mirror of
https://github.com/Start9Labs/start-os.git
synced 2026-03-26 18:31:52 +00:00
* disable concurrency and delete tmpdir before retry * undo retry * really limit usage of pgloader * configurable * no migrate notifications
178 lines
5.8 KiB
Rust
178 lines
5.8 KiB
Rust
use std::net::{IpAddr, SocketAddr};
|
|
use std::ops::Deref;
|
|
use std::path::{Path, PathBuf};
|
|
use std::sync::Arc;
|
|
|
|
use josekit::jwk::Jwk;
|
|
use patch_db::json_ptr::JsonPointer;
|
|
use patch_db::PatchDb;
|
|
use rpc_toolkit::yajrc::RpcError;
|
|
use rpc_toolkit::Context;
|
|
use serde::{Deserialize, Serialize};
|
|
use sqlx::postgres::PgConnectOptions;
|
|
use sqlx::PgPool;
|
|
use tokio::fs::File;
|
|
use tokio::sync::broadcast::Sender;
|
|
use tokio::sync::RwLock;
|
|
use tracing::instrument;
|
|
use url::Host;
|
|
|
|
use crate::db::model::Database;
|
|
use crate::init::{init_postgres, pgloader};
|
|
use crate::net::tor::os_key;
|
|
use crate::setup::{password_hash, RecoveryStatus};
|
|
use crate::util::io::from_yaml_async_reader;
|
|
use crate::util::AsyncFileExt;
|
|
use crate::{Error, ResultExt};
|
|
|
|
#[derive(Clone, Serialize, Deserialize)]
|
|
#[serde(rename_all = "kebab-case")]
|
|
pub struct SetupResult {
|
|
pub tor_address: String,
|
|
pub lan_address: String,
|
|
pub root_ca: String,
|
|
}
|
|
|
|
#[derive(Debug, Default, Deserialize)]
|
|
#[serde(rename_all = "kebab-case")]
|
|
pub struct SetupContextConfig {
|
|
pub migration_batch_rows: Option<usize>,
|
|
pub migration_prefetch_rows: Option<usize>,
|
|
pub bind_rpc: Option<SocketAddr>,
|
|
pub datadir: Option<PathBuf>,
|
|
}
|
|
impl SetupContextConfig {
|
|
#[instrument(skip(path))]
|
|
pub async fn load<P: AsRef<Path>>(path: Option<P>) -> Result<Self, Error> {
|
|
let cfg_path = path
|
|
.as_ref()
|
|
.map(|p| p.as_ref())
|
|
.unwrap_or(Path::new(crate::util::config::CONFIG_PATH));
|
|
if let Some(f) = File::maybe_open(cfg_path)
|
|
.await
|
|
.with_ctx(|_| (crate::ErrorKind::Filesystem, cfg_path.display().to_string()))?
|
|
{
|
|
from_yaml_async_reader(f).await
|
|
} else {
|
|
Ok(Self::default())
|
|
}
|
|
}
|
|
pub fn datadir(&self) -> &Path {
|
|
self.datadir
|
|
.as_deref()
|
|
.unwrap_or_else(|| Path::new("/embassy-data"))
|
|
}
|
|
}
|
|
|
|
pub struct SetupContextSeed {
|
|
pub config_path: Option<PathBuf>,
|
|
pub migration_batch_rows: usize,
|
|
pub migration_prefetch_rows: usize,
|
|
pub bind_rpc: SocketAddr,
|
|
pub shutdown: Sender<()>,
|
|
pub datadir: PathBuf,
|
|
/// Used to encrypt for hidding from snoopers for setups create password
|
|
/// Set via path
|
|
pub current_secret: Arc<Jwk>,
|
|
pub selected_v2_drive: RwLock<Option<PathBuf>>,
|
|
pub cached_product_key: RwLock<Option<Arc<String>>>,
|
|
pub recovery_status: RwLock<Option<Result<RecoveryStatus, RpcError>>>,
|
|
pub setup_result: RwLock<Option<(Arc<String>, SetupResult)>>,
|
|
}
|
|
|
|
impl AsRef<Jwk> for SetupContextSeed {
|
|
fn as_ref(&self) -> &Jwk {
|
|
&self.current_secret
|
|
}
|
|
}
|
|
|
|
#[derive(Clone)]
|
|
pub struct SetupContext(Arc<SetupContextSeed>);
|
|
impl SetupContext {
|
|
#[instrument(skip(path))]
|
|
pub async fn init<P: AsRef<Path>>(path: Option<P>) -> Result<Self, Error> {
|
|
let cfg = SetupContextConfig::load(path.as_ref()).await?;
|
|
let (shutdown, _) = tokio::sync::broadcast::channel(1);
|
|
let datadir = cfg.datadir().to_owned();
|
|
Ok(Self(Arc::new(SetupContextSeed {
|
|
config_path: path.as_ref().map(|p| p.as_ref().to_owned()),
|
|
migration_batch_rows: cfg.migration_batch_rows.unwrap_or(25000),
|
|
migration_prefetch_rows: cfg.migration_prefetch_rows.unwrap_or(100_000),
|
|
bind_rpc: cfg.bind_rpc.unwrap_or(([127, 0, 0, 1], 5959).into()),
|
|
shutdown,
|
|
datadir,
|
|
current_secret: Arc::new(
|
|
Jwk::generate_ec_key(josekit::jwk::alg::ec::EcCurve::P256).map_err(|e| {
|
|
tracing::debug!("{:?}", e);
|
|
tracing::error!("Couldn't generate ec key");
|
|
Error::new(
|
|
color_eyre::eyre::eyre!("Couldn't generate ec key"),
|
|
crate::ErrorKind::Unknown,
|
|
)
|
|
})?,
|
|
),
|
|
selected_v2_drive: RwLock::new(None),
|
|
cached_product_key: RwLock::new(None),
|
|
recovery_status: RwLock::new(None),
|
|
setup_result: RwLock::new(None),
|
|
})))
|
|
}
|
|
#[instrument(skip(self))]
|
|
pub async fn db(&self, secret_store: &PgPool) -> Result<PatchDb, Error> {
|
|
let db_path = self.datadir.join("main").join("embassy.db");
|
|
let db = PatchDb::open(&db_path)
|
|
.await
|
|
.with_ctx(|_| (crate::ErrorKind::Filesystem, db_path.display().to_string()))?;
|
|
if !db.exists(&<JsonPointer>::default()).await {
|
|
db.put(
|
|
&<JsonPointer>::default(),
|
|
&Database::init(
|
|
&os_key(&mut secret_store.acquire().await?).await?,
|
|
password_hash(&mut secret_store.acquire().await?).await?,
|
|
),
|
|
)
|
|
.await?;
|
|
}
|
|
Ok(db)
|
|
}
|
|
#[instrument(skip(self))]
|
|
pub async fn secret_store(&self) -> Result<PgPool, Error> {
|
|
init_postgres(&self.datadir).await?;
|
|
let secret_store =
|
|
PgPool::connect_with(PgConnectOptions::new().database("secrets").username("root"))
|
|
.await?;
|
|
sqlx::migrate!()
|
|
.run(&secret_store)
|
|
.await
|
|
.with_kind(crate::ErrorKind::Database)?;
|
|
let old_db_path = self.datadir.join("main/secrets.db");
|
|
if tokio::fs::metadata(&old_db_path).await.is_ok() {
|
|
pgloader(
|
|
&old_db_path,
|
|
self.migration_batch_rows,
|
|
self.migration_prefetch_rows,
|
|
)
|
|
.await?;
|
|
}
|
|
Ok(secret_store)
|
|
}
|
|
}
|
|
|
|
impl Context for SetupContext {
|
|
fn host(&self) -> Host<&str> {
|
|
match self.0.bind_rpc.ip() {
|
|
IpAddr::V4(a) => Host::Ipv4(a),
|
|
IpAddr::V6(a) => Host::Ipv6(a),
|
|
}
|
|
}
|
|
fn port(&self) -> u16 {
|
|
self.0.bind_rpc.port()
|
|
}
|
|
}
|
|
impl Deref for SetupContext {
|
|
type Target = SetupContextSeed;
|
|
fn deref(&self) -> &Self::Target {
|
|
&*self.0
|
|
}
|
|
}
|