mirror of
https://github.com/Start9Labs/start-os.git
synced 2026-03-26 10:21:52 +00:00
* don't export api params * import from SDK instead of BE --------- Co-authored-by: Aiden McClelland <me@drbonez.dev>
335 lines
10 KiB
Rust
335 lines
10 KiB
Rust
use std::path::PathBuf;
|
|
use std::sync::atomic::{AtomicBool, Ordering};
|
|
|
|
use clap::Parser;
|
|
use color_eyre::eyre::{eyre, Result};
|
|
use emver::Version;
|
|
use helpers::{Rsync, RsyncOptions};
|
|
use lazy_static::lazy_static;
|
|
use reqwest::Url;
|
|
use rpc_toolkit::command;
|
|
use serde::{Deserialize, Serialize};
|
|
use tokio::process::Command;
|
|
use tokio_stream::StreamExt;
|
|
use tracing::instrument;
|
|
use ts_rs::TS;
|
|
|
|
use crate::context::RpcContext;
|
|
use crate::db::model::public::UpdateProgress;
|
|
use crate::disk::mount::filesystem::bind::Bind;
|
|
use crate::disk::mount::filesystem::ReadWrite;
|
|
use crate::disk::mount::guard::MountGuard;
|
|
use crate::notifications::{notify, NotificationLevel};
|
|
use crate::prelude::*;
|
|
use crate::registry::marketplace::with_query_params;
|
|
use crate::sound::{
|
|
CIRCLE_OF_5THS_SHORT, UPDATE_FAILED_1, UPDATE_FAILED_2, UPDATE_FAILED_3, UPDATE_FAILED_4,
|
|
};
|
|
use crate::update::latest_information::LatestInformation;
|
|
use crate::util::Invoke;
|
|
use crate::{Error, ErrorKind, ResultExt, PLATFORM};
|
|
|
|
mod latest_information;
|
|
|
|
lazy_static! {
|
|
static ref UPDATED: AtomicBool = AtomicBool::new(false);
|
|
}
|
|
|
|
#[derive(Deserialize, Serialize, Parser, TS)]
|
|
#[serde(rename_all = "camelCase")]
|
|
#[command(rename_all = "kebab-case")]
|
|
pub struct UpdateSystemParams {
|
|
#[ts(type = "string")]
|
|
marketplace_url: Url,
|
|
}
|
|
|
|
/// An user/ daemon would call this to update the system to the latest version and do the updates available,
|
|
/// and this will return something if there is an update, and in that case there will need to be a restart.
|
|
#[instrument(skip_all)]
|
|
pub async fn update_system(
|
|
ctx: RpcContext,
|
|
UpdateSystemParams { marketplace_url }: UpdateSystemParams,
|
|
) -> Result<UpdateResult, Error> {
|
|
if UPDATED.load(Ordering::SeqCst) {
|
|
return Ok(UpdateResult::NoUpdates);
|
|
}
|
|
Ok(if maybe_do_update(ctx, marketplace_url).await?.is_some() {
|
|
UpdateResult::Updating
|
|
} else {
|
|
UpdateResult::NoUpdates
|
|
})
|
|
}
|
|
|
|
/// What is the status of the updates?
|
|
#[derive(serde::Serialize, serde::Deserialize, Clone, Debug)]
|
|
#[serde(rename_all = "camelCase")]
|
|
pub enum UpdateResult {
|
|
NoUpdates,
|
|
Updating,
|
|
}
|
|
|
|
pub fn display_update_result(_: UpdateSystemParams, status: UpdateResult) {
|
|
match status {
|
|
UpdateResult::Updating => {
|
|
println!("Updating...");
|
|
}
|
|
UpdateResult::NoUpdates => {
|
|
println!("No updates available");
|
|
}
|
|
}
|
|
}
|
|
|
|
#[instrument(skip_all)]
|
|
async fn maybe_do_update(ctx: RpcContext, marketplace_url: Url) -> Result<Option<()>, Error> {
|
|
let peeked = ctx.db.peek().await;
|
|
let latest_version: Version = ctx
|
|
.client
|
|
.get(with_query_params(
|
|
ctx.clone(),
|
|
format!("{}/eos/v0/latest", marketplace_url,).parse()?,
|
|
))
|
|
.send()
|
|
.await
|
|
.with_kind(ErrorKind::Network)?
|
|
.json::<LatestInformation>()
|
|
.await
|
|
.with_kind(ErrorKind::Network)?
|
|
.version;
|
|
let current_version = peeked.as_public().as_server_info().as_version().de()?;
|
|
if latest_version < *current_version {
|
|
return Ok(None);
|
|
}
|
|
|
|
let eos_url = EosUrl {
|
|
base: marketplace_url,
|
|
version: latest_version,
|
|
};
|
|
let status = ctx
|
|
.db
|
|
.mutate(|db| {
|
|
let mut status = peeked.as_public().as_server_info().as_status_info().de()?;
|
|
if status.update_progress.is_some() {
|
|
return Err(Error::new(
|
|
eyre!("Server is already updating!"),
|
|
crate::ErrorKind::InvalidRequest,
|
|
));
|
|
}
|
|
|
|
status.update_progress = Some(UpdateProgress {
|
|
size: None,
|
|
downloaded: 0,
|
|
});
|
|
db.as_public_mut()
|
|
.as_server_info_mut()
|
|
.as_status_info_mut()
|
|
.ser(&status)?;
|
|
Ok(status)
|
|
})
|
|
.await?;
|
|
|
|
if status.updated {
|
|
return Ok(None);
|
|
}
|
|
|
|
tokio::spawn(async move {
|
|
let res = do_update(ctx.clone(), eos_url).await;
|
|
match res {
|
|
Ok(()) => {
|
|
ctx.db
|
|
.mutate(|db| {
|
|
let status_info =
|
|
db.as_public_mut().as_server_info_mut().as_status_info_mut();
|
|
status_info.as_update_progress_mut().ser(&None)?;
|
|
status_info.as_updated_mut().ser(&true)
|
|
})
|
|
.await?;
|
|
CIRCLE_OF_5THS_SHORT
|
|
.play()
|
|
.await
|
|
.expect("could not play sound");
|
|
}
|
|
Err(e) => {
|
|
let err_string = format!("Update was not successful because of {}", e);
|
|
ctx.db
|
|
.mutate(|db| {
|
|
db.as_public_mut()
|
|
.as_server_info_mut()
|
|
.as_status_info_mut()
|
|
.as_update_progress_mut()
|
|
.ser(&None)?;
|
|
notify(
|
|
db,
|
|
None,
|
|
NotificationLevel::Error,
|
|
"StartOS Update Failed".to_owned(),
|
|
err_string,
|
|
(),
|
|
)
|
|
})
|
|
.await
|
|
.unwrap();
|
|
// TODO: refactor sound lib to make compound tempos easier to deal with
|
|
UPDATE_FAILED_1
|
|
.play()
|
|
.await
|
|
.expect("could not play song: update failed 1");
|
|
UPDATE_FAILED_2
|
|
.play()
|
|
.await
|
|
.expect("could not play song: update failed 2");
|
|
UPDATE_FAILED_3
|
|
.play()
|
|
.await
|
|
.expect("could not play song: update failed 3");
|
|
UPDATE_FAILED_4
|
|
.play()
|
|
.await
|
|
.expect("could not play song: update failed 4");
|
|
}
|
|
}
|
|
Ok::<(), Error>(())
|
|
});
|
|
Ok(Some(()))
|
|
}
|
|
|
|
#[instrument(skip_all)]
|
|
async fn do_update(ctx: RpcContext, eos_url: EosUrl) -> Result<(), Error> {
|
|
let mut rsync = Rsync::new(
|
|
eos_url.rsync_path()?,
|
|
"/media/embassy/next/",
|
|
Default::default(),
|
|
)
|
|
.await?;
|
|
while let Some(progress) = rsync.progress.next().await {
|
|
ctx.db
|
|
.mutate(|db| {
|
|
db.as_public_mut()
|
|
.as_server_info_mut()
|
|
.as_status_info_mut()
|
|
.as_update_progress_mut()
|
|
.ser(&Some(UpdateProgress {
|
|
size: Some(100),
|
|
downloaded: (100.0 * progress) as u64,
|
|
}))
|
|
})
|
|
.await?;
|
|
}
|
|
rsync.wait().await?;
|
|
|
|
copy_fstab().await?;
|
|
copy_machine_id().await?;
|
|
copy_ssh_host_keys().await?;
|
|
sync_boot().await?;
|
|
swap_boot_label().await?;
|
|
|
|
Ok(())
|
|
}
|
|
|
|
#[derive(Debug)]
|
|
struct EosUrl {
|
|
base: Url,
|
|
version: Version,
|
|
}
|
|
|
|
impl EosUrl {
|
|
#[instrument()]
|
|
pub fn rsync_path(&self) -> Result<PathBuf, Error> {
|
|
let host = self
|
|
.base
|
|
.host_str()
|
|
.ok_or_else(|| Error::new(eyre!("Could not get host of base"), ErrorKind::ParseUrl))?;
|
|
let version: &Version = &self.version;
|
|
Ok(format!("{host}::{version}/{}/", &*PLATFORM)
|
|
.parse()
|
|
.map_err(|_| Error::new(eyre!("Could not parse path"), ErrorKind::ParseUrl))?)
|
|
}
|
|
}
|
|
|
|
async fn copy_fstab() -> Result<(), Error> {
|
|
tokio::fs::copy("/etc/fstab", "/media/embassy/next/etc/fstab").await?;
|
|
Ok(())
|
|
}
|
|
|
|
async fn copy_machine_id() -> Result<(), Error> {
|
|
tokio::fs::copy("/etc/machine-id", "/media/embassy/next/etc/machine-id").await?;
|
|
Ok(())
|
|
}
|
|
|
|
async fn copy_ssh_host_keys() -> Result<(), Error> {
|
|
tokio::fs::copy(
|
|
"/etc/ssh/ssh_host_rsa_key",
|
|
"/media/embassy/next/etc/ssh/ssh_host_rsa_key",
|
|
)
|
|
.await?;
|
|
tokio::fs::copy(
|
|
"/etc/ssh/ssh_host_rsa_key.pub",
|
|
"/media/embassy/next/etc/ssh/ssh_host_rsa_key.pub",
|
|
)
|
|
.await?;
|
|
tokio::fs::copy(
|
|
"/etc/ssh/ssh_host_ecdsa_key",
|
|
"/media/embassy/next/etc/ssh/ssh_host_ecdsa_key",
|
|
)
|
|
.await?;
|
|
tokio::fs::copy(
|
|
"/etc/ssh/ssh_host_ecdsa_key.pub",
|
|
"/media/embassy/next/etc/ssh/ssh_host_ecdsa_key.pub",
|
|
)
|
|
.await?;
|
|
tokio::fs::copy(
|
|
"/etc/ssh/ssh_host_ed25519_key",
|
|
"/media/embassy/next/etc/ssh/ssh_host_ed25519_key",
|
|
)
|
|
.await?;
|
|
tokio::fs::copy(
|
|
"/etc/ssh/ssh_host_ed25519_key.pub",
|
|
"/media/embassy/next/etc/ssh/ssh_host_ed25519_key.pub",
|
|
)
|
|
.await?;
|
|
Ok(())
|
|
}
|
|
|
|
async fn sync_boot() -> Result<(), Error> {
|
|
Rsync::new(
|
|
"/media/embassy/next/boot/",
|
|
"/boot/",
|
|
RsyncOptions {
|
|
delete: false,
|
|
force: false,
|
|
ignore_existing: false,
|
|
exclude: Vec::new(),
|
|
no_permissions: false,
|
|
no_owner: false,
|
|
},
|
|
)
|
|
.await?
|
|
.wait()
|
|
.await?;
|
|
if &*PLATFORM != "raspberrypi" {
|
|
let dev_mnt =
|
|
MountGuard::mount(&Bind::new("/dev"), "/media/embassy/next/dev", ReadWrite).await?;
|
|
let sys_mnt =
|
|
MountGuard::mount(&Bind::new("/sys"), "/media/embassy/next/sys", ReadWrite).await?;
|
|
let proc_mnt =
|
|
MountGuard::mount(&Bind::new("/proc"), "/media/embassy/next/proc", ReadWrite).await?;
|
|
let boot_mnt =
|
|
MountGuard::mount(&Bind::new("/boot"), "/media/embassy/next/boot", ReadWrite).await?;
|
|
Command::new("chroot")
|
|
.arg("/media/embassy/next")
|
|
.arg("update-grub2")
|
|
.invoke(ErrorKind::MigrationFailed)
|
|
.await?;
|
|
boot_mnt.unmount(false).await?;
|
|
proc_mnt.unmount(false).await?;
|
|
sys_mnt.unmount(false).await?;
|
|
dev_mnt.unmount(false).await?;
|
|
}
|
|
Ok(())
|
|
}
|
|
|
|
#[instrument(skip_all)]
|
|
async fn swap_boot_label() -> Result<(), Error> {
|
|
tokio::fs::write("/media/embassy/config/upgrade", b"").await?;
|
|
Ok(())
|
|
}
|