commit | 453fed064da5751d4de325357ead2b4e1c5a3757 | [log] [tgz] |
---|---|---|
author | Ratan Gupta <ratagupt@linux.vnet.ibm.com> | Sat Dec 14 09:39:47 2019 +0530 |
committer | Ratan Gupta <ratagupt@linux.vnet.ibm.com> | Wed Apr 08 18:29:00 2020 +0000 |
tree | eba35e2ee0c59f2f0791396c1fd9a485036702ed | |
parent | cb6cb49df6778d48ef3a90d181169abfb4e4354e [diff] |
Rest service root implementation This commit introduces the following => Service root implementation => compiler option for the IBM management console specific functionalities TestedBy: curl -k -H "X-Auth-Token: $bmc_token" -X GET https://${bmc}/ibm/v1 Signed-off-by: Ratan Gupta <ratagupt@linux.vnet.ibm.com> Change-Id: I2dcb8eee0b69b1723e0cc3d980a5846b3519e7d9
This component attempts to be a "do everything" embedded webserver for openbmc.
At this time, the webserver implements a few interfaces:
BMCWeb is configured by setting -D
flags that correspond to options in bmcweb/CMakeLists.txt
and then compiling. For example, cmake -DBMCWEB_ENABLE_KVM=NO ...
followed by make
. The option names become C++ preprocessor symbols that control which code is compiled into the program.
When BMCWeb starts running, it reads persistent configuration data (such as UUID and session data) from a local file. If this is not usable, it generates a new configuration.
When BMCWeb SSL support is enabled and a usable certificate is not found, it will generate a self-sign a certificate before launching the server. The keys are generated by the secp384r1
algorithm. The certificate
C=US, O=OpenBMC, CN=testhost
,SHA-256
algorithm.