commit | 97b0e43aa005798c81e8f918209f920e250c34c0 | [log] [tgz] |
---|---|---|
author | Sunitha Harish <sunithaharish04@gmail.com> | Thu Nov 21 04:59:29 2019 -0600 |
committer | Sunitha Harish <sunithaharish04@gmail.com> | Thu Apr 09 00:27:42 2020 -0500 |
tree | 312e0d68625cbcc015fa2243d5af89d09be46411 | |
parent | 453fed064da5751d4de325357ead2b4e1c5a3757 [diff] |
Save-area file upload to BMC This change includes: 1. New compiler option for the IBM management console specific functionalities 2. New REST path handler for the IBM path /ibm/v1/Host/ConfigFiles 3. Save-Area file Upload through REST interface PUT command Tested by : curl -k -H "X-Auth-Token: $bmc_token" -X PUT https://${bmc}/ibm/v1/Host/ConfigFiles/<filename> --data-binary "@<filepath>" Signed-off-by: Sunitha Harish <sunithaharish04@gmail.com> Change-Id: I939938009b2de447aea9af5bb3c53bdb845c4084
This component attempts to be a "do everything" embedded webserver for openbmc.
At this time, the webserver implements a few interfaces:
BMCWeb is configured by setting -D
flags that correspond to options in bmcweb/CMakeLists.txt
and then compiling. For example, cmake -DBMCWEB_ENABLE_KVM=NO ...
followed by make
. The option names become C++ preprocessor symbols that control which code is compiled into the program.
When BMCWeb starts running, it reads persistent configuration data (such as UUID and session data) from a local file. If this is not usable, it generates a new configuration.
When BMCWeb SSL support is enabled and a usable certificate is not found, it will generate a self-sign a certificate before launching the server. The keys are generated by the secp384r1
algorithm. The certificate
C=US, O=OpenBMC, CN=testhost
,SHA-256
algorithm.