2 ###############################################################################
5 # Copyright (C) 2010, 2011 IPFire Team (www.ipfire.org) #
7 # This program is free software: you can redistribute it and/or modify #
8 # it under the terms of the GNU General Public License as published by #
9 # the Free Software Foundation, either version 3 of the License, or #
10 # (at your option) any later version. #
12 # This program is distributed in the hope that it will be useful, #
13 # but WITHOUT ANY WARRANTY; without even the implied warranty of #
14 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the #
15 # GNU General Public License for more details. #
17 # You should have received a copy of the GNU General Public License #
18 # along with this program. If not, see <http://www.gnu.org/licenses/>. #
20 ###############################################################################
37 SYS_CLASS_DMI
= "/sys/class/dmi/id"
38 SECRET_ID_FILE
= "/etc/fireinfo-id"
40 INVALID_ID_STRINGS
= (
41 "OEM", "O.E.M.", "o.e.m.",
43 "12345", "54321", "202020",
48 "01010101-0101-0101-0101-010101010101",
49 "00020003-0004-0005-0006-000700080009",
50 "03000200-0400-0500-0006-000700080009",
51 "0000000", "00000000",
54 INVALID_ID_STRINGS_EXACT_MATCH
= (
58 class Singleton(type):
59 def __init__(cls
, name
, bases
, dict):
60 super(Singleton
, cls
).__init
__(name
, bases
, dict)
63 def __call__(cls
, *args
, **kw
):
64 if cls
.instance
is None:
65 cls
.instance
= super(Singleton
, cls
).__call
__(*args
, **kw
)
70 def read_from_file(filename
):
72 Read all data from filename.
74 if not os
.path
.exists(filename
):
78 with
open(filename
) as f
:
79 return f
.read().strip()
84 __metaclass__
= Singleton
87 self
.bios
= bios
.BIOS(self
)
93 self
.hypervisor
= hypervisor
.Hypervisor()
95 # Read /proc/cpuinfo for vendor information.
96 self
.__cpuinfo
= self
.cpu
.read_cpuinfo()
102 "model" : self
.model
,
103 "vendor" : self
.vendor
,
105 # Indicator if the system is running in a
106 # virtual environment.
107 "virtual" : self
.virtual
,
110 "language" : self
.language
,
112 # Release information
113 "release" : self
.release
,
114 "kernel_release" : self
.kernel_release
,
116 "memory" : self
.memory
,
117 "root_size" : self
.root_size
,
121 for device
in self
.devices
:
123 "subsystem" : device
.subsystem
.lower(),
124 "vendor" : device
.vendor
.lower(),
125 "model" : device
.model
.lower(),
126 "deviceclass" : device
.deviceclass
,
127 "driver" : device
.driver
,
130 # PCI devices provide subsystem information, USB don't.
131 if d
["subsystem"] == "pci":
132 d
["sub_model"] = device
.sub_model
133 d
["sub_vendor"] = device
.sub_vendor
135 p
["devices"].append(d
)
139 "vendor" : self
.cpu
.vendor
,
140 "model" : self
.cpu
.model
,
141 "model_string" : self
.cpu
.model_string
,
142 "stepping" : self
.cpu
.stepping
,
143 "flags" : self
.cpu
.flags
,
144 "bogomips" : self
.cpu
.bogomips
,
145 "speed" : self
.cpu
.speed
,
146 "family" : self
.cpu
.family
,
147 "count" : self
.cpu
.count
151 "green" : self
.network
.has_green(),
152 "blue" : self
.network
.has_blue(),
153 "orange" : self
.network
.has_orange(),
154 "red" : self
.network
.has_red(),
157 # Only append hypervisor information if we are virtualized.
160 "vendor" : self
.hypervisor
.vendor
,
165 "profile_version" : PROFILE_VERSION
,
167 # Identification and authorization codes
168 "public_id" : self
.public_id
,
169 "private_id" : self
.private_id
,
171 # Actual profile data
183 This returns a globally (hopefully) ID to identify the host
184 later (by request) in the database.
186 public_id
= self
.secret_id
190 return hashlib
.sha1(public_id
).hexdigest()
193 def private_id(self
):
195 The private ID is built out of the _unique_id and used to
196 permit a host to do changes on the database.
198 No one could ever guess this without access to the host.
201 for i
in reversed(self
.secret_id
):
207 return hashlib
.sha1(private_id
).hexdigest()
212 Read a "secret" ID from a file if available
213 or calculate it from the hardware.
215 if os
.path
.exists(SECRET_ID_FILE
):
216 return read_from_file(SECRET_ID_FILE
)
218 return hashlib
.sha1(self
._unique
_id
).hexdigest()
221 def _unique_id(self
):
223 This is a helper ID which is generated out of some hardware information
224 that is considered to be constant over a PC's lifetime.
226 None of the data here is ever sent to the server.
230 # Virtual machines (for example) and some boards have a UUID
231 # which is globally unique.
232 for file in ("product_uuid", "product_serial", "chassis_serial"):
233 id = read_from_file(os
.path
.join(SYS_CLASS_DMI
, file))
236 # Sort out all bogous or invalid strings from the list.
242 for i
in INVALID_ID_STRINGS_EXACT_MATCH
:
248 for i
in INVALID_ID_STRINGS
:
258 # Use serial number from root disk (if available) and if
259 # no other ID was found, yet.
261 root_disk_serial
= self
.root_disk_serial
262 if root_disk_serial
and not root_disk_serial
.startswith("QM000"):
263 ids
.append(root_disk_serial
)
265 # As last resort, we use the UUID from pakfire.
267 id = read_from_file("/opt/pakfire/db/uuid")
275 Return the language code of IPFire or "unknown" if we cannot get it.
277 # Return "unknown" if settings file does not exist.
278 filename
= "/var/ipfire/main/settings"
279 if not os
.path
.exists(filename
):
282 with
open(filename
, "r") as f
:
283 for line
in f
.readlines():
284 key
, val
= line
.split("=", 1)
285 if key
== "LANGUAGE":
291 Return the system release string.
293 return read_from_file("/etc/system-release") or "unknown"
296 def bios_vendor(self
):
298 Return the bios vendor name.
300 return read_from_file("/sys/class/dmi/id/bios_vendor")
302 def vendor_model_tuple(self
):
304 s
= self
.__cpuinfo
["Hardware"]
308 if s
.startswith("ARM-Versatile"):
312 v
, m
= s
.split(" ", 1)
314 if s
.startswith("BCM"):
326 Return the vendor string of this system (if any).
329 for file in ("sys_vendor", "board_vendor", "chassis_vendor",):
330 ret
= read_from_file(os
.path
.join(SYS_CLASS_DMI
, file))
335 v
, m
= self
.vendor_model_tuple()
343 Return the model string of this system (if any).
346 for file in ("product_name", "board_model", "chassis_model",):
347 ret
= read_from_file(os
.path
.join(SYS_CLASS_DMI
, file))
352 v
, m
= self
.vendor_model_tuple()
360 Return the amount of memory in kilobytes.
362 with
open("/proc/meminfo", "r") as f
:
363 firstline
= f
.readline().strip()
364 return int(firstline
.split()[1])
367 def kernel_release(self
):
369 Return the kernel release string.
376 Return the dev node of the root disk.
378 with
open("/etc/mtab", "r") as f
:
379 dev
, mountpoint
, fs
, rest
= f
.readline().split(" ", 3)
380 if mountpoint
== "/" and not fs
== "rootfs":
384 # Handle raids and MMC cards like (mmcblk0p3).
388 # Otherwise cut off all digits at end of string
389 while dev
[-1] in string
.digits
:
397 Return the size of the root disk in kilobytes.
399 path
= "/sys/block/%s/size" % self
.root_disk
400 if not os
.path
.exists(path
):
403 with
open(path
, "r") as f
:
404 return int(f
.readline()) * 512 / 1024
407 def root_disk_serial(self
):
409 Return the serial number of the root disk (if any).
412 serial
= _fireinfo
.get_harddisk_serial("/dev/%s" % self
.root_disk
)
418 return serial
.strip()
422 Scan for all devices (PCI/USB) in the system and append them
428 ("/sys/bus/pci/devices", device
.PCIDevice
),
429 ("/sys/bus/usb/devices", device
.USBDevice
)
431 for path
, cls
in toscan
:
432 if not os
.path
.exists(path
):
435 dirlist
= os
.listdir(path
)
437 self
.devices
.append(cls(os
.path
.join(path
, dir)))
442 Say if the host is running in a virtual environment.
444 return self
.hypervisor
.virtual
449 Reference to the network class.
451 return network
.Network()
454 if __name__
== "__main__":
464 print "------------\n", s
.devices
, "\n------------\n"
465 print json
.dumps(s
.profile(), sort_keys
=True, indent
=4)