mirror of
https://github.com/Start9Labs/start-os.git
synced 2026-03-26 10:21:52 +00:00
* start consolidating * add start-cli flash-os * combine install and setup and refactor all * use http * undo mock * fix translation * translations * use dialogservice wrapper * better ST messaging on setup * only warn on update if breakages (#3097) * finish setup wizard and ui language-keyboard feature * fix typo * wip: localization * remove start-tunnel readme * switch to posix strings for language internal * revert mock * translate backend strings * fix missing about text * help text for args * feat: add "Add new gateway" option (#3098) * feat: add "Add new gateway" option * Update web/projects/ui/src/app/routes/portal/components/form/controls/select.component.ts Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> * add translation --------- Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> Co-authored-by: Matt Hill <mattnine@protonmail.com> * fix dns selection * keyboard keymap also * ability to shutdown after install * revert mock * working setup flow + manifest localization * (mostly) redundant localization on frontend * version bump * omit live medium from disk list and better space management * ignore missing package archive on 035 migration * fix device migration * add i18n helper to sdk * fix install over 0.3.5.1 * fix grub config --------- Co-authored-by: Matt Hill <mattnine@protonmail.com> Co-authored-by: Matt Hill <MattDHill@users.noreply.github.com> Co-authored-by: Alex Inkin <alexander@inkin.ru> Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
219 lines
6.5 KiB
Rust
219 lines
6.5 KiB
Rust
use std::collections::BTreeMap;
|
|
use std::sync::Arc;
|
|
|
|
use clap::Parser;
|
|
use futures::{StreamExt, stream};
|
|
use patch_db::json_ptr::ROOT;
|
|
use serde::{Deserialize, Serialize};
|
|
use tokio::sync::Mutex;
|
|
use tracing::instrument;
|
|
use ts_rs::TS;
|
|
|
|
use super::target::BackupTargetId;
|
|
use crate::backup::os::OsBackup;
|
|
use crate::context::setup::SetupResult;
|
|
use crate::context::{RpcContext, SetupContext};
|
|
use crate::db::model::Database;
|
|
use crate::disk::mount::backup::BackupMountGuard;
|
|
use crate::disk::mount::filesystem::ReadWrite;
|
|
use crate::disk::mount::guard::{GenericMountGuard, TmpMountGuard};
|
|
use crate::init::init;
|
|
use crate::prelude::*;
|
|
use crate::progress::ProgressUnits;
|
|
use crate::s9pk::S9pk;
|
|
use crate::service::service_map::DownloadInstallFuture;
|
|
use crate::setup::SetupExecuteProgress;
|
|
use crate::system::{save_language, sync_kiosk};
|
|
use crate::util::serde::{IoFormat, Pem};
|
|
use crate::{PLATFORM, PackageId};
|
|
|
|
#[derive(Deserialize, Serialize, Parser, TS)]
|
|
#[serde(rename_all = "camelCase")]
|
|
#[command(rename_all = "kebab-case")]
|
|
pub struct RestorePackageParams {
|
|
#[arg(help = "help.arg.package-ids")]
|
|
pub ids: Vec<PackageId>,
|
|
#[arg(help = "help.arg.backup-target-id")]
|
|
pub target_id: BackupTargetId,
|
|
#[arg(help = "help.arg.backup-password")]
|
|
pub password: String,
|
|
}
|
|
|
|
// #[command(rename = "restore", display(display_none))]
|
|
#[instrument(skip(ctx, password))]
|
|
pub async fn restore_packages_rpc(
|
|
ctx: RpcContext,
|
|
RestorePackageParams {
|
|
ids,
|
|
target_id,
|
|
password,
|
|
}: RestorePackageParams,
|
|
) -> Result<(), Error> {
|
|
let peek = ctx.db.peek().await;
|
|
let fs = target_id.load(&peek)?;
|
|
let backup_guard = BackupMountGuard::mount(
|
|
TmpMountGuard::mount(&fs, ReadWrite).await?,
|
|
&peek.as_public().as_server_info().as_id().de()?,
|
|
&password,
|
|
)
|
|
.await?;
|
|
|
|
let tasks = restore_packages(&ctx, backup_guard, ids).await?;
|
|
|
|
tokio::spawn(async move {
|
|
stream::iter(tasks)
|
|
.for_each_concurrent(5, |(id, res)| async move {
|
|
match async { res.await?.await }.await {
|
|
Ok(_) => (),
|
|
Err(err) => {
|
|
tracing::error!(
|
|
"{}",
|
|
t!("backup.restore.package-error", id = id, error = err)
|
|
);
|
|
tracing::debug!("{:?}", err);
|
|
}
|
|
}
|
|
})
|
|
.await;
|
|
});
|
|
|
|
Ok(())
|
|
}
|
|
|
|
#[instrument(skip_all)]
|
|
pub async fn recover_full_server(
|
|
ctx: &SetupContext,
|
|
disk_guid: InternedString,
|
|
password: String,
|
|
recovery_source: TmpMountGuard,
|
|
server_id: &str,
|
|
recovery_password: &str,
|
|
kiosk: Option<bool>,
|
|
SetupExecuteProgress {
|
|
init_phases,
|
|
restore_phase,
|
|
rpc_ctx_phases,
|
|
}: SetupExecuteProgress,
|
|
) -> Result<(SetupResult, RpcContext), Error> {
|
|
let mut restore_phase = restore_phase.or_not_found("restore progress")?;
|
|
|
|
let backup_guard =
|
|
BackupMountGuard::mount(recovery_source, server_id, recovery_password).await?;
|
|
|
|
let os_backup_path = backup_guard.path().join("os-backup.json");
|
|
let mut os_backup: OsBackup = IoFormat::Json.from_slice(
|
|
&tokio::fs::read(&os_backup_path)
|
|
.await
|
|
.with_ctx(|_| (ErrorKind::Filesystem, os_backup_path.display().to_string()))?,
|
|
)?;
|
|
|
|
os_backup.account.password = argon2::hash_encoded(
|
|
password.as_bytes(),
|
|
&rand::random::<[u8; 16]>()[..],
|
|
&argon2::Config::rfc9106_low_mem(),
|
|
)
|
|
.with_kind(ErrorKind::PasswordHashGeneration)?;
|
|
|
|
let kiosk = Some(kiosk.unwrap_or(true)).filter(|_| &*PLATFORM != "raspberrypi");
|
|
sync_kiosk(kiosk).await?;
|
|
|
|
let language = ctx.language.peek(|a| a.clone());
|
|
let keyboard = ctx.keyboard.peek(|a| a.clone());
|
|
|
|
if let Some(language) = &language {
|
|
save_language(&**language).await?;
|
|
}
|
|
|
|
if let Some(keyboard) = &keyboard {
|
|
keyboard.save().await?;
|
|
}
|
|
|
|
let db = ctx.db().await?;
|
|
db.put(
|
|
&ROOT,
|
|
&Database::init(&os_backup.account, kiosk, language, keyboard)?,
|
|
)
|
|
.await?;
|
|
drop(db);
|
|
|
|
let config = ctx.config.peek(|c| c.clone());
|
|
|
|
let init_result = init(&ctx.webserver, &config, init_phases).await?;
|
|
|
|
let rpc_ctx = RpcContext::init(
|
|
&ctx.webserver,
|
|
&config,
|
|
disk_guid.clone(),
|
|
Some(init_result),
|
|
rpc_ctx_phases,
|
|
)
|
|
.await?;
|
|
|
|
restore_phase.start();
|
|
let ids: Vec<_> = backup_guard
|
|
.metadata
|
|
.package_backups
|
|
.keys()
|
|
.cloned()
|
|
.collect();
|
|
let tasks = restore_packages(&rpc_ctx, backup_guard, ids).await?;
|
|
restore_phase.set_total(tasks.len() as u64);
|
|
restore_phase.set_units(Some(ProgressUnits::Steps));
|
|
let restore_phase = Arc::new(Mutex::new(restore_phase));
|
|
stream::iter(tasks)
|
|
.for_each_concurrent(5, |(id, res)| {
|
|
let restore_phase = restore_phase.clone();
|
|
async move {
|
|
match async { res.await?.await }.await {
|
|
Ok(_) => (),
|
|
Err(err) => {
|
|
tracing::error!(
|
|
"{}",
|
|
t!("backup.restore.package-error", id = id, error = err)
|
|
);
|
|
tracing::debug!("{:?}", err);
|
|
}
|
|
}
|
|
*restore_phase.lock().await += 1;
|
|
}
|
|
})
|
|
.await;
|
|
restore_phase.lock().await.complete();
|
|
|
|
Ok((
|
|
SetupResult {
|
|
hostname: os_backup.account.hostname,
|
|
root_ca: Pem(os_backup.account.root_ca_cert),
|
|
needs_restart: ctx.install_rootfs.peek(|a| a.is_some()),
|
|
},
|
|
rpc_ctx,
|
|
))
|
|
}
|
|
|
|
#[instrument(skip(ctx, backup_guard))]
|
|
async fn restore_packages(
|
|
ctx: &RpcContext,
|
|
backup_guard: BackupMountGuard<TmpMountGuard>,
|
|
ids: Vec<PackageId>,
|
|
) -> Result<BTreeMap<PackageId, DownloadInstallFuture>, Error> {
|
|
let backup_guard = Arc::new(backup_guard);
|
|
let mut tasks = BTreeMap::new();
|
|
for id in ids {
|
|
let backup_dir = backup_guard.clone().package_backup(&id).await?;
|
|
let s9pk_path = backup_dir.path().join(&id).with_extension("s9pk");
|
|
let task = ctx
|
|
.services
|
|
.install(
|
|
ctx.clone(),
|
|
|| S9pk::open(s9pk_path, Some(&id)),
|
|
None, // TODO: pull from metadata?
|
|
Some(backup_dir),
|
|
None,
|
|
)
|
|
.await?;
|
|
tasks.insert(id, task);
|
|
}
|
|
|
|
Ok(tasks)
|
|
}
|