| commit | 1ddcf01a159779cb5af2992b8f1e8ba9ab7484a5 | [log] [tgz] |
|---|---|---|
| author | Jason M. Bills <jason.m.bills@linux.intel.com> | Tue Nov 26 14:59:21 2019 -0800 |
| committer | Jason Bills <jason.m.bills@linux.intel.com> | Mon Dec 02 16:53:55 2019 +0000 |
| tree | 71a5ce6efb1cbb7558d82ae64e76e6b6f519bd6d | |
| parent | e195977836ef5135d9362f40e8755da8c34dc0d7 [diff] |
Return a 404 instead of 500 for invalid Crashdump URIs Tested: Used a browser to request an invalid Crashdump URI and got a 404 with a resource not found error. Change-Id: Idcac7868bb1f3b4c0248926b46be2cf4fce05328 Signed-off-by: Jason M. Bills <jason.m.bills@linux.intel.com>
This component attempts to be a "do everything" embedded webserver for openbmc.
At this time, the webserver implements a few interfaces:
BMCWeb is configured by setting -D flags that correspond to options in bmcweb/CMakeLists.txt and then compiling. For example, cmake -DBMCWEB_ENABLE_KVM=NO ... followed by make. The option names become C++ preprocessor symbols that control which code is compiled into the program.
When BMCWeb starts running, it reads persistent configuration data (such as UUID and session data) from a local file. If this is not usable, it generates a new configuration.
When BMCWeb SSL support is enabled and a usable certificate is not found, it will generate a self-sign a certificate before launching the server. The keys are generated by the prime256v1 algorithm. The certificate
C=US, O=OpenBMC, CN=testhost,SHA-256 algorithm.