blob: 2a40f8afed4a7c747fa59ab432bfa0b13f501c5f [file] [log] [blame]
Jennifer Lee729dae72018-04-24 15:59:34 -07001/*
2// Copyright (c) 2018 Intel Corporation
3//
4// Licensed under the Apache License, Version 2.0 (the "License");
5// you may not use this file except in compliance with the License.
6// You may obtain a copy of the License at
7//
8// http://www.apache.org/licenses/LICENSE-2.0
9//
10// Unless required by applicable law or agreed to in writing, software
11// distributed under the License is distributed on an "AS IS" BASIS,
12// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13// See the License for the specific language governing permissions and
14// limitations under the License.
15*/
16#pragma once
17
Tejas Patild61e5192021-06-04 15:49:35 +053018#include "bmcweb_config.h"
19
Ed Tanous3ccb3ad2023-01-13 17:40:03 -080020#include "app.hpp"
21#include "dbus_utility.hpp"
Ed Tanous5b904292024-04-16 11:10:17 -070022#include "error_messages.hpp"
Ed Tanous757178a2024-04-03 14:32:38 -070023#include "generated/enums/update_service.hpp"
George Liu0ed80c82020-05-12 16:06:27 +080024#include "multipart_parser.hpp"
Ed Tanous2c6ffdb2023-06-28 11:28:38 -070025#include "ossl_random.hpp"
Ed Tanous3ccb3ad2023-01-13 17:40:03 -080026#include "query.hpp"
27#include "registries/privilege_registry.hpp"
Ed Tanousa8e884f2023-01-13 17:40:03 -080028#include "task.hpp"
Ed Tanous5b904292024-04-16 11:10:17 -070029#include "task_messages.hpp"
John Edward Broadbent08d81ad2022-05-17 20:00:23 -070030#include "utils/collection.hpp"
Ed Tanous3ccb3ad2023-01-13 17:40:03 -080031#include "utils/dbus_utils.hpp"
Ed Tanous5b904292024-04-16 11:10:17 -070032#include "utils/json_utils.hpp"
Ed Tanous3ccb3ad2023-01-13 17:40:03 -080033#include "utils/sw_utils.hpp"
34
George Liue99073f2022-12-09 11:06:16 +080035#include <boost/system/error_code.hpp>
Ed Tanousef4c65b2023-04-24 15:28:50 -070036#include <boost/url/format.hpp>
Jonathan Doman1e1e5982021-06-11 09:36:17 -070037#include <sdbusplus/asio/property.hpp>
Ed Tanous3ccb3ad2023-01-13 17:40:03 -080038#include <sdbusplus/bus/match.hpp>
Krzysztof Grobelnyd1bde9e2022-09-07 10:40:51 +020039#include <sdbusplus/unpack_properties.hpp>
Gunnar Mills1214b7e2020-06-04 10:11:30 -050040
George Liu2b731192023-01-11 16:27:13 +080041#include <array>
George Liu0ed80c82020-05-12 16:06:27 +080042#include <filesystem>
Ed Tanous7cb59f62022-05-05 11:48:31 -070043#include <optional>
44#include <string>
George Liu2b731192023-01-11 16:27:13 +080045#include <string_view>
46
Ed Tanous1abe55e2018-09-05 08:30:59 -070047namespace redfish
48{
Ed Tanous27826b52018-10-29 11:40:58 -070049
Andrew Geissler0e7de462019-03-04 19:11:54 -060050// Match signals added on software path
Ed Tanouscf9e4172022-12-21 09:30:16 -080051// NOLINTNEXTLINE(cppcoreguidelines-avoid-non-const-global-variables)
Patrick Williams59d494e2022-07-22 19:26:55 -050052static std::unique_ptr<sdbusplus::bus::match_t> fwUpdateMatcher;
Ed Tanouscf9e4172022-12-21 09:30:16 -080053// NOLINTNEXTLINE(cppcoreguidelines-avoid-non-const-global-variables)
Patrick Williams59d494e2022-07-22 19:26:55 -050054static std::unique_ptr<sdbusplus::bus::match_t> fwUpdateErrorMatcher;
Andrew Geissler0e7de462019-03-04 19:11:54 -060055// Only allow one update at a time
Ed Tanouscf9e4172022-12-21 09:30:16 -080056// NOLINTNEXTLINE(cppcoreguidelines-avoid-non-const-global-variables)
Andrew Geissler0e7de462019-03-04 19:11:54 -060057static bool fwUpdateInProgress = false;
Andrew Geissler86adcd62019-04-18 10:58:05 -050058// Timer for software available
Ed Tanouscf9e4172022-12-21 09:30:16 -080059// NOLINTNEXTLINE(cppcoreguidelines-avoid-non-const-global-variables)
Ed Tanous271584a2019-07-09 16:24:22 -070060static std::unique_ptr<boost::asio::steady_timer> fwAvailableTimer;
Andrew Geissler86adcd62019-04-18 10:58:05 -050061
Ed Tanousdf254f22024-04-01 13:25:46 -070062inline void cleanUp()
Andrew Geissler86adcd62019-04-18 10:58:05 -050063{
64 fwUpdateInProgress = false;
65 fwUpdateMatcher = nullptr;
James Feist4cde5d92020-06-11 10:39:55 -070066 fwUpdateErrorMatcher = nullptr;
Andrew Geissler86adcd62019-04-18 10:58:05 -050067}
Ed Tanousdf254f22024-04-01 13:25:46 -070068
69inline void activateImage(const std::string& objPath,
70 const std::string& service)
Andrew Geissler86adcd62019-04-18 10:58:05 -050071{
Ed Tanous62598e32023-07-17 17:06:25 -070072 BMCWEB_LOG_DEBUG("Activate image for {} {}", objPath, service);
George Liu9ae226f2023-06-21 17:56:46 +080073 sdbusplus::asio::setProperty(
74 *crow::connections::systemBus, service, objPath,
75 "xyz.openbmc_project.Software.Activation", "RequestedActivation",
76 "xyz.openbmc_project.Software.Activation.RequestedActivations.Active",
Ed Tanous8b242752023-06-27 17:17:13 -070077 [](const boost::system::error_code& ec) {
78 if (ec)
Ed Tanous002d39b2022-05-31 08:59:27 -070079 {
Ed Tanous62598e32023-07-17 17:06:25 -070080 BMCWEB_LOG_DEBUG("error_code = {}", ec);
81 BMCWEB_LOG_DEBUG("error msg = {}", ec.message());
Ed Tanous002d39b2022-05-31 08:59:27 -070082 }
Patrick Williams5a39f772023-10-20 11:20:21 -050083 });
Andrew Geissler86adcd62019-04-18 10:58:05 -050084}
Andrew Geissler0554c982019-04-23 14:40:12 -050085
86// Note that asyncResp can be either a valid pointer or nullptr. If nullptr
87// then no asyncResp updates will occur
zhanghch058d1b46d2021-04-01 11:18:24 +080088static void
89 softwareInterfaceAdded(const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
Patrick Williams59d494e2022-07-22 19:26:55 -050090 sdbusplus::message_t& m, task::Payload&& payload)
Andrew Geissler86adcd62019-04-18 10:58:05 -050091{
Michael Shen80f79a42023-08-24 13:41:53 +000092 dbus::utility::DBusInterfacesMap interfacesProperties;
Andrew Geissler86adcd62019-04-18 10:58:05 -050093
94 sdbusplus::message::object_path objPath;
95
96 m.read(objPath, interfacesProperties);
97
Ed Tanous62598e32023-07-17 17:06:25 -070098 BMCWEB_LOG_DEBUG("obj path = {}", objPath.str);
Ed Tanouse3eb3d62022-12-21 11:56:07 -080099 for (const auto& interface : interfacesProperties)
Andrew Geissler86adcd62019-04-18 10:58:05 -0500100 {
Ed Tanous62598e32023-07-17 17:06:25 -0700101 BMCWEB_LOG_DEBUG("interface = {}", interface.first);
Andrew Geissler86adcd62019-04-18 10:58:05 -0500102
103 if (interface.first == "xyz.openbmc_project.Software.Activation")
104 {
Andrew Geissler86adcd62019-04-18 10:58:05 -0500105 // Retrieve service and activate
George Liu2b731192023-01-11 16:27:13 +0800106 constexpr std::array<std::string_view, 1> interfaces = {
107 "xyz.openbmc_project.Software.Activation"};
108 dbus::utility::getDbusObject(
109 objPath.str, interfaces,
Ed Tanousa3e65892021-09-16 14:13:20 -0700110 [objPath, asyncResp, payload(std::move(payload))](
Ed Tanous8b242752023-06-27 17:17:13 -0700111 const boost::system::error_code& ec,
Ed Tanousa3e65892021-09-16 14:13:20 -0700112 const std::vector<
113 std::pair<std::string, std::vector<std::string>>>&
114 objInfo) mutable {
Ed Tanous8b242752023-06-27 17:17:13 -0700115 if (ec)
Ed Tanous002d39b2022-05-31 08:59:27 -0700116 {
Ed Tanous62598e32023-07-17 17:06:25 -0700117 BMCWEB_LOG_DEBUG("error_code = {}", ec);
118 BMCWEB_LOG_DEBUG("error msg = {}", ec.message());
Andrew Geissler0554c982019-04-23 14:40:12 -0500119 if (asyncResp)
120 {
Ed Tanous002d39b2022-05-31 08:59:27 -0700121 messages::internalError(asyncResp->res);
122 }
123 cleanUp();
124 return;
125 }
126 // Ensure we only got one service back
127 if (objInfo.size() != 1)
128 {
Ed Tanous62598e32023-07-17 17:06:25 -0700129 BMCWEB_LOG_ERROR("Invalid Object Size {}", objInfo.size());
Ed Tanous002d39b2022-05-31 08:59:27 -0700130 if (asyncResp)
131 {
132 messages::internalError(asyncResp->res);
133 }
134 cleanUp();
135 return;
136 }
137 // cancel timer only when
138 // xyz.openbmc_project.Software.Activation interface
139 // is added
140 fwAvailableTimer = nullptr;
141
142 activateImage(objPath.str, objInfo[0].first);
143 if (asyncResp)
144 {
145 std::shared_ptr<task::TaskData> task =
146 task::TaskData::createTask(
Ed Tanous8b242752023-06-27 17:17:13 -0700147 [](const boost::system::error_code& ec2,
Patrick Williams59d494e2022-07-22 19:26:55 -0500148 sdbusplus::message_t& msg,
Ed Tanous002d39b2022-05-31 08:59:27 -0700149 const std::shared_ptr<task::TaskData>&
150 taskData) {
Ed Tanous8b242752023-06-27 17:17:13 -0700151 if (ec2)
Ed Tanous002d39b2022-05-31 08:59:27 -0700152 {
153 return task::completed;
154 }
155
156 std::string iface;
157 dbus::utility::DBusPropertiesMap values;
158
159 std::string index = std::to_string(taskData->index);
160 msg.read(iface, values);
161
162 if (iface == "xyz.openbmc_project.Software.Activation")
163 {
Gayathri Leburu0fb5b502022-11-17 04:51:55 +0000164 const std::string* state = nullptr;
Ed Tanous002d39b2022-05-31 08:59:27 -0700165 for (const auto& property : values)
166 {
167 if (property.first == "Activation")
168 {
Gayathri Leburu0fb5b502022-11-17 04:51:55 +0000169 state = std::get_if<std::string>(
170 &property.second);
171 if (state == nullptr)
James Feist32898ce2020-03-10 16:16:52 -0700172 {
Ed Tanous002d39b2022-05-31 08:59:27 -0700173 taskData->messages.emplace_back(
174 messages::internalError());
James Feist32898ce2020-03-10 16:16:52 -0700175 return task::completed;
176 }
Ed Tanous002d39b2022-05-31 08:59:27 -0700177 }
178 }
James Feist32898ce2020-03-10 16:16:52 -0700179
Ed Tanous002d39b2022-05-31 08:59:27 -0700180 if (state == nullptr)
181 {
182 return !task::completed;
183 }
James Feist32898ce2020-03-10 16:16:52 -0700184
Ed Tanous11ba3972022-07-11 09:50:41 -0700185 if (state->ends_with("Invalid") ||
186 state->ends_with("Failed"))
Ed Tanous002d39b2022-05-31 08:59:27 -0700187 {
188 taskData->state = "Exception";
189 taskData->status = "Warning";
190 taskData->messages.emplace_back(
191 messages::taskAborted(index));
192 return task::completed;
193 }
James Feiste5d50062020-05-11 17:29:00 -0700194
Ed Tanous11ba3972022-07-11 09:50:41 -0700195 if (state->ends_with("Staged"))
Ed Tanous002d39b2022-05-31 08:59:27 -0700196 {
197 taskData->state = "Stopping";
198 taskData->messages.emplace_back(
199 messages::taskPaused(index));
200
201 // its staged, set a long timer to
202 // allow them time to complete the
203 // update (probably cycle the
204 // system) if this expires then
Ed Tanous8ece0e42024-01-02 13:16:50 -0800205 // task will be canceled
Ed Tanous002d39b2022-05-31 08:59:27 -0700206 taskData->extendTimer(std::chrono::hours(5));
207 return !task::completed;
208 }
209
Ed Tanous11ba3972022-07-11 09:50:41 -0700210 if (state->ends_with("Active"))
Ed Tanous002d39b2022-05-31 08:59:27 -0700211 {
212 taskData->messages.emplace_back(
213 messages::taskCompletedOK(index));
214 taskData->state = "Completed";
215 return task::completed;
216 }
217 }
218 else if (
219 iface ==
220 "xyz.openbmc_project.Software.ActivationProgress")
221 {
Ed Tanous002d39b2022-05-31 08:59:27 -0700222 const uint8_t* progress = nullptr;
223 for (const auto& property : values)
224 {
225 if (property.first == "Progress")
226 {
Gayathri Leburu0fb5b502022-11-17 04:51:55 +0000227 progress =
228 std::get_if<uint8_t>(&property.second);
229 if (progress == nullptr)
James Feist32898ce2020-03-10 16:16:52 -0700230 {
James Feist32898ce2020-03-10 16:16:52 -0700231 taskData->messages.emplace_back(
Ed Tanous002d39b2022-05-31 08:59:27 -0700232 messages::internalError());
233 return task::completed;
James Feist32898ce2020-03-10 16:16:52 -0700234 }
Ed Tanous002d39b2022-05-31 08:59:27 -0700235 }
236 }
James Feist32898ce2020-03-10 16:16:52 -0700237
Ed Tanous002d39b2022-05-31 08:59:27 -0700238 if (progress == nullptr)
239 {
240 return !task::completed;
241 }
Gayathri Leburu0fb5b502022-11-17 04:51:55 +0000242 taskData->percentComplete = *progress;
Ed Tanous002d39b2022-05-31 08:59:27 -0700243 taskData->messages.emplace_back(
Gayathri Leburu0fb5b502022-11-17 04:51:55 +0000244 messages::taskProgressChanged(index,
245 *progress));
James Feist32898ce2020-03-10 16:16:52 -0700246
Ed Tanous002d39b2022-05-31 08:59:27 -0700247 // if we're getting status updates it's
248 // still alive, update timer
249 taskData->extendTimer(std::chrono::minutes(5));
250 }
251
252 // as firmware update often results in a
253 // reboot, the task may never "complete"
254 // unless it is an error
255
256 return !task::completed;
Patrick Williams5a39f772023-10-20 11:20:21 -0500257 },
Ed Tanous002d39b2022-05-31 08:59:27 -0700258 "type='signal',interface='org.freedesktop.DBus.Properties',"
259 "member='PropertiesChanged',path='" +
260 objPath.str + "'");
261 task->startTimer(std::chrono::minutes(5));
262 task->populateResp(asyncResp->res);
263 task->payload.emplace(std::move(payload));
264 }
265 fwUpdateInProgress = false;
Patrick Williams5a39f772023-10-20 11:20:21 -0500266 });
Patrick Williams62bafc02022-09-08 17:35:35 -0500267
268 break;
Andrew Geissler86adcd62019-04-18 10:58:05 -0500269 }
270 }
271}
272
Myung Bae8549b952023-08-16 15:18:19 -0400273inline void afterAvailbleTimerAsyncWait(
274 const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
275 const boost::system::error_code& ec)
276{
277 cleanUp();
278 if (ec == boost::asio::error::operation_aborted)
279 {
280 // expected, we were canceled before the timer completed.
281 return;
282 }
283 BMCWEB_LOG_ERROR("Timed out waiting for firmware object being created");
284 BMCWEB_LOG_ERROR("FW image may has already been uploaded to server");
285 if (ec)
286 {
287 BMCWEB_LOG_ERROR("Async_wait failed{}", ec);
288 return;
289 }
290 if (asyncResp)
291 {
292 redfish::messages::internalError(asyncResp->res);
293 }
294}
295
296inline void
297 handleUpdateErrorType(const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
298 const std::string& url, const std::string& type)
299{
300 if (type == "xyz.openbmc_project.Software.Image.Error.UnTarFailure")
301 {
302 redfish::messages::invalidUpload(asyncResp->res, url,
303 "Invalid archive");
304 }
305 else if (type ==
306 "xyz.openbmc_project.Software.Image.Error.ManifestFileFailure")
307 {
308 redfish::messages::invalidUpload(asyncResp->res, url,
309 "Invalid manifest");
310 }
311 else if (type == "xyz.openbmc_project.Software.Image.Error.ImageFailure")
312 {
313 redfish::messages::invalidUpload(asyncResp->res, url,
314 "Invalid image format");
315 }
316 else if (type == "xyz.openbmc_project.Software.Version.Error.AlreadyExists")
317 {
318 redfish::messages::invalidUpload(asyncResp->res, url,
319 "Image version already exists");
320
321 redfish::messages::resourceAlreadyExists(
322 asyncResp->res, "UpdateService", "Version", "uploaded version");
323 }
324 else if (type == "xyz.openbmc_project.Software.Image.Error.BusyFailure")
325 {
326 redfish::messages::resourceExhaustion(asyncResp->res, url);
327 }
Myung Bae4034a652023-08-17 08:47:35 -0400328 else if (type == "xyz.openbmc_project.Software.Version.Error.Incompatible")
Myung Bae8549b952023-08-16 15:18:19 -0400329 {
Myung Bae4034a652023-08-17 08:47:35 -0400330 redfish::messages::invalidUpload(asyncResp->res, url,
331 "Incompatible image version");
332 }
333 else if (type ==
334 "xyz.openbmc_project.Software.Version.Error.ExpiredAccessKey")
335 {
336 redfish::messages::invalidUpload(asyncResp->res, url,
337 "Update Access Key Expired");
338 }
339 else if (type ==
340 "xyz.openbmc_project.Software.Version.Error.InvalidSignature")
341 {
342 redfish::messages::invalidUpload(asyncResp->res, url,
343 "Invalid image signature");
344 }
345 else if (type ==
346 "xyz.openbmc_project.Software.Image.Error.InternalFailure" ||
347 type == "xyz.openbmc_project.Software.Version.Error.HostFile")
348 {
349 BMCWEB_LOG_ERROR("Software Image Error type={}", type);
Myung Bae8549b952023-08-16 15:18:19 -0400350 redfish::messages::internalError(asyncResp->res);
351 }
Myung Bae4034a652023-08-17 08:47:35 -0400352 else
353 {
354 // Unrelated error types. Ignored
355 BMCWEB_LOG_INFO("Non-Software-related Error type={}. Ignored", type);
356 return;
357 }
358 // Clear the timer
359 fwAvailableTimer = nullptr;
Myung Bae8549b952023-08-16 15:18:19 -0400360}
361
362inline void
363 afterUpdateErrorMatcher(const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
364 const std::string& url, sdbusplus::message_t& m)
365{
Michael Shen80f79a42023-08-24 13:41:53 +0000366 dbus::utility::DBusInterfacesMap interfacesProperties;
Myung Bae8549b952023-08-16 15:18:19 -0400367 sdbusplus::message::object_path objPath;
368 m.read(objPath, interfacesProperties);
369 BMCWEB_LOG_DEBUG("obj path = {}", objPath.str);
370 for (const std::pair<std::string, dbus::utility::DBusPropertiesMap>&
371 interface : interfacesProperties)
372 {
373 if (interface.first == "xyz.openbmc_project.Logging.Entry")
374 {
375 for (const std::pair<std::string, dbus::utility::DbusVariantType>&
376 value : interface.second)
377 {
378 if (value.first != "Message")
379 {
380 continue;
381 }
382 const std::string* type =
383 std::get_if<std::string>(&value.second);
384 if (type == nullptr)
385 {
386 // if this was our message, timeout will cover it
387 return;
388 }
Myung Bae8549b952023-08-16 15:18:19 -0400389 handleUpdateErrorType(asyncResp, url, *type);
390 }
391 }
392 }
393}
394
Andrew Geissler0554c982019-04-23 14:40:12 -0500395// Note that asyncResp can be either a valid pointer or nullptr. If nullptr
396// then no asyncResp updates will occur
Ed Tanousf5139332024-04-03 13:25:04 -0700397inline void monitorForSoftwareAvailable(
zhanghch058d1b46d2021-04-01 11:18:24 +0800398 const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
399 const crow::Request& req, const std::string& url,
Gunnar Mills5d138942022-09-07 10:26:21 -0500400 int timeoutTimeSeconds = 25)
Andrew Geissler86adcd62019-04-18 10:58:05 -0500401{
402 // Only allow one FW update at a time
Ed Tanouse05aec52022-01-25 10:28:56 -0800403 if (fwUpdateInProgress)
Andrew Geissler86adcd62019-04-18 10:58:05 -0500404 {
Andrew Geissler0554c982019-04-23 14:40:12 -0500405 if (asyncResp)
406 {
Andrew Geissler0554c982019-04-23 14:40:12 -0500407 messages::serviceTemporarilyUnavailable(asyncResp->res, "30");
408 }
Andrew Geissler86adcd62019-04-18 10:58:05 -0500409 return;
410 }
411
Ed Tanous8e8245d2024-04-11 22:21:38 -0700412 if (req.ioService == nullptr)
413 {
414 messages::internalError(asyncResp->res);
415 return;
416 }
417
Andrew Geissler0554c982019-04-23 14:40:12 -0500418 fwAvailableTimer =
Ed Tanous271584a2019-07-09 16:24:22 -0700419 std::make_unique<boost::asio::steady_timer>(*req.ioService);
Andrew Geissler86adcd62019-04-18 10:58:05 -0500420
Ed Tanous271584a2019-07-09 16:24:22 -0700421 fwAvailableTimer->expires_after(std::chrono::seconds(timeoutTimeSeconds));
Andrew Geissler86adcd62019-04-18 10:58:05 -0500422
423 fwAvailableTimer->async_wait(
Myung Bae8549b952023-08-16 15:18:19 -0400424 std::bind_front(afterAvailbleTimerAsyncWait, asyncResp));
425
Ed Tanousa3e65892021-09-16 14:13:20 -0700426 task::Payload payload(req);
Patrick Williams59d494e2022-07-22 19:26:55 -0500427 auto callback = [asyncResp, payload](sdbusplus::message_t& m) mutable {
Ed Tanous62598e32023-07-17 17:06:25 -0700428 BMCWEB_LOG_DEBUG("Match fired");
Ed Tanousa3e65892021-09-16 14:13:20 -0700429 softwareInterfaceAdded(asyncResp, m, std::move(payload));
Andrew Geissler86adcd62019-04-18 10:58:05 -0500430 };
431
432 fwUpdateInProgress = true;
433
Patrick Williams59d494e2022-07-22 19:26:55 -0500434 fwUpdateMatcher = std::make_unique<sdbusplus::bus::match_t>(
Andrew Geissler86adcd62019-04-18 10:58:05 -0500435 *crow::connections::systemBus,
436 "interface='org.freedesktop.DBus.ObjectManager',type='signal',"
437 "member='InterfacesAdded',path='/xyz/openbmc_project/software'",
438 callback);
James Feist4cde5d92020-06-11 10:39:55 -0700439
Patrick Williams59d494e2022-07-22 19:26:55 -0500440 fwUpdateErrorMatcher = std::make_unique<sdbusplus::bus::match_t>(
James Feist4cde5d92020-06-11 10:39:55 -0700441 *crow::connections::systemBus,
Brian Mae1cc4822021-12-01 17:05:54 +0800442 "interface='org.freedesktop.DBus.ObjectManager',type='signal',"
443 "member='InterfacesAdded',"
444 "path='/xyz/openbmc_project/logging'",
Myung Bae8549b952023-08-16 15:18:19 -0400445 std::bind_front(afterUpdateErrorMatcher, asyncResp, url));
Andrew Geissler86adcd62019-04-18 10:58:05 -0500446}
Jennifer Lee729dae72018-04-24 15:59:34 -0700447
Ed Tanous757178a2024-04-03 14:32:38 -0700448inline std::optional<boost::urls::url>
449 parseSimpleUpdateUrl(std::string imageURI,
450 std::optional<std::string> transferProtocol,
451 crow::Response& res)
Ed Tanousf86bcc82023-08-25 09:34:07 -0700452{
453 if (imageURI.find("://") == std::string::npos)
454 {
455 if (imageURI.starts_with("/"))
456 {
457 messages::actionParameterValueTypeError(
458 res, imageURI, "ImageURI", "UpdateService.SimpleUpdate");
459 return std::nullopt;
460 }
461 if (!transferProtocol)
462 {
463 messages::actionParameterValueTypeError(
464 res, imageURI, "ImageURI", "UpdateService.SimpleUpdate");
465 return std::nullopt;
466 }
Ed Tanouse5cf7772024-04-03 13:45:31 -0700467 // OpenBMC currently only supports TFTP or HTTPS
Ed Tanous757178a2024-04-03 14:32:38 -0700468 if (*transferProtocol == "TFTP")
469 {
470 imageURI = "tftp://" + imageURI;
471 }
Ed Tanouse5cf7772024-04-03 13:45:31 -0700472 else if (*transferProtocol == "HTTPS")
473 {
474 imageURI = "https://" + imageURI;
475 }
Ed Tanous757178a2024-04-03 14:32:38 -0700476 else
Ed Tanousf86bcc82023-08-25 09:34:07 -0700477 {
478 messages::actionParameterNotSupported(res, "TransferProtocol",
479 *transferProtocol);
480 BMCWEB_LOG_ERROR("Request incorrect protocol parameter: {}",
481 *transferProtocol);
482 return std::nullopt;
483 }
Ed Tanousf86bcc82023-08-25 09:34:07 -0700484 }
485
486 boost::system::result<boost::urls::url> url =
487 boost::urls::parse_absolute_uri(imageURI);
488 if (!url)
489 {
490 messages::actionParameterValueTypeError(res, imageURI, "ImageURI",
491 "UpdateService.SimpleUpdate");
492
493 return std::nullopt;
494 }
495 url->normalize();
496
Ed Tanous757178a2024-04-03 14:32:38 -0700497 if (url->scheme() == "tftp")
498 {
499 if (url->encoded_path().size() < 2)
500 {
501 messages::actionParameterNotSupported(res, "ImageURI",
502 url->buffer());
503 return std::nullopt;
504 }
505 }
Ed Tanouse5cf7772024-04-03 13:45:31 -0700506 else if (url->scheme() == "https")
507 {
508 // Empty paths default to "/"
509 if (url->encoded_path().empty())
510 {
511 url->set_encoded_path("/");
512 }
513 }
Ed Tanous757178a2024-04-03 14:32:38 -0700514 else
Ed Tanousf86bcc82023-08-25 09:34:07 -0700515 {
516 messages::actionParameterNotSupported(res, "ImageURI", imageURI);
517 return std::nullopt;
518 }
Ed Tanous757178a2024-04-03 14:32:38 -0700519
520 if (url->encoded_path().empty())
Ed Tanousf86bcc82023-08-25 09:34:07 -0700521 {
Ed Tanous757178a2024-04-03 14:32:38 -0700522 messages::actionParameterValueTypeError(res, imageURI, "ImageURI",
523 "UpdateService.SimpleUpdate");
Ed Tanousf86bcc82023-08-25 09:34:07 -0700524 return std::nullopt;
525 }
Ed Tanous757178a2024-04-03 14:32:38 -0700526
527 return *url;
Ed Tanousf86bcc82023-08-25 09:34:07 -0700528}
529
Ed Tanouse5cf7772024-04-03 13:45:31 -0700530inline void doHttpsUpdate(const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
531 const boost::urls::url_view_base& url)
532{
533 messages::actionParameterNotSupported(asyncResp->res, "ImageURI",
534 url.buffer());
535}
536
Ed Tanous6b0f66b2024-04-03 13:38:21 -0700537inline void doTftpUpdate(const crow::Request& req,
538 const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
Ed Tanous757178a2024-04-03 14:32:38 -0700539 const boost::urls::url_view_base& url)
Ed Tanous6b0f66b2024-04-03 13:38:21 -0700540{
541#ifndef BMCWEB_INSECURE_ENABLE_REDFISH_FW_TFTP_UPDATE
542 messages::actionParameterNotSupported(asyncResp->res, "ImageURI",
Ed Tanous757178a2024-04-03 14:32:38 -0700543 url.buffer());
Ed Tanous6b0f66b2024-04-03 13:38:21 -0700544 return;
545#endif
Ed Tanous757178a2024-04-03 14:32:38 -0700546
547 std::string path(url.encoded_path());
548 if (path.size() < 2)
549 {
550 messages::actionParameterNotSupported(asyncResp->res, "ImageURI",
551 url.buffer());
552 return;
553 }
554 // TFTP expects a path without a /
555 path.erase(0, 1);
556 std::string host(url.encoded_host_and_port());
557 BMCWEB_LOG_DEBUG("Server: {} File: {}", host, path);
Ed Tanous6b0f66b2024-04-03 13:38:21 -0700558
559 // Setup callback for when new software detected
560 // Give TFTP 10 minutes to complete
561 monitorForSoftwareAvailable(
562 asyncResp, req,
563 "/redfish/v1/UpdateService/Actions/UpdateService.SimpleUpdate", 600);
564
565 // TFTP can take up to 10 minutes depending on image size and
566 // connection speed. Return to caller as soon as the TFTP operation
567 // has been started. The callback above will ensure the activate
568 // is started once the download has completed
569 redfish::messages::success(asyncResp->res);
570
571 // Call TFTP service
572 crow::connections::systemBus->async_method_call(
573 [](const boost::system::error_code& ec) {
574 if (ec)
575 {
576 // messages::internalError(asyncResp->res);
577 cleanUp();
578 BMCWEB_LOG_DEBUG("error_code = {}", ec);
579 BMCWEB_LOG_DEBUG("error msg = {}", ec.message());
580 }
581 else
582 {
583 BMCWEB_LOG_DEBUG("Call to DownloaViaTFTP Success");
584 }
585 },
586 "xyz.openbmc_project.Software.Download",
587 "/xyz/openbmc_project/software", "xyz.openbmc_project.Common.TFTP",
Ed Tanous757178a2024-04-03 14:32:38 -0700588 "DownloadViaTFTP", path, host);
Ed Tanous6b0f66b2024-04-03 13:38:21 -0700589}
590
Ed Tanousf5139332024-04-03 13:25:04 -0700591inline void handleUpdateServiceSimpleUpdateAction(
592 crow::App& app, const crow::Request& req,
593 const std::shared_ptr<bmcweb::AsyncResp>& asyncResp)
Andrew Geissler0554c982019-04-23 14:40:12 -0500594{
Ed Tanousf5139332024-04-03 13:25:04 -0700595 if (!redfish::setUpRedfishRoute(app, req, asyncResp))
596 {
597 return;
598 }
599
600 std::optional<std::string> transferProtocol;
601 std::string imageURI;
602
603 BMCWEB_LOG_DEBUG("Enter UpdateService.SimpleUpdate doPost");
604
605 // User can pass in both TransferProtocol and ImageURI parameters or
606 // they can pass in just the ImageURI with the transfer protocol
607 // embedded within it.
608 // 1) TransferProtocol:TFTP ImageURI:1.1.1.1/myfile.bin
609 // 2) ImageURI:tftp://1.1.1.1/myfile.bin
610
611 if (!json_util::readJsonAction(req, asyncResp->res, "TransferProtocol",
612 transferProtocol, "ImageURI", imageURI))
613 {
614 BMCWEB_LOG_DEBUG("Missing TransferProtocol or ImageURI parameter");
615 return;
616 }
617
Ed Tanous757178a2024-04-03 14:32:38 -0700618 std::optional<boost::urls::url> url =
619 parseSimpleUpdateUrl(imageURI, transferProtocol, asyncResp->res);
620 if (!url)
Ed Tanousf5139332024-04-03 13:25:04 -0700621 {
622 return;
623 }
Ed Tanous757178a2024-04-03 14:32:38 -0700624 if (url->scheme() == "tftp")
625 {
626 doTftpUpdate(req, asyncResp, *url);
627 }
Ed Tanouse5cf7772024-04-03 13:45:31 -0700628 else if (url->scheme() == "https")
629 {
630 doHttpsUpdate(asyncResp, *url);
631 }
Ed Tanous757178a2024-04-03 14:32:38 -0700632 else
633 {
634 messages::actionParameterNotSupported(asyncResp->res, "ImageURI",
635 url->buffer());
636 return;
637 }
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700638
Ed Tanousf5139332024-04-03 13:25:04 -0700639 BMCWEB_LOG_DEBUG("Exit UpdateService.SimpleUpdate doPost");
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700640}
641
George Liu0ed80c82020-05-12 16:06:27 +0800642inline void uploadImageFile(crow::Response& res, std::string_view body)
643{
Ed Tanous2c6ffdb2023-06-28 11:28:38 -0700644 std::filesystem::path filepath("/tmp/images/" + bmcweb::getRandomUUID());
645
Ed Tanous62598e32023-07-17 17:06:25 -0700646 BMCWEB_LOG_DEBUG("Writing file to {}", filepath.string());
George Liu0ed80c82020-05-12 16:06:27 +0800647 std::ofstream out(filepath, std::ofstream::out | std::ofstream::binary |
648 std::ofstream::trunc);
649 // set the permission of the file to 640
Patrick Williams89492a12023-05-10 07:51:34 -0500650 std::filesystem::perms permission = std::filesystem::perms::owner_read |
651 std::filesystem::perms::group_read;
George Liu0ed80c82020-05-12 16:06:27 +0800652 std::filesystem::permissions(filepath, permission);
653 out << body;
654
655 if (out.bad())
656 {
657 messages::internalError(res);
658 cleanUp();
659 }
660}
661
662inline void setApplyTime(const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
663 const std::string& applyTime)
664{
665 std::string applyTimeNewVal;
666 if (applyTime == "Immediate")
667 {
668 applyTimeNewVal =
669 "xyz.openbmc_project.Software.ApplyTime.RequestedApplyTimes.Immediate";
670 }
671 else if (applyTime == "OnReset")
672 {
673 applyTimeNewVal =
674 "xyz.openbmc_project.Software.ApplyTime.RequestedApplyTimes.OnReset";
675 }
676 else
677 {
Ed Tanous62598e32023-07-17 17:06:25 -0700678 BMCWEB_LOG_INFO(
679 "ApplyTime value is not in the list of acceptable values");
George Liu0ed80c82020-05-12 16:06:27 +0800680 messages::propertyValueNotInList(asyncResp->res, applyTime,
681 "ApplyTime");
682 return;
683 }
684
Ed Tanousd02aad32024-02-13 14:43:34 -0800685 setDbusProperty(asyncResp, "xyz.openbmc_project.Settings",
686 sdbusplus::message::object_path(
687 "/xyz/openbmc_project/software/apply_time"),
688 "xyz.openbmc_project.Software.ApplyTime",
689 "RequestedApplyTime", "ApplyTime", applyTimeNewVal);
George Liu0ed80c82020-05-12 16:06:27 +0800690}
691
692inline void
693 updateMultipartContext(const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
Ed Tanous6b54e4e2024-04-10 08:58:48 -0700694 const crow::Request& req,
George Liu0ed80c82020-05-12 16:06:27 +0800695 const MultipartParser& parser)
696{
697 const std::string* uploadData = nullptr;
698 std::optional<std::string> applyTime = "OnReset";
699 bool targetFound = false;
700 for (const FormPart& formpart : parser.mime_fields)
701 {
702 boost::beast::http::fields::const_iterator it =
703 formpart.fields.find("Content-Disposition");
704 if (it == formpart.fields.end())
705 {
Ed Tanous62598e32023-07-17 17:06:25 -0700706 BMCWEB_LOG_ERROR("Couldn't find Content-Disposition");
George Liu0ed80c82020-05-12 16:06:27 +0800707 return;
708 }
Ed Tanous62598e32023-07-17 17:06:25 -0700709 BMCWEB_LOG_INFO("Parsing value {}", it->value());
George Liu0ed80c82020-05-12 16:06:27 +0800710
711 // The construction parameters of param_list must start with `;`
712 size_t index = it->value().find(';');
713 if (index == std::string::npos)
714 {
715 continue;
716 }
717
Patrick Williams89492a12023-05-10 07:51:34 -0500718 for (const auto& param :
George Liu0ed80c82020-05-12 16:06:27 +0800719 boost::beast::http::param_list{it->value().substr(index)})
720 {
721 if (param.first != "name" || param.second.empty())
722 {
723 continue;
724 }
725
726 if (param.second == "UpdateParameters")
727 {
728 std::vector<std::string> targets;
729 nlohmann::json content =
730 nlohmann::json::parse(formpart.content);
Ed Tanous7cb59f62022-05-05 11:48:31 -0700731 nlohmann::json::object_t* obj =
732 content.get_ptr<nlohmann::json::object_t*>();
733 if (obj == nullptr)
734 {
735 messages::propertyValueFormatError(asyncResp->res, targets,
736 "UpdateParameters");
737 return;
738 }
739
740 if (!json_util::readJsonObject(
741 *obj, asyncResp->res, "Targets", targets,
742 "@Redfish.OperationApplyTime", applyTime))
George Liu0ed80c82020-05-12 16:06:27 +0800743 {
744 return;
745 }
746 if (targets.size() != 1)
747 {
Ed Tanous7cb59f62022-05-05 11:48:31 -0700748 messages::propertyValueFormatError(asyncResp->res, targets,
749 "Targets");
George Liu0ed80c82020-05-12 16:06:27 +0800750 return;
751 }
752 if (targets[0] != "/redfish/v1/Managers/bmc")
753 {
Ed Tanous7cb59f62022-05-05 11:48:31 -0700754 messages::propertyValueNotInList(asyncResp->res, targets[0],
755 "Targets/0");
George Liu0ed80c82020-05-12 16:06:27 +0800756 return;
757 }
758 targetFound = true;
759 }
760 else if (param.second == "UpdateFile")
761 {
762 uploadData = &(formpart.content);
763 }
764 }
765 }
766
767 if (uploadData == nullptr)
768 {
Ed Tanous62598e32023-07-17 17:06:25 -0700769 BMCWEB_LOG_ERROR("Upload data is NULL");
George Liu0ed80c82020-05-12 16:06:27 +0800770 messages::propertyMissing(asyncResp->res, "UpdateFile");
771 return;
772 }
773 if (!targetFound)
774 {
775 messages::propertyMissing(asyncResp->res, "targets");
776 return;
777 }
778
779 setApplyTime(asyncResp, *applyTime);
780
Ed Tanous6b54e4e2024-04-10 08:58:48 -0700781 // Setup callback for when new software detected
782 monitorForSoftwareAvailable(asyncResp, req, "/redfish/v1/UpdateService");
783
George Liu0ed80c82020-05-12 16:06:27 +0800784 uploadImageFile(asyncResp->res, *uploadData);
785}
786
Ed Tanousc2051d12022-05-11 12:21:55 -0700787inline void
788 handleUpdateServicePost(App& app, const crow::Request& req,
789 const std::shared_ptr<bmcweb::AsyncResp>& asyncResp)
790{
Carson Labrado3ba00072022-06-06 19:40:56 +0000791 if (!redfish::setUpRedfishRoute(app, req, asyncResp))
Ed Tanousc2051d12022-05-11 12:21:55 -0700792 {
793 return;
794 }
Ninad Palsuleb33a4322023-06-09 09:19:18 -0500795 std::string_view contentType = req.getHeaderValue("Content-Type");
Ed Tanousc2051d12022-05-11 12:21:55 -0700796
Ed Tanous62598e32023-07-17 17:06:25 -0700797 BMCWEB_LOG_DEBUG("doPost: contentType={}", contentType);
Ed Tanousc2051d12022-05-11 12:21:55 -0700798
Ninad Palsuleb33a4322023-06-09 09:19:18 -0500799 // Make sure that content type is application/octet-stream or
800 // multipart/form-data
Ed Tanous18f8f602023-07-18 10:07:23 -0700801 if (bmcweb::asciiIEquals(contentType, "application/octet-stream"))
George Liu0ed80c82020-05-12 16:06:27 +0800802 {
Ninad Palsuleb33a4322023-06-09 09:19:18 -0500803 // Setup callback for when new software detected
804 monitorForSoftwareAvailable(asyncResp, req,
805 "/redfish/v1/UpdateService");
806
George Liu0ed80c82020-05-12 16:06:27 +0800807 uploadImageFile(asyncResp->res, req.body());
George Liu0ed80c82020-05-12 16:06:27 +0800808 }
Ninad Palsuleb33a4322023-06-09 09:19:18 -0500809 else if (contentType.starts_with("multipart/form-data"))
George Liu0ed80c82020-05-12 16:06:27 +0800810 {
Ninad Palsuleb33a4322023-06-09 09:19:18 -0500811 MultipartParser parser;
812
Ninad Palsuleb33a4322023-06-09 09:19:18 -0500813 ParserError ec = parser.parse(req);
814 if (ec != ParserError::PARSER_SUCCESS)
815 {
816 // handle error
Ed Tanous62598e32023-07-17 17:06:25 -0700817 BMCWEB_LOG_ERROR("MIME parse failed, ec : {}",
818 static_cast<int>(ec));
Ninad Palsuleb33a4322023-06-09 09:19:18 -0500819 messages::internalError(asyncResp->res);
820 return;
821 }
Ed Tanous6b54e4e2024-04-10 08:58:48 -0700822
823 updateMultipartContext(asyncResp, req, parser);
George Liu0ed80c82020-05-12 16:06:27 +0800824 }
Ninad Palsuleb33a4322023-06-09 09:19:18 -0500825 else
826 {
Ed Tanous62598e32023-07-17 17:06:25 -0700827 BMCWEB_LOG_DEBUG("Bad content type specified:{}", contentType);
Ninad Palsuleb33a4322023-06-09 09:19:18 -0500828 asyncResp->res.result(boost::beast::http::status::bad_request);
829 }
Ed Tanousc2051d12022-05-11 12:21:55 -0700830}
831
Ed Tanousf5139332024-04-03 13:25:04 -0700832inline void
833 handleUpdateServiceGet(App& app, const crow::Request& req,
834 const std::shared_ptr<bmcweb::AsyncResp>& asyncResp)
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700835{
Ed Tanousf5139332024-04-03 13:25:04 -0700836 if (!redfish::setUpRedfishRoute(app, req, asyncResp))
837 {
838 return;
839 }
840 asyncResp->res.jsonValue["@odata.type"] =
841 "#UpdateService.v1_11_1.UpdateService";
842 asyncResp->res.jsonValue["@odata.id"] = "/redfish/v1/UpdateService";
843 asyncResp->res.jsonValue["Id"] = "UpdateService";
844 asyncResp->res.jsonValue["Description"] = "Service for Software Update";
845 asyncResp->res.jsonValue["Name"] = "Update Service";
Ed Tanous4dc23f32022-05-11 11:32:19 -0700846
Ed Tanousf5139332024-04-03 13:25:04 -0700847 asyncResp->res.jsonValue["HttpPushUri"] =
848 "/redfish/v1/UpdateService/update";
849 asyncResp->res.jsonValue["MultipartHttpPushUri"] =
850 "/redfish/v1/UpdateService/update";
Ed Tanous4dc23f32022-05-11 11:32:19 -0700851
Ed Tanousf5139332024-04-03 13:25:04 -0700852 // UpdateService cannot be disabled
853 asyncResp->res.jsonValue["ServiceEnabled"] = true;
854 asyncResp->res.jsonValue["FirmwareInventory"]["@odata.id"] =
855 "/redfish/v1/UpdateService/FirmwareInventory";
856 // Get the MaxImageSizeBytes
Ed Tanous25b54db2024-04-17 15:40:31 -0700857 asyncResp->res.jsonValue["MaxImageSizeBytes"] = BMCWEB_HTTP_BODY_LIMIT *
Ed Tanousf5139332024-04-03 13:25:04 -0700858 1024 * 1024;
Tejas Patild61e5192021-06-04 15:49:35 +0530859
Ed Tanousf5139332024-04-03 13:25:04 -0700860 // Update Actions object.
861 nlohmann::json& updateSvcSimpleUpdate =
862 asyncResp->res.jsonValue["Actions"]["#UpdateService.SimpleUpdate"];
863 updateSvcSimpleUpdate["target"] =
864 "/redfish/v1/UpdateService/Actions/UpdateService.SimpleUpdate";
Ed Tanous757178a2024-04-03 14:32:38 -0700865
866 nlohmann::json::array_t allowed;
Ed Tanouse5cf7772024-04-03 13:45:31 -0700867 allowed.emplace_back(update_service::TransferProtocolType::HTTPS);
Ed Tanous757178a2024-04-03 14:32:38 -0700868
Ed Tanous25b54db2024-04-17 15:40:31 -0700869 if constexpr (BMCWEB_INSECURE_PUSH_STYLE_NOTIFICATION)
870 {
871 allowed.emplace_back(update_service::TransferProtocolType::TFTP);
872 }
Ed Tanous757178a2024-04-03 14:32:38 -0700873
874 updateSvcSimpleUpdate["TransferProtocol@Redfish.AllowableValues"] =
875 std::move(allowed);
876
Ed Tanousf5139332024-04-03 13:25:04 -0700877 // Get the current ApplyTime value
878 sdbusplus::asio::getProperty<std::string>(
879 *crow::connections::systemBus, "xyz.openbmc_project.Settings",
880 "/xyz/openbmc_project/software/apply_time",
881 "xyz.openbmc_project.Software.ApplyTime", "RequestedApplyTime",
882 [asyncResp](const boost::system::error_code& ec,
883 const std::string& applyTime) {
884 if (ec)
Ed Tanous002d39b2022-05-31 08:59:27 -0700885 {
Ed Tanousf5139332024-04-03 13:25:04 -0700886 BMCWEB_LOG_DEBUG("DBUS response error {}", ec);
887 messages::internalError(asyncResp->res);
Ed Tanous002d39b2022-05-31 08:59:27 -0700888 return;
889 }
890
Ed Tanousf5139332024-04-03 13:25:04 -0700891 // Store the ApplyTime Value
892 if (applyTime == "xyz.openbmc_project.Software.ApplyTime."
893 "RequestedApplyTimes.Immediate")
Ed Tanous002d39b2022-05-31 08:59:27 -0700894 {
Ed Tanousf5139332024-04-03 13:25:04 -0700895 asyncResp->res.jsonValue["HttpPushUriOptions"]
896 ["HttpPushUriApplyTime"]["ApplyTime"] =
897 "Immediate";
898 }
899 else if (applyTime == "xyz.openbmc_project.Software.ApplyTime."
900 "RequestedApplyTimes.OnReset")
901 {
902 asyncResp->res.jsonValue["HttpPushUriOptions"]
903 ["HttpPushUriApplyTime"]["ApplyTime"] =
904 "OnReset";
Ed Tanous002d39b2022-05-31 08:59:27 -0700905 }
Patrick Williams5a39f772023-10-20 11:20:21 -0500906 });
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700907}
908
Ed Tanousf5139332024-04-03 13:25:04 -0700909inline void handleUpdateServicePatch(
910 App& app, const crow::Request& req,
911 const std::shared_ptr<bmcweb::AsyncResp>& asyncResp)
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700912{
Ed Tanousf5139332024-04-03 13:25:04 -0700913 if (!redfish::setUpRedfishRoute(app, req, asyncResp))
914 {
915 return;
916 }
917 BMCWEB_LOG_DEBUG("doPatch...");
Ed Tanous002d39b2022-05-31 08:59:27 -0700918
Ed Tanousf5139332024-04-03 13:25:04 -0700919 std::optional<std::string> applyTime;
920 if (!json_util::readJsonPatch(
921 req, asyncResp->res,
922 "HttpPushUriOptions/HttpPushUriApplyTime/ApplyTime", applyTime))
923 {
924 return;
925 }
926
927 if (applyTime)
928 {
929 setApplyTime(asyncResp, *applyTime);
930 }
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700931}
Ed Tanousf5139332024-04-03 13:25:04 -0700932
933inline void handleUpdateServiceFirmwareInventoryCollectionGet(
934 App& app, const crow::Request& req,
935 const std::shared_ptr<bmcweb::AsyncResp>& asyncResp)
936{
937 if (!redfish::setUpRedfishRoute(app, req, asyncResp))
938 {
939 return;
940 }
941 asyncResp->res.jsonValue["@odata.type"] =
942 "#SoftwareInventoryCollection.SoftwareInventoryCollection";
943 asyncResp->res.jsonValue["@odata.id"] =
944 "/redfish/v1/UpdateService/FirmwareInventory";
945 asyncResp->res.jsonValue["Name"] = "Software Inventory Collection";
946 const std::array<const std::string_view, 1> iface = {
947 "xyz.openbmc_project.Software.Version"};
948
949 redfish::collection_util::getCollectionMembers(
950 asyncResp,
951 boost::urls::url("/redfish/v1/UpdateService/FirmwareInventory"), iface,
952 "/xyz/openbmc_project/software");
953}
954
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700955/* Fill related item links (i.e. bmc, bios) in for inventory */
Ed Tanousf5139332024-04-03 13:25:04 -0700956inline void getRelatedItems(const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
957 const std::string& purpose)
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700958{
Willy Tueee00132022-06-14 14:53:17 -0700959 if (purpose == sw_util::bmcPurpose)
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700960 {
Ed Tanousac106bf2023-06-07 09:24:59 -0700961 nlohmann::json& relatedItem = asyncResp->res.jsonValue["RelatedItem"];
Ed Tanous14766872022-03-15 10:44:42 -0700962 nlohmann::json::object_t item;
963 item["@odata.id"] = "/redfish/v1/Managers/bmc";
Patrick Williamsb2ba3072023-05-12 10:27:39 -0500964 relatedItem.emplace_back(std::move(item));
Ed Tanousac106bf2023-06-07 09:24:59 -0700965 asyncResp->res.jsonValue["RelatedItem@odata.count"] =
966 relatedItem.size();
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700967 }
Willy Tueee00132022-06-14 14:53:17 -0700968 else if (purpose == sw_util::biosPurpose)
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700969 {
Ed Tanousac106bf2023-06-07 09:24:59 -0700970 nlohmann::json& relatedItem = asyncResp->res.jsonValue["RelatedItem"];
Ed Tanous14766872022-03-15 10:44:42 -0700971 nlohmann::json::object_t item;
972 item["@odata.id"] = "/redfish/v1/Systems/system/Bios";
Patrick Williamsb2ba3072023-05-12 10:27:39 -0500973 relatedItem.emplace_back(std::move(item));
Ed Tanousac106bf2023-06-07 09:24:59 -0700974 asyncResp->res.jsonValue["RelatedItem@odata.count"] =
975 relatedItem.size();
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700976 }
977 else
978 {
Carson Labradobf2dded2023-08-10 00:37:06 +0000979 BMCWEB_LOG_DEBUG("Unknown software purpose {}", purpose);
John Edward Broadbent7e860f12021-04-08 15:57:16 -0700980 }
981}
982
Willy Tuaf246602022-06-14 15:51:53 -0700983inline void
984 getSoftwareVersion(const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
985 const std::string& service, const std::string& path,
986 const std::string& swId)
987{
Krzysztof Grobelnyd1bde9e2022-09-07 10:40:51 +0200988 sdbusplus::asio::getAllProperties(
989 *crow::connections::systemBus, service, path,
990 "xyz.openbmc_project.Software.Version",
Willy Tuaf246602022-06-14 15:51:53 -0700991 [asyncResp,
Ed Tanous8b242752023-06-27 17:17:13 -0700992 swId](const boost::system::error_code& ec,
Willy Tuaf246602022-06-14 15:51:53 -0700993 const dbus::utility::DBusPropertiesMap& propertiesList) {
Ed Tanous8b242752023-06-27 17:17:13 -0700994 if (ec)
Willy Tuaf246602022-06-14 15:51:53 -0700995 {
996 messages::internalError(asyncResp->res);
997 return;
998 }
Krzysztof Grobelnyd1bde9e2022-09-07 10:40:51 +0200999
Willy Tuaf246602022-06-14 15:51:53 -07001000 const std::string* swInvPurpose = nullptr;
1001 const std::string* version = nullptr;
Krzysztof Grobelnyd1bde9e2022-09-07 10:40:51 +02001002
1003 const bool success = sdbusplus::unpackPropertiesNoThrow(
1004 dbus_utils::UnpackErrorPrinter(), propertiesList, "Purpose",
1005 swInvPurpose, "Version", version);
1006
1007 if (!success)
Willy Tuaf246602022-06-14 15:51:53 -07001008 {
Krzysztof Grobelnyd1bde9e2022-09-07 10:40:51 +02001009 messages::internalError(asyncResp->res);
1010 return;
Willy Tuaf246602022-06-14 15:51:53 -07001011 }
1012
1013 if (swInvPurpose == nullptr)
1014 {
Ed Tanous62598e32023-07-17 17:06:25 -07001015 BMCWEB_LOG_DEBUG("Can't find property \"Purpose\"!");
Willy Tuaf246602022-06-14 15:51:53 -07001016 messages::internalError(asyncResp->res);
1017 return;
1018 }
1019
Ed Tanous62598e32023-07-17 17:06:25 -07001020 BMCWEB_LOG_DEBUG("swInvPurpose = {}", *swInvPurpose);
Willy Tuaf246602022-06-14 15:51:53 -07001021
1022 if (version == nullptr)
1023 {
Ed Tanous62598e32023-07-17 17:06:25 -07001024 BMCWEB_LOG_DEBUG("Can't find property \"Version\"!");
Willy Tuaf246602022-06-14 15:51:53 -07001025
1026 messages::internalError(asyncResp->res);
1027
1028 return;
1029 }
1030 asyncResp->res.jsonValue["Version"] = *version;
1031 asyncResp->res.jsonValue["Id"] = swId;
1032
1033 // swInvPurpose is of format:
1034 // xyz.openbmc_project.Software.Version.VersionPurpose.ABC
1035 // Translate this to "ABC image"
1036 size_t endDesc = swInvPurpose->rfind('.');
1037 if (endDesc == std::string::npos)
1038 {
1039 messages::internalError(asyncResp->res);
1040 return;
1041 }
1042 endDesc++;
1043 if (endDesc >= swInvPurpose->size())
1044 {
1045 messages::internalError(asyncResp->res);
1046 return;
1047 }
1048
1049 std::string formatDesc = swInvPurpose->substr(endDesc);
1050 asyncResp->res.jsonValue["Description"] = formatDesc + " image";
1051 getRelatedItems(asyncResp, *swInvPurpose);
Patrick Williams5a39f772023-10-20 11:20:21 -05001052 });
Willy Tuaf246602022-06-14 15:51:53 -07001053}
1054
Ed Tanousf5139332024-04-03 13:25:04 -07001055inline void handleUpdateServiceFirmwareInventoryGet(
1056 App& app, const crow::Request& req,
1057 const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
1058 const std::string& param)
John Edward Broadbent7e860f12021-04-08 15:57:16 -07001059{
Ed Tanousf5139332024-04-03 13:25:04 -07001060 if (!redfish::setUpRedfishRoute(app, req, asyncResp))
1061 {
1062 return;
1063 }
1064 std::shared_ptr<std::string> swId = std::make_shared<std::string>(param);
1065
1066 asyncResp->res.jsonValue["@odata.id"] = boost::urls::format(
1067 "/redfish/v1/UpdateService/FirmwareInventory/{}", *swId);
1068
1069 constexpr std::array<std::string_view, 1> interfaces = {
1070 "xyz.openbmc_project.Software.Version"};
1071 dbus::utility::getSubTree(
1072 "/", 0, interfaces,
1073 [asyncResp,
1074 swId](const boost::system::error_code& ec,
1075 const dbus::utility::MapperGetSubTreeResponse& subtree) {
1076 BMCWEB_LOG_DEBUG("doGet callback...");
1077 if (ec)
Ed Tanous002d39b2022-05-31 08:59:27 -07001078 {
Ed Tanousf5139332024-04-03 13:25:04 -07001079 messages::internalError(asyncResp->res);
Ed Tanous002d39b2022-05-31 08:59:27 -07001080 return;
1081 }
Ed Tanous002d39b2022-05-31 08:59:27 -07001082
Ed Tanousf5139332024-04-03 13:25:04 -07001083 // Ensure we find our input swId, otherwise return an error
1084 bool found = false;
1085 for (const std::pair<
1086 std::string,
1087 std::vector<std::pair<std::string, std::vector<std::string>>>>&
1088 obj : subtree)
1089 {
1090 if (!obj.first.ends_with(*swId))
Ed Tanous45ca1b82022-03-25 13:07:27 -07001091 {
Ed Tanousf5139332024-04-03 13:25:04 -07001092 continue;
Ed Tanous45ca1b82022-03-25 13:07:27 -07001093 }
John Edward Broadbent7e860f12021-04-08 15:57:16 -07001094
Ed Tanousf5139332024-04-03 13:25:04 -07001095 if (obj.second.empty())
Ed Tanous002d39b2022-05-31 08:59:27 -07001096 {
Ed Tanousf5139332024-04-03 13:25:04 -07001097 continue;
Ed Tanous002d39b2022-05-31 08:59:27 -07001098 }
Ed Tanous1abe55e2018-09-05 08:30:59 -07001099
Ed Tanousf5139332024-04-03 13:25:04 -07001100 found = true;
1101 sw_util::getSwStatus(asyncResp, swId, obj.second[0].first);
1102 getSoftwareVersion(asyncResp, obj.second[0].first, obj.first,
1103 *swId);
1104 }
1105 if (!found)
1106 {
1107 BMCWEB_LOG_WARNING("Input swID {} not found!", *swId);
1108 messages::resourceMissingAtURI(
1109 asyncResp->res,
1110 boost::urls::format(
1111 "/redfish/v1/UpdateService/FirmwareInventory/{}", *swId));
1112 return;
1113 }
1114 asyncResp->res.jsonValue["@odata.type"] =
1115 "#SoftwareInventory.v1_1_0.SoftwareInventory";
1116 asyncResp->res.jsonValue["Name"] = "Software Inventory";
1117 asyncResp->res.jsonValue["Status"]["HealthRollup"] = "OK";
1118
1119 asyncResp->res.jsonValue["Updateable"] = false;
1120 sw_util::getSwUpdatableStatus(asyncResp, swId);
Patrick Williams5a39f772023-10-20 11:20:21 -05001121 });
John Edward Broadbent7e860f12021-04-08 15:57:16 -07001122}
Ed Tanous1abe55e2018-09-05 08:30:59 -07001123
Ed Tanousf5139332024-04-03 13:25:04 -07001124inline void requestRoutesUpdateService(App& app)
1125{
1126 BMCWEB_ROUTE(
1127 app, "/redfish/v1/UpdateService/Actions/UpdateService.SimpleUpdate/")
1128 .privileges(redfish::privileges::postUpdateService)
1129 .methods(boost::beast::http::verb::post)(std::bind_front(
1130 handleUpdateServiceSimpleUpdateAction, std::ref(app)));
1131
1132 BMCWEB_ROUTE(app, "/redfish/v1/UpdateService/FirmwareInventory/<str>/")
1133 .privileges(redfish::privileges::getSoftwareInventory)
1134 .methods(boost::beast::http::verb::get)(std::bind_front(
1135 handleUpdateServiceFirmwareInventoryGet, std::ref(app)));
1136
1137 BMCWEB_ROUTE(app, "/redfish/v1/UpdateService/")
1138 .privileges(redfish::privileges::getUpdateService)
1139 .methods(boost::beast::http::verb::get)(
1140 std::bind_front(handleUpdateServiceGet, std::ref(app)));
1141
1142 BMCWEB_ROUTE(app, "/redfish/v1/UpdateService/")
1143 .privileges(redfish::privileges::patchUpdateService)
1144 .methods(boost::beast::http::verb::patch)(
1145 std::bind_front(handleUpdateServicePatch, std::ref(app)));
1146
1147 BMCWEB_ROUTE(app, "/redfish/v1/UpdateService/update/")
1148 .privileges(redfish::privileges::postUpdateService)
1149 .methods(boost::beast::http::verb::post)(
1150 std::bind_front(handleUpdateServicePost, std::ref(app)));
1151
1152 BMCWEB_ROUTE(app, "/redfish/v1/UpdateService/FirmwareInventory/")
1153 .privileges(redfish::privileges::getSoftwareInventoryCollection)
1154 .methods(boost::beast::http::verb::get)(std::bind_front(
1155 handleUpdateServiceFirmwareInventoryCollectionGet, std::ref(app)));
1156}
1157
Ed Tanous1abe55e2018-09-05 08:30:59 -07001158} // namespace redfish