<feed xmlns='http://www.w3.org/2005/Atom'>
<title>phosphor-webui, branch master</title>
<subtitle>OpenBMC Phosphor WebUI sources</subtitle>
<id>https://git.raptorcs.com/git/phosphor-webui/atom?h=master</id>
<link rel='self' href='https://git.raptorcs.com/git/phosphor-webui/atom?h=master'/>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/phosphor-webui/'/>
<updated>2020-02-11T16:43:22+00:00</updated>
<entry>
<title>Create profile settings page</title>
<updated>2020-02-11T16:43:22+00:00</updated>
<author>
<name>Yoshie Muranaka</name>
<email>yoshiemuranaka@gmail.com</email>
</author>
<published>2020-01-29T21:21:12+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/phosphor-webui/commit/?id=4148f2eee6313068d3223871005160b2902abb18'/>
<id>urn:sha1:4148f2eee6313068d3223871005160b2902abb18</id>
<content type='text'>
Adding a profile settings page so readonly and operator
roles are able to change their own password.

Signed-off-by: Yoshie Muranaka &lt;yoshiemuranaka@gmail.com&gt;
Change-Id: Iee9536255ad47f4df4af8746c1e01da37c407f2b
</content>
</entry>
<entry>
<title>Block forwarding to non-local url</title>
<updated>2020-02-11T16:43:02+00:00</updated>
<author>
<name>James Feist</name>
<email>james.feist@linux.intel.com</email>
</author>
<published>2020-02-10T17:25:07+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/phosphor-webui/commit/?id=b0a0847a8eb02ae21f755942799a81c6e3475e64'/>
<id>urn:sha1:b0a0847a8eb02ae21f755942799a81c6e3475e64</id>
<content type='text'>
Currently we don't protect against forwarding to remote
url, so things like:

https://&lt;bmc-address&gt;/#/login?next=http:%2F%2Fyahoo.com

can be used to forward an unsuspecting user to a different
url. This fixes that issue.

Tested: Local redirects still work, above link does not

Closes #109

Change-Id: I4d6c52880156802860f405af43037fb84235912f
Signed-off-by: James Feist &lt;james.feist@linux.intel.com&gt;
</content>
</entry>
<entry>
<title>Fix security vulnerabilities</title>
<updated>2020-01-16T20:30:38+00:00</updated>
<author>
<name>Gunnar Mills</name>
<email>gmills@us.ibm.com</email>
</author>
<published>2020-01-16T20:26:39+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/phosphor-webui/commit/?id=425ed044e9422ad17e8d1924387620cd3d925f37'/>
<id>urn:sha1:425ed044e9422ad17e8d1924387620cd3d925f37</id>
<content type='text'>
Had a few more vulnerabilities show up including:
regular expressions Cross-Site Scripting (XSS) vulnerability

https://github.com/advisories/GHSA-h9rv-jmmf-4pgx

Remediation
Upgrade serialize-javascript to version 2.1.1 or later.

Ran npm audit fix.

Don't think this was a real vulnerability but always good to fix.

Tested: Built for a Witherspoon, loaded on the code, and tested.

Change-Id: I3af6941fdef98b950c7e17ddfeb368fdccc5cabc
Signed-off-by: Gunnar Mills &lt;gmills@us.ibm.com&gt;
</content>
</entry>
<entry>
<title>Update navigation to accordian-style menu</title>
<updated>2020-01-13T15:24:01+00:00</updated>
<author>
<name>kathy</name>
<email>kathryn.elainex.pine@intel.com</email>
</author>
<published>2019-11-11T18:35:31+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/phosphor-webui/commit/?id=cee23d931785fe0638054a2448acb2e44411fdd0'/>
<id>urn:sha1:cee23d931785fe0638054a2448acb2e44411fdd0</id>
<content type='text'>
- New navigation provides intuitive structure for showing relationship
between sections and pages
- Menu keeps an open state, which allows easy clicking to sibling pages
- Ability to preview all page sections w/o hover over blocking page content
- Allows user to see where they are within navigation at all times

Tested: Opened each page and confirmed new navigation worked, clicked through
to all pages successfully.

Change-Id: Ie10dc95d8e15ee9bf89a3bec9ff231c0a7065ed9
Signed-off-by: Kathy Pine &lt;kathryn.elainex.pine@intel.com&gt;
</content>
</entry>
<entry>
<title>Users: Role Table: Update ssh</title>
<updated>2019-12-19T00:45:00+00:00</updated>
<author>
<name>Gunnar Mills</name>
<email>gmills@us.ibm.com</email>
</author>
<published>2019-12-16T19:57:52+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/phosphor-webui/commit/?id=dda0b83ebe65f7dc90275a649245e85ba3e8b315'/>
<id>urn:sha1:dda0b83ebe65f7dc90275a649245e85ba3e8b315</id>
<content type='text'>
https://github.com/openbmc/openbmc/commit/19e81d3f3b731681a57bb5ef9681d33cc291bde8
restricts SSH authentication to only admin role users.

Updated the table.

Tested: Loaded on a Witherspoon
Change-Id: Ice5c93dc6dc4aa937de2c3fb9072c2f81719325c
Signed-off-by: Gunnar Mills &lt;gmills@us.ibm.com&gt;
</content>
</entry>
<entry>
<title>Users: Update Callback/NoAccess Role</title>
<updated>2019-12-19T00:44:53+00:00</updated>
<author>
<name>Gunnar Mills</name>
<email>gmills@us.ibm.com</email>
</author>
<published>2019-12-16T16:36:56+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/phosphor-webui/commit/?id=6765c07a2831434d7c5bb56a08a15c67adb0c3a2'/>
<id>urn:sha1:6765c07a2831434d7c5bb56a08a15c67adb0c3a2</id>
<content type='text'>
https://github.com/openbmc/bmcweb/commit/e9e6d240ab85e515f8d264e39b47a75043b73374
added a new user role, NoAccess.

https://github.com/openbmc/bmcweb/commit/cb3e11fadd77b04f5b26aefbde18411625e5e304
removed Callback.

This "NoAccess" role can not ssh, access Redfish, the D-Bus API, or
IPMI.

Tested: Loaded on a witherspoon.
Change-Id: I4f870fdefb5342344fd442876d671a59864bbf34
Signed-off-by: Gunnar Mills &lt;gmills@us.ibm.com&gt;
</content>
</entry>
<entry>
<title>User logged in when IsAuthenticated cookie is set.</title>
<updated>2019-12-16T12:45:09+00:00</updated>
<author>
<name>Wiktor Gołgowski</name>
<email>wiktor.golgowski@intel.com</email>
</author>
<published>2019-12-10T11:46:45+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/phosphor-webui/commit/?id=f2127efa1b7d1c9fc1625f6e30b75be0ed658d53'/>
<id>urn:sha1:f2127efa1b7d1c9fc1625f6e30b75be0ed658d53</id>
<content type='text'>
Related to https://gerrit.openbmc-project.xyz/c/openbmc/bmcweb/+/27270

Currently the only condition checked when user is logged in was the
"LOGIN_ID" value in browser session storage. The only place in the code
where it is set is the Basic Authorization flow.

In case of mTLS authentication, we are not able to set session storage
value. This is why additional 'IsAuthenticated' cookie is added.

In the case when user session expires, the failing XHR should cause the
page to redirect to the login prompt. Additionally, IsAuthenticated
cookie is removed to disable redirection.

Tested: verified the flow with the mTLS changes. User is put in the
webUI interface without login prompt when using mTLS authentication. If
the authentication fails, browser redirects to the login page.

Signed-off-by: Wiktor Gołgowski &lt;wiktor.golgowski@intel.com&gt;
Change-Id: Ia7061f3e146c6547d4bfdf42940150b1a5c06903
</content>
</entry>
<entry>
<title>AngularJS: vulnerability: npm audit fix</title>
<updated>2019-12-04T22:23:03+00:00</updated>
<author>
<name>Gunnar Mills</name>
<email>gmills@us.ibm.com</email>
</author>
<published>2019-11-20T21:48:16+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/phosphor-webui/commit/?id=86f4056a2dfee6fced5b5b03de04a7ef9c33d74f'/>
<id>urn:sha1:86f4056a2dfee6fced5b5b03de04a7ef9c33d74f</id>
<content type='text'>
https://github.com/advisories/GHSA-89mq-4x47-5v83
"In AngularJS before 1.7.9 the function merge() could be tricked
into adding or modifying properties of Object.prototype using
a __proto__ payload."

Although, don't see how this is a real threat to the webui
fixed anyway.

https://github.com/angular/angular.js/compare/v1.7.8...v1.7.9
The difference between 1.7.8 and 1.7.9 is small.

Discussion in the works to move any from AngularJS
https://lists.ozlabs.org/pipermail/openbmc/2019-November/019431.html

Tested: Built and loaded on a Witherspoon
Change-Id: Ibe2c9671203a76cd8b4dbb8b1dbbaae2a8230138
Signed-off-by: Gunnar Mills &lt;gmills@us.ibm.com&gt;
</content>
</entry>
<entry>
<title>Fix LDAP request resulting in 400 response</title>
<updated>2019-12-04T18:00:25+00:00</updated>
<author>
<name>Derick Montague</name>
<email>derick.montague@ibm.com</email>
</author>
<published>2019-12-03T18:52:42+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/phosphor-webui/commit/?id=b42b93d8adcf463dc7cc4422cf6718d698c95236'/>
<id>urn:sha1:b42b93d8adcf463dc7cc4422cf6718d698c95236</id>
<content type='text'>
- Remove all references to the AuthenticationType property since our
request is a PATCH and we are not changing the value.

Resolves: https://github.com/openbmc/phosphor-webui/issues/102

Signed-off-by: Derick Montague &lt;derick.montague@ibm.com&gt;
Change-Id: I911ac41bf61250847e4c308f09df8fd59dd27fa7
</content>
</entry>
<entry>
<title>Sorting certificate table</title>
<updated>2019-12-04T18:00:17+00:00</updated>
<author>
<name>Zbigniew Kurzynski</name>
<email>zbigniew.kurzynski@intel.com</email>
</author>
<published>2019-11-28T10:40:57+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/phosphor-webui/commit/?id=ca7e093bd789f34c35e714dc5bce1ae4e9ce4205'/>
<id>urn:sha1:ca7e093bd789f34c35e714dc5bce1ae4e9ce4205</id>
<content type='text'>
So far the certificate table was not sorted and it happen that having
multiple certificates they appear on different table position after
machine restart.
That is because the Redfish was used to get the list of certificates
and it does not guarantee any order of elements in returned
collections.

After merging this commit certificates will be always sorted by:
type, issuer name and then by date.

Tested:
Manual tests were made to cofirm that certificates are properly sorted.

Signed-off-by: Zbigniew Kurzynski &lt;zbigniew.kurzynski@intel.com&gt;
Change-Id: Ie8e63d598cd04e2396ed09244a69284e49566f8d
</content>
</entry>
</feed>
