| Borawski.Lukasz | 86e1b66 | 2018-01-19 14:22:14 +0100 | [diff] [blame] | 1 | /* | 
|  | 2 | // Copyright (c) 2018 Intel Corporation | 
|  | 3 | // | 
|  | 4 | // Licensed under the Apache License, Version 2.0 (the "License"); | 
|  | 5 | // you may not use this file except in compliance with the License. | 
|  | 6 | // You may obtain a copy of the License at | 
|  | 7 | // | 
|  | 8 | //      http://www.apache.org/licenses/LICENSE-2.0 | 
|  | 9 | // | 
|  | 10 | // Unless required by applicable law or agreed to in writing, software | 
|  | 11 | // distributed under the License is distributed on an "AS IS" BASIS, | 
|  | 12 | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
|  | 13 | // See the License for the specific language governing permissions and | 
|  | 14 | // limitations under the License. | 
|  | 15 | */ | 
|  | 16 | #pragma once | 
|  | 17 |  | 
| Ed Tanous | 04e438c | 2020-10-03 08:06:26 -0700 | [diff] [blame] | 18 | #include "http_request.hpp" | 
|  | 19 | #include "http_response.hpp" | 
| Borawski.Lukasz | 86e1b66 | 2018-01-19 14:22:14 +0100 | [diff] [blame] | 20 | #include "privileges.hpp" | 
| Ed Tanous | a8c4ce9 | 2021-03-24 08:44:51 -0700 | [diff] [blame^] | 21 | #include "redfish_v1.hpp" | 
| Ed Tanous | 1abe55e | 2018-09-05 08:30:59 -0700 | [diff] [blame] | 22 |  | 
| Ed Tanous | a0803ef | 2018-08-29 13:29:23 -0700 | [diff] [blame] | 23 | #include <error_messages.hpp> | 
| Ed Tanous | a8c4ce9 | 2021-03-24 08:44:51 -0700 | [diff] [blame^] | 24 | #include <rf_async_resp.hpp> | 
| Ed Tanous | a0803ef | 2018-08-29 13:29:23 -0700 | [diff] [blame] | 25 |  | 
| Gunnar Mills | 1214b7e | 2020-06-04 10:11:30 -0500 | [diff] [blame] | 26 | #include <vector> | 
| Borawski.Lukasz | 86e1b66 | 2018-01-19 14:22:14 +0100 | [diff] [blame] | 27 |  | 
| Ed Tanous | 1abe55e | 2018-09-05 08:30:59 -0700 | [diff] [blame] | 28 | namespace redfish | 
|  | 29 | { | 
| Borawski.Lukasz | 86e1b66 | 2018-01-19 14:22:14 +0100 | [diff] [blame] | 30 |  | 
|  | 31 | /** | 
|  | 32 | * @brief  Abstract class used for implementing Redfish nodes. | 
|  | 33 | * | 
|  | 34 | */ | 
| Ed Tanous | 1abe55e | 2018-09-05 08:30:59 -0700 | [diff] [blame] | 35 | class Node | 
|  | 36 | { | 
| Ed Tanous | 4df1bee | 2021-03-24 08:23:03 -0700 | [diff] [blame] | 37 | private: | 
|  | 38 | bool redfishPreChecks(const crow::Request& req, crow::Response& res) | 
|  | 39 | { | 
|  | 40 | std::string_view odataHeader = req.getHeaderValue("OData-Version"); | 
|  | 41 | if (odataHeader.empty()) | 
|  | 42 | { | 
|  | 43 | // Clients aren't required to provide odata version | 
|  | 44 | return true; | 
|  | 45 | } | 
|  | 46 | if (odataHeader != "4.0") | 
|  | 47 | { | 
|  | 48 | redfish::messages::preconditionFailed(res); | 
|  | 49 | res.end(); | 
|  | 50 | return false; | 
|  | 51 | } | 
|  | 52 |  | 
|  | 53 | res.addHeader("OData-Version", "4.0"); | 
|  | 54 | return true; | 
|  | 55 | } | 
|  | 56 |  | 
| Ed Tanous | 1abe55e | 2018-09-05 08:30:59 -0700 | [diff] [blame] | 57 | public: | 
|  | 58 | template <typename... Params> | 
| Ed Tanous | cb13a39 | 2020-07-25 19:02:03 +0000 | [diff] [blame] | 59 | Node(App& app, std::string&& entityUrl, [[maybe_unused]] Params... paramsIn) | 
| Ed Tanous | 1abe55e | 2018-09-05 08:30:59 -0700 | [diff] [blame] | 60 | { | 
| Tanous | f00032d | 2018-11-05 01:18:10 -0300 | [diff] [blame] | 61 | crow::DynamicRule& get = app.routeDynamic(entityUrl.c_str()); | 
|  | 62 | getRule = &get; | 
| Ed Tanous | b41187f | 2019-10-24 16:30:02 -0700 | [diff] [blame] | 63 | get.methods(boost::beast::http::verb::get)( | 
|  | 64 | [this](const crow::Request& req, crow::Response& res, | 
|  | 65 | Params... params) { | 
| Ed Tanous | 4df1bee | 2021-03-24 08:23:03 -0700 | [diff] [blame] | 66 | if (!redfishPreChecks(req, res)) | 
|  | 67 | { | 
|  | 68 | return; | 
|  | 69 | } | 
| Ed Tanous | b41187f | 2019-10-24 16:30:02 -0700 | [diff] [blame] | 70 | std::vector<std::string> paramVec = {params...}; | 
|  | 71 | doGet(res, req, paramVec); | 
|  | 72 | }); | 
| Tanous | f00032d | 2018-11-05 01:18:10 -0300 | [diff] [blame] | 73 |  | 
|  | 74 | crow::DynamicRule& patch = app.routeDynamic(entityUrl.c_str()); | 
|  | 75 | patchRule = &patch; | 
| Ed Tanous | b41187f | 2019-10-24 16:30:02 -0700 | [diff] [blame] | 76 | patch.methods(boost::beast::http::verb::patch)( | 
|  | 77 | [this](const crow::Request& req, crow::Response& res, | 
|  | 78 | Params... params) { | 
| Ed Tanous | 4df1bee | 2021-03-24 08:23:03 -0700 | [diff] [blame] | 79 | if (!redfishPreChecks(req, res)) | 
|  | 80 | { | 
|  | 81 | return; | 
|  | 82 | } | 
| Ed Tanous | b41187f | 2019-10-24 16:30:02 -0700 | [diff] [blame] | 83 | std::vector<std::string> paramVec = {params...}; | 
|  | 84 | doPatch(res, req, paramVec); | 
|  | 85 | }); | 
| Tanous | f00032d | 2018-11-05 01:18:10 -0300 | [diff] [blame] | 86 |  | 
|  | 87 | crow::DynamicRule& post = app.routeDynamic(entityUrl.c_str()); | 
|  | 88 | postRule = &post; | 
| Ed Tanous | b41187f | 2019-10-24 16:30:02 -0700 | [diff] [blame] | 89 | post.methods(boost::beast::http::verb::post)( | 
|  | 90 | [this](const crow::Request& req, crow::Response& res, | 
|  | 91 | Params... params) { | 
| Ed Tanous | 4df1bee | 2021-03-24 08:23:03 -0700 | [diff] [blame] | 92 | if (!redfishPreChecks(req, res)) | 
|  | 93 | { | 
|  | 94 | return; | 
|  | 95 | } | 
| Ed Tanous | b41187f | 2019-10-24 16:30:02 -0700 | [diff] [blame] | 96 | std::vector<std::string> paramVec = {params...}; | 
|  | 97 | doPost(res, req, paramVec); | 
|  | 98 | }); | 
| Tanous | f00032d | 2018-11-05 01:18:10 -0300 | [diff] [blame] | 99 |  | 
| Adrian Ambrożewicz | 1530261 | 2020-07-16 11:24:47 +0200 | [diff] [blame] | 100 | crow::DynamicRule& put = app.routeDynamic(entityUrl.c_str()); | 
|  | 101 | putRule = &put; | 
|  | 102 | put.methods(boost::beast::http::verb::put)( | 
|  | 103 | [this](const crow::Request& req, crow::Response& res, | 
|  | 104 | Params... params) { | 
| Ed Tanous | 4df1bee | 2021-03-24 08:23:03 -0700 | [diff] [blame] | 105 | if (!redfishPreChecks(req, res)) | 
|  | 106 | { | 
|  | 107 | return; | 
|  | 108 | } | 
| Adrian Ambrożewicz | 1530261 | 2020-07-16 11:24:47 +0200 | [diff] [blame] | 109 | std::vector<std::string> paramVec = {params...}; | 
|  | 110 | doPut(res, req, paramVec); | 
|  | 111 | }); | 
|  | 112 |  | 
| Ed Tanous | 2c70f80 | 2020-09-28 14:29:23 -0700 | [diff] [blame] | 113 | crow::DynamicRule& deleteR = app.routeDynamic(entityUrl.c_str()); | 
|  | 114 | deleteRule = &deleteR; | 
|  | 115 | deleteR.methods(boost::beast::http::verb::delete_)( | 
| Ed Tanous | b41187f | 2019-10-24 16:30:02 -0700 | [diff] [blame] | 116 | [this](const crow::Request& req, crow::Response& res, | 
|  | 117 | Params... params) { | 
| Ed Tanous | 4df1bee | 2021-03-24 08:23:03 -0700 | [diff] [blame] | 118 | if (!redfishPreChecks(req, res)) | 
|  | 119 | { | 
|  | 120 | return; | 
|  | 121 | } | 
| Ed Tanous | b41187f | 2019-10-24 16:30:02 -0700 | [diff] [blame] | 122 | std::vector<std::string> paramVec = {params...}; | 
|  | 123 | doDelete(res, req, paramVec); | 
|  | 124 | }); | 
| Tanous | f00032d | 2018-11-05 01:18:10 -0300 | [diff] [blame] | 125 | } | 
|  | 126 |  | 
|  | 127 | void initPrivileges() | 
|  | 128 | { | 
|  | 129 | auto it = entityPrivileges.find(boost::beast::http::verb::get); | 
|  | 130 | if (it != entityPrivileges.end()) | 
|  | 131 | { | 
|  | 132 | if (getRule != nullptr) | 
|  | 133 | { | 
| Ed Tanous | 23a21a1 | 2020-07-25 04:45:05 +0000 | [diff] [blame] | 134 | getRule->privileges(it->second); | 
| Tanous | f00032d | 2018-11-05 01:18:10 -0300 | [diff] [blame] | 135 | } | 
|  | 136 | } | 
|  | 137 | it = entityPrivileges.find(boost::beast::http::verb::post); | 
|  | 138 | if (it != entityPrivileges.end()) | 
|  | 139 | { | 
|  | 140 | if (postRule != nullptr) | 
|  | 141 | { | 
| Ed Tanous | 23a21a1 | 2020-07-25 04:45:05 +0000 | [diff] [blame] | 142 | postRule->privileges(it->second); | 
| Tanous | f00032d | 2018-11-05 01:18:10 -0300 | [diff] [blame] | 143 | } | 
|  | 144 | } | 
|  | 145 | it = entityPrivileges.find(boost::beast::http::verb::patch); | 
|  | 146 | if (it != entityPrivileges.end()) | 
|  | 147 | { | 
|  | 148 | if (patchRule != nullptr) | 
|  | 149 | { | 
| Ed Tanous | 23a21a1 | 2020-07-25 04:45:05 +0000 | [diff] [blame] | 150 | patchRule->privileges(it->second); | 
| Tanous | f00032d | 2018-11-05 01:18:10 -0300 | [diff] [blame] | 151 | } | 
|  | 152 | } | 
| Adrian Ambrożewicz | 1530261 | 2020-07-16 11:24:47 +0200 | [diff] [blame] | 153 | it = entityPrivileges.find(boost::beast::http::verb::put); | 
|  | 154 | if (it != entityPrivileges.end()) | 
|  | 155 | { | 
|  | 156 | if (putRule != nullptr) | 
|  | 157 | { | 
| Ed Tanous | 23a21a1 | 2020-07-25 04:45:05 +0000 | [diff] [blame] | 158 | putRule->privileges(it->second); | 
| Adrian Ambrożewicz | 1530261 | 2020-07-16 11:24:47 +0200 | [diff] [blame] | 159 | } | 
|  | 160 | } | 
| Tanous | f00032d | 2018-11-05 01:18:10 -0300 | [diff] [blame] | 161 | it = entityPrivileges.find(boost::beast::http::verb::delete_); | 
|  | 162 | if (it != entityPrivileges.end()) | 
|  | 163 | { | 
|  | 164 | if (deleteRule != nullptr) | 
|  | 165 | { | 
| Ed Tanous | 23a21a1 | 2020-07-25 04:45:05 +0000 | [diff] [blame] | 166 | deleteRule->privileges(it->second); | 
| Tanous | f00032d | 2018-11-05 01:18:10 -0300 | [diff] [blame] | 167 | } | 
|  | 168 | } | 
| Borawski.Lukasz | c1a46bd | 2018-02-08 13:31:59 +0100 | [diff] [blame] | 169 | } | 
| Ed Tanous | cbbfa96 | 2018-03-13 16:46:28 -0700 | [diff] [blame] | 170 |  | 
| Ed Tanous | 1abe55e | 2018-09-05 08:30:59 -0700 | [diff] [blame] | 171 | virtual ~Node() = default; | 
| Borawski.Lukasz | c1a46bd | 2018-02-08 13:31:59 +0100 | [diff] [blame] | 172 |  | 
| Ed Tanous | 1abe55e | 2018-09-05 08:30:59 -0700 | [diff] [blame] | 173 | OperationMap entityPrivileges; | 
| Borawski.Lukasz | 86e1b66 | 2018-01-19 14:22:14 +0100 | [diff] [blame] | 174 |  | 
| Tanous | f00032d | 2018-11-05 01:18:10 -0300 | [diff] [blame] | 175 | crow::DynamicRule* getRule = nullptr; | 
|  | 176 | crow::DynamicRule* postRule = nullptr; | 
|  | 177 | crow::DynamicRule* patchRule = nullptr; | 
| Adrian Ambrożewicz | 1530261 | 2020-07-16 11:24:47 +0200 | [diff] [blame] | 178 | crow::DynamicRule* putRule = nullptr; | 
| Tanous | f00032d | 2018-11-05 01:18:10 -0300 | [diff] [blame] | 179 | crow::DynamicRule* deleteRule = nullptr; | 
|  | 180 |  | 
| Ed Tanous | 1abe55e | 2018-09-05 08:30:59 -0700 | [diff] [blame] | 181 | protected: | 
|  | 182 | // Node is designed to be an abstract class, so doGet is pure virtual | 
| Ed Tanous | cb13a39 | 2020-07-25 19:02:03 +0000 | [diff] [blame] | 183 | virtual void doGet(crow::Response& res, const crow::Request&, | 
|  | 184 | const std::vector<std::string>&) | 
| Ed Tanous | 1abe55e | 2018-09-05 08:30:59 -0700 | [diff] [blame] | 185 | { | 
|  | 186 | res.result(boost::beast::http::status::method_not_allowed); | 
| Borawski.Lukasz | 86e1b66 | 2018-01-19 14:22:14 +0100 | [diff] [blame] | 187 | res.end(); | 
|  | 188 | } | 
| Ed Tanous | 1abe55e | 2018-09-05 08:30:59 -0700 | [diff] [blame] | 189 |  | 
| Ed Tanous | cb13a39 | 2020-07-25 19:02:03 +0000 | [diff] [blame] | 190 | virtual void doPatch(crow::Response& res, const crow::Request&, | 
|  | 191 | const std::vector<std::string>&) | 
| Ed Tanous | 1abe55e | 2018-09-05 08:30:59 -0700 | [diff] [blame] | 192 | { | 
|  | 193 | res.result(boost::beast::http::status::method_not_allowed); | 
|  | 194 | res.end(); | 
|  | 195 | } | 
|  | 196 |  | 
| Ed Tanous | cb13a39 | 2020-07-25 19:02:03 +0000 | [diff] [blame] | 197 | virtual void doPost(crow::Response& res, const crow::Request&, | 
|  | 198 | const std::vector<std::string>&) | 
| Ed Tanous | 1abe55e | 2018-09-05 08:30:59 -0700 | [diff] [blame] | 199 | { | 
|  | 200 | res.result(boost::beast::http::status::method_not_allowed); | 
|  | 201 | res.end(); | 
|  | 202 | } | 
|  | 203 |  | 
| Ed Tanous | cb13a39 | 2020-07-25 19:02:03 +0000 | [diff] [blame] | 204 | virtual void doPut(crow::Response& res, const crow::Request&, | 
|  | 205 | const std::vector<std::string>&) | 
| Adrian Ambrożewicz | 1530261 | 2020-07-16 11:24:47 +0200 | [diff] [blame] | 206 | { | 
|  | 207 | res.result(boost::beast::http::status::method_not_allowed); | 
|  | 208 | res.end(); | 
|  | 209 | } | 
|  | 210 |  | 
| Ed Tanous | cb13a39 | 2020-07-25 19:02:03 +0000 | [diff] [blame] | 211 | virtual void doDelete(crow::Response& res, const crow::Request&, | 
|  | 212 | const std::vector<std::string>&) | 
| Ed Tanous | 1abe55e | 2018-09-05 08:30:59 -0700 | [diff] [blame] | 213 | { | 
|  | 214 | res.result(boost::beast::http::status::method_not_allowed); | 
|  | 215 | res.end(); | 
|  | 216 | } | 
| Joseph Reynolds | 900f949 | 2019-11-25 15:37:29 -0600 | [diff] [blame] | 217 |  | 
| Joseph Reynolds | 3bf4e63 | 2020-02-06 14:44:32 -0600 | [diff] [blame] | 218 | /* @brief Would the operation be allowed if the user did not have the | 
|  | 219 | * ConfigureSelf Privilege?  Also honors session.isConfigureSelfOnly. | 
| Joseph Reynolds | 900f949 | 2019-11-25 15:37:29 -0600 | [diff] [blame] | 220 | * | 
|  | 221 | * @param req      the request | 
|  | 222 | * | 
|  | 223 | * @returns        True if allowed, false otherwise | 
|  | 224 | */ | 
|  | 225 | inline bool isAllowedWithoutConfigureSelf(const crow::Request& req) | 
|  | 226 | { | 
| RAJESWARAN THILLAIGOVINDAN | 61dbeef | 2019-12-13 04:26:54 -0600 | [diff] [blame] | 227 | const std::string& userRole = req.userRole; | 
|  | 228 | BMCWEB_LOG_DEBUG << "isAllowedWithoutConfigureSelf for the role " | 
|  | 229 | << req.userRole; | 
| Joseph Reynolds | 3bf4e63 | 2020-02-06 14:44:32 -0600 | [diff] [blame] | 230 | Privileges effectiveUserPrivileges; | 
|  | 231 | if (req.session && req.session->isConfigureSelfOnly) | 
|  | 232 | { | 
|  | 233 | // The session has no privileges because it is limited to | 
|  | 234 | // configureSelfOnly and we are disregarding that privilege. | 
|  | 235 | // Note that some operations do not require any privilege. | 
|  | 236 | } | 
|  | 237 | else | 
|  | 238 | { | 
|  | 239 | effectiveUserPrivileges = redfish::getUserPrivileges(userRole); | 
|  | 240 | effectiveUserPrivileges.resetSinglePrivilege("ConfigureSelf"); | 
|  | 241 | } | 
| Joseph Reynolds | 900f949 | 2019-11-25 15:37:29 -0600 | [diff] [blame] | 242 | const auto& requiredPrivilegesIt = entityPrivileges.find(req.method()); | 
|  | 243 | return (requiredPrivilegesIt != entityPrivileges.end()) && | 
|  | 244 | isOperationAllowedWithPrivileges(requiredPrivilegesIt->second, | 
|  | 245 | effectiveUserPrivileges); | 
|  | 246 | } | 
| Borawski.Lukasz | 86e1b66 | 2018-01-19 14:22:14 +0100 | [diff] [blame] | 247 | }; | 
|  | 248 |  | 
| Ed Tanous | 1abe55e | 2018-09-05 08:30:59 -0700 | [diff] [blame] | 249 | } // namespace redfish |