REST-API mit Response-Envelope (1:1 mail-gateway), HS256-JWT-Signer (Secret persistent unter /var/lib/edgeguard/.jwt_fingerprint), Setup-Wizard (Bcrypt-Admin-Passwort in setup.json), Auth-Middleware (Cookie + Bearer), Setup-Gate. Update-Banner-Endpoints /system/package-versions + /system/upgrade ab Tag 1 wired (Pattern aus enconf-management-agent: systemd-run detached, HTTP-Response geht VOR dem Self-Replace raus). CRUD-Repos für domains/backends/routing_rules mit pgxpool + handgeschriebenem SQL (mail-gateway-Pattern, kein GORM zur Laufzeit). Audit-Log-Schreiber auf jede Mutation, NodeID aus /etc/machine-id. DB-Pool öffnet best-effort — ohne erreichbare PG bleiben CRUD-Routen unregistriert, Auth/Setup/System antworten weiter (Dev ohne PG). End-to-end live-getestet gegen lokale postgres-16: Setup → Login → POST/PUT/DELETE Backends + Domains + Routing-Rules → audit_log schreibt 5 Zeilen mit korrektem actor/action/subject. Graceful degrade ohne DB ebenfalls verifiziert. Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
143 lines
4.1 KiB
Go
143 lines
4.1 KiB
Go
package handlers
|
|
|
|
import (
|
|
"log/slog"
|
|
"net/http"
|
|
"os"
|
|
"os/exec"
|
|
"regexp"
|
|
"strings"
|
|
"syscall"
|
|
|
|
"github.com/gin-gonic/gin"
|
|
|
|
"git.netcell-it.de/projekte/edgeguard-native/internal/handlers/response"
|
|
)
|
|
|
|
// SystemHandler covers /system/health, /system/package-versions and
|
|
// /system/upgrade. Wired from day 1 because the management UI carries
|
|
// an update banner that polls package-versions.
|
|
type SystemHandler struct {
|
|
Version string
|
|
}
|
|
|
|
func NewSystemHandler(version string) *SystemHandler {
|
|
return &SystemHandler{Version: version}
|
|
}
|
|
|
|
func (h *SystemHandler) Register(rg *gin.RouterGroup) {
|
|
g := rg.Group("/system")
|
|
g.GET("/health", h.Health)
|
|
g.GET("/package-versions", h.PackageVersions)
|
|
g.POST("/upgrade", h.Upgrade)
|
|
}
|
|
|
|
func (h *SystemHandler) Health(c *gin.Context) {
|
|
response.OK(c, gin.H{
|
|
"status": "ok",
|
|
"version": h.Version,
|
|
})
|
|
}
|
|
|
|
// PackageVersions reports installed and available versions for the
|
|
// edgeguard-* APT packages. Called by the UI's update banner — it
|
|
// polls every few minutes and lights up when available > installed.
|
|
//
|
|
// `apt-get update -qq` is fired first (best-effort, no error if it
|
|
// fails — we'd still return the cached candidate). Then `apt-cache
|
|
// policy` is parsed for each package.
|
|
func (h *SystemHandler) PackageVersions(c *gin.Context) {
|
|
_ = exec.Command("apt-get", "update", "-qq").Run()
|
|
|
|
out := map[string]string{}
|
|
for _, pkg := range []string{"edgeguard-api", "edgeguard-ui", "edgeguard"} {
|
|
raw, err := exec.Command("apt-cache", "policy", pkg).CombinedOutput()
|
|
if err != nil {
|
|
out[pkg+"_installed"] = ""
|
|
out[pkg+"_available"] = ""
|
|
continue
|
|
}
|
|
installed, candidate := parseAptPolicy(string(raw))
|
|
out[pkg+"_installed"] = installed
|
|
out[pkg+"_available"] = candidate
|
|
}
|
|
response.OK(c, out)
|
|
}
|
|
|
|
// Upgrade runs the apt upgrade detached via systemd-run so the API
|
|
// can reply BEFORE the package replaces it. Pattern from netcell-
|
|
// webpanel/management-agent/internal/handlers/update.go (see
|
|
// architecture.md §11). Without --collect on a transient service
|
|
// unit, the apt-get child dies when systemd-cleans up the scope as
|
|
// the API exits — leaves the box half-upgraded.
|
|
func (h *SystemHandler) Upgrade(c *gin.Context) {
|
|
slog.Info("starting package upgrade (detached)")
|
|
|
|
const script = `#!/bin/bash
|
|
set -e
|
|
sleep 2
|
|
export DEBIAN_FRONTEND=noninteractive
|
|
echo "[upgrade] dpkg --configure -a"
|
|
dpkg --configure -a || true
|
|
echo "[upgrade] apt-get update"
|
|
apt-get update -qq
|
|
echo "[upgrade] apt-get install -y edgeguard-api edgeguard-ui edgeguard"
|
|
apt-get install -y -qq -o Dpkg::Options::=--force-confold edgeguard-api edgeguard-ui edgeguard
|
|
echo "[upgrade] complete"
|
|
rm -f /tmp/edgeguard-upgrade.sh
|
|
`
|
|
if err := os.WriteFile("/tmp/edgeguard-upgrade.sh", []byte(script), 0o755); err != nil {
|
|
response.Internal(c, err)
|
|
return
|
|
}
|
|
|
|
const unitName = "edgeguard-upgrade.service"
|
|
_ = exec.Command("systemctl", "reset-failed", unitName).Run()
|
|
cmd := exec.Command("systemd-run",
|
|
"--unit="+unitName,
|
|
"--description=EdgeGuard self-upgrade",
|
|
"--collect",
|
|
"bash", "/tmp/edgeguard-upgrade.sh")
|
|
if err := cmd.Run(); err != nil {
|
|
// systemd-run unavailable (dev env) — fall back to setsid
|
|
fallback := exec.Command("setsid", "bash", "/tmp/edgeguard-upgrade.sh")
|
|
fallback.SysProcAttr = &syscall.SysProcAttr{Setpgid: true}
|
|
if err2 := fallback.Start(); err2 != nil {
|
|
response.Internal(c, err2)
|
|
return
|
|
}
|
|
_ = fallback.Process.Release()
|
|
}
|
|
|
|
c.JSON(http.StatusAccepted, response.Envelope{
|
|
Data: gin.H{"status": "upgrading", "unit": unitName},
|
|
Error: nil,
|
|
Message: "Upgrade gestartet",
|
|
})
|
|
}
|
|
|
|
// parseAptPolicy extracts "Installed: x" and "Candidate: y" from
|
|
// apt-cache policy output. Both can be "(none)"; we normalise that to
|
|
// empty string.
|
|
var aptPolicyLine = regexp.MustCompile(`^\s+(Installed|Candidate):\s+(.+)\s*$`)
|
|
|
|
func parseAptPolicy(out string) (installed, candidate string) {
|
|
for _, line := range strings.Split(out, "\n") {
|
|
m := aptPolicyLine.FindStringSubmatch(line)
|
|
if m == nil {
|
|
continue
|
|
}
|
|
val := m[2]
|
|
if val == "(none)" {
|
|
val = ""
|
|
}
|
|
switch m[1] {
|
|
case "Installed":
|
|
installed = val
|
|
case "Candidate":
|
|
candidate = val
|
|
}
|
|
}
|
|
return installed, candidate
|
|
}
|