You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
To build:
First clone [ocp-spec-tools](https://github.com/opencomputeproject/ocp-spec-tools/), and then run:
```
$ path/to/ocp-spec-tools/ocp-docker-pull.sh
$ path/to/ocp-spec-tools/ocp-docker-run.sh --pdf OpenRMC_UsageGuide_v1.2.pdf OpenRMC_UsageGuide_v1.2.ocp
```
The following metadata fields are not currently respected by ocp-spec-tools:
- `supersedes`
- `status`
- `released`
- `class`
- `copyright`
- `paragraph_numbering`
Signed-off-by: Jeff Andersen <jeffandersen@google.com>
The firmware can be updated with a pull or push method. The "Redfish Firmware Update Whitepaper"\[3\] has detail discussion of the firmware update process.
168
+
The firmware can be updated with a pull or push method. The "Redfish Firmware Update Whitepaper" [@{redfish-firmware-update}] has detail discussion of the firmware update process.
149
169
150
170
The main process is for the firmware package to be delivered opaquely, and the Redfish Service interprets the firmware package to determine the components that are updated.
151
171
The Targets property can be used to guide and constrain this behavior.
@@ -752,7 +772,7 @@ To perform a reset of the group, a POST is invoked to the value of the Target pr
752
772
POST /redfish/v1/AggregationService/Actions/Aggregate.Reset
753
773
754
774
The POST request shall contain a request body. The contents of the request body are described by resource specified by the
755
-
@Reddfish.ActionInfo property. The TargetURIs property specifies the group to be used.
775
+
\@Reddfish.ActionInfo property. The TargetURIs property specifies the group to be used.
756
776
After the group is used, it is forgotten.
757
777
758
778
```
@@ -1109,7 +1129,7 @@ it.
1109
1129
- **Managed Node List =** Node Certificate + Time Stamp of Initial
1110
1130
session establishment
1111
1131
1112
-
> In the Redfish Certificate Management Whitepaper \[1\], the node
1132
+
> In the Redfish Certificate Management Whitepaper [@{redfish-certificate-whitepaper}], the node
1113
1133
> certificate and rack manager certificate are referred to as device
1114
1134
> identity certificates.
1115
1135
@@ -1247,18 +1267,6 @@ Reason for Classification
1247
1267
| | | | | | Other node managers do not have node’s token (encrypted during transit) |
1248
1268
| 9 | A rogue rack manager attempts to reply legitimate encrypted rack manager’s token | Network Adversary | End User’s Data | H | In discovery flow, node decrypts rack manager’s token and checks the cert in token with the cert that rogue rack manager passes down early in discovery flow. Discrepancy leads to the fact that node logs “Suspicious Node Manger” event (no session will get establish). |
0 commit comments