blob: 533d1469c1317b07fcf07b5a3662f433f3bae049 [file] [log] [blame]
Jennifer Lee729dae72018-04-24 15:59:34 -07001/*
2// Copyright (c) 2018 Intel Corporation
3//
4// Licensed under the Apache License, Version 2.0 (the "License");
5// you may not use this file except in compliance with the License.
6// You may obtain a copy of the License at
7//
8// http://www.apache.org/licenses/LICENSE-2.0
9//
10// Unless required by applicable law or agreed to in writing, software
11// distributed under the License is distributed on an "AS IS" BASIS,
12// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13// See the License for the specific language governing permissions and
14// limitations under the License.
15*/
16#pragma once
17
Tejas Patild61e5192021-06-04 15:49:35 +053018#include "bmcweb_config.h"
19
Ed Tanous3ccb3ad2023-01-13 17:40:03 -080020#include "app.hpp"
21#include "dbus_utility.hpp"
Ed Tanous5b904292024-04-16 11:10:17 -070022#include "error_messages.hpp"
Ed Tanous757178a2024-04-03 14:32:38 -070023#include "generated/enums/update_service.hpp"
George Liu0ed80c82020-05-12 16:06:27 +080024#include "multipart_parser.hpp"
Ed Tanous2c6ffdb2023-06-28 11:28:38 -070025#include "ossl_random.hpp"
Ed Tanous3ccb3ad2023-01-13 17:40:03 -080026#include "query.hpp"
27#include "registries/privilege_registry.hpp"
Ed Tanousa8e884f2023-01-13 17:40:03 -080028#include "task.hpp"
Ed Tanous5b904292024-04-16 11:10:17 -070029#include "task_messages.hpp"
John Edward Broadbent08d81ad2022-05-17 20:00:23 -070030#include "utils/collection.hpp"
Ed Tanous3ccb3ad2023-01-13 17:40:03 -080031#include "utils/dbus_utils.hpp"
Ed Tanous5b904292024-04-16 11:10:17 -070032#include "utils/json_utils.hpp"
Ed Tanous3ccb3ad2023-01-13 17:40:03 -080033#include "utils/sw_utils.hpp"
34
Jagpal Singh Gillde0c9602024-04-29 17:30:21 -070035#include <sys/mman.h>
36
George Liue99073f2022-12-09 11:06:16 +080037#include <boost/system/error_code.hpp>
Ed Tanousef4c65b2023-04-24 15:28:50 -070038#include <boost/url/format.hpp>
Jonathan Doman1e1e5982021-06-11 09:36:17 -070039#include <sdbusplus/asio/property.hpp>
Ed Tanous3ccb3ad2023-01-13 17:40:03 -080040#include <sdbusplus/bus/match.hpp>
Krzysztof Grobelnyd1bde9e2022-09-07 10:40:51 +020041#include <sdbusplus/unpack_properties.hpp>
Gunnar Mills1214b7e2020-06-04 10:11:30 -050042
George Liu2b731192023-01-11 16:27:13 +080043#include <array>
Jagpal Singh Gillde0c9602024-04-29 17:30:21 -070044#include <cstddef>
George Liu0ed80c82020-05-12 16:06:27 +080045#include <filesystem>
Jagpal Singh Gillc71b6c92024-04-29 16:50:53 -070046#include <functional>
Jagpal Singh Gillde0c9602024-04-29 17:30:21 -070047#include <iterator>
Jagpal Singh Gillef93eab2024-04-17 16:06:14 -070048#include <memory>
Ed Tanous7cb59f62022-05-05 11:48:31 -070049#include <optional>
50#include <string>
George Liu2b731192023-01-11 16:27:13 +080051#include <string_view>
Jagpal Singh Gillde0c9602024-04-29 17:30:21 -070052#include <unordered_map>
Jagpal Singh Gillef93eab2024-04-17 16:06:14 -070053#include <vector>
George Liu2b731192023-01-11 16:27:13 +080054
Ed Tanous1abe55e2018-09-05 08:30:59 -070055namespace redfish
56{
Ed Tanous27826b52018-10-29 11:40:58 -070057
Andrew Geissler0e7de462019-03-04 19:11:54 -060058// Match signals added on software path
Ed Tanouscf9e4172022-12-21 09:30:16 -080059// NOLINTNEXTLINE(cppcoreguidelines-avoid-non-const-global-variables)
Patrick Williams59d494e2022-07-22 19:26:55 -050060static std::unique_ptr<sdbusplus::bus::match_t> fwUpdateMatcher;
Ed Tanouscf9e4172022-12-21 09:30:16 -080061// NOLINTNEXTLINE(cppcoreguidelines-avoid-non-const-global-variables)
Patrick Williams59d494e2022-07-22 19:26:55 -050062static std::unique_ptr<sdbusplus::bus::match_t> fwUpdateErrorMatcher;
Andrew Geissler0e7de462019-03-04 19:11:54 -060063// Only allow one update at a time
Ed Tanouscf9e4172022-12-21 09:30:16 -080064// NOLINTNEXTLINE(cppcoreguidelines-avoid-non-const-global-variables)
Andrew Geissler0e7de462019-03-04 19:11:54 -060065static bool fwUpdateInProgress = false;
Andrew Geissler86adcd62019-04-18 10:58:05 -050066// Timer for software available
Ed Tanouscf9e4172022-12-21 09:30:16 -080067// NOLINTNEXTLINE(cppcoreguidelines-avoid-non-const-global-variables)
Ed Tanous271584a2019-07-09 16:24:22 -070068static std::unique_ptr<boost::asio::steady_timer> fwAvailableTimer;
Andrew Geissler86adcd62019-04-18 10:58:05 -050069
Jagpal Singh Gillde0c9602024-04-29 17:30:21 -070070struct MemoryFileDescriptor
71{
72 int fd = -1;
73
74 explicit MemoryFileDescriptor(const std::string& filename) :
75 fd(memfd_create(filename.c_str(), 0))
76 {}
77
78 MemoryFileDescriptor(const MemoryFileDescriptor&) = default;
79 MemoryFileDescriptor(MemoryFileDescriptor&& other) noexcept : fd(other.fd)
80 {
81 other.fd = -1;
82 }
83 MemoryFileDescriptor& operator=(const MemoryFileDescriptor&) = delete;
84 MemoryFileDescriptor& operator=(MemoryFileDescriptor&&) = default;
85
86 ~MemoryFileDescriptor()
87 {
88 if (fd != -1)
89 {
90 close(fd);
91 }
92 }
93
94 bool rewind() const
95 {
96 if (lseek(fd, 0, SEEK_SET) == -1)
97 {
98 BMCWEB_LOG_ERROR("Failed to seek to beginning of image memfd");
99 return false;
100 }
101 return true;
102 }
103};
104
Ed Tanousdf254f22024-04-01 13:25:46 -0700105inline void cleanUp()
Andrew Geissler86adcd62019-04-18 10:58:05 -0500106{
107 fwUpdateInProgress = false;
108 fwUpdateMatcher = nullptr;
James Feist4cde5d92020-06-11 10:39:55 -0700109 fwUpdateErrorMatcher = nullptr;
Andrew Geissler86adcd62019-04-18 10:58:05 -0500110}
Ed Tanousdf254f22024-04-01 13:25:46 -0700111
112inline void activateImage(const std::string& objPath,
113 const std::string& service)
Andrew Geissler86adcd62019-04-18 10:58:05 -0500114{
Ed Tanous62598e32023-07-17 17:06:25 -0700115 BMCWEB_LOG_DEBUG("Activate image for {} {}", objPath, service);
George Liu9ae226f2023-06-21 17:56:46 +0800116 sdbusplus::asio::setProperty(
117 *crow::connections::systemBus, service, objPath,
118 "xyz.openbmc_project.Software.Activation", "RequestedActivation",
119 "xyz.openbmc_project.Software.Activation.RequestedActivations.Active",
Ed Tanous8b242752023-06-27 17:17:13 -0700120 [](const boost::system::error_code& ec) {
121 if (ec)
Ed Tanous002d39b2022-05-31 08:59:27 -0700122 {
Ed Tanous62598e32023-07-17 17:06:25 -0700123 BMCWEB_LOG_DEBUG("error_code = {}", ec);
124 BMCWEB_LOG_DEBUG("error msg = {}", ec.message());
Ed Tanous002d39b2022-05-31 08:59:27 -0700125 }
Patrick Williams5a39f772023-10-20 11:20:21 -0500126 });
Andrew Geissler86adcd62019-04-18 10:58:05 -0500127}
Andrew Geissler0554c982019-04-23 14:40:12 -0500128
Jagpal Singh Gillc71b6c92024-04-29 16:50:53 -0700129inline bool handleCreateTask(const boost::system::error_code& ec2,
130 sdbusplus::message_t& msg,
131 const std::shared_ptr<task::TaskData>& taskData)
132{
133 if (ec2)
134 {
135 return task::completed;
136 }
137
138 std::string iface;
139 dbus::utility::DBusPropertiesMap values;
140
141 std::string index = std::to_string(taskData->index);
142 msg.read(iface, values);
143
144 if (iface == "xyz.openbmc_project.Software.Activation")
145 {
146 const std::string* state = nullptr;
147 for (const auto& property : values)
148 {
149 if (property.first == "Activation")
150 {
151 state = std::get_if<std::string>(&property.second);
152 if (state == nullptr)
153 {
154 taskData->messages.emplace_back(messages::internalError());
155 return task::completed;
156 }
157 }
158 }
159
160 if (state == nullptr)
161 {
162 return !task::completed;
163 }
164
165 if (state->ends_with("Invalid") || state->ends_with("Failed"))
166 {
167 taskData->state = "Exception";
168 taskData->status = "Warning";
169 taskData->messages.emplace_back(messages::taskAborted(index));
170 return task::completed;
171 }
172
173 if (state->ends_with("Staged"))
174 {
175 taskData->state = "Stopping";
176 taskData->messages.emplace_back(messages::taskPaused(index));
177
178 // its staged, set a long timer to
179 // allow them time to complete the
180 // update (probably cycle the
181 // system) if this expires then
182 // task will be canceled
183 taskData->extendTimer(std::chrono::hours(5));
184 return !task::completed;
185 }
186
187 if (state->ends_with("Active"))
188 {
189 taskData->messages.emplace_back(messages::taskCompletedOK(index));
190 taskData->state = "Completed";
191 return task::completed;
192 }
193 }
194 else if (iface == "xyz.openbmc_project.Software.ActivationProgress")
195 {
196 const uint8_t* progress = nullptr;
197 for (const auto& property : values)
198 {
199 if (property.first == "Progress")
200 {
201 progress = std::get_if<uint8_t>(&property.second);
202 if (progress == nullptr)
203 {
204 taskData->messages.emplace_back(messages::internalError());
205 return task::completed;
206 }
207 }
208 }
209
210 if (progress == nullptr)
211 {
212 return !task::completed;
213 }
214 taskData->percentComplete = *progress;
215 taskData->messages.emplace_back(
216 messages::taskProgressChanged(index, *progress));
217
218 // if we're getting status updates it's
219 // still alive, update timer
220 taskData->extendTimer(std::chrono::minutes(5));
221 }
222
223 // as firmware update often results in a
224 // reboot, the task may never "complete"
225 // unless it is an error
226
227 return !task::completed;
228}
229
230inline void createTask(const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
231 task::Payload&& payload,
232 const sdbusplus::message::object_path& objPath)
233{
234 std::shared_ptr<task::TaskData> task = task::TaskData::createTask(
235 std::bind_front(handleCreateTask),
236 "type='signal',interface='org.freedesktop.DBus.Properties',"
237 "member='PropertiesChanged',path='" +
238 objPath.str + "'");
239 task->startTimer(std::chrono::minutes(5));
240 task->populateResp(asyncResp->res);
241 task->payload.emplace(std::move(payload));
242}
243
Andrew Geissler0554c982019-04-23 14:40:12 -0500244// Note that asyncResp can be either a valid pointer or nullptr. If nullptr
245// then no asyncResp updates will occur
zhanghch058d1b46d2021-04-01 11:18:24 +0800246static void
247 softwareInterfaceAdded(const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
Patrick Williams59d494e2022-07-22 19:26:55 -0500248 sdbusplus::message_t& m, task::Payload&& payload)
Andrew Geissler86adcd62019-04-18 10:58:05 -0500249{
Michael Shen80f79a42023-08-24 13:41:53 +0000250 dbus::utility::DBusInterfacesMap interfacesProperties;
Andrew Geissler86adcd62019-04-18 10:58:05 -0500251
252 sdbusplus::message::object_path objPath;
253
254 m.read(objPath, interfacesProperties);
255
Ed Tanous62598e32023-07-17 17:06:25 -0700256 BMCWEB_LOG_DEBUG("obj path = {}", objPath.str);
Ed Tanouse3eb3d62022-12-21 11:56:07 -0800257 for (const auto& interface : interfacesProperties)
Andrew Geissler86adcd62019-04-18 10:58:05 -0500258 {
Ed Tanous62598e32023-07-17 17:06:25 -0700259 BMCWEB_LOG_DEBUG("interface = {}", interface.first);
Andrew Geissler86adcd62019-04-18 10:58:05 -0500260
261 if (interface.first == "xyz.openbmc_project.Software.Activation")
262 {
Andrew Geissler86adcd62019-04-18 10:58:05 -0500263 // Retrieve service and activate
George Liu2b731192023-01-11 16:27:13 +0800264 constexpr std::array<std::string_view, 1> interfaces = {
265 "xyz.openbmc_project.Software.Activation"};
266 dbus::utility::getDbusObject(
267 objPath.str, interfaces,
Ed Tanousa3e65892021-09-16 14:13:20 -0700268 [objPath, asyncResp, payload(std::move(payload))](
Ed Tanous8b242752023-06-27 17:17:13 -0700269 const boost::system::error_code& ec,
Ed Tanousa3e65892021-09-16 14:13:20 -0700270 const std::vector<
271 std::pair<std::string, std::vector<std::string>>>&
272 objInfo) mutable {
Ed Tanous8b242752023-06-27 17:17:13 -0700273 if (ec)
Ed Tanous002d39b2022-05-31 08:59:27 -0700274 {
Ed Tanous62598e32023-07-17 17:06:25 -0700275 BMCWEB_LOG_DEBUG("error_code = {}", ec);
276 BMCWEB_LOG_DEBUG("error msg = {}", ec.message());
Andrew Geissler0554c982019-04-23 14:40:12 -0500277 if (asyncResp)
278 {
Ed Tanous002d39b2022-05-31 08:59:27 -0700279 messages::internalError(asyncResp->res);
280 }
281 cleanUp();
282 return;
283 }
284 // Ensure we only got one service back
285 if (objInfo.size() != 1)
286 {
Ed Tanous62598e32023-07-17 17:06:25 -0700287 BMCWEB_LOG_ERROR("Invalid Object Size {}", objInfo.size());
Ed Tanous002d39b2022-05-31 08:59:27 -0700288 if (asyncResp)
289 {
290 messages::internalError(asyncResp->res);
291 }
292 cleanUp();
293 return;
294 }
295 // cancel timer only when
296 // xyz.openbmc_project.Software.Activation interface
297 // is added
298 fwAvailableTimer = nullptr;
299
300 activateImage(objPath.str, objInfo[0].first);
301 if (asyncResp)
302 {
Jagpal Singh Gillc71b6c92024-04-29 16:50:53 -0700303 createTask(asyncResp, std::move(payload), objPath);
Ed Tanous002d39b2022-05-31 08:59:27 -0700304 }
305 fwUpdateInProgress = false;
Patrick Williams5a39f772023-10-20 11:20:21 -0500306 });
Patrick Williams62bafc02022-09-08 17:35:35 -0500307
308 break;
Andrew Geissler86adcd62019-04-18 10:58:05 -0500309 }
310 }
311}
312
Myung Bae8549b952023-08-16 15:18:19 -0400313inline void afterAvailbleTimerAsyncWait(
314 const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
315 const boost::system::error_code& ec)
316{
317 cleanUp();
318 if (ec == boost::asio::error::operation_aborted)
319 {
320 // expected, we were canceled before the timer completed.
321 return;
322 }
323 BMCWEB_LOG_ERROR("Timed out waiting for firmware object being created");
324 BMCWEB_LOG_ERROR("FW image may has already been uploaded to server");
325 if (ec)
326 {
327 BMCWEB_LOG_ERROR("Async_wait failed{}", ec);
328 return;
329 }
330 if (asyncResp)
331 {
332 redfish::messages::internalError(asyncResp->res);
333 }
334}
335
336inline void
337 handleUpdateErrorType(const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
338 const std::string& url, const std::string& type)
339{
340 if (type == "xyz.openbmc_project.Software.Image.Error.UnTarFailure")
341 {
342 redfish::messages::invalidUpload(asyncResp->res, url,
343 "Invalid archive");
344 }
345 else if (type ==
346 "xyz.openbmc_project.Software.Image.Error.ManifestFileFailure")
347 {
348 redfish::messages::invalidUpload(asyncResp->res, url,
349 "Invalid manifest");
350 }
351 else if (type == "xyz.openbmc_project.Software.Image.Error.ImageFailure")
352 {
353 redfish::messages::invalidUpload(asyncResp->res, url,
354 "Invalid image format");
355 }
356 else if (type == "xyz.openbmc_project.Software.Version.Error.AlreadyExists")
357 {
358 redfish::messages::invalidUpload(asyncResp->res, url,
359 "Image version already exists");
360
361 redfish::messages::resourceAlreadyExists(
362 asyncResp->res, "UpdateService", "Version", "uploaded version");
363 }
364 else if (type == "xyz.openbmc_project.Software.Image.Error.BusyFailure")
365 {
366 redfish::messages::resourceExhaustion(asyncResp->res, url);
367 }
Myung Bae4034a652023-08-17 08:47:35 -0400368 else if (type == "xyz.openbmc_project.Software.Version.Error.Incompatible")
Myung Bae8549b952023-08-16 15:18:19 -0400369 {
Myung Bae4034a652023-08-17 08:47:35 -0400370 redfish::messages::invalidUpload(asyncResp->res, url,
371 "Incompatible image version");
372 }
373 else if (type ==
374 "xyz.openbmc_project.Software.Version.Error.ExpiredAccessKey")
375 {
376 redfish::messages::invalidUpload(asyncResp->res, url,
377 "Update Access Key Expired");
378 }
379 else if (type ==
380 "xyz.openbmc_project.Software.Version.Error.InvalidSignature")
381 {
382 redfish::messages::invalidUpload(asyncResp->res, url,
383 "Invalid image signature");
384 }
385 else if (type ==
386 "xyz.openbmc_project.Software.Image.Error.InternalFailure" ||
387 type == "xyz.openbmc_project.Software.Version.Error.HostFile")
388 {
389 BMCWEB_LOG_ERROR("Software Image Error type={}", type);
Myung Bae8549b952023-08-16 15:18:19 -0400390 redfish::messages::internalError(asyncResp->res);
391 }
Myung Bae4034a652023-08-17 08:47:35 -0400392 else
393 {
394 // Unrelated error types. Ignored
395 BMCWEB_LOG_INFO("Non-Software-related Error type={}. Ignored", type);
396 return;
397 }
398 // Clear the timer
399 fwAvailableTimer = nullptr;
Myung Bae8549b952023-08-16 15:18:19 -0400400}
401
402inline void
403 afterUpdateErrorMatcher(const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
404 const std::string& url, sdbusplus::message_t& m)
405{
Michael Shen80f79a42023-08-24 13:41:53 +0000406 dbus::utility::DBusInterfacesMap interfacesProperties;
Myung Bae8549b952023-08-16 15:18:19 -0400407 sdbusplus::message::object_path objPath;
408 m.read(objPath, interfacesProperties);
409 BMCWEB_LOG_DEBUG("obj path = {}", objPath.str);
410 for (const std::pair<std::string, dbus::utility::DBusPropertiesMap>&
411 interface : interfacesProperties)
412 {
413 if (interface.first == "xyz.openbmc_project.Logging.Entry")
414 {
415 for (const std::pair<std::string, dbus::utility::DbusVariantType>&
416 value : interface.second)
417 {
418 if (value.first != "Message")
419 {
420 continue;
421 }
422 const std::string* type =
423 std::get_if<std::string>(&value.second);
424 if (type == nullptr)
425 {
426 // if this was our message, timeout will cover it
427 return;
428 }
Myung Bae8549b952023-08-16 15:18:19 -0400429 handleUpdateErrorType(asyncResp, url, *type);
430 }
431 }
432 }
433}
434
Andrew Geissler0554c982019-04-23 14:40:12 -0500435// Note that asyncResp can be either a valid pointer or nullptr. If nullptr
436// then no asyncResp updates will occur
Ed Tanousf5139332024-04-03 13:25:04 -0700437inline void monitorForSoftwareAvailable(
zhanghch058d1b46d2021-04-01 11:18:24 +0800438 const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
439 const crow::Request& req, const std::string& url,
Gunnar Mills5d138942022-09-07 10:26:21 -0500440 int timeoutTimeSeconds = 25)
Andrew Geissler86adcd62019-04-18 10:58:05 -0500441{
442 // Only allow one FW update at a time
Ed Tanouse05aec52022-01-25 10:28:56 -0800443 if (fwUpdateInProgress)
Andrew Geissler86adcd62019-04-18 10:58:05 -0500444 {
Andrew Geissler0554c982019-04-23 14:40:12 -0500445 if (asyncResp)
446 {
Andrew Geissler0554c982019-04-23 14:40:12 -0500447 messages::serviceTemporarilyUnavailable(asyncResp->res, "30");
448 }
Andrew Geissler86adcd62019-04-18 10:58:05 -0500449 return;
450 }
451
Ed Tanous8e8245d2024-04-11 22:21:38 -0700452 if (req.ioService == nullptr)
453 {
454 messages::internalError(asyncResp->res);
455 return;
456 }
457
Andrew Geissler0554c982019-04-23 14:40:12 -0500458 fwAvailableTimer =
Ed Tanous271584a2019-07-09 16:24:22 -0700459 std::make_unique<boost::asio::steady_timer>(*req.ioService);
Andrew Geissler86adcd62019-04-18 10:58:05 -0500460
Ed Tanous271584a2019-07-09 16:24:22 -0700461 fwAvailableTimer->expires_after(std::chrono::seconds(timeoutTimeSeconds));
Andrew Geissler86adcd62019-04-18 10:58:05 -0500462
463 fwAvailableTimer->async_wait(
Myung Bae8549b952023-08-16 15:18:19 -0400464 std::bind_front(afterAvailbleTimerAsyncWait, asyncResp));
465
Ed Tanousa3e65892021-09-16 14:13:20 -0700466 task::Payload payload(req);
Patrick Williams59d494e2022-07-22 19:26:55 -0500467 auto callback = [asyncResp, payload](sdbusplus::message_t& m) mutable {
Ed Tanous62598e32023-07-17 17:06:25 -0700468 BMCWEB_LOG_DEBUG("Match fired");
Ed Tanousa3e65892021-09-16 14:13:20 -0700469 softwareInterfaceAdded(asyncResp, m, std::move(payload));
Andrew Geissler86adcd62019-04-18 10:58:05 -0500470 };
471
472 fwUpdateInProgress = true;
473
Patrick Williams59d494e2022-07-22 19:26:55 -0500474 fwUpdateMatcher = std::make_unique<sdbusplus::bus::match_t>(
Andrew Geissler86adcd62019-04-18 10:58:05 -0500475 *crow::connections::systemBus,
476 "interface='org.freedesktop.DBus.ObjectManager',type='signal',"
477 "member='InterfacesAdded',path='/xyz/openbmc_project/software'",
478 callback);
James Feist4cde5d92020-06-11 10:39:55 -0700479
Patrick Williams59d494e2022-07-22 19:26:55 -0500480 fwUpdateErrorMatcher = std::make_unique<sdbusplus::bus::match_t>(
James Feist4cde5d92020-06-11 10:39:55 -0700481 *crow::connections::systemBus,
Brian Mae1cc4822021-12-01 17:05:54 +0800482 "interface='org.freedesktop.DBus.ObjectManager',type='signal',"
483 "member='InterfacesAdded',"
484 "path='/xyz/openbmc_project/logging'",
Myung Bae8549b952023-08-16 15:18:19 -0400485 std::bind_front(afterUpdateErrorMatcher, asyncResp, url));
Andrew Geissler86adcd62019-04-18 10:58:05 -0500486}
Jennifer Lee729dae72018-04-24 15:59:34 -0700487
Ed Tanous757178a2024-04-03 14:32:38 -0700488inline std::optional<boost::urls::url>
489 parseSimpleUpdateUrl(std::string imageURI,
490 std::optional<std::string> transferProtocol,
491 crow::Response& res)
Ed Tanousf86bcc82023-08-25 09:34:07 -0700492{
493 if (imageURI.find("://") == std::string::npos)
494 {
495 if (imageURI.starts_with("/"))
496 {
497 messages::actionParameterValueTypeError(
498 res, imageURI, "ImageURI", "UpdateService.SimpleUpdate");
499 return std::nullopt;
500 }
501 if (!transferProtocol)
502 {
503 messages::actionParameterValueTypeError(
504 res, imageURI, "ImageURI", "UpdateService.SimpleUpdate");
505 return std::nullopt;
506 }
Ed Tanouse5cf7772024-04-03 13:45:31 -0700507 // OpenBMC currently only supports TFTP or HTTPS
Ed Tanous757178a2024-04-03 14:32:38 -0700508 if (*transferProtocol == "TFTP")
509 {
510 imageURI = "tftp://" + imageURI;
511 }
Ed Tanouse5cf7772024-04-03 13:45:31 -0700512 else if (*transferProtocol == "HTTPS")
513 {
514 imageURI = "https://" + imageURI;
515 }
Ed Tanous757178a2024-04-03 14:32:38 -0700516 else
Ed Tanousf86bcc82023-08-25 09:34:07 -0700517 {
518 messages::actionParameterNotSupported(res, "TransferProtocol",
519 *transferProtocol);
520 BMCWEB_LOG_ERROR("Request incorrect protocol parameter: {}",
521 *transferProtocol);
522 return std::nullopt;
523 }
Ed Tanousf86bcc82023-08-25 09:34:07 -0700524 }
525
526 boost::system::result<boost::urls::url> url =
527 boost::urls::parse_absolute_uri(imageURI);
528 if (!url)
529 {
530 messages::actionParameterValueTypeError(res, imageURI, "ImageURI",
531 "UpdateService.SimpleUpdate");
532
533 return std::nullopt;
534 }
535 url->normalize();
536
Ed Tanous757178a2024-04-03 14:32:38 -0700537 if (url->scheme() == "tftp")
538 {
539 if (url->encoded_path().size() < 2)
540 {
541 messages::actionParameterNotSupported(res, "ImageURI",
542 url->buffer());
543 return std::nullopt;
544 }
545 }
Ed Tanouse5cf7772024-04-03 13:45:31 -0700546 else if (url->scheme() == "https")
547 {
548 // Empty paths default to "/"
549 if (url->encoded_path().empty())
550 {
551 url->set_encoded_path("/");
552 }
553 }
Ed Tanous757178a2024-04-03 14:32:38 -0700554 else
Ed Tanousf86bcc82023-08-25 09:34:07 -0700555 {
556 messages::actionParameterNotSupported(res, "ImageURI", imageURI);
557 return std::nullopt;
558 }
Ed Tanous757178a2024-04-03 14:32:38 -0700559
560 if (url->encoded_path().empty())
Ed Tanousf86bcc82023-08-25 09:34:07 -0700561 {
Ed Tanous757178a2024-04-03 14:32:38 -0700562 messages::actionParameterValueTypeError(res, imageURI, "ImageURI",
563 "UpdateService.SimpleUpdate");
Ed Tanousf86bcc82023-08-25 09:34:07 -0700564 return std::nullopt;
565 }
Ed Tanous757178a2024-04-03 14:32:38 -0700566
567 return *url;
Ed Tanousf86bcc82023-08-25 09:34:07 -0700568}
569
Ed Tanouse5cf7772024-04-03 13:45:31 -0700570inline void doHttpsUpdate(const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
571 const boost::urls::url_view_base& url)
572{
573 messages::actionParameterNotSupported(asyncResp->res, "ImageURI",
574 url.buffer());
575}
576
Ed Tanous6b0f66b2024-04-03 13:38:21 -0700577inline void doTftpUpdate(const crow::Request& req,
578 const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
Ed Tanous757178a2024-04-03 14:32:38 -0700579 const boost::urls::url_view_base& url)
Ed Tanous6b0f66b2024-04-03 13:38:21 -0700580{
Ed Tanousc72503f2024-05-06 14:57:13 -0700581 if (!BMCWEB_INSECURE_TFTP_UPDATE)
582 {
583 messages::actionParameterNotSupported(asyncResp->res, "ImageURI",
584 url.buffer());
585 return;
586 }
Ed Tanous757178a2024-04-03 14:32:38 -0700587
588 std::string path(url.encoded_path());
589 if (path.size() < 2)
590 {
591 messages::actionParameterNotSupported(asyncResp->res, "ImageURI",
592 url.buffer());
593 return;
594 }
595 // TFTP expects a path without a /
596 path.erase(0, 1);
597 std::string host(url.encoded_host_and_port());
598 BMCWEB_LOG_DEBUG("Server: {} File: {}", host, path);
Ed Tanous6b0f66b2024-04-03 13:38:21 -0700599
600 // Setup callback for when new software detected
601 // Give TFTP 10 minutes to complete
602 monitorForSoftwareAvailable(
603 asyncResp, req,
604 "/redfish/v1/UpdateService/Actions/UpdateService.SimpleUpdate", 600);
605
606 // TFTP can take up to 10 minutes depending on image size and
607 // connection speed. Return to caller as soon as the TFTP operation
608 // has been started. The callback above will ensure the activate
609 // is started once the download has completed
610 redfish::messages::success(asyncResp->res);
611
612 // Call TFTP service
613 crow::connections::systemBus->async_method_call(
614 [](const boost::system::error_code& ec) {
615 if (ec)
616 {
617 // messages::internalError(asyncResp->res);
618 cleanUp();
619 BMCWEB_LOG_DEBUG("error_code = {}", ec);
620 BMCWEB_LOG_DEBUG("error msg = {}", ec.message());
621 }
622 else
623 {
624 BMCWEB_LOG_DEBUG("Call to DownloaViaTFTP Success");
625 }
626 },
627 "xyz.openbmc_project.Software.Download",
628 "/xyz/openbmc_project/software", "xyz.openbmc_project.Common.TFTP",
Ed Tanous757178a2024-04-03 14:32:38 -0700629 "DownloadViaTFTP", path, host);
Ed Tanous6b0f66b2024-04-03 13:38:21 -0700630}
631
Ed Tanousf5139332024-04-03 13:25:04 -0700632inline void handleUpdateServiceSimpleUpdateAction(
633 crow::App& app, const crow::Request& req,
634 const std::shared_ptr<bmcweb::AsyncResp>& asyncResp)
Andrew Geissler0554c982019-04-23 14:40:12 -0500635{
Ed Tanousf5139332024-04-03 13:25:04 -0700636 if (!redfish::setUpRedfishRoute(app, req, asyncResp))
637 {
638 return;
639 }
640
641 std::optional<std::string> transferProtocol;
642 std::string imageURI;
643
644 BMCWEB_LOG_DEBUG("Enter UpdateService.SimpleUpdate doPost");
645
646 // User can pass in both TransferProtocol and ImageURI parameters or
647 // they can pass in just the ImageURI with the transfer protocol
648 // embedded within it.
649 // 1) TransferProtocol:TFTP ImageURI:1.1.1.1/myfile.bin
650 // 2) ImageURI:tftp://1.1.1.1/myfile.bin
651
652 if (!json_util::readJsonAction(req, asyncResp->res, "TransferProtocol",
653 transferProtocol, "ImageURI", imageURI))
654 {
655 BMCWEB_LOG_DEBUG("Missing TransferProtocol or ImageURI parameter");
656 return;
657 }
658
Ed Tanous757178a2024-04-03 14:32:38 -0700659 std::optional<boost::urls::url> url =
660 parseSimpleUpdateUrl(imageURI, transferProtocol, asyncResp->res);
661 if (!url)
Ed Tanousf5139332024-04-03 13:25:04 -0700662 {
663 return;
664 }
Ed Tanous757178a2024-04-03 14:32:38 -0700665 if (url->scheme() == "tftp")
666 {
667 doTftpUpdate(req, asyncResp, *url);
668 }
Ed Tanouse5cf7772024-04-03 13:45:31 -0700669 else if (url->scheme() == "https")
670 {
671 doHttpsUpdate(asyncResp, *url);
672 }
Ed Tanous757178a2024-04-03 14:32:38 -0700673 else
674 {
675 messages::actionParameterNotSupported(asyncResp->res, "ImageURI",
676 url->buffer());
677 return;
678 }
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700679
Ed Tanousf5139332024-04-03 13:25:04 -0700680 BMCWEB_LOG_DEBUG("Exit UpdateService.SimpleUpdate doPost");
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700681}
682
George Liu0ed80c82020-05-12 16:06:27 +0800683inline void uploadImageFile(crow::Response& res, std::string_view body)
684{
Ed Tanous2c6ffdb2023-06-28 11:28:38 -0700685 std::filesystem::path filepath("/tmp/images/" + bmcweb::getRandomUUID());
686
Ed Tanous62598e32023-07-17 17:06:25 -0700687 BMCWEB_LOG_DEBUG("Writing file to {}", filepath.string());
George Liu0ed80c82020-05-12 16:06:27 +0800688 std::ofstream out(filepath, std::ofstream::out | std::ofstream::binary |
689 std::ofstream::trunc);
690 // set the permission of the file to 640
Patrick Williams89492a12023-05-10 07:51:34 -0500691 std::filesystem::perms permission = std::filesystem::perms::owner_read |
692 std::filesystem::perms::group_read;
George Liu0ed80c82020-05-12 16:06:27 +0800693 std::filesystem::permissions(filepath, permission);
694 out << body;
695
696 if (out.bad())
697 {
698 messages::internalError(res);
699 cleanUp();
700 }
701}
702
Jagpal Singh Gillde0c9602024-04-29 17:30:21 -0700703// Convert the Request Apply Time to the D-Bus value
704inline bool convertApplyTime(crow::Response& res, const std::string& applyTime,
705 std::string& applyTimeNewVal)
706{
707 if (applyTime == "Immediate")
708 {
709 applyTimeNewVal =
Jagpal Singh Gill049079f2024-06-02 18:11:13 -0700710 "xyz.openbmc_project.Software.ApplyTime.RequestedApplyTimes.Immediate";
Jagpal Singh Gillde0c9602024-04-29 17:30:21 -0700711 }
712 else if (applyTime == "OnReset")
713 {
714 applyTimeNewVal =
Jagpal Singh Gill049079f2024-06-02 18:11:13 -0700715 "xyz.openbmc_project.Software.ApplyTime.RequestedApplyTimes.OnReset";
Jagpal Singh Gillde0c9602024-04-29 17:30:21 -0700716 }
717 else
718 {
719 BMCWEB_LOG_WARNING(
720 "ApplyTime value {} is not in the list of acceptable values",
721 applyTime);
722 messages::propertyValueNotInList(res, applyTime, "ApplyTime");
723 return false;
724 }
725 return true;
726}
727
George Liu0ed80c82020-05-12 16:06:27 +0800728inline void setApplyTime(const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
729 const std::string& applyTime)
730{
731 std::string applyTimeNewVal;
Jagpal Singh Gill049079f2024-06-02 18:11:13 -0700732 if (!convertApplyTime(asyncResp->res, applyTime, applyTimeNewVal))
George Liu0ed80c82020-05-12 16:06:27 +0800733 {
George Liu0ed80c82020-05-12 16:06:27 +0800734 return;
735 }
736
Ginu Georgee93abac2024-06-14 17:35:27 +0530737 setDbusProperty(asyncResp, "ApplyTime", "xyz.openbmc_project.Settings",
Ed Tanousd02aad32024-02-13 14:43:34 -0800738 sdbusplus::message::object_path(
739 "/xyz/openbmc_project/software/apply_time"),
740 "xyz.openbmc_project.Software.ApplyTime",
Ginu Georgee93abac2024-06-14 17:35:27 +0530741 "RequestedApplyTime", applyTimeNewVal);
George Liu0ed80c82020-05-12 16:06:27 +0800742}
743
Jagpal Singh Gillef93eab2024-04-17 16:06:14 -0700744struct MultiPartUpdateParameters
George Liu0ed80c82020-05-12 16:06:27 +0800745{
Jagpal Singh Gillef93eab2024-04-17 16:06:14 -0700746 std::optional<std::string> applyTime;
747 std::string uploadData;
Jagpal Singh Gillde0c9602024-04-29 17:30:21 -0700748 std::vector<std::string> targets;
Jagpal Singh Gillef93eab2024-04-17 16:06:14 -0700749};
750
Jagpal Singh Gillde0c9602024-04-29 17:30:21 -0700751inline std::optional<std::string>
752 processUrl(boost::system::result<boost::urls::url_view>& url)
753{
754 if (!url)
755 {
756 return std::nullopt;
757 }
758 if (crow::utility::readUrlSegments(*url, "redfish", "v1", "Managers",
759 BMCWEB_REDFISH_MANAGER_URI_NAME))
760 {
761 return std::make_optional(std::string(BMCWEB_REDFISH_MANAGER_URI_NAME));
762 }
763 if constexpr (!BMCWEB_REDFISH_UPDATESERVICE_USE_DBUS)
764 {
765 return std::nullopt;
766 }
767 std::string firmwareId;
768 if (!crow::utility::readUrlSegments(*url, "redfish", "v1", "UpdateService",
769 "FirmwareInventory",
770 std::ref(firmwareId)))
771 {
772 return std::nullopt;
773 }
774
775 return std::make_optional(firmwareId);
776}
777
Jagpal Singh Gillef93eab2024-04-17 16:06:14 -0700778inline std::optional<MultiPartUpdateParameters>
779 extractMultipartUpdateParameters(
780 const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
781 MultipartParser parser)
782{
783 MultiPartUpdateParameters multiRet;
784 for (FormPart& formpart : parser.mime_fields)
George Liu0ed80c82020-05-12 16:06:27 +0800785 {
786 boost::beast::http::fields::const_iterator it =
787 formpart.fields.find("Content-Disposition");
788 if (it == formpart.fields.end())
789 {
Ed Tanous62598e32023-07-17 17:06:25 -0700790 BMCWEB_LOG_ERROR("Couldn't find Content-Disposition");
Jagpal Singh Gillef93eab2024-04-17 16:06:14 -0700791 return std::nullopt;
George Liu0ed80c82020-05-12 16:06:27 +0800792 }
Ed Tanous62598e32023-07-17 17:06:25 -0700793 BMCWEB_LOG_INFO("Parsing value {}", it->value());
George Liu0ed80c82020-05-12 16:06:27 +0800794
795 // The construction parameters of param_list must start with `;`
796 size_t index = it->value().find(';');
797 if (index == std::string::npos)
798 {
799 continue;
800 }
801
Patrick Williams89492a12023-05-10 07:51:34 -0500802 for (const auto& param :
George Liu0ed80c82020-05-12 16:06:27 +0800803 boost::beast::http::param_list{it->value().substr(index)})
804 {
805 if (param.first != "name" || param.second.empty())
806 {
807 continue;
808 }
809
810 if (param.second == "UpdateParameters")
811 {
Jagpal Singh Gillef93eab2024-04-17 16:06:14 -0700812 std::vector<std::string> tempTargets;
Ed Tanousac1e1242024-07-10 22:10:14 -0700813 nlohmann::json content = nlohmann::json::parse(formpart.content,
814 nullptr, false);
815 if (content.is_discarded())
816 {
817 return std::nullopt;
818 }
Ed Tanous7cb59f62022-05-05 11:48:31 -0700819 nlohmann::json::object_t* obj =
820 content.get_ptr<nlohmann::json::object_t*>();
821 if (obj == nullptr)
822 {
Jagpal Singh Gillef93eab2024-04-17 16:06:14 -0700823 messages::propertyValueTypeError(
824 asyncResp->res, formpart.content, "UpdateParameters");
825 return std::nullopt;
Ed Tanous7cb59f62022-05-05 11:48:31 -0700826 }
827
828 if (!json_util::readJsonObject(
Jagpal Singh Gillef93eab2024-04-17 16:06:14 -0700829 *obj, asyncResp->res, "Targets", tempTargets,
830 "@Redfish.OperationApplyTime", multiRet.applyTime))
George Liu0ed80c82020-05-12 16:06:27 +0800831 {
Jagpal Singh Gillef93eab2024-04-17 16:06:14 -0700832 return std::nullopt;
George Liu0ed80c82020-05-12 16:06:27 +0800833 }
Jagpal Singh Gillef93eab2024-04-17 16:06:14 -0700834
835 for (size_t urlIndex = 0; urlIndex < tempTargets.size();
836 urlIndex++)
George Liu0ed80c82020-05-12 16:06:27 +0800837 {
Jagpal Singh Gillef93eab2024-04-17 16:06:14 -0700838 const std::string& target = tempTargets[urlIndex];
839 boost::system::result<boost::urls::url_view> url =
840 boost::urls::parse_origin_form(target);
Jagpal Singh Gillde0c9602024-04-29 17:30:21 -0700841 auto res = processUrl(url);
842 if (!res.has_value())
Jagpal Singh Gillef93eab2024-04-17 16:06:14 -0700843 {
844 messages::propertyValueFormatError(
845 asyncResp->res, target,
846 std::format("Targets/{}", urlIndex));
847 return std::nullopt;
848 }
Jagpal Singh Gillde0c9602024-04-29 17:30:21 -0700849 multiRet.targets.emplace_back(res.value());
George Liu0ed80c82020-05-12 16:06:27 +0800850 }
Jagpal Singh Gillef93eab2024-04-17 16:06:14 -0700851 if (multiRet.targets.size() != 1)
George Liu0ed80c82020-05-12 16:06:27 +0800852 {
Jagpal Singh Gillef93eab2024-04-17 16:06:14 -0700853 messages::propertyValueFormatError(
854 asyncResp->res, multiRet.targets, "Targets");
855 return std::nullopt;
George Liu0ed80c82020-05-12 16:06:27 +0800856 }
George Liu0ed80c82020-05-12 16:06:27 +0800857 }
858 else if (param.second == "UpdateFile")
859 {
Jagpal Singh Gillef93eab2024-04-17 16:06:14 -0700860 multiRet.uploadData = std::move(formpart.content);
George Liu0ed80c82020-05-12 16:06:27 +0800861 }
862 }
863 }
864
Jagpal Singh Gillef93eab2024-04-17 16:06:14 -0700865 if (multiRet.uploadData.empty())
George Liu0ed80c82020-05-12 16:06:27 +0800866 {
Ed Tanous62598e32023-07-17 17:06:25 -0700867 BMCWEB_LOG_ERROR("Upload data is NULL");
George Liu0ed80c82020-05-12 16:06:27 +0800868 messages::propertyMissing(asyncResp->res, "UpdateFile");
Jagpal Singh Gillef93eab2024-04-17 16:06:14 -0700869 return std::nullopt;
870 }
871 if (multiRet.targets.empty())
872 {
873 messages::propertyMissing(asyncResp->res, "Targets");
874 return std::nullopt;
875 }
876 return multiRet;
877}
878
879inline void
Jagpal Singh Gillde0c9602024-04-29 17:30:21 -0700880 handleStartUpdate(const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
881 task::Payload payload, const std::string& objectPath,
882 const boost::system::error_code& ec,
883 const sdbusplus::message::object_path& retPath)
884{
885 if (ec)
886 {
887 BMCWEB_LOG_ERROR("error_code = {}", ec);
888 BMCWEB_LOG_ERROR("error msg = {}", ec.message());
889 messages::internalError(asyncResp->res);
890 return;
891 }
892
893 BMCWEB_LOG_INFO("Call to StartUpdate Success, retPath = {}", retPath.str);
894 createTask(asyncResp, std::move(payload), objectPath);
895}
896
897inline void startUpdate(const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
898 task::Payload payload,
899 const MemoryFileDescriptor& memfd,
900 const std::string& applyTime,
901 const std::string& objectPath,
902 const std::string& serviceName)
903{
904 crow::connections::systemBus->async_method_call(
905 [asyncResp, payload = std::move(payload),
906 objectPath](const boost::system::error_code& ec1,
907 const sdbusplus::message::object_path& retPath) mutable {
908 handleStartUpdate(asyncResp, std::move(payload), objectPath, ec1,
909 retPath);
910 },
911 serviceName, objectPath, "xyz.openbmc_project.Software.Update",
912 "StartUpdate", sdbusplus::message::unix_fd(memfd.fd), applyTime);
913}
914
Jagpal Singh Gill08f61d52024-07-17 15:17:22 -0700915inline void getSwInfo(const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
916 task::Payload payload, const MemoryFileDescriptor& memfd,
917 const std::string& applyTime, const std::string& target,
918 const boost::system::error_code& ec,
919 const dbus::utility::MapperGetSubTreeResponse& subtree)
Jagpal Singh Gillde0c9602024-04-29 17:30:21 -0700920{
Jagpal Singh Gill08f61d52024-07-17 15:17:22 -0700921 using SwInfoMap = std::unordered_map<
922 std::string, std::pair<sdbusplus::message::object_path, std::string>>;
Jagpal Singh Gillde0c9602024-04-29 17:30:21 -0700923 SwInfoMap swInfoMap;
924
925 if (ec)
926 {
927 BMCWEB_LOG_ERROR("error_code = {}", ec);
928 BMCWEB_LOG_ERROR("error msg = {}", ec.message());
929 messages::internalError(asyncResp->res);
930 return;
931 }
932 BMCWEB_LOG_DEBUG("Found {} software version paths", subtree.size());
933
Jagpal Singh Gill08f61d52024-07-17 15:17:22 -0700934 for (const auto& entry : subtree)
Jagpal Singh Gillde0c9602024-04-29 17:30:21 -0700935 {
Jagpal Singh Gill08f61d52024-07-17 15:17:22 -0700936 sdbusplus::message::object_path path(entry.first);
Jagpal Singh Gillde0c9602024-04-29 17:30:21 -0700937 std::string swId = path.filename();
Jagpal Singh Gill08f61d52024-07-17 15:17:22 -0700938 swInfoMap.emplace(swId, make_pair(path, entry.second[0].first));
Jagpal Singh Gillde0c9602024-04-29 17:30:21 -0700939 }
940
941 auto swEntry = swInfoMap.find(target);
942 if (swEntry == swInfoMap.end())
943 {
944 BMCWEB_LOG_WARNING("No valid DBus path for Target URI {}", target);
945 messages::propertyValueFormatError(asyncResp->res, target, "Targets");
946 return;
947 }
948
Jagpal Singh Gill08f61d52024-07-17 15:17:22 -0700949 BMCWEB_LOG_DEBUG("Found software version path {} serviceName {}",
950 swEntry->second.first.str, swEntry->second.second);
Jagpal Singh Gillde0c9602024-04-29 17:30:21 -0700951
Jagpal Singh Gill08f61d52024-07-17 15:17:22 -0700952 startUpdate(asyncResp, std::move(payload), memfd, applyTime,
953 swEntry->second.first.str, swEntry->second.second);
954}
955
956inline void
957 handleBMCUpdate(const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
958 task::Payload payload, const MemoryFileDescriptor& memfd,
959 const std::string& applyTime,
960 const boost::system::error_code& ec,
961 const dbus::utility::MapperEndPoints& functionalSoftware)
962{
963 if (ec)
964 {
965 BMCWEB_LOG_ERROR("error_code = {}", ec);
966 BMCWEB_LOG_ERROR("error msg = {}", ec.message());
967 messages::internalError(asyncResp->res);
968 return;
969 }
970 if (functionalSoftware.size() != 1)
971 {
972 BMCWEB_LOG_ERROR("Found {} functional software endpoints",
973 functionalSoftware.size());
974 messages::internalError(asyncResp->res);
975 return;
976 }
977
978 startUpdate(asyncResp, std::move(payload), memfd, applyTime,
979 functionalSoftware[0], "xyz.openbmc_project.Software.Manager");
Jagpal Singh Gillde0c9602024-04-29 17:30:21 -0700980}
981
982inline void
983 processUpdateRequest(const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
Jagpal Singh Gill9dae4de2024-06-02 23:43:56 -0700984 task::Payload&& payload, std::string_view body,
Jagpal Singh Gillde0c9602024-04-29 17:30:21 -0700985 const std::string& applyTime,
986 std::vector<std::string>& targets)
987{
Jagpal Singh Gillde0c9602024-04-29 17:30:21 -0700988 MemoryFileDescriptor memfd("update-image");
989 if (memfd.fd == -1)
990 {
991 BMCWEB_LOG_ERROR("Failed to create image memfd");
992 messages::internalError(asyncResp->res);
993 return;
994 }
995 if (write(memfd.fd, body.data(), body.length()) !=
996 static_cast<ssize_t>(body.length()))
997 {
998 BMCWEB_LOG_ERROR("Failed to write to image memfd");
999 messages::internalError(asyncResp->res);
1000 return;
1001 }
1002 if (!memfd.rewind())
1003 {
1004 messages::internalError(asyncResp->res);
1005 return;
1006 }
1007
Jagpal Singh Gillde0c9602024-04-29 17:30:21 -07001008 if (!targets.empty() && targets[0] == BMCWEB_REDFISH_MANAGER_URI_NAME)
1009 {
Jagpal Singh Gill08f61d52024-07-17 15:17:22 -07001010 dbus::utility::getAssociationEndPoints(
1011 "/xyz/openbmc_project/software/bmc/functional",
1012 [asyncResp, payload = std::move(payload), memfd = std::move(memfd),
1013 applyTime](
1014 const boost::system::error_code& ec,
1015 const dbus::utility::MapperEndPoints& objectPaths) mutable {
1016 handleBMCUpdate(asyncResp, std::move(payload), memfd, applyTime, ec,
1017 objectPaths);
1018 });
Jagpal Singh Gillde0c9602024-04-29 17:30:21 -07001019 }
1020 else
1021 {
1022 constexpr std::array<std::string_view, 1> interfaces = {
1023 "xyz.openbmc_project.Software.Version"};
Jagpal Singh Gill08f61d52024-07-17 15:17:22 -07001024 dbus::utility::getSubTree(
Jagpal Singh Gillde0c9602024-04-29 17:30:21 -07001025 "/xyz/openbmc_project/software", 1, interfaces,
1026 [asyncResp, payload = std::move(payload), memfd = std::move(memfd),
Jagpal Singh Gill08f61d52024-07-17 15:17:22 -07001027 applyTime, targets](const boost::system::error_code& ec,
1028 const dbus::utility::MapperGetSubTreeResponse&
1029 subtree) mutable {
1030 getSwInfo(asyncResp, std::move(payload), memfd, applyTime,
1031 targets[0], ec, subtree);
Jagpal Singh Gillde0c9602024-04-29 17:30:21 -07001032 });
1033 }
1034}
1035
1036inline void
Jagpal Singh Gillef93eab2024-04-17 16:06:14 -07001037 updateMultipartContext(const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
1038 const crow::Request& req, MultipartParser&& parser)
1039{
1040 std::optional<MultiPartUpdateParameters> multipart =
1041 extractMultipartUpdateParameters(asyncResp, std::move(parser));
1042 if (!multipart)
1043 {
George Liu0ed80c82020-05-12 16:06:27 +08001044 return;
1045 }
Jagpal Singh Gillef93eab2024-04-17 16:06:14 -07001046 if (!multipart->applyTime)
George Liu0ed80c82020-05-12 16:06:27 +08001047 {
Jagpal Singh Gillef93eab2024-04-17 16:06:14 -07001048 multipart->applyTime = "OnReset";
George Liu0ed80c82020-05-12 16:06:27 +08001049 }
1050
Jagpal Singh Gillde0c9602024-04-29 17:30:21 -07001051 if constexpr (BMCWEB_REDFISH_UPDATESERVICE_USE_DBUS)
1052 {
Jagpal Singh Gill9dae4de2024-06-02 23:43:56 -07001053 std::string applyTimeNewVal;
1054 if (!convertApplyTime(asyncResp->res, *multipart->applyTime,
1055 applyTimeNewVal))
1056 {
1057 return;
1058 }
1059 task::Payload payload(req);
1060
1061 processUpdateRequest(asyncResp, std::move(payload),
1062 multipart->uploadData, applyTimeNewVal,
1063 multipart->targets);
Jagpal Singh Gillde0c9602024-04-29 17:30:21 -07001064 }
1065 else
1066 {
1067 setApplyTime(asyncResp, *multipart->applyTime);
George Liu0ed80c82020-05-12 16:06:27 +08001068
Jagpal Singh Gillde0c9602024-04-29 17:30:21 -07001069 // Setup callback for when new software detected
1070 monitorForSoftwareAvailable(asyncResp, req,
1071 "/redfish/v1/UpdateService");
Ed Tanous6b54e4e2024-04-10 08:58:48 -07001072
Jagpal Singh Gillde0c9602024-04-29 17:30:21 -07001073 uploadImageFile(asyncResp->res, multipart->uploadData);
1074 }
George Liu0ed80c82020-05-12 16:06:27 +08001075}
1076
Jagpal Singh Gill9dae4de2024-06-02 23:43:56 -07001077inline void doHTTPUpdate(const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
1078 const crow::Request& req)
1079{
1080 if constexpr (BMCWEB_REDFISH_UPDATESERVICE_USE_DBUS)
1081 {
1082 task::Payload payload(req);
1083 // HTTP push only supports BMC updates (with ApplyTime as immediate) for
1084 // backwards compatibility. Specific component updates will be handled
1085 // through Multipart form HTTP push.
1086 std::vector<std::string> targets;
1087 targets.emplace_back(BMCWEB_REDFISH_MANAGER_URI_NAME);
1088
1089 processUpdateRequest(
1090 asyncResp, std::move(payload), req.body(),
1091 "xyz.openbmc_project.Software.ApplyTime.RequestedApplyTimes.Immediate",
1092 targets);
1093 }
1094 else
1095 {
1096 // Setup callback for when new software detected
1097 monitorForSoftwareAvailable(asyncResp, req,
1098 "/redfish/v1/UpdateService");
1099
1100 uploadImageFile(asyncResp->res, req.body());
1101 }
1102}
1103
Ed Tanousc2051d12022-05-11 12:21:55 -07001104inline void
1105 handleUpdateServicePost(App& app, const crow::Request& req,
1106 const std::shared_ptr<bmcweb::AsyncResp>& asyncResp)
1107{
Carson Labrado3ba00072022-06-06 19:40:56 +00001108 if (!redfish::setUpRedfishRoute(app, req, asyncResp))
Ed Tanousc2051d12022-05-11 12:21:55 -07001109 {
1110 return;
1111 }
Ninad Palsuleb33a4322023-06-09 09:19:18 -05001112 std::string_view contentType = req.getHeaderValue("Content-Type");
Ed Tanousc2051d12022-05-11 12:21:55 -07001113
Ed Tanous62598e32023-07-17 17:06:25 -07001114 BMCWEB_LOG_DEBUG("doPost: contentType={}", contentType);
Ed Tanousc2051d12022-05-11 12:21:55 -07001115
Ninad Palsuleb33a4322023-06-09 09:19:18 -05001116 // Make sure that content type is application/octet-stream or
1117 // multipart/form-data
Ed Tanous18f8f602023-07-18 10:07:23 -07001118 if (bmcweb::asciiIEquals(contentType, "application/octet-stream"))
George Liu0ed80c82020-05-12 16:06:27 +08001119 {
Jagpal Singh Gill9dae4de2024-06-02 23:43:56 -07001120 doHTTPUpdate(asyncResp, req);
George Liu0ed80c82020-05-12 16:06:27 +08001121 }
Ninad Palsuleb33a4322023-06-09 09:19:18 -05001122 else if (contentType.starts_with("multipart/form-data"))
George Liu0ed80c82020-05-12 16:06:27 +08001123 {
Ninad Palsuleb33a4322023-06-09 09:19:18 -05001124 MultipartParser parser;
1125
Ninad Palsuleb33a4322023-06-09 09:19:18 -05001126 ParserError ec = parser.parse(req);
1127 if (ec != ParserError::PARSER_SUCCESS)
1128 {
1129 // handle error
Ed Tanous62598e32023-07-17 17:06:25 -07001130 BMCWEB_LOG_ERROR("MIME parse failed, ec : {}",
1131 static_cast<int>(ec));
Ninad Palsuleb33a4322023-06-09 09:19:18 -05001132 messages::internalError(asyncResp->res);
1133 return;
1134 }
Ed Tanous6b54e4e2024-04-10 08:58:48 -07001135
Jagpal Singh Gillef93eab2024-04-17 16:06:14 -07001136 updateMultipartContext(asyncResp, req, std::move(parser));
George Liu0ed80c82020-05-12 16:06:27 +08001137 }
Ninad Palsuleb33a4322023-06-09 09:19:18 -05001138 else
1139 {
Ed Tanous62598e32023-07-17 17:06:25 -07001140 BMCWEB_LOG_DEBUG("Bad content type specified:{}", contentType);
Ninad Palsuleb33a4322023-06-09 09:19:18 -05001141 asyncResp->res.result(boost::beast::http::status::bad_request);
1142 }
Ed Tanousc2051d12022-05-11 12:21:55 -07001143}
1144
Ed Tanousf5139332024-04-03 13:25:04 -07001145inline void
1146 handleUpdateServiceGet(App& app, const crow::Request& req,
1147 const std::shared_ptr<bmcweb::AsyncResp>& asyncResp)
John Edward Broadbent7e860f12021-04-08 15:57:16 -07001148{
Ed Tanousf5139332024-04-03 13:25:04 -07001149 if (!redfish::setUpRedfishRoute(app, req, asyncResp))
1150 {
1151 return;
1152 }
1153 asyncResp->res.jsonValue["@odata.type"] =
1154 "#UpdateService.v1_11_1.UpdateService";
1155 asyncResp->res.jsonValue["@odata.id"] = "/redfish/v1/UpdateService";
1156 asyncResp->res.jsonValue["Id"] = "UpdateService";
1157 asyncResp->res.jsonValue["Description"] = "Service for Software Update";
1158 asyncResp->res.jsonValue["Name"] = "Update Service";
Ed Tanous4dc23f32022-05-11 11:32:19 -07001159
Ed Tanousf5139332024-04-03 13:25:04 -07001160 asyncResp->res.jsonValue["HttpPushUri"] =
1161 "/redfish/v1/UpdateService/update";
1162 asyncResp->res.jsonValue["MultipartHttpPushUri"] =
1163 "/redfish/v1/UpdateService/update";
Ed Tanous4dc23f32022-05-11 11:32:19 -07001164
Ed Tanousf5139332024-04-03 13:25:04 -07001165 // UpdateService cannot be disabled
1166 asyncResp->res.jsonValue["ServiceEnabled"] = true;
1167 asyncResp->res.jsonValue["FirmwareInventory"]["@odata.id"] =
1168 "/redfish/v1/UpdateService/FirmwareInventory";
1169 // Get the MaxImageSizeBytes
Ed Tanous25b54db2024-04-17 15:40:31 -07001170 asyncResp->res.jsonValue["MaxImageSizeBytes"] = BMCWEB_HTTP_BODY_LIMIT *
Ed Tanousf5139332024-04-03 13:25:04 -07001171 1024 * 1024;
Tejas Patild61e5192021-06-04 15:49:35 +05301172
Ed Tanousf5139332024-04-03 13:25:04 -07001173 // Update Actions object.
1174 nlohmann::json& updateSvcSimpleUpdate =
1175 asyncResp->res.jsonValue["Actions"]["#UpdateService.SimpleUpdate"];
1176 updateSvcSimpleUpdate["target"] =
1177 "/redfish/v1/UpdateService/Actions/UpdateService.SimpleUpdate";
Ed Tanous757178a2024-04-03 14:32:38 -07001178
1179 nlohmann::json::array_t allowed;
Ed Tanouse5cf7772024-04-03 13:45:31 -07001180 allowed.emplace_back(update_service::TransferProtocolType::HTTPS);
Ed Tanous757178a2024-04-03 14:32:38 -07001181
Ed Tanous25b54db2024-04-17 15:40:31 -07001182 if constexpr (BMCWEB_INSECURE_PUSH_STYLE_NOTIFICATION)
1183 {
1184 allowed.emplace_back(update_service::TransferProtocolType::TFTP);
1185 }
Ed Tanous757178a2024-04-03 14:32:38 -07001186
1187 updateSvcSimpleUpdate["TransferProtocol@Redfish.AllowableValues"] =
1188 std::move(allowed);
1189
Ed Tanous539d8c62024-06-19 14:38:27 -07001190 asyncResp->res
1191 .jsonValue["HttpPushUriOptions"]["HttpPushUriApplyTime"]["ApplyTime"] =
1192 update_service::ApplyTime::Immediate;
John Edward Broadbent7e860f12021-04-08 15:57:16 -07001193}
Ed Tanousf5139332024-04-03 13:25:04 -07001194
1195inline void handleUpdateServiceFirmwareInventoryCollectionGet(
1196 App& app, const crow::Request& req,
1197 const std::shared_ptr<bmcweb::AsyncResp>& asyncResp)
1198{
1199 if (!redfish::setUpRedfishRoute(app, req, asyncResp))
1200 {
1201 return;
1202 }
1203 asyncResp->res.jsonValue["@odata.type"] =
1204 "#SoftwareInventoryCollection.SoftwareInventoryCollection";
1205 asyncResp->res.jsonValue["@odata.id"] =
1206 "/redfish/v1/UpdateService/FirmwareInventory";
1207 asyncResp->res.jsonValue["Name"] = "Software Inventory Collection";
1208 const std::array<const std::string_view, 1> iface = {
1209 "xyz.openbmc_project.Software.Version"};
1210
1211 redfish::collection_util::getCollectionMembers(
1212 asyncResp,
1213 boost::urls::url("/redfish/v1/UpdateService/FirmwareInventory"), iface,
1214 "/xyz/openbmc_project/software");
1215}
1216
John Edward Broadbent7e860f12021-04-08 15:57:16 -07001217/* Fill related item links (i.e. bmc, bios) in for inventory */
Ed Tanousf5139332024-04-03 13:25:04 -07001218inline void getRelatedItems(const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
1219 const std::string& purpose)
John Edward Broadbent7e860f12021-04-08 15:57:16 -07001220{
Willy Tueee00132022-06-14 14:53:17 -07001221 if (purpose == sw_util::bmcPurpose)
John Edward Broadbent7e860f12021-04-08 15:57:16 -07001222 {
Ed Tanousac106bf2023-06-07 09:24:59 -07001223 nlohmann::json& relatedItem = asyncResp->res.jsonValue["RelatedItem"];
Ed Tanous14766872022-03-15 10:44:42 -07001224 nlohmann::json::object_t item;
Ed Tanous253f11b2024-05-16 09:38:31 -07001225 item["@odata.id"] = boost::urls::format(
1226 "/redfish/v1/Managers/{}", BMCWEB_REDFISH_MANAGER_URI_NAME);
Patrick Williamsb2ba3072023-05-12 10:27:39 -05001227 relatedItem.emplace_back(std::move(item));
Ed Tanousac106bf2023-06-07 09:24:59 -07001228 asyncResp->res.jsonValue["RelatedItem@odata.count"] =
1229 relatedItem.size();
John Edward Broadbent7e860f12021-04-08 15:57:16 -07001230 }
Willy Tueee00132022-06-14 14:53:17 -07001231 else if (purpose == sw_util::biosPurpose)
John Edward Broadbent7e860f12021-04-08 15:57:16 -07001232 {
Ed Tanousac106bf2023-06-07 09:24:59 -07001233 nlohmann::json& relatedItem = asyncResp->res.jsonValue["RelatedItem"];
Ed Tanous14766872022-03-15 10:44:42 -07001234 nlohmann::json::object_t item;
Ed Tanous253f11b2024-05-16 09:38:31 -07001235 item["@odata.id"] = std::format("/redfish/v1/Systems/{}/Bios",
1236 BMCWEB_REDFISH_SYSTEM_URI_NAME);
Patrick Williamsb2ba3072023-05-12 10:27:39 -05001237 relatedItem.emplace_back(std::move(item));
Ed Tanousac106bf2023-06-07 09:24:59 -07001238 asyncResp->res.jsonValue["RelatedItem@odata.count"] =
1239 relatedItem.size();
John Edward Broadbent7e860f12021-04-08 15:57:16 -07001240 }
1241 else
1242 {
Carson Labradobf2dded2023-08-10 00:37:06 +00001243 BMCWEB_LOG_DEBUG("Unknown software purpose {}", purpose);
John Edward Broadbent7e860f12021-04-08 15:57:16 -07001244 }
1245}
1246
Willy Tuaf246602022-06-14 15:51:53 -07001247inline void
1248 getSoftwareVersion(const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
1249 const std::string& service, const std::string& path,
1250 const std::string& swId)
1251{
Krzysztof Grobelnyd1bde9e2022-09-07 10:40:51 +02001252 sdbusplus::asio::getAllProperties(
1253 *crow::connections::systemBus, service, path,
1254 "xyz.openbmc_project.Software.Version",
Willy Tuaf246602022-06-14 15:51:53 -07001255 [asyncResp,
Ed Tanous8b242752023-06-27 17:17:13 -07001256 swId](const boost::system::error_code& ec,
Willy Tuaf246602022-06-14 15:51:53 -07001257 const dbus::utility::DBusPropertiesMap& propertiesList) {
Ed Tanous8b242752023-06-27 17:17:13 -07001258 if (ec)
Willy Tuaf246602022-06-14 15:51:53 -07001259 {
1260 messages::internalError(asyncResp->res);
1261 return;
1262 }
Krzysztof Grobelnyd1bde9e2022-09-07 10:40:51 +02001263
Willy Tuaf246602022-06-14 15:51:53 -07001264 const std::string* swInvPurpose = nullptr;
1265 const std::string* version = nullptr;
Krzysztof Grobelnyd1bde9e2022-09-07 10:40:51 +02001266
1267 const bool success = sdbusplus::unpackPropertiesNoThrow(
1268 dbus_utils::UnpackErrorPrinter(), propertiesList, "Purpose",
1269 swInvPurpose, "Version", version);
1270
1271 if (!success)
Willy Tuaf246602022-06-14 15:51:53 -07001272 {
Krzysztof Grobelnyd1bde9e2022-09-07 10:40:51 +02001273 messages::internalError(asyncResp->res);
1274 return;
Willy Tuaf246602022-06-14 15:51:53 -07001275 }
1276
1277 if (swInvPurpose == nullptr)
1278 {
Ed Tanous62598e32023-07-17 17:06:25 -07001279 BMCWEB_LOG_DEBUG("Can't find property \"Purpose\"!");
Willy Tuaf246602022-06-14 15:51:53 -07001280 messages::internalError(asyncResp->res);
1281 return;
1282 }
1283
Ed Tanous62598e32023-07-17 17:06:25 -07001284 BMCWEB_LOG_DEBUG("swInvPurpose = {}", *swInvPurpose);
Willy Tuaf246602022-06-14 15:51:53 -07001285
1286 if (version == nullptr)
1287 {
Ed Tanous62598e32023-07-17 17:06:25 -07001288 BMCWEB_LOG_DEBUG("Can't find property \"Version\"!");
Willy Tuaf246602022-06-14 15:51:53 -07001289
1290 messages::internalError(asyncResp->res);
1291
1292 return;
1293 }
1294 asyncResp->res.jsonValue["Version"] = *version;
1295 asyncResp->res.jsonValue["Id"] = swId;
1296
1297 // swInvPurpose is of format:
1298 // xyz.openbmc_project.Software.Version.VersionPurpose.ABC
1299 // Translate this to "ABC image"
1300 size_t endDesc = swInvPurpose->rfind('.');
1301 if (endDesc == std::string::npos)
1302 {
1303 messages::internalError(asyncResp->res);
1304 return;
1305 }
1306 endDesc++;
1307 if (endDesc >= swInvPurpose->size())
1308 {
1309 messages::internalError(asyncResp->res);
1310 return;
1311 }
1312
1313 std::string formatDesc = swInvPurpose->substr(endDesc);
1314 asyncResp->res.jsonValue["Description"] = formatDesc + " image";
1315 getRelatedItems(asyncResp, *swInvPurpose);
Patrick Williams5a39f772023-10-20 11:20:21 -05001316 });
Willy Tuaf246602022-06-14 15:51:53 -07001317}
1318
Ed Tanousf5139332024-04-03 13:25:04 -07001319inline void handleUpdateServiceFirmwareInventoryGet(
1320 App& app, const crow::Request& req,
1321 const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
1322 const std::string& param)
John Edward Broadbent7e860f12021-04-08 15:57:16 -07001323{
Ed Tanousf5139332024-04-03 13:25:04 -07001324 if (!redfish::setUpRedfishRoute(app, req, asyncResp))
1325 {
1326 return;
1327 }
1328 std::shared_ptr<std::string> swId = std::make_shared<std::string>(param);
1329
1330 asyncResp->res.jsonValue["@odata.id"] = boost::urls::format(
1331 "/redfish/v1/UpdateService/FirmwareInventory/{}", *swId);
1332
1333 constexpr std::array<std::string_view, 1> interfaces = {
1334 "xyz.openbmc_project.Software.Version"};
1335 dbus::utility::getSubTree(
1336 "/", 0, interfaces,
1337 [asyncResp,
1338 swId](const boost::system::error_code& ec,
1339 const dbus::utility::MapperGetSubTreeResponse& subtree) {
1340 BMCWEB_LOG_DEBUG("doGet callback...");
1341 if (ec)
Ed Tanous002d39b2022-05-31 08:59:27 -07001342 {
Ed Tanousf5139332024-04-03 13:25:04 -07001343 messages::internalError(asyncResp->res);
Ed Tanous002d39b2022-05-31 08:59:27 -07001344 return;
1345 }
Ed Tanous002d39b2022-05-31 08:59:27 -07001346
Ed Tanousf5139332024-04-03 13:25:04 -07001347 // Ensure we find our input swId, otherwise return an error
1348 bool found = false;
1349 for (const std::pair<
1350 std::string,
1351 std::vector<std::pair<std::string, std::vector<std::string>>>>&
1352 obj : subtree)
1353 {
1354 if (!obj.first.ends_with(*swId))
Ed Tanous45ca1b82022-03-25 13:07:27 -07001355 {
Ed Tanousf5139332024-04-03 13:25:04 -07001356 continue;
Ed Tanous45ca1b82022-03-25 13:07:27 -07001357 }
John Edward Broadbent7e860f12021-04-08 15:57:16 -07001358
Ed Tanousf5139332024-04-03 13:25:04 -07001359 if (obj.second.empty())
Ed Tanous002d39b2022-05-31 08:59:27 -07001360 {
Ed Tanousf5139332024-04-03 13:25:04 -07001361 continue;
Ed Tanous002d39b2022-05-31 08:59:27 -07001362 }
Ed Tanous1abe55e2018-09-05 08:30:59 -07001363
Ed Tanousf5139332024-04-03 13:25:04 -07001364 found = true;
1365 sw_util::getSwStatus(asyncResp, swId, obj.second[0].first);
1366 getSoftwareVersion(asyncResp, obj.second[0].first, obj.first,
1367 *swId);
1368 }
1369 if (!found)
1370 {
1371 BMCWEB_LOG_WARNING("Input swID {} not found!", *swId);
1372 messages::resourceMissingAtURI(
1373 asyncResp->res,
1374 boost::urls::format(
1375 "/redfish/v1/UpdateService/FirmwareInventory/{}", *swId));
1376 return;
1377 }
1378 asyncResp->res.jsonValue["@odata.type"] =
1379 "#SoftwareInventory.v1_1_0.SoftwareInventory";
1380 asyncResp->res.jsonValue["Name"] = "Software Inventory";
Ed Tanous539d8c62024-06-19 14:38:27 -07001381 asyncResp->res.jsonValue["Status"]["HealthRollup"] =
1382 resource::Health::OK;
Ed Tanousf5139332024-04-03 13:25:04 -07001383
1384 asyncResp->res.jsonValue["Updateable"] = false;
1385 sw_util::getSwUpdatableStatus(asyncResp, swId);
Patrick Williams5a39f772023-10-20 11:20:21 -05001386 });
John Edward Broadbent7e860f12021-04-08 15:57:16 -07001387}
Ed Tanous1abe55e2018-09-05 08:30:59 -07001388
Ed Tanousf5139332024-04-03 13:25:04 -07001389inline void requestRoutesUpdateService(App& app)
1390{
1391 BMCWEB_ROUTE(
1392 app, "/redfish/v1/UpdateService/Actions/UpdateService.SimpleUpdate/")
1393 .privileges(redfish::privileges::postUpdateService)
1394 .methods(boost::beast::http::verb::post)(std::bind_front(
1395 handleUpdateServiceSimpleUpdateAction, std::ref(app)));
1396
1397 BMCWEB_ROUTE(app, "/redfish/v1/UpdateService/FirmwareInventory/<str>/")
1398 .privileges(redfish::privileges::getSoftwareInventory)
1399 .methods(boost::beast::http::verb::get)(std::bind_front(
1400 handleUpdateServiceFirmwareInventoryGet, std::ref(app)));
1401
1402 BMCWEB_ROUTE(app, "/redfish/v1/UpdateService/")
1403 .privileges(redfish::privileges::getUpdateService)
1404 .methods(boost::beast::http::verb::get)(
1405 std::bind_front(handleUpdateServiceGet, std::ref(app)));
1406
Ed Tanousf5139332024-04-03 13:25:04 -07001407 BMCWEB_ROUTE(app, "/redfish/v1/UpdateService/update/")
1408 .privileges(redfish::privileges::postUpdateService)
1409 .methods(boost::beast::http::verb::post)(
1410 std::bind_front(handleUpdateServicePost, std::ref(app)));
1411
1412 BMCWEB_ROUTE(app, "/redfish/v1/UpdateService/FirmwareInventory/")
1413 .privileges(redfish::privileges::getSoftwareInventoryCollection)
1414 .methods(boost::beast::http::verb::get)(std::bind_front(
1415 handleUpdateServiceFirmwareInventoryCollectionGet, std::ref(app)));
1416}
1417
Ed Tanous1abe55e2018-09-05 08:30:59 -07001418} // namespace redfish