commit | 6964c9820ad101d6fc30badd1ae353efea3dd094 | [log] [tgz] |
---|---|---|
author | James Feist <james.feist@linux.intel.com> | Tue Jul 28 16:10:23 2020 -0700 |
committer | James Feist <james.feist@linux.intel.com> | Wed Jul 29 12:00:06 2020 -0700 |
tree | 780e003294b379aa8997bfc937a0f40bc914d662 | |
parent | 80319af19c4b74a95a940ade10b13dee2562fe8a [diff] |
Fix MTLS Auth MTLS Auth was not in the authenticate header, making it authenticate too late now (in handle) as we now authenticate before reading the headers. Move it to the authenticate header. Tested: MTLS in Chrome and via scripting allowed GETs on resources Change-Id: Ia765efd5c588b497de010605b474f6bb886a9dd1 Signed-off-by: James Feist <james.feist@linux.intel.com>
This component attempts to be a "do everything" embedded webserver for openbmc.
At this time, the webserver implements a few interfaces:
BMCWeb is configured by setting -D
flags that correspond to options in bmcweb/CMakeLists.txt
and then compiling. For example, cmake -DBMCWEB_ENABLE_KVM=NO ...
followed by make
. The option names become C++ preprocessor symbols that control which code is compiled into the program.
When BMCWeb starts running, it reads persistent configuration data (such as UUID and session data) from a local file. If this is not usable, it generates a new configuration.
When BMCWeb SSL support is enabled and a usable certificate is not found, it will generate a self-sign a certificate before launching the server. The keys are generated by the secp384r1
algorithm. The certificate
C=US, O=OpenBMC, CN=testhost
,SHA-256
algorithm.