Files
topgrade/src/steps/os/dragonfly.rs

36 lines
1.0 KiB
Rust
Raw Normal View History

use crate::command::CommandExt;
use crate::execution_context::ExecutionContext;
use crate::step::Step;
2019-06-25 22:47:36 -07:00
use crate::terminal::print_separator;
2022-11-11 09:39:29 -05:00
use color_eyre::eyre::Result;
use rust_i18n::t;
2019-06-25 22:47:36 -07:00
pub fn upgrade_packages(ctx: &ExecutionContext) -> Result<()> {
print_separator(t!("DragonFly BSD Packages"));
let sudo = ctx.require_sudo()?;
let mut cmd = sudo.execute(ctx, "/usr/local/sbin/pkg")?;
cmd.arg("upgrade");
if ctx.config().yes(Step::System) {
cmd.arg("-y");
}
cmd.status_checked()
2019-06-25 22:47:36 -07:00
}
pub fn audit_packages(ctx: &ExecutionContext) -> Result<()> {
print_separator(t!("DragonFly BSD Audit"));
let sudo = ctx.require_sudo()?;
sudo.execute(ctx, "/usr/local/sbin/pkg")?
.args(["audit", "-Fr"])
.status_checked_with(|status| {
if !status.success() {
println!(
"{}",
t!("The package audit was successful, but vulnerable packages still remain on the system")
);
}
Ok(())
})
2019-06-25 22:47:36 -07:00
}