blob: 3e4490c3a836e5cacb028eb223ff4d4b8cfbe092 [file] [log] [blame]
Richard Marian Thomaiyar4654d992018-04-19 05:38:37 +05301/*
2// Copyright (c) 2018 Intel Corporation
3//
4// Licensed under the Apache License, Version 2.0 (the "License");
5// you may not use this file except in compliance with the License.
6// You may obtain a copy of the License at
7//
8// http://www.apache.org/licenses/LICENSE-2.0
9//
10// Unless required by applicable law or agreed to in writing, software
11// distributed under the License is distributed on an "AS IS" BASIS,
12// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13// See the License for the specific language governing permissions and
14// limitations under the License.
15*/
16
17#include "user_layer.hpp"
18
19#include "passwd_mgr.hpp"
Richard Marian Thomaiyar5a6b6362018-03-12 23:42:34 +053020#include "user_mgmt.hpp"
21
Richard Marian Thomaiyar4654d992018-04-19 05:38:37 +053022namespace
23{
24ipmi::PasswdMgr passwdMgr;
25}
26
27namespace ipmi
28{
Richard Marian Thomaiyar5a6b6362018-03-12 23:42:34 +053029
30ipmi_ret_t ipmiUserInit()
31{
32 getUserAccessObject();
33 return IPMI_CC_OK;
34}
35
Richard Marian Thomaiyar4654d992018-04-19 05:38:37 +053036std::string ipmiUserGetPassword(const std::string& userName)
37{
38 return passwdMgr.getPasswdByUserName(userName);
39}
40
Richard Marian Thomaiyar42bed642018-09-21 12:28:57 +053041ipmi_ret_t ipmiClearUserEntryPassword(const std::string& userName)
AppaRao Pulib29b5ab2018-05-17 10:28:48 +053042{
Richard Marian Thomaiyar42bed642018-09-21 12:28:57 +053043 if (passwdMgr.updateUserEntry(userName, "") != 0)
44 {
45 return IPMI_CC_UNSPECIFIED_ERROR;
46 }
47 return IPMI_CC_OK;
48}
49
50ipmi_ret_t ipmiRenameUserEntryPassword(const std::string& userName,
51 const std::string& newUserName)
52{
53 if (passwdMgr.updateUserEntry(userName, newUserName) != 0)
54 {
55 return IPMI_CC_UNSPECIFIED_ERROR;
56 }
AppaRao Pulib29b5ab2018-05-17 10:28:48 +053057 return IPMI_CC_OK;
58}
59
Richard Marian Thomaiyar5a6b6362018-03-12 23:42:34 +053060bool ipmiUserIsValidUserId(const uint8_t& userId)
61{
62 return UserAccess::isValidUserId(userId);
63}
64
65bool ipmiUserIsValidChannel(const uint8_t& chNum)
66{
67 return UserAccess::isValidChannel(chNum);
68}
69
70bool ipmiUserIsValidPrivilege(const uint8_t& priv)
71{
72 return UserAccess::isValidPrivilege(priv);
73}
74
75uint8_t ipmiUserGetUserId(const std::string& userName)
76{
77 return getUserAccessObject().getUserId(userName);
78}
79
80ipmi_ret_t ipmiUserSetUserName(const uint8_t& userId, const char* userName)
81{
82 return getUserAccessObject().setUserName(userId, userName);
83}
84
85ipmi_ret_t ipmiUserGetUserName(const uint8_t& userId, std::string& userName)
86{
87 return getUserAccessObject().getUserName(userId, userName);
88}
89
90ipmi_ret_t ipmiUserGetAllCounts(uint8_t& maxChUsers, uint8_t& enabledUsers,
91 uint8_t& fixedUsers)
92{
93 maxChUsers = ipmiMaxUsers;
94 UsersTbl* userData = getUserAccessObject().getUsersTblPtr();
95 enabledUsers = 0;
96 fixedUsers = 0;
97 // user index 0 is reserved, starts with 1
98 for (size_t count = 1; count <= ipmiMaxUsers; ++count)
99 {
100 if (userData->user[count].userEnabled)
101 {
102 enabledUsers++;
103 }
104 if (userData->user[count].fixedUserName)
105 {
106 fixedUsers++;
107 }
108 }
109 return IPMI_CC_OK;
110}
111
112ipmi_ret_t ipmiUserCheckEnabled(const uint8_t& userId, bool& state)
113{
114 if (!UserAccess::isValidUserId(userId))
115 {
116 return IPMI_CC_PARM_OUT_OF_RANGE;
117 }
118 UserInfo* userInfo = getUserAccessObject().getUserInfo(userId);
119 state = userInfo->userEnabled;
120 return IPMI_CC_OK;
121}
122
123ipmi_ret_t ipmiUserGetPrivilegeAccess(const uint8_t& userId,
124 const uint8_t& chNum,
125 PrivAccess& privAccess)
126{
127
128 if (!UserAccess::isValidChannel(chNum))
129 {
130 return IPMI_CC_INVALID_FIELD_REQUEST;
131 }
132 if (!UserAccess::isValidUserId(userId))
133 {
134 return IPMI_CC_PARM_OUT_OF_RANGE;
135 }
136 UserInfo* userInfo = getUserAccessObject().getUserInfo(userId);
137 privAccess.privilege = userInfo->userPrivAccess[chNum].privilege;
138 privAccess.ipmiEnabled = userInfo->userPrivAccess[chNum].ipmiEnabled;
139 privAccess.linkAuthEnabled =
140 userInfo->userPrivAccess[chNum].linkAuthEnabled;
141 privAccess.accessCallback = userInfo->userPrivAccess[chNum].accessCallback;
142
143 return IPMI_CC_OK;
144}
145
146ipmi_ret_t ipmiUserSetPrivilegeAccess(const uint8_t& userId,
147 const uint8_t& chNum,
148 const PrivAccess& privAccess,
149 const bool& otherPrivUpdates)
150{
151 UserPrivAccess userPrivAccess;
152 userPrivAccess.privilege = privAccess.privilege;
153 if (otherPrivUpdates)
154 {
155 userPrivAccess.ipmiEnabled = privAccess.ipmiEnabled;
156 userPrivAccess.linkAuthEnabled = privAccess.linkAuthEnabled;
157 userPrivAccess.accessCallback = privAccess.accessCallback;
158 }
159 return getUserAccessObject().setUserPrivilegeAccess(
160 userId, chNum, userPrivAccess, otherPrivUpdates);
161}
162
Richard Marian Thomaiyar4654d992018-04-19 05:38:37 +0530163} // namespace ipmi