diff --git a/.github/workflows/shellcheck.yml b/.github/workflows/shellcheck.yml index b9bfc12..aedb3e5 100644 --- a/.github/workflows/shellcheck.yml +++ b/.github/workflows/shellcheck.yml @@ -29,4 +29,5 @@ jobs: - name: Shellcheck! run: | shellcheck migrate2rocky/migrate2rocky.sh + shellcheck migrate2rocky/migrate2rocky9.sh shellcheck mirror/mirrorsync.sh diff --git a/migrate2rocky/README.md b/migrate2rocky/README.md index 4ff5168..bf1439d 100644 --- a/migrate2rocky/README.md +++ b/migrate2rocky/README.md @@ -133,7 +133,7 @@ ipa-server-upgrade --skip-version-check This is because the centos-release-* packages that contain the .repo files for the individual repositories depend on centos-release. Storage sig and related -release packages should be available soon from RockyLinux. In the meantine you +release packages should be available soon from RockyLinux. In the meantime you can use a command like the following to install the .repo files and continue to use the repository from CentOS (note please substitute the URL to the release package for the repo that you need): diff --git a/migrate2rocky/migrate2rocky9.sh b/migrate2rocky/migrate2rocky9.sh new file mode 100644 index 0000000..dbcf520 --- /dev/null +++ b/migrate2rocky/migrate2rocky9.sh @@ -0,0 +1,1313 @@ +#!/bin/bash +# +# migrate2rocky9 - Migrate another EL8 distribution to RockyLinux 9. +# By: Peter Ajamian +# Adapted from centos2rocky.sh by label +# +# The latest version of this script can be found at: +# https://github.com/rocky-linux/rocky-tools +# +# Copyright (c) 2022 Rocky Enterprise Software Foundation +# +# Permission is hereby granted, free of charge, to any person obtaining a copy +# of this software and associated documentation files (the "Software"), to deal +# in the Software without restriction, including without limitation the rights +# to use, copy, modify, merge, publish, distribute, sublicense, and/or sell +# copies of the Software, and to permit persons to whom the Software is +# furnished to do so, subject to the following conditions: +# +# The above copyright notice and this permission notice (including the next +# paragraph) shall be included in all copies or substantial portions of the +# Software. +# +# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR +# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, +# FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE +# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER +# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, +# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE +# SOFTWARE. +# + +## Using this script means you accept all risks of system instability. + +# These checks need to be right at the top because we start with bash-isms right +# away in this script. +if [ -n "$POSIXLY_CORRECT" ] || [ -z "$BASH_VERSION" ]; then + printf '%s\n' "bash >= 4.2 is required for this script." >&2 + exit 1 +fi + +# We need bash version >= 4.2 for associative arrays and other features. +if (( BASH_VERSINFO[0]*100 + BASH_VERSINFO[1] < 402 )); then + printf '%s\n' "bash >= 4.2 is required for this script." >&2 + exit 1 +fi + +shopt -s extglob + +# Make sure we're root. +if (( EUID != 0 )); then + printf '%s\n' \ + "You must run this script as root. Either use sudo or 'su -c ${0}'" >&2 + exit 1 +fi + + +# Path to logfile +logfile=/var/log/migrate2rocky.log + +# Rotate old logs +numlogs=5 +if [[ -e $logfile ]]; then + # Here we use mv before bin_check, so simply check the exit status to see if + # it worked. + if ! mv -f "$logfile" "$logfile.0"; then + printf '%s\n' "Unable to rotate logfiles, continuing without rotation." >&2 + else + for ((i=numlogs;i>0;i--)); do + if [[ -e "$logfile.$((i-1))" ]]; then + if ! mv -f "$logfile.$((i-1))" "$logfile.$i"; then + printf '%s\n' \ +"Unable to rotate logfiles, continuing without rotation." + break + fi + fi + done + fi +fi + +# Send all output to the logfile as well as stdout. +# After the following we get: +# Output to 1 goes to stdout and the logfile. +# Output to 2 goes to stderr and the logfile. +# Output to 3 just goes to stdout. +# Output to 4 just goes to stderr. +# Output to 5 just goes to the logfile. + +# shellcheck disable=SC2094 +exec \ + 3>&1 \ + 4>&2 \ + 5>> "$logfile" \ + > >(tee -a "$logfile") \ + 2> >(tee -a "$logfile" >&2) + +# List nocolor last here so that -x doesn't bork the display. +errcolor=$(tput setaf 1) +infocolor=$(tput setaf 6) +nocolor=$(tput op) + +# Single arg just gets returned verbatim, multi arg gets formatted via printf. +# First arg is the name of a variable to store the results. +msg_format () { + local _var + _var="$1" + shift + if (( $# > 1 )); then + # shellcheck disable=SC2059 + printf -v "$_var" "$@" + else + printf -v "$_var" "%s" "$1" + fi +} + +# Send an info message to the log file and stdout (with color) +infomsg () { + local msg + msg_format msg "$@" + printf '%s' "$msg" >&5 + printf '%s%s%s' "$infocolor" "$msg" "$nocolor" >&3 +} + +# Send an error message to the log file and stderr (with color) +errmsg () { + local msg + msg_format msg "$@" + printf '%s' "$msg" >&5 + printf '%s%s%s' "$errcolor" "$msg" "$nocolor" >&4 +} + +infomsg 'migrate2rocky9 - Begin logging at %(%c)T.\n\n' -1 + +export LC_ALL=C.UTF-8 +unset LANGUAGE +shopt -s nullglob + +SUPPORTED_MAJOR="9" +SUPPORTED_PLATFORM="platform:el$SUPPORTED_MAJOR" +ARCH=$(arch) + +gpg_key_url="https://dl.rockylinux.org/pub/rocky/RPM-GPG-KEY-Rocky-9" +gpg_key_sha512="ead288baa8daad12d6f340f1a392d47413f8614425673fe310e82d4ead94ca15eb2e1329b30389e6a7f93dd406da255df410306cffd7a1a24f0dfb4c8e23fbfe" + +sm_ca_dir=/etc/rhsm/ca +unset tmp_sm_ca_dir + +# all repos must be signed with the same key given in $gpg_key_url +declare -A repo_urls +repo_urls=( + [rockybaseos]="https://dl.rockylinux.org/pub/rocky/${SUPPORTED_MAJOR}/BaseOS/$ARCH/os/" + [rockyappstream]="https://dl.rockylinux.org/pub/rocky/${SUPPORTED_MAJOR}/AppStream/$ARCH/os/" +) + +# These are additional packages that should always be installed. +# (currently blank, but we add to it for an EFI boot system). +always_install=() + +# The repos package for CentOS stream requires special handling. +declare -g -A stream_repos_pkgs +stream_repos_pkgs=( + [rocky-repos]=centos-stream-repos + [epel-release]=epel-next-release +) + +# Map for package name suffix for shim/grub2-efi +# on x86_64: grub2-efi-x64, shim-x64 +# on aarch64: grub2-efi-aa64, shim-aa64 +declare -A cpu_arch_suffix_map=( + [x86_64]=x64 + [aarch64]=aa64 +) + +# Prefix to add to CentOS stream repo names when renaming them. +stream_prefix=stream- + +# Always replace these stream packages with their Rocky Linux equivalents. +stream_always_replace=( + fwupdate\* + grub2-\* + shim-\* + kernel + kernel-\* +) + +# Directory to required space in MiB +# Note this is based on Rocky Linux 8 numbers. We will use these until we can +# get realistic numbers for Rocky 9. +declare -A dir_space_map +dir_space_map=( + [/usr]=250 + [/var]=1536 + [/boot]=50 +) + +unset CDPATH + +exit_message() { + errmsg $'\n'"$1"$'\n\n' + final_message + exit 1 +} + +final_message() { + errmsg '%s ' \ + "An error occurred while we were attempting to convert your system to" \ + "Rocky Linux. Your system may be unstable. Script will now exit to" \ + "prevent possible damage."$'\n\n' + logmessage +} + +logmessage(){ + printf '%s%s%s\n' "$infocolor" \ + "A log of this installation can be found at $logfile" \ + "$nocolor" >&3 +} + +# This just grabs a field from os-release and returns it. +os-release () ( + # shellcheck source=/dev/null + . /etc/os-release + if ! [[ ${!1} ]]; then + return 1 + fi + printf '%s\n' "${!1}" +) + +# Check the version of a package against a supplied version number. Note that +# this uses sort -V to compare the versions which isn't perfect for rpm package +# versions, but to do a proper comparison we would need to use rpmdev-vercmp in +# the rpmdevtools package which we don't want to force-install. sort -V should +# be adequate for our needs here. +pkg_ver() ( + ver=$(rpm -q --qf '%{VERSION}\n' "$1") || return 2 + if [[ $(sort -V <<<"$ver"$'\n'"$2" | head -1) != "$2" ]]; then + return 1 + fi + return 0 +) + +# Set up a temporary directory. +pre_setup () { + if ! tmp_dir=$(mktemp -d) || [[ ! -d "$tmp_dir" ]]; then + exit_message "Error creating temp dir" + fi + # failglob makes pathname expansion fail if empty, dotglob adds files + # starting with . to pathname expansion + if ( shopt -s failglob dotglob; : "$tmp_dir"/* ) 2>/dev/null ; then + exit_message "Temp dir not empty" + fi +} + +# Cleanup function gets rid of the temporary directory. +exit_clean () { + if [[ -d "$tmp_dir" ]]; then + rm -rf "$tmp_dir" + fi + if [[ -f "$container_macros" ]]; then + rm -f "$container_macros" + fi +} + +pre_check () { + if [[ -e /etc/rhsm/ca/katello-server-ca.pem ]]; then +# shellcheck disable=SC2026 + exit_message \ +'Migration from Katello-modified systems is not supported by migrate2rocky9. '\ +'See the README file for details.' + fi + if [[ -e /etc/salt/minion.d/susemanager.conf ]]; then +# shellcheck disable=SC2026 + exit_message \ +'Migration from Uyuni/SUSE Manager-modified systems is not supported by '\ +'migrate2rocky9. See the README file for details.' + fi + + dnf -y check || exit_message \ +'Errors found in dnf/rpm database. Please correct before running '\ +'migrate2rocky9.' + + # Get available space to compare to requirements. + # If the stock kernel is not installed we don't require space in /boot + if ! rpm -q --quiet kernel; then + dir_space_map[/boot]=0 + fi + local -a errs dirs=("${!dir_space_map[@]}") + local dir mount avail i=0 + local -A mount_avail_map mount_space_map + while read -r mount avail; do + if [[ $mount == 'Filesystem' ]]; then + continue + fi + + dir=${dirs[$((i++))]} + + mount_avail_map[$mount]=${avail%M} + (( mount_space_map[$mount]+=dir_space_map[$dir] )) + done < <(df -BM --output=source,avail "${dirs[@]}") + + for mount in "${!mount_space_map[@]}"; do + (( avail = mount_avail_map[$mount]*95/100 )) + if (( avail < mount_space_map[$mount] )); then + errs+=("Not enough space in $mount, ${mount_space_map[$mount]}M required, ${avail}M available.") + fi + done + + if (( ${#errs[@]} )); then + IFS=$'\n' + exit_message "${errs[*]}" + fi +} + +# All of the binaries used by this script are available in a EL9 minimal install +# and are in /bin, so we should not encounter a system where the script doesn't +# work unless it's severely broken. This is just a simple check that will cause +# the script to bail if any expected system utilities are missing. +bin_check() { + # Check the platform. + if [[ $(os-release PLATFORM_ID) != "$SUPPORTED_PLATFORM" ]]; then +# shellcheck disable=SC2026 + exit_message \ +'This script must be run on an EL9 distribution. Migration from other '\ +'distributions is not supported.' + fi + + local -a missing bins + bins=( + rpm dnf awk column tee tput mkdir cat arch sort uniq rmdir df + rm head curl sha512sum mktemp systemd-detect-virt sed grep + ) + if [[ $update_efi ]]; then + bins+=(findmnt grub2-mkconfig efibootmgr mokutil lsblk) + fi + for bin in "${bins[@]}"; do + if ! type "$bin" >/dev/null 2>&1; then + missing+=("$bin") + fi + done + + local -A pkgs + pkgs=( + [dnf]=4.2 + [dnf-plugins-core]=0 + ) + + for pkg in "${!pkgs[@]}"; do + ver=${pkgs[$pkg]} + if ! pkg_ver "$pkg" "$ver"; then + # shellcheck disable=SC2140 + exit_message \ +"$pkg >= $ver is required for this script. Please run "\ +"\"dnf install $pkg; dnf update\" first." + fi + done; + + if (( ${#missing[@]} )); then +# shellcheck disable=SC2140 + exit_message \ +"Commands not found: ${missing[*]}. Possible bad PATH setting or corrupt "\ +"installation." + fi +} + +# This function will overwrite the repoquery_results associative array with the +# info for the resulting package. Note that we explicitly disable the epel repo +# as a special-case below to avoid having the extras repository map to epel. +repoquery () { + local name val prev result + result=$(safednf -y -q "${dist_repourl_swaps[@]}" \ + --setopt=epel.excludepkgs=epel-release repoquery -i "$1") || + exit_message "Failed to fetch info for package $1." + if ! [[ $result ]]; then + # We didn't match this package, the repo could be disabled. + return 1 + fi + declare -gA repoquery_results=() + while IFS=" :" read -r name val; do + if [[ -z $name ]]; then + repoquery_results[$prev]+=" $val" + else + prev=$name + repoquery_results[$name]=$val + fi + done <<<"$result" +} + +# This function will overwrite the repoinfo_results associative array with the +# info for the resulting repository. +_repoinfo () { + local name val result + result=$( + safednf -y -q --repo="$1" "${dist_repourl_swaps[@]}" repoinfo "$1" + ) || return + if [[ $result == 'Total packages: 0' ]]; then + # We didn't match this repo. + return 1 + fi + declare -gA repoinfo_results=() + while IFS=" :" read -r name val; do + if [[ ! ( $name || $val) ]]; then + continue + fi + if [[ -z $name ]]; then + repoinfo_results[$prev]+=" $val" + else + prev=$name + repoinfo_results[$name]=$val + fi + done <<<"$result" + + # Set the enabled state + if [[ ! ${enabled_repo_check[$1]} ]]; then + repoinfo_results[Repo-status]=disabled + fi + + # dnf repoinfo doesn't return the gpgkey, but we need that so we have to get + # it from the repo file itself. + # "end_of_file" is a hack here. Since it is not a valid dnf setting we know + # it won't appear in a .repo file on a line by itself, so it's safe to + # search for the string to make the awk parser look all the way to the end + # of the file. + # shellcheck disable=SC2154 + repoinfo_results[Repo-gpgkey]=$( + awk ' + $0=="['"${repoinfo_results[Repo-id]}"']",$0=="end_of_file" { + if (l++ < 1) {next} + else if (/^\[.*\]$/) {nextfile} + else if (sub(/^gpgkey\s*=\s*file:\/\//,"")) {print; nextfile} + else {next} + } + ' < "${repoinfo_results[Repo-filename]}" + ) + + # Add an indicator of whether this is a subscription-manager managed + # repository. + # shellcheck disable=SC2154 + repoinfo_results[Repo-managed]=$( + awk ' + BEGIN {FS="[)(]"} + /^# Managed by \(.*\) subscription-manager$/ {print $2} + ' < "${repoinfo_results[Repo-filename]}" + ) +} + +# We now store the repoinfo results in a cache. +declare -g -A repoinfo_results_cache=() +repoinfo () { + local k + if [[ ! ${repoinfo_results_cache[$1]} ]]; then + _repoinfo "$@" || return + repoinfo_results_cache[$1]=1 + for k in "${!repoinfo_results[@]}"; do + repoinfo_results_cache[$1:$k]=${repoinfo_results[$k]} + done + else + repoinfo_results=() + for k in "${!repoinfo_results_cache[@]}"; do + local repo=${k%%:*} key=${k#*:} + if [[ $repo != "$1" ]]; then + continue + fi + + repoinfo_results[$key]=${repoinfo_results_cache[$k]} + done + fi +} + +provides_pkg () ( + if [[ ! $1 ]]; then + return 0 + fi + + set -o pipefail + provides=$( + safednf -y -q "${dist_repourl_swaps[@]}" provides "$1" | + awk '{print $1; nextfile}' + ) || + return 1 + set +o pipefail + pkg=$(rpm -q --queryformat '%{NAME}\n' "$provides") || + pkg=$( + safednf -y -q "${dist_repourl_swaps[@]}" repoquery \ + --queryformat '%{NAME}\n' "$provides" + ) || exit_message "Can't get package name for $provides." + printf '%s\n' "$pkg" +) + +# If you pass an empty arg as one of the package specs to rpm it will match +# every package on the system. This function simply strips out any empty args +# and passes the rest to rpm to avoid this side-effect. +saferpm () ( + args=() + for a in "$@"; do + if [[ $a ]]; then + args+=("$a") + fi + done + rpm "${args[@]}" +) + +# And a similar function for dnf +safednf () ( + args=() + for a in "$@"; do + if [[ $a ]]; then + args+=("$a") + fi + done + dnf "${args[@]}" +) + +# +# Three ways we check the repourl. If dnf repoinfo fails then we assume the URL +# is bad. A missing URL is also considered bad. Lastly we check to see if we +# can fetch the repomd.xml file from the repository, and if not then the repourl +# is considered bad. In any of these cases we'll end up replacing the repourl +# with a good one from our mirror of CentOS vault. +# +check_repourl () { + repoinfo "$1" || return + if [[ ! ${repoinfo_results[Repo-baseurl]} ]]; then + return 1 + fi + + local -a urls; + IFS=, read -r -a urls <<<"${repoinfo_results[Repo-baseurl]}" + local u + for u in "${urls[@]##*( )}"; do + curl -sfLI "${u%% *}repodata/repomd.xml" > /dev/null && return + done + return "$(( $? ? $? : 1 ))" +} + +collect_system_info () { + # Dump the DNF cache first so we start with a clean slate. + infomsg $'\nRemoving dnf cache\n' + rm -rf /var/cache/{yum,dnf} + # Check the efi mount first, so we can bail before wasting time on all these + # other checks if it's not there. + if [[ $update_efi ]]; then + local efi_mount kname + declare -g -a efi_disk efi_partition + efi_mount=$(findmnt --mountpoint /boot/efi --output SOURCE \ + --noheadings) || + exit_message "Can't find EFI mount. No EFI boot detected." + kname=$(lsblk -dno kname "$efi_mount") + efi_disk=("$(lsblk -dno pkname "/dev/$kname")") + + if [[ ${efi_disk[0]} ]]; then + efi_partition=("$(<"/sys/block/${efi_disk[0]}/$kname/partition")") + else + # This is likely an md-raid or other type of virtual disk, we need + # to dig a little deeper to find the actual physical disks and + # partitions. + kname=$(lsblk -dno kname "$efi_mount") + cd "/sys/block/$kname/slaves" || exit_message \ +"Unable to gather EFI data: Can't cd to /sys/block/$kname/slaves." + if ! (shopt -s failglob; : ./*) 2>/dev/null; then + exit_message \ +"Unable to gather EFI data: No slaves found in /sys/block/$kname/slaves." + fi + efi_disk=() + for d in *; do + efi_disk+=("$(lsblk -dno pkname "/dev/$d")") + efi_partition+=("$(<"$d/partition")") + if [[ ! ${efi_disk[-1]} || ! ${efi_partition[-1]} ]]; then + exit_message \ +"Unable to gather EFI data: Can't find disk name or partition number for $d." + fi + done + cd - + fi + + # We need to make sure that these packages are always installed in an + # EFI system. + always_install+=( + "shim-${cpu_arch_suffix_map[$ARCH]}" + "grub2-efi-${cpu_arch_suffix_map[$ARCH]}" + ) + fi + + # Don't enable these module streams, even if they are enabled in the source + # distro. + declare -g -a module_excludes + module_excludes=( + ) + + # Some OracleLinux modules have stream names of ol9 instead of rhel9 and ol + # instead of rhel. This is a map that does a glob match and replacement. + local -A module_glob_map + module_glob_map=( + ['%:ol9']=:rhel9 + ['%:ol']=:rhel + ); + + # We need to map rockylinux repository names to the equivalent repositories + # in the source distro. To do that we look for known packages in each + # repository and see what repo they came from. We need to use repoquery for + # this which requires downloading the package, so we pick relatively small + # packages for this. + declare -g -A repo_map pkg_repo_map + declare -g -a managed_repos + pkg_repo_map=( + [baseos]=rootfiles.noarch + [appstream]=apr-util-ldap.$ARCH + [highavailability]=pacemaker-doc.noarch + [crb]=python3-mpich.$ARCH + [extras]=epel-release.noarch +# [devel]=quota-devel.$ARCH + ) + + dist_id=$(os-release ID) + # We need a different dist ID for CentOS Linux vs CentOS Stream + if [[ $dist_id == centos ]] && rpm --quiet -q centos-stream-release; then + dist_id+=-stream + fi + + PRETTY_NAME=$(os-release PRETTY_NAME) + infomsg '%s' \ + "Preparing to migrate $PRETTY_NAME to Rocky Linux 9."$'\n\n' + + # Check to see if we need to change the repourl on any system repositories + local -A dist_repourl_map + dist_repourl_map=( + ) + + # We need a list of enabled repositories + local -a enabled_repos=() + declare -g -A enabled_repo_check=() + declare -g -a dist_repourl_swaps=() + readarray -s 1 -t enabled_repos < <(dnf -q -y repolist --enabled) + for r in "${enabled_repos[@]}"; do + enabled_repo_check[${r%% *}]=1 + done + + + # ...and finally set a number of dnf options to replace the baseurl of these + # repos + local k + for k in "${!dist_repourl_map[@]}"; do + local d=${k%%:*} r=${k#*:} + if [[ $d != "$dist_id" || ! ${enabled_repo_check[$r]} ]] || + check_repourl "$r"; then + continue + fi + + dist_repourl_swaps+=( + "--setopt=$r.mirrorlist=" + "--setopt=$r.metalink=" + "--setopt=$r.baseurl=" + "--setopt=$r.baseurl=${dist_repourl_map[$k]}" + ) + + infomsg 'Baseurl for %s is invalid, setting to %s.\n' \ + "$r" "${dist_repourl_map[$k]}" + done + + infomsg '%s' "Determining repository names for $PRETTY_NAME" + + for r in "${!pkg_repo_map[@]}"; do + printf '.' + p=${pkg_repo_map[$r]} + repoquery "$p" || continue + repo_map[$r]=${repoquery_results[Repository]} + done + + printf '%s\n' '' '' \ +"Found the following repositories which map from $PRETTY_NAME to Rocky Linux 9:" + column -t -s $'\t' -N "$PRETTY_NAME,Rocky Linux 9" < <( + for r in "${!repo_map[@]}"; do + printf '%s\t%s\n' "${repo_map[$r]}" "$r" + done + ) + + infomsg $'\n'"Getting system package names for $PRETTY_NAME" + + # We don't know what the names of these packages are, we have to discover + # them via various means. The most common means is to look for either a + # distro-agnostic provides or a filename. In a couple of cases we need to + # jump through hoops to get a filename that is provided specifically by the + # source distro. + # Get info for each repository to determine which ones are subscription + # managed. + # system-release here is a bit of a hack, but it ensures that the + # rocky-repos package will get installed. + for r in "${!repo_map[@]}"; do + repoinfo "${repo_map[$r]}" || + exit_message "Failed to fetch info for repository ${repo_map[$r]}." + + if [[ $r == "baseos" ]]; then + local baseos_filename=system-release + if [[ ! ${repoinfo_results[Repo-managed]} ]]; then + baseos_filename="${repoinfo_results[Repo-filename]}" + fi + local baseos_gpgkey="${repoinfo_results[Repo-gpgkey]}" + fi + if [[ ${repoinfo_results[Repo-managed]} ]]; then + managed_repos+=("${repo_map[$r]}") + fi + done + + # First get info for the baseos repo + repoinfo "${repo_map[baseos]}" || + exit_message "Failed to fetch info for repository ${repo_map[baseos]}." + + declare -g -A pkg_map provides_pkg_map + declare -g -a addl_provide_removes addl_pkg_removes + provides_pkg_map=( + [rocky-backgrounds]=system-backgrounds + [rocky-indexhtml]=redhat-indexhtml + [rocky-repos]="$baseos_filename" + [rocky-logos]=system-logos + [rocky-logos-httpd]=system-logos-httpd + [rocky-logos-ipa]=system-logos-ipa + [rocky-gpg-keys]="$baseos_gpgkey" + [rocky-release]=system-release + ) + addl_provide_removes=( + redhat-release + redhat-release-eula + ) + + # Check to make sure that we don't already have a full or partial + # RockyLinux install. + if [[ $(rpm -qa "${!provides_pkg_map[@]}") ]]; then + exit_message \ +$'Found a full or partial RockyLinux install already in place. Aborting\n' +$'because continuing with the migration could cause further damage to system.' + fi + + for pkg in "${!provides_pkg_map[@]}"; do + printf '.' + prov=${provides_pkg_map[$pkg]} + pkg_map[$pkg]=$(provides_pkg "$prov") || + exit_message "Can't get package that provides $prov." + done + for prov in "${addl_provide_removes[@]}"; do + printf '.' + local pkg; + pkg=$(provides_pkg "$prov") || continue + addl_pkg_removes+=("$pkg") + done + +# shellcheck disable=SC2140 + printf '%s\n' '' '' \ +"Found the following system packages which map from $PRETTY_NAME to Rocky "\ +"Linux 9:" + column -t -s $'\t' -N "$PRETTY_NAME,Rocky Linux 9" < <( + for p in "${!pkg_map[@]}"; do + printf '%s\t%s\n' "${pkg_map[$p]}" "$p" + done + ) + + infomsg $'\n'"Getting list of installed system packages."$'\n' + + readarray -t installed_packages < <( + saferpm -qa --queryformat="%{NAME}\n" "${pkg_map[@]}" + ) + declare -g -A installed_pkg_check installed_pkg_map + for p in "${installed_packages[@]}"; do + installed_pkg_check[$p]=1 + done + for p in "${!pkg_map[@]}"; do + if [[ ${pkg_map[$p]} && ${installed_pkg_check[${pkg_map[$p]}]} ]]; then + installed_pkg_map[$p]=${pkg_map[$p]} + fi + done; + + # Special Handling for CentOS Stream Repos + installed_sys_stream_repos_pkgs=() + installed_stream_repos_pkgs=() + for p in "${!stream_repos_pkgs[@]}"; do + if [[ ${installed_pkg_map[$p]} && + ${installed_pkg_map[$p]} == "${stream_repos_pkgs[$p]}" ]] + then + # System package that needs to be swapped / disabled + installed_pkg_map[$p]= + installed_sys_stream_repos_pkgs+=( "${stream_repos_pkgs[$p]}" ) + elif rpm --quiet -q "${stream_repos_pkgs[$p]}"; then + # Non-system package, repos just need to be disabled. + installed_stream_repos_pkgs+=( "${stream_repos_pkgs[$p]}" ) + fi + done + +# shellcheck disable=SC2140 + printf '%s\n' '' \ +"We will replace the following $PRETTY_NAME packages with their Rocky Linux 9 "\ +"equivalents" + column -t -s $'\t' -N "Packages to be Removed,Packages to be Installed" < <( + for p in "${!installed_pkg_map[@]}"; do + printf '%s\t%s\n' "${installed_pkg_map[$p]}" "$p" + done + ) + + if (( ${#installed_sys_stream_repos_pkgs[@]} )); then +# shellcheck disable=SC2026 + printf '%s\n' '' \ +'Also to aid the transition from CentOS Stream the following packages will be '\ +'removed from the rpm database but the included repos will be renamed and '\ +'retained but disabled:' \ + "${installed_sys_stream_repos_pkgs[@]}" + fi + + if (( ${#installed_stream_repos_pkgs[@]} )); then +# shellcheck disable=SC2026 + printf '%s\n' '' \ +'Also to aid the transition from CentOS Stream the repos included in the '\ +'following packages will be renamed and retained but disabled:' \ + "${installed_stream_repos_pkgs[@]}" + fi + + if (( ${#addl_pkg_removes[@]} )); then + printf '%s\n' '' \ +"In addition to the above the following system packages will be removed:" \ + "${addl_pkg_removes[@]}" + fi + + # Release packages that are part of SIG's should be listed below when they + # are available. + # UPDATE: We may or may not do something with SIG's here, it could just be + # left as a separate exercise to swap out the sig repos. + #sigs_to_swap=() + + infomsg '%s' $'\n' \ + $'Getting a list of enabled modules for the system repositories.\n' + + # Get a list of system enabled modules. + readarray -t enabled_modules < <( + set -e -o pipefail + safednf -y -q "${repo_map[@]/#/--repo=}" "${dist_repourl_swaps[@]}" \ + module list --enabled | + awk ' + $1 == "@modulefailsafe", /^$/ {next} + $1 == "Name", /^$/ {if ($1!="Name" && !/^$/) print $1":"$2} + ' | sort -u + set +e +o pipefail + ) + + # Map the known module name differences. + disable_modules=() + local i gl repl mod + for i in "${!enabled_modules[@]}"; do + mod=${enabled_modules[$i]} + for gl in "${!module_glob_map[@]}"; do + repl=${module_glob_map[$gl]} + mod=${mod/$gl/$repl} + done + if [[ $mod != "${enabled_modules[$i]}" ]]; then + disable_modules+=("${enabled_modules[$i]}") + enabled_modules[$i]=$mod + fi + done + + # Remove entries matching any excluded modules. + if (( ${#module_excludes[@]} )); then + printf '%s\n' '' "Excluding modules:" "${module_excludes[@]}" + local -A module_check='()' + local -a tmparr='()' + for m in "${module_excludes[@]}"; do + module_check[$m]=1 + done + for m in "${enabled_modules[@]}"; do + if [[ ! ${module_check[$m]} ]]; then + tmparr+=("$m") + fi + done + enabled_modules=("${tmparr[@]}") + fi + + printf '%s\n' '' "Found the following modules to re-enable at completion:" \ + "${enabled_modules[@]}" '' + + if (( ${#managed_repos[@]} )); then +# shellcheck disable=SC2026 + printf '%s\n' '' \ +'In addition, since this system uses subscription-manager the following '\ +'managed repos will be disabled:' \ + "${managed_repos[@]}" + fi +} + +convert_info_dir=/root/convert +unset convert_to_rocky reinstall_all_rpms verify_all_rpms update_efi \ + container_macros + +usage() { + printf '%s\n' \ + "Usage: ${0##*/} [OPTIONS]" \ + '' \ + 'Options:' \ + '-h Display this help' \ + '-r Convert to rocky' \ + '-V Verify switch' \ + ' !! USE WITH CAUTION !!' + exit 1 +} >&2 + +generate_rpm_info() { + mkdir -p "$convert_info_dir" + infomsg "Creating a list of RPMs installed: $1"$'\n' +# shellcheck disable=SC2140 + rpm -qa --qf \ +"%{NAME}|%{VERSION}|%{RELEASE}|%{INSTALLTIME}|%{VENDOR}|%{BUILDTIME}|"\ +"%{BUILDHOST}|%{SOURCERPM}|%{LICENSE}|%{PACKAGER}\n" | + sort > "${convert_info_dir}/$HOSTNAME-rpm-list-$1.log" + infomsg "Verifying RPMs installed against RPM database: $1"$'\n\n' + rpm -Va | sort -k3 > \ + "${convert_info_dir}/$HOSTNAME-rpm-list-verified-$1.log" +} + +# Run a dnf update before the actual migration. +pre_update() { + infomsg '%s\n' "Running dnf update before we attempt the migration." + safednf -y "${dist_repourl_swaps[@]}" update || exit_message \ +$'Error running pre-update. Stopping now to avoid putting the system in an\n'\ +$'unstable state. Please correct the issues shown here and try again.' +} + +package_swaps() { + # Save off any subscription-manager keys, just in case. + if ( shopt -s failglob dotglob; : "$sm_ca_dir"/* ) 2>/dev/null ; then + tmp_sm_ca_dir=$tmp_dir/sm-certs + mkdir "$tmp_sm_ca_dir" || + exit_message "Could not create directory: $tmp_sm_ca_dir" + cp -f -dR --preserve=all "$sm_ca_dir"/* "$tmp_sm_ca_dir/" || + exit_message "Could not copy certs to $tmp_sm_ca_dir" + fi + + # prepare repo parameters + local -a dnfparameters + for repo in "${!repo_urls[@]}"; do + dnfparameters+=( "--repofrompath=${repo},${repo_urls[${repo}]}" ) + dnfparameters+=( "--setopt=${repo}.gpgcheck=1" ) + dnfparameters+=( "--setopt=${repo}.gpgkey=file://${gpg_key_file}" ) + done + + # CentOS Stream specific processing + if (( ${#installed_stream_repos_pkgs[@]} || + ${#installed_sys_stream_repos_pkgs[@]} )); then + # Get a list of the repo files. + local -a repos_files + readarray -t repos_files < <( + saferpm -ql "${installed_sys_stream_repos_pkgs[@]}" \ + "${installed_stream_repos_pkgs[@]}" | + grep '^/etc/yum\.repos\.d/.\+\.repo$' + ) + + if (( ${#installed_sys_stream_repos_pkgs[@]} )); then + # Remove the package from the rpm db. + saferpm -e --justdb --nodeps -a \ + "${installed_sys_stream_repos_pkgs[@]}" || + exit_message \ +"Could not remove packages from the rpm db: ${installed_sys_stream_repos_pkgs[*]}" + fi + + # Rename the stream repos with a prefix and fix the baseurl. + # shellcheck disable=SC2016 + sed -i \ + -e 's/^\[/['"$stream_prefix"'/' \ + -e 's|^mirrorlist=|#mirrorlist=|' \ + -e 's|^#baseurl=http://mirror.centos.org/$contentdir/$stream/|baseurl=http://mirror.centos.org/centos/9-stream/|' \ + -e 's|^baseurl=http://vault.centos.org/$contentdir/$stream/|baseurl=https://vault.centos.org/centos/9-stream/|' \ + "${repos_files[@]}" + fi + + # Use dnf shell to swap the system packages out. + safednf -y shell --disablerepo=\* --noautoremove \ + "${dist_repourl_swaps[@]}" \ + --setopt=protected_packages= --setopt=keepcache=True \ + "${dnfparameters[@]}" \ + </dev/null + )]=$rpm + done + + # Attempt to install. + for pkg in "${check_installed[@]}"; do + printf '%s\n' "$pkg" + if ! rpm -i --force --nodeps --nodigest "${rpm_map[$pkg]}" \ + 2>/dev/null; then + # Try to install the package in just the db, then clean it up. + rpm -i --force --justdb --nodeps --nodigest "${rpm_map[$pkg]}" \ + 2>/dev/null + + # Get list of files that are still causing problems and donk + # them. + readarray -t file_list < <( + rpm -V "$pkg" 2>/dev/null | awk '$1!="missing" {print $2}' + ) + for file in "${file_list[@]}"; do + rmdir "$file" || + rm -f "$file" || + rm -rf "$file" + done + + # Now try re-installing the package to replace the missing + # files. Regardless of the outcome here we just accept it and + # move on and hope for the best. + rpm -i --reinstall --force --nodeps --nodigest \ + "${rpm_map[$pkg]}" 2>/dev/null + fi + done + fi + + # Distrosync + infomsg $'Ensuring repos are enabled before the package swap\n' + safednf -y --enableplugin=config_manager config-manager \ + --set-enabled "${!repo_map[@]}" || { + printf '%s\n' 'Repo name missing?' + exit 25 + } + + if (( ${#managed_repos[@]} )); then + # Filter the managed repos for ones still in the system. + readarray -t managed_repos < <( + safednf -y -q repolist "${managed_repos[@]}" | + awk '$1!="repo" {print $1}' + ) + + if (( ${#managed_repos[@]} )); then + infomsg $'\nDisabling subscription managed repos\n' + safednf -y --enableplugin=config_manager config-manager \ + --disable "${managed_repos[@]}" + fi + fi + + if (( ${#disable_modules[@]} )); then + infomsg $'Disabling modules\n\n' + safednf -y module disable "${disable_modules[@]}" || + exit_message "Can't disable modules ${disable_modules[*]}" + fi + + if (( ${#enabled_modules[@]} )); then + infomsg $'Enabling modules\n\n' + safednf -y module enable "${enabled_modules[@]}" || + exit_message "Can't enable modules ${enabled_modules[*]}" + fi + + # Make sure that excluded modules are disabled. + if (( ${#module_excludes[@]} )); then + infomsg $'Disabling excluded modules\n\n' + safednf -y module disable "${module_excludes[@]}" || + exit_message "Can't disable modules ${module_excludes[*]}" + fi + + infomsg $'\nSyncing packages\n\n' + dnf -y distro-sync || exit_message "Error during distro-sync." + + # Disable Stream repos. + if (( ${#installed_sys_stream_repos_pkgs[@]} || + ${#installed_stream_repos_pkgs[@]} )); then + dnf -y --enableplugin=config_manager config-manager --set-disabled \ + "$stream_prefix*" || + errmsg \ +$'Failed to disable CentOS Stream repos, please check and disable manually.\n' + + if (( ${#stream_always_replace[@]} )) && + [[ $(saferpm -qa "${stream_always_replace[@]}") ]]; then + safednf -y distro-sync "${stream_always_replace[@]}" || + exit_message "Error during distro-sync." + fi + + infomsg $'\nCentOS Stream Migration Notes:\n\n' + cat < "$container_macros" + elif [[ -d /sys/firmware/efi/ ]]; then + declare -g update_efi + update_efi=true + fi +} + +# Called to update the EFI boot. +fix_efi () ( + grub2-mkconfig -o /boot/efi/EFI/rocky/grub.cfg || + exit_message "Error updating the grub config." + for i in "${!efi_disk[@]}"; do + efibootmgr -c -d "/dev/${efi_disk[$i]}" -p "${efi_partition[$i]}" \ + -L "Rocky Linux" -l "/EFI/rocky/shim${cpu_arch_suffix_map[$ARCH]}.efi" || + exit_message "Error updating uEFI firmware." + done +) + +# Download and verify the Rocky Linux package signing key +establish_gpg_trust () { + # create temp dir and verify it is really created and empty, so we are sure + # deleting it afterwards won't cause any harm + declare -g gpg_tmp_dir + gpg_tmp_dir=$tmp_dir/gpg + if ! mkdir "$gpg_tmp_dir" || [[ ! -d "$gpg_tmp_dir" ]]; then + exit_message "Error creating temp dir" + fi + # failglob makes pathname expansion fail if empty, dotglob adds files + # starting with . to pathname expansion + if ( shopt -s failglob dotglob; : "$gpg_tmp_dir"/* ) 2>/dev/null ; then + exit_message "Temp dir not empty" + fi + + # extract the filename from the url, use the temp dir just created + declare -g gpg_key_file="$gpg_tmp_dir/${gpg_key_url##*/}" + + if ! curl -L -o "$gpg_key_file" --silent --show-error "$gpg_key_url"; then + rm -rf "$gpg_tmp_dir" + exit_message "Error downloading the Rocky Linux signing key." + fi + + if ! sha512sum --quiet -c <<<"$gpg_key_sha512 $gpg_key_file"; then + rm -rf "$gpg_tmp_dir" + exit_message "Error validating the signing key." + fi +} + +## End actual work + +noopts=0 +while getopts "hrVR" option; do + (( noopts++ )) + case "$option" in + h) + usage + ;; + r) + convert_to_rocky=true + ;; + V) + verify_all_rpms=true + ;; + *) + errmsg $'Invalid switch\n' + usage + ;; + esac +done +if (( ! noopts )); then + usage +fi + +pre_setup +trap exit_clean EXIT +pre_check +efi_check +bin_check + +if [[ $verify_all_rpms ]]; then + generate_rpm_info begin +fi + +if [[ $convert_to_rocky ]]; then + collect_system_info + establish_gpg_trust + pre_update + package_swaps +fi + +if [[ $verify_all_rpms && $convert_to_rocky ]]; then + generate_rpm_info finish + infomsg $'You may review the following files:\n' + printf '%s\n' "$convert_info_dir/$HOSTNAME-rpm-list-"*.log +fi + +if [[ $update_efi && $convert_to_rocky ]]; then + fix_efi +fi + +printf '\n\n\n' +if [[ $convert_to_rocky ]]; then + infomsg $'\nDone, please reboot your system.\n' +fi +logmessage