fix: update button enabling its package
This commit is contained in:
@ -125,12 +125,13 @@ pub async fn kill() -> Result<(), String> {
|
||||
pub async fn install_package(
|
||||
state: State<'_, tokio::sync::Mutex<AppData>>,
|
||||
key: PkgKey,
|
||||
force: bool
|
||||
force: bool,
|
||||
enable: bool
|
||||
) -> Result<InstallResult, String> {
|
||||
log::debug!("invoke: install_package({})", key);
|
||||
|
||||
let mut appd = state.lock().await;
|
||||
appd.pkgs.install_package(&key, force, true)
|
||||
appd.pkgs.install_package(&key, force, true, enable)
|
||||
.await
|
||||
.map_err(|e| e.to_string())
|
||||
}
|
||||
|
@ -17,6 +17,12 @@ pub struct DownloadTick {
|
||||
ratio: f32,
|
||||
}
|
||||
|
||||
#[derive(Serialize, Deserialize, Clone, Debug)]
|
||||
pub struct DownloadEndPayload {
|
||||
pub key: PkgKey,
|
||||
pub enable: bool
|
||||
}
|
||||
|
||||
impl DownloadHandler {
|
||||
pub fn new(app: AppHandle) -> DownloadHandler {
|
||||
DownloadHandler {
|
||||
@ -25,7 +31,7 @@ impl DownloadHandler {
|
||||
}
|
||||
}
|
||||
|
||||
pub fn download_zip(&mut self, zip_path: &PathBuf, pkg: &Package) -> Result<()> {
|
||||
pub fn download_zip(&mut self, zip_path: &PathBuf, pkg: &Package, enable: bool) -> Result<()> {
|
||||
let rmt = pkg.rmt.as_ref()
|
||||
.ok_or_else(|| anyhow!("Attempted to download a package without remote data"))?
|
||||
.clone();
|
||||
@ -34,12 +40,18 @@ impl DownloadHandler {
|
||||
} else {
|
||||
// TODO clear cache button should clear this
|
||||
self.paths.insert(zip_path.clone());
|
||||
tauri::async_runtime::spawn(Self::download_zip_proc(self.app.clone(), zip_path.clone(), pkg.key(), rmt));
|
||||
tauri::async_runtime::spawn(Self::download_zip_proc(self.app.clone(), zip_path.clone(), pkg.key(), rmt, enable));
|
||||
Ok(())
|
||||
}
|
||||
}
|
||||
|
||||
async fn download_zip_proc(app: AppHandle, zip_path: PathBuf, pkg_key: PkgKey, rmt: Remote) -> Result<()> {
|
||||
async fn download_zip_proc(
|
||||
app: AppHandle,
|
||||
zip_path: PathBuf,
|
||||
pkg_key: PkgKey,
|
||||
rmt: Remote,
|
||||
enable: bool
|
||||
) -> Result<()> {
|
||||
use futures::StreamExt;
|
||||
use tokio::io::AsyncWriteExt;
|
||||
|
||||
@ -66,7 +78,10 @@ impl DownloadHandler {
|
||||
|
||||
log::debug!("downloaded to {:?}", zip_path);
|
||||
|
||||
app.emit("download-end", pkg_key)?;
|
||||
app.emit("download-end", DownloadEndPayload {
|
||||
key: pkg_key,
|
||||
enable
|
||||
})?;
|
||||
|
||||
Ok(())
|
||||
}
|
||||
|
@ -102,16 +102,23 @@ pub async fn run(_args: Vec<String>) {
|
||||
});
|
||||
|
||||
app.listen("download-end", closure!(clone apph, |ev| {
|
||||
let raw = ev.payload();
|
||||
log::debug!("download-end triggered: {}", raw);
|
||||
let key = PkgKey(raw[1..raw.len()-1].to_owned());
|
||||
let apph = apph.clone();
|
||||
tauri::async_runtime::spawn(async move {
|
||||
let mutex = apph.state::<Mutex<AppData>>();
|
||||
let mut appd = mutex.lock().await;
|
||||
let res = appd.pkgs.install_package(&key, true, false).await;
|
||||
log::debug!("download-end install {:?}", res);
|
||||
});
|
||||
let payload = serde_json::from_str::<download_handler::DownloadEndPayload>(ev.payload());
|
||||
match payload {
|
||||
Ok(payload) => {
|
||||
log::debug!("download-end triggered: {:?}", payload);
|
||||
let key = payload.key;
|
||||
let apph = apph.clone();
|
||||
tauri::async_runtime::spawn(async move {
|
||||
let mutex = apph.state::<Mutex<AppData>>();
|
||||
let mut appd = mutex.lock().await;
|
||||
let res = appd.pkgs.install_package(&key, true, false, payload.enable).await;
|
||||
log::debug!("download-end install {:?}", res);
|
||||
});
|
||||
},
|
||||
Err(err) => {
|
||||
log::error!("invalid download payload: {err}");
|
||||
}
|
||||
}
|
||||
}));
|
||||
|
||||
app.listen("launch-end", closure!(clone apph, |_| {
|
||||
@ -134,11 +141,13 @@ pub async fn run(_args: Vec<String>) {
|
||||
tauri::async_runtime::spawn(async move {
|
||||
let mutex = apph.state::<Mutex<AppData>>();
|
||||
let mut appd = mutex.lock().await;
|
||||
let res = appd.toggle_package(payload.pkg.clone(), ToggleAction::EnableSelf);
|
||||
log::debug!(
|
||||
"install-end-prelude toggle {:?}",
|
||||
res
|
||||
);
|
||||
if payload.enable == true {
|
||||
let res = appd.toggle_package(payload.pkg.clone(), ToggleAction::EnableSelf);
|
||||
log::debug!(
|
||||
"install-end-prelude toggle {:?}",
|
||||
res
|
||||
);
|
||||
}
|
||||
use tauri::Emitter;
|
||||
let res = apph.emit("install-end", payload);
|
||||
log::debug!("install-end {:?}", res);
|
||||
@ -273,7 +282,7 @@ fn deep_link(app: AppHandle, args: Vec<String>) {
|
||||
let mut appd = mutex.lock().await;
|
||||
if appd.pkgs.is_offline() {
|
||||
log::warn!("Deep link installation failed: offline");
|
||||
} else if let Err(e) = appd.pkgs.install_package(&key, true, true).await {
|
||||
} else if let Err(e) = appd.pkgs.install_package(&key, true, true, true).await {
|
||||
log::warn!("Deep link installation failed: {}", e.to_string());
|
||||
}
|
||||
});
|
||||
|
@ -23,7 +23,8 @@ pub struct PackageStore {
|
||||
|
||||
#[derive(Clone, Serialize, Deserialize, Debug)]
|
||||
pub struct Payload {
|
||||
pub pkg: PkgKey
|
||||
pub pkg: PkgKey,
|
||||
pub enable: bool,
|
||||
}
|
||||
|
||||
#[derive(Clone, Copy, Serialize, Deserialize, Debug)]
|
||||
@ -180,7 +181,13 @@ impl PackageStore {
|
||||
self.offline = false;
|
||||
}
|
||||
|
||||
pub async fn install_package(&mut self, key: &PkgKey, force: bool, install_deps: bool) -> Result<InstallResult> {
|
||||
pub async fn install_package(
|
||||
&mut self,
|
||||
key: &PkgKey,
|
||||
force: bool,
|
||||
install_deps: bool,
|
||||
enable: bool
|
||||
) -> Result<InstallResult> {
|
||||
log::info!("installation request: {}/{}/{}", key, force, install_deps);
|
||||
|
||||
let pkg = self.store.get(key)
|
||||
@ -193,7 +200,8 @@ impl PackageStore {
|
||||
}
|
||||
|
||||
self.app.emit("install-start", Payload {
|
||||
pkg: key.to_owned()
|
||||
pkg: key.to_owned(),
|
||||
enable
|
||||
})?;
|
||||
|
||||
let rmt = pkg.rmt.as_ref()
|
||||
@ -203,7 +211,7 @@ impl PackageStore {
|
||||
let mut set = HashSet::new();
|
||||
self.resolve_deps(rmt.clone(), &mut set)?;
|
||||
for dep in set {
|
||||
Box::pin(self.install_package(&dep, false, false)).await?;
|
||||
Box::pin(self.install_package(&dep, false, false, enable)).await?;
|
||||
}
|
||||
}
|
||||
|
||||
@ -214,7 +222,7 @@ impl PackageStore {
|
||||
let part_path = zip_path.join(".part");
|
||||
|
||||
if !zip_path.exists() && !part_path.exists() {
|
||||
self.dlh.download_zip(&zip_path, &pkg)?;
|
||||
self.dlh.download_zip(&zip_path, &pkg, enable)?;
|
||||
log::debug!("deferring {}", key);
|
||||
return Ok(InstallResult::Deferred);
|
||||
}
|
||||
@ -230,7 +238,8 @@ impl PackageStore {
|
||||
self.reload_package(key.to_owned()).await;
|
||||
|
||||
self.app.emit("install-end-prelude", Payload {
|
||||
pkg: key.to_owned()
|
||||
pkg: key.to_owned(),
|
||||
enable
|
||||
})?;
|
||||
|
||||
log::info!("installed {}", key);
|
||||
@ -252,7 +261,8 @@ impl PackageStore {
|
||||
|
||||
if rv.is_ok() {
|
||||
self.app.emit("install-end-prelude", Payload {
|
||||
pkg: key.to_owned()
|
||||
pkg: key.to_owned(),
|
||||
enable: false
|
||||
})?;
|
||||
log::info!("deleted {}", key);
|
||||
}
|
||||
|
Reference in New Issue
Block a user