commit | 425ed044e9422ad17e8d1924387620cd3d925f37 | [log] [tgz] |
---|---|---|
author | Gunnar Mills <gmills@us.ibm.com> | Thu Jan 16 14:26:39 2020 -0600 |
committer | Gunnar Mills <gmills@us.ibm.com> | Thu Jan 16 14:30:38 2020 -0600 |
tree | 40df490657890ff4430f626b714e23c481505471 | |
parent | cee23d931785fe0638054a2448acb2e44411fdd0 [diff] |
Fix security vulnerabilities Had a few more vulnerabilities show up including: regular expressions Cross-Site Scripting (XSS) vulnerability https://github.com/advisories/GHSA-h9rv-jmmf-4pgx Remediation Upgrade serialize-javascript to version 2.1.1 or later. Ran npm audit fix. Don't think this was a real vulnerability but always good to fix. Tested: Built for a Witherspoon, loaded on the code, and tested. Change-Id: I3af6941fdef98b950c7e17ddfeb368fdccc5cabc Signed-off-by: Gunnar Mills <gmills@us.ibm.com>
The OpenBMC WebUI is a Web-based user interface for the OpenBMC firmware stack. The WebUI uses AngularJS. Features include:
nodejs (>= 4.2.6) npm (>= 6.0.1)
Note The default installation of your Linux distro may not come with the required versions above. See the following for more information on updating:
https://docs.npmjs.com/troubleshooting/try-the-latest-stable-version-of-node https://docs.npmjs.com/troubleshooting/try-the-latest-stable-version-of-npm
npm install
Note This must be run from within the phosphor-webui git repository.
npm run-script server
This will start a server instance and begin listening for connections at http://localhost:8080
. This development server provides live reloading on code changes. NOTE: Browsing to https://<BMC>
and accepting the self-signed certificate might be required to prevent your browser from blocking traffic to the BMC.
Enter the BMC Host or BMC IP address, username, and password. The default username and password are root
/0penBmc
.
Note that some OpenBMC implementations use bmcweb for its backend. For security reasons, bmcweb will need to be recompiled and loaded onto the target BMC Host before the above redirect command will work. The option to turn on within bmcweb is BMCWEB_INSECURE_DISABLE_XSS_PREVENTION
. In order to test locally, you will also need to disable CSRF by turning on BMCWEB_INSECURE_DISABLE_CSRF_PREVENTION
.