commit | ea4968c0e8e6a71a7a23263bd05e04147339e6c5 | [log] [tgz] |
---|---|---|
author | Gunnar Mills <gmills@us.ibm.com> | Thu Sep 26 16:19:12 2019 -0500 |
committer | Gunnar Mills <gmills@us.ibm.com> | Mon Sep 30 20:22:14 2019 +0000 |
tree | 07129acfb96c33413266f5f6d9e90cbe05e1cd2a | |
parent | 198ce1ff3900a82ad9e98ee473078a1bb8a2131a [diff] |
Update Callback role privileges The "Callback" role currently is an IPMI access point, can ssh to the BMC, and is a Readonly user in Redfish and the WebUI. Added a TODO to revisit this. See: https://github.com/openbmc/bmcweb/commit/88e097c4cfa1172504d802e9f6b327f095f2748e Tested: Loaded on a Witherspoon. Now see checkmarks for Callback in the following rows: Log in to the service and read resources, IPMI access point, Redfish access point, SSH access point, and WebUI access point. Change-Id: Ica4863b1a424d0b115fb48b988c712fe27c99d74 Signed-off-by: Gunnar Mills <gmills@us.ibm.com>
The OpenBMC WebUI is a Web-based user interface for the OpenBMC firmware stack. The WebUI uses AngularJS. Features include:
nodejs (>= 4.2.6) npm (>= 6.0.1)
Note The default installation of your Linux distro may not come with the required versions above. See the following for more information on updating:
https://docs.npmjs.com/troubleshooting/try-the-latest-stable-version-of-node https://docs.npmjs.com/troubleshooting/try-the-latest-stable-version-of-npm
npm install
Note This must be run from within the phosphor-webui git repository.
npm run-script server
This will start a server instance and begin listening for connections at http://localhost:8080
. This development server provides live reloading on code changes. NOTE: Browsing to https://<BMC>
and accepting the self-signed certificate might be required to prevent your browser from blocking traffic to the BMC.
Enter the BMC Host or BMC IP address, username, and password. The default username and password are root
/0penBmc
.
Note that some OpenBMC implementations use bmcweb for its backend. For security reasons, bmcweb will need to be recompiled and loaded onto the target BMC Host before the above redirect command will work. The option to turn on within bmcweb is BMCWEB_INSECURE_DISABLE_XSS_PREVENTION
. In order to test locally, you will also need to disable CSRF by turning on BMCWEB_INSECURE_DISABLE_CSRF_PREVENTION
.