mirror of
https://github.com/Start9Labs/start-os.git
synced 2026-03-26 18:31:52 +00:00
* add support for inbound proxies * backend changes * fix file type * proxy -> tunnel, implement backend apis * wip start-tunneld * add domains and gateways, remove routers, fix docs links * dont show hidden actions * show and test dns * edit instead of chnage acme and change gateway * refactor: domains page * refactor: gateways page * domains and acme refactor * certificate authorities * refactor public/private gateways * fix fe types * domains mostly finished * refactor: add file control to form service * add ip util to sdk * domains api + migration * start service interface page, WIP * different options for clearnet domains * refactor: styles for interfaces page * minor * better placeholder for no addresses * start sorting addresses * best address logic * comments * fix unnecessary export * MVP of service interface page * domains preferred * fix: address comments * only translations left * wip: start-tunnel & fix build * forms for adding domain, rework things based on new ideas * fix: dns testing * public domain, max width, descriptions for dns * nix StartOS domains, implement public and private domains at interface scope * restart tor instead of reset * better icon for restart tor * dns * fix sort functions for public and private domains * with todos * update types * clean up tech debt, bump dependencies * revert to ts-rs v9 * fix all types * fix dns form * add missing translations * it builds * fix: comments (#3009) * fix: comments * undo default --------- Co-authored-by: Matt Hill <mattnine@protonmail.com> * fix: refactor legacy components (#3010) * fix: comments * fix: refactor legacy components * remove default again --------- Co-authored-by: Matt Hill <mattnine@protonmail.com> * more translations * wip * fix deadlock * coukd work * simple renaming * placeholder for empty service interfaces table * honor hidden form values * remove logs * reason instead of description * fix dns * misc fixes * implement toggling gateways for service interface * fix showing dns records * move status column in service list * remove unnecessary truthy check * refactor: refactor forms components and remove legacy Taiga UI package (#3012) * handle wh file uploads * wip: debugging tor * socks5 proxy working * refactor: fix multiple comments (#3013) * refactor: fix multiple comments * styling changes, add documentation to sidebar * translations for dns page * refactor: subtle colors * rearrange service page --------- Co-authored-by: Matt Hill <mattnine@protonmail.com> * fix file_stream and remove non-terminating test * clean up logs * support for sccache * fix gha sccache * more marketplace translations * install wizard clarity * stub hostnameInfo in migration * fix address info after setup, fix styling on SI page, new 040 release notes * remove tor logs from os * misc fixes * reset tor still not functioning... * update ts * minor styling and wording * chore: some fixes (#3015) * fix gateway renames * different handling for public domains * styling fixes * whole navbar should not be clickable on service show page * timeout getState request * remove links from changelog * misc fixes from pairing * use custom name for gateway in more places * fix dns parsing * closes #3003 * closes #2999 * chore: some fixes (#3017) * small copy change * revert hardcoded error for testing * dont require port forward if gateway is public * use old wan ip when not available * fix .const hanging on undefined * fix test * fix doc test * fix renames * update deps * allow specifying dependency metadata directly * temporarily make dependencies not cliackable in marketplace listings * fix socks bind * fix test --------- Co-authored-by: Aiden McClelland <me@drbonez.dev> Co-authored-by: waterplea <alexander@inkin.ru>
188 lines
5.6 KiB
Rust
188 lines
5.6 KiB
Rust
use std::collections::BTreeMap;
|
|
use std::sync::Arc;
|
|
|
|
use clap::Parser;
|
|
use futures::{StreamExt, stream};
|
|
use models::PackageId;
|
|
use patch_db::json_ptr::ROOT;
|
|
use serde::{Deserialize, Serialize};
|
|
use tokio::sync::Mutex;
|
|
use tracing::instrument;
|
|
use ts_rs::TS;
|
|
|
|
use super::target::BackupTargetId;
|
|
use crate::PLATFORM;
|
|
use crate::backup::os::OsBackup;
|
|
use crate::context::setup::SetupResult;
|
|
use crate::context::{RpcContext, SetupContext};
|
|
use crate::db::model::Database;
|
|
use crate::disk::mount::backup::BackupMountGuard;
|
|
use crate::disk::mount::filesystem::ReadWrite;
|
|
use crate::disk::mount::guard::{GenericMountGuard, TmpMountGuard};
|
|
use crate::init::init;
|
|
use crate::prelude::*;
|
|
use crate::progress::ProgressUnits;
|
|
use crate::s9pk::S9pk;
|
|
use crate::service::service_map::DownloadInstallFuture;
|
|
use crate::setup::SetupExecuteProgress;
|
|
use crate::system::sync_kiosk;
|
|
use crate::util::serde::IoFormat;
|
|
|
|
#[derive(Deserialize, Serialize, Parser, TS)]
|
|
#[serde(rename_all = "camelCase")]
|
|
#[command(rename_all = "kebab-case")]
|
|
pub struct RestorePackageParams {
|
|
pub ids: Vec<PackageId>,
|
|
pub target_id: BackupTargetId,
|
|
pub password: String,
|
|
}
|
|
|
|
// #[command(rename = "restore", display(display_none))]
|
|
#[instrument(skip(ctx, password))]
|
|
pub async fn restore_packages_rpc(
|
|
ctx: RpcContext,
|
|
RestorePackageParams {
|
|
ids,
|
|
target_id,
|
|
password,
|
|
}: RestorePackageParams,
|
|
) -> Result<(), Error> {
|
|
let peek = ctx.db.peek().await;
|
|
let fs = target_id.load(&peek)?;
|
|
let backup_guard = BackupMountGuard::mount(
|
|
TmpMountGuard::mount(&fs, ReadWrite).await?,
|
|
&peek.as_public().as_server_info().as_id().de()?,
|
|
&password,
|
|
)
|
|
.await?;
|
|
|
|
let tasks = restore_packages(&ctx, backup_guard, ids).await?;
|
|
|
|
tokio::spawn(async move {
|
|
stream::iter(tasks)
|
|
.for_each_concurrent(5, |(id, res)| async move {
|
|
match async { res.await?.await }.await {
|
|
Ok(_) => (),
|
|
Err(err) => {
|
|
tracing::error!("Error restoring package {}: {}", id, err);
|
|
tracing::debug!("{:?}", err);
|
|
}
|
|
}
|
|
})
|
|
.await;
|
|
});
|
|
|
|
Ok(())
|
|
}
|
|
|
|
#[instrument(skip_all)]
|
|
pub async fn recover_full_embassy(
|
|
ctx: &SetupContext,
|
|
disk_guid: Arc<String>,
|
|
start_os_password: String,
|
|
recovery_source: TmpMountGuard,
|
|
server_id: &str,
|
|
recovery_password: &str,
|
|
kiosk: Option<bool>,
|
|
SetupExecuteProgress {
|
|
init_phases,
|
|
restore_phase,
|
|
rpc_ctx_phases,
|
|
}: SetupExecuteProgress,
|
|
) -> Result<(SetupResult, RpcContext), Error> {
|
|
let mut restore_phase = restore_phase.or_not_found("restore progress")?;
|
|
|
|
let backup_guard =
|
|
BackupMountGuard::mount(recovery_source, server_id, recovery_password).await?;
|
|
|
|
let os_backup_path = backup_guard.path().join("os-backup.json");
|
|
let mut os_backup: OsBackup = IoFormat::Json.from_slice(
|
|
&tokio::fs::read(&os_backup_path)
|
|
.await
|
|
.with_ctx(|_| (ErrorKind::Filesystem, os_backup_path.display().to_string()))?,
|
|
)?;
|
|
|
|
os_backup.account.password = argon2::hash_encoded(
|
|
start_os_password.as_bytes(),
|
|
&rand::random::<[u8; 16]>()[..],
|
|
&argon2::Config::rfc9106_low_mem(),
|
|
)
|
|
.with_kind(ErrorKind::PasswordHashGeneration)?;
|
|
|
|
let kiosk = Some(kiosk.unwrap_or(true)).filter(|_| &*PLATFORM != "raspberrypi");
|
|
sync_kiosk(kiosk).await?;
|
|
|
|
let db = ctx.db().await?;
|
|
db.put(&ROOT, &Database::init(&os_backup.account, kiosk)?)
|
|
.await?;
|
|
drop(db);
|
|
|
|
let init_result = init(&ctx.webserver, &ctx.config, init_phases).await?;
|
|
|
|
let rpc_ctx = RpcContext::init(
|
|
&ctx.webserver,
|
|
&ctx.config,
|
|
disk_guid.clone(),
|
|
Some(init_result),
|
|
rpc_ctx_phases,
|
|
)
|
|
.await?;
|
|
|
|
restore_phase.start();
|
|
let ids: Vec<_> = backup_guard
|
|
.metadata
|
|
.package_backups
|
|
.keys()
|
|
.cloned()
|
|
.collect();
|
|
let tasks = restore_packages(&rpc_ctx, backup_guard, ids).await?;
|
|
restore_phase.set_total(tasks.len() as u64);
|
|
restore_phase.set_units(Some(ProgressUnits::Steps));
|
|
let restore_phase = Arc::new(Mutex::new(restore_phase));
|
|
stream::iter(tasks)
|
|
.for_each_concurrent(5, |(id, res)| {
|
|
let restore_phase = restore_phase.clone();
|
|
async move {
|
|
match async { res.await?.await }.await {
|
|
Ok(_) => (),
|
|
Err(err) => {
|
|
tracing::error!("Error restoring package {}: {}", id, err);
|
|
tracing::debug!("{:?}", err);
|
|
}
|
|
}
|
|
*restore_phase.lock().await += 1;
|
|
}
|
|
})
|
|
.await;
|
|
restore_phase.lock().await.complete();
|
|
|
|
Ok(((&os_backup.account).try_into()?, rpc_ctx))
|
|
}
|
|
|
|
#[instrument(skip(ctx, backup_guard))]
|
|
async fn restore_packages(
|
|
ctx: &RpcContext,
|
|
backup_guard: BackupMountGuard<TmpMountGuard>,
|
|
ids: Vec<PackageId>,
|
|
) -> Result<BTreeMap<PackageId, DownloadInstallFuture>, Error> {
|
|
let backup_guard = Arc::new(backup_guard);
|
|
let mut tasks = BTreeMap::new();
|
|
for id in ids {
|
|
let backup_dir = backup_guard.clone().package_backup(&id).await?;
|
|
let s9pk_path = backup_dir.path().join(&id).with_extension("s9pk");
|
|
let task = ctx
|
|
.services
|
|
.install(
|
|
ctx.clone(),
|
|
|| S9pk::open(s9pk_path, Some(&id)),
|
|
None, // TODO: pull from metadata?
|
|
Some(backup_dir),
|
|
None,
|
|
)
|
|
.await?;
|
|
tasks.insert(id, task);
|
|
}
|
|
|
|
Ok(tasks)
|
|
}
|