blob: 5e4aed78f74be5aa1ed74eef0fd0c91eeee133d7 [file] [log] [blame]
Richard Marian Thomaiyar4654d992018-04-19 05:38:37 +05301/*
2// Copyright (c) 2018 Intel Corporation
3//
4// Licensed under the Apache License, Version 2.0 (the "License");
5// you may not use this file except in compliance with the License.
6// You may obtain a copy of the License at
7//
8// http://www.apache.org/licenses/LICENSE-2.0
9//
10// Unless required by applicable law or agreed to in writing, software
11// distributed under the License is distributed on an "AS IS" BASIS,
12// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13// See the License for the specific language governing permissions and
14// limitations under the License.
15*/
16
17#include "user_layer.hpp"
18
19#include "passwd_mgr.hpp"
Richard Marian Thomaiyar5a6b6362018-03-12 23:42:34 +053020#include "user_mgmt.hpp"
21
Richard Marian Thomaiyar4654d992018-04-19 05:38:37 +053022namespace
23{
24ipmi::PasswdMgr passwdMgr;
25}
26
27namespace ipmi
28{
Richard Marian Thomaiyar5a6b6362018-03-12 23:42:34 +053029
NITIN SHARMAb541a5a2019-07-18 12:46:59 +000030Cc ipmiUserInit()
Richard Marian Thomaiyar5a6b6362018-03-12 23:42:34 +053031{
32 getUserAccessObject();
NITIN SHARMAb541a5a2019-07-18 12:46:59 +000033 return ccSuccess;
Richard Marian Thomaiyar5a6b6362018-03-12 23:42:34 +053034}
35
Richard Marian Thomaiyar4654d992018-04-19 05:38:37 +053036std::string ipmiUserGetPassword(const std::string& userName)
37{
38 return passwdMgr.getPasswdByUserName(userName);
39}
40
NITIN SHARMAb541a5a2019-07-18 12:46:59 +000041Cc ipmiClearUserEntryPassword(const std::string& userName)
AppaRao Pulib29b5ab2018-05-17 10:28:48 +053042{
Richard Marian Thomaiyar42bed642018-09-21 12:28:57 +053043 if (passwdMgr.updateUserEntry(userName, "") != 0)
44 {
NITIN SHARMAb541a5a2019-07-18 12:46:59 +000045 return ccUnspecifiedError;
Richard Marian Thomaiyar42bed642018-09-21 12:28:57 +053046 }
NITIN SHARMAb541a5a2019-07-18 12:46:59 +000047 return ccSuccess;
Richard Marian Thomaiyar42bed642018-09-21 12:28:57 +053048}
49
NITIN SHARMAb541a5a2019-07-18 12:46:59 +000050Cc ipmiRenameUserEntryPassword(const std::string& userName,
51 const std::string& newUserName)
Richard Marian Thomaiyar42bed642018-09-21 12:28:57 +053052{
53 if (passwdMgr.updateUserEntry(userName, newUserName) != 0)
54 {
NITIN SHARMAb541a5a2019-07-18 12:46:59 +000055 return ccUnspecifiedError;
Richard Marian Thomaiyar42bed642018-09-21 12:28:57 +053056 }
NITIN SHARMAb541a5a2019-07-18 12:46:59 +000057 return ccSuccess;
AppaRao Pulib29b5ab2018-05-17 10:28:48 +053058}
59
Richard Marian Thomaiyara45cb342018-12-03 15:08:59 +053060bool ipmiUserIsValidUserId(const uint8_t userId)
Richard Marian Thomaiyar5a6b6362018-03-12 23:42:34 +053061{
62 return UserAccess::isValidUserId(userId);
63}
64
Richard Marian Thomaiyara45cb342018-12-03 15:08:59 +053065bool ipmiUserIsValidPrivilege(const uint8_t priv)
Richard Marian Thomaiyar5a6b6362018-03-12 23:42:34 +053066{
67 return UserAccess::isValidPrivilege(priv);
68}
69
70uint8_t ipmiUserGetUserId(const std::string& userName)
71{
72 return getUserAccessObject().getUserId(userName);
73}
74
NITIN SHARMAb541a5a2019-07-18 12:46:59 +000075Cc ipmiUserSetUserName(const uint8_t userId, const char* userName)
Richard Marian Thomaiyar5a6b6362018-03-12 23:42:34 +053076{
77 return getUserAccessObject().setUserName(userId, userName);
78}
79
NITIN SHARMAb541a5a2019-07-18 12:46:59 +000080Cc ipmiUserGetUserName(const uint8_t userId, std::string& userName)
Richard Marian Thomaiyar5a6b6362018-03-12 23:42:34 +053081{
82 return getUserAccessObject().getUserName(userId, userName);
83}
84
NITIN SHARMAb541a5a2019-07-18 12:46:59 +000085Cc ipmiUserSetUserPassword(const uint8_t userId, const char* userPassword)
Suryakanth Sekar90b00c72019-01-16 10:37:57 +053086{
87 return getUserAccessObject().setUserPassword(userId, userPassword);
88}
89
NITIN SHARMAb541a5a2019-07-18 12:46:59 +000090Cc ipmiSetSpecialUserPassword(const std::string& userName,
91 const std::string& userPassword)
Richard Marian Thomaiyar788362c2019-04-14 15:12:47 +053092{
93 return getUserAccessObject().setSpecialUserPassword(userName, userPassword);
94}
95
NITIN SHARMAb541a5a2019-07-18 12:46:59 +000096Cc ipmiUserGetAllCounts(uint8_t& maxChUsers, uint8_t& enabledUsers,
97 uint8_t& fixedUsers)
Richard Marian Thomaiyar5a6b6362018-03-12 23:42:34 +053098{
99 maxChUsers = ipmiMaxUsers;
100 UsersTbl* userData = getUserAccessObject().getUsersTblPtr();
101 enabledUsers = 0;
102 fixedUsers = 0;
103 // user index 0 is reserved, starts with 1
104 for (size_t count = 1; count <= ipmiMaxUsers; ++count)
105 {
106 if (userData->user[count].userEnabled)
107 {
108 enabledUsers++;
109 }
110 if (userData->user[count].fixedUserName)
111 {
112 fixedUsers++;
113 }
114 }
NITIN SHARMAb541a5a2019-07-18 12:46:59 +0000115 return ccSuccess;
Richard Marian Thomaiyar5a6b6362018-03-12 23:42:34 +0530116}
117
NITIN SHARMAb541a5a2019-07-18 12:46:59 +0000118Cc ipmiUserUpdateEnabledState(const uint8_t userId, const bool& state)
Richard Marian Thomaiyar282e79b2018-11-13 19:00:58 +0530119{
120 return getUserAccessObject().setUserEnabledState(userId, state);
121}
122
NITIN SHARMAb541a5a2019-07-18 12:46:59 +0000123Cc ipmiUserCheckEnabled(const uint8_t userId, bool& state)
Richard Marian Thomaiyar5a6b6362018-03-12 23:42:34 +0530124{
125 if (!UserAccess::isValidUserId(userId))
126 {
NITIN SHARMAb541a5a2019-07-18 12:46:59 +0000127 return ccParmOutOfRange;
Richard Marian Thomaiyar5a6b6362018-03-12 23:42:34 +0530128 }
129 UserInfo* userInfo = getUserAccessObject().getUserInfo(userId);
130 state = userInfo->userEnabled;
NITIN SHARMAb541a5a2019-07-18 12:46:59 +0000131 return ccSuccess;
Richard Marian Thomaiyar5a6b6362018-03-12 23:42:34 +0530132}
133
NITIN SHARMAb541a5a2019-07-18 12:46:59 +0000134Cc ipmiUserGetPrivilegeAccess(const uint8_t userId, const uint8_t chNum,
135 PrivAccess& privAccess)
Richard Marian Thomaiyar5a6b6362018-03-12 23:42:34 +0530136{
137
138 if (!UserAccess::isValidChannel(chNum))
139 {
NITIN SHARMAb541a5a2019-07-18 12:46:59 +0000140 return ccInvalidFieldRequest;
Richard Marian Thomaiyar5a6b6362018-03-12 23:42:34 +0530141 }
142 if (!UserAccess::isValidUserId(userId))
143 {
NITIN SHARMAb541a5a2019-07-18 12:46:59 +0000144 return ccParmOutOfRange;
Richard Marian Thomaiyar5a6b6362018-03-12 23:42:34 +0530145 }
146 UserInfo* userInfo = getUserAccessObject().getUserInfo(userId);
147 privAccess.privilege = userInfo->userPrivAccess[chNum].privilege;
148 privAccess.ipmiEnabled = userInfo->userPrivAccess[chNum].ipmiEnabled;
149 privAccess.linkAuthEnabled =
150 userInfo->userPrivAccess[chNum].linkAuthEnabled;
151 privAccess.accessCallback = userInfo->userPrivAccess[chNum].accessCallback;
NITIN SHARMAb541a5a2019-07-18 12:46:59 +0000152 return ccSuccess;
Richard Marian Thomaiyar5a6b6362018-03-12 23:42:34 +0530153}
154
NITIN SHARMAb541a5a2019-07-18 12:46:59 +0000155Cc ipmiUserSetPrivilegeAccess(const uint8_t userId, const uint8_t chNum,
156 const PrivAccess& privAccess,
157 const bool& otherPrivUpdates)
Richard Marian Thomaiyar5a6b6362018-03-12 23:42:34 +0530158{
159 UserPrivAccess userPrivAccess;
160 userPrivAccess.privilege = privAccess.privilege;
161 if (otherPrivUpdates)
162 {
163 userPrivAccess.ipmiEnabled = privAccess.ipmiEnabled;
164 userPrivAccess.linkAuthEnabled = privAccess.linkAuthEnabled;
165 userPrivAccess.accessCallback = privAccess.accessCallback;
166 }
167 return getUserAccessObject().setUserPrivilegeAccess(
168 userId, chNum, userPrivAccess, otherPrivUpdates);
169}
170
Ayushi Smriti02650d52019-05-15 11:59:09 +0000171bool ipmiUserPamAuthenticate(std::string_view userName,
172 std::string_view userPassword)
173{
174 return pamUserCheckAuthenticate(userName, userPassword);
175}
176
NITIN SHARMAb541a5a2019-07-18 12:46:59 +0000177Cc ipmiUserSetUserPayloadAccess(const uint8_t chNum, const uint8_t operation,
178 const uint8_t userId,
179 const PayloadAccess& payloadAccess)
Saravanan Palanisamy77381f12019-05-15 22:33:17 +0000180{
181
182 if (!UserAccess::isValidChannel(chNum))
183 {
NITIN SHARMAb541a5a2019-07-18 12:46:59 +0000184 return ccInvalidFieldRequest;
Saravanan Palanisamy77381f12019-05-15 22:33:17 +0000185 }
186 if (!UserAccess::isValidUserId(userId))
187 {
NITIN SHARMAb541a5a2019-07-18 12:46:59 +0000188 return ccParmOutOfRange;
Saravanan Palanisamy77381f12019-05-15 22:33:17 +0000189 }
190
191 return getUserAccessObject().setUserPayloadAccess(chNum, operation, userId,
192 payloadAccess);
193}
194
NITIN SHARMAb541a5a2019-07-18 12:46:59 +0000195Cc ipmiUserGetUserPayloadAccess(const uint8_t chNum, const uint8_t userId,
196 PayloadAccess& payloadAccess)
Saravanan Palanisamy77381f12019-05-15 22:33:17 +0000197{
198
199 if (!UserAccess::isValidChannel(chNum))
200 {
NITIN SHARMAb541a5a2019-07-18 12:46:59 +0000201 return ccInvalidFieldRequest;
Saravanan Palanisamy77381f12019-05-15 22:33:17 +0000202 }
203 if (!UserAccess::isValidUserId(userId))
204 {
NITIN SHARMAb541a5a2019-07-18 12:46:59 +0000205 return ccParmOutOfRange;
Saravanan Palanisamy77381f12019-05-15 22:33:17 +0000206 }
207
208 UserInfo* userInfo = getUserAccessObject().getUserInfo(userId);
209
210 payloadAccess.stdPayloadEnables1 =
211 userInfo->payloadAccess[chNum].stdPayloadEnables1;
212 payloadAccess.stdPayloadEnables2Reserved =
213 userInfo->payloadAccess[chNum].stdPayloadEnables2Reserved;
214 payloadAccess.oemPayloadEnables1 =
215 userInfo->payloadAccess[chNum].oemPayloadEnables1;
216 payloadAccess.oemPayloadEnables2Reserved =
217 userInfo->payloadAccess[chNum].oemPayloadEnables2Reserved;
218
NITIN SHARMAb541a5a2019-07-18 12:46:59 +0000219 return ccSuccess;
Saravanan Palanisamy77381f12019-05-15 22:33:17 +0000220}
221
Richard Marian Thomaiyar4654d992018-04-19 05:38:37 +0530222} // namespace ipmi