commit | d887fff197b2fc3357bcbb1adb028521699a204a | [log] [tgz] |
---|---|---|
author | Joseph Reynolds <joseph-reynolds@charter.net> | Tue Jan 14 16:34:09 2020 -0600 |
committer | Joseph Reynolds <joseph-reynolds@charter.net> | Thu Jan 30 16:24:12 2020 +0000 |
tree | cd2038b1dfd796becf9444d27b1024ca5dc4b7d7 | |
parent | d04ba325f3ef4e60eb4fd8e7477af78d1be0d79d [diff] |
Enhance return value from pamAuthenticateUser This enhances the return value from the pamAuthenticateUser function so callers can articulate PAM error codes like PAM_NEW_AUTHTOK_REQD which means the credentials are correct, but the password must be changed. Tested: Yes, scenarios via both Redfish login and Basic Auth: - correct username and password, password is not expired - correct username and password, password is expired - correct username and incorrect password, password is not expired - correct username and incorrect password, password is expired - non-existent user (passsword is not relevant) Signed-off-by: Joseph Reynolds <joseph-reynolds@charter.net> Change-Id: I1114d6c9cc591fb0a1853cb4edea32ad22f7b015
This component attempts to be a "do everything" embedded webserver for openbmc.
At this time, the webserver implements a few interfaces:
BMCWeb is configured by setting -D
flags that correspond to options in bmcweb/CMakeLists.txt
and then compiling. For example, cmake -DBMCWEB_ENABLE_KVM=NO ...
followed by make
. The option names become C++ preprocessor symbols that control which code is compiled into the program.
When BMCWeb starts running, it reads persistent configuration data (such as UUID and session data) from a local file. If this is not usable, it generates a new configuration.
When BMCWeb SSL support is enabled and a usable certificate is not found, it will generate a self-sign a certificate before launching the server. The keys are generated by the prime256v1
algorithm. The certificate
C=US, O=OpenBMC, CN=testhost
,SHA-256
algorithm.