commit | 8724c2975eaeb0eb36715204fec4406eb484e8e5 | [log] [tgz] |
---|---|---|
author | Karthick Sundarrajan <karthick.sundarrajan@intel.com> | Mon Jan 06 09:04:48 2020 -0800 |
committer | Karthick Sundarrajan <karthick.sundarrajan@intel.com> | Fri Jan 17 19:43:41 2020 +0000 |
tree | 98af41afd3c6b5282aa230c3010b79c3bdacdad3 | |
parent | bc6be2376b4a5407e51deab72b1a4c8a1b7fd425 [diff] |
Changed input data format for Crashdump.SendRawPeci At present, the Crashdump.SendRawPeci redfish interface accepts one PECI command at a time. Changed it to accept array of PECI commands through which multiple PECI commands can be aggregated into one redfish call. Also provided backward compatibility for existing single PECI command input format. Tested: Tested by aggregating 1000 PECI commands in one redfish call. Tested by giving single PECI command with the existing format. Change-Id: I05c547438ce9833519807b39347223183bdfb4ed Signed-off-by: Karthick Sundarrajan <karthick.sundarrajan@intel.com>
This component attempts to be a "do everything" embedded webserver for openbmc.
At this time, the webserver implements a few interfaces:
BMCWeb is configured by setting -D
flags that correspond to options in bmcweb/CMakeLists.txt
and then compiling. For example, cmake -DBMCWEB_ENABLE_KVM=NO ...
followed by make
. The option names become C++ preprocessor symbols that control which code is compiled into the program.
When BMCWeb starts running, it reads persistent configuration data (such as UUID and session data) from a local file. If this is not usable, it generates a new configuration.
When BMCWeb SSL support is enabled and a usable certificate is not found, it will generate a self-sign a certificate before launching the server. The keys are generated by the prime256v1
algorithm. The certificate
C=US, O=OpenBMC, CN=testhost
,SHA-256
algorithm.