mirror of
https://github.com/token2/snapd.git
synced 2026-03-13 11:15:47 -07:00
Add a SNAP_CLIENT_DEBUG_HTTP bitfield environment variable that allows logging requests, responses and bodies that the client receives from the REST API. Bodies are never logged in local installs because, since they contain packaged snaps, their size would make the log unreadable. Signed-off-by: Miguel Pires <miguel.pires@canonical.com>
802 lines
22 KiB
Go
802 lines
22 KiB
Go
// -*- Mode: Go; indent-tabs-mode: t -*-
|
|
|
|
/*
|
|
* Copyright (C) 2015-2020 Canonical Ltd
|
|
*
|
|
* This program is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License version 3 as
|
|
* published by the Free Software Foundation.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*
|
|
*/
|
|
|
|
package client
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
"io"
|
|
"io/ioutil"
|
|
"net"
|
|
"net/http"
|
|
"net/url"
|
|
"os"
|
|
"path"
|
|
"strconv"
|
|
"time"
|
|
|
|
"github.com/snapcore/snapd/dirs"
|
|
"github.com/snapcore/snapd/httputil"
|
|
"github.com/snapcore/snapd/jsonutil"
|
|
)
|
|
|
|
func unixDialer(socketPath string) func(string, string) (net.Conn, error) {
|
|
if socketPath == "" {
|
|
socketPath = dirs.SnapdSocket
|
|
}
|
|
return func(_, _ string) (net.Conn, error) {
|
|
return net.Dial("unix", socketPath)
|
|
}
|
|
}
|
|
|
|
type doer interface {
|
|
Do(*http.Request) (*http.Response, error)
|
|
}
|
|
|
|
// Config allows to customize client behavior.
|
|
type Config struct {
|
|
// BaseURL contains the base URL where snappy daemon is expected to be.
|
|
// It can be empty for a default behavior of talking over a unix socket.
|
|
BaseURL string
|
|
|
|
// DisableAuth controls whether the client should send an
|
|
// Authorization header from reading the auth.json data.
|
|
DisableAuth bool
|
|
|
|
// Interactive controls whether the client runs in interactive mode.
|
|
// At present, this only affects whether interactive polkit
|
|
// authorisation is requested.
|
|
Interactive bool
|
|
|
|
// Socket is the path to the unix socket to use
|
|
Socket string
|
|
|
|
// DisableKeepAlive indicates whether the connections should not be kept
|
|
// alive for later reuse
|
|
DisableKeepAlive bool
|
|
|
|
// User-Agent to sent to the snapd daemon
|
|
UserAgent string
|
|
}
|
|
|
|
// A Client knows how to talk to the snappy daemon.
|
|
type Client struct {
|
|
baseURL url.URL
|
|
doer doer
|
|
|
|
disableAuth bool
|
|
interactive bool
|
|
|
|
maintenance error
|
|
|
|
warningCount int
|
|
warningTimestamp time.Time
|
|
|
|
userAgent string
|
|
|
|
// SetMayLogBody controls whether a request or response's body may be logged
|
|
// if the appropriate environment variable is set
|
|
SetMayLogBody func(bool)
|
|
}
|
|
|
|
// New returns a new instance of Client
|
|
func New(config *Config) *Client {
|
|
if config == nil {
|
|
config = &Config{}
|
|
}
|
|
|
|
var baseURL *url.URL
|
|
var dial func(network, addr string) (net.Conn, error)
|
|
|
|
// By default talk over an UNIX socket.
|
|
if config.BaseURL == "" {
|
|
dial = unixDialer(config.Socket)
|
|
baseURL = &url.URL{
|
|
Scheme: "http",
|
|
Host: "localhost",
|
|
}
|
|
} else {
|
|
var err error
|
|
baseURL, err = url.Parse(config.BaseURL)
|
|
if err != nil {
|
|
panic(fmt.Sprintf("cannot parse server base URL: %q (%v)", config.BaseURL, err))
|
|
}
|
|
}
|
|
|
|
transport := &httputil.LoggedTransport{
|
|
Transport: &http.Transport{
|
|
Dial: dial,
|
|
DisableKeepAlives: config.DisableKeepAlive,
|
|
},
|
|
Key: "SNAP_CLIENT_DEBUG_HTTP",
|
|
MayLogBody: true,
|
|
}
|
|
return &Client{
|
|
baseURL: *baseURL,
|
|
doer: &http.Client{Transport: transport},
|
|
disableAuth: config.DisableAuth,
|
|
interactive: config.Interactive,
|
|
userAgent: config.UserAgent,
|
|
SetMayLogBody: func(logBody bool) {
|
|
transport.MayLogBody = logBody
|
|
},
|
|
}
|
|
}
|
|
|
|
// Maintenance returns an error reflecting the daemon maintenance status or nil.
|
|
func (client *Client) Maintenance() error {
|
|
return client.maintenance
|
|
}
|
|
|
|
// WarningsSummary returns the number of warnings that are ready to be shown to
|
|
// the user, and the timestamp of the most recently added warning (useful for
|
|
// silencing the warning alerts, and OKing the returned warnings).
|
|
func (client *Client) WarningsSummary() (count int, timestamp time.Time) {
|
|
return client.warningCount, client.warningTimestamp
|
|
}
|
|
|
|
func (client *Client) WhoAmI() (string, error) {
|
|
user, err := readAuthData()
|
|
if os.IsNotExist(err) {
|
|
return "", nil
|
|
}
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
return user.Email, nil
|
|
}
|
|
|
|
func (client *Client) setAuthorization(req *http.Request) error {
|
|
user, err := readAuthData()
|
|
if os.IsNotExist(err) {
|
|
return nil
|
|
}
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
var buf bytes.Buffer
|
|
fmt.Fprintf(&buf, `Macaroon root="%s"`, user.Macaroon)
|
|
for _, discharge := range user.Discharges {
|
|
fmt.Fprintf(&buf, `, discharge="%s"`, discharge)
|
|
}
|
|
req.Header.Set("Authorization", buf.String())
|
|
return nil
|
|
}
|
|
|
|
type RequestError struct{ error }
|
|
|
|
func (e RequestError) Error() string {
|
|
return fmt.Sprintf("cannot build request: %v", e.error)
|
|
}
|
|
|
|
type AuthorizationError struct{ Err error }
|
|
|
|
func (e AuthorizationError) Error() string {
|
|
return fmt.Sprintf("cannot add authorization: %v", e.Err)
|
|
}
|
|
|
|
func (e AuthorizationError) Is(target error) bool {
|
|
_, ok := target.(AuthorizationError)
|
|
return ok
|
|
}
|
|
|
|
type ConnectionError struct{ Err error }
|
|
|
|
func (e ConnectionError) Error() string {
|
|
var errStr string
|
|
switch e.Err {
|
|
case context.DeadlineExceeded:
|
|
errStr = "timeout exceeded while waiting for response"
|
|
case context.Canceled:
|
|
errStr = "request canceled"
|
|
default:
|
|
errStr = e.Err.Error()
|
|
}
|
|
return fmt.Sprintf("cannot communicate with server: %s", errStr)
|
|
}
|
|
|
|
func (e ConnectionError) Unwrap() error {
|
|
return e.Err
|
|
}
|
|
|
|
type InternalClientError struct{ Err error }
|
|
|
|
func (e InternalClientError) Error() string {
|
|
return fmt.Sprintf("internal error: %s", e.Err.Error())
|
|
}
|
|
|
|
func (e InternalClientError) Is(target error) bool {
|
|
_, ok := target.(InternalClientError)
|
|
return ok
|
|
}
|
|
|
|
// AllowInteractionHeader is the HTTP request header used to indicate
|
|
// that the client is willing to allow interaction.
|
|
const AllowInteractionHeader = "X-Allow-Interaction"
|
|
|
|
// raw performs a request and returns the resulting http.Response and
|
|
// error. You usually only need to call this directly if you expect the
|
|
// response to not be JSON, otherwise you'd call Do(...) instead.
|
|
func (client *Client) raw(ctx context.Context, method, urlpath string, query url.Values, headers map[string]string, body io.Reader) (*http.Response, error) {
|
|
// fake a url to keep http.Client happy
|
|
u := client.baseURL
|
|
u.Path = path.Join(client.baseURL.Path, urlpath)
|
|
u.RawQuery = query.Encode()
|
|
req, err := http.NewRequest(method, u.String(), body)
|
|
if err != nil {
|
|
return nil, RequestError{err}
|
|
}
|
|
if client.userAgent != "" {
|
|
req.Header.Set("User-Agent", client.userAgent)
|
|
}
|
|
|
|
for key, value := range headers {
|
|
req.Header.Set(key, value)
|
|
}
|
|
// Content-length headers are special and need to be set
|
|
// directly to the request. Just setting it to the header
|
|
// will be ignored by go http.
|
|
if clStr := req.Header.Get("Content-Length"); clStr != "" {
|
|
cl, err := strconv.ParseInt(clStr, 10, 64)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
req.ContentLength = cl
|
|
}
|
|
|
|
if !client.disableAuth {
|
|
// set Authorization header if there are user's credentials
|
|
err = client.setAuthorization(req)
|
|
if err != nil {
|
|
return nil, AuthorizationError{err}
|
|
}
|
|
}
|
|
|
|
if client.interactive {
|
|
req.Header.Set(AllowInteractionHeader, "true")
|
|
}
|
|
|
|
if ctx != nil {
|
|
req = req.WithContext(ctx)
|
|
}
|
|
|
|
rsp, err := client.doer.Do(req)
|
|
if err != nil {
|
|
return nil, ConnectionError{err}
|
|
}
|
|
|
|
return rsp, nil
|
|
}
|
|
|
|
// rawWithTimeout is like raw(), but sets a timeout based on opts for
|
|
// the whole of request and response (including rsp.Body() read) round
|
|
// trip. If opts is nil the default doTimeout is used.
|
|
// The caller is responsible for canceling the internal context
|
|
// to release the resources associated with the request by calling the
|
|
// returned cancel function.
|
|
func (client *Client) rawWithTimeout(ctx context.Context, method, urlpath string, query url.Values, headers map[string]string, body io.Reader, opts *doOptions) (*http.Response, context.CancelFunc, error) {
|
|
opts = ensureDoOpts(opts)
|
|
if opts.Timeout <= 0 {
|
|
return nil, nil, InternalClientError{fmt.Errorf("timeout not set in options for rawWithTimeout")}
|
|
}
|
|
|
|
ctx, cancel := context.WithTimeout(ctx, opts.Timeout)
|
|
rsp, err := client.raw(ctx, method, urlpath, query, headers, body)
|
|
if err != nil && ctx.Err() != nil {
|
|
cancel()
|
|
return nil, nil, ConnectionError{ctx.Err()}
|
|
}
|
|
|
|
return rsp, cancel, err
|
|
}
|
|
|
|
var (
|
|
doRetry = 250 * time.Millisecond
|
|
// snapd may need to reach out to the store, where it uses a fixed 10s
|
|
// timeout for the whole of a single request to complete, requests are
|
|
// retried for up to 38s in total, make sure that the client timeout is
|
|
// not shorter than that
|
|
doTimeout = 120 * time.Second
|
|
)
|
|
|
|
// MockDoTimings mocks the delay used by the do retry loop and request timeout.
|
|
func MockDoTimings(retry, timeout time.Duration) (restore func()) {
|
|
oldRetry := doRetry
|
|
oldTimeout := doTimeout
|
|
doRetry = retry
|
|
doTimeout = timeout
|
|
return func() {
|
|
doRetry = oldRetry
|
|
doTimeout = oldTimeout
|
|
}
|
|
}
|
|
|
|
type hijacked struct {
|
|
do func(*http.Request) (*http.Response, error)
|
|
}
|
|
|
|
func (h hijacked) Do(req *http.Request) (*http.Response, error) {
|
|
return h.do(req)
|
|
}
|
|
|
|
// Hijack lets the caller take over the raw http request
|
|
func (client *Client) Hijack(f func(*http.Request) (*http.Response, error)) {
|
|
client.doer = hijacked{f}
|
|
}
|
|
|
|
type doOptions struct {
|
|
// Timeout is the overall request timeout
|
|
Timeout time.Duration
|
|
// Retry interval.
|
|
// Note for a request with a Timeout but without a retry, Retry should just
|
|
// be set to something larger than the Timeout.
|
|
Retry time.Duration
|
|
}
|
|
|
|
func ensureDoOpts(opts *doOptions) *doOptions {
|
|
if opts == nil {
|
|
// defaults
|
|
opts = &doOptions{
|
|
Timeout: doTimeout,
|
|
Retry: doRetry,
|
|
}
|
|
}
|
|
return opts
|
|
}
|
|
|
|
// doNoTimeoutAndRetry can be passed to the do family to not have timeout
|
|
// nor retries.
|
|
var doNoTimeoutAndRetry = &doOptions{
|
|
Timeout: time.Duration(-1),
|
|
}
|
|
|
|
// do performs a request and decodes the resulting json into the given
|
|
// value. It's low-level, for testing/experimenting only; you should
|
|
// usually use a higher level interface that builds on this.
|
|
func (client *Client) do(method, path string, query url.Values, headers map[string]string, body io.Reader, v interface{}, opts *doOptions) (statusCode int, err error) {
|
|
opts = ensureDoOpts(opts)
|
|
|
|
client.checkMaintenanceJSON()
|
|
|
|
var rsp *http.Response
|
|
ctx := context.Background()
|
|
if opts.Timeout <= 0 {
|
|
// no timeout and retries
|
|
rsp, err = client.raw(ctx, method, path, query, headers, body)
|
|
} else {
|
|
if opts.Retry <= 0 {
|
|
return 0, InternalClientError{fmt.Errorf("retry setting %s invalid", opts.Retry)}
|
|
}
|
|
retry := time.NewTicker(opts.Retry)
|
|
defer retry.Stop()
|
|
timeout := time.NewTimer(opts.Timeout)
|
|
defer timeout.Stop()
|
|
|
|
for {
|
|
var cancel context.CancelFunc
|
|
// use the same timeout as for the whole of the retry
|
|
// loop to error out the whole do() call when a single
|
|
// request exceeds the deadline
|
|
rsp, cancel, err = client.rawWithTimeout(ctx, method, path, query, headers, body, opts)
|
|
if err == nil {
|
|
defer cancel()
|
|
}
|
|
if err == nil || shouldNotRetryError(err) || method != "GET" {
|
|
break
|
|
}
|
|
select {
|
|
case <-retry.C:
|
|
continue
|
|
case <-timeout.C:
|
|
}
|
|
break
|
|
}
|
|
}
|
|
if err != nil {
|
|
return 0, err
|
|
}
|
|
defer rsp.Body.Close()
|
|
|
|
if v != nil {
|
|
if err := decodeInto(rsp.Body, v); err != nil {
|
|
return rsp.StatusCode, err
|
|
}
|
|
}
|
|
|
|
return rsp.StatusCode, nil
|
|
}
|
|
|
|
func shouldNotRetryError(err error) bool {
|
|
return errors.Is(err, AuthorizationError{}) ||
|
|
errors.Is(err, InternalClientError{})
|
|
}
|
|
|
|
func decodeInto(reader io.Reader, v interface{}) error {
|
|
dec := json.NewDecoder(reader)
|
|
if err := dec.Decode(v); err != nil {
|
|
r := dec.Buffered()
|
|
buf, err1 := ioutil.ReadAll(r)
|
|
if err1 != nil {
|
|
buf = []byte(fmt.Sprintf("error reading buffered response body: %s", err1))
|
|
}
|
|
return fmt.Errorf("cannot decode %q: %s", buf, err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// doSync performs a request to the given path using the specified HTTP method.
|
|
// It expects a "sync" response from the API and on success decodes the JSON
|
|
// response payload into the given value using the "UseNumber" json decoding
|
|
// which produces json.Numbers instead of float64 types for numbers.
|
|
func (client *Client) doSync(method, path string, query url.Values, headers map[string]string, body io.Reader, v interface{}) (*ResultInfo, error) {
|
|
return client.doSyncWithOpts(method, path, query, headers, body, v, nil)
|
|
}
|
|
|
|
// checkMaintenanceJSON checks if there is a maintenance.json file written by
|
|
// snapd the daemon that positively identifies snapd as being unavailable due to
|
|
// maintenance, either for snapd restarting itself to update, or rebooting the
|
|
// system to update the kernel or base snap, etc. If there is ongoing
|
|
// maintenance, then the maintenance object on the client is set appropriately.
|
|
// note that currently checkMaintenanceJSON does not return errors, such that
|
|
// if the file is missing or corrupt or empty, nothing will happen and it will
|
|
// be silently ignored
|
|
func (client *Client) checkMaintenanceJSON() {
|
|
f, err := os.Open(dirs.SnapdMaintenanceFile)
|
|
// just continue if we can't read the maintenance file
|
|
if err != nil {
|
|
return
|
|
}
|
|
defer f.Close()
|
|
|
|
// we have a maintenance file, try to read it
|
|
maintenance := &Error{}
|
|
|
|
if err := json.NewDecoder(f).Decode(&maintenance); err != nil {
|
|
// if the json is malformed, just ignore it for now, we only use it for
|
|
// positive identification of snapd down for maintenance
|
|
return
|
|
}
|
|
|
|
if maintenance != nil {
|
|
switch maintenance.Kind {
|
|
case ErrorKindDaemonRestart:
|
|
client.maintenance = maintenance
|
|
case ErrorKindSystemRestart:
|
|
client.maintenance = maintenance
|
|
}
|
|
// don't set maintenance for other kinds, as we don't know what it
|
|
// is yet
|
|
|
|
// this also means an empty json object in maintenance.json doesn't get
|
|
// treated as a real maintenance downtime for example
|
|
}
|
|
}
|
|
|
|
func (client *Client) doSyncWithOpts(method, path string, query url.Values, headers map[string]string, body io.Reader, v interface{}, opts *doOptions) (*ResultInfo, error) {
|
|
// first check maintenance.json to see if snapd is down for a restart, and
|
|
// set cli.maintenance as appropriate, then perform the request
|
|
// TODO: it would be a nice thing to skip the request if we know that snapd
|
|
// won't respond and return a specific error, but that's a big behavior
|
|
// change we probably shouldn't make right now, not to mention it probably
|
|
// requires adjustments in other areas too
|
|
client.checkMaintenanceJSON()
|
|
|
|
var rsp response
|
|
statusCode, err := client.do(method, path, query, headers, body, &rsp, opts)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if err := rsp.err(client, statusCode); err != nil {
|
|
return nil, err
|
|
}
|
|
if rsp.Type != "sync" {
|
|
return nil, fmt.Errorf("expected sync response, got %q", rsp.Type)
|
|
}
|
|
|
|
if v != nil {
|
|
if err := jsonutil.DecodeWithNumber(bytes.NewReader(rsp.Result), v); err != nil {
|
|
return nil, fmt.Errorf("cannot unmarshal: %v", err)
|
|
}
|
|
}
|
|
|
|
client.warningCount = rsp.WarningCount
|
|
client.warningTimestamp = rsp.WarningTimestamp
|
|
|
|
return &rsp.ResultInfo, nil
|
|
}
|
|
|
|
func (client *Client) doAsync(method, path string, query url.Values, headers map[string]string, body io.Reader) (changeID string, err error) {
|
|
_, changeID, err = client.doAsyncFull(method, path, query, headers, body, nil)
|
|
return
|
|
}
|
|
|
|
func (client *Client) doAsyncFull(method, path string, query url.Values, headers map[string]string, body io.Reader, opts *doOptions) (result json.RawMessage, changeID string, err error) {
|
|
var rsp response
|
|
statusCode, err := client.do(method, path, query, headers, body, &rsp, opts)
|
|
if err != nil {
|
|
return nil, "", err
|
|
}
|
|
if err := rsp.err(client, statusCode); err != nil {
|
|
return nil, "", err
|
|
}
|
|
if rsp.Type != "async" {
|
|
return nil, "", fmt.Errorf("expected async response for %q on %q, got %q", method, path, rsp.Type)
|
|
}
|
|
if statusCode != 202 {
|
|
return nil, "", fmt.Errorf("operation not accepted")
|
|
}
|
|
if rsp.Change == "" {
|
|
return nil, "", fmt.Errorf("async response without change reference")
|
|
}
|
|
|
|
return rsp.Result, rsp.Change, nil
|
|
}
|
|
|
|
type ServerVersion struct {
|
|
Version string
|
|
Series string
|
|
OSID string
|
|
OSVersionID string
|
|
OnClassic bool
|
|
|
|
KernelVersion string
|
|
Architecture string
|
|
Virtualization string
|
|
}
|
|
|
|
func (client *Client) ServerVersion() (*ServerVersion, error) {
|
|
sysInfo, err := client.SysInfo()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return &ServerVersion{
|
|
Version: sysInfo.Version,
|
|
Series: sysInfo.Series,
|
|
OSID: sysInfo.OSRelease.ID,
|
|
OSVersionID: sysInfo.OSRelease.VersionID,
|
|
OnClassic: sysInfo.OnClassic,
|
|
|
|
KernelVersion: sysInfo.KernelVersion,
|
|
Architecture: sysInfo.Architecture,
|
|
Virtualization: sysInfo.Virtualization,
|
|
}, nil
|
|
}
|
|
|
|
// A response produced by the REST API will usually fit in this
|
|
// (exceptions are the icons/ endpoints obvs)
|
|
type response struct {
|
|
Result json.RawMessage `json:"result"`
|
|
Type string `json:"type"`
|
|
Change string `json:"change"`
|
|
|
|
WarningCount int `json:"warning-count"`
|
|
WarningTimestamp time.Time `json:"warning-timestamp"`
|
|
|
|
ResultInfo
|
|
|
|
Maintenance *Error `json:"maintenance"`
|
|
}
|
|
|
|
// Error is the real value of response.Result when an error occurs.
|
|
type Error struct {
|
|
Kind ErrorKind `json:"kind"`
|
|
Value interface{} `json:"value"`
|
|
Message string `json:"message"`
|
|
|
|
StatusCode int
|
|
}
|
|
|
|
func (e *Error) Error() string {
|
|
return e.Message
|
|
}
|
|
|
|
// IsRetryable returns true if the given error is an error
|
|
// that can be retried later.
|
|
func IsRetryable(err error) bool {
|
|
switch e := err.(type) {
|
|
case *Error:
|
|
return e.Kind == ErrorKindSnapChangeConflict
|
|
}
|
|
return false
|
|
}
|
|
|
|
// IsTwoFactorError returns whether the given error is due to problems
|
|
// in two-factor authentication.
|
|
func IsTwoFactorError(err error) bool {
|
|
e, ok := err.(*Error)
|
|
if !ok || e == nil {
|
|
return false
|
|
}
|
|
|
|
return e.Kind == ErrorKindTwoFactorFailed || e.Kind == ErrorKindTwoFactorRequired
|
|
}
|
|
|
|
// IsInterfacesUnchangedError returns whether the given error means the requested
|
|
// change to interfaces was not made, because there was nothing to do.
|
|
func IsInterfacesUnchangedError(err error) bool {
|
|
e, ok := err.(*Error)
|
|
if !ok || e == nil {
|
|
return false
|
|
}
|
|
return e.Kind == ErrorKindInterfacesUnchanged
|
|
}
|
|
|
|
// IsAssertionNotFoundError returns whether the given error means that the
|
|
// assertion wasn't found and thus the device isn't ready/seeded.
|
|
func IsAssertionNotFoundError(err error) bool {
|
|
e, ok := err.(*Error)
|
|
if !ok || e == nil {
|
|
return false
|
|
}
|
|
|
|
return e.Kind == ErrorKindAssertionNotFound
|
|
}
|
|
|
|
// OSRelease contains information about the system extracted from /etc/os-release.
|
|
type OSRelease struct {
|
|
ID string `json:"id"`
|
|
VersionID string `json:"version-id,omitempty"`
|
|
}
|
|
|
|
// RefreshInfo contains information about refreshes.
|
|
type RefreshInfo struct {
|
|
// Timer contains the refresh.timer setting.
|
|
Timer string `json:"timer,omitempty"`
|
|
// Schedule contains the legacy refresh.schedule setting.
|
|
Schedule string `json:"schedule,omitempty"`
|
|
Last string `json:"last,omitempty"`
|
|
Hold string `json:"hold,omitempty"`
|
|
Next string `json:"next,omitempty"`
|
|
}
|
|
|
|
// SysInfo holds system information
|
|
type SysInfo struct {
|
|
Series string `json:"series,omitempty"`
|
|
Version string `json:"version,omitempty"`
|
|
BuildID string `json:"build-id"`
|
|
OSRelease OSRelease `json:"os-release"`
|
|
OnClassic bool `json:"on-classic"`
|
|
Managed bool `json:"managed"`
|
|
|
|
KernelVersion string `json:"kernel-version,omitempty"`
|
|
Architecture string `json:"architecture,omitempty"`
|
|
Virtualization string `json:"virtualization,omitempty"`
|
|
|
|
Refresh RefreshInfo `json:"refresh,omitempty"`
|
|
Confinement string `json:"confinement"`
|
|
SandboxFeatures map[string][]string `json:"sandbox-features,omitempty"`
|
|
}
|
|
|
|
func (rsp *response) err(cli *Client, statusCode int) error {
|
|
if cli != nil {
|
|
maintErr := rsp.Maintenance
|
|
// avoid setting to (*client.Error)(nil)
|
|
if maintErr != nil {
|
|
cli.maintenance = maintErr
|
|
} else {
|
|
cli.maintenance = nil
|
|
}
|
|
}
|
|
if rsp.Type != "error" {
|
|
return nil
|
|
}
|
|
var resultErr Error
|
|
err := json.Unmarshal(rsp.Result, &resultErr)
|
|
if err != nil || resultErr.Message == "" {
|
|
return fmt.Errorf("server error: %q", http.StatusText(statusCode))
|
|
}
|
|
resultErr.StatusCode = statusCode
|
|
|
|
return &resultErr
|
|
}
|
|
|
|
func parseError(r *http.Response) error {
|
|
var rsp response
|
|
if r.Header.Get("Content-Type") != "application/json" {
|
|
return fmt.Errorf("server error: %q", r.Status)
|
|
}
|
|
|
|
dec := json.NewDecoder(r.Body)
|
|
if err := dec.Decode(&rsp); err != nil {
|
|
return fmt.Errorf("cannot unmarshal error: %v", err)
|
|
}
|
|
|
|
err := rsp.err(nil, r.StatusCode)
|
|
if err == nil {
|
|
return fmt.Errorf("server error: %q", r.Status)
|
|
}
|
|
return err
|
|
}
|
|
|
|
// SysInfo gets system information from the REST API.
|
|
func (client *Client) SysInfo() (*SysInfo, error) {
|
|
var sysInfo SysInfo
|
|
|
|
opts := &doOptions{
|
|
Timeout: 25 * time.Second,
|
|
Retry: doRetry,
|
|
}
|
|
if _, err := client.doSyncWithOpts("GET", "/v2/system-info", nil, nil, nil, &sysInfo, opts); err != nil {
|
|
return nil, fmt.Errorf("cannot obtain system details: %v", err)
|
|
}
|
|
|
|
return &sysInfo, nil
|
|
}
|
|
|
|
type debugAction struct {
|
|
Action string `json:"action"`
|
|
Params interface{} `json:"params,omitempty"`
|
|
}
|
|
|
|
// Debug is only useful when writing test code, it will trigger
|
|
// an internal action with the given parameters.
|
|
func (client *Client) Debug(action string, params interface{}, result interface{}) error {
|
|
body, err := json.Marshal(debugAction{
|
|
Action: action,
|
|
Params: params,
|
|
})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
_, err = client.doSync("POST", "/v2/debug", nil, nil, bytes.NewReader(body), result)
|
|
return err
|
|
}
|
|
|
|
func (client *Client) DebugGet(aspect string, result interface{}, params map[string]string) error {
|
|
urlParams := url.Values{"aspect": []string{aspect}}
|
|
for k, v := range params {
|
|
urlParams.Set(k, v)
|
|
}
|
|
_, err := client.doSync("GET", "/v2/debug", urlParams, nil, nil, &result)
|
|
return err
|
|
}
|
|
|
|
type SystemRecoveryKeysResponse struct {
|
|
RecoveryKey string `json:"recovery-key"`
|
|
ReinstallKey string `json:"reinstall-key,omitempty"`
|
|
}
|
|
|
|
func (client *Client) SystemRecoveryKeys(result interface{}) error {
|
|
_, err := client.doSync("GET", "/v2/system-recovery-keys", nil, nil, nil, &result)
|
|
return err
|
|
}
|
|
|
|
func (c *Client) MigrateSnapHome(snaps []string) (changeID string, err error) {
|
|
body, err := json.Marshal(struct {
|
|
Action string `json:"action"`
|
|
Snaps []string `json:"snaps"`
|
|
}{
|
|
Action: "migrate-home",
|
|
Snaps: snaps,
|
|
})
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
return c.doAsync("POST", "/v2/debug", nil, nil, bytes.NewReader(body))
|
|
}
|