blob: f820e61e7636bebe1bb0d9541dd26a0d136723af [file] [log] [blame]
Jennifer Lee729dae72018-04-24 15:59:34 -07001/*
2// Copyright (c) 2018 Intel Corporation
3//
4// Licensed under the Apache License, Version 2.0 (the "License");
5// you may not use this file except in compliance with the License.
6// You may obtain a copy of the License at
7//
8// http://www.apache.org/licenses/LICENSE-2.0
9//
10// Unless required by applicable law or agreed to in writing, software
11// distributed under the License is distributed on an "AS IS" BASIS,
12// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13// See the License for the specific language governing permissions and
14// limitations under the License.
15*/
16#pragma once
17
Tejas Patild61e5192021-06-04 15:49:35 +053018#include "bmcweb_config.h"
19
John Edward Broadbent7e860f12021-04-08 15:57:16 -070020#include <app.hpp>
Jennifer Lee729dae72018-04-24 15:59:34 -070021#include <boost/container/flat_map.hpp>
Ed Tanous168e20c2021-12-13 14:39:53 -080022#include <dbus_utility.hpp>
Ed Tanoused398212021-06-09 17:05:54 -070023#include <registries/privilege_registry.hpp>
Jonathan Doman1e1e5982021-06-11 09:36:17 -070024#include <sdbusplus/asio/property.hpp>
Andrew Geissler87d84722019-02-28 14:28:39 -060025#include <utils/fw_utils.hpp>
Gunnar Mills1214b7e2020-06-04 10:11:30 -050026
Ed Tanous1abe55e2018-09-05 08:30:59 -070027namespace redfish
28{
Ed Tanous27826b52018-10-29 11:40:58 -070029
Andrew Geissler0e7de462019-03-04 19:11:54 -060030// Match signals added on software path
Jennifer Leeacb7cfb2018-06-07 16:08:15 -070031static std::unique_ptr<sdbusplus::bus::match::match> fwUpdateMatcher;
James Feist4cde5d92020-06-11 10:39:55 -070032static std::unique_ptr<sdbusplus::bus::match::match> fwUpdateErrorMatcher;
Andrew Geissler0e7de462019-03-04 19:11:54 -060033// Only allow one update at a time
34static bool fwUpdateInProgress = false;
Andrew Geissler86adcd62019-04-18 10:58:05 -050035// Timer for software available
Ed Tanous271584a2019-07-09 16:24:22 -070036static std::unique_ptr<boost::asio::steady_timer> fwAvailableTimer;
Andrew Geissler86adcd62019-04-18 10:58:05 -050037
John Edward Broadbent7e860f12021-04-08 15:57:16 -070038inline static void cleanUp()
Andrew Geissler86adcd62019-04-18 10:58:05 -050039{
40 fwUpdateInProgress = false;
41 fwUpdateMatcher = nullptr;
James Feist4cde5d92020-06-11 10:39:55 -070042 fwUpdateErrorMatcher = nullptr;
Andrew Geissler86adcd62019-04-18 10:58:05 -050043}
John Edward Broadbent7e860f12021-04-08 15:57:16 -070044inline static void activateImage(const std::string& objPath,
45 const std::string& service)
Andrew Geissler86adcd62019-04-18 10:58:05 -050046{
47 BMCWEB_LOG_DEBUG << "Activate image for " << objPath << " " << service;
48 crow::connections::systemBus->async_method_call(
Ed Tanous81ce6092020-12-17 16:54:55 +000049 [](const boost::system::error_code errorCode) {
50 if (errorCode)
Andrew Geissler86adcd62019-04-18 10:58:05 -050051 {
Ed Tanous81ce6092020-12-17 16:54:55 +000052 BMCWEB_LOG_DEBUG << "error_code = " << errorCode;
53 BMCWEB_LOG_DEBUG << "error msg = " << errorCode.message();
Andrew Geissler86adcd62019-04-18 10:58:05 -050054 }
55 },
56 service, objPath, "org.freedesktop.DBus.Properties", "Set",
57 "xyz.openbmc_project.Software.Activation", "RequestedActivation",
Ed Tanous168e20c2021-12-13 14:39:53 -080058 dbus::utility::DbusVariantType(
George Liu0fda0f12021-11-16 10:06:17 +080059 "xyz.openbmc_project.Software.Activation.RequestedActivations.Active"));
Andrew Geissler86adcd62019-04-18 10:58:05 -050060}
Andrew Geissler0554c982019-04-23 14:40:12 -050061
62// Note that asyncResp can be either a valid pointer or nullptr. If nullptr
63// then no asyncResp updates will occur
zhanghch058d1b46d2021-04-01 11:18:24 +080064static void
65 softwareInterfaceAdded(const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
66 sdbusplus::message::message& m,
Ed Tanousa3e65892021-09-16 14:13:20 -070067 task::Payload&& payload)
Andrew Geissler86adcd62019-04-18 10:58:05 -050068{
69 std::vector<std::pair<
70 std::string,
Ed Tanous168e20c2021-12-13 14:39:53 -080071 std::vector<std::pair<std::string, dbus::utility::DbusVariantType>>>>
Andrew Geissler86adcd62019-04-18 10:58:05 -050072 interfacesProperties;
73
74 sdbusplus::message::object_path objPath;
75
76 m.read(objPath, interfacesProperties);
77
78 BMCWEB_LOG_DEBUG << "obj path = " << objPath.str;
Gunnar Mills1214b7e2020-06-04 10:11:30 -050079 for (auto& interface : interfacesProperties)
Andrew Geissler86adcd62019-04-18 10:58:05 -050080 {
81 BMCWEB_LOG_DEBUG << "interface = " << interface.first;
82
83 if (interface.first == "xyz.openbmc_project.Software.Activation")
84 {
Andrew Geissler86adcd62019-04-18 10:58:05 -050085 // Retrieve service and activate
86 crow::connections::systemBus->async_method_call(
Ed Tanousa3e65892021-09-16 14:13:20 -070087 [objPath, asyncResp, payload(std::move(payload))](
88 const boost::system::error_code errorCode,
89 const std::vector<
90 std::pair<std::string, std::vector<std::string>>>&
91 objInfo) mutable {
Ed Tanous81ce6092020-12-17 16:54:55 +000092 if (errorCode)
Andrew Geissler86adcd62019-04-18 10:58:05 -050093 {
Ed Tanous81ce6092020-12-17 16:54:55 +000094 BMCWEB_LOG_DEBUG << "error_code = " << errorCode;
Andrew Geissler86adcd62019-04-18 10:58:05 -050095 BMCWEB_LOG_DEBUG << "error msg = "
Ed Tanous81ce6092020-12-17 16:54:55 +000096 << errorCode.message();
Andrew Geissler0554c982019-04-23 14:40:12 -050097 if (asyncResp)
98 {
99 messages::internalError(asyncResp->res);
100 }
Andrew Geissler86adcd62019-04-18 10:58:05 -0500101 cleanUp();
102 return;
103 }
104 // Ensure we only got one service back
105 if (objInfo.size() != 1)
106 {
107 BMCWEB_LOG_ERROR << "Invalid Object Size "
108 << objInfo.size();
Andrew Geissler0554c982019-04-23 14:40:12 -0500109 if (asyncResp)
110 {
111 messages::internalError(asyncResp->res);
112 }
Andrew Geissler86adcd62019-04-18 10:58:05 -0500113 cleanUp();
114 return;
115 }
116 // cancel timer only when
117 // xyz.openbmc_project.Software.Activation interface
118 // is added
119 fwAvailableTimer = nullptr;
120
121 activateImage(objPath.str, objInfo[0].first);
Andrew Geissler0554c982019-04-23 14:40:12 -0500122 if (asyncResp)
123 {
James Feist32898ce2020-03-10 16:16:52 -0700124 std::shared_ptr<task::TaskData> task =
125 task::TaskData::createTask(
126 [](boost::system::error_code ec,
Gunnar Mills1214b7e2020-06-04 10:11:30 -0500127 sdbusplus::message::message& msg,
128 const std::shared_ptr<task::TaskData>&
129 taskData) {
James Feist32898ce2020-03-10 16:16:52 -0700130 if (ec)
131 {
132 return task::completed;
133 }
134
135 std::string iface;
136 boost::container::flat_map<
James Feistfd9ab9e2020-05-19 13:48:07 -0700137 std::string,
Ed Tanous168e20c2021-12-13 14:39:53 -0800138 dbus::utility::DbusVariantType>
James Feist32898ce2020-03-10 16:16:52 -0700139 values;
James Feist32898ce2020-03-10 16:16:52 -0700140
James Feiste5d50062020-05-11 17:29:00 -0700141 std::string index =
142 std::to_string(taskData->index);
James Feistfd9ab9e2020-05-19 13:48:07 -0700143 msg.read(iface, values);
James Feiste5d50062020-05-11 17:29:00 -0700144
George Liu0fda0f12021-11-16 10:06:17 +0800145 if (iface ==
146 "xyz.openbmc_project.Software.Activation")
James Feist32898ce2020-03-10 16:16:52 -0700147 {
James Feistfd9ab9e2020-05-19 13:48:07 -0700148 auto findActivation =
149 values.find("Activation");
150 if (findActivation == values.end())
151 {
152 return !task::completed;
153 }
Gunnar Mills1214b7e2020-06-04 10:11:30 -0500154 std::string* state =
James Feistfd9ab9e2020-05-19 13:48:07 -0700155 std::get_if<std::string>(
156 &(findActivation->second));
157
158 if (state == nullptr)
159 {
160 taskData->messages.emplace_back(
161 messages::internalError());
162 return task::completed;
163 }
164
165 if (boost::ends_with(*state,
166 "Invalid") ||
167 boost::ends_with(*state, "Failed"))
168 {
169 taskData->state = "Exception";
170 taskData->status = "Warning";
171 taskData->messages.emplace_back(
172 messages::taskAborted(index));
173 return task::completed;
174 }
175
176 if (boost::ends_with(*state, "Staged"))
177 {
178 taskData->state = "Stopping";
179 taskData->messages.emplace_back(
180 messages::taskPaused(index));
181
182 // its staged, set a long timer to
183 // allow them time to complete the
184 // update (probably cycle the
185 // system) if this expires then
186 // task will be cancelled
187 taskData->extendTimer(
188 std::chrono::hours(5));
189 return !task::completed;
190 }
191
192 if (boost::ends_with(*state, "Active"))
193 {
194 taskData->messages.emplace_back(
195 messages::taskCompletedOK(
196 index));
197 taskData->state = "Completed";
198 return task::completed;
199 }
James Feist32898ce2020-03-10 16:16:52 -0700200 }
George Liu0fda0f12021-11-16 10:06:17 +0800201 else if (
202 iface ==
203 "xyz.openbmc_project.Software.ActivationProgress")
James Feist32898ce2020-03-10 16:16:52 -0700204 {
James Feistfd9ab9e2020-05-19 13:48:07 -0700205 auto findProgress =
206 values.find("Progress");
207 if (findProgress == values.end())
208 {
209 return !task::completed;
210 }
Gunnar Mills1214b7e2020-06-04 10:11:30 -0500211 uint8_t* progress =
James Feistfd9ab9e2020-05-19 13:48:07 -0700212 std::get_if<uint8_t>(
213 &(findProgress->second));
James Feist32898ce2020-03-10 16:16:52 -0700214
James Feistfd9ab9e2020-05-19 13:48:07 -0700215 if (progress == nullptr)
216 {
217 taskData->messages.emplace_back(
218 messages::internalError());
219 return task::completed;
220 }
George Liu6868ff52021-01-02 11:37:41 +0800221 taskData->percentComplete =
222 static_cast<int>(*progress);
James Feist32898ce2020-03-10 16:16:52 -0700223 taskData->messages.emplace_back(
James Feistfd9ab9e2020-05-19 13:48:07 -0700224 messages::taskProgressChanged(
225 index, static_cast<size_t>(
226 *progress)));
227
228 // if we're getting status updates it's
229 // still alive, update timer
230 taskData->extendTimer(
231 std::chrono::minutes(5));
James Feist32898ce2020-03-10 16:16:52 -0700232 }
233
234 // as firmware update often results in a
235 // reboot, the task may never "complete"
236 // unless it is an error
237
238 return !task::completed;
239 },
George Liu0fda0f12021-11-16 10:06:17 +0800240 "type='signal',interface='org.freedesktop.DBus.Properties',"
James Feistfd9ab9e2020-05-19 13:48:07 -0700241 "member='PropertiesChanged',path='" +
James Feist32898ce2020-03-10 16:16:52 -0700242 objPath.str + "'");
243 task->startTimer(std::chrono::minutes(5));
244 task->populateResp(asyncResp->res);
Ed Tanousa3e65892021-09-16 14:13:20 -0700245 task->payload.emplace(std::move(payload));
Andrew Geissler0554c982019-04-23 14:40:12 -0500246 }
Andrew Geissler86adcd62019-04-18 10:58:05 -0500247 fwUpdateInProgress = false;
248 },
249 "xyz.openbmc_project.ObjectMapper",
250 "/xyz/openbmc_project/object_mapper",
251 "xyz.openbmc_project.ObjectMapper", "GetObject", objPath.str,
Gunnar Mills1214b7e2020-06-04 10:11:30 -0500252 std::array<const char*, 1>{
Andrew Geissler86adcd62019-04-18 10:58:05 -0500253 "xyz.openbmc_project.Software.Activation"});
254 }
255 }
256}
257
Andrew Geissler0554c982019-04-23 14:40:12 -0500258// Note that asyncResp can be either a valid pointer or nullptr. If nullptr
259// then no asyncResp updates will occur
Ed Tanousb5a76932020-09-29 16:16:58 -0700260static void monitorForSoftwareAvailable(
zhanghch058d1b46d2021-04-01 11:18:24 +0800261 const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
262 const crow::Request& req, const std::string& url,
263 int timeoutTimeSeconds = 10)
Andrew Geissler86adcd62019-04-18 10:58:05 -0500264{
265 // Only allow one FW update at a time
266 if (fwUpdateInProgress != false)
267 {
Andrew Geissler0554c982019-04-23 14:40:12 -0500268 if (asyncResp)
269 {
Andrew Geissler0554c982019-04-23 14:40:12 -0500270 messages::serviceTemporarilyUnavailable(asyncResp->res, "30");
271 }
Andrew Geissler86adcd62019-04-18 10:58:05 -0500272 return;
273 }
274
Andrew Geissler0554c982019-04-23 14:40:12 -0500275 fwAvailableTimer =
Ed Tanous271584a2019-07-09 16:24:22 -0700276 std::make_unique<boost::asio::steady_timer>(*req.ioService);
Andrew Geissler86adcd62019-04-18 10:58:05 -0500277
Ed Tanous271584a2019-07-09 16:24:22 -0700278 fwAvailableTimer->expires_after(std::chrono::seconds(timeoutTimeSeconds));
Andrew Geissler86adcd62019-04-18 10:58:05 -0500279
280 fwAvailableTimer->async_wait(
Gunnar Mills1214b7e2020-06-04 10:11:30 -0500281 [asyncResp](const boost::system::error_code& ec) {
Andrew Geissler86adcd62019-04-18 10:58:05 -0500282 cleanUp();
283 if (ec == boost::asio::error::operation_aborted)
284 {
285 // expected, we were canceled before the timer completed.
286 return;
287 }
288 BMCWEB_LOG_ERROR
289 << "Timed out waiting for firmware object being created";
290 BMCWEB_LOG_ERROR
291 << "FW image may has already been uploaded to server";
292 if (ec)
293 {
294 BMCWEB_LOG_ERROR << "Async_wait failed" << ec;
295 return;
296 }
Andrew Geissler0554c982019-04-23 14:40:12 -0500297 if (asyncResp)
298 {
299 redfish::messages::internalError(asyncResp->res);
300 }
Andrew Geissler86adcd62019-04-18 10:58:05 -0500301 });
Ed Tanousa3e65892021-09-16 14:13:20 -0700302 task::Payload payload(req);
303 auto callback = [asyncResp,
304 payload](sdbusplus::message::message& m) mutable {
Andrew Geissler86adcd62019-04-18 10:58:05 -0500305 BMCWEB_LOG_DEBUG << "Match fired";
Ed Tanousa3e65892021-09-16 14:13:20 -0700306 softwareInterfaceAdded(asyncResp, m, std::move(payload));
Andrew Geissler86adcd62019-04-18 10:58:05 -0500307 };
308
309 fwUpdateInProgress = true;
310
311 fwUpdateMatcher = std::make_unique<sdbusplus::bus::match::match>(
312 *crow::connections::systemBus,
313 "interface='org.freedesktop.DBus.ObjectManager',type='signal',"
314 "member='InterfacesAdded',path='/xyz/openbmc_project/software'",
315 callback);
James Feist4cde5d92020-06-11 10:39:55 -0700316
317 fwUpdateErrorMatcher = std::make_unique<sdbusplus::bus::match::match>(
318 *crow::connections::systemBus,
Brian Mae1cc4822021-12-01 17:05:54 +0800319 "interface='org.freedesktop.DBus.ObjectManager',type='signal',"
320 "member='InterfacesAdded',"
321 "path='/xyz/openbmc_project/logging'",
James Feist4cde5d92020-06-11 10:39:55 -0700322 [asyncResp, url](sdbusplus::message::message& m) {
Brian Mae1cc4822021-12-01 17:05:54 +0800323 std::vector<
324 std::pair<std::string, dbus::utility::DBusPropertiesMap>>
325 interfacesProperties;
326 sdbusplus::message::object_path objPath;
327 m.read(objPath, interfacesProperties);
328 BMCWEB_LOG_DEBUG << "obj path = " << objPath.str;
329 for (const std::pair<std::string, dbus::utility::DBusPropertiesMap>&
330 interface : interfacesProperties)
James Feist4cde5d92020-06-11 10:39:55 -0700331 {
Brian Mae1cc4822021-12-01 17:05:54 +0800332 if (interface.first == "xyz.openbmc_project.Logging.Entry")
333 {
Ed Tanous711ac7a2021-12-20 09:34:41 -0800334 for (const std::pair<std::string,
335 dbus::utility::DbusVariantType>&
336 value : interface.second)
Brian Mae1cc4822021-12-01 17:05:54 +0800337 {
Ed Tanous711ac7a2021-12-20 09:34:41 -0800338 if (value.first != "Message")
339 {
340 continue;
341 }
342 const std::string* type =
343 std::get_if<std::string>(&value.second);
344 if (type == nullptr)
345 {
346 // if this was our message, timeout will cover it
347 return;
348 }
349 fwAvailableTimer = nullptr;
350 if (*type ==
351 "xyz.openbmc_project.Software.Image.Error.UnTarFailure")
352 {
353 redfish::messages::invalidUpload(
354 asyncResp->res, url, "Invalid archive");
355 }
356 else if (*type ==
357 "xyz.openbmc_project.Software.Image.Error."
358 "ManifestFileFailure")
359 {
360 redfish::messages::invalidUpload(
361 asyncResp->res, url, "Invalid manifest");
362 }
363 else if (
364 *type ==
365 "xyz.openbmc_project.Software.Image.Error.ImageFailure")
366 {
367 redfish::messages::invalidUpload(
368 asyncResp->res, url, "Invalid image format");
369 }
370 else if (
371 *type ==
372 "xyz.openbmc_project.Software.Version.Error.AlreadyExists")
373 {
374 redfish::messages::invalidUpload(
375 asyncResp->res, url,
376 "Image version already exists");
Gunnar Mills88b3dd12020-11-20 14:26:04 -0600377
Ed Tanous711ac7a2021-12-20 09:34:41 -0800378 redfish::messages::resourceAlreadyExists(
379 asyncResp->res,
380 "UpdateService.v1_5_0.UpdateService", "Version",
381 "uploaded version");
382 }
383 else if (
384 *type ==
385 "xyz.openbmc_project.Software.Image.Error.BusyFailure")
386 {
387 redfish::messages::resourceExhaustion(
388 asyncResp->res, url);
389 }
390 else
391 {
392 redfish::messages::internalError(asyncResp->res);
393 }
Brian Mae1cc4822021-12-01 17:05:54 +0800394 }
395 }
Gunnar Mills88b3dd12020-11-20 14:26:04 -0600396 }
James Feist4cde5d92020-06-11 10:39:55 -0700397 });
Andrew Geissler86adcd62019-04-18 10:58:05 -0500398}
Jennifer Lee729dae72018-04-24 15:59:34 -0700399
Andrew Geissler0554c982019-04-23 14:40:12 -0500400/**
401 * UpdateServiceActionsSimpleUpdate class supports handle POST method for
402 * SimpleUpdate action.
403 */
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700404inline void requestRoutesUpdateServiceActionsSimpleUpdate(App& app)
Andrew Geissler0554c982019-04-23 14:40:12 -0500405{
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700406 BMCWEB_ROUTE(
407 app, "/redfish/v1/UpdateService/Actions/UpdateService.SimpleUpdate/")
Ed Tanoused398212021-06-09 17:05:54 -0700408 .privileges(redfish::privileges::postUpdateService)
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700409 .methods(
410 boost::beast::http::verb::
411 post)([](const crow::Request& req,
412 const std::shared_ptr<bmcweb::AsyncResp>& asyncResp) {
413 std::optional<std::string> transferProtocol;
414 std::string imageURI;
Andrew Geissler0554c982019-04-23 14:40:12 -0500415
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700416 BMCWEB_LOG_DEBUG << "Enter UpdateService.SimpleUpdate doPost";
Andrew Geissler0554c982019-04-23 14:40:12 -0500417
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700418 // User can pass in both TransferProtocol and ImageURI parameters or
419 // they can pass in just the ImageURI with the transfer protocol
420 // embedded within it.
421 // 1) TransferProtocol:TFTP ImageURI:1.1.1.1/myfile.bin
422 // 2) ImageURI:tftp://1.1.1.1/myfile.bin
Andrew Geissler0554c982019-04-23 14:40:12 -0500423
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700424 if (!json_util::readJson(req, asyncResp->res, "TransferProtocol",
425 transferProtocol, "ImageURI", imageURI))
426 {
427 BMCWEB_LOG_DEBUG
428 << "Missing TransferProtocol or ImageURI parameter";
429 return;
430 }
431 if (!transferProtocol)
432 {
433 // Must be option 2
434 // Verify ImageURI has transfer protocol in it
435 size_t separator = imageURI.find(':');
436 if ((separator == std::string::npos) ||
437 ((separator + 1) > imageURI.size()))
438 {
439 messages::actionParameterValueTypeError(
440 asyncResp->res, imageURI, "ImageURI",
441 "UpdateService.SimpleUpdate");
442 BMCWEB_LOG_ERROR << "ImageURI missing transfer protocol: "
443 << imageURI;
444 return;
445 }
446 transferProtocol = imageURI.substr(0, separator);
447 // Ensure protocol is upper case for a common comparison path
448 // below
449 boost::to_upper(*transferProtocol);
450 BMCWEB_LOG_DEBUG << "Encoded transfer protocol "
451 << *transferProtocol;
Andrew Geissler0554c982019-04-23 14:40:12 -0500452
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700453 // Adjust imageURI to not have the protocol on it for parsing
454 // below
455 // ex. tftp://1.1.1.1/myfile.bin -> 1.1.1.1/myfile.bin
456 imageURI = imageURI.substr(separator + 3);
457 BMCWEB_LOG_DEBUG << "Adjusted imageUri " << imageURI;
458 }
459
460 // OpenBMC currently only supports TFTP
461 if (*transferProtocol != "TFTP")
462 {
463 messages::actionParameterNotSupported(
464 asyncResp->res, "TransferProtocol",
465 "UpdateService.SimpleUpdate");
466 BMCWEB_LOG_ERROR << "Request incorrect protocol parameter: "
467 << *transferProtocol;
468 return;
469 }
470
471 // Format should be <IP or Hostname>/<file> for imageURI
472 size_t separator = imageURI.find('/');
Andrew Geissler0554c982019-04-23 14:40:12 -0500473 if ((separator == std::string::npos) ||
474 ((separator + 1) > imageURI.size()))
475 {
476 messages::actionParameterValueTypeError(
477 asyncResp->res, imageURI, "ImageURI",
478 "UpdateService.SimpleUpdate");
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700479 BMCWEB_LOG_ERROR << "Invalid ImageURI: " << imageURI;
Jayashankar Padath274dfe62019-08-23 12:30:57 +0530480 return;
Jayashankar Padathfa1a5a32019-05-28 23:54:37 +0530481 }
482
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700483 std::string tftpServer = imageURI.substr(0, separator);
484 std::string fwFile = imageURI.substr(separator + 1);
485 BMCWEB_LOG_DEBUG << "Server: " << tftpServer + " File: " << fwFile;
Jayashankar Padath274dfe62019-08-23 12:30:57 +0530486
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700487 // Setup callback for when new software detected
488 // Give TFTP 10 minutes to complete
489 monitorForSoftwareAvailable(
490 asyncResp, req,
491 "/redfish/v1/UpdateService/Actions/UpdateService.SimpleUpdate",
492 600);
493
494 // TFTP can take up to 10 minutes depending on image size and
495 // connection speed. Return to caller as soon as the TFTP operation
496 // has been started. The callback above will ensure the activate
497 // is started once the download has completed
498 redfish::messages::success(asyncResp->res);
499
500 // Call TFTP service
501 crow::connections::systemBus->async_method_call(
502 [](const boost::system::error_code ec) {
503 if (ec)
Jayashankar Padathfa1a5a32019-05-28 23:54:37 +0530504 {
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700505 // messages::internalError(asyncResp->res);
506 cleanUp();
507 BMCWEB_LOG_DEBUG << "error_code = " << ec;
508 BMCWEB_LOG_DEBUG << "error msg = " << ec.message();
Jayashankar Padath274dfe62019-08-23 12:30:57 +0530509 }
510 else
511 {
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700512 BMCWEB_LOG_DEBUG << "Call to DownloaViaTFTP Success";
513 }
514 },
515 "xyz.openbmc_project.Software.Download",
516 "/xyz/openbmc_project/software",
517 "xyz.openbmc_project.Common.TFTP", "DownloadViaTFTP", fwFile,
518 tftpServer);
519
520 BMCWEB_LOG_DEBUG << "Exit UpdateService.SimpleUpdate doPost";
521 });
522}
523
524inline void requestRoutesUpdateService(App& app)
525{
526 BMCWEB_ROUTE(app, "/redfish/v1/UpdateService/")
Ed Tanoused398212021-06-09 17:05:54 -0700527 .privileges(redfish::privileges::getUpdateService)
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700528 .methods(
529 boost::beast::http::verb::
530 get)([](const crow::Request&,
531 const std::shared_ptr<bmcweb::AsyncResp>& asyncResp) {
532 asyncResp->res.jsonValue["@odata.type"] =
Chicago Duan0588a3b2021-06-10 18:20:36 +0800533 "#UpdateService.v1_5_0.UpdateService";
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700534 asyncResp->res.jsonValue["@odata.id"] = "/redfish/v1/UpdateService";
535 asyncResp->res.jsonValue["Id"] = "UpdateService";
536 asyncResp->res.jsonValue["Description"] =
537 "Service for Software Update";
538 asyncResp->res.jsonValue["Name"] = "Update Service";
539 asyncResp->res.jsonValue["HttpPushUri"] =
540 "/redfish/v1/UpdateService";
541 // UpdateService cannot be disabled
542 asyncResp->res.jsonValue["ServiceEnabled"] = true;
543 asyncResp->res.jsonValue["FirmwareInventory"] = {
544 {"@odata.id", "/redfish/v1/UpdateService/FirmwareInventory"}};
Tejas Patild61e5192021-06-04 15:49:35 +0530545 // Get the MaxImageSizeBytes
546 asyncResp->res.jsonValue["MaxImageSizeBytes"] =
547 bmcwebHttpReqBodyLimitMb * 1024 * 1024;
548
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700549#ifdef BMCWEB_INSECURE_ENABLE_REDFISH_FW_TFTP_UPDATE
550 // Update Actions object.
551 nlohmann::json& updateSvcSimpleUpdate =
552 asyncResp->res
553 .jsonValue["Actions"]["#UpdateService.SimpleUpdate"];
554 updateSvcSimpleUpdate["target"] =
555 "/redfish/v1/UpdateService/Actions/UpdateService.SimpleUpdate";
556 updateSvcSimpleUpdate["TransferProtocol@Redfish.AllowableValues"] =
557 {"TFTP"};
558#endif
559 // Get the current ApplyTime value
Jonathan Doman1e1e5982021-06-11 09:36:17 -0700560 sdbusplus::asio::getProperty<std::string>(
561 *crow::connections::systemBus, "xyz.openbmc_project.Settings",
562 "/xyz/openbmc_project/software/apply_time",
563 "xyz.openbmc_project.Software.ApplyTime", "RequestedApplyTime",
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700564 [asyncResp](const boost::system::error_code ec,
Jonathan Doman1e1e5982021-06-11 09:36:17 -0700565 const std::string& applyTime) {
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700566 if (ec)
567 {
568 BMCWEB_LOG_DEBUG << "DBUS response error " << ec;
569 messages::internalError(asyncResp->res);
Jayashankar Padathfa1a5a32019-05-28 23:54:37 +0530570 return;
571 }
Jayashankar Padath274dfe62019-08-23 12:30:57 +0530572
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700573 // Store the ApplyTime Value
Jonathan Doman1e1e5982021-06-11 09:36:17 -0700574 if (applyTime == "xyz.openbmc_project.Software.ApplyTime."
575 "RequestedApplyTimes.Immediate")
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700576 {
577 asyncResp->res
578 .jsonValue["HttpPushUriOptions"]
579 ["HttpPushUriApplyTime"]["ApplyTime"] =
580 "Immediate";
581 }
Jonathan Doman1e1e5982021-06-11 09:36:17 -0700582 else if (applyTime ==
583 "xyz.openbmc_project.Software.ApplyTime."
584 "RequestedApplyTimes.OnReset")
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700585 {
586 asyncResp->res
587 .jsonValue["HttpPushUriOptions"]
588 ["HttpPushUriApplyTime"]["ApplyTime"] =
589 "OnReset";
590 }
Jonathan Doman1e1e5982021-06-11 09:36:17 -0700591 });
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700592 });
593 BMCWEB_ROUTE(app, "/redfish/v1/UpdateService/")
Ed Tanoused398212021-06-09 17:05:54 -0700594 .privileges(redfish::privileges::patchUpdateService)
George Liu0fda0f12021-11-16 10:06:17 +0800595 .methods(
596 boost::beast::http::verb::
597 patch)([](const crow::Request& req,
598 const std::shared_ptr<bmcweb::AsyncResp>& asyncResp) {
599 BMCWEB_LOG_DEBUG << "doPatch...";
Jayashankar Padathfa1a5a32019-05-28 23:54:37 +0530600
George Liu0fda0f12021-11-16 10:06:17 +0800601 std::optional<nlohmann::json> pushUriOptions;
602 if (!json_util::readJson(req, asyncResp->res, "HttpPushUriOptions",
603 pushUriOptions))
604 {
605 return;
606 }
607
608 if (pushUriOptions)
609 {
610 std::optional<nlohmann::json> pushUriApplyTime;
611 if (!json_util::readJson(*pushUriOptions, asyncResp->res,
612 "HttpPushUriApplyTime",
613 pushUriApplyTime))
Ed Tanous1abe55e2018-09-05 08:30:59 -0700614 {
Ed Tanousc711bf82018-07-30 16:31:33 -0700615 return;
Ed Tanous1abe55e2018-09-05 08:30:59 -0700616 }
Jennifer Lee6c4eb9d2018-05-22 10:58:31 -0700617
George Liu0fda0f12021-11-16 10:06:17 +0800618 if (pushUriApplyTime)
Ed Tanous1abe55e2018-09-05 08:30:59 -0700619 {
George Liu0fda0f12021-11-16 10:06:17 +0800620 std::optional<std::string> applyTime;
621 if (!json_util::readJson(*pushUriApplyTime, asyncResp->res,
622 "ApplyTime", applyTime))
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700623 {
624 return;
625 }
626
George Liu0fda0f12021-11-16 10:06:17 +0800627 if (applyTime)
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700628 {
George Liu0fda0f12021-11-16 10:06:17 +0800629 std::string applyTimeNewVal;
630 if (applyTime == "Immediate")
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700631 {
George Liu0fda0f12021-11-16 10:06:17 +0800632 applyTimeNewVal =
633 "xyz.openbmc_project.Software.ApplyTime.RequestedApplyTimes.Immediate";
634 }
635 else if (applyTime == "OnReset")
636 {
637 applyTimeNewVal =
638 "xyz.openbmc_project.Software.ApplyTime.RequestedApplyTimes.OnReset";
639 }
640 else
641 {
642 BMCWEB_LOG_INFO
643 << "ApplyTime value is not in the list of acceptable values";
644 messages::propertyValueNotInList(
645 asyncResp->res, *applyTime, "ApplyTime");
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700646 return;
647 }
648
George Liu0fda0f12021-11-16 10:06:17 +0800649 // Set the requested image apply time value
650 crow::connections::systemBus->async_method_call(
651 [asyncResp](const boost::system::error_code ec) {
652 if (ec)
653 {
654 BMCWEB_LOG_ERROR
655 << "D-Bus responses error: " << ec;
656 messages::internalError(asyncResp->res);
657 return;
658 }
659 messages::success(asyncResp->res);
660 },
661 "xyz.openbmc_project.Settings",
662 "/xyz/openbmc_project/software/apply_time",
663 "org.freedesktop.DBus.Properties", "Set",
664 "xyz.openbmc_project.Software.ApplyTime",
665 "RequestedApplyTime",
Ed Tanous168e20c2021-12-13 14:39:53 -0800666 dbus::utility::DbusVariantType{applyTimeNewVal});
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700667 }
668 }
George Liu0fda0f12021-11-16 10:06:17 +0800669 }
670 });
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700671 BMCWEB_ROUTE(app, "/redfish/v1/UpdateService/")
Ed Tanoused398212021-06-09 17:05:54 -0700672 .privileges(redfish::privileges::postUpdateService)
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700673 .methods(boost::beast::http::verb::post)(
674 [](const crow::Request& req,
675 const std::shared_ptr<bmcweb::AsyncResp>& asyncResp) {
676 BMCWEB_LOG_DEBUG << "doPost...";
677
678 // Setup callback for when new software detected
679 monitorForSoftwareAvailable(asyncResp, req,
680 "/redfish/v1/UpdateService");
681
682 std::string filepath("/tmp/images/" +
683 boost::uuids::to_string(
684 boost::uuids::random_generator()()));
685 BMCWEB_LOG_DEBUG << "Writing file to " << filepath;
686 std::ofstream out(filepath, std::ofstream::out |
687 std::ofstream::binary |
688 std::ofstream::trunc);
689 out << req.body;
690 out.close();
691 BMCWEB_LOG_DEBUG << "file upload complete!!";
692 });
693}
694
695inline void requestRoutesSoftwareInventoryCollection(App& app)
696{
697 BMCWEB_ROUTE(app, "/redfish/v1/UpdateService/FirmwareInventory/")
Ed Tanoused398212021-06-09 17:05:54 -0700698 .privileges(redfish::privileges::getSoftwareInventoryCollection)
George Liu0fda0f12021-11-16 10:06:17 +0800699 .methods(
700 boost::beast::http::verb::
701 get)([](const crow::Request&,
702 const std::shared_ptr<bmcweb::AsyncResp>& asyncResp) {
703 asyncResp->res.jsonValue["@odata.type"] =
704 "#SoftwareInventoryCollection.SoftwareInventoryCollection";
705 asyncResp->res.jsonValue["@odata.id"] =
706 "/redfish/v1/UpdateService/FirmwareInventory";
707 asyncResp->res.jsonValue["Name"] = "Software Inventory Collection";
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700708
George Liu0fda0f12021-11-16 10:06:17 +0800709 crow::connections::systemBus->async_method_call(
710 [asyncResp](
711 const boost::system::error_code ec,
712 const std::vector<
713 std::pair<std::string,
714 std::vector<std::pair<
715 std::string, std::vector<std::string>>>>>&
716 subtree) {
717 if (ec)
718 {
719 messages::internalError(asyncResp->res);
720 return;
721 }
722 asyncResp->res.jsonValue["Members"] =
723 nlohmann::json::array();
724 asyncResp->res.jsonValue["Members@odata.count"] = 0;
725
726 for (auto& obj : subtree)
727 {
728 sdbusplus::message::object_path path(obj.first);
729 std::string swId = path.filename();
730 if (swId.empty())
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700731 {
732 messages::internalError(asyncResp->res);
George Liu0fda0f12021-11-16 10:06:17 +0800733 BMCWEB_LOG_DEBUG << "Can't parse firmware ID!!";
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700734 return;
735 }
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700736
George Liu0fda0f12021-11-16 10:06:17 +0800737 nlohmann::json& members =
738 asyncResp->res.jsonValue["Members"];
739 members.push_back(
740 {{"@odata.id",
741 "/redfish/v1/UpdateService/FirmwareInventory/" +
742 swId}});
743 asyncResp->res.jsonValue["Members@odata.count"] =
744 members.size();
745 }
746 },
747 // Note that only firmware levels associated with a device
748 // are stored under /xyz/openbmc_project/software therefore
749 // to ensure only real FirmwareInventory items are returned,
750 // this full object path must be used here as input to
751 // mapper
752 "xyz.openbmc_project.ObjectMapper",
753 "/xyz/openbmc_project/object_mapper",
754 "xyz.openbmc_project.ObjectMapper", "GetSubTree",
755 "/xyz/openbmc_project/software", static_cast<int32_t>(0),
756 std::array<const char*, 1>{
757 "xyz.openbmc_project.Software.Version"});
758 });
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700759}
760/* Fill related item links (i.e. bmc, bios) in for inventory */
761inline static void
762 getRelatedItems(const std::shared_ptr<bmcweb::AsyncResp>& aResp,
763 const std::string& purpose)
764{
765 if (purpose == fw_util::bmcPurpose)
766 {
767 nlohmann::json& relatedItem = aResp->res.jsonValue["RelatedItem"];
768 relatedItem.push_back({{"@odata.id", "/redfish/v1/Managers/bmc"}});
769 aResp->res.jsonValue["RelatedItem@odata.count"] = relatedItem.size();
770 }
771 else if (purpose == fw_util::biosPurpose)
772 {
773 nlohmann::json& relatedItem = aResp->res.jsonValue["RelatedItem"];
774 relatedItem.push_back(
775 {{"@odata.id", "/redfish/v1/Systems/system/Bios"}});
776 aResp->res.jsonValue["Members@odata.count"] = relatedItem.size();
777 }
778 else
779 {
780 BMCWEB_LOG_ERROR << "Unknown software purpose " << purpose;
781 }
782}
783
784inline void requestRoutesSoftwareInventory(App& app)
785{
786 BMCWEB_ROUTE(app, "/redfish/v1/UpdateService/FirmwareInventory/<str>/")
Ed Tanoused398212021-06-09 17:05:54 -0700787 .privileges(redfish::privileges::getSoftwareInventory)
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700788 .methods(
789 boost::beast::http::verb::get)([](const crow::Request&,
790 const std::shared_ptr<
791 bmcweb::AsyncResp>& asyncResp,
792 const std::string& param) {
793 std::shared_ptr<std::string> swId =
794 std::make_shared<std::string>(param);
795
796 asyncResp->res.jsonValue["@odata.id"] =
797 "/redfish/v1/UpdateService/FirmwareInventory/" + *swId;
798
799 crow::connections::systemBus->async_method_call(
800 [asyncResp, swId](
801 const boost::system::error_code ec,
802 const std::vector<
803 std::pair<std::string,
804 std::vector<std::pair<
805 std::string, std::vector<std::string>>>>>&
806 subtree) {
807 BMCWEB_LOG_DEBUG << "doGet callback...";
808 if (ec)
Jennifer Leef4b65ab2018-09-18 12:00:13 -0700809 {
Jason M. Billsf12894f2018-10-09 12:45:45 -0700810 messages::internalError(asyncResp->res);
Jennifer Leef4b65ab2018-09-18 12:00:13 -0700811 return;
812 }
Jennifer Leef4b65ab2018-09-18 12:00:13 -0700813
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700814 // Ensure we find our input swId, otherwise return an error
815 bool found = false;
816 for (const std::pair<
817 std::string,
818 std::vector<std::pair<
819 std::string, std::vector<std::string>>>>& obj :
820 subtree)
Ed Tanous1abe55e2018-09-05 08:30:59 -0700821 {
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700822 if (boost::ends_with(obj.first, *swId) != true)
823 {
824 continue;
825 }
Ed Tanous1abe55e2018-09-05 08:30:59 -0700826
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700827 if (obj.second.size() < 1)
828 {
829 continue;
830 }
831
832 found = true;
833 fw_util::getFwStatus(asyncResp, swId,
834 obj.second[0].first);
835
836 crow::connections::systemBus->async_method_call(
Ed Tanous168e20c2021-12-13 14:39:53 -0800837 [asyncResp,
838 swId](const boost::system::error_code errorCode,
839 const boost::container::flat_map<
840 std::string,
841 dbus::utility::DbusVariantType>&
842 propertiesList) {
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700843 if (errorCode)
844 {
845 messages::internalError(asyncResp->res);
846 return;
847 }
848 boost::container::flat_map<
Ed Tanous168e20c2021-12-13 14:39:53 -0800849 std::string,
850 dbus::utility::DbusVariantType>::
851 const_iterator it =
852 propertiesList.find("Purpose");
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700853 if (it == propertiesList.end())
854 {
855 BMCWEB_LOG_DEBUG
856 << "Can't find property \"Purpose\"!";
857 messages::propertyMissing(asyncResp->res,
858 "Purpose");
859 return;
860 }
861 const std::string* swInvPurpose =
862 std::get_if<std::string>(&it->second);
863 if (swInvPurpose == nullptr)
864 {
George Liu0fda0f12021-11-16 10:06:17 +0800865 BMCWEB_LOG_DEBUG
866 << "wrong types for property\"Purpose\"!";
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700867 messages::propertyValueTypeError(
868 asyncResp->res, "", "Purpose");
869 return;
870 }
871
872 BMCWEB_LOG_DEBUG << "swInvPurpose = "
873 << *swInvPurpose;
874 it = propertiesList.find("Version");
875 if (it == propertiesList.end())
876 {
877 BMCWEB_LOG_DEBUG
878 << "Can't find property \"Version\"!";
879 messages::propertyMissing(asyncResp->res,
880 "Version");
881 return;
882 }
883
884 BMCWEB_LOG_DEBUG << "Version found!";
885
886 const std::string* version =
887 std::get_if<std::string>(&it->second);
888
889 if (version == nullptr)
890 {
891 BMCWEB_LOG_DEBUG
892 << "Can't find property \"Version\"!";
893
894 messages::propertyValueTypeError(
895 asyncResp->res, "", "Version");
896 return;
897 }
898 asyncResp->res.jsonValue["Version"] = *version;
899 asyncResp->res.jsonValue["Id"] = *swId;
900
901 // swInvPurpose is of format:
902 // xyz.openbmc_project.Software.Version.VersionPurpose.ABC
903 // Translate this to "ABC image"
904 size_t endDesc = swInvPurpose->rfind('.');
905 if (endDesc == std::string::npos)
906 {
907 messages::internalError(asyncResp->res);
908 return;
909 }
910 endDesc++;
911 if (endDesc >= swInvPurpose->size())
912 {
913 messages::internalError(asyncResp->res);
914 return;
915 }
916
917 std::string formatDesc =
918 swInvPurpose->substr(endDesc);
919 asyncResp->res.jsonValue["Description"] =
920 formatDesc + " image";
921 getRelatedItems(asyncResp, *swInvPurpose);
922 },
923 obj.second[0].first, obj.first,
924 "org.freedesktop.DBus.Properties", "GetAll",
925 "xyz.openbmc_project.Software.Version");
926 }
927 if (!found)
Ed Tanous1abe55e2018-09-05 08:30:59 -0700928 {
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700929 BMCWEB_LOG_ERROR
930 << "Input swID " + *swId + " not found!";
931 messages::resourceMissingAtURI(
932 asyncResp->res,
933 "/redfish/v1/UpdateService/FirmwareInventory/" +
934 *swId);
935 return;
Ed Tanous1abe55e2018-09-05 08:30:59 -0700936 }
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700937 asyncResp->res.jsonValue["@odata.type"] =
938 "#SoftwareInventory.v1_1_0.SoftwareInventory";
939 asyncResp->res.jsonValue["Name"] = "Software Inventory";
940 asyncResp->res.jsonValue["Status"]["HealthRollup"] = "OK";
Ed Tanous1abe55e2018-09-05 08:30:59 -0700941
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700942 asyncResp->res.jsonValue["Updateable"] = false;
943 fw_util::getFwUpdateableStatus(asyncResp, swId);
944 },
945 "xyz.openbmc_project.ObjectMapper",
946 "/xyz/openbmc_project/object_mapper",
947 "xyz.openbmc_project.ObjectMapper", "GetSubTree", "/",
948 static_cast<int32_t>(0),
949 std::array<const char*, 1>{
950 "xyz.openbmc_project.Software.Version"});
951 });
952}
Ed Tanous1abe55e2018-09-05 08:30:59 -0700953
954} // namespace redfish