You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
To build:
First clone [ocp-spec-tools](https://github.com/opencomputeproject/ocp-spec-tools/), and then run:
```
$ path/to/ocp-spec-tools/ocp-docker-pull.sh
$ path/to/ocp-spec-tools/ocp-docker-run.sh --pdf OpenRMC_UsageGuide_v1.2.pdf OpenRMC_UsageGuide_v1.2.ocp
```
The following metadata fields are not currently respected by ocp-spec-tools:
- `supersedes`
- `status`
- `released`
- `class`
- `copyright`
- `paragraph_numbering`
Signed-off-by: Jeff Andersen <jeffandersen@google.com>
The firmware can be updated with a pull or push method. The "Redfish Firmware Update Whitepaper"\[3\] has detail discussion of the firmware update process.
171
+
The firmware can be updated with a pull or push method. The "Redfish Firmware Update Whitepaper" [@{redfish-firmware-update}] has detail discussion of the firmware update process.
149
172
150
173
The main process is for the firmware package to be delivered opaquely, and the Redfish Service interprets the firmware package to determine the components that are updated.
151
174
The Targets property can be used to guide and constrain this behavior.
@@ -752,7 +775,7 @@ To perform a reset of the group, a POST is invoked to the value of the Target pr
752
775
POST /redfish/v1/AggregationService/Actions/Aggregate.Reset
753
776
754
777
The POST request shall contain a request body. The contents of the request body are described by resource specified by the
755
-
@Reddfish.ActionInfo property. The TargetURIs property specifies the group to be used.
778
+
\@Reddfish.ActionInfo property. The TargetURIs property specifies the group to be used.
756
779
After the group is used, it is forgotten.
757
780
758
781
```
@@ -1109,7 +1132,7 @@ it.
1109
1132
- **Managed Node List =** Node Certificate + Time Stamp of Initial
1110
1133
session establishment
1111
1134
1112
-
> In the Redfish Certificate Management Whitepaper \[1\], the node
1135
+
> In the Redfish Certificate Management Whitepaper [@{redfish-certificate-whitepaper}], the node
1113
1136
> certificate and rack manager certificate are referred to as device
1114
1137
> identity certificates.
1115
1138
@@ -1247,18 +1270,6 @@ Reason for Classification
1247
1270
| | | | | | Other node managers do not have node’s token (encrypted during transit) |
1248
1271
| 9 | A rogue rack manager attempts to reply legitimate encrypted rack manager’s token | Network Adversary | End User’s Data | H | In discovery flow, node decrypts rack manager’s token and checks the cert in token with the cert that rogue rack manager passes down early in discovery flow. Discrepancy leads to the fact that node logs “Suspicious Node Manger” event (no session will get establish). |
0 commit comments