commit | 1eb779d10a6ac0f77ded4067b7f2b4514f1e2bce | [log] [tgz] |
---|---|---|
author | Ed Tanous <ed@tanous.net> | Fri Sep 11 09:44:49 2020 -0700 |
committer | Ed Tanous <ed@tanous.net> | Sat Sep 19 15:50:04 2020 +0000 |
tree | 7696261a75d04d633ef73b5d3f59b09989f1b891 | |
parent | 23e64207a6668319df1f273641febdeab4c09148 [diff] |
Add Ed back as a maintainer I seem to be doing more and more architectural work these days on bmcweb, so I might as well make it slightly more official by editing this powerful text file. I really would've prefered pulling a sword from a stone, or been given a 2 factor encryption key by the lady of the lake, but as monty python says "strange women lying in ponds distributing swords is no basis for a system of government. Supreme executive power derives from a mandate from the masses, not from some farcical aquatic ceremony." As such, I submit this to the masses for approval. Change-Id: Ie9767c58980855bf63ef94524553c08fcc202980 Signed-off-by: Ed Tanous <ed@tanous.net>
This component attempts to be a "do everything" embedded webserver for openbmc.
At this time, the webserver implements a few interfaces:
BMCWeb is configured by setting -D
flags that correspond to options in bmcweb/CMakeLists.txt
and then compiling. For example, cmake -DBMCWEB_ENABLE_KVM=NO ...
followed by make
. The option names become C++ preprocessor symbols that control which code is compiled into the program.
When BMCWeb starts running, it reads persistent configuration data (such as UUID and session data) from a local file. If this is not usable, it generates a new configuration.
When BMCWeb SSL support is enabled and a usable certificate is not found, it will generate a self-sign a certificate before launching the server. The keys are generated by the secp384r1
algorithm. The certificate
C=US, O=OpenBMC, CN=testhost
,SHA-256
algorithm.