1 /*
2 // Copyright (c) 2018 Intel Corporation
3 //
4 // Licensed under the Apache License, Version 2.0 (the "License");
5 // you may not use this file except in compliance with the License.
6 // You may obtain a copy of the License at
7 //
8 //      http://www.apache.org/licenses/LICENSE-2.0
9 //
10 // Unless required by applicable law or agreed to in writing, software
11 // distributed under the License is distributed on an "AS IS" BASIS,
12 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 // See the License for the specific language governing permissions and
14 // limitations under the License.
15 */
16 #pragma once
17 
18 #include "bmcweb_config.h"
19 
20 #include "app.hpp"
21 #include "dbus_utility.hpp"
22 #include "error_messages.hpp"
23 #include "generated/enums/update_service.hpp"
24 #include "multipart_parser.hpp"
25 #include "ossl_random.hpp"
26 #include "query.hpp"
27 #include "registries/privilege_registry.hpp"
28 #include "task.hpp"
29 #include "task_messages.hpp"
30 #include "utils/collection.hpp"
31 #include "utils/dbus_utils.hpp"
32 #include "utils/json_utils.hpp"
33 #include "utils/sw_utils.hpp"
34 
35 #include <boost/system/error_code.hpp>
36 #include <boost/url/format.hpp>
37 #include <sdbusplus/asio/property.hpp>
38 #include <sdbusplus/bus/match.hpp>
39 #include <sdbusplus/unpack_properties.hpp>
40 
41 #include <array>
42 #include <filesystem>
43 #include <optional>
44 #include <string>
45 #include <string_view>
46 
47 namespace redfish
48 {
49 
50 // Match signals added on software path
51 // NOLINTNEXTLINE(cppcoreguidelines-avoid-non-const-global-variables)
52 static std::unique_ptr<sdbusplus::bus::match_t> fwUpdateMatcher;
53 // NOLINTNEXTLINE(cppcoreguidelines-avoid-non-const-global-variables)
54 static std::unique_ptr<sdbusplus::bus::match_t> fwUpdateErrorMatcher;
55 // Only allow one update at a time
56 // NOLINTNEXTLINE(cppcoreguidelines-avoid-non-const-global-variables)
57 static bool fwUpdateInProgress = false;
58 // Timer for software available
59 // NOLINTNEXTLINE(cppcoreguidelines-avoid-non-const-global-variables)
60 static std::unique_ptr<boost::asio::steady_timer> fwAvailableTimer;
61 
62 inline void cleanUp()
63 {
64     fwUpdateInProgress = false;
65     fwUpdateMatcher = nullptr;
66     fwUpdateErrorMatcher = nullptr;
67 }
68 
69 inline void activateImage(const std::string& objPath,
70                           const std::string& service)
71 {
72     BMCWEB_LOG_DEBUG("Activate image for {} {}", objPath, service);
73     sdbusplus::asio::setProperty(
74         *crow::connections::systemBus, service, objPath,
75         "xyz.openbmc_project.Software.Activation", "RequestedActivation",
76         "xyz.openbmc_project.Software.Activation.RequestedActivations.Active",
77         [](const boost::system::error_code& ec) {
78         if (ec)
79         {
80             BMCWEB_LOG_DEBUG("error_code = {}", ec);
81             BMCWEB_LOG_DEBUG("error msg = {}", ec.message());
82         }
83     });
84 }
85 
86 // Note that asyncResp can be either a valid pointer or nullptr. If nullptr
87 // then no asyncResp updates will occur
88 static void
89     softwareInterfaceAdded(const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
90                            sdbusplus::message_t& m, task::Payload&& payload)
91 {
92     dbus::utility::DBusInterfacesMap interfacesProperties;
93 
94     sdbusplus::message::object_path objPath;
95 
96     m.read(objPath, interfacesProperties);
97 
98     BMCWEB_LOG_DEBUG("obj path = {}", objPath.str);
99     for (const auto& interface : interfacesProperties)
100     {
101         BMCWEB_LOG_DEBUG("interface = {}", interface.first);
102 
103         if (interface.first == "xyz.openbmc_project.Software.Activation")
104         {
105             // Retrieve service and activate
106             constexpr std::array<std::string_view, 1> interfaces = {
107                 "xyz.openbmc_project.Software.Activation"};
108             dbus::utility::getDbusObject(
109                 objPath.str, interfaces,
110                 [objPath, asyncResp, payload(std::move(payload))](
111                     const boost::system::error_code& ec,
112                     const std::vector<
113                         std::pair<std::string, std::vector<std::string>>>&
114                         objInfo) mutable {
115                 if (ec)
116                 {
117                     BMCWEB_LOG_DEBUG("error_code = {}", ec);
118                     BMCWEB_LOG_DEBUG("error msg = {}", ec.message());
119                     if (asyncResp)
120                     {
121                         messages::internalError(asyncResp->res);
122                     }
123                     cleanUp();
124                     return;
125                 }
126                 // Ensure we only got one service back
127                 if (objInfo.size() != 1)
128                 {
129                     BMCWEB_LOG_ERROR("Invalid Object Size {}", objInfo.size());
130                     if (asyncResp)
131                     {
132                         messages::internalError(asyncResp->res);
133                     }
134                     cleanUp();
135                     return;
136                 }
137                 // cancel timer only when
138                 // xyz.openbmc_project.Software.Activation interface
139                 // is added
140                 fwAvailableTimer = nullptr;
141 
142                 activateImage(objPath.str, objInfo[0].first);
143                 if (asyncResp)
144                 {
145                     std::shared_ptr<task::TaskData> task =
146                         task::TaskData::createTask(
147                             [](const boost::system::error_code& ec2,
148                                sdbusplus::message_t& msg,
149                                const std::shared_ptr<task::TaskData>&
150                                    taskData) {
151                         if (ec2)
152                         {
153                             return task::completed;
154                         }
155 
156                         std::string iface;
157                         dbus::utility::DBusPropertiesMap values;
158 
159                         std::string index = std::to_string(taskData->index);
160                         msg.read(iface, values);
161 
162                         if (iface == "xyz.openbmc_project.Software.Activation")
163                         {
164                             const std::string* state = nullptr;
165                             for (const auto& property : values)
166                             {
167                                 if (property.first == "Activation")
168                                 {
169                                     state = std::get_if<std::string>(
170                                         &property.second);
171                                     if (state == nullptr)
172                                     {
173                                         taskData->messages.emplace_back(
174                                             messages::internalError());
175                                         return task::completed;
176                                     }
177                                 }
178                             }
179 
180                             if (state == nullptr)
181                             {
182                                 return !task::completed;
183                             }
184 
185                             if (state->ends_with("Invalid") ||
186                                 state->ends_with("Failed"))
187                             {
188                                 taskData->state = "Exception";
189                                 taskData->status = "Warning";
190                                 taskData->messages.emplace_back(
191                                     messages::taskAborted(index));
192                                 return task::completed;
193                             }
194 
195                             if (state->ends_with("Staged"))
196                             {
197                                 taskData->state = "Stopping";
198                                 taskData->messages.emplace_back(
199                                     messages::taskPaused(index));
200 
201                                 // its staged, set a long timer to
202                                 // allow them time to complete the
203                                 // update (probably cycle the
204                                 // system) if this expires then
205                                 // task will be canceled
206                                 taskData->extendTimer(std::chrono::hours(5));
207                                 return !task::completed;
208                             }
209 
210                             if (state->ends_with("Active"))
211                             {
212                                 taskData->messages.emplace_back(
213                                     messages::taskCompletedOK(index));
214                                 taskData->state = "Completed";
215                                 return task::completed;
216                             }
217                         }
218                         else if (
219                             iface ==
220                             "xyz.openbmc_project.Software.ActivationProgress")
221                         {
222                             const uint8_t* progress = nullptr;
223                             for (const auto& property : values)
224                             {
225                                 if (property.first == "Progress")
226                                 {
227                                     progress =
228                                         std::get_if<uint8_t>(&property.second);
229                                     if (progress == nullptr)
230                                     {
231                                         taskData->messages.emplace_back(
232                                             messages::internalError());
233                                         return task::completed;
234                                     }
235                                 }
236                             }
237 
238                             if (progress == nullptr)
239                             {
240                                 return !task::completed;
241                             }
242                             taskData->percentComplete = *progress;
243                             taskData->messages.emplace_back(
244                                 messages::taskProgressChanged(index,
245                                                               *progress));
246 
247                             // if we're getting status updates it's
248                             // still alive, update timer
249                             taskData->extendTimer(std::chrono::minutes(5));
250                         }
251 
252                         // as firmware update often results in a
253                         // reboot, the task  may never "complete"
254                         // unless it is an error
255 
256                         return !task::completed;
257                     },
258                             "type='signal',interface='org.freedesktop.DBus.Properties',"
259                             "member='PropertiesChanged',path='" +
260                                 objPath.str + "'");
261                     task->startTimer(std::chrono::minutes(5));
262                     task->populateResp(asyncResp->res);
263                     task->payload.emplace(std::move(payload));
264                 }
265                 fwUpdateInProgress = false;
266             });
267 
268             break;
269         }
270     }
271 }
272 
273 inline void afterAvailbleTimerAsyncWait(
274     const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
275     const boost::system::error_code& ec)
276 {
277     cleanUp();
278     if (ec == boost::asio::error::operation_aborted)
279     {
280         // expected, we were canceled before the timer completed.
281         return;
282     }
283     BMCWEB_LOG_ERROR("Timed out waiting for firmware object being created");
284     BMCWEB_LOG_ERROR("FW image may has already been uploaded to server");
285     if (ec)
286     {
287         BMCWEB_LOG_ERROR("Async_wait failed{}", ec);
288         return;
289     }
290     if (asyncResp)
291     {
292         redfish::messages::internalError(asyncResp->res);
293     }
294 }
295 
296 inline void
297     handleUpdateErrorType(const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
298                           const std::string& url, const std::string& type)
299 {
300     if (type == "xyz.openbmc_project.Software.Image.Error.UnTarFailure")
301     {
302         redfish::messages::invalidUpload(asyncResp->res, url,
303                                          "Invalid archive");
304     }
305     else if (type ==
306              "xyz.openbmc_project.Software.Image.Error.ManifestFileFailure")
307     {
308         redfish::messages::invalidUpload(asyncResp->res, url,
309                                          "Invalid manifest");
310     }
311     else if (type == "xyz.openbmc_project.Software.Image.Error.ImageFailure")
312     {
313         redfish::messages::invalidUpload(asyncResp->res, url,
314                                          "Invalid image format");
315     }
316     else if (type == "xyz.openbmc_project.Software.Version.Error.AlreadyExists")
317     {
318         redfish::messages::invalidUpload(asyncResp->res, url,
319                                          "Image version already exists");
320 
321         redfish::messages::resourceAlreadyExists(
322             asyncResp->res, "UpdateService", "Version", "uploaded version");
323     }
324     else if (type == "xyz.openbmc_project.Software.Image.Error.BusyFailure")
325     {
326         redfish::messages::resourceExhaustion(asyncResp->res, url);
327     }
328     else if (type == "xyz.openbmc_project.Software.Version.Error.Incompatible")
329     {
330         redfish::messages::invalidUpload(asyncResp->res, url,
331                                          "Incompatible image version");
332     }
333     else if (type ==
334              "xyz.openbmc_project.Software.Version.Error.ExpiredAccessKey")
335     {
336         redfish::messages::invalidUpload(asyncResp->res, url,
337                                          "Update Access Key Expired");
338     }
339     else if (type ==
340              "xyz.openbmc_project.Software.Version.Error.InvalidSignature")
341     {
342         redfish::messages::invalidUpload(asyncResp->res, url,
343                                          "Invalid image signature");
344     }
345     else if (type ==
346                  "xyz.openbmc_project.Software.Image.Error.InternalFailure" ||
347              type == "xyz.openbmc_project.Software.Version.Error.HostFile")
348     {
349         BMCWEB_LOG_ERROR("Software Image Error type={}", type);
350         redfish::messages::internalError(asyncResp->res);
351     }
352     else
353     {
354         // Unrelated error types. Ignored
355         BMCWEB_LOG_INFO("Non-Software-related Error type={}. Ignored", type);
356         return;
357     }
358     // Clear the timer
359     fwAvailableTimer = nullptr;
360 }
361 
362 inline void
363     afterUpdateErrorMatcher(const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
364                             const std::string& url, sdbusplus::message_t& m)
365 {
366     dbus::utility::DBusInterfacesMap interfacesProperties;
367     sdbusplus::message::object_path objPath;
368     m.read(objPath, interfacesProperties);
369     BMCWEB_LOG_DEBUG("obj path = {}", objPath.str);
370     for (const std::pair<std::string, dbus::utility::DBusPropertiesMap>&
371              interface : interfacesProperties)
372     {
373         if (interface.first == "xyz.openbmc_project.Logging.Entry")
374         {
375             for (const std::pair<std::string, dbus::utility::DbusVariantType>&
376                      value : interface.second)
377             {
378                 if (value.first != "Message")
379                 {
380                     continue;
381                 }
382                 const std::string* type =
383                     std::get_if<std::string>(&value.second);
384                 if (type == nullptr)
385                 {
386                     // if this was our message, timeout will cover it
387                     return;
388                 }
389                 handleUpdateErrorType(asyncResp, url, *type);
390             }
391         }
392     }
393 }
394 
395 // Note that asyncResp can be either a valid pointer or nullptr. If nullptr
396 // then no asyncResp updates will occur
397 inline void monitorForSoftwareAvailable(
398     const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
399     const crow::Request& req, const std::string& url,
400     int timeoutTimeSeconds = 25)
401 {
402     // Only allow one FW update at a time
403     if (fwUpdateInProgress)
404     {
405         if (asyncResp)
406         {
407             messages::serviceTemporarilyUnavailable(asyncResp->res, "30");
408         }
409         return;
410     }
411 
412     if (req.ioService == nullptr)
413     {
414         messages::internalError(asyncResp->res);
415         return;
416     }
417 
418     fwAvailableTimer =
419         std::make_unique<boost::asio::steady_timer>(*req.ioService);
420 
421     fwAvailableTimer->expires_after(std::chrono::seconds(timeoutTimeSeconds));
422 
423     fwAvailableTimer->async_wait(
424         std::bind_front(afterAvailbleTimerAsyncWait, asyncResp));
425 
426     task::Payload payload(req);
427     auto callback = [asyncResp, payload](sdbusplus::message_t& m) mutable {
428         BMCWEB_LOG_DEBUG("Match fired");
429         softwareInterfaceAdded(asyncResp, m, std::move(payload));
430     };
431 
432     fwUpdateInProgress = true;
433 
434     fwUpdateMatcher = std::make_unique<sdbusplus::bus::match_t>(
435         *crow::connections::systemBus,
436         "interface='org.freedesktop.DBus.ObjectManager',type='signal',"
437         "member='InterfacesAdded',path='/xyz/openbmc_project/software'",
438         callback);
439 
440     fwUpdateErrorMatcher = std::make_unique<sdbusplus::bus::match_t>(
441         *crow::connections::systemBus,
442         "interface='org.freedesktop.DBus.ObjectManager',type='signal',"
443         "member='InterfacesAdded',"
444         "path='/xyz/openbmc_project/logging'",
445         std::bind_front(afterUpdateErrorMatcher, asyncResp, url));
446 }
447 
448 inline std::optional<boost::urls::url>
449     parseSimpleUpdateUrl(std::string imageURI,
450                          std::optional<std::string> transferProtocol,
451                          crow::Response& res)
452 {
453     if (imageURI.find("://") == std::string::npos)
454     {
455         if (imageURI.starts_with("/"))
456         {
457             messages::actionParameterValueTypeError(
458                 res, imageURI, "ImageURI", "UpdateService.SimpleUpdate");
459             return std::nullopt;
460         }
461         if (!transferProtocol)
462         {
463             messages::actionParameterValueTypeError(
464                 res, imageURI, "ImageURI", "UpdateService.SimpleUpdate");
465             return std::nullopt;
466         }
467         // OpenBMC currently only supports TFTP or HTTPS
468         if (*transferProtocol == "TFTP")
469         {
470             imageURI = "tftp://" + imageURI;
471         }
472         else if (*transferProtocol == "HTTPS")
473         {
474             imageURI = "https://" + imageURI;
475         }
476         else
477         {
478             messages::actionParameterNotSupported(res, "TransferProtocol",
479                                                   *transferProtocol);
480             BMCWEB_LOG_ERROR("Request incorrect protocol parameter: {}",
481                              *transferProtocol);
482             return std::nullopt;
483         }
484     }
485 
486     boost::system::result<boost::urls::url> url =
487         boost::urls::parse_absolute_uri(imageURI);
488     if (!url)
489     {
490         messages::actionParameterValueTypeError(res, imageURI, "ImageURI",
491                                                 "UpdateService.SimpleUpdate");
492 
493         return std::nullopt;
494     }
495     url->normalize();
496 
497     if (url->scheme() == "tftp")
498     {
499         if (url->encoded_path().size() < 2)
500         {
501             messages::actionParameterNotSupported(res, "ImageURI",
502                                                   url->buffer());
503             return std::nullopt;
504         }
505     }
506     else if (url->scheme() == "https")
507     {
508         // Empty paths default to "/"
509         if (url->encoded_path().empty())
510         {
511             url->set_encoded_path("/");
512         }
513     }
514     else
515     {
516         messages::actionParameterNotSupported(res, "ImageURI", imageURI);
517         return std::nullopt;
518     }
519 
520     if (url->encoded_path().empty())
521     {
522         messages::actionParameterValueTypeError(res, imageURI, "ImageURI",
523                                                 "UpdateService.SimpleUpdate");
524         return std::nullopt;
525     }
526 
527     return *url;
528 }
529 
530 inline void doHttpsUpdate(const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
531                           const boost::urls::url_view_base& url)
532 {
533     messages::actionParameterNotSupported(asyncResp->res, "ImageURI",
534                                           url.buffer());
535 }
536 
537 inline void doTftpUpdate(const crow::Request& req,
538                          const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
539                          const boost::urls::url_view_base& url)
540 {
541     if (!BMCWEB_INSECURE_TFTP_UPDATE)
542     {
543         messages::actionParameterNotSupported(asyncResp->res, "ImageURI",
544                                               url.buffer());
545         return;
546     }
547 
548     std::string path(url.encoded_path());
549     if (path.size() < 2)
550     {
551         messages::actionParameterNotSupported(asyncResp->res, "ImageURI",
552                                               url.buffer());
553         return;
554     }
555     // TFTP expects a path without a /
556     path.erase(0, 1);
557     std::string host(url.encoded_host_and_port());
558     BMCWEB_LOG_DEBUG("Server: {} File: {}", host, path);
559 
560     // Setup callback for when new software detected
561     // Give TFTP 10 minutes to complete
562     monitorForSoftwareAvailable(
563         asyncResp, req,
564         "/redfish/v1/UpdateService/Actions/UpdateService.SimpleUpdate", 600);
565 
566     // TFTP can take up to 10 minutes depending on image size and
567     // connection speed. Return to caller as soon as the TFTP operation
568     // has been started. The callback above will ensure the activate
569     // is started once the download has completed
570     redfish::messages::success(asyncResp->res);
571 
572     // Call TFTP service
573     crow::connections::systemBus->async_method_call(
574         [](const boost::system::error_code& ec) {
575         if (ec)
576         {
577             // messages::internalError(asyncResp->res);
578             cleanUp();
579             BMCWEB_LOG_DEBUG("error_code = {}", ec);
580             BMCWEB_LOG_DEBUG("error msg = {}", ec.message());
581         }
582         else
583         {
584             BMCWEB_LOG_DEBUG("Call to DownloaViaTFTP Success");
585         }
586     },
587         "xyz.openbmc_project.Software.Download",
588         "/xyz/openbmc_project/software", "xyz.openbmc_project.Common.TFTP",
589         "DownloadViaTFTP", path, host);
590 }
591 
592 inline void handleUpdateServiceSimpleUpdateAction(
593     crow::App& app, const crow::Request& req,
594     const std::shared_ptr<bmcweb::AsyncResp>& asyncResp)
595 {
596     if (!redfish::setUpRedfishRoute(app, req, asyncResp))
597     {
598         return;
599     }
600 
601     std::optional<std::string> transferProtocol;
602     std::string imageURI;
603 
604     BMCWEB_LOG_DEBUG("Enter UpdateService.SimpleUpdate doPost");
605 
606     // User can pass in both TransferProtocol and ImageURI parameters or
607     // they can pass in just the ImageURI with the transfer protocol
608     // embedded within it.
609     // 1) TransferProtocol:TFTP ImageURI:1.1.1.1/myfile.bin
610     // 2) ImageURI:tftp://1.1.1.1/myfile.bin
611 
612     if (!json_util::readJsonAction(req, asyncResp->res, "TransferProtocol",
613                                    transferProtocol, "ImageURI", imageURI))
614     {
615         BMCWEB_LOG_DEBUG("Missing TransferProtocol or ImageURI parameter");
616         return;
617     }
618 
619     std::optional<boost::urls::url> url =
620         parseSimpleUpdateUrl(imageURI, transferProtocol, asyncResp->res);
621     if (!url)
622     {
623         return;
624     }
625     if (url->scheme() == "tftp")
626     {
627         doTftpUpdate(req, asyncResp, *url);
628     }
629     else if (url->scheme() == "https")
630     {
631         doHttpsUpdate(asyncResp, *url);
632     }
633     else
634     {
635         messages::actionParameterNotSupported(asyncResp->res, "ImageURI",
636                                               url->buffer());
637         return;
638     }
639 
640     BMCWEB_LOG_DEBUG("Exit UpdateService.SimpleUpdate doPost");
641 }
642 
643 inline void uploadImageFile(crow::Response& res, std::string_view body)
644 {
645     std::filesystem::path filepath("/tmp/images/" + bmcweb::getRandomUUID());
646 
647     BMCWEB_LOG_DEBUG("Writing file to {}", filepath.string());
648     std::ofstream out(filepath, std::ofstream::out | std::ofstream::binary |
649                                     std::ofstream::trunc);
650     // set the permission of the file to 640
651     std::filesystem::perms permission = std::filesystem::perms::owner_read |
652                                         std::filesystem::perms::group_read;
653     std::filesystem::permissions(filepath, permission);
654     out << body;
655 
656     if (out.bad())
657     {
658         messages::internalError(res);
659         cleanUp();
660     }
661 }
662 
663 inline void setApplyTime(const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
664                          const std::string& applyTime)
665 {
666     std::string applyTimeNewVal;
667     if (applyTime == "Immediate")
668     {
669         applyTimeNewVal =
670             "xyz.openbmc_project.Software.ApplyTime.RequestedApplyTimes.Immediate";
671     }
672     else if (applyTime == "OnReset")
673     {
674         applyTimeNewVal =
675             "xyz.openbmc_project.Software.ApplyTime.RequestedApplyTimes.OnReset";
676     }
677     else
678     {
679         BMCWEB_LOG_INFO(
680             "ApplyTime value is not in the list of acceptable values");
681         messages::propertyValueNotInList(asyncResp->res, applyTime,
682                                          "ApplyTime");
683         return;
684     }
685 
686     setDbusProperty(asyncResp, "xyz.openbmc_project.Settings",
687                     sdbusplus::message::object_path(
688                         "/xyz/openbmc_project/software/apply_time"),
689                     "xyz.openbmc_project.Software.ApplyTime",
690                     "RequestedApplyTime", "ApplyTime", applyTimeNewVal);
691 }
692 
693 inline void
694     updateMultipartContext(const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
695                            const crow::Request& req,
696                            const MultipartParser& parser)
697 {
698     const std::string* uploadData = nullptr;
699     std::optional<std::string> applyTime = "OnReset";
700     bool targetFound = false;
701     for (const FormPart& formpart : parser.mime_fields)
702     {
703         boost::beast::http::fields::const_iterator it =
704             formpart.fields.find("Content-Disposition");
705         if (it == formpart.fields.end())
706         {
707             BMCWEB_LOG_ERROR("Couldn't find Content-Disposition");
708             return;
709         }
710         BMCWEB_LOG_INFO("Parsing value {}", it->value());
711 
712         // The construction parameters of param_list must start with `;`
713         size_t index = it->value().find(';');
714         if (index == std::string::npos)
715         {
716             continue;
717         }
718 
719         for (const auto& param :
720              boost::beast::http::param_list{it->value().substr(index)})
721         {
722             if (param.first != "name" || param.second.empty())
723             {
724                 continue;
725             }
726 
727             if (param.second == "UpdateParameters")
728             {
729                 std::vector<std::string> targets;
730                 nlohmann::json content =
731                     nlohmann::json::parse(formpart.content);
732                 nlohmann::json::object_t* obj =
733                     content.get_ptr<nlohmann::json::object_t*>();
734                 if (obj == nullptr)
735                 {
736                     messages::propertyValueFormatError(asyncResp->res, targets,
737                                                        "UpdateParameters");
738                     return;
739                 }
740 
741                 if (!json_util::readJsonObject(
742                         *obj, asyncResp->res, "Targets", targets,
743                         "@Redfish.OperationApplyTime", applyTime))
744                 {
745                     return;
746                 }
747                 if (targets.size() != 1)
748                 {
749                     messages::propertyValueFormatError(asyncResp->res, targets,
750                                                        "Targets");
751                     return;
752                 }
753                 if (targets[0] != "/redfish/v1/Managers/bmc")
754                 {
755                     messages::propertyValueNotInList(asyncResp->res, targets[0],
756                                                      "Targets/0");
757                     return;
758                 }
759                 targetFound = true;
760             }
761             else if (param.second == "UpdateFile")
762             {
763                 uploadData = &(formpart.content);
764             }
765         }
766     }
767 
768     if (uploadData == nullptr)
769     {
770         BMCWEB_LOG_ERROR("Upload data is NULL");
771         messages::propertyMissing(asyncResp->res, "UpdateFile");
772         return;
773     }
774     if (!targetFound)
775     {
776         messages::propertyMissing(asyncResp->res, "targets");
777         return;
778     }
779 
780     setApplyTime(asyncResp, *applyTime);
781 
782     // Setup callback for when new software detected
783     monitorForSoftwareAvailable(asyncResp, req, "/redfish/v1/UpdateService");
784 
785     uploadImageFile(asyncResp->res, *uploadData);
786 }
787 
788 inline void
789     handleUpdateServicePost(App& app, const crow::Request& req,
790                             const std::shared_ptr<bmcweb::AsyncResp>& asyncResp)
791 {
792     if (!redfish::setUpRedfishRoute(app, req, asyncResp))
793     {
794         return;
795     }
796     std::string_view contentType = req.getHeaderValue("Content-Type");
797 
798     BMCWEB_LOG_DEBUG("doPost: contentType={}", contentType);
799 
800     // Make sure that content type is application/octet-stream or
801     // multipart/form-data
802     if (bmcweb::asciiIEquals(contentType, "application/octet-stream"))
803     {
804         // Setup callback for when new software detected
805         monitorForSoftwareAvailable(asyncResp, req,
806                                     "/redfish/v1/UpdateService");
807 
808         uploadImageFile(asyncResp->res, req.body());
809     }
810     else if (contentType.starts_with("multipart/form-data"))
811     {
812         MultipartParser parser;
813 
814         ParserError ec = parser.parse(req);
815         if (ec != ParserError::PARSER_SUCCESS)
816         {
817             // handle error
818             BMCWEB_LOG_ERROR("MIME parse failed, ec : {}",
819                              static_cast<int>(ec));
820             messages::internalError(asyncResp->res);
821             return;
822         }
823 
824         updateMultipartContext(asyncResp, req, parser);
825     }
826     else
827     {
828         BMCWEB_LOG_DEBUG("Bad content type specified:{}", contentType);
829         asyncResp->res.result(boost::beast::http::status::bad_request);
830     }
831 }
832 
833 inline void
834     handleUpdateServiceGet(App& app, const crow::Request& req,
835                            const std::shared_ptr<bmcweb::AsyncResp>& asyncResp)
836 {
837     if (!redfish::setUpRedfishRoute(app, req, asyncResp))
838     {
839         return;
840     }
841     asyncResp->res.jsonValue["@odata.type"] =
842         "#UpdateService.v1_11_1.UpdateService";
843     asyncResp->res.jsonValue["@odata.id"] = "/redfish/v1/UpdateService";
844     asyncResp->res.jsonValue["Id"] = "UpdateService";
845     asyncResp->res.jsonValue["Description"] = "Service for Software Update";
846     asyncResp->res.jsonValue["Name"] = "Update Service";
847 
848     asyncResp->res.jsonValue["HttpPushUri"] =
849         "/redfish/v1/UpdateService/update";
850     asyncResp->res.jsonValue["MultipartHttpPushUri"] =
851         "/redfish/v1/UpdateService/update";
852 
853     // UpdateService cannot be disabled
854     asyncResp->res.jsonValue["ServiceEnabled"] = true;
855     asyncResp->res.jsonValue["FirmwareInventory"]["@odata.id"] =
856         "/redfish/v1/UpdateService/FirmwareInventory";
857     // Get the MaxImageSizeBytes
858     asyncResp->res.jsonValue["MaxImageSizeBytes"] = BMCWEB_HTTP_BODY_LIMIT *
859                                                     1024 * 1024;
860 
861     // Update Actions object.
862     nlohmann::json& updateSvcSimpleUpdate =
863         asyncResp->res.jsonValue["Actions"]["#UpdateService.SimpleUpdate"];
864     updateSvcSimpleUpdate["target"] =
865         "/redfish/v1/UpdateService/Actions/UpdateService.SimpleUpdate";
866 
867     nlohmann::json::array_t allowed;
868     allowed.emplace_back(update_service::TransferProtocolType::HTTPS);
869 
870     if constexpr (BMCWEB_INSECURE_PUSH_STYLE_NOTIFICATION)
871     {
872         allowed.emplace_back(update_service::TransferProtocolType::TFTP);
873     }
874 
875     updateSvcSimpleUpdate["TransferProtocol@Redfish.AllowableValues"] =
876         std::move(allowed);
877 
878     // Get the current ApplyTime value
879     sdbusplus::asio::getProperty<std::string>(
880         *crow::connections::systemBus, "xyz.openbmc_project.Settings",
881         "/xyz/openbmc_project/software/apply_time",
882         "xyz.openbmc_project.Software.ApplyTime", "RequestedApplyTime",
883         [asyncResp](const boost::system::error_code& ec,
884                     const std::string& applyTime) {
885         if (ec)
886         {
887             BMCWEB_LOG_DEBUG("DBUS response error {}", ec);
888             messages::internalError(asyncResp->res);
889             return;
890         }
891 
892         // Store the ApplyTime Value
893         if (applyTime == "xyz.openbmc_project.Software.ApplyTime."
894                          "RequestedApplyTimes.Immediate")
895         {
896             asyncResp->res.jsonValue["HttpPushUriOptions"]
897                                     ["HttpPushUriApplyTime"]["ApplyTime"] =
898                 "Immediate";
899         }
900         else if (applyTime == "xyz.openbmc_project.Software.ApplyTime."
901                               "RequestedApplyTimes.OnReset")
902         {
903             asyncResp->res.jsonValue["HttpPushUriOptions"]
904                                     ["HttpPushUriApplyTime"]["ApplyTime"] =
905                 "OnReset";
906         }
907     });
908 }
909 
910 inline void handleUpdateServicePatch(
911     App& app, const crow::Request& req,
912     const std::shared_ptr<bmcweb::AsyncResp>& asyncResp)
913 {
914     if (!redfish::setUpRedfishRoute(app, req, asyncResp))
915     {
916         return;
917     }
918     BMCWEB_LOG_DEBUG("doPatch...");
919 
920     std::optional<std::string> applyTime;
921     if (!json_util::readJsonPatch(
922             req, asyncResp->res,
923             "HttpPushUriOptions/HttpPushUriApplyTime/ApplyTime", applyTime))
924     {
925         return;
926     }
927 
928     if (applyTime)
929     {
930         setApplyTime(asyncResp, *applyTime);
931     }
932 }
933 
934 inline void handleUpdateServiceFirmwareInventoryCollectionGet(
935     App& app, const crow::Request& req,
936     const std::shared_ptr<bmcweb::AsyncResp>& asyncResp)
937 {
938     if (!redfish::setUpRedfishRoute(app, req, asyncResp))
939     {
940         return;
941     }
942     asyncResp->res.jsonValue["@odata.type"] =
943         "#SoftwareInventoryCollection.SoftwareInventoryCollection";
944     asyncResp->res.jsonValue["@odata.id"] =
945         "/redfish/v1/UpdateService/FirmwareInventory";
946     asyncResp->res.jsonValue["Name"] = "Software Inventory Collection";
947     const std::array<const std::string_view, 1> iface = {
948         "xyz.openbmc_project.Software.Version"};
949 
950     redfish::collection_util::getCollectionMembers(
951         asyncResp,
952         boost::urls::url("/redfish/v1/UpdateService/FirmwareInventory"), iface,
953         "/xyz/openbmc_project/software");
954 }
955 
956 /* Fill related item links (i.e. bmc, bios) in for inventory */
957 inline void getRelatedItems(const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
958                             const std::string& purpose)
959 {
960     if (purpose == sw_util::bmcPurpose)
961     {
962         nlohmann::json& relatedItem = asyncResp->res.jsonValue["RelatedItem"];
963         nlohmann::json::object_t item;
964         item["@odata.id"] = "/redfish/v1/Managers/bmc";
965         relatedItem.emplace_back(std::move(item));
966         asyncResp->res.jsonValue["RelatedItem@odata.count"] =
967             relatedItem.size();
968     }
969     else if (purpose == sw_util::biosPurpose)
970     {
971         nlohmann::json& relatedItem = asyncResp->res.jsonValue["RelatedItem"];
972         nlohmann::json::object_t item;
973         item["@odata.id"] = "/redfish/v1/Systems/system/Bios";
974         relatedItem.emplace_back(std::move(item));
975         asyncResp->res.jsonValue["RelatedItem@odata.count"] =
976             relatedItem.size();
977     }
978     else
979     {
980         BMCWEB_LOG_DEBUG("Unknown software purpose {}", purpose);
981     }
982 }
983 
984 inline void
985     getSoftwareVersion(const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
986                        const std::string& service, const std::string& path,
987                        const std::string& swId)
988 {
989     sdbusplus::asio::getAllProperties(
990         *crow::connections::systemBus, service, path,
991         "xyz.openbmc_project.Software.Version",
992         [asyncResp,
993          swId](const boost::system::error_code& ec,
994                const dbus::utility::DBusPropertiesMap& propertiesList) {
995         if (ec)
996         {
997             messages::internalError(asyncResp->res);
998             return;
999         }
1000 
1001         const std::string* swInvPurpose = nullptr;
1002         const std::string* version = nullptr;
1003 
1004         const bool success = sdbusplus::unpackPropertiesNoThrow(
1005             dbus_utils::UnpackErrorPrinter(), propertiesList, "Purpose",
1006             swInvPurpose, "Version", version);
1007 
1008         if (!success)
1009         {
1010             messages::internalError(asyncResp->res);
1011             return;
1012         }
1013 
1014         if (swInvPurpose == nullptr)
1015         {
1016             BMCWEB_LOG_DEBUG("Can't find property \"Purpose\"!");
1017             messages::internalError(asyncResp->res);
1018             return;
1019         }
1020 
1021         BMCWEB_LOG_DEBUG("swInvPurpose = {}", *swInvPurpose);
1022 
1023         if (version == nullptr)
1024         {
1025             BMCWEB_LOG_DEBUG("Can't find property \"Version\"!");
1026 
1027             messages::internalError(asyncResp->res);
1028 
1029             return;
1030         }
1031         asyncResp->res.jsonValue["Version"] = *version;
1032         asyncResp->res.jsonValue["Id"] = swId;
1033 
1034         // swInvPurpose is of format:
1035         // xyz.openbmc_project.Software.Version.VersionPurpose.ABC
1036         // Translate this to "ABC image"
1037         size_t endDesc = swInvPurpose->rfind('.');
1038         if (endDesc == std::string::npos)
1039         {
1040             messages::internalError(asyncResp->res);
1041             return;
1042         }
1043         endDesc++;
1044         if (endDesc >= swInvPurpose->size())
1045         {
1046             messages::internalError(asyncResp->res);
1047             return;
1048         }
1049 
1050         std::string formatDesc = swInvPurpose->substr(endDesc);
1051         asyncResp->res.jsonValue["Description"] = formatDesc + " image";
1052         getRelatedItems(asyncResp, *swInvPurpose);
1053     });
1054 }
1055 
1056 inline void handleUpdateServiceFirmwareInventoryGet(
1057     App& app, const crow::Request& req,
1058     const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
1059     const std::string& param)
1060 {
1061     if (!redfish::setUpRedfishRoute(app, req, asyncResp))
1062     {
1063         return;
1064     }
1065     std::shared_ptr<std::string> swId = std::make_shared<std::string>(param);
1066 
1067     asyncResp->res.jsonValue["@odata.id"] = boost::urls::format(
1068         "/redfish/v1/UpdateService/FirmwareInventory/{}", *swId);
1069 
1070     constexpr std::array<std::string_view, 1> interfaces = {
1071         "xyz.openbmc_project.Software.Version"};
1072     dbus::utility::getSubTree(
1073         "/", 0, interfaces,
1074         [asyncResp,
1075          swId](const boost::system::error_code& ec,
1076                const dbus::utility::MapperGetSubTreeResponse& subtree) {
1077         BMCWEB_LOG_DEBUG("doGet callback...");
1078         if (ec)
1079         {
1080             messages::internalError(asyncResp->res);
1081             return;
1082         }
1083 
1084         // Ensure we find our input swId, otherwise return an error
1085         bool found = false;
1086         for (const std::pair<
1087                  std::string,
1088                  std::vector<std::pair<std::string, std::vector<std::string>>>>&
1089                  obj : subtree)
1090         {
1091             if (!obj.first.ends_with(*swId))
1092             {
1093                 continue;
1094             }
1095 
1096             if (obj.second.empty())
1097             {
1098                 continue;
1099             }
1100 
1101             found = true;
1102             sw_util::getSwStatus(asyncResp, swId, obj.second[0].first);
1103             getSoftwareVersion(asyncResp, obj.second[0].first, obj.first,
1104                                *swId);
1105         }
1106         if (!found)
1107         {
1108             BMCWEB_LOG_WARNING("Input swID {} not found!", *swId);
1109             messages::resourceMissingAtURI(
1110                 asyncResp->res,
1111                 boost::urls::format(
1112                     "/redfish/v1/UpdateService/FirmwareInventory/{}", *swId));
1113             return;
1114         }
1115         asyncResp->res.jsonValue["@odata.type"] =
1116             "#SoftwareInventory.v1_1_0.SoftwareInventory";
1117         asyncResp->res.jsonValue["Name"] = "Software Inventory";
1118         asyncResp->res.jsonValue["Status"]["HealthRollup"] = "OK";
1119 
1120         asyncResp->res.jsonValue["Updateable"] = false;
1121         sw_util::getSwUpdatableStatus(asyncResp, swId);
1122     });
1123 }
1124 
1125 inline void requestRoutesUpdateService(App& app)
1126 {
1127     BMCWEB_ROUTE(
1128         app, "/redfish/v1/UpdateService/Actions/UpdateService.SimpleUpdate/")
1129         .privileges(redfish::privileges::postUpdateService)
1130         .methods(boost::beast::http::verb::post)(std::bind_front(
1131             handleUpdateServiceSimpleUpdateAction, std::ref(app)));
1132 
1133     BMCWEB_ROUTE(app, "/redfish/v1/UpdateService/FirmwareInventory/<str>/")
1134         .privileges(redfish::privileges::getSoftwareInventory)
1135         .methods(boost::beast::http::verb::get)(std::bind_front(
1136             handleUpdateServiceFirmwareInventoryGet, std::ref(app)));
1137 
1138     BMCWEB_ROUTE(app, "/redfish/v1/UpdateService/")
1139         .privileges(redfish::privileges::getUpdateService)
1140         .methods(boost::beast::http::verb::get)(
1141             std::bind_front(handleUpdateServiceGet, std::ref(app)));
1142 
1143     BMCWEB_ROUTE(app, "/redfish/v1/UpdateService/")
1144         .privileges(redfish::privileges::patchUpdateService)
1145         .methods(boost::beast::http::verb::patch)(
1146             std::bind_front(handleUpdateServicePatch, std::ref(app)));
1147 
1148     BMCWEB_ROUTE(app, "/redfish/v1/UpdateService/update/")
1149         .privileges(redfish::privileges::postUpdateService)
1150         .methods(boost::beast::http::verb::post)(
1151             std::bind_front(handleUpdateServicePost, std::ref(app)));
1152 
1153     BMCWEB_ROUTE(app, "/redfish/v1/UpdateService/FirmwareInventory/")
1154         .privileges(redfish::privileges::getSoftwareInventoryCollection)
1155         .methods(boost::beast::http::verb::get)(std::bind_front(
1156             handleUpdateServiceFirmwareInventoryCollectionGet, std::ref(app)));
1157 }
1158 
1159 } // namespace redfish
1160