1
|
#!/bin/sh
|
2
|
|
3
|
# /etc/rc.firmware
|
4
|
# originally part of m0n0wall (http://neon1.net/m0n0wall)
|
5
|
# Copyright (C) 2005-2009 Scott Ullrich <sullrich@pfsense.org>.
|
6
|
# Copyright (C) 2003 Manuel Kasper <mk@neon1.net>.
|
7
|
# All rights reserved.
|
8
|
|
9
|
# mount /cf
|
10
|
/etc/rc.conf_mount_rw
|
11
|
|
12
|
# Reset file(s)
|
13
|
echo "" >/conf/upgrade_log.txt
|
14
|
echo "" >/conf/firmware_update_misc_log.txt
|
15
|
echo "" >/conf/fdisk_upgrade_log.txt
|
16
|
|
17
|
exec 3>&2 2>>/conf/firmware_update_misc_log.txt
|
18
|
|
19
|
export ACTION=$1
|
20
|
export IMG=$2
|
21
|
if [ $# -eq 3 ]; then
|
22
|
export CUSTOMIMG=$3
|
23
|
fi
|
24
|
|
25
|
if [ $ACTION != "upgrade" ]; then
|
26
|
/sbin/umount -f /ftmp > /dev/null 2>&1
|
27
|
fi
|
28
|
|
29
|
file_notice() {
|
30
|
/usr/local/bin/php -q -d auto_prepend_file=config.inc <<ENDOFF
|
31
|
<?php
|
32
|
require_once("globals.inc");
|
33
|
require_once("functions.inc");
|
34
|
file_notice("$1", "$2", "$1", "");
|
35
|
?>
|
36
|
ENDOFF
|
37
|
}
|
38
|
|
39
|
output_env_to_log() {
|
40
|
date >> /conf/upgrade_log.txt
|
41
|
echo "" >> /conf/upgrade_log.txt
|
42
|
|
43
|
ls -lah /dev/ >> /conf/upgrade_log.txt
|
44
|
echo "" >> /conf/upgrade_log.txt
|
45
|
|
46
|
ls -lah $IMG >> /conf/upgrade_log.txt
|
47
|
echo "" >> /conf/upgrade_log.txt
|
48
|
|
49
|
md5 $IMG >> /conf/upgrade_log.txt
|
50
|
echo "" >> /conf/upgrade_log.txt
|
51
|
|
52
|
mount >> /conf/upgrade_log.txt
|
53
|
echo "" >> /conf/upgrade_log.txt
|
54
|
|
55
|
top >> /conf/upgrade_log.txt
|
56
|
echo "" >> /conf/upgrade_log.txt
|
57
|
}
|
58
|
|
59
|
backup_chflags() {
|
60
|
TOPROCESS="bin lib libexec sbin usr"
|
61
|
for files in $TOPROCESS; do
|
62
|
/usr/sbin/mtree -Pcp /${files} | bzip2 -9 > /tmp/chflags.dist.${files}.bz2 2>> /conf/upgrade_log.txt
|
63
|
done
|
64
|
}
|
65
|
|
66
|
restore_chflags() {
|
67
|
TOPROCESS="bin lib libexec sbin usr"
|
68
|
for files in $TOPROCESS; do
|
69
|
cd / && /usr/bin/bzcat /tmp/chflags.dist.${files}.bz2 | /usr/sbin/mtree -PU -p /${files} >> /conf/upgrade_log.txt 2>&1
|
70
|
done
|
71
|
}
|
72
|
|
73
|
remove_chflags() {
|
74
|
TOPROCESS="bin lib libexec sbin usr"
|
75
|
for files in $TOPROCESS; do
|
76
|
/bin/chflags -R noschg /${files}
|
77
|
/bin/chmod -R u+rw /${files}
|
78
|
done
|
79
|
}
|
80
|
|
81
|
binary_update() {
|
82
|
TGZ=$1
|
83
|
ERR_F="/tmp/bdiff.log"
|
84
|
rm ${ERR_F} 2>/dev/null
|
85
|
/bin/mkdir /tmp/patched /tmp/patches 2>>${ERR_F}
|
86
|
# Save the old shutdown binary. If we switch from i386 to amd64 (or back) the reboot binary won't run at the end since it doesn't match up.
|
87
|
/bin/cp -p /sbin/shutdown /sbin/shutdown.old
|
88
|
backup_chflags
|
89
|
remove_chflags
|
90
|
cd /tmp/patches
|
91
|
for i in `/usr/bin/tar tvzf $TGZ | egrep -v "(^d|_md5)" | nawk '{print $9;}'`;
|
92
|
do
|
93
|
FILE=`basename ${i}`
|
94
|
echo "Working on ${i}"
|
95
|
# Untar patch file and md5 files
|
96
|
/usr/bin/tar xzf ${TGZ} ${i} ${i}.old_file_md5 ${i}.new_patch_md5 ${i}.new_file_md5 2>>${ERR_F}
|
97
|
|
98
|
# Apply patch - oldfile newfile patchfile
|
99
|
/usr/local/bin/bspatch /${i} /tmp/patched/${FILE} /tmp/patches/${i} 2>>${ERR_F}
|
100
|
|
101
|
OLD_FILE_MD5=`cat /tmp/patches/${i}.old_file_md5 2>/dev/null`
|
102
|
NEW_PATCH_MD5=`cat /tmp/patches/${i}.new_patch_md5 2>/dev/null`
|
103
|
NEW_FILE_MD5=`cat /tmp/patches/${i}.new_file_md5 2>/dev/null`
|
104
|
PATCHED_MD5=`/sbin/md5 -q /tmp/patched/${FILE} 2>/dev/null`
|
105
|
|
106
|
if [ "$PATCHED_MD5" = "$NEW_PATCH_MD5" ]; then
|
107
|
/usr/bin/install -S /tmp/patched/${FILE} /${i}
|
108
|
else
|
109
|
#echo "${i} file does not match intended final md5."
|
110
|
echo "${i} file does not match intended final md5." >> ${ERR_F}
|
111
|
fi
|
112
|
|
113
|
/bin/rm /tmp/patched/${FILE} >> ${ERR_F}
|
114
|
/bin/rm /tmp/patches/${i} >> ${ERR_F}
|
115
|
/bin/rm /tmp/patches/${i}.* >> ${ERR_F}
|
116
|
done
|
117
|
/bin/rm -rf /tmp/patched /tmp/patches >> ${ERR_F}
|
118
|
restore_chflags
|
119
|
}
|
120
|
|
121
|
case $ACTION in
|
122
|
enable)
|
123
|
touch /conf/upgrade_log.txt
|
124
|
echo "" >> /conf/upgrade_log.txt
|
125
|
echo "Enable" >> /conf/upgrade_log.txt
|
126
|
echo "" >> /conf/upgrade_log.txt
|
127
|
/etc/rc.conf_mount_ro
|
128
|
;;
|
129
|
auto)
|
130
|
touch /var/run/firmwarelock.dirty
|
131
|
backup_chflags
|
132
|
remove_chflags
|
133
|
/etc/rc.firmware_auto
|
134
|
restore_chflags
|
135
|
/etc/rc.conf_mount_ro
|
136
|
;;
|
137
|
pfSenseNanoBSDupgrade)
|
138
|
|
139
|
# Sanity check - bail early if there's no firmware file!
|
140
|
if [ ! -r $IMG ]; then
|
141
|
echo "2nd parameter has not been passed or file does not exist. Exiting." >> /conf/upgrade_log.txt 2>&1
|
142
|
/etc/rc.conf_mount_ro
|
143
|
exit 1
|
144
|
fi
|
145
|
|
146
|
# Prevent full upgrade file from being used to upgrade
|
147
|
if [ `echo $IMG | grep "full"` ]; then
|
148
|
echo "You cannot use a full file for upgrade. Please use a file labeled nanobsd upgrade."
|
149
|
file_notice "NanoBSDUpgradeFailure" "You have attemped to use a full NanoBSD installation file as an upgrade. Please use a NanoBSD file labeled 'upgrade' instead."
|
150
|
rm -f $IMG
|
151
|
/etc/rc.conf_mount_ro
|
152
|
exit 1
|
153
|
fi
|
154
|
|
155
|
touch /var/run/firmwarelock.dirty
|
156
|
|
157
|
echo "NanoBSD Firmware upgrade in progress..." >> /conf/upgrade_log.txt 2>&1
|
158
|
echo "NanoBSD Firmware upgrade in progress..." | wall
|
159
|
/etc/rc.notify_message -e -g -m "NanoBSD Firmware upgrade in progress..."
|
160
|
|
161
|
# backup config
|
162
|
/bin/mkdir -p /tmp/configbak
|
163
|
cp -Rp /conf/* /tmp/configbak 2>/dev/null
|
164
|
|
165
|
# Remove logs from backup dir to avoid clobbering upon restore.
|
166
|
rm /tmp/configbak/*_log.txt 2>/dev/null
|
167
|
|
168
|
echo "" >> /conf/upgrade_log.txt
|
169
|
|
170
|
echo "Installing ${IMG}." >> /conf/upgrade_log.txt 2>&1
|
171
|
echo "Installing ${IMG}." | wall
|
172
|
|
173
|
# resolve glabel label that we booted from
|
174
|
BOOT_DEVICE=`/sbin/mount | /usr/bin/grep pfsense | /usr/bin/cut -d'/' -f4 | /usr/bin/cut -d' ' -f1`
|
175
|
# resolve glabel to the real boot dev entry
|
176
|
REAL_BOOT_DEVICE=`/sbin/glabel list | /usr/bin/grep -B2 ufs/${BOOT_DEVICE} | /usr/bin/head -n 1 | /usr/bin/cut -f3 -d' '`
|
177
|
# grab the boot device, example ad1, ad0
|
178
|
BOOT_DRIVE=`/sbin/glabel list | /usr/bin/grep -B2 ufs/pfsense | /usr/bin/head -n 1 | /usr/bin/cut -f3 -d' ' | /usr/bin/cut -d's' -f1`
|
179
|
# test the slice. if we are on slice 1 we need to flash 2 and vica versa
|
180
|
if [ `echo $REAL_BOOT_DEVICE | /usr/bin/grep "s1"` ]; then
|
181
|
SLICE="2"
|
182
|
OLDSLICE="1"
|
183
|
TOFLASH="${BOOT_DRIVE}s${SLICE}"
|
184
|
COMPLETE_PATH="${BOOT_DRIVE}s${SLICE}a"
|
185
|
GLABEL_SLICE="pfsense1"
|
186
|
UFS_ID="1"
|
187
|
OLD_UFS_ID="0"
|
188
|
else
|
189
|
SLICE="1"
|
190
|
OLDSLICE="2"
|
191
|
TOFLASH="${BOOT_DRIVE}s${SLICE}"
|
192
|
COMPLETE_PATH="${BOOT_DRIVE}s${SLICE}a"
|
193
|
GLABEL_SLICE="pfsense0"
|
194
|
UFS_ID="0"
|
195
|
OLD_UFS_ID="1"
|
196
|
fi
|
197
|
|
198
|
# Output specifc information that this script is using
|
199
|
echo "SLICE ${SLICE}" >> /conf/upgrade_log.txt
|
200
|
echo "OLDSLICE ${OLDSLICE}" >> /conf/upgrade_log.txt
|
201
|
echo "TOFLASH ${TOFLASH}" >> /conf/upgrade_log.txt
|
202
|
echo "COMPLETE_PATH ${COMPLETE_PATH}" >> /conf/upgrade_log.txt
|
203
|
echo "GLABEL_SLICE ${GLABEL_SLICE}" >> /conf/upgrade_log.txt
|
204
|
|
205
|
# First ensure the new file can fit inside the
|
206
|
# slice that we are going to be operating on.
|
207
|
NEW_IMG_SIZE=`echo $((\`gzip -l ${IMG} | grep -v compressed | awk '{ print $2}'\` / 1024 / 1024))`
|
208
|
SIZE=`/sbin/fdisk ${COMPLETE_PATH} | /usr/bin/grep Meg | /usr/bin/awk '{ print $5 }' | /usr/bin/cut -d"(" -f2`
|
209
|
# USB slices are under-reported even more than CF slices when viewed
|
210
|
# directly, instead of when looking at the entire disk. Compensate
|
211
|
# by adding exactly 6MB. 4MB was consistently 2MB too few, and
|
212
|
# was resulting in failing upgrades on USB Flash based installs.
|
213
|
SIZE=`expr $SIZE + 6`
|
214
|
if [ "$SIZE" -lt "$NEW_IMG_SIZE" ]; then
|
215
|
file_notice "UpgradeFailure" "Upgrade failed due to the upgrade image being larger than the partition that is configured on disk. Halting. Size on disk: $SIZE < Size of new image: $NEW_IMG_SIZE"
|
216
|
echo "Upgrade failed. Please check the system log file for more information" | wall
|
217
|
rm -f $IMG
|
218
|
rm -f /var/run/firmwarelock.dirty
|
219
|
rm -f /var/run/firmware.lock
|
220
|
rm -f ${IMG}
|
221
|
/etc/rc.conf_mount_ro
|
222
|
exit 1
|
223
|
fi
|
224
|
|
225
|
# Output environment information to log file
|
226
|
output_env_to_log
|
227
|
|
228
|
# Grab a before upgrade look at fdisk
|
229
|
echo "" >> /conf/fdisk_upgrade_log.txt
|
230
|
echo "Before upgrade fdisk/bsdlabel" >> /conf/fdisk_upgrade_log.txt
|
231
|
fdisk $BOOT_DRIVE >> /conf/fdisk_upgrade_log.txt
|
232
|
bsdlabel -A ${BOOT_DRIVE}s1 >> /conf/fdisk_upgrade_log.txt
|
233
|
bsdlabel -A ${BOOT_DRIVE}s2 >> /conf/fdisk_upgrade_log.txt
|
234
|
bsdlabel -A ${BOOT_DRIVE}s3 >> /conf/fdisk_upgrade_log.txt
|
235
|
echo "---------------------------------------------------------------" >> /conf/fdisk_upgrade_log.txt
|
236
|
echo "" >> /conf/fdisk_upgrade_log.txt
|
237
|
|
238
|
# Log that we are really doing a NanoBSD upgrade
|
239
|
echo "" >> /conf/upgrade_log.txt
|
240
|
echo "NanoBSD upgrade starting" >> /conf/upgrade_log.txt
|
241
|
echo "" >> /conf/upgrade_log.txt
|
242
|
|
243
|
# Remove TOFLASH and get ready for new flash image
|
244
|
echo "" >> /conf/upgrade_log.txt
|
245
|
echo "dd if=/dev/zero of=/dev/${TOFLASH} bs=1m count=1" >> /conf/upgrade_log.txt
|
246
|
dd if=/dev/zero of=/dev/${TOFLASH} bs=1m count=1 >> /conf/upgrade_log.txt 2>&1
|
247
|
|
248
|
# Stream gzipped image to dd and explode image to new area
|
249
|
echo "" >> /conf/upgrade_log.txt
|
250
|
echo "/usr/bin/gzip -dc $IMG | /bin/dd of=/dev/${TOFLASH} obs=64k" >> /conf/upgrade_log.txt
|
251
|
/usr/bin/gzip -dc $IMG | /bin/dd of=/dev/${TOFLASH} obs=64k >> /conf/upgrade_log.txt 2>&1
|
252
|
|
253
|
# Grab a after upgrade look at fdisk
|
254
|
echo "" >> /conf/fdisk_upgrade_log.txt
|
255
|
echo "After upgrade fdisk/bsdlabel" >> /conf/upgrade_log.txt
|
256
|
fdisk $BOOT_DRIVE >> /conf/fdisk_upgrade_log.txt
|
257
|
bsdlabel -A ${BOOT_DRIVE}s1 >> /conf/fdisk_upgrade_log.txt
|
258
|
bsdlabel -A ${BOOT_DRIVE}s2 >> /conf/fdisk_upgrade_log.txt
|
259
|
bsdlabel -A ${BOOT_DRIVE}s3 >> /conf/fdisk_upgrade_log.txt
|
260
|
echo "---------------------------------------------------------------" >> /conf/fdisk_upgrade_log.txt
|
261
|
echo "" >> /conf/fdisk_upgrade_log.txt
|
262
|
|
263
|
# Ensure that our new system is sound and bail if it is not and file a notice
|
264
|
echo "" >> /conf/upgrade_log.txt
|
265
|
echo "/sbin/fsck_ufs -y /dev/${COMPLETE_PATH}" >> /conf/upgrade_log.txt
|
266
|
/sbin/fsck_ufs -y /dev/${COMPLETE_PATH} >> /conf/upgrade_log.txt 2>&1
|
267
|
if [ $? != 0 ]; then
|
268
|
file_notice "UpgradeFailure" "{\$g['product_name']} upgrade has failed. Your system has been left in a usable state."
|
269
|
rm -f $IMG
|
270
|
rm -f /var/run/firmwarelock.dirty
|
271
|
rm -f /var/run/firmware.lock
|
272
|
/etc/rc.conf_mount_ro
|
273
|
exit 1
|
274
|
fi
|
275
|
|
276
|
# Enable foot shooting
|
277
|
sysctl kern.geom.debugflags=16
|
278
|
|
279
|
# Add back the corresponding glabel
|
280
|
echo "" >> /conf/upgrade_log.txt
|
281
|
echo "/sbin/tunefs -L ${GLABEL_SLICE} /dev/${COMPLETE_PATH}" >> /conf/upgrade_log.txt
|
282
|
/sbin/tunefs -L ${GLABEL_SLICE} /dev/${COMPLETE_PATH} >> /conf/upgrade_log.txt 2>&1
|
283
|
|
284
|
# restore config
|
285
|
cp -Rp /tmp/configbak/* /conf 2>/dev/null
|
286
|
|
287
|
# Remove upgrade file
|
288
|
rm -f $IMG
|
289
|
|
290
|
# Mount newly prepared slice
|
291
|
mkdir /tmp/$GLABEL_SLICE
|
292
|
mount /dev/ufs/$GLABEL_SLICE /tmp/$GLABEL_SLICE
|
293
|
|
294
|
# If /boot/loader.conf.local exists
|
295
|
# copy to the other slice.
|
296
|
if [ -f /boot/loader.conf.local ]; then
|
297
|
cp /boot/loader.conf.local /tmp/$GLABEL_SLICE/boot/loader.conf.local
|
298
|
fi
|
299
|
|
300
|
# If /tmp/$GLABEL_SLICE/tmp/post_upgrade_command exists
|
301
|
# after update then execute the command.
|
302
|
echo "Checking for post_upgrade_command..." >> /conf/upgrade_log.txt
|
303
|
if [ -f /tmp/$GLABEL_SLICE/tmp/post_upgrade_command ]; then
|
304
|
echo "Found post_upgrade_command, executing ($GLABEL_SLICE)..." >> /conf/upgrade_log.txt
|
305
|
sh /tmp/$GLABEL_SLICE/tmp/post_upgrade_command $GLABEL_SLICE >> /conf/upgrade_log.txt 2>&1
|
306
|
fi
|
307
|
|
308
|
# Update fstab
|
309
|
cp /etc/fstab /tmp/$GLABEL_SLICE/etc/fstab
|
310
|
sed -i "" "s/pfsense${OLD_UFS_ID}/pfsense${UFS_ID}/g" /tmp/$GLABEL_SLICE/etc/fstab
|
311
|
if [ $? != 0 ]; then
|
312
|
echo "Something went wrong when trying to update the fstab entry. Aborting upgrade."
|
313
|
file_notice "UpgradeFailure" "Something went wrong when trying to update the fstab entry. Aborting upgrade."
|
314
|
rm -f $IMG
|
315
|
rm -f /var/run/firmwarelock.dirty
|
316
|
rm -f /var/run/firmware.lock
|
317
|
umount /tmp/$GLABEL_SLICE
|
318
|
/etc/rc.conf_mount_ro
|
319
|
exit 1
|
320
|
fi
|
321
|
echo "" >> /conf/upgrade_log.txt
|
322
|
cat /tmp/$GLABEL_SLICE/etc/fstab >> /conf/upgrade_log.txt
|
323
|
|
324
|
echo "" >> /conf/upgrade_log.txt
|
325
|
find /tmp/$GLABEL_SLICE >/conf/file_upgrade_log.txt
|
326
|
echo "" >> /conf/upgrade_log.txt
|
327
|
|
328
|
# Unmount newly prepared slice
|
329
|
umount /tmp/$GLABEL_SLICE
|
330
|
|
331
|
sync
|
332
|
|
333
|
# Set active mount slice in fdisk
|
334
|
echo "" >> /conf/upgrade_log.txt
|
335
|
echo "gpart set -a active -i ${SLICE} ${BOOT_DRIVE}" >> /conf/upgrade_log.txt
|
336
|
gpart set -a active -i ${SLICE} ${BOOT_DRIVE} >> /conf/upgrade_log.txt 2>&1
|
337
|
|
338
|
sync
|
339
|
|
340
|
# Set active boot source - NanoBSD does not do this but otherwise we
|
341
|
# end up with the wrong partition being active.
|
342
|
echo "" >> /conf/upgrade_log.txt
|
343
|
echo "/usr/sbin/boot0cfg -s ${SLICE} -v /dev/${BOOT_DRIVE}" >> /conf/upgrade_log.txt
|
344
|
/usr/sbin/boot0cfg -s ${SLICE} -v /dev/${BOOT_DRIVE} >> /conf/upgrade_log.txt 2>&1
|
345
|
|
346
|
# Disable foot shooting
|
347
|
sysctl kern.geom.debugflags=0
|
348
|
|
349
|
# Grab a final look at fdisk
|
350
|
echo "" >> /conf/fdisk_upgrade_log.txt
|
351
|
echo "Final upgrade fdisk/bsdlabel" >> /conf/fdisk_upgrade_log.txt
|
352
|
fdisk $BOOT_DRIVE >> /conf/fdisk_upgrade_log.txt
|
353
|
bsdlabel -A ${BOOT_DRIVE}s1 >> /conf/fdisk_upgrade_log.txt
|
354
|
bsdlabel -A ${BOOT_DRIVE}s2 >> /conf/fdisk_upgrade_log.txt
|
355
|
bsdlabel -A ${BOOT_DRIVE}s3 >> /conf/fdisk_upgrade_log.txt
|
356
|
echo "---------------------------------------------------------------" >> /conf/fdisk_upgrade_log.txt
|
357
|
echo "" >> /conf/fdisk_upgrade_log.txt
|
358
|
|
359
|
# Remove extra stuff
|
360
|
rm -rf /etc/rc.conf
|
361
|
rm -rf /etc/motd
|
362
|
rm -rf /usr/savecore/*
|
363
|
|
364
|
date >> /conf/upgrade_log.txt
|
365
|
echo "" >> /conf/upgrade_log.txt
|
366
|
|
367
|
# Trigger a package reinstallation on reobot
|
368
|
touch /conf/needs_package_sync
|
369
|
|
370
|
# remount /cf ro
|
371
|
/etc/rc.conf_mount_ro
|
372
|
/bin/sync
|
373
|
|
374
|
echo "NanoBSD Firmware upgrade is complete. Rebooting in 10 seconds." >> /conf/upgrade_log.txt 2>&1
|
375
|
echo "NanoBSD Firmware upgrade is complete. Rebooting in 10 seconds." | wall
|
376
|
/etc/rc.notify_message -e -g -m "NanoBSD Firmware upgrade is complete. Rebooting in 10 seconds."
|
377
|
|
378
|
sleep 10
|
379
|
|
380
|
rm -f /var/run/firmwarelock.dirty
|
381
|
rm -f /var/run/firmware.lock
|
382
|
sh /etc/rc.reboot
|
383
|
|
384
|
;;
|
385
|
pfSenseupgrade)
|
386
|
|
387
|
# Sanity check - bail early if there's no firmware file!
|
388
|
if [ ! -r $IMG ]; then
|
389
|
echo "2nd parameter has not been passed or file does not exist. Exiting." >> /conf/upgrade_log.txt 2>&1
|
390
|
/etc/rc.conf_mount_ro
|
391
|
exit
|
392
|
fi
|
393
|
|
394
|
# wait 1 seconds before beginning
|
395
|
sleep 1
|
396
|
|
397
|
# Log that we are really doing a pfSense upgrade
|
398
|
echo "" >> /conf/upgrade_log.txt
|
399
|
echo "pfSenseupgrade upgrade starting" >> /conf/upgrade_log.txt
|
400
|
echo "" >> /conf/upgrade_log.txt
|
401
|
|
402
|
touch /var/run/firmwarelock.dirty
|
403
|
|
404
|
if [ -f /tmp/perform_full_backup.txt ]; then
|
405
|
echo "Performing full backup" >> /conf/upgrade_log.txt
|
406
|
/etc/rc.create_full_backup
|
407
|
rm /tmp/perform_full_backup.txt
|
408
|
fi
|
409
|
|
410
|
touch /conf/upgrade_log.txt
|
411
|
echo "" >> /conf/upgrade_log.txt
|
412
|
|
413
|
# Output environment information to log file
|
414
|
output_env_to_log
|
415
|
|
416
|
backup_chflags
|
417
|
remove_chflags
|
418
|
|
419
|
# Do we have a pre-upgrade hook in the update file?
|
420
|
if [ `tar tvzf $IMG | grep /tmp/pre_upgrade_command | wc -l` -gt 0 ]; then
|
421
|
tar xzvf $IMG -C / ./tmp/pre_upgrade_command >> /conf/upgrade_log.txt 2>&1
|
422
|
chmod a+rx /tmp/pre_upgrade_command >> /conf/upgrade_log.txt 2>&1
|
423
|
sh /tmp/pre_upgrade_command >> /conf/upgrade_log.txt 2>&1
|
424
|
fi
|
425
|
|
426
|
echo "Firmware upgrade in progress..." >> /conf/upgrade_log.txt 2>&1
|
427
|
echo "Firmware upgrade in progress..." | wall
|
428
|
/etc/rc.notify_message -e -g -m "Firmware upgrade in progress..."
|
429
|
|
430
|
# backup config
|
431
|
/bin/mkdir -p /tmp/configbak
|
432
|
cp -Rp /conf/* /tmp/configbak 2>/dev/null
|
433
|
|
434
|
# Remove logs from backup dir to avoid clobbering upon restore.
|
435
|
rm /tmp/configbak/*_log.txt 2>/dev/null
|
436
|
|
437
|
# tar explode image onto hd
|
438
|
killall -9 check_reload_status
|
439
|
killall -9 check_reload_status
|
440
|
echo "Installing $IMG." >> /conf/upgrade_log.txt 2>&1
|
441
|
cd / && /usr/bin/tar xzUPf $IMG >> /conf/upgrade_log.txt 2>&1
|
442
|
/usr/local/sbin/check_reload_status
|
443
|
echo "Image installed $IMG." >> /conf/upgrade_log.txt 2>&1
|
444
|
|
445
|
# process custom image if its passed
|
446
|
if [ $# -eq 3 ]; then
|
447
|
if [ -f $CUSTOMIMG ]; then
|
448
|
echo "Custom image $CUSTOMIMG found." >> /conf/upgrade_log.txt 2>&1
|
449
|
echo "Custom image ($CUSTOMIMG) found." >> /conf/upgrade_log.txt 2>&1
|
450
|
PWD_DIR=`pwd`
|
451
|
cd / && /usr/bin/tar xzPUf $CUSTOMIMG >> /conf/upgrade_log.txt 2>&1
|
452
|
cd $PWD_DIR
|
453
|
echo "Custom image $CUSTOMIMG installed." >> /conf/upgrade_log.txt 2>&1
|
454
|
fi
|
455
|
fi
|
456
|
|
457
|
# restore config
|
458
|
cp -Rp /tmp/configbak/* /conf 2>/dev/null
|
459
|
|
460
|
# restore /etc symlinks
|
461
|
rm /etc/hosts
|
462
|
ln -s /var/etc/hosts /etc/hosts
|
463
|
|
464
|
restore_chflags
|
465
|
|
466
|
# Remove upgrade file
|
467
|
rm -f $IMG
|
468
|
|
469
|
if [ -e /etc/init_bootloader.sh ]; then
|
470
|
sh /etc/init_bootloader.sh >> /conf/upgrade_log.txt 2>&1
|
471
|
fi
|
472
|
|
473
|
# Remove saved commit ID for gitsync
|
474
|
rm -f /etc/version.gitsync
|
475
|
|
476
|
# If /tmp/post_upgrade_command exists after update
|
477
|
# then execute the command.
|
478
|
if [ -f /tmp/post_upgrade_command ]; then
|
479
|
sh /tmp/post_upgrade_command >> /conf/upgrade_log.txt 2>&1
|
480
|
fi
|
481
|
|
482
|
# remove unused files
|
483
|
rm -rf /etc/rc.conf
|
484
|
rm -rf /etc/motd
|
485
|
rm -rf /usr/savecore/*
|
486
|
|
487
|
date >> /conf/upgrade_log.txt
|
488
|
echo "" >> /conf/upgrade_log.txt
|
489
|
|
490
|
# remount /cf ro
|
491
|
/etc/rc.conf_mount_ro
|
492
|
|
493
|
# release the firmware lock
|
494
|
rm -f /var/run/firmwarelock.dirty
|
495
|
rm -f /var/run/firmware.lock
|
496
|
/bin/sync
|
497
|
|
498
|
echo "Firmware upgrade is complete. Rebooting in 10 seconds." >> /conf/upgrade_log.txt 2>&1
|
499
|
echo "Firmware upgrade is complete. Rebooting in 10 seconds." | wall
|
500
|
/etc/rc.notify_message -e -g -m "Firmware upgrade is complete. Rebooting in 10 seconds."
|
501
|
|
502
|
# Sleep and allow disks to catch up
|
503
|
sleep 10
|
504
|
|
505
|
# If the archive has unpacked a file called
|
506
|
# /tmp/no_upgrade_reboot_required then do
|
507
|
# not reboot after upgrade.
|
508
|
if [ -f /tmp/no_upgrade_reboot_required ]; then
|
509
|
rm /tmp/no_upgrade_reboot_required
|
510
|
else
|
511
|
sh /etc/rc.reboot
|
512
|
fi
|
513
|
|
514
|
;;
|
515
|
delta_update)
|
516
|
touch /var/run/firmwarelock.dirty
|
517
|
backup_chflags
|
518
|
remove_chflags
|
519
|
binary_update $IMG
|
520
|
restore_chflags
|
521
|
rm -rf /etc/rc.conf
|
522
|
rm -rf /etc/motd
|
523
|
find / -name CVS -type d -exec rm {} \;
|
524
|
rm -rf /usr/savecore/*
|
525
|
/etc/rc.conf_mount_ro
|
526
|
/sbin/umount -f /cf 2>/dev/null
|
527
|
/sbin/mount -r /cf 2>/dev/null
|
528
|
/sbin/umount -f / 2>/dev/null
|
529
|
/sbin/mount -r / 2>/dev/null
|
530
|
if [ -e /etc/init_bootloader.sh ]; then
|
531
|
sh /etc/init_bootloader.sh
|
532
|
fi
|
533
|
|
534
|
;;
|
535
|
esac
|
536
|
|