mirror of
https://git.proxmox.com/git/fwupd
synced 2025-06-04 16:05:11 +00:00

We do not want to export this unfinished API, and it's probably best just to not compile it by default until it is actually useful.
6747 lines
200 KiB
C
6747 lines
200 KiB
C
/*
|
|
* Copyright (C) 2015 Richard Hughes <richard@hughsie.com>
|
|
*
|
|
* SPDX-License-Identifier: LGPL-2.1+
|
|
*/
|
|
|
|
#define G_LOG_DOMAIN "FuEngine"
|
|
|
|
#include "config.h"
|
|
|
|
#include <gio/gio.h>
|
|
#ifdef HAVE_GIO_UNIX
|
|
#include <gio/gunixinputstream.h>
|
|
#endif
|
|
#include <glib-object.h>
|
|
#include <string.h>
|
|
#ifdef HAVE_UTSNAME_H
|
|
#include <sys/utsname.h>
|
|
#endif
|
|
#include <errno.h>
|
|
|
|
#include "fwupd-common-private.h"
|
|
#include "fwupd-enums-private.h"
|
|
#include "fwupd-error.h"
|
|
#include "fwupd-release-private.h"
|
|
#include "fwupd-remote-private.h"
|
|
#include "fwupd-resources.h"
|
|
#include "fwupd-security-attr-private.h"
|
|
|
|
#include "fu-backend.h"
|
|
#include "fu-cabinet.h"
|
|
#include "fu-common-cab.h"
|
|
#include "fu-common.h"
|
|
#include "fu-config.h"
|
|
#include "fu-debug.h"
|
|
#include "fu-device-list.h"
|
|
#include "fu-device-private.h"
|
|
#include "fu-engine.h"
|
|
#include "fu-engine-helper.h"
|
|
#include "fu-engine-request.h"
|
|
#include "fu-hwids.h"
|
|
#include "fu-idle.h"
|
|
#include "fu-keyring-utils.h"
|
|
#include "fu-hash.h"
|
|
#include "fu-history.h"
|
|
#include "fu-mutex.h"
|
|
#include "fu-plugin.h"
|
|
#include "fu-plugin-list.h"
|
|
#include "fu-plugin-private.h"
|
|
#include "fu-quirks.h"
|
|
#include "fu-remote-list.h"
|
|
#include "fu-security-attr.h"
|
|
#include "fu-security-attrs-private.h"
|
|
#include "fu-smbios-private.h"
|
|
#include "fu-udev-device-private.h"
|
|
|
|
#ifdef HAVE_GUDEV
|
|
#include "fu-udev-backend.h"
|
|
#endif
|
|
#ifdef HAVE_GUSB
|
|
#include "fu-usb-backend.h"
|
|
#endif
|
|
#ifdef HAVE_BLUEZ
|
|
#include "fu-bluez-backend.h"
|
|
#endif
|
|
|
|
#include "fu-dfu-firmware.h"
|
|
#include "fu-dfuse-firmware.h"
|
|
#include "fu-fmap-firmware.h"
|
|
#include "fu-ihex-firmware.h"
|
|
#include "fu-srec-firmware.h"
|
|
|
|
/* only needed until we hard depend on jcat 0.1.3 */
|
|
#include <libjcat/jcat-version.h>
|
|
|
|
#ifdef HAVE_SYSTEMD
|
|
#include "fu-systemd.h"
|
|
#endif
|
|
|
|
static void fu_engine_finalize (GObject *obj);
|
|
static void fu_engine_ensure_security_attrs (FuEngine *self);
|
|
|
|
struct _FuEngine
|
|
{
|
|
GObject parent_instance;
|
|
FuAppFlags app_flags;
|
|
GPtrArray *backends;
|
|
FuConfig *config;
|
|
FuRemoteList *remote_list;
|
|
FuDeviceList *device_list;
|
|
FwupdStatus status;
|
|
gboolean tainted;
|
|
guint percentage;
|
|
FuHistory *history;
|
|
FuIdle *idle;
|
|
XbSilo *silo;
|
|
gboolean coldplug_running;
|
|
guint coldplug_id;
|
|
guint coldplug_delay;
|
|
FuPluginList *plugin_list;
|
|
GPtrArray *plugin_filter;
|
|
GPtrArray *udev_subsystems;
|
|
FuSmbios *smbios;
|
|
FuHwids *hwids;
|
|
FuQuirks *quirks;
|
|
GHashTable *runtime_versions;
|
|
GHashTable *compile_versions;
|
|
GHashTable *approved_firmware; /* (nullable) */
|
|
GHashTable *blocked_firmware; /* (nullable) */
|
|
GHashTable *firmware_gtypes;
|
|
gchar *host_machine_id;
|
|
JcatContext *jcat_context;
|
|
gboolean loaded;
|
|
gchar *host_security_id;
|
|
FuSecurityAttrs *host_security_attrs;
|
|
};
|
|
|
|
enum {
|
|
SIGNAL_CHANGED,
|
|
SIGNAL_DEVICE_ADDED,
|
|
SIGNAL_DEVICE_REMOVED,
|
|
SIGNAL_DEVICE_CHANGED,
|
|
SIGNAL_STATUS_CHANGED,
|
|
SIGNAL_PERCENTAGE_CHANGED,
|
|
SIGNAL_LAST
|
|
};
|
|
|
|
static guint signals[SIGNAL_LAST] = { 0 };
|
|
|
|
G_DEFINE_TYPE (FuEngine, fu_engine, G_TYPE_OBJECT)
|
|
|
|
#define FU_ENGINE_BATTERY_LEVEL_THRESHOLD 10 /* % */
|
|
|
|
static void
|
|
fu_engine_emit_changed (FuEngine *self)
|
|
{
|
|
g_signal_emit (self, signals[SIGNAL_CHANGED], 0);
|
|
fu_engine_idle_reset (self);
|
|
|
|
/* update the motd */
|
|
if (self->loaded &&
|
|
fu_config_get_update_motd (self->config)) {
|
|
g_autoptr(GError) error_local = NULL;
|
|
if (!fu_engine_update_motd (self, &error_local))
|
|
g_debug ("failed to update MOTD: %s",
|
|
error_local->message);
|
|
}
|
|
}
|
|
|
|
static void
|
|
fu_engine_emit_device_changed (FuEngine *self, FuDevice *device)
|
|
{
|
|
/* invalidate host security attributes */
|
|
g_clear_pointer (&self->host_security_id, g_free);
|
|
g_signal_emit (self, signals[SIGNAL_DEVICE_CHANGED], 0, device);
|
|
}
|
|
|
|
static gint
|
|
fu_engine_gtypes_sort_cb (gconstpointer a, gconstpointer b)
|
|
{
|
|
const gchar *stra = *((const gchar **) a);
|
|
const gchar *strb = *((const gchar **) b);
|
|
return g_strcmp0 (stra, strb);
|
|
}
|
|
|
|
GPtrArray *
|
|
fu_engine_get_firmware_gtype_ids (FuEngine *self)
|
|
{
|
|
GPtrArray *firmware_gtypes = g_ptr_array_new_with_free_func (g_free);
|
|
g_autoptr(GList) keys = g_hash_table_get_keys (self->firmware_gtypes);
|
|
for (GList *l = keys; l != NULL; l = l->next) {
|
|
const gchar *id = l->data;
|
|
g_ptr_array_add (firmware_gtypes, g_strdup (id));
|
|
}
|
|
g_ptr_array_sort (firmware_gtypes, fu_engine_gtypes_sort_cb);
|
|
return firmware_gtypes;
|
|
}
|
|
|
|
GType
|
|
fu_engine_get_firmware_gtype_by_id (FuEngine *self, const gchar *id)
|
|
{
|
|
return GPOINTER_TO_SIZE (g_hash_table_lookup (self->firmware_gtypes, id));
|
|
}
|
|
|
|
static void
|
|
fu_engine_add_firmware_gtype (FuEngine *self, const gchar *id, GType gtype)
|
|
{
|
|
g_hash_table_insert (self->firmware_gtypes, g_strdup (id), GSIZE_TO_POINTER (gtype));
|
|
}
|
|
|
|
/**
|
|
* fu_engine_get_status:
|
|
* @self: A #FuEngine
|
|
*
|
|
* Gets the current engine status.
|
|
*
|
|
* Returns: a #FwupdStatus, e.g. %FWUPD_STATUS_DECOMPRESSING
|
|
**/
|
|
FwupdStatus
|
|
fu_engine_get_status (FuEngine *self)
|
|
{
|
|
g_return_val_if_fail (FU_IS_ENGINE (self), 0);
|
|
return self->status;
|
|
}
|
|
|
|
static void
|
|
fu_engine_set_status (FuEngine *self, FwupdStatus status)
|
|
{
|
|
if (self->status == status)
|
|
return;
|
|
self->status = status;
|
|
|
|
/* emit changed */
|
|
g_debug ("Emitting PropertyChanged('Status'='%s')",
|
|
fwupd_status_to_string (status));
|
|
g_signal_emit (self, signals[SIGNAL_STATUS_CHANGED], 0, status);
|
|
}
|
|
|
|
static void
|
|
fu_engine_set_percentage (FuEngine *self, guint percentage)
|
|
{
|
|
if (self->percentage == percentage)
|
|
return;
|
|
self->percentage = percentage;
|
|
|
|
/* emit changed */
|
|
g_signal_emit (self, signals[SIGNAL_PERCENTAGE_CHANGED], 0, percentage);
|
|
}
|
|
|
|
static void
|
|
fu_engine_progress_notify_cb (FuDevice *device, GParamSpec *pspec, FuEngine *self)
|
|
{
|
|
if (fu_device_get_status (device) == FWUPD_STATUS_UNKNOWN)
|
|
return;
|
|
fu_engine_set_percentage (self, fu_device_get_progress (device));
|
|
fu_engine_emit_device_changed (self, device);
|
|
}
|
|
|
|
static void
|
|
fu_engine_status_notify_cb (FuDevice *device, GParamSpec *pspec, FuEngine *self)
|
|
{
|
|
fu_engine_set_status (self, fu_device_get_status (device));
|
|
fu_engine_emit_device_changed (self, device);
|
|
}
|
|
|
|
static void
|
|
fu_engine_watch_device (FuEngine *self, FuDevice *device)
|
|
{
|
|
g_autoptr(FuDevice) device_old = fu_device_list_get_old (self->device_list, device);
|
|
if (device_old != NULL) {
|
|
g_signal_handlers_disconnect_by_func (device_old,
|
|
fu_engine_progress_notify_cb,
|
|
self);
|
|
g_signal_handlers_disconnect_by_func (device_old,
|
|
fu_engine_status_notify_cb,
|
|
self);
|
|
}
|
|
g_signal_connect (device, "notify::progress",
|
|
G_CALLBACK (fu_engine_progress_notify_cb), self);
|
|
g_signal_connect (device, "notify::status",
|
|
G_CALLBACK (fu_engine_status_notify_cb), self);
|
|
}
|
|
|
|
static void
|
|
fu_engine_device_added_cb (FuDeviceList *device_list, FuDevice *device, FuEngine *self)
|
|
{
|
|
fu_engine_watch_device (self, device);
|
|
g_signal_emit (self, signals[SIGNAL_DEVICE_ADDED], 0, device);
|
|
}
|
|
|
|
static void
|
|
fu_engine_device_runner_device_removed (FuEngine *self, FuDevice *device)
|
|
{
|
|
GPtrArray *plugins = fu_plugin_list_get_all (self->plugin_list);
|
|
for (guint j = 0; j < plugins->len; j++) {
|
|
FuPlugin *plugin_tmp = g_ptr_array_index (plugins, j);
|
|
fu_plugin_runner_device_removed (plugin_tmp, device);
|
|
}
|
|
}
|
|
|
|
static void
|
|
fu_engine_device_removed_cb (FuDeviceList *device_list, FuDevice *device, FuEngine *self)
|
|
{
|
|
fu_engine_device_runner_device_removed (self, device);
|
|
g_signal_handlers_disconnect_by_data (device, self);
|
|
g_signal_emit (self, signals[SIGNAL_DEVICE_REMOVED], 0, device);
|
|
}
|
|
|
|
static void
|
|
fu_engine_device_changed_cb (FuDeviceList *device_list, FuDevice *device, FuEngine *self)
|
|
{
|
|
fu_engine_watch_device (self, device);
|
|
fu_engine_emit_device_changed (self, device);
|
|
}
|
|
|
|
/* convert hex and decimal versions to dotted style */
|
|
static gchar *
|
|
fu_engine_get_release_version (FuEngine *self, FuDevice *dev, XbNode *rel, GError **error)
|
|
{
|
|
FwupdVersionFormat fmt = fu_device_get_version_format (dev);
|
|
const gchar *version;
|
|
guint64 ver_uint32;
|
|
|
|
/* get version */
|
|
version = xb_node_get_attr (rel, "version");
|
|
if (version == NULL) {
|
|
g_set_error_literal (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOT_SUPPORTED,
|
|
"version unset");
|
|
return NULL;
|
|
}
|
|
|
|
/* already dotted notation */
|
|
if (g_strstr_len (version, -1, ".") != NULL)
|
|
return g_strdup (version);
|
|
|
|
/* don't touch my version! */
|
|
if (fmt == FWUPD_VERSION_FORMAT_PLAIN)
|
|
return g_strdup (version);
|
|
|
|
/* parse as integer */
|
|
ver_uint32 = fu_common_strtoull (version);
|
|
if (fmt == FWUPD_VERSION_FORMAT_UNKNOWN ||
|
|
ver_uint32 == 0 || ver_uint32 > G_MAXUINT32)
|
|
return g_strdup (version);
|
|
|
|
/* convert to dotted decimal */
|
|
return fu_common_version_from_uint32 ((guint32) ver_uint32, fmt);
|
|
}
|
|
|
|
static gint
|
|
fu_engine_scheme_compare_cb (gconstpointer a, gconstpointer b, gpointer user_data)
|
|
{
|
|
FuEngine *self = FU_ENGINE (user_data);
|
|
const gchar *location1 = *((const gchar ** )a);
|
|
const gchar *location2 = *((const gchar **) b);
|
|
g_autofree gchar *scheme1 = fu_common_uri_get_scheme (location1);
|
|
g_autofree gchar *scheme2 = fu_common_uri_get_scheme (location2);
|
|
guint prio1 = fu_config_get_uri_scheme_prio (self->config, scheme1);
|
|
guint prio2 = fu_config_get_uri_scheme_prio (self->config, scheme2);
|
|
if (prio1 < prio2)
|
|
return -1;
|
|
if (prio1 > prio2)
|
|
return 1;
|
|
return 0;
|
|
}
|
|
|
|
static gboolean
|
|
fu_engine_set_release_from_artifact (FuEngine *self,
|
|
FwupdRelease *rel,
|
|
FwupdRemote *remote,
|
|
XbNode *artifact,
|
|
GError **error)
|
|
{
|
|
const gchar *filename;
|
|
guint64 size;
|
|
g_autoptr(GPtrArray) locations = NULL;
|
|
g_autoptr(GPtrArray) checksums = NULL;
|
|
|
|
/* filename */
|
|
filename = xb_node_query_text (artifact, "filename", NULL);
|
|
if (filename != NULL)
|
|
fwupd_release_set_filename (rel, filename);
|
|
|
|
/* location */
|
|
locations = xb_node_query (artifact, "location", 0, NULL);
|
|
if (locations != NULL) {
|
|
for (guint i = 0; i < locations->len; i++) {
|
|
XbNode *n = g_ptr_array_index (locations, i);
|
|
g_autofree gchar *scheme = NULL;
|
|
|
|
/* check the scheme is allowed */
|
|
scheme = fu_common_uri_get_scheme (xb_node_get_text (n));
|
|
if (scheme != NULL) {
|
|
guint prio = fu_config_get_uri_scheme_prio (self->config, scheme);
|
|
if (prio == G_MAXUINT)
|
|
continue;
|
|
}
|
|
|
|
/* build the complete URI */
|
|
if (remote != NULL) {
|
|
g_autofree gchar *uri = NULL;
|
|
uri = fwupd_remote_build_firmware_uri (remote,
|
|
xb_node_get_text (n),
|
|
NULL);
|
|
if (uri != NULL) {
|
|
fwupd_release_add_location (rel, uri);
|
|
continue;
|
|
}
|
|
}
|
|
fwupd_release_add_location (rel, xb_node_get_text (n));
|
|
}
|
|
}
|
|
|
|
/* checksum */
|
|
checksums = xb_node_query (artifact, "checksum", 0, NULL);
|
|
if (checksums != NULL) {
|
|
for (guint i = 0; i < checksums->len; i++) {
|
|
XbNode *n = g_ptr_array_index (checksums, i);
|
|
fwupd_release_add_checksum (rel, xb_node_get_text (n));
|
|
}
|
|
}
|
|
|
|
/* size */
|
|
size = xb_node_query_text_as_uint (artifact, "size[@type='installed']", NULL);
|
|
if (size != G_MAXUINT64)
|
|
fwupd_release_set_size (rel, size);
|
|
|
|
/* success */
|
|
return TRUE;
|
|
}
|
|
|
|
static gboolean
|
|
fu_engine_set_release_from_appstream (FuEngine *self,
|
|
FuDevice *dev,
|
|
FwupdRelease *rel,
|
|
XbNode *component,
|
|
XbNode *release,
|
|
GError **error)
|
|
{
|
|
FwupdRemote *remote = NULL;
|
|
const gchar *tmp;
|
|
const gchar *remote_id;
|
|
guint64 tmp64;
|
|
g_autofree gchar *version_rel = NULL;
|
|
g_autoptr(GPtrArray) cats = NULL;
|
|
g_autoptr(GPtrArray) issues = NULL;
|
|
g_autoptr(XbNode) artifact = NULL;
|
|
g_autoptr(XbNode) description = NULL;
|
|
|
|
/* set from the component */
|
|
tmp = xb_node_query_text (component, "id", NULL);
|
|
if (tmp != NULL)
|
|
fwupd_release_set_appstream_id (rel, tmp);
|
|
tmp = xb_node_query_text (component, "url[@type='homepage']", NULL);
|
|
if (tmp != NULL)
|
|
fwupd_release_set_homepage (rel, tmp);
|
|
tmp = xb_node_query_text (component, "project_license", NULL);
|
|
if (tmp != NULL)
|
|
fwupd_release_set_license (rel, tmp);
|
|
tmp = xb_node_query_text (component, "name", NULL);
|
|
if (tmp != NULL)
|
|
fwupd_release_set_name (rel, tmp);
|
|
tmp = xb_node_query_text (component, "summary", NULL);
|
|
if (tmp != NULL)
|
|
fwupd_release_set_summary (rel, tmp);
|
|
tmp = xb_node_query_text (component, "branch", NULL);
|
|
if (tmp != NULL)
|
|
fwupd_release_set_branch (rel, tmp);
|
|
tmp = xb_node_query_text (component, "developer_name", NULL);
|
|
if (tmp != NULL)
|
|
fwupd_release_set_vendor (rel, tmp);
|
|
|
|
/* refresh the device and release to the new version format too */
|
|
fu_engine_md_refresh_device_from_component (self, dev, component);
|
|
|
|
/* the version is fixed up at runtime */
|
|
version_rel = fu_engine_get_release_version (self, dev, release, error);
|
|
if (version_rel == NULL)
|
|
return FALSE;
|
|
fwupd_release_set_version (rel, version_rel);
|
|
|
|
/* find the remote */
|
|
remote_id = xb_node_query_text (component, "../custom/value[@key='fwupd::RemoteId']", NULL);
|
|
if (remote_id != NULL) {
|
|
fwupd_release_set_remote_id (rel, remote_id);
|
|
remote = fu_remote_list_get_by_id (self->remote_list, remote_id);
|
|
if (remote == NULL)
|
|
g_warning ("no remote found for release %s", version_rel);
|
|
}
|
|
artifact = xb_node_query_first (release, "artifacts/artifact", NULL);
|
|
if (artifact != NULL) {
|
|
if (!fu_engine_set_release_from_artifact (self,
|
|
rel,
|
|
remote,
|
|
artifact,
|
|
error))
|
|
return FALSE;
|
|
}
|
|
description = xb_node_query_first (release, "description", NULL);
|
|
if (description != NULL) {
|
|
g_autofree gchar *xml = NULL;
|
|
xml = xb_node_export (description, XB_NODE_EXPORT_FLAG_ONLY_CHILDREN, NULL);
|
|
if (xml != NULL)
|
|
fwupd_release_set_description (rel, xml);
|
|
}
|
|
if (artifact == NULL) {
|
|
tmp = xb_node_query_text (release, "location", NULL);
|
|
if (tmp != NULL) {
|
|
g_autofree gchar *uri = NULL;
|
|
if (remote != NULL)
|
|
uri = fwupd_remote_build_firmware_uri (remote, tmp, NULL);
|
|
if (uri == NULL)
|
|
uri = g_strdup (tmp);
|
|
fwupd_release_add_location (rel, uri);
|
|
} else if (remote != NULL &&
|
|
fwupd_remote_get_kind (remote) == FWUPD_REMOTE_KIND_DIRECTORY) {
|
|
g_autofree gchar *uri = NULL;
|
|
tmp = xb_node_query_text (component, "../custom/value[@key='fwupd::FilenameCache']", NULL);
|
|
if (tmp != NULL) {
|
|
uri = g_strdup_printf ("file://%s", tmp);
|
|
fwupd_release_add_location (rel, uri);
|
|
}
|
|
}
|
|
}
|
|
if (artifact == NULL) {
|
|
tmp = xb_node_query_text (release, "checksum[@target='content']", NULL);
|
|
if (tmp != NULL)
|
|
fwupd_release_set_filename (rel, tmp);
|
|
}
|
|
tmp = xb_node_query_text (release, "url[@type='details']", NULL);
|
|
if (tmp != NULL)
|
|
fwupd_release_set_details_url (rel, tmp);
|
|
tmp = xb_node_query_text (release, "url[@type='source']", NULL);
|
|
if (tmp != NULL)
|
|
fwupd_release_set_source_url (rel, tmp);
|
|
if (artifact == NULL) {
|
|
tmp = xb_node_query_text (release, "checksum[@target='container']", NULL);
|
|
if (tmp != NULL)
|
|
fwupd_release_add_checksum (rel, tmp);
|
|
}
|
|
if (artifact == NULL) {
|
|
tmp64 = xb_node_query_text_as_uint (release, "size[@type='installed']", NULL);
|
|
if (tmp64 != G_MAXUINT64)
|
|
fwupd_release_set_size (rel, tmp64);
|
|
}
|
|
if (fwupd_release_get_size (rel) == 0) {
|
|
GBytes *sz = xb_node_get_data (release, "fwupd::ReleaseSize");
|
|
if (sz != NULL) {
|
|
const guint64 *sizeptr = g_bytes_get_data (sz, NULL);
|
|
fwupd_release_set_size (rel, *sizeptr);
|
|
}
|
|
}
|
|
tmp = xb_node_get_attr (release, "urgency");
|
|
if (tmp != NULL)
|
|
fwupd_release_set_urgency (rel, fwupd_release_urgency_from_string (tmp));
|
|
tmp64 = xb_node_get_attr_as_uint (release, "install_duration");
|
|
if (tmp64 != G_MAXUINT64)
|
|
fwupd_release_set_install_duration (rel, tmp64);
|
|
tmp64 = xb_node_get_attr_as_uint (release, "timestamp");
|
|
if (tmp64 != G_MAXUINT64)
|
|
fwupd_release_set_created (rel, tmp64);
|
|
cats = xb_node_query (component, "categories/category", 0, NULL);
|
|
if (cats != NULL) {
|
|
for (guint i = 0; i < cats->len; i++) {
|
|
XbNode *n = g_ptr_array_index (cats, i);
|
|
fwupd_release_add_category (rel, xb_node_get_text (n));
|
|
}
|
|
}
|
|
issues = xb_node_query (component, "issues/issue", 0, NULL);
|
|
if (issues != NULL) {
|
|
for (guint i = 0; i < issues->len; i++) {
|
|
XbNode *n = g_ptr_array_index (issues, i);
|
|
fwupd_release_add_issue (rel, xb_node_get_text (n));
|
|
}
|
|
}
|
|
tmp = xb_node_query_text (component, "screenshots/screenshot/caption", NULL);
|
|
if (tmp != NULL)
|
|
fwupd_release_set_detach_caption (rel, tmp);
|
|
tmp = xb_node_query_text (component, "screenshots/screenshot/image", NULL);
|
|
if (tmp != NULL)
|
|
fwupd_release_set_detach_image (rel, tmp);
|
|
tmp = xb_node_query_text (component, "custom/value[@key='LVFS::UpdateProtocol']", NULL);
|
|
if (tmp != NULL)
|
|
fwupd_release_set_protocol (rel, tmp);
|
|
tmp = xb_node_query_text (component, "custom/value[@key='LVFS::UpdateMessage']", NULL);
|
|
if (tmp != NULL)
|
|
fwupd_release_set_update_message (rel, tmp);
|
|
tmp = xb_node_query_text (component, "custom/value[@key='LVFS::UpdateImage']", NULL);
|
|
if (tmp != NULL)
|
|
fwupd_release_set_update_image (rel, tmp);
|
|
|
|
/* sort the locations by scheme */
|
|
g_ptr_array_sort_with_data (fwupd_release_get_locations (rel),
|
|
fu_engine_scheme_compare_cb, self);
|
|
return TRUE;
|
|
}
|
|
|
|
/* finds the remote-id for the first firmware in the silo that matches this
|
|
* container checksum */
|
|
static const gchar *
|
|
fu_engine_get_remote_id_for_checksum (FuEngine *self, const gchar *csum)
|
|
{
|
|
g_autofree gchar *xpath = NULL;
|
|
g_autoptr(XbNode) key = NULL;
|
|
xpath = g_strdup_printf ("components/component[@type='firmware']/releases/release/"
|
|
"checksum[@target='container'][text()='%s']/../../"
|
|
"../../custom/value[@key='fwupd::RemoteId']", csum);
|
|
key = xb_silo_query_first (self->silo, xpath, NULL);
|
|
if (key == NULL)
|
|
return NULL;
|
|
return xb_node_get_text (key);
|
|
}
|
|
|
|
/**
|
|
* fu_engine_unlock:
|
|
* @self: A #FuEngine
|
|
* @device_id: A device ID
|
|
* @error: A #GError, or %NULL
|
|
*
|
|
* Unlocks a device.
|
|
*
|
|
* Returns: %TRUE for success
|
|
**/
|
|
gboolean
|
|
fu_engine_unlock (FuEngine *self, const gchar *device_id, GError **error)
|
|
{
|
|
FuPlugin *plugin;
|
|
g_autoptr(FuDevice) device = NULL;
|
|
|
|
g_return_val_if_fail (FU_IS_ENGINE (self), FALSE);
|
|
g_return_val_if_fail (device_id != NULL, FALSE);
|
|
g_return_val_if_fail (error == NULL || *error == NULL, FALSE);
|
|
|
|
/* check the device exists */
|
|
device = fu_device_list_get_by_id (self->device_list, device_id, error);
|
|
if (device == NULL)
|
|
return FALSE;
|
|
|
|
/* get the plugin */
|
|
plugin = fu_plugin_list_find_by_name (self->plugin_list,
|
|
fu_device_get_plugin (device),
|
|
error);
|
|
if (plugin == NULL)
|
|
return FALSE;
|
|
|
|
/* run the correct plugin that added this */
|
|
if (!fu_plugin_runner_unlock (plugin, device, error))
|
|
return FALSE;
|
|
|
|
/* make the UI update */
|
|
fu_engine_emit_device_changed (self, device);
|
|
fu_engine_emit_changed (self);
|
|
return TRUE;
|
|
}
|
|
|
|
gboolean
|
|
fu_engine_modify_config (FuEngine *self, const gchar *key, const gchar *value, GError **error)
|
|
{
|
|
const gchar *keys[] = {
|
|
"ArchiveSizeMax",
|
|
"DisabledDevices",
|
|
"BlockedFirmware",
|
|
"DisabledPlugins",
|
|
"IdleTimeout",
|
|
"VerboseDomains",
|
|
"UpdateMotd",
|
|
"EnumerateAllDevices",
|
|
NULL };
|
|
|
|
g_return_val_if_fail (FU_IS_ENGINE (self), FALSE);
|
|
g_return_val_if_fail (key != NULL, FALSE);
|
|
g_return_val_if_fail (value != NULL, FALSE);
|
|
g_return_val_if_fail (error == NULL || *error == NULL, FALSE);
|
|
|
|
/* check keys are valid */
|
|
if (!g_strv_contains (keys, key)) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOT_FOUND,
|
|
"key %s not supported", key);
|
|
return FALSE;
|
|
}
|
|
|
|
/* modify, effective next reboot */
|
|
return fu_config_set_key_value (self->config, key, value, error);
|
|
}
|
|
|
|
/**
|
|
* fu_engine_modify_remote:
|
|
* @self: A #FuEngine
|
|
* @remote_id: A remote ID
|
|
* @key: the key, e.g. `Enabled`
|
|
* @value: the key, e.g. `true`
|
|
* @error: A #GError, or %NULL
|
|
*
|
|
* Updates the verification silo entry for a specific device.
|
|
*
|
|
* Returns: %TRUE for success
|
|
**/
|
|
gboolean
|
|
fu_engine_modify_remote (FuEngine *self,
|
|
const gchar *remote_id,
|
|
const gchar *key,
|
|
const gchar *value,
|
|
GError **error)
|
|
{
|
|
const gchar *keys[] = {
|
|
"ApprovalRequired",
|
|
"AutomaticReports",
|
|
"AutomaticSecurityReports",
|
|
"Enabled",
|
|
"FirmwareBaseURI",
|
|
"MetadataURI",
|
|
"ReportURI",
|
|
"SecurityReportURI",
|
|
NULL,
|
|
};
|
|
|
|
/* check keys are valid */
|
|
if (!g_strv_contains (keys, key)) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOT_FOUND,
|
|
"key %s not supported", key);
|
|
return FALSE;
|
|
}
|
|
return fu_remote_list_set_key_value (self->remote_list, remote_id, key, value, error);
|
|
}
|
|
|
|
/**
|
|
* fu_engine_modify_device:
|
|
* @self: A #FuEngine
|
|
* @device_id: A device ID
|
|
* @key: the key, e.g. `Flags`
|
|
* @value: the key, e.g. `reported`
|
|
* @error: A #GError, or %NULL
|
|
*
|
|
* Sets the reported flag for a specific device. This ensures that other
|
|
* front-end clients for fwupd do not report the same event.
|
|
*
|
|
* Returns: %TRUE for success
|
|
**/
|
|
gboolean
|
|
fu_engine_modify_device (FuEngine *self,
|
|
const gchar *device_id,
|
|
const gchar *key,
|
|
const gchar *value,
|
|
GError **error)
|
|
{
|
|
g_autoptr(FuDevice) device = NULL;
|
|
|
|
/* find the correct device */
|
|
device = fu_history_get_device_by_id (self->history, device_id, error);
|
|
if (device == NULL)
|
|
return FALSE;
|
|
|
|
/* support adding a subset of the device flags */
|
|
if (g_strcmp0 (key, "Flags") == 0) {
|
|
FwupdDeviceFlags flag = fwupd_device_flag_from_string (value);
|
|
if (flag == FWUPD_DEVICE_FLAG_UNKNOWN) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOT_SUPPORTED,
|
|
"key %s not a valid flag", key);
|
|
return FALSE;
|
|
}
|
|
if (flag != FWUPD_DEVICE_FLAG_REPORTED &&
|
|
flag != FWUPD_DEVICE_FLAG_NOTIFIED) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOT_SUPPORTED,
|
|
"flag %s cannot be set from client", key);
|
|
return FALSE;
|
|
}
|
|
fu_device_add_flag (device, flag);
|
|
return fu_history_modify_device (self->history, device, error);
|
|
}
|
|
|
|
/* others invalid */
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOT_SUPPORTED,
|
|
"key %s not supported", key);
|
|
return FALSE;
|
|
}
|
|
|
|
static const gchar *
|
|
fu_engine_checksum_type_to_string (GChecksumType checksum_type)
|
|
{
|
|
if (checksum_type == G_CHECKSUM_SHA1)
|
|
return "sha1";
|
|
if (checksum_type == G_CHECKSUM_SHA256)
|
|
return "sha256";
|
|
if (checksum_type == G_CHECKSUM_SHA512)
|
|
return "sha512";
|
|
return "sha1";
|
|
}
|
|
|
|
/**
|
|
* fu_engine_verify_update:
|
|
* @self: A #FuEngine
|
|
* @device_id: A device ID
|
|
* @error: A #GError, or %NULL
|
|
*
|
|
* Updates the verification silo entry for a specific device.
|
|
*
|
|
* Returns: %TRUE for success
|
|
**/
|
|
gboolean
|
|
fu_engine_verify_update (FuEngine *self, const gchar *device_id, GError **error)
|
|
{
|
|
FuPlugin *plugin;
|
|
GPtrArray *checksums;
|
|
GPtrArray *guids;
|
|
g_autofree gchar *fn = NULL;
|
|
g_autofree gchar *localstatedir = NULL;
|
|
g_autoptr(FuDevice) device = NULL;
|
|
g_autoptr(GFile) file = NULL;
|
|
g_autoptr(XbBuilder) builder = xb_builder_new ();
|
|
g_autoptr(XbBuilderNode) component = NULL;
|
|
g_autoptr(XbBuilderNode) provides = NULL;
|
|
g_autoptr(XbBuilderNode) release = NULL;
|
|
g_autoptr(XbBuilderNode) releases = NULL;
|
|
g_autoptr(XbSilo) silo = NULL;
|
|
|
|
g_return_val_if_fail (FU_IS_ENGINE (self), FALSE);
|
|
g_return_val_if_fail (device_id != NULL, FALSE);
|
|
g_return_val_if_fail (error == NULL || *error == NULL, FALSE);
|
|
|
|
/* check the devices still exists */
|
|
device = fu_device_list_get_by_id (self->device_list, device_id, error);
|
|
if (device == NULL)
|
|
return FALSE;
|
|
|
|
/* get the plugin */
|
|
plugin = fu_plugin_list_find_by_name (self->plugin_list,
|
|
fu_device_get_plugin (device),
|
|
error);
|
|
if (plugin == NULL)
|
|
return FALSE;
|
|
|
|
/* get the checksum */
|
|
checksums = fu_device_get_checksums (device);
|
|
if (checksums->len == 0) {
|
|
if (!fu_plugin_runner_verify (plugin, device,
|
|
FU_PLUGIN_VERIFY_FLAG_NONE,
|
|
error))
|
|
return FALSE;
|
|
fu_engine_emit_device_changed (self, device);
|
|
}
|
|
|
|
/* we got nothing */
|
|
if (checksums->len == 0) {
|
|
g_set_error_literal (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOT_SUPPORTED,
|
|
"device verification not supported");
|
|
return FALSE;
|
|
}
|
|
|
|
/* build XML */
|
|
component = xb_builder_node_insert (NULL, "component",
|
|
"type", "firmware",
|
|
NULL);
|
|
provides = xb_builder_node_insert (component, "provides", NULL);
|
|
guids = fu_device_get_guids (device);
|
|
for (guint i = 0; i < guids->len; i++) {
|
|
const gchar *guid = g_ptr_array_index (guids, i);
|
|
g_autoptr(XbBuilderNode) provide = NULL;
|
|
provide = xb_builder_node_insert (provides, "firmware",
|
|
"type", "flashed",
|
|
NULL);
|
|
xb_builder_node_set_text (provide, guid, -1);
|
|
}
|
|
releases = xb_builder_node_insert (component, "releases", NULL);
|
|
release = xb_builder_node_insert (releases, "release",
|
|
"version", fu_device_get_version (device),
|
|
NULL);
|
|
for (guint i = 0; i < checksums->len; i++) {
|
|
const gchar *checksum = g_ptr_array_index (checksums, i);
|
|
GChecksumType kind = fwupd_checksum_guess_kind (checksum);
|
|
g_autoptr(XbBuilderNode) csum = NULL;
|
|
csum = xb_builder_node_insert (release, "checksum",
|
|
"type", fu_engine_checksum_type_to_string (kind),
|
|
"target", "content",
|
|
NULL);
|
|
xb_builder_node_set_text (csum, checksum, -1);
|
|
}
|
|
xb_builder_import_node (builder, component);
|
|
|
|
/* save silo */
|
|
localstatedir = fu_common_get_path (FU_PATH_KIND_LOCALSTATEDIR_PKG);
|
|
fn = g_strdup_printf ("%s/verify/%s.xml", localstatedir, device_id);
|
|
if (!fu_common_mkdir_parent (fn, error))
|
|
return FALSE;
|
|
file = g_file_new_for_path (fn);
|
|
silo = xb_builder_compile (builder, XB_BUILDER_COMPILE_FLAG_NONE, NULL, error);
|
|
if (silo == NULL)
|
|
return FALSE;
|
|
if (!xb_silo_export_file (silo, file,
|
|
XB_NODE_EXPORT_FLAG_FORMAT_MULTILINE,
|
|
NULL, error))
|
|
return FALSE;
|
|
|
|
/* success */
|
|
return TRUE;
|
|
}
|
|
|
|
XbNode *
|
|
fu_engine_get_component_by_guids (FuEngine *self, FuDevice *device)
|
|
{
|
|
GPtrArray *guids = fu_device_get_guids (device);
|
|
g_autoptr(GString) xpath = g_string_new (NULL);
|
|
g_autoptr(XbNode) component = NULL;
|
|
for (guint i = 0; i < guids->len; i++) {
|
|
const gchar *guid = g_ptr_array_index (guids, i);
|
|
xb_string_append_union (xpath,
|
|
"components/component[@type='firmware']/"
|
|
"provides/firmware[@type='flashed'][text()='%s']/"
|
|
"../..", guid);
|
|
}
|
|
component = xb_silo_query_first (self->silo, xpath->str, NULL);
|
|
if (component != NULL)
|
|
return g_steal_pointer (&component);
|
|
return NULL;
|
|
}
|
|
|
|
static XbNode *
|
|
fu_engine_verify_from_local_metadata (FuEngine *self,
|
|
FuDevice *device,
|
|
GError **error)
|
|
{
|
|
g_autofree gchar *fn = NULL;
|
|
g_autofree gchar *localstatedir = NULL;
|
|
g_autofree gchar *xpath = NULL;
|
|
g_autoptr(GFile) file = NULL;
|
|
g_autoptr(XbBuilder) builder = xb_builder_new ();
|
|
g_autoptr(XbBuilderSource) source = xb_builder_source_new ();
|
|
g_autoptr(XbNode) release = NULL;
|
|
g_autoptr(XbSilo) silo = NULL;
|
|
|
|
localstatedir = fu_common_get_path (FU_PATH_KIND_LOCALSTATEDIR_PKG);
|
|
fn = g_strdup_printf ("%s/verify/%s.xml",
|
|
localstatedir,
|
|
fu_device_get_id (device));
|
|
file = g_file_new_for_path (fn);
|
|
if (!g_file_query_exists (file, NULL)) {
|
|
g_set_error (error,
|
|
G_IO_ERROR,
|
|
G_IO_ERROR_NOT_FOUND,
|
|
"failed to find %s", fn);
|
|
return NULL;
|
|
}
|
|
|
|
if (!xb_builder_source_load_file (source, file,
|
|
XB_BUILDER_SOURCE_FLAG_NONE,
|
|
NULL, error))
|
|
return NULL;
|
|
xb_builder_import_source (builder, source);
|
|
silo = xb_builder_compile (builder,
|
|
XB_BUILDER_COMPILE_FLAG_NONE,
|
|
NULL, error);
|
|
if (silo == NULL)
|
|
return NULL;
|
|
xpath = g_strdup_printf ("component/releases/release[@version='%s']",
|
|
fu_device_get_version (device));
|
|
release = xb_silo_query_first (silo, xpath, error);
|
|
if (release == NULL)
|
|
return NULL;
|
|
|
|
/* silo has to have same lifecycle as node */
|
|
g_object_set_data_full (G_OBJECT (release), "XbSilo",
|
|
g_steal_pointer (&silo),
|
|
(GDestroyNotify) g_object_unref);
|
|
return g_steal_pointer (&release);
|
|
}
|
|
|
|
static XbNode *
|
|
fu_engine_verify_from_system_metadata (FuEngine *self,
|
|
FuDevice *device,
|
|
GError **error)
|
|
{
|
|
FwupdVersionFormat fmt = fu_device_get_version_format (device);
|
|
GPtrArray *guids = fu_device_get_guids (device);
|
|
g_autoptr(XbQuery) query = NULL;
|
|
|
|
/* prepare query with bound GUID parameter */
|
|
query = xb_query_new_full (self->silo,
|
|
"components/component[@type='firmware']/"
|
|
"provides/firmware[@type='flashed'][text()=?]/"
|
|
"../../releases/release",
|
|
XB_QUERY_FLAG_OPTIMIZE |
|
|
XB_QUERY_FLAG_USE_INDEXES,
|
|
error);
|
|
if (query == NULL)
|
|
return NULL;
|
|
|
|
/* use prepared query for each GUID */
|
|
for (guint i = 0; i < guids->len; i++) {
|
|
const gchar *guid = g_ptr_array_index (guids, i);
|
|
g_autoptr(GError) error_local = NULL;
|
|
g_autoptr(GPtrArray) releases = NULL;
|
|
#if LIBXMLB_CHECK_VERSION(0,3,0)
|
|
g_auto(XbQueryContext) context = XB_QUERY_CONTEXT_INIT ();
|
|
#endif
|
|
|
|
/* bind GUID and then query */
|
|
#if LIBXMLB_CHECK_VERSION(0,3,0)
|
|
xb_value_bindings_bind_str (xb_query_context_get_bindings (&context), 0, guid, NULL);
|
|
releases = xb_silo_query_with_context (self->silo, query, &context, &error_local);
|
|
#else
|
|
if (!xb_query_bind_str (query, 0, guid, error)) {
|
|
g_prefix_error (error, "failed to bind string: ");
|
|
return NULL;
|
|
}
|
|
releases = xb_silo_query_full (self->silo, query, &error_local);
|
|
#endif
|
|
if (releases == NULL) {
|
|
if (g_error_matches (error_local, G_IO_ERROR, G_IO_ERROR_NOT_FOUND) ||
|
|
g_error_matches (error_local, G_IO_ERROR, G_IO_ERROR_INVALID_ARGUMENT)) {
|
|
g_debug ("could not find %s: %s",
|
|
guid, error_local->message);
|
|
continue;
|
|
}
|
|
g_propagate_error (error, g_steal_pointer (&error_local));
|
|
return NULL;
|
|
}
|
|
for (guint j = 0; j < releases->len; j++) {
|
|
XbNode *rel = g_ptr_array_index (releases, j);
|
|
const gchar *rel_ver = xb_node_get_attr (rel, "version");
|
|
g_autofree gchar *tmp_ver = fu_common_version_parse_from_format (rel_ver, fmt);
|
|
if (fu_common_vercmp_full (tmp_ver, fu_device_get_version (device), fmt) == 0)
|
|
return g_object_ref (rel);
|
|
}
|
|
}
|
|
|
|
/* not found */
|
|
g_set_error_literal (error,
|
|
G_IO_ERROR,
|
|
G_IO_ERROR_NOT_FOUND,
|
|
"failed to find release");
|
|
return NULL;
|
|
}
|
|
|
|
/**
|
|
* fu_engine_verify:
|
|
* @self: A #FuEngine
|
|
* @device_id: A device ID
|
|
* @error: A #GError, or %NULL
|
|
*
|
|
* Verifies a device firmware checksum using the verification silo entry.
|
|
*
|
|
* Returns: %TRUE for success
|
|
**/
|
|
gboolean
|
|
fu_engine_verify (FuEngine *self, const gchar *device_id, GError **error)
|
|
{
|
|
FuPlugin *plugin;
|
|
GPtrArray *checksums;
|
|
g_autoptr(FuDevice) device = NULL;
|
|
g_autoptr(GError) error_local = NULL;
|
|
g_autoptr(GString) xpath_csum = g_string_new (NULL);
|
|
g_autoptr(XbNode) csum = NULL;
|
|
g_autoptr(XbNode) release = NULL;
|
|
|
|
g_return_val_if_fail (FU_IS_ENGINE (self), FALSE);
|
|
g_return_val_if_fail (device_id != NULL, FALSE);
|
|
g_return_val_if_fail (error == NULL || *error == NULL, FALSE);
|
|
|
|
/* check the id exists */
|
|
device = fu_device_list_get_by_id (self->device_list, device_id, error);
|
|
if (device == NULL)
|
|
return FALSE;
|
|
|
|
/* get the plugin */
|
|
plugin = fu_plugin_list_find_by_name (self->plugin_list,
|
|
fu_device_get_plugin (device),
|
|
error);
|
|
if (plugin == NULL)
|
|
return FALSE;
|
|
|
|
/* update the device firmware hashes if possible */
|
|
if (fu_device_has_flag (device, FWUPD_DEVICE_FLAG_CAN_VERIFY_IMAGE)) {
|
|
if (!fu_plugin_runner_verify (plugin, device,
|
|
FU_PLUGIN_VERIFY_FLAG_NONE, error))
|
|
return FALSE;
|
|
}
|
|
|
|
/* find component in local metadata */
|
|
release = fu_engine_verify_from_local_metadata (self, device, &error_local);
|
|
if (release == NULL) {
|
|
if (!g_error_matches (error_local, G_IO_ERROR, G_IO_ERROR_NOT_FOUND) &&
|
|
!g_error_matches (error_local, G_IO_ERROR, G_IO_ERROR_INVALID_ARGUMENT)) {
|
|
g_propagate_error (error, g_steal_pointer (&error_local));
|
|
return FALSE;
|
|
}
|
|
}
|
|
|
|
/* try again with the system metadata */
|
|
if (release == NULL) {
|
|
g_autoptr(GError) error_system = NULL;
|
|
release = fu_engine_verify_from_system_metadata (self, device, &error_system);
|
|
if (release == NULL) {
|
|
if (!g_error_matches (error_system, G_IO_ERROR, G_IO_ERROR_NOT_FOUND) &&
|
|
!g_error_matches (error_system, G_IO_ERROR, G_IO_ERROR_INVALID_ARGUMENT)) {
|
|
g_propagate_error (error, g_steal_pointer (&error_system));
|
|
return FALSE;
|
|
}
|
|
}
|
|
}
|
|
if (release == NULL) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOT_FOUND,
|
|
"No release found for version %s",
|
|
fu_device_get_version (device));
|
|
return FALSE;
|
|
}
|
|
|
|
/* get the matching checksum */
|
|
checksums = fu_device_get_checksums (device);
|
|
if (checksums->len == 0) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOT_FOUND,
|
|
"No device checksums for %s",
|
|
fu_device_get_version (device));
|
|
return FALSE;
|
|
}
|
|
|
|
/* do any of the checksums in the release match any in the device */
|
|
for (guint j = 0; j < checksums->len; j++) {
|
|
const gchar *hash_tmp = g_ptr_array_index (checksums, j);
|
|
xb_string_append_union (xpath_csum,
|
|
"checksum[@target='device'][text()='%s']",
|
|
hash_tmp);
|
|
xb_string_append_union (xpath_csum,
|
|
"checksum[@target='content'][text()='%s']",
|
|
hash_tmp);
|
|
}
|
|
csum = xb_node_query_first (release, xpath_csum->str, NULL);
|
|
if (csum == NULL) {
|
|
g_autoptr(GString) checksums_device = g_string_new (NULL);
|
|
g_autoptr(GString) checksums_metadata = g_string_new (NULL);
|
|
g_autoptr(GPtrArray) csums = NULL;
|
|
g_autoptr(GString) xpath = g_string_new (NULL);
|
|
|
|
/* get all checksums to display a useful error */
|
|
xb_string_append_union (xpath, "checksum[@target='device']");
|
|
if (fu_device_has_flag (device, FWUPD_DEVICE_FLAG_CAN_VERIFY_IMAGE))
|
|
xb_string_append_union (xpath, "checksum[@target='content']");
|
|
csums = xb_node_query (release, xpath->str, 0, NULL);
|
|
if (csums == NULL) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOT_FOUND,
|
|
"No stored checksums for %s",
|
|
fu_device_get_version (device));
|
|
return FALSE;
|
|
}
|
|
for (guint i = 0; i < csums->len; i++) {
|
|
XbNode *csum_tmp = g_ptr_array_index (csums, i);
|
|
xb_string_append_union (checksums_metadata,
|
|
"%s", xb_node_get_text (csum_tmp));
|
|
}
|
|
for (guint i = 0; i < checksums->len; i++) {
|
|
const gchar *hash_tmp = g_ptr_array_index (checksums, i);
|
|
xb_string_append_union (checksums_device, "%s", hash_tmp);
|
|
}
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOT_FOUND,
|
|
"For %s %s expected %s, got %s",
|
|
fu_device_get_name (device),
|
|
fu_device_get_version (device),
|
|
checksums_metadata->str,
|
|
checksums_device->str);
|
|
return FALSE;
|
|
}
|
|
|
|
/* success */
|
|
return TRUE;
|
|
}
|
|
|
|
static gboolean
|
|
fu_engine_require_vercmp (XbNode *req,
|
|
const gchar *version,
|
|
FwupdVersionFormat fmt,
|
|
GError **error)
|
|
{
|
|
gboolean ret = FALSE;
|
|
gint rc = 0;
|
|
const gchar *tmp = xb_node_get_attr (req, "compare");
|
|
const gchar *version_req = xb_node_get_attr (req, "version");
|
|
|
|
if (g_strcmp0 (tmp, "eq") == 0) {
|
|
rc = fu_common_vercmp_full (version, version_req, fmt);
|
|
ret = rc == 0;
|
|
} else if (g_strcmp0 (tmp, "ne") == 0) {
|
|
rc = fu_common_vercmp_full (version, version_req, fmt);
|
|
ret = rc != 0;
|
|
} else if (g_strcmp0 (tmp, "lt") == 0) {
|
|
rc = fu_common_vercmp_full (version, version_req, fmt);
|
|
ret = rc < 0;
|
|
} else if (g_strcmp0 (tmp, "gt") == 0) {
|
|
rc = fu_common_vercmp_full (version, version_req, fmt);
|
|
ret = rc > 0;
|
|
} else if (g_strcmp0 (tmp, "le") == 0) {
|
|
rc = fu_common_vercmp_full (version, version_req, fmt);
|
|
ret = rc <= 0;
|
|
} else if (g_strcmp0 (tmp, "ge") == 0) {
|
|
rc = fu_common_vercmp_full (version, version_req, fmt);
|
|
ret = rc >= 0;
|
|
} else if (g_strcmp0 (tmp, "glob") == 0) {
|
|
ret = fu_common_fnmatch (version_req, version);
|
|
} else if (g_strcmp0 (tmp, "regex") == 0) {
|
|
ret = g_regex_match_simple (version_req, version, 0, 0);
|
|
} else {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOT_SUPPORTED,
|
|
"failed to compare [%s] and [%s]",
|
|
version_req,
|
|
version);
|
|
return FALSE;
|
|
}
|
|
|
|
/* set error */
|
|
if (!ret) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_INTERNAL,
|
|
"failed predicate [%s %s %s]",
|
|
version_req, tmp, version);
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
static gboolean
|
|
fu_engine_check_requirement_not_child (FuEngine *self, XbNode *req,
|
|
FuDevice *device, GError **error)
|
|
{
|
|
GPtrArray *children = fu_device_get_children (device);
|
|
|
|
/* only <firmware> supported */
|
|
if (g_strcmp0 (xb_node_get_element (req), "firmware") != 0) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOT_SUPPORTED,
|
|
"cannot handle not-child %s requirement",
|
|
xb_node_get_element (req));
|
|
return FALSE;
|
|
}
|
|
|
|
/* check each child */
|
|
for (guint i = 0; i < children->len; i++) {
|
|
FuDevice *child = g_ptr_array_index (children, i);
|
|
const gchar *version = fu_device_get_version (child);
|
|
if (version == NULL) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOT_SUPPORTED,
|
|
"no version provided by %s, child of %s",
|
|
fu_device_get_name (child),
|
|
fu_device_get_name (device));
|
|
return FALSE;
|
|
}
|
|
if (fu_engine_require_vercmp (req, version,
|
|
fu_device_get_version_format (child),
|
|
NULL)) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOT_SUPPORTED,
|
|
"Not compatible with child device version %s",
|
|
version);
|
|
return FALSE;
|
|
}
|
|
}
|
|
return TRUE;
|
|
}
|
|
|
|
static gboolean
|
|
fu_engine_check_requirement_vendor_id (FuEngine *self, XbNode *req,
|
|
FuDevice *device, GError **error)
|
|
{
|
|
GPtrArray *vendor_ids;
|
|
const gchar *vendor_ids_metadata;
|
|
g_autofree gchar *vendor_ids_device = NULL;
|
|
|
|
/* devices without vendor IDs should not exist! */
|
|
vendor_ids = fu_device_get_vendor_ids (device);
|
|
if (vendor_ids->len == 0) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOT_SUPPORTED,
|
|
"device [%s] has no vendor ID",
|
|
fu_device_get_id (device));
|
|
return FALSE;
|
|
}
|
|
|
|
/* metadata with empty vendor IDs should not exist! */
|
|
vendor_ids_metadata = xb_node_get_attr (req, "version");
|
|
if (vendor_ids_metadata == NULL) {
|
|
g_set_error_literal (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOT_SUPPORTED,
|
|
"metadata has no vendor ID");
|
|
return FALSE;
|
|
}
|
|
|
|
/* it is always safe to use a regex, even for simple strings */
|
|
vendor_ids_device = fu_common_strjoin_array ("|", vendor_ids);
|
|
if (!g_regex_match_simple (vendor_ids_metadata, vendor_ids_device, 0, 0)) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_INVALID_FILE,
|
|
"Not compatible with vendor %s: got %s",
|
|
vendor_ids_device,
|
|
vendor_ids_metadata);
|
|
return FALSE;
|
|
}
|
|
|
|
/* success */
|
|
return TRUE;
|
|
}
|
|
|
|
static gboolean
|
|
fu_engine_check_requirement_firmware (FuEngine *self, XbNode *req, FuDevice *device,
|
|
FwupdInstallFlags flags, GError **error)
|
|
{
|
|
guint64 depth;
|
|
g_autoptr(FuDevice) device_actual = g_object_ref (device);
|
|
g_autoptr(GError) error_local = NULL;
|
|
|
|
/* look at the parent device */
|
|
depth = xb_node_get_attr_as_uint (req, "depth");
|
|
if (depth != G_MAXUINT64) {
|
|
for (guint64 i = 0; i < depth; i++) {
|
|
FuDevice *device_tmp = fu_device_get_parent (device_actual);
|
|
if (device_actual == NULL) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOT_SUPPORTED,
|
|
"No parent device for %s "
|
|
"(%" G_GUINT64_FORMAT "/%" G_GUINT64_FORMAT ")",
|
|
fu_device_get_name (device_actual), i, depth);
|
|
return FALSE;
|
|
}
|
|
g_set_object (&device_actual, device_tmp);
|
|
}
|
|
}
|
|
|
|
/* old firmware version */
|
|
if (xb_node_get_text (req) == NULL) {
|
|
const gchar *version = fu_device_get_version (device_actual);
|
|
if (!fu_engine_require_vercmp (req, version,
|
|
fu_device_get_version_format (device_actual),
|
|
&error_local)) {
|
|
if (g_strcmp0 (xb_node_get_attr (req, "compare"), "ge") == 0) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_INVALID_FILE,
|
|
"Not compatible with firmware version %s, requires >= %s",
|
|
version, xb_node_get_attr (req, "version"));
|
|
} else {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_INVALID_FILE,
|
|
"Not compatible with firmware version: %s",
|
|
error_local->message);
|
|
}
|
|
return FALSE;
|
|
}
|
|
return TRUE;
|
|
}
|
|
|
|
/* bootloader version */
|
|
if (g_strcmp0 (xb_node_get_text (req), "bootloader") == 0) {
|
|
const gchar *version = fu_device_get_version_bootloader (device_actual);
|
|
if (!fu_engine_require_vercmp (req, version,
|
|
fu_device_get_version_format (device_actual),
|
|
&error_local)) {
|
|
if (g_strcmp0 (xb_node_get_attr (req, "compare"), "ge") == 0) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOT_SUPPORTED,
|
|
"Not compatible with bootloader version %s, requires >= %s",
|
|
version, xb_node_get_attr (req, "version"));
|
|
|
|
} else {
|
|
g_debug ("Bootloader is not compatible: %s", error_local->message);
|
|
g_set_error_literal (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOT_SUPPORTED,
|
|
"Bootloader is not compatible");
|
|
}
|
|
return FALSE;
|
|
}
|
|
return TRUE;
|
|
}
|
|
|
|
/* vendor ID */
|
|
if (g_strcmp0 (xb_node_get_text (req), "vendor-id") == 0) {
|
|
if (flags & FWUPD_INSTALL_FLAG_IGNORE_VID_PID)
|
|
return TRUE;
|
|
return fu_engine_check_requirement_vendor_id (self, req, device_actual, error);
|
|
}
|
|
|
|
/* child version */
|
|
if (g_strcmp0 (xb_node_get_text (req), "not-child") == 0)
|
|
return fu_engine_check_requirement_not_child (self, req, device_actual, error);
|
|
|
|
/* another device */
|
|
if (fwupd_guid_is_valid (xb_node_get_text (req))) {
|
|
const gchar *guid = xb_node_get_text (req);
|
|
const gchar *version;
|
|
|
|
/* find if the other device exists */
|
|
if (depth == G_MAXUINT64) {
|
|
g_autoptr(FuDevice) device_tmp = NULL;
|
|
device_tmp = fu_device_list_get_by_guid (self->device_list, guid, error);
|
|
if (device_tmp == NULL)
|
|
return FALSE;
|
|
g_set_object (&device_actual, device_tmp);
|
|
|
|
/* verify the parent device has the GUID */
|
|
} else {
|
|
if (!fu_device_has_guid (device_actual, guid)) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOT_SUPPORTED,
|
|
"No GUID of %s on parent device %s",
|
|
guid, fu_device_get_name (device_actual));
|
|
return FALSE;
|
|
}
|
|
}
|
|
|
|
/* get the version of the other device */
|
|
version = fu_device_get_version (device_actual);
|
|
if (version != NULL &&
|
|
xb_node_get_attr (req, "compare") != NULL &&
|
|
!fu_engine_require_vercmp (req, version,
|
|
fu_device_get_version_format (device_actual),
|
|
&error_local)) {
|
|
if (g_strcmp0 (xb_node_get_attr (req, "compare"), "ge") == 0) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_INVALID_FILE,
|
|
"Not compatible with %s version %s, requires >= %s",
|
|
fu_device_get_name (device_actual),
|
|
version,
|
|
xb_node_get_attr (req, "version"));
|
|
} else {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_INVALID_FILE,
|
|
"Not compatible with %s: %s",
|
|
fu_device_get_name (device_actual),
|
|
error_local->message);
|
|
}
|
|
return FALSE;
|
|
}
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
/* not supported */
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOT_SUPPORTED,
|
|
"cannot handle firmware requirement '%s'",
|
|
xb_node_get_text (req));
|
|
return FALSE;
|
|
}
|
|
|
|
static gboolean
|
|
fu_engine_check_requirement_id (FuEngine *self, XbNode *req, GError **error)
|
|
{
|
|
g_autoptr(GError) error_local = NULL;
|
|
const gchar *version = g_hash_table_lookup (self->runtime_versions,
|
|
xb_node_get_text (req));
|
|
if (version == NULL) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOT_FOUND,
|
|
"no version available for %s",
|
|
xb_node_get_text (req));
|
|
return FALSE;
|
|
}
|
|
if (!fu_engine_require_vercmp (req, version, FWUPD_VERSION_FORMAT_UNKNOWN, &error_local)) {
|
|
if (g_strcmp0 (xb_node_get_attr (req, "compare"), "ge") == 0) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_INVALID_FILE,
|
|
"Not compatible with %s version %s, requires >= %s",
|
|
xb_node_get_text (req), version,
|
|
xb_node_get_attr (req, "version"));
|
|
} else {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_INVALID_FILE,
|
|
"Not compatible with %s version: %s",
|
|
xb_node_get_text (req), error_local->message);
|
|
}
|
|
return FALSE;
|
|
}
|
|
|
|
g_debug ("requirement %s %s %s -> %s passed",
|
|
xb_node_get_attr (req, "version"),
|
|
xb_node_get_attr (req, "compare"),
|
|
version, xb_node_get_text (req));
|
|
return TRUE;
|
|
}
|
|
|
|
static gboolean
|
|
fu_engine_check_requirement_hardware (FuEngine *self, XbNode *req, GError **error)
|
|
{
|
|
g_auto(GStrv) hwid_split = NULL;
|
|
|
|
/* split and treat as OR */
|
|
hwid_split = g_strsplit (xb_node_get_text (req), "|", -1);
|
|
for (guint i = 0; hwid_split[i] != NULL; i++) {
|
|
if (fu_hwids_has_guid (self->hwids, hwid_split[i])) {
|
|
g_debug ("HWID provided %s", hwid_split[i]);
|
|
return TRUE;
|
|
}
|
|
}
|
|
|
|
/* nothing matched */
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_INVALID_FILE,
|
|
"no HWIDs matched %s",
|
|
xb_node_get_text (req));
|
|
return FALSE;
|
|
}
|
|
|
|
static gboolean
|
|
fu_engine_check_requirement_client (FuEngine *self,
|
|
FuEngineRequest *request,
|
|
XbNode *req,
|
|
GError **error)
|
|
{
|
|
FwupdFeatureFlags flags;
|
|
g_auto(GStrv) feature_split = NULL;
|
|
|
|
/* split and treat as AND */
|
|
feature_split = g_strsplit (xb_node_get_text (req), "|", -1);
|
|
flags = fu_engine_request_get_feature_flags (request);
|
|
for (guint i = 0; feature_split[i] != NULL; i++) {
|
|
FwupdFeatureFlags flag = fwupd_feature_flag_from_string (feature_split[i]);
|
|
|
|
/* not recognized */
|
|
if (flag == FWUPD_FEATURE_FLAG_LAST) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOT_FOUND,
|
|
"client requirement %s unknown",
|
|
feature_split[i]);
|
|
return FALSE;
|
|
}
|
|
|
|
/* not supported */
|
|
if ((flags & flag) == 0) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOT_SUPPORTED,
|
|
"client requirement %s not supported",
|
|
feature_split[i]);
|
|
return FALSE;
|
|
}
|
|
}
|
|
|
|
/* success */
|
|
return TRUE;
|
|
}
|
|
|
|
static gboolean
|
|
fu_engine_check_requirement (FuEngine *self,
|
|
FuEngineRequest *request,
|
|
XbNode *req,
|
|
FuDevice *device,
|
|
FwupdInstallFlags flags,
|
|
GError **error)
|
|
{
|
|
/* ensure component requirement */
|
|
if (g_strcmp0 (xb_node_get_element (req), "id") == 0)
|
|
return fu_engine_check_requirement_id (self, req, error);
|
|
|
|
/* ensure firmware requirement */
|
|
if (g_strcmp0 (xb_node_get_element (req), "firmware") == 0) {
|
|
if (device == NULL)
|
|
return TRUE;
|
|
return fu_engine_check_requirement_firmware (self, req, device,
|
|
flags, error);
|
|
}
|
|
|
|
/* ensure hardware requirement */
|
|
if (g_strcmp0 (xb_node_get_element (req), "hardware") == 0)
|
|
return fu_engine_check_requirement_hardware (self, req, error);
|
|
|
|
/* ensure client requirement */
|
|
if (g_strcmp0 (xb_node_get_element (req), "client") == 0)
|
|
return fu_engine_check_requirement_client (self, request, req, error);
|
|
|
|
/* not supported */
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOT_SUPPORTED,
|
|
"cannot handle requirement type %s",
|
|
xb_node_get_element (req));
|
|
return FALSE;
|
|
}
|
|
|
|
gboolean
|
|
fu_engine_check_trust (FuInstallTask *task, GError **error)
|
|
{
|
|
#ifndef HAVE_POLKIT
|
|
if ((fu_install_task_get_trust_flags (task) & FWUPD_TRUST_FLAG_PAYLOAD) == 0) {
|
|
g_set_error_literal (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_INVALID_FILE,
|
|
"archive signature missing or not trusted");
|
|
return FALSE;
|
|
}
|
|
#endif
|
|
return TRUE;
|
|
}
|
|
|
|
gboolean
|
|
fu_engine_check_requirements (FuEngine *self,
|
|
FuEngineRequest *request,
|
|
FuInstallTask *task,
|
|
FwupdInstallFlags flags,
|
|
GError **error)
|
|
{
|
|
FuDevice *device = fu_install_task_get_device (task);
|
|
g_autoptr(GError) error_local = NULL;
|
|
g_autoptr(GPtrArray) reqs = NULL;
|
|
|
|
/* all install task checks require a device */
|
|
if (device != NULL) {
|
|
if (!fu_install_task_check_requirements (task, flags, error))
|
|
return FALSE;
|
|
}
|
|
|
|
/* do engine checks */
|
|
reqs = xb_node_query (fu_install_task_get_component (task),
|
|
"requires/*", 0, &error_local);
|
|
if (reqs != NULL) {
|
|
for (guint i = 0; i < reqs->len; i++) {
|
|
XbNode *req = g_ptr_array_index (reqs, i);
|
|
if (!fu_engine_check_requirement (self, request,
|
|
req, device,
|
|
flags, error))
|
|
return FALSE;
|
|
}
|
|
} else if (!g_error_matches (error_local, G_IO_ERROR, G_IO_ERROR_NOT_FOUND) &&
|
|
!g_error_matches (error_local, G_IO_ERROR, G_IO_ERROR_INVALID_ARGUMENT)) {
|
|
g_propagate_error (error, g_steal_pointer (&error_local));
|
|
return FALSE;
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
void
|
|
fu_engine_idle_reset (FuEngine *self)
|
|
{
|
|
fu_idle_reset (self->idle);
|
|
}
|
|
|
|
static gchar *
|
|
fu_engine_get_boot_time (void)
|
|
{
|
|
g_autofree gchar *buf = NULL;
|
|
g_auto(GStrv) lines = NULL;
|
|
if (!g_file_get_contents ("/proc/stat", &buf, NULL, NULL))
|
|
return NULL;
|
|
lines = g_strsplit (buf, "\n", -1);
|
|
for (guint i = 0; lines[i] != NULL; i++) {
|
|
if (g_str_has_prefix (lines[i], "btime "))
|
|
return g_strdup (lines[i] + 6);
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
static gboolean
|
|
fu_engine_get_report_metadata_os_release (GHashTable *hash, GError **error)
|
|
{
|
|
g_autoptr(GHashTable) os_release = NULL;
|
|
struct {
|
|
const gchar *key;
|
|
const gchar *val;
|
|
} distro_kv[] = {
|
|
{ "ID", "DistroId" },
|
|
{ "VERSION_ID", "DistroVersion" },
|
|
{ "VARIANT_ID", "DistroVariant" },
|
|
{ NULL, NULL }
|
|
};
|
|
|
|
/* get all required os-release keys */
|
|
os_release = fwupd_get_os_release (error);
|
|
if (os_release == NULL)
|
|
return FALSE;
|
|
for (guint i = 0; distro_kv[i].key != NULL; i++) {
|
|
const gchar *tmp = g_hash_table_lookup (os_release, distro_kv[i].key);
|
|
if (tmp != NULL) {
|
|
g_hash_table_insert (hash,
|
|
g_strdup (distro_kv[i].val),
|
|
g_strdup (tmp));
|
|
}
|
|
}
|
|
return TRUE;
|
|
}
|
|
|
|
static gboolean
|
|
fu_engine_get_report_metadata_kernel_cmdline (GHashTable *hash, GError **error)
|
|
{
|
|
gsize bufsz = 0;
|
|
g_autofree gchar *buf = NULL;
|
|
const gchar *ignore[] = {
|
|
"",
|
|
"auto",
|
|
"boot",
|
|
"BOOT_IMAGE",
|
|
"console",
|
|
"cryptdevice",
|
|
"cryptkey",
|
|
"earlycon",
|
|
"earlyprintk",
|
|
"ether",
|
|
"initrd",
|
|
"ip",
|
|
"LANG",
|
|
"loglevel",
|
|
"luks.key",
|
|
"luks.name",
|
|
"luks.options",
|
|
"luks.uuid",
|
|
"mount.usr",
|
|
"mount.usrflags",
|
|
"mount.usrfstype",
|
|
"netdev",
|
|
"netroot",
|
|
"nfsaddrs",
|
|
"nfs.nfs4_unique_id",
|
|
"nfsroot",
|
|
"noplymouth",
|
|
"ostree",
|
|
"quiet",
|
|
"rd.dm.uuid",
|
|
"rd.luks.allow-discards",
|
|
"rd.luks.key",
|
|
"rd.luks.name",
|
|
"rd.luks.options",
|
|
"rd.luks.uuid",
|
|
"rd.lvm.lv",
|
|
"rd.lvm.vg",
|
|
"rd.md.uuid",
|
|
"rd.systemd.mask",
|
|
"rd.systemd.wants",
|
|
"resume",
|
|
"resumeflags",
|
|
"rhgb",
|
|
"ro",
|
|
"root",
|
|
"rootflags",
|
|
"roothash",
|
|
"rw",
|
|
"showopts",
|
|
"splash",
|
|
"swap",
|
|
"systemd.mask",
|
|
"systemd.unit",
|
|
"systemd.verity_root_data",
|
|
"systemd.verity_root_hash",
|
|
"systemd.wants",
|
|
"verbose",
|
|
"vt.handoff",
|
|
"zfs",
|
|
NULL, /* last entry */
|
|
};
|
|
|
|
/* get a PII-safe kernel command line */
|
|
if (!g_file_get_contents ("/proc/cmdline", &buf, &bufsz, error))
|
|
return FALSE;
|
|
if (bufsz > 0) {
|
|
g_auto(GStrv) tokens = fu_common_strnsplit (buf, bufsz - 1, " ", -1);
|
|
g_autoptr(GString) cmdline_safe = g_string_new (NULL);
|
|
for (guint i = 0; tokens[i] != NULL; i++) {
|
|
g_auto(GStrv) kv = NULL;
|
|
if (strlen (tokens[i]) == 0)
|
|
continue;
|
|
kv = g_strsplit (tokens[i], "=", 2);
|
|
if (g_strv_contains (ignore, kv[0]))
|
|
continue;
|
|
if (cmdline_safe->len > 0)
|
|
g_string_append (cmdline_safe, " ");
|
|
g_string_append (cmdline_safe, tokens[i]);
|
|
}
|
|
if (cmdline_safe->len > 0) {
|
|
g_hash_table_insert (hash,
|
|
g_strdup ("KernelCmdline"),
|
|
g_strdup (cmdline_safe->str));
|
|
}
|
|
}
|
|
return TRUE;
|
|
}
|
|
|
|
GHashTable *
|
|
fu_engine_get_report_metadata (FuEngine *self, GError **error)
|
|
{
|
|
const gchar *tmp;
|
|
gchar *btime;
|
|
#ifdef HAVE_UTSNAME_H
|
|
struct utsname name_tmp;
|
|
#endif
|
|
g_autoptr(GHashTable) hash = NULL;
|
|
g_autoptr(GList) compile_keys = g_hash_table_get_keys (self->compile_versions);
|
|
g_autoptr(GList) runtime_keys = g_hash_table_get_keys (self->runtime_versions);
|
|
|
|
/* convert all the runtime and compile-time versions */
|
|
hash = g_hash_table_new_full (g_str_hash, g_str_equal, g_free, g_free);
|
|
for (GList *l = compile_keys; l != NULL; l = l->next) {
|
|
const gchar *id = l->data;
|
|
const gchar *version = g_hash_table_lookup (self->compile_versions, id);
|
|
g_hash_table_insert (hash,
|
|
g_strdup_printf ("CompileVersion(%s)", id),
|
|
g_strdup (version));
|
|
}
|
|
for (GList *l = runtime_keys; l != NULL; l = l->next) {
|
|
const gchar *id = l->data;
|
|
const gchar *version = g_hash_table_lookup (self->runtime_versions, id);
|
|
g_hash_table_insert (hash,
|
|
g_strdup_printf ("RuntimeVersion(%s)", id),
|
|
g_strdup (version));
|
|
}
|
|
if (!fu_engine_get_report_metadata_os_release (hash, error))
|
|
return NULL;
|
|
if (!fu_engine_get_report_metadata_kernel_cmdline (hash, error))
|
|
return NULL;
|
|
|
|
/* DMI data */
|
|
tmp = fu_hwids_get_value (self->hwids, FU_HWIDS_KEY_PRODUCT_NAME);
|
|
if (tmp != NULL)
|
|
g_hash_table_insert (hash, g_strdup ("HostProduct"), g_strdup (tmp));
|
|
tmp = fu_hwids_get_value (self->hwids, FU_HWIDS_KEY_FAMILY);
|
|
if (tmp != NULL)
|
|
g_hash_table_insert (hash, g_strdup ("HostFamily"), g_strdup (tmp));
|
|
tmp = fu_hwids_get_value (self->hwids, FU_HWIDS_KEY_PRODUCT_SKU);
|
|
if (tmp != NULL)
|
|
g_hash_table_insert (hash, g_strdup ("HostSku"), g_strdup (tmp));
|
|
tmp = fu_hwids_get_value (self->hwids, FU_HWIDS_KEY_MANUFACTURER);
|
|
if (tmp != NULL)
|
|
g_hash_table_insert (hash, g_strdup ("HostVendor"), g_strdup (tmp));
|
|
|
|
/* kernel version is often important for debugging failures */
|
|
#ifdef HAVE_UTSNAME_H
|
|
memset (&name_tmp, 0, sizeof (struct utsname));
|
|
if (uname (&name_tmp) >= 0) {
|
|
g_hash_table_insert (hash,
|
|
g_strdup ("CpuArchitecture"),
|
|
g_strdup (name_tmp.machine));
|
|
g_hash_table_insert (hash,
|
|
g_strdup ("KernelVersion"),
|
|
g_strdup (name_tmp.release));
|
|
}
|
|
#endif
|
|
|
|
/* add the kernel boot time so we can detect a reboot */
|
|
btime = fu_engine_get_boot_time ();
|
|
if (btime != NULL)
|
|
g_hash_table_insert (hash, g_strdup ("BootTime"), btime);
|
|
|
|
return g_steal_pointer (&hash);
|
|
}
|
|
|
|
/**
|
|
* fu_engine_composite_prepare:
|
|
* @self: A #FuEngine
|
|
* @devices: (element-type #FuDevice): devices that will be updated
|
|
* @error: A #GError, or %NULL
|
|
*
|
|
* Calls into the plugin loader, informing each plugin of the pending upgrade(s).
|
|
*
|
|
* Any failure in any plugin will abort all of the actions before they are started.
|
|
*
|
|
* Returns: %TRUE for success
|
|
**/
|
|
gboolean
|
|
fu_engine_composite_prepare (FuEngine *self, GPtrArray *devices, GError **error)
|
|
{
|
|
GPtrArray *plugins = fu_plugin_list_get_all (self->plugin_list);
|
|
for (guint j = 0; j < plugins->len; j++) {
|
|
FuPlugin *plugin_tmp = g_ptr_array_index (plugins, j);
|
|
if (!fu_plugin_runner_composite_prepare (plugin_tmp, devices, error))
|
|
return FALSE;
|
|
}
|
|
return TRUE;
|
|
}
|
|
|
|
/**
|
|
* fu_engine_composite_cleanup:
|
|
* @self: A #FuEngine
|
|
* @devices: (element-type #FuDevice): devices that will be updated
|
|
* @error: A #GError, or %NULL
|
|
*
|
|
* Calls into the plugin loader, informing each plugin of the pending upgrade(s).
|
|
*
|
|
* Returns: %TRUE for success
|
|
**/
|
|
gboolean
|
|
fu_engine_composite_cleanup (FuEngine *self, GPtrArray *devices, GError **error)
|
|
{
|
|
GPtrArray *plugins = fu_plugin_list_get_all (self->plugin_list);
|
|
for (guint j = 0; j < plugins->len; j++) {
|
|
FuPlugin *plugin_tmp = g_ptr_array_index (plugins, j);
|
|
if (!fu_plugin_runner_composite_cleanup (plugin_tmp, devices, error))
|
|
return FALSE;
|
|
}
|
|
return TRUE;
|
|
}
|
|
|
|
/**
|
|
* fu_engine_install_tasks:
|
|
* @self: A #FuEngine
|
|
* @request: A #FuEngineRequest
|
|
* @install_tasks: (element-type FuInstallTask): A #FuDevice
|
|
* @blob_cab: The #GBytes of the .cab file
|
|
* @flags: The #FwupdInstallFlags, e.g. %FWUPD_DEVICE_FLAG_UPDATABLE
|
|
* @error: A #GError, or %NULL
|
|
*
|
|
* Installs a specific firmware file on one or more install tasks.
|
|
*
|
|
* By this point all the requirements and tests should have been done in
|
|
* fu_engine_check_requirements() so this should not fail before running
|
|
* the plugin loader.
|
|
*
|
|
* Returns: %TRUE for success
|
|
**/
|
|
gboolean
|
|
fu_engine_install_tasks (FuEngine *self,
|
|
FuEngineRequest *request,
|
|
GPtrArray *install_tasks,
|
|
GBytes *blob_cab,
|
|
FwupdInstallFlags flags,
|
|
GError **error)
|
|
{
|
|
g_autoptr(FuIdleLocker) locker = NULL;
|
|
g_autoptr(GPtrArray) devices = NULL;
|
|
g_autoptr(GPtrArray) devices_new = NULL;
|
|
|
|
/* do not allow auto-shutdown during this time */
|
|
locker = fu_idle_locker_new (self->idle, "update");
|
|
g_assert (locker != NULL);
|
|
|
|
/* notify the plugins about the composite action */
|
|
devices = g_ptr_array_new_with_free_func ((GDestroyNotify) g_object_unref);
|
|
for (guint i = 0; i < install_tasks->len; i++) {
|
|
FuInstallTask *task = g_ptr_array_index (install_tasks, i);
|
|
g_debug ("composite update %u: %s", i + 1,
|
|
fu_device_get_id (fu_install_task_get_device (task)));
|
|
g_ptr_array_add (devices, g_object_ref (fu_install_task_get_device (task)));
|
|
}
|
|
if (!fu_engine_composite_prepare (self, devices, error)) {
|
|
g_prefix_error (error, "failed to prepare composite action: ");
|
|
return FALSE;
|
|
}
|
|
|
|
/* all authenticated, so install all the things */
|
|
for (guint i = 0; i < install_tasks->len; i++) {
|
|
FuInstallTask *task = g_ptr_array_index (install_tasks, i);
|
|
if (!fu_engine_install (self, task, blob_cab, flags, error)) {
|
|
g_autoptr(GError) error_local = NULL;
|
|
if (!fu_engine_composite_cleanup (self, devices, &error_local)) {
|
|
g_warning ("failed to cleanup failed composite action: %s",
|
|
error_local->message);
|
|
}
|
|
return FALSE;
|
|
}
|
|
}
|
|
|
|
/* set all the device statuses back to unknown */
|
|
for (guint i = 0; i < install_tasks->len; i++) {
|
|
FuInstallTask *task = g_ptr_array_index (install_tasks, i);
|
|
FuDevice *device = fu_install_task_get_device (task);
|
|
fu_device_set_status (device, FWUPD_STATUS_UNKNOWN);
|
|
}
|
|
|
|
/* get a new list of devices in case they replugged */
|
|
devices_new = g_ptr_array_new_with_free_func ((GDestroyNotify) g_object_unref);
|
|
for (guint i = 0; i < devices->len; i++) {
|
|
FuDevice *device;
|
|
g_autoptr(FuDevice) device_new = NULL;
|
|
g_autoptr(GError) error_local = NULL;
|
|
device = g_ptr_array_index (devices, i);
|
|
device_new = fu_device_list_get_by_id (self->device_list,
|
|
fu_device_get_id (device),
|
|
&error_local);
|
|
if (device_new == NULL) {
|
|
g_debug ("failed to find new device: %s",
|
|
error_local->message);
|
|
continue;
|
|
}
|
|
g_ptr_array_add (devices_new, g_steal_pointer (&device_new));
|
|
}
|
|
|
|
/* notify the plugins about the composite action */
|
|
if (!fu_engine_composite_cleanup (self, devices_new, error)) {
|
|
g_prefix_error (error, "failed to cleanup composite action: ");
|
|
return FALSE;
|
|
}
|
|
|
|
/* success */
|
|
return TRUE;
|
|
}
|
|
|
|
static FwupdRelease *
|
|
fu_engine_create_release_metadata (FuEngine *self,
|
|
FuDevice *device,
|
|
FuPlugin *plugin,
|
|
GError **error)
|
|
{
|
|
GPtrArray *metadata_sources;
|
|
g_autoptr(FwupdRelease) release = fwupd_release_new ();
|
|
g_autoptr(GHashTable) metadata_device = NULL;
|
|
g_autoptr(GHashTable) metadata_hash = NULL;
|
|
|
|
/* build the version metadata */
|
|
metadata_hash = fu_engine_get_report_metadata (self, error);
|
|
if (metadata_hash == NULL)
|
|
return NULL;
|
|
fwupd_release_add_metadata (release, metadata_hash);
|
|
if (fu_plugin_get_report_metadata (plugin) != NULL)
|
|
fwupd_release_add_metadata (release, fu_plugin_get_report_metadata (plugin));
|
|
metadata_device = fu_device_report_metadata_pre (device);
|
|
if (metadata_device != NULL)
|
|
fwupd_release_add_metadata (release, metadata_device);
|
|
|
|
/* allow other plugins to contribute metadata too */
|
|
metadata_sources = fu_plugin_get_rules (plugin, FU_PLUGIN_RULE_METADATA_SOURCE);
|
|
if (metadata_sources != NULL) {
|
|
for (guint i = 0; i < metadata_sources->len; i++) {
|
|
FuPlugin *plugin_tmp;
|
|
const gchar *plugin_name = g_ptr_array_index (metadata_sources, i);
|
|
g_autoptr(GError) error_local = NULL;
|
|
|
|
plugin_tmp = fu_plugin_list_find_by_name (self->plugin_list,
|
|
plugin_name,
|
|
&error_local);
|
|
if (plugin_tmp == NULL) {
|
|
g_warning ("could not add metadata for %s: %s",
|
|
plugin_name,
|
|
error_local->message);
|
|
continue;
|
|
}
|
|
if (fu_plugin_get_report_metadata (plugin_tmp) != NULL) {
|
|
fwupd_release_add_metadata (release,
|
|
fu_plugin_get_report_metadata (plugin_tmp));
|
|
}
|
|
}
|
|
}
|
|
return g_steal_pointer (&release);
|
|
}
|
|
|
|
static gboolean
|
|
fu_engine_is_running_offline (FuEngine *self)
|
|
{
|
|
#ifdef HAVE_SYSTEMD
|
|
g_autofree gchar *default_target = NULL;
|
|
g_autoptr(GError) error = NULL;
|
|
default_target = fu_systemd_get_default_target (&error);
|
|
if (default_target == NULL) {
|
|
g_warning ("failed to get default.target: %s", error->message);
|
|
return FALSE;
|
|
}
|
|
return g_strcmp0 (default_target, "system-update.target") == 0;
|
|
#else
|
|
return FALSE;
|
|
#endif
|
|
}
|
|
|
|
static gboolean
|
|
fu_engine_offline_setup (GError **error)
|
|
{
|
|
#ifdef HAVE_GIO_UNIX
|
|
gint rc;
|
|
g_autofree gchar *filename = NULL;
|
|
g_autofree gchar *symlink_target = fu_common_get_path (FU_PATH_KIND_LOCALSTATEDIR_PKG);
|
|
g_autofree gchar *trigger = fu_common_get_path (FU_PATH_KIND_OFFLINE_TRIGGER);
|
|
|
|
g_return_val_if_fail (error == NULL || *error == NULL, FALSE);
|
|
|
|
/* does already exist */
|
|
filename = fu_common_realpath (trigger, NULL);
|
|
if (g_strcmp0 (filename, symlink_target) == 0) {
|
|
g_debug ("%s already points to %s, skipping creation",
|
|
trigger, symlink_target);
|
|
return TRUE;
|
|
}
|
|
|
|
/* create symlink for the systemd-system-update-generator */
|
|
rc = symlink (symlink_target, trigger);
|
|
if (rc < 0) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_INTERNAL,
|
|
"Failed to create symlink %s to %s: %s",
|
|
trigger, symlink_target, strerror (errno));
|
|
return FALSE;
|
|
}
|
|
return TRUE;
|
|
#else
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOT_SUPPORTED,
|
|
"Not supported as <gio-unix.h> not available");
|
|
return FALSE;
|
|
#endif
|
|
|
|
}
|
|
|
|
static gboolean
|
|
fu_engine_offline_invalidate (GError **error)
|
|
{
|
|
g_autofree gchar *trigger = fu_common_get_path (FU_PATH_KIND_OFFLINE_TRIGGER);
|
|
g_autoptr(GError) error_local = NULL;
|
|
g_autoptr(GFile) file1 = NULL;
|
|
|
|
g_return_val_if_fail (error == NULL || *error == NULL, FALSE);
|
|
|
|
file1 = g_file_new_for_path (trigger);
|
|
if (!g_file_query_exists (file1, NULL))
|
|
return TRUE;
|
|
if (!g_file_delete (file1, NULL, &error_local)) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_INTERNAL,
|
|
"Cannot delete %s: %s",
|
|
trigger,
|
|
error_local->message);
|
|
return FALSE;
|
|
}
|
|
return TRUE;
|
|
}
|
|
|
|
/**
|
|
* fu_engine_schedule_update:
|
|
* @self: a #FuEngine
|
|
* @device: a #FuDevice
|
|
* @release: A #FwupdRelease
|
|
* @blob_cab: A #GBytes
|
|
* @flags: #FwupdInstallFlags
|
|
* @error: A #GError or NULL
|
|
*
|
|
* Schedule an offline update for the device
|
|
*
|
|
* Returns: #TRUE for success, #FALSE for failure
|
|
*
|
|
* Since: 1.3.5
|
|
**/
|
|
gboolean
|
|
fu_engine_schedule_update (FuEngine *self,
|
|
FuDevice *device,
|
|
FwupdRelease *release,
|
|
GBytes *blob_cab,
|
|
FwupdInstallFlags flags,
|
|
GError **error)
|
|
{
|
|
gchar tmpname[] = {"XXXXXX.cab"};
|
|
g_autofree gchar *dirname = NULL;
|
|
g_autofree gchar *filename = NULL;
|
|
g_autoptr(FuHistory) history = NULL;
|
|
g_autoptr(GFile) file = NULL;
|
|
|
|
/* id already exists */
|
|
history = fu_history_new ();
|
|
if ((flags & FWUPD_INSTALL_FLAG_FORCE) == 0) {
|
|
g_autoptr(FuDevice) res_tmp = NULL;
|
|
res_tmp = fu_history_get_device_by_id (history, fu_device_get_id (device), NULL);
|
|
if (res_tmp != NULL &&
|
|
fu_device_get_update_state (res_tmp) == FWUPD_UPDATE_STATE_PENDING) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_ALREADY_PENDING,
|
|
"%s is already scheduled to be updated",
|
|
fu_device_get_id (device));
|
|
return FALSE;
|
|
}
|
|
}
|
|
|
|
/* create directory */
|
|
dirname = fu_common_get_path (FU_PATH_KIND_LOCALSTATEDIR_PKG);
|
|
file = g_file_new_for_path (dirname);
|
|
if (!g_file_query_exists (file, NULL)) {
|
|
if (!g_file_make_directory_with_parents (file, NULL, error))
|
|
return FALSE;
|
|
}
|
|
|
|
/* get a random filename */
|
|
for (guint i = 0; i < 6; i++)
|
|
tmpname[i] = (gchar) g_random_int_range ('A', 'Z');
|
|
filename = g_build_filename (dirname, tmpname, NULL);
|
|
|
|
/* just copy to the temp file */
|
|
fu_device_set_status (device, FWUPD_STATUS_SCHEDULING);
|
|
if (!g_file_set_contents (filename,
|
|
g_bytes_get_data (blob_cab, NULL),
|
|
(gssize) g_bytes_get_size (blob_cab),
|
|
error))
|
|
return FALSE;
|
|
|
|
/* schedule for next boot */
|
|
g_debug ("schedule %s to be installed to %s on next boot",
|
|
filename, fu_device_get_id (device));
|
|
fwupd_release_set_filename (release, filename);
|
|
|
|
/* add to database */
|
|
fu_device_add_flag (device, FWUPD_DEVICE_FLAG_NEEDS_REBOOT);
|
|
fu_device_set_update_state (device, FWUPD_UPDATE_STATE_PENDING);
|
|
if (!fu_history_add_device (history, device, release, error))
|
|
return FALSE;
|
|
|
|
/* next boot we run offline */
|
|
fu_device_set_progress (device, 100);
|
|
return fu_engine_offline_setup (error);
|
|
}
|
|
|
|
static gboolean
|
|
fu_engine_install_release (FuEngine *self,
|
|
FuDevice *device_orig,
|
|
XbNode *component,
|
|
XbNode *rel,
|
|
FwupdInstallFlags flags,
|
|
GError **error)
|
|
{
|
|
FuPlugin *plugin;
|
|
FwupdVersionFormat fmt;
|
|
GBytes *blob_fw;
|
|
const gchar *tmp;
|
|
g_autofree gchar *version_orig = NULL;
|
|
g_autofree gchar *version_rel = NULL;
|
|
g_autoptr(FuDevice) device_tmp = NULL;
|
|
g_autoptr(FuDevice) device = g_object_ref (device_orig);
|
|
g_autoptr(GBytes) blob_fw2 = NULL;
|
|
g_autoptr(GError) error_local = NULL;
|
|
|
|
/* get per-release firmware blob */
|
|
blob_fw = xb_node_get_data (rel, "fwupd::FirmwareBlob");
|
|
if (blob_fw == NULL) {
|
|
g_set_error_literal (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_INTERNAL,
|
|
"Failed to get firmware blob from release");
|
|
return FALSE;
|
|
}
|
|
|
|
/* use a bubblewrap helper script to build the firmware */
|
|
tmp = g_object_get_data (G_OBJECT (component), "fwupd::BuilderScript");
|
|
if (tmp != NULL) {
|
|
const gchar *tmp2 = g_object_get_data (G_OBJECT (component), "fwupd::BuilderOutput");
|
|
if (tmp2 == NULL)
|
|
tmp2 = "firmware.bin";
|
|
blob_fw2 = fu_common_firmware_builder (blob_fw, tmp, tmp2, error);
|
|
if (blob_fw2 == NULL)
|
|
return FALSE;
|
|
} else {
|
|
blob_fw2 = g_bytes_ref (blob_fw);
|
|
}
|
|
|
|
/* get the plugin */
|
|
plugin = fu_plugin_list_find_by_name (self->plugin_list,
|
|
fu_device_get_plugin (device),
|
|
error);
|
|
if (plugin == NULL)
|
|
return FALSE;
|
|
|
|
/* schedule this for the next reboot if not in system-update.target,
|
|
* but first check if allowed on battery power */
|
|
version_rel = fu_engine_get_release_version (self, device, rel, error);
|
|
if (version_rel == NULL) {
|
|
g_prefix_error (error, "failed to get release version: ");
|
|
return FALSE;
|
|
}
|
|
|
|
/* add device to database */
|
|
if ((flags & FWUPD_INSTALL_FLAG_NO_HISTORY) == 0) {
|
|
g_autoptr(FwupdRelease) release_tmp = NULL;
|
|
release_tmp = fu_engine_create_release_metadata (self, device, plugin, error);
|
|
if (release_tmp == NULL)
|
|
return FALSE;
|
|
tmp = xb_node_query_text (component,
|
|
"releases/release/checksum[@target='container']",
|
|
NULL);
|
|
if (tmp != NULL)
|
|
fwupd_release_add_checksum (release_tmp, tmp);
|
|
fwupd_release_set_version (release_tmp, version_rel);
|
|
fu_device_set_update_state (device, FWUPD_UPDATE_STATE_FAILED);
|
|
if (!fu_history_add_device (self->history, device, release_tmp, error))
|
|
return FALSE;
|
|
}
|
|
|
|
/* install firmware blob */
|
|
version_orig = g_strdup (fu_device_get_version (device));
|
|
if (!fu_engine_install_blob (self, device, blob_fw2, flags, &error_local)) {
|
|
fu_device_set_status (device, FWUPD_STATUS_IDLE);
|
|
if (g_error_matches (error_local,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_AC_POWER_REQUIRED) ||
|
|
g_error_matches (error_local,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_BATTERY_LEVEL_TOO_LOW) ||
|
|
g_error_matches (error_local,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NEEDS_USER_ACTION) ||
|
|
g_error_matches (error_local,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_BROKEN_SYSTEM)) {
|
|
fu_device_set_update_state (device, FWUPD_UPDATE_STATE_FAILED_TRANSIENT);
|
|
} else {
|
|
fu_device_set_update_state (device, FWUPD_UPDATE_STATE_FAILED);
|
|
}
|
|
fu_device_set_update_error (device, error_local->message);
|
|
if ((flags & FWUPD_INSTALL_FLAG_NO_HISTORY) == 0 &&
|
|
!fu_history_modify_device (self->history, device, error)) {
|
|
return FALSE;
|
|
}
|
|
g_propagate_error (error, g_steal_pointer (&error_local));
|
|
return FALSE;
|
|
}
|
|
|
|
/* the device may have changed */
|
|
device_tmp = fu_device_list_get_by_id (self->device_list,
|
|
fu_device_get_id (device),
|
|
error);
|
|
if (device_tmp == NULL) {
|
|
g_prefix_error (error, "failed to get device after install: ");
|
|
return FALSE;
|
|
}
|
|
g_set_object (&device, device_tmp);
|
|
|
|
/* update database */
|
|
if (fu_device_has_flag (device, FWUPD_DEVICE_FLAG_NEEDS_REBOOT) ||
|
|
fu_device_has_flag (device, FWUPD_DEVICE_FLAG_NEEDS_SHUTDOWN)) {
|
|
fu_device_set_update_state (device, FWUPD_UPDATE_STATE_NEEDS_REBOOT);
|
|
if ((flags & FWUPD_INSTALL_FLAG_NO_HISTORY) == 0 &&
|
|
!fu_history_modify_device (self->history, device, error))
|
|
return FALSE;
|
|
/* success */
|
|
return TRUE;
|
|
}
|
|
|
|
/* for online updates, verify the version changed if not a re-install */
|
|
fmt = fu_device_get_version_format (device);
|
|
if (version_rel != NULL &&
|
|
fu_common_vercmp_full (version_orig, version_rel, fmt) != 0 &&
|
|
fu_common_vercmp_full (version_orig, fu_device_get_version (device), fmt) == 0 &&
|
|
!fu_device_has_flag (device, FWUPD_DEVICE_FLAG_NEEDS_ACTIVATION)) {
|
|
g_autofree gchar *str = NULL;
|
|
fu_device_set_update_state (device, FWUPD_UPDATE_STATE_FAILED);
|
|
str = g_strdup_printf ("device version not updated on success, %s != %s",
|
|
version_rel, fu_device_get_version (device));
|
|
fu_device_set_update_error (device, str);
|
|
}
|
|
|
|
/* success */
|
|
if ((flags & FWUPD_INSTALL_FLAG_NO_HISTORY) == 0 &&
|
|
!fu_history_modify_device (self->history, device, error))
|
|
return FALSE;
|
|
|
|
/* make the UI update */
|
|
fu_engine_emit_changed (self);
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
typedef struct {
|
|
gboolean ret;
|
|
GError **error;
|
|
FuEngine *self;
|
|
FuDevice *device;
|
|
} FuEngineSortHelper;
|
|
|
|
static gint
|
|
fu_engine_sort_release_versions_cb (gconstpointer a, gconstpointer b, gpointer user_data)
|
|
{
|
|
FuEngineSortHelper *helper = (FuEngineSortHelper *) user_data;
|
|
XbNode *na = *((XbNode **) a);
|
|
XbNode *nb = *((XbNode **) b);
|
|
g_autofree gchar *va = NULL;
|
|
g_autofree gchar *vb = NULL;
|
|
|
|
/* already failed */
|
|
if (!helper->ret)
|
|
return 0;
|
|
|
|
/* get the semver from the release */
|
|
va = fu_engine_get_release_version (helper->self, helper->device, na, helper->error);
|
|
if (va == NULL) {
|
|
g_prefix_error (helper->error, "failed to get release version: ");
|
|
return 0;
|
|
}
|
|
vb = fu_engine_get_release_version (helper->self, helper->device, nb, helper->error);
|
|
if (vb == NULL) {
|
|
g_prefix_error (helper->error, "failed to get release version: ");
|
|
return 0;
|
|
}
|
|
return fu_common_vercmp_full (va, vb, fu_device_get_version_format (helper->device));
|
|
}
|
|
|
|
static gboolean
|
|
fu_engine_sort_releases (FuEngine *self, FuDevice *device, GPtrArray *rels, GError **error)
|
|
{
|
|
FuEngineSortHelper helper = {
|
|
.ret = TRUE,
|
|
.self = self,
|
|
.device = device,
|
|
.error = error,
|
|
};
|
|
g_ptr_array_sort_with_data (rels, fu_engine_sort_release_versions_cb, &helper);
|
|
return helper.ret;
|
|
}
|
|
|
|
/**
|
|
* fu_engine_install:
|
|
* @self: A #FuEngine
|
|
* @task: A #FuInstallTask
|
|
* @blob_cab: The #GBytes of the .cab file
|
|
* @flags: The #FwupdInstallFlags, e.g. %FWUPD_DEVICE_FLAG_UPDATABLE
|
|
* @error: A #GError, or %NULL
|
|
*
|
|
* Installs a specific firmware file on a device.
|
|
*
|
|
* By this point all the requirements and tests should have been done in
|
|
* fu_engine_check_requirements() so this should not fail before running
|
|
* the plugin loader.
|
|
*
|
|
* Returns: %TRUE for success
|
|
**/
|
|
gboolean
|
|
fu_engine_install (FuEngine *self,
|
|
FuInstallTask *task,
|
|
GBytes *blob_cab,
|
|
FwupdInstallFlags flags,
|
|
GError **error)
|
|
{
|
|
XbNode *component = fu_install_task_get_component (task);
|
|
g_autoptr(FuDevice) device = NULL;
|
|
g_autoptr(GError) error_local = NULL;
|
|
g_autoptr(XbNode) rel_newest = NULL;
|
|
#if LIBXMLB_CHECK_VERSION(0,2,0)
|
|
g_autoptr(XbQuery) query = NULL;
|
|
#endif
|
|
|
|
g_return_val_if_fail (FU_IS_ENGINE (self), FALSE);
|
|
g_return_val_if_fail (XB_IS_NODE (component), FALSE);
|
|
g_return_val_if_fail (blob_cab != NULL, FALSE);
|
|
g_return_val_if_fail (error == NULL || *error == NULL, FALSE);
|
|
|
|
/* not in bootloader mode */
|
|
device = g_object_ref (fu_install_task_get_device (task));
|
|
if (fu_device_has_flag (device, FWUPD_DEVICE_FLAG_NEEDS_BOOTLOADER)) {
|
|
const gchar *caption = NULL;
|
|
caption = xb_node_query_text (component,
|
|
"screenshots/screenshot/caption",
|
|
NULL);
|
|
if (caption != NULL) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NEEDS_USER_ACTION,
|
|
"Device %s needs to manually be put in update mode: %s",
|
|
fu_device_get_name (device), caption);
|
|
} else {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NEEDS_USER_ACTION,
|
|
"Device %s needs to manually be put in update mode",
|
|
fu_device_get_name (device));
|
|
}
|
|
fu_device_set_update_state (device, FWUPD_UPDATE_STATE_FAILED_TRANSIENT);
|
|
if (error != NULL)
|
|
fu_device_set_update_error (device, (*error)->message);
|
|
return FALSE;
|
|
}
|
|
|
|
/* get the newest version */
|
|
#if LIBXMLB_CHECK_VERSION(0,2,0)
|
|
query = xb_query_new_full (xb_node_get_silo (component),
|
|
"releases/release",
|
|
XB_QUERY_FLAG_FORCE_NODE_CACHE,
|
|
error);
|
|
if (query == NULL)
|
|
return FALSE;
|
|
rel_newest = xb_node_query_first_full (component, query, &error_local);
|
|
#else
|
|
rel_newest = xb_node_query_first (component, "releases/release", &error_local);
|
|
#endif
|
|
if (rel_newest == NULL) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_INVALID_FILE,
|
|
"No releases in the firmware component: %s",
|
|
error_local->message);
|
|
return FALSE;
|
|
}
|
|
|
|
/* schedule this for the next reboot if not in system-update.target,
|
|
* but first check if allowed on battery power */
|
|
if ((flags & FWUPD_INSTALL_FLAG_OFFLINE) > 0 &&
|
|
!fu_engine_is_running_offline (self)) {
|
|
FuPlugin *plugin;
|
|
g_autoptr(FwupdRelease) release_tmp = NULL;
|
|
g_autofree gchar *version_rel = NULL;
|
|
version_rel = fu_engine_get_release_version (self, device, rel_newest, error);
|
|
if (version_rel == NULL) {
|
|
g_prefix_error (error, "failed to get release version: ");
|
|
return FALSE;
|
|
}
|
|
plugin = fu_plugin_list_find_by_name (self->plugin_list, "upower", NULL);
|
|
if (plugin != NULL) {
|
|
if (!fu_plugin_runner_update_prepare (plugin, flags, device, error))
|
|
return FALSE;
|
|
}
|
|
release_tmp = fu_engine_create_release_metadata (self, device, plugin, error);
|
|
if (release_tmp == NULL)
|
|
return FALSE;
|
|
fwupd_release_set_version (release_tmp, version_rel);
|
|
return fu_engine_schedule_update (self, device, release_tmp,
|
|
blob_cab, flags, error);
|
|
}
|
|
|
|
/* install each intermediate release, or install only the newest version */
|
|
if (fu_device_has_flag (device, FWUPD_DEVICE_FLAG_INSTALL_ALL_RELEASES)) {
|
|
g_autoptr(GPtrArray) rels = NULL;
|
|
#if LIBXMLB_CHECK_VERSION(0,2,0)
|
|
rels = xb_node_query_full (component, query, &error_local);
|
|
#else
|
|
rels = xb_node_query (component, "releases/release", 0, &error_local);
|
|
#endif
|
|
if (rels == NULL) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_INVALID_FILE,
|
|
"No releases in the firmware component: %s",
|
|
error_local->message);
|
|
return FALSE;
|
|
}
|
|
if (!fu_engine_sort_releases (self, device, rels, error))
|
|
return FALSE;
|
|
for (guint i = 0; i < rels->len; i++) {
|
|
XbNode *rel = g_ptr_array_index (rels, i);
|
|
if (!fu_engine_install_release (self, device, component, rel, flags, error))
|
|
return FALSE;
|
|
}
|
|
} else {
|
|
if (!fu_engine_install_release (self, device, component, rel_newest, flags, error))
|
|
return FALSE;
|
|
}
|
|
|
|
/* success */
|
|
fu_device_set_update_state (device, FWUPD_UPDATE_STATE_SUCCESS);
|
|
return TRUE;
|
|
}
|
|
|
|
/**
|
|
* fu_engine_get_plugins:
|
|
* @self: A #FuPluginList
|
|
*
|
|
* Gets all the plugins that have been added.
|
|
*
|
|
* Returns: (transfer none) (element-type FuPlugin): the plugins
|
|
*
|
|
* Since: 1.0.8
|
|
**/
|
|
GPtrArray *
|
|
fu_engine_get_plugins (FuEngine *self)
|
|
{
|
|
g_return_val_if_fail (FU_IS_ENGINE (self), NULL);
|
|
return fu_plugin_list_get_all (self->plugin_list);
|
|
}
|
|
|
|
/**
|
|
* fu_engine_get_device:
|
|
* @self: A #FuEngine
|
|
* @device_id: A device ID
|
|
* @error: A #GError, or %NULL
|
|
*
|
|
* Gets a specific device.
|
|
*
|
|
* Returns: (transfer full): a device, or %NULL if not found
|
|
**/
|
|
FuDevice *
|
|
fu_engine_get_device (FuEngine *self, const gchar *device_id, GError **error)
|
|
{
|
|
g_autoptr(FuDevice) device1 = NULL;
|
|
g_autoptr(FuDevice) device2 = NULL;
|
|
g_autoptr(FuDevice) root = NULL;
|
|
|
|
/* find device */
|
|
device1 = fu_device_list_get_by_id (self->device_list, device_id, error);
|
|
if (device1 == NULL)
|
|
return NULL;
|
|
|
|
/* wait for device to disconnect and reconnect */
|
|
root = fu_device_get_root (device1);
|
|
if (fu_device_has_flag (device1, FWUPD_DEVICE_FLAG_WAIT_FOR_REPLUG)) {
|
|
if (!fu_device_list_wait_for_replug (self->device_list, device1, error)) {
|
|
g_prefix_error (error, "failed to wait for detach replug: ");
|
|
return NULL;
|
|
}
|
|
} else if (fu_device_has_flag (root, FWUPD_DEVICE_FLAG_WAIT_FOR_REPLUG)) {
|
|
if (!fu_device_list_wait_for_replug (self->device_list, root, error)) {
|
|
g_prefix_error (error, "failed to wait for detach replug: ");
|
|
return NULL;
|
|
}
|
|
} else {
|
|
/* no replug required */
|
|
return g_steal_pointer (&device1);
|
|
}
|
|
|
|
/* get the new device */
|
|
device2 = fu_device_list_get_by_id (self->device_list, device_id, error);
|
|
if (device2 == NULL) {
|
|
g_prefix_error (error, "failed to get device after replug: ");
|
|
return NULL;
|
|
}
|
|
|
|
/* success */
|
|
return g_steal_pointer (&device2);
|
|
}
|
|
|
|
/* same as FuDevice->prepare, but with the device open */
|
|
static gboolean
|
|
fu_engine_device_prepare (FuEngine *self,
|
|
FuDevice *device,
|
|
FwupdInstallFlags flags,
|
|
GError **error)
|
|
{
|
|
g_autoptr(FuDeviceLocker) locker = fu_device_locker_new (device, error);
|
|
if (locker == NULL) {
|
|
g_prefix_error (error, "failed to open device for prepare: ");
|
|
return FALSE;
|
|
}
|
|
|
|
/* check battery level is sane -- if the device needs a higher
|
|
* threshold then it can be checked in FuDevice->prepare() */
|
|
if (fu_device_get_battery_level (device) > 0 &&
|
|
fu_device_get_battery_level (device) < FU_ENGINE_BATTERY_LEVEL_THRESHOLD) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_BATTERY_LEVEL_TOO_LOW,
|
|
"battery level is too low: %u%%",
|
|
fu_device_get_battery_level (device));
|
|
return FALSE;
|
|
}
|
|
|
|
return fu_device_prepare (device, flags, error);
|
|
}
|
|
|
|
/* same as FuDevice->cleanup, but with the device open */
|
|
static gboolean
|
|
fu_engine_device_cleanup (FuEngine *self,
|
|
FuDevice *device,
|
|
FwupdInstallFlags flags,
|
|
GError **error)
|
|
{
|
|
g_autoptr(FuDeviceLocker) locker = NULL;
|
|
|
|
if (fu_device_has_flag (device, FWUPD_DEVICE_FLAG_WILL_DISAPPEAR)) {
|
|
g_debug ("skipping device cleanup due to will-disappear flag");
|
|
return TRUE;
|
|
}
|
|
|
|
locker = fu_device_locker_new (device, error);
|
|
if (locker == NULL) {
|
|
g_prefix_error (error, "failed to open device for cleanup: ");
|
|
return FALSE;
|
|
}
|
|
return fu_device_cleanup (device, flags, error);
|
|
}
|
|
|
|
static gboolean
|
|
fu_engine_update_prepare (FuEngine *self,
|
|
FwupdInstallFlags flags,
|
|
const gchar *device_id,
|
|
GError **error)
|
|
{
|
|
GPtrArray *plugins = fu_plugin_list_get_all (self->plugin_list);
|
|
g_autofree gchar *str = NULL;
|
|
g_autoptr(FuDevice) device = NULL;
|
|
|
|
/* the device and plugin both may have changed */
|
|
device = fu_engine_get_device (self, device_id, error);
|
|
if (device == NULL)
|
|
return FALSE;
|
|
|
|
/* don't rely on a plugin clearing this */
|
|
fu_device_remove_flag (device, FWUPD_DEVICE_FLAG_ANOTHER_WRITE_REQUIRED);
|
|
|
|
str = fu_device_to_string (device);
|
|
g_debug ("prepare -> %s", str);
|
|
if (!fu_engine_device_prepare (self, device, flags, error))
|
|
return FALSE;
|
|
for (guint j = 0; j < plugins->len; j++) {
|
|
FuPlugin *plugin_tmp = g_ptr_array_index (plugins, j);
|
|
if (!fu_plugin_runner_update_prepare (plugin_tmp, flags, device, error))
|
|
return FALSE;
|
|
}
|
|
|
|
/* wait for device to disconnect and reconnect */
|
|
if (fu_device_has_flag (device, FWUPD_DEVICE_FLAG_WAIT_FOR_REPLUG)) {
|
|
if (!fu_device_list_wait_for_replug (self->device_list, device, error)) {
|
|
g_prefix_error (error, "failed to wait for prepare replug: ");
|
|
return FALSE;
|
|
}
|
|
}
|
|
return TRUE;
|
|
}
|
|
|
|
static gboolean
|
|
fu_engine_update_cleanup (FuEngine *self,
|
|
FwupdInstallFlags flags,
|
|
const gchar *device_id,
|
|
GError **error)
|
|
{
|
|
GPtrArray *plugins = fu_plugin_list_get_all (self->plugin_list);
|
|
g_autofree gchar *str = NULL;
|
|
g_autoptr(FuDevice) device = NULL;
|
|
|
|
/* the device and plugin both may have changed */
|
|
device = fu_engine_get_device (self, device_id, error);
|
|
if (device == NULL)
|
|
return FALSE;
|
|
str = fu_device_to_string (device);
|
|
g_debug ("cleanup -> %s", str);
|
|
if (!fu_engine_device_cleanup (self, device, flags, error))
|
|
return FALSE;
|
|
for (guint j = 0; j < plugins->len; j++) {
|
|
FuPlugin *plugin_tmp = g_ptr_array_index (plugins, j);
|
|
if (!fu_plugin_runner_update_cleanup (plugin_tmp, flags, device, error))
|
|
return FALSE;
|
|
}
|
|
|
|
/* wait for device to disconnect and reconnect */
|
|
if (fu_device_has_flag (device, FWUPD_DEVICE_FLAG_WAIT_FOR_REPLUG)) {
|
|
if (!fu_device_list_wait_for_replug (self->device_list, device, error)) {
|
|
g_prefix_error (error, "failed to wait for cleanup replug: ");
|
|
return FALSE;
|
|
}
|
|
}
|
|
return TRUE;
|
|
}
|
|
|
|
static gboolean
|
|
fu_engine_update_detach (FuEngine *self, const gchar *device_id, GError **error)
|
|
{
|
|
FuPlugin *plugin;
|
|
g_autofree gchar *str = NULL;
|
|
g_autoptr(FuDevice) device = NULL;
|
|
|
|
/* the device and plugin both may have changed */
|
|
device = fu_engine_get_device (self, device_id, error);
|
|
if (device == NULL)
|
|
return FALSE;
|
|
str = fu_device_to_string (device);
|
|
g_debug ("detach -> %s", str);
|
|
plugin = fu_plugin_list_find_by_name (self->plugin_list,
|
|
fu_device_get_plugin (device),
|
|
error);
|
|
if (plugin == NULL)
|
|
return FALSE;
|
|
if (!fu_plugin_runner_update_detach (plugin, device, error))
|
|
return FALSE;
|
|
return TRUE;
|
|
}
|
|
|
|
static gboolean
|
|
fu_engine_update_attach (FuEngine *self, const gchar *device_id, GError **error)
|
|
{
|
|
FuPlugin *plugin;
|
|
g_autofree gchar *str = NULL;
|
|
g_autoptr(FuDevice) device = NULL;
|
|
|
|
/* the device and plugin both may have changed */
|
|
device = fu_engine_get_device (self, device_id, error);
|
|
if (device == NULL) {
|
|
g_prefix_error (error, "failed to get device after update: ");
|
|
return FALSE;
|
|
}
|
|
str = fu_device_to_string (device);
|
|
g_debug ("attach -> %s", str);
|
|
plugin = fu_plugin_list_find_by_name (self->plugin_list,
|
|
fu_device_get_plugin (device),
|
|
error);
|
|
if (plugin == NULL)
|
|
return FALSE;
|
|
|
|
if (!fu_plugin_runner_update_attach (plugin, device, error))
|
|
return FALSE;
|
|
return TRUE;
|
|
}
|
|
|
|
gboolean
|
|
fu_engine_activate (FuEngine *self, const gchar *device_id, GError **error)
|
|
{
|
|
FuPlugin *plugin;
|
|
g_autofree gchar *str = NULL;
|
|
g_autoptr(FuDevice) device = NULL;
|
|
|
|
g_return_val_if_fail (FU_IS_ENGINE (self), FALSE);
|
|
g_return_val_if_fail (device_id != NULL, FALSE);
|
|
g_return_val_if_fail (error == NULL || *error == NULL, FALSE);
|
|
|
|
/* check the device exists */
|
|
device = fu_device_list_get_by_id (self->device_list, device_id, error);
|
|
if (device == NULL)
|
|
return FALSE;
|
|
str = fu_device_to_string (device);
|
|
g_debug ("activate -> %s", str);
|
|
plugin = fu_plugin_list_find_by_name (self->plugin_list,
|
|
fu_device_get_plugin (device),
|
|
error);
|
|
if (plugin == NULL)
|
|
return FALSE;
|
|
g_debug ("Activating %s", fu_device_get_name (device));
|
|
|
|
if (!fu_plugin_runner_activate (plugin, device, error))
|
|
return FALSE;
|
|
|
|
fu_engine_emit_device_changed (self, device);
|
|
fu_engine_emit_changed (self);
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
static gboolean
|
|
fu_engine_update_reload (FuEngine *self, const gchar *device_id, GError **error)
|
|
{
|
|
FuPlugin *plugin;
|
|
g_autofree gchar *str = NULL;
|
|
g_autoptr(FuDevice) device = NULL;
|
|
|
|
/* the device and plugin both may have changed */
|
|
device = fu_engine_get_device (self, device_id, error);
|
|
if (device == NULL) {
|
|
g_prefix_error (error, "failed to get device after update: ");
|
|
return FALSE;
|
|
}
|
|
str = fu_device_to_string (device);
|
|
g_debug ("reload -> %s", str);
|
|
plugin = fu_plugin_list_find_by_name (self->plugin_list,
|
|
fu_device_get_plugin (device),
|
|
error);
|
|
if (plugin == NULL)
|
|
return FALSE;
|
|
|
|
if (fu_device_has_flag (device, FWUPD_DEVICE_FLAG_WILL_DISAPPEAR)) {
|
|
g_debug ("skipping reload due to will-disappear flag");
|
|
return TRUE;
|
|
}
|
|
|
|
if (!fu_plugin_runner_update_reload (plugin, device, error)) {
|
|
g_prefix_error (error, "failed to reload device: ");
|
|
return FALSE;
|
|
}
|
|
return TRUE;
|
|
}
|
|
|
|
static gboolean
|
|
fu_engine_update (FuEngine *self,
|
|
const gchar *device_id,
|
|
GBytes *blob_fw2,
|
|
FwupdInstallFlags flags,
|
|
GError **error)
|
|
{
|
|
FuPlugin *plugin;
|
|
g_autofree gchar *str = NULL;
|
|
g_autoptr(FuDevice) device = NULL;
|
|
g_autoptr(FuDevice) device_pending = NULL;
|
|
|
|
/* cancel the pending action */
|
|
if (!fu_engine_offline_invalidate (error))
|
|
return FALSE;
|
|
|
|
/* the device and plugin both may have changed */
|
|
device = fu_engine_get_device (self, device_id, error);
|
|
if (device == NULL) {
|
|
g_prefix_error (error, "failed to get device after detach: ");
|
|
return FALSE;
|
|
}
|
|
device_pending = fu_history_get_device_by_id (self->history, device_id, NULL);
|
|
str = fu_device_to_string (device);
|
|
g_debug ("update -> %s", str);
|
|
plugin = fu_plugin_list_find_by_name (self->plugin_list,
|
|
fu_device_get_plugin (device),
|
|
error);
|
|
if (plugin == NULL)
|
|
return FALSE;
|
|
if (!fu_plugin_runner_update (plugin, device, blob_fw2, flags, error)) {
|
|
g_autoptr(GError) error_attach = NULL;
|
|
g_autoptr(GError) error_cleanup = NULL;
|
|
|
|
/* attack back into runtime then cleanup */
|
|
if (!fu_plugin_runner_update_attach (plugin,
|
|
device,
|
|
&error_attach)) {
|
|
g_warning ("failed to attach device after failed update: %s",
|
|
error_attach->message);
|
|
}
|
|
if (!fu_engine_update_cleanup (self, flags, device_id, &error_cleanup)) {
|
|
g_warning ("failed to update-cleanup after failed update: %s",
|
|
error_cleanup->message);
|
|
}
|
|
return FALSE;
|
|
}
|
|
|
|
/* cleanup */
|
|
if (device_pending != NULL) {
|
|
const gchar *tmp;
|
|
FwupdRelease *release;
|
|
|
|
/* update history database */
|
|
fu_device_set_update_state (device, FWUPD_UPDATE_STATE_SUCCESS);
|
|
if (!fu_history_modify_device (self->history, device, error))
|
|
return FALSE;
|
|
|
|
/* delete cab file */
|
|
release = fu_device_get_release_default (device_pending);
|
|
tmp = fwupd_release_get_filename (release);
|
|
if (tmp != NULL && g_str_has_prefix (tmp, FWUPD_LIBEXECDIR)) {
|
|
g_autoptr(GError) error_delete = NULL;
|
|
g_autoptr(GFile) file = NULL;
|
|
file = g_file_new_for_path (tmp);
|
|
if (!g_file_delete (file, NULL, &error_delete)) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_INVALID_FILE,
|
|
"Failed to delete %s: %s",
|
|
tmp, error_delete->message);
|
|
return FALSE;
|
|
}
|
|
}
|
|
}
|
|
return TRUE;
|
|
}
|
|
|
|
GBytes *
|
|
fu_engine_firmware_dump (FuEngine *self,
|
|
FuDevice *device,
|
|
FwupdInstallFlags flags,
|
|
GError **error)
|
|
{
|
|
g_autoptr(FuDeviceLocker) locker = NULL;
|
|
|
|
/* open, read, close */
|
|
locker = fu_device_locker_new (device, error);
|
|
if (locker == NULL) {
|
|
g_prefix_error (error, "failed to open device for firmware read: ");
|
|
return NULL;
|
|
}
|
|
return fu_device_dump_firmware (device, error);
|
|
}
|
|
|
|
gboolean
|
|
fu_engine_install_blob (FuEngine *self,
|
|
FuDevice *device,
|
|
GBytes *blob_fw,
|
|
FwupdInstallFlags flags,
|
|
GError **error)
|
|
{
|
|
guint retries = 0;
|
|
g_autofree gchar *device_id = NULL;
|
|
g_autoptr(GTimer) timer = g_timer_new ();
|
|
|
|
/* test the firmware is not an empty blob */
|
|
if (g_bytes_get_size (blob_fw) == 0) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_INVALID_FILE,
|
|
"Firmware is invalid as has zero size");
|
|
return FALSE;
|
|
}
|
|
|
|
/* mark this as modified even if we actually fail to do the update */
|
|
fu_device_set_modified (device, (guint64) g_get_real_time () / G_USEC_PER_SEC);
|
|
|
|
/* plugins can set FWUPD_DEVICE_FLAG_ANOTHER_WRITE_REQUIRED to run again, but they
|
|
* must return TRUE rather than an error */
|
|
device_id = g_strdup (fu_device_get_id (device));
|
|
do {
|
|
g_autoptr(FuDevice) device_tmp = NULL;
|
|
|
|
/* check for a loop */
|
|
if (++retries > 5) {
|
|
g_set_error_literal (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_INTERNAL,
|
|
"aborting device write loop, limit 5");
|
|
return FALSE;
|
|
}
|
|
|
|
/* signal to all the plugins the update is about to happen */
|
|
if (!fu_engine_update_prepare (self, flags, device_id, error))
|
|
return FALSE;
|
|
|
|
/* detach to bootloader mode */
|
|
if (!fu_engine_update_detach (self, device_id, error))
|
|
return FALSE;
|
|
|
|
/* install */
|
|
if (!fu_engine_update (self, device_id, blob_fw, flags, error))
|
|
return FALSE;
|
|
|
|
/* attach into runtime mode */
|
|
if (!fu_engine_update_attach (self, device_id, error))
|
|
return FALSE;
|
|
|
|
/* the device and plugin both may have changed */
|
|
device_tmp = fu_engine_get_device (self, device_id, error);
|
|
if (device_tmp == NULL)
|
|
return FALSE;
|
|
if (!fu_device_has_flag (device_tmp, FWUPD_DEVICE_FLAG_ANOTHER_WRITE_REQUIRED))
|
|
break;
|
|
|
|
} while (TRUE);
|
|
|
|
/* get the new version number */
|
|
if (!fu_engine_update_reload (self, device_id, error))
|
|
return FALSE;
|
|
|
|
/* signal to all the plugins the update has happened */
|
|
if (!fu_engine_update_cleanup (self, flags, device_id, error))
|
|
return FALSE;
|
|
|
|
/* make the UI update */
|
|
fu_engine_set_status (self, FWUPD_STATUS_IDLE);
|
|
g_debug ("Updating %s took %f seconds", fu_device_get_name (device),
|
|
g_timer_elapsed (timer, NULL));
|
|
return TRUE;
|
|
}
|
|
|
|
static FuDevice *
|
|
fu_engine_get_item_by_id_fallback_history (FuEngine *self, const gchar *id, GError **error)
|
|
{
|
|
g_autoptr(GPtrArray) devices = NULL;
|
|
|
|
/* not a wildcard */
|
|
if (g_strcmp0 (id, FWUPD_DEVICE_ID_ANY) != 0) {
|
|
g_autoptr(FuDevice) dev = NULL;
|
|
g_autoptr(GError) error_local = NULL;
|
|
|
|
/* get this one device */
|
|
dev = fu_history_get_device_by_id (self->history, id, &error_local);
|
|
if (dev == NULL) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOTHING_TO_DO,
|
|
"Failed to find %s in history database: %s",
|
|
id, error_local->message);
|
|
return NULL;
|
|
}
|
|
|
|
/* only useful */
|
|
if (fu_device_get_update_state (dev) == FWUPD_UPDATE_STATE_SUCCESS ||
|
|
fu_device_get_update_state (dev) == FWUPD_UPDATE_STATE_FAILED_TRANSIENT ||
|
|
fu_device_get_update_state (dev) == FWUPD_UPDATE_STATE_FAILED) {
|
|
return g_steal_pointer (&dev);
|
|
}
|
|
|
|
/* nothing in database */
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOTHING_TO_DO,
|
|
"Device %s has no results to report",
|
|
fu_device_get_id (dev));
|
|
return NULL;
|
|
}
|
|
|
|
/* allow '*' for any */
|
|
devices = fu_history_get_devices (self->history, error);
|
|
if (devices == NULL)
|
|
return NULL;
|
|
for (guint i = 0; i < devices->len; i++) {
|
|
FuDevice *dev = g_ptr_array_index (devices, i);
|
|
if (fu_device_get_update_state (dev) == FWUPD_UPDATE_STATE_SUCCESS ||
|
|
fu_device_get_update_state (dev) == FWUPD_UPDATE_STATE_FAILED_TRANSIENT ||
|
|
fu_device_get_update_state (dev) == FWUPD_UPDATE_STATE_FAILED)
|
|
return g_object_ref (dev);
|
|
}
|
|
g_set_error_literal (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOTHING_TO_DO,
|
|
"Failed to find any useful results to report");
|
|
return NULL;
|
|
}
|
|
|
|
/* for the self tests */
|
|
void
|
|
fu_engine_set_silo (FuEngine *self, XbSilo *silo)
|
|
{
|
|
g_return_if_fail (FU_IS_ENGINE (self));
|
|
g_return_if_fail (XB_IS_SILO (silo));
|
|
g_set_object (&self->silo, silo);
|
|
}
|
|
|
|
static gboolean
|
|
fu_engine_appstream_upgrade_cb (XbBuilderFixup *self,
|
|
XbBuilderNode *bn,
|
|
gpointer user_data,
|
|
GError **error)
|
|
{
|
|
if (g_strcmp0 (xb_builder_node_get_element (bn), "metadata") == 0)
|
|
xb_builder_node_set_element (bn, "custom");
|
|
return TRUE;
|
|
}
|
|
|
|
static XbBuilderSource *
|
|
fu_engine_create_metadata_builder_source (FuEngine *self,
|
|
const gchar *fn,
|
|
GError **error)
|
|
{
|
|
g_autoptr(GBytes) blob = NULL;
|
|
g_autoptr(XbSilo) silo = NULL;
|
|
g_autoptr(XbBuilderSource) source = xb_builder_source_new ();
|
|
g_autofree gchar *xml = NULL;
|
|
|
|
g_debug ("building metadata for %s", fn);
|
|
blob = fu_common_get_contents_bytes (fn, error);
|
|
if (blob == NULL)
|
|
return NULL;
|
|
|
|
/* convert the silo for the CAB into a XbBuilderSource */
|
|
silo = fu_engine_get_silo_from_blob (self, blob, error);
|
|
if (silo == NULL)
|
|
return NULL;
|
|
xml = xb_silo_export (silo, XB_NODE_EXPORT_FLAG_NONE, error);
|
|
if (xml == NULL)
|
|
return NULL;
|
|
if (!xb_builder_source_load_xml (source, xml,
|
|
XB_BUILDER_SOURCE_FLAG_NONE,
|
|
error))
|
|
return NULL;
|
|
return g_steal_pointer (&source);
|
|
}
|
|
|
|
static gboolean
|
|
fu_engine_create_metadata (FuEngine *self, XbBuilder *builder,
|
|
FwupdRemote *remote, GError **error)
|
|
{
|
|
g_autoptr(GPtrArray) files = NULL;
|
|
const gchar *path;
|
|
|
|
/* find all files in directory */
|
|
path = fwupd_remote_get_filename_cache (remote);
|
|
files = fu_common_get_files_recursive (path, error);
|
|
if (files == NULL)
|
|
return FALSE;
|
|
|
|
/* add each source */
|
|
for (guint i = 0; i < files->len; i++) {
|
|
g_autoptr(XbBuilderNode) custom = NULL;
|
|
g_autoptr(XbBuilderSource) source = NULL;
|
|
g_autoptr(GError) error_local = NULL;
|
|
const gchar *fn = g_ptr_array_index (files, i);
|
|
g_autofree gchar *fn_lowercase = g_ascii_strdown (fn, -1);
|
|
|
|
/* check is cab file */
|
|
if (!g_str_has_suffix (fn_lowercase, ".cab")) {
|
|
g_debug ("ignoring: %s", fn);
|
|
continue;
|
|
}
|
|
|
|
/* build source for file */
|
|
source = fu_engine_create_metadata_builder_source (self, fn, &error_local);
|
|
if (source == NULL) {
|
|
g_warning ("failed to create builder source: %s",
|
|
error_local->message);
|
|
continue;
|
|
}
|
|
|
|
/* add metadata */
|
|
custom = xb_builder_node_new ("custom");
|
|
xb_builder_node_insert_text (custom,
|
|
"value", fn,
|
|
"key", "fwupd::FilenameCache",
|
|
NULL);
|
|
xb_builder_node_insert_text (custom,
|
|
"value", fwupd_remote_get_id (remote),
|
|
"key", "fwupd::RemoteId",
|
|
NULL);
|
|
xb_builder_source_set_info (source, custom);
|
|
xb_builder_import_source (builder, source);
|
|
}
|
|
return TRUE;
|
|
}
|
|
|
|
static void
|
|
fu_engine_ensure_device_supported (FuEngine *self, FuDevice *device)
|
|
{
|
|
gboolean is_supported = FALSE;
|
|
g_autoptr(GError) error = NULL;
|
|
g_autoptr(GPtrArray) releases = NULL;
|
|
g_autoptr(FuEngineRequest) request = fu_engine_request_new ();
|
|
|
|
/* all flags set */
|
|
fu_engine_request_set_feature_flags (request, ~0);
|
|
|
|
/* get all releases that pass the requirements */
|
|
releases = fu_engine_get_releases_for_device (self,
|
|
request,
|
|
device,
|
|
&error);
|
|
if (releases == NULL) {
|
|
if (!g_error_matches (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOTHING_TO_DO) &&
|
|
!g_error_matches (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOT_SUPPORTED)) {
|
|
g_warning ("failed to get releases for %s: %s",
|
|
fu_device_get_name (device),
|
|
error->message);
|
|
}
|
|
} else {
|
|
if (releases->len > 0)
|
|
is_supported = TRUE;
|
|
}
|
|
|
|
/* was supported, now unsupported */
|
|
if (!is_supported) {
|
|
if (fu_device_has_flag (device, FWUPD_DEVICE_FLAG_SUPPORTED)) {
|
|
fu_device_remove_flag (device, FWUPD_DEVICE_FLAG_SUPPORTED);
|
|
fu_engine_emit_device_changed (self, device);
|
|
}
|
|
return;
|
|
}
|
|
|
|
/* was unsupported, now supported */
|
|
if (!fu_device_has_flag (device, FWUPD_DEVICE_FLAG_SUPPORTED)) {
|
|
fu_device_add_flag (device, FWUPD_DEVICE_FLAG_SUPPORTED);
|
|
fu_engine_emit_device_changed (self, device);
|
|
}
|
|
}
|
|
|
|
static void
|
|
fu_engine_md_refresh_device_name (FuEngine *self, FuDevice *device, XbNode *component)
|
|
{
|
|
const gchar *name = NULL;
|
|
|
|
/* require data */
|
|
if (component == NULL)
|
|
return;
|
|
|
|
/* copy 1:1 */
|
|
name = xb_node_query_text (component, "name", NULL);
|
|
if (name != NULL) {
|
|
fu_device_set_name (device, name);
|
|
fu_device_remove_internal_flag (device, FU_DEVICE_INTERNAL_FLAG_MD_SET_NAME);
|
|
}
|
|
}
|
|
|
|
static void
|
|
fu_engine_md_refresh_device_icon (FuEngine *self, FuDevice *device, XbNode *component)
|
|
{
|
|
const gchar *icon = NULL;
|
|
|
|
/* require data */
|
|
if (component == NULL)
|
|
return;
|
|
|
|
/* copy 1:1 */
|
|
icon = xb_node_query_text (component, "icon", NULL);
|
|
if (icon != NULL) {
|
|
fu_device_add_icon (device, icon);
|
|
fu_device_remove_internal_flag (device, FU_DEVICE_INTERNAL_FLAG_MD_SET_ICON);
|
|
}
|
|
}
|
|
|
|
static const gchar *
|
|
fu_common_device_category_to_name (const gchar *cat)
|
|
{
|
|
if (g_strcmp0 (cat, "X-EmbeddedController") == 0)
|
|
return "Embedded Controller";
|
|
if (g_strcmp0 (cat, "X-ManagementEngine") == 0)
|
|
return "Intel Management Engine";
|
|
if (g_strcmp0 (cat, "X-CorporateManagementEngine") == 0)
|
|
return "Intel Management Engine";
|
|
if (g_strcmp0 (cat, "X-ConsumerManagementEngine") == 0)
|
|
return "Intel Management Engine";
|
|
if (g_strcmp0 (cat, "X-ThunderboltController") == 0)
|
|
return "Thunderbolt Controller";
|
|
if (g_strcmp0 (cat, "X-PlatformSecurityProcessor") == 0)
|
|
return "Platform Security Processor";
|
|
if (g_strcmp0 (cat, "X-CpuMicrocode") == 0)
|
|
return "CPU Microcode";
|
|
return NULL;
|
|
}
|
|
|
|
static void
|
|
fu_engine_md_refresh_device_name_category (FuEngine *self, FuDevice *device, XbNode *component)
|
|
{
|
|
const gchar *name = NULL;
|
|
g_autoptr(GPtrArray) cats = NULL;
|
|
|
|
/* require data */
|
|
if (component == NULL)
|
|
return;
|
|
|
|
/* get AppStream and safe-compat categories */
|
|
cats = xb_node_query (component, "categories/category|X-categories/category", 0, NULL);
|
|
if (cats == NULL)
|
|
return;
|
|
for (guint i = 0; i < cats->len; i++) {
|
|
XbNode *n = g_ptr_array_index (cats, i);
|
|
name = fu_common_device_category_to_name (xb_node_get_text (n));
|
|
if (name != NULL)
|
|
break;
|
|
}
|
|
if (name != NULL) {
|
|
fu_device_set_name (device, name);
|
|
fu_device_remove_internal_flag (device, FU_DEVICE_INTERNAL_FLAG_MD_SET_NAME_CATEGORY);
|
|
}
|
|
}
|
|
|
|
static void
|
|
_g_ptr_array_reverse (GPtrArray *array)
|
|
{
|
|
guint last_idx = array->len - 1;
|
|
for (guint i = 0; i < array->len / 2; i++) {
|
|
gpointer tmp = array->pdata[i];
|
|
array->pdata[i] = array->pdata[last_idx - i];
|
|
array->pdata[last_idx - i] = tmp;
|
|
}
|
|
}
|
|
|
|
static void
|
|
fu_engine_md_refresh_device_verfmt (FuEngine *self, FuDevice *device, XbNode *component)
|
|
{
|
|
FwupdVersionFormat verfmt = FWUPD_VERSION_FORMAT_UNKNOWN;
|
|
g_autoptr(GPtrArray) verfmts = NULL;
|
|
|
|
/* require data */
|
|
if (component == NULL)
|
|
return;
|
|
|
|
/* get metadata */
|
|
verfmts = xb_node_query (component, "custom/value[@key='LVFS::VersionFormat']", 0, NULL);
|
|
if (verfmts == NULL)
|
|
return;
|
|
_g_ptr_array_reverse (verfmts);
|
|
for (guint i = 0; i < verfmts->len; i++) {
|
|
XbNode *value = g_ptr_array_index (verfmts, i);
|
|
verfmt = fwupd_version_format_from_string (xb_node_get_text (value));
|
|
if (verfmt != FWUPD_VERSION_FORMAT_UNKNOWN)
|
|
break;
|
|
}
|
|
|
|
/* found and different to existing */
|
|
if (verfmt != FWUPD_VERSION_FORMAT_UNKNOWN &&
|
|
fu_device_get_version_format (device) != verfmt) {
|
|
fu_device_set_version_format (device, verfmt);
|
|
if (fu_device_get_version_raw (device) != 0x0) {
|
|
g_autofree gchar *version = NULL;
|
|
version = fu_common_version_from_uint32 (fu_device_get_version_raw (device), verfmt);
|
|
fu_device_set_version (device, version);
|
|
}
|
|
if (fu_device_get_version_lowest_raw (device) != 0x0) {
|
|
g_autofree gchar *version = NULL;
|
|
version = fu_common_version_from_uint32 (fu_device_get_version_lowest_raw (device), verfmt);
|
|
fu_device_set_version_lowest (device, version);
|
|
}
|
|
if (fu_device_get_version_bootloader_raw (device) != 0x0) {
|
|
g_autofree gchar *version = NULL;
|
|
version = fu_common_version_from_uint32 (fu_device_get_version_bootloader_raw (device), verfmt);
|
|
fu_device_set_version_bootloader (device, version);
|
|
}
|
|
}
|
|
|
|
/* do not try to do this again */
|
|
fu_device_remove_internal_flag (device, FU_DEVICE_INTERNAL_FLAG_MD_SET_VERFMT);
|
|
}
|
|
|
|
void
|
|
fu_engine_md_refresh_device_from_component (FuEngine *self, FuDevice *device, XbNode *component)
|
|
{
|
|
/* set the name */
|
|
if (fu_device_has_internal_flag (device, FU_DEVICE_INTERNAL_FLAG_MD_SET_NAME))
|
|
fu_engine_md_refresh_device_name (self, device, component);
|
|
if (fu_device_has_internal_flag (device, FU_DEVICE_INTERNAL_FLAG_MD_SET_NAME_CATEGORY))
|
|
fu_engine_md_refresh_device_name_category (self, device, component);
|
|
if (fu_device_has_internal_flag (device, FU_DEVICE_INTERNAL_FLAG_MD_SET_ICON))
|
|
fu_engine_md_refresh_device_icon (self, device, component);
|
|
|
|
/* fix the version */
|
|
if (fu_device_has_internal_flag (device, FU_DEVICE_INTERNAL_FLAG_MD_SET_VERFMT))
|
|
fu_engine_md_refresh_device_verfmt (self, device, component);
|
|
}
|
|
|
|
static void
|
|
fu_engine_md_refresh_devices (FuEngine *self)
|
|
{
|
|
g_autoptr(GPtrArray) devices = fu_device_list_get_all (self->device_list);
|
|
for (guint i = 0; i < devices->len; i++) {
|
|
FuDevice *device = g_ptr_array_index (devices, i);
|
|
g_autoptr(XbNode) component = fu_engine_get_component_by_guids (self, device);
|
|
|
|
/* set or clear the SUPPORTED flag */
|
|
fu_engine_ensure_device_supported (self, device);
|
|
|
|
/* fixup the name and format as needed */
|
|
fu_engine_md_refresh_device_from_component (self, device, component);
|
|
}
|
|
}
|
|
|
|
static gboolean
|
|
fu_engine_load_metadata_store (FuEngine *self, FuEngineLoadFlags flags, GError **error)
|
|
{
|
|
GPtrArray *remotes;
|
|
XbBuilderCompileFlags compile_flags = XB_BUILDER_COMPILE_FLAG_IGNORE_INVALID;
|
|
g_autofree gchar *cachedirpkg = NULL;
|
|
g_autofree gchar *xmlbfn = NULL;
|
|
g_autoptr(GFile) xmlb = NULL;
|
|
g_autoptr(GPtrArray) components = NULL;
|
|
g_autoptr(XbBuilder) builder = xb_builder_new ();
|
|
|
|
/* clear existing silo */
|
|
g_clear_object (&self->silo);
|
|
|
|
/* verbose profiling */
|
|
if (g_getenv ("FWUPD_XMLB_VERBOSE") != NULL) {
|
|
xb_builder_set_profile_flags (builder,
|
|
XB_SILO_PROFILE_FLAG_XPATH |
|
|
XB_SILO_PROFILE_FLAG_DEBUG);
|
|
}
|
|
|
|
/* load each enabled metadata file */
|
|
remotes = fu_remote_list_get_all (self->remote_list);
|
|
for (guint i = 0; i < remotes->len; i++) {
|
|
const gchar *path = NULL;
|
|
g_autoptr(GError) error_local = NULL;
|
|
g_autoptr(GFile) file = NULL;
|
|
g_autoptr(XbBuilderFixup) fixup = NULL;
|
|
g_autoptr(XbBuilderNode) custom = NULL;
|
|
g_autoptr(XbBuilderSource) source = xb_builder_source_new ();
|
|
|
|
FwupdRemote *remote = g_ptr_array_index (remotes, i);
|
|
if (!fwupd_remote_get_enabled (remote))
|
|
continue;
|
|
path = fwupd_remote_get_filename_cache (remote);
|
|
if (!g_file_test (path, G_FILE_TEST_EXISTS))
|
|
continue;
|
|
|
|
/* generate all metadata on demand */
|
|
if (fwupd_remote_get_kind (remote) == FWUPD_REMOTE_KIND_DIRECTORY) {
|
|
g_debug ("building metadata for remote '%s'",
|
|
fwupd_remote_get_id (remote));
|
|
if (!fu_engine_create_metadata (self, builder, remote, &error_local)) {
|
|
g_warning ("failed to generate remote %s: %s",
|
|
fwupd_remote_get_id (remote),
|
|
error_local->message);
|
|
}
|
|
continue;
|
|
}
|
|
|
|
/* save the remote-id in the custom metadata space */
|
|
file = g_file_new_for_path (path);
|
|
if (!xb_builder_source_load_file (source, file,
|
|
XB_BUILDER_SOURCE_FLAG_NONE,
|
|
NULL, &error_local)) {
|
|
g_warning ("failed to load remote %s: %s",
|
|
fwupd_remote_get_id (remote),
|
|
error_local->message);
|
|
continue;
|
|
}
|
|
|
|
/* fix up any legacy installed files */
|
|
fixup = xb_builder_fixup_new ("AppStreamUpgrade",
|
|
fu_engine_appstream_upgrade_cb,
|
|
self, NULL);
|
|
xb_builder_fixup_set_max_depth (fixup, 3);
|
|
xb_builder_source_add_fixup (source, fixup);
|
|
|
|
/* add metadata */
|
|
custom = xb_builder_node_new ("custom");
|
|
xb_builder_node_insert_text (custom,
|
|
"value", path,
|
|
"key", "fwupd::FilenameCache",
|
|
NULL);
|
|
xb_builder_node_insert_text (custom,
|
|
"value", fwupd_remote_get_id (remote),
|
|
"key", "fwupd::RemoteId",
|
|
NULL);
|
|
xb_builder_source_set_info (source, custom);
|
|
|
|
/* we need to watch for changes? */
|
|
xb_builder_import_source (builder, source);
|
|
}
|
|
|
|
/* on a read-only filesystem don't care about the cache GUID */
|
|
if (flags & FU_ENGINE_LOAD_FLAG_READONLY)
|
|
compile_flags |= XB_BUILDER_COMPILE_FLAG_IGNORE_GUID;
|
|
|
|
/* ensure silo is up to date */
|
|
cachedirpkg = fu_common_get_path (FU_PATH_KIND_CACHEDIR_PKG);
|
|
xmlbfn = g_build_filename (cachedirpkg, "metadata.xmlb", NULL);
|
|
xmlb = g_file_new_for_path (xmlbfn);
|
|
self->silo = xb_builder_ensure (builder, xmlb, compile_flags, NULL, error);
|
|
if (self->silo == NULL)
|
|
return FALSE;
|
|
|
|
/* print what we've got */
|
|
components = xb_silo_query (self->silo,
|
|
"components/component[@type='firmware']",
|
|
0, NULL);
|
|
if (components != NULL)
|
|
g_debug ("%u components now in silo", components->len);
|
|
|
|
/* build the index */
|
|
if (!xb_silo_query_build_index (self->silo,
|
|
"components/component",
|
|
"type", error))
|
|
return FALSE;
|
|
if (!xb_silo_query_build_index (self->silo,
|
|
"components/component[@type='firmware']/provides/firmware",
|
|
"type", error))
|
|
return FALSE;
|
|
if (!xb_silo_query_build_index (self->silo,
|
|
"components/component[@type='firmware']/provides/firmware",
|
|
NULL, error))
|
|
return FALSE;
|
|
|
|
/* success */
|
|
return TRUE;
|
|
}
|
|
|
|
static void
|
|
fu_engine_config_changed_cb (FuConfig *config, FuEngine *self)
|
|
{
|
|
fu_idle_set_timeout (self->idle, fu_config_get_idle_timeout (config));
|
|
}
|
|
|
|
static void
|
|
fu_engine_remote_list_changed_cb (FuRemoteList *remote_list, FuEngine *self)
|
|
{
|
|
g_autoptr(GError) error_local = NULL;
|
|
if (!fu_engine_load_metadata_store (self, FU_ENGINE_LOAD_FLAG_NONE,
|
|
&error_local))
|
|
g_warning ("Failed to reload metadata store: %s",
|
|
error_local->message);
|
|
|
|
/* set device properties from the metadata */
|
|
fu_engine_md_refresh_devices (self);
|
|
|
|
/* invalidate host security attributes */
|
|
g_clear_pointer (&self->host_security_id, g_free);
|
|
|
|
/* make the UI update */
|
|
fu_engine_emit_changed (self);
|
|
}
|
|
|
|
static gint
|
|
fu_engine_sort_jcat_results_timestamp_cb (gconstpointer a, gconstpointer b)
|
|
{
|
|
JcatResult *ra = *((JcatResult **) a);
|
|
JcatResult *rb = *((JcatResult **) b);
|
|
if (jcat_result_get_timestamp (ra) < jcat_result_get_timestamp (rb))
|
|
return 1;
|
|
if (jcat_result_get_timestamp (ra) > jcat_result_get_timestamp (rb))
|
|
return -1;
|
|
return 0;
|
|
}
|
|
|
|
static JcatResult *
|
|
fu_engine_get_newest_signature_jcat_result (GPtrArray *results, GError **error)
|
|
{
|
|
/* sort by timestamp, newest first */
|
|
g_ptr_array_sort (results, fu_engine_sort_jcat_results_timestamp_cb);
|
|
|
|
/* get the first signature, ignoring the checksums */
|
|
for (guint i = 0; i < results->len; i++) {
|
|
JcatResult *result = g_ptr_array_index (results, i);
|
|
#if LIBJCAT_CHECK_VERSION(0, 1, 3)
|
|
if (jcat_result_get_method (result) == JCAT_BLOB_METHOD_SIGNATURE)
|
|
return g_object_ref (result);
|
|
#else
|
|
guint verify_kind = 0;
|
|
g_autoptr(JcatEngine) engine = NULL;
|
|
g_object_get (result, "engine", &engine, NULL);
|
|
g_object_get (engine, "verify-kind", &verify_kind, NULL);
|
|
if (verify_kind == 2) /* SIGNATURE */
|
|
return g_object_ref (result);
|
|
#endif
|
|
}
|
|
|
|
/* should never happen due to %JCAT_VERIFY_FLAG_REQUIRE_SIGNATURE */
|
|
g_set_error_literal (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_INVALID_FILE,
|
|
"no signature method in results");
|
|
return NULL;
|
|
}
|
|
|
|
static JcatResult *
|
|
fu_engine_get_system_jcat_result (FuEngine *self, FwupdRemote *remote, GError **error)
|
|
{
|
|
g_autoptr(GBytes) blob = NULL;
|
|
g_autoptr(GBytes) blob_sig = NULL;
|
|
g_autoptr(GInputStream) istream = NULL;
|
|
g_autoptr(GPtrArray) results = NULL;
|
|
g_autoptr(JcatItem) jcat_item = NULL;
|
|
g_autoptr(JcatFile) jcat_file = jcat_file_new ();
|
|
|
|
blob = fu_common_get_contents_bytes (fwupd_remote_get_filename_cache (remote), error);
|
|
if (blob == NULL)
|
|
return NULL;
|
|
blob_sig = fu_common_get_contents_bytes (fwupd_remote_get_filename_cache_sig (remote), error);
|
|
if (blob_sig == NULL)
|
|
return NULL;
|
|
istream = g_memory_input_stream_new_from_bytes (blob_sig);
|
|
if (!jcat_file_import_stream (jcat_file, istream,
|
|
JCAT_IMPORT_FLAG_NONE,
|
|
NULL, error))
|
|
return NULL;
|
|
jcat_item = jcat_file_get_item_default (jcat_file, error);
|
|
if (jcat_item == NULL)
|
|
return NULL;
|
|
results = jcat_context_verify_item (self->jcat_context,
|
|
blob, jcat_item,
|
|
JCAT_VERIFY_FLAG_REQUIRE_CHECKSUM |
|
|
JCAT_VERIFY_FLAG_REQUIRE_SIGNATURE,
|
|
error);
|
|
if (results == NULL)
|
|
return NULL;
|
|
|
|
/* return the newest signature */
|
|
return fu_engine_get_newest_signature_jcat_result (results, error);
|
|
}
|
|
|
|
static gboolean
|
|
fu_engine_validate_result_timestamp (JcatResult *jcat_result,
|
|
JcatResult *jcat_result_old,
|
|
GError **error)
|
|
{
|
|
gint64 delta = 0;
|
|
|
|
g_return_val_if_fail (JCAT_IS_RESULT (jcat_result), FALSE);
|
|
g_return_val_if_fail (JCAT_IS_RESULT (jcat_result_old), FALSE);
|
|
|
|
if (jcat_result_get_timestamp (jcat_result) == 0) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_INVALID_FILE,
|
|
"no signing timestamp");
|
|
return FALSE;
|
|
}
|
|
if (jcat_result_get_timestamp (jcat_result_old) > 0) {
|
|
delta = jcat_result_get_timestamp (jcat_result) -
|
|
jcat_result_get_timestamp (jcat_result_old);
|
|
}
|
|
if (delta < 0) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_INVALID_FILE,
|
|
"new signing timestamp was %"
|
|
G_GINT64_FORMAT " seconds older",
|
|
-delta);
|
|
return FALSE;
|
|
}
|
|
if (delta > 0)
|
|
g_debug ("timestamp increased, so no rollback");
|
|
return TRUE;
|
|
}
|
|
|
|
/**
|
|
* fu_engine_update_metadata_bytes:
|
|
* @self: A #FuEngine
|
|
* @remote_id: A remote ID, e.g. `lvfs`
|
|
* @bytes_raw: Blob of metadata
|
|
* @bytes_sig: Blob of metadata signature, typically Jcat binary format
|
|
* @error: A #GError, or %NULL
|
|
*
|
|
* Updates the metadata for a specific remote.
|
|
*
|
|
* Returns: %TRUE for success
|
|
**/
|
|
gboolean
|
|
fu_engine_update_metadata_bytes (FuEngine *self, const gchar *remote_id,
|
|
GBytes *bytes_raw, GBytes *bytes_sig, GError **error)
|
|
{
|
|
FwupdKeyringKind keyring_kind;
|
|
FwupdRemote *remote;
|
|
JcatVerifyFlags jcat_flags = JCAT_VERIFY_FLAG_REQUIRE_SIGNATURE;
|
|
g_autoptr(JcatFile) jcat_file = jcat_file_new ();
|
|
|
|
g_return_val_if_fail (FU_IS_ENGINE (self), FALSE);
|
|
g_return_val_if_fail (remote_id != NULL, FALSE);
|
|
g_return_val_if_fail (bytes_raw != NULL, FALSE);
|
|
g_return_val_if_fail (bytes_sig != NULL, FALSE);
|
|
g_return_val_if_fail (error == NULL || *error == NULL, FALSE);
|
|
|
|
/* check remote is valid */
|
|
remote = fu_remote_list_get_by_id (self->remote_list, remote_id);
|
|
if (remote == NULL) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOT_FOUND,
|
|
"remote %s not found", remote_id);
|
|
return FALSE;
|
|
}
|
|
if (!fwupd_remote_get_enabled (remote)) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOT_SUPPORTED,
|
|
"remote %s not enabled", remote_id);
|
|
return FALSE;
|
|
}
|
|
|
|
/* verify JCatFile, or create a dummy one from legacy data */
|
|
keyring_kind = fwupd_remote_get_keyring_kind (remote);
|
|
if (keyring_kind == FWUPD_KEYRING_KIND_JCAT) {
|
|
g_autoptr(GInputStream) istream = NULL;
|
|
istream = g_memory_input_stream_new_from_bytes (bytes_sig);
|
|
if (!jcat_file_import_stream (jcat_file, istream,
|
|
JCAT_IMPORT_FLAG_NONE,
|
|
NULL, error))
|
|
return FALSE;
|
|
jcat_flags |= JCAT_VERIFY_FLAG_REQUIRE_CHECKSUM;
|
|
} else if (keyring_kind == FWUPD_KEYRING_KIND_GPG) {
|
|
g_autoptr(JcatBlob) jcab_blob = NULL;
|
|
g_autoptr(JcatItem) jcat_item = jcat_item_new ("");
|
|
jcab_blob = jcat_blob_new (JCAT_BLOB_KIND_GPG, bytes_sig);
|
|
jcat_item_add_blob (jcat_item, jcab_blob);
|
|
jcat_file_add_item (jcat_file, jcat_item);
|
|
} else if (keyring_kind == FWUPD_KEYRING_KIND_PKCS7) {
|
|
g_autoptr(JcatBlob) jcab_blob = NULL;
|
|
g_autoptr(JcatItem) jcat_item = jcat_item_new ("");
|
|
jcab_blob = jcat_blob_new (JCAT_BLOB_KIND_PKCS7, bytes_sig);
|
|
jcat_item_add_blob (jcat_item, jcab_blob);
|
|
jcat_file_add_item (jcat_file, jcat_item);
|
|
}
|
|
|
|
/* verify file */
|
|
if (keyring_kind != FWUPD_KEYRING_KIND_NONE) {
|
|
g_autoptr(GError) error_local = NULL;
|
|
g_autoptr(GPtrArray) results = NULL;
|
|
g_autoptr(JcatItem) jcat_item = NULL;
|
|
g_autoptr(JcatResult) jcat_result = NULL;
|
|
g_autoptr(JcatResult) jcat_result_old = NULL;
|
|
|
|
/* this should only be signing one thing */
|
|
jcat_item = jcat_file_get_item_default (jcat_file, error);
|
|
if (jcat_item == NULL)
|
|
return FALSE;
|
|
results = jcat_context_verify_item (self->jcat_context,
|
|
bytes_raw, jcat_item,
|
|
jcat_flags, error);
|
|
if (results == NULL)
|
|
return FALSE;
|
|
|
|
/* return the newest signature */
|
|
jcat_result = fu_engine_get_newest_signature_jcat_result (results, error);
|
|
if (jcat_result == NULL)
|
|
return FALSE;
|
|
|
|
/* verify the metadata was signed later than the existing
|
|
* metadata for this remote to mitigate a rollback attack */
|
|
jcat_result_old = fu_engine_get_system_jcat_result (self, remote, &error_local);
|
|
if (jcat_result_old == NULL) {
|
|
if (g_error_matches (error_local,
|
|
G_FILE_ERROR,
|
|
G_FILE_ERROR_NOENT)) {
|
|
g_debug ("no existing valid keyrings: %s",
|
|
error_local->message);
|
|
} else {
|
|
g_warning ("could not get existing keyring result: %s",
|
|
error_local->message);
|
|
}
|
|
} else {
|
|
if (!fu_engine_validate_result_timestamp (jcat_result,
|
|
jcat_result_old,
|
|
error))
|
|
return FALSE;
|
|
}
|
|
}
|
|
|
|
/* save XML and signature to remotes.d */
|
|
if (!fu_common_set_contents_bytes (fwupd_remote_get_filename_cache (remote),
|
|
bytes_raw, error))
|
|
return FALSE;
|
|
if (keyring_kind != FWUPD_KEYRING_KIND_NONE) {
|
|
if (!fu_common_set_contents_bytes (fwupd_remote_get_filename_cache_sig (remote),
|
|
bytes_sig, error))
|
|
return FALSE;
|
|
}
|
|
if (!fu_engine_load_metadata_store (self, FU_ENGINE_LOAD_FLAG_NONE, error))
|
|
return FALSE;
|
|
|
|
/* refresh SUPPORTED flag on devices */
|
|
fu_engine_md_refresh_devices (self);
|
|
|
|
/* invalidate host security attributes */
|
|
g_clear_pointer (&self->host_security_id, g_free);
|
|
|
|
/* make the UI update */
|
|
fu_engine_emit_changed (self);
|
|
return TRUE;
|
|
}
|
|
|
|
/**
|
|
* fu_engine_update_metadata:
|
|
* @self: A #FuEngine
|
|
* @remote_id: A remote ID, e.g. `lvfs`
|
|
* @fd: file descriptor of the metadata
|
|
* @fd_sig: file descriptor of the metadata signature
|
|
* @error: A #GError, or %NULL
|
|
*
|
|
* Updates the metadata for a specific remote.
|
|
*
|
|
* Note: this will close the fds when done
|
|
*
|
|
* Returns: %TRUE for success
|
|
**/
|
|
gboolean
|
|
fu_engine_update_metadata (FuEngine *self, const gchar *remote_id,
|
|
gint fd, gint fd_sig, GError **error)
|
|
{
|
|
#ifdef HAVE_GIO_UNIX
|
|
g_autoptr(GBytes) bytes_raw = NULL;
|
|
g_autoptr(GBytes) bytes_sig = NULL;
|
|
g_autoptr(GInputStream) stream_fd = NULL;
|
|
g_autoptr(GInputStream) stream_sig = NULL;
|
|
|
|
g_return_val_if_fail (FU_IS_ENGINE (self), FALSE);
|
|
g_return_val_if_fail (remote_id != NULL, FALSE);
|
|
g_return_val_if_fail (fd > 0, FALSE);
|
|
g_return_val_if_fail (fd_sig > 0, FALSE);
|
|
g_return_val_if_fail (error == NULL || *error == NULL, FALSE);
|
|
|
|
/* ensures the fd's are closed on error */
|
|
stream_fd = g_unix_input_stream_new (fd, TRUE);
|
|
stream_sig = g_unix_input_stream_new (fd_sig, TRUE);
|
|
|
|
/* read the entire file into memory */
|
|
bytes_raw = g_input_stream_read_bytes (stream_fd, 0x100000, NULL, error);
|
|
if (bytes_raw == NULL)
|
|
return FALSE;
|
|
|
|
/* read signature */
|
|
bytes_sig = g_input_stream_read_bytes (stream_sig, 0x100000, NULL, error);
|
|
if (bytes_sig == NULL)
|
|
return FALSE;
|
|
|
|
/* update with blobs */
|
|
return fu_engine_update_metadata_bytes (self, remote_id,
|
|
bytes_raw, bytes_sig,
|
|
error);
|
|
#else
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOT_SUPPORTED,
|
|
"Not supported as <glib-unix.h> is unavailable");
|
|
return FALSE;
|
|
#endif
|
|
}
|
|
|
|
/**
|
|
* fu_engine_get_silo_from_blob:
|
|
* @self: A #FuEngine
|
|
* @blob_cab: A #GBytes
|
|
* @error: A #GError, or %NULL
|
|
*
|
|
* Creates a silo from a .cab file blob.
|
|
*
|
|
* Returns: (transfer container): a #XbSilo, or %NULL
|
|
**/
|
|
XbSilo *
|
|
fu_engine_get_silo_from_blob (FuEngine *self, GBytes *blob_cab, GError **error)
|
|
{
|
|
g_autoptr(FuCabinet) cabinet = fu_cabinet_new ();
|
|
g_autoptr(XbSilo) silo = NULL;
|
|
|
|
g_return_val_if_fail (FU_IS_ENGINE (self), NULL);
|
|
g_return_val_if_fail (blob_cab != NULL, NULL);
|
|
g_return_val_if_fail (error == NULL || *error == NULL, NULL);
|
|
|
|
/* load file */
|
|
fu_engine_set_status (self, FWUPD_STATUS_DECOMPRESSING);
|
|
fu_cabinet_set_size_max (cabinet, fu_engine_get_archive_size_max (self));
|
|
fu_cabinet_set_jcat_context (cabinet, self->jcat_context);
|
|
if (!fu_cabinet_parse (cabinet, blob_cab, FU_CABINET_PARSE_FLAG_NONE, error))
|
|
return NULL;
|
|
silo = fu_cabinet_get_silo (cabinet);
|
|
fu_engine_set_status (self, FWUPD_STATUS_IDLE);
|
|
return g_steal_pointer (&silo);
|
|
}
|
|
|
|
static FuDevice *
|
|
fu_engine_get_result_from_component (FuEngine *self,
|
|
FuEngineRequest *request,
|
|
XbNode *component,
|
|
GError **error)
|
|
{
|
|
FwupdReleaseFlags release_flags = FWUPD_RELEASE_FLAG_NONE;
|
|
g_autoptr(FuInstallTask) task = NULL;
|
|
g_autoptr(FuDevice) dev = NULL;
|
|
g_autoptr(FwupdRelease) rel = NULL;
|
|
g_autoptr(GError) error_local = NULL;
|
|
g_autoptr(GPtrArray) provides = NULL;
|
|
g_autoptr(XbNode) description = NULL;
|
|
g_autoptr(XbNode) release = NULL;
|
|
#if LIBXMLB_CHECK_VERSION(0,2,0)
|
|
g_autoptr(XbQuery) query = NULL;
|
|
#endif
|
|
|
|
dev = fu_device_new ();
|
|
provides = xb_node_query (component,
|
|
"provides/firmware[@type=$'flashed']",
|
|
0, &error_local);
|
|
if (provides == NULL) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_INTERNAL,
|
|
"failed to get release: %s",
|
|
error_local->message);
|
|
return NULL;
|
|
}
|
|
for (guint i = 0; i < provides->len; i++) {
|
|
XbNode *prov = XB_NODE (g_ptr_array_index (provides, i));
|
|
const gchar *guid;
|
|
g_autoptr(FuDevice) device = NULL;
|
|
|
|
/* is a online or offline update appropriate */
|
|
guid = xb_node_get_text (prov);
|
|
if (guid == NULL)
|
|
continue;
|
|
device = fu_device_list_get_by_guid (self->device_list, guid, NULL);
|
|
if (device != NULL) {
|
|
fu_device_set_name (dev, fu_device_get_name (device));
|
|
fu_device_set_flags (dev, fu_device_get_flags (device));
|
|
fu_device_set_id (dev, fu_device_get_id (device));
|
|
fu_device_set_version_raw (dev, fu_device_get_version_raw (device));
|
|
fu_device_set_version_format (dev, fu_device_get_version_format (device));
|
|
fu_device_set_version (dev, fu_device_get_version (device));
|
|
}
|
|
|
|
/* add GUID */
|
|
fu_device_add_guid (dev, guid);
|
|
}
|
|
if (fu_device_get_guids(dev)->len == 0) {
|
|
g_set_error_literal (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_INTERNAL,
|
|
"component has no GUIDs");
|
|
return NULL;
|
|
}
|
|
|
|
/* check we can install it */
|
|
task = fu_install_task_new (NULL, component);
|
|
if (!fu_engine_check_requirements (self, request, task,
|
|
FWUPD_INSTALL_FLAG_IGNORE_VID_PID,
|
|
error))
|
|
return NULL;
|
|
|
|
/* verify trust */
|
|
#if LIBXMLB_CHECK_VERSION(0,2,0)
|
|
query = xb_query_new_full (xb_node_get_silo (component),
|
|
"releases/release",
|
|
XB_QUERY_FLAG_FORCE_NODE_CACHE,
|
|
error);
|
|
if (query == NULL)
|
|
return NULL;
|
|
release = xb_node_query_first_full (component, query, &error_local);
|
|
#else
|
|
release = xb_node_query_first (component,
|
|
"releases/release",
|
|
&error_local);
|
|
#endif
|
|
if (release == NULL) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_INTERNAL,
|
|
"failed to get release: %s",
|
|
error_local->message);
|
|
return NULL;
|
|
}
|
|
if (!fu_keyring_get_release_flags (release,
|
|
&release_flags,
|
|
&error_local)) {
|
|
if (g_error_matches (error_local,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOT_SUPPORTED)) {
|
|
g_warning ("Ignoring verification: %s",
|
|
error_local->message);
|
|
} else {
|
|
g_propagate_error (error, g_steal_pointer (&error_local));
|
|
return NULL;
|
|
}
|
|
}
|
|
|
|
/* create a result with all the metadata in */
|
|
description = xb_node_query_first (component, "description", NULL);
|
|
if (description != NULL) {
|
|
g_autofree gchar *xml = NULL;
|
|
xml = xb_node_export (description,
|
|
XB_NODE_EXPORT_FLAG_ONLY_CHILDREN,
|
|
NULL);
|
|
if (xml != NULL)
|
|
fu_device_set_description (dev, xml);
|
|
}
|
|
rel = fwupd_release_new ();
|
|
fwupd_release_set_flags (rel, release_flags);
|
|
if (!fu_engine_set_release_from_appstream (self, dev, rel, component, release, error))
|
|
return NULL;
|
|
fu_device_add_release (dev, rel);
|
|
return g_steal_pointer (&dev);
|
|
}
|
|
|
|
static gint
|
|
fu_engine_get_details_sort_cb (gconstpointer a, gconstpointer b)
|
|
{
|
|
FuDevice *device1 = *((FuDevice **) a);
|
|
FuDevice *device2 = *((FuDevice **) b);
|
|
if (!fu_device_has_flag (device1, FWUPD_DEVICE_FLAG_UPDATABLE) &&
|
|
fu_device_has_flag (device2, FWUPD_DEVICE_FLAG_UPDATABLE))
|
|
return 1;
|
|
if (fu_device_has_flag (device1, FWUPD_DEVICE_FLAG_UPDATABLE) &&
|
|
!fu_device_has_flag (device2, FWUPD_DEVICE_FLAG_UPDATABLE))
|
|
return -1;
|
|
return 0;
|
|
}
|
|
|
|
/**
|
|
* fu_engine_get_details:
|
|
* @self: A #FuEngine
|
|
* @request: A #FuEngineRequest
|
|
* @fd: A file descriptor
|
|
* @error: A #GError, or %NULL
|
|
*
|
|
* Gets the details about a local file.
|
|
*
|
|
* Note: this will close the fd when done
|
|
*
|
|
* Returns: (transfer container) (element-type FuDevice): results
|
|
**/
|
|
GPtrArray *
|
|
fu_engine_get_details (FuEngine *self, FuEngineRequest *request, gint fd, GError **error)
|
|
{
|
|
const gchar *remote_id;
|
|
g_autofree gchar *csum = NULL;
|
|
g_autoptr(GBytes) blob = NULL;
|
|
g_autoptr(GError) error_local = NULL;
|
|
g_autoptr(GPtrArray) components = NULL;
|
|
g_autoptr(GPtrArray) details = NULL;
|
|
g_autoptr(XbSilo) silo = NULL;
|
|
|
|
g_return_val_if_fail (FU_IS_ENGINE (self), NULL);
|
|
g_return_val_if_fail (fd > 0, NULL);
|
|
g_return_val_if_fail (error == NULL || *error == NULL, NULL);
|
|
|
|
/* get all components */
|
|
blob = fu_common_get_contents_fd (fd,
|
|
fu_engine_get_archive_size_max (self),
|
|
error);
|
|
if (blob == NULL)
|
|
return NULL;
|
|
silo = fu_engine_get_silo_from_blob (self, blob, error);
|
|
if (silo == NULL)
|
|
return NULL;
|
|
components = xb_silo_query (silo,
|
|
"components/component[@type='firmware']",
|
|
0, &error_local);
|
|
if (components == NULL) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_INVALID_FILE,
|
|
"no components: %s",
|
|
error_local->message);
|
|
return NULL;
|
|
}
|
|
|
|
/* build the index */
|
|
if (!xb_silo_query_build_index (silo, "components/component[@type='firmware']/provides/firmware",
|
|
"type", error))
|
|
return NULL;
|
|
if (!xb_silo_query_build_index (silo, "components/component[@type='firmware']/provides/firmware",
|
|
NULL, error))
|
|
return NULL;
|
|
|
|
/* does this exist in any enabled remote */
|
|
csum = g_compute_checksum_for_bytes (G_CHECKSUM_SHA1, blob);
|
|
remote_id = fu_engine_get_remote_id_for_checksum (self, csum);
|
|
|
|
/* create results with all the metadata in */
|
|
details = g_ptr_array_new_with_free_func ((GDestroyNotify) g_object_unref);
|
|
for (guint i = 0; i < components->len; i++) {
|
|
XbNode *component = g_ptr_array_index (components, i);
|
|
FuDevice *dev;
|
|
dev = fu_engine_get_result_from_component (self, request, component, error);
|
|
if (dev == NULL)
|
|
return NULL;
|
|
if (remote_id != NULL) {
|
|
FwupdRelease *rel = fu_device_get_release_default (dev);
|
|
fwupd_release_set_remote_id (rel, remote_id);
|
|
fu_device_add_flag (dev, FWUPD_DEVICE_FLAG_SUPPORTED);
|
|
}
|
|
if (fu_device_has_internal_flag (dev, FU_DEVICE_INTERNAL_FLAG_MD_SET_VERFMT))
|
|
fu_engine_md_refresh_device_verfmt (self, dev, component);
|
|
|
|
/* if this matched a device on the system, ensure all the
|
|
* requirements passed before setting UPDATABLE */
|
|
if (fu_device_has_flag (dev, FWUPD_DEVICE_FLAG_UPDATABLE)) {
|
|
g_autoptr(FuInstallTask) task = fu_install_task_new (dev, component);
|
|
g_autoptr(GError) error_req = NULL;
|
|
if (!fu_engine_check_requirements (self, request, task,
|
|
FWUPD_INSTALL_FLAG_OFFLINE |
|
|
FWUPD_INSTALL_FLAG_IGNORE_VID_PID |
|
|
FWUPD_INSTALL_FLAG_ALLOW_REINSTALL |
|
|
FWUPD_INSTALL_FLAG_ALLOW_BRANCH_SWITCH |
|
|
FWUPD_INSTALL_FLAG_ALLOW_OLDER,
|
|
&error_req)) {
|
|
g_debug ("%s failed requirement checks: %s",
|
|
fu_device_get_id (dev),
|
|
error_req->message);
|
|
fu_device_remove_flag (dev, FWUPD_DEVICE_FLAG_UPDATABLE);
|
|
} else {
|
|
g_debug ("%s passed requirement checks",
|
|
fu_device_get_id (dev));
|
|
}
|
|
}
|
|
|
|
g_ptr_array_add (details, dev);
|
|
}
|
|
|
|
/* order multiple devices so that the one that passes the requirement
|
|
* is listed first */
|
|
g_ptr_array_sort (details, fu_engine_get_details_sort_cb);
|
|
|
|
return g_steal_pointer (&details);
|
|
}
|
|
|
|
static gint
|
|
fu_engine_sort_devices_by_priority_name (gconstpointer a, gconstpointer b)
|
|
{
|
|
FuDevice *dev_a = *((FuDevice **) a);
|
|
FuDevice *dev_b = *((FuDevice **) b);
|
|
gint prio_a = fu_device_get_priority (dev_a);
|
|
gint prio_b = fu_device_get_priority (dev_b);
|
|
const gchar *name_a = fu_device_get_name (dev_a);
|
|
const gchar *name_b = fu_device_get_name (dev_b);
|
|
|
|
if (prio_a > prio_b)
|
|
return -1;
|
|
if (prio_a < prio_b)
|
|
return 1;
|
|
if (g_strcmp0 (name_a, name_b) > 0)
|
|
return 1;
|
|
if (g_strcmp0 (name_a, name_b) < 0)
|
|
return -1;
|
|
return 0;
|
|
}
|
|
|
|
/**
|
|
* fu_engine_get_devices:
|
|
* @self: A #FuEngine
|
|
* @error: A #GError, or %NULL
|
|
*
|
|
* Gets the list of devices.
|
|
*
|
|
* Returns: (transfer container) (element-type FwupdDevice): results
|
|
**/
|
|
GPtrArray *
|
|
fu_engine_get_devices (FuEngine *self, GError **error)
|
|
{
|
|
g_autoptr(GPtrArray) devices = NULL;
|
|
|
|
g_return_val_if_fail (FU_IS_ENGINE (self), NULL);
|
|
g_return_val_if_fail (error == NULL || *error == NULL, NULL);
|
|
|
|
devices = fu_device_list_get_active (self->device_list);
|
|
if (devices->len == 0) {
|
|
g_set_error_literal (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOTHING_TO_DO,
|
|
"No detected devices");
|
|
return NULL;
|
|
}
|
|
g_ptr_array_sort (devices, fu_engine_sort_devices_by_priority_name);
|
|
return g_steal_pointer (&devices);
|
|
}
|
|
|
|
/**
|
|
* fu_engine_get_devices_by_guid:
|
|
* @self: A #FuEngine
|
|
* @guid: A GUID
|
|
* @error: A #GError, or %NULL
|
|
*
|
|
* Gets a specific device.
|
|
*
|
|
* Returns: (transfer full): a device, or %NULL if not found
|
|
**/
|
|
GPtrArray *
|
|
fu_engine_get_devices_by_guid (FuEngine *self, const gchar *guid, GError **error)
|
|
{
|
|
g_autoptr(GPtrArray) devices = NULL;
|
|
g_autoptr(GPtrArray) devices_tmp = NULL;
|
|
|
|
/* find the devices by GUID */
|
|
devices_tmp = fu_device_list_get_all (self->device_list);
|
|
devices = g_ptr_array_new_with_free_func ((GDestroyNotify) g_object_unref);
|
|
for (guint i = 0; i < devices_tmp->len; i++) {
|
|
FuDevice *dev_tmp = g_ptr_array_index (devices_tmp, i);
|
|
if (fu_device_has_guid (dev_tmp, guid))
|
|
g_ptr_array_add (devices, g_object_ref (dev_tmp));
|
|
}
|
|
|
|
/* nothing */
|
|
if (devices->len == 0) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOT_FOUND,
|
|
"failed to find any device providing %s", guid);
|
|
return NULL;
|
|
}
|
|
|
|
/* success */
|
|
return g_steal_pointer (&devices);
|
|
}
|
|
|
|
static void
|
|
fu_engine_get_history_set_hsi_attrs (FuEngine *self, FuDevice *device)
|
|
{
|
|
g_autoptr(GPtrArray) vals = NULL;
|
|
|
|
/* ensure up to date */
|
|
fu_engine_ensure_security_attrs (self);
|
|
|
|
/* add attributes */
|
|
vals = fu_security_attrs_get_all (self->host_security_attrs);
|
|
for (guint i = 0; i < vals->len; i++) {
|
|
FwupdSecurityAttr *attr = g_ptr_array_index (vals, i);
|
|
const gchar *tmp;
|
|
tmp = fwupd_security_attr_result_to_string (fwupd_security_attr_get_result (attr));
|
|
fu_device_set_metadata (device, fwupd_security_attr_get_appstream_id (attr), tmp);
|
|
}
|
|
|
|
/* computed value */
|
|
fu_device_set_metadata (device, "HSI", self->host_security_id);
|
|
}
|
|
|
|
/**
|
|
* fu_engine_get_history:
|
|
* @self: A #FuEngine
|
|
* @error: A #GError, or %NULL
|
|
*
|
|
* Gets the list of history.
|
|
*
|
|
* Returns: (transfer container) (element-type FwupdDevice): results
|
|
**/
|
|
GPtrArray *
|
|
fu_engine_get_history (FuEngine *self, GError **error)
|
|
{
|
|
g_autoptr(GPtrArray) devices = NULL;
|
|
|
|
g_return_val_if_fail (FU_IS_ENGINE (self), NULL);
|
|
g_return_val_if_fail (error == NULL || *error == NULL, NULL);
|
|
|
|
devices = fu_history_get_devices (self->history, error);
|
|
if (devices == NULL)
|
|
return NULL;
|
|
if (devices->len == 0) {
|
|
g_set_error_literal (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOTHING_TO_DO,
|
|
"No history");
|
|
return NULL;
|
|
}
|
|
|
|
/* if this is the system firmware device, add the HSI attrs */
|
|
for (guint i = 0; i < devices->len; i++) {
|
|
FuDevice *dev = g_ptr_array_index (devices, i);
|
|
if (fu_device_has_instance_id (dev, "main-system-firmware"))
|
|
fu_engine_get_history_set_hsi_attrs (self, dev);
|
|
}
|
|
|
|
/* try to set the remote ID for each device */
|
|
for (guint i = 0; i < devices->len; i++) {
|
|
FuDevice *dev = g_ptr_array_index (devices, i);
|
|
FwupdRelease *rel;
|
|
GPtrArray *csums;
|
|
|
|
/* get the checksums */
|
|
rel = fu_device_get_release_default (dev);
|
|
if (rel == NULL)
|
|
continue;
|
|
|
|
/* find the checksum that matches */
|
|
csums = fwupd_release_get_checksums (rel);
|
|
for (guint j = 0; j < csums->len; j++) {
|
|
const gchar *csum = g_ptr_array_index (csums, j);
|
|
const gchar *remote_id = fu_engine_get_remote_id_for_checksum (self, csum);
|
|
if (remote_id != NULL) {
|
|
fu_device_add_flag (dev, FWUPD_DEVICE_FLAG_SUPPORTED);
|
|
fwupd_release_set_remote_id (rel, remote_id);
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
return g_steal_pointer (&devices);
|
|
}
|
|
|
|
#if !GLIB_CHECK_VERSION(2,62,0)
|
|
static GPtrArray *
|
|
g_ptr_array_copy (GPtrArray *array, GCopyFunc func, gpointer user_data)
|
|
{
|
|
GPtrArray *new = g_ptr_array_new_with_free_func ((GDestroyNotify) g_object_unref);
|
|
for (guint i = 0; i < array->len; i++) {
|
|
GObject *obj = g_ptr_array_index (array, i);
|
|
g_ptr_array_add (new, g_object_ref (obj));
|
|
}
|
|
return new;
|
|
}
|
|
#endif
|
|
|
|
/**
|
|
* fu_engine_get_remotes:
|
|
* @self: A #FuEngine
|
|
* @error: A #GError, or %NULL
|
|
*
|
|
* Gets the list of remotes in use by the engine.
|
|
*
|
|
* Returns: (transfer container) (element-type FwupdRemote): results
|
|
**/
|
|
GPtrArray *
|
|
fu_engine_get_remotes (FuEngine *self, GError **error)
|
|
{
|
|
GPtrArray *remotes;
|
|
|
|
g_return_val_if_fail (FU_IS_ENGINE (self), NULL);
|
|
g_return_val_if_fail (error == NULL || *error == NULL, NULL);
|
|
|
|
remotes = fu_remote_list_get_all (self->remote_list);
|
|
if (remotes->len == 0) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_INTERNAL,
|
|
"No remotes configured");
|
|
return NULL;
|
|
}
|
|
|
|
/* deep copy so the remote list can be kept up to date */
|
|
return g_ptr_array_copy (remotes, (GCopyFunc) g_object_ref, NULL);
|
|
}
|
|
|
|
/**
|
|
* fu_engine_get_remote_by_id:
|
|
* @self: A #FuEngine
|
|
* @remote_id: A string representation of a remote
|
|
* @error: A #GError, or %NULL
|
|
*
|
|
* Gets the FwupdRemote object.
|
|
*
|
|
* Returns: FwupdRemote
|
|
**/
|
|
FwupdRemote *
|
|
fu_engine_get_remote_by_id (FuEngine *self, const gchar *remote_id, GError **error)
|
|
{
|
|
g_autoptr(GPtrArray) remotes = NULL;
|
|
|
|
remotes = fu_engine_get_remotes (self, error);
|
|
if (remotes == NULL)
|
|
return NULL;
|
|
|
|
for (guint i = 0; i < remotes->len; i++) {
|
|
FwupdRemote *remote = g_ptr_array_index (remotes, i);
|
|
if (g_strcmp0 (remote_id, fwupd_remote_get_id (remote)) == 0)
|
|
return remote;
|
|
}
|
|
|
|
g_set_error (error, FWUPD_ERROR, FWUPD_ERROR_INTERNAL,
|
|
"Couldn't find remote %s", remote_id);
|
|
|
|
return NULL;
|
|
}
|
|
|
|
|
|
static gint
|
|
fu_engine_sort_releases_cb (gconstpointer a, gconstpointer b, gpointer user_data)
|
|
{
|
|
FuDevice *device = FU_DEVICE (user_data);
|
|
FwupdRelease *rel_a = FWUPD_RELEASE (*((FwupdRelease **) a));
|
|
FwupdRelease *rel_b = FWUPD_RELEASE (*((FwupdRelease **) b));
|
|
gint rc;
|
|
|
|
/* first by branch */
|
|
rc = g_strcmp0 (fwupd_release_get_branch (rel_b), fwupd_release_get_branch (rel_a));
|
|
if (rc != 0)
|
|
return rc;
|
|
|
|
/* then by version */
|
|
return fu_common_vercmp_full (fwupd_release_get_version (rel_b),
|
|
fwupd_release_get_version (rel_a),
|
|
fu_device_get_version_format (device));
|
|
}
|
|
|
|
static gboolean
|
|
fu_engine_check_release_is_approved (FuEngine *self, FwupdRelease *rel)
|
|
{
|
|
GPtrArray *csums = fwupd_release_get_checksums (rel);
|
|
if (self->approved_firmware == NULL)
|
|
return FALSE;
|
|
for (guint i = 0; i < csums->len; i++) {
|
|
const gchar *csum = g_ptr_array_index (csums, i);
|
|
g_debug ("checking %s against approved list", csum);
|
|
if (g_hash_table_lookup (self->approved_firmware, csum) != NULL)
|
|
return TRUE;
|
|
}
|
|
return FALSE;
|
|
}
|
|
|
|
static gboolean
|
|
fu_engine_check_release_is_blocked (FuEngine *self, FwupdRelease *rel)
|
|
{
|
|
GPtrArray *csums = fwupd_release_get_checksums (rel);
|
|
if (self->blocked_firmware == NULL)
|
|
return FALSE;
|
|
for (guint i = 0; i < csums->len; i++) {
|
|
const gchar *csum = g_ptr_array_index (csums, i);
|
|
if (g_hash_table_lookup (self->blocked_firmware, csum) != NULL)
|
|
return TRUE;
|
|
}
|
|
return FALSE;
|
|
}
|
|
|
|
static gboolean
|
|
fu_engine_add_releases_for_device_component (FuEngine *self,
|
|
FuEngineRequest *request,
|
|
FuDevice *device,
|
|
XbNode *component,
|
|
GPtrArray *releases,
|
|
GError **error)
|
|
{
|
|
FwupdFeatureFlags feature_flags;
|
|
FwupdVersionFormat fmt = fu_device_get_version_format (device);
|
|
g_autoptr(GError) error_local = NULL;
|
|
g_autoptr(FuInstallTask) task = fu_install_task_new (device, component);
|
|
g_autoptr(GPtrArray) releases_tmp = NULL;
|
|
|
|
if (!fu_engine_check_requirements (self, request, task,
|
|
FWUPD_INSTALL_FLAG_OFFLINE |
|
|
FWUPD_INSTALL_FLAG_IGNORE_VID_PID |
|
|
FWUPD_INSTALL_FLAG_ALLOW_BRANCH_SWITCH |
|
|
FWUPD_INSTALL_FLAG_ALLOW_REINSTALL |
|
|
FWUPD_INSTALL_FLAG_ALLOW_OLDER,
|
|
error))
|
|
return FALSE;
|
|
|
|
/* get all releases */
|
|
releases_tmp = xb_node_query (component, "releases/release", 0, &error_local);
|
|
if (releases_tmp == NULL) {
|
|
if (g_error_matches (error_local, G_IO_ERROR, G_IO_ERROR_NOT_FOUND))
|
|
return TRUE;
|
|
if (g_error_matches (error_local, G_IO_ERROR, G_IO_ERROR_INVALID_ARGUMENT))
|
|
return TRUE;
|
|
g_propagate_error (error, g_steal_pointer (&error_local));
|
|
return FALSE;
|
|
}
|
|
feature_flags = fu_engine_request_get_feature_flags (request);
|
|
for (guint i = 0; i < releases_tmp->len; i++) {
|
|
XbNode *release = g_ptr_array_index (releases_tmp, i);
|
|
const gchar *remote_id;
|
|
const gchar *update_message;
|
|
const gchar *update_image;
|
|
gint vercmp;
|
|
GPtrArray *checksums;
|
|
GPtrArray *locations;
|
|
g_autoptr(FwupdRelease) rel = fwupd_release_new ();
|
|
g_autoptr(GError) error_loop = NULL;
|
|
|
|
/* create new FwupdRelease for the XbNode */
|
|
if (!fu_engine_set_release_from_appstream (self,
|
|
device,
|
|
rel,
|
|
component,
|
|
release,
|
|
&error_loop)) {
|
|
g_warning ("failed to set release for component: %s",
|
|
error_loop->message);
|
|
continue;
|
|
}
|
|
|
|
/* fall back to quirk-provided value */
|
|
if (fwupd_release_get_install_duration (rel) == 0)
|
|
fwupd_release_set_install_duration (rel, fu_device_get_install_duration (device));
|
|
|
|
/* invalid */
|
|
locations = fwupd_release_get_locations (rel);
|
|
if (locations->len == 0)
|
|
continue;
|
|
checksums = fwupd_release_get_checksums (rel);
|
|
if (checksums->len == 0)
|
|
continue;
|
|
|
|
/* different branch */
|
|
if (g_strcmp0 (fwupd_release_get_branch (rel),
|
|
fu_device_get_branch (device)) != 0) {
|
|
if ((feature_flags & FWUPD_FEATURE_FLAG_SWITCH_BRANCH) == 0) {
|
|
g_debug ("client does not understand branches, skipping %s:%s",
|
|
fwupd_release_get_branch (rel),
|
|
fwupd_release_get_version (rel));
|
|
continue;
|
|
}
|
|
fwupd_release_add_flag (rel, FWUPD_RELEASE_FLAG_IS_ALTERNATE_BRANCH);
|
|
}
|
|
|
|
/* test for upgrade or downgrade */
|
|
vercmp = fu_common_vercmp_full (fwupd_release_get_version (rel),
|
|
fu_device_get_version (device),
|
|
fmt);
|
|
if (vercmp > 0)
|
|
fwupd_release_add_flag (rel, FWUPD_RELEASE_FLAG_IS_UPGRADE);
|
|
else if (vercmp < 0)
|
|
fwupd_release_add_flag (rel, FWUPD_RELEASE_FLAG_IS_DOWNGRADE);
|
|
|
|
/* lower than allowed to downgrade to */
|
|
if (fu_device_get_version_lowest (device) != NULL &&
|
|
fu_common_vercmp_full (fwupd_release_get_version (rel),
|
|
fu_device_get_version_lowest (device),
|
|
fmt) < 0) {
|
|
fwupd_release_add_flag (rel, FWUPD_RELEASE_FLAG_BLOCKED_VERSION);
|
|
}
|
|
|
|
/* manually blocked */
|
|
if (fu_engine_check_release_is_blocked (self, rel))
|
|
fwupd_release_add_flag (rel, FWUPD_RELEASE_FLAG_BLOCKED_APPROVAL);
|
|
|
|
/* check if remote is filtering firmware */
|
|
remote_id = fwupd_release_get_remote_id (rel);
|
|
if (remote_id != NULL) {
|
|
FwupdRemote *remote = fu_engine_get_remote_by_id (self, remote_id, NULL);
|
|
if (remote != NULL &&
|
|
fwupd_remote_get_approval_required (remote) &&
|
|
!fu_engine_check_release_is_approved (self, rel)) {
|
|
fwupd_release_add_flag (rel, FWUPD_RELEASE_FLAG_BLOCKED_APPROVAL);
|
|
}
|
|
}
|
|
|
|
/* add update message if exists but device doesn't already have one */
|
|
update_message = fwupd_release_get_update_message (rel);
|
|
if (fwupd_device_get_update_message (FWUPD_DEVICE (device)) == NULL &&
|
|
update_message != NULL) {
|
|
fwupd_device_set_update_message (FWUPD_DEVICE (device), update_message);
|
|
}
|
|
update_image = fwupd_release_get_update_image (rel);
|
|
if (fwupd_device_get_update_image (FWUPD_DEVICE (device)) == NULL &&
|
|
update_image != NULL) {
|
|
fwupd_device_set_update_image (FWUPD_DEVICE (device), update_image);
|
|
}
|
|
/* success */
|
|
g_ptr_array_add (releases, g_steal_pointer (&rel));
|
|
}
|
|
|
|
/* success */
|
|
return TRUE;
|
|
}
|
|
|
|
static const gchar *
|
|
fu_engine_get_branch_fallback (const gchar *nullable_branch)
|
|
{
|
|
if (nullable_branch == NULL)
|
|
return "default";
|
|
return nullable_branch;
|
|
}
|
|
|
|
GPtrArray *
|
|
fu_engine_get_releases_for_device (FuEngine *self,
|
|
FuEngineRequest *request,
|
|
FuDevice *device,
|
|
GError **error)
|
|
{
|
|
GPtrArray *device_guids;
|
|
GPtrArray *releases;
|
|
const gchar *version;
|
|
g_autoptr(GError) error_all = NULL;
|
|
g_autoptr(GError) error_local = NULL;
|
|
g_autoptr(GPtrArray) branches = NULL;
|
|
g_autoptr(GPtrArray) components = NULL;
|
|
g_autoptr(GString) xpath = g_string_new (NULL);
|
|
|
|
/* get device version */
|
|
version = fu_device_get_version (device);
|
|
if (version == NULL) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOT_SUPPORTED,
|
|
"no version set");
|
|
return NULL;
|
|
}
|
|
|
|
/* only show devices that can be updated */
|
|
if (!fu_device_has_flag (device, FWUPD_DEVICE_FLAG_UPDATABLE)) {
|
|
g_set_error_literal (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOT_SUPPORTED,
|
|
"is not updatable");
|
|
return NULL;
|
|
}
|
|
|
|
/* get all the components that provide any of these GUIDs */
|
|
device_guids = fu_device_get_guids (device);
|
|
for (guint i = 0; i < device_guids->len; i++) {
|
|
const gchar *guid = g_ptr_array_index (device_guids, i);
|
|
xb_string_append_union (xpath,
|
|
"components/component[@type='firmware']/"
|
|
"provides/firmware[@type=$'flashed'][text()=$'%s']/"
|
|
"../..", guid);
|
|
}
|
|
components = xb_silo_query (self->silo, xpath->str, 0, &error_local);
|
|
if (components == NULL) {
|
|
if (g_error_matches (error_local, G_IO_ERROR, G_IO_ERROR_NOT_FOUND) ||
|
|
g_error_matches (error_local, G_IO_ERROR, G_IO_ERROR_INVALID_ARGUMENT)) {
|
|
g_set_error_literal (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOTHING_TO_DO,
|
|
"No releases found");
|
|
return NULL;
|
|
}
|
|
g_propagate_error (error, g_steal_pointer (&error_local));
|
|
return NULL;
|
|
}
|
|
|
|
/* find all the releases that pass all the requirements */
|
|
releases = g_ptr_array_new_with_free_func ((GDestroyNotify) g_object_unref);
|
|
for (guint i = 0; i < components->len; i++) {
|
|
XbNode *component = XB_NODE (g_ptr_array_index (components, i));
|
|
g_autoptr(GError) error_tmp = NULL;
|
|
if (!fu_engine_add_releases_for_device_component (self,
|
|
request,
|
|
device,
|
|
component,
|
|
releases,
|
|
&error_tmp)) {
|
|
if (error_all == NULL) {
|
|
error_all = g_steal_pointer (&error_tmp);
|
|
continue;
|
|
}
|
|
|
|
/* assume the domain and code is the same */
|
|
g_prefix_error (&error_all, "%s, ", error_tmp->message);
|
|
}
|
|
}
|
|
|
|
/* are there multiple branches available */
|
|
branches = g_ptr_array_new_with_free_func (g_free);
|
|
g_ptr_array_add (branches,
|
|
g_strdup (fu_engine_get_branch_fallback (fu_device_get_branch (device))));
|
|
for (guint i = 0; i < releases->len; i++) {
|
|
FwupdRelease *rel_tmp = FWUPD_RELEASE (g_ptr_array_index (releases, i));
|
|
const gchar *branch_tmp = fu_engine_get_branch_fallback (fwupd_release_get_branch (rel_tmp));
|
|
#if GLIB_CHECK_VERSION(2,54,3)
|
|
if (g_ptr_array_find_with_equal_func (branches, branch_tmp,
|
|
g_str_equal, NULL))
|
|
continue;
|
|
#endif
|
|
g_ptr_array_add (branches, g_strdup (branch_tmp));
|
|
}
|
|
if (branches->len > 1)
|
|
fu_device_add_flag (device, FWUPD_DEVICE_FLAG_HAS_MULTIPLE_BRANCHES);
|
|
|
|
/* return the compound error */
|
|
if (releases->len == 0) {
|
|
if (error_all != NULL) {
|
|
g_propagate_prefixed_error (error, g_steal_pointer (&error_all),
|
|
"No releases found: ");
|
|
return NULL;
|
|
}
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOTHING_TO_DO,
|
|
"No releases found");
|
|
return NULL;
|
|
}
|
|
return releases;
|
|
}
|
|
|
|
/**
|
|
* fu_engine_get_releases:
|
|
* @self: A #FuEngine
|
|
* @request: A #FuEngineRequest
|
|
* @device_id: A device ID
|
|
* @error: A #GError, or %NULL
|
|
*
|
|
* Gets the releases available for a specific device.
|
|
*
|
|
* Returns: (transfer container) (element-type FwupdDevice): results
|
|
**/
|
|
GPtrArray *
|
|
fu_engine_get_releases (FuEngine *self,
|
|
FuEngineRequest *request,
|
|
const gchar *device_id,
|
|
GError **error)
|
|
{
|
|
g_autoptr(FuDevice) device = NULL;
|
|
g_autoptr(GPtrArray) releases = NULL;
|
|
|
|
g_return_val_if_fail (FU_IS_ENGINE (self), NULL);
|
|
g_return_val_if_fail (device_id != NULL, NULL);
|
|
g_return_val_if_fail (error == NULL || *error == NULL, NULL);
|
|
|
|
/* find the device */
|
|
device = fu_device_list_get_by_id (self->device_list, device_id, error);
|
|
if (device == NULL)
|
|
return NULL;
|
|
|
|
/* get all the releases for the device */
|
|
releases = fu_engine_get_releases_for_device (self, request, device, error);
|
|
if (releases == NULL)
|
|
return NULL;
|
|
if (releases->len == 0) {
|
|
g_set_error_literal (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOTHING_TO_DO,
|
|
"No releases for device");
|
|
return NULL;
|
|
}
|
|
g_ptr_array_sort_with_data (releases, fu_engine_sort_releases_cb, device);
|
|
return g_steal_pointer (&releases);
|
|
}
|
|
|
|
/**
|
|
* fu_engine_get_downgrades:
|
|
* @self: A #FuEngine
|
|
* @request: A #FuEngineRequest
|
|
* @device_id: A device ID
|
|
* @error: A #GError, or %NULL
|
|
*
|
|
* Gets the downgrades available for a specific device.
|
|
*
|
|
* Returns: (transfer container) (element-type FwupdDevice): results
|
|
**/
|
|
GPtrArray *
|
|
fu_engine_get_downgrades (FuEngine *self,
|
|
FuEngineRequest *request,
|
|
const gchar *device_id,
|
|
GError **error)
|
|
{
|
|
g_autoptr(FuDevice) device = NULL;
|
|
g_autoptr(GPtrArray) releases = NULL;
|
|
g_autoptr(GPtrArray) releases_tmp = NULL;
|
|
g_autoptr(GString) error_str = g_string_new (NULL);
|
|
|
|
g_return_val_if_fail (FU_IS_ENGINE (self), NULL);
|
|
g_return_val_if_fail (device_id != NULL, NULL);
|
|
g_return_val_if_fail (error == NULL || *error == NULL, NULL);
|
|
|
|
/* find the device */
|
|
device = fu_device_list_get_by_id (self->device_list, device_id, error);
|
|
if (device == NULL)
|
|
return NULL;
|
|
|
|
/* get all the releases for the device */
|
|
releases_tmp = fu_engine_get_releases_for_device (self, request, device, error);
|
|
if (releases_tmp == NULL)
|
|
return NULL;
|
|
releases = g_ptr_array_new_with_free_func ((GDestroyNotify) g_object_unref);
|
|
for (guint i = 0; i < releases_tmp->len; i++) {
|
|
FwupdRelease *rel_tmp = g_ptr_array_index (releases_tmp, i);
|
|
|
|
/* same as installed */
|
|
if (!fwupd_release_has_flag (rel_tmp, FWUPD_RELEASE_FLAG_IS_UPGRADE) &&
|
|
!fwupd_release_has_flag (rel_tmp, FWUPD_RELEASE_FLAG_IS_DOWNGRADE)) {
|
|
g_string_append_printf (error_str, "%s=same, ",
|
|
fwupd_release_get_version (rel_tmp));
|
|
g_debug ("ignoring %s as the same as %s",
|
|
fwupd_release_get_version (rel_tmp),
|
|
fu_device_get_version (device));
|
|
continue;
|
|
}
|
|
|
|
/* newer than current */
|
|
if (fwupd_release_has_flag (rel_tmp, FWUPD_RELEASE_FLAG_IS_UPGRADE)) {
|
|
g_string_append_printf (error_str, "%s=newer, ",
|
|
fwupd_release_get_version (rel_tmp));
|
|
g_debug ("ignoring %s as newer than %s",
|
|
fwupd_release_get_version (rel_tmp),
|
|
fu_device_get_version (device));
|
|
continue;
|
|
}
|
|
|
|
/* don't show releases we are not allowed to downgrade to */
|
|
if (fwupd_release_has_flag (rel_tmp, FWUPD_RELEASE_FLAG_BLOCKED_VERSION)) {
|
|
g_string_append_printf (error_str, "%s=lowest, ",
|
|
fwupd_release_get_version (rel_tmp));
|
|
g_debug ("ignoring %s as older than lowest %s",
|
|
fwupd_release_get_version (rel_tmp),
|
|
fu_device_get_version_lowest (device));
|
|
continue;
|
|
}
|
|
|
|
/* different branch */
|
|
if (fwupd_release_has_flag (rel_tmp, FWUPD_RELEASE_FLAG_IS_ALTERNATE_BRANCH)) {
|
|
g_debug ("ignoring release %s as branch %s, and device is %s",
|
|
fwupd_release_get_version (rel_tmp),
|
|
fwupd_release_get_branch (rel_tmp),
|
|
fu_device_get_branch (device));
|
|
continue;
|
|
}
|
|
|
|
g_ptr_array_add (releases, g_object_ref (rel_tmp));
|
|
}
|
|
if (error_str->len > 2)
|
|
g_string_truncate (error_str, error_str->len - 2);
|
|
if (releases->len == 0) {
|
|
if (error_str->len > 0) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOTHING_TO_DO,
|
|
"current version is %s: %s",
|
|
fu_device_get_version (device),
|
|
error_str->str);
|
|
} else {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOTHING_TO_DO,
|
|
"current version is %s",
|
|
fu_device_get_version (device));
|
|
}
|
|
return NULL;
|
|
}
|
|
g_ptr_array_sort_with_data (releases, fu_engine_sort_releases_cb, device);
|
|
return g_steal_pointer (&releases);
|
|
}
|
|
|
|
GPtrArray *
|
|
fu_engine_get_approved_firmware (FuEngine *self)
|
|
{
|
|
GPtrArray *checksums = g_ptr_array_new_with_free_func (g_free);
|
|
if (self->approved_firmware != NULL) {
|
|
g_autoptr(GList) keys = g_hash_table_get_keys (self->approved_firmware);
|
|
for (GList *l = keys; l != NULL; l = l->next) {
|
|
const gchar *csum = l->data;
|
|
g_ptr_array_add (checksums, g_strdup (csum));
|
|
}
|
|
}
|
|
return checksums;
|
|
}
|
|
|
|
void
|
|
fu_engine_add_approved_firmware (FuEngine *self, const gchar *checksum)
|
|
{
|
|
if (self->approved_firmware == NULL) {
|
|
self->approved_firmware = g_hash_table_new_full (g_str_hash,
|
|
g_str_equal,
|
|
g_free,
|
|
NULL);
|
|
}
|
|
g_hash_table_add (self->approved_firmware, g_strdup (checksum));
|
|
}
|
|
|
|
GPtrArray *
|
|
fu_engine_get_blocked_firmware (FuEngine *self)
|
|
{
|
|
GPtrArray *checksums = g_ptr_array_new_with_free_func (g_free);
|
|
if (self->blocked_firmware != NULL) {
|
|
g_autoptr(GList) keys = g_hash_table_get_keys (self->blocked_firmware);
|
|
for (GList *l = keys; l != NULL; l = l->next) {
|
|
const gchar *csum = l->data;
|
|
g_ptr_array_add (checksums, g_strdup (csum));
|
|
}
|
|
}
|
|
return checksums;
|
|
}
|
|
|
|
void
|
|
fu_engine_add_blocked_firmware (FuEngine *self, const gchar *checksum)
|
|
{
|
|
if (self->blocked_firmware == NULL) {
|
|
self->blocked_firmware = g_hash_table_new_full (g_str_hash,
|
|
g_str_equal,
|
|
g_free,
|
|
NULL);
|
|
}
|
|
g_hash_table_add (self->blocked_firmware, g_strdup (checksum));
|
|
}
|
|
|
|
gboolean
|
|
fu_engine_set_blocked_firmware (FuEngine *self, GPtrArray *checksums, GError **error)
|
|
{
|
|
/* update in-memory hash */
|
|
if (self->blocked_firmware != NULL) {
|
|
g_hash_table_unref (self->blocked_firmware);
|
|
self->blocked_firmware = NULL;
|
|
}
|
|
for (guint i = 0; i < checksums->len; i++) {
|
|
const gchar *csum = g_ptr_array_index (checksums, i);
|
|
fu_engine_add_blocked_firmware (self, csum);
|
|
}
|
|
|
|
/* save database */
|
|
if (!fu_history_clear_blocked_firmware (self->history, error))
|
|
return FALSE;
|
|
for (guint i = 0; i < checksums->len; i++) {
|
|
const gchar *csum = g_ptr_array_index (checksums, i);
|
|
if (!fu_history_add_blocked_firmware (self->history, csum, error))
|
|
return FALSE;
|
|
}
|
|
return TRUE;
|
|
}
|
|
|
|
gchar *
|
|
fu_engine_self_sign (FuEngine *self,
|
|
const gchar *value,
|
|
JcatSignFlags flags,
|
|
GError **error)
|
|
{
|
|
g_autoptr(JcatBlob) jcat_signature = NULL;
|
|
g_autoptr(JcatEngine) jcat_engine = NULL;
|
|
g_autoptr(JcatResult) jcat_result = NULL;
|
|
g_autoptr(GBytes) payload = NULL;
|
|
|
|
/* create detached signature and verify */
|
|
jcat_engine = jcat_context_get_engine (self->jcat_context,
|
|
JCAT_BLOB_KIND_PKCS7,
|
|
error);
|
|
if (jcat_engine == NULL)
|
|
return NULL;
|
|
payload = g_bytes_new (value, strlen (value));
|
|
jcat_signature = jcat_engine_self_sign (jcat_engine, payload, flags, error);
|
|
if (jcat_signature == NULL)
|
|
return NULL;
|
|
jcat_result = jcat_engine_self_verify (jcat_engine, payload,
|
|
jcat_blob_get_data (jcat_signature),
|
|
JCAT_VERIFY_FLAG_NONE, error);
|
|
if (jcat_result == NULL)
|
|
return NULL;
|
|
return jcat_blob_get_data_as_string (jcat_signature);
|
|
}
|
|
|
|
/**
|
|
* fu_engine_get_upgrades:
|
|
* @self: A #FuEngine
|
|
* @request: A #FuEngineRequest
|
|
* @device_id: A device ID
|
|
* @error: A #GError, or %NULL
|
|
*
|
|
* Gets the upgrades available for a specific device.
|
|
*
|
|
* Returns: (transfer container) (element-type FwupdDevice): results
|
|
**/
|
|
GPtrArray *
|
|
fu_engine_get_upgrades (FuEngine *self,
|
|
FuEngineRequest *request,
|
|
const gchar *device_id,
|
|
GError **error)
|
|
{
|
|
g_autoptr(FuDevice) device = NULL;
|
|
g_autoptr(GPtrArray) releases = NULL;
|
|
g_autoptr(GPtrArray) releases_tmp = NULL;
|
|
g_autoptr(GString) error_str = g_string_new (NULL);
|
|
|
|
g_return_val_if_fail (FU_IS_ENGINE (self), NULL);
|
|
g_return_val_if_fail (device_id != NULL, NULL);
|
|
g_return_val_if_fail (error == NULL || *error == NULL, NULL);
|
|
|
|
/* find the device */
|
|
device = fu_device_list_get_by_id (self->device_list, device_id, error);
|
|
if (device == NULL)
|
|
return NULL;
|
|
|
|
/* don't show upgrades again until we reboot */
|
|
if (fu_device_get_update_state (device) == FWUPD_UPDATE_STATE_NEEDS_REBOOT) {
|
|
g_set_error_literal (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOTHING_TO_DO,
|
|
"A reboot is pending");
|
|
return NULL;
|
|
}
|
|
|
|
/* get all the releases for the device */
|
|
releases_tmp = fu_engine_get_releases_for_device (self, request, device, error);
|
|
if (releases_tmp == NULL)
|
|
return NULL;
|
|
releases = g_ptr_array_new_with_free_func ((GDestroyNotify) g_object_unref);
|
|
for (guint i = 0; i < releases_tmp->len; i++) {
|
|
FwupdRelease *rel_tmp = g_ptr_array_index (releases_tmp, i);
|
|
|
|
/* same as installed */
|
|
if (!fwupd_release_has_flag (rel_tmp, FWUPD_RELEASE_FLAG_IS_UPGRADE) &&
|
|
!fwupd_release_has_flag (rel_tmp, FWUPD_RELEASE_FLAG_IS_DOWNGRADE)) {
|
|
g_string_append_printf (error_str, "%s=same, ",
|
|
fwupd_release_get_version (rel_tmp));
|
|
g_debug ("ignoring %s == %s",
|
|
fwupd_release_get_version (rel_tmp),
|
|
fu_device_get_version (device));
|
|
continue;
|
|
}
|
|
|
|
/* older than current */
|
|
if (fwupd_release_has_flag (rel_tmp, FWUPD_RELEASE_FLAG_IS_DOWNGRADE)) {
|
|
g_string_append_printf (error_str, "%s=older, ",
|
|
fwupd_release_get_version (rel_tmp));
|
|
g_debug ("ignoring %s < %s",
|
|
fwupd_release_get_version (rel_tmp),
|
|
fu_device_get_version (device));
|
|
continue;
|
|
}
|
|
|
|
/* not approved */
|
|
if (fwupd_release_has_flag (rel_tmp, FWUPD_RELEASE_FLAG_BLOCKED_APPROVAL)) {
|
|
g_string_append_printf (error_str, "%s=not-approved, ",
|
|
fwupd_release_get_version (rel_tmp));
|
|
g_debug ("ignoring %s as not approved as required by %s",
|
|
fwupd_release_get_version (rel_tmp),
|
|
fwupd_release_get_remote_id (rel_tmp));
|
|
continue;
|
|
}
|
|
|
|
/* different branch */
|
|
if (fwupd_release_has_flag (rel_tmp, FWUPD_RELEASE_FLAG_IS_ALTERNATE_BRANCH)) {
|
|
g_debug ("ignoring release %s as branch %s, and device is %s",
|
|
fwupd_release_get_version (rel_tmp),
|
|
fwupd_release_get_branch (rel_tmp),
|
|
fu_device_get_branch (device));
|
|
continue;
|
|
}
|
|
|
|
g_ptr_array_add (releases, g_object_ref (rel_tmp));
|
|
}
|
|
if (error_str->len > 2)
|
|
g_string_truncate (error_str, error_str->len - 2);
|
|
if (releases->len == 0) {
|
|
if (error_str->len > 0) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOTHING_TO_DO,
|
|
"current version is %s: %s",
|
|
fu_device_get_version (device),
|
|
error_str->str);
|
|
} else {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOTHING_TO_DO,
|
|
"current version is %s",
|
|
fu_device_get_version (device));
|
|
}
|
|
return NULL;
|
|
}
|
|
g_ptr_array_sort_with_data (releases, fu_engine_sort_releases_cb, device);
|
|
return g_steal_pointer (&releases);
|
|
}
|
|
|
|
/**
|
|
* fu_engine_clear_results:
|
|
* @self: A #FuEngine
|
|
* @device_id: A device ID
|
|
* @error: A #GError, or %NULL
|
|
*
|
|
* Clear the historical state of a specific device operation.
|
|
*
|
|
* Returns: %TRUE for success
|
|
**/
|
|
gboolean
|
|
fu_engine_clear_results (FuEngine *self, const gchar *device_id, GError **error)
|
|
{
|
|
g_autoptr(FuDevice) device = NULL;
|
|
FuPlugin *plugin;
|
|
|
|
g_return_val_if_fail (FU_IS_ENGINE (self), FALSE);
|
|
g_return_val_if_fail (device_id != NULL, FALSE);
|
|
g_return_val_if_fail (error == NULL || *error == NULL, FALSE);
|
|
|
|
/* find the device */
|
|
device = fu_engine_get_item_by_id_fallback_history (self, device_id, error);
|
|
if (device == NULL)
|
|
return FALSE;
|
|
|
|
/* already set on the database */
|
|
if (fu_device_has_flag (device, FWUPD_DEVICE_FLAG_NOTIFIED)) {
|
|
g_set_error_literal (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOT_SUPPORTED,
|
|
"device already has notified flag");
|
|
return FALSE;
|
|
}
|
|
|
|
/* call into the plugin if it still exists */
|
|
plugin = fu_plugin_list_find_by_name (self->plugin_list,
|
|
fu_device_get_plugin (device),
|
|
error);
|
|
if (plugin != NULL) {
|
|
if (!fu_plugin_runner_clear_results (plugin, device, error))
|
|
return FALSE;
|
|
}
|
|
|
|
/* override */
|
|
fu_device_add_flag (device, FWUPD_DEVICE_FLAG_NOTIFIED);
|
|
return fu_history_modify_device (self->history, device, error);
|
|
}
|
|
|
|
/**
|
|
* fu_engine_get_results:
|
|
* @self: A #FuEngine
|
|
* @device_id: A device ID
|
|
* @error: A #GError, or %NULL
|
|
*
|
|
* Gets the historical state of a specific device operation.
|
|
*
|
|
* Returns: (transfer container): a #FwupdDevice, or %NULL
|
|
**/
|
|
FwupdDevice *
|
|
fu_engine_get_results (FuEngine *self, const gchar *device_id, GError **error)
|
|
{
|
|
g_autoptr(FuDevice) device = NULL;
|
|
|
|
g_return_val_if_fail (FU_IS_ENGINE (self), NULL);
|
|
g_return_val_if_fail (device_id != NULL, NULL);
|
|
g_return_val_if_fail (error == NULL || *error == NULL, NULL);
|
|
|
|
/* find the device */
|
|
device = fu_engine_get_item_by_id_fallback_history (self, device_id, error);
|
|
if (device == NULL)
|
|
return NULL;
|
|
|
|
/* the notification has already been shown to the user */
|
|
if (fu_device_has_flag (device, FWUPD_DEVICE_FLAG_NOTIFIED)) {
|
|
g_set_error (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOTHING_TO_DO,
|
|
"User has already been notified about %s [%s]",
|
|
fu_device_get_name (device),
|
|
fu_device_get_id (device));
|
|
return NULL;
|
|
}
|
|
|
|
/* success */
|
|
return g_object_ref (FWUPD_DEVICE (device));
|
|
}
|
|
|
|
static void
|
|
fu_engine_plugins_setup (FuEngine *self)
|
|
{
|
|
GPtrArray *plugins = fu_plugin_list_get_all (self->plugin_list);
|
|
for (guint i = 0; i < plugins->len; i++) {
|
|
g_autoptr(GError) error = NULL;
|
|
FuPlugin *plugin = g_ptr_array_index (plugins, i);
|
|
if (fu_plugin_has_flag (plugin, FWUPD_PLUGIN_FLAG_REQUIRE_HWID)) {
|
|
fu_plugin_add_flag (plugin, FWUPD_PLUGIN_FLAG_DISABLED);
|
|
g_message ("disabling plugin %s because no HwId",
|
|
fu_plugin_get_name (plugin));
|
|
continue;
|
|
}
|
|
if (!fu_plugin_runner_startup (plugin, &error)) {
|
|
fu_plugin_add_flag (plugin, FWUPD_PLUGIN_FLAG_DISABLED);
|
|
if (g_error_matches (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOT_SUPPORTED)) {
|
|
fu_plugin_add_flag (plugin, FWUPD_PLUGIN_FLAG_NO_HARDWARE);
|
|
}
|
|
g_message ("disabling plugin because: %s", error->message);
|
|
}
|
|
}
|
|
}
|
|
|
|
static void
|
|
fu_engine_plugins_coldplug (FuEngine *self, gboolean is_recoldplug)
|
|
{
|
|
GPtrArray *plugins;
|
|
g_autoptr(GString) str = g_string_new (NULL);
|
|
|
|
/* don't allow coldplug to be scheduled when in coldplug */
|
|
self->coldplug_running = TRUE;
|
|
|
|
/* prepare */
|
|
plugins = fu_plugin_list_get_all (self->plugin_list);
|
|
for (guint i = 0; i < plugins->len; i++) {
|
|
g_autoptr(GError) error = NULL;
|
|
FuPlugin *plugin = g_ptr_array_index (plugins, i);
|
|
if (!fu_plugin_runner_coldplug_prepare (plugin, &error))
|
|
g_warning ("failed to prepare coldplug: %s", error->message);
|
|
}
|
|
|
|
/* do this in one place */
|
|
if (self->coldplug_delay > 0) {
|
|
g_debug ("sleeping for %ums", self->coldplug_delay);
|
|
g_usleep (self->coldplug_delay * 1000);
|
|
}
|
|
|
|
/* exec */
|
|
for (guint i = 0; i < plugins->len; i++) {
|
|
g_autoptr(GError) error = NULL;
|
|
FuPlugin *plugin = g_ptr_array_index (plugins, i);
|
|
if (is_recoldplug) {
|
|
if (!fu_plugin_runner_recoldplug (plugin, &error))
|
|
g_message ("failed recoldplug: %s", error->message);
|
|
} else {
|
|
if (!fu_plugin_runner_coldplug (plugin, &error)) {
|
|
fu_plugin_add_flag (plugin, FWUPD_PLUGIN_FLAG_DISABLED);
|
|
g_message ("disabling plugin because: %s",
|
|
error->message);
|
|
}
|
|
}
|
|
}
|
|
|
|
/* cleanup */
|
|
for (guint i = 0; i < plugins->len; i++) {
|
|
g_autoptr(GError) error = NULL;
|
|
FuPlugin *plugin = g_ptr_array_index (plugins, i);
|
|
if (!fu_plugin_runner_coldplug_cleanup (plugin, &error))
|
|
g_warning ("failed to cleanup coldplug: %s", error->message);
|
|
}
|
|
|
|
/* print what we do have */
|
|
for (guint i = 0; i < plugins->len; i++) {
|
|
FuPlugin *plugin = g_ptr_array_index (plugins, i);
|
|
if (fu_plugin_has_flag (plugin, FWUPD_PLUGIN_FLAG_DISABLED))
|
|
continue;
|
|
g_string_append_printf (str, "%s, ", fu_plugin_get_name (plugin));
|
|
}
|
|
if (str->len > 2) {
|
|
g_string_truncate (str, str->len - 2);
|
|
g_debug ("using plugins: %s", str->str);
|
|
}
|
|
|
|
/* we can recoldplug from this point on */
|
|
self->coldplug_running = FALSE;
|
|
}
|
|
|
|
static void
|
|
fu_engine_plugin_device_register (FuEngine *self, FuDevice *device)
|
|
{
|
|
GPtrArray *plugins;
|
|
if (fu_device_has_flag (device, FWUPD_DEVICE_FLAG_REGISTERED)) {
|
|
g_warning ("already registered %s, ignoring",
|
|
fu_device_get_id (device));
|
|
return;
|
|
}
|
|
plugins = fu_plugin_list_get_all (self->plugin_list);
|
|
for (guint i = 0; i < plugins->len; i++) {
|
|
FuPlugin *plugin = g_ptr_array_index (plugins, i);
|
|
fu_plugin_runner_device_register (plugin, device);
|
|
}
|
|
fu_device_add_flag (device, FWUPD_DEVICE_FLAG_REGISTERED);
|
|
}
|
|
|
|
static void
|
|
fu_engine_plugin_device_register_cb (FuPlugin *plugin,
|
|
FuDevice *device,
|
|
gpointer user_data)
|
|
{
|
|
FuEngine *self = FU_ENGINE (user_data);
|
|
fu_engine_plugin_device_register (self, device);
|
|
}
|
|
|
|
static void
|
|
fu_engine_plugin_device_added_cb (FuPlugin *plugin,
|
|
FuDevice *device,
|
|
gpointer user_data)
|
|
{
|
|
FuEngine *self = FU_ENGINE (user_data);
|
|
|
|
/* plugin has prio and device not already set from quirk */
|
|
if (fu_plugin_get_priority (plugin) > 0 &&
|
|
fu_device_get_priority (device) == 0) {
|
|
g_debug ("auto-setting %s priority to %u",
|
|
fu_device_get_id (device),
|
|
fu_plugin_get_priority (plugin));
|
|
fu_device_set_priority (device, fu_plugin_get_priority (plugin));
|
|
}
|
|
|
|
fu_engine_add_device (self, device);
|
|
}
|
|
|
|
static void
|
|
fu_engine_adopt_children (FuEngine *self, FuDevice *device)
|
|
{
|
|
GPtrArray *guids;
|
|
g_autoptr(GPtrArray) devices = fu_device_list_get_active (self->device_list);
|
|
|
|
/* find the parent GUID in any existing device */
|
|
guids = fu_device_get_parent_guids (device);
|
|
for (guint j = 0; j < guids->len; j++) {
|
|
const gchar *guid = g_ptr_array_index (guids, j);
|
|
for (guint i = 0; i < devices->len; i++) {
|
|
FuDevice *device_tmp = g_ptr_array_index (devices, i);
|
|
if (fu_device_get_parent (device) != NULL)
|
|
continue;
|
|
if (fu_device_has_guid (device_tmp, guid)) {
|
|
g_debug ("setting parent of %s [%s] to be %s [%s]",
|
|
fu_device_get_name (device),
|
|
fu_device_get_id (device),
|
|
fu_device_get_name (device_tmp),
|
|
fu_device_get_id (device_tmp));
|
|
fu_device_set_parent (device, device_tmp);
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
/* the new device is the parent to an existing child */
|
|
guids = fu_device_get_guids (device);
|
|
for (guint j = 0; j < guids->len; j++) {
|
|
const gchar *guid = g_ptr_array_index (guids, j);
|
|
for (guint i = 0; i < devices->len; i++) {
|
|
FuDevice *device_tmp = g_ptr_array_index (devices, i);
|
|
if (fu_device_get_parent (device_tmp) != NULL)
|
|
continue;
|
|
if (fu_device_has_parent_guid (device_tmp, guid)) {
|
|
g_debug ("setting parent of %s [%s] to be %s [%s]",
|
|
fu_device_get_name (device_tmp),
|
|
fu_device_get_id (device_tmp),
|
|
fu_device_get_name (device),
|
|
fu_device_get_id (device));
|
|
fu_device_set_parent (device_tmp, device);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
static void
|
|
fu_engine_set_proxy_device (FuEngine *self, FuDevice *device)
|
|
{
|
|
GPtrArray *guids;
|
|
g_autoptr(FuDevice) proxy = NULL;
|
|
g_autoptr(GPtrArray) devices = NULL;
|
|
|
|
if (fu_device_get_proxy (device) != NULL)
|
|
return;
|
|
if (fu_device_get_proxy_guid (device) == NULL)
|
|
return;
|
|
|
|
/* find the proxy GUID in any existing device */
|
|
proxy = fu_device_list_get_by_guid (self->device_list,
|
|
fu_device_get_proxy_guid (device),
|
|
NULL);
|
|
if (proxy != NULL) {
|
|
g_debug ("setting proxy of %s to %s for %s",
|
|
fu_device_get_id (proxy),
|
|
fu_device_get_id (device),
|
|
fu_device_get_proxy_guid (device));
|
|
fu_device_set_proxy (device, proxy);
|
|
return;
|
|
}
|
|
|
|
/* are we the parent of an existing device */
|
|
guids = fu_device_get_guids (device);
|
|
for (guint j = 0; j < guids->len; j++) {
|
|
const gchar *guid = g_ptr_array_index (guids, j);
|
|
devices = fu_device_list_get_active (self->device_list);
|
|
for (guint i = 0; i < devices->len; i++) {
|
|
FuDevice *device_tmp = g_ptr_array_index (devices, i);
|
|
if (g_strcmp0 (fu_device_get_proxy_guid (device_tmp), guid) == 0) {
|
|
g_debug ("adding proxy of %s to %s for %s",
|
|
fu_device_get_id (device),
|
|
fu_device_get_id (device_tmp),
|
|
guid);
|
|
fu_device_set_proxy (device_tmp, device);
|
|
return;
|
|
}
|
|
}
|
|
}
|
|
|
|
/* nothing found */
|
|
g_warning ("did not find proxy device %s",
|
|
fu_device_get_proxy_guid (device));
|
|
}
|
|
|
|
static void
|
|
fu_engine_device_inherit_history (FuEngine *self, FuDevice *device)
|
|
{
|
|
g_autoptr(FuDevice) device_history = NULL;
|
|
|
|
/* any success or failed update? */
|
|
device_history = fu_history_get_device_by_id (self->history,
|
|
fu_device_get_id (device),
|
|
NULL);
|
|
if (device_history == NULL)
|
|
return;
|
|
|
|
/* the device is still running the old firmware version and so if it
|
|
* required activation before, it still requires it now -- note:
|
|
* we can't just check for version_new=version to allow for re-installs */
|
|
if (fu_device_has_flag (device_history, FWUPD_DEVICE_FLAG_NEEDS_ACTIVATION)) {
|
|
FwupdRelease *release = fu_device_get_release_default (device_history);
|
|
if (fu_common_vercmp_full (fu_device_get_version (device),
|
|
fwupd_release_get_version (release),
|
|
fu_device_get_version_format (device)) != 0) {
|
|
g_debug ("inheriting needs-activation for %s as version %s != %s",
|
|
fu_device_get_name (device),
|
|
fu_device_get_version (device),
|
|
fwupd_release_get_version (release));
|
|
fu_device_add_flag (device, FWUPD_DEVICE_FLAG_NEEDS_ACTIVATION);
|
|
}
|
|
}
|
|
}
|
|
|
|
void
|
|
fu_engine_add_device (FuEngine *self, FuDevice *device)
|
|
{
|
|
GPtrArray *disabled_devices;
|
|
GPtrArray *device_guids;
|
|
g_autoptr(XbNode) component = NULL;
|
|
|
|
/* device has no GUIDs set! */
|
|
device_guids = fu_device_get_guids (device);
|
|
if (device_guids->len == 0) {
|
|
g_warning ("no GUIDs for device %s [%s]",
|
|
fu_device_get_name (device),
|
|
fu_device_get_id (device));
|
|
return;
|
|
}
|
|
|
|
/* is this GUID disabled */
|
|
disabled_devices = fu_config_get_disabled_devices (self->config);
|
|
for (guint i = 0; i < disabled_devices->len; i++) {
|
|
const gchar *disabled_guid = g_ptr_array_index (disabled_devices, i);
|
|
for (guint j = 0; j < device_guids->len; j++) {
|
|
const gchar *device_guid = g_ptr_array_index (device_guids, j);
|
|
if (g_strcmp0 (disabled_guid, device_guid) == 0) {
|
|
g_debug ("%s [%s] is disabled [%s], ignoring from %s",
|
|
fu_device_get_name (device),
|
|
fu_device_get_id (device),
|
|
device_guid,
|
|
fu_device_get_plugin (device));
|
|
return;
|
|
}
|
|
}
|
|
}
|
|
|
|
/* does the device not have an assigned protocol */
|
|
if (fu_device_has_flag (device, FWUPD_DEVICE_FLAG_UPDATABLE) &&
|
|
fu_device_get_protocols (device)->len == 0) {
|
|
g_warning ("device %s [%s] does not define an update protocol",
|
|
fu_device_get_id (device),
|
|
fu_device_get_name (device));
|
|
}
|
|
|
|
/* if this device is locked get some metadata from AppStream */
|
|
component = fu_engine_get_component_by_guids (self, device);
|
|
if (fu_device_has_flag (device, FWUPD_DEVICE_FLAG_LOCKED)) {
|
|
if (component != NULL) {
|
|
g_autoptr(XbNode) release = NULL;
|
|
release = xb_node_query_first (component,
|
|
"releases/release",
|
|
NULL);
|
|
if (release != NULL) {
|
|
g_autoptr(FwupdRelease) rel = fwupd_release_new ();
|
|
g_autoptr(GError) error_local = NULL;
|
|
if (!fu_engine_set_release_from_appstream (self,
|
|
device,
|
|
rel,
|
|
component,
|
|
release,
|
|
&error_local)) {
|
|
g_warning ("failed to set AppStream release: %s",
|
|
error_local->message);
|
|
} else {
|
|
fu_device_add_release (device, rel);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
/* adopt any required children, which may or may not already exist */
|
|
fu_engine_adopt_children (self, device);
|
|
|
|
/* set the proxy device if specified by GUID */
|
|
fu_engine_set_proxy_device (self, device);
|
|
|
|
/* set any alternate objects on the device from the ID */
|
|
if (fu_device_get_alternate_id (device) != NULL) {
|
|
g_autoptr(FuDevice) device_alt = NULL;
|
|
device_alt = fu_device_list_get_by_id (self->device_list,
|
|
fu_device_get_alternate_id (device),
|
|
NULL);
|
|
if (device_alt != NULL)
|
|
fu_device_set_alternate (device, device_alt);
|
|
}
|
|
|
|
if (fu_device_get_version_format (device) == FWUPD_VERSION_FORMAT_UNKNOWN &&
|
|
fu_common_version_guess_format (fu_device_get_version (device)) == FWUPD_VERSION_FORMAT_NUMBER) {
|
|
fu_device_remove_flag (device, FWUPD_DEVICE_FLAG_UPDATABLE);
|
|
fu_device_set_update_error (device, "VersionFormat is ambiguous for this device");
|
|
}
|
|
|
|
/* no vendor-id, and so no way to lock it down! */
|
|
if (fu_device_has_flag (device, FWUPD_DEVICE_FLAG_UPDATABLE) &&
|
|
fu_device_get_vendor_ids(device)->len == 0) {
|
|
fu_device_remove_flag (device, FWUPD_DEVICE_FLAG_UPDATABLE);
|
|
fu_device_set_update_error (device, "No vendor ID set");
|
|
}
|
|
|
|
/* notify all plugins about this new device */
|
|
if (!fu_device_has_flag (device, FWUPD_DEVICE_FLAG_REGISTERED))
|
|
fu_engine_plugin_device_register (self, device);
|
|
|
|
/* does the device *still* not have a vendor ID? */
|
|
if (fu_device_has_flag (device, FWUPD_DEVICE_FLAG_UPDATABLE) &&
|
|
fu_device_get_vendor_ids(device)->len == 0) {
|
|
g_warning ("device %s [%s] does not define a vendor-id!",
|
|
fu_device_get_id (device),
|
|
fu_device_get_name (device));
|
|
}
|
|
|
|
/* create new device */
|
|
fu_device_list_add (self->device_list, device);
|
|
|
|
/* fix order */
|
|
fu_device_list_depsolve_order (self->device_list, device);
|
|
|
|
/* fixup the name and format as needed from cached metadata */
|
|
if (component != NULL)
|
|
fu_engine_md_refresh_device_from_component (self, device, component);
|
|
|
|
/* match the metadata so clients can tell if the device is worthy */
|
|
fu_engine_ensure_device_supported (self, device);
|
|
|
|
/* sometimes inherit flags from recent history */
|
|
fu_engine_device_inherit_history (self, device);
|
|
|
|
fu_engine_emit_changed (self);
|
|
}
|
|
|
|
static void
|
|
fu_engine_plugin_add_firmware_gtype_cb (FuPlugin *plugin,
|
|
const gchar *id,
|
|
GType gtype,
|
|
gpointer user_data)
|
|
{
|
|
FuEngine *self = FU_ENGINE (user_data);
|
|
fu_engine_add_firmware_gtype (self, id, gtype);
|
|
}
|
|
|
|
static void
|
|
fu_engine_plugin_rules_changed_cb (FuPlugin *plugin, gpointer user_data)
|
|
{
|
|
FuEngine *self = FU_ENGINE (user_data);
|
|
GPtrArray *rules = fu_plugin_get_rules (plugin, FU_PLUGIN_RULE_INHIBITS_IDLE);
|
|
if (rules == NULL)
|
|
return;
|
|
for (guint j = 0; j < rules->len; j++) {
|
|
const gchar *tmp = g_ptr_array_index (rules, j);
|
|
fu_idle_inhibit (self->idle, tmp);
|
|
}
|
|
}
|
|
|
|
static void
|
|
fu_engine_plugin_security_changed_cb (FuPlugin *plugin, gpointer user_data)
|
|
{
|
|
FuEngine *self = FU_ENGINE (user_data);
|
|
|
|
/* invalidate host security attributes */
|
|
g_clear_pointer (&self->host_security_id, g_free);
|
|
|
|
/* make UI refresh */
|
|
fu_engine_emit_changed (self);
|
|
}
|
|
|
|
static void
|
|
fu_engine_plugin_device_removed_cb (FuPlugin *plugin,
|
|
FuDevice *device,
|
|
gpointer user_data)
|
|
{
|
|
FuEngine *self = (FuEngine *) user_data;
|
|
FuPlugin *plugin_old;
|
|
g_autoptr(FuDevice) device_tmp = NULL;
|
|
g_autoptr(GError) error = NULL;
|
|
|
|
device_tmp = fu_device_list_get_by_id (self->device_list,
|
|
fu_device_get_id (device),
|
|
&error);
|
|
if (device_tmp == NULL) {
|
|
g_debug ("failed to find device %s: %s",
|
|
fu_device_get_id (device),
|
|
error->message);
|
|
return;
|
|
}
|
|
|
|
/* get the plugin */
|
|
plugin_old = fu_plugin_list_find_by_name (self->plugin_list,
|
|
fu_device_get_plugin (device),
|
|
&error);
|
|
if (plugin_old == NULL) {
|
|
g_debug ("failed to find plugin %s: %s",
|
|
fu_device_get_plugin (device),
|
|
error->message);
|
|
return;
|
|
}
|
|
|
|
/* check this came from the same plugin */
|
|
if (g_strcmp0 (fu_plugin_get_name (plugin),
|
|
fu_plugin_get_name (plugin_old)) != 0) {
|
|
g_debug ("ignoring duplicate removal from %s",
|
|
fu_plugin_get_name (plugin));
|
|
return;
|
|
}
|
|
|
|
/* make the UI update */
|
|
fu_device_list_remove (self->device_list, device);
|
|
fu_engine_emit_changed (self);
|
|
}
|
|
|
|
static gboolean
|
|
fu_engine_recoldplug_delay_cb (gpointer user_data)
|
|
{
|
|
FuEngine *self = (FuEngine *) user_data;
|
|
g_debug ("recoldplugging");
|
|
fu_engine_plugins_coldplug (self, TRUE);
|
|
self->coldplug_id = 0;
|
|
return FALSE;
|
|
}
|
|
|
|
static void
|
|
fu_engine_plugin_recoldplug_cb (FuPlugin *plugin, FuEngine *self)
|
|
{
|
|
if (self->coldplug_running) {
|
|
g_warning ("coldplug already running, cannot recoldplug");
|
|
return;
|
|
}
|
|
if (self->app_flags & FU_APP_FLAGS_NO_IDLE_SOURCES) {
|
|
g_debug ("doing direct recoldplug");
|
|
fu_engine_plugins_coldplug (self, TRUE);
|
|
for (guint i = 0; i < self->backends->len; i++) {
|
|
FuBackend *backend = g_ptr_array_index (self->backends, i);
|
|
g_autoptr(GError) error_local = NULL;
|
|
if (!fu_backend_get_enabled (backend))
|
|
continue;
|
|
if (!fu_backend_recoldplug (backend, &error_local)) {
|
|
g_warning ("failed to recoldplug: %s",
|
|
error_local->message);
|
|
continue;
|
|
}
|
|
}
|
|
return;
|
|
}
|
|
g_debug ("scheduling a recoldplug");
|
|
if (self->coldplug_id != 0)
|
|
g_source_remove (self->coldplug_id);
|
|
self->coldplug_id = g_timeout_add (1500, fu_engine_recoldplug_delay_cb, self);
|
|
}
|
|
|
|
static void
|
|
fu_engine_plugin_set_coldplug_delay_cb (FuPlugin *plugin, guint duration, FuEngine *self)
|
|
{
|
|
self->coldplug_delay = MAX (self->coldplug_delay, duration);
|
|
g_debug ("got coldplug delay of %ums, global maximum is now %ums",
|
|
duration, self->coldplug_delay);
|
|
}
|
|
|
|
/* this is called by the self tests as well */
|
|
void
|
|
fu_engine_add_plugin (FuEngine *self, FuPlugin *plugin)
|
|
{
|
|
if (fu_plugin_is_open (plugin)) {
|
|
/* plugin does not match built version */
|
|
if (fu_plugin_get_build_hash (plugin) == NULL) {
|
|
const gchar *name = fu_plugin_get_name (plugin);
|
|
g_warning ("%s should call fu_plugin_set_build_hash()",
|
|
name);
|
|
self->tainted = TRUE;
|
|
} else if (g_strcmp0 (fu_plugin_get_build_hash (plugin),
|
|
FU_BUILD_HASH) != 0) {
|
|
const gchar *name = fu_plugin_get_name (plugin);
|
|
g_warning ("%s has incorrect built version %s",
|
|
name, fu_plugin_get_build_hash (plugin));
|
|
self->tainted = TRUE;
|
|
}
|
|
}
|
|
|
|
fu_plugin_list_add (self->plugin_list, plugin);
|
|
}
|
|
|
|
static gboolean
|
|
fu_engine_is_plugin_name_disabled (FuEngine *self, const gchar *name)
|
|
{
|
|
GPtrArray *disabled = fu_config_get_disabled_plugins (self->config);
|
|
for (guint i = 0; i < disabled->len; i++) {
|
|
const gchar *name_tmp = g_ptr_array_index (disabled, i);
|
|
if (g_strcmp0 (name_tmp, name) == 0)
|
|
return TRUE;
|
|
}
|
|
return FALSE;
|
|
}
|
|
|
|
static gboolean
|
|
fu_engine_is_plugin_name_enabled (FuEngine *self, const gchar *name)
|
|
{
|
|
if (self->plugin_filter->len == 0)
|
|
return TRUE;
|
|
for (guint i = 0; i < self->plugin_filter->len; i++) {
|
|
const gchar *name_tmp = g_ptr_array_index (self->plugin_filter, i);
|
|
if (fu_common_fnmatch (name_tmp, name))
|
|
return TRUE;
|
|
}
|
|
return FALSE;
|
|
}
|
|
|
|
void
|
|
fu_engine_add_plugin_filter (FuEngine *self, const gchar *plugin_glob)
|
|
{
|
|
GString *str;
|
|
g_return_if_fail (FU_IS_ENGINE (self));
|
|
g_return_if_fail (plugin_glob != NULL);
|
|
str = g_string_new (plugin_glob);
|
|
fu_common_string_replace (str, "-", "_");
|
|
g_ptr_array_add (self->plugin_filter, g_string_free (str, FALSE));
|
|
}
|
|
|
|
static gboolean
|
|
fu_engine_plugin_check_supported_cb (FuPlugin *plugin, const gchar *guid, FuEngine *self)
|
|
{
|
|
g_autoptr(XbNode) n = NULL;
|
|
g_autofree gchar *xpath = NULL;
|
|
|
|
if (fu_config_get_enumerate_all_devices (self->config))
|
|
return TRUE;
|
|
|
|
xpath = g_strdup_printf ("components/component[@type='firmware']/"
|
|
"provides/firmware[@type='flashed'][text()='%s']",
|
|
guid);
|
|
n = xb_silo_query_first (self->silo, xpath, NULL);
|
|
return n != NULL;
|
|
}
|
|
|
|
gboolean
|
|
fu_engine_get_tainted (FuEngine *self)
|
|
{
|
|
return self->tainted;
|
|
}
|
|
|
|
const gchar *
|
|
fu_engine_get_host_product (FuEngine *self)
|
|
{
|
|
const gchar *result = NULL;
|
|
g_return_val_if_fail (FU_IS_ENGINE (self), NULL);
|
|
result = fu_hwids_get_value (self->hwids, FU_HWIDS_KEY_PRODUCT_NAME);
|
|
return result != NULL ? result : "Unknown Product";
|
|
}
|
|
|
|
const gchar *
|
|
fu_engine_get_host_machine_id (FuEngine *self)
|
|
{
|
|
g_return_val_if_fail (FU_IS_ENGINE (self), NULL);
|
|
return self->host_machine_id;
|
|
}
|
|
|
|
static void
|
|
fu_engine_ensure_security_attrs_tainted (FuEngine *self)
|
|
{
|
|
gboolean disabled_plugins = FALSE;
|
|
GPtrArray *disabled = fu_config_get_disabled_plugins (self->config);
|
|
g_autoptr(FwupdSecurityAttr) attr = fwupd_security_attr_new (FWUPD_SECURITY_ATTR_ID_FWUPD_PLUGINS);
|
|
fwupd_security_attr_set_plugin (attr, "core");
|
|
fwupd_security_attr_add_flag (attr, FWUPD_SECURITY_ATTR_FLAG_RUNTIME_ISSUE);
|
|
|
|
fu_security_attrs_append (self->host_security_attrs, attr);
|
|
for (guint i = 0; i < disabled->len; i++) {
|
|
const gchar *name_tmp = g_ptr_array_index (disabled, i);
|
|
if (!g_str_has_prefix (name_tmp, "test") &&
|
|
g_strcmp0 (name_tmp, "invalid") != 0) {
|
|
disabled_plugins = TRUE;
|
|
break;
|
|
}
|
|
}
|
|
if (self->tainted) {
|
|
fwupd_security_attr_set_result (attr, FWUPD_SECURITY_ATTR_RESULT_TAINTED);
|
|
return;
|
|
}
|
|
if (self->plugin_filter->len > 0 || disabled_plugins) {
|
|
fwupd_security_attr_set_result (attr, FWUPD_SECURITY_ATTR_RESULT_NOT_ENABLED);
|
|
return;
|
|
}
|
|
|
|
/* success */
|
|
fwupd_security_attr_add_flag (attr, FWUPD_SECURITY_ATTR_FLAG_SUCCESS);
|
|
fwupd_security_attr_set_result (attr, FWUPD_SECURITY_ATTR_RESULT_NOT_TAINTED);
|
|
}
|
|
|
|
static gchar *
|
|
fu_engine_attrs_calculate_hsi_for_chassis (FuEngine *self)
|
|
{
|
|
guint val;
|
|
g_autoptr(GError) error = NULL;
|
|
|
|
/* get chassis type from SMBIOS data */
|
|
val = fu_smbios_get_integer (self->smbios,
|
|
FU_SMBIOS_STRUCTURE_TYPE_CHASSIS,
|
|
0x05, &error);
|
|
if (val == G_MAXUINT) {
|
|
g_warning ("failed to get chassis type: %s", error->message);
|
|
return g_strdup ("HSI-INVALID:chassis");
|
|
}
|
|
|
|
/* verify HSI makes sense for this chassis type */
|
|
switch (val) {
|
|
case FU_SMBIOS_CHASSIS_KIND_DESKTOP:
|
|
case FU_SMBIOS_CHASSIS_KIND_LOW_PROFILE_DESKTOP:
|
|
case FU_SMBIOS_CHASSIS_KIND_MINI_TOWER:
|
|
case FU_SMBIOS_CHASSIS_KIND_TOWER:
|
|
case FU_SMBIOS_CHASSIS_KIND_PORTABLE:
|
|
case FU_SMBIOS_CHASSIS_KIND_LAPTOP:
|
|
case FU_SMBIOS_CHASSIS_KIND_NOTEBOOK:
|
|
case FU_SMBIOS_CHASSIS_KIND_ALL_IN_ONE:
|
|
case FU_SMBIOS_CHASSIS_KIND_SUB_NOTEBOOK:
|
|
case FU_SMBIOS_CHASSIS_KIND_LUNCH_BOX:
|
|
case FU_SMBIOS_CHASSIS_KIND_MAIN_SERVER:
|
|
case FU_SMBIOS_CHASSIS_KIND_TABLET:
|
|
case FU_SMBIOS_CHASSIS_KIND_CONVERTIBLE:
|
|
case FU_SMBIOS_CHASSIS_KIND_DETACHABLE:
|
|
case FU_SMBIOS_CHASSIS_KIND_IOT_GATEWAY:
|
|
case FU_SMBIOS_CHASSIS_KIND_EMBEDDED_PC:
|
|
case FU_SMBIOS_CHASSIS_KIND_MINI_PC:
|
|
case FU_SMBIOS_CHASSIS_KIND_STICK_PC:
|
|
return fu_security_attrs_calculate_hsi (self->host_security_attrs,
|
|
FU_SECURITY_ATTRS_FLAG_ADD_VERSION);
|
|
default:
|
|
break;
|
|
}
|
|
|
|
/* failed */
|
|
return g_strdup_printf ("HSI-INVALID:chassis[0x%02x]", val);
|
|
}
|
|
|
|
|
|
static void
|
|
fu_engine_ensure_security_attrs (FuEngine *self)
|
|
{
|
|
GPtrArray *plugins = fu_plugin_list_get_all (self->plugin_list);
|
|
g_autoptr(GPtrArray) items = NULL;
|
|
|
|
/* already valid */
|
|
if (self->host_security_id != NULL)
|
|
return;
|
|
|
|
/* clear old values */
|
|
fu_security_attrs_remove_all (self->host_security_attrs);
|
|
|
|
/* built in */
|
|
fu_engine_ensure_security_attrs_tainted (self);
|
|
|
|
/* call into plugins */
|
|
for (guint j = 0; j < plugins->len; j++) {
|
|
FuPlugin *plugin_tmp = g_ptr_array_index (plugins, j);
|
|
fu_plugin_runner_add_security_attrs (plugin_tmp, self->host_security_attrs);
|
|
}
|
|
|
|
/* set the fallback names for clients without native translations */
|
|
items = fu_security_attrs_get_all (self->host_security_attrs);
|
|
for (guint i = 0; i < items->len; i++) {
|
|
FwupdSecurityAttr *attr = g_ptr_array_index (items, i);
|
|
if (fwupd_security_attr_get_name (attr) == NULL) {
|
|
g_autofree gchar *name_tmp = fu_security_attr_get_name (attr);
|
|
if (name_tmp == NULL) {
|
|
g_warning ("failed to get fallback for %s",
|
|
fwupd_security_attr_get_appstream_id (attr));
|
|
continue;
|
|
}
|
|
fwupd_security_attr_set_name (attr, name_tmp);
|
|
}
|
|
}
|
|
|
|
/* set the obsoletes flag for each attr */
|
|
fu_security_attrs_depsolve (self->host_security_attrs);
|
|
|
|
/* distil into one simple string */
|
|
g_free (self->host_security_id);
|
|
self->host_security_id = fu_engine_attrs_calculate_hsi_for_chassis (self);
|
|
}
|
|
|
|
const gchar *
|
|
fu_engine_get_host_security_id (FuEngine *self)
|
|
{
|
|
g_return_val_if_fail (FU_IS_ENGINE (self), NULL);
|
|
fu_engine_ensure_security_attrs (self);
|
|
return self->host_security_id;
|
|
}
|
|
|
|
FuSecurityAttrs *
|
|
fu_engine_get_host_security_attrs (FuEngine *self)
|
|
{
|
|
g_return_val_if_fail (FU_IS_ENGINE (self), NULL);
|
|
fu_engine_ensure_security_attrs (self);
|
|
return g_object_ref (self->host_security_attrs);
|
|
}
|
|
|
|
gboolean
|
|
fu_engine_load_plugins (FuEngine *self, GError **error)
|
|
{
|
|
const gchar *fn;
|
|
g_autoptr(GDir) dir = NULL;
|
|
g_autofree gchar *plugin_path = NULL;
|
|
g_autofree gchar *suffix = g_strdup_printf (".%s", G_MODULE_SUFFIX);
|
|
g_autoptr(GPtrArray) plugins_disabled = g_ptr_array_new_with_free_func (g_free);
|
|
g_autoptr(GPtrArray) plugins_disabled_rt = g_ptr_array_new_with_free_func (g_free);
|
|
|
|
/* search */
|
|
plugin_path = fu_common_get_path (FU_PATH_KIND_PLUGINDIR_PKG);
|
|
dir = g_dir_open (plugin_path, 0, error);
|
|
if (dir == NULL)
|
|
return FALSE;
|
|
while ((fn = g_dir_read_name (dir)) != NULL) {
|
|
g_autofree gchar *filename = NULL;
|
|
g_autofree gchar *name = NULL;
|
|
g_autoptr(FuPlugin) plugin = NULL;
|
|
g_autoptr(GError) error_local = NULL;
|
|
|
|
/* ignore non-plugins */
|
|
if (!g_str_has_suffix (fn, suffix))
|
|
continue;
|
|
|
|
/* is disabled */
|
|
name = fu_plugin_guess_name_from_fn (fn);
|
|
if (name == NULL)
|
|
continue;
|
|
if (fu_engine_is_plugin_name_disabled (self, name) ||
|
|
!fu_engine_is_plugin_name_enabled (self, name)) {
|
|
g_ptr_array_add (plugins_disabled, g_steal_pointer (&name));
|
|
continue;
|
|
}
|
|
|
|
/* open module */
|
|
filename = g_build_filename (plugin_path, fn, NULL);
|
|
plugin = fu_plugin_new ();
|
|
fu_plugin_set_name (plugin, name);
|
|
fu_plugin_set_hwids (plugin, self->hwids);
|
|
fu_plugin_set_smbios (plugin, self->smbios);
|
|
fu_plugin_set_udev_subsystems (plugin, self->udev_subsystems);
|
|
fu_plugin_set_quirks (plugin, self->quirks);
|
|
fu_plugin_set_runtime_versions (plugin, self->runtime_versions);
|
|
fu_plugin_set_compile_versions (plugin, self->compile_versions);
|
|
g_signal_connect (plugin, "add-firmware-gtype",
|
|
G_CALLBACK (fu_engine_plugin_add_firmware_gtype_cb),
|
|
self);
|
|
|
|
/* if loaded from fu_engine_load() open the plugin */
|
|
if (g_hash_table_size (self->firmware_gtypes) > 0) {
|
|
if (!fu_plugin_open (plugin, filename, &error_local)) {
|
|
g_warning ("cannot load: %s", error_local->message);
|
|
fu_engine_add_plugin (self, plugin);
|
|
continue;
|
|
}
|
|
}
|
|
|
|
/* runtime disabled */
|
|
if (fu_plugin_has_flag (plugin, FWUPD_PLUGIN_FLAG_DISABLED)) {
|
|
g_ptr_array_add (plugins_disabled_rt, g_steal_pointer (&name));
|
|
continue;
|
|
}
|
|
|
|
/* watch for changes */
|
|
g_signal_connect (plugin, "device-added",
|
|
G_CALLBACK (fu_engine_plugin_device_added_cb),
|
|
self);
|
|
g_signal_connect (plugin, "device-removed",
|
|
G_CALLBACK (fu_engine_plugin_device_removed_cb),
|
|
self);
|
|
g_signal_connect (plugin, "device-register",
|
|
G_CALLBACK (fu_engine_plugin_device_register_cb),
|
|
self);
|
|
g_signal_connect (plugin, "recoldplug",
|
|
G_CALLBACK (fu_engine_plugin_recoldplug_cb),
|
|
self);
|
|
g_signal_connect (plugin, "set-coldplug-delay",
|
|
G_CALLBACK (fu_engine_plugin_set_coldplug_delay_cb),
|
|
self);
|
|
g_signal_connect (plugin, "check-supported",
|
|
G_CALLBACK (fu_engine_plugin_check_supported_cb),
|
|
self);
|
|
g_signal_connect (plugin, "rules-changed",
|
|
G_CALLBACK (fu_engine_plugin_rules_changed_cb),
|
|
self);
|
|
g_signal_connect (plugin, "security-changed",
|
|
G_CALLBACK (fu_engine_plugin_security_changed_cb),
|
|
self);
|
|
|
|
/* add */
|
|
fu_engine_add_plugin (self, plugin);
|
|
}
|
|
|
|
/* show list */
|
|
if (plugins_disabled->len > 0) {
|
|
g_autofree gchar *str = NULL;
|
|
g_ptr_array_add (plugins_disabled, NULL);
|
|
str = g_strjoinv (", ", (gchar **) plugins_disabled->pdata);
|
|
g_debug ("plugins disabled: %s", str);
|
|
}
|
|
if (plugins_disabled_rt->len > 0) {
|
|
g_autofree gchar *str = NULL;
|
|
g_ptr_array_add (plugins_disabled_rt, NULL);
|
|
str = g_strjoinv (", ", (gchar **) plugins_disabled_rt->pdata);
|
|
g_debug ("plugins runtime-disabled: %s", str);
|
|
}
|
|
|
|
/* depsolve into the correct order */
|
|
if (!fu_plugin_list_depsolve (self->plugin_list, error))
|
|
return FALSE;
|
|
|
|
/* success */
|
|
return TRUE;
|
|
}
|
|
|
|
static gboolean
|
|
fu_engine_cleanup_state (GError **error)
|
|
{
|
|
const gchar *filenames[] = {
|
|
"/var/cache/app-info/xmls/fwupd-verify.xml",
|
|
"/var/cache/app-info/xmls/fwupd.xml",
|
|
NULL };
|
|
for (guint i = 0; filenames[i] != NULL; i++) {
|
|
g_autoptr(GFile) file = g_file_new_for_path (filenames[i]);
|
|
if (g_file_query_exists (file, NULL)) {
|
|
if (!g_file_delete (file, NULL, error))
|
|
return FALSE;
|
|
}
|
|
}
|
|
return TRUE;
|
|
}
|
|
|
|
guint64
|
|
fu_engine_get_archive_size_max (FuEngine *self)
|
|
{
|
|
return fu_config_get_archive_size_max (self->config);
|
|
}
|
|
|
|
static void
|
|
fu_engine_backend_device_removed_cb (FuBackend *backend, FuDevice *device, FuEngine *self)
|
|
{
|
|
g_autoptr(GPtrArray) devices = NULL;
|
|
|
|
/* debug */
|
|
if (g_getenv ("FWUPD_PROBE_VERBOSE") != NULL) {
|
|
g_debug ("%s removed %s",
|
|
fu_backend_get_name (backend),
|
|
fu_device_get_backend_id (device));
|
|
}
|
|
|
|
/* go through each device and remove any that match */
|
|
devices = fu_device_list_get_all (self->device_list);
|
|
for (guint i = 0; i < devices->len; i++) {
|
|
FuDevice *device_tmp = g_ptr_array_index (devices, i);
|
|
if (g_strcmp0 (fu_device_get_backend_id (device_tmp),
|
|
fu_device_get_backend_id (device)) == 0) {
|
|
g_debug ("auto-removing backend device");
|
|
fu_device_list_remove (self->device_list, device_tmp);
|
|
}
|
|
}
|
|
}
|
|
|
|
static void
|
|
fu_engine_backend_device_added_cb (FuBackend *backend, FuDevice *device, FuEngine *self)
|
|
{
|
|
g_autoptr(GError) error_local = NULL;
|
|
g_autoptr(GPtrArray) possible_plugins = NULL;
|
|
|
|
/* super useful for plugin development */
|
|
if (g_getenv ("FWUPD_PROBE_VERBOSE") != NULL) {
|
|
g_autofree gchar *str = fu_device_to_string (FU_DEVICE (device));
|
|
g_debug ("%s added %s", fu_backend_get_name (backend), str);
|
|
}
|
|
|
|
/* add any extra quirks */
|
|
fu_device_set_quirks (device, self->quirks);
|
|
if (!fu_device_probe (device, &error_local)) {
|
|
g_warning ("failed to probe device %s: %s",
|
|
fu_device_get_backend_id (device),
|
|
error_local->message);
|
|
return;
|
|
}
|
|
|
|
/* super useful for plugin development */
|
|
if (g_getenv ("FWUPD_PROBE_VERBOSE") != NULL) {
|
|
g_autofree gchar *str = fu_device_to_string (FU_DEVICE (device));
|
|
g_debug ("%s added %s", fu_backend_get_name (backend), str);
|
|
}
|
|
|
|
/* can be specified using a quirk */
|
|
possible_plugins = fu_device_get_possible_plugins (device);
|
|
for (guint i = 0; i < possible_plugins->len; i++) {
|
|
FuPlugin *plugin;
|
|
const gchar *plugin_name = g_ptr_array_index (possible_plugins, i);
|
|
g_autoptr(GError) error = NULL;
|
|
|
|
plugin = fu_plugin_list_find_by_name (self->plugin_list, plugin_name, NULL);
|
|
if (plugin == NULL)
|
|
continue;
|
|
if (!fu_plugin_runner_backend_device_added (plugin, device, &error)) {
|
|
if (g_error_matches (error, FWUPD_ERROR, FWUPD_ERROR_NOT_SUPPORTED)) {
|
|
if (g_getenv ("FWUPD_PROBE_VERBOSE") != NULL) {
|
|
g_debug ("%s ignoring: %s",
|
|
fu_plugin_get_name (plugin),
|
|
error->message);
|
|
}
|
|
continue;
|
|
}
|
|
g_warning ("failed to add device %s: %s",
|
|
fu_device_get_backend_id (device),
|
|
error->message);
|
|
continue;
|
|
}
|
|
}
|
|
}
|
|
|
|
static void
|
|
fu_engine_backend_device_changed_cb (FuBackend *backend, FuDevice *device, FuEngine *self)
|
|
{
|
|
GPtrArray *plugins = fu_plugin_list_get_all (self->plugin_list);
|
|
g_autoptr(GPtrArray) devices = NULL;
|
|
|
|
/* debug */
|
|
if (g_getenv ("FWUPD_PROBE_VERBOSE") != NULL) {
|
|
g_debug ("%s changed %s",
|
|
fu_backend_get_name (backend),
|
|
fu_device_get_physical_id (device));
|
|
}
|
|
|
|
/* emit changed on any that match */
|
|
devices = fu_device_list_get_all (self->device_list);
|
|
for (guint i = 0; i < devices->len; i++) {
|
|
FuDevice *device_tmp = g_ptr_array_index (devices, i);
|
|
if (!FU_IS_UDEV_DEVICE (device_tmp))
|
|
continue;
|
|
if (g_strcmp0 (fu_udev_device_get_sysfs_path (FU_UDEV_DEVICE (device_tmp)),
|
|
fu_udev_device_get_sysfs_path (FU_UDEV_DEVICE (device))) == 0) {
|
|
fu_udev_device_emit_changed (FU_UDEV_DEVICE (device));
|
|
}
|
|
}
|
|
|
|
/* run all plugins */
|
|
for (guint j = 0; j < plugins->len; j++) {
|
|
FuPlugin *plugin_tmp = g_ptr_array_index (plugins, j);
|
|
g_autoptr(GError) error = NULL;
|
|
if (!fu_plugin_runner_backend_device_changed (plugin_tmp, device, &error)) {
|
|
if (g_error_matches (error, FWUPD_ERROR, FWUPD_ERROR_NOT_SUPPORTED)) {
|
|
g_debug ("%s ignoring: %s",
|
|
fu_plugin_get_name (plugin_tmp),
|
|
error->message);
|
|
continue;
|
|
}
|
|
g_warning ("%s failed to change udev device %s: %s",
|
|
fu_plugin_get_name (plugin_tmp),
|
|
fu_udev_device_get_sysfs_path (FU_UDEV_DEVICE (device)),
|
|
error->message);
|
|
}
|
|
}
|
|
}
|
|
|
|
static void
|
|
fu_engine_load_quirks_for_hwid (FuEngine *self, const gchar *hwid)
|
|
{
|
|
FuPlugin *plugin;
|
|
const gchar *value;
|
|
g_auto(GStrv) plugins = NULL;
|
|
|
|
/* does prefixed quirk exist */
|
|
value = fu_quirks_lookup_by_id (self->quirks, hwid, FU_QUIRKS_PLUGIN);
|
|
if (value == NULL)
|
|
return;
|
|
plugins = g_strsplit (value, ",", -1);
|
|
for (guint i = 0; plugins[i] != NULL; i++) {
|
|
g_autoptr(GError) error_local = NULL;
|
|
plugin = fu_plugin_list_find_by_name (self->plugin_list,
|
|
plugins[i], &error_local);
|
|
if (plugin == NULL) {
|
|
g_debug ("no %s plugin for HwId %s: %s",
|
|
plugins[i], hwid, error_local->message);
|
|
continue;
|
|
}
|
|
g_debug ("enabling %s due to HwId %s", plugins[i], hwid);
|
|
fu_plugin_remove_flag (plugin, FWUPD_PLUGIN_FLAG_REQUIRE_HWID);
|
|
}
|
|
}
|
|
|
|
static void
|
|
fu_engine_load_quirks (FuEngine *self, FuQuirksLoadFlags quirks_flags)
|
|
{
|
|
GPtrArray *hwids = fu_hwids_get_guids (self->hwids);
|
|
g_autoptr(GError) error = NULL;
|
|
|
|
/* rebuild silo if required */
|
|
if (!fu_quirks_load (self->quirks, quirks_flags, &error)) {
|
|
g_warning ("Failed to load quirks: %s", error->message);
|
|
return;
|
|
}
|
|
|
|
/* search each hwid */
|
|
for (guint i = 0; i < hwids->len; i++) {
|
|
const gchar *hwid = g_ptr_array_index (hwids, i);
|
|
fu_engine_load_quirks_for_hwid (self, hwid);
|
|
}
|
|
}
|
|
|
|
static void
|
|
fu_engine_load_smbios (FuEngine *self)
|
|
{
|
|
g_autoptr(GError) error = NULL;
|
|
if (!fu_smbios_setup (self->smbios, &error))
|
|
g_warning ("Failed to load SMBIOS: %s", error->message);
|
|
}
|
|
|
|
static void
|
|
fu_engine_load_hwids (FuEngine *self)
|
|
{
|
|
g_autoptr(GError) error = NULL;
|
|
if (!fu_hwids_setup (self->hwids, self->smbios, &error))
|
|
g_warning ("Failed to load HWIDs: %s", error->message);
|
|
}
|
|
|
|
static gboolean
|
|
fu_engine_update_history_device (FuEngine *self, FuDevice *dev_history, GError **error)
|
|
{
|
|
FuPlugin *plugin;
|
|
FwupdRelease *rel_history;
|
|
g_autofree gchar *btime = NULL;
|
|
g_autoptr(FuDevice) dev = NULL;
|
|
g_autoptr(GHashTable) metadata_device = NULL;
|
|
|
|
/* is in the device list */
|
|
dev = fu_device_list_get_by_id (self->device_list,
|
|
fu_device_get_id (dev_history),
|
|
error);
|
|
if (dev == NULL)
|
|
return FALSE;
|
|
|
|
/* does the installed version match what we tried to install
|
|
* before fwupd was restarted */
|
|
rel_history = fu_device_get_release_default (dev_history);
|
|
if (rel_history == NULL) {
|
|
g_set_error_literal (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_INTERNAL,
|
|
"no release for history FuDevice");
|
|
return FALSE;
|
|
}
|
|
|
|
/* is this the same boot time as when we scheduled the update,
|
|
* i.e. has fwupd been restarted before we rebooted */
|
|
btime = fu_engine_get_boot_time ();
|
|
if (g_strcmp0 (fwupd_release_get_metadata_item (rel_history, "BootTime"),
|
|
btime) == 0) {
|
|
g_debug ("service restarted, but no reboot has taken place");
|
|
|
|
/* if it needed reboot then, it also needs it now... */
|
|
if (fu_device_get_update_state (dev_history) == FWUPD_UPDATE_STATE_NEEDS_REBOOT) {
|
|
g_debug ("inheriting needs-reboot for %s",
|
|
fu_device_get_name (dev));
|
|
fu_device_set_update_state (dev, FWUPD_UPDATE_STATE_NEEDS_REBOOT);
|
|
}
|
|
return TRUE;
|
|
}
|
|
|
|
/* save any additional report metadata */
|
|
metadata_device = fu_device_report_metadata_post (dev);
|
|
if (metadata_device != NULL && g_hash_table_size (metadata_device) > 0) {
|
|
fwupd_release_add_metadata (rel_history, metadata_device);
|
|
if (!fu_history_set_device_metadata (self->history,
|
|
fu_device_get_id (dev_history),
|
|
fwupd_release_get_metadata (rel_history),
|
|
error)) {
|
|
g_prefix_error (error, "failed to set metadata: ");
|
|
return FALSE;
|
|
}
|
|
}
|
|
|
|
/* the system is running with the new firmware version */
|
|
if (fu_common_vercmp_full (fu_device_get_version (dev),
|
|
fwupd_release_get_version (rel_history),
|
|
fu_device_get_version_format (dev)) == 0) {
|
|
GPtrArray *checksums;
|
|
g_debug ("installed version %s matching history %s",
|
|
fu_device_get_version (dev),
|
|
fwupd_release_get_version (rel_history));
|
|
|
|
/* copy over runtime checksums if set from probe() */
|
|
checksums = fu_device_get_checksums (dev);
|
|
for (guint i = 0; i < checksums->len; i++) {
|
|
const gchar *csum = g_ptr_array_index (checksums, i);
|
|
fu_device_add_checksum (dev_history, csum);
|
|
}
|
|
fu_device_set_version_format (dev_history, fu_device_get_version_format (dev));
|
|
fu_device_set_version (dev_history, fu_device_get_version (dev));
|
|
fu_device_remove_flag (dev_history, FWUPD_DEVICE_FLAG_NEEDS_ACTIVATION);
|
|
fu_device_set_update_state (dev_history, FWUPD_UPDATE_STATE_SUCCESS);
|
|
fu_device_set_update_error (dev_history, NULL);
|
|
return fu_history_modify_device (self->history, dev_history, error);
|
|
}
|
|
|
|
/* does the plugin know the update failure */
|
|
plugin = fu_plugin_list_find_by_name (self->plugin_list,
|
|
fu_device_get_plugin (dev),
|
|
error);
|
|
if (plugin == NULL)
|
|
return FALSE;
|
|
if (!fu_plugin_runner_get_results (plugin, dev, error))
|
|
return FALSE;
|
|
|
|
/* the plugin either can't tell us the error, or doesn't know itself */
|
|
if (fu_device_get_update_state (dev) != FWUPD_UPDATE_STATE_FAILED &&
|
|
fu_device_get_update_state (dev) != FWUPD_UPDATE_STATE_FAILED_TRANSIENT) {
|
|
g_debug ("falling back to generic failure");
|
|
fu_device_set_update_state (dev_history, FWUPD_UPDATE_STATE_FAILED);
|
|
fu_device_set_update_error (dev_history, "failed to run update on reboot");
|
|
} else {
|
|
fu_device_set_update_state (dev_history, fu_device_get_update_state (dev));
|
|
fu_device_set_update_error (dev_history, fu_device_get_update_error (dev));
|
|
}
|
|
|
|
/* update the state in the database */
|
|
return fu_history_modify_device (self->history, dev_history, error);
|
|
}
|
|
|
|
static gboolean
|
|
fu_engine_update_history_database (FuEngine *self, GError **error)
|
|
{
|
|
g_autoptr(GPtrArray) devices = NULL;
|
|
|
|
/* get any devices */
|
|
devices = fu_history_get_devices (self->history, error);
|
|
if (devices == NULL)
|
|
return FALSE;
|
|
for (guint i = 0; i < devices->len; i++) {
|
|
FuDevice *dev = g_ptr_array_index (devices, i);
|
|
g_autoptr(GError) error_local = NULL;
|
|
|
|
/* not in the required state */
|
|
if (fu_device_get_update_state (dev) != FWUPD_UPDATE_STATE_NEEDS_REBOOT &&
|
|
fu_device_get_update_state (dev) != FWUPD_UPDATE_STATE_PENDING)
|
|
continue;
|
|
|
|
/* try to save the new update-state, but ignoring any error */
|
|
if (!fu_engine_update_history_device (self, dev, &error_local)) {
|
|
g_warning ("failed to update history database: %s",
|
|
error_local->message);
|
|
}
|
|
}
|
|
return TRUE;
|
|
}
|
|
|
|
static void
|
|
fu_engine_ensure_client_certificate (FuEngine *self)
|
|
{
|
|
g_autoptr(GBytes) blob = g_bytes_new_static ("test\0", 5);
|
|
g_autoptr(GError) error = NULL;
|
|
g_autoptr(JcatBlob) jcat_sig = NULL;
|
|
g_autoptr(JcatEngine) jcat_engine = NULL;
|
|
|
|
/* create keyring and sign dummy data to ensure certificate exists */
|
|
jcat_engine = jcat_context_get_engine (self->jcat_context,
|
|
JCAT_BLOB_KIND_PKCS7,
|
|
&error);
|
|
if (jcat_engine == NULL) {
|
|
g_message ("failed to create keyring: %s", error->message);
|
|
return;
|
|
}
|
|
jcat_sig = jcat_engine_self_sign (jcat_engine, blob, JCAT_SIGN_FLAG_NONE, &error);
|
|
if (jcat_sig == NULL) {
|
|
g_message ("failed to sign using keyring: %s", error->message);
|
|
return;
|
|
}
|
|
g_debug ("client certificate exists and working");
|
|
}
|
|
|
|
/**
|
|
* fu_engine_load:
|
|
* @self: A #FuEngine
|
|
* @flags: #FuEngineLoadFlags, e.g. %FU_ENGINE_LOAD_FLAG_READONLY
|
|
* @error: A #GError, or %NULL
|
|
*
|
|
* Load the firmware update engine so it is ready for use.
|
|
*
|
|
* Returns: %TRUE for success
|
|
**/
|
|
gboolean
|
|
fu_engine_load (FuEngine *self, FuEngineLoadFlags flags, GError **error)
|
|
{
|
|
FuQuirksLoadFlags quirks_flags = FU_QUIRKS_LOAD_FLAG_NONE;
|
|
guint backend_cnt = 0;
|
|
g_autoptr(GPtrArray) checksums_approved = NULL;
|
|
g_autoptr(GPtrArray) checksums_blocked = NULL;
|
|
#ifndef _WIN32
|
|
g_autoptr(GError) error_local = NULL;
|
|
#endif
|
|
|
|
g_return_val_if_fail (FU_IS_ENGINE (self), FALSE);
|
|
g_return_val_if_fail (error == NULL || *error == NULL, FALSE);
|
|
|
|
/* avoid re-loading a second time if fu-tool or fu-util request to */
|
|
if (self->loaded)
|
|
return TRUE;
|
|
|
|
/* TODO: Read registry key [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography] "MachineGuid" */
|
|
#ifndef _WIN32
|
|
/* cache machine ID so we can use it from a sandboxed app */
|
|
self->host_machine_id = fwupd_build_machine_id ("fwupd", &error_local);
|
|
if (self->host_machine_id == NULL)
|
|
g_debug ("failed to build machine-id: %s", error_local->message);
|
|
#endif
|
|
/* read config file */
|
|
if (!fu_config_load (self->config, error)) {
|
|
g_prefix_error (error, "Failed to load config: ");
|
|
return FALSE;
|
|
}
|
|
|
|
/* read remotes */
|
|
if (flags & FU_ENGINE_LOAD_FLAG_REMOTES) {
|
|
FuRemoteListLoadFlags remote_list_flags = FU_REMOTE_LIST_LOAD_FLAG_NONE;
|
|
if (flags & FU_ENGINE_LOAD_FLAG_READONLY)
|
|
remote_list_flags |= FU_REMOTE_LIST_LOAD_FLAG_READONLY_FS;
|
|
if (!fu_remote_list_load (self->remote_list, remote_list_flags, error)) {
|
|
g_prefix_error (error, "Failed to load remotes: ");
|
|
return FALSE;
|
|
}
|
|
}
|
|
|
|
/* create client certificate */
|
|
fu_engine_ensure_client_certificate (self);
|
|
|
|
/* get hardcoded approved and blocked firmware */
|
|
checksums_approved = fu_config_get_approved_firmware (self->config);
|
|
for (guint i = 0; i < checksums_approved->len; i++) {
|
|
const gchar *csum = g_ptr_array_index (checksums_approved, i);
|
|
fu_engine_add_approved_firmware (self, csum);
|
|
}
|
|
checksums_blocked = fu_config_get_blocked_firmware (self->config);
|
|
for (guint i = 0; i < checksums_blocked->len; i++) {
|
|
const gchar *csum = g_ptr_array_index (checksums_blocked, i);
|
|
fu_engine_add_blocked_firmware (self, csum);
|
|
}
|
|
|
|
/* get extra firmware saved to the database */
|
|
checksums_approved = fu_history_get_approved_firmware (self->history, error);
|
|
if (checksums_approved == NULL)
|
|
return FALSE;
|
|
for (guint i = 0; i < checksums_approved->len; i++) {
|
|
const gchar *csum = g_ptr_array_index (checksums_approved, i);
|
|
fu_engine_add_approved_firmware (self, csum);
|
|
}
|
|
checksums_blocked = fu_history_get_blocked_firmware (self->history, error);
|
|
if (checksums_blocked == NULL)
|
|
return FALSE;
|
|
for (guint i = 0; i < checksums_blocked->len; i++) {
|
|
const gchar *csum = g_ptr_array_index (checksums_blocked, i);
|
|
fu_engine_add_blocked_firmware (self, csum);
|
|
}
|
|
|
|
/* set up idle exit */
|
|
if ((self->app_flags & FU_APP_FLAGS_NO_IDLE_SOURCES) == 0)
|
|
fu_idle_set_timeout (self->idle, fu_config_get_idle_timeout (self->config));
|
|
|
|
/* load SMBIOS and the hwids */
|
|
if (flags & FU_ENGINE_LOAD_FLAG_HWINFO) {
|
|
fu_engine_load_smbios (self);
|
|
fu_engine_load_hwids (self);
|
|
}
|
|
|
|
/* load AppStream metadata */
|
|
if (!fu_engine_load_metadata_store (self, flags, error)) {
|
|
g_prefix_error (error, "Failed to load AppStream data: ");
|
|
return FALSE;
|
|
}
|
|
|
|
/* add the "built-in" firmware types */
|
|
fu_engine_add_firmware_gtype (self, "raw", FU_TYPE_FIRMWARE);
|
|
fu_engine_add_firmware_gtype (self, "dfu", FU_TYPE_DFU_FIRMWARE);
|
|
fu_engine_add_firmware_gtype (self, "dfuse", FU_TYPE_DFUSE_FIRMWARE);
|
|
fu_engine_add_firmware_gtype (self, "fmap", FU_TYPE_FMAP_FIRMWARE);
|
|
fu_engine_add_firmware_gtype (self, "ihex", FU_TYPE_IHEX_FIRMWARE);
|
|
fu_engine_add_firmware_gtype (self, "srec", FU_TYPE_SREC_FIRMWARE);
|
|
fu_engine_add_firmware_gtype (self, "smbios", FU_TYPE_SMBIOS);
|
|
|
|
/* set up backends */
|
|
for (guint i = 0; i < self->backends->len; i++) {
|
|
FuBackend *backend = g_ptr_array_index (self->backends, i);
|
|
g_autoptr(GError) error_backend = NULL;
|
|
if (!fu_backend_setup (backend, &error_backend)) {
|
|
g_debug ("failed to setup backend %s: %s",
|
|
fu_backend_get_name (backend),
|
|
error_backend->message);
|
|
continue;
|
|
}
|
|
backend_cnt++;
|
|
}
|
|
if (backend_cnt == 0) {
|
|
g_set_error_literal (error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_NOT_SUPPORTED,
|
|
"all backends failed setup");
|
|
return FALSE;
|
|
}
|
|
|
|
/* delete old data files */
|
|
if (!fu_engine_cleanup_state (error)) {
|
|
g_prefix_error (error, "Failed to clean up: ");
|
|
return FALSE;
|
|
}
|
|
|
|
/* load plugin */
|
|
if (!fu_engine_load_plugins (self, error)) {
|
|
g_prefix_error (error, "Failed to load plugins: ");
|
|
return FALSE;
|
|
}
|
|
|
|
/* on a read-only filesystem don't care about the cache GUID */
|
|
if (flags & FU_ENGINE_LOAD_FLAG_READONLY)
|
|
quirks_flags |= FU_QUIRKS_LOAD_FLAG_READONLY_FS;
|
|
fu_engine_load_quirks (self, quirks_flags);
|
|
|
|
/* watch the device list for updates and proxy */
|
|
g_signal_connect (self->device_list, "added",
|
|
G_CALLBACK (fu_engine_device_added_cb),
|
|
self);
|
|
g_signal_connect (self->device_list, "removed",
|
|
G_CALLBACK (fu_engine_device_removed_cb),
|
|
self);
|
|
g_signal_connect (self->device_list, "changed",
|
|
G_CALLBACK (fu_engine_device_changed_cb),
|
|
self);
|
|
fu_engine_set_status (self, FWUPD_STATUS_LOADING);
|
|
|
|
/* add devices */
|
|
fu_engine_plugins_setup (self);
|
|
if (flags & FU_ENGINE_LOAD_FLAG_COLDPLUG)
|
|
fu_engine_plugins_coldplug (self, FALSE);
|
|
|
|
/* coldplug backends */
|
|
if (flags & FU_ENGINE_LOAD_FLAG_COLDPLUG) {
|
|
for (guint i = 0; i < self->backends->len; i++) {
|
|
FuBackend *backend = g_ptr_array_index (self->backends, i);
|
|
g_autoptr(GError) error_backend = NULL;
|
|
if (!fu_backend_get_enabled (backend))
|
|
continue;
|
|
g_signal_connect (backend, "device-added",
|
|
G_CALLBACK (fu_engine_backend_device_added_cb),
|
|
self);
|
|
g_signal_connect (backend, "device-removed",
|
|
G_CALLBACK (fu_engine_backend_device_removed_cb),
|
|
self);
|
|
g_signal_connect (backend, "device-changed",
|
|
G_CALLBACK (fu_engine_backend_device_changed_cb),
|
|
self);
|
|
if (!fu_backend_coldplug (backend, &error_backend)) {
|
|
g_warning ("failed to coldplug backend %s: %s",
|
|
fu_backend_get_name (backend),
|
|
error_backend->message);
|
|
continue;
|
|
}
|
|
}
|
|
}
|
|
|
|
/* set device properties from the metadata */
|
|
fu_engine_md_refresh_devices (self);
|
|
|
|
/* update the db for devices that were updated during the reboot */
|
|
if (!fu_engine_update_history_database (self, error))
|
|
return FALSE;
|
|
|
|
fu_engine_set_status (self, FWUPD_STATUS_IDLE);
|
|
self->loaded = TRUE;
|
|
|
|
/* let clients know engine finished starting up */
|
|
fu_engine_emit_changed (self);
|
|
|
|
/* success */
|
|
return TRUE;
|
|
}
|
|
|
|
static void
|
|
fu_engine_class_init (FuEngineClass *klass)
|
|
{
|
|
GObjectClass *object_class = G_OBJECT_CLASS (klass);
|
|
object_class->finalize = fu_engine_finalize;
|
|
|
|
signals[SIGNAL_CHANGED] =
|
|
g_signal_new ("changed",
|
|
G_TYPE_FROM_CLASS (object_class), G_SIGNAL_RUN_LAST,
|
|
0, NULL, NULL, g_cclosure_marshal_VOID__VOID,
|
|
G_TYPE_NONE, 0);
|
|
signals[SIGNAL_DEVICE_ADDED] =
|
|
g_signal_new ("device-added",
|
|
G_TYPE_FROM_CLASS (object_class), G_SIGNAL_RUN_LAST,
|
|
0, NULL, NULL, g_cclosure_marshal_VOID__OBJECT,
|
|
G_TYPE_NONE, 1, FU_TYPE_DEVICE);
|
|
signals[SIGNAL_DEVICE_REMOVED] =
|
|
g_signal_new ("device-removed",
|
|
G_TYPE_FROM_CLASS (object_class), G_SIGNAL_RUN_LAST,
|
|
0, NULL, NULL, g_cclosure_marshal_VOID__OBJECT,
|
|
G_TYPE_NONE, 1, FU_TYPE_DEVICE);
|
|
signals[SIGNAL_DEVICE_CHANGED] =
|
|
g_signal_new ("device-changed",
|
|
G_TYPE_FROM_CLASS (object_class), G_SIGNAL_RUN_LAST,
|
|
0, NULL, NULL, g_cclosure_marshal_VOID__OBJECT,
|
|
G_TYPE_NONE, 1, FU_TYPE_DEVICE);
|
|
signals[SIGNAL_STATUS_CHANGED] =
|
|
g_signal_new ("status-changed",
|
|
G_TYPE_FROM_CLASS (object_class), G_SIGNAL_RUN_LAST,
|
|
0, NULL, NULL, g_cclosure_marshal_VOID__UINT,
|
|
G_TYPE_NONE, 1, G_TYPE_UINT);
|
|
signals[SIGNAL_PERCENTAGE_CHANGED] =
|
|
g_signal_new ("percentage-changed",
|
|
G_TYPE_FROM_CLASS (object_class), G_SIGNAL_RUN_LAST,
|
|
0, NULL, NULL, g_cclosure_marshal_VOID__UINT,
|
|
G_TYPE_NONE, 1, G_TYPE_UINT);
|
|
}
|
|
|
|
void
|
|
fu_engine_add_runtime_version (FuEngine *self,
|
|
const gchar *component_id,
|
|
const gchar *version)
|
|
{
|
|
g_hash_table_insert (self->runtime_versions,
|
|
g_strdup (component_id),
|
|
g_strdup (version));
|
|
}
|
|
|
|
void
|
|
fu_engine_add_app_flag (FuEngine *self, FuAppFlags app_flags)
|
|
{
|
|
g_return_if_fail (FU_IS_ENGINE (self));
|
|
self->app_flags |= app_flags;
|
|
}
|
|
|
|
static void
|
|
fu_engine_idle_status_notify_cb (FuIdle *idle, GParamSpec *pspec, FuEngine *self)
|
|
{
|
|
FwupdStatus status = fu_idle_get_status (idle);
|
|
if (status == FWUPD_STATUS_SHUTDOWN)
|
|
fu_engine_set_status (self, status);
|
|
}
|
|
|
|
static void
|
|
fu_engine_init (FuEngine *self)
|
|
{
|
|
#ifdef HAVE_UTSNAME_H
|
|
struct utsname uname_tmp;
|
|
#endif
|
|
g_autofree gchar *keyring_path = NULL;
|
|
g_autofree gchar *pkidir_fw = NULL;
|
|
g_autofree gchar *pkidir_md = NULL;
|
|
g_autofree gchar *sysconfdir = NULL;
|
|
self->percentage = 0;
|
|
self->status = FWUPD_STATUS_IDLE;
|
|
self->config = fu_config_new ();
|
|
self->remote_list = fu_remote_list_new ();
|
|
self->device_list = fu_device_list_new ();
|
|
self->smbios = fu_smbios_new ();
|
|
self->hwids = fu_hwids_new ();
|
|
self->idle = fu_idle_new ();
|
|
self->quirks = fu_quirks_new ();
|
|
self->history = fu_history_new ();
|
|
self->plugin_list = fu_plugin_list_new ();
|
|
self->plugin_filter = g_ptr_array_new_with_free_func (g_free);
|
|
self->host_security_attrs = fu_security_attrs_new ();
|
|
self->udev_subsystems = g_ptr_array_new_with_free_func (g_free);
|
|
self->backends = g_ptr_array_new_with_free_func ((GDestroyNotify) g_object_unref);
|
|
self->runtime_versions = g_hash_table_new_full (g_str_hash, g_str_equal, g_free, g_free);
|
|
self->compile_versions = g_hash_table_new_full (g_str_hash, g_str_equal, g_free, g_free);
|
|
self->firmware_gtypes = g_hash_table_new_full (g_str_hash, g_str_equal, g_free, NULL);
|
|
|
|
g_signal_connect (self->config, "changed",
|
|
G_CALLBACK (fu_engine_config_changed_cb),
|
|
self);
|
|
g_signal_connect (self->remote_list, "changed",
|
|
G_CALLBACK (fu_engine_remote_list_changed_cb),
|
|
self);
|
|
|
|
g_signal_connect (self->idle, "notify::status",
|
|
G_CALLBACK (fu_engine_idle_status_notify_cb), self);
|
|
|
|
/* backends */
|
|
#ifdef HAVE_GUSB
|
|
g_ptr_array_add (self->backends, fu_usb_backend_new ());
|
|
#endif
|
|
#ifdef HAVE_GUDEV
|
|
g_ptr_array_add (self->backends, fu_udev_backend_new (self->udev_subsystems));
|
|
#endif
|
|
#ifdef HAVE_BLUEZ
|
|
g_ptr_array_add (self->backends, fu_bluez_backend_new ());
|
|
#endif
|
|
|
|
/* setup Jcat context */
|
|
self->jcat_context = jcat_context_new ();
|
|
keyring_path = fu_common_get_path (FU_PATH_KIND_LOCALSTATEDIR_PKG);
|
|
jcat_context_set_keyring_path (self->jcat_context, keyring_path);
|
|
sysconfdir = fu_common_get_path (FU_PATH_KIND_SYSCONFDIR);
|
|
pkidir_fw = g_build_filename (sysconfdir, "pki", "fwupd", NULL);
|
|
jcat_context_add_public_keys (self->jcat_context, pkidir_fw);
|
|
pkidir_md = g_build_filename (sysconfdir, "pki", "fwupd-metadata", NULL);
|
|
jcat_context_add_public_keys (self->jcat_context, pkidir_md);
|
|
|
|
/* add some runtime versions of things the daemon depends on */
|
|
fu_engine_add_runtime_version (self, "org.freedesktop.fwupd", VERSION);
|
|
fu_engine_add_runtime_version (self, "com.redhat.fwupdate", "12");
|
|
fu_engine_add_runtime_version (self, "org.freedesktop.appstream-glib", "0.7.14");
|
|
#if G_USB_CHECK_VERSION(0,3,1)
|
|
fu_engine_add_runtime_version (self, "org.freedesktop.gusb", g_usb_version_string ());
|
|
#endif
|
|
|
|
/* optional kernel version */
|
|
#ifdef HAVE_UTSNAME_H
|
|
memset (&uname_tmp, 0, sizeof(uname_tmp));
|
|
if (uname (&uname_tmp) >= 0)
|
|
fu_engine_add_runtime_version (self, "org.kernel", uname_tmp.release);
|
|
#endif
|
|
|
|
g_hash_table_insert (self->compile_versions,
|
|
g_strdup ("com.redhat.fwupdate"),
|
|
g_strdup ("12"));
|
|
g_hash_table_insert (self->compile_versions,
|
|
g_strdup ("org.freedesktop.fwupd"),
|
|
g_strdup (VERSION));
|
|
#ifdef HAVE_GUSB
|
|
g_hash_table_insert (self->compile_versions,
|
|
g_strdup ("org.freedesktop.gusb"),
|
|
g_strdup_printf ("%i.%i.%i",
|
|
G_USB_MAJOR_VERSION,
|
|
G_USB_MINOR_VERSION,
|
|
G_USB_MICRO_VERSION));
|
|
#endif
|
|
}
|
|
|
|
static void
|
|
fu_engine_finalize (GObject *obj)
|
|
{
|
|
FuEngine *self = FU_ENGINE (obj);
|
|
|
|
if (self->silo != NULL)
|
|
g_object_unref (self->silo);
|
|
if (self->coldplug_id != 0)
|
|
g_source_remove (self->coldplug_id);
|
|
if (self->approved_firmware != NULL)
|
|
g_hash_table_unref (self->approved_firmware);
|
|
if (self->blocked_firmware != NULL)
|
|
g_hash_table_unref (self->blocked_firmware);
|
|
|
|
g_free (self->host_machine_id);
|
|
g_free (self->host_security_id);
|
|
g_object_unref (self->host_security_attrs);
|
|
g_object_unref (self->idle);
|
|
g_object_unref (self->config);
|
|
g_object_unref (self->remote_list);
|
|
g_object_unref (self->smbios);
|
|
g_object_unref (self->quirks);
|
|
g_object_unref (self->hwids);
|
|
g_object_unref (self->history);
|
|
g_object_unref (self->device_list);
|
|
g_object_unref (self->jcat_context);
|
|
g_ptr_array_unref (self->plugin_filter);
|
|
g_ptr_array_unref (self->udev_subsystems);
|
|
g_ptr_array_unref (self->backends);
|
|
g_hash_table_unref (self->runtime_versions);
|
|
g_hash_table_unref (self->compile_versions);
|
|
g_hash_table_unref (self->firmware_gtypes);
|
|
g_object_unref (self->plugin_list);
|
|
|
|
G_OBJECT_CLASS (fu_engine_parent_class)->finalize (obj);
|
|
}
|
|
|
|
FuEngine *
|
|
fu_engine_new (FuAppFlags app_flags)
|
|
{
|
|
FuEngine *self;
|
|
self = g_object_new (FU_TYPE_ENGINE, NULL);
|
|
self->app_flags = app_flags;
|
|
return FU_ENGINE (self);
|
|
}
|