History log of /openbmc/bmcweb/features/redfish/lib/account_service.hpp (Results 151 – 175 of 199)
Revision Date Author Comments
# 78158631 05-Nov-2019 Zbigniew Kurzynski <zbigniew.kurzynski@intel.com>

Auth methods configuration

Added Oem extension for AccountService allowing user to configure
which authentication methods should be enabled. User is now able
to turn on and off authentication method

Auth methods configuration

Added Oem extension for AccountService allowing user to configure
which authentication methods should be enabled. User is now able
to turn on and off authentication methods like BasicAuth, XToken, etc.
User is not allowed to turn off all of the methods at once - at least
one method has to be active to prevent lock-out. This configuration
is persistent, will be saved on file-system and will be loaded on
bmcweb's restart.

Tested:
No regression found in manual testing. By default everything works as before,
and disabling auth method prevents user to authenticate by it. Tested that
user is not allowed to disable all the methods - either in one PATCH or by
disabling them one at a time.
ServiceValidator run with success.

This change is a fix for this request:
https://gerrit.openbmc-project.xyz/c/openbmc/bmcweb/+/23590/18

which was revert here:
https://gerrit.openbmc-project.xyz/c/openbmc/bmcweb/+/26869

Signed-off-by: Zbigniew Kurzynski <zbigniew.kurzynski@intel.com>
Change-Id: I66b5ad423746f1992070a14f2983a07b1320190e

show more ...


# 66b5ca76 07-Aug-2019 jayaprakash Mutyala <mutyalax.jayaprakash@intel.com>

account_service: redfish user Patch error handling

Modified doPatch method to populate redfish user update error codes.

Tested:
Tested user updates with below scenarios
1)Provided username is not e

account_service: redfish user Patch error handling

Modified doPatch method to populate redfish user update error codes.

Tested:
Tested user updates with below scenarios
1)Provided username is not exist
2)Replace username already user exists
3)Replace Username is NULL/Invalid
4)Replace username is not starting with alphabet
5)Replace username exceeds more than 16 characters
6)Password is not valid for Replace/existing username

Redfish validator test results:
1 failProp errors in /redfish/v1/Systems/system/LogServices/EventLog
1 problemResource errors in /redfish/v1/Systems/system/LogServices/
EventLog/Entries
Counter({'skipOptional': 17887, 'pass': 12133, 'passGet': 1285,
'metadataNamespaces': 1047, 'serviceNamespaces': 69, 'reflink': 9,
'passAction': 7, 'warningPresent': 6, 'optionalAction': 6,
'repeat': 3, 'invalidPropertyValue': 3, 'failErrorPresent': 1,
'err.LogEntryCollection.LogEntryCollection': 1, 'failProp': 1,
'unvalidated': 1, 'problemResource': 1,
'unverifiedComplexAdditional': 1, 'warnTrailingSlashLink': 1})
Validation has failed: 3 problems found

Signed-off-by: jayaprakash Mutyala <mutyalax.jayaprakash@intel.com>
Change-Id: Ibee448c5d5c4f38c5c4cacda757864593f6001fc

show more ...


# eecd51a4 04-Nov-2019 James Feist <james.feist@linux.intel.com>

Revert "Auth methods configuration"

This reverts commit 0ff64dc2cd3a15b4204a477ad2eb5219d66e6110.

Reason for revert: <breaks redfish validator, <edmx:Reference Uri="/redfish/v1/schema/OemAccountSer

Revert "Auth methods configuration"

This reverts commit 0ff64dc2cd3a15b4204a477ad2eb5219d66e6110.

Reason for revert: <breaks redfish validator, <edmx:Reference Uri="/redfish/v1/schema/OemAccountService_v1.xml"> but the file name unversioned static/redfish/v1/schema/OemAccountService.xml>

Change-Id: I696dd09bf519e364f5f529a674e047a8eeead578
Signed-off-by: James Feist <james.feist@linux.intel.com>

show more ...


# 0ff64dc2 12-Jul-2019 Kowalski, Kamil <kamil.kowalski@intel.com>

Auth methods configuration

Added Oem extension for AccountService allowing user to configure
which authentication methods should be enabled. User is now able
to turn on and off authentication method

Auth methods configuration

Added Oem extension for AccountService allowing user to configure
which authentication methods should be enabled. User is now able
to turn on and off authentication methods like BasicAuth, XToken, etc.
User is not allowed to turn off all of the methods at once - at least
one method has to be active to prevent lock-out. This configuration
is persistent, will be saved on file-system and will be loaded on
bmcweb's restart.

Tested:
No regression found in manual testing. By default everything works as before,
and disabling auth method prevents user to authenticate by it. Tested that
user is not allowed to disable all the methods - either in one PATCH or by
disabling them one at a time.
ServiceValidator run with success.

Change-Id: I3a775d783ac05998d17b8e91800962bffd8cab52
Signed-off-by: Kowalski, Kamil <kamil.kowalski@intel.com>
Signed-off-by: Zbigniew Kurzynski <zbigniew.kurzynski@intel.com>

show more ...


# 0f0353b6 24-Oct-2019 Ed Tanous <ed.tanous@intel.com>

Modernize: use emplace instead of push_back

We had a couple uses of push_back in the code that could be made more
efficient with emplace(). Use them instead.

Tested: No functional change. Needs t

Modernize: use emplace instead of push_back

We had a couple uses of push_back in the code that could be made more
efficient with emplace(). Use them instead.

Tested: No functional change. Needs tested.

Signed-off-by: Ed Tanous <ed.tanous@intel.com>
Change-Id: I417601e416b1d0be989617a372978d52670135d8

show more ...


# c80fee55 16-Oct-2019 AppaRao Puli <apparao.puli@linux.intel.com>

Renamed User role name to ReadOnly

As per redfish specification (DSP0266), there are
set of predefined privilege roles. In OpenBMC code
has "User" as role name instead of "ReadOnly".
So corrected th

Renamed User role name to ReadOnly

As per redfish specification (DSP0266), there are
set of predefined privilege roles. In OpenBMC code
has "User" as role name instead of "ReadOnly".
So corrected the same. Updated Redfish.md accordingly.

Spec says:
Role Name = "ReadOnly"
▪ AssignedPrivileges = Login, ConfigureSelf

Tested:
- Role collection shows new role.
- GET on /redfish/v1/AccountService/Roles/ReadOnly
URI shows correct AssignedPrivileges.
- Ran negative test with /redfish/v1/AccountService/Roles/User
and observed error(404 - Not Found).
- Ran Redfish validator and no new issues observed.

Signed-off-by: AppaRao Puli <apparao.puli@linux.intel.com>
Change-Id: I7b0132c628fb4950b6ec095269cd1a12e92aea9a

show more ...


# 271584ab 09-Jul-2019 Ed Tanous <ed.tanous@intel.com>

Fix a bunch of warnings

using the list of warnings from here:
https://github.com/lefticus/cppbestpractices/blob/e73393f25a85f83fed7399d8b65cb117d00b2231/02-Use_the_Tools_Available.md#L100

Seems lik

Fix a bunch of warnings

using the list of warnings from here:
https://github.com/lefticus/cppbestpractices/blob/e73393f25a85f83fed7399d8b65cb117d00b2231/02-Use_the_Tools_Available.md#L100

Seems like a good place to start, and would improve things a bit
type-wise. This patchset attempts to correct all the issues in one
shot.

Tested:
It builds. Will test various subsystems that have been touched

Signed-off-by: Ed Tanous <ed.tanous@intel.com>
Change-Id: I588c26440e5a97f718a0f0ea74cc84107d53aa1e

show more ...


# 06785244 26-Jul-2019 Ratan Gupta <ratagupt@linux.vnet.ibm.com>

Redfish: Add PATCH operation support for RemoteRoleMapping

Added PATCH operation support for RemoteRoleMapping property under
LDAP/ActiveDirectory property in AccountService schema.

1. How to add t

Redfish: Add PATCH operation support for RemoteRoleMapping

Added PATCH operation support for RemoteRoleMapping property under
LDAP/ActiveDirectory property in AccountService schema.

1. How to add the Role Mapping?

PATCH {"ActiveDirectory":{"RemoteRoleMapping": [{"RemoteGroup":
"Admingroup15","LocalRole": "User"},{"RemoteGroup": "Admingroup13",
"LocalRole": "Administrator"},{"RemoteGroup": "Admingroup14",
"LocalRole": "Operator"}]}}

With the above PATCH request, all the above role mapping gets added.

2. How to delete a specific role mapping?

After adding the above roles mapping, if user want to delete the second mapping
which is ({"RemoteGroup": "Admingroup13", "LocalRole": "Administrator"})

Following PATCH request would be used.
PATCH {"ActiveDirectory":{"RemoteRoleMapping": [{},null,{}]}}

3. How to update specific role mapping ?

Let's take a case where user want to update the second role mapping
PATCH {"ActiveDirectory":{"RemoteRoleMapping": [{},{"RemoteGroup":"Admingroup25","LocalRole": "User"},{}]}}
or
PATCH {"ActiveDirectory":{"RemoteRoleMapping": [{},{"RemoteGroup":"Admingroup25"},{}]}} and \
PATCH {"ActiveDirectory":{"RemoteRoleMapping": [{},{"LocalRole": "User"},{}]}}
Tested:

1. Did a PATCH operation with below given Data:

' {"ActiveDirectory":{"RemoteRoleMapping": [{"RemoteGroup": "Admingroup215","LocalRole": "User"}, \
{"RemoteGroup": "Admingroup213","LocalRole":"Administrator"},{"RemoteGroup":"Admingroup214","LocalRole":"Operator"}]}}'

2. With GET got below given data:

"RemoteRoleMapping": [
{
"LocalRole": "Operator",
"RemoteGroup": "Admingroup214"
},
{
"LocalRole": "Administrator",
"RemoteGroup": "Admingroup213"
},
{
"LocalRole": "User",
"RemoteGroup": "Admingroup215"
}
],

3. Did a PATCH operation with below given Data:

'{"ActiveDirectory":{"RemoteRoleMapping": [{},null,{}]}}'

4. With GET got below given data:

"RemoteRoleMapping": [
{
"LocalRole": "Operator",
"RemoteGroup": "Admingroup214"
},
{
"LocalRole": "User",
"RemoteGroup": "Admingroup215"
}
],

5. Did a PATCH operation with below given Data:

'{"ActiveDirectory":{"RemoteRoleMapping": [null,null]}}'

6. With GET got below given data:

"RemoteRoleMapping": []

7. Did a PATCH operation with below given Data:

'{"ActiveDirectory":{"RemoteRoleMapping": [{"RemoteGroup": "Admingroup215","LocalRole": "User"}, \
{"RemoteGroup": "Admingroup213","LocalRole":"Administrator"},{"RemoteGroup":"Admingroup214","LocalRole":"Operator"}]}}'

8. With GET got below given data:

"RemoteRoleMapping": [
{
"LocalRole": "Administrator",
"RemoteGroup": "Admingroup213"
},
{
"LocalRole": "Operator",
"RemoteGroup": "Admingroup214"
},
{
"LocalRole": "User",
"RemoteGroup": "Admingroup215"
}
],
9. Did a PATCH operation with below given Data:

'{"ActiveDirectory":{"RemoteRoleMapping": [{"RemoteGroup": "Admingroup25"},{},{}]}}'

10.With GET got below given data:

"RemoteRoleMapping": [
{
"LocalRole": "Administrator",
"RemoteGroup": "Admingroup25"
},
{
"LocalRole": "Operator",
"RemoteGroup": "Admingroup214"
},
{
"LocalRole": "User",
"RemoteGroup": "Admingroup215"
}
],
11. Did a PATCH operation with below given Data:

'{"ActiveDirectory":{"RemoteRoleMapping": [{"LocalRole": "User"},{},{}]}}'

12.With GET got below given data:

"RemoteRoleMapping": [
{
"LocalRole": "User",
"RemoteGroup": "Admingroup25"
},
{
"LocalRole": "Operator",
"RemoteGroup": "Admingroup214"
},
{
"LocalRole": "User",
"RemoteGroup": "Admingroup215"
}
],

13. Did a PATCH operation with below given Data:

'{"ActiveDirectory":{"RemoteRoleMapping": [{},{"RemoteGroup": "Admingroup26","LocalRole": "User"},{}]}}'

14.With GET got below given data:

"RemoteRoleMapping": [
{
"LocalRole": "User",
"RemoteGroup": "Admingroup25"
},
{
"LocalRole": "User",
"RemoteGroup": "Admingroup26"
},
{
"LocalRole": "User",
"RemoteGroup": "Admingroup215"
}
],

15. Try to delete the role map when there was no role map entry and get the following error.
"RemoteRoleMapping/1@Message.ExtendedInfo": [
{
"@odata.type": "/redfish/v1/$metadata#Message.v1_0_0.Message",
"Message": "The value null for the property RemoteRoleMapping/0 is of a different type than the property can accept.",
"MessageArgs": [
"null",
"RemoteRoleMapping/0"
],
"MessageId": "Base.1.4.0.PropertyValueTypeError",
"Resolution": "Correct the value for the property in the request body and resubmit the request if the operation failed.",
"Severity": "Warning"
}

Signed-off-by: Ratan Gupta <ratagupt@linux.vnet.ibm.com>
Change-Id: Iaa37221bd6fdc87dbf51755d9425ecd5b07eee6c

show more ...


# 4e68c45b 04-Sep-2019 Ayushi Smriti <smriti.ayushi@linux.intel.com>

Fix: Only return error info in invalid URI case

Collection schemas return some valuable parameter information values
on get query, even when the URI is invalid and 404/400 error code
is returned.
Fi

Fix: Only return error info in invalid URI case

Collection schemas return some valuable parameter information values
on get query, even when the URI is invalid and 404/400 error code
is returned.
Fix for the same is provided by packing the json response at proper
places and returning only the required error info, for security reasons.

Tested:
Verified by redfish GET query for invalid uri cases.
Only error msg and info is returned.

Signed-off-by: Ayushi Smriti <smriti.ayushi@linux.intel.com>
Change-Id: Iae45da86c2d2adbc39d78f7c267d551d4e6525f2

show more ...


# 599c71d8 23-Aug-2019 Ayushi Smriti <smriti.ayushi@linux.intel.com>

Read AllGroups property from user manager

This bmcweb code is to create users as per the available groups,
and make the code dynamic.

Tested: Created a new user and did redfish post query.
Verified

Read AllGroups property from user manager

This bmcweb code is to create users as per the available groups,
and make the code dynamic.

Tested: Created a new user and did redfish post query.
Verified through busctl introspection, available groups were listed
for the new user.

Signed-off-by: Ayushi Smriti <smriti.ayushi@linux.intel.com>
Change-Id: Ifec6d71d9721e4bfef53c9e38b17e9b7864777e6

show more ...


# d4b5443f 17-Jul-2019 Ed Tanous <ed.tanous@intel.com>

Revert "Redfish: Add PATCH operation support for RemoteRoleMapping"

This reverts commit 2a21b9db6fcfe477f9ef31453df93e3f6c442a44.

Reason for revert:

Merged accidentally. Tested locally, and seems

Revert "Redfish: Add PATCH operation support for RemoteRoleMapping"

This reverts commit 2a21b9db6fcfe477f9ef31453df93e3f6c442a44.

Reason for revert:

Merged accidentally. Tested locally, and seems to work as designed. Needs fixed to match the comments below, then should be good to go.

Change-Id: I95c19e47a09ca5afa343fd7590bc39f750cd81e0

show more ...


# 2a21b9db 31-Jan-2019 Nagaraju Goruganti <ngorugan@in.ibm.com>

Redfish: Add PATCH operation support for RemoteRoleMapping

Added PATCH operation support for RemoteRoleMapping property under
LDAP/ActiveDirectory property in AccountService schema.

1. How to add t

Redfish: Add PATCH operation support for RemoteRoleMapping

Added PATCH operation support for RemoteRoleMapping property under
LDAP/ActiveDirectory property in AccountService schema.

1. How to add the Role Mapping?

PATCH {"ActiveDirectory":{"RemoteRoleMapping": [{"RemoteGroup":
"Admingroup15","LocalRole": "User"},{"RemoteGroup": "Admingroup13",
"LocalRole": "Administrator"},{"RemoteGroup": "Admingroup14",
"LocalRole": "Operator"}]}}

With the above PATCH request, all the above role mapping gets added.

2. How to delete a specific role mapping?

After adding the above roles mapping, if user want to delete the second mapping
which is ({"RemoteGroup": "Admingroup13", "LocalRole": "Administrator"})

Following PATCH request would be used.
PATCH {"ActiveDirectory":{"RemoteRoleMapping": [{},null,{}]}}

3. How to update specific role mapping ?

Let's take a case where user want to update the second role mapping
PATCH {"ActiveDirectory":{"RemoteRoleMapping": [{},{"RemoteGroup":"Admingroup25","LocalRole": "User"},{}]}}
or
PATCH {"ActiveDirectory":{"RemoteRoleMapping": [{},{"RemoteGroup":"Admingroup25"},{}]}} and \
PATCH {"ActiveDirectory":{"RemoteRoleMapping": [{},{"LocalRole": "User"},{}]}}
Tested:

1. Did a PATCH operation with below given Data:

' {"ActiveDirectory":{"RemoteRoleMapping": [{"RemoteGroup": "Admingroup215","LocalRole": "User"}, \
{"RemoteGroup": "Admingroup213","LocalRole":"Administrator"},{"RemoteGroup":"Admingroup214","LocalRole":"Operator"}]}}'

2. With GET got below given data:

"RemoteRoleMapping": [
{
"LocalRole": "Operator",
"RemoteGroup": "Admingroup214"
},
{
"LocalRole": "Administrator",
"RemoteGroup": "Admingroup213"
},
{
"LocalRole": "User",
"RemoteGroup": "Admingroup215"
}
],

3. Did a PATCH operation with below given Data:

'{"ActiveDirectory":{"RemoteRoleMapping": [{},null,{}]}}'

4. With GET got below given data:

"RemoteRoleMapping": [
{
"LocalRole": "Operator",
"RemoteGroup": "Admingroup214"
},
{
"LocalRole": "User",
"RemoteGroup": "Admingroup215"
}
],

5. Did a PATCH operation with below given Data:

'{"ActiveDirectory":{"RemoteRoleMapping": [null,null]}}'

6. With GET got below given data:

"RemoteRoleMapping": []

7. Did a PATCH operation with below given Data:

'{"ActiveDirectory":{"RemoteRoleMapping": [{"RemoteGroup": "Admingroup215","LocalRole": "User"}, \
{"RemoteGroup": "Admingroup213","LocalRole":"Administrator"},{"RemoteGroup":"Admingroup214","LocalRole":"Operator"}]}}'

8. With GET got below given data:

"RemoteRoleMapping": [
{
"LocalRole": "Administrator",
"RemoteGroup": "Admingroup213"
},
{
"LocalRole": "Operator",
"RemoteGroup": "Admingroup214"
},
{
"LocalRole": "User",
"RemoteGroup": "Admingroup215"
}
],
9. Did a PATCH operation with below given Data:

'{"ActiveDirectory":{"RemoteRoleMapping": [{"RemoteGroup": "Admingroup25"},{},{}]}}'

10.With GET got below given data:

"RemoteRoleMapping": [
{
"LocalRole": "Administrator",
"RemoteGroup": "Admingroup25"
},
{
"LocalRole": "Operator",
"RemoteGroup": "Admingroup214"
},
{
"LocalRole": "User",
"RemoteGroup": "Admingroup215"
}
],
11. Did a PATCH operation with below given Data:

'{"ActiveDirectory":{"RemoteRoleMapping": [{"LocalRole": "User"},{},{}]}}'

12.With GET got below given data:

"RemoteRoleMapping": [
{
"LocalRole": "User",
"RemoteGroup": "Admingroup25"
},
{
"LocalRole": "Operator",
"RemoteGroup": "Admingroup214"
},
{
"LocalRole": "User",
"RemoteGroup": "Admingroup215"
}
],

13. Did a PATCH operation with below given Data:

'{"ActiveDirectory":{"RemoteRoleMapping": [{},{"RemoteGroup": "Admingroup26","LocalRole": "User"},{}]}}'

14.With GET got below given data:

"RemoteRoleMapping": [
{
"LocalRole": "User",
"RemoteGroup": "Admingroup25"
},
{
"LocalRole": "User",
"RemoteGroup": "Admingroup26"
},
{
"LocalRole": "User",
"RemoteGroup": "Admingroup215"
}
],

Change-Id: Idc80cee94b8b55d036c2514d50c147a72ed4c7f2
Signed-off-by: Ratan Gupta <ratagupt@linux.vnet.ibm.com>
Signed-off-by: Nagaraju Goruganti <ngorugan@in.ibm.com>

show more ...


# 54fc587a 30-Jan-2019 Nagaraju Goruganti <ngorugan@in.ibm.com>

Redfish: Populate the RemoteRoleMapping prop under AccountService schema

Get request on account service gets the RemoteRoleMapping info.

Tested:
1.Ran redifsh validator and there are no errors
2.GE

Redfish: Populate the RemoteRoleMapping prop under AccountService schema

Get request on account service gets the RemoteRoleMapping info.

Tested:
1.Ran redifsh validator and there are no errors
2.GET Request on AccountService would add below given info if RoleMapping data
is configured on the system.
GET
"RemoteRoleMapping": [
{
"LocalRole": "<configured role>",
"RemoteUser": "<configured user>"
},
],

Change-Id: Ie22f0bb520de795d31a9aba76a56fe88886ed50b
Signed-off-by: Ratan Gupta <ratagupt@linux.vnet.ibm.com>
Signed-off-by: Nagaraju Goruganti <ngorugan@in.ibm.com>

show more ...


# 37cce918 20-Feb-2019 Marri Devender Rao <devenrao@in.ibm.com>

Redfish: Add support to upload/replace/view LDAP Certificate

Implements CertificateCollection schema to upload/list
existing LDAP certificates

Implements Certificate schema to view existing LDAP
ce

Redfish: Add support to upload/replace/view LDAP Certificate

Implements CertificateCollection schema to upload/list
existing LDAP certificates

Implements Certificate schema to view existing LDAP
certificate

Implements ReplaceCertificate action to replace existing
LDAP certificate.

Tested:
1. Tested schema with validator and no issues
2. Privilege map for certificate service is not yet pubished
3. POST on /redfish/v1/AccountService/LDAP/Certificates
curl -c cjar -b cjar -k -H "X-Auth-Token: $bmc_token" -H "Content-Type: application/octet-stream" -X POST -T testcert.pem https://${bmc}/redfish/v1/AccountServie/LDAP/Certificates
{
"@odata.context": "/redfish/v1/$metadata#Certificate.Certificate",
"@odata.id": "/redfish/v1/AccountService/LDAP/Certificates/1",
"@odata.type": "#Certificate.v1_0_0.Certificate",
"CertificateString": "-----BEGIN CERTIFICATE---------END CERTIFICATE-----\n",
"Description": "LDAP Certificate",
"Id": "1",
"Issuer": {
"City": "SomeCity",
"CommonName": "www.company.com",
"Country": "US",
"Organization": "MyCompany",
"State": "VA",
"organizationUnit": "MyDivision"
},
"KeyUsage": [
"KeyAgreement",
"ServerAuthentication"
],
"Name": "LDAP Certificate",
"Subject": {
"City": "SomeCity",
"CommonName": "www.company.com",
"Organization": "MyCompany",
"State": "VA",
"organizationUnit": "MyDivision"
},
"ValidNotAfter": "2029-03-14T02:11:02+00:00",
"ValidNotBefore": "2019-03-17T02:11:02+00:00"
}

4. GET on /redfish/v1/AccountService/LDAP/Certificates/
{
"@odata.context":
"/redfish/v1/$metadata#CertificateCollection.CertificateCollection",
"@odata.id": "/redfish/v1/AccountService/LDAP/Certificates",
"@odata.type": "#CertificateCollection.CertificatesCollection",
"Description": "A Collection of LDAP certificate instances",
"Members": [
{
"@odata.id": "/redfish/v1/AccountService/LDAP/Certificates/1"
}
],
"Members@odata.count": 1,
"Name": "LDAP Certificate Collection"
}

5.GET on /redfish/v1/CertificateService/CertificateLocations/
{
"@odata.context":
"/redfish/v1/$metadata#CertificateLocations.CertificateLocations",
"@odata.id": "/redfish/v1/CertificateService/CertificateLocations",
"@odata.type": "#CertificateLocations.v1_0_0.CertificateLocations",
"Description": "Defines a resource that an administrator can use in order to
locate all certificates installed on a given service",
"Id": "CertificateLocations",
"Links": {
"Certificates": [
{
"@odata.id":
"/redfish/v1/Managers/bmc/NetworkProtocol/HTTPS/Certificates/1"
},
{
"@odata.id": "/redfish/v1/AccountService/LDAP/Certificates/1"
}
],
"Certificates@odata.count": 2
},
"Name": "Certificate Locations"
}

6.GET on /redfish/v1/AccountService/LDAP/Certificates/1
{
"@odata.context": "/redfish/v1/$metadata#Certificate.Certificate",
"@odata.id": "/redfish/v1/AccountService/LDAP/Certificates/1",
"@odata.type": "#Certificate.v1_0_0.Certificate",
"CertificateString": "-----BEGINCERTIFICATE-----\n ... -----ENDCERTIFICATE-----\n",
"CertificateType": "PEM",
"Description": "LDAP Certificate",
"Id": "1",
"Issuer": {
"CommonName": "localhost",
"Organization": "openbmc-project.xyz"
},
"KeyUsage": [],
"Name": "LDAP Certificate",
"Subject": {
"CommonName": "localhost"
}

7.Replace certificate
POST on /redfish/v1/CertificateService/Actions/CertificateService.ReplaceCertificate/
{
"@odata.context": "/redfish/v1/$metadata#Certificate.Certificate",
"@odata.id": "/redfish/v1/AccountService/LDAP/Certificates/1",
"@odata.type": "#Certificate.v1_0_0.Certificate",
...
}
8.GET on AccountService
curl -k -H "X-Auth-Token: $bmc_token" -X GET
https://${bmc}/redfish/v1/AccountService
{
"@odata.context": "/redfish/v1/$metadata#AccountService.AccountService",
"@odata.id": "/redfish/v1/AccountService",
"@odata.type": "#AccountService.v1_4_0.AccountService",
"Id": "AccountService",
"LDAP": {
"AccountProviderType": "LDAPService",
"Certificates": {
"@odata.id": "/redfish/v1/AccountService/LDAP/Certificates"
},

Change-Id: I056a4cea8b0377e156b660984857cdfadbfe1b2c
Signed-off-by: Marri Devender Rao <devenrao@in.ibm.com>

show more ...


# eb2bbe56 22-Apr-2019 Ratan Gupta <ratagupt@linux.vnet.ibm.com>

Redfish: Implement PATCH operation for ActiveDirectory property in AccountService

With this commit PATCH operation on the ActiveDirectory property
would configure the ActiveDirectory on the OpenBMC.

Redfish: Implement PATCH operation for ActiveDirectory property in AccountService

With this commit PATCH operation on the ActiveDirectory property
would configure the ActiveDirectory on the OpenBMC.

If one of the config is enabled, user needs to disable the other config.
eg: If LDAP is enabled and user tries to enable the Active Diretory
user will get the error and user need to disable the LDAP first.

TestedBy:
Enable the LDAP service: PASS
Login through LDAP credentials : PASS
Enable the AD service throws error as LDAP is already enabled: PASS
Disable the LDAP service : PASS
Enable the AD service : PASS
Login through AD credentials: PASS
Login through LDAP credentials, should not be allowed: PASS
Detailed test results are at following location.
https://pastebin.com/ibX5nyAc

Change-Id: I36d17757db1542604dbf5215728ac30f4e91f610
Signed-off-by: Ratan Gupta <ratagupt@linux.vnet.ibm.com>

show more ...


# ab828d7c 22-Apr-2019 Ratan Gupta <ratagupt@linux.vnet.ibm.com>

Redfish: Populate the ActiveDirectory property in AccountService schema

With this commit get request on account service gets the
LDAP/AD configuration.

TestedBy: 1) Run the redfish - validator

Redfish: Populate the ActiveDirectory property in AccountService schema

With this commit get request on account service gets the
LDAP/AD configuration.

TestedBy: 1) Run the redfish - validator
=> when there is no configuration
=> After LDAP Configuration.
=> After ActiveDirectory Configuration.
2) GET request through redfish
/redfish/v1/AccountService
Gets both LDAP and ActiveDirectory properties.
Detailed test results are at following location.
https://pastebin.com/ibX5nyAc

Change-Id: I0d6cdc2039eecffe96b6a27f3d65905ceb92d9b9
Signed-off-by: Ratan Gupta <ratagupt@linux.vnet.ibm.com>

show more ...


# cee58b23 28-May-2019 Ed Tanous <ed.tanous@intel.com>

Remove AllowableValues for read-only LDAP values

Given that today LDAP doesn't support modification of the
AccountProviderType, and AuthenticationType parameters, providing
AllowableValues is a bit

Remove AllowableValues for read-only LDAP values

Given that today LDAP doesn't support modification of the
AccountProviderType, and AuthenticationType parameters, providing
AllowableValues is a bit of a misnomer, and a waste.

Tested:
Work in progress.
Would like to get concensus on this, then will verify correct responses
and error codes

Signed-off-by: Ed Tanous <ed.tanous@intel.com>
Change-Id: I6d2d38b581ce5a9f7b4106582aeb4ec3fc9c424a

show more ...


# 22c33710 03-May-2019 Ratan Gupta <ratagupt@linux.vnet.ibm.com>

Redfish: Move checkDbusPathExist function to dbus utility

This function is a utility function which would be needed
by other files.

TestedBy: ran the redfish validator: PASS

Change-Id: I2a0d07f264

Redfish: Move checkDbusPathExist function to dbus utility

This function is a utility function which would be needed
by other files.

TestedBy: ran the redfish validator: PASS

Change-Id: I2a0d07f264952f47a724da11f72b15ca5e019d62
Signed-off-by: Ratan Gupta <ratagupt@linux.vnet.ibm.com>

show more ...


# 8a07d286 15-Mar-2019 Ratan Gupta <ratagupt@linux.vnet.ibm.com>

Redfish(Account): Support the patch for individual properties for LDAP

This commit supports the patch of individual properties under LDAP.

Tested by:
Ldap Config not exist
1

Redfish(Account): Support the patch for individual properties for LDAP

This commit supports the patch of individual properties under LDAP.

Tested by:
Ldap Config not exist
1) Run the redfish validator tool
2) PATCH the authentication, auth type, username property
Keep getting the message what is missing.
3) PATCH with all the required properties.
Ldap Config Exist
4) Run the redfish validator tool
5) PATCH the service address property
6) PATCH Auth type, account providertype
7) PATCH user name
8) PATCH multiple properties

Detailed test reults are at the following location
https://pastebin.com/ibX5nyAc

Change-Id: Ib09c7765f86f626d3b74b5ba7a3e7a97cedb4acf
Signed-off-by: Ratan Gupta <ratagupt@linux.vnet.ibm.com>

show more ...


# 6973a582 13-Dec-2018 Ratan Gupta <ratagupt@linux.vnet.ibm.com>

Redfish: Populate the LDAP property in AccountService schema

With this commit get request on account service gets the
LDAP/AD configuration.

RemoteRoleMapping under LDAP property will be supported

Redfish: Populate the LDAP property in AccountService schema

With this commit get request on account service gets the
LDAP/AD configuration.

RemoteRoleMapping under LDAP property will be supported by
other commit.

TestedBy: 1) Run the redfish - validator
=> when there is no LDAP configuration
=> After LDAP Configuration.
2) GET request through redfish
/redfish/v1/AccountService

Detailed test cases are at the following location.
https://pastebin.com/ibX5nyAc

Change-Id: I718d1eb4b40d3a626440487ac9a63d8c96721cee
Signed-off-by: Ratan Gupta <ratagupt@linux.vnet.ibm.com>

show more ...


# ae29b8c4 24-Apr-2019 Adriana Kobylak <anoo@us.ibm.com>

bmcweb: /s/boost::beast::string_view/std::string_view/g

Follow-on to https://gerrit.openbmc-project.xyz/c/openbmc/bmcweb/+/18891

Tested: Checked that the host console and virtual media endpoints

bmcweb: /s/boost::beast::string_view/std::string_view/g

Follow-on to https://gerrit.openbmc-project.xyz/c/openbmc/bmcweb/+/18891

Tested: Checked that the host console and virtual media endpoints
still worked as expected.

Change-Id: Ifdc5f21f3668bdf9bd24189504aaeb17b232c921
Signed-off-by: Adriana Kobylak <anoo@us.ibm.com>

show more ...


# 4d64ce34 29-Mar-2019 Gunnar Mills <gmills@us.ibm.com>

Fix AllowableValues failProp error

The RedfishServiceValidator throws the following error:
"ERROR - Locked@Redfish.AllowableValues[0]: Expected
string value, got type class 'bool'"

From http://redf

Fix AllowableValues failProp error

The RedfishServiceValidator throws the following error:
"ERROR - Locked@Redfish.AllowableValues[0]: Expected
string value, got type class 'bool'"

From http://redfish.dmtf.org/schemas/DSP0266_1.0.html#allowable-values

"6.5.4.7.2. Allowable values

The property representing the action may be annotated with the
"AllowableValues" annotation in order to specify the list of
allowable values for a particular parameter.

The set of allowable values is specified by including a property
whose name is the name of the parameter followed by
"@Redfish.AllowableValues", and whose value is a JSON array of
strings representing the allowable values for the parameter."

Moved AllowableValues[0] to a string.

Tested: Ran RedfishServiceValidator and no longer observe the
error.

Change-Id: I167416fe62449dd428f549c486069db0de7676b0
Signed-off-by: Gunnar Mills <gmills@us.ibm.com>

show more ...


# f00032db 04-Nov-2018 Tanous <ed.tanous@intel.com>

Allow multiple registrations

This patchset is the beginings of the infrastructure to allow
separate registrations, and map privileges to the actual node in the
url table rather than having each regi

Allow multiple registrations

This patchset is the beginings of the infrastructure to allow
separate registrations, and map privileges to the actual node in the
url table rather than having each registration manage privileges
manually.

Tested by:
Running redfish compliance tool. All things still pass.

Change-Id: I72d278cc19c60ba5b6e563fbd705b0551faf9a6a
Signed-off-by: Ed Tanous <ed.tanous@intel.com>

show more ...


# 343ff2e1 23-Mar-2019 AppaRao Puli <apparao.puli@linux.intel.com>

Changing maxPasswordLength to 20

Changed maxPasswordLength to 20 as per
documentation.

Tested by:
- Checked redfish account properties
response and observed change value.

Signed-off-by: AppaRa

Changing maxPasswordLength to 20

Changed maxPasswordLength to 20 as per
documentation.

Tested by:
- Checked redfish account properties
response and observed change value.

Signed-off-by: AppaRao Puli <apparao.puli@linux.intel.com>
Change-Id: If1a963c29381bb7feb431f7e9b270b4432b72f9d

show more ...


# 19fb6e71 04-Mar-2019 Ratan Gupta <ratagupt@linux.vnet.ibm.com>

Redfish(AccountService): Send the correct error message for the read only property

MinPasswordLength and MaxPasswordLength is a readOnly property
in the account service schema, so send the correct m

Redfish(AccountService): Send the correct error message for the read only property

MinPasswordLength and MaxPasswordLength is a readOnly property
in the account service schema, so send the correct message
if the user tries to PATCH these properties.

Change-Id: If231ca13ef97fc05928435ac14a8190a186beb06
Signed-off-by: Ratan Gupta <ratagupt@linux.vnet.ibm.com>

show more ...


12345678