commit | 7d7034a65cf91e481e74494eec36957ceff573e9 | [log] [tgz] |
---|---|---|
author | Zbigniew Lukwinski <zbigniew.lukwinski@linux.intel.com> | Thu Nov 14 15:49:29 2019 +0100 |
committer | Zbigniew Lukwinski <zbigniew.lukwinski@linux.intel.com> | Mon Nov 18 09:20:42 2019 +0000 |
tree | f4e780efda4e1da7c49f8ff2986f3c0b08979f28 | |
parent | a3002228555bbabb42387a27e8b4ec55240ce7eb [diff] |
mTLS access fix to some URLs. This patch is about fixing mTLS access to URL requiring Administrator or Opeartor privileges (e.g. /redfish/v1/AccountService). Tested manually with cURL: - prepare and install CA certificate, - call GET to the url=/redfish/v1/AccountService, - verify whether got status=200 and proper body in the response. Signed-off-by: Zbigniew Lukwinski <zbigniew.lukwinski@linux.intel.com> Change-Id: I65109bffadf4f1d6d410cd303687b6da55fd1be0
This component attempts to be a "do everything" embedded webserver for openbmc.
At this time, the webserver implements a few interfaces:
BMCWeb is configured by setting -D
flags that correspond to options in bmcweb/CMakeLists.txt
and then compiling. For example, cmake -DBMCWEB_ENABLE_KVM=NO ...
followed by make
. The option names become C++ preprocessor symbols that control which code is compiled into the program.
When BMCWeb starts running, it reads persistent configuration data (such as UUID and session data) from a local file. If this is not usable, it generates a new configuration.
When BMCWeb SSL support is enabled and a usable certificate is not found, it will generate a self-sign a certificate before launching the server. The keys are generated by the prime256v1
algorithm. The certificate
C=US, O=OpenBMC, CN=testhost
,SHA-256
algorithm.