#
36e3c539 |
| 31-Jul-2023 |
Vernon Mauery <vernon.mauery@linux.intel.com> |
Update System GUID handling to be more robust
If the service that owns the GUID has not yet started when netipmid starts, netipmid was throwing an error and failing to start. If the time difference
Update System GUID handling to be more robust
If the service that owns the GUID has not yet started when netipmid starts, netipmid was throwing an error and failing to start. If the time difference was too great, it would fail to re-start and then stay stopped. This makes the error handling more robust so that the order is not so important.
Tested: started netipmid with and without the UUID service running and restarted the service to ensure that netipmid would stay running.
Signed-off-by: Vernon Mauery <vernon.mauery@linux.intel.com> Change-Id: Id464330a2ba8416ff229fa258fff0ad7a1b8f51c
show more ...
|
#
7b7f25f7 |
| 04-Jul-2022 |
George Liu <liuxiwei@inspur.com> |
logging: switch to lg2
After switching to C++20, it is recommended to use `phosphor::lg2` to format log, and the correct `CODE_LINE` and `CODE_FUNC` values can be used in log tracking.
Signed-off-b
logging: switch to lg2
After switching to C++20, it is recommended to use `phosphor::lg2` to format log, and the correct `CODE_LINE` and `CODE_FUNC` values can be used in log tracking.
Signed-off-by: George Liu <liuxiwei@inspur.com> Change-Id: I4aabaafe997e13c10d655a83a9ef0071ad11126e
show more ...
|
#
be1470cc |
| 04-Jul-2022 |
George Liu <liuxiwei@inspur.com> |
Fix cppcheck warnings
Signed-off-by: George Liu <liuxiwei@inspur.com> Change-Id: Ibe6b12e81292c655f0ab1420159521c2e6991e37
|
#
bc8958fe |
| 03-Jul-2022 |
George Liu <liuxiwei@inspur.com> |
Update to latest clang-format
Refer:https://github.com/openbmc/docs/blob/ac5d544553934f8083c61c5986a1420261bc8a4c/style/cpp/.clang-format
Signed-off-by: George Liu <liuxiwei@inspur.com> Change-Id:
Update to latest clang-format
Refer:https://github.com/openbmc/docs/blob/ac5d544553934f8083c61c5986a1420261bc8a4c/style/cpp/.clang-format
Signed-off-by: George Liu <liuxiwei@inspur.com> Change-Id: I1e06864afc29ce7de463e62fa2a0eb6f70e8fd93
show more ...
|
#
12d199b2 |
| 06-Oct-2021 |
Patrick Williams <patrick@stwcx.xyz> |
catch exceptions as const
Signed-off-by: Patrick Williams <patrick@stwcx.xyz> Change-Id: If18cc0293b52ce5f7f8e068688aa17d28ed27d50
|
#
41ff9b51 |
| 11-Jun-2021 |
Vernon Mauery <vernon.mauery@linux.intel.com> |
make internal command functor match external
The internal command functor was getting passed a const message::Handler& instead of a std::shared_ptr<message::Handler> which will not work with an upco
make internal command functor match external
The internal command functor was getting passed a const message::Handler& instead of a std::shared_ptr<message::Handler> which will not work with an upcoming patch that needs the functor to be able to modify the Handler object. Also, it is convenient to have the same signature for both types of handlers.
Tested: run ipmitool to see that behavior does not change.
Change-Id: Ie8660e4d16bd66eccc282aef2594b88c25b847db Signed-off-by: Vernon Mauery <vernon.mauery@linux.intel.com>
show more ...
|
#
2085ae07 |
| 10-Jun-2021 |
Vernon Mauery <vernon.mauery@linux.intel.com> |
replace tuple-based singleton with individual singletons
The tuple-based singletons did not actually enforce singleton behavior and the requirement of the accessor mechanism to include all of the me
replace tuple-based singleton with individual singletons
The tuple-based singletons did not actually enforce singleton behavior and the requirement of the accessor mechanism to include all of the member types at once was starting to cause a header prerequisite tangle. This removes the cross-dependencies and enforces actual singletons by making a single way to access the class.
Tested: Run ipmitool to show that behavior has not changed
Change-Id: Ie966e1142363d279365b1095066380c8383e9f9b Signed-off-by: Vernon Mauery <vernon.mauery@linux.intel.com>
show more ...
|
#
f8a34fc4 |
| 12-Jun-2019 |
Suryakanth Sekar <suryakanth.sekar@linux.intel.com> |
netipmid: Manage and expose session object
Session (RMCP+) is managed by net-ipmid directly, but session commands has to be supported in both LAN & other session-less interfaces. In order to make se
netipmid: Manage and expose session object
Session (RMCP+) is managed by net-ipmid directly, but session commands has to be supported in both LAN & other session-less interfaces. In order to make session commands to work in other interfaces, session objects must be exposed as D-Bus objects, so that ipmi-providers can query the same.
Tested: 1. Verified that RMCP+ session are perfectly working 2. Verified RMCP+ session establishment fails for wrong password 3. Verified that session privilege level are maintained and access are restricted accordingly 4. Verified session timeout and sessions are destroyed accordingly after timeout 5. verified max session count working behavior 6. verified ipmi-providers responding with proper response for this (or D-Bus objects are exposed correctly during session creation, session deletion,session update, (like privilege, - say even set session privilege level command) 7.Session objects are created dynamically.
Change-Id: I78a8449359877ef6cc4cd8161d8c67e6e54eb52b Signed-off-by: Suryakanth Sekar <suryakanth.sekar@linux.intel.com>
show more ...
|
#
4021b1f7 |
| 11-Feb-2019 |
Tom Joseph <tomjoseph@in.ibm.com> |
Return the maximum privilege in open session command
This commit does the following:
- Set the maximum privilege role in the session instead of current privilege in the implementation of the open
Return the maximum privilege in open session command
This commit does the following:
- Set the maximum privilege role in the session instead of current privilege in the implementation of the open session request/response.
- In open session response, return the maximum privilege of the session instead of the current privilege level.
- Update RAKP12 and RAKP34 implementation
Tested: Checked the session setup works fine with ipmitool and freeipmi utility ipmipower.
Change-Id: I41b63b91f08c2ed96856c4db41eedaa878c663e3 Signed-off-by: Tom Joseph <tomjoseph@in.ibm.com>
show more ...
|
#
fc37e59e |
| 19-Dec-2018 |
Vernon Mauery <vernon.mauery@linux.intel.com> |
netipmid: replace std::cerr with phosphor::logging calls
This is part of a cleanup and standardization effort of code to get existing code up to date.
Change-Id: I0c982ef8d7afa2f56a9cd204bb8ac31127
netipmid: replace std::cerr with phosphor::logging calls
This is part of a cleanup and standardization effort of code to get existing code up to date.
Change-Id: I0c982ef8d7afa2f56a9cd204bb8ac3112769641c Signed-off-by: Vernon Mauery <vernon.mauery@linux.intel.com>
show more ...
|
#
127748a8 |
| 05-Sep-2018 |
Richard Marian Thomaiyar <richard.marian.thomaiyar@linux.intel.com> |
RMCP+ login support with privilege
Implementation of RMCP login support with appropriate privilege level.
Unit Test: 1. Verified that user is able to login without any issues 2. Privilege of the us
RMCP+ login support with privilege
Implementation of RMCP login support with appropriate privilege level.
Unit Test: 1. Verified that user is able to login without any issues 2. Privilege of the user is minimum of requested, user & channel 3. Unable to set higher privilege using Set session commands
Change-Id: I5e9ef21dfc1f1b50aa815562a3a65d90c434877c Signed-off-by: Richard Marian Thomaiyar <richard.marian.thomaiyar@linux.intel.com>
show more ...
|
#
ae1fda44 |
| 15-Oct-2018 |
Vernon Mauery <vernon.mauery@linux.intel.com> |
netipmid: use std::shared_ptr instead of weak_ptr/lock
All of the instances of getSession and startSession were assigning the result to a local shared_ptr via lock on the weak_ptr. It doesn't make s
netipmid: use std::shared_ptr instead of weak_ptr/lock
All of the instances of getSession and startSession were assigning the result to a local shared_ptr via lock on the weak_ptr. It doesn't make sense to demote the shared_ptr (from the sessionsMap) to a weak_ptr via the return, only to promote to a shared_ptr again via lock.
Tested-by: running ipmitool -H a.b.c.d -P 0penBmc -I lanplus mc info Sessions start and stop, same as before.
Change-Id: Ic10779285891d73ee51115f16ed0000b38d1c52a Signed-off-by: Vernon Mauery <vernon.mauery@linux.intel.com>
show more ...
|
#
9e801a2b |
| 12-Oct-2018 |
Vernon Mauery <vernon.mauery@linux.intel.com> |
netipmid: apply clang-format rules
Lots of whitespace change. Let clang-format do its job and keep the code looking nice.
Change-Id: Idfcad1a99cab8170d55a06163de8ad3f420b68b7 Signed-off-by: Vernon
netipmid: apply clang-format rules
Lots of whitespace change. Let clang-format do its job and keep the code looking nice.
Change-Id: Idfcad1a99cab8170d55a06163de8ad3f420b68b7 Signed-off-by: Vernon Mauery <vernon.mauery@linux.intel.com>
show more ...
|
#
56527b93 |
| 21-Mar-2018 |
Tom Joseph <tomjoseph@in.ibm.com> |
Support username for IPMI default user account
The current support in IPMI is for the nameless account, which has no username and only password associated with the account. In ipmitool for the namel
Support username for IPMI default user account
The current support in IPMI is for the nameless account, which has no username and only password associated with the account. In ipmitool for the nameless account -U option is not needed. There are management scripts which take a parameter for -U option and fails if -U option is not supported by ipmitool option. This patch is to support "admin" username for the default account. Once full fledged user account management is in place, this change can be removed.
Change-Id: Idad73c0d04f189af66f2365424a68a637fe0e476 Signed-off-by: Tom Joseph <tomjoseph@in.ibm.com>
show more ...
|
#
1d9d4166 |
| 22-Mar-2018 |
Nagaraju Goruganti <ngorugan@in.ibm.com> |
Patch #2 Reducing IPMI logging footprint
net-ipmid is noisy in terms of journal logging. A small step towards cleaning that up.
Partially Resolves openbmc/openbmc#2507
Change-Id: I78e0286fb3708637
Patch #2 Reducing IPMI logging footprint
net-ipmid is noisy in terms of journal logging. A small step towards cleaning that up.
Partially Resolves openbmc/openbmc#2507
Change-Id: I78e0286fb37086373c86dca276c0948f4595cb0a Signed-off-by: Nagaraju Goruganti <ngorugan@in.ibm.com>
show more ...
|
#
7e9e2ef6 |
| 29-Nov-2017 |
Vernon Mauery <vernon.mauery@linux.intel.com> |
Add support for cipher suite 17
cipher suite 17 uses RAKP_HMAC_SHA256 for authentication and RAKP_HMAC_SHA256_128 for integrity. This adds those in and fixes up the lookups so the stack knows about
Add support for cipher suite 17
cipher suite 17 uses RAKP_HMAC_SHA256 for authentication and RAKP_HMAC_SHA256_128 for integrity. This adds those in and fixes up the lookups so the stack knows about the new algorithms.
Change-Id: Icdc66563d08060fc0e541ceaf3bee9dd5f89fdb2 Signed-off-by: Vernon Mauery <vernon.mauery@linux.intel.com>
show more ...
|
#
9b307be6 |
| 22-Nov-2017 |
Vernon Mauery <vernon.mauery@linux.intel.com> |
Prepare for adding RMCP+ cipher suite 17
In many places, there are baked-in assumptions about algorithms that tie the session initiation to cipher suite 3. This commit teases out those assumptions a
Prepare for adding RMCP+ cipher suite 17
In many places, there are baked-in assumptions about algorithms that tie the session initiation to cipher suite 3. This commit teases out those assumptions and prepares for the next patch that actually adds in the new authentication and integrity algorithms to support cipher suite 17.
Change-Id: I2ee3672a7c503b89c5ff0aba30cf7a4601e24d04 Signed-off-by: Vernon Mauery <vernon.mauery@linux.intel.com>
show more ...
|
#
83029cb8 |
| 01-Sep-2017 |
Tom Joseph <tomjoseph@in.ibm.com> |
Cache system GUID in netipmid
GUID is used in the IPMI session setup steps RAKP12 and RAKP34. The GUID is read from the DBUS property. It is observed that when the host is booting, reading the GUID
Cache system GUID in netipmid
GUID is used in the IPMI session setup steps RAKP12 and RAKP34. The GUID is read from the DBUS property. It is observed that when the host is booting, reading the GUID takes a significant delay and the session setup fails with ipmitool. Since GUID doesn't change for a machine, it is safe to cache GUID in the netipmid and speed up the session setup.
Resolves openbmc/openbmc#1812 Resolves openbmc/openbmc#2245 Resolves openbmc/openbmc#2246
Change-Id: I78c993b3e5ef8b6764457c8fdb3ecb985b965c0c Signed-off-by: Tom Joseph <tomjoseph@in.ibm.com>
show more ...
|
#
18a45e9d |
| 11-Apr-2017 |
Tom Joseph <tomjoseph@in.ibm.com> |
Change the signature of the command handler functions.
Resolves openbmc/openbmc#857
Change-Id: I0b7ca6665dd89629838a238d77aff67fec1818c7 Signed-off-by: Tom Joseph <tomjoseph@in.ibm.com>
|
#
4c766eb1 |
| 24-Jan-2017 |
Tom Joseph <tomjoseph@in.ibm.com> |
Set the Confidentiality Algo in the RAKP34 command
Change-Id: I7601b2fd35bedd0145533c5742ef4c848055eefd Signed-off-by: Tom Joseph <tomjoseph@in.ibm.com>
|
#
ef02fb3d |
| 19-Jan-2017 |
Tom Joseph <tomjoseph@in.ibm.com> |
Refactor the RAKP34 implementation
Refactor the code to apply integrity algorithm to a separate function.
Change-Id: I438165dd6fb4962084b319bbdcd53c47e0fc659f Signed-off-by: Tom Joseph <tomjoseph@i
Refactor the RAKP34 implementation
Refactor the code to apply integrity algorithm to a separate function.
Change-Id: I438165dd6fb4962084b319bbdcd53c47e0fc659f Signed-off-by: Tom Joseph <tomjoseph@in.ibm.com>
show more ...
|
#
818d0701 |
| 10-Jan-2017 |
Tom Joseph <tomjoseph@in.ibm.com> |
Set the Integrity Algo once the Session setup succeeds
Change-Id: I5c6122b89c345d71e081aadb50c968344b5c697b Signed-off-by: Tom Joseph <tomjoseph@in.ibm.com>
|
#
50fb50a9 |
| 06-Dec-2016 |
Tom Joseph <tomjoseph@in.ibm.com> |
RAKP Message 3 & RAKP Message 4 Implementation
Change-Id: I0206a04fec2531e5c5dfee8677d4a2b6942022f7 Signed-off-by: Tom Joseph <tomjoseph@in.ibm.com>
|