| commit | 453fed064da5751d4de325357ead2b4e1c5a3757 | [log] [tgz] |
|---|---|---|
| author | Ratan Gupta <ratagupt@linux.vnet.ibm.com> | Sat Dec 14 09:39:47 2019 +0530 |
| committer | Ratan Gupta <ratagupt@linux.vnet.ibm.com> | Wed Apr 08 18:29:00 2020 +0000 |
| tree | eba35e2ee0c59f2f0791396c1fd9a485036702ed | |
| parent | cb6cb49df6778d48ef3a90d181169abfb4e4354e [diff] |
Rest service root implementation
This commit introduces the following
=> Service root implementation
=> compiler option for the IBM management console specific functionalities
TestedBy:
curl -k -H "X-Auth-Token: $bmc_token" -X GET https://${bmc}/ibm/v1
Signed-off-by: Ratan Gupta <ratagupt@linux.vnet.ibm.com>
Change-Id: I2dcb8eee0b69b1723e0cc3d980a5846b3519e7d9
This component attempts to be a "do everything" embedded webserver for openbmc.
At this time, the webserver implements a few interfaces:
BMCWeb is configured by setting -D flags that correspond to options in bmcweb/CMakeLists.txt and then compiling. For example, cmake -DBMCWEB_ENABLE_KVM=NO ... followed by make. The option names become C++ preprocessor symbols that control which code is compiled into the program.
When BMCWeb starts running, it reads persistent configuration data (such as UUID and session data) from a local file. If this is not usable, it generates a new configuration.
When BMCWeb SSL support is enabled and a usable certificate is not found, it will generate a self-sign a certificate before launching the server. The keys are generated by the secp384r1 algorithm. The certificate
C=US, O=OpenBMC, CN=testhost,SHA-256 algorithm.