2022-07-18 22:02:49 +00:00
|
|
|
package agent
|
|
|
|
|
|
|
|
import (
|
2022-08-18 13:12:05 +00:00
|
|
|
"encoding/json"
|
2022-07-18 22:02:49 +00:00
|
|
|
"fmt"
|
2024-10-16 10:36:19 +00:00
|
|
|
"path/filepath"
|
2023-09-27 14:38:55 +00:00
|
|
|
"strings"
|
2023-09-14 12:35:44 +00:00
|
|
|
|
|
|
|
hook "github.com/kairos-io/kairos-agent/v2/internal/agent/hooks"
|
2023-12-08 08:50:01 +00:00
|
|
|
"github.com/mudler/go-pluggable"
|
2023-09-14 12:35:44 +00:00
|
|
|
|
2023-07-10 12:39:48 +00:00
|
|
|
"github.com/kairos-io/kairos-agent/v2/internal/bus"
|
|
|
|
"github.com/kairos-io/kairos-agent/v2/pkg/action"
|
2023-09-28 11:50:14 +00:00
|
|
|
config "github.com/kairos-io/kairos-agent/v2/pkg/config"
|
2023-12-18 10:38:26 +00:00
|
|
|
"github.com/kairos-io/kairos-agent/v2/pkg/uki"
|
2024-01-09 15:42:49 +00:00
|
|
|
internalutils "github.com/kairos-io/kairos-agent/v2/pkg/utils"
|
2024-10-16 10:36:19 +00:00
|
|
|
k8sutils "github.com/kairos-io/kairos-agent/v2/pkg/utils/k8s"
|
2023-12-08 08:50:01 +00:00
|
|
|
events "github.com/kairos-io/kairos-sdk/bus"
|
2023-07-20 10:02:43 +00:00
|
|
|
"github.com/kairos-io/kairos-sdk/collector"
|
|
|
|
"github.com/kairos-io/kairos-sdk/utils"
|
2023-12-07 13:00:04 +00:00
|
|
|
"github.com/kairos-io/kairos-sdk/versioneer"
|
2022-07-18 22:02:49 +00:00
|
|
|
)
|
|
|
|
|
2023-12-07 13:00:04 +00:00
|
|
|
func CurrentImage() (string, error) {
|
|
|
|
artifact, err := versioneer.NewArtifactFromOSRelease()
|
|
|
|
if err != nil {
|
2024-10-07 09:44:05 +00:00
|
|
|
return "", fmt.Errorf("creating an Artifact from kairos-release: %w", err)
|
2023-12-07 13:00:04 +00:00
|
|
|
}
|
2022-08-18 13:12:05 +00:00
|
|
|
|
2023-12-07 13:00:04 +00:00
|
|
|
registryAndOrg, err := utils.OSRelease("REGISTRY_AND_ORG")
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
2022-08-18 15:19:15 +00:00
|
|
|
}
|
2022-08-18 13:12:05 +00:00
|
|
|
|
2023-12-07 13:00:04 +00:00
|
|
|
return artifact.ContainerName(registryAndOrg)
|
|
|
|
}
|
|
|
|
|
2024-01-11 08:05:34 +00:00
|
|
|
func ListAllReleases(includePrereleases bool) ([]string, error) {
|
2023-12-07 13:00:04 +00:00
|
|
|
var err error
|
|
|
|
|
2024-01-11 08:05:34 +00:00
|
|
|
tagList, err := allReleases()
|
2023-12-08 08:50:01 +00:00
|
|
|
if err != nil {
|
2024-01-11 08:05:34 +00:00
|
|
|
return []string{}, err
|
2023-12-08 08:50:01 +00:00
|
|
|
}
|
2023-12-07 13:00:04 +00:00
|
|
|
|
2024-01-11 08:05:34 +00:00
|
|
|
if !includePrereleases {
|
|
|
|
tagList = tagList.NoPrereleases()
|
2022-08-18 13:12:05 +00:00
|
|
|
}
|
2023-12-07 13:00:04 +00:00
|
|
|
|
2024-01-11 08:05:34 +00:00
|
|
|
return tagList.FullImages()
|
|
|
|
}
|
|
|
|
|
|
|
|
func ListNewerReleases(includePrereleases bool) ([]string, error) {
|
|
|
|
var err error
|
|
|
|
|
2023-12-08 08:50:01 +00:00
|
|
|
tagList, err := newerReleases()
|
|
|
|
if err != nil {
|
|
|
|
return []string{}, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if !includePrereleases {
|
|
|
|
tagList = tagList.NoPrereleases()
|
2023-12-07 13:00:04 +00:00
|
|
|
}
|
|
|
|
|
2023-12-08 08:50:01 +00:00
|
|
|
return tagList.FullImages()
|
2022-08-18 13:12:05 +00:00
|
|
|
}
|
|
|
|
|
2024-10-15 08:47:09 +00:00
|
|
|
// TODO: Check where force and preReleases is being used? They dont seem to be used anywhere?
|
2023-03-24 13:00:33 +00:00
|
|
|
func Upgrade(
|
2024-08-13 09:12:20 +00:00
|
|
|
source string, force, strictValidations bool, dirs []string, upgradeEntry string, preReleases bool) error {
|
2022-08-18 13:12:05 +00:00
|
|
|
bus.Manager.Initialize()
|
|
|
|
|
2024-10-16 10:36:19 +00:00
|
|
|
fixedDirs := make([]string, len(dirs))
|
|
|
|
// Check and fix dirs if we are under k8s, so we read the actual running system configs instead of only
|
|
|
|
// the container configs
|
|
|
|
// we can run it blindly as it will return an empty string if not under k8s
|
|
|
|
hostdir := k8sutils.GetHostDirForK8s()
|
|
|
|
for _, dir := range dirs {
|
|
|
|
fixedDirs = append(fixedDirs, filepath.Join(hostdir, dir))
|
|
|
|
}
|
|
|
|
|
2024-01-31 18:38:16 +00:00
|
|
|
if internalutils.UkiBootMode() == internalutils.UkiHDD {
|
2024-10-16 10:36:19 +00:00
|
|
|
return upgradeUki(source, fixedDirs, upgradeEntry, strictValidations)
|
2024-01-09 15:42:49 +00:00
|
|
|
} else {
|
2024-10-16 10:36:19 +00:00
|
|
|
return upgrade(source, fixedDirs, upgradeEntry, strictValidations)
|
2024-01-09 15:42:49 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-10-15 08:47:09 +00:00
|
|
|
func upgrade(sourceImageURL string, dirs []string, upgradeEntry string, strictValidations bool) error {
|
|
|
|
c, err := getConfig(sourceImageURL, dirs, upgradeEntry, strictValidations)
|
2023-05-05 16:43:21 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2024-10-15 08:47:09 +00:00
|
|
|
utils.SetEnv(c.Env)
|
2023-05-05 16:43:21 +00:00
|
|
|
|
2024-10-15 08:47:09 +00:00
|
|
|
err = c.CheckForUsers()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Load the upgrade Config from the system
|
|
|
|
upgradeSpec, err := config.ReadUpgradeSpecFromConfig(c)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2023-09-28 12:08:16 +00:00
|
|
|
err = upgradeSpec.Sanitize()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2023-07-25 13:21:34 +00:00
|
|
|
upgradeAction := action.NewUpgradeAction(c, upgradeSpec)
|
2022-08-17 08:31:39 +00:00
|
|
|
|
2023-07-24 10:28:59 +00:00
|
|
|
err = upgradeAction.Run()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2025-03-24 15:05:39 +00:00
|
|
|
return hook.Run(*c, upgradeSpec, hook.FinishUpgrade...)
|
2022-07-18 22:02:49 +00:00
|
|
|
}
|
2023-06-30 08:37:50 +00:00
|
|
|
|
2024-10-15 08:47:09 +00:00
|
|
|
func upgradeUki(sourceImageURL string, dirs []string, upgradeEntry string, strictValidations bool) error {
|
|
|
|
c, err := getConfig(sourceImageURL, dirs, upgradeEntry, strictValidations)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
utils.SetEnv(c.Env)
|
|
|
|
|
|
|
|
err = c.CheckForUsers()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Load the upgrade Config from the system
|
|
|
|
upgradeSpec, err := config.ReadUkiUpgradeSpecFromConfig(c)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
err = upgradeSpec.Sanitize()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
upgradeAction := uki.NewUpgradeAction(c, upgradeSpec)
|
|
|
|
|
|
|
|
err = upgradeAction.Run()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2025-03-24 15:05:39 +00:00
|
|
|
return hook.Run(*c, upgradeSpec, hook.FinishUpgrade...)
|
2024-10-15 08:47:09 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func getConfig(sourceImageURL string, dirs []string, upgradeEntry string, strictValidations bool) (*config.Config, error) {
|
|
|
|
cliConf, err := generateUpgradeConfForCLIArgs(sourceImageURL, upgradeEntry)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
c, err := config.Scan(collector.Directories(dirs...),
|
|
|
|
collector.Readers(strings.NewReader(cliConf)),
|
|
|
|
collector.StrictValidation(strictValidations))
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return c, err
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2024-01-11 08:05:34 +00:00
|
|
|
func allReleases() (versioneer.TagList, error) {
|
|
|
|
artifact, err := versioneer.NewArtifactFromOSRelease()
|
|
|
|
if err != nil {
|
|
|
|
return versioneer.TagList{}, err
|
|
|
|
}
|
|
|
|
|
|
|
|
registryAndOrg, err := utils.OSRelease("REGISTRY_AND_ORG")
|
|
|
|
if err != nil {
|
|
|
|
return versioneer.TagList{}, err
|
|
|
|
}
|
|
|
|
|
|
|
|
tagList, err := artifact.TagList(registryAndOrg)
|
|
|
|
if err != nil {
|
|
|
|
return tagList, err
|
|
|
|
}
|
|
|
|
|
2024-04-12 06:11:40 +00:00
|
|
|
return tagList.OtherAnyVersion().RSorted(), nil
|
2024-01-11 08:05:34 +00:00
|
|
|
}
|
|
|
|
|
2023-12-07 13:00:04 +00:00
|
|
|
func newerReleases() (versioneer.TagList, error) {
|
|
|
|
artifact, err := versioneer.NewArtifactFromOSRelease()
|
|
|
|
if err != nil {
|
|
|
|
return versioneer.TagList{}, err
|
|
|
|
}
|
|
|
|
|
|
|
|
registryAndOrg, err := utils.OSRelease("REGISTRY_AND_ORG")
|
|
|
|
if err != nil {
|
|
|
|
return versioneer.TagList{}, err
|
|
|
|
}
|
|
|
|
|
|
|
|
tagList, err := artifact.TagList(registryAndOrg)
|
|
|
|
if err != nil {
|
|
|
|
return tagList, err
|
|
|
|
}
|
2024-04-12 06:11:40 +00:00
|
|
|
return tagList.NewerAnyVersion().RSorted(), nil
|
2023-12-07 13:00:04 +00:00
|
|
|
}
|
|
|
|
|
2023-09-28 12:55:14 +00:00
|
|
|
// generateUpgradeConfForCLIArgs creates a kairos configuration for `--source` and `--recovery`
|
2023-09-28 11:19:48 +00:00
|
|
|
// command line arguments. It will be added to the rest of the configurations.
|
2024-08-13 09:12:20 +00:00
|
|
|
func generateUpgradeConfForCLIArgs(source, upgradeEntry string) (string, error) {
|
2024-02-02 12:20:06 +00:00
|
|
|
upgradeConfig := ExtraConfigUpgrade{}
|
2023-09-27 14:38:55 +00:00
|
|
|
|
2024-08-13 09:12:20 +00:00
|
|
|
upgradeConfig.Upgrade.Entry = upgradeEntry
|
2024-07-29 13:51:14 +00:00
|
|
|
|
2023-09-28 11:19:48 +00:00
|
|
|
// Set uri both for active and recovery because we don't know what we are
|
|
|
|
// actually upgrading. The "upgradeRecovery" is just the command line argument.
|
|
|
|
// The user might have set it to "true" in the kairos config. Since we don't
|
|
|
|
// have access to that yet, we just set both uri values which shouldn't matter
|
|
|
|
// anyway, the right one will be used later in the process.
|
|
|
|
if source != "" {
|
2024-02-02 12:20:06 +00:00
|
|
|
upgradeConfig.Upgrade.RecoverySystem.URI = source
|
|
|
|
upgradeConfig.Upgrade.System.URI = source
|
2023-09-28 10:04:03 +00:00
|
|
|
}
|
|
|
|
|
2024-02-05 10:30:24 +00:00
|
|
|
d, err := json.Marshal(upgradeConfig)
|
2023-09-28 10:04:03 +00:00
|
|
|
|
2023-09-28 11:19:48 +00:00
|
|
|
return string(d), err
|
2023-09-27 14:38:55 +00:00
|
|
|
}
|
2023-09-28 09:27:27 +00:00
|
|
|
|
2023-12-08 08:50:01 +00:00
|
|
|
func getReleasesFromProvider(includePrereleases bool) ([]string, error) {
|
|
|
|
var result []string
|
|
|
|
bus.Manager.Response(events.EventAvailableReleases, func(p *pluggable.Plugin, r *pluggable.EventResponse) {
|
|
|
|
if r.Data == "" {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err := json.Unmarshal([]byte(r.Data), &result); err != nil {
|
|
|
|
fmt.Printf("warn: failed unmarshalling data: '%s'\n", err.Error())
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
configYAML := "IncludePreReleases: true"
|
|
|
|
_, err := bus.Manager.Publish(events.EventAvailableReleases, events.EventPayload{Config: configYAML})
|
|
|
|
if err != nil {
|
|
|
|
return result, fmt.Errorf("failed publishing event: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return result, nil
|
|
|
|
}
|
2023-12-18 10:38:26 +00:00
|
|
|
|
2024-02-02 12:20:06 +00:00
|
|
|
// ExtraConfigUpgrade is the struct that holds the upgrade options that come from flags and events
|
|
|
|
type ExtraConfigUpgrade struct {
|
|
|
|
Upgrade struct {
|
2024-08-13 09:12:20 +00:00
|
|
|
Entry string `json:"entry,omitempty"`
|
2024-02-02 12:20:06 +00:00
|
|
|
RecoverySystem struct {
|
|
|
|
URI string `json:"uri,omitempty"`
|
|
|
|
} `json:"recovery-system,omitempty"`
|
|
|
|
System struct {
|
|
|
|
URI string `json:"uri,omitempty"`
|
|
|
|
} `json:"system,omitempty"`
|
|
|
|
} `json:"upgrade,omitempty"`
|
|
|
|
}
|