<feed xmlns='http://www.w3.org/2005/Atom'>
<title>bmcweb/include, branch master</title>
<subtitle>OpenBMC Web server</subtitle>
<id>https://git.raptorcs.com/git/bmcweb/atom?h=master</id>
<link rel='self' href='https://git.raptorcs.com/git/bmcweb/atom?h=master'/>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/bmcweb/'/>
<updated>2020-02-03T17:14:45+00:00</updated>
<entry>
<title>Remove IBM specific variable name</title>
<updated>2020-02-03T17:14:45+00:00</updated>
<author>
<name>Ed Tanous</name>
<email>ed.tanous@intel.com</email>
</author>
<published>2019-10-23T20:30:04+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/bmcweb/commit/?id=c7a29d366c958bd20509ba88d17c4fb3cb38d7ef'/>
<id>urn:sha1:c7a29d366c958bd20509ba88d17c4fb3cb38d7ef</id>
<content type='text'>
Considering that the webui is no longer an "IBM" specific entity, and is
now the standard for the project, there's no need for this variable to
call it out explicitly.  Update comment and variable name to be more
correct.

Tested: No functional change, only comments.

Signed-off-by: Ed Tanous &lt;ed.tanous@intel.com&gt;
Change-Id: I2169876c38ccd558a3cfcfc61637720bd290b3ee
</content>
</entry>
<entry>
<title>Enhance return value from pamAuthenticateUser</title>
<updated>2020-01-30T16:24:12+00:00</updated>
<author>
<name>Joseph Reynolds</name>
<email>joseph-reynolds@charter.net</email>
</author>
<published>2020-01-14T22:34:09+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/bmcweb/commit/?id=d887fff197b2fc3357bcbb1adb028521699a204a'/>
<id>urn:sha1:d887fff197b2fc3357bcbb1adb028521699a204a</id>
<content type='text'>
This enhances the return value from the pamAuthenticateUser function so
callers can articulate PAM error codes like PAM_NEW_AUTHTOK_REQD which
means the credentials are correct, but the password must be changed.

Tested: Yes, scenarios via both Redfish login and Basic Auth:
 - correct username and password, password is not expired
 - correct username and password, password is expired
 - correct username and incorrect password, password is not expired
 - correct username and incorrect password, password is expired
 - non-existent user (passsword is not relevant)

Signed-off-by: Joseph Reynolds &lt;joseph-reynolds@charter.net&gt;
Change-Id: I1114d6c9cc591fb0a1853cb4edea32ad22f7b015
</content>
</entry>
<entry>
<title>nbd-proxy closing fixes</title>
<updated>2020-01-02T08:54:35+00:00</updated>
<author>
<name>Iwona Winiarska</name>
<email>iwona.winiarska@intel.com</email>
</author>
<published>2019-11-29T11:34:33+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/bmcweb/commit/?id=123e823757a6efc08b215766124ba7321e3cca55'/>
<id>urn:sha1:123e823757a6efc08b215766124ba7321e3cca55</id>
<content type='text'>
This commit fixes:
  - handling of virtual media unmount method
  - cancels unix socket async accept upon early websocket closing
    (reproduction with rapid start/stop button pressing or closing
     websocket just after negotation msg from NBD server)

Tested:
  - unmount method via WebUI
  - unix socket accept cancellation - modified NBD server to close
    websocket after sending negotation message &amp; rapid start/stop button
    pressing

Signed-off-by: Iwona Winiarska &lt;iwona.winiarska@intel.com&gt;
Signed-off-by: Jan Sowinski &lt;jan.sowinski@intel.com&gt;
Change-Id: Ibcbb87a7e35cfbee8c8b4686f64c9090c66f0c17
</content>
</entry>
<entry>
<title>Turning ON the mutual TLS</title>
<updated>2019-12-19T07:52:01+00:00</updated>
<author>
<name>Zbigniew Kurzynski</name>
<email>zbigniew.kurzynski@intel.com</email>
</author>
<published>2019-11-07T11:55:04+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/bmcweb/commit/?id=cac94c55c59a397524a04786f4d699e2bd7f21bf'/>
<id>urn:sha1:cac94c55c59a397524a04786f4d699e2bd7f21bf</id>
<content type='text'>
This commit sets the mutual TLS option to ON by default.

Core mTLS implementation was accepted under this commit:

   https://gerrit.openbmc-project.xyz/c/openbmc/bmcweb/+/23588

where by default the mTLS was disabled.

Tested:
   Manual tests were made to verify if this option turns the
   mTLS ON.

Signed-off-by: Zbigniew Kurzynski &lt;zbigniew.kurzynski@intel.com&gt;
Change-Id: I3bc5f5453d4c4df1cd7ecb0b8868423285b6ab83
</content>
</entry>
<entry>
<title>Remove #include of self</title>
<updated>2019-12-18T18:27:08+00:00</updated>
<author>
<name>Ed Tanous</name>
<email>ed.tanous@intel.com</email>
</author>
<published>2019-10-23T20:33:17+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/bmcweb/commit/?id=aede01cdec31ae90de1af81e26def4e9419b80e3'/>
<id>urn:sha1:aede01cdec31ae90de1af81e26def4e9419b80e3</id>
<content type='text'>
Through one of the refactors, webserver_common.hpp picked up an include
to itself, presumably when code was moved.  This doesn't cause any ill
effects, but is cruft that can be cleaned up.

Tested:
Code compiles.  No functional change to verify.

Signed-off-by: Ed Tanous &lt;ed.tanous@intel.com&gt;
Change-Id: Ie901baa3cfd88decdbecbad01c6b577d92d2441b
</content>
</entry>
<entry>
<title>Fix authorization for LDAP users</title>
<updated>2019-12-17T05:06:45+00:00</updated>
<author>
<name>RAJESWARAN THILLAIGOVINDAN</name>
<email>rajeswgo@in.ibm.com</email>
</author>
<published>2019-12-13T10:26:54+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/bmcweb/commit/?id=61dbeef97168db1a1f7a351c5f95e09afd361e48'/>
<id>urn:sha1:61dbeef97168db1a1f7a351c5f95e09afd361e48</id>
<content type='text'>
Modified the code to make an asynchronous call to GetUserInfo to get
the user role for authorization.

For local users, DBus matches are used to store user role map hot in
memory. Hence, bmcweb has to know whether a user is a local user or
LDAP user to get the role. To avoid this, removed the existing DBus
matches and modified the code to call GetUserInfo to get the role of
local users as well as LDAP users.

Tested:
-   Created a local user having admin privilege and verified that he is
    able to restart the system
    /redfish/v1/Systems/system/Actions/ComputerSystem.Reset
        -d '{"ResetType": "GracefulRestart"}'
-   Created a local user having user privilege and verified that he is
    unauthorized to restart the system
    /redfish/v1/Systems/system/Actions/ComputerSystem.Reset
        -d '{"ResetType": "GracefulRestart"}'
-   Created a remote user having admin privilege and verified that he is
    able to restart the system
    /redfish/v1/Systems/system/Actions/ComputerSystem.Reset
        -d '{"ResetType": "GracefulRestart"}'
-   Created a remote user having user privilege and verified that he is
    unauthorized to restart the system
    /redfish/v1/Systems/system/Actions/ComputerSystem.Reset
        -d '{"ResetType": "GracefulRestart"}'
-   Tested Redfish ConfigureSelf privilege

Signed-off-by: RAJESWARAN THILLAIGOVINDAN &lt;rajeswgo@in.ibm.com&gt;
Change-Id: Ic3e46a0c0aff2cf456c98048350e58e302011c57
</content>
</entry>
<entry>
<title>Fixing mTLS switches</title>
<updated>2019-12-16T08:07:09+00:00</updated>
<author>
<name>Zbigniew Kurzynski</name>
<email>zbigniew.kurzynski@intel.com</email>
</author>
<published>2019-11-14T12:37:15+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/bmcweb/commit/?id=009c2a4d7ba310789487910cc06cb19c745c1c97'/>
<id>urn:sha1:009c2a4d7ba310789487910cc06cb19c745c1c97</id>
<content type='text'>
This commit is a fix for revert:
https://gerrit.openbmc-project.xyz/c/openbmc/bmcweb/+/27205

The mTLS will work only when:

* Compilation flag BMCWEB_ENABLE_MUTUAL_TLS_AUTHENTICATION is
  enabled and,
* AccountService-&gt;Oem-&gt;OpenBMC-&gt;AuthMethods-&gt;TLS is set and,
* at least one certificate is uploaded to TrustStore.

To enforce a new mTLS settings after switching AuthMethods-&gt;TLS
all awaiting for acceptance connections are dropped.

In case of authorized mTLS requests a cookie with XSRF-TOKEN entry
and SESSION is added to response. It will force the X-XSRF-TOKEN
challenge in case of applications supporting cookies like web
browsers.

Also some minor log messages changes were made in this commit.

Tested:
validator_service run with status: 'Validation has succeeded'.

Tests were made with Chrome browser Version 78.0.3904.108.
The certificate popup appears only when mTLS is enabled in CMake,
the TLS option is set and at least one CA certificate is present.
In other cases mTLS is not active and there is no popup for certs.

Signed-off-by: Zbigniew Kurzynski &lt;zbigniew.kurzynski@intel.com&gt;
Change-Id: I778b848b767356b60386694f802a89b3c1f6cb14
</content>
</entry>
<entry>
<title>Change PAM service_name for password changes</title>
<updated>2019-12-11T21:00:05+00:00</updated>
<author>
<name>Joseph Reynolds</name>
<email>joseph-reynolds@charter.net</email>
</author>
<published>2019-12-05T23:53:35+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/bmcweb/commit/?id=96b39e02ba160cda74b70b4cd9bac34c760e1701'/>
<id>urn:sha1:96b39e02ba160cda74b70b4cd9bac34c760e1701</id>
<content type='text'>
BMCWeb was using the "passwd" command PAM configuration settings when changing
the password.  This changes it to use PAM service_name="webserver", the same
name it already uses for PAM authentication and account management functions.

Doing so allows the BMC system administrator to provide separate PAM config
files for the "passwd" command and BMCWeb's password changing function, and
for these activities to be correctly identified in the system logs.

Here is a sample incorrect log message (truncated &amp; wrapped):
bmcweb[353]: pam_warn(passwd:chauthtok): function=[pam_sm_chauthtok]
    flags=0xc000 service=[passwd] terminal=[&lt;unknown&gt;] user=[testuser]
    ruser=[&lt;unknown&gt;] rhost=[&lt;unknown&gt;]
The "service" should be "webserver".

Tested: yes, password change successful

Change-Id: I593f42c8f0494df967fb498fb4dd66fa4168596b
Signed-off-by: Joseph Reynolds &lt;joseph-reynolds@charter.net&gt;
</content>
</entry>
<entry>
<title>Revert "Fix authorization for LDAP users"</title>
<updated>2019-12-10T17:22:47+00:00</updated>
<author>
<name>James Feist</name>
<email>james.feist@linux.intel.com</email>
</author>
<published>2019-12-10T16:52:14+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/bmcweb/commit/?id=7166bf0fd7453f2b5d6bfb3afbdad5eb00f74990'/>
<id>urn:sha1:7166bf0fd7453f2b5d6bfb3afbdad5eb00f74990</id>
<content type='text'>
This reverts commit 5e931ae994307babe6c3520cbaca6a7139acc81d.

Reason for revert: Causing build failures

/bmcweb/redfish-core/include/node.hpp: In member function ‘bool redfish::Node::isAllowedWithoutConfigureSelf(const crow::Request&amp;)’:
/bmcweb/redfish-core/include/node.hpp:182:36: error: ‘crow::persistent_data::UserRoleMap’ has not been declared
             crow::persistent_data::UserRoleMap::getInstance().getUserRole(

When 900f949773795141266271107219ea019f2839cd was merged first
this patch was not successfully rebased.

Change-Id: I947d96362c7dadea5572888468a11fac5ee361d4
Signed-off-by: James Feist &lt;james.feist@linux.intel.com&gt;
</content>
</entry>
<entry>
<title>Fix authorization for LDAP users</title>
<updated>2019-12-09T15:17:13+00:00</updated>
<author>
<name>RAJESWARAN THILLAIGOVINDAN</name>
<email>rajeswgo@in.ibm.com</email>
</author>
<published>2019-07-15T12:51:33+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/bmcweb/commit/?id=5e931ae994307babe6c3520cbaca6a7139acc81d'/>
<id>urn:sha1:5e931ae994307babe6c3520cbaca6a7139acc81d</id>
<content type='text'>
Modified the code to make an asynchronous call to GetUserInfo to get
the user role for authorization.

For local users, DBus matches are used to store user role map hot in
memory. Hence, bmcweb has to know whether a user is a local user or
LDAP user to get the role. To avoid this, removed the existing DBus
matches and modified the code to call GetUserInfo to get the role of
local users as well as LDAP users.

Tested:
-   Created a local user having admin privilege and verified that he is
    able to restart the system
    /redfish/v1/Systems/system/Actions/ComputerSystem.Reset
        -d '{"ResetType": "GracefulRestart"}'
-   Created a local user having user privilege and verified that he is
    unauthorized to restart the system
    /redfish/v1/Systems/system/Actions/ComputerSystem.Reset
        -d '{"ResetType": "GracefulRestart"}'
-   Created a remote user having admin privilege and verified that he is
    able to restart the system
    /redfish/v1/Systems/system/Actions/ComputerSystem.Reset
        -d '{"ResetType": "GracefulRestart"}'
-   Created a remote user having user privilege and verified that he is
    unauthorized to restart the system
    /redfish/v1/Systems/system/Actions/ComputerSystem.Reset
        -d '{"ResetType": "GracefulRestart"}'

Signed-off-by: RAJESWARAN THILLAIGOVINDAN &lt;rajeswgo@in.ibm.com&gt;
Change-Id: Ifd813e1af4dfcb7aeaba18e04b6c9767d2a5e95a
</content>
</entry>
</feed>
