mirror of
https://github.com/DarkFlippers/unleashed-firmware
synced 2024-12-20 17:53:20 +00:00
224d0aefe4
* First part of multitarget porting * Delete firmware/targets/f7/Inc directory * Delete firmware/targets/f7/Src directory * gpio: cli fixes; about: using version from HAL * sdk: path fixes * gui: include fixes * applications: more include fixes * gpio: ported to new apis * hal: introduced furi_hal_target_hw.h; libs: added one_wire * hal: f18 target * github: also build f18 by default * typo fix * fbt: removed extra checks on app list * api: explicitly bundling select mlib headers with sdk * hal: f18: changed INPUT_DEBOUNCE_TICKS to match f7 * cleaned up commented out code * docs: added info on hw targets * docs: targets: formatting fixes * f18: fixed link error * f18: fixed API version to match f7 * docs: hardware: minor wording fixes * faploader: added fw target check * docs: typo fixes * github: not building komi target by default * fbt: support for `targets` field for built-in apps * github: reworked build flow to exclude app_set; fbt: removed komi-specific appset; added additional target buildset check * github: fixed build; nfc: fixed pvs warnings * attempt to fix target id * f7, f18: removed certain HAL function from public API * apps: debug: enabled bt_debug_app for f18 * Targets: backport input pins configuration routine from F7 to F18 Co-authored-by: Aleksandr Kutuzov <alleteam@gmail.com>
133 lines
4.5 KiB
C
133 lines
4.5 KiB
C
|
|
#include <furi.h>
|
|
#include <furi_hal.h>
|
|
#include <cli/cli.h>
|
|
#include <storage/storage.h>
|
|
#include <loader/loader.h>
|
|
#include <toolbox/path.h>
|
|
#include <toolbox/tar/tar_archive.h>
|
|
#include <toolbox/args.h>
|
|
#include <update_util/update_manifest.h>
|
|
#include <update_util/lfs_backup.h>
|
|
#include <update_util/update_operation.h>
|
|
|
|
typedef void (*cmd_handler)(FuriString* args);
|
|
typedef struct {
|
|
const char* command;
|
|
const cmd_handler handler;
|
|
} CliSubcommand;
|
|
|
|
static void updater_cli_install(FuriString* manifest_path) {
|
|
printf("Verifying update package at '%s'\r\n", furi_string_get_cstr(manifest_path));
|
|
|
|
UpdatePrepareResult result = update_operation_prepare(furi_string_get_cstr(manifest_path));
|
|
if(result != UpdatePrepareResultOK) {
|
|
printf(
|
|
"Error: %s. Stopping update.\r\n",
|
|
update_operation_describe_preparation_result(result));
|
|
return;
|
|
}
|
|
printf("OK.\r\nRestarting to apply update. BRB\r\n");
|
|
furi_delay_ms(100);
|
|
furi_hal_power_reset();
|
|
}
|
|
|
|
static void updater_cli_backup(FuriString* args) {
|
|
printf("Backup /int to '%s'\r\n", furi_string_get_cstr(args));
|
|
Storage* storage = furi_record_open(RECORD_STORAGE);
|
|
bool success = lfs_backup_create(storage, furi_string_get_cstr(args));
|
|
furi_record_close(RECORD_STORAGE);
|
|
printf("Result: %s\r\n", success ? "OK" : "FAIL");
|
|
}
|
|
|
|
static void updater_cli_restore(FuriString* args) {
|
|
printf("Restore /int from '%s'\r\n", furi_string_get_cstr(args));
|
|
Storage* storage = furi_record_open(RECORD_STORAGE);
|
|
bool success = lfs_backup_unpack(storage, furi_string_get_cstr(args));
|
|
furi_record_close(RECORD_STORAGE);
|
|
printf("Result: %s\r\n", success ? "OK" : "FAIL");
|
|
}
|
|
|
|
static void updater_cli_help(FuriString* args) {
|
|
UNUSED(args);
|
|
printf("Commands:\r\n"
|
|
"\tinstall /ext/path/to/update.fuf - verify & apply update package\r\n"
|
|
"\tbackup /ext/path/to/backup.tar - create internal storage backup\r\n"
|
|
"\trestore /ext/path/to/backup.tar - restore internal storage backup\r\n");
|
|
}
|
|
|
|
static const CliSubcommand update_cli_subcommands[] = {
|
|
{.command = "install", .handler = updater_cli_install},
|
|
{.command = "backup", .handler = updater_cli_backup},
|
|
{.command = "restore", .handler = updater_cli_restore},
|
|
{.command = "help", .handler = updater_cli_help},
|
|
};
|
|
|
|
static void updater_cli_ep(Cli* cli, FuriString* args, void* context) {
|
|
UNUSED(cli);
|
|
UNUSED(context);
|
|
FuriString* subcommand;
|
|
subcommand = furi_string_alloc();
|
|
if(!args_read_string_and_trim(args, subcommand) || furi_string_empty(args)) {
|
|
updater_cli_help(args);
|
|
furi_string_free(subcommand);
|
|
return;
|
|
}
|
|
for(size_t idx = 0; idx < COUNT_OF(update_cli_subcommands); ++idx) {
|
|
const CliSubcommand* subcmd_def = &update_cli_subcommands[idx];
|
|
if(furi_string_cmp_str(subcommand, subcmd_def->command) == 0) {
|
|
subcmd_def->handler(args);
|
|
furi_string_free(subcommand);
|
|
return;
|
|
}
|
|
}
|
|
furi_string_free(subcommand);
|
|
updater_cli_help(args);
|
|
}
|
|
|
|
static int32_t updater_spawner_thread_worker(void* arg) {
|
|
UNUSED(arg);
|
|
Loader* loader = furi_record_open(RECORD_LOADER);
|
|
loader_start(loader, "UpdaterApp", NULL);
|
|
furi_record_close(RECORD_LOADER);
|
|
return 0;
|
|
}
|
|
|
|
static void updater_spawner_thread_cleanup(FuriThreadState state, void* context) {
|
|
FuriThread* thread = context;
|
|
if(state == FuriThreadStateStopped) {
|
|
furi_thread_free(thread);
|
|
}
|
|
}
|
|
|
|
static void updater_start_app() {
|
|
FuriHalRtcBootMode mode = furi_hal_rtc_get_boot_mode();
|
|
if((mode != FuriHalRtcBootModePreUpdate) && (mode != FuriHalRtcBootModePostUpdate)) {
|
|
return;
|
|
}
|
|
|
|
/* We need to spawn a separate thread, because these callbacks are executed
|
|
* inside loader process, at startup.
|
|
* So, accessing its record would cause a deadlock
|
|
*/
|
|
FuriThread* thread =
|
|
furi_thread_alloc_ex("UpdateAppSpawner", 768, updater_spawner_thread_worker, NULL);
|
|
furi_thread_set_state_callback(thread, updater_spawner_thread_cleanup);
|
|
furi_thread_set_state_context(thread, thread);
|
|
furi_thread_start(thread);
|
|
}
|
|
|
|
void updater_on_system_start() {
|
|
#ifdef SRV_CLI
|
|
Cli* cli = (Cli*)furi_record_open(RECORD_CLI);
|
|
cli_add_command(cli, "update", CliCommandFlagDefault, updater_cli_ep, NULL);
|
|
furi_record_close(RECORD_CLI);
|
|
#else
|
|
UNUSED(updater_cli_ep);
|
|
#endif
|
|
#ifndef FURI_RAM_EXEC
|
|
updater_start_app();
|
|
#else
|
|
UNUSED(updater_start_app);
|
|
#endif
|
|
}
|