cleanup
All checks were successful
Blockstorage/repertory/pipeline/head This commit looks good
BlockStorage/repertory/pipeline/head This commit looks good

This commit is contained in:
2025-09-14 11:32:52 -05:00
parent b28f422174
commit ba586ad32f

View File

@@ -2,20 +2,21 @@
# No `-e` (we tolerate benign non-zero returns); keep -Euo
set -Euo pipefail
# ---- logging to a writable place (DMG is read-only) ----
LOG_DIR="/tmp"
LOG_FILE="${LOG_DIR}/Install-$(date +%Y%m%d-%H%M%S).log"
exec > >(tee -a "$LOG_FILE") 2>&1
echo "Logging to: $LOG_FILE"
TARGET_DIR="/Applications"
APP_NAME="repertory.app" # final install path: /Applications/repertory.app
APP_NAME="repertory.app"
# Embedded at pack time (from CFBundleIdentifier prefix)
LABEL_PREFIX="__LABEL_PREFIX__"
UI_LABEL="${LABEL_PREFIX}.ui"
# make staged visible to trap cleanup
staged=""
backup=""
snapfile=""
skip_ui_launch=0
log() { printf "[%(%H:%M:%S)T] %s\n" -1 "$*"; }
warn() { log "WARN: $*"; }
@@ -26,14 +27,13 @@ die() {
here="$(cd "$(dirname "$0")" && pwd)"
# Find the source app anywhere under the DMG root (supports hidden .payload/)
src_app="$(/usr/bin/find "$here" -type d -name "$APP_NAME" -print -quit 2>/dev/null || true)"
if [[ -z "${src_app:-}" ]]; then
src_app="$(/usr/bin/find "$here" -type d -name "*.app" -print -quit 2>/dev/null || true)"
fi
[[ -z "${src_app:-}" ]] && die "No .app found on this disk image."
app_basename="$(basename "$src_app")" # repertory.app
app_basename="$(basename "$src_app")"
dest_app="${TARGET_DIR}/${APP_NAME}"
bundle_id_of() { /usr/bin/defaults read "$1/Contents/Info" CFBundleIdentifier 2>/dev/null || true; }
@@ -47,7 +47,6 @@ bundle_build_of() {
/usr/bin/defaults read "$1/Contents/Info" CFBundleVersion 2>/dev/null || echo "(unknown)"
}
# Require /Applications; prompt for sudo if needed; abort if cannot elevate
USE_SUDO=0
SUDO=""
ensure_target_writable() {
@@ -67,7 +66,6 @@ ensure_target_writable() {
die "Cannot write to ${TARGET_DIR} and sudo is unavailable."
}
# ----- STRICT LABEL PREFIX GATE (fail if invalid) -----
_is_valid_label_prefix() {
local p="${1:-}"
[[ -n "$p" ]] && [[ "$p" != "__LABEL_PREFIX__" ]] && [[ "$p" =~ ^[A-Za-z0-9._-]+$ ]] && [[ "$p" == *.* ]]
@@ -76,7 +74,6 @@ if ! _is_valid_label_prefix "${LABEL_PREFIX:-}"; then
die "Invalid LABEL_PREFIX in installer (value: \"${LABEL_PREFIX:-}\"). Rebuild the DMG so the installer contains a valid reverse-DNS prefix."
fi
# ----- LaunchServices helpers -----
ls_prune_bundle_id() {
local bundle_id="$1" keep_path="$2"
[[ -z "$bundle_id" ]] && return 0
@@ -100,7 +97,6 @@ ls_register_exact() {
/System/Library/Frameworks/CoreServices.framework/Frameworks/LaunchServices.framework/Support/lsregister -f "$app_path" >/dev/null 2>&1 || true
}
# ----- FUSE unmount (no process killing here) -----
is_mounted() { /sbin/mount | /usr/bin/awk '{print $3}' | /usr/bin/grep -Fx "${1:-}" >/dev/null 2>&1; }
_list_repertory_fuse_mounts() { /sbin/mount | /usr/bin/grep -Ei 'macfuse|osxfuse' | /usr/bin/awk '{print $3}' | /usr/bin/grep -i "repertory" || true; }
_unmount_one() {
@@ -134,8 +130,25 @@ unmount_existing_repertory_volumes_first() {
return $failed
}
# ----- user LaunchAgents (by LABEL_PREFIX only) -----
get_plist_label() { /usr/bin/defaults read "$1" Label 2>/dev/null || /usr/libexec/PlistBuddy -c "Print :Label" "$1" 2>/dev/null || basename "$1" .plist; }
get_plist_label() {
/usr/bin/defaults read "$1" Label 2>/dev/null || /usr/libexec/PlistBuddy -c "Print :Label" "$1" 2>/dev/null || basename "$1" .plist
}
snapshot_launchagents_user() {
local user_agents="$HOME/Library/LaunchAgents"
snapfile="$(/usr/bin/mktemp "/tmp/repertory_launchagents.XXXXXX")"
if [[ -d "$user_agents" ]]; then
/usr/bin/find "$user_agents" -maxdepth 1 -type f -name "${LABEL_PREFIX}"'*.plist' -print 2>/dev/null |
while IFS= read -r plist; do
[[ -z "$plist" ]] && continue
local label
label="$(get_plist_label "$plist")"
[[ -n "$label" && "$label" == "${LABEL_PREFIX}"* ]] || continue
printf "%s\t%s\n" "$plist" "$label" >>"$snapfile"
done
fi
}
unload_launchd_helpers_user() {
local uid
uid="$(id -u)"
@@ -154,6 +167,7 @@ unload_launchd_helpers_user() {
/bin/launchctl bootout "gui/${uid}" "$label" 2>/dev/null ||
/bin/launchctl remove "$label" 2>/dev/null || true
done < <(/usr/bin/find "$user_agents" -maxdepth 1 -type f -name "${LABEL_PREFIX}"'*.plist' -print 2>/dev/null)
/bin/launchctl list 2>/dev/null | /usr/bin/awk -v pre="$LABEL_PREFIX" 'NF>=3 && index($3, pre)==1 {print $3}' |
while read -r lbl; do
[[ -z "$lbl" ]] && continue
@@ -161,20 +175,33 @@ unload_launchd_helpers_user() {
/bin/launchctl bootout "gui/${uid}" "$lbl" 2>/dev/null || /bin/launchctl remove "$lbl" 2>/dev/null || true
done
}
remove_launchd_plists_user() {
local user_agents="$HOME/Library/LaunchAgents"
[[ -d "$user_agents" ]] || return 0
while IFS= read -r plist; do
[[ -z "$plist" ]] && continue
local base
base="$(basename "$plist")"
[[ "$base" == "${LABEL_PREFIX}"* ]] || continue
log "Removing LaunchAgent plist: $plist"
/bin/rm -f "$plist" 2>/dev/null || warn "Failed to remove $plist"
done < <(/usr/bin/find "$user_agents" -maxdepth 1 -type f -name "${LABEL_PREFIX}"'*.plist' -print 2>/dev/null)
restart_launchagents_from_snapshot() {
[[ -n "${snapfile:-}" && -f "${snapfile}" ]] || return 0
local uid
uid="$(id -u)"
local count=0
local ui_seen=0
while IFS=$'\t' read -r plist label; do
[[ -z "$plist" || -z "$label" ]] && continue
[[ -f "$plist" ]] || continue
log "Re-starting LaunchAgent: ${label}"
/bin/launchctl bootstrap "gui/${uid}" "$plist" 2>/dev/null || true
/bin/launchctl kickstart -k "gui/${uid}/${label}" 2>/dev/null || true
((count++)) || true
if [[ "$label" == "$UI_LABEL" ]]; then ui_seen=1; fi
done <"$snapfile"
log "Re-started ${count} LaunchAgent(s) with prefix ${LABEL_PREFIX}." || true
if ((ui_seen)); then
sleep 0.3
if /bin/launchctl list | /usr/bin/awk '{print $3}' | /usr/bin/grep -Fxq "$UI_LABEL"; then
log "UI LaunchAgent (${UI_LABEL}) active after restart; skipping manual UI launch."
skip_ui_launch=1
fi
fi
}
# ----- quarantine helper -----
remove_quarantine() {
local path="${1:-}"
if [[ "${USE_SUDO:-0}" == "1" ]]; then
@@ -184,7 +211,6 @@ remove_quarantine() {
fi
}
# ----- optional diagnostics -----
dump_quick_diagnostics() {
local dest_app="$1" exec_name="$2"
warn "codesign verify:"
@@ -202,18 +228,12 @@ dump_quick_diagnostics() {
/usr/bin/log show --style syslog --last 2m --predicate "process == \"${exec_name}\"" 2>/dev/null | /usr/bin/tail -n 120 || true
}
# ----- process helpers -----
_current_user() { id -un; } # username (ps prints 'user' as a name)
# Faster/more robust "alive" check than parsing `ps`.
_current_user() { id -un; }
ps_alive() {
local p="${1:-}"
[[ -n "$p" ]] && /bin/kill -0 "$p" 2>/dev/null
}
# Newest PID for current user/exec, started >= since_epoch, where command line is:
# - exactly the binary (no args), OR
# - contains -ui or --ui (possibly with other args)
find_latest_repertory_pid() {
local since_epoch="$1" exec_name="$2" user="$(_current_user)"
/bin/ps ax -o pid=,lstart=,user=,command= |
@@ -222,15 +242,12 @@ find_latest_repertory_pid() {
pid=$1; lstart=$2" "$3" "$4" "$5" "$6; usr=$7;
cmd=""; for (i=8;i<=NF;i++) { if (i>8) cmd=cmd" "; cmd=cmd $i }
if (usr != u) next;
n=split(cmd, tok, /[[:space:]]+/); if (n < 1) next;
argv0 = tok[1]; m=split(argv0, parts, "/"); base = parts[m];
if (base != en) next;
has_ui = (cmd ~ /(^|[[:space:]])-{1,2}ui([[:space:]]|$)/) ? 1 : 0;
no_args = (n == 1) ? 1 : 0;
if (!has_ui && !no_args) next;
printf "%s\t%s\n", pid, lstart
}' |
while IFS=$'\t' read -r pid lstart; do
@@ -252,7 +269,6 @@ kill_repertory_processes() {
/usr/bin/pkill -KILL -x "$exec_name" >/dev/null 2>&1 || true
}
# ----- visibility helper -----
unhide_path() {
local path="$1"
/usr/bin/chflags -R nohidden "$path" 2>/dev/null || true
@@ -261,43 +277,27 @@ unhide_path() {
now_epoch() { /bin/date +%s; }
# --- main ---
main() {
ensure_target_writable
local exec_name
exec_name="$(bundle_exec_of "$src_app")"
# 1) Unmount FUSE mounts first
unmount_existing_repertory_volumes_first || warn "One or more FUSE mounts resisted unmount; continuing."
# 2) Stop/remove user LaunchAgents
unload_launchd_helpers_user
remove_launchd_plists_user
# 3) Kill any remaining repertory processes
kill_repertory_processes "$exec_name"
# ---- Stage → atomic swap (keep backup until success confirmed) ----
stage_new_app() {
staged="${dest_app}.new-$$"
log "Staging new app → $staged"
$SUDO /usr/bin/ditto "$src_app" "$staged" || die "ditto to stage failed"
remove_quarantine "$staged"
}
# Sanity
if [[ ! -f "$staged/Contents/Info.plist" ]]; then
validate_staged_app() {
[[ -f "$staged/Contents/Info.plist" ]] || {
$SUDO /bin/rm -rf "$staged"
die "staged app missing Info.plist"
fi
}
local exe_name_staged
exe_name_staged="$(/usr/bin/defaults read "$staged/Contents/Info" CFBundleExecutable 2>/dev/null || echo "${app_basename%.app}")"
if [[ ! -x "$staged/Contents/MacOS/$exe_name_staged" ]]; then
[[ -x "$staged/Contents/MacOS/$exe_name_staged" ]] || {
$SUDO /bin/rm -rf "$staged"
die "staged app missing main executable"
fi
}
}
# Activate (keep backup until success)
local backup=""
activate_staged_app() {
if [[ -d "$dest_app" ]]; then
backup="${dest_app}.$(date +%Y%m%d%H%M%S).bak"
log "Moving existing app to backup: $backup"
@@ -313,13 +313,14 @@ main() {
$SUDO /bin/rm -rf "$staged" || true
die "install activation failed"
fi
}
post_activate_housekeeping() {
log "Clearing quarantine on installed app…"
remove_quarantine "$dest_app"
log "Clearing hidden flags on installed app…"
unhide_path "$dest_app"
# LS refresh/prune
local LSREG="/System/Library/Frameworks/CoreServices.framework/Frameworks/LaunchServices.framework/Support/lsregister"
[[ -x "$LSREG" ]] && "$LSREG" -f "$dest_app" >/dev/null 2>&1 || true
local BID
@@ -328,23 +329,23 @@ main() {
ls_register_exact "$dest_app"
log "Installed ${app_basename}: version=$(bundle_version_of "$dest_app") build=$(bundle_build_of "$dest_app")"
}
launch_ui() {
/usr/bin/open -n "$dest_app" || warn "open -n by path failed; not falling back to -b to avoid launching a stale copy."
}
wait_for_ui_stability() {
local exec_name_now="$1"
local PID_DETECT_TIMEOUT_SEC="${PID_DETECT_TIMEOUT_SEC:-2}"
local POLL_INTERVAL="${POLL_INTERVAL:-0.10}"
local STABILITY_WINDOW_SEC="${STABILITY_WINDOW_SEC:-8}"
local GAP_TOLERANCE_SEC="${GAP_TOLERANCE_SEC:-1}"
# ---- Launch ONLY by full path (no -b fallback) ----
log "Launching the new app…"
local launch_epoch
launch_epoch="$(now_epoch)"
local exec_name_now
exec_name_now="$(/usr/bin/defaults read "$dest_app/Contents/Info" CFBundleExecutable 2>/dev/null || echo "${app_basename%.app}")"
# Tunables
local PID_DETECT_TIMEOUT_SEC="${PID_DETECT_TIMEOUT_SEC:-2}"
local POLL_INTERVAL="${POLL_INTERVAL:-0.10}" # seconds; fractional OK
local STABILITY_WINDOW_SEC="${STABILITY_WINDOW_SEC:-8}"
local GAP_TOLERANCE_SEC="${GAP_TOLERANCE_SEC:-1}" # allow brief handoff gaps
/usr/bin/open -n "$dest_app" || warn "open -n by path failed; not falling back to -b to avoid launching a stale copy."
# Detect initial UI pid (don't fail if we miss the very first parent)
local cur_pid=""
for ((i = 0; i < PID_DETECT_TIMEOUT_SEC * 10; i++)); do
cur_pid="$(find_latest_repertory_pid "$launch_epoch" "$exec_name_now" || true)"
@@ -354,36 +355,23 @@ main() {
if [[ -z "$cur_pid" ]]; then
warn "No UI process observed for ${exec_name_now} after launch."
dump_quick_diagnostics "$dest_app" "$exec_name_now" || true
if [[ -n "$backup" && -d "$backup" ]]; then
warn "Rolling back to previous app…"
$SUDO /bin/rm -rf "$dest_app" || true
$SUDO /bin/mv "$backup" "$dest_app" || true
/usr/bin/open -n "$dest_app" || true
fi
log "Done."
return 0
return 1
fi
log "Tracking UI pid $cur_pid."
ps_alive "$cur_pid" || cur_pid=""
# === Stability shepherd: succeed if *any* qualifying UI pid is present
# for the entire window, with small tolerance for handoffs.
local start_ts
start_ts="$(now_epoch)"
local last_seen_ts="$start_ts"
local last_logged_pid="$cur_pid"
# Ensure the first observed PID is alive; if not, we still allow a quick adopt.
ps_alive "$cur_pid" || cur_pid=""
while :; do
local newest
newest="$(find_latest_repertory_pid "$launch_epoch" "$exec_name_now" || true)"
if [[ -n "$newest" ]] && ps_alive "$newest"; then
# update last-seen
last_seen_ts="$(now_epoch)"
if [[ "$newest" != "$cur_pid" ]]; then
# only log when PID actually changes; never print "(was )"
if [[ -n "$cur_pid" && "$newest" != "$last_logged_pid" ]]; then
log "Adopting successor UI pid $newest (was $cur_pid)."
elif [[ -z "$cur_pid" ]]; then
@@ -394,7 +382,6 @@ main() {
fi
fi
# success if window elapsed and we've seen a live UI within tolerance
local now
now="$(now_epoch)"
local elapsed=$((now - start_ts))
@@ -402,20 +389,64 @@ main() {
if ((elapsed >= STABILITY_WINDOW_SEC)); then
if ((gap <= GAP_TOLERANCE_SEC)); then
log "UI verified alive across stability window (~${STABILITY_WINDOW_SEC}s)."
if [[ -n "$backup" && -d "$backup" ]]; then
log "Removing backup: $backup"
$SUDO /bin/rm -rf "$backup" || warn "Could not remove backup (safe to delete manually): $backup"
fi
log "Done."
return 0
else
break
fi
fi
sleep "$POLL_INTERVAL"
done
return 1
}
main() {
ensure_target_writable
local exec_name
exec_name="$(bundle_exec_of "$src_app")"
snapshot_launchagents_user
unmount_existing_repertory_volumes_first || warn "One or more FUSE mounts resisted unmount; continuing."
unload_launchd_helpers_user
kill_repertory_processes "$exec_name"
stage_new_app
validate_staged_app
activate_staged_app
post_activate_housekeeping
restart_launchagents_from_snapshot
if ((skip_ui_launch)); then
[[ -n "$backup" && -d "$backup" ]] && {
log "Removing backup: $backup"
$SUDO /bin/rm -rf "$backup" || warn "Could not remove backup (safe to delete manually): $backup"
}
log "Done."
return 0
fi
log "Launching the new app…"
launch_ui
local exec_name_now
exec_name_now="$(/usr/bin/defaults read "$dest_app/Contents/Info" CFBundleExecutable 2>/dev/null || echo "${app_basename%.app}")"
if wait_for_ui_stability "$exec_name_now"; then
[[ -n "$backup" && -d "$backup" ]] && {
log "Removing backup: $backup"
$SUDO /bin/rm -rf "$backup" || warn "Could not remove backup (safe to delete manually): $backup"
}
log "Done."
return 0
fi
warn "No surviving UI process for ${exec_name_now} by end of verification."
dump_quick_diagnostics "$dest_app" "$exec_name_now" || true
if [[ -n "$backup" && -d "$backup" ]]; then
@@ -436,6 +467,9 @@ cleanup_staged() {
/bin/rm -rf "${staged}" 2>/dev/null || true
fi
fi
if [[ -n "${snapfile:-}" && -f "${snapfile}" ]]; then
/bin/rm -f "${snapfile}" 2>/dev/null || true
fi
}
trap 'rc=$?; cleanup_staged; if (( rc != 0 )); then echo "Installer failed with code $rc. See $LOG_FILE"; fi' EXIT