-
Notifications
You must be signed in to change notification settings - Fork 15
Expand file tree
/
Copy pathdeploy.py
More file actions
402 lines (362 loc) · 17.2 KB
/
deploy.py
File metadata and controls
402 lines (362 loc) · 17.2 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
from __future__ import annotations
import argparse
from contextlib import ExitStack
import tempfile
from pathlib import Path
from typing import Optional
from timecapsulesmb.cli.context import CommandContext
from timecapsulesmb.cli.flows import request_deploy_reboot_and_wait, verify_managed_runtime_flow
from timecapsulesmb.cli.runtime import (
add_config_argument,
load_env_config,
print_json,
require_supported_device_compatibility,
)
from timecapsulesmb.core.config import (
DEFAULTS,
MANAGED_PAYLOAD_DIR_NAME,
AppConfig,
airport_family_display_name_from_identity,
parse_bool,
shell_quote,
)
from timecapsulesmb.core.messages import NETBSD4_REBOOT_FOLLOWUP, NETBSD4_REBOOT_GUIDANCE
from timecapsulesmb.core.paths import resolve_app_paths
from timecapsulesmb.core.release import CLI_VERSION_CODE, RELEASE_TAG
from timecapsulesmb.identity import ensure_install_id
from timecapsulesmb.deploy.artifact_resolver import resolve_payload_artifacts
from timecapsulesmb.deploy.artifacts import validate_artifacts
from timecapsulesmb.deploy.auth import render_smbpasswd
from timecapsulesmb.deploy.dry_run import deployment_plan_to_jsonable, format_deployment_plan
from timecapsulesmb.deploy.executor import flush_remote_filesystem_writes, run_remote_actions, upload_deployment_payload
from timecapsulesmb.deploy.planner import (
BINARY_MDNS_SOURCE,
BINARY_NBNS_SOURCE,
BINARY_SMBD_SOURCE,
DEFAULT_APPLE_MOUNT_WAIT_SECONDS,
DEFAULT_ATA_IDLE_SECONDS,
DEFAULT_DISKD_USE_VOLUME_ATTEMPTS,
GENERATED_FLASH_CONFIG_SOURCE,
GENERATED_SMBPASSWD_SOURCE,
GENERATED_USERNAME_MAP_SOURCE,
PACKAGED_COMMON_SH_SOURCE,
PACKAGED_DFREE_SH_SOURCE,
PACKAGED_START_SAMBA_SOURCE,
PACKAGED_RC_LOCAL_SOURCE,
PACKAGED_WATCHDOG_SOURCE,
build_deployment_plan,
)
from timecapsulesmb.deploy.boot_assets import (
boot_asset_path,
)
from timecapsulesmb.device.compat import is_netbsd4_payload_family, payload_family_description
from timecapsulesmb.device.storage import (
MAST_DISCOVERY_ATTEMPTS,
MAST_DISCOVERY_DELAY_SECONDS,
PayloadHome,
PayloadVerificationResult,
build_dry_run_payload_home,
verify_payload_home_conn,
)
from timecapsulesmb.device.probe import read_interface_ipv4_addrs_conn
from timecapsulesmb.telemetry import TelemetryClient
from timecapsulesmb.cli.util import color_green, color_red
REBOOT_NO_DOWN_MESSAGE = (
"Reboot was requested but the device did not go down.\n"
"The deploy stopped the managed runtime before reboot; power-cycle or rerun deploy."
)
def _no_mast_volumes_message(*, attempts: int, delay_seconds: int) -> str:
return (
f"No deployable HFS disk was found after {attempts} MaSt queries "
f"spaced {delay_seconds} seconds apart."
)
def _no_writable_mast_volumes_message(volume_count: int) -> str:
return f"MaSt found {volume_count} deployable HFS volume(s), but deploy could not write to any of them."
def _render_flash_config_assignment(key: str, value: str | int) -> str:
if isinstance(value, int):
return f"{key}={value}"
return f"{key}={shell_quote(value)}"
def render_flash_runtime_config(
config: AppConfig,
payload_home: PayloadHome,
*,
nbns_enabled: bool,
debug_logging: bool,
ata_idle_seconds: int = DEFAULT_ATA_IDLE_SECONDS,
diskd_use_volume_attempts: int = DEFAULT_DISKD_USE_VOLUME_ATTEMPTS,
) -> str:
internal_root_default = config.get("TC_INTERNAL_SHARE_USE_DISK_ROOT", DEFAULTS["TC_INTERNAL_SHARE_USE_DISK_ROOT"])
any_protocol_default = config.get("TC_ANY_PROTOCOL", DEFAULTS["TC_ANY_PROTOCOL"])
values: list[tuple[str, str | int]] = [
("TC_CONFIG_VERSION", 2),
("TC_DEPLOY_RELEASE_TAG", RELEASE_TAG),
("TC_DEPLOY_CLI_VERSION_CODE", CLI_VERSION_CODE),
("INTERNAL_SHARE_USE_DISK_ROOT", 1 if parse_bool(internal_root_default) else 0),
("ANY_PROTOCOL", 1 if parse_bool(any_protocol_default) else 0),
("DISKD_USE_VOLUME_ATTEMPTS", diskd_use_volume_attempts),
("ATA_IDLE_SECONDS", ata_idle_seconds),
("NBNS_ENABLED", 1 if nbns_enabled else 0),
("SMBD_DEBUG_LOGGING", 1 if debug_logging else 0),
("MDNS_DEBUG_LOGGING", 1 if debug_logging else 0),
]
return "\n".join(_render_flash_config_assignment(key, value) for key, value in values) + "\n"
def _target_family_display_name(target) -> str:
probe = target.probe_state.probe_result if target.probe_state is not None else None
return airport_family_display_name_from_identity(
model=None if probe is None else probe.airport_model,
syap=None if probe is None else probe.airport_syap,
)
def _payload_verification_error(payload_home: PayloadHome, result: PayloadVerificationResult) -> str:
return f"managed payload verification failed at {payload_home.payload_dir}: {result.detail}"
def _non_negative_int(value: str) -> int:
try:
parsed = int(value)
except ValueError as e:
raise argparse.ArgumentTypeError("must be an integer") from e
if parsed < 0:
raise argparse.ArgumentTypeError("must be 0 or greater")
return parsed
def main(argv: Optional[list[str]] = None) -> int:
parser = argparse.ArgumentParser(description="Deploy the checked-in Samba 4 payload to an AirPort storage device.")
add_config_argument(parser)
parser.add_argument("--no-reboot", action="store_true", help="Do not reboot after deployment")
parser.add_argument("--yes", action="store_true", help="Do not prompt before reboot")
parser.add_argument("--dry-run", action="store_true", help="Print actions without making changes")
parser.add_argument("--json", action="store_true", help="Output the dry-run deployment plan as JSON")
parser.add_argument("--allow-unsupported", action="store_true", help="Proceed even if the detected device is not currently supported")
parser.add_argument("--no-nbns", action="store_true", help="Disable the bundled NBNS responder on the next boot")
parser.add_argument(
"--mount-wait",
type=_non_negative_int,
default=DEFAULT_APPLE_MOUNT_WAIT_SECONDS,
metavar="SECONDS",
help=f"Seconds for deployment-time diskd.useVolume mount guards to wait before their manual fallback (default: {DEFAULT_APPLE_MOUNT_WAIT_SECONDS})",
)
parser.add_argument("--debug-logging", action="store_true", help=argparse.SUPPRESS)
args = parser.parse_args(argv)
if args.json and not args.dry_run:
parser.error("--json currently requires --dry-run")
if not args.json:
print("Deploying...")
nbns_enabled = not args.no_nbns
ensure_install_id()
app_paths = resolve_app_paths(config_path=args.config)
config = load_env_config(env_path=args.config)
telemetry = TelemetryClient.from_config(config, nbns_enabled=nbns_enabled)
with CommandContext(telemetry, "deploy", "deploy_started", "deploy_finished", config=config, args=args) as command_context:
command_context.update_fields(
nbns_enabled=nbns_enabled,
reboot_was_attempted=False,
device_came_back_after_reboot=False,
)
command_context.set_stage("resolve_managed_target")
target = command_context.resolve_validated_managed_target(profile="deploy", include_probe=True)
connection = target.connection
host = connection.host
smb_password = connection.password
command_context.set_stage("validate_artifacts")
artifact_results = validate_artifacts(app_paths.distribution_root)
failures = [message for _, ok, message in artifact_results if not ok]
if failures:
raise SystemExit("; ".join(failures))
command_context.set_stage("check_compatibility")
compatibility, compatibility_message = require_supported_device_compatibility(
command_context,
allow_unsupported=args.allow_unsupported,
json_output=args.json,
)
if not compatibility.payload_family:
raise SystemExit(f"{compatibility_message}\nNo deployable payload is available for this detected device.")
payload_family = compatibility.payload_family
is_netbsd4 = is_netbsd4_payload_family(payload_family)
if not args.json:
print(f"Using {payload_family_description(payload_family)} payload...")
apple_mount_wait_seconds = args.mount_wait
resolved_artifacts = resolve_payload_artifacts(app_paths.distribution_root, payload_family)
smbd_path = resolved_artifacts["smbd"].absolute_path
mdns_path = resolved_artifacts["mdns-advertiser"].absolute_path
nbns_path = resolved_artifacts["nbns-advertiser"].absolute_path
if args.dry_run:
payload_home = build_dry_run_payload_home(MANAGED_PAYLOAD_DIR_NAME)
else:
mast_discovery = command_context.wait_for_mast_volumes(
connection,
attempts=MAST_DISCOVERY_ATTEMPTS,
delay_seconds=MAST_DISCOVERY_DELAY_SECONDS,
)
mast_volumes = mast_discovery.volumes
if not mast_volumes:
raise SystemExit(
_no_mast_volumes_message(
attempts=MAST_DISCOVERY_ATTEMPTS,
delay_seconds=MAST_DISCOVERY_DELAY_SECONDS,
)
)
selection = command_context.select_payload_home(
connection,
mast_volumes,
MANAGED_PAYLOAD_DIR_NAME,
wait_seconds=apple_mount_wait_seconds,
)
if selection.payload_home is None:
raise SystemExit(_no_writable_mast_volumes_message(len(mast_volumes)))
payload_home = selection.payload_home
command_context.set_stage("build_deployment_plan")
plan = build_deployment_plan(
host,
payload_home,
smbd_path,
mdns_path,
nbns_path,
activate_netbsd4=is_netbsd4,
reboot_after_deploy=not args.no_reboot,
apple_mount_wait_seconds=apple_mount_wait_seconds,
)
command_context.add_debug_fields(
payload_volume_root=plan.volume_root,
payload_device_path=plan.device_path,
payload_dir=plan.payload_dir,
)
if args.dry_run:
if args.json:
print_json(deployment_plan_to_jsonable(plan))
else:
print(format_deployment_plan(plan))
command_context.succeed()
return 0
if is_netbsd4 and not args.yes:
print("Deploy will activate Samba immediately without rebooting.")
print(color_red(NETBSD4_REBOOT_GUIDANCE))
print(NETBSD4_REBOOT_FOLLOWUP)
proceed = command_context.confirm_or_fail(
"Continue with NetBSD 4 deploy + activation?",
default=False,
noninteractive_message="Running `deploy` requires confirmation when stdin is not interactive. Use `deploy --yes` in a non-interactive environment.",
)
if proceed is None:
return 1
if not proceed:
print("Deployment cancelled.")
command_context.cancel_with_error("Cancelled by user at NetBSD4 deploy confirmation prompt.")
return 0
command_context.set_stage("pre_upload_actions")
run_remote_actions(connection, plan.pre_upload_actions)
command_context.set_stage("prepare_deployment_files")
flash_config_text = render_flash_runtime_config(
config,
payload_home,
nbns_enabled=nbns_enabled,
debug_logging=args.debug_logging,
)
with tempfile.TemporaryDirectory(prefix="tc-deploy-") as tmp, ExitStack() as boot_assets:
tmpdir = Path(tmp)
generated_flash_config = tmpdir / "tcapsulesmb.conf"
generated_smbpasswd = tmpdir / "smbpasswd"
generated_username_map = tmpdir / "username.map"
generated_flash_config.write_text(flash_config_text)
smbpasswd_text, username_map_text = render_smbpasswd(smb_password)
generated_smbpasswd.write_text(smbpasswd_text)
generated_username_map.write_text(username_map_text)
upload_sources = {
BINARY_SMBD_SOURCE: plan.smbd_path,
BINARY_MDNS_SOURCE: plan.mdns_path,
BINARY_NBNS_SOURCE: plan.nbns_path,
GENERATED_SMBPASSWD_SOURCE: generated_smbpasswd,
GENERATED_USERNAME_MAP_SOURCE: generated_username_map,
GENERATED_FLASH_CONFIG_SOURCE: generated_flash_config,
PACKAGED_RC_LOCAL_SOURCE: boot_assets.enter_context(boot_asset_path("rc.local")),
PACKAGED_COMMON_SH_SOURCE: boot_assets.enter_context(boot_asset_path("common.sh")),
PACKAGED_DFREE_SH_SOURCE: boot_assets.enter_context(boot_asset_path("dfree.sh")),
PACKAGED_START_SAMBA_SOURCE: boot_assets.enter_context(boot_asset_path("start-samba.sh")),
PACKAGED_WATCHDOG_SOURCE: boot_assets.enter_context(boot_asset_path("watchdog.sh")),
}
command_context.set_stage("upload_payload")
upload_deployment_payload(
plan,
connection=connection,
source_resolver=upload_sources,
)
command_context.set_stage("post_upload_actions")
run_remote_actions(connection, plan.post_upload_actions)
command_context.set_stage("verify_payload_upload")
payload_verification = verify_payload_home_conn(
connection,
payload_home,
wait_seconds=apple_mount_wait_seconds,
)
command_context.add_debug_fields(payload_upload_verification=payload_verification.detail)
if not payload_verification.ok:
raise SystemExit(_payload_verification_error(payload_home, payload_verification))
command_context.set_stage("flush_payload_upload")
if not args.json:
print("Flushing deployed payload to disk...")
flush_remote_filesystem_writes(connection)
# The immediate verification above can succeed from cache. Flush and
# verify again before any reboot so dirty HFS metadata cannot disappear
# under an ACP-triggered restart.
command_context.set_stage("verify_payload_upload_after_sync")
payload_verification = verify_payload_home_conn(
connection,
payload_home,
wait_seconds=apple_mount_wait_seconds,
)
command_context.add_debug_fields(payload_post_sync_verification=payload_verification.detail)
if not payload_verification.ok:
raise SystemExit(_payload_verification_error(payload_home, payload_verification))
print(f"Deployed Samba payload to {plan.payload_dir}")
print("Updated /mnt/Flash boot files.")
if is_netbsd4:
print("Activating NetBSD4 payload without reboot.")
command_context.set_stage("netbsd4_activation")
run_remote_actions(connection, plan.activation_actions)
if not verify_managed_runtime_flow(
connection,
command_context,
stage="verify_runtime_activation",
timeout_seconds=180,
heading="Waiting for NetBSD 4 device activation, this can take a few minutes for Samba to start up...",
failure_message="NetBSD4 activation failed.",
):
return 1
print(f"NetBSD4 activation complete. {NETBSD4_REBOOT_FOLLOWUP}")
print(color_green("Deploy Finished."))
command_context.succeed()
return 0
if args.no_reboot:
print("Skipping reboot.")
print(color_green("Deploy Finished."))
command_context.succeed()
return 0
if not args.yes:
device_name = _target_family_display_name(target)
proceed = command_context.confirm_or_fail(
f"This will reboot the {device_name} now. Continue?",
default=True,
noninteractive_message="Running `deploy` with reboot requires confirmation when stdin is not interactive. Use `deploy --yes` to skip the prompt or `deploy --no-reboot`.",
)
if proceed is None:
return 1
if not proceed:
print("Deployment complete without reboot.")
command_context.cancel_with_error("Cancelled by user at reboot confirmation prompt.")
return 0
if not request_deploy_reboot_and_wait(
connection,
command_context,
reboot_no_down_message=REBOOT_NO_DOWN_MESSAGE,
):
return 1
print("Waiting for managed runtime to finish starting...")
if verify_managed_runtime_flow(
connection,
command_context,
stage="verify_runtime_reboot",
timeout_seconds=240,
heading="Wait for device to finish loading; it can take a few minutes for Samba to start up...",
failure_message="Managed runtime did not become ready after reboot.",
):
print(color_green("Deploy Finished."))
command_context.succeed()
return 0
return 1
return 1