mirror of
https://github.com/Start9Labs/start-os.git
synced 2026-03-30 12:11:56 +00:00
* wip * restructure backend for new ui structure * new patchdb bootstrap, single websocket api, local storage migration, more * update db websocket * init apis * update patch-db * setup progress * feat: implement state service, alert and routing Signed-off-by: waterplea <alexander@inkin.ru> * update setup wizard for new types * feat: add init page Signed-off-by: waterplea <alexander@inkin.ru> * chore: refactor message, patch-db source stream and connection service Signed-off-by: waterplea <alexander@inkin.ru> * fix method not found on state * fix backend bugs * fix compat assets * address comments * remove unneeded styling * cleaner progress * bugfixes * fix init logs * fix progress reporting * fix navigation by getting state after init * remove patch dependency from live api * fix caching * re-add patchDB to live api * fix metrics values * send close frame * add bootId and fix polling --------- Signed-off-by: waterplea <alexander@inkin.ru> Co-authored-by: Aiden McClelland <me@drbonez.dev> Co-authored-by: waterplea <alexander@inkin.ru>
153 lines
5.0 KiB
Rust
153 lines
5.0 KiB
Rust
use std::collections::BTreeSet;
|
|
use std::path::Path;
|
|
|
|
use async_compression::tokio::bufread::GzipDecoder;
|
|
use serde::{Deserialize, Serialize};
|
|
use tokio::fs::File;
|
|
use tokio::io::BufReader;
|
|
use tokio::process::Command;
|
|
|
|
use crate::disk::fsck::RequiresReboot;
|
|
use crate::prelude::*;
|
|
use crate::progress::PhaseProgressTrackerHandle;
|
|
use crate::util::Invoke;
|
|
use crate::PLATFORM;
|
|
|
|
/// Part of the Firmware, look there for more about
|
|
#[derive(Clone, Deserialize, Serialize)]
|
|
#[serde(rename_all = "camelCase")]
|
|
pub struct VersionMatcher {
|
|
/// Strip this prefix on the version matcher
|
|
semver_prefix: Option<String>,
|
|
/// Match the semver to this range
|
|
semver_range: Option<semver::VersionReq>,
|
|
/// Strip this suffix on the version matcher
|
|
semver_suffix: Option<String>,
|
|
}
|
|
|
|
/// Inside a file that is firmware.json, we
|
|
/// wanted a structure that could help decide what to do
|
|
/// for each of the firmware versions
|
|
#[derive(Clone, Deserialize, Serialize)]
|
|
#[serde(rename_all = "camelCase")]
|
|
pub struct Firmware {
|
|
id: String,
|
|
/// This is the platform(s) the firmware was built for
|
|
platform: BTreeSet<String>,
|
|
/// This usally comes from the dmidecode
|
|
system_product_name: Option<String>,
|
|
/// The version comes from dmidecode, then we decide if it matches
|
|
bios_version: Option<VersionMatcher>,
|
|
/// the hash of the firmware rom.gz
|
|
shasum: String,
|
|
}
|
|
|
|
pub fn display_firmware_update_result(result: RequiresReboot) {
|
|
if result.0 {
|
|
println!("Firmware successfully updated! Reboot to apply changes.");
|
|
} else {
|
|
println!("No firmware update available.");
|
|
}
|
|
}
|
|
|
|
pub async fn check_for_firmware_update() -> Result<Option<Firmware>, Error> {
|
|
let system_product_name = String::from_utf8(
|
|
Command::new("dmidecode")
|
|
.arg("-s")
|
|
.arg("system-product-name")
|
|
.invoke(ErrorKind::Firmware)
|
|
.await?,
|
|
)?
|
|
.trim()
|
|
.to_owned();
|
|
let bios_version = String::from_utf8(
|
|
Command::new("dmidecode")
|
|
.arg("-s")
|
|
.arg("bios-version")
|
|
.invoke(ErrorKind::Firmware)
|
|
.await?,
|
|
)?
|
|
.trim()
|
|
.to_owned();
|
|
if system_product_name.is_empty() || bios_version.is_empty() {
|
|
return Ok(None);
|
|
}
|
|
|
|
for firmware in serde_json::from_str::<Vec<Firmware>>(
|
|
&tokio::fs::read_to_string("/usr/lib/startos/firmware.json").await?,
|
|
)
|
|
.with_kind(ErrorKind::Deserialization)?
|
|
{
|
|
let matches_product_name = firmware
|
|
.system_product_name
|
|
.as_ref()
|
|
.map_or(true, |spn| spn == &system_product_name);
|
|
let matches_bios_version = firmware
|
|
.bios_version
|
|
.as_ref()
|
|
.map_or(Some(true), |bv| {
|
|
let mut semver_str = bios_version.as_str();
|
|
if let Some(prefix) = &bv.semver_prefix {
|
|
semver_str = semver_str.strip_prefix(prefix)?;
|
|
}
|
|
if let Some(suffix) = &bv.semver_suffix {
|
|
semver_str = semver_str.strip_suffix(suffix)?;
|
|
}
|
|
let semver = semver_str
|
|
.split(".")
|
|
.filter_map(|v| v.parse().ok())
|
|
.chain(std::iter::repeat(0))
|
|
.take(3)
|
|
.collect::<Vec<_>>();
|
|
let semver = semver::Version::new(semver[0], semver[1], semver[2]);
|
|
Some(
|
|
bv.semver_range
|
|
.as_ref()
|
|
.map_or(true, |r| r.matches(&semver)),
|
|
)
|
|
})
|
|
.unwrap_or(false);
|
|
if firmware.platform.contains(&*PLATFORM) && matches_product_name && matches_bios_version {
|
|
return Ok(Some(firmware));
|
|
}
|
|
}
|
|
|
|
Ok(None)
|
|
}
|
|
|
|
/// We wanted to make sure during every init
|
|
/// that the firmware was the correct and updated for
|
|
/// systems like the Pure System that a new firmware
|
|
/// was released and the updates where pushed through the pure os.
|
|
pub async fn update_firmware(firmware: Firmware) -> Result<(), Error> {
|
|
let id = &firmware.id;
|
|
let firmware_dir = Path::new("/usr/lib/startos/firmware");
|
|
let filename = format!("{id}.rom.gz");
|
|
let firmware_path = firmware_dir.join(&filename);
|
|
Command::new("sha256sum")
|
|
.arg("-c")
|
|
.input(Some(&mut std::io::Cursor::new(format!(
|
|
"{} {}",
|
|
firmware.shasum,
|
|
firmware_path.display()
|
|
))))
|
|
.invoke(ErrorKind::Filesystem)
|
|
.await?;
|
|
let mut rdr = if tokio::fs::metadata(&firmware_path).await.is_ok() {
|
|
GzipDecoder::new(BufReader::new(File::open(&firmware_path).await?))
|
|
} else {
|
|
return Err(Error::new(
|
|
eyre!("Firmware {id}.rom.gz not found in {firmware_dir:?}"),
|
|
ErrorKind::NotFound,
|
|
));
|
|
};
|
|
Command::new("flashrom")
|
|
.arg("-p")
|
|
.arg("internal")
|
|
.arg("-w-")
|
|
.input(Some(&mut rdr))
|
|
.invoke(ErrorKind::Firmware)
|
|
.await?;
|
|
Ok(())
|
|
}
|