commit | ddfc22f272148f57fe8abb62b7909724970339bf | [log] [tgz] |
---|---|---|
author | Jason M. Bills <jason.m.bills@linux.intel.com> | Tue Oct 08 12:10:39 2019 -0700 |
committer | Jason Bills <jason.m.bills@linux.intel.com> | Tue Oct 29 18:42:47 2019 +0000 |
tree | a6c53317eace6dc09ebcc6c079102a4c0fbd4eba | |
parent | e855dd28ff68c13fea57b49f34da9302e6b2f6cd [diff] |
Add a Redfish schema for the Crashdump OEM Actions Tested: Passed the Redfish Service Validator Change-Id: Ib121346e3be031584eb522ceb8c8e4e3a350f13a Signed-off-by: Jason M. Bills <jason.m.bills@linux.intel.com>
This component attempts to be a "do everything" embedded webserver for openbmc.
At this time, the webserver implements a few interfaces:
BMCWeb is configured by setting -D
flags that correspond to options in bmcweb/CMakeLists.txt
and then compiling. For example, cmake -DBMCWEB_ENABLE_KVM=NO ...
followed by make
. The option names become C++ preprocessor symbols that control which code is compiled into the program.
When BMCWeb starts running, it reads persistent configuration data (such as UUID and session data) from a local file. If this is not usable, it generates a new configuration.
When BMCWeb SSL support is enabled and a usable certificate is not found, it will generate a self-sign a certificate before launching the server. The keys are generated by the prime256v1
algorithm. The certificate
C=US, O=OpenBMC, CN=testhost
,SHA-256
algorithm.