2 ###############################################################################
5 # Copyright (C) 2010, 2011 IPFire Team (www.ipfire.org) #
7 # This program is free software: you can redistribute it and/or modify #
8 # it under the terms of the GNU General Public License as published by #
9 # the Free Software Foundation, either version 3 of the License, or #
10 # (at your option) any later version. #
12 # This program is distributed in the hope that it will be useful, #
13 # but WITHOUT ANY WARRANTY; without even the implied warranty of #
14 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the #
15 # GNU General Public License for more details. #
17 # You should have received a copy of the GNU General Public License #
18 # along with this program. If not, see <http://www.gnu.org/licenses/>. #
20 ###############################################################################
37 SYS_CLASS_DMI
= "/sys/class/dmi/id"
38 SECRET_ID_FILE
= "/etc/fireinfo-id"
40 INVALID_ID_STRINGS
= (
41 "OEM", "O.E.M.", "o.e.m.",
43 "12345", "54321", "202020",
48 "Serial", "System Serial Number",
50 "01010101-0101-0101-0101-010101010101",
51 "00020003-0004-0005-0006-000700080009",
52 "03000200-0400-0500-0006-000700080009",
53 "11111111-1111-1111-1111-111111111111",
54 "0000000", "00000000",
57 INVALID_ID_STRINGS_EXACT_MATCH
= (
61 class Singleton(type):
62 def __init__(cls
, name
, bases
, dict):
63 super(Singleton
, cls
).__init
__(name
, bases
, dict)
66 def __call__(cls
, *args
, **kw
):
67 if cls
.instance
is None:
68 cls
.instance
= super(Singleton
, cls
).__call
__(*args
, **kw
)
73 def read_from_file(filename
):
75 Read all data from filename.
77 if not os
.path
.exists(filename
):
81 with
open(filename
) as f
:
82 return f
.read().strip()
87 __metaclass__
= Singleton
90 self
.bios
= bios
.BIOS(self
)
96 self
.hypervisor
= hypervisor
.Hypervisor()
98 # Read /proc/cpuinfo for vendor information.
99 self
.__cpuinfo
= self
.cpu
.read_cpuinfo()
105 "model" : self
.model
,
106 "vendor" : self
.vendor
,
108 # Indicator if the system is running in a
109 # virtual environment.
110 "virtual" : self
.virtual
,
113 "language" : self
.language
,
115 # Release information
116 "release" : self
.release
,
117 "kernel_release" : self
.kernel_release
,
119 "memory" : self
.memory
,
120 "root_size" : self
.root_size
,
124 for device
in self
.devices
:
126 "subsystem" : device
.subsystem
.lower(),
127 "vendor" : device
.vendor
.lower(),
128 "model" : device
.model
.lower(),
129 "deviceclass" : device
.deviceclass
,
130 "driver" : device
.driver
,
133 # PCI devices provide subsystem information, USB don't.
134 if d
["subsystem"] == "pci":
135 d
["sub_model"] = device
.sub_model
136 d
["sub_vendor"] = device
.sub_vendor
138 p
["devices"].append(d
)
142 "vendor" : self
.cpu
.vendor
,
143 "model" : self
.cpu
.model
,
144 "model_string" : self
.cpu
.model_string
,
145 "stepping" : self
.cpu
.stepping
,
146 "flags" : self
.cpu
.flags
,
147 "speed" : self
.cpu
.speed
,
148 "family" : self
.cpu
.family
,
149 "count" : self
.cpu
.count
152 if self
.cpu
.bogomips
:
153 p
["bogomips"] = self
.cpu
.bogomips
156 "green" : self
.network
.has_green(),
157 "blue" : self
.network
.has_blue(),
158 "orange" : self
.network
.has_orange(),
159 "red" : self
.network
.has_red(),
162 # Only append hypervisor information if we are virtualized.
165 "vendor" : self
.hypervisor
.vendor
,
170 "profile_version" : PROFILE_VERSION
,
172 # Identification and authorization codes
173 "public_id" : self
.public_id
,
174 "private_id" : self
.private_id
,
176 # Actual profile data
188 This returns a globally (hopefully) ID to identify the host
189 later (by request) in the database.
191 public_id
= self
.secret_id
195 return hashlib
.sha1(public_id
).hexdigest()
198 def private_id(self
):
200 The private ID is built out of the _unique_id and used to
201 permit a host to do changes on the database.
203 No one could ever guess this without access to the host.
206 for i
in reversed(self
.secret_id
):
212 return hashlib
.sha1(private_id
).hexdigest()
217 Read a "secret" ID from a file if available
218 or calculate it from the hardware.
220 if os
.path
.exists(SECRET_ID_FILE
):
221 return read_from_file(SECRET_ID_FILE
)
223 return hashlib
.sha1(self
._unique
_id
).hexdigest()
226 def _unique_id(self
):
228 This is a helper ID which is generated out of some hardware information
229 that is considered to be constant over a PC's lifetime.
231 None of the data here is ever sent to the server.
235 # Virtual machines (for example) and some boards have a UUID
236 # which is globally unique.
237 for file in ("product_uuid", "product_serial", "chassis_serial"):
238 id = read_from_file(os
.path
.join(SYS_CLASS_DMI
, file))
241 # Sort out all bogous or invalid strings from the list.
247 for i
in INVALID_ID_STRINGS_EXACT_MATCH
:
253 for i
in INVALID_ID_STRINGS
:
258 # Check if the string only contains 0xff
259 if id and all((e
== "\xff" for e
in id)):
267 # Use serial number from root disk (if available) and if
268 # no other ID was found, yet.
270 root_disk_serial
= self
.root_disk_serial
271 if root_disk_serial
and not root_disk_serial
.startswith("QM000"):
272 ids
.append(root_disk_serial
)
274 # As last resort, we use the UUID from pakfire.
276 id = read_from_file("/opt/pakfire/db/uuid")
284 Return the language code of IPFire or "unknown" if we cannot get it.
286 # Return "unknown" if settings file does not exist.
287 filename
= "/var/ipfire/main/settings"
288 if not os
.path
.exists(filename
):
291 with
open(filename
, "r") as f
:
292 for line
in f
.readlines():
293 key
, val
= line
.split("=", 1)
294 if key
== "LANGUAGE":
300 Return the system release string.
302 return read_from_file("/etc/system-release") or "unknown"
305 def bios_vendor(self
):
307 Return the bios vendor name.
309 return read_from_file("/sys/class/dmi/id/bios_vendor")
311 def vendor_model_tuple(self
):
313 s
= self
.__cpuinfo
["Hardware"]
317 if s
.startswith("ARM-Versatile"):
321 v
, m
= s
.split(" ", 1)
323 if s
.startswith("BCM"):
333 def escape_string(s
):
335 Will remove all non-printable characters from the given string
340 return filter(lambda x
: x
in string
.printable
, s
)
345 Return the vendor string of this system (if any).
348 for file in ("sys_vendor", "board_vendor", "chassis_vendor",):
349 ret
= read_from_file(os
.path
.join(SYS_CLASS_DMI
, file))
351 return self
.escape_string(ret
)
353 if os
.path
.exists("/proc/device-tree"):
354 ret
= self
.__cpuinfo
.get("Hardware", None)
356 ret
, m
= self
.vendor_model_tuple()
358 return self
.escape_string(ret
)
363 Return the model string of this system (if any).
366 for file in ("product_name", "board_model", "chassis_model",):
367 ret
= read_from_file(os
.path
.join(SYS_CLASS_DMI
, file))
369 return self
.escape_string(ret
)
371 # Read device-tree model if available
372 ret
= read_from_file("/proc/device-tree/model")
374 # replace the NULL byte with which the DT string ends
375 ret
= ret
.replace(u
"\u0000", "")
377 # Fall back to read /proc/cpuinfo
379 v
, ret
= self
.vendor_model_tuple()
381 return self
.escape_string(ret
)
386 Return the amount of memory in kilobytes.
388 with
open("/proc/meminfo", "r") as f
:
389 firstline
= f
.readline().strip()
390 return int(firstline
.split()[1])
393 def kernel_release(self
):
395 Return the kernel release string.
402 Return the dev node of the root disk.
404 with
open("/etc/mtab", "r") as f
:
405 dev
, mountpoint
, fs
, rest
= f
.readline().split(" ", 3)
406 if mountpoint
== "/" and not fs
== "rootfs":
410 # Handle raids and MMC cards like (mmcblk0p3).
414 # Otherwise cut off all digits at end of string
415 while dev
[-1] in string
.digits
:
423 Return the size of the root disk in kilobytes.
425 path
= "/sys/block/%s/size" % self
.root_disk
426 if not os
.path
.exists(path
):
429 with
open(path
, "r") as f
:
430 return int(f
.readline()) * 512 / 1024
433 def root_disk_serial(self
):
435 Return the serial number of the root disk (if any).
438 serial
= _fireinfo
.get_harddisk_serial("/dev/%s" % self
.root_disk
)
444 return serial
.strip()
448 Scan for all devices (PCI/USB) in the system and append them
454 ("/sys/bus/pci/devices", device
.PCIDevice
),
455 ("/sys/bus/usb/devices", device
.USBDevice
)
457 for path
, cls
in toscan
:
458 if not os
.path
.exists(path
):
461 dirlist
= os
.listdir(path
)
463 self
.devices
.append(cls(os
.path
.join(path
, dir)))
468 Say if the host is running in a virtual environment.
470 return self
.hypervisor
.virtual
475 Reference to the network class.
477 return network
.Network()
480 if __name__
== "__main__":
490 print "------------\n", s
.devices
, "\n------------\n"
491 print json
.dumps(s
.profile(), sort_keys
=True, indent
=4)