mirror of
https://github.com/kairos-io/kairos-agent.git
synced 2025-04-27 19:28:59 +00:00
there are 3 ways: - cli arg: --recovery - cli arg: --boot-entry - config setting: upgrade.recovery: true We only checked the config setting Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
252 lines
6.6 KiB
Go
252 lines
6.6 KiB
Go
package agent
|
|
|
|
import (
|
|
"encoding/json"
|
|
"fmt"
|
|
"strings"
|
|
|
|
hook "github.com/kairos-io/kairos-agent/v2/internal/agent/hooks"
|
|
"github.com/mudler/go-pluggable"
|
|
|
|
"github.com/kairos-io/kairos-agent/v2/internal/bus"
|
|
"github.com/kairos-io/kairos-agent/v2/pkg/action"
|
|
config "github.com/kairos-io/kairos-agent/v2/pkg/config"
|
|
v1 "github.com/kairos-io/kairos-agent/v2/pkg/types/v1"
|
|
"github.com/kairos-io/kairos-agent/v2/pkg/uki"
|
|
internalutils "github.com/kairos-io/kairos-agent/v2/pkg/utils"
|
|
events "github.com/kairos-io/kairos-sdk/bus"
|
|
"github.com/kairos-io/kairos-sdk/collector"
|
|
"github.com/kairos-io/kairos-sdk/utils"
|
|
"github.com/kairos-io/kairos-sdk/versioneer"
|
|
)
|
|
|
|
func CurrentImage() (string, error) {
|
|
artifact, err := versioneer.NewArtifactFromOSRelease()
|
|
if err != nil {
|
|
return "", fmt.Errorf("creating an Artifact from os-release: %w", err)
|
|
}
|
|
|
|
registryAndOrg, err := utils.OSRelease("REGISTRY_AND_ORG")
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
return artifact.ContainerName(registryAndOrg)
|
|
}
|
|
|
|
func ListAllReleases(includePrereleases bool) ([]string, error) {
|
|
var err error
|
|
|
|
tagList, err := allReleases()
|
|
if err != nil {
|
|
return []string{}, err
|
|
}
|
|
|
|
if !includePrereleases {
|
|
tagList = tagList.NoPrereleases()
|
|
}
|
|
|
|
return tagList.FullImages()
|
|
}
|
|
|
|
func ListNewerReleases(includePrereleases bool) ([]string, error) {
|
|
var err error
|
|
|
|
tagList, err := newerReleases()
|
|
if err != nil {
|
|
return []string{}, err
|
|
}
|
|
|
|
if !includePrereleases {
|
|
tagList = tagList.NoPrereleases()
|
|
}
|
|
|
|
return tagList.FullImages()
|
|
}
|
|
|
|
func Upgrade(
|
|
source string, force, strictValidations bool, dirs []string, upgradeEntry string, preReleases bool) error {
|
|
bus.Manager.Initialize()
|
|
|
|
if internalutils.UkiBootMode() == internalutils.UkiHDD {
|
|
return upgradeUki(source, dirs, upgradeEntry, strictValidations)
|
|
} else {
|
|
return upgrade(source, force, strictValidations, dirs, upgradeEntry, preReleases)
|
|
}
|
|
}
|
|
|
|
func upgrade(source string, force, strictValidations bool, dirs []string, upgradeEntry string, preReleases bool) error {
|
|
upgradeSpec, c, err := generateUpgradeSpec(source, force, strictValidations, dirs, upgradeEntry, preReleases)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
err = upgradeSpec.Sanitize()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
upgradeAction := action.NewUpgradeAction(c, upgradeSpec)
|
|
|
|
err = upgradeAction.Run()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return hook.Run(*c, upgradeSpec, hook.AfterUpgrade...)
|
|
}
|
|
|
|
func allReleases() (versioneer.TagList, error) {
|
|
artifact, err := versioneer.NewArtifactFromOSRelease()
|
|
if err != nil {
|
|
return versioneer.TagList{}, err
|
|
}
|
|
|
|
registryAndOrg, err := utils.OSRelease("REGISTRY_AND_ORG")
|
|
if err != nil {
|
|
return versioneer.TagList{}, err
|
|
}
|
|
|
|
tagList, err := artifact.TagList(registryAndOrg)
|
|
if err != nil {
|
|
return tagList, err
|
|
}
|
|
|
|
return tagList.OtherAnyVersion().RSorted(), nil
|
|
}
|
|
|
|
func newerReleases() (versioneer.TagList, error) {
|
|
artifact, err := versioneer.NewArtifactFromOSRelease()
|
|
if err != nil {
|
|
return versioneer.TagList{}, err
|
|
}
|
|
|
|
registryAndOrg, err := utils.OSRelease("REGISTRY_AND_ORG")
|
|
if err != nil {
|
|
return versioneer.TagList{}, err
|
|
}
|
|
|
|
tagList, err := artifact.TagList(registryAndOrg)
|
|
if err != nil {
|
|
return tagList, err
|
|
}
|
|
return tagList.NewerAnyVersion().RSorted(), nil
|
|
}
|
|
|
|
// generateUpgradeConfForCLIArgs creates a kairos configuration for `--source` and `--recovery`
|
|
// command line arguments. It will be added to the rest of the configurations.
|
|
func generateUpgradeConfForCLIArgs(source, upgradeEntry string) (string, error) {
|
|
upgradeConfig := ExtraConfigUpgrade{}
|
|
|
|
upgradeConfig.Upgrade.Entry = upgradeEntry
|
|
|
|
// Set uri both for active and recovery because we don't know what we are
|
|
// actually upgrading. The "upgradeRecovery" is just the command line argument.
|
|
// The user might have set it to "true" in the kairos config. Since we don't
|
|
// have access to that yet, we just set both uri values which shouldn't matter
|
|
// anyway, the right one will be used later in the process.
|
|
if source != "" {
|
|
upgradeConfig.Install.RecoverySystem.URI = source
|
|
upgradeConfig.Install.System.URI = source
|
|
}
|
|
|
|
d, err := json.Marshal(upgradeConfig)
|
|
|
|
return string(d), err
|
|
}
|
|
|
|
func generateUpgradeSpec(sourceImageURL string, force, strictValidations bool, dirs []string, upgradeEntry string, preReleases bool) (*v1.UpgradeSpec, *config.Config, error) {
|
|
cliConf, err := generateUpgradeConfForCLIArgs(sourceImageURL, upgradeEntry)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
c, err := config.Scan(collector.Directories(dirs...),
|
|
collector.Readers(strings.NewReader(cliConf)),
|
|
collector.StrictValidation(strictValidations))
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
utils.SetEnv(c.Env)
|
|
|
|
// Load the upgrade Config from the system
|
|
upgradeSpec, err := config.ReadUpgradeSpecFromConfig(c)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
return upgradeSpec, c, nil
|
|
}
|
|
|
|
func getReleasesFromProvider(includePrereleases bool) ([]string, error) {
|
|
var result []string
|
|
bus.Manager.Response(events.EventAvailableReleases, func(p *pluggable.Plugin, r *pluggable.EventResponse) {
|
|
if r.Data == "" {
|
|
return
|
|
}
|
|
if err := json.Unmarshal([]byte(r.Data), &result); err != nil {
|
|
fmt.Printf("warn: failed unmarshalling data: '%s'\n", err.Error())
|
|
}
|
|
})
|
|
|
|
configYAML := "IncludePreReleases: true"
|
|
_, err := bus.Manager.Publish(events.EventAvailableReleases, events.EventPayload{Config: configYAML})
|
|
if err != nil {
|
|
return result, fmt.Errorf("failed publishing event: %w", err)
|
|
}
|
|
|
|
return result, nil
|
|
}
|
|
|
|
func upgradeUki(source string, dirs []string, upgradeEntry string, strictValidations bool) error {
|
|
cliConf, err := generateUpgradeConfForCLIArgs(source, upgradeEntry)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
c, err := config.Scan(collector.Directories(dirs...),
|
|
collector.Readers(strings.NewReader(cliConf)),
|
|
collector.StrictValidation(strictValidations))
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
utils.SetEnv(c.Env)
|
|
|
|
// Load the upgrade Config from the system
|
|
upgradeSpec, err := config.ReadUkiUpgradeSpecFromConfig(c)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
err = upgradeSpec.Sanitize()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
upgradeAction := uki.NewUpgradeAction(c, upgradeSpec)
|
|
|
|
err = upgradeAction.Run()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return hook.Run(*c, upgradeSpec, hook.AfterUpgrade...)
|
|
}
|
|
|
|
// ExtraConfigUpgrade is the struct that holds the upgrade options that come from flags and events
|
|
type ExtraConfigUpgrade struct {
|
|
Upgrade struct {
|
|
Entry string `json:"entry,omitempty"`
|
|
} `json:"upgrade,omitempty"`
|
|
Install struct {
|
|
RecoverySystem struct {
|
|
URI string `json:"uri,omitempty"`
|
|
} `json:"recovery-system,omitempty"`
|
|
System struct {
|
|
URI string `json:"uri,omitempty"`
|
|
} `json:"system,omitempty"`
|
|
} `json:"install,omitempty"`
|
|
}
|