From patchwork Mon Apr 27 06:39:53 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Kasturi shekar X-Patchwork-Id: 5049 Return-Path: Received: from shymkent.ilbers.de ([unix socket]) by shymkent (Cyrus 2.5.10-Debian-2.5.10-3+deb9u2) with LMTPA; Mon, 27 Apr 2026 08:40:13 +0200 X-Sieve: CMU Sieve 2.4 Received: from mail-pj1-f61.google.com (mail-pj1-f61.google.com [209.85.216.61]) by shymkent.ilbers.de (8.15.2/8.15.2/Debian-8+deb9u1) with ESMTPS id 63R6e49w000432 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT) for ; Mon, 27 Apr 2026 08:40:05 +0200 Received: by mail-pj1-f61.google.com with SMTP id 98e67ed59e1d1-35da4795b3csf19469051a91.2 for ; Sun, 26 Apr 2026 23:40:05 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1777271999; cv=pass; d=google.com; s=arc-20240605; b=b4c055/SIDNi9psilbvKBjPqNhzZEeB/5M6+CJENOv86dtmwEzhfB+1NxrOl3RuN/w NUGkWlijS5rPWftapSZI+KrJXtflbReERkEktvQKeMJK4ZXtXHdKjRyGqDbolMEJTOjx 70JUI+fjYB4nzdAmnNZhWnc5X2Nr0UZHNQmbbp6ykCHiFRyuK0NiIPPlai6yVf2wr5tJ Zk/zJ9mq3aV7A4lmzCPGY/7Q43z9G41AY7SCjxU8H0BdN7NPA3MGFnHYEXXRGIRQIedK zX3QmLoBtEQFteGfz10Bs6QyCH0ukwr/eq1CsWW86a90TRdwjOKr74ILVe7KzbUWXV+h 0JoQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20240605; h=list-unsubscribe:list-subscribe:list-archive:list-help:list-post :list-id:mailing-list:precedence:reply-to:feedback-id :content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:dkim-signature; bh=+pWAEweT2nMw4WAGuckTbp8IQ4MGsAGNiLvZyLmSEE0=; fh=ND0/tKG9zw+2gB0/tEVHMycqI4NazJKP4OYWr2VWQoo=; b=TvQJG1EcXO5vYPrmPBUN29KQeGsRCv0FFaXgoS/KVVsMbAVJ3NP7y8p8IXBzHU6D8o AFelE09D/kiKg/5R9WF9Ao2YAzQ/E4hAZrT7VkGrCjGkybmRcaU6/R/L+1WI5vWTWHGO iRZwT/zesOPLM04ELzhZ/ilHw3IrfzPQtcgTZvfHY9/ziNRMZzs7EnXnzlYidl5+bwah DxU8OuqB+Agi9fIw0cc5QoKa1sKxYTJ3/b9CVAos3cL6L01waJwAB4Dbx45QkogWc7u+ FhWv3Q1ne+flnt+9FknELprcWG3pMUKOCTBveEZfAPypoPR7AbNX5jbsWIMva4l/BT+B c9Yg==; darn=isar-build.org ARC-Authentication-Results: i=2; gmr-mx.google.com; dkim=pass header.i=@siemens.com header.s=fm2 header.b=cv4WCk5C; spf=pass (google.com: domain of fm-1328757-20260427063956c78e33cfec000207a5-obe5_1@rts-flowmailer.siemens.com designates 185.136.64.228 as permitted sender) smtp.mailfrom=fm-1328757-20260427063956c78e33cfec000207a5-ObE5_1@rts-flowmailer.siemens.com; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=siemens.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=googlegroups.com; s=20251104; t=1777271999; x=1777876799; darn=isar-build.org; h=list-unsubscribe:list-subscribe:list-archive:list-help:list-post :list-id:mailing-list:precedence:reply-to :x-original-authentication-results:x-original-sender:feedback-id :content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=+pWAEweT2nMw4WAGuckTbp8IQ4MGsAGNiLvZyLmSEE0=; b=ucDoz+Y27cOrGAz61C5tR55oY4/5sj6BIOUAXhw7rMy/qup7KwGCYwrnCL45WIoy4n LGjRFbaCBoMfcxMhkw7dzKyesWmnLJxHYByEsiToI+NynnVk6nunVz3Rkr4TKHgRDi4n 8Ct8RRn9ebqe0gKnJBJ/S1eVyHJ6o9P59HBiLr5mIl5QeVuQHtmpD4ued+yMd8IhuJE7 nJCoxFvT0YtuBYn01KnsIIXjfNc6WLaE0Z39dhqElK1nlVave1XR2mmc2azoa11HHRGX lpmpsH4aL02GM8HzMLlPKaJrr6njJy6Icg1WP0mcdBagelr9RpzhW7/7udGHPRkgXSL7 Eujg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777271999; x=1777876799; h=list-unsubscribe:list-subscribe:list-archive:list-help:list-post :x-spam-checked-in-group:list-id:mailing-list:precedence:reply-to :x-original-authentication-results:x-original-sender:feedback-id :content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-beenthere:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=+pWAEweT2nMw4WAGuckTbp8IQ4MGsAGNiLvZyLmSEE0=; b=YaVRoqTC0luLJP/PCKnVOvHN72X+IH/XVmfMvFk8GYcCzSak+SyAISny8ASrHvtu/X eTKCLABoQfowDsZzsLKTgUNAJc8nh3Z3NWyAelPwjFidJbKTbHiGMgASRfBi9vb0+TKd mpOvupsnHzIku8vBlgy8jgDCDJcdQlkdf25+sy3+9n5sOPDV4+zBNFsx/uir2pxeX/D2 eeggUIEDfleJ169CGLV5dXn6LlWGjl5cUpX/EAt7Dtn2yubJGyC+huzP4MramtthDQN8 VVcxdINXq1fW0jqTNo8OmPIfzK+MFSTloOsAsLFGkhlyzl68OFVCfde8raw/dPzZSkWs kqZw== X-Forwarded-Encrypted: i=2; AFNElJ96F0cLeW64yjLKHQ0TGSrPQZB7ayE32v3lzW+Lp/zbua4TE2m1xoIF9yZ+lvYMWSr42wZx9WI=@isar-build.org X-Gm-Message-State: AOJu0Yw9nhaspznLE5H6lrx3Vfq16t9PHew9V38YhOCQaTV/M6mG6MNF J3Pvw7+kz9zEOoulqCq92FUh9Rj6MgZeBvO+aaSZPq1BrY8lkPi3V83s X-Received: by 2002:a17:90b:2686:b0:356:2c7b:c026 with SMTP id 98e67ed59e1d1-36140499690mr42166402a91.23.1777271998930; Sun, 26 Apr 2026 23:39:58 -0700 (PDT) X-BeenThere: isar-users@googlegroups.com; h="AUV6zMMV5DK+Ih5jC99jjDR/iAol8xyEEAiDwQsTcVKyGVenbQ==" Received: by 2002:a17:90b:808:b0:35f:b556:578a with SMTP id 98e67ed59e1d1-3612fe99103ls9636873a91.2.-pod-prod-03-us; Sun, 26 Apr 2026 23:39:57 -0700 (PDT) X-Received: by 2002:a17:90b:5185:b0:35f:b7f5:9b3 with SMTP id 98e67ed59e1d1-361403b18c9mr44568572a91.3.1777271997478; Sun, 26 Apr 2026 23:39:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1777271997; cv=none; d=google.com; s=arc-20240605; b=Xk7u/JRHxfn7TyOLNPcflS25K8VZ9SvS+s4ql0/rSh+O7w4WGpKYqz1xFOYOgVWjO8 8P8wqvf6y7xVygv+uOQOrWjUthsHagESQwcQOIo4OXIpmkYX0XiH1ixB4iNk1+pgX1VY N7Nkv+afS84BeOY1EmBvBXiZAVRfW/6ZVNAlpZUZ6Vzhj6BPb9J8J40/O37Ugdy8qtGA KsFV6rsGleUePkv5VvQ+VbJjzkI9z9IjKdBNvi57WdIdC+nHDRdwccYASGxhzwn1Dz34 oiIZvrQroW5F0IgKHWWSOmF95fg+BGt+VE82Aq6EpAfuHpdYn20fyTTI+MxuF1lsrLay t6LQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20240605; h=feedback-id:content-transfer-encoding:mime-version:references :in-reply-to:message-id:date:subject:cc:to:from:dkim-signature; bh=yVTshxRX4pn1ALbNKO5dfGlTxrgYLO6qs1Kg+k4dJdw=; fh=kh6mBxUBxYhzFhhtG3ckYICU9JWCX223LZXZsw4oG5w=; b=ZJUOTWuLtlx8Hij8TBQXKKQvIX2GlYpQavw+IVvOsa1JaaWYhfMVa30yUOsdY+wHB8 dOV0tNKXmWSsQ7qhm+krC8bVk6WopSDnp8CPH3iD5Kfd6ybyGLH1kpMUNk4C48B/FuCg YBXrNgmCi6WbVpAPaLLztMayfPOh5qCgiyWZlM3O2VIASniUVq0gcPvdnA+JYQgjYef9 HbzY4ttCL3U7+RRDNBZXgM8cLy/oA9SSZZrBz8FDctylUs8i49fAQJy5Nfi5Uvlght+x XEGfkIkxXqptT+946xMKJwiyhVLfoLBkopnYuA05ZYc+0c0i5Dljv4svvbv/QhRF/Qkk e6jg==; dara=google.com ARC-Authentication-Results: i=1; gmr-mx.google.com; dkim=pass header.i=@siemens.com header.s=fm2 header.b=cv4WCk5C; spf=pass (google.com: domain of fm-1328757-20260427063956c78e33cfec000207a5-obe5_1@rts-flowmailer.siemens.com designates 185.136.64.228 as permitted sender) smtp.mailfrom=fm-1328757-20260427063956c78e33cfec000207a5-ObE5_1@rts-flowmailer.siemens.com; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=siemens.com Received: from mta-64-228.siemens.flowmailer.net (mta-64-228.siemens.flowmailer.net. [185.136.64.228]) by gmr-mx.google.com with ESMTPS id 98e67ed59e1d1-36141787cefsi1027153a91.0.2026.04.26.23.39.57 for (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Sun, 26 Apr 2026 23:39:57 -0700 (PDT) Received-SPF: pass (google.com: domain of fm-1328757-20260427063956c78e33cfec000207a5-obe5_1@rts-flowmailer.siemens.com designates 185.136.64.228 as permitted sender) client-ip=185.136.64.228; Received: by mta-64-228.siemens.flowmailer.net with ESMTPSA id 20260427063956c78e33cfec000207a5 for ; Mon, 27 Apr 2026 08:39:56 +0200 X-Patchwork-Original-From: "'Kasturi shekar' via isar-users" From: Kasturi shekar To: isar-users@googlegroups.com Cc: "kasturi.shekar" Subject: [PATCH 1/4] installer: extract backend helpers to sys_api.sh Date: Mon, 27 Apr 2026 12:09:53 +0530 Message-ID: <20260427063957.603123-2-kasturi.shekar@siemens.com> In-Reply-To: <20260427063957.603123-1-kasturi.shekar@siemens.com> References: <20260427063957.603123-1-kasturi.shekar@siemens.com> MIME-Version: 1.0 X-Flowmailer-Platform: Siemens Feedback-ID: 519:519-1328757:519-21489:flowmailer X-Original-Sender: kasturi.shekar@siemens.com X-Original-Authentication-Results: gmr-mx.google.com; dkim=pass header.i=@siemens.com header.s=fm2 header.b=cv4WCk5C; spf=pass (google.com: domain of fm-1328757-20260427063956c78e33cfec000207a5-obe5_1@rts-flowmailer.siemens.com designates 185.136.64.228 as permitted sender) smtp.mailfrom=fm-1328757-20260427063956c78e33cfec000207a5-ObE5_1@rts-flowmailer.siemens.com; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=siemens.com X-Original-From: Kasturi shekar Reply-To: Kasturi shekar Precedence: list Mailing-list: list isar-users@googlegroups.com; contact isar-users+owners@googlegroups.com List-ID: X-Spam-Checked-In-Group: isar-users@googlegroups.com X-Google-Group-Id: 914930254986 List-Post: , List-Help: , List-Archive: , List-Unsubscribe: , X-Spam-Status: No, score=-4.9 required=5.0 tests=DKIMWL_WL_MED,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, RCVD_IN_DNSWL_BLOCKED,RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL, RCVD_IN_RP_CERTIFIED,RCVD_IN_RP_RNBL,RCVD_IN_RP_SAFE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on shymkent.ilbers.de X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= From: "kasturi.shekar" Move backend and system-facing installer logic into sys_api.sh This patch introduces backend helper APIs for: - install image discovery - target device discovery and filtering - root/live-device exclusion - RAID member and inactive md filtering - block device state and size helpers - bmap copy execution with locking and progress pipe support Signed-off-by: kasturi.shekar --- .../deploy-image/files/usr/bin/sys_api.sh | 400 +++++++++++++++--- 1 file changed, 333 insertions(+), 67 deletions(-) diff --git a/meta-isar/recipes-installer/deploy-image/files/usr/bin/sys_api.sh b/meta-isar/recipes-installer/deploy-image/files/usr/bin/sys_api.sh index b144419e..9c9c5840 100644 --- a/meta-isar/recipes-installer/deploy-image/files/usr/bin/sys_api.sh +++ b/meta-isar/recipes-installer/deploy-image/files/usr/bin/sys_api.sh @@ -1,84 +1,350 @@ #!/usr/bin/env bash +# This software is a part of ISAR. +# Copyright (C) Siemens AG, 2026 # -# sys_api.sh — Ported installer system APIs -# ------------------------------------------------------------------- +# SPDX-License-Identifier: MIT -# Load shared framework utilities -source ./func.sh || { - echo "Error: func.sh not found or not readable." >&2 - exit 1 +#-------------------------------------------------------------------------- +# sys_api.sh - Backend APIs for deploy-image-wic installer. +# +# This file intentionally contains only system/backend logic: +# - image discovery +# - target device discovery and filtering +# - low-level install/copy flow +# +# UI concerns (dialog boxes, menus, confirmations) are implemented in +# installer_ui.sh and called by the main orchestrator script. +#-------------------------------------------------------------------------- + +# Globals populated by sys_discover_target_devices(). +SYS_CURRENT_ROOT_DEV="" +SYS_TARGET_DEVICES=() + +#-------------------------------------------------------------------------- +# sys_first_default_image_name +# +# Returns: +# basename of matching *.wic* image (excluding *.wic.bmap), or empty. +#-------------------------------------------------------------------------- +sys_first_default_image_name() { + local install_data_dir="$1" + + find "$install_data_dir" -type f -iname "*.wic*" -a -not -iname "*.wic.bmap" \ + -exec basename {} \; | head -n 1 +} + +#-------------------------------------------------------------------------- +# sys_list_installable_entries +# +# Returns: +# relative file paths under install_data_dir, one per line. +# Files ending in *.wic.bmap are excluded. +#-------------------------------------------------------------------------- +sys_list_installable_entries() { + local install_data_dir="$1" + + ( + cd "$install_data_dir" || return 1 + find . -type f ! -iname "*.wic.bmap" -print | sed 's#^./##' + ) } -# ------------------------------------------------------------------- -# API: locate_disk_images -# Description: -# Find disk image files (.wic, .wic.bz2) under given path. -# Usage: -# sys_locate_disk_images search_path=/install -# Returns JSON: -# {"error":"", "retval":"0", "images":["/install/image.wic", ...]} -# ------------------------------------------------------------------- -sys_locate_disk_images() { - local -A ARGS - local required=(search_path) - api_args ARGS required[@] "$@" || { - pack_return_data error "$_args_error" retval "1" - return 1 - } - - local fn="${FUNCNAME[0]}" - local path="${ARGS[search_path]}" - - log_info "$fn" "Searching for disk images in '$path'" - - local images - images=$(find "$path" -type f -iname "*.wic*" ! -iname "*.wic.bmap" 2>/dev/null) - - # when no images found in /install - if [[ -z "$images" ]]; then - log_warn "$fn" "No images found." - pack_return_data error "No images found" retval "1" - return 1 +#-------------------------------------------------------------------------- +# sys_resolve_image_path +# +# Arguments: +# install_data_dir - base directory where installable images are stored +# image_or_path - either a relative image filename under install_data_dir +# or an explicit absolute/relative filesystem path +# +# Returns: +# absolute image path if resolvable, else non-zero return code. +#-------------------------------------------------------------------------- +sys_resolve_image_path() { + local install_data_dir="$1" + local image_or_path="$2" + + if [ -f "$image_or_path" ]; then + echo "$image_or_path" + return 0 + fi + + if [ -f "$install_data_dir/$image_or_path" ]; then + echo "$install_data_dir/$image_or_path" + return 0 fi - # Convert newline-separated paths into JSON array elements - local json_images - json_images=$(printf '"%s",' $images | sed 's/,$//') - # final JSON response on stdout - echo "{ \"error\":\"\", \"retval\":\"0\", \"images\":[${json_images}] }" + return 1 } +#-------------------------------------------------------------------------- +# sys_discover_target_devices +# +# Populates globals: +# SYS_CURRENT_ROOT_DEV - current live root device identifier +# SYS_TARGET_DEVICES - array with valid target block devices (/dev/*) +# +# Filtering rules match legacy deploy-image-wic behavior, including: +# - skip installer/live root device and backing devices +# - skip loop/dm/ram/sr/mtd/zram +# - skip inactive md arrays and md members +#-------------------------------------------------------------------------- +sys_discover_target_devices() { + local current_root_dev_type + local current_root_dev + local root_source + local root_source_resolved + local base_no_part + local slave + local slave_dev + local slave_base + local devices + local mmc_devices + local device + local is_raid_member + local holder_path + local holder_name + local state + local skip_device + local ex + + local exclude_list=() + + SYS_TARGET_DEVICES=() + + # Determine the live root device so we do not offer the current system disk + # as an install target. For NFS roots use a special sentinel value. + + current_root_dev_type=$(findmnt / -o fstype -n) + if [ "$current_root_dev_type" = "nfs" ]; then + current_root_dev="nfs" + exclude_list+=("nfs") + else + root_source=$(findmnt / -o source -n) + root_source_resolved=$(readlink -f "$root_source" 2>/dev/null || echo "$root_source") + current_root_dev=${root_source_resolved#/dev/} + + exclude_list+=("$current_root_dev") + + # Strip partition suffix for common disk names so the base device + # (e.g. /dev/sda or /dev/mmcblk0) also does not become selectable. + if [[ "$current_root_dev" =~ ^(mmcblk|nvme) ]]; then + base_no_part="${current_root_dev%p[0-9]*}" + else + base_no_part="${current_root_dev%%[0-9]*}" + fi + + if [ -n "$base_no_part" ]; then + exclude_list+=("$base_no_part") + fi + + # Exclude backing devices for the live root, such as multipath or RAID + # underlying devices exposed via /sys/block//slaves. + if [ -d "/sys/block/$current_root_dev/slaves" ]; then + for slave in /sys/block/"$current_root_dev"/slaves/*; do + [ -e "$slave" ] || continue + slave_dev=$(basename "$slave") + exclude_list+=("$slave_dev") + slave_base=${slave_dev%%[0-9]*} + [ -n "$slave_base" ] && exclude_list+=("$slave_base") + done + fi + fi + + SYS_CURRENT_ROOT_DEV="$current_root_dev" + + # Gather block devices from /sys/block while preserving mmcblk devices that + # would otherwise be filtered by the main find expression. + devices=$(find /sys/block/ -type b,c,f,l -not -iname "mmcblk*" -printf "%f\n") || true + mmc_devices=$(find /sys/block/ -type b,c,f,l -iname "mmcblk[0-9]" -printf "%f\n") || true + devices="$devices $mmc_devices" + + for device in $devices; do + is_raid_member=0 + + if [ -d "/sys/block/$device/holders" ] && [ ! -d "/sys/block/$device/md" ]; then + for holder_path in /sys/block/$device/holders/*; do + holder_name=$(basename "$holder_path") + case "$holder_name" in + md[0-9]*) + is_raid_member=1 + break + ;; + esac + done + fi + + if [ "$is_raid_member" -eq 1 ]; then + # Skip RAID member devices, because we only want whole block devices + # available for standalone image installation. + continue + fi + + if [[ "$device" == md* ]]; then + # Accept only active or clean md arrays, reject degraded/inactive RAID sets. + if [ -f "/sys/block/$device/md/array_state" ]; then + state=$(cat /sys/block/$device/md/array_state | tr -d '\n' | tr -d ' ') + if [ "$state" != "active" ] && [ "$state" != "clean" ]; then + echo "Skipping RAID device $device: state='$state'" >&2 + continue + fi + echo "Found RAID device $device: state='$state'" >&2 + else + echo "Skipping RAID device $device: no array_state file" >&2 + continue + fi + fi -# ------------------------------------------------------------------- -# API: sys_list_valid_target_devices -# Description: -# Shell-friendly variant of sys_get_valid_target_devices. -# Prints one valid device per line (absolute path). -# Usage: -# sys_list_valid_target_devices -# Output: -# /dev/sdb -# /dev/sdc -# ------------------------------------------------------------------- -sys_list_valid_target_devices() { - local dev - - for dev in /sys/block/*; do - dev=$(basename "$dev") - - case "$dev" in - loop*|ram*|sr*|mtd*) + case "$device" in + dm-*|loop*|mtd*|sr*|ram*|zram*) continue ;; esac - # skip inactive md devices - if [[ "$dev" == md* ]]; then - [ -f "/sys/block/$dev/md/array_state" ] || continue - state=$(cat /sys/block/$dev/md/array_state) - [ "$state" = "active" ] || [ "$state" = "clean" ] || continue - fi + skip_device=0 + for ex in "${exclude_list[@]}"; do + if [[ "$device" == "$ex"* ]]; then + skip_device=1 + break + fi + done - echo "/dev/$dev" + if [ "$skip_device" -eq 0 ]; then + SYS_TARGET_DEVICES+=("/dev/$device") + fi done } + +#-------------------------------------------------------------------------- +# sys_device_size +# +# Returns: +# human-readable size string from lsblk, or empty if unavailable. +#-------------------------------------------------------------------------- +sys_device_size() { + local device="$1" + lsblk --nodeps --noheadings -o SIZE "$device" 2>/dev/null | tr -d " " +} + +#-------------------------------------------------------------------------- +# sys_device_is_empty +# +# Returns: +# 0 when first 1 MiB is zero-filled, 1 otherwise. +#-------------------------------------------------------------------------- +sys_device_is_empty() { + local device="$1" + cmp /dev/zero "$device" -n 1M >/dev/null 2>&1 +} + +#-------------------------------------------------------------------------- +# sys_version_ge +# +# Returns: +# 0 if current >= required, else 1. +#-------------------------------------------------------------------------- +sys_version_ge() { + local current="$1" + local required="$2" + + if [ "$(printf '%s\n' "$current"X "$required" | sort -V | head -n 1)" != "$current"X ]; then + return 0 + fi + return 1 +} + +#-------------------------------------------------------------------------- +# sys_bmap_options_for_image +# +# Returns: +# bmaptool options string ("--nobmap" when no sidecar bmap is present). +#-------------------------------------------------------------------------- +sys_bmap_options_for_image() { + local image_path="$1" + local disk_bmap + + disk_bmap="${image_path%.wic*}.wic.bmap" + if [ -f "$disk_bmap" ]; then + # If a .wic.bmap sidecar exists, return an empty option string so + # bmaptool uses the bundled map automatically. + echo "" + else + echo "--nobmap" + fi +} + +#-------------------------------------------------------------------------- +# sys_install_image_with_lock +# +# Performs the actual bmaptool copy, serializing concurrent installer +# consoles via flock. When UI hook functions are available, this API +# uses them to present a progress gauge in attended mode. +# +# Optional UI hooks (if defined): +# ui_start_progress_gauge +# ui_stop_progress_gauge +#-------------------------------------------------------------------------- +sys_install_image_with_lock() { + local image_path="$1" + local target_device="$2" + local lockfile="/run/installer.lock" + local progress_pipe="/run/installer.fifo" + local bmap_options + local bmap_version + local quiet_flag="" + + bmap_options=$(sys_bmap_options_for_image "$image_path") + + exec 9>"$lockfile" + if flock -n 9; then + bmap_version=$(bmaptool --version | awk '{ print $NF }') + + if sys_version_ge "$bmap_version" "3.6"; then + if [ -p "$progress_pipe" ]; then + rm -f "$progress_pipe" + fi + + if ! mkfifo "$progress_pipe"; then + echo "Error: Failed to create named pipe $progress_pipe" + return 1 + fi + + bmap_options="$bmap_options --psplash-pipe=$progress_pipe" + quiet_flag="-q" + + if declare -F ui_start_progress_gauge >/dev/null; then + ui_start_progress_gauge "$progress_pipe" + fi + fi + + # Run the actual copying step under the lock to avoid concurrent writes + # from multiple installer consoles or sessions. + if ! bmaptool $quiet_flag copy $bmap_options "$image_path" "$target_device"; then + if declare -F ui_stop_progress_gauge >/dev/null; then + ui_stop_progress_gauge + fi + return 1 + fi + + if declare -F ui_stop_progress_gauge >/dev/null; then + ui_stop_progress_gauge + fi + else + echo "Installation already running in another console." + sleep 5 + + if [ -e "$progress_pipe" ]; then + echo "Installation progress..." + tail -f "$progress_pipe" | while read -r line; do + printf "\r%s%%" "$line" + done + else + echo "Waiting for installation to finish..." + while pgrep -x "bmaptool" >/dev/null; do + sleep 5 + done + fi + fi + + return 0 +}