Projet

Général

Profil

Télécharger (17,3 ko) Statistiques
| Branche: | Tag: | Révision:

univnautes / etc / rc.firmware @ master

1
#!/bin/sh
2

    
3
# /etc/rc.firmware
4
# originally part of m0n0wall (http://neon1.net/m0n0wall)
5
# Copyright (C) 2005-2009 Scott Ullrich <sullrich@pfsense.org>.
6
# Copyright (C) 2003 Manuel Kasper <mk@neon1.net>.
7
# All rights reserved.
8

    
9
# mount /cf
10
/etc/rc.conf_mount_rw
11

    
12
# Reset file(s)
13
echo "" >/conf/upgrade_log.txt
14
echo "" >/conf/firmware_update_misc_log.txt
15
echo "" >/conf/fdisk_upgrade_log.txt
16

    
17
exec 3>&2 2>>/conf/firmware_update_misc_log.txt
18

    
19
export ACTION=$1
20
export IMG=$2
21
if [ $# -eq 3 ]; then
22
	export CUSTOMIMG=$3
23
fi
24

    
25
if [ $ACTION != "upgrade" ]; then
26
	/sbin/umount -f /ftmp > /dev/null 2>&1
27
fi
28

    
29
file_notice() {
30
	/usr/local/bin/php -q -d auto_prepend_file=config.inc <<ENDOFF
31
	<?php
32
		require_once("globals.inc");		
33
		require_once("functions.inc");
34
		file_notice("$1", "$2", "$1", "");
35
	?>
36
ENDOFF
37
}
38

    
39
output_env_to_log() {
40
	date >> /conf/upgrade_log.txt
41
	echo "" >> /conf/upgrade_log.txt
42
	
43
	ls -lah /dev/ >> /conf/upgrade_log.txt
44
	echo "" >> /conf/upgrade_log.txt
45

    
46
	ls -lah $IMG >> /conf/upgrade_log.txt
47
	echo "" >> /conf/upgrade_log.txt
48

    
49
	md5 $IMG >> /conf/upgrade_log.txt
50
	echo "" >> /conf/upgrade_log.txt
51

    
52
	mount >> /conf/upgrade_log.txt
53
	echo "" >> /conf/upgrade_log.txt
54

    
55
	top >> /conf/upgrade_log.txt
56
	echo "" >> /conf/upgrade_log.txt
57
}
58

    
59
backup_chflags() {
60
	TOPROCESS="bin lib libexec sbin usr"
61
	for files in $TOPROCESS; do
62
		/usr/sbin/mtree -Pcp /${files} | bzip2 -9 > /tmp/chflags.dist.${files}.bz2 2>> /conf/upgrade_log.txt 
63
	done
64
}
65

    
66
restore_chflags() {
67
	TOPROCESS="bin lib libexec sbin usr"
68
	for files in $TOPROCESS; do
69
		cd / && /usr/bin/bzcat /tmp/chflags.dist.${files}.bz2 | /usr/sbin/mtree -PU -p /${files} >> /conf/upgrade_log.txt 2>&1
70
	done
71
}
72

    
73
remove_chflags() {
74
	TOPROCESS="bin lib libexec sbin usr"
75
	for files in $TOPROCESS; do
76
		/bin/chflags -R noschg /${files}
77
		/bin/chmod -R u+rw /${files}
78
	done
79
}
80

    
81
binary_update() {
82
	TGZ=$1
83
	ERR_F="/tmp/bdiff.log"
84
	rm ${ERR_F} 2>/dev/null
85
	/bin/mkdir /tmp/patched /tmp/patches 2>>${ERR_F}
86
	# Save the old shutdown binary. If we switch from i386 to amd64 (or back) the reboot binary won't run at the end since it doesn't match up.
87
	/bin/cp -p /sbin/shutdown /sbin/shutdown.old
88
	backup_chflags
89
	remove_chflags
90
	cd /tmp/patches
91
	for i in `/usr/bin/tar tvzf $TGZ | egrep -v "(^d|_md5)" | nawk '{print $9;}'`;
92
	 do
93
	   FILE=`basename ${i}`
94
	   echo "Working on ${i}"
95
	   # Untar patch file and md5 files
96
	   /usr/bin/tar xzf ${TGZ} ${i} ${i}.old_file_md5 ${i}.new_patch_md5 ${i}.new_file_md5 2>>${ERR_F}
97

    
98
	   # Apply patch - oldfile newfile patchfile
99
	   /usr/local/bin/bspatch /${i} /tmp/patched/${FILE} /tmp/patches/${i} 2>>${ERR_F}
100

    
101
	   OLD_FILE_MD5=`cat /tmp/patches/${i}.old_file_md5 2>/dev/null`
102
	   NEW_PATCH_MD5=`cat /tmp/patches/${i}.new_patch_md5 2>/dev/null`
103
	   NEW_FILE_MD5=`cat /tmp/patches/${i}.new_file_md5 2>/dev/null`
104
	   PATCHED_MD5=`/sbin/md5 -q /tmp/patched/${FILE} 2>/dev/null`
105

    
106
	   if [ "$PATCHED_MD5" = "$NEW_PATCH_MD5" ]; then
107
		/usr/bin/install -S  /tmp/patched/${FILE} /${i}
108
	   else
109
		#echo "${i} file does not match intended final md5."
110
		echo "${i} file does not match intended final md5." >> ${ERR_F}
111
	   fi
112

    
113
	   /bin/rm /tmp/patched/${FILE} >> ${ERR_F}
114
	   /bin/rm /tmp/patches/${i} >> ${ERR_F}
115
	   /bin/rm /tmp/patches/${i}.* >> ${ERR_F}
116
	done
117
	/bin/rm -rf /tmp/patched /tmp/patches >> ${ERR_F}
118
	restore_chflags
119
}
120

    
121
case $ACTION in
122
enable)
123
	touch /conf/upgrade_log.txt
124
	echo "" >> /conf/upgrade_log.txt
125
	echo "Enable" >> /conf/upgrade_log.txt
126
	echo "" >> /conf/upgrade_log.txt		
127
	/etc/rc.conf_mount_ro
128
	;;
129
auto)
130
	touch /var/run/firmwarelock.dirty
131
	backup_chflags
132
	remove_chflags
133
	/etc/rc.firmware_auto
134
	restore_chflags
135
	/etc/rc.conf_mount_ro
136
	;;
137
pfSenseNanoBSDupgrade)
138

    
139
	# Sanity check - bail early if there's no firmware file!
140
	if [ ! -r $IMG ]; then
141
		echo "2nd parameter has not been passed or file does not exist. Exiting." >> /conf/upgrade_log.txt 2>&1
142
		/etc/rc.conf_mount_ro
143
		exit 1
144
	fi
145

    
146
	# Prevent full upgrade file from being used to upgrade
147
	if [ `echo $IMG | grep "full"` ]; then
148
		echo "You cannot use a full file for upgrade.  Please use a file labeled nanobsd upgrade."
149
		file_notice "NanoBSDUpgradeFailure" "You have attemped to use a full NanoBSD installation file as an upgrade.  Please use a NanoBSD file labeled 'upgrade' instead."
150
		rm -f $IMG
151
		/etc/rc.conf_mount_ro		
152
		exit 1
153
	fi
154

    
155
	touch /var/run/firmwarelock.dirty
156

    
157
	echo "NanoBSD Firmware upgrade in progress..."  >> /conf/upgrade_log.txt 2>&1
158
	echo "NanoBSD Firmware upgrade in progress..." | wall
159
	/etc/rc.notify_message -e -g -m "NanoBSD Firmware upgrade in progress..."
160
	
161
	# backup config
162
	/bin/mkdir -p /tmp/configbak
163
	cp -Rp /conf/* /tmp/configbak 2>/dev/null
164

    
165
	# Remove logs from backup dir to avoid clobbering upon restore.
166
	rm /tmp/configbak/*_log.txt 2>/dev/null
167

    
168
	echo "" >> /conf/upgrade_log.txt
169

    
170
	echo "Installing ${IMG}." >> /conf/upgrade_log.txt 2>&1
171
	echo "Installing ${IMG}." | wall
172

    
173
	# resolve glabel label that we booted from
174
	BOOT_DEVICE=`/sbin/mount | /usr/bin/grep pfsense | /usr/bin/cut -d'/' -f4 | /usr/bin/cut -d' ' -f1`
175
	# resolve glabel to the real boot dev entry
176
	REAL_BOOT_DEVICE=`/sbin/glabel list | /usr/bin/grep -B2 ufs/${BOOT_DEVICE} | /usr/bin/head -n 1 | /usr/bin/cut -f3 -d' '`
177
	# grab the boot device, example ad1, ad0
178
	BOOT_DRIVE=`/sbin/glabel list | /usr/bin/grep -B2 ufs/pfsense | /usr/bin/head -n 1 | /usr/bin/cut -f3 -d' ' | /usr/bin/cut -d's' -f1`
179
	# test the slice.  if we are on slice 1 we need to flash 2 and vica versa
180
	if [ `echo $REAL_BOOT_DEVICE | /usr/bin/grep "s1"` ]; then 
181
		SLICE="2"
182
		OLDSLICE="1"
183
		TOFLASH="${BOOT_DRIVE}s${SLICE}"
184
		COMPLETE_PATH="${BOOT_DRIVE}s${SLICE}a"
185
		GLABEL_SLICE="pfsense1"
186
		UFS_ID="1"
187
		OLD_UFS_ID="0"
188
	else
189
		SLICE="1"
190
		OLDSLICE="2"		
191
		TOFLASH="${BOOT_DRIVE}s${SLICE}"
192
		COMPLETE_PATH="${BOOT_DRIVE}s${SLICE}a"
193
		GLABEL_SLICE="pfsense0"
194
		UFS_ID="0"
195
		OLD_UFS_ID="1"
196
	fi
197

    
198
	# Output specifc information that this script is using
199
	echo "SLICE         ${SLICE}" >> /conf/upgrade_log.txt
200
	echo "OLDSLICE      ${OLDSLICE}" >> /conf/upgrade_log.txt
201
	echo "TOFLASH       ${TOFLASH}" >> /conf/upgrade_log.txt
202
	echo "COMPLETE_PATH ${COMPLETE_PATH}" >> /conf/upgrade_log.txt
203
	echo "GLABEL_SLICE  ${GLABEL_SLICE}" >> /conf/upgrade_log.txt
204

    
205
	# First ensure the new file can fit inside the 
206
	# slice that we are going to be operating on.
207
	NEW_IMG_SIZE=`echo $((\`gzip -l ${IMG} | grep -v compressed | awk '{ print $2}'\` / 1024 / 1024))`
208
	SIZE=`/sbin/fdisk ${COMPLETE_PATH} | /usr/bin/grep Meg | /usr/bin/awk '{ print $5 }' | /usr/bin/cut -d"(" -f2`
209
	# USB slices are under-reported even more than CF slices when viewed
210
	#   directly, instead of when looking at the entire disk. Compensate
211
	#   by adding exactly 6MB. 4MB was consistently 2MB too few, and
212
	#   was resulting in failing upgrades on USB Flash based installs.
213
	SIZE=`expr $SIZE + 6`
214
	if [ "$SIZE" -lt "$NEW_IMG_SIZE" ]; then
215
		file_notice "UpgradeFailure" "Upgrade failed due to the upgrade image being larger than the partition that is configured on disk.  Halting. Size on disk: $SIZE < Size of new image: $NEW_IMG_SIZE"
216
		echo "Upgrade failed.  Please check the system log file for more information" | wall
217
		rm -f $IMG
218
		rm -f /var/run/firmwarelock.dirty
219
		rm -f /var/run/firmware.lock
220
		rm -f ${IMG}
221
		/etc/rc.conf_mount_ro		
222
		exit 1
223
	fi
224

    
225
	# Output environment information to log file
226
	output_env_to_log
227
	
228
	# Grab a before upgrade look at fdisk
229
	echo "" >> /conf/fdisk_upgrade_log.txt
230
	echo "Before upgrade fdisk/bsdlabel" >> /conf/fdisk_upgrade_log.txt
231
	fdisk $BOOT_DRIVE >> /conf/fdisk_upgrade_log.txt
232
	bsdlabel -A ${BOOT_DRIVE}s1 >> /conf/fdisk_upgrade_log.txt
233
	bsdlabel -A ${BOOT_DRIVE}s2 >> /conf/fdisk_upgrade_log.txt
234
	bsdlabel -A ${BOOT_DRIVE}s3 >> /conf/fdisk_upgrade_log.txt
235
	echo "---------------------------------------------------------------" >> /conf/fdisk_upgrade_log.txt
236
	echo "" >> /conf/fdisk_upgrade_log.txt
237
	
238
	# Log that we are really doing a NanoBSD upgrade
239
	echo "" >> /conf/upgrade_log.txt
240
	echo "NanoBSD upgrade starting" >> /conf/upgrade_log.txt
241
	echo "" >> /conf/upgrade_log.txt
242

    
243
	# Remove TOFLASH and get ready for new flash image
244
	echo "" >> /conf/upgrade_log.txt
245
	echo "dd if=/dev/zero of=/dev/${TOFLASH} bs=1m count=1" >> /conf/upgrade_log.txt	
246
	dd if=/dev/zero of=/dev/${TOFLASH} bs=1m count=1 >> /conf/upgrade_log.txt 2>&1
247

    
248
	# Stream gzipped image to dd and explode image to new area
249
	echo "" >> /conf/upgrade_log.txt
250
	echo "/usr/bin/gzip -dc $IMG | /bin/dd of=/dev/${TOFLASH} obs=64k" >> /conf/upgrade_log.txt
251
	/usr/bin/gzip -dc $IMG | /bin/dd of=/dev/${TOFLASH} obs=64k >> /conf/upgrade_log.txt 2>&1
252

    
253
	# Grab a after upgrade look at fdisk
254
	echo "" >> /conf/fdisk_upgrade_log.txt
255
	echo "After upgrade fdisk/bsdlabel" >> /conf/upgrade_log.txt
256
	fdisk $BOOT_DRIVE >> /conf/fdisk_upgrade_log.txt
257
	bsdlabel -A ${BOOT_DRIVE}s1 >> /conf/fdisk_upgrade_log.txt
258
	bsdlabel -A ${BOOT_DRIVE}s2 >> /conf/fdisk_upgrade_log.txt
259
	bsdlabel -A ${BOOT_DRIVE}s3 >> /conf/fdisk_upgrade_log.txt
260
	echo "---------------------------------------------------------------" >> /conf/fdisk_upgrade_log.txt
261
	echo "" >> /conf/fdisk_upgrade_log.txt
262
	
263
	# Ensure that our new system is sound and bail if it is not and file a notice
264
	echo "" >> /conf/upgrade_log.txt
265
	echo "/sbin/fsck_ufs -y /dev/${COMPLETE_PATH}" >> /conf/upgrade_log.txt
266
	/sbin/fsck_ufs -y /dev/${COMPLETE_PATH} >> /conf/upgrade_log.txt 2>&1
267
	if [ $? != 0 ]; then
268
		file_notice "UpgradeFailure" "{\$g['product_name']} upgrade has failed.   Your system has been left in a usable state."
269
		rm -f $IMG
270
		rm -f /var/run/firmwarelock.dirty
271
		rm -f /var/run/firmware.lock
272
		/etc/rc.conf_mount_ro		
273
		exit 1
274
	fi
275

    
276
	# Enable foot shooting
277
	sysctl kern.geom.debugflags=16
278

    
279
	# Add back the corresponding glabel
280
	echo "" >> /conf/upgrade_log.txt
281
	echo "/sbin/tunefs -L ${GLABEL_SLICE} /dev/${COMPLETE_PATH}" >> /conf/upgrade_log.txt
282
	/sbin/tunefs -L ${GLABEL_SLICE} /dev/${COMPLETE_PATH} >> /conf/upgrade_log.txt 2>&1
283

    
284
	# restore config
285
	cp -Rp /tmp/configbak/* /conf 2>/dev/null
286

    
287
	# Remove upgrade file
288
	rm -f $IMG
289

    
290
	# Mount newly prepared slice
291
	mkdir /tmp/$GLABEL_SLICE
292
	mount /dev/ufs/$GLABEL_SLICE /tmp/$GLABEL_SLICE
293

    
294
	# If /boot/loader.conf.local exists
295
	# copy to the other slice.
296
	if [ -f /boot/loader.conf.local ]; then
297
		cp /boot/loader.conf.local /tmp/$GLABEL_SLICE/boot/loader.conf.local
298
	fi
299

    
300
	# If /tmp/$GLABEL_SLICE/tmp/post_upgrade_command exists 
301
	# after update then execute the command.
302
	echo "Checking for post_upgrade_command..." >> /conf/upgrade_log.txt
303
	if [ -f /tmp/$GLABEL_SLICE/tmp/post_upgrade_command ]; then
304
		echo "Found post_upgrade_command, executing ($GLABEL_SLICE)..." >> /conf/upgrade_log.txt
305
		sh /tmp/$GLABEL_SLICE/tmp/post_upgrade_command $GLABEL_SLICE >> /conf/upgrade_log.txt 2>&1
306
	fi
307

    
308
	# Update fstab
309
	cp /etc/fstab /tmp/$GLABEL_SLICE/etc/fstab
310
	sed -i "" "s/pfsense${OLD_UFS_ID}/pfsense${UFS_ID}/g" /tmp/$GLABEL_SLICE/etc/fstab
311
	if [ $? != 0 ]; then
312
		echo "Something went wrong when trying to update the fstab entry.  Aborting upgrade."
313
		file_notice "UpgradeFailure" "Something went wrong when trying to update the fstab entry.  Aborting upgrade."
314
		rm -f $IMG
315
		rm -f /var/run/firmwarelock.dirty
316
		rm -f /var/run/firmware.lock
317
		umount /tmp/$GLABEL_SLICE
318
		/etc/rc.conf_mount_ro
319
		exit 1
320
	fi
321
	echo "" >> /conf/upgrade_log.txt
322
	cat /tmp/$GLABEL_SLICE/etc/fstab >> /conf/upgrade_log.txt
323

    
324
	echo "" >> /conf/upgrade_log.txt
325
	find /tmp/$GLABEL_SLICE >/conf/file_upgrade_log.txt
326
	echo "" >> /conf/upgrade_log.txt
327

    
328
	# Unmount newly prepared slice
329
	umount /tmp/$GLABEL_SLICE
330
	
331
	sync
332

    
333
	# Set active mount slice in fdisk
334
	echo "" >> /conf/upgrade_log.txt
335
	echo "gpart set -a active -i ${SLICE} ${BOOT_DRIVE}" >> /conf/upgrade_log.txt
336
	gpart set -a active -i ${SLICE} ${BOOT_DRIVE} >> /conf/upgrade_log.txt 2>&1
337

    
338
	sync
339

    
340
	# Set active boot source - NanoBSD does not do this but otherwise we
341
	# end up with the wrong partition being active.
342
	echo "" >> /conf/upgrade_log.txt
343
	echo "/usr/sbin/boot0cfg -s ${SLICE} -v /dev/${BOOT_DRIVE}" >> /conf/upgrade_log.txt
344
	/usr/sbin/boot0cfg -s ${SLICE} -v /dev/${BOOT_DRIVE} >> /conf/upgrade_log.txt 2>&1
345

    
346
	# Disable foot shooting
347
	sysctl kern.geom.debugflags=0
348

    
349
	# Grab a final look at fdisk
350
	echo "" >> /conf/fdisk_upgrade_log.txt
351
	echo "Final upgrade fdisk/bsdlabel" >> /conf/fdisk_upgrade_log.txt
352
	fdisk $BOOT_DRIVE >> /conf/fdisk_upgrade_log.txt
353
	bsdlabel -A ${BOOT_DRIVE}s1 >> /conf/fdisk_upgrade_log.txt
354
	bsdlabel -A ${BOOT_DRIVE}s2 >> /conf/fdisk_upgrade_log.txt
355
	bsdlabel -A ${BOOT_DRIVE}s3 >> /conf/fdisk_upgrade_log.txt
356
	echo "---------------------------------------------------------------" >> /conf/fdisk_upgrade_log.txt
357
	echo "" >> /conf/fdisk_upgrade_log.txt
358

    
359
	# Remove extra stuff
360
	rm -rf /etc/rc.conf
361
	rm -rf /etc/motd
362
	rm -rf /usr/savecore/*
363

    
364
	date >> /conf/upgrade_log.txt
365
	echo "" >> /conf/upgrade_log.txt
366

    
367
	# Trigger a package reinstallation on reobot
368
	touch /conf/needs_package_sync
369

    
370
	# remount /cf ro
371
	/etc/rc.conf_mount_ro
372
	/bin/sync
373

    
374
	echo "NanoBSD Firmware upgrade is complete.  Rebooting in 10 seconds."  >> /conf/upgrade_log.txt 2>&1
375
	echo "NanoBSD Firmware upgrade is complete.  Rebooting in 10 seconds." | wall
376
	/etc/rc.notify_message -e -g -m "NanoBSD Firmware upgrade is complete.  Rebooting in 10 seconds."
377

    
378
	sleep 10
379

    
380
	rm -f /var/run/firmwarelock.dirty
381
	rm -f /var/run/firmware.lock
382
	. /etc/rc.reboot
383

    
384
	;;
385
pfSenseupgrade)
386

    
387
	# Sanity check - bail early if there's no firmware file!
388
	if [ ! -r $IMG ]; then
389
		echo "2nd parameter has not been passed or file does not exist. Exiting." >> /conf/upgrade_log.txt 2>&1
390
		/etc/rc.conf_mount_ro
391
		exit
392
	fi
393

    
394
	# wait 1 seconds before beginning
395
	sleep 1
396

    
397
	# Log that we are really doing a pfSense upgrade
398
	echo "" >> /conf/upgrade_log.txt
399
	echo "pfSenseupgrade upgrade starting" >> /conf/upgrade_log.txt
400
	echo "" >> /conf/upgrade_log.txt
401

    
402
	touch /var/run/firmwarelock.dirty
403

    
404
	if [ -f /tmp/perform_full_backup.txt ]; then
405
		echo "Performing full backup" >> /conf/upgrade_log.txt
406
		/etc/rc.create_full_backup
407
		rm /tmp/perform_full_backup.txt
408
	fi
409

    
410
	touch /conf/upgrade_log.txt
411
	echo "" >> /conf/upgrade_log.txt
412

    
413
	# Output environment information to log file
414
	output_env_to_log
415

    
416
	backup_chflags
417
	remove_chflags
418

    
419
	# Do we have a pre-upgrade hook in the update file?
420
	if [ `tar tvzf $IMG | grep /tmp/pre_upgrade_command | wc -l` -gt 0 ]; then 
421
		tar xzvf $IMG -C / ./tmp/pre_upgrade_command >> /conf/upgrade_log.txt 2>&1
422
		chmod a+rx /tmp/pre_upgrade_command >> /conf/upgrade_log.txt 2>&1
423
		sh /tmp/pre_upgrade_command >> /conf/upgrade_log.txt 2>&1
424
	fi
425

    
426
	echo "Firmware upgrade in progress..."  >> /conf/upgrade_log.txt 2>&1
427
	echo "Firmware upgrade in progress..."  | wall
428
	/etc/rc.notify_message -e -g -m "Firmware upgrade in progress..."
429
	
430
	# backup config
431
	[ -d /tmp/configbak ] && rm -rf /tmp/configbak
432
	/bin/mkdir -p /tmp/configbak
433
	cp -Rp /conf/* /tmp/configbak 2>/dev/null
434

    
435
	# Remove logs from backup dir to avoid clobbering upon restore.
436
	rm /tmp/configbak/*_log.txt 2>/dev/null
437

    
438
	# tar explode image onto hd
439
	killall -9 check_reload_status
440
	killall -9 check_reload_status
441
	echo "Installing $IMG." >> /conf/upgrade_log.txt 2>&1
442
	cd / && /usr/bin/tar --exclude=./dev -xzUPf $IMG >> /conf/upgrade_log.txt 2>&1
443
	/usr/local/sbin/check_reload_status
444
	echo "Image installed $IMG." >> /conf/upgrade_log.txt 2>&1
445

    
446
    # process custom image if its passed
447
    if [ $# -eq 3 ]; then
448
	    if [ -f $CUSTOMIMG ]; then
449
	        echo "Custom image $CUSTOMIMG found." >> /conf/upgrade_log.txt 2>&1
450
	        echo "Custom image ($CUSTOMIMG) found." >> /conf/upgrade_log.txt 2>&1
451
	        PWD_DIR=`pwd`
452
	        cd / && /usr/bin/tar xzPUf $CUSTOMIMG >> /conf/upgrade_log.txt 2>&1
453
	        cd $PWD_DIR
454
	        echo "Custom image $CUSTOMIMG installed." >> /conf/upgrade_log.txt 2>&1
455
	    fi
456
    fi
457

    
458
	# restore config
459
	cp -Rp /tmp/configbak/* /conf 2>/dev/null
460

    
461
	# restore /etc symlinks
462
	rm /etc/hosts
463
	ln -s /var/etc/hosts /etc/hosts
464

    
465
	restore_chflags
466

    
467
	# Remove upgrade file
468
	rm -f $IMG
469

    
470
	if [ -e /etc/init_bootloader.sh ]; then
471
		if [ ! -x /etc/init_bootloader.sh ]; then
472
			chmod ug+x /etc/init_bootloader.sh
473
		fi
474
		/etc/init_bootloader.sh >> /conf/upgrade_log.txt 2>&1
475
	fi
476

    
477
	# Remove saved commit ID for gitsync
478
	rm -f /etc/version.gitsync
479

    
480
	# If /tmp/post_upgrade_command exists after update
481
	# then execute the command.
482
	if [ -f /tmp/post_upgrade_command ]; then
483
		if [ ! -x /tmp/post_upgrade_command ]; then
484
			chmod ug+x /tmp/post_upgrade_command
485
		fi
486
		/tmp/post_upgrade_command >> /conf/upgrade_log.txt 2>&1
487
	fi
488

    
489
	# remove unused files
490
	rm -rf /etc/rc.conf
491
	rm -rf /etc/motd
492
	rm -rf /usr/savecore/*
493

    
494
	date >> /conf/upgrade_log.txt
495
	echo "" >> /conf/upgrade_log.txt
496

    
497
	# remount /cf ro
498
	/etc/rc.conf_mount_ro
499

    
500
	# release the firmware lock
501
	rm -f /var/run/firmwarelock.dirty
502
	rm -f /var/run/firmware.lock
503
	/bin/sync
504

    
505
	echo "Firmware upgrade is complete. Rebooting in 10 seconds."  >> /conf/upgrade_log.txt 2>&1
506
	echo "Firmware upgrade is complete. Rebooting in 10 seconds."  | wall
507
	/etc/rc.notify_message -e -g -m "Firmware upgrade is complete. Rebooting in 10 seconds."
508

    
509
	# Sleep and allow disks to catch up
510
	sleep 10
511

    
512
	# If the archive has unpacked a file called
513
	# /tmp/no_upgrade_reboot_required then do
514
	# not reboot after upgrade.
515
	if [ -f /tmp/no_upgrade_reboot_required ]; then
516
		rm /tmp/no_upgrade_reboot_required
517
	else
518
		. /etc/rc.reboot
519
	fi
520

    
521
	;;
522
delta_update)
523
	touch /var/run/firmwarelock.dirty
524
	backup_chflags
525
	remove_chflags
526
	binary_update $IMG
527
	restore_chflags
528
	rm -rf /etc/rc.conf
529
	rm -rf /etc/motd
530
	find / -name CVS -type d -exec rm {} \;
531
	rm -rf /usr/savecore/*
532
	/etc/rc.conf_mount_ro
533
	/sbin/umount -f /cf 2>/dev/null
534
	/sbin/mount -r /cf 2>/dev/null
535
	/sbin/umount -f / 2>/dev/null
536
	/sbin/mount -r / 2>/dev/null
537
	if [ -e /etc/init_bootloader.sh ]; then
538
		sh /etc/init_bootloader.sh
539
	fi
540

    
541
	;;
542
esac
543

    
(51-51/103)