2022-11-23 10:06:23 -03:00
|
|
|
use crate::command::CommandExt;
|
2023-05-25 15:09:23 +08:00
|
|
|
use crate::execution_context::ExecutionContext;
|
2025-07-16 10:16:27 +01:00
|
|
|
use crate::step::Step;
|
2019-06-25 22:47:36 -07:00
|
|
|
use crate::terminal::print_separator;
|
2022-11-11 09:39:29 -05:00
|
|
|
use color_eyre::eyre::Result;
|
2025-06-25 15:59:02 +02:00
|
|
|
use rust_i18n::t;
|
2019-06-25 22:47:36 -07:00
|
|
|
|
2023-05-25 15:09:23 +08:00
|
|
|
pub fn upgrade_packages(ctx: &ExecutionContext) -> Result<()> {
|
2024-10-03 12:47:35 +02:00
|
|
|
print_separator(t!("DragonFly BSD Packages"));
|
2025-06-25 15:59:02 +02:00
|
|
|
|
2025-09-26 21:22:55 +02:00
|
|
|
let sudo = ctx.require_sudo()?;
|
2025-06-25 15:59:02 +02:00
|
|
|
let mut cmd = sudo.execute(ctx, "/usr/local/sbin/pkg")?;
|
|
|
|
|
cmd.arg("upgrade");
|
2023-07-25 08:37:03 +08:00
|
|
|
if ctx.config().yes(Step::System) {
|
|
|
|
|
cmd.arg("-y");
|
|
|
|
|
}
|
|
|
|
|
cmd.status_checked()
|
2019-06-25 22:47:36 -07:00
|
|
|
}
|
|
|
|
|
|
2023-06-03 04:20:42 +08:00
|
|
|
pub fn audit_packages(ctx: &ExecutionContext) -> Result<()> {
|
2024-10-03 12:47:35 +02:00
|
|
|
print_separator(t!("DragonFly BSD Audit"));
|
2024-01-07 18:40:01 -07:00
|
|
|
|
2025-09-26 21:22:55 +02:00
|
|
|
let sudo = ctx.require_sudo()?;
|
2025-06-25 15:59:02 +02:00
|
|
|
sudo.execute(ctx, "/usr/local/sbin/pkg")?
|
|
|
|
|
.args(["audit", "-Fr"])
|
|
|
|
|
.status_checked_with(|status| {
|
|
|
|
|
if !status.success() {
|
|
|
|
|
println!(
|
|
|
|
|
"{}",
|
|
|
|
|
t!("The package audit was successful, but vulnerable packages still remain on the system")
|
|
|
|
|
);
|
|
|
|
|
}
|
|
|
|
|
Ok(())
|
|
|
|
|
})
|
2019-06-25 22:47:36 -07:00
|
|
|
}
|