As OpenBMC is intended to be deployed on an embedded system, care should be taken to avoid expensive constructs, and memory usage. In general, our performance and metric targets are:
Care should be taken to ensure that all code is written to be asynchronous in nature, to avoid blocking methods from stopping the processing of other tasks. At this time the webserver uses boost::asio for it async framework. Threads should be avoided if possible, and instead use async tasks within boost::asio.
Secure coding practices should be followed in all places in the webserver
In general, this means:
Error handling should be constructed in such a way that all possible errors return valid HTTP responses. The following HTTP codes will be used commonly
Where possible, 307 and 308 redirects should be avoided, as they introduce the possibility for subtle security bugs.
Given that the most common target of OpenBMC is an ARM11 processor, care needs to be taken to ensure startup times are low. In general this means:
The webserver shall provide the following authentication mechanisms.
There shall be connection between the authentication mechanism used and resources that are available over it. The webserver shall employ an authentication scheme that is in line with the rest of OpenBMC, and allows users and privileges to be provisioned from other interfaces.
The OpenBMC webserver shall follow the latest OWASP recommendations for authentication, session management, and security.
The performance priorities for the OpenBMC webserver are (in order):
In general, the OpenBMC webserver is built using the data driven design. Abstraction and Interface guarantees should be used when multiple implementations exist, but for implementations where only a single implementation exists, prefer to make the code correct and clean rather than implement a concrete interface.
The webserver should be capable of hosting phosphor-webui, and implementing the required flows to host the application. In general, all access methods should be available to the webui.
bmcweb's Redfish implementation, including Redfish OEM Resources, shall conform to the Redfish specification. Please keep bmcweb's Redfish support document updated. OEM schemas should conform and be developed in line with the rules in OEM SCHEMAS.
A number of examples of common errors are captured in the common errors doc. It is recommended that developers read and understand all of them before starting any openbmc development. Common Errors.
There are a variety of ways to develop and test bmcweb software changes. Here are the steps for using the SDK and QEMU.
git clone ssh://openbmc.gerrit/openbmc/bmcweb/
Follow directions in README.md to compile
Reduce binary size by stripping it when ready for testing
arm-openbmc-linux-gnueabi-strip bmcweb
Note: Stripping is not required and having the debug symbols could be useful depending on your testing. Leaving them will drastically increase your transfer time to the BMC.
scp -P 2222 bmcweb root@127.0.0.1:/tmp/
Special Notes: The address and port shown here (127.0.0.1 and 2222) reaches the QEMU session you set up in your development environment as described above.
systemctl stop bmcweb
Note: bmcweb supports being started directly in parallel with the bmcweb running as a service. The standalone bmcweb will be available on port 18080. An advantage of this is you can compare between the two easily for testing. In QEMU you would need to open up port 18080 when starting QEMU. Your curl commands would need to use 18080 to communicate.
mkdir -p /var/persist/usr mkdir -p /var/persist/work/usr mount -t overlay -o lowerdir=/usr,upperdir=/var/persist/usr,workdir=/var/persist/work/usr overlay /usr
rm /usr/bin/bmcweb
ln -sf /tmp/bmcweb /usr/bin/bmcweb
curl -c cjar -b cjar -k -X POST https://127.0.0.1:2443/login -d "{\"data\": [ \"root\", \"0penBmc\" ] }" curl -c cjar -b cjar -k -X GET https://127.0.0.1:2443/xyz/openbmc_project/state/bmc0
See the REST and Redfish cheatsheets for valid commands.
Please test all Redfish changes with the Redfish Service Validator. Your change should not introduce any new validator errors. Please include the Redfish Service Validator results as part of the commit message "Tested" field.
clang-tidy is a tool that can be used to identify coding style violations, bad design patterns, and bug prone constructs. The checks are implemented in the .clang-tidy file in the root of bmcweb, and are expected to be passing. To run, the best way is to run the checks in yocto.
# check out meta-clang in your openbmc root cd openbmc git clone https://github.com/kraj/meta-clang # add the meta-clang layer to BBLAYERS in $BBPATH/conf/bblayers.conf <path_to_your_build_dir>/meta-clang # Add this line to $BBPATH/conf/local.conf to build bmcweb with clang TOOLCHAIN_pn-bmcweb = "clang" # and build bitbake bmcweb # Open devshell (this will open a shell) bitbake -c devshell bmcweb # cd into the work dir cd oe-workdir/bmcweb-1.0+git999 # run clang tidy clang-tidy --header-filter=".*" -p . $BBPATH/workspace/sources/bmcweb/src/webserver_main.cpp