mirror of
https://github.com/fleetdm/fleet
synced 2026-04-21 21:47:20 +00:00
For #32859. We can ignore the "Dependency review" failure in [CVE-2023-32698](https://github.com/advisories/GHSA-w7jw-q4fg-qc4c) because we already have the rules to ignore it (we are not vulnerable). I'm not updating nfpm to latest because it would require further changes on all deb/rpm generation (source code breaking changes on the golang interfaces). --- <img width="448" height="151" alt="screenshot-2025-09-11_08-38-20" src="https://github.com/user-attachments/assets/4c00b960-568a-48d9-8098-308c8ab8916f" /> <img width="391" height="73" alt="screenshot-2025-09-11_08-37-40" src="https://github.com/user-attachments/assets/dec6ea22-31f8-4930-b067-0b04b4ec2b5f" /> <img width="759" height="428" alt="Image" src="https://github.com/user-attachments/assets/0a76d070-4709-4a35-8e6e-caf869473d28" /> <img width="1178" height="634" alt="Image" src="https://github.com/user-attachments/assets/98e6fa2a-ba07-4a55-81aa-ad747f1c57b9" /> <img width="1388" height="830" alt="Image" src="https://github.com/user-attachments/assets/19d36bad-d01d-4130-b271-38bea2534833" /> <img width="933" height="930" alt="Image" src="https://github.com/user-attachments/assets/1d6a369b-65d7-46a4-98a6-e6f0b29be2c8" /> <img width="2241" height="693" alt="Image" src="https://github.com/user-attachments/assets/d8f98e97-f027-4c1c-ae5d-c4fa3b592a20" /> - [X] Changes file added for user-visible changes in `changes/`, `orbit/changes/` or `ee/fleetd-chrome/changes`. See [Changes files](https://github.com/fleetdm/fleet/blob/main/docs/Contributing/guides/committing-changes.md#changes-files) for more information. ## Testing - [x] Added/updated automated tests - [X] QA'd all new/changed functionality manually
545 lines
17 KiB
Go
545 lines
17 KiB
Go
package packaging
|
|
|
|
import (
|
|
"bytes"
|
|
"crypto/tls"
|
|
"errors"
|
|
"fmt"
|
|
"os"
|
|
"path/filepath"
|
|
"text/template"
|
|
|
|
"github.com/Masterminds/semver"
|
|
"github.com/fleetdm/fleet/v4/orbit/pkg/constant"
|
|
"github.com/fleetdm/fleet/v4/orbit/pkg/update"
|
|
"github.com/fleetdm/fleet/v4/pkg/secure"
|
|
"github.com/goreleaser/nfpm/v2"
|
|
"github.com/goreleaser/nfpm/v2/arch"
|
|
"github.com/goreleaser/nfpm/v2/files"
|
|
"github.com/goreleaser/nfpm/v2/rpm"
|
|
"github.com/rs/zerolog/log"
|
|
)
|
|
|
|
// Reusable snippet to conditionally wait to restart orbit upon an in-band upgrade
|
|
// (orbit installing an update to itself). Without this, the maintainer script will
|
|
// terminate orbit along with the package installation, aborting the install and
|
|
// potentially leaving the host in an unreachable state.
|
|
const postInstallSafeRestart = `
|
|
if test -z "${INSTALLER_PATH:-}"; then
|
|
systemctl restart orbit.service 2>&1
|
|
else
|
|
echo "Detected in-band upgrade (orbit upgrading orbit). Delaying service"
|
|
echo "restart to prevent orbit from being stopped mid-script."
|
|
if command -v systemd-run >/dev/null 2>&1; then
|
|
systemd-run --on-active=60 --working-directory=/ systemctl restart --no-block orbit.service
|
|
else
|
|
echo "...nevermind, systemd-run not available, exiting postinst"
|
|
echo "without restarting."
|
|
fi
|
|
fi
|
|
`
|
|
|
|
func buildNFPM(opt Options, pkger nfpm.Packager) (string, error) {
|
|
// Initialize directories
|
|
tmpDir, err := initializeTempDir()
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
defer os.RemoveAll(tmpDir)
|
|
|
|
rootDir := filepath.Join(tmpDir, "root")
|
|
if err := secure.MkdirAll(rootDir, constant.DefaultDirMode); err != nil {
|
|
return "", fmt.Errorf("create root dir: %w", err)
|
|
}
|
|
orbitRoot := filepath.Join(rootDir, "opt", "orbit")
|
|
if err := secure.MkdirAll(orbitRoot, constant.DefaultDirMode); err != nil {
|
|
return "", fmt.Errorf("create orbit dir: %w", err)
|
|
}
|
|
|
|
if opt.Architecture != ArchAmd64 && opt.Architecture != ArchArm64 {
|
|
return "", fmt.Errorf("Invalid architecture: %s", opt.Architecture)
|
|
}
|
|
|
|
// Initialize autoupdate metadata
|
|
updateOpt := update.DefaultOptions
|
|
|
|
updateOpt.RootDirectory = orbitRoot
|
|
if opt.Architecture == ArchArm64 {
|
|
updateOpt.Targets = update.LinuxArm64Targets
|
|
} else {
|
|
updateOpt.Targets = update.LinuxTargets
|
|
}
|
|
updateOpt.ServerCertificatePath = opt.UpdateTLSServerCertificate
|
|
|
|
if opt.UpdateTLSClientCertificate != "" {
|
|
updateClientCrt, err := tls.LoadX509KeyPair(opt.UpdateTLSClientCertificate, opt.UpdateTLSClientKey)
|
|
if err != nil {
|
|
return "", fmt.Errorf("error loading update client certificate and key: %w", err)
|
|
}
|
|
updateOpt.ClientCertificate = &updateClientCrt
|
|
}
|
|
|
|
if opt.Desktop {
|
|
if opt.Architecture == ArchArm64 {
|
|
updateOpt.Targets[constant.DesktopTUFTargetName] = update.DesktopLinuxArm64Target
|
|
} else {
|
|
updateOpt.Targets[constant.DesktopTUFTargetName] = update.DesktopLinuxTarget
|
|
}
|
|
// Override default channel with the provided value.
|
|
updateOpt.Targets.SetTargetChannel(constant.DesktopTUFTargetName, opt.DesktopChannel)
|
|
}
|
|
|
|
// Override default channels with the provided values.
|
|
updateOpt.Targets.SetTargetChannel(constant.OrbitTUFTargetName, opt.OrbitChannel)
|
|
updateOpt.Targets.SetTargetChannel(constant.OsqueryTUFTargetName, opt.OsquerydChannel)
|
|
|
|
updateOpt.ServerURL = opt.UpdateURL
|
|
if opt.UpdateRoots != "" {
|
|
updateOpt.RootKeys = opt.UpdateRoots
|
|
}
|
|
|
|
updatesData, err := InitializeUpdates(updateOpt)
|
|
if err != nil {
|
|
return "", fmt.Errorf("initialize updates: %w", err)
|
|
}
|
|
log.Debug().Stringer("data", updatesData).Msg("updates initialized")
|
|
if opt.Version == "" {
|
|
// We set the package version to orbit's latest version.
|
|
opt.Version = updatesData.OrbitVersion
|
|
}
|
|
|
|
varLibSymlink := false
|
|
if orbitSemVer, err := semver.NewVersion(updatesData.OrbitVersion); err == nil {
|
|
if orbitSemVer.LessThan(semver.MustParse("0.0.11")) {
|
|
varLibSymlink = true
|
|
}
|
|
}
|
|
// If err != nil we assume non-legacy Orbit.
|
|
|
|
// Write files
|
|
|
|
_, isRPM := pkger.(*rpm.RPM)
|
|
|
|
if err := writeSystemdUnit(opt, rootDir); err != nil {
|
|
return "", fmt.Errorf("write systemd unit: %w", err)
|
|
}
|
|
|
|
if err := writeEnvFile(opt, rootDir); err != nil {
|
|
return "", fmt.Errorf("write env file: %w", err)
|
|
}
|
|
|
|
if err := writeOsqueryFlagfile(opt, orbitRoot); err != nil {
|
|
return "", fmt.Errorf("write flagfile: %w", err)
|
|
}
|
|
|
|
if err := writeOsqueryCertPEM(opt, orbitRoot); err != nil {
|
|
return "", fmt.Errorf("write certs.pem: %w", err)
|
|
}
|
|
|
|
postInstallPath := filepath.Join(tmpDir, "postinstall.sh")
|
|
if err := writePostInstall(opt, postInstallPath); err != nil {
|
|
return "", fmt.Errorf("write postinstall script: %w", err)
|
|
}
|
|
preRemovePath := filepath.Join(tmpDir, "preremove.sh")
|
|
if err := writePreRemove(pkger, preRemovePath); err != nil {
|
|
return "", fmt.Errorf("write preremove script: %w", err)
|
|
}
|
|
postRemovePath := filepath.Join(tmpDir, "postremove.sh")
|
|
if err := writePostRemove(postRemovePath); err != nil {
|
|
return "", fmt.Errorf("write postremove script: %w", err)
|
|
}
|
|
var postTransPath string
|
|
if isRPM {
|
|
postTransPath = filepath.Join(tmpDir, "posttrans.sh")
|
|
if err := writeRPMPostTrans(opt, postTransPath); err != nil {
|
|
return "", fmt.Errorf("write RPM posttrans script: %w", err)
|
|
}
|
|
}
|
|
|
|
if opt.FleetCertificate != "" {
|
|
if err := writeFleetServerCertificate(opt, orbitRoot); err != nil {
|
|
return "", fmt.Errorf("write fleet server certificate: %w", err)
|
|
}
|
|
}
|
|
|
|
if opt.FleetTLSClientCertificate != "" {
|
|
if err := writeFleetClientCertificate(opt, orbitRoot); err != nil {
|
|
return "", fmt.Errorf("write fleet client certificate: %w", err)
|
|
}
|
|
}
|
|
|
|
if opt.UpdateTLSServerCertificate != "" {
|
|
if err := writeUpdateServerCertificate(opt, orbitRoot); err != nil {
|
|
return "", fmt.Errorf("write update server certificate: %w", err)
|
|
}
|
|
}
|
|
|
|
if opt.UpdateTLSClientCertificate != "" {
|
|
if err := writeUpdateClientCertificate(opt, orbitRoot); err != nil {
|
|
return "", fmt.Errorf("write update client certificate: %w", err)
|
|
}
|
|
}
|
|
|
|
// Pick up all file contents
|
|
|
|
contents := files.Contents{
|
|
&files.Content{
|
|
Source: filepath.Join(rootDir, "**"),
|
|
Destination: "/",
|
|
},
|
|
// Symlink current into /opt/orbit/bin/orbit/orbit
|
|
&files.Content{
|
|
Source: "/opt/orbit/bin/orbit/" + updateOpt.Targets[constant.OrbitTUFTargetName].Platform + "/" + opt.OrbitChannel + "/orbit",
|
|
Destination: "/opt/orbit/bin/orbit/orbit",
|
|
Type: "symlink",
|
|
FileInfo: &files.ContentFileInfo{
|
|
Mode: constant.DefaultExecutableMode | os.ModeSymlink,
|
|
},
|
|
},
|
|
// Symlink current into /usr/local/bin
|
|
&files.Content{
|
|
Source: "/opt/orbit/bin/orbit/orbit",
|
|
Destination: "/usr/local/bin/orbit",
|
|
Type: "symlink",
|
|
FileInfo: &files.ContentFileInfo{
|
|
Mode: constant.DefaultExecutableMode | os.ModeSymlink,
|
|
},
|
|
},
|
|
}
|
|
|
|
// Add empty folders to be created.
|
|
for _, emptyFolder := range []string{"/var/log/osquery", "/var/log/orbit"} {
|
|
contents = append(contents, (&files.Content{
|
|
Destination: emptyFolder,
|
|
Type: "dir",
|
|
}).WithFileInfoDefaults())
|
|
}
|
|
|
|
if varLibSymlink {
|
|
contents = append(contents,
|
|
// Symlink needed to support old versions of orbit.
|
|
&files.Content{
|
|
Source: "/opt/orbit",
|
|
Destination: "/var/lib/orbit",
|
|
Type: "symlink",
|
|
FileInfo: &files.ContentFileInfo{
|
|
Mode: os.ModeSymlink,
|
|
},
|
|
})
|
|
}
|
|
|
|
contents, err = files.ExpandContentGlobs(contents, false)
|
|
if err != nil {
|
|
return "", fmt.Errorf("glob contents: %w", err)
|
|
}
|
|
for _, c := range contents {
|
|
log.Debug().Interface("file", c).Msg("added file")
|
|
}
|
|
|
|
rpmInfo := nfpm.RPM{}
|
|
if _, ok := pkger.(*rpm.RPM); ok {
|
|
rpmInfo.Scripts.PostTrans = postTransPath
|
|
}
|
|
|
|
archLinuxInfo := nfpm.ArchLinux{}
|
|
if _, ok := pkger.(arch.ArchLinux); ok {
|
|
archLinuxInfo.Packager = "Fleet"
|
|
preUpgradePath := filepath.Join(tmpDir, "preupgrade.sh")
|
|
if err := writeArchLinuxPreUpgrade(preUpgradePath); err != nil {
|
|
return "", fmt.Errorf("write preupgrade script: %w", err)
|
|
}
|
|
archLinuxInfo.Scripts.PreUpgrade = preUpgradePath
|
|
archLinuxInfo.Scripts.PostUpgrade = postInstallPath
|
|
}
|
|
|
|
// Build package
|
|
info := &nfpm.Info{
|
|
Name: "fleet-osquery",
|
|
Version: opt.Version,
|
|
Description: "Fleet osquery -- runtime and autoupdater",
|
|
Arch: opt.Architecture,
|
|
Maintainer: "Fleet Device Management",
|
|
Vendor: "Fleet Device Management",
|
|
License: "https://github.com/fleetdm/fleet/blob/main/LICENSE",
|
|
Homepage: "https://fleetdm.com",
|
|
Overridables: nfpm.Overridables{
|
|
Contents: contents,
|
|
Scripts: nfpm.Scripts{
|
|
PostInstall: postInstallPath,
|
|
PreRemove: preRemovePath,
|
|
PostRemove: postRemovePath,
|
|
},
|
|
RPM: rpmInfo,
|
|
ArchLinux: archLinuxInfo,
|
|
},
|
|
}
|
|
filename := pkger.ConventionalFileName(info)
|
|
if opt.CustomOutfile != "" {
|
|
filename = opt.CustomOutfile
|
|
}
|
|
if opt.NativeTooling {
|
|
filename = filepath.Join("build", filename)
|
|
}
|
|
|
|
if err := os.Remove(filename); err != nil && !errors.Is(err, os.ErrNotExist) {
|
|
return "", fmt.Errorf("removing existing file: %w", err)
|
|
}
|
|
|
|
if opt.NativeTooling {
|
|
if err := secure.MkdirAll(filepath.Dir(filename), 0o700); err != nil {
|
|
return "", fmt.Errorf("cannot create build dir: %w", err)
|
|
}
|
|
}
|
|
|
|
out, err := secure.OpenFile(filename, os.O_CREATE|os.O_RDWR, constant.DefaultFileMode)
|
|
if err != nil {
|
|
return "", fmt.Errorf("open output file: %w", err)
|
|
}
|
|
defer out.Close()
|
|
|
|
if err := pkger.Package(info, out); err != nil {
|
|
return "", fmt.Errorf("write package: %w", err)
|
|
}
|
|
if err := out.Sync(); err != nil {
|
|
return "", fmt.Errorf("sync output file: %w", err)
|
|
}
|
|
log.Info().Str("path", filename).Msg("wrote package")
|
|
|
|
return filename, nil
|
|
}
|
|
|
|
func writeSystemdUnit(opt Options, rootPath string) error {
|
|
systemdRoot := filepath.Join(rootPath, "usr", "lib", "systemd", "system")
|
|
if err := secure.MkdirAll(systemdRoot, constant.DefaultDirMode); err != nil {
|
|
return fmt.Errorf("create systemd dir: %w", err)
|
|
}
|
|
if err := os.WriteFile(
|
|
filepath.Join(systemdRoot, "orbit.service"),
|
|
[]byte(`
|
|
[Unit]
|
|
Description=Orbit osquery
|
|
After=network.service syslog.service
|
|
StartLimitIntervalSec=0
|
|
|
|
[Service]
|
|
TimeoutStartSec=0
|
|
EnvironmentFile=/etc/default/orbit
|
|
ExecStart=/opt/orbit/bin/orbit/orbit
|
|
Restart=always
|
|
RestartSec=1
|
|
KillMode=control-group
|
|
KillSignal=SIGTERM
|
|
CPUQuota=20%
|
|
|
|
[Install]
|
|
WantedBy=multi-user.target
|
|
`),
|
|
constant.DefaultSystemdUnitMode,
|
|
); err != nil {
|
|
return fmt.Errorf("write file: %w", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
var envTemplate = template.Must(template.New("env").Parse(`
|
|
ORBIT_UPDATE_URL={{ .UpdateURL }}
|
|
ORBIT_ORBIT_CHANNEL={{ .OrbitChannel }}
|
|
ORBIT_OSQUERYD_CHANNEL={{ .OsquerydChannel }}
|
|
ORBIT_UPDATE_INTERVAL={{ .OrbitUpdateInterval }}
|
|
{{ if .Desktop }}
|
|
ORBIT_FLEET_DESKTOP=true
|
|
ORBIT_DESKTOP_CHANNEL={{ .DesktopChannel }}
|
|
{{ if .FleetDesktopAlternativeBrowserHost }}
|
|
ORBIT_FLEET_DESKTOP_ALTERNATIVE_BROWSER_HOST={{ .FleetDesktopAlternativeBrowserHost }}
|
|
{{ end }}
|
|
{{ end }}
|
|
{{ if .Insecure }}ORBIT_INSECURE=true{{ end }}
|
|
{{ if .DisableUpdates }}ORBIT_DISABLE_UPDATES=true{{ end }}
|
|
{{ if .FleetURL }}ORBIT_FLEET_URL={{.FleetURL}}{{ end }}
|
|
{{ if .FleetCertificate }}ORBIT_FLEET_CERTIFICATE=/opt/orbit/fleet.pem{{ end }}
|
|
{{ if .UpdateTLSServerCertificate }}ORBIT_UPDATE_TLS_CERTIFICATE=/opt/orbit/update.pem{{ end }}
|
|
{{ if .EnrollSecret }}ORBIT_ENROLL_SECRET={{.EnrollSecret}}{{ end }}
|
|
{{ if .Debug }}ORBIT_DEBUG=true{{ end }}
|
|
{{ if .EnableScripts }}ORBIT_ENABLE_SCRIPTS=true{{ end }}
|
|
{{ if and (ne .HostIdentifier "") (ne .HostIdentifier "uuid") }}ORBIT_HOST_IDENTIFIER={{.HostIdentifier}}{{ end }}
|
|
{{ if .OsqueryDB }}ORBIT_OSQUERY_DB={{.OsqueryDB}}{{ end }}
|
|
{{ if .EndUserEmail }}ORBIT_END_USER_EMAIL={{.EndUserEmail}}{{ end }}
|
|
{{ if .FleetManagedHostIdentityCertificate }}ORBIT_FLEET_MANAGED_HOST_IDENTITY_CERTIFICATE=true{{ end }}
|
|
{{ if .DisableSetupExperience }}ORBIT_DISABLE_SETUP_EXPERIENCE=true{{ end }}
|
|
`))
|
|
|
|
func writeEnvFile(opt Options, rootPath string) error {
|
|
envRoot := filepath.Join(rootPath, "etc", "default")
|
|
if err := secure.MkdirAll(envRoot, constant.DefaultDirMode); err != nil {
|
|
return fmt.Errorf("create env dir: %w", err)
|
|
}
|
|
|
|
var contents bytes.Buffer
|
|
if err := envTemplate.Execute(&contents, opt); err != nil {
|
|
return fmt.Errorf("execute template: %w", err)
|
|
}
|
|
|
|
if err := os.WriteFile(
|
|
filepath.Join(envRoot, "orbit"),
|
|
contents.Bytes(),
|
|
constant.DefaultFileMode,
|
|
); err != nil {
|
|
return fmt.Errorf("write file: %w", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
var postInstallTemplate = template.Must(template.New("postinstall").Parse(`#!/bin/sh
|
|
|
|
# Exit on error
|
|
set -e
|
|
|
|
# If we have a systemd, daemon-reload away now
|
|
if command -v systemctl >/dev/null 2>&1; then
|
|
systemctl daemon-reload >/dev/null 2>&1
|
|
{{ if .StartService -}}
|
|
` + postInstallSafeRestart + `
|
|
systemctl enable orbit.service 2>&1
|
|
{{- end}}
|
|
fi
|
|
`))
|
|
|
|
func writePostInstall(opt Options, path string) error {
|
|
var contents bytes.Buffer
|
|
if err := postInstallTemplate.Execute(&contents, opt); err != nil {
|
|
return fmt.Errorf("execute template: %w", err)
|
|
}
|
|
|
|
if err := os.WriteFile(path, contents.Bytes(), constant.DefaultFileMode); err != nil {
|
|
return fmt.Errorf("write file: %w", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func writePreRemove(pkger nfpm.Packager, path string) error {
|
|
// We add `|| true` in case the service is not running
|
|
// or has been manually disabled already. Otherwise,
|
|
// uninstallation fails.
|
|
//
|
|
// Upgrades require special considerations.
|
|
//
|
|
// On Debian systems, the old package is removed BEFORE the
|
|
// new package is installed. The old package's prerm script is
|
|
// called with the first argument set to "upgrade" if the
|
|
// package is being upgraded. In this case, we do not stop or
|
|
// disable the service; it will be restarted by the post-install
|
|
// script. If called with "remove" or "deconfigure", we should
|
|
// stop and disable any running orbit service.
|
|
// https://www.debian.org/doc/debian-policy/ch-maintainerscripts.html#details-of-unpack-phase-of-installation-or-upgrade
|
|
//
|
|
// On RPM systems, the old package is removed AFTER the new
|
|
// package is installed. The preun script is called with the
|
|
// argument "0" upon uninstall and "1" upon upgrade.
|
|
// https://docs.fedoraproject.org/en-US/packaging-guidelines/Scriptlets/#_syntax
|
|
// https://docs.fedoraproject.org/en-US/packaging-guidelines/Scriptlets/#ordering
|
|
//
|
|
// "pkill fleet-desktop" is required because the application
|
|
// runs as user (separate from sudo command that launched it),
|
|
// so on some systems it's not killed properly.
|
|
preRemoveScript := `#!/bin/sh
|
|
|
|
case "${1:-}" in
|
|
1|remove|deconfigure)
|
|
systemctl disable --now orbit.service || true
|
|
pkill fleet-desktop || true
|
|
;;
|
|
0|upgrade)
|
|
;;
|
|
esac
|
|
|
|
`
|
|
// pre_remove script on Arch Linux receives the old version as argument.
|
|
_, isArchLinux := pkger.(arch.ArchLinux)
|
|
if isArchLinux {
|
|
preRemoveScript = `#!/bin/sh
|
|
|
|
systemctl disable --now orbit.service || true
|
|
pkill fleet-desktop || true
|
|
|
|
`
|
|
}
|
|
if err := os.WriteFile(path, []byte(preRemoveScript), constant.DefaultFileMode); err != nil {
|
|
return fmt.Errorf("write file: %w", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func writePostRemove(path string) error {
|
|
if err := os.WriteFile(path, []byte(`#!/bin/sh
|
|
|
|
# For RPM during uninstall, $1 is 0
|
|
# For Debian during remove, $1 is "remove"
|
|
if [ "$1" = 0 ] || [ "$1" = "remove" ]; then
|
|
rm -rf /var/lib/orbit /var/log/orbit /usr/local/bin/orbit /etc/default/orbit /usr/lib/systemd/system/orbit.service /opt/orbit
|
|
fi
|
|
`), constant.DefaultFileMode); err != nil {
|
|
return fmt.Errorf("write file: %w", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// postTransTemplate contains the template for RPM posttrans scriptlet (used when upgrading).
|
|
// See https://docs.fedoraproject.org/en-US/packaging-guidelines/Scriptlets/.
|
|
//
|
|
// We cannot rely on "$1" because it's always "0" for RPM < 4.12
|
|
// (see https://github.com/rpm-software-management/rpm/commit/ab069ec876639d46d12dd76dad54fd8fb762e43d)
|
|
// thus we check if orbit service is enabled, and if not we enable it (because posttrans
|
|
// will run both on "install" and "upgrade").
|
|
var postTransTemplate = template.Must(template.New("posttrans").Parse(`#!/bin/sh
|
|
|
|
# Exit on error
|
|
set -e
|
|
|
|
if ! systemctl is-enabled orbit >/dev/null 2>&1; then
|
|
# If we have a systemd, daemon-reload away now
|
|
if command -v systemctl >/dev/null 2>&1; then
|
|
systemctl daemon-reload >/dev/null 2>&1
|
|
{{ if .StartService -}}
|
|
` + postInstallSafeRestart + `
|
|
systemctl enable orbit.service 2>&1
|
|
{{- end}}
|
|
fi
|
|
fi
|
|
`))
|
|
|
|
// writeRPMPostTrans sets the posttrans scriptlets necessary to support RPM upgrades.
|
|
func writeRPMPostTrans(opt Options, path string) error {
|
|
var contents bytes.Buffer
|
|
if err := postTransTemplate.Execute(&contents, opt); err != nil {
|
|
return fmt.Errorf("execute template: %w", err)
|
|
}
|
|
if err := os.WriteFile(path, contents.Bytes(), constant.DefaultFileMode); err != nil {
|
|
return fmt.Errorf("write file: %w", err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func writeArchLinuxPreUpgrade(path string) error {
|
|
// Currently the pre-upgrade script for ArchLinux just cleanly
|
|
// brings the service down.
|
|
//
|
|
// We add `|| true` in case the service is not running
|
|
// or has been manually disabled already. Otherwise,
|
|
// script might return non-zero exit code.
|
|
const preUpgradeScript = `#!/bin/sh
|
|
|
|
systemctl disable --now orbit.service || true
|
|
pkill fleet-desktop || true
|
|
|
|
`
|
|
if err := os.WriteFile(path, []byte(preUpgradeScript), constant.DefaultFileMode); err != nil {
|
|
return fmt.Errorf("write file: %w", err)
|
|
}
|
|
|
|
return nil
|
|
}
|