1 /*
2  * Copyright 2018 Google Inc.
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *     http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16 
17 #include "updater.hpp"
18 
19 #include "flags.hpp"
20 #include "handler.hpp"
21 #include "status.hpp"
22 #include "tool_errors.hpp"
23 #include "util.hpp"
24 
25 #include <algorithm>
26 #include <cstring>
27 #include <ipmiblob/blob_errors.hpp>
28 #include <memory>
29 #include <string>
30 #include <thread>
31 #include <unordered_map>
32 #include <vector>
33 
34 namespace host_tool
35 {
36 
37 void updaterMain(UpdateHandlerInterface* updater, const std::string& imagePath,
38                  const std::string& signaturePath,
39                  const std::string& layoutType)
40 {
41     /* TODO: validate the layoutType isn't a special value such as: 'update',
42      * 'verify', or 'hash'
43      */
44     std::string layout = "/flash/" + layoutType;
45 
46     bool goalSupported = updater->checkAvailable(layout);
47     if (!goalSupported)
48     {
49         throw ToolException("Goal firmware or interface not supported");
50     }
51 
52     /* Yay, our data handler is supported. */
53     try
54     {
55         /* Send over the firmware image. */
56         std::fprintf(stderr, "Sending over the firmware image.\n");
57         updater->sendFile(layout, imagePath);
58 
59         /* Send over the hash contents. */
60         std::fprintf(stderr, "Sending over the hash file.\n");
61         updater->sendFile(ipmi_flash::hashBlobId, signaturePath);
62 
63         /* Trigger the verification by opening and committing the verify file.
64          */
65         std::fprintf(stderr, "Opening the verification file\n");
66         if (updater->verifyFile(ipmi_flash::verifyBlobId))
67         {
68             std::fprintf(stderr, "succeeded\n");
69         }
70         else
71         {
72             std::fprintf(stderr, "failed\n");
73             throw ToolException("Verification failed");
74         }
75 
76         /* Trigger the update by opening and committing the update file. */
77         std::fprintf(stderr, "Opening the update file\n");
78         if (updater->verifyFile(ipmi_flash::updateBlobId))
79         {
80             std::fprintf(stderr, "succeeded\n");
81         }
82         else
83         {
84             /* Depending on the update mechanism used, this may be
85              * uninteresting. For instance, for the static layout, we use the
86              * reboot update mechanism.  Which doesn't always lead to a
87              * successful return before the BMC starts shutting down services.
88              */
89             std::fprintf(stderr, "failed\n");
90             throw ToolException("Update failed");
91         }
92     }
93     catch (...)
94     {
95         updater->cleanArtifacts();
96         throw;
97     }
98 }
99 
100 } // namespace host_tool
101