mirror of
https://github.com/Start9Labs/start-os.git
synced 2026-03-31 20:43:41 +00:00
* wip: static-server errors * wip: fix wifi * wip: Fix the service_effects * wip: Fix cors in the middleware * wip(chore): Auth clean up the lint. * wip(fix): Vhost * wip: continue manager refactor Co-authored-by: J H <Blu-J@users.noreply.github.com> * wip: service manager refactor * wip: Some fixes * wip(fix): Fix the lib.rs * wip * wip(fix): Logs * wip: bins * wip(innspect): Add in the inspect * wip: config * wip(fix): Diagnostic * wip(fix): Dependencies * wip: context * wip(fix) Sorta auth * wip: warnings * wip(fix): registry/admin * wip(fix) marketplace * wip(fix) Some more converted and fixed with the linter and config * wip: Working on the static server * wip(fix)static server * wip: Remove some asynnc * wip: Something about the request and regular rpc * wip: gut install Co-authored-by: J H <Blu-J@users.noreply.github.com> * wip: Convert the static server into the new system * wip delete file * test * wip(fix) vhost does not need the with safe defaults * wip: Adding in the wifi * wip: Fix the developer and the verify * wip: new install flow Co-authored-by: J H <Blu-J@users.noreply.github.com> * fix middleware * wip * wip: Fix the auth * wip * continue service refactor * feature: Service get_config * feat: Action * wip: Fighting the great fight against the borrow checker * wip: Remove an error in a file that I just need to deel with later * chore: Add in some more lifetime stuff to the services * wip: Install fix on lifetime * cleanup * wip: Deal with the borrow later * more cleanup * resolve borrowchecker errors * wip(feat): add in the handler for the socket, for now * wip(feat): Update the service_effect_handler::action * chore: Add in the changes to make sure the from_service goes to context * chore: Change the * refactor service map * fix references to service map * fill out restore * wip: Before I work on the store stuff * fix backup module * handle some warnings * feat: add in the ui components on the rust side * feature: Update the procedures * chore: Update the js side of the main and a few of the others * chore: Update the rpc listener to match the persistant container * wip: Working on updating some things to have a better name * wip(feat): Try and get the rpc to return the correct shape? * lxc wip * wip(feat): Try and get the rpc to return the correct shape? * build for container runtime wip * remove container-init * fix build * fix error * chore: Update to work I suppose * lxc wip * remove docker module and feature * download alpine squashfs automatically * overlays effect Co-authored-by: Jade <Blu-J@users.noreply.github.com> * chore: Add the overlay effect * feat: Add the mounter in the main * chore: Convert to use the mounts, still need to work with the sandbox * install fixes * fix ssl * fixes from testing * implement tmpfile for upload * wip * misc fixes * cleanup * cleanup * better progress reporting * progress for sideload * return real guid * add devmode script * fix lxc rootfs path * fix percentage bar * fix progress bar styling * fix build for unstable * tweaks * label progress * tweaks * update progress more often * make symlink in rpc_client * make socket dir * fix parent path * add start-cli to container * add echo and gitInfo commands * wip: Add the init + errors * chore: Add in the exit effect for the system * chore: Change the type to null for failure to parse * move sigterm timeout to stopping status * update order * chore: Update the return type * remove dbg * change the map error * chore: Update the thing to capture id * chore add some life changes * chore: Update the loging * chore: Update the package to run module * us From for RpcError * chore: Update to use import instead * chore: update * chore: Use require for the backup * fix a default * update the type that is wrong * chore: Update the type of the manifest * chore: Update to make null * only symlink if not exists * get rid of double result * better debug info for ErrorCollection * chore: Update effects * chore: fix * mount assets and volumes * add exec instead of spawn * fix mounting in image * fix overlay mounts Co-authored-by: Jade <Blu-J@users.noreply.github.com> * misc fixes * feat: Fix two * fix: systemForEmbassy main * chore: Fix small part of main loop * chore: Modify the bundle * merge * fixMain loop" * move tsc to makefile * chore: Update the return types of the health check * fix client * chore: Convert the todo to use tsmatches * add in the fixes for the seen and create the hack to allow demo * chore: Update to include the systemForStartOs * chore UPdate to the latest types from the expected outout * fixes * fix typo * Don't emit if failure on tsc * wip Co-authored-by: Jade <Blu-J@users.noreply.github.com> * add s9pk api * add inspection * add inspect manifest * newline after display serializable * fix squashfs in image name * edit manifest Co-authored-by: Jade <Blu-J@users.noreply.github.com> * wait for response on repl * ignore sig for now * ignore sig for now * re-enable sig verification * fix * wip * env and chroot * add profiling logs * set uid & gid in squashfs to 100000 * set uid of sqfs to 100000 * fix mksquashfs args * add env to compat * fix * re-add docker feature flag * fix docker output format being stupid * here be dragons * chore: Add in the cross compiling for something * fix npm link * extract logs from container on exit * chore: Update for testing * add log capture to drop trait * chore: add in the modifications that I make * chore: Update small things for no updates * chore: Update the types of something * chore: Make main not complain * idmapped mounts * idmapped volumes * re-enable kiosk * chore: Add in some logging for the new system * bring in start-sdk * remove avahi * chore: Update the deps * switch to musl * chore: Update the version of prettier * chore: Organize' * chore: Update some of the headers back to the standard of fetch * fix musl build * fix idmapped mounts * fix cross build * use cross compiler for correct arch * feat: Add in the faked ssl stuff for the effects * @dr_bonez Did a solution here * chore: Something that DrBonez * chore: up * wip: We have a working server!!! * wip * uninstall * wip * tes --------- Co-authored-by: J H <dragondef@gmail.com> Co-authored-by: J H <Blu-J@users.noreply.github.com> Co-authored-by: J H <2364004+Blu-J@users.noreply.github.com>
273 lines
8.4 KiB
Rust
273 lines
8.4 KiB
Rust
use std::net::{Ipv6Addr, SocketAddr};
|
|
use std::path::Path;
|
|
use std::sync::Arc;
|
|
use std::time::Duration;
|
|
|
|
use helpers::NonDetachingJoinHandle;
|
|
use tokio::process::Command;
|
|
use tracing::instrument;
|
|
|
|
use crate::context::config::ServerConfig;
|
|
use crate::context::{DiagnosticContext, InstallContext, SetupContext};
|
|
use crate::disk::fsck::{RepairStrategy, RequiresReboot};
|
|
use crate::disk::main::DEFAULT_PASSWORD;
|
|
use crate::disk::REPAIR_DISK_PATH;
|
|
use crate::firmware::update_firmware;
|
|
use crate::init::STANDBY_MODE_PATH;
|
|
use crate::net::web_server::WebServer;
|
|
use crate::shutdown::Shutdown;
|
|
use crate::sound::{BEP, CHIME};
|
|
use crate::util::Invoke;
|
|
use crate::{Error, ErrorKind, ResultExt, PLATFORM};
|
|
|
|
#[instrument(skip_all)]
|
|
async fn setup_or_init(config: &ServerConfig) -> Result<Option<Shutdown>, Error> {
|
|
let song = NonDetachingJoinHandle::from(tokio::spawn(async {
|
|
loop {
|
|
BEP.play().await.unwrap();
|
|
BEP.play().await.unwrap();
|
|
tokio::time::sleep(Duration::from_secs(30)).await;
|
|
}
|
|
}));
|
|
|
|
match update_firmware().await {
|
|
Ok(RequiresReboot(true)) => {
|
|
return Ok(Some(Shutdown {
|
|
export_args: None,
|
|
restart: true,
|
|
}))
|
|
}
|
|
Err(e) => {
|
|
tracing::warn!("Error performing firmware update: {e}");
|
|
tracing::debug!("{e:?}");
|
|
}
|
|
_ => (),
|
|
}
|
|
|
|
Command::new("ln")
|
|
.arg("-sf")
|
|
.arg("/usr/lib/startos/scripts/fake-apt")
|
|
.arg("/usr/local/bin/apt")
|
|
.invoke(crate::ErrorKind::Filesystem)
|
|
.await?;
|
|
Command::new("ln")
|
|
.arg("-sf")
|
|
.arg("/usr/lib/startos/scripts/fake-apt")
|
|
.arg("/usr/local/bin/apt-get")
|
|
.invoke(crate::ErrorKind::Filesystem)
|
|
.await?;
|
|
Command::new("ln")
|
|
.arg("-sf")
|
|
.arg("/usr/lib/startos/scripts/fake-apt")
|
|
.arg("/usr/local/bin/aptitude")
|
|
.invoke(crate::ErrorKind::Filesystem)
|
|
.await?;
|
|
|
|
Command::new("make-ssl-cert")
|
|
.arg("generate-default-snakeoil")
|
|
.arg("--force-overwrite")
|
|
.invoke(crate::ErrorKind::OpenSsl)
|
|
.await?;
|
|
|
|
if tokio::fs::metadata("/run/live/medium").await.is_ok() {
|
|
Command::new("sed")
|
|
.arg("-i")
|
|
.arg("s/PasswordAuthentication no/PasswordAuthentication yes/g")
|
|
.arg("/etc/ssh/sshd_config")
|
|
.invoke(crate::ErrorKind::Filesystem)
|
|
.await?;
|
|
Command::new("systemctl")
|
|
.arg("reload")
|
|
.arg("ssh")
|
|
.invoke(crate::ErrorKind::OpenSsh)
|
|
.await?;
|
|
|
|
let ctx = InstallContext::init().await?;
|
|
|
|
let server = WebServer::install(
|
|
SocketAddr::new(Ipv6Addr::UNSPECIFIED.into(), 80),
|
|
ctx.clone(),
|
|
)?;
|
|
|
|
drop(song);
|
|
tokio::time::sleep(Duration::from_secs(1)).await; // let the record state that I hate this
|
|
CHIME.play().await?;
|
|
|
|
ctx.shutdown
|
|
.subscribe()
|
|
.recv()
|
|
.await
|
|
.expect("context dropped");
|
|
|
|
server.shutdown().await;
|
|
|
|
Command::new("reboot")
|
|
.invoke(crate::ErrorKind::Unknown)
|
|
.await?;
|
|
} else if tokio::fs::metadata("/media/embassy/config/disk.guid")
|
|
.await
|
|
.is_err()
|
|
{
|
|
let ctx = SetupContext::init(config)?;
|
|
|
|
let server = WebServer::setup(
|
|
SocketAddr::new(Ipv6Addr::UNSPECIFIED.into(), 80),
|
|
ctx.clone(),
|
|
)?;
|
|
|
|
drop(song);
|
|
tokio::time::sleep(Duration::from_secs(1)).await; // let the record state that I hate this
|
|
CHIME.play().await?;
|
|
|
|
let mut shutdown = ctx.shutdown.subscribe();
|
|
shutdown.recv().await.expect("context dropped");
|
|
|
|
server.shutdown().await;
|
|
|
|
drop(shutdown);
|
|
|
|
tokio::task::yield_now().await;
|
|
if let Err(e) = Command::new("killall")
|
|
.arg("firefox-esr")
|
|
.invoke(ErrorKind::NotFound)
|
|
.await
|
|
{
|
|
tracing::error!("Failed to kill kiosk: {}", e);
|
|
tracing::debug!("{:?}", e);
|
|
}
|
|
} else {
|
|
let guid_string = tokio::fs::read_to_string("/media/embassy/config/disk.guid") // unique identifier for volume group - keeps track of the disk that goes with your embassy
|
|
.await?;
|
|
let guid = guid_string.trim();
|
|
let requires_reboot = crate::disk::main::import(
|
|
guid,
|
|
config.datadir(),
|
|
if tokio::fs::metadata(REPAIR_DISK_PATH).await.is_ok() {
|
|
RepairStrategy::Aggressive
|
|
} else {
|
|
RepairStrategy::Preen
|
|
},
|
|
if guid.ends_with("_UNENC") {
|
|
None
|
|
} else {
|
|
Some(DEFAULT_PASSWORD)
|
|
},
|
|
)
|
|
.await?;
|
|
if tokio::fs::metadata(REPAIR_DISK_PATH).await.is_ok() {
|
|
tokio::fs::remove_file(REPAIR_DISK_PATH)
|
|
.await
|
|
.with_ctx(|_| (crate::ErrorKind::Filesystem, REPAIR_DISK_PATH))?;
|
|
}
|
|
if requires_reboot.0 {
|
|
crate::disk::main::export(guid, config.datadir()).await?;
|
|
Command::new("reboot")
|
|
.invoke(crate::ErrorKind::Unknown)
|
|
.await?;
|
|
}
|
|
tracing::info!("Loaded Disk");
|
|
crate::init::init(config).await?;
|
|
drop(song);
|
|
}
|
|
|
|
Ok(None)
|
|
}
|
|
|
|
async fn run_script_if_exists<P: AsRef<Path>>(path: P) {
|
|
let script = path.as_ref();
|
|
if script.exists() {
|
|
match Command::new("/bin/bash").arg(script).spawn() {
|
|
Ok(mut c) => {
|
|
if let Err(e) = c.wait().await {
|
|
tracing::error!("Error Running {}: {}", script.display(), e);
|
|
tracing::debug!("{:?}", e);
|
|
}
|
|
}
|
|
Err(e) => {
|
|
tracing::error!("Error Running {}: {}", script.display(), e);
|
|
tracing::debug!("{:?}", e);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
#[instrument(skip_all)]
|
|
async fn inner_main(config: &ServerConfig) -> Result<Option<Shutdown>, Error> {
|
|
if &*PLATFORM == "raspberrypi" && tokio::fs::metadata(STANDBY_MODE_PATH).await.is_ok() {
|
|
tokio::fs::remove_file(STANDBY_MODE_PATH).await?;
|
|
Command::new("sync").invoke(ErrorKind::Filesystem).await?;
|
|
crate::sound::SHUTDOWN.play().await?;
|
|
futures::future::pending::<()>().await;
|
|
}
|
|
|
|
crate::sound::BEP.play().await?;
|
|
|
|
run_script_if_exists("/media/embassy/config/preinit.sh").await;
|
|
|
|
let res = match setup_or_init(config).await {
|
|
Err(e) => {
|
|
async move {
|
|
tracing::error!("{}", e.source);
|
|
tracing::debug!("{}", e.source);
|
|
crate::sound::BEETHOVEN.play().await?;
|
|
|
|
let ctx = DiagnosticContext::init(
|
|
config,
|
|
if tokio::fs::metadata("/media/embassy/config/disk.guid")
|
|
.await
|
|
.is_ok()
|
|
{
|
|
Some(Arc::new(
|
|
tokio::fs::read_to_string("/media/embassy/config/disk.guid") // unique identifier for volume group - keeps track of the disk that goes with your embassy
|
|
.await?
|
|
.trim()
|
|
.to_owned(),
|
|
))
|
|
} else {
|
|
None
|
|
},
|
|
e,
|
|
)?;
|
|
|
|
let server = WebServer::diagnostic(
|
|
SocketAddr::new(Ipv6Addr::UNSPECIFIED.into(), 80),
|
|
ctx.clone(),
|
|
)?;
|
|
|
|
let shutdown = ctx.shutdown.subscribe().recv().await.unwrap();
|
|
|
|
server.shutdown().await;
|
|
|
|
Ok(shutdown)
|
|
}
|
|
.await
|
|
}
|
|
Ok(s) => Ok(s),
|
|
};
|
|
|
|
run_script_if_exists("/media/embassy/config/postinit.sh").await;
|
|
|
|
res
|
|
}
|
|
|
|
pub fn main(config: &ServerConfig) {
|
|
let res = {
|
|
let rt = tokio::runtime::Builder::new_multi_thread()
|
|
.enable_all()
|
|
.build()
|
|
.expect("failed to initialize runtime");
|
|
rt.block_on(inner_main(config))
|
|
};
|
|
|
|
match res {
|
|
Ok(Some(shutdown)) => shutdown.execute(),
|
|
Ok(None) => (),
|
|
Err(e) => {
|
|
eprintln!("{}", e.source);
|
|
tracing::debug!("{:?}", e.source);
|
|
drop(e.source);
|
|
std::process::exit(e.kind as i32)
|
|
}
|
|
}
|
|
}
|