.walking type=io.containerd.differ.v1
|
||||||
|
time="2025-12-26T17:00:31.720700483Z" level=info msg="loading plugin" id=io.containerd.lease.v1.manager type=io.containerd.lease.v1
|
||||||
|
time="2025-12-26T17:00:31.720705680Z" level=info msg="loading plugin" id=io.containerd.mount-manager.v1.bolt type=io.containerd.mount-manager.v1
|
||||||
|
time="2025-12-26T17:00:31.730341558Z" level=info msg="loading plugin" id=io.containerd.service.v1.containers-service type=io.containerd.service.v1
|
||||||
|
time="2025-12-26T17:00:31.730376426Z" level=info msg="loading plugin" id=io.containerd.service.v1.content-service type=io.containerd.service.v1
|
||||||
|
time="2025-12-26T17:00:31.730387303Z" level=info msg="loading plugin" id=io.containerd.service.v1.diff-service type=io.containerd.service.v1
|
||||||
|
time="2025-12-26T17:00:31.730398550Z" level=info msg="loading plugin" id=io.containerd.service.v1.images-service type=io.containerd.service.v1
|
||||||
|
time="2025-12-26T17:00:31.730409225Z" level=info msg="loading plugin" id=io.containerd.service.v1.introspection-service type=io.containerd.service.v1
|
||||||
|
time="2025-12-26T17:00:31.730418716Z" level=info msg="loading plugin" id=io.containerd.service.v1.namespaces-service type=io.containerd.service.v1
|
||||||
|
time="2025-12-26T17:00:31.730426969Z" level=info msg="loading plugin" id=io.containerd.service.v1.snapshots-service type=io.containerd.service.v1
|
||||||
|
time="2025-12-26T17:00:31.730439790Z" level=info msg="loading plugin" id=io.containerd.shim.v1.manager type=io.containerd.shim.v1
|
||||||
|
time="2025-12-26T17:00:31.730453240Z" level=info msg="loading plugin" id=io.containerd.runtime.v2.task type=io.containerd.runtime.v2
|
||||||
|
time="2025-12-26T17:00:31.730595974Z" level=info msg="loading plugin" id=io.containerd.service.v1.tasks-service type=io.containerd.service.v1
|
||||||
|
time="2025-12-26T17:00:31.730613653Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.containers type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T17:00:31.730624484Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.content type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T17:00:31.730632974Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.diff type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T17:00:31.730641870Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.events type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T17:00:31.730649677Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.images type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T17:00:31.730658962Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.introspection type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T17:00:31.730668771Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.leases type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T17:00:31.730678507Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.mounts type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T17:00:31.730686143Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.namespaces type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T17:00:31.730706862Z" level=info msg="loading plugin" id=io.containerd.sandbox.store.v1.local type=io.containerd.sandbox.store.v1
|
||||||
|
time="2025-12-26T17:00:31.730722989Z" level=info msg="loading plugin" id=io.containerd.transfer.v1.local type=io.containerd.transfer.v1
|
||||||
|
time="2025-12-26T17:00:31.730751288Z" level=info msg="loading plugin" id=io.containerd.cri.v1.images type=io.containerd.cri.v1
|
||||||
|
time="2025-12-26T17:00:31.730857584Z" level=info msg="Get image filesystem path \"/var/lib/docker/containerd/daemon/io.containerd.snapshotter.v1.overlayfs\" for snapshotter \"overlayfs\""
|
||||||
|
time="2025-12-26T17:00:31.730877944Z" level=info msg="Start snapshots syncer"
|
||||||
|
time="2025-12-26T17:00:31.730894454Z" level=info msg="loading plugin" id=io.containerd.cri.v1.runtime type=io.containerd.cri.v1
|
||||||
|
time="2025-12-26T17:00:31.731070610Z" level=info msg="starting cri plugin" config="{\"containerd\":{\"defaultRuntimeName\":\"runc\",\"runtimes\":{\"runc\":{\"runtimeType\":\"io.containerd.runc.v2\",\"runtimePath\":\"\",\"PodAnnotations\":null,\"ContainerAnnotations\":null,\"options\":{\"BinaryName\":\"\",\"CriuImagePath\":\"\",\"CriuWorkPath\":\"\",\"IoGid\":0,\"IoUid\":0,\"NoNewKeyring\":false,\"Root\":\"\",\"ShimCgroup\":\"\",\"SystemdCgroup\":false},\"privileged_without_host_devices\":false,\"privileged_without_host_devices_all_devices_allowed\":false,\"cgroupWritable\":false,\"baseRuntimeSpec\":\"\",\"cniConfDir\":\"\",\"cniMaxConfNum\":0,\"snapshotter\":\"\",\"sandboxer\":\"podsandbox\",\"io_type\":\"\"}},\"ignoreBlockIONotEnabledErrors\":false,\"ignoreRdtNotEnabledErrors\":false},\"cni\":{\"binDir\":\"\",\"binDirs\":[\"/opt/cni/bin\"],\"confDir\":\"/etc/cni/net.d\",\"maxConfNum\":1,\"setupSerially\":false,\"confTemplate\":\"\",\"ipPref\":\"\",\"useInternalLoopback\":false},\"enableSelinux\":false,\"selinuxCategoryRange\":1024,\"maxContainerLogLineSize\":16384,\"disableApparmor\":false,\"restrictOOMScoreAdj\":false,\"disableProcMount\":false,\"unsetSeccompProfile\":\"\",\"tolerateMissingHugetlbController\":true,\"disableHugetlbController\":true,\"device_ownership_from_security_context\":false,\"ignoreImageDefinedVolumes\":false,\"netnsMountsUnderStateDir\":false,\"enableUnprivilegedPorts\":true,\"enableUnprivilegedICMP\":true,\"enableCDI\":true,\"cdiSpecDirs\":[\"/etc/cdi\",\"/var/run/cdi\"],\"drainExecSyncIOTimeout\":\"0s\",\"ignoreDeprecationWarnings\":null,\"containerdRootDir\":\"/var/lib/docker/containerd/daemon\",\"containerdEndpoint\":\"/var/run/docker/containerd/containerd.sock\",\"rootDir\":\"/var/lib/docker/containerd/daemon/io.containerd.grpc.v1.cri\",\"stateDir\":\"/var/run/docker/containerd/daemon/io.containerd.grpc.v1.cri\"}"
|
||||||
|
time="2025-12-26T17:00:31.731102405Z" level=info msg="loading plugin" id=io.containerd.podsandbox.controller.v1.podsandbox type=io.containerd.podsandbox.controller.v1
|
||||||
|
time="2025-12-26T17:00:31.731128197Z" level=info msg="loading plugin" id=io.containerd.sandbox.controller.v1.shim type=io.containerd.sandbox.controller.v1
|
||||||
|
time="2025-12-26T17:00:31.731193031Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.sandbox-controllers type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T17:00:31.731200982Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.sandboxes type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T17:00:31.731205777Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.snapshots type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T17:00:31.731209980Z" level=info msg="loading plugin" id=io.containerd.streaming.v1.manager type=io.containerd.streaming.v1
|
||||||
|
time="2025-12-26T17:00:31.731214824Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.streaming type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T17:00:31.731219248Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.tasks type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T17:00:31.731223844Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.transfer type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T17:00:31.731232946Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.version type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T17:00:31.731239826Z" level=info msg="loading plugin" id=io.containerd.monitor.container.v1.restart type=io.containerd.monitor.container.v1
|
||||||
|
time="2025-12-26T17:00:31.731255852Z" level=info msg="loading plugin" id=io.containerd.tracing.processor.v1.otlp type=io.containerd.tracing.processor.v1
|
||||||
|
time="2025-12-26T17:00:31.731263836Z" level=info msg="skip loading plugin" error="skip plugin: tracing endpoint not configured" id=io.containerd.tracing.processor.v1.otlp type=io.containerd.tracing.processor.v1
|
||||||
|
time="2025-12-26T17:00:31.731267707Z" level=info msg="loading plugin" id=io.containerd.internal.v1.tracing type=io.containerd.internal.v1
|
||||||
|
time="2025-12-26T17:00:31.731271783Z" level=info msg="skip loading plugin" error="skip plugin: tracing endpoint not configured" id=io.containerd.internal.v1.tracing type=io.containerd.internal.v1
|
||||||
|
time="2025-12-26T17:00:31.731275100Z" level=info msg="loading plugin" id=io.containerd.ttrpc.v1.otelttrpc type=io.containerd.ttrpc.v1
|
||||||
|
time="2025-12-26T17:00:31.731280016Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.healthcheck type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T17:00:31.731448393Z" level=info msg=serving... address=/var/run/docker/containerd/containerd-debug.sock
|
||||||
|
time="2025-12-26T17:00:31.731473806Z" level=info msg=serving... address=/var/run/docker/containerd/containerd.sock.ttrpc
|
||||||
|
time="2025-12-26T17:00:31.731492732Z" level=info msg=serving... address=/var/run/docker/containerd/containerd.sock
|
||||||
|
time="2025-12-26T17:00:31.731503174Z" level=info msg="containerd successfully booted in 0.052761s"
|
||||||
|
time="2025-12-26T17:00:31.734685579Z" level=info msg="OTEL tracing is not configured, using no-op tracer provider"
|
||||||
|
time="2025-12-26T17:00:31.734799553Z" level=info msg="CDI directory does not exist, skipping: failed to monitor for changes: no such file or directory" dir=/etc/cdi
|
||||||
|
time="2025-12-26T17:00:31.734812727Z" level=info msg="CDI directory does not exist, skipping: failed to monitor for changes: no such file or directory" dir=/var/run/cdi
|
||||||
|
time="2025-12-26T17:00:31.741342450Z" level=info msg="Creating a containerd client" address=/var/run/docker/containerd/containerd.sock timeout=1m0s
|
||||||
|
time="2025-12-26T17:00:31.789810808Z" level=info msg="Loading containers: start."
|
||||||
|
time="2025-12-26T17:00:31.789841146Z" level=info msg="Starting daemon with containerd snapshotter integration enabled"
|
||||||
|
time="2025-12-26T17:00:31.790944984Z" level=info msg="Restoring containers: start."
|
||||||
|
time="2025-12-26T17:00:31.801003706Z" level=info msg="Deleting nftables IPv4 rules" error="exec: \"nft\": executable file not found in $PATH"
|
||||||
|
time="2025-12-26T17:00:31.801024443Z" level=info msg="Deleting nftables IPv6 rules" error="exec: \"nft\": executable file not found in $PATH"
|
||||||
|
time="2025-12-26T17:00:31.991621063Z" level=info msg="Loading containers: done."
|
||||||
|
time="2025-12-26T17:00:31.996631011Z" level=warning msg="[DEPRECATION NOTICE]: API is accessible on http://0.0.0.0:2375 without encryption.\n Access to the remote API is equivalent to root access on the host. Refer\n to the 'Docker daemon attack surface' section in the documentation for\n more information: https://docs.docker.com/go/attack-surface/\nIn future versions this will be a hard failure preventing the daemon from starting! Learn more at: https://docs.docker.com/go/api-security/"
|
||||||
|
time="2025-12-26T17:00:31.996653056Z" level=info msg="Docker daemon" commit=fbf3ed2 containerd-snapshotter=true storage-driver=overlayfs version=29.1.3
|
||||||
|
time="2025-12-26T17:00:31.996710585Z" level=info msg="Initializing buildkit"
|
||||||
|
time="2025-12-26T17:00:32.069603995Z" level=info msg="Completed buildkit initialization"
|
||||||
|
time="2025-12-26T17:00:32.072710025Z" level=info msg="Daemon has completed initialization"
|
||||||
|
time="2025-12-26T17:00:32.072752238Z" level=info msg="API listen on /var/run/docker.sock"
|
||||||
|
time="2025-12-26T17:00:32.072773881Z" level=info msg="API listen on [::]:2375"
|
||||||
|
time="2025-12-26T17:00:43.099851916Z" level=info msg="image pulled" digest="sha256:049c6ec3dad73daa72a97d8031862bb66cd07ae65db661c82b9a739cdc3fc294" remote="ghcr.io/kevinveenbirkenbach/alpine-rsync:latest"
|
||||||
|
time="2025-12-26T17:00:48.227195916Z" level=info msg="image pulled" digest="sha256:765942a4039992336de8dd5db680586e1a206607dd06170ff0a37267a9e01958" remote="docker.io/library/alpine:3.20"
|
||||||
|
time="2025-12-26T17:00:53.300823343Z" level=info msg="connecting to shim debae25e9efdf3852a3a80174d33276bc78d40964c126972a2d9baa6fc637b45" address="unix:///run/containerd/s/bc05889af75cafd69995a5da4eaac21a9b7480650f37b4ce1d06f41d828d889e" namespace=moby protocol=ttrpc version=3
|
||||||
|
time="2025-12-26T17:00:53.401038895Z" level=info msg="No non-localhost DNS nameservers are left in resolv.conf. Using default external servers"
|
||||||
|
time="2025-12-26T17:00:53.418527896Z" level=info msg="sbJoin: gwep4 ''->'bbecf7c52919', gwep6 ''->''" eid=bbecf7c52919 ep=elated_snyder net=bridge nid=43f0f11bd281
|
||||||
|
time="2025-12-26T17:00:53.475799953Z" level=info msg="shim disconnected" id=debae25e9efdf3852a3a80174d33276bc78d40964c126972a2d9baa6fc637b45 namespace=moby
|
||||||
|
time="2025-12-26T17:00:53.475826135Z" level=info msg="cleaning up after shim disconnected" id=debae25e9efdf3852a3a80174d33276bc78d40964c126972a2d9baa6fc637b45 namespace=moby
|
||||||
|
time="2025-12-26T17:00:53.475834014Z" level=info msg="cleaning up dead shim" id=debae25e9efdf3852a3a80174d33276bc78d40964c126972a2d9baa6fc637b45 namespace=moby
|
||||||
|
time="2025-12-26T17:00:53.475840126Z" level=info msg="ignoring event" container=debae25e9efdf3852a3a80174d33276bc78d40964c126972a2d9baa6fc637b45 module=libcontainerd namespace=moby topic=/tasks/delete type="*events.TaskDelete"
|
||||||
113
artifacts/dind-logs-20251226180450.txt
Normal file
113
artifacts/dind-logs-20251226180450.txt
Normal file
@@ -0,0 +1,113 @@
|
|||||||
|
cat: can't open '/proc/net/ip6_tables_names': No such file or directory
|
||||||
|
cat: can't open '/proc/net/arp_tables_names': No such file or directory
|
||||||
|
iptables v1.8.11 (nf_tables)
|
||||||
|
time="2025-12-26T17:04:50.613107807Z" level=info msg="Starting up"
|
||||||
|
time="2025-12-26T17:04:50.613339353Z" level=warning msg="Binding to IP address without --tlsverify is insecure and gives root access on this machine to everyone who has access to your network." host="tcp://0.0.0.0:2375"
|
||||||
|
time="2025-12-26T17:04:50.613346861Z" level=warning msg="Binding to an IP address, even on localhost, can also give access to scripts run in a browser. Be safe out there!" host="tcp://0.0.0.0:2375"
|
||||||
|
time="2025-12-26T17:04:50.613349917Z" level=warning msg="[DEPRECATION NOTICE] In future versions this will be a hard failure preventing the daemon from starting! Learn more at: https://docs.docker.com/go/api-security/" host="tcp://0.0.0.0:2375"
|
||||||
|
time="2025-12-26T17:04:51.613771872Z" level=info msg="containerd not running, starting managed containerd"
|
||||||
|
time="2025-12-26T17:04:51.614652534Z" level=info msg="started new containerd process" address=/var/run/docker/containerd/containerd.sock module=libcontainerd pid=38
|
||||||
|
time="2025-12-26T17:04:51.622815401Z" level=info msg="starting containerd" revision=1c4457e00facac03ce1d75f7b6777a7a851e5c41 version=v2.2.0
|
||||||
|
time="2025-12-26T17:04:51.627029971Z" level=warning msg="Configuration migrated from version 2, use `containerd config migrate` to avoid migration" t="1.695µs"
|
||||||
|
time="2025-12-26T17:04:51.627048536Z" level=info msg="loading plugin" id=io.containerd.content.v1.content type=io.containerd.content.v1
|
||||||
|
time="2025-12-26T17:04:51.627067091Z" level=info msg="loading plugin" id=io.containerd.image-verifier.v1.bindir type=io.containerd.image-verifier.v1
|
||||||
|
time="2025-12-26T17:04:51.627071644Z" level=info msg="loading plugin" id=io.containerd.internal.v1.opt type=io.containerd.internal.v1
|
||||||
|
time="2025-12-26T17:04:51.627157330Z" level=info msg="loading plugin" id=io.containerd.warning.v1.deprecations type=io.containerd.warning.v1
|
||||||
|
time="2025-12-26T17:04:51.627162094Z" level=info msg="loading plugin" id=io.containerd.mount-handler.v1.erofs type=io.containerd.mount-handler.v1
|
||||||
|
time="2025-12-26T17:04:51.627168687Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.blockfile type=io.containerd.snapshotter.v1
|
||||||
|
time="2025-12-26T17:04:51.627186430Z" level=info msg="skip loading plugin" error="no scratch file generator: skip plugin" id=io.containerd.snapshotter.v1.blockfile type=io.containerd.snapshotter.v1
|
||||||
|
time="2025-12-26T17:04:51.627190221Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.devmapper type=io.containerd.snapshotter.v1
|
||||||
|
time="2025-12-26T17:04:51.627194071Z" level=info msg="skip loading plugin" error="devmapper not configured: skip plugin" id=io.containerd.snapshotter.v1.devmapper type=io.containerd.snapshotter.v1
|
||||||
|
time="2025-12-26T17:04:51.627197321Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.erofs type=io.containerd.snapshotter.v1
|
||||||
|
time="2025-12-26T17:04:51.627263105Z" level=info msg="skip loading plugin" error="EROFS unsupported, please `modprobe erofs`: skip plugin" id=io.containerd.snapshotter.v1.erofs type=io.containerd.snapshotter.v1
|
||||||
|
time="2025-12-26T17:04:51.627267252Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.native type=io.containerd.snapshotter.v1
|
||||||
|
time="2025-12-26T17:04:51.627289297Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.overlayfs type=io.containerd.snapshotter.v1
|
||||||
|
time="2025-12-26T17:04:51.627351514Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.zfs type=io.containerd.snapshotter.v1
|
||||||
|
time="2025-12-26T17:04:51.627366412Z" level=info msg="skip loading plugin" error="lstat /var/lib/docker/containerd/daemon/io.containerd.snapshotter.v1.zfs: no such file or directory: skip plugin" id=io.containerd.snapshotter.v1.zfs type=io.containerd.snapshotter.v1
|
||||||
|
time="2025-12-26T17:04:51.627370505Z" level=info msg="loading plugin" id=io.containerd.event.v1.exchange type=io.containerd.event.v1
|
||||||
|
time="2025-12-26T17:04:51.627384024Z" level=info msg="loading plugin" id=io.containerd.monitor.task.v1.cgroups type=io.containerd.monitor.task.v1
|
||||||
|
time="2025-12-26T17:04:51.627567625Z" level=info msg="loading plugin" id=io.containerd.metadata.v1.bolt type=io.containerd.metadata.v1
|
||||||
|
time="2025-12-26T17:04:51.627694627Z" level=info msg="metadata content store policy set" policy=shared
|
||||||
|
time="2025-12-26T17:04:51.671110562Z" level=info msg="loading plugin" id=io.containerd.gc.v1.scheduler type=io.containerd.gc.v1
|
||||||
|
time="2025-12-26T17:04:51.671180400Z" level=info msg="loading plugin" id=io.containerd.nri.v1.nri type=io.containerd.nri.v1
|
||||||
|
time="2025-12-26T17:04:51.671214347Z" level=info msg="built-in NRI default validator is disabled"
|
||||||
|
time="2025-12-26T17:04:51.671233509Z" level=info msg="runtime interface created"
|
||||||
|
time="2025-12-26T17:04:51.671237604Z" level=info msg="created NRI interface"
|
||||||
|
time="2025-12-26T17:04:51.671243623Z" level=info msg="loading plugin" id=io.containerd.differ.v1.erofs type=io.containerd.differ.v1
|
||||||
|
time="2025-12-26T17:04:51.671341286Z" level=info msg="skip loading plugin" error="failed to check mkfs.erofs availability: failed to run mkfs.erofs --help: exec: \"mkfs.erofs\": executable file not found in $PATH: skip plugin" id=io.containerd.differ.v1.erofs type=io.containerd.differ.v1
|
||||||
|
time="2025-12-26T17:04:51.671353665Z" level=info msg="loading plugin" id=io.containerd.differ.v1.walking type=io.containerd.differ.v1
|
||||||
|
time="2025-12-26T17:04:51.671363925Z" level=info msg="loading plugin" id=io.containerd.lease.v1.manager type=io.containerd.lease.v1
|
||||||
|
time="2025-12-26T17:04:51.671371889Z" level=info msg="loading plugin" id=io.containerd.mount-manager.v1.bolt type=io.containerd.mount-manager.v1
|
||||||
|
time="2025-12-26T17:04:51.682298424Z" level=info msg="loading plugin" id=io.containerd.service.v1.containers-service type=io.containerd.service.v1
|
||||||
|
time="2025-12-26T17:04:51.682322472Z" level=info msg="loading plugin" id=io.containerd.service.v1.content-service type=io.containerd.service.v1
|
||||||
|
time="2025-12-26T17:04:51.682333398Z" level=info msg="loading plugin" id=io.containerd.service.v1.diff-service type=io.containerd.service.v1
|
||||||
|
time="2025-12-26T17:04:51.682341979Z" level=info msg="loading plugin" id=io.containerd.service.v1.images-service type=io.containerd.service.v1
|
||||||
|
time="2025-12-26T17:04:51.682350038Z" level=info msg="loading plugin" id=io.containerd.service.v1.introspection-service type=io.containerd.service.v1
|
||||||
|
time="2025-12-26T17:04:51.682357562Z" level=info msg="loading plugin" id=io.containerd.service.v1.namespaces-service type=io.containerd.service.v1
|
||||||
|
time="2025-12-26T17:04:51.682373750Z" level=info msg="loading plugin" id=io.containerd.service.v1.snapshots-service type=io.containerd.service.v1
|
||||||
|
time="2025-12-26T17:04:51.682381707Z" level=info msg="loading plugin" id=io.containerd.shim.v1.manager type=io.containerd.shim.v1
|
||||||
|
time="2025-12-26T17:04:51.682391080Z" level=info msg="loading plugin" id=io.containerd.runtime.v2.task type=io.containerd.runtime.v2
|
||||||
|
time="2025-12-26T17:04:51.682525041Z" level=info msg="loading plugin" id=io.containerd.service.v1.tasks-service type=io.containerd.service.v1
|
||||||
|
time="2025-12-26T17:04:51.682541064Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.containers type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T17:04:51.682550397Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.content type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T17:04:51.682557457Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.diff type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T17:04:51.682565722Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.events type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T17:04:51.682572929Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.images type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T17:04:51.682580571Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.introspection type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T17:04:51.682587529Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.leases type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T17:04:51.682595171Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.mounts type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T17:04:51.682601599Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.namespaces type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T17:04:51.682610883Z" level=info msg="loading plugin" id=io.containerd.sandbox.store.v1.local type=io.containerd.sandbox.store.v1
|
||||||
|
time="2025-12-26T17:04:51.682621078Z" level=info msg="loading plugin" id=io.containerd.transfer.v1.local type=io.containerd.transfer.v1
|
||||||
|
time="2025-12-26T17:04:51.682644046Z" level=info msg="loading plugin" id=io.containerd.cri.v1.images type=io.containerd.cri.v1
|
||||||
|
time="2025-12-26T17:04:51.682674205Z" level=info msg="Get image filesystem path \"/var/lib/docker/containerd/daemon/io.containerd.snapshotter.v1.overlayfs\" for snapshotter \"overlayfs\""
|
||||||
|
time="2025-12-26T17:04:51.682683653Z" level=info msg="Start snapshots syncer"
|
||||||
|
time="2025-12-26T17:04:51.682701064Z" level=info msg="loading plugin" id=io.containerd.cri.v1.runtime type=io.containerd.cri.v1
|
||||||
|
time="2025-12-26T17:04:51.682882056Z" level=info msg="starting cri plugin" config="{\"containerd\":{\"defaultRuntimeName\":\"runc\",\"runtimes\":{\"runc\":{\"runtimeType\":\"io.containerd.runc.v2\",\"runtimePath\":\"\",\"PodAnnotations\":null,\"ContainerAnnotations\":null,\"options\":{\"BinaryName\":\"\",\"CriuImagePath\":\"\",\"CriuWorkPath\":\"\",\"IoGid\":0,\"IoUid\":0,\"NoNewKeyring\":false,\"Root\":\"\",\"ShimCgroup\":\"\",\"SystemdCgroup\":false},\"privileged_without_host_devices\":false,\"privileged_without_host_devices_all_devices_allowed\":false,\"cgroupWritable\":false,\"baseRuntimeSpec\":\"\",\"cniConfDir\":\"\",\"cniMaxConfNum\":0,\"snapshotter\":\"\",\"sandboxer\":\"podsandbox\",\"io_type\":\"\"}},\"ignoreBlockIONotEnabledErrors\":false,\"ignoreRdtNotEnabledErrors\":false},\"cni\":{\"binDir\":\"\",\"binDirs\":[\"/opt/cni/bin\"],\"confDir\":\"/etc/cni/net.d\",\"maxConfNum\":1,\"setupSerially\":false,\"confTemplate\":\"\",\"ipPref\":\"\",\"useInternalLoopback\":false},\"enableSelinux\":false,\"selinuxCategoryRange\":1024,\"maxContainerLogLineSize\":16384,\"disableApparmor\":false,\"restrictOOMScoreAdj\":false,\"disableProcMount\":false,\"unsetSeccompProfile\":\"\",\"tolerateMissingHugetlbController\":true,\"disableHugetlbController\":true,\"device_ownership_from_security_context\":false,\"ignoreImageDefinedVolumes\":false,\"netnsMountsUnderStateDir\":false,\"enableUnprivilegedPorts\":true,\"enableUnprivilegedICMP\":true,\"enableCDI\":true,\"cdiSpecDirs\":[\"/etc/cdi\",\"/var/run/cdi\"],\"drainExecSyncIOTimeout\":\"0s\",\"ignoreDeprecationWarnings\":null,\"containerdRootDir\":\"/var/lib/docker/containerd/daemon\",\"containerdEndpoint\":\"/var/run/docker/containerd/containerd.sock\",\"rootDir\":\"/var/lib/docker/containerd/daemon/io.containerd.grpc.v1.cri\",\"stateDir\":\"/var/run/docker/containerd/daemon/io.containerd.grpc.v1.cri\"}"
|
||||||
|
time="2025-12-26T17:04:51.682925497Z" level=info msg="loading plugin" id=io.containerd.podsandbox.controller.v1.podsandbox type=io.containerd.podsandbox.controller.v1
|
||||||
|
time="2025-12-26T17:04:51.682973419Z" level=info msg="loading plugin" id=io.containerd.sandbox.controller.v1.shim type=io.containerd.sandbox.controller.v1
|
||||||
|
time="2025-12-26T17:04:51.683071161Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.sandbox-controllers type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T17:04:51.683095568Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.sandboxes type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T17:04:51.683108804Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.snapshots type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T17:04:51.683116807Z" level=info msg="loading plugin" id=io.containerd.streaming.v1.manager type=io.containerd.streaming.v1
|
||||||
|
time="2025-12-26T17:04:51.683124837Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.streaming type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T17:04:51.683134026Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.tasks type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T17:04:51.683141550Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.transfer type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T17:04:51.683150586Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.version type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T17:04:51.683157413Z" level=info msg="loading plugin" id=io.containerd.monitor.container.v1.restart type=io.containerd.monitor.container.v1
|
||||||
|
time="2025-12-26T17:04:51.683181945Z" level=info msg="loading plugin" id=io.containerd.tracing.processor.v1.otlp type=io.containerd.tracing.processor.v1
|
||||||
|
time="2025-12-26T17:04:51.683191987Z" level=info msg="skip loading plugin" error="skip plugin: tracing endpoint not configured" id=io.containerd.tracing.processor.v1.otlp type=io.containerd.tracing.processor.v1
|
||||||
|
time="2025-12-26T17:04:51.683198479Z" level=info msg="loading plugin" id=io.containerd.internal.v1.tracing type=io.containerd.internal.v1
|
||||||
|
time="2025-12-26T17:04:51.683205005Z" level=info msg="skip loading plugin" error="skip plugin: tracing endpoint not configured" id=io.containerd.internal.v1.tracing type=io.containerd.internal.v1
|
||||||
|
time="2025-12-26T17:04:51.683210667Z" level=info msg="loading plugin" id=io.containerd.ttrpc.v1.otelttrpc type=io.containerd.ttrpc.v1
|
||||||
|
time="2025-12-26T17:04:51.683217137Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.healthcheck type=io.containerd.grpc.v1
|
||||||
|
time="2025-12-26T17:04:51.683382334Z" level=info msg=serving... address=/var/run/docker/containerd/containerd-debug.sock
|
||||||
|
time="2025-12-26T17:04:51.683440740Z" level=info msg=serving... address=/var/run/docker/containerd/containerd.sock.ttrpc
|
||||||
|
time="2025-12-26T17:04:51.683482395Z" level=info msg=serving... address=/var/run/docker/containerd/containerd.sock
|
||||||
|
time="2025-12-26T17:04:51.683496332Z" level=info msg="containerd successfully booted in 0.061180s"
|
||||||
|
time="2025-12-26T17:04:51.689868310Z" level=info msg="OTEL tracing is not configured, using no-op tracer provider"
|
||||||
|
time="2025-12-26T17:04:51.689928240Z" level=info msg="CDI directory does not exist, skipping: failed to monitor for changes: no such file or directory" dir=/etc/cdi
|
||||||
|
time="2025-12-26T17:04:51.689933180Z" level=info msg="CDI directory does not exist, skipping: failed to monitor for changes: no such file or directory" dir=/var/run/cdi
|
||||||
|
time="2025-12-26T17:04:51.696060714Z" level=info msg="Creating a containerd client" address=/var/run/docker/containerd/containerd.sock timeout=1m0s
|
||||||
|
time="2025-12-26T17:04:51.748026436Z" level=info msg="Loading containers: start."
|
||||||
|
time="2025-12-26T17:04:51.748060954Z" level=info msg="Starting daemon with containerd snapshotter integration enabled"
|
||||||
|
time="2025-12-26T17:04:51.749558601Z" level=info msg="Restoring containers: start."
|
||||||
|
time="2025-12-26T17:04:51.759819367Z" level=info msg="Deleting nftables IPv4 rules" error="exec: \"nft\": executable file not found in $PATH"
|
||||||
|
time="2025-12-26T17:04:51.759838278Z" level=info msg="Deleting nftables IPv6 rules" error="exec: \"nft\": executable file not found in $PATH"
|
||||||
|
time="2025-12-26T17:04:51.947199035Z" level=info msg="Loading containers: done."
|
||||||
|
time="2025-12-26T17:04:51.952524862Z" level=warning msg="[DEPRECATION NOTICE]: API is accessible on http://0.0.0.0:2375 without encryption.\n Access to the remote API is equivalent to root access on the host. Refer\n to the 'Docker daemon attack surface' section in the documentation for\n more information: https://docs.docker.com/go/attack-surface/\nIn future versions this will be a hard failure preventing the daemon from starting! Learn more at: https://docs.docker.com/go/api-security/"
|
||||||
|
time="2025-12-26T17:04:51.952549078Z" level=info msg="Docker daemon" commit=fbf3ed2 containerd-snapshotter=true storage-driver=overlayfs version=29.1.3
|
||||||
|
time="2025-12-26T17:04:51.952629278Z" level=info msg="Initializing buildkit"
|
||||||
|
time="2025-12-26T17:04:52.020834951Z" level=info msg="Completed buildkit initialization"
|
||||||
|
time="2025-12-26T17:04:52.025499900Z" level=info msg="Daemon has completed initialization"
|
||||||
|
time="2025-12-26T17:04:52.025532980Z" level=info msg="API listen on /var/run/docker.sock"
|
||||||
|
time="2025-12-26T17:04:52.025551717Z" level=info msg="API listen on [::]:2375"
|
||||||
|
time="2025-12-26T17:04:57.724576270Z" level=info msg="image pulled" digest="sha256:049c6ec3dad73daa72a97d8031862bb66cd07ae65db661c82b9a739cdc3fc294" remote="ghcr.io/kevinveenbirkenbach/alpine-rsync:latest"
|
||||||
|
time="2025-12-26T17:05:02.767455556Z" level=info msg="image pulled" digest="sha256:765942a4039992336de8dd5db680586e1a206607dd06170ff0a37267a9e01958" remote="docker.io/library/alpine:3.20"
|
||||||
|
time="2025-12-26T17:05:07.941089635Z" level=info msg="connecting to shim f606f132edfe329a81b3ec57a35a707f957409c387c10e7b8e78f984cbbef72f" address="unix:///run/containerd/s/d8dd997d64f10682ec22cc749e044ca9c730cb6f71bde41ab934c21fba8c11da" namespace=moby protocol=ttrpc version=3
|
||||||
|
time="2025-12-26T17:05:08.050665605Z" level=info msg="No non-localhost DNS nameservers are left in resolv.conf. Using default external servers"
|
||||||
|
time="2025-12-26T17:05:08.067292062Z" level=info msg="sbJoin: gwep4 ''->'ce9a9cdb2d56', gwep6 ''->''" eid=ce9a9cdb2d56 ep=eloquent_solomon net=bridge nid=f9303d265b7c
|
||||||
|
time="2025-12-26T17:05:08.122943760Z" level=info msg="ignoring event" container=f606f132edfe329a81b3ec57a35a707f957409c387c10e7b8e78f984cbbef72f module=libcontainerd namespace=moby topic=/tasks/delete type="*events.TaskDelete"
|
||||||
|
time="2025-12-26T17:05:08.123007623Z" level=info msg="shim disconnected" id=f606f132edfe329a81b3ec57a35a707f957409c387c10e7b8e78f984cbbef72f namespace=moby
|
||||||
|
time="2025-12-26T17:05:08.123023007Z" level=info msg="cleaning up after shim disconnected" id=f606f132edfe329a81b3ec57a35a707f957409c387c10e7b8e78f984cbbef72f namespace=moby
|
||||||
|
time="2025-12-26T17:05:08.123026335Z" level=info msg="cleaning up dead shim" id=f606f132edfe329a81b3ec57a35a707f957409c387c10e7b8e78f984cbbef72f namespace=moby
|
||||||
BIN
artifacts/e2e-tmp-20251226141235.tar.gz
Normal file
BIN
artifacts/e2e-tmp-20251226141235.tar.gz
Normal file
Binary file not shown.
BIN
artifacts/e2e-tmp-20251226180030.tar.gz
Normal file
BIN
artifacts/e2e-tmp-20251226180030.tar.gz
Normal file
Binary file not shown.
BIN
artifacts/e2e-tmp-20251226180450.tar.gz
Normal file
BIN
artifacts/e2e-tmp-20251226180450.tar.gz
Normal file
Binary file not shown.
@@ -1,382 +0,0 @@
|
|||||||
#!/bin/python
|
|
||||||
# Backups volumes of running containers
|
|
||||||
|
|
||||||
import subprocess
|
|
||||||
import os
|
|
||||||
import re
|
|
||||||
import pathlib
|
|
||||||
import pandas
|
|
||||||
from datetime import datetime
|
|
||||||
import argparse
|
|
||||||
|
|
||||||
class BackupException(Exception):
|
|
||||||
"""Generic exception for backup errors."""
|
|
||||||
pass
|
|
||||||
|
|
||||||
def execute_shell_command(command):
|
|
||||||
"""Execute a shell command and return its output."""
|
|
||||||
print(command)
|
|
||||||
process = subprocess.Popen(
|
|
||||||
[command],
|
|
||||||
stdout=subprocess.PIPE,
|
|
||||||
stderr=subprocess.PIPE,
|
|
||||||
shell=True
|
|
||||||
)
|
|
||||||
out, err = process.communicate()
|
|
||||||
if process.returncode != 0:
|
|
||||||
raise BackupException(
|
|
||||||
f"Error in command: {command}\n"
|
|
||||||
f"Output: {out}\nError: {err}\n"
|
|
||||||
f"Exit code: {process.returncode}"
|
|
||||||
)
|
|
||||||
return [line.decode("utf-8") for line in out.splitlines()]
|
|
||||||
|
|
||||||
def create_version_directory():
|
|
||||||
"""Create necessary directories for backup."""
|
|
||||||
version_dir = os.path.join(VERSIONS_DIR, BACKUP_TIME)
|
|
||||||
pathlib.Path(version_dir).mkdir(parents=True, exist_ok=True)
|
|
||||||
return version_dir
|
|
||||||
|
|
||||||
def get_machine_id():
|
|
||||||
"""Get the machine identifier."""
|
|
||||||
return execute_shell_command("sha256sum /etc/machine-id")[0][0:64]
|
|
||||||
|
|
||||||
### GLOBAL CONFIGURATION ###
|
|
||||||
|
|
||||||
# Container names treated as special instances for database backups
|
|
||||||
DATABASE_CONTAINERS = ['central-mariadb', 'central-postgres']
|
|
||||||
|
|
||||||
# Images which do not require container stop for file backups
|
|
||||||
IMAGES_NO_STOP_REQUIRED = []
|
|
||||||
|
|
||||||
# Images to skip entirely
|
|
||||||
IMAGES_NO_BACKUP_REQUIRED = []
|
|
||||||
|
|
||||||
# Compose dirs requiring hard restart
|
|
||||||
DOCKER_COMPOSE_HARD_RESTART_REQUIRED = ['mailu']
|
|
||||||
|
|
||||||
# DEFINE CONSTANTS
|
|
||||||
DIRNAME = os.path.dirname(__file__)
|
|
||||||
SCRIPTS_DIRECTORY = pathlib.Path(os.path.realpath(__file__)).parent.parent
|
|
||||||
DATABASES = pandas.read_csv(os.path.join(DIRNAME, "databases.csv"), sep=";")
|
|
||||||
REPOSITORY_NAME = os.path.basename(DIRNAME)
|
|
||||||
MACHINE_ID = get_machine_id()
|
|
||||||
BACKUPS_DIR = '/Backups/'
|
|
||||||
VERSIONS_DIR = os.path.join(BACKUPS_DIR, MACHINE_ID, REPOSITORY_NAME)
|
|
||||||
BACKUP_TIME = datetime.now().strftime("%Y%m%d%H%M%S")
|
|
||||||
VERSION_DIR = create_version_directory()
|
|
||||||
|
|
||||||
def get_instance(container):
|
|
||||||
"""Extract the database instance name based on container name."""
|
|
||||||
if container in DATABASE_CONTAINERS:
|
|
||||||
instance_name = container
|
|
||||||
else:
|
|
||||||
instance_name = re.split("(_|-)(database|db|postgres)", container)[0]
|
|
||||||
print(f"Extracted instance name: {instance_name}")
|
|
||||||
return instance_name
|
|
||||||
|
|
||||||
def stamp_directory():
|
|
||||||
"""Stamp a directory using directory-validator."""
|
|
||||||
stamp_command = f"dirval {VERSION_DIR} --stamp"
|
|
||||||
try:
|
|
||||||
execute_shell_command(stamp_command)
|
|
||||||
print(f"Successfully stamped directory: {VERSION_DIR}")
|
|
||||||
except BackupException as e:
|
|
||||||
print(f"Error running 'dirval' for {VERSION_DIR}: {e}")
|
|
||||||
exit(1)
|
|
||||||
|
|
||||||
def backup_database(container, volume_dir, db_type):
|
|
||||||
"""Backup database (MariaDB or PostgreSQL) if applicable."""
|
|
||||||
print(f"Starting database backup for {container} using {db_type}...")
|
|
||||||
instance_name = get_instance(container)
|
|
||||||
database_entries = DATABASES.loc[DATABASES['instance'] == instance_name]
|
|
||||||
if database_entries.empty:
|
|
||||||
raise BackupException(f"No entry found for instance '{instance_name}'")
|
|
||||||
for database_entry in database_entries.iloc:
|
|
||||||
database_name = database_entry['database']
|
|
||||||
database_username = database_entry['username']
|
|
||||||
database_password = database_entry['password']
|
|
||||||
backup_destination_dir = os.path.join(volume_dir, "sql")
|
|
||||||
pathlib.Path(backup_destination_dir).mkdir(parents=True, exist_ok=True)
|
|
||||||
backup_destination_file = os.path.join(
|
|
||||||
backup_destination_dir,
|
|
||||||
f"{database_name}.backup.sql"
|
|
||||||
)
|
|
||||||
if db_type == 'mariadb':
|
|
||||||
cmd = (
|
|
||||||
f"docker exec {container} "
|
|
||||||
f"/usr/bin/mariadb-dump -u {database_username} "
|
|
||||||
f"-p{database_password} {database_name} > {backup_destination_file}"
|
|
||||||
)
|
|
||||||
execute_shell_command(cmd)
|
|
||||||
if db_type == 'postgres':
|
|
||||||
cluster_file = os.path.join(
|
|
||||||
backup_destination_dir,
|
|
||||||
f"{instance_name}.cluster.backup.sql"
|
|
||||||
)
|
|
||||||
if not database_name:
|
|
||||||
fallback_pg_dumpall(
|
|
||||||
container,
|
|
||||||
database_username,
|
|
||||||
database_password,
|
|
||||||
cluster_file
|
|
||||||
)
|
|
||||||
return
|
|
||||||
try:
|
|
||||||
if database_password:
|
|
||||||
cmd = (
|
|
||||||
f"PGPASSWORD={database_password} docker exec -i {container} "
|
|
||||||
f"pg_dump -U {database_username} -d {database_name} "
|
|
||||||
f"-h localhost > {backup_destination_file}"
|
|
||||||
)
|
|
||||||
else:
|
|
||||||
cmd = (
|
|
||||||
f"docker exec -i {container} pg_dump -U {database_username} "
|
|
||||||
f"-d {database_name} -h localhost --no-password "
|
|
||||||
f"> {backup_destination_file}"
|
|
||||||
)
|
|
||||||
execute_shell_command(cmd)
|
|
||||||
except BackupException as e:
|
|
||||||
print(f"pg_dump failed: {e}")
|
|
||||||
print(f"Falling back to pg_dumpall for instance '{instance_name}'")
|
|
||||||
fallback_pg_dumpall(
|
|
||||||
container,
|
|
||||||
database_username,
|
|
||||||
database_password,
|
|
||||||
cluster_file
|
|
||||||
)
|
|
||||||
print(f"Database backup for database {container} completed.")
|
|
||||||
|
|
||||||
def get_last_backup_dir(volume_name, current_backup_dir):
|
|
||||||
"""Get the most recent backup directory for the specified volume."""
|
|
||||||
versions = sorted(os.listdir(VERSIONS_DIR), reverse=True)
|
|
||||||
for version in versions:
|
|
||||||
backup_dir = os.path.join(
|
|
||||||
VERSIONS_DIR, version, volume_name, "files", ""
|
|
||||||
)
|
|
||||||
if backup_dir != current_backup_dir and os.path.isdir(backup_dir):
|
|
||||||
return backup_dir
|
|
||||||
print(f"No previous backups available for volume: {volume_name}")
|
|
||||||
return None
|
|
||||||
|
|
||||||
def getStoragePath(volume_name):
|
|
||||||
path = execute_shell_command(
|
|
||||||
f"docker volume inspect --format '{{{{ .Mountpoint }}}}' {volume_name}"
|
|
||||||
)[0]
|
|
||||||
return f"{path}/"
|
|
||||||
|
|
||||||
def getFileRsyncDestinationPath(volume_dir):
|
|
||||||
path = os.path.join(volume_dir, "files")
|
|
||||||
return f"{path}/"
|
|
||||||
|
|
||||||
def fallback_pg_dumpall(container, username, password, backup_destination_file):
|
|
||||||
"""Fallback function to run pg_dumpall if pg_dump fails or no DB is defined."""
|
|
||||||
print(f"Running pg_dumpall for container '{container}'...")
|
|
||||||
cmd = (
|
|
||||||
f"PGPASSWORD={password} docker exec -i {container} "
|
|
||||||
f"pg_dumpall -U {username} -h localhost > {backup_destination_file}"
|
|
||||||
)
|
|
||||||
execute_shell_command(cmd)
|
|
||||||
|
|
||||||
def backup_volume(volume_name, volume_dir):
|
|
||||||
"""Perform incremental file backup of a Docker volume."""
|
|
||||||
try:
|
|
||||||
print(f"Starting backup routine for volume: {volume_name}")
|
|
||||||
dest = getFileRsyncDestinationPath(volume_dir)
|
|
||||||
pathlib.Path(dest).mkdir(parents=True, exist_ok=True)
|
|
||||||
last = get_last_backup_dir(volume_name, dest)
|
|
||||||
link_dest = f"--link-dest='{last}'" if last else ""
|
|
||||||
source = getStoragePath(volume_name)
|
|
||||||
cmd = (
|
|
||||||
f"rsync -abP --delete --delete-excluded "
|
|
||||||
f"{link_dest} {source} {dest}"
|
|
||||||
)
|
|
||||||
execute_shell_command(cmd)
|
|
||||||
except BackupException as e:
|
|
||||||
if "file has vanished" in str(e):
|
|
||||||
print("Warning: Some files vanished before transfer. Continuing.")
|
|
||||||
else:
|
|
||||||
raise
|
|
||||||
print(f"Backup routine for volume: {volume_name} completed.")
|
|
||||||
|
|
||||||
def get_image_info(container):
|
|
||||||
return execute_shell_command(
|
|
||||||
f"docker inspect --format '{{{{.Config.Image}}}}' {container}"
|
|
||||||
)
|
|
||||||
|
|
||||||
def has_image(container, image):
|
|
||||||
"""Check if the container is using the image"""
|
|
||||||
info = get_image_info(container)[0]
|
|
||||||
return image in info
|
|
||||||
|
|
||||||
def change_containers_status(containers, status):
|
|
||||||
"""Stop or start a list of containers."""
|
|
||||||
if containers:
|
|
||||||
names = ' '.join(containers)
|
|
||||||
print(f"{status.capitalize()} containers: {names}...")
|
|
||||||
execute_shell_command(f"docker {status} {names}")
|
|
||||||
else:
|
|
||||||
print(f"No containers to {status}.")
|
|
||||||
|
|
||||||
def is_image_whitelisted(container, images):
|
|
||||||
"""
|
|
||||||
Return True if the container's image matches any of the whitelist patterns.
|
|
||||||
Also prints out the image name and the match result.
|
|
||||||
"""
|
|
||||||
# fetch the image (e.g. "nextcloud:23-fpm-alpine")
|
|
||||||
info = get_image_info(container)[0]
|
|
||||||
|
|
||||||
# check against each pattern
|
|
||||||
whitelisted = any(pattern in info for pattern in images)
|
|
||||||
|
|
||||||
# log the result
|
|
||||||
print(f"Container {container!r} → image {info!r} → whitelisted? {whitelisted}", flush=True)
|
|
||||||
|
|
||||||
return whitelisted
|
|
||||||
|
|
||||||
def is_container_stop_required(containers):
|
|
||||||
"""
|
|
||||||
Check if any of the containers are using images that are not whitelisted.
|
|
||||||
If so, print them out and return True; otherwise return False.
|
|
||||||
"""
|
|
||||||
# Find all containers whose image isn’t on the whitelist
|
|
||||||
not_whitelisted = [
|
|
||||||
c for c in containers
|
|
||||||
if not is_image_whitelisted(c, IMAGES_NO_STOP_REQUIRED)
|
|
||||||
]
|
|
||||||
|
|
||||||
if not_whitelisted:
|
|
||||||
print(f"Containers requiring stop because they are not whitelisted: {', '.join(not_whitelisted)}")
|
|
||||||
return True
|
|
||||||
|
|
||||||
return False
|
|
||||||
|
|
||||||
def create_volume_directory(volume_name):
|
|
||||||
"""Create necessary directories for backup."""
|
|
||||||
path = os.path.join(VERSION_DIR, volume_name)
|
|
||||||
pathlib.Path(path).mkdir(parents=True, exist_ok=True)
|
|
||||||
return path
|
|
||||||
|
|
||||||
def is_image_ignored(container):
|
|
||||||
"""Check if the container's image is one of the ignored images."""
|
|
||||||
return any(has_image(container, img) for img in IMAGES_NO_BACKUP_REQUIRED)
|
|
||||||
|
|
||||||
def backup_with_containers_paused(volume_name, volume_dir, containers, shutdown):
|
|
||||||
change_containers_status(containers, 'stop')
|
|
||||||
backup_volume(volume_name, volume_dir)
|
|
||||||
if not shutdown:
|
|
||||||
change_containers_status(containers, 'start')
|
|
||||||
|
|
||||||
def backup_mariadb_or_postgres(container, volume_dir):
|
|
||||||
"""Performs database image specific backup procedures"""
|
|
||||||
for img in ['mariadb', 'postgres']:
|
|
||||||
if has_image(container, img):
|
|
||||||
backup_database(container, volume_dir, img)
|
|
||||||
return True
|
|
||||||
return False
|
|
||||||
|
|
||||||
def default_backup_routine_for_volume(volume_name, containers, shutdown):
|
|
||||||
"""Perform backup routine for a given volume."""
|
|
||||||
vol_dir = ""
|
|
||||||
for c in containers:
|
|
||||||
if is_image_ignored(c):
|
|
||||||
print(f"Ignoring volume '{volume_name}' linked to container '{c}'.")
|
|
||||||
continue
|
|
||||||
vol_dir = create_volume_directory(volume_name)
|
|
||||||
if backup_mariadb_or_postgres(c, vol_dir):
|
|
||||||
return
|
|
||||||
if vol_dir:
|
|
||||||
backup_volume(volume_name, vol_dir)
|
|
||||||
if is_container_stop_required(containers):
|
|
||||||
backup_with_containers_paused(volume_name, vol_dir, containers, shutdown)
|
|
||||||
|
|
||||||
def backup_everything(volume_name, containers, shutdown):
|
|
||||||
"""Perform file backup routine for a given volume."""
|
|
||||||
vol_dir = create_volume_directory(volume_name)
|
|
||||||
for c in containers:
|
|
||||||
backup_mariadb_or_postgres(c, vol_dir)
|
|
||||||
backup_volume(volume_name, vol_dir)
|
|
||||||
backup_with_containers_paused(volume_name, vol_dir, containers, shutdown)
|
|
||||||
|
|
||||||
def hard_restart_docker_services(dir_path):
|
|
||||||
"""Perform a hard restart of docker-compose services in the given directory."""
|
|
||||||
try:
|
|
||||||
print(f"Performing hard restart for docker-compose services in: {dir_path}")
|
|
||||||
subprocess.run(["docker-compose", "down"], cwd=dir_path, check=True)
|
|
||||||
subprocess.run(["docker-compose", "up", "-d"], cwd=dir_path, check=True)
|
|
||||||
print(f"Hard restart completed successfully in: {dir_path}")
|
|
||||||
except subprocess.CalledProcessError as e:
|
|
||||||
print(f"Error during hard restart in {dir_path}: {e}")
|
|
||||||
exit(2)
|
|
||||||
|
|
||||||
def handle_docker_compose_services(parent_directory):
|
|
||||||
"""Iterate through directories and restart or hard restart services as needed."""
|
|
||||||
for entry in os.scandir(parent_directory):
|
|
||||||
if entry.is_dir():
|
|
||||||
dir_path = entry.path
|
|
||||||
name = os.path.basename(dir_path)
|
|
||||||
print(f"Checking directory: {dir_path}")
|
|
||||||
compose_file = os.path.join(dir_path, "docker-compose.yml")
|
|
||||||
if os.path.isfile(compose_file):
|
|
||||||
print(f"Found docker-compose.yml in {dir_path}.")
|
|
||||||
if name in DOCKER_COMPOSE_HARD_RESTART_REQUIRED:
|
|
||||||
print(f"Directory {name} detected. Performing hard restart...")
|
|
||||||
hard_restart_docker_services(dir_path)
|
|
||||||
else:
|
|
||||||
print(f"No restart required for services in {dir_path}...")
|
|
||||||
else:
|
|
||||||
print(f"No docker-compose.yml found in {dir_path}. Skipping.")
|
|
||||||
|
|
||||||
def main():
|
|
||||||
global DATABASE_CONTAINERS, IMAGES_NO_STOP_REQUIRED
|
|
||||||
parser = argparse.ArgumentParser(description='Backup Docker volumes.')
|
|
||||||
parser.add_argument('--everything', action='store_true',
|
|
||||||
help='Force file backup for all volumes and additional execute database dumps')
|
|
||||||
parser.add_argument('--shutdown', action='store_true',
|
|
||||||
help='Doesn\'t restart containers after backup')
|
|
||||||
parser.add_argument('--compose-dir', type=str, required=True,
|
|
||||||
help='Path to the parent directory containing docker-compose setups')
|
|
||||||
parser.add_argument(
|
|
||||||
'--database-containers',
|
|
||||||
nargs='+',
|
|
||||||
required=True,
|
|
||||||
help='List of container names treated as special instances for database backups'
|
|
||||||
)
|
|
||||||
parser.add_argument(
|
|
||||||
'--images-no-stop-required',
|
|
||||||
nargs='+',
|
|
||||||
required=True,
|
|
||||||
help='List of image names for which containers should not be stopped during file backup'
|
|
||||||
)
|
|
||||||
parser.add_argument(
|
|
||||||
'--images-no-backup-required',
|
|
||||||
nargs='+',
|
|
||||||
help='List of image names for which no backup should be performed (optional)'
|
|
||||||
)
|
|
||||||
args = parser.parse_args()
|
|
||||||
DATABASE_CONTAINERS = args.database_containers
|
|
||||||
IMAGES_NO_STOP_REQUIRED = args.images_no_stop_required
|
|
||||||
if args.images_no_backup_required is not None:
|
|
||||||
global IMAGES_NO_BACKUP_REQUIRED
|
|
||||||
IMAGES_NO_BACKUP_REQUIRED = args.images_no_backup_required
|
|
||||||
|
|
||||||
print('💾 Start volume backups...', flush=True)
|
|
||||||
volume_names = execute_shell_command("docker volume ls --format '{{.Name}}'")
|
|
||||||
for volume_name in volume_names:
|
|
||||||
print(f'Start backup routine for volume: {volume_name}')
|
|
||||||
containers = execute_shell_command(
|
|
||||||
f"docker ps --filter volume=\"{volume_name}\" --format '{{{{.Names}}}}'"
|
|
||||||
)
|
|
||||||
if args.everything:
|
|
||||||
backup_everything(volume_name, containers, args.shutdown)
|
|
||||||
else:
|
|
||||||
default_backup_routine_for_volume(volume_name, containers, args.shutdown)
|
|
||||||
|
|
||||||
stamp_directory()
|
|
||||||
print('Finished volume backups.')
|
|
||||||
|
|
||||||
print('Handling Docker Compose services...')
|
|
||||||
handle_docker_compose_services(args.compose_dir)
|
|
||||||
|
|
||||||
if __name__ == "__main__":
|
|
||||||
main()
|
|
||||||
@@ -1 +0,0 @@
|
|||||||
instance;database;username;password
|
|
||||||
29
pyproject.toml
Normal file
29
pyproject.toml
Normal file
@@ -0,0 +1,29 @@
|
|||||||
|
[build-system]
|
||||||
|
requires = ["setuptools>=69", "wheel"]
|
||||||
|
build-backend = "setuptools.build_meta"
|
||||||
|
|
||||||
|
[project]
|
||||||
|
name = "backup-docker-to-local"
|
||||||
|
version = "0.1.0"
|
||||||
|
description = "Backup Docker volumes to local with rsync and optional DB dumps."
|
||||||
|
readme = "README.md"
|
||||||
|
requires-python = ">=3.9"
|
||||||
|
license = { text = "AGPL-3.0-or-later" }
|
||||||
|
authors = [{ name = "Kevin Veen-Birkenbach" }]
|
||||||
|
|
||||||
|
dependencies = [
|
||||||
|
"pandas",
|
||||||
|
"dirval",
|
||||||
|
]
|
||||||
|
|
||||||
|
[project.scripts]
|
||||||
|
baudolo = "baudolo.backup.__main__:main"
|
||||||
|
baudolo-restore = "baudolo.restore.__main__:main"
|
||||||
|
baudolo-configure = "baudolo.configure.__main__:main"
|
||||||
|
|
||||||
|
[tool.setuptools]
|
||||||
|
package-dir = { "" = "src" }
|
||||||
|
|
||||||
|
[tool.setuptools.packages.find]
|
||||||
|
where = ["src"]
|
||||||
|
exclude = ["tests*"]
|
||||||
@@ -1,85 +0,0 @@
|
|||||||
#!/bin/bash
|
|
||||||
|
|
||||||
# Check minimum number of arguments
|
|
||||||
if [ $# -lt 3 ]; then
|
|
||||||
echo "ERROR: Not enough arguments. Please provide at least a volume name, backup hash, and version."
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
|
|
||||||
volume_name="$1" # Volume-Name
|
|
||||||
backup_hash="$2" # Hashed Machine ID
|
|
||||||
version="$3" # version to recover
|
|
||||||
|
|
||||||
# DATABASE PARAMETERS
|
|
||||||
database_type="$4" # Valid values; mariadb, postgress
|
|
||||||
database_container="$5" # optional
|
|
||||||
database_password="$6" # optional
|
|
||||||
database_name="$7" # optional
|
|
||||||
database_user="$database_name"
|
|
||||||
|
|
||||||
|
|
||||||
backup_folder="Backups/$backup_hash/backup-docker-to-local/$version/$volume_name"
|
|
||||||
backup_files="/$backup_folder/files"
|
|
||||||
backup_sql="/$backup_folder/sql/$database_name.backup.sql"
|
|
||||||
|
|
||||||
# DATABASE RECOVERY
|
|
||||||
|
|
||||||
if [ ! -z "$database_type" ]; then
|
|
||||||
if [ "$database_type" = "postgres" ]; then
|
|
||||||
if [ -n "$database_container" ] && [ -n "$database_password" ] && [ -n "$database_name" ]; then
|
|
||||||
echo "Recover PostgreSQL dump"
|
|
||||||
export PGPASSWORD="$database_password"
|
|
||||||
cat "$backup_sql" | docker exec -i "$database_container" psql -v ON_ERROR_STOP=1 -U "$database_user" -d "$database_name"
|
|
||||||
if [ $? -ne 0 ]; then
|
|
||||||
echo "ERROR: Failed to recover PostgreSQL dump"
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
exit 0
|
|
||||||
fi
|
|
||||||
elif [ "$database_type" = "mariadb" ]; then
|
|
||||||
if [ -n "$database_container" ] && [ -n "$database_password" ] && [ -n "$database_name" ]; then
|
|
||||||
echo "recover mysql dump"
|
|
||||||
cat "$backup_sql" | docker exec -i "$database_container" mariadb -u "$database_user" --password="$database_password" "$database_name"
|
|
||||||
if [ $? -ne 0 ]; then
|
|
||||||
echo "ERROR: Failed to recover mysql dump"
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
exit 0
|
|
||||||
fi
|
|
||||||
fi
|
|
||||||
echo "A database backup exists, but a parameter is missing."
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
|
|
||||||
# FILE RECOVERY
|
|
||||||
|
|
||||||
echo "Inspect volume $volume_name"
|
|
||||||
docker volume inspect "$volume_name"
|
|
||||||
exit_status_volume_inspect=$?
|
|
||||||
|
|
||||||
if [ $exit_status_volume_inspect -eq 0 ]; then
|
|
||||||
echo "Volume $volume_name already exists"
|
|
||||||
else
|
|
||||||
echo "Create volume $volume_name"
|
|
||||||
docker volume create "$volume_name"
|
|
||||||
if [ $? -ne 0 ]; then
|
|
||||||
echo "ERROR: Failed to create volume $volume_name"
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
fi
|
|
||||||
|
|
||||||
if [ -d "$backup_files" ]; then
|
|
||||||
echo "recover files"
|
|
||||||
docker run --rm -v "$volume_name:/recover/" -v "$backup_files:/backup/" "kevinveenbirkenbach/alpine-rsync" sh -c "rsync -avv --delete /backup/ /recover/"
|
|
||||||
if [ $? -ne 0 ]; then
|
|
||||||
echo "ERROR: Failed to recover files"
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
exit 0
|
|
||||||
else
|
|
||||||
echo "ERROR: $backup_files doesn't exist"
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
|
|
||||||
echo "ERROR: Unhandled case"
|
|
||||||
exit 1
|
|
||||||
@@ -1,5 +0,0 @@
|
|||||||
pacman:
|
|
||||||
- lsof
|
|
||||||
- python-pandas
|
|
||||||
pkgmgr:
|
|
||||||
- dirval
|
|
||||||
@@ -1,170 +0,0 @@
|
|||||||
#!/usr/bin/env python3
|
|
||||||
# @todo Not tested yet. Needs to be tested
|
|
||||||
"""
|
|
||||||
restore_backup.py
|
|
||||||
|
|
||||||
A script to recover Docker volumes and database dumps from local backups.
|
|
||||||
Supports an --empty flag to clear the database objects before import (drops all tables/functions etc.).
|
|
||||||
"""
|
|
||||||
import argparse
|
|
||||||
import os
|
|
||||||
import sys
|
|
||||||
import subprocess
|
|
||||||
|
|
||||||
|
|
||||||
def run_command(cmd, capture_output=False, input=None, **kwargs):
|
|
||||||
"""Run a subprocess command and handle errors."""
|
|
||||||
try:
|
|
||||||
result = subprocess.run(cmd, check=True, capture_output=capture_output, input=input, **kwargs)
|
|
||||||
return result
|
|
||||||
except subprocess.CalledProcessError as e:
|
|
||||||
print(f"ERROR: Command '{' '.join(cmd)}' failed with exit code {e.returncode}")
|
|
||||||
if e.stdout:
|
|
||||||
print(e.stdout.decode())
|
|
||||||
if e.stderr:
|
|
||||||
print(e.stderr.decode())
|
|
||||||
sys.exit(1)
|
|
||||||
|
|
||||||
|
|
||||||
def recover_postgres(container, password, db_name, user, backup_sql, empty=False):
|
|
||||||
print("Recovering PostgreSQL dump...")
|
|
||||||
os.environ['PGPASSWORD'] = password
|
|
||||||
if empty:
|
|
||||||
print("Dropping existing PostgreSQL objects...")
|
|
||||||
# Drop all tables, views, sequences, functions in public schema
|
|
||||||
drop_sql = """
|
|
||||||
DO $$ DECLARE r RECORD;
|
|
||||||
BEGIN
|
|
||||||
FOR r IN (
|
|
||||||
SELECT table_name AS name, 'TABLE' AS type FROM information_schema.tables WHERE table_schema='public'
|
|
||||||
UNION ALL
|
|
||||||
SELECT routine_name AS name, 'FUNCTION' AS type FROM information_schema.routines WHERE specific_schema='public'
|
|
||||||
UNION ALL
|
|
||||||
SELECT sequence_name AS name, 'SEQUENCE' AS type FROM information_schema.sequences WHERE sequence_schema='public'
|
|
||||||
) LOOP
|
|
||||||
-- Use %s for type to avoid quoting the SQL keyword
|
|
||||||
EXECUTE format('DROP %s public.%I CASCADE', r.type, r.name);
|
|
||||||
END LOOP;
|
|
||||||
END
|
|
||||||
$$;
|
|
||||||
"""
|
|
||||||
run_command([
|
|
||||||
'docker', 'exec', '-i', container,
|
|
||||||
'psql', '-v', 'ON_ERROR_STOP=1', '-U', user, '-d', db_name
|
|
||||||
], input=drop_sql.encode())
|
|
||||||
print("Existing objects dropped.")
|
|
||||||
print("Importing the dump...")
|
|
||||||
with open(backup_sql, 'rb') as f:
|
|
||||||
run_command([
|
|
||||||
'docker', 'exec', '-i', container,
|
|
||||||
'psql', '-v', 'ON_ERROR_STOP=1', '-U', user, '-d', db_name
|
|
||||||
], stdin=f)
|
|
||||||
print("PostgreSQL recovery complete.")
|
|
||||||
|
|
||||||
|
|
||||||
def recover_mariadb(container, password, db_name, user, backup_sql, empty=False):
|
|
||||||
print("Recovering MariaDB dump...")
|
|
||||||
if empty:
|
|
||||||
print("Dropping existing MariaDB tables...")
|
|
||||||
# Disable foreign key checks
|
|
||||||
run_command([
|
|
||||||
'docker', 'exec', container,
|
|
||||||
'mysql', '-u', user, f"--password={password}", '-e', 'SET FOREIGN_KEY_CHECKS=0;'
|
|
||||||
])
|
|
||||||
# Get all table names
|
|
||||||
result = run_command([
|
|
||||||
'docker', 'exec', container,
|
|
||||||
'mysql', '-u', user, f"--password={password}", '-N', '-e',
|
|
||||||
f"SELECT table_name FROM information_schema.tables WHERE table_schema = '{db_name}';"
|
|
||||||
], capture_output=True)
|
|
||||||
tables = result.stdout.decode().split()
|
|
||||||
for tbl in tables:
|
|
||||||
run_command([
|
|
||||||
'docker', 'exec', container,
|
|
||||||
'mysql', '-u', user, f"--password={password}", '-e',
|
|
||||||
f"DROP TABLE IF EXISTS `{db_name}`.`{tbl}`;"
|
|
||||||
])
|
|
||||||
# Enable foreign key checks
|
|
||||||
run_command([
|
|
||||||
'docker', 'exec', container,
|
|
||||||
'mysql', '-u', user, f"--password={password}", '-e', 'SET FOREIGN_KEY_CHECKS=1;'
|
|
||||||
])
|
|
||||||
print("Existing tables dropped.")
|
|
||||||
print("Importing the dump...")
|
|
||||||
with open(backup_sql, 'rb') as f:
|
|
||||||
run_command([
|
|
||||||
'docker', 'exec', '-i', container,
|
|
||||||
'mariadb', '-u', user, f"--password={password}", db_name
|
|
||||||
], stdin=f)
|
|
||||||
print("MariaDB recovery complete.")
|
|
||||||
|
|
||||||
|
|
||||||
def recover_files(volume_name, backup_files):
|
|
||||||
print(f"Inspecting volume {volume_name}...")
|
|
||||||
inspect = subprocess.run(['docker', 'volume', 'inspect', volume_name], stdout=subprocess.DEVNULL)
|
|
||||||
if inspect.returncode != 0:
|
|
||||||
print(f"Volume {volume_name} does not exist. Creating...")
|
|
||||||
run_command(['docker', 'volume', 'create', volume_name])
|
|
||||||
else:
|
|
||||||
print(f"Volume {volume_name} already exists.")
|
|
||||||
|
|
||||||
if not os.path.isdir(backup_files):
|
|
||||||
print(f"ERROR: Backup files folder '{backup_files}' does not exist.")
|
|
||||||
sys.exit(1)
|
|
||||||
|
|
||||||
print("Recovering files...")
|
|
||||||
run_command([
|
|
||||||
'docker', 'run', '--rm',
|
|
||||||
'-v', f"{volume_name}:/recover/",
|
|
||||||
'-v', f"{backup_files}:/backup/",
|
|
||||||
'kevinveenbirkenbach/alpine-rsync',
|
|
||||||
'sh', '-c', 'rsync -avv --delete /backup/ /recover/'
|
|
||||||
])
|
|
||||||
print("File recovery complete.")
|
|
||||||
|
|
||||||
|
|
||||||
def main():
|
|
||||||
parser = argparse.ArgumentParser(
|
|
||||||
description='Recover Docker volumes and database dumps from local backups.'
|
|
||||||
)
|
|
||||||
parser.add_argument('volume_name', help='Name of the Docker volume')
|
|
||||||
parser.add_argument('backup_hash', help='Hashed Machine ID')
|
|
||||||
parser.add_argument('version', help='Version to recover')
|
|
||||||
|
|
||||||
parser.add_argument('--db-type', choices=['postgres', 'mariadb'], help='Type of database backup')
|
|
||||||
parser.add_argument('--db-container', help='Docker container name for the database')
|
|
||||||
parser.add_argument('--db-password', help='Password for the database user')
|
|
||||||
parser.add_argument('--db-name', help='Name of the database')
|
|
||||||
parser.add_argument('--empty', action='store_true', help='Drop existing database objects before importing')
|
|
||||||
|
|
||||||
args = parser.parse_args()
|
|
||||||
|
|
||||||
volume = args.volume_name
|
|
||||||
backup_hash = args.backup_hash
|
|
||||||
version = args.version
|
|
||||||
|
|
||||||
backup_folder = os.path.join('Backups', backup_hash, 'backup-docker-to-local', version, volume)
|
|
||||||
backup_files = os.path.join(os.sep, backup_folder, 'files')
|
|
||||||
backup_sql = None
|
|
||||||
if args.db_name:
|
|
||||||
backup_sql = os.path.join(os.sep, backup_folder, 'sql', f"{args.db_name}.backup.sql")
|
|
||||||
|
|
||||||
# Database recovery
|
|
||||||
if args.db_type:
|
|
||||||
if not (args.db_container and args.db_password and args.db_name):
|
|
||||||
print("ERROR: A database backup exists, aber ein Parameter fehlt.")
|
|
||||||
sys.exit(1)
|
|
||||||
|
|
||||||
user = args.db_name
|
|
||||||
if args.db_type == 'postgres':
|
|
||||||
recover_postgres(args.db_container, args.db_password, args.db_name, user, backup_sql, empty=args.empty)
|
|
||||||
else:
|
|
||||||
recover_mariadb(args.db_container, args.db_password, args.db_name, user, backup_sql, empty=args.empty)
|
|
||||||
sys.exit(0)
|
|
||||||
|
|
||||||
# File recovery
|
|
||||||
recover_files(volume, backup_files)
|
|
||||||
|
|
||||||
|
|
||||||
if __name__ == '__main__':
|
|
||||||
main()
|
|
||||||
@@ -1,96 +0,0 @@
|
|||||||
#!/usr/bin/env python3
|
|
||||||
"""
|
|
||||||
Restore multiple PostgreSQL databases from .backup.sql files via a Docker container.
|
|
||||||
|
|
||||||
Usage:
|
|
||||||
./restore_databases.py /path/to/backup_dir container_name
|
|
||||||
"""
|
|
||||||
import argparse
|
|
||||||
import subprocess
|
|
||||||
import sys
|
|
||||||
import os
|
|
||||||
import glob
|
|
||||||
|
|
||||||
def run_command(cmd, stdin=None):
|
|
||||||
"""
|
|
||||||
Run a subprocess command and abort immediately on any failure.
|
|
||||||
:param cmd: list of command parts
|
|
||||||
:param stdin: file-like object to use as stdin
|
|
||||||
"""
|
|
||||||
subprocess.run(cmd, stdin=stdin, check=True)
|
|
||||||
|
|
||||||
|
|
||||||
def main():
|
|
||||||
parser = argparse.ArgumentParser(
|
|
||||||
description="Restore Postgres databases from backup SQL files via Docker container."
|
|
||||||
)
|
|
||||||
parser.add_argument(
|
|
||||||
"backup_dir",
|
|
||||||
help="Path to directory containing .backup.sql files"
|
|
||||||
)
|
|
||||||
parser.add_argument(
|
|
||||||
"container",
|
|
||||||
help="Name of the Postgres Docker container"
|
|
||||||
)
|
|
||||||
args = parser.parse_args()
|
|
||||||
|
|
||||||
backup_dir = args.backup_dir
|
|
||||||
container = args.container
|
|
||||||
|
|
||||||
pattern = os.path.join(backup_dir, "*.backup.sql")
|
|
||||||
sql_files = sorted(glob.glob(pattern))
|
|
||||||
if not sql_files:
|
|
||||||
print(f"No .backup.sql files found in {backup_dir}", file=sys.stderr)
|
|
||||||
sys.exit(1)
|
|
||||||
|
|
||||||
for sqlfile in sql_files:
|
|
||||||
# Extract database name by stripping the full suffix '.backup.sql'
|
|
||||||
filename = os.path.basename(sqlfile)
|
|
||||||
if not filename.endswith('.backup.sql'):
|
|
||||||
continue
|
|
||||||
dbname = filename[:-len('.backup.sql')]
|
|
||||||
print(f"=== Processing {sqlfile} → database: {dbname} ===")
|
|
||||||
|
|
||||||
# Drop the database, forcing disconnect of sessions if necessary
|
|
||||||
run_command([
|
|
||||||
"docker", "exec", "-i", container,
|
|
||||||
"psql", "-U", "postgres", "-c",
|
|
||||||
f"DROP DATABASE IF EXISTS \"{dbname}\" WITH (FORCE);"
|
|
||||||
])
|
|
||||||
|
|
||||||
# Create a fresh database
|
|
||||||
run_command([
|
|
||||||
"docker", "exec", "-i", container,
|
|
||||||
"psql", "-U", "postgres", "-c",
|
|
||||||
f"CREATE DATABASE \"{dbname}\";"
|
|
||||||
])
|
|
||||||
|
|
||||||
# Ensure the ownership role exists
|
|
||||||
print(f"Ensuring role '{dbname}' exists...")
|
|
||||||
run_command([
|
|
||||||
"docker", "exec", "-i", container,
|
|
||||||
"psql", "-U", "postgres", "-c",
|
|
||||||
(
|
|
||||||
"DO $$BEGIN "
|
|
||||||
f"IF NOT EXISTS (SELECT FROM pg_roles WHERE rolname = '{dbname}') THEN "
|
|
||||||
f"CREATE ROLE \"{dbname}\"; "
|
|
||||||
"END IF; "
|
|
||||||
"END$$;"
|
|
||||||
)
|
|
||||||
])
|
|
||||||
|
|
||||||
# Restore the dump into the database by streaming file (will abort on first error)
|
|
||||||
print(f"Restoring dump into {dbname} (this may take a while)…")
|
|
||||||
with open(sqlfile, 'rb') as infile:
|
|
||||||
run_command([
|
|
||||||
"docker", "exec", "-i", container,
|
|
||||||
"psql", "-U", "postgres", "-d", dbname
|
|
||||||
], stdin=infile)
|
|
||||||
|
|
||||||
print(f"✔ {dbname} restored.")
|
|
||||||
|
|
||||||
print("All databases have been restored.")
|
|
||||||
|
|
||||||
|
|
||||||
if __name__ == "__main__":
|
|
||||||
main()
|
|
||||||
234
scripts/test-e2e.sh
Executable file
234
scripts/test-e2e.sh
Executable file
@@ -0,0 +1,234 @@
|
|||||||
|
#!/usr/bin/env bash
|
||||||
|
set -euo pipefail
|
||||||
|
|
||||||
|
# -----------------------------------------------------------------------------
|
||||||
|
# E2E runner using Docker-in-Docker (DinD) with debug-on-failure
|
||||||
|
#
|
||||||
|
# Debug toggles:
|
||||||
|
# E2E_KEEP_ON_FAIL=1 -> keep DinD + volumes + network if tests fail
|
||||||
|
# E2E_KEEP_VOLUMES=1 -> keep volumes even on success/cleanup
|
||||||
|
# E2E_DEBUG_SHELL=1 -> open an interactive shell in the test container instead of running tests
|
||||||
|
# E2E_ARTIFACTS_DIR=./artifacts
|
||||||
|
# -----------------------------------------------------------------------------
|
||||||
|
|
||||||
|
NET="${E2E_NET:-baudolo-e2e-net}"
|
||||||
|
DIND="${E2E_DIND_NAME:-baudolo-e2e-dind}"
|
||||||
|
DIND_VOL="${E2E_DIND_VOL:-baudolo-e2e-dind-data}"
|
||||||
|
E2E_TMP_VOL="${E2E_TMP_VOL:-baudolo-e2e-tmp}"
|
||||||
|
|
||||||
|
DIND_HOST="${E2E_DIND_HOST:-tcp://127.0.0.1:2375}"
|
||||||
|
DIND_HOST_IN_NET="${E2E_DIND_HOST_IN_NET:-tcp://${DIND}:2375}"
|
||||||
|
|
||||||
|
IMG="${E2E_IMAGE:-baudolo:local}"
|
||||||
|
RSYNC_IMG="${E2E_RSYNC_IMAGE:-ghcr.io/kevinveenbirkenbach/alpine-rsync}"
|
||||||
|
|
||||||
|
READY_TIMEOUT_SECONDS="${E2E_READY_TIMEOUT_SECONDS:-120}"
|
||||||
|
ARTIFACTS_DIR="${E2E_ARTIFACTS_DIR:-./artifacts}"
|
||||||
|
|
||||||
|
KEEP_ON_FAIL="${E2E_KEEP_ON_FAIL:-0}"
|
||||||
|
KEEP_VOLUMES="${E2E_KEEP_VOLUMES:-0}"
|
||||||
|
DEBUG_SHELL="${E2E_DEBUG_SHELL:-0}"
|
||||||
|
|
||||||
|
FAILED=0
|
||||||
|
TS="$(date +%Y%m%d%H%M%S)"
|
||||||
|
|
||||||
|
mkdir -p "${ARTIFACTS_DIR}"
|
||||||
|
|
||||||
|
log() { echo ">> $*"; }
|
||||||
|
|
||||||
|
dump_debug() {
|
||||||
|
log "DEBUG: collecting diagnostics into ${ARTIFACTS_DIR}"
|
||||||
|
|
||||||
|
{
|
||||||
|
echo "=== Host docker version ==="
|
||||||
|
docker version || true
|
||||||
|
echo
|
||||||
|
echo "=== Host docker info ==="
|
||||||
|
docker info || true
|
||||||
|
echo
|
||||||
|
echo "=== DinD reachable? (docker -H ${DIND_HOST} version) ==="
|
||||||
|
docker -H "${DIND_HOST}" version || true
|
||||||
|
echo
|
||||||
|
} > "${ARTIFACTS_DIR}/debug-host-${TS}.txt" 2>&1 || true
|
||||||
|
|
||||||
|
# DinD logs
|
||||||
|
docker logs --tail=5000 "${DIND}" > "${ARTIFACTS_DIR}/dind-logs-${TS}.txt" 2>&1 || true
|
||||||
|
|
||||||
|
# DinD state
|
||||||
|
{
|
||||||
|
echo "=== docker -H ps -a ==="
|
||||||
|
docker -H "${DIND_HOST}" ps -a || true
|
||||||
|
echo
|
||||||
|
echo "=== docker -H images ==="
|
||||||
|
docker -H "${DIND_HOST}" images || true
|
||||||
|
echo
|
||||||
|
echo "=== docker -H network ls ==="
|
||||||
|
docker -H "${DIND_HOST}" network ls || true
|
||||||
|
echo
|
||||||
|
echo "=== docker -H volume ls ==="
|
||||||
|
docker -H "${DIND_HOST}" volume ls || true
|
||||||
|
echo
|
||||||
|
echo "=== docker -H system df ==="
|
||||||
|
docker -H "${DIND_HOST}" system df || true
|
||||||
|
} > "${ARTIFACTS_DIR}/debug-dind-${TS}.txt" 2>&1 || true
|
||||||
|
|
||||||
|
# Try to capture recent events (best effort; might be noisy)
|
||||||
|
docker -H "${DIND_HOST}" events --since 10m --until 0s \
|
||||||
|
> "${ARTIFACTS_DIR}/dind-events-${TS}.txt" 2>&1 || true
|
||||||
|
|
||||||
|
# Dump shared /tmp content from the tmp volume:
|
||||||
|
# We create a temporary container that mounts the volume, then tar its content.
|
||||||
|
# (Does not rely on host filesystem paths.)
|
||||||
|
log "DEBUG: archiving shared /tmp (volume ${E2E_TMP_VOL})"
|
||||||
|
docker -H "${DIND_HOST}" run --rm \
|
||||||
|
-v "${E2E_TMP_VOL}:/tmp" \
|
||||||
|
alpine:3.20 \
|
||||||
|
sh -lc 'cd /tmp && tar -czf /out.tar.gz . || true' \
|
||||||
|
>/dev/null 2>&1 || true
|
||||||
|
|
||||||
|
# The above writes inside the container FS, not to host. So do it properly:
|
||||||
|
# Use "docker cp" from a temp container.
|
||||||
|
local tmpc="baudolo-e2e-tmpdump-${TS}"
|
||||||
|
docker -H "${DIND_HOST}" rm -f "${tmpc}" >/dev/null 2>&1 || true
|
||||||
|
docker -H "${DIND_HOST}" create --name "${tmpc}" -v "${E2E_TMP_VOL}:/tmp" alpine:3.20 \
|
||||||
|
sh -lc 'cd /tmp && tar -czf /tmpdump.tar.gz . || true' >/dev/null
|
||||||
|
docker -H "${DIND_HOST}" start -a "${tmpc}" >/dev/null 2>&1 || true
|
||||||
|
docker -H "${DIND_HOST}" cp "${tmpc}:/tmpdump.tar.gz" "${ARTIFACTS_DIR}/e2e-tmp-${TS}.tar.gz" >/dev/null 2>&1 || true
|
||||||
|
docker -H "${DIND_HOST}" rm -f "${tmpc}" >/dev/null 2>&1 || true
|
||||||
|
|
||||||
|
log "DEBUG: artifacts written:"
|
||||||
|
ls -la "${ARTIFACTS_DIR}" | sed 's/^/ /' || true
|
||||||
|
}
|
||||||
|
|
||||||
|
cleanup() {
|
||||||
|
if [ "${FAILED}" -eq 1 ] && [ "${KEEP_ON_FAIL}" = "1" ]; then
|
||||||
|
log "KEEP_ON_FAIL=1 and failure detected -> skipping cleanup."
|
||||||
|
log "Next steps:"
|
||||||
|
echo " - Inspect DinD logs: docker logs ${DIND} | less"
|
||||||
|
echo " - Use DinD daemon: docker -H ${DIND_HOST} ps -a"
|
||||||
|
echo " - Shared tmp vol: docker -H ${DIND_HOST} run --rm -v ${E2E_TMP_VOL}:/tmp alpine:3.20 ls -la /tmp"
|
||||||
|
echo " - DinD docker root: docker -H ${DIND_HOST} run --rm -v ${DIND_VOL}:/var/lib/docker alpine:3.20 ls -la /var/lib/docker/volumes"
|
||||||
|
return 0
|
||||||
|
fi
|
||||||
|
|
||||||
|
log "Cleanup: stopping ${DIND} and removing network ${NET}"
|
||||||
|
docker rm -f "${DIND}" >/dev/null 2>&1 || true
|
||||||
|
docker network rm "${NET}" >/dev/null 2>&1 || true
|
||||||
|
|
||||||
|
if [ "${KEEP_VOLUMES}" != "1" ]; then
|
||||||
|
docker volume rm -f "${DIND_VOL}" >/dev/null 2>&1 || true
|
||||||
|
docker volume rm -f "${E2E_TMP_VOL}" >/dev/null 2>&1 || true
|
||||||
|
else
|
||||||
|
log "Keeping volumes (E2E_KEEP_VOLUMES=1): ${DIND_VOL}, ${E2E_TMP_VOL}"
|
||||||
|
fi
|
||||||
|
}
|
||||||
|
trap cleanup EXIT INT TERM
|
||||||
|
|
||||||
|
log "Creating network ${NET} (if missing)"
|
||||||
|
docker network inspect "${NET}" >/dev/null 2>&1 || docker network create "${NET}" >/dev/null
|
||||||
|
|
||||||
|
log "Removing old ${DIND} (if any)"
|
||||||
|
docker rm -f "${DIND}" >/dev/null 2>&1 || true
|
||||||
|
|
||||||
|
log "(Re)creating DinD data volume ${DIND_VOL}"
|
||||||
|
docker volume rm -f "${DIND_VOL}" >/dev/null 2>&1 || true
|
||||||
|
docker volume create "${DIND_VOL}" >/dev/null
|
||||||
|
|
||||||
|
log "(Re)creating shared /tmp volume ${E2E_TMP_VOL}"
|
||||||
|
docker volume rm -f "${E2E_TMP_VOL}" >/dev/null 2>&1 || true
|
||||||
|
docker volume create "${E2E_TMP_VOL}" >/dev/null
|
||||||
|
|
||||||
|
log "Starting Docker-in-Docker daemon ${DIND}"
|
||||||
|
docker run -d --privileged \
|
||||||
|
--name "${DIND}" \
|
||||||
|
--network "${NET}" \
|
||||||
|
-e DOCKER_TLS_CERTDIR="" \
|
||||||
|
-v "${DIND_VOL}:/var/lib/docker" \
|
||||||
|
-v "${E2E_TMP_VOL}:/tmp" \
|
||||||
|
-p 2375:2375 \
|
||||||
|
docker:dind \
|
||||||
|
--host=tcp://0.0.0.0:2375 \
|
||||||
|
--tls=false >/dev/null
|
||||||
|
|
||||||
|
log "Waiting for DinD to be ready..."
|
||||||
|
for i in $(seq 1 "${READY_TIMEOUT_SECONDS}"); do
|
||||||
|
if docker -H "${DIND_HOST}" version >/dev/null 2>&1; then
|
||||||
|
log "DinD is ready."
|
||||||
|
break
|
||||||
|
fi
|
||||||
|
sleep 1
|
||||||
|
if [ "${i}" -eq "${READY_TIMEOUT_SECONDS}" ]; then
|
||||||
|
echo "ERROR: DinD did not become ready in time"
|
||||||
|
docker logs --tail=200 "${DIND}" || true
|
||||||
|
FAILED=1
|
||||||
|
dump_debug || true
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
|
||||||
|
log "Pre-pulling helper images in DinD..."
|
||||||
|
log " - Pulling: ${RSYNC_IMG}"
|
||||||
|
docker -H "${DIND_HOST}" pull "${RSYNC_IMG}"
|
||||||
|
|
||||||
|
log "Ensuring alpine exists in DinD (for debug helpers)"
|
||||||
|
docker -H "${DIND_HOST}" pull alpine:3.20 >/dev/null
|
||||||
|
|
||||||
|
log "Loading ${IMG} image into DinD..."
|
||||||
|
docker save "${IMG}" | docker -H "${DIND_HOST}" load >/dev/null
|
||||||
|
|
||||||
|
log "Running E2E tests inside DinD"
|
||||||
|
set +e
|
||||||
|
if [ "${DEBUG_SHELL}" = "1" ]; then
|
||||||
|
log "E2E_DEBUG_SHELL=1 -> opening shell in test container"
|
||||||
|
docker run --rm -it \
|
||||||
|
--network "${NET}" \
|
||||||
|
-e DOCKER_HOST="${DIND_HOST_IN_NET}" \
|
||||||
|
-e E2E_RSYNC_IMAGE="${RSYNC_IMG}" \
|
||||||
|
-v "${DIND_VOL}:/var/lib/docker:ro" \
|
||||||
|
-v "${E2E_TMP_VOL}:/tmp" \
|
||||||
|
"${IMG}" \
|
||||||
|
sh -lc '
|
||||||
|
set -e
|
||||||
|
if [ ! -f /etc/machine-id ]; then
|
||||||
|
mkdir -p /etc
|
||||||
|
cat /proc/sys/kernel/random/uuid > /etc/machine-id
|
||||||
|
fi
|
||||||
|
echo ">> DOCKER_HOST=${DOCKER_HOST}"
|
||||||
|
docker ps -a || true
|
||||||
|
exec sh
|
||||||
|
'
|
||||||
|
rc=$?
|
||||||
|
else
|
||||||
|
docker run --rm \
|
||||||
|
--network "${NET}" \
|
||||||
|
-e DOCKER_HOST="${DIND_HOST_IN_NET}" \
|
||||||
|
-e E2E_RSYNC_IMAGE="${RSYNC_IMG}" \
|
||||||
|
-v "${DIND_VOL}:/var/lib/docker:ro" \
|
||||||
|
-v "${E2E_TMP_VOL}:/tmp" \
|
||||||
|
"${IMG}" \
|
||||||
|
sh -lc '
|
||||||
|
set -euo pipefail
|
||||||
|
set -x
|
||||||
|
export PYTHONUNBUFFERED=1
|
||||||
|
|
||||||
|
export TMPDIR=/tmp TMP=/tmp TEMP=/tmp
|
||||||
|
|
||||||
|
if [ ! -f /etc/machine-id ]; then
|
||||||
|
mkdir -p /etc
|
||||||
|
cat /proc/sys/kernel/random/uuid > /etc/machine-id
|
||||||
|
fi
|
||||||
|
|
||||||
|
python -m unittest discover -t . -s tests/e2e -p "test_*.py" -v -f
|
||||||
|
'
|
||||||
|
rc=$?
|
||||||
|
fi
|
||||||
|
set -e
|
||||||
|
|
||||||
|
if [ "${rc}" -ne 0 ]; then
|
||||||
|
FAILED=1
|
||||||
|
echo "ERROR: E2E tests failed (exit code: ${rc})"
|
||||||
|
dump_debug || true
|
||||||
|
exit "${rc}"
|
||||||
|
fi
|
||||||
|
|
||||||
|
log "E2E tests passed."
|
||||||
0
src/baudolo/__init__.py
Normal file
0
src/baudolo/__init__.py
Normal file
1
src/baudolo/backup/__init__.py
Normal file
1
src/baudolo/backup/__init__.py
Normal file
@@ -0,0 +1 @@
|
|||||||
|
"""Baudolo backup package."""
|
||||||
9
src/baudolo/backup/__main__.py
Normal file
9
src/baudolo/backup/__main__.py
Normal file
@@ -0,0 +1,9 @@
|
|||||||
|
#!/usr/bin/env python3
|
||||||
|
|
||||||
|
from __future__ import annotations
|
||||||
|
|
||||||
|
from .app import main
|
||||||
|
|
||||||
|
|
||||||
|
if __name__ == "__main__":
|
||||||
|
raise SystemExit(main())
|
||||||
183
src/baudolo/backup/app.py
Normal file
183
src/baudolo/backup/app.py
Normal file
@@ -0,0 +1,183 @@
|
|||||||
|
from __future__ import annotations
|
||||||
|
|
||||||
|
import os
|
||||||
|
import pathlib
|
||||||
|
from datetime import datetime
|
||||||
|
|
||||||
|
import pandas
|
||||||
|
from dirval import create_stamp_file
|
||||||
|
|
||||||
|
from .cli import parse_args
|
||||||
|
from .compose import handle_docker_compose_services
|
||||||
|
from .db import backup_database
|
||||||
|
from .docker import (
|
||||||
|
change_containers_status,
|
||||||
|
containers_using_volume,
|
||||||
|
docker_volume_names,
|
||||||
|
get_image_info,
|
||||||
|
has_image,
|
||||||
|
)
|
||||||
|
from .shell import execute_shell_command
|
||||||
|
from .volume import backup_volume
|
||||||
|
|
||||||
|
|
||||||
|
def get_machine_id() -> str:
|
||||||
|
return execute_shell_command("sha256sum /etc/machine-id")[0][0:64]
|
||||||
|
|
||||||
|
|
||||||
|
def stamp_directory(version_dir: str) -> None:
|
||||||
|
"""
|
||||||
|
Use dirval as a Python library to stamp the directory (no CLI dependency).
|
||||||
|
"""
|
||||||
|
create_stamp_file(version_dir)
|
||||||
|
|
||||||
|
|
||||||
|
def create_version_directory(versions_dir: str, backup_time: str) -> str:
|
||||||
|
version_dir = os.path.join(versions_dir, backup_time)
|
||||||
|
pathlib.Path(version_dir).mkdir(parents=True, exist_ok=True)
|
||||||
|
return version_dir
|
||||||
|
|
||||||
|
|
||||||
|
def create_volume_directory(version_dir: str, volume_name: str) -> str:
|
||||||
|
path = os.path.join(version_dir, volume_name)
|
||||||
|
pathlib.Path(path).mkdir(parents=True, exist_ok=True)
|
||||||
|
return path
|
||||||
|
|
||||||
|
|
||||||
|
def is_image_ignored(container: str, images_no_backup_required: list[str]) -> bool:
|
||||||
|
if not images_no_backup_required:
|
||||||
|
return False
|
||||||
|
img = get_image_info(container)
|
||||||
|
return any(pat in img for pat in images_no_backup_required)
|
||||||
|
|
||||||
|
|
||||||
|
def volume_is_fully_ignored(containers: list[str], images_no_backup_required: list[str]) -> bool:
|
||||||
|
"""
|
||||||
|
Skip file backup only if all containers linked to the volume are ignored.
|
||||||
|
"""
|
||||||
|
if not containers:
|
||||||
|
return False
|
||||||
|
return all(is_image_ignored(c, images_no_backup_required) for c in containers)
|
||||||
|
|
||||||
|
|
||||||
|
def requires_stop(containers: list[str], images_no_stop_required: list[str]) -> bool:
|
||||||
|
"""
|
||||||
|
Stop is required if ANY container image is NOT in the whitelist patterns.
|
||||||
|
"""
|
||||||
|
for c in containers:
|
||||||
|
img = get_image_info(c)
|
||||||
|
if not any(pat in img for pat in images_no_stop_required):
|
||||||
|
return True
|
||||||
|
return False
|
||||||
|
|
||||||
|
|
||||||
|
def backup_mariadb_or_postgres(
|
||||||
|
*,
|
||||||
|
container: str,
|
||||||
|
volume_dir: str,
|
||||||
|
databases_df: "pandas.DataFrame",
|
||||||
|
database_containers: list[str],
|
||||||
|
) -> bool:
|
||||||
|
"""
|
||||||
|
Returns True if the container is a DB container we handled.
|
||||||
|
"""
|
||||||
|
for img in ["mariadb", "postgres"]:
|
||||||
|
if has_image(container, img):
|
||||||
|
backup_database(
|
||||||
|
container=container,
|
||||||
|
volume_dir=volume_dir,
|
||||||
|
db_type=img,
|
||||||
|
databases_df=databases_df,
|
||||||
|
database_containers=database_containers,
|
||||||
|
)
|
||||||
|
return True
|
||||||
|
return False
|
||||||
|
|
||||||
|
|
||||||
|
def _backup_dumps_for_volume(
|
||||||
|
*,
|
||||||
|
containers: list[str],
|
||||||
|
vol_dir: str,
|
||||||
|
databases_df: "pandas.DataFrame",
|
||||||
|
database_containers: list[str],
|
||||||
|
) -> bool:
|
||||||
|
"""
|
||||||
|
Create DB dumps for any mariadb/postgres containers attached to this volume.
|
||||||
|
Returns True if at least one dump was produced.
|
||||||
|
"""
|
||||||
|
dumped_any = False
|
||||||
|
for c in containers:
|
||||||
|
if backup_mariadb_or_postgres(
|
||||||
|
container=c,
|
||||||
|
volume_dir=vol_dir,
|
||||||
|
databases_df=databases_df,
|
||||||
|
database_containers=database_containers,
|
||||||
|
):
|
||||||
|
dumped_any = True
|
||||||
|
return dumped_any
|
||||||
|
|
||||||
|
|
||||||
|
def main() -> int:
|
||||||
|
args = parse_args()
|
||||||
|
|
||||||
|
machine_id = get_machine_id()
|
||||||
|
backup_time = datetime.now().strftime("%Y%m%d%H%M%S")
|
||||||
|
|
||||||
|
versions_dir = os.path.join(args.backups_dir, machine_id, args.repo_name)
|
||||||
|
version_dir = create_version_directory(versions_dir, backup_time)
|
||||||
|
|
||||||
|
databases_df = pandas.read_csv(args.databases_csv, sep=";")
|
||||||
|
|
||||||
|
print("💾 Start volume backups...", flush=True)
|
||||||
|
|
||||||
|
for volume_name in docker_volume_names():
|
||||||
|
print(f"Start backup routine for volume: {volume_name}", flush=True)
|
||||||
|
containers = containers_using_volume(volume_name)
|
||||||
|
|
||||||
|
vol_dir = create_volume_directory(version_dir, volume_name)
|
||||||
|
|
||||||
|
# Old behavior: DB dumps are additional to file backups.
|
||||||
|
_backup_dumps_for_volume(
|
||||||
|
containers=containers,
|
||||||
|
vol_dir=vol_dir,
|
||||||
|
databases_df=databases_df,
|
||||||
|
database_containers=args.database_containers,
|
||||||
|
)
|
||||||
|
|
||||||
|
# dump-only: skip ALL file rsync backups
|
||||||
|
if args.dump_only:
|
||||||
|
continue
|
||||||
|
|
||||||
|
# skip file backup if all linked containers are ignored
|
||||||
|
if volume_is_fully_ignored(containers, args.images_no_backup_required):
|
||||||
|
print(
|
||||||
|
f"Skipping file backup for volume '{volume_name}' (all linked containers are ignored).",
|
||||||
|
flush=True,
|
||||||
|
)
|
||||||
|
continue
|
||||||
|
|
||||||
|
if args.everything:
|
||||||
|
# "everything": always do pre-rsync, then stop + rsync again
|
||||||
|
backup_volume(versions_dir, volume_name, vol_dir)
|
||||||
|
change_containers_status(containers, "stop")
|
||||||
|
backup_volume(versions_dir, volume_name, vol_dir)
|
||||||
|
if not args.shutdown:
|
||||||
|
change_containers_status(containers, "start")
|
||||||
|
continue
|
||||||
|
|
||||||
|
# default: rsync, and if needed stop + rsync
|
||||||
|
backup_volume(versions_dir, volume_name, vol_dir)
|
||||||
|
if requires_stop(containers, args.images_no_stop_required):
|
||||||
|
change_containers_status(containers, "stop")
|
||||||
|
backup_volume(versions_dir, volume_name, vol_dir)
|
||||||
|
if not args.shutdown:
|
||||||
|
change_containers_status(containers, "start")
|
||||||
|
|
||||||
|
# Stamp the backup version directory using dirval (python lib)
|
||||||
|
stamp_directory(version_dir)
|
||||||
|
print("Finished volume backups.", flush=True)
|
||||||
|
|
||||||
|
print("Handling Docker Compose services...", flush=True)
|
||||||
|
handle_docker_compose_services(args.compose_dir, args.docker_compose_hard_restart_required)
|
||||||
|
|
||||||
|
return 0
|
||||||
93
src/baudolo/backup/cli.py
Normal file
93
src/baudolo/backup/cli.py
Normal file
@@ -0,0 +1,93 @@
|
|||||||
|
from __future__ import annotations
|
||||||
|
|
||||||
|
import argparse
|
||||||
|
import os
|
||||||
|
from pathlib import Path
|
||||||
|
|
||||||
|
|
||||||
|
def _default_repo_name() -> str:
|
||||||
|
"""
|
||||||
|
Derive the repository name from the folder that contains `src/`.
|
||||||
|
|
||||||
|
Expected layout:
|
||||||
|
<repo-root>/src/baudolo/backup/cli.py
|
||||||
|
|
||||||
|
=> parents[0]=backup, [1]=baudolo, [2]=src, [3]=repo-root
|
||||||
|
"""
|
||||||
|
try:
|
||||||
|
return Path(__file__).resolve().parents[3].name
|
||||||
|
except Exception:
|
||||||
|
return "backup-docker-to-local"
|
||||||
|
|
||||||
|
|
||||||
|
def parse_args() -> argparse.Namespace:
|
||||||
|
dirname = os.path.dirname(__file__)
|
||||||
|
default_databases_csv = os.path.join(dirname, "databases.csv")
|
||||||
|
|
||||||
|
p = argparse.ArgumentParser(description="Backup Docker volumes.")
|
||||||
|
|
||||||
|
p.add_argument(
|
||||||
|
"--compose-dir",
|
||||||
|
type=str,
|
||||||
|
required=True,
|
||||||
|
help="Path to the parent directory containing docker-compose setups",
|
||||||
|
)
|
||||||
|
p.add_argument(
|
||||||
|
"--docker-compose-hard-restart-required",
|
||||||
|
nargs="+",
|
||||||
|
default=["mailu"],
|
||||||
|
help="Compose dir names that require 'docker-compose down && up -d' (default: mailu)",
|
||||||
|
)
|
||||||
|
|
||||||
|
p.add_argument(
|
||||||
|
"--repo-name",
|
||||||
|
default=_default_repo_name(),
|
||||||
|
help="Backup repo folder name under <backups-dir>/<machine-id>/ (default: git repo folder name)",
|
||||||
|
)
|
||||||
|
p.add_argument(
|
||||||
|
"--databases-csv",
|
||||||
|
default=default_databases_csv,
|
||||||
|
help=f"Path to databases.csv (default: {default_databases_csv})",
|
||||||
|
)
|
||||||
|
p.add_argument(
|
||||||
|
"--backups-dir",
|
||||||
|
default="/Backups",
|
||||||
|
help="Backup root directory (default: /Backups)",
|
||||||
|
)
|
||||||
|
|
||||||
|
p.add_argument(
|
||||||
|
"--database-containers",
|
||||||
|
nargs="+",
|
||||||
|
required=True,
|
||||||
|
help="Container names treated as special instances for database backups",
|
||||||
|
)
|
||||||
|
p.add_argument(
|
||||||
|
"--images-no-stop-required",
|
||||||
|
nargs="+",
|
||||||
|
required=True,
|
||||||
|
help="Image name patterns for which containers should not be stopped during file backup",
|
||||||
|
)
|
||||||
|
p.add_argument(
|
||||||
|
"--images-no-backup-required",
|
||||||
|
nargs="+",
|
||||||
|
default=[],
|
||||||
|
help="Image name patterns for which no backup should be performed",
|
||||||
|
)
|
||||||
|
|
||||||
|
p.add_argument(
|
||||||
|
"--everything",
|
||||||
|
action="store_true",
|
||||||
|
help="Force file backup for all volumes and also execute database dumps (like old script)",
|
||||||
|
)
|
||||||
|
p.add_argument(
|
||||||
|
"--shutdown",
|
||||||
|
action="store_true",
|
||||||
|
help="Do not restart containers after backup",
|
||||||
|
)
|
||||||
|
p.add_argument(
|
||||||
|
"--dump-only",
|
||||||
|
action="store_true",
|
||||||
|
help="Only create DB dumps (skip ALL file rsync backups)",
|
||||||
|
)
|
||||||
|
|
||||||
|
return p.parse_args()
|
||||||
31
src/baudolo/backup/compose.py
Normal file
31
src/baudolo/backup/compose.py
Normal file
@@ -0,0 +1,31 @@
|
|||||||
|
from __future__ import annotations
|
||||||
|
|
||||||
|
import os
|
||||||
|
import subprocess
|
||||||
|
|
||||||
|
|
||||||
|
def hard_restart_docker_services(dir_path: str) -> None:
|
||||||
|
print(f"Hard restart docker-compose services in: {dir_path}", flush=True)
|
||||||
|
subprocess.run(["docker-compose", "down"], cwd=dir_path, check=True)
|
||||||
|
subprocess.run(["docker-compose", "up", "-d"], cwd=dir_path, check=True)
|
||||||
|
|
||||||
|
|
||||||
|
def handle_docker_compose_services(parent_directory: str, hard_restart_required: list[str]) -> None:
|
||||||
|
for entry in os.scandir(parent_directory):
|
||||||
|
if not entry.is_dir():
|
||||||
|
continue
|
||||||
|
|
||||||
|
dir_path = entry.path
|
||||||
|
name = os.path.basename(dir_path)
|
||||||
|
compose_file = os.path.join(dir_path, "docker-compose.yml")
|
||||||
|
|
||||||
|
print(f"Checking directory: {dir_path}", flush=True)
|
||||||
|
if not os.path.isfile(compose_file):
|
||||||
|
print("No docker-compose.yml found. Skipping.", flush=True)
|
||||||
|
continue
|
||||||
|
|
||||||
|
if name in hard_restart_required:
|
||||||
|
print(f"{name}: hard restart required.", flush=True)
|
||||||
|
hard_restart_docker_services(dir_path)
|
||||||
|
else:
|
||||||
|
print(f"{name}: no restart required.", flush=True)
|
||||||
73
src/baudolo/backup/db.py
Normal file
73
src/baudolo/backup/db.py
Normal file
@@ -0,0 +1,73 @@
|
|||||||
|
from __future__ import annotations
|
||||||
|
|
||||||
|
import os
|
||||||
|
import pathlib
|
||||||
|
import re
|
||||||
|
|
||||||
|
import pandas
|
||||||
|
|
||||||
|
from .shell import BackupException, execute_shell_command
|
||||||
|
|
||||||
|
|
||||||
|
def get_instance(container: str, database_containers: list[str]) -> str:
|
||||||
|
if container in database_containers:
|
||||||
|
return container
|
||||||
|
return re.split(r"(_|-)(database|db|postgres)", container)[0]
|
||||||
|
|
||||||
|
|
||||||
|
def fallback_pg_dumpall(container: str, username: str, password: str, out_file: str) -> None:
|
||||||
|
cmd = (
|
||||||
|
f"PGPASSWORD={password} docker exec -i {container} "
|
||||||
|
f"pg_dumpall -U {username} -h localhost > {out_file}"
|
||||||
|
)
|
||||||
|
execute_shell_command(cmd)
|
||||||
|
|
||||||
|
|
||||||
|
def backup_database(
|
||||||
|
*,
|
||||||
|
container: str,
|
||||||
|
volume_dir: str,
|
||||||
|
db_type: str,
|
||||||
|
databases_df: "pandas.DataFrame",
|
||||||
|
database_containers: list[str],
|
||||||
|
) -> None:
|
||||||
|
instance_name = get_instance(container, database_containers)
|
||||||
|
entries = databases_df.loc[databases_df["instance"] == instance_name]
|
||||||
|
if entries.empty:
|
||||||
|
raise BackupException(f"No entry found for instance '{instance_name}'")
|
||||||
|
|
||||||
|
out_dir = os.path.join(volume_dir, "sql")
|
||||||
|
pathlib.Path(out_dir).mkdir(parents=True, exist_ok=True)
|
||||||
|
|
||||||
|
for row in entries.iloc:
|
||||||
|
db_name = row["database"]
|
||||||
|
user = row["username"]
|
||||||
|
password = row["password"]
|
||||||
|
|
||||||
|
dump_file = os.path.join(out_dir, f"{db_name}.backup.sql")
|
||||||
|
|
||||||
|
if db_type == "mariadb":
|
||||||
|
cmd = (
|
||||||
|
f"docker exec {container} /usr/bin/mariadb-dump "
|
||||||
|
f"-u {user} -p{password} {db_name} > {dump_file}"
|
||||||
|
)
|
||||||
|
execute_shell_command(cmd)
|
||||||
|
continue
|
||||||
|
|
||||||
|
if db_type == "postgres":
|
||||||
|
cluster_file = os.path.join(out_dir, f"{instance_name}.cluster.backup.sql")
|
||||||
|
if not db_name:
|
||||||
|
fallback_pg_dumpall(container, user, password, cluster_file)
|
||||||
|
return
|
||||||
|
|
||||||
|
try:
|
||||||
|
cmd = (
|
||||||
|
f"PGPASSWORD={password} docker exec -i {container} "
|
||||||
|
f"pg_dump -U {user} -d {db_name} -h localhost > {dump_file}"
|
||||||
|
)
|
||||||
|
execute_shell_command(cmd)
|
||||||
|
except BackupException as e:
|
||||||
|
print(f"pg_dump failed: {e}", flush=True)
|
||||||
|
print(f"Falling back to pg_dumpall for instance '{instance_name}'", flush=True)
|
||||||
|
fallback_pg_dumpall(container, user, password, cluster_file)
|
||||||
|
continue
|
||||||
43
src/baudolo/backup/docker.py
Normal file
43
src/baudolo/backup/docker.py
Normal file
@@ -0,0 +1,43 @@
|
|||||||
|
from __future__ import annotations
|
||||||
|
|
||||||
|
from .shell import execute_shell_command
|
||||||
|
|
||||||
|
|
||||||
|
def get_image_info(container: str) -> str:
|
||||||
|
return execute_shell_command(
|
||||||
|
f"docker inspect --format '{{{{.Config.Image}}}}' {container}"
|
||||||
|
)[0]
|
||||||
|
|
||||||
|
|
||||||
|
def has_image(container: str, pattern: str) -> bool:
|
||||||
|
"""Return True if container's image contains the pattern."""
|
||||||
|
return pattern in get_image_info(container)
|
||||||
|
|
||||||
|
|
||||||
|
def docker_volume_names() -> list[str]:
|
||||||
|
return execute_shell_command("docker volume ls --format '{{.Name}}'")
|
||||||
|
|
||||||
|
|
||||||
|
def containers_using_volume(volume_name: str) -> list[str]:
|
||||||
|
return execute_shell_command(
|
||||||
|
f"docker ps --filter volume=\"{volume_name}\" --format '{{{{.Names}}}}'"
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
def change_containers_status(containers: list[str], status: str) -> None:
|
||||||
|
"""Stop or start a list of containers."""
|
||||||
|
if not containers:
|
||||||
|
print(f"No containers to {status}.", flush=True)
|
||||||
|
return
|
||||||
|
names = " ".join(containers)
|
||||||
|
print(f"{status.capitalize()} containers: {names}...", flush=True)
|
||||||
|
execute_shell_command(f"docker {status} {names}")
|
||||||
|
|
||||||
|
|
||||||
|
def docker_volume_exists(volume: str) -> bool:
|
||||||
|
# Avoid throwing exceptions for exists checks.
|
||||||
|
try:
|
||||||
|
execute_shell_command(f"docker volume inspect {volume} >/dev/null 2>&1 && echo OK")
|
||||||
|
return True
|
||||||
|
except Exception:
|
||||||
|
return False
|
||||||
26
src/baudolo/backup/shell.py
Normal file
26
src/baudolo/backup/shell.py
Normal file
@@ -0,0 +1,26 @@
|
|||||||
|
from __future__ import annotations
|
||||||
|
|
||||||
|
import subprocess
|
||||||
|
|
||||||
|
|
||||||
|
class BackupException(Exception):
|
||||||
|
"""Generic exception for backup errors."""
|
||||||
|
|
||||||
|
|
||||||
|
def execute_shell_command(command: str) -> list[str]:
|
||||||
|
"""Execute a shell command and return its output lines."""
|
||||||
|
print(command, flush=True)
|
||||||
|
process = subprocess.Popen(
|
||||||
|
[command],
|
||||||
|
stdout=subprocess.PIPE,
|
||||||
|
stderr=subprocess.PIPE,
|
||||||
|
shell=True,
|
||||||
|
)
|
||||||
|
out, err = process.communicate()
|
||||||
|
if process.returncode != 0:
|
||||||
|
raise BackupException(
|
||||||
|
f"Error in command: {command}\n"
|
||||||
|
f"Output: {out}\nError: {err}\n"
|
||||||
|
f"Exit code: {process.returncode}"
|
||||||
|
)
|
||||||
|
return [line.decode("utf-8") for line in out.splitlines()]
|
||||||
42
src/baudolo/backup/volume.py
Normal file
42
src/baudolo/backup/volume.py
Normal file
@@ -0,0 +1,42 @@
|
|||||||
|
from __future__ import annotations
|
||||||
|
|
||||||
|
import os
|
||||||
|
import pathlib
|
||||||
|
|
||||||
|
from .shell import BackupException, execute_shell_command
|
||||||
|
|
||||||
|
|
||||||
|
def get_storage_path(volume_name: str) -> str:
|
||||||
|
path = execute_shell_command(
|
||||||
|
f"docker volume inspect --format '{{{{ .Mountpoint }}}}' {volume_name}"
|
||||||
|
)[0]
|
||||||
|
return f"{path}/"
|
||||||
|
|
||||||
|
|
||||||
|
def get_last_backup_dir(versions_dir: str, volume_name: str, current_backup_dir: str) -> str | None:
|
||||||
|
versions = sorted(os.listdir(versions_dir), reverse=True)
|
||||||
|
for version in versions:
|
||||||
|
candidate = os.path.join(versions_dir, version, volume_name, "files", "")
|
||||||
|
if candidate != current_backup_dir and os.path.isdir(candidate):
|
||||||
|
return candidate
|
||||||
|
return None
|
||||||
|
|
||||||
|
|
||||||
|
def backup_volume(versions_dir: str, volume_name: str, volume_dir: str) -> None:
|
||||||
|
"""Perform incremental file backup of a Docker volume."""
|
||||||
|
dest = os.path.join(volume_dir, "files") + "/"
|
||||||
|
pathlib.Path(dest).mkdir(parents=True, exist_ok=True)
|
||||||
|
|
||||||
|
last = get_last_backup_dir(versions_dir, volume_name, dest)
|
||||||
|
link_dest = f"--link-dest='{last}'" if last else ""
|
||||||
|
source = get_storage_path(volume_name)
|
||||||
|
|
||||||
|
cmd = f"rsync -abP --delete --delete-excluded {link_dest} {source} {dest}"
|
||||||
|
|
||||||
|
try:
|
||||||
|
execute_shell_command(cmd)
|
||||||
|
except BackupException as e:
|
||||||
|
if "file has vanished" in str(e):
|
||||||
|
print("Warning: Some files vanished before transfer. Continuing.", flush=True)
|
||||||
|
else:
|
||||||
|
raise
|
||||||
1
src/baudolo/restore/__init__.py
Normal file
1
src/baudolo/restore/__init__.py
Normal file
@@ -0,0 +1 @@
|
|||||||
|
__all__ = ["main"]
|
||||||
103
src/baudolo/restore/__main__.py
Normal file
103
src/baudolo/restore/__main__.py
Normal file
@@ -0,0 +1,103 @@
|
|||||||
|
from __future__ import annotations
|
||||||
|
|
||||||
|
import argparse
|
||||||
|
import sys
|
||||||
|
|
||||||
|
from .paths import BackupPaths
|
||||||
|
from .files import restore_volume_files
|
||||||
|
from .db.postgres import restore_postgres_sql
|
||||||
|
from .db.mariadb import restore_mariadb_sql
|
||||||
|
|
||||||
|
|
||||||
|
def _add_common_backup_args(p: argparse.ArgumentParser) -> None:
|
||||||
|
p.add_argument("volume_name", help="Docker volume name")
|
||||||
|
p.add_argument("backup_hash", help="Hashed machine id")
|
||||||
|
p.add_argument("version", help="Backup version directory name")
|
||||||
|
|
||||||
|
p.add_argument(
|
||||||
|
"--backups-dir",
|
||||||
|
default="/Backups",
|
||||||
|
help="Backup root directory (default: /Backups)",
|
||||||
|
)
|
||||||
|
p.add_argument(
|
||||||
|
"--repo-name",
|
||||||
|
default="backup-docker-to-local",
|
||||||
|
help="Backup repo folder name under <backups-dir>/<hash>/ (default: backup-docker-to-local)",
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
def main(argv: list[str] | None = None) -> int:
|
||||||
|
parser = argparse.ArgumentParser(
|
||||||
|
prog="baudolo-restore",
|
||||||
|
description="Restore docker volume files and DB dumps.",
|
||||||
|
)
|
||||||
|
sub = parser.add_subparsers(dest="cmd", required=True)
|
||||||
|
|
||||||
|
p_files = sub.add_parser("files", help="Restore files into a docker volume")
|
||||||
|
_add_common_backup_args(p_files)
|
||||||
|
p_files.add_argument("--rsync-image", default="ghcr.io/kevinveenbirkenbach/alpine-rsync")
|
||||||
|
|
||||||
|
p_pg = sub.add_parser("postgres", help="Restore a single PostgreSQL database dump")
|
||||||
|
_add_common_backup_args(p_pg)
|
||||||
|
p_pg.add_argument("--container", required=True)
|
||||||
|
p_pg.add_argument("--db-name", required=True)
|
||||||
|
p_pg.add_argument("--db-user", default=None, help="Defaults to db-name if omitted")
|
||||||
|
p_pg.add_argument("--db-password", required=True)
|
||||||
|
p_pg.add_argument("--empty", action="store_true")
|
||||||
|
|
||||||
|
p_mdb = sub.add_parser("mariadb", help="Restore a single MariaDB/MySQL-compatible dump")
|
||||||
|
_add_common_backup_args(p_mdb)
|
||||||
|
p_mdb.add_argument("--container", required=True)
|
||||||
|
p_mdb.add_argument("--db-name", required=True)
|
||||||
|
p_mdb.add_argument("--db-user", default=None, help="Defaults to db-name if omitted")
|
||||||
|
p_mdb.add_argument("--db-password", required=True)
|
||||||
|
p_mdb.add_argument("--empty", action="store_true")
|
||||||
|
|
||||||
|
args = parser.parse_args(argv)
|
||||||
|
|
||||||
|
bp = BackupPaths(
|
||||||
|
args.volume_name,
|
||||||
|
args.backup_hash,
|
||||||
|
args.version,
|
||||||
|
repo_name=args.repo_name,
|
||||||
|
backups_dir=args.backups_dir,
|
||||||
|
)
|
||||||
|
|
||||||
|
try:
|
||||||
|
if args.cmd == "files":
|
||||||
|
return restore_volume_files(args.volume_name, bp.files_dir(), rsync_image=args.rsync_image)
|
||||||
|
|
||||||
|
if args.cmd == "postgres":
|
||||||
|
user = args.db_user or args.db_name
|
||||||
|
restore_postgres_sql(
|
||||||
|
container=args.container,
|
||||||
|
db_name=args.db_name,
|
||||||
|
user=user,
|
||||||
|
password=args.db_password,
|
||||||
|
sql_path=bp.sql_file(args.db_name),
|
||||||
|
empty=args.empty,
|
||||||
|
)
|
||||||
|
return 0
|
||||||
|
|
||||||
|
if args.cmd == "mariadb":
|
||||||
|
user = args.db_user or args.db_name
|
||||||
|
restore_mariadb_sql(
|
||||||
|
container=args.container,
|
||||||
|
db_name=args.db_name,
|
||||||
|
user=user,
|
||||||
|
password=args.db_password,
|
||||||
|
sql_path=bp.sql_file(args.db_name),
|
||||||
|
empty=args.empty,
|
||||||
|
)
|
||||||
|
return 0
|
||||||
|
|
||||||
|
parser.error("Unhandled command")
|
||||||
|
return 2
|
||||||
|
|
||||||
|
except Exception as e:
|
||||||
|
print(f"ERROR: {e}", file=sys.stderr)
|
||||||
|
return 1
|
||||||
|
|
||||||
|
|
||||||
|
if __name__ == "__main__":
|
||||||
|
raise SystemExit(main())
|
||||||
1
src/baudolo/restore/db/__init__.py
Normal file
1
src/baudolo/restore/db/__init__.py
Normal file
@@ -0,0 +1 @@
|
|||||||
|
"""Database restore handlers (Postgres, MariaDB/MySQL)."""
|
||||||
83
src/baudolo/restore/db/mariadb.py
Normal file
83
src/baudolo/restore/db/mariadb.py
Normal file
@@ -0,0 +1,83 @@
|
|||||||
|
from __future__ import annotations
|
||||||
|
|
||||||
|
import os
|
||||||
|
import sys
|
||||||
|
|
||||||
|
from ..run import docker_exec, docker_exec_sh
|
||||||
|
|
||||||
|
|
||||||
|
def _pick_client(container: str) -> str:
|
||||||
|
# Prefer mariadb, fallback to mysql (many images provide one or both).
|
||||||
|
script = r"""
|
||||||
|
set -eu
|
||||||
|
if command -v mariadb >/dev/null 2>&1; then echo mariadb; exit 0; fi
|
||||||
|
if command -v mysql >/dev/null 2>&1; then echo mysql; exit 0; fi
|
||||||
|
exit 42
|
||||||
|
"""
|
||||||
|
try:
|
||||||
|
out = docker_exec_sh(container, script, capture=True).stdout.decode().strip()
|
||||||
|
if not out:
|
||||||
|
raise RuntimeError("empty client detection output")
|
||||||
|
return out
|
||||||
|
except Exception as e:
|
||||||
|
print("ERROR: neither 'mariadb' nor 'mysql' found in container.", file=sys.stderr)
|
||||||
|
raise e
|
||||||
|
|
||||||
|
|
||||||
|
def restore_mariadb_sql(
|
||||||
|
*,
|
||||||
|
container: str,
|
||||||
|
db_name: str,
|
||||||
|
user: str,
|
||||||
|
password: str,
|
||||||
|
sql_path: str,
|
||||||
|
empty: bool,
|
||||||
|
) -> None:
|
||||||
|
client = _pick_client(container)
|
||||||
|
|
||||||
|
if not os.path.isfile(sql_path):
|
||||||
|
raise FileNotFoundError(sql_path)
|
||||||
|
|
||||||
|
if empty:
|
||||||
|
# Close to old behavior: list tables, drop individually, then re-enable checks.
|
||||||
|
docker_exec(
|
||||||
|
container,
|
||||||
|
["mysql", "-u", user, f"--password={password}", "-e", "SET FOREIGN_KEY_CHECKS=0;"],
|
||||||
|
)
|
||||||
|
|
||||||
|
result = docker_exec(
|
||||||
|
container,
|
||||||
|
[
|
||||||
|
"mysql",
|
||||||
|
"-u",
|
||||||
|
user,
|
||||||
|
f"--password={password}",
|
||||||
|
"-N",
|
||||||
|
"-e",
|
||||||
|
f"SELECT table_name FROM information_schema.tables WHERE table_schema = '{db_name}';",
|
||||||
|
],
|
||||||
|
capture=True,
|
||||||
|
)
|
||||||
|
tables = result.stdout.decode().split()
|
||||||
|
for tbl in tables:
|
||||||
|
docker_exec(
|
||||||
|
container,
|
||||||
|
[
|
||||||
|
"mysql",
|
||||||
|
"-u",
|
||||||
|
user,
|
||||||
|
f"--password={password}",
|
||||||
|
"-e",
|
||||||
|
f"DROP TABLE IF EXISTS `{db_name}`.`{tbl}`;",
|
||||||
|
],
|
||||||
|
)
|
||||||
|
|
||||||
|
docker_exec(
|
||||||
|
container,
|
||||||
|
["mysql", "-u", user, f"--password={password}", "-e", "SET FOREIGN_KEY_CHECKS=1;"],
|
||||||
|
)
|
||||||
|
|
||||||
|
with open(sql_path, "rb") as f:
|
||||||
|
docker_exec(container, [client, "-u", user, f"--password={password}", db_name], stdin=f)
|
||||||
|
|
||||||
|
print(f"MariaDB/MySQL restore complete for db '{db_name}'.")
|
||||||
53
src/baudolo/restore/db/postgres.py
Normal file
53
src/baudolo/restore/db/postgres.py
Normal file
@@ -0,0 +1,53 @@
|
|||||||
|
from __future__ import annotations
|
||||||
|
|
||||||
|
import os
|
||||||
|
|
||||||
|
from ..run import docker_exec
|
||||||
|
|
||||||
|
|
||||||
|
def restore_postgres_sql(
|
||||||
|
*,
|
||||||
|
container: str,
|
||||||
|
db_name: str,
|
||||||
|
user: str,
|
||||||
|
password: str,
|
||||||
|
sql_path: str,
|
||||||
|
empty: bool,
|
||||||
|
) -> None:
|
||||||
|
if not os.path.isfile(sql_path):
|
||||||
|
raise FileNotFoundError(sql_path)
|
||||||
|
|
||||||
|
# Make password available INSIDE the container for psql.
|
||||||
|
docker_env = {"PGPASSWORD": password}
|
||||||
|
|
||||||
|
if empty:
|
||||||
|
drop_sql = r"""
|
||||||
|
DO $$ DECLARE r RECORD;
|
||||||
|
BEGIN
|
||||||
|
FOR r IN (
|
||||||
|
SELECT table_name AS name, 'TABLE' AS type FROM information_schema.tables WHERE table_schema='public'
|
||||||
|
UNION ALL
|
||||||
|
SELECT routine_name AS name, 'FUNCTION' AS type FROM information_schema.routines WHERE specific_schema='public'
|
||||||
|
UNION ALL
|
||||||
|
SELECT sequence_name AS name, 'SEQUENCE' AS type FROM information_schema.sequences WHERE sequence_schema='public'
|
||||||
|
) LOOP
|
||||||
|
EXECUTE format('DROP %s public.%I CASCADE', r.type, r.name);
|
||||||
|
END LOOP;
|
||||||
|
END $$;
|
||||||
|
"""
|
||||||
|
docker_exec(
|
||||||
|
container,
|
||||||
|
["psql", "-v", "ON_ERROR_STOP=1", "-U", user, "-d", db_name],
|
||||||
|
stdin=drop_sql.encode(),
|
||||||
|
docker_env=docker_env,
|
||||||
|
)
|
||||||
|
|
||||||
|
with open(sql_path, "rb") as f:
|
||||||
|
docker_exec(
|
||||||
|
container,
|
||||||
|
["psql", "-v", "ON_ERROR_STOP=1", "-U", user, "-d", db_name],
|
||||||
|
stdin=f,
|
||||||
|
docker_env=docker_env,
|
||||||
|
)
|
||||||
|
|
||||||
|
print(f"PostgreSQL restore complete for db '{db_name}'.")
|
||||||
37
src/baudolo/restore/files.py
Normal file
37
src/baudolo/restore/files.py
Normal file
@@ -0,0 +1,37 @@
|
|||||||
|
from __future__ import annotations
|
||||||
|
|
||||||
|
import os
|
||||||
|
import sys
|
||||||
|
|
||||||
|
from .run import run, docker_volume_exists
|
||||||
|
|
||||||
|
|
||||||
|
def restore_volume_files(volume_name: str, backup_files_dir: str, *, rsync_image: str) -> int:
|
||||||
|
if not os.path.isdir(backup_files_dir):
|
||||||
|
print(f"ERROR: backup files dir not found: {backup_files_dir}", file=sys.stderr)
|
||||||
|
return 2
|
||||||
|
|
||||||
|
if not docker_volume_exists(volume_name):
|
||||||
|
print(f"Volume {volume_name} does not exist. Creating...")
|
||||||
|
run(["docker", "volume", "create", volume_name])
|
||||||
|
else:
|
||||||
|
print(f"Volume {volume_name} already exists.")
|
||||||
|
|
||||||
|
# Keep behavior close to the old script: rsync -avv --delete
|
||||||
|
run(
|
||||||
|
[
|
||||||
|
"docker",
|
||||||
|
"run",
|
||||||
|
"--rm",
|
||||||
|
"-v",
|
||||||
|
f"{volume_name}:/recover/",
|
||||||
|
"-v",
|
||||||
|
f"{backup_files_dir}:/backup/",
|
||||||
|
rsync_image,
|
||||||
|
"sh",
|
||||||
|
"-lc",
|
||||||
|
"rsync -avv --delete /backup/ /recover/",
|
||||||
|
]
|
||||||
|
)
|
||||||
|
print("File restore complete.")
|
||||||
|
return 0
|
||||||
29
src/baudolo/restore/paths.py
Normal file
29
src/baudolo/restore/paths.py
Normal file
@@ -0,0 +1,29 @@
|
|||||||
|
from __future__ import annotations
|
||||||
|
|
||||||
|
import os
|
||||||
|
from dataclasses import dataclass
|
||||||
|
|
||||||
|
|
||||||
|
@dataclass(frozen=True)
|
||||||
|
class BackupPaths:
|
||||||
|
volume_name: str
|
||||||
|
backup_hash: str
|
||||||
|
version: str
|
||||||
|
repo_name: str
|
||||||
|
backups_dir: str = "/Backups"
|
||||||
|
|
||||||
|
def root(self) -> str:
|
||||||
|
# Always build an absolute path under backups_dir
|
||||||
|
return os.path.join(
|
||||||
|
self.backups_dir,
|
||||||
|
self.backup_hash,
|
||||||
|
self.repo_name,
|
||||||
|
self.version,
|
||||||
|
self.volume_name,
|
||||||
|
)
|
||||||
|
|
||||||
|
def files_dir(self) -> str:
|
||||||
|
return os.path.join(self.root(), "files")
|
||||||
|
|
||||||
|
def sql_file(self, db_name: str) -> str:
|
||||||
|
return os.path.join(self.root(), "sql", f"{db_name}.backup.sql")
|
||||||
81
src/baudolo/restore/run.py
Normal file
81
src/baudolo/restore/run.py
Normal file
@@ -0,0 +1,81 @@
|
|||||||
|
from __future__ import annotations
|
||||||
|
|
||||||
|
import subprocess
|
||||||
|
import sys
|
||||||
|
from typing import Optional
|
||||||
|
|
||||||
|
|
||||||
|
def run(
|
||||||
|
cmd: list[str],
|
||||||
|
*,
|
||||||
|
stdin=None,
|
||||||
|
capture: bool = False,
|
||||||
|
env: Optional[dict] = None,
|
||||||
|
) -> subprocess.CompletedProcess:
|
||||||
|
try:
|
||||||
|
return subprocess.run(
|
||||||
|
cmd,
|
||||||
|
check=True,
|
||||||
|
stdin=stdin,
|
||||||
|
capture_output=capture,
|
||||||
|
env=env,
|
||||||
|
)
|
||||||
|
except subprocess.CalledProcessError as e:
|
||||||
|
msg = f"ERROR: command failed ({e.returncode}): {' '.join(cmd)}"
|
||||||
|
print(msg, file=sys.stderr)
|
||||||
|
if e.stdout:
|
||||||
|
try:
|
||||||
|
print(e.stdout.decode(), file=sys.stderr)
|
||||||
|
except Exception:
|
||||||
|
print(e.stdout, file=sys.stderr)
|
||||||
|
if e.stderr:
|
||||||
|
try:
|
||||||
|
print(e.stderr.decode(), file=sys.stderr)
|
||||||
|
except Exception:
|
||||||
|
print(e.stderr, file=sys.stderr)
|
||||||
|
raise
|
||||||
|
|
||||||
|
|
||||||
|
def docker_exec(
|
||||||
|
container: str,
|
||||||
|
argv: list[str],
|
||||||
|
*,
|
||||||
|
stdin=None,
|
||||||
|
capture: bool = False,
|
||||||
|
env: Optional[dict] = None,
|
||||||
|
docker_env: Optional[dict[str, str]] = None,
|
||||||
|
) -> subprocess.CompletedProcess:
|
||||||
|
cmd: list[str] = ["docker", "exec", "-i"]
|
||||||
|
if docker_env:
|
||||||
|
for k, v in docker_env.items():
|
||||||
|
cmd.extend(["-e", f"{k}={v}"])
|
||||||
|
cmd.extend([container, *argv])
|
||||||
|
return run(cmd, stdin=stdin, capture=capture, env=env)
|
||||||
|
|
||||||
|
|
||||||
|
def docker_exec_sh(
|
||||||
|
container: str,
|
||||||
|
script: str,
|
||||||
|
*,
|
||||||
|
stdin=None,
|
||||||
|
capture: bool = False,
|
||||||
|
env: Optional[dict] = None,
|
||||||
|
docker_env: Optional[dict[str, str]] = None,
|
||||||
|
) -> subprocess.CompletedProcess:
|
||||||
|
return docker_exec(
|
||||||
|
container,
|
||||||
|
["sh", "-lc", script],
|
||||||
|
stdin=stdin,
|
||||||
|
capture=capture,
|
||||||
|
env=env,
|
||||||
|
docker_env=docker_env,
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
def docker_volume_exists(volume: str) -> bool:
|
||||||
|
p = subprocess.run(
|
||||||
|
["docker", "volume", "inspect", volume],
|
||||||
|
stdout=subprocess.DEVNULL,
|
||||||
|
stderr=subprocess.DEVNULL,
|
||||||
|
)
|
||||||
|
return p.returncode == 0
|
||||||
0
tests/e2e/__init__.py
Normal file
0
tests/e2e/__init__.py
Normal file
176
tests/e2e/helpers.py
Normal file
176
tests/e2e/helpers.py
Normal file
@@ -0,0 +1,176 @@
|
|||||||
|
# tests/e2e/helpers.py
|
||||||
|
from __future__ import annotations
|
||||||
|
|
||||||
|
import shutil
|
||||||
|
import subprocess
|
||||||
|
import time
|
||||||
|
import uuid
|
||||||
|
from pathlib import Path
|
||||||
|
|
||||||
|
|
||||||
|
def run(cmd: list[str], *, capture: bool = True, check: bool = True, cwd: str | None = None) -> subprocess.CompletedProcess:
|
||||||
|
return subprocess.run(
|
||||||
|
cmd,
|
||||||
|
check=check,
|
||||||
|
cwd=cwd,
|
||||||
|
text=True,
|
||||||
|
capture_output=capture,
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
def sh(cmd: str, *, capture: bool = True, check: bool = True) -> subprocess.CompletedProcess:
|
||||||
|
return run(["sh", "-lc", cmd], capture=capture, check=check)
|
||||||
|
|
||||||
|
|
||||||
|
def unique(prefix: str) -> str:
|
||||||
|
return f"{prefix}-{uuid.uuid4().hex[:10]}"
|
||||||
|
|
||||||
|
|
||||||
|
def require_docker() -> None:
|
||||||
|
run(["docker", "version"], capture=True, check=True)
|
||||||
|
|
||||||
|
|
||||||
|
def machine_hash() -> str:
|
||||||
|
out = sh("sha256sum /etc/machine-id | awk '{print $1}'").stdout.strip()
|
||||||
|
if len(out) < 16:
|
||||||
|
raise RuntimeError("Could not determine machine hash from /etc/machine-id")
|
||||||
|
return out
|
||||||
|
|
||||||
|
|
||||||
|
def wait_for_log(container: str, pattern: str, timeout_s: int = 60) -> None:
|
||||||
|
deadline = time.time() + timeout_s
|
||||||
|
while time.time() < deadline:
|
||||||
|
p = run(["docker", "logs", container], capture=True, check=False)
|
||||||
|
if pattern in (p.stdout or ""):
|
||||||
|
return
|
||||||
|
time.sleep(1)
|
||||||
|
raise TimeoutError(f"Timed out waiting for log pattern '{pattern}' in {container}")
|
||||||
|
|
||||||
|
|
||||||
|
def wait_for_postgres(container: str, *, user: str = "postgres", timeout_s: int = 90) -> None:
|
||||||
|
"""
|
||||||
|
Docker-outside-of-Docker friendly readiness: check from inside the DB container.
|
||||||
|
"""
|
||||||
|
deadline = time.time() + timeout_s
|
||||||
|
while time.time() < deadline:
|
||||||
|
p = run(
|
||||||
|
["docker", "exec", container, "sh", "-lc", f"pg_isready -U {user} -h localhost"],
|
||||||
|
capture=True,
|
||||||
|
check=False,
|
||||||
|
)
|
||||||
|
if p.returncode == 0:
|
||||||
|
return
|
||||||
|
time.sleep(1)
|
||||||
|
raise TimeoutError(f"Timed out waiting for Postgres readiness in container {container}")
|
||||||
|
|
||||||
|
|
||||||
|
def wait_for_mariadb(container: str, *, root_password: str, timeout_s: int = 90) -> None:
|
||||||
|
"""
|
||||||
|
Docker-outside-of-Docker friendly readiness: check from inside the DB container.
|
||||||
|
"""
|
||||||
|
deadline = time.time() + timeout_s
|
||||||
|
while time.time() < deadline:
|
||||||
|
# mariadb-admin is present in the official mariadb image
|
||||||
|
p = run(
|
||||||
|
["docker", "exec", container, "sh", "-lc", f"mariadb-admin -uroot -p{root_password} ping -h localhost"],
|
||||||
|
capture=True,
|
||||||
|
check=False,
|
||||||
|
)
|
||||||
|
if p.returncode == 0:
|
||||||
|
return
|
||||||
|
time.sleep(1)
|
||||||
|
raise TimeoutError(f"Timed out waiting for MariaDB readiness in container {container}")
|
||||||
|
|
||||||
|
|
||||||
|
def backup_run(
|
||||||
|
*,
|
||||||
|
backups_dir: str,
|
||||||
|
repo_name: str,
|
||||||
|
compose_dir: str,
|
||||||
|
databases_csv: str,
|
||||||
|
database_containers: list[str],
|
||||||
|
images_no_stop_required: list[str],
|
||||||
|
images_no_backup_required: list[str] | None = None,
|
||||||
|
dump_only: bool = False,
|
||||||
|
) -> None:
|
||||||
|
cmd = [
|
||||||
|
"baudolo",
|
||||||
|
"--compose-dir", compose_dir,
|
||||||
|
"--docker-compose-hard-restart-required", "mailu",
|
||||||
|
"--repo-name", repo_name,
|
||||||
|
"--databases-csv", databases_csv,
|
||||||
|
"--backups-dir", backups_dir,
|
||||||
|
"--database-containers", *database_containers,
|
||||||
|
"--images-no-stop-required", *images_no_stop_required,
|
||||||
|
]
|
||||||
|
if images_no_backup_required:
|
||||||
|
cmd += ["--images-no-backup-required", *images_no_backup_required]
|
||||||
|
if dump_only:
|
||||||
|
cmd += ["--dump-only"]
|
||||||
|
|
||||||
|
try:
|
||||||
|
run(cmd, capture=True, check=True)
|
||||||
|
except subprocess.CalledProcessError as e:
|
||||||
|
# Print captured output so failing E2E tests are "live" / debuggable in CI logs
|
||||||
|
print(">>> baudolo failed (exit code:", e.returncode, ")")
|
||||||
|
if e.stdout:
|
||||||
|
print(">>> baudolo STDOUT:\n" + e.stdout)
|
||||||
|
if e.stderr:
|
||||||
|
print(">>> baudolo STDERR:\n" + e.stderr)
|
||||||
|
raise
|
||||||
|
|
||||||
|
|
||||||
|
def latest_version_dir(backups_dir: str, repo_name: str) -> tuple[str, str]:
|
||||||
|
"""
|
||||||
|
Returns (hash, version) for the latest backup.
|
||||||
|
"""
|
||||||
|
h = machine_hash()
|
||||||
|
root = Path(backups_dir) / h / repo_name
|
||||||
|
if not root.is_dir():
|
||||||
|
raise FileNotFoundError(str(root))
|
||||||
|
|
||||||
|
versions = sorted([p.name for p in root.iterdir() if p.is_dir()])
|
||||||
|
if not versions:
|
||||||
|
raise RuntimeError(f"No versions found under {root}")
|
||||||
|
return h, versions[-1]
|
||||||
|
|
||||||
|
|
||||||
|
def backup_path(backups_dir: str, repo_name: str, version: str, volume: str) -> Path:
|
||||||
|
h = machine_hash()
|
||||||
|
return Path(backups_dir) / h / repo_name / version / volume
|
||||||
|
|
||||||
|
|
||||||
|
def create_minimal_compose_dir(base: str) -> str:
|
||||||
|
"""
|
||||||
|
baudolo requires --compose-dir. Create an empty dir with one non-compose subdir.
|
||||||
|
"""
|
||||||
|
p = Path(base) / "compose-root"
|
||||||
|
p.mkdir(parents=True, exist_ok=True)
|
||||||
|
(p / "noop").mkdir(parents=True, exist_ok=True)
|
||||||
|
return str(p)
|
||||||
|
|
||||||
|
|
||||||
|
def write_databases_csv(path: str, rows: list[tuple[str, str, str, str]]) -> None:
|
||||||
|
"""
|
||||||
|
rows: (instance, database, username, password)
|
||||||
|
database may be '' (empty) to trigger pg_dumpall behavior if you want, but here we use db name.
|
||||||
|
"""
|
||||||
|
Path(path).parent.mkdir(parents=True, exist_ok=True)
|
||||||
|
with open(path, "w", encoding="utf-8") as f:
|
||||||
|
f.write("instance;database;username;password\n")
|
||||||
|
for inst, db, user, pw in rows:
|
||||||
|
f.write(f"{inst};{db};{user};{pw}\n")
|
||||||
|
|
||||||
|
|
||||||
|
def cleanup_docker(*, containers: list[str], volumes: list[str]) -> None:
|
||||||
|
for c in containers:
|
||||||
|
run(["docker", "rm", "-f", c], capture=True, check=False)
|
||||||
|
for v in volumes:
|
||||||
|
run(["docker", "volume", "rm", "-f", v], capture=True, check=False)
|
||||||
|
|
||||||
|
|
||||||
|
def ensure_empty_dir(path: str) -> None:
|
||||||
|
p = Path(path)
|
||||||
|
if p.exists():
|
||||||
|
shutil.rmtree(p)
|
||||||
|
p.mkdir(parents=True, exist_ok=True)
|
||||||
84
tests/e2e/test_e2e_files_full.py
Normal file
84
tests/e2e/test_e2e_files_full.py
Normal file
@@ -0,0 +1,84 @@
|
|||||||
|
import unittest
|
||||||
|
from pathlib import Path
|
||||||
|
|
||||||
|
from .helpers import (
|
||||||
|
backup_run,
|
||||||
|
backup_path,
|
||||||
|
cleanup_docker,
|
||||||
|
create_minimal_compose_dir,
|
||||||
|
ensure_empty_dir,
|
||||||
|
latest_version_dir,
|
||||||
|
require_docker,
|
||||||
|
unique,
|
||||||
|
write_databases_csv,
|
||||||
|
run,
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
class TestE2EFilesFull(unittest.TestCase):
|
||||||
|
@classmethod
|
||||||
|
def setUpClass(cls) -> None:
|
||||||
|
require_docker()
|
||||||
|
cls.prefix = unique("baudolo-e2e-files-full")
|
||||||
|
cls.backups_dir = f"/tmp/{cls.prefix}/Backups"
|
||||||
|
ensure_empty_dir(cls.backups_dir)
|
||||||
|
|
||||||
|
cls.compose_dir = create_minimal_compose_dir(f"/tmp/{cls.prefix}")
|
||||||
|
cls.repo_name = cls.prefix
|
||||||
|
|
||||||
|
cls.volume_src = f"{cls.prefix}-vol-src"
|
||||||
|
cls.volume_dst = f"{cls.prefix}-vol-dst"
|
||||||
|
cls.containers = []
|
||||||
|
cls.volumes = [cls.volume_src, cls.volume_dst]
|
||||||
|
|
||||||
|
# create source volume with a file
|
||||||
|
run(["docker", "volume", "create", cls.volume_src])
|
||||||
|
run([
|
||||||
|
"docker", "run", "--rm",
|
||||||
|
"-v", f"{cls.volume_src}:/data",
|
||||||
|
"alpine:3.20",
|
||||||
|
"sh", "-lc", "mkdir -p /data && echo 'hello' > /data/hello.txt",
|
||||||
|
])
|
||||||
|
|
||||||
|
# databases.csv (unused, but required by CLI)
|
||||||
|
cls.databases_csv = f"/tmp/{cls.prefix}/databases.csv"
|
||||||
|
write_databases_csv(cls.databases_csv, [])
|
||||||
|
|
||||||
|
# Run backup (files should be copied)
|
||||||
|
backup_run(
|
||||||
|
backups_dir=cls.backups_dir,
|
||||||
|
repo_name=cls.repo_name,
|
||||||
|
compose_dir=cls.compose_dir,
|
||||||
|
databases_csv=cls.databases_csv,
|
||||||
|
database_containers=["dummy-db"],
|
||||||
|
images_no_stop_required=["alpine", "postgres", "mariadb", "mysql"],
|
||||||
|
)
|
||||||
|
|
||||||
|
cls.hash, cls.version = latest_version_dir(cls.backups_dir, cls.repo_name)
|
||||||
|
|
||||||
|
@classmethod
|
||||||
|
def tearDownClass(cls) -> None:
|
||||||
|
cleanup_docker(containers=cls.containers, volumes=cls.volumes)
|
||||||
|
|
||||||
|
def test_files_backup_exists(self) -> None:
|
||||||
|
p = backup_path(self.backups_dir, self.repo_name, self.version, self.volume_src) / "files" / "hello.txt"
|
||||||
|
self.assertTrue(p.is_file(), f"Expected backed up file at: {p}")
|
||||||
|
|
||||||
|
def test_restore_files_into_new_volume(self) -> None:
|
||||||
|
# restore files into dst volume
|
||||||
|
run([
|
||||||
|
"baudolo-restore", "files",
|
||||||
|
self.volume_dst, self.hash, self.version,
|
||||||
|
"--backups-dir", self.backups_dir,
|
||||||
|
"--repo-name", self.repo_name,
|
||||||
|
"--rsync-image", "ghcr.io/kevinveenbirkenbach/alpine-rsync",
|
||||||
|
])
|
||||||
|
|
||||||
|
# verify restored file exists in dst volume
|
||||||
|
p = run([
|
||||||
|
"docker", "run", "--rm",
|
||||||
|
"-v", f"{self.volume_dst}:/data",
|
||||||
|
"alpine:3.20",
|
||||||
|
"sh", "-lc", "cat /data/hello.txt",
|
||||||
|
])
|
||||||
|
self.assertEqual((p.stdout or "").strip(), "hello")
|
||||||
72
tests/e2e/test_e2e_files_no_copy.py
Normal file
72
tests/e2e/test_e2e_files_no_copy.py
Normal file
@@ -0,0 +1,72 @@
|
|||||||
|
import unittest
|
||||||
|
|
||||||
|
from .helpers import (
|
||||||
|
backup_run,
|
||||||
|
backup_path,
|
||||||
|
cleanup_docker,
|
||||||
|
create_minimal_compose_dir,
|
||||||
|
ensure_empty_dir,
|
||||||
|
latest_version_dir,
|
||||||
|
require_docker,
|
||||||
|
unique,
|
||||||
|
write_databases_csv,
|
||||||
|
run,
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
class TestE2EFilesNoCopy(unittest.TestCase):
|
||||||
|
@classmethod
|
||||||
|
def setUpClass(cls) -> None:
|
||||||
|
require_docker()
|
||||||
|
cls.prefix = unique("baudolo-e2e-files-nocopy")
|
||||||
|
cls.backups_dir = f"/tmp/{cls.prefix}/Backups"
|
||||||
|
ensure_empty_dir(cls.backups_dir)
|
||||||
|
|
||||||
|
cls.compose_dir = create_minimal_compose_dir(f"/tmp/{cls.prefix}")
|
||||||
|
cls.repo_name = cls.prefix
|
||||||
|
|
||||||
|
cls.volume_src = f"{cls.prefix}-vol-src"
|
||||||
|
cls.volume_dst = f"{cls.prefix}-vol-dst"
|
||||||
|
cls.containers = []
|
||||||
|
cls.volumes = [cls.volume_src, cls.volume_dst]
|
||||||
|
|
||||||
|
run(["docker", "volume", "create", cls.volume_src])
|
||||||
|
run([
|
||||||
|
"docker", "run", "--rm",
|
||||||
|
"-v", f"{cls.volume_src}:/data",
|
||||||
|
"alpine:3.20",
|
||||||
|
"sh", "-lc", "echo 'hello' > /data/hello.txt",
|
||||||
|
])
|
||||||
|
|
||||||
|
cls.databases_csv = f"/tmp/{cls.prefix}/databases.csv"
|
||||||
|
write_databases_csv(cls.databases_csv, [])
|
||||||
|
|
||||||
|
# dump-only => NO file rsync backups
|
||||||
|
backup_run(
|
||||||
|
backups_dir=cls.backups_dir,
|
||||||
|
repo_name=cls.repo_name,
|
||||||
|
compose_dir=cls.compose_dir,
|
||||||
|
databases_csv=cls.databases_csv,
|
||||||
|
database_containers=["dummy-db"],
|
||||||
|
images_no_stop_required=["alpine", "postgres", "mariadb", "mysql"],
|
||||||
|
dump_only=True,
|
||||||
|
)
|
||||||
|
|
||||||
|
cls.hash, cls.version = latest_version_dir(cls.backups_dir, cls.repo_name)
|
||||||
|
|
||||||
|
@classmethod
|
||||||
|
def tearDownClass(cls) -> None:
|
||||||
|
cleanup_docker(containers=cls.containers, volumes=cls.volumes)
|
||||||
|
|
||||||
|
def test_files_backup_not_present(self) -> None:
|
||||||
|
p = backup_path(self.backups_dir, self.repo_name, self.version, self.volume_src) / "files"
|
||||||
|
self.assertFalse(p.exists(), f"Did not expect files backup dir at: {p}")
|
||||||
|
|
||||||
|
def test_restore_files_fails_expected(self) -> None:
|
||||||
|
p = run([
|
||||||
|
"baudolo-restore", "files",
|
||||||
|
self.volume_dst, self.hash, self.version,
|
||||||
|
"--backups-dir", self.backups_dir,
|
||||||
|
"--repo-name", self.repo_name,
|
||||||
|
], check=False)
|
||||||
|
self.assertEqual(p.returncode, 2, f"Expected exitcode 2, got {p.returncode}\nSTDOUT={p.stdout}\nSTDERR={p.stderr}")
|
||||||
105
tests/e2e/test_e2e_mariadb_full.py
Normal file
105
tests/e2e/test_e2e_mariadb_full.py
Normal file
@@ -0,0 +1,105 @@
|
|||||||
|
# tests/e2e/test_e2e_mariadb_full.py
|
||||||
|
import unittest
|
||||||
|
|
||||||
|
from .helpers import (
|
||||||
|
backup_run,
|
||||||
|
backup_path,
|
||||||
|
cleanup_docker,
|
||||||
|
create_minimal_compose_dir,
|
||||||
|
ensure_empty_dir,
|
||||||
|
latest_version_dir,
|
||||||
|
require_docker,
|
||||||
|
unique,
|
||||||
|
write_databases_csv,
|
||||||
|
run,
|
||||||
|
wait_for_mariadb,
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
class TestE2EMariaDBFull(unittest.TestCase):
|
||||||
|
@classmethod
|
||||||
|
def setUpClass(cls) -> None:
|
||||||
|
require_docker()
|
||||||
|
cls.prefix = unique("baudolo-e2e-mariadb-full")
|
||||||
|
cls.backups_dir = f"/tmp/{cls.prefix}/Backups"
|
||||||
|
ensure_empty_dir(cls.backups_dir)
|
||||||
|
cls.compose_dir = create_minimal_compose_dir(f"/tmp/{cls.prefix}")
|
||||||
|
cls.repo_name = cls.prefix
|
||||||
|
|
||||||
|
cls.db_container = f"{cls.prefix}-mariadb"
|
||||||
|
cls.db_volume = f"{cls.prefix}-mariadb-vol"
|
||||||
|
cls.containers = [cls.db_container]
|
||||||
|
cls.volumes = [cls.db_volume]
|
||||||
|
|
||||||
|
run(["docker", "volume", "create", cls.db_volume])
|
||||||
|
|
||||||
|
# Start MariaDB (no host port publishing needed; we will exec into the container)
|
||||||
|
run([
|
||||||
|
"docker", "run", "-d",
|
||||||
|
"--name", cls.db_container,
|
||||||
|
"-e", "MARIADB_ROOT_PASSWORD=rootpw",
|
||||||
|
"-v", f"{cls.db_volume}:/var/lib/mysql",
|
||||||
|
"mariadb:11",
|
||||||
|
])
|
||||||
|
wait_for_mariadb(cls.db_container, root_password="rootpw", timeout_s=90)
|
||||||
|
|
||||||
|
# Create DB + data
|
||||||
|
run([
|
||||||
|
"docker", "exec", cls.db_container,
|
||||||
|
"sh", "-lc",
|
||||||
|
"mariadb -uroot -prootpw -e \"CREATE DATABASE appdb; "
|
||||||
|
"CREATE TABLE appdb.t (id INT PRIMARY KEY, v VARCHAR(50)); "
|
||||||
|
"INSERT INTO appdb.t VALUES (1,'ok');\"",
|
||||||
|
])
|
||||||
|
|
||||||
|
cls.databases_csv = f"/tmp/{cls.prefix}/databases.csv"
|
||||||
|
instance = cls.db_container
|
||||||
|
write_databases_csv(cls.databases_csv, [(instance, "appdb", "root", "rootpw")])
|
||||||
|
|
||||||
|
# Backup with file+dump
|
||||||
|
backup_run(
|
||||||
|
backups_dir=cls.backups_dir,
|
||||||
|
repo_name=cls.repo_name,
|
||||||
|
compose_dir=cls.compose_dir,
|
||||||
|
databases_csv=cls.databases_csv,
|
||||||
|
database_containers=[cls.db_container],
|
||||||
|
images_no_stop_required=["mariadb", "mysql", "alpine", "postgres"],
|
||||||
|
)
|
||||||
|
|
||||||
|
cls.hash, cls.version = latest_version_dir(cls.backups_dir, cls.repo_name)
|
||||||
|
|
||||||
|
# Wipe DB
|
||||||
|
run([
|
||||||
|
"docker", "exec", cls.db_container,
|
||||||
|
"sh", "-lc",
|
||||||
|
"mariadb -uroot -prootpw -e \"DROP DATABASE appdb;\"",
|
||||||
|
])
|
||||||
|
|
||||||
|
# Restore DB
|
||||||
|
run([
|
||||||
|
"baudolo-restore", "mariadb",
|
||||||
|
cls.db_volume, cls.hash, cls.version,
|
||||||
|
"--backups-dir", cls.backups_dir,
|
||||||
|
"--repo-name", cls.repo_name,
|
||||||
|
"--container", cls.db_container,
|
||||||
|
"--db-name", "appdb",
|
||||||
|
"--db-user", "root",
|
||||||
|
"--db-password", "rootpw",
|
||||||
|
"--empty",
|
||||||
|
])
|
||||||
|
|
||||||
|
@classmethod
|
||||||
|
def tearDownClass(cls) -> None:
|
||||||
|
cleanup_docker(containers=cls.containers, volumes=cls.volumes)
|
||||||
|
|
||||||
|
def test_dump_file_exists(self) -> None:
|
||||||
|
p = backup_path(self.backups_dir, self.repo_name, self.version, self.db_volume) / "sql" / "appdb.backup.sql"
|
||||||
|
self.assertTrue(p.is_file(), f"Expected dump file at: {p}")
|
||||||
|
|
||||||
|
def test_data_restored(self) -> None:
|
||||||
|
p = run([
|
||||||
|
"docker", "exec", self.db_container,
|
||||||
|
"sh", "-lc",
|
||||||
|
"mariadb -uroot -prootpw -N -e \"SELECT v FROM appdb.t WHERE id=1;\"",
|
||||||
|
])
|
||||||
|
self.assertEqual((p.stdout or "").strip(), "ok")
|
||||||
102
tests/e2e/test_e2e_mariadb_no_copy.py
Normal file
102
tests/e2e/test_e2e_mariadb_no_copy.py
Normal file
@@ -0,0 +1,102 @@
|
|||||||
|
# tests/e2e/test_e2e_mariadb_no_copy.py
|
||||||
|
import unittest
|
||||||
|
|
||||||
|
from .helpers import (
|
||||||
|
backup_run,
|
||||||
|
backup_path,
|
||||||
|
cleanup_docker,
|
||||||
|
create_minimal_compose_dir,
|
||||||
|
ensure_empty_dir,
|
||||||
|
latest_version_dir,
|
||||||
|
require_docker,
|
||||||
|
unique,
|
||||||
|
write_databases_csv,
|
||||||
|
run,
|
||||||
|
wait_for_mariadb,
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
class TestE2EMariaDBNoCopy(unittest.TestCase):
|
||||||
|
@classmethod
|
||||||
|
def setUpClass(cls) -> None:
|
||||||
|
require_docker()
|
||||||
|
cls.prefix = unique("baudolo-e2e-mariadb-nocopy")
|
||||||
|
cls.backups_dir = f"/tmp/{cls.prefix}/Backups"
|
||||||
|
ensure_empty_dir(cls.backups_dir)
|
||||||
|
cls.compose_dir = create_minimal_compose_dir(f"/tmp/{cls.prefix}")
|
||||||
|
cls.repo_name = cls.prefix
|
||||||
|
|
||||||
|
cls.db_container = f"{cls.prefix}-mariadb"
|
||||||
|
cls.db_volume = f"{cls.prefix}-mariadb-vol"
|
||||||
|
cls.containers = [cls.db_container]
|
||||||
|
cls.volumes = [cls.db_volume]
|
||||||
|
|
||||||
|
run(["docker", "volume", "create", cls.db_volume])
|
||||||
|
run([
|
||||||
|
"docker", "run", "-d",
|
||||||
|
"--name", cls.db_container,
|
||||||
|
"-e", "MARIADB_ROOT_PASSWORD=rootpw",
|
||||||
|
"-v", f"{cls.db_volume}:/var/lib/mysql",
|
||||||
|
"mariadb:11",
|
||||||
|
])
|
||||||
|
wait_for_mariadb(cls.db_container, root_password="rootpw", timeout_s=90)
|
||||||
|
|
||||||
|
run([
|
||||||
|
"docker", "exec", cls.db_container,
|
||||||
|
"sh", "-lc",
|
||||||
|
"mariadb -uroot -prootpw -e \"CREATE DATABASE appdb; "
|
||||||
|
"CREATE TABLE appdb.t (id INT PRIMARY KEY, v VARCHAR(50)); "
|
||||||
|
"INSERT INTO appdb.t VALUES (1,'ok');\"",
|
||||||
|
])
|
||||||
|
|
||||||
|
cls.databases_csv = f"/tmp/{cls.prefix}/databases.csv"
|
||||||
|
write_databases_csv(cls.databases_csv, [(cls.db_container, "appdb", "root", "rootpw")])
|
||||||
|
|
||||||
|
# dump-only => no files
|
||||||
|
backup_run(
|
||||||
|
backups_dir=cls.backups_dir,
|
||||||
|
repo_name=cls.repo_name,
|
||||||
|
compose_dir=cls.compose_dir,
|
||||||
|
databases_csv=cls.databases_csv,
|
||||||
|
database_containers=[cls.db_container],
|
||||||
|
images_no_stop_required=["mariadb", "mysql", "alpine", "postgres"],
|
||||||
|
dump_only=True,
|
||||||
|
)
|
||||||
|
|
||||||
|
cls.hash, cls.version = latest_version_dir(cls.backups_dir, cls.repo_name)
|
||||||
|
|
||||||
|
# Wipe DB
|
||||||
|
run([
|
||||||
|
"docker", "exec", cls.db_container,
|
||||||
|
"sh", "-lc",
|
||||||
|
"mariadb -uroot -prootpw -e \"DROP DATABASE appdb;\"",
|
||||||
|
])
|
||||||
|
|
||||||
|
# Restore DB
|
||||||
|
run([
|
||||||
|
"baudolo-restore", "mariadb",
|
||||||
|
cls.db_volume, cls.hash, cls.version,
|
||||||
|
"--backups-dir", cls.backups_dir,
|
||||||
|
"--repo-name", cls.repo_name,
|
||||||
|
"--container", cls.db_container,
|
||||||
|
"--db-name", "appdb",
|
||||||
|
"--db-user", "root",
|
||||||
|
"--db-password", "rootpw",
|
||||||
|
"--empty",
|
||||||
|
])
|
||||||
|
|
||||||
|
@classmethod
|
||||||
|
def tearDownClass(cls) -> None:
|
||||||
|
cleanup_docker(containers=cls.containers, volumes=cls.volumes)
|
||||||
|
|
||||||
|
def test_files_backup_not_present(self) -> None:
|
||||||
|
p = backup_path(self.backups_dir, self.repo_name, self.version, self.db_volume) / "files"
|
||||||
|
self.assertFalse(p.exists(), f"Did not expect files backup dir at: {p}")
|
||||||
|
|
||||||
|
def test_data_restored(self) -> None:
|
||||||
|
p = run([
|
||||||
|
"docker", "exec", self.db_container,
|
||||||
|
"sh", "-lc",
|
||||||
|
"mariadb -uroot -prootpw -N -e \"SELECT v FROM appdb.t WHERE id=1;\"",
|
||||||
|
])
|
||||||
|
self.assertEqual((p.stdout or "").strip(), "ok")
|
||||||
102
tests/e2e/test_e2e_postgres_full.py
Normal file
102
tests/e2e/test_e2e_postgres_full.py
Normal file
@@ -0,0 +1,102 @@
|
|||||||
|
# tests/e2e/test_e2e_postgres_full.py
|
||||||
|
import unittest
|
||||||
|
|
||||||
|
from .helpers import (
|
||||||
|
backup_run,
|
||||||
|
backup_path,
|
||||||
|
cleanup_docker,
|
||||||
|
create_minimal_compose_dir,
|
||||||
|
ensure_empty_dir,
|
||||||
|
latest_version_dir,
|
||||||
|
require_docker,
|
||||||
|
unique,
|
||||||
|
write_databases_csv,
|
||||||
|
run,
|
||||||
|
wait_for_postgres,
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
class TestE2EPostgresFull(unittest.TestCase):
|
||||||
|
@classmethod
|
||||||
|
def setUpClass(cls) -> None:
|
||||||
|
require_docker()
|
||||||
|
cls.prefix = unique("baudolo-e2e-postgres-full")
|
||||||
|
cls.backups_dir = f"/tmp/{cls.prefix}/Backups"
|
||||||
|
ensure_empty_dir(cls.backups_dir)
|
||||||
|
cls.compose_dir = create_minimal_compose_dir(f"/tmp/{cls.prefix}")
|
||||||
|
cls.repo_name = cls.prefix
|
||||||
|
|
||||||
|
cls.pg_container = f"{cls.prefix}-pg"
|
||||||
|
cls.pg_volume = f"{cls.prefix}-pg-vol"
|
||||||
|
cls.containers = [cls.pg_container]
|
||||||
|
cls.volumes = [cls.pg_volume]
|
||||||
|
|
||||||
|
run(["docker", "volume", "create", cls.pg_volume])
|
||||||
|
|
||||||
|
run([
|
||||||
|
"docker", "run", "-d",
|
||||||
|
"--name", cls.pg_container,
|
||||||
|
"-e", "POSTGRES_PASSWORD=pgpw",
|
||||||
|
"-e", "POSTGRES_DB=appdb",
|
||||||
|
"-e", "POSTGRES_USER=postgres",
|
||||||
|
"-v", f"{cls.pg_volume}:/var/lib/postgresql/data",
|
||||||
|
"postgres:16",
|
||||||
|
])
|
||||||
|
wait_for_postgres(cls.pg_container, user="postgres", timeout_s=90)
|
||||||
|
|
||||||
|
# Create a table + data
|
||||||
|
run([
|
||||||
|
"docker", "exec", cls.pg_container,
|
||||||
|
"sh", "-lc",
|
||||||
|
"psql -U postgres -d appdb -c \"CREATE TABLE t (id int primary key, v text); INSERT INTO t VALUES (1,'ok');\"",
|
||||||
|
])
|
||||||
|
|
||||||
|
cls.databases_csv = f"/tmp/{cls.prefix}/databases.csv"
|
||||||
|
write_databases_csv(cls.databases_csv, [(cls.pg_container, "appdb", "postgres", "pgpw")])
|
||||||
|
|
||||||
|
backup_run(
|
||||||
|
backups_dir=cls.backups_dir,
|
||||||
|
repo_name=cls.repo_name,
|
||||||
|
compose_dir=cls.compose_dir,
|
||||||
|
databases_csv=cls.databases_csv,
|
||||||
|
database_containers=[cls.pg_container],
|
||||||
|
images_no_stop_required=["postgres", "mariadb", "mysql", "alpine"],
|
||||||
|
)
|
||||||
|
|
||||||
|
cls.hash, cls.version = latest_version_dir(cls.backups_dir, cls.repo_name)
|
||||||
|
|
||||||
|
# Wipe schema
|
||||||
|
run([
|
||||||
|
"docker", "exec", cls.pg_container,
|
||||||
|
"sh", "-lc",
|
||||||
|
"psql -U postgres -d appdb -c \"DROP TABLE t;\"",
|
||||||
|
])
|
||||||
|
|
||||||
|
# Restore
|
||||||
|
run([
|
||||||
|
"baudolo-restore", "postgres",
|
||||||
|
cls.pg_volume, cls.hash, cls.version,
|
||||||
|
"--backups-dir", cls.backups_dir,
|
||||||
|
"--repo-name", cls.repo_name,
|
||||||
|
"--container", cls.pg_container,
|
||||||
|
"--db-name", "appdb",
|
||||||
|
"--db-user", "postgres",
|
||||||
|
"--db-password", "pgpw",
|
||||||
|
"--empty",
|
||||||
|
])
|
||||||
|
|
||||||
|
@classmethod
|
||||||
|
def tearDownClass(cls) -> None:
|
||||||
|
cleanup_docker(containers=cls.containers, volumes=cls.volumes)
|
||||||
|
|
||||||
|
def test_dump_file_exists(self) -> None:
|
||||||
|
p = backup_path(self.backups_dir, self.repo_name, self.version, self.pg_volume) / "sql" / "appdb.backup.sql"
|
||||||
|
self.assertTrue(p.is_file(), f"Expected dump file at: {p}")
|
||||||
|
|
||||||
|
def test_data_restored(self) -> None:
|
||||||
|
p = run([
|
||||||
|
"docker", "exec", self.pg_container,
|
||||||
|
"sh", "-lc",
|
||||||
|
"psql -U postgres -d appdb -t -c \"SELECT v FROM t WHERE id=1;\"",
|
||||||
|
])
|
||||||
|
self.assertEqual((p.stdout or "").strip(), "ok")
|
||||||
99
tests/e2e/test_e2e_postgres_no_copy.py
Normal file
99
tests/e2e/test_e2e_postgres_no_copy.py
Normal file
@@ -0,0 +1,99 @@
|
|||||||
|
# tests/e2e/test_e2e_postgres_no_copy.py
|
||||||
|
import unittest
|
||||||
|
|
||||||
|
from .helpers import (
|
||||||
|
backup_run,
|
||||||
|
backup_path,
|
||||||
|
cleanup_docker,
|
||||||
|
create_minimal_compose_dir,
|
||||||
|
ensure_empty_dir,
|
||||||
|
latest_version_dir,
|
||||||
|
require_docker,
|
||||||
|
unique,
|
||||||
|
write_databases_csv,
|
||||||
|
run,
|
||||||
|
wait_for_postgres,
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
class TestE2EPostgresNoCopy(unittest.TestCase):
|
||||||
|
@classmethod
|
||||||
|
def setUpClass(cls) -> None:
|
||||||
|
require_docker()
|
||||||
|
cls.prefix = unique("baudolo-e2e-postgres-nocopy")
|
||||||
|
cls.backups_dir = f"/tmp/{cls.prefix}/Backups"
|
||||||
|
ensure_empty_dir(cls.backups_dir)
|
||||||
|
cls.compose_dir = create_minimal_compose_dir(f"/tmp/{cls.prefix}")
|
||||||
|
cls.repo_name = cls.prefix
|
||||||
|
|
||||||
|
cls.pg_container = f"{cls.prefix}-pg"
|
||||||
|
cls.pg_volume = f"{cls.prefix}-pg-vol"
|
||||||
|
cls.containers = [cls.pg_container]
|
||||||
|
cls.volumes = [cls.pg_volume]
|
||||||
|
|
||||||
|
run(["docker", "volume", "create", cls.pg_volume])
|
||||||
|
run([
|
||||||
|
"docker", "run", "-d",
|
||||||
|
"--name", cls.pg_container,
|
||||||
|
"-e", "POSTGRES_PASSWORD=pgpw",
|
||||||
|
"-e", "POSTGRES_DB=appdb",
|
||||||
|
"-e", "POSTGRES_USER=postgres",
|
||||||
|
"-v", f"{cls.pg_volume}:/var/lib/postgresql/data",
|
||||||
|
"postgres:16",
|
||||||
|
])
|
||||||
|
wait_for_postgres(cls.pg_container, user="postgres", timeout_s=90)
|
||||||
|
|
||||||
|
run([
|
||||||
|
"docker", "exec", cls.pg_container,
|
||||||
|
"sh", "-lc",
|
||||||
|
"psql -U postgres -d appdb -c \"CREATE TABLE t (id int primary key, v text); INSERT INTO t VALUES (1,'ok');\"",
|
||||||
|
])
|
||||||
|
|
||||||
|
cls.databases_csv = f"/tmp/{cls.prefix}/databases.csv"
|
||||||
|
write_databases_csv(cls.databases_csv, [(cls.pg_container, "appdb", "postgres", "pgpw")])
|
||||||
|
|
||||||
|
backup_run(
|
||||||
|
backups_dir=cls.backups_dir,
|
||||||
|
repo_name=cls.repo_name,
|
||||||
|
compose_dir=cls.compose_dir,
|
||||||
|
databases_csv=cls.databases_csv,
|
||||||
|
database_containers=[cls.pg_container],
|
||||||
|
images_no_stop_required=["postgres", "mariadb", "mysql", "alpine"],
|
||||||
|
dump_only=True,
|
||||||
|
)
|
||||||
|
|
||||||
|
cls.hash, cls.version = latest_version_dir(cls.backups_dir, cls.repo_name)
|
||||||
|
|
||||||
|
run([
|
||||||
|
"docker", "exec", cls.pg_container,
|
||||||
|
"sh", "-lc",
|
||||||
|
"psql -U postgres -d appdb -c \"DROP TABLE t;\"",
|
||||||
|
])
|
||||||
|
|
||||||
|
run([
|
||||||
|
"baudolo-restore", "postgres",
|
||||||
|
cls.pg_volume, cls.hash, cls.version,
|
||||||
|
"--backups-dir", cls.backups_dir,
|
||||||
|
"--repo-name", cls.repo_name,
|
||||||
|
"--container", cls.pg_container,
|
||||||
|
"--db-name", "appdb",
|
||||||
|
"--db-user", "postgres",
|
||||||
|
"--db-password", "pgpw",
|
||||||
|
"--empty",
|
||||||
|
])
|
||||||
|
|
||||||
|
@classmethod
|
||||||
|
def tearDownClass(cls) -> None:
|
||||||
|
cleanup_docker(containers=cls.containers, volumes=cls.volumes)
|
||||||
|
|
||||||
|
def test_files_backup_not_present(self) -> None:
|
||||||
|
p = backup_path(self.backups_dir, self.repo_name, self.version, self.pg_volume) / "files"
|
||||||
|
self.assertFalse(p.exists(), f"Did not expect files backup dir at: {p}")
|
||||||
|
|
||||||
|
def test_data_restored(self) -> None:
|
||||||
|
p = run([
|
||||||
|
"docker", "exec", self.pg_container,
|
||||||
|
"sh", "-lc",
|
||||||
|
"psql -U postgres -d appdb -t -c \"SELECT v FROM t WHERE id=1;\"",
|
||||||
|
])
|
||||||
|
self.assertEqual((p.stdout or "").strip(), "ok")
|
||||||
@@ -1,64 +1,36 @@
|
|||||||
# tests/unit/test_backup.py
|
|
||||||
|
|
||||||
import unittest
|
import unittest
|
||||||
from unittest.mock import patch
|
from unittest.mock import patch
|
||||||
import importlib.util
|
|
||||||
import sys
|
|
||||||
import os
|
|
||||||
import pathlib
|
|
||||||
|
|
||||||
# Prevent actual directory creation in backup script import
|
from baudolo.backup.app import requires_stop
|
||||||
dummy_mkdir = lambda self, *args, **kwargs: None
|
|
||||||
original_mkdir = pathlib.Path.mkdir
|
|
||||||
pathlib.Path.mkdir = dummy_mkdir
|
|
||||||
|
|
||||||
# Create a virtual databases.csv in the project root for the module import
|
|
||||||
test_dir = os.path.dirname(__file__)
|
|
||||||
project_root = os.path.abspath(os.path.join(test_dir, '../../'))
|
|
||||||
sys.path.insert(0, project_root)
|
|
||||||
db_csv_path = os.path.join(project_root, 'databases.csv')
|
|
||||||
with open(db_csv_path, 'w') as f:
|
|
||||||
f.write('instance;database;username;password\n')
|
|
||||||
|
|
||||||
# Dynamically load the hyphenated script as module 'backup'
|
class TestRequiresStop(unittest.TestCase):
|
||||||
script_path = os.path.join(project_root, 'backup-docker-to-local.py')
|
@patch("baudolo.backup.app.get_image_info")
|
||||||
spec = importlib.util.spec_from_file_location('backup', script_path)
|
def test_requires_stop_false_when_all_images_are_whitelisted(self, mock_get_image_info):
|
||||||
backup = importlib.util.module_from_spec(spec)
|
# All containers use images containing allowed substrings
|
||||||
sys.modules['backup'] = backup
|
mock_get_image_info.side_effect = [
|
||||||
spec.loader.exec_module(backup)
|
"repo/mastodon:v4",
|
||||||
|
"repo/wordpress:latest",
|
||||||
|
]
|
||||||
|
containers = ["c1", "c2"]
|
||||||
|
whitelist = ["mastodon", "wordpress"]
|
||||||
|
self.assertFalse(requires_stop(containers, whitelist))
|
||||||
|
|
||||||
# Restore original mkdir
|
@patch("baudolo.backup.app.get_image_info")
|
||||||
pathlib.Path.mkdir = original_mkdir
|
def test_requires_stop_true_when_any_image_is_not_whitelisted(self, mock_get_image_info):
|
||||||
|
mock_get_image_info.side_effect = [
|
||||||
|
"repo/mastodon:v4",
|
||||||
|
"repo/nginx:latest",
|
||||||
|
]
|
||||||
|
containers = ["c1", "c2"]
|
||||||
|
whitelist = ["mastodon", "wordpress"]
|
||||||
|
self.assertTrue(requires_stop(containers, whitelist))
|
||||||
|
|
||||||
class TestIsImageWhitelisted(unittest.TestCase):
|
@patch("baudolo.backup.app.get_image_info")
|
||||||
@patch('backup.get_image_info')
|
def test_requires_stop_true_when_whitelist_empty(self, mock_get_image_info):
|
||||||
def test_returns_true_when_image_matches(self, mock_get_image_info):
|
mock_get_image_info.return_value = "repo/anything:latest"
|
||||||
# Simulate a container image containing 'mastodon'
|
self.assertTrue(requires_stop(["c1"], []))
|
||||||
mock_get_image_info.return_value = ['repo/mastodon:v4']
|
|
||||||
images = ['mastodon', 'wordpress']
|
|
||||||
self.assertTrue(
|
|
||||||
backup.is_image_whitelisted('any_container', images),
|
|
||||||
"Should return True when at least one image substring matches"
|
|
||||||
)
|
|
||||||
|
|
||||||
@patch('backup.get_image_info')
|
|
||||||
def test_returns_false_when_no_image_matches(self, mock_get_image_info):
|
|
||||||
# Simulate a container image without matching substrings
|
|
||||||
mock_get_image_info.return_value = ['repo/nginx:latest']
|
|
||||||
images = ['mastodon', 'wordpress']
|
|
||||||
self.assertFalse(
|
|
||||||
backup.is_image_whitelisted('any_container', images),
|
|
||||||
"Should return False when no image substring matches"
|
|
||||||
)
|
|
||||||
|
|
||||||
@patch('backup.get_image_info')
|
if __name__ == "__main__":
|
||||||
def test_returns_false_with_empty_image_list(self, mock_get_image_info):
|
|
||||||
# Even if get_image_info returns something, an empty list yields False
|
|
||||||
mock_get_image_info.return_value = ['repo/element:1.0']
|
|
||||||
self.assertFalse(
|
|
||||||
backup.is_image_whitelisted('any_container', []),
|
|
||||||
"Should return False when the images list is empty"
|
|
||||||
)
|
|
||||||
|
|
||||||
if __name__ == '__main__':
|
|
||||||
unittest.main()
|
unittest.main()
|
||||||
|
|||||||
Reference in New Issue
Block a user