2022-07-18 22:02:49 +00:00
|
|
|
package agent
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2022-08-18 13:12:05 +00:00
|
|
|
"encoding/json"
|
2022-07-18 22:02:49 +00:00
|
|
|
"fmt"
|
2023-07-20 10:02:43 +00:00
|
|
|
"sort"
|
2023-09-27 14:38:55 +00:00
|
|
|
"strings"
|
2023-09-14 12:35:44 +00:00
|
|
|
|
|
|
|
hook "github.com/kairos-io/kairos-agent/v2/internal/agent/hooks"
|
|
|
|
|
2023-04-20 07:57:58 +00:00
|
|
|
"github.com/Masterminds/semver/v3"
|
2023-07-10 12:39:48 +00:00
|
|
|
"github.com/kairos-io/kairos-agent/v2/internal/bus"
|
|
|
|
"github.com/kairos-io/kairos-agent/v2/pkg/action"
|
2023-09-28 11:50:14 +00:00
|
|
|
config "github.com/kairos-io/kairos-agent/v2/pkg/config"
|
2023-07-10 12:39:48 +00:00
|
|
|
"github.com/kairos-io/kairos-agent/v2/pkg/github"
|
2023-09-28 09:27:27 +00:00
|
|
|
v1 "github.com/kairos-io/kairos-agent/v2/pkg/types/v1"
|
2023-07-20 10:02:43 +00:00
|
|
|
events "github.com/kairos-io/kairos-sdk/bus"
|
|
|
|
"github.com/kairos-io/kairos-sdk/collector"
|
|
|
|
"github.com/kairos-io/kairos-sdk/utils"
|
2022-08-18 13:12:05 +00:00
|
|
|
"github.com/mudler/go-pluggable"
|
2022-07-18 22:02:49 +00:00
|
|
|
)
|
|
|
|
|
2023-04-21 10:32:28 +00:00
|
|
|
func ListReleases(includePrereleases bool) semver.Collection {
|
2023-04-20 07:57:58 +00:00
|
|
|
var releases semver.Collection
|
2022-08-18 13:12:05 +00:00
|
|
|
|
|
|
|
bus.Manager.Response(events.EventAvailableReleases, func(p *pluggable.Plugin, r *pluggable.EventResponse) {
|
2022-08-18 15:19:15 +00:00
|
|
|
if err := json.Unmarshal([]byte(r.Data), &releases); err != nil {
|
|
|
|
fmt.Printf("warn: failed unmarshalling data: '%s'\n", err.Error())
|
|
|
|
}
|
2022-08-18 13:12:05 +00:00
|
|
|
})
|
|
|
|
|
2022-08-18 15:19:15 +00:00
|
|
|
if _, err := bus.Manager.Publish(events.EventAvailableReleases, events.EventPayload{}); err != nil {
|
|
|
|
fmt.Printf("warn: failed publishing event: '%s'\n", err.Error())
|
|
|
|
}
|
2022-08-18 13:12:05 +00:00
|
|
|
|
|
|
|
if len(releases) == 0 {
|
2022-07-18 22:02:49 +00:00
|
|
|
githubRepo, err := utils.OSRelease("GITHUB_REPO")
|
|
|
|
if err != nil {
|
2022-08-18 13:12:05 +00:00
|
|
|
return releases
|
2022-07-18 22:02:49 +00:00
|
|
|
}
|
2023-04-21 10:32:28 +00:00
|
|
|
fmt.Println("Searching for releases")
|
|
|
|
if includePrereleases {
|
|
|
|
fmt.Println("Including pre-releases")
|
|
|
|
}
|
|
|
|
releases, _ = github.FindReleases(context.Background(), "", githubRepo, includePrereleases)
|
2023-07-20 10:02:43 +00:00
|
|
|
} else {
|
|
|
|
// We got the release list from the bus manager and we don't know if they are sorted, so sort them in reverse to get the latest first
|
|
|
|
sort.Sort(sort.Reverse(releases))
|
2022-08-18 13:12:05 +00:00
|
|
|
}
|
|
|
|
return releases
|
|
|
|
}
|
|
|
|
|
2023-03-24 13:00:33 +00:00
|
|
|
func Upgrade(
|
2023-09-28 10:04:03 +00:00
|
|
|
version, source string, force, strictValidations bool, dirs []string, preReleases bool, upgradeRecovery bool) error {
|
2022-08-18 13:12:05 +00:00
|
|
|
bus.Manager.Initialize()
|
|
|
|
|
2023-09-28 11:50:14 +00:00
|
|
|
upgradeSpec, c, err := generateUpgradeSpec(version, source, force, strictValidations, dirs, preReleases, upgradeRecovery)
|
2023-05-05 16:43:21 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2023-09-28 12:08:16 +00:00
|
|
|
err = upgradeSpec.Sanitize()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2023-07-25 13:21:34 +00:00
|
|
|
upgradeAction := action.NewUpgradeAction(c, upgradeSpec)
|
2022-08-17 08:31:39 +00:00
|
|
|
|
2023-07-24 10:28:59 +00:00
|
|
|
err = upgradeAction.Run()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if upgradeSpec.Reboot {
|
|
|
|
utils.Reboot()
|
|
|
|
}
|
|
|
|
|
|
|
|
if upgradeSpec.PowerOff {
|
|
|
|
utils.PowerOFF()
|
|
|
|
}
|
|
|
|
|
|
|
|
return hook.Run(*c, upgradeSpec, hook.AfterUpgrade...)
|
2022-07-18 22:02:49 +00:00
|
|
|
}
|
2023-06-30 08:37:50 +00:00
|
|
|
|
|
|
|
// determineUpgradeImage asks the provider plugin for an image or constructs
|
|
|
|
// it using version and data from /etc/os-release
|
2023-09-28 09:27:27 +00:00
|
|
|
func determineUpgradeImage(version string) (*v1.ImageSource, error) {
|
2023-06-30 08:37:50 +00:00
|
|
|
var img string
|
|
|
|
bus.Manager.Response(events.EventVersionImage, func(p *pluggable.Plugin, r *pluggable.EventResponse) {
|
|
|
|
img = r.Data
|
|
|
|
})
|
|
|
|
|
|
|
|
_, err := bus.Manager.Publish(events.EventVersionImage, &events.VersionImagePayload{
|
|
|
|
Version: version,
|
|
|
|
})
|
|
|
|
if err != nil {
|
2023-09-28 09:27:27 +00:00
|
|
|
return nil, err
|
2023-06-30 08:37:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if img != "" {
|
2023-09-28 09:27:27 +00:00
|
|
|
return nil, nil
|
2023-06-30 08:37:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
registry, err := utils.OSRelease("IMAGE_REPO")
|
|
|
|
if err != nil {
|
2023-09-28 09:27:27 +00:00
|
|
|
return nil, fmt.Errorf("can't find IMAGE_REPO key under /etc/os-release %w", err)
|
2023-06-30 08:37:50 +00:00
|
|
|
}
|
|
|
|
|
2023-09-28 09:27:27 +00:00
|
|
|
return v1.NewSrcFromURI(fmt.Sprintf("%s:%s", registry, version))
|
2023-06-30 08:37:50 +00:00
|
|
|
}
|
2023-09-27 14:38:55 +00:00
|
|
|
|
2023-09-28 12:55:14 +00:00
|
|
|
// generateUpgradeConfForCLIArgs creates a kairos configuration for `--source` and `--recovery`
|
2023-09-28 11:19:48 +00:00
|
|
|
// command line arguments. It will be added to the rest of the configurations.
|
2023-09-28 12:55:14 +00:00
|
|
|
func generateUpgradeConfForCLIArgs(source string, upgradeRecovery bool) (string, error) {
|
2023-09-28 11:19:48 +00:00
|
|
|
upgrade := map[string](map[string]interface{}){
|
|
|
|
"upgrade": {},
|
|
|
|
}
|
2023-09-27 14:38:55 +00:00
|
|
|
|
2023-09-28 11:19:48 +00:00
|
|
|
if upgradeRecovery {
|
|
|
|
upgrade["upgrade"]["recovery"] = "true"
|
2023-09-27 14:38:55 +00:00
|
|
|
}
|
|
|
|
|
2023-09-28 11:19:48 +00:00
|
|
|
// Set uri both for active and recovery because we don't know what we are
|
|
|
|
// actually upgrading. The "upgradeRecovery" is just the command line argument.
|
|
|
|
// The user might have set it to "true" in the kairos config. Since we don't
|
|
|
|
// have access to that yet, we just set both uri values which shouldn't matter
|
|
|
|
// anyway, the right one will be used later in the process.
|
|
|
|
if source != "" {
|
|
|
|
upgrade["upgrade"]["recovery-system"] = map[string]string{
|
|
|
|
"uri": source,
|
|
|
|
}
|
|
|
|
upgrade["upgrade"]["system"] = map[string]string{
|
|
|
|
"uri": source,
|
2023-09-28 10:04:03 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-09-28 11:19:48 +00:00
|
|
|
d, err := json.Marshal(upgrade)
|
2023-09-28 10:04:03 +00:00
|
|
|
|
2023-09-28 11:19:48 +00:00
|
|
|
return string(d), err
|
2023-09-27 14:38:55 +00:00
|
|
|
}
|
2023-09-28 09:27:27 +00:00
|
|
|
|
|
|
|
func handleEmptySource(spec *v1.UpgradeSpec, version string, preReleases, force bool) error {
|
|
|
|
var err error
|
|
|
|
if spec.RecoveryUpgrade {
|
|
|
|
if spec.Recovery.Source.IsEmpty() {
|
|
|
|
spec.Recovery.Source, err = getLatestOrConstructSource(version, preReleases, force)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if spec.Active.Source.IsEmpty() {
|
|
|
|
spec.Active.Source, err = getLatestOrConstructSource(version, preReleases, force)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
func getLatestOrConstructSource(version string, preReleases, force bool) (*v1.ImageSource, error) {
|
|
|
|
var err error
|
|
|
|
if version == "" {
|
|
|
|
version, err = findLatestVersion(preReleases, force)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return determineUpgradeImage(version)
|
|
|
|
}
|
|
|
|
|
|
|
|
func findLatestVersion(preReleases, force bool) (string, error) {
|
|
|
|
fmt.Println("Searching for releases")
|
|
|
|
if preReleases {
|
|
|
|
fmt.Println("Including pre-releases")
|
|
|
|
}
|
|
|
|
releases := ListReleases(preReleases)
|
|
|
|
|
|
|
|
if len(releases) == 0 {
|
|
|
|
return "", fmt.Errorf("no releases found")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Using Original here because the parsing removes the v as its a semver. But it stores the original full version there
|
|
|
|
version := releases[0].Original()
|
|
|
|
|
|
|
|
if utils.Version() == version && !force {
|
2023-09-28 11:50:14 +00:00
|
|
|
return "", fmt.Errorf("version %s already installed. use --force to force upgrade", version)
|
2023-09-28 09:27:27 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
msg := fmt.Sprintf("Latest release is %s\nAre you sure you want to upgrade to this release? (y/n)", version)
|
|
|
|
reply, err := promptBool(events.YAMLPrompt{Prompt: msg, Default: "y"})
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
if reply == "false" {
|
|
|
|
return "", fmt.Errorf("cancelled by the user")
|
|
|
|
}
|
|
|
|
|
|
|
|
return version, nil
|
|
|
|
}
|
2023-09-28 11:50:14 +00:00
|
|
|
|
|
|
|
func generateUpgradeSpec(version, source string, force, strictValidations bool, dirs []string, preReleases, upgradeRecovery bool) (*v1.UpgradeSpec, *config.Config, error) {
|
2023-09-28 12:55:14 +00:00
|
|
|
cliConf, err := generateUpgradeConfForCLIArgs(source, upgradeRecovery)
|
2023-09-28 11:50:14 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
c, err := config.Scan(collector.Directories(dirs...),
|
2023-09-28 12:08:16 +00:00
|
|
|
collector.Readers(strings.NewReader(cliConf)),
|
2023-09-28 11:50:14 +00:00
|
|
|
collector.StrictValidation(strictValidations))
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
utils.SetEnv(c.Env)
|
|
|
|
|
|
|
|
// Load the upgrade Config from the system
|
|
|
|
upgradeSpec, err := config.ReadUpgradeSpecFromConfig(c)
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
err = handleEmptySource(upgradeSpec, version, preReleases, force)
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return upgradeSpec, c, nil
|
|
|
|
}
|