|
| 1 | +name: Manual HP Masternode Backup |
| 2 | + |
| 3 | +on: |
| 4 | + workflow_dispatch: |
| 5 | + inputs: |
| 6 | + network: |
| 7 | + description: "Network to back up" |
| 8 | + required: true |
| 9 | + type: string |
| 10 | + default: testnet |
| 11 | + backup_label: |
| 12 | + description: "Short label stamped into the S3 object path" |
| 13 | + required: true |
| 14 | + type: string |
| 15 | + host_limit: |
| 16 | + description: "Ansible limit expression (start with a single hp-masternode-N for validation)" |
| 17 | + required: true |
| 18 | + type: string |
| 19 | + default: hp-masternode-1 |
| 20 | + batch_size: |
| 21 | + description: "How many HPMNs may run backup concurrently" |
| 22 | + required: true |
| 23 | + type: string |
| 24 | + default: "5" |
| 25 | + install_backup_tooling: |
| 26 | + description: "Install/update backup script prerequisites before running the backup" |
| 27 | + required: true |
| 28 | + type: boolean |
| 29 | + default: false |
| 30 | + |
| 31 | +jobs: |
| 32 | + backup: |
| 33 | + name: Run HP masternode backup |
| 34 | + runs-on: ubuntu-22.04 |
| 35 | + timeout-minutes: 90 |
| 36 | + env: |
| 37 | + NETWORK_NAME: ${{ inputs.network }} |
| 38 | + HOST_LIMIT: ${{ inputs.host_limit }} |
| 39 | + HPMN_BACKUP_TRIGGER_LABEL: ${{ inputs.backup_label }} |
| 40 | + HPMN_BACKUP_S3_BUCKET: ${{ vars.HPMN_BACKUP_S3_BUCKET }} |
| 41 | + HPMN_BACKUP_S3_PREFIX: ${{ vars.HPMN_BACKUP_S3_PREFIX }} |
| 42 | + HPMN_BACKUP_S3_SSE_MODE: ${{ vars.HPMN_BACKUP_S3_SSE_MODE }} |
| 43 | + AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }} |
| 44 | + AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }} |
| 45 | + AWS_SESSION_TOKEN: ${{ secrets.AWS_SESSION_TOKEN }} |
| 46 | + AWS_REGION: ${{ secrets.AWS_REGION }} |
| 47 | + ANSIBLE_HOST_KEY_CHECKING: "false" |
| 48 | + ANSIBLE_CONFIG: ansible/ansible.cfg |
| 49 | + |
| 50 | + steps: |
| 51 | + - name: Checkout dash-network-deploy |
| 52 | + uses: actions/checkout@v4 |
| 53 | + |
| 54 | + - name: Install controller dependencies |
| 55 | + run: | |
| 56 | + sudo apt-get update |
| 57 | + sudo apt-get install -y python3-pip python3-netaddr |
| 58 | + python3 -m pip install --upgrade pip |
| 59 | + python3 -m pip install ansible-core==2.16.3 jmespath |
| 60 | +
|
| 61 | + - name: Install Ansible roles and collections |
| 62 | + run: | |
| 63 | + ansible-galaxy install -r ansible/requirements.yml |
| 64 | + mkdir -p ~/.ansible/roles |
| 65 | + cp -r ansible/roles/* ~/.ansible/roles/ |
| 66 | +
|
| 67 | + - name: Set up SSH keys |
| 68 | + env: |
| 69 | + DEPLOY_SERVER_KEY: ${{ secrets.DEPLOY_SERVER_KEY }} |
| 70 | + EVO_APP_DEPLOY_KEY: ${{ secrets.EVO_APP_DEPLOY_KEY }} |
| 71 | + run: | |
| 72 | + mkdir -p ~/.ssh |
| 73 | +
|
| 74 | + printf '%s\n' "$DEPLOY_SERVER_KEY" > ~/.ssh/id_rsa |
| 75 | + chmod 600 ~/.ssh/id_rsa |
| 76 | + ssh-keygen -y -f ~/.ssh/id_rsa > ~/.ssh/id_rsa.pub |
| 77 | + chmod 644 ~/.ssh/id_rsa.pub |
| 78 | +
|
| 79 | + printf '%s\n' "$EVO_APP_DEPLOY_KEY" > ~/.ssh/id_ed25519 |
| 80 | + chmod 600 ~/.ssh/id_ed25519 |
| 81 | +
|
| 82 | + cat > ~/.ssh/config << 'EOL' |
| 83 | + Host github.com |
| 84 | + IdentityFile ~/.ssh/id_ed25519 |
| 85 | + StrictHostKeyChecking no |
| 86 | +
|
| 87 | + Host * |
| 88 | + IdentityFile ~/.ssh/id_rsa |
| 89 | + User ubuntu |
| 90 | + StrictHostKeyChecking no |
| 91 | + UserKnownHostsFile=/dev/null |
| 92 | + EOL |
| 93 | +
|
| 94 | + chmod 600 ~/.ssh/config |
| 95 | +
|
| 96 | + - name: Clone network configs |
| 97 | + run: | |
| 98 | + rm -rf networks |
| 99 | + git clone git@github.com:dashpay/dash-network-configs.git networks |
| 100 | +
|
| 101 | + - name: Validate network files and backup config |
| 102 | + run: | |
| 103 | + test -f "networks/${NETWORK_NAME}.inventory" |
| 104 | + test -f "networks/${NETWORK_NAME}.yml" |
| 105 | + test -n "$HPMN_BACKUP_S3_BUCKET" |
| 106 | + test -n "$AWS_ACCESS_KEY_ID" |
| 107 | + test -n "$AWS_SECRET_ACCESS_KEY" |
| 108 | + test -n "$AWS_REGION" |
| 109 | + case "${HPMN_BACKUP_S3_SSE_MODE:-AES256}" in |
| 110 | + AES256) |
| 111 | + ;; |
| 112 | + aws:kms) |
| 113 | + test -n "${{ secrets.HPMN_BACKUP_S3_KMS_KEY_ID }}" |
| 114 | + ;; |
| 115 | + *) |
| 116 | + echo "Unsupported HPMN_BACKUP_S3_SSE_MODE: ${HPMN_BACKUP_S3_SSE_MODE}" >&2 |
| 117 | + exit 1 |
| 118 | + ;; |
| 119 | + esac |
| 120 | +
|
| 121 | + - name: Install backup tooling on target HP masternodes |
| 122 | + if: ${{ inputs.install_backup_tooling }} |
| 123 | + run: | |
| 124 | + ansible-playbook \ |
| 125 | + -i "networks/${NETWORK_NAME}.inventory" \ |
| 126 | + ansible/hpmn_backup_install.yml \ |
| 127 | + -e "@networks/${NETWORK_NAME}.yml" \ |
| 128 | + -e "dash_network_name=${NETWORK_NAME}" \ |
| 129 | + -e "hpmn_backup_install_serial=${{ inputs.batch_size }}" \ |
| 130 | + --limit "${HOST_LIMIT}" |
| 131 | +
|
| 132 | + - name: Trigger HP masternode backup |
| 133 | + run: | |
| 134 | + if [[ "${HPMN_BACKUP_S3_SSE_MODE:-AES256}" == "aws:kms" ]]; then |
| 135 | + export HPMN_BACKUP_S3_KMS_KEY_ID="${{ secrets.HPMN_BACKUP_S3_KMS_KEY_ID }}" |
| 136 | + fi |
| 137 | +
|
| 138 | + ansible-playbook \ |
| 139 | + -i "networks/${NETWORK_NAME}.inventory" \ |
| 140 | + ansible/hpmn_backup_run.yml \ |
| 141 | + -e "@networks/${NETWORK_NAME}.yml" \ |
| 142 | + -e "dash_network_name=${NETWORK_NAME}" \ |
| 143 | + -e "hpmn_backup_serial=${{ inputs.batch_size }}" \ |
| 144 | + -e "hpmn_backup_trigger_label=${HPMN_BACKUP_TRIGGER_LABEL}" \ |
| 145 | + --limit "${HOST_LIMIT}" |
0 commit comments