commit | 755a33c41a9d189525c835eb2257e7505cda3cec | [log] [tgz] |
---|---|---|
author | Zbigniew Kurzynski <zbigniew.kurzynski@intel.com> | Fri Feb 28 14:06:37 2020 +0100 |
committer | Zbigniew Kurzynski <zbigniew.kurzynski@intel.com> | Tue Mar 03 06:22:53 2020 +0000 |
tree | da38264ee311186111494eccec9a6d0eb98e44e3 | |
parent | 66afe4fa3eac1dfbfb55e1fb726502c75a96e58b [diff] |
Adding new types to simplify access to ManagedObjectType. Current implementation of the ManagedObjectType is quite complicate, it has a lot of nested elements and those it is hard to access them. These new definitions makes the definition more readable and used in code will improve operations on nested types of the ManagedObjectType. Tests: This change is just a definition and does not requires additional tests. Signed-off-by: Zbigniew Kurzynski <zbigniew.kurzynski@intel.com> Change-Id: Icadd57653262009e60e3b4391607d22fa4b7be6b
This component attempts to be a "do everything" embedded webserver for openbmc.
At this time, the webserver implements a few interfaces:
BMCWeb is configured by setting -D
flags that correspond to options in bmcweb/CMakeLists.txt
and then compiling. For example, cmake -DBMCWEB_ENABLE_KVM=NO ...
followed by make
. The option names become C++ preprocessor symbols that control which code is compiled into the program.
When BMCWeb starts running, it reads persistent configuration data (such as UUID and session data) from a local file. If this is not usable, it generates a new configuration.
When BMCWeb SSL support is enabled and a usable certificate is not found, it will generate a self-sign a certificate before launching the server. The keys are generated by the prime256v1
algorithm. The certificate
C=US, O=OpenBMC, CN=testhost
,SHA-256
algorithm.