mirror of https://github.com/minio/minio.git
				
				
				
			
		
			
				
	
	
		
			628 lines
		
	
	
		
			19 KiB
		
	
	
	
		
			Go
		
	
	
	
			
		
		
	
	
			628 lines
		
	
	
		
			19 KiB
		
	
	
	
		
			Go
		
	
	
	
| // Copyright (c) 2015-2021 MinIO, Inc.
 | |
| //
 | |
| // This file is part of MinIO Object Storage stack
 | |
| //
 | |
| // This program is free software: you can redistribute it and/or modify
 | |
| // it under the terms of the GNU Affero General Public License as published by
 | |
| // the Free Software Foundation, either version 3 of the License, or
 | |
| // (at your option) any later version.
 | |
| //
 | |
| // This program is distributed in the hope that it will be useful
 | |
| // but WITHOUT ANY WARRANTY; without even the implied warranty of
 | |
| // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | |
| // GNU Affero General Public License for more details.
 | |
| //
 | |
| // You should have received a copy of the GNU Affero General Public License
 | |
| // along with this program.  If not, see <http://www.gnu.org/licenses/>.
 | |
| 
 | |
| package cmd
 | |
| 
 | |
| import (
 | |
| 	"bufio"
 | |
| 	"bytes"
 | |
| 	"crypto"
 | |
| 	"crypto/tls"
 | |
| 	"encoding/hex"
 | |
| 	"errors"
 | |
| 	"fmt"
 | |
| 	"io"
 | |
| 	"net/http"
 | |
| 	"net/url"
 | |
| 	"os"
 | |
| 	"path"
 | |
| 	"path/filepath"
 | |
| 	"runtime"
 | |
| 	"strings"
 | |
| 	"sync/atomic"
 | |
| 	"time"
 | |
| 
 | |
| 	xhttp "github.com/minio/minio/internal/http"
 | |
| 	"github.com/minio/minio/internal/logger"
 | |
| 	"github.com/minio/pkg/v2/env"
 | |
| 	xnet "github.com/minio/pkg/v2/net"
 | |
| 	"github.com/minio/selfupdate"
 | |
| 	gopsutilcpu "github.com/shirou/gopsutil/v3/cpu"
 | |
| )
 | |
| 
 | |
| const (
 | |
| 	minioReleaseTagTimeLayout = "2006-01-02T15-04-05Z"
 | |
| 	minioOSARCH               = runtime.GOOS + "-" + runtime.GOARCH
 | |
| 	minioReleaseURL           = "https://dl.min.io/server/minio/release/" + minioOSARCH + SlashSeparator
 | |
| 
 | |
| 	envMinisignPubKey = "MINIO_UPDATE_MINISIGN_PUBKEY"
 | |
| 	updateTimeout     = 10 * time.Second
 | |
| )
 | |
| 
 | |
| // For windows our files have .exe additionally.
 | |
| var minioReleaseWindowsInfoURL = minioReleaseURL + "minio.exe.sha256sum"
 | |
| 
 | |
| // minioVersionToReleaseTime - parses a standard official release
 | |
| // MinIO version string.
 | |
| //
 | |
| // An official binary's version string is the release time formatted
 | |
| // with RFC3339 (in UTC) - e.g. `2017-09-29T19:16:56Z`
 | |
| func minioVersionToReleaseTime(version string) (releaseTime time.Time, err error) {
 | |
| 	return time.Parse(time.RFC3339, version)
 | |
| }
 | |
| 
 | |
| // releaseTimeToReleaseTag - converts a time to a string formatted as
 | |
| // an official MinIO release tag.
 | |
| //
 | |
| // An official minio release tag looks like:
 | |
| // `RELEASE.2017-09-29T19-16-56Z`
 | |
| func releaseTimeToReleaseTag(releaseTime time.Time) string {
 | |
| 	return "RELEASE." + releaseTime.Format(minioReleaseTagTimeLayout)
 | |
| }
 | |
| 
 | |
| // releaseTagToReleaseTime - reverse of `releaseTimeToReleaseTag()`
 | |
| func releaseTagToReleaseTime(releaseTag string) (releaseTime time.Time, err error) {
 | |
| 	fields := strings.Split(releaseTag, ".")
 | |
| 	if len(fields) < 2 || len(fields) > 4 {
 | |
| 		return releaseTime, fmt.Errorf("%s is not a valid release tag", releaseTag)
 | |
| 	}
 | |
| 	if fields[0] != "RELEASE" {
 | |
| 		return releaseTime, fmt.Errorf("%s is not a valid release tag", releaseTag)
 | |
| 	}
 | |
| 	return time.Parse(minioReleaseTagTimeLayout, fields[1])
 | |
| }
 | |
| 
 | |
| // getModTime - get the file modification time of `path`
 | |
| func getModTime(path string) (t time.Time, err error) {
 | |
| 	// Convert to absolute path
 | |
| 	absPath, err := filepath.Abs(path)
 | |
| 	if err != nil {
 | |
| 		return t, fmt.Errorf("Unable to get absolute path of %s. %w", path, err)
 | |
| 	}
 | |
| 
 | |
| 	// Version is minio non-standard, we will use minio binary's
 | |
| 	// ModTime as release time.
 | |
| 	fi, err := Stat(absPath)
 | |
| 	if err != nil {
 | |
| 		return t, fmt.Errorf("Unable to get ModTime of %s. %w", absPath, err)
 | |
| 	}
 | |
| 
 | |
| 	// Return the ModTime
 | |
| 	return fi.ModTime().UTC(), nil
 | |
| }
 | |
| 
 | |
| // GetCurrentReleaseTime - returns this process's release time.  If it
 | |
| // is official minio version, parsed version is returned else minio
 | |
| // binary's mod time is returned.
 | |
| func GetCurrentReleaseTime() (releaseTime time.Time, err error) {
 | |
| 	if releaseTime, err = minioVersionToReleaseTime(Version); err == nil {
 | |
| 		return releaseTime, err
 | |
| 	}
 | |
| 
 | |
| 	// Looks like version is minio non-standard, we use minio
 | |
| 	// binary's ModTime as release time:
 | |
| 	return getModTime(os.Args[0])
 | |
| }
 | |
| 
 | |
| // IsDocker - returns if the environment minio is running in docker or
 | |
| // not. The check is a simple file existence check.
 | |
| //
 | |
| // https://github.com/moby/moby/blob/master/daemon/initlayer/setup_unix.go
 | |
| // https://github.com/containers/podman/blob/master/libpod/runtime.go
 | |
| //
 | |
| //	"/.dockerenv":        "file",
 | |
| //	"/run/.containerenv": "file",
 | |
| func IsDocker() bool {
 | |
| 	var err error
 | |
| 	for _, envfile := range []string{
 | |
| 		"/.dockerenv",
 | |
| 		"/run/.containerenv",
 | |
| 	} {
 | |
| 		_, err = os.Stat(envfile)
 | |
| 		if err == nil {
 | |
| 			return true
 | |
| 		}
 | |
| 	}
 | |
| 	if osIsNotExist(err) {
 | |
| 		// if none of the files are present we may be running inside
 | |
| 		// CRI-O, Containerd etc..
 | |
| 		// Fallback to our container specific ENVs if they are set.
 | |
| 		return env.IsSet("MINIO_ACCESS_KEY_FILE")
 | |
| 	}
 | |
| 
 | |
| 	// Log error, as we will not propagate it to caller
 | |
| 	logger.LogIf(GlobalContext, err)
 | |
| 
 | |
| 	return err == nil
 | |
| }
 | |
| 
 | |
| // IsDCOS returns true if minio is running in DCOS.
 | |
| func IsDCOS() bool {
 | |
| 	// http://mesos.apache.org/documentation/latest/docker-containerizer/
 | |
| 	// Mesos docker containerizer sets this value
 | |
| 	return env.Get("MESOS_CONTAINER_NAME", "") != ""
 | |
| }
 | |
| 
 | |
| // IsKubernetes returns true if minio is running in kubernetes.
 | |
| func IsKubernetes() bool {
 | |
| 	// Kubernetes env used to validate if we are
 | |
| 	// indeed running inside a kubernetes pod
 | |
| 	// is KUBERNETES_SERVICE_HOST
 | |
| 	// https://github.com/kubernetes/kubernetes/blob/master/pkg/kubelet/kubelet_pods.go#L541
 | |
| 	return env.Get("KUBERNETES_SERVICE_HOST", "") != ""
 | |
| }
 | |
| 
 | |
| // IsBOSH returns true if minio is deployed from a bosh package
 | |
| func IsBOSH() bool {
 | |
| 	// "/var/vcap/bosh" exists in BOSH deployed instance.
 | |
| 	_, err := os.Stat("/var/vcap/bosh")
 | |
| 	if osIsNotExist(err) {
 | |
| 		return false
 | |
| 	}
 | |
| 
 | |
| 	// Log error, as we will not propagate it to caller
 | |
| 	logger.LogIf(GlobalContext, err)
 | |
| 
 | |
| 	return err == nil
 | |
| }
 | |
| 
 | |
| // MinIO Helm chart uses DownwardAPIFile to write pod label info to /podinfo/labels
 | |
| // More info: https://kubernetes.io/docs/tasks/inject-data-application/downward-api-volume-expose-pod-information/#store-pod-fields
 | |
| // Check if this is Helm package installation and report helm chart version
 | |
| func getHelmVersion(helmInfoFilePath string) string {
 | |
| 	// Read the file exists.
 | |
| 	helmInfoFile, err := Open(helmInfoFilePath)
 | |
| 	if err != nil {
 | |
| 		// Log errors and return "" as MinIO can be deployed
 | |
| 		// without Helm charts as well.
 | |
| 		if !osIsNotExist(err) {
 | |
| 			reqInfo := (&logger.ReqInfo{}).AppendTags("helmInfoFilePath", helmInfoFilePath)
 | |
| 			ctx := logger.SetReqInfo(GlobalContext, reqInfo)
 | |
| 			logger.LogIf(ctx, err)
 | |
| 		}
 | |
| 		return ""
 | |
| 	}
 | |
| 	defer helmInfoFile.Close()
 | |
| 	scanner := bufio.NewScanner(helmInfoFile)
 | |
| 	for scanner.Scan() {
 | |
| 		if strings.Contains(scanner.Text(), "chart=") {
 | |
| 			helmChartVersion := strings.TrimPrefix(scanner.Text(), "chart=")
 | |
| 			// remove quotes from the chart version
 | |
| 			return strings.Trim(helmChartVersion, `"`)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	return ""
 | |
| }
 | |
| 
 | |
| // IsSourceBuild - returns if this binary is a non-official build from
 | |
| // source code.
 | |
| func IsSourceBuild() bool {
 | |
| 	_, err := minioVersionToReleaseTime(Version)
 | |
| 	return err != nil
 | |
| }
 | |
| 
 | |
| // IsPCFTile returns if server is running in PCF
 | |
| func IsPCFTile() bool {
 | |
| 	return env.Get("MINIO_PCF_TILE_VERSION", "") != ""
 | |
| }
 | |
| 
 | |
| // DO NOT CHANGE USER AGENT STYLE.
 | |
| // The style should be
 | |
| //
 | |
| //	MinIO (<OS>; <ARCH>[; <MODE>][; dcos][; kubernetes][; docker][; source]) MinIO/<VERSION> MinIO/<RELEASE-TAG> MinIO/<COMMIT-ID> [MinIO/universe-<PACKAGE-NAME>] [MinIO/helm-<HELM-VERSION>]
 | |
| //
 | |
| // Any change here should be discussed by opening an issue at
 | |
| // https://github.com/minio/minio/issues.
 | |
| func getUserAgent(mode string) string {
 | |
| 	userAgentParts := []string{}
 | |
| 	// Helper function to concisely append a pair of strings to a
 | |
| 	// the user-agent slice.
 | |
| 	uaAppend := func(p, q string) {
 | |
| 		userAgentParts = append(userAgentParts, p, q)
 | |
| 	}
 | |
| 
 | |
| 	uaAppend("MinIO (", runtime.GOOS)
 | |
| 	uaAppend("; ", runtime.GOARCH)
 | |
| 	if mode != "" {
 | |
| 		uaAppend("; ", mode)
 | |
| 	}
 | |
| 	if IsDCOS() {
 | |
| 		uaAppend("; ", "dcos")
 | |
| 	}
 | |
| 	if IsKubernetes() {
 | |
| 		uaAppend("; ", "kubernetes")
 | |
| 	}
 | |
| 	if IsDocker() {
 | |
| 		uaAppend("; ", "docker")
 | |
| 	}
 | |
| 	if IsBOSH() {
 | |
| 		uaAppend("; ", "bosh")
 | |
| 	}
 | |
| 	if IsSourceBuild() {
 | |
| 		uaAppend("; ", "source")
 | |
| 	}
 | |
| 
 | |
| 	uaAppend(") MinIO/", Version)
 | |
| 	uaAppend(" MinIO/", ReleaseTag)
 | |
| 	uaAppend(" MinIO/", CommitID)
 | |
| 	if IsDCOS() {
 | |
| 		universePkgVersion := env.Get("MARATHON_APP_LABEL_DCOS_PACKAGE_VERSION", "")
 | |
| 		// On DC/OS environment try to the get universe package version.
 | |
| 		if universePkgVersion != "" {
 | |
| 			uaAppend(" MinIO/universe-", universePkgVersion)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	if IsKubernetes() {
 | |
| 		// In Kubernetes environment, try to fetch the helm package version
 | |
| 		helmChartVersion := getHelmVersion("/podinfo/labels")
 | |
| 		if helmChartVersion != "" {
 | |
| 			uaAppend(" MinIO/helm-", helmChartVersion)
 | |
| 		}
 | |
| 		// In Kubernetes environment, try to fetch the Operator, VSPHERE plugin version
 | |
| 		opVersion := env.Get("MINIO_OPERATOR_VERSION", "")
 | |
| 		if opVersion != "" {
 | |
| 			uaAppend(" MinIO/operator-", opVersion)
 | |
| 		}
 | |
| 		vsphereVersion := env.Get("MINIO_VSPHERE_PLUGIN_VERSION", "")
 | |
| 		if vsphereVersion != "" {
 | |
| 			uaAppend(" MinIO/vsphere-plugin-", vsphereVersion)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	if IsPCFTile() {
 | |
| 		pcfTileVersion := env.Get("MINIO_PCF_TILE_VERSION", "")
 | |
| 		if pcfTileVersion != "" {
 | |
| 			uaAppend(" MinIO/pcf-tile-", pcfTileVersion)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	if cpus, err := gopsutilcpu.Info(); err == nil && len(cpus) > 0 {
 | |
| 		cpuMap := make(map[string]struct{}, len(cpus))
 | |
| 		coreMap := make(map[string]struct{}, len(cpus))
 | |
| 		for i := range cpus {
 | |
| 			cpuMap[cpus[i].PhysicalID] = struct{}{}
 | |
| 			coreMap[cpus[i].CoreID] = struct{}{}
 | |
| 		}
 | |
| 		cpu := cpus[0]
 | |
| 		uaAppend(" CPU ", fmt.Sprintf("(total_cpus:%d, total_cores:%d; vendor:%s; family:%s; model:%s; stepping:%d; model_name:%s)",
 | |
| 			len(cpuMap), len(coreMap), cpu.VendorID, cpu.Family, cpu.Model, cpu.Stepping, cpu.ModelName))
 | |
| 	}
 | |
| 
 | |
| 	return strings.Join(userAgentParts, "")
 | |
| }
 | |
| 
 | |
| func downloadReleaseURL(u *url.URL, timeout time.Duration, mode string) (content string, err error) {
 | |
| 	req, err := http.NewRequest(http.MethodGet, u.String(), nil)
 | |
| 	if err != nil {
 | |
| 		return content, AdminError{
 | |
| 			Code:       AdminUpdateUnexpectedFailure,
 | |
| 			Message:    err.Error(),
 | |
| 			StatusCode: http.StatusInternalServerError,
 | |
| 		}
 | |
| 	}
 | |
| 	req.Header.Set("User-Agent", getUserAgent(mode))
 | |
| 
 | |
| 	client := &http.Client{Transport: getUpdateTransport(timeout)}
 | |
| 	resp, err := client.Do(req)
 | |
| 	if err != nil {
 | |
| 		if xnet.IsNetworkOrHostDown(err, false) {
 | |
| 			return content, AdminError{
 | |
| 				Code:       AdminUpdateURLNotReachable,
 | |
| 				Message:    err.Error(),
 | |
| 				StatusCode: http.StatusServiceUnavailable,
 | |
| 			}
 | |
| 		}
 | |
| 		return content, AdminError{
 | |
| 			Code:       AdminUpdateUnexpectedFailure,
 | |
| 			Message:    err.Error(),
 | |
| 			StatusCode: http.StatusInternalServerError,
 | |
| 		}
 | |
| 	}
 | |
| 	if resp == nil {
 | |
| 		return content, AdminError{
 | |
| 			Code:       AdminUpdateUnexpectedFailure,
 | |
| 			Message:    fmt.Sprintf("No response from server to download URL %s", u),
 | |
| 			StatusCode: http.StatusInternalServerError,
 | |
| 		}
 | |
| 	}
 | |
| 	defer xhttp.DrainBody(resp.Body)
 | |
| 
 | |
| 	if resp.StatusCode != http.StatusOK {
 | |
| 		return content, AdminError{
 | |
| 			Code:       AdminUpdateUnexpectedFailure,
 | |
| 			Message:    fmt.Sprintf("Error downloading URL %s. Response: %v", u, resp.Status),
 | |
| 			StatusCode: resp.StatusCode,
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	contentBytes, err := io.ReadAll(resp.Body)
 | |
| 	if err != nil {
 | |
| 		return content, AdminError{
 | |
| 			Code:       AdminUpdateUnexpectedFailure,
 | |
| 			Message:    fmt.Sprintf("Error reading response. %s", err),
 | |
| 			StatusCode: http.StatusInternalServerError,
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	return string(contentBytes), nil
 | |
| }
 | |
| 
 | |
| // parseReleaseData - parses release info file content fetched from
 | |
| // official minio download server.
 | |
| //
 | |
| // The expected format is a single line with two words like:
 | |
| //
 | |
| // fbe246edbd382902db9a4035df7dce8cb441357d minio.RELEASE.2016-10-07T01-16-39Z.<hotfix_optional>
 | |
| //
 | |
| // The second word must be `minio.` appended to a standard release tag.
 | |
| func parseReleaseData(data string) (sha256Sum []byte, releaseTime time.Time, releaseInfo string, err error) {
 | |
| 	defer func() {
 | |
| 		if err != nil {
 | |
| 			err = AdminError{
 | |
| 				Code:       AdminUpdateUnexpectedFailure,
 | |
| 				Message:    err.Error(),
 | |
| 				StatusCode: http.StatusInternalServerError,
 | |
| 			}
 | |
| 		}
 | |
| 	}()
 | |
| 
 | |
| 	fields := strings.Fields(data)
 | |
| 	if len(fields) != 2 {
 | |
| 		err = fmt.Errorf("Unknown release data `%s`", data)
 | |
| 		return sha256Sum, releaseTime, releaseInfo, err
 | |
| 	}
 | |
| 
 | |
| 	sha256Sum, err = hex.DecodeString(fields[0])
 | |
| 	if err != nil {
 | |
| 		return sha256Sum, releaseTime, releaseInfo, err
 | |
| 	}
 | |
| 
 | |
| 	releaseInfo = fields[1]
 | |
| 
 | |
| 	// Split release of style minio.RELEASE.2019-08-21T19-40-07Z.<hotfix>
 | |
| 	nfields := strings.SplitN(releaseInfo, ".", 2)
 | |
| 	if len(nfields) != 2 {
 | |
| 		err = fmt.Errorf("Unknown release information `%s`", releaseInfo)
 | |
| 		return sha256Sum, releaseTime, releaseInfo, err
 | |
| 	}
 | |
| 	if nfields[0] != "minio" {
 | |
| 		err = fmt.Errorf("Unknown release `%s`", releaseInfo)
 | |
| 		return sha256Sum, releaseTime, releaseInfo, err
 | |
| 	}
 | |
| 
 | |
| 	releaseTime, err = releaseTagToReleaseTime(nfields[1])
 | |
| 	if err != nil {
 | |
| 		err = fmt.Errorf("Unknown release tag format. %w", err)
 | |
| 	}
 | |
| 
 | |
| 	return sha256Sum, releaseTime, releaseInfo, err
 | |
| }
 | |
| 
 | |
| func getUpdateTransport(timeout time.Duration) http.RoundTripper {
 | |
| 	var updateTransport http.RoundTripper = &http.Transport{
 | |
| 		Proxy:                 http.ProxyFromEnvironment,
 | |
| 		DialContext:           xhttp.NewCustomDialContext(timeout, globalTCPOptions),
 | |
| 		IdleConnTimeout:       timeout,
 | |
| 		TLSHandshakeTimeout:   timeout,
 | |
| 		ExpectContinueTimeout: timeout,
 | |
| 		TLSClientConfig: &tls.Config{
 | |
| 			RootCAs:            globalRootCAs,
 | |
| 			ClientSessionCache: tls.NewLRUClientSessionCache(tlsClientSessionCacheSize),
 | |
| 		},
 | |
| 		DisableCompression: true,
 | |
| 	}
 | |
| 	return updateTransport
 | |
| }
 | |
| 
 | |
| func getLatestReleaseTime(u *url.URL, timeout time.Duration, mode string) (sha256Sum []byte, releaseTime time.Time, err error) {
 | |
| 	data, err := downloadReleaseURL(u, timeout, mode)
 | |
| 	if err != nil {
 | |
| 		return sha256Sum, releaseTime, err
 | |
| 	}
 | |
| 
 | |
| 	sha256Sum, releaseTime, _, err = parseReleaseData(data)
 | |
| 	return
 | |
| }
 | |
| 
 | |
| const (
 | |
| 	// Kubernetes deployment doc link.
 | |
| 	kubernetesDeploymentDoc = "https://min.io/docs/minio/kubernetes/upstream/index.html#quickstart-for-kubernetes"
 | |
| 
 | |
| 	// Mesos deployment doc link.
 | |
| 	mesosDeploymentDoc = "https://min.io/docs/minio/kubernetes/upstream/index.html#quickstart-for-kubernetes"
 | |
| )
 | |
| 
 | |
| func getDownloadURL(releaseTag string) (downloadURL string) {
 | |
| 	// Check if we are in DCOS environment, return
 | |
| 	// deployment guide for update procedures.
 | |
| 	if IsDCOS() {
 | |
| 		return mesosDeploymentDoc
 | |
| 	}
 | |
| 
 | |
| 	// Check if we are in kubernetes environment, return
 | |
| 	// deployment guide for update procedures.
 | |
| 	if IsKubernetes() {
 | |
| 		return kubernetesDeploymentDoc
 | |
| 	}
 | |
| 
 | |
| 	// Check if we are docker environment, return docker update command
 | |
| 	if IsDocker() {
 | |
| 		// Construct release tag name.
 | |
| 		return fmt.Sprintf("podman pull quay.io/minio/minio:%s", releaseTag)
 | |
| 	}
 | |
| 
 | |
| 	// For binary only installations, we return link to the latest binary.
 | |
| 	if runtime.GOOS == "windows" {
 | |
| 		return minioReleaseURL + "minio.exe"
 | |
| 	}
 | |
| 
 | |
| 	return minioReleaseURL + "minio"
 | |
| }
 | |
| 
 | |
| func getUpdateReaderFromURL(u *url.URL, transport http.RoundTripper, mode string) (io.ReadCloser, error) {
 | |
| 	clnt := &http.Client{
 | |
| 		Transport: transport,
 | |
| 	}
 | |
| 	req, err := http.NewRequest(http.MethodGet, u.String(), nil)
 | |
| 	if err != nil {
 | |
| 		return nil, AdminError{
 | |
| 			Code:       AdminUpdateUnexpectedFailure,
 | |
| 			Message:    err.Error(),
 | |
| 			StatusCode: http.StatusInternalServerError,
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	req.Header.Set("User-Agent", getUserAgent(mode))
 | |
| 
 | |
| 	resp, err := clnt.Do(req)
 | |
| 	if err != nil {
 | |
| 		if xnet.IsNetworkOrHostDown(err, false) {
 | |
| 			return nil, AdminError{
 | |
| 				Code:       AdminUpdateURLNotReachable,
 | |
| 				Message:    err.Error(),
 | |
| 				StatusCode: http.StatusServiceUnavailable,
 | |
| 			}
 | |
| 		}
 | |
| 		return nil, AdminError{
 | |
| 			Code:       AdminUpdateUnexpectedFailure,
 | |
| 			Message:    err.Error(),
 | |
| 			StatusCode: http.StatusInternalServerError,
 | |
| 		}
 | |
| 	}
 | |
| 	return resp.Body, nil
 | |
| }
 | |
| 
 | |
| var updateInProgress uint32
 | |
| 
 | |
| // Function to get the reader from an architecture
 | |
| func downloadBinary(u *url.URL, mode string) (readerReturn []byte, err error) {
 | |
| 	transport := getUpdateTransport(30 * time.Second)
 | |
| 	var reader io.ReadCloser
 | |
| 	if u.Scheme == "https" || u.Scheme == "http" {
 | |
| 		reader, err = getUpdateReaderFromURL(u, transport, mode)
 | |
| 		if err != nil {
 | |
| 			return nil, err
 | |
| 		}
 | |
| 	} else {
 | |
| 		return nil, fmt.Errorf("unsupported protocol scheme: %s", u.Scheme)
 | |
| 	}
 | |
| 	defer xhttp.DrainBody(reader)
 | |
| 	// convert a Reader to bytes
 | |
| 	binaryFile, err := io.ReadAll(reader)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	return binaryFile, nil
 | |
| }
 | |
| 
 | |
| const (
 | |
| 	// Update this whenever the official minisign pubkey is rotated.
 | |
| 	defaultMinisignPubkey = "RWTx5Zr1tiHQLwG9keckT0c45M3AGeHD6IvimQHpyRywVWGbP1aVSGav"
 | |
| )
 | |
| 
 | |
| func verifyBinary(u *url.URL, sha256Sum []byte, releaseInfo, mode string, reader []byte) (err error) {
 | |
| 	if !atomic.CompareAndSwapUint32(&updateInProgress, 0, 1) {
 | |
| 		return errors.New("update already in progress")
 | |
| 	}
 | |
| 	defer atomic.StoreUint32(&updateInProgress, 0)
 | |
| 
 | |
| 	transport := getUpdateTransport(30 * time.Second)
 | |
| 	opts := selfupdate.Options{
 | |
| 		Hash:     crypto.SHA256,
 | |
| 		Checksum: sha256Sum,
 | |
| 	}
 | |
| 
 | |
| 	if err := opts.CheckPermissions(); err != nil {
 | |
| 		return AdminError{
 | |
| 			Code:       AdminUpdateApplyFailure,
 | |
| 			Message:    fmt.Sprintf("server update failed with: %s, do not restart the servers yet", err),
 | |
| 			StatusCode: http.StatusInternalServerError,
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	minisignPubkey := env.Get(envMinisignPubKey, defaultMinisignPubkey)
 | |
| 	if minisignPubkey != "" {
 | |
| 		v := selfupdate.NewVerifier()
 | |
| 		u.Path = path.Dir(u.Path) + slashSeparator + releaseInfo + ".minisig"
 | |
| 		if err = v.LoadFromURL(u.String(), minisignPubkey, transport); err != nil {
 | |
| 			return AdminError{
 | |
| 				Code:       AdminUpdateApplyFailure,
 | |
| 				Message:    fmt.Sprintf("signature loading failed for %v with %v", u, err),
 | |
| 				StatusCode: http.StatusInternalServerError,
 | |
| 			}
 | |
| 		}
 | |
| 		opts.Verifier = v
 | |
| 	}
 | |
| 
 | |
| 	if err = selfupdate.PrepareAndCheckBinary(bytes.NewReader(reader), opts); err != nil {
 | |
| 		var pathErr *os.PathError
 | |
| 		if errors.As(err, &pathErr) {
 | |
| 			return AdminError{
 | |
| 				Code: AdminUpdateApplyFailure,
 | |
| 				Message: fmt.Sprintf("Unable to update the binary at %s: %v",
 | |
| 					filepath.Dir(pathErr.Path), pathErr.Err),
 | |
| 				StatusCode: http.StatusForbidden,
 | |
| 			}
 | |
| 		}
 | |
| 		return AdminError{
 | |
| 			Code:       AdminUpdateApplyFailure,
 | |
| 			Message:    err.Error(),
 | |
| 			StatusCode: http.StatusInternalServerError,
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func commitBinary() (err error) {
 | |
| 	if !atomic.CompareAndSwapUint32(&updateInProgress, 0, 1) {
 | |
| 		return errors.New("update already in progress")
 | |
| 	}
 | |
| 	defer atomic.StoreUint32(&updateInProgress, 0)
 | |
| 
 | |
| 	opts := selfupdate.Options{}
 | |
| 
 | |
| 	if err = selfupdate.CommitBinary(opts); err != nil {
 | |
| 		if rerr := selfupdate.RollbackError(err); rerr != nil {
 | |
| 			return AdminError{
 | |
| 				Code:       AdminUpdateApplyFailure,
 | |
| 				Message:    fmt.Sprintf("Failed to rollback from bad update: %v", rerr),
 | |
| 				StatusCode: http.StatusInternalServerError,
 | |
| 			}
 | |
| 		}
 | |
| 		var pathErr *os.PathError
 | |
| 		if errors.As(err, &pathErr) {
 | |
| 			return AdminError{
 | |
| 				Code: AdminUpdateApplyFailure,
 | |
| 				Message: fmt.Sprintf("Unable to update the binary at %s: %v",
 | |
| 					filepath.Dir(pathErr.Path), pathErr.Err),
 | |
| 				StatusCode: http.StatusForbidden,
 | |
| 			}
 | |
| 		}
 | |
| 		return AdminError{
 | |
| 			Code:       AdminUpdateApplyFailure,
 | |
| 			Message:    err.Error(),
 | |
| 			StatusCode: http.StatusInternalServerError,
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	return nil
 | |
| }
 |