blob: 557bbe291ed20102166642f6b0ff38ca85bad5e9 [file] [log] [blame]
Ed Tanous40e9b922024-09-10 13:50:16 -07001// SPDX-License-Identifier: Apache-2.0
2// SPDX-FileCopyrightText: Copyright OpenBMC Authors
Ed Tanous3cd70722024-04-06 09:24:01 -07003#include "webserver_run.hpp"
4
5#include "bmcweb_config.h"
6
7#include "app.hpp"
Ed Tanous3cd70722024-04-06 09:24:01 -07008#include "dbus_monitor.hpp"
9#include "dbus_singleton.hpp"
10#include "event_service_manager.hpp"
11#include "google/google_service_root.hpp"
12#include "hostname_monitor.hpp"
13#include "ibm/management_console_rest.hpp"
14#include "image_upload.hpp"
15#include "kvm_websocket.hpp"
Ed Tanous5b904292024-04-16 11:10:17 -070016#include "logging.hpp"
Ed Tanous3cd70722024-04-06 09:24:01 -070017#include "login_routes.hpp"
Ed Tanous3cd70722024-04-06 09:24:01 -070018#include "obmc_console.hpp"
19#include "openbmc_dbus_rest.hpp"
20#include "redfish.hpp"
21#include "redfish_aggregator.hpp"
Ed Tanous3cd70722024-04-06 09:24:01 -070022#include "user_monitor.hpp"
23#include "vm_websocket.hpp"
24#include "webassets.hpp"
25
Ed Tanous3cd70722024-04-06 09:24:01 -070026#include <boost/asio/io_context.hpp>
27#include <sdbusplus/asio/connection.hpp>
Aushim Nagarkattibd1299b2024-08-12 17:11:04 -070028#include <sdbusplus/asio/object_server.hpp>
Ed Tanous5b904292024-04-16 11:10:17 -070029
Ed Tanous41fe81c2024-09-02 15:08:41 -070030#include <algorithm>
Ed Tanous5b904292024-04-16 11:10:17 -070031#include <memory>
Ed Tanous41fe81c2024-09-02 15:08:41 -070032#include <string>
33#include <string_view>
Ed Tanous3cd70722024-04-06 09:24:01 -070034
Aushim Nagarkattibd1299b2024-08-12 17:11:04 -070035static void setLogLevel(const std::string& logLevel)
36{
37 const std::basic_string_view<char>* iter =
38 std::ranges::find(crow::mapLogLevelFromName, logLevel);
39 if (iter == crow::mapLogLevelFromName.end())
40 {
41 BMCWEB_LOG_ERROR("log-level {} not found", logLevel);
42 return;
43 }
44 crow::getBmcwebCurrentLoggingLevel() = crow::getLogLevelFromName(logLevel);
45 BMCWEB_LOG_INFO("Requested log-level change to: {}", logLevel);
46}
47
Ed Tanous3cd70722024-04-06 09:24:01 -070048int run()
49{
50 auto io = std::make_shared<boost::asio::io_context>();
51 App app(io);
52
Aushim Nagarkattibd1299b2024-08-12 17:11:04 -070053 std::shared_ptr<sdbusplus::asio::connection> systemBus =
54 std::make_shared<sdbusplus::asio::connection>(*io);
55 crow::connections::systemBus = systemBus.get();
56
57 auto server = sdbusplus::asio::object_server(systemBus);
58
59 std::shared_ptr<sdbusplus::asio::dbus_interface> iface =
60 server.add_interface("/xyz/openbmc_project/bmcweb",
61 "xyz.openbmc_project.bmcweb");
62
63 iface->register_method("SetLogLevel", setLogLevel);
64
65 iface->initialize();
Ed Tanous3cd70722024-04-06 09:24:01 -070066
67 // Static assets need to be initialized before Authorization, because auth
68 // needs to build the whitelist from the static routes
69
Ed Tanous25b54db2024-04-17 15:40:31 -070070 if constexpr (BMCWEB_STATIC_HOSTING)
71 {
72 crow::webassets::requestRoutes(app);
73 }
Ed Tanous3cd70722024-04-06 09:24:01 -070074
Ed Tanous25b54db2024-04-17 15:40:31 -070075 if constexpr (BMCWEB_KVM)
76 {
77 crow::obmc_kvm::requestRoutes(app);
78 }
Ed Tanous3cd70722024-04-06 09:24:01 -070079
Ed Tanous25b54db2024-04-17 15:40:31 -070080 if constexpr (BMCWEB_REDFISH)
81 {
82 redfish::RedfishService redfish(app);
Alexander Hansen6c58a032024-11-21 15:27:04 -080083
84 // Create EventServiceManager instance and initialize Config
85 redfish::EventServiceManager::getInstance(&*io);
Ed Tanous3cd70722024-04-06 09:24:01 -070086
Ed Tanous25b54db2024-04-17 15:40:31 -070087 if constexpr (BMCWEB_REDFISH_AGGREGATION)
88 {
89 // Create RedfishAggregator instance and initialize Config
90 redfish::RedfishAggregator::getInstance(&*io);
91 }
92 }
Ed Tanous3cd70722024-04-06 09:24:01 -070093
Ed Tanous25b54db2024-04-17 15:40:31 -070094 if constexpr (BMCWEB_REST)
95 {
96 crow::dbus_monitor::requestRoutes(app);
97 crow::image_upload::requestRoutes(app);
98 crow::openbmc_mapper::requestRoutes(app);
99 }
Ed Tanous3cd70722024-04-06 09:24:01 -0700100
Ed Tanous25b54db2024-04-17 15:40:31 -0700101 if constexpr (BMCWEB_HOST_SERIAL_SOCKET)
102 {
103 crow::obmc_console::requestRoutes(app);
104 }
Ed Tanous3cd70722024-04-06 09:24:01 -0700105
Ed Tanous3cd70722024-04-06 09:24:01 -0700106 crow::obmc_vm::requestRoutes(app);
Ed Tanous3cd70722024-04-06 09:24:01 -0700107
Ed Tanous25b54db2024-04-17 15:40:31 -0700108 if constexpr (BMCWEB_IBM_MANAGEMENT_CONSOLE)
109 {
110 crow::ibm_mc::requestRoutes(app);
111 }
Ed Tanous3cd70722024-04-06 09:24:01 -0700112
Ed Tanous25b54db2024-04-17 15:40:31 -0700113 if constexpr (BMCWEB_GOOGLE_API)
114 {
115 crow::google_api::requestRoutes(app);
116 }
Ed Tanous3cd70722024-04-06 09:24:01 -0700117
Ed Tanous3cd70722024-04-06 09:24:01 -0700118 crow::login_routes::requestRoutes(app);
119
Ed Tanous25b54db2024-04-17 15:40:31 -0700120 if constexpr (!BMCWEB_INSECURE_DISABLE_SSL)
Ed Tanous8db83742024-04-13 09:11:15 -0700121 {
122 BMCWEB_LOG_INFO("Start Hostname Monitor Service...");
123 crow::hostname_monitor::registerHostnameSignal();
124 }
Ed Tanous3cd70722024-04-06 09:24:01 -0700125
126 bmcweb::registerUserRemovedSignal();
127
128 app.run();
Aushim Nagarkattibd1299b2024-08-12 17:11:04 -0700129
130 systemBus->request_name("xyz.openbmc_project.bmcweb");
131
Ed Tanous3cd70722024-04-06 09:24:01 -0700132 io->run();
133
134 crow::connections::systemBus = nullptr;
135
Ed Tanous3cd70722024-04-06 09:24:01 -0700136 return 0;
137}