commit | ad22fefecaf7988fd7072dc71042efbf86fc5162 | [log] [tgz] |
---|---|---|
author | Ed Tanous <edtanous@google.com> | Mon Sep 13 13:07:32 2021 -0700 |
committer | Ed Tanous <ed@tanous.net> | Fri Sep 17 16:39:43 2021 +0000 |
tree | a3b9291f037b5b5aa4367bacd1ddb9f2034b1eb1 | |
parent | 7de9f811db3400121e1453b1fa3da09ae6df69f6 [diff] |
Nullify HttpHeaders per the specification Per the definition of HttpHeaders in the schema "This object shall be null or an empty array in responses." This commit does as the specification commands. In theory, this could break clients that were checking the HttpHeaders after posting it, but it's not being put behind an option flag in this patchset for a couple reasons: 1. This has the potential to leak security secrets, as the normal use case for this is to put in Authorization headers. 2. Given that the most likely client that would "break" is the one doing the POST to this API, and it already has the data, it seems unlikely that there's any implementation that would explicitly check that the returned object is identical to the sent one, especially if error codes are handled properly. Tested: curl -vvvv --insecure -u root:0penBmc "https://192.168.7.2:443/redfish/v1/EventService/Subscriptions" -X POST -d "{\"Destination\":\"http://192.168.7.2/foo\",\"Context\":\"Public\",\"Protocol\":\"Redfish\",\"HttpHeaders\": [{\"Foo\": \"Bar\"}]}" Succeeded with 200 curl -vvvv --insecure -u root:0penBmc "https://192.168.7.2/redfish/v1/EventService/Subscriptions/405645225" Returned "HttpHeaders": [], As part of its object Signed-off-by: Ed Tanous <edtanous@google.com> Change-Id: I32181044d0af6b4395daea3f6ca4480022fc7553
This component attempts to be a "do everything" embedded webserver for openbmc.
At this time, the webserver implements a few interfaces:
BMCWeb is configured by setting -D
flags that correspond to options in bmcweb/meson_options.txt
and then compiling. For example, meson <builddir> -Dkvm=disabled ...
followed by ninja
in build directory. The option names become C++ preprocessor symbols that control which code is compiled into the program.
meson builddir ninja -C builddir
meson builddir -Dbuildtype=minsize -Db_lto=true -Dtests=disabled ninja -C buildir
If any of the dependencies are not found on the host system during configuration, meson automatically gets them via its wrap dependencies mentioned in bmcweb/subprojects
.
meson builddir -Dwrap_mode=nofallback ninja -C builddir
meson builddir -Dbuildtype=debug ninja -C builddir
meson builddir -Db_coverage=true -Dtests=enabled ninja coverage -C builddir test
When BMCWeb starts running, it reads persistent configuration data (such as UUID and session data) from a local file. If this is not usable, it generates a new configuration.
When BMCWeb SSL support is enabled and a usable certificate is not found, it will generate a self-sign a certificate before launching the server. The keys are generated by the secp384r1
algorithm. The certificate
C=US, O=OpenBMC, CN=testhost
,SHA-256
algorithm.