MTCAP- Upgrade firmware mPower-5.1.2
Home › Forums › Conduit: AEP Model › MTCAP- Upgrade firmware mPower-5.1.2
- This topic has 7 replies, 2 voices, and was last updated 5 years, 3 months ago by
conduit.aep.testing@gmail.com.
-
AuthorPosts
-
December 26, 2019 at 8:45 am #30061
conduit.aep.testing@gmail.com
ParticipantHi,
I am trying to do firmware upgrade from mPower-5.1.2 to mPower-5.1.2 using
curl commands and it failed:
I also have tried the below commands:
curl -k -b headers -X PUT -H “Content-Type: application/json” -d ‘{“signedFirmwareValidation”:false}’ https://192.168.2.1/api/system
curl -k -b headers -X POST -d “” https://192.168.2.1/api/command/save
Ubuntu:
=======(env) test@test-VirtualBox:/Downloads/mtcap/5.1.2$ curl -i -k -d “username=admin&password=Testing1234&submit=Login” –dump-header headers https://192.168.2.1/api/login
HTTP/1.1 200 OK
Set-Cookie: token=A78FF0536EF3BC8B7C1050A932725237; Path=/; Secure
Cache-Control: no-cache
Content-type: application/json
Access-Control-Allow-Origin: *
Content-Security-Policy: default-src ‘self’; script-src ‘unsafe-inline’ ‘unsafe-eval’ ‘self’; style-src ‘unsafe-inline’ https://fonts.googleapis.com ‘self’; font-src https://fonts.gstatic.com ‘self’; connect-src ‘self’; img-src ‘self’ data:
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
X-Content-Type-Options: nosniff
Referrer-Policy: strict-origin-when-cross-origin
Feature-Policy: accelerometer ‘none’; camera ‘none’; geolocation ‘none’; gyroscope ‘none’; payment ‘none’; usb ‘none’
Strict-Transport-Security: max-age=31536000
Content-Length: 321
Date: Sat, 07 Dec 2019 11:24:06 GMT{
“code” : 200,
“result” : {
“address” : “192.168.2.2”,
“isipcuser” : false,
“isremoteuser” : false,
“permission” : “admin”,
“port” : “47100”,
“timestamp” : “11:24:6:459”,
“token” : “A78FF0536EF3BC8B7C1050A932725237”,
“user” : “admin”
},
“status” : “success”
}
(env) test@test-VirtualBox:~/Downloads/mtcap/5.1.2$ curl -i -k -b headers –http1.0 -F file=@MTCAP_5.1.2_upgrade-signed.bin https://192.168.2.1/api/command/firmware_upgrade
HTTP/1.0 400 Bad Request
Set-Cookie: token=A78FF0536EF3BC8B7C1050A932725237; Path=/; Secure
Cache-Control: no-cache
Content-type: application/json
Access-Control-Allow-Origin: *
Content-Security-Policy: default-src ‘self’; script-src ‘unsafe-inline’ ‘unsafe-eval’ ‘self’; style-src ‘unsafe-inline’ https://fonts.googleapis.com ‘self’; font-src https://fonts.gstatic.com ‘self’; connect-src ‘self’; img-src ‘self’ data:
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
X-Content-Type-Options: nosniff
Referrer-Policy: strict-origin-when-cross-origin
Feature-Policy: accelerometer ‘none’; camera ‘none’; geolocation ‘none’; gyroscope ‘none’; payment ‘none’; usb ‘none’
Strict-Transport-Security: max-age=31536000
Content-Length: 116
Connection: close
Date: Sat, 07 Dec 2019 11:25:58 GMT{
“code” : 400,
“error” : “Firmware upgrade failed. Invalid firmware update package.”,
“status” : “fail”
}==================
##############################################
var/log/api.log==================
….
2019-12-07T11:25:22.587803+00:00 mtcap API: [SESSION] Authorized Agent [] Permission [admin] IP [127.0.0.1] Port [] Token []
2019-12-07T11:25:22.588300+00:00 mtcap API: [ROUTER][GET][waninfo/wans]
2019-12-07T11:25:22.943094+00:00 mtcap API: [SESSION] Ending FCGI Request [253] as [RESPONDER]
2019-12-07T11:25:22.965737+00:00 mtcap lighttpd[1551]: � localhost – [07/Dec/2019:11:25:22 +0000] “GET /api/waninfo/wans HTTP/1.1” 200 1352 “-” “-”
2019-12-07T11:25:47.053659+00:00 mtcap API: [SESSION] Starting FCGI Request [254]
2019-12-07T11:25:47.055425+00:00 mtcap API: [SESSION] StdIn Length [106219742] greater than allowed maximum. Reducing to 102400000.
2019-12-07T11:25:56.203491+00:00 mtcap API: [SESSION] count 219742 total 106219742 v_mStdIn.size 106
2019-12-07T11:25:56.237974+00:00 mtcap API: [SESSION] Response Started
2019-12-07T11:25:56.240909+00:00 mtcap API: [SESSION] Authorized Agent [admin] Permission [admin] IP [192.168.2.2] Port [47100] Token [A78FF0536EF3BC8B7C1050A932725237]
2019-12-07T11:25:56.282569+00:00 mtcap API: [SESSION] num StdIn chunks :106
2019-12-07T11:25:57.994678+00:00 mtcap API: [SESSION] Uploading File:#012{#012 “filename” : “MTCAP_5.1.2_upgrade-signed.bin”,#012 “size” : 106219520,#012 “type” : “application/octet-stream”#012}#012
2019-12-07T11:25:57.995945+00:00 mtcap API: [SESSION] Successfully uploaded /var/tmp/MTCAP_5.1.2_upgrade-signed.bin
2019-12-07T11:25:57.998040+00:00 mtcap API: [ROUTER][ADD][command/firmware_upgrade]
2019-12-07T11:25:58.001281+00:00 mtcap API: [CMDCTRLR] Upgrading System Firmware
2019-12-07T11:25:58.004466+00:00 mtcap API: [COMMAND][UPGRADE] firmware_upgrade ‘/var/tmp/upgrade.bin’
2019-12-07T11:25:58.310631+00:00 mtcap API: [COMMAND][UPGRADE] Call to system() returned: [23552] errno = [0] error: [Success]
2019-12-07T11:25:58.316162+00:00 mtcap API: [CMDCTRLR] Starting node-red
2019-12-07T11:25:58.361384+00:00 mtcap API: [CMDCTRLR] Starting Lora Network Server
2019-12-07T11:25:58.425517+00:00 mtcap API: [SESSION] Ending FCGI Request [254] as [RESPONDER]
…
==================Any ideas?
Thanks
December 26, 2019 at 9:01 am #30062conduit.aep.testing@gmail.com
Participant/var/log/messages:
==================
2019-12-10T10:54:54.846805+00:00 mtcap watchdog: User-Space Watchdog Running : [ /dev/watchdog ] opts [ ]
2019-12-10T10:59:42.904570+00:00 mtcap firmware_upgrade: info: Starting firmware upgrade procedure
2019-12-10T10:59:43.092039+00:00 mtcap firmware_upgrade: error: Cannot list upgrade package content
2019-12-10T10:59:43.121356+00:00 mtcap firmware_upgrade: info: Firmware upgrade procedure exited with 92 code
2019-12-10T10:59:49.687091+00:00 mtcap 2019-12-10 10:59:49,684 – aep-utils – INFO – (‘Successfully queried nodeRed enabled: {\n “code” : 200,\n “result” : true,\n “status” : “success”\n}\n’,)
==================Notes: If I am using the same MTCAP_5.1.2_upgrade-signed.bin and upgrade via WEB GUI, it worked.
December 26, 2019 at 9:20 am #30063Jason Reiss
KeymasterAny difference in the api.log between using API and GUI?
You could also look at the API calls being made by the Web GUI for differences.December 26, 2019 at 10:13 am #30064conduit.aep.testing@gmail.com
ParticipantIt looks like the WEB GUI is issuing the command – /firmware_pre_upgrade/ before calling the: /firmware_upgrade/ api:
=============================
…
(X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36″
2019-12-10T11:27:43.770751+00:00 mtcap API: [SESSION] Starting FCGI Request [11967]
2019-12-10T11:27:43.772712+00:00 mtcap API: [SESSION] count 75 total 75 v_mStdIn.size 1
2019-12-10T11:27:43.773126+00:00 mtcap API: [SESSION] Response Started
2019-12-10T11:27:43.775291+00:00 mtcap API: [SESSION] Authorized Web User [admin] Permission [admin] IP [192.168.2.2] Port [50638] Token [21FD52652E3E13B924E5A896F4CE56]
2019-12-10T11:27:43.776094+00:00 mtcap API: [ROUTER][ADD][command/firmware_pre_upgrade]
2019-12-10T11:27:43.776575+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Pre Upgrading System Firmware
2019-12-10T11:27:43.779963+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Firmware Upgrade Info: {#012 “info” : {#012 “fileName” : “MTCAP_5.1.2_upgrade-signed.bin”,#012 “fileSize” : 106219520#012 }#012}
2019-12-10T11:27:44.588975+00:00 mtcap API: [CMDCTRLR] Stopping node-red
2019-12-10T11:27:44.670628+00:00 mtcap API: [CMDCTRLR] Stopping Lora Network Server
2019-12-10T11:27:44.767586+00:00 mtcap API: [SESSION] Ending FCGI Request [11967] as [RESPONDER]========================
However, I tried it with the curl command and I am getting the following:====================================================
Ubuntu:
=======VirtualBox:~/Documents/python/review-12-16-19/review/ssh-login$ curl -i -k -b headers -X POST -d ‘{“filename” : “MTCAP_5.1.2_upgrade-signed.bin”,”size” : 106219520,”type” : “application/octet-stream”}’ https://192.168.2.1/api/command/firmware_pre_upgrade
HTTP/1.1 200 OK
Set-Cookie: token=FB76B78DB94B40AAEE3028F79BEDFC7E; Path=/; Secure
Cache-Control: no-cache
Content-type: application/json
Access-Control-Allow-Origin: *
Content-Security-Policy: default-src ‘self’; script-src ‘unsafe-inline’ ‘unsafe-eval’ ‘self’; style-src ‘unsafe-inline’ https://fonts.googleapis.com ‘self’; font-src https://fonts.gstatic.com ‘self’; connect-src ‘self’; img-src ‘self’ data:
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
X-Content-Type-Options: nosniff
Referrer-Policy: strict-origin-when-cross-origin
Feature-Policy: accelerometer ‘none’; camera ‘none’; geolocation ‘none’; gyroscope ‘none’; payment ‘none’; usb ‘none’
Strict-Transport-Security: max-age=31536000
Content-Length: 45
Date: Tue, 10 Dec 2019 11:48:04 GMT{
“code” : 200,
“status” : “success”
}
=========================================
/var/log/api.log:
=================
2019-12-10T12:05:07.698380+00:00 mtcap API: [SESSION] count 102 total 102 v_mStdIn.size 1
2019-12-10T12:05:07.700389+00:00 mtcap API: [SESSION] Response Started
2019-12-10T12:05:07.703221+00:00 mtcap API: [SESSION] AUTHORIZATION FAILED! IP [192.168.2.2] Port [50768] Code [401 Unauthorized]
2019-12-10T12:05:07.704377+00:00 mtcap API: [SESSION] Ending FCGI Request [208] as [RESPONDER]
2019-12-10T12:05:07.707988+00:00 mtcap lighttpd[3909]: 192.168.2.2 192.168.2.1 – [10/Dec/2019:12:05:07 +0000] “POST /api/command/firmware_pre_upgrade HTTP/1.1” 401 77 “-” “curl/7.35.0”
2019-12-10T12:05:10.627122+00:00 mtcap API: [SESSION] Starting FCGI Request [209]
2019-12-10T12:05:10.629636+00:00 mtcap API: [SESSION] Response Started
2019-12-10T12:05:10.631303+00:00 mtcap API: [SESSION] Authorized Agent [] Permission [admin] IP [127.0.0.1] Port [] Token []
2019-12-10T12:05:10.632687+00:00 mtcap API: [ROUTER][GET][waninfo/wans]
2019-12-10T12:05:10.780381+00:00 mtcap API: [SESSION] Ending FCGI Request [209] as [RESPONDER]
2019-12-10T12:05:10.783049+00:00 mtcap lighttpd[3909]: ^ localhost – [10/Dec/2019:12:05:10 +0000] “GET /api/waninfo/wans HTTP/1.1” 200 1352 “-” “-”
2019-12-10T12:05:33.380307+00:00 mtcap API: [SESSION] Starting FCGI Request [210]
2019-12-10T12:05:33.382136+00:00 mtcap API: [SESSION] count 46 total 46 v_mStdIn.size 1
2019-12-10T12:05:33.382554+00:00 mtcap API: [SESSION] Response Started
2019-12-10T12:05:34.039155+00:00 mtcap API: pam_unix(api:session): session opened for user admin by (uid=0)
2019-12-10T12:05:34.044183+00:00 mtcap API: [SESSION] Authorized Agent [admin] Permission [admin] IP [192.168.2.2] Port [50770] Token [8897D444E53E7DDE688E60D4ADDB9D56]
2019-12-10T12:05:34.046503+00:00 mtcap API: [SESSION] Ending FCGI Request [210] as [RESPONDER]
2019-12-10T12:05:34.049653+00:00 mtcap lighttpd[3909]: 192.168.2.2 192.168.2.1 – [10/Dec/2019:12:05:33 +0000] “POST /api/login HTTP/1.1” 200 321 “-” “curl/7.35.0”
2019-12-10T12:05:40.791852+00:00 mtcap API: [SESSION] Starting FCGI Request [211]
2019-12-10T12:05:40.794456+00:00 mtcap API: [SESSION] Response Started
2019-12-10T12:05:40.796385+00:00 mtcap API: [SESSION] Authorized Agent [] Permission [admin] IP [127.0.0.1] Port [] Token []
2019-12-10T12:05:40.798208+00:00 mtcap API: [ROUTER][GET][waninfo/wans]
2019-12-10T12:05:40.944203+00:00 mtcap API: [SESSION] Ending FCGI Request [211] as [RESPONDER]
2019-12-10T12:05:40.946445+00:00 mtcap lighttpd[3909]: ^ localhost – [10/Dec/2019:12:05:40 +0000] “GET /api/waninfo/wans HTTP/1.1” 200 1352 “-” “-”
2019-12-10T12:05:43.160795+00:00 mtcap API: [SESSION] Starting FCGI Request [212]
2019-12-10T12:05:43.162730+00:00 mtcap API: [SESSION] count 102 total 102 v_mStdIn.size 1
2019-12-10T12:05:43.163139+00:00 mtcap API: [SESSION] Response Started
2019-12-10T12:05:43.165203+00:00 mtcap API: [SESSION] Authorized Agent [admin] Permission [admin] IP [192.168.2.2] Port [50770] Token [8897D444E53E7DDE688E60D4ADDB9D56]
2019-12-10T12:05:43.166007+00:00 mtcap API: [ROUTER][ADD][command/firmware_pre_upgrade]
2019-12-10T12:05:43.166524+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Pre Upgrading System Firmware
2019-12-10T12:05:43.166776+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Firmware Upgrade Info: null
2019-12-10T12:05:43.166990+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Firmware file size of not provided or not valid=========================================
Any ideas?
December 26, 2019 at 10:42 am #30065Jason Reiss
KeymasterThe json provided to the curl command did not match the UI call.
{“info” : { “fileName” : “MTCAP_5.1.2_upgrade-signed.bin”, “fileSize” : 106219520 }}
December 26, 2019 at 11:01 am #30066conduit.aep.testing@gmail.com
ParticipantUbuntu:
=======VirtualBox:~/Documents/python/review-12-16-19/review/ssh-login$ curl -i -k -b headers -X POST -d ‘{“info”:{“filename” : “MTCAP_5.1.2_upgrade-signed.bin”,”size” : 106219520,”type” : “application/octet-stream”}}’ https://192.168.2.1/api/command/firmware_pre_upgrade
HTTP/1.1 200 OK
Set-Cookie: token=E3C1528DC8F2793FF214B26FCFDB1; Path=/; Secure
Cache-Control: no-cache
Content-type: application/json
Access-Control-Allow-Origin: *
Content-Security-Policy: default-src ‘self’; script-src ‘unsafe-inline’ ‘unsafe-eval’ ‘self’; style-src ‘unsafe-inline’ https://fonts.googleapis.com ‘self’; font-src https://fonts.gstatic.com ‘self’; connect-src ‘self’; img-src ‘self’ data:
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
X-Content-Type-Options: nosniff
Referrer-Policy: strict-origin-when-cross-origin
Feature-Policy: accelerometer ‘none’; camera ‘none’; geolocation ‘none’; gyroscope ‘none’; payment ‘none’; usb ‘none’
Strict-Transport-Security: max-age=31536000
Content-Length: 45
Date: Tue, 10 Dec 2019 12:53:03 GMT{
“code” : 200,
“status” : “success”
}======================================
/var/log/api:
============root@mtcap:/var/config/home/admin# tail -f /var/log/api.log
2019-12-10T12:52:52.439913+00:00 mtcap API: [CMDCTRLR] Stopping node-red
2019-12-10T12:52:52.483823+00:00 mtcap API: [CMDCTRLR] Stopping Lora Network Server
2019-12-10T12:52:52.540734+00:00 mtcap API: [SESSION] Ending FCGI Request [355] as [RESPONDER]
2019-12-10T12:52:52.567407+00:00 mtcap lighttpd[3909]: 192.168.2.2 192.168.2.1 – [10/Dec/2019:12:52:51 +0000] “POST /api/command/firmware_pre_upgrade HTTP/1.1” 200 45 “-” “curl/7.35.0”
2019-12-10T12:52:56.988752+00:00 mtcap API: [SESSION] Starting FCGI Request [356]
2019-12-10T12:52:56.991023+00:00 mtcap API: [SESSION] Response Started
2019-12-10T12:52:56.993067+00:00 mtcap API: [SESSION] Authorized Agent [] Permission [admin] IP [127.0.0.1] Port [] Token []
2019-12-10T12:52:56.994460+00:00 mtcap API: [ROUTER][GET][waninfo/wans]
2019-12-10T12:52:57.139427+00:00 mtcap API: [SESSION] Ending FCGI Request [356] as [RESPONDER]
2019-12-10T12:52:57.141679+00:00 mtcap lighttpd[3909]: ^ localhost – [10/Dec/2019:12:52:56 +0000] “GET /api/waninfo/wans HTTP/1.1” 200 1352 “-” “-”
2019-12-10T12:53:01.865013+00:00 mtcap API: [SESSION] Starting FCGI Request [357]
2019-12-10T12:53:01.866484+00:00 mtcap API: [SESSION] Response Started
2019-12-10T12:53:01.867333+00:00 mtcap API: [SESSION] Authorized Agent [] Permission [admin] IP [127.0.0.1] Port [] Token []
2019-12-10T12:53:01.868057+00:00 mtcap API: [ROUTER][GET][syslog]
2019-12-10T12:53:01.869334+00:00 mtcap API: [SESSION] Ending FCGI Request [357] as [RESPONDER]
2019-12-10T12:53:01.879031+00:00 mtcap lighttpd[3909]: ^ localhost – [10/Dec/2019:12:53:01 +0000] “GET /api/syslog HTTP/1.1” 200 314 “-” “-”
2019-12-10T12:53:02.548040+00:00 mtcap API: [SESSION] Starting FCGI Request [358]
2019-12-10T12:53:02.549709+00:00 mtcap API: [SESSION] count 111 total 111 v_mStdIn.size 1
2019-12-10T12:53:02.551776+00:00 mtcap API: [SESSION] Response Started
2019-12-10T12:53:02.554708+00:00 mtcap API: [SESSION] Authorized Agent [admin] Permission [admin] IP [192.168.2.2] Port [50864] Token [E3C1528DC8F2793FF214B26FCFDB1]
2019-12-10T12:53:02.556161+00:00 mtcap API: [ROUTER][ADD][command/firmware_pre_upgrade]
2019-12-10T12:53:02.557510+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Pre Upgrading System Firmware
2019-12-10T12:53:02.558909+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Firmware Upgrade Info: null
2019-12-10T12:53:02.559153+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Firmware file size of not provided or not valid
======================================I have tried it and still same issue.
December 26, 2019 at 11:06 am #30067Jason Reiss
KeymasterIt still does not match.
Try changing “filename” to “fileName” and “size” to “fileSize”.December 26, 2019 at 11:29 am #30068conduit.aep.testing@gmail.com
ParticipantVirtualBox:~/Documents/python/review-12-16-19/review/ssh-login$ curl -i -k -d “username=admin&password=Testing1234&submit=Login” –dump-header headers https://192.168.2.1/api/loginHTTP/1.1 200 OK
Set-Cookie: token=A95A1836ECEE92134A5688B17DAEFB5F; Path=/; Secure
Cache-Control: no-cache
Content-type: application/json
Access-Control-Allow-Origin: *
Content-Security-Policy: default-src ‘self’; script-src ‘unsafe-inline’ ‘unsafe-eval’ ‘self’; style-src ‘unsafe-inline’ https://fonts.googleapis.com ‘self’; font-src https://fonts.gstatic.com ‘self’; connect-src ‘self’; img-src ‘self’ data:
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
X-Content-Type-Options: nosniff
Referrer-Policy: strict-origin-when-cross-origin
Feature-Policy: accelerometer ‘none’; camera ‘none’; geolocation ‘none’; gyroscope ‘none’; payment ‘none’; usb ‘none’
Strict-Transport-Security: max-age=31536000
Content-Length: 322
Date: Tue, 10 Dec 2019 13:12:16 GMT{
“code” : 200,
“result” : {
“address” : “192.168.2.2”,
“isipcuser” : false,
“isremoteuser” : false,
“permission” : “admin”,
“port” : “51016”,
“timestamp” : “13:12:16:474”,
“token” : “A95A1836ECEE92134A5688B17DAEFB5F”,
“user” : “admin”
},
“status” : “success”
}
VirtualBox:~/Documents/python/review-12-16-19/review/ssh-login$ curl -i -k -b headers -X POST -d ‘{“info”:{“fileName” : “MTCAP_5.1.2_upgrade-signed.bin”,”fileSize” : 106219520}}’ https://192.168.2.1/api/command/firmware_pre_upgradeHTTP/1.1 200 OK
Set-Cookie: token=A95A1836ECEE92134A5688B17DAEFB5F; Path=/; Secure
Cache-Control: no-cache
Content-type: application/json
Access-Control-Allow-Origin: *
Content-Security-Policy: default-src ‘self’; script-src ‘unsafe-inline’ ‘unsafe-eval’ ‘self’; style-src ‘unsafe-inline’ https://fonts.googleapis.com ‘self’; font-src https://fonts.gstatic.com ‘self’; connect-src ‘self’; img-src ‘self’ data:
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
X-Content-Type-Options: nosniff
Referrer-Policy: strict-origin-when-cross-origin
Feature-Policy: accelerometer ‘none’; camera ‘none’; geolocation ‘none’; gyroscope ‘none’; payment ‘none’; usb ‘none’
Strict-Transport-Security: max-age=31536000
Content-Length: 45
Date: Tue, 10 Dec 2019 13:13:20 GMT{
“code” : 200,
“status” : “success”
}/var/log/api:
=============
root@mtcap:/var/config/home/admin# tail -f /var/log/api.log
2019-12-10T12:50:56.202133+00:00 mtcap API: [SESSION] Authorized Agent [] Permission [admin] IP [127.0.0.1] Port [] Token []
2019-12-10T12:50:56.202872+00:00 mtcap API: [ROUTER][GET][waninfo/wans]
2019-12-10T12:50:56.344193+00:00 mtcap API: [SESSION] Ending FCGI Request [347] as [RESPONDER]
2019-12-10T12:50:56.346449+00:00 mtcap lighttpd[3909]: ^ localhost – [10/Dec/2019:12:50:56 +0000] “GET /api/waninfo/wans HTTP/1.1” 200 1352 “-” “-”
2019-12-10T12:51:01.881197+00:00 mtcap API: [SESSION] Starting FCGI Request [348]
2019-12-10T12:51:01.882596+00:00 mtcap API: [SESSION] Response Started
2019-12-10T12:51:01.883444+00:00 mtcap API: [SESSION] Authorized Agent [] Permission [admin] IP [127.0.0.1] Port [] Token []
2019-12-10T12:51:01.884181+00:00 mtcap API: [ROUTER][GET][syslog]
2019-12-10T12:51:01.885425+00:00 mtcap API: [SESSION] Ending FCGI Request [348] as [RESPONDER]
2019-12-10T12:51:01.895475+00:00 mtcap lighttpd[3909]: ^ localhost – [10/Dec/2019:12:51:01 +0000] “GET /api/syslog HTTP/1.1” 200 314 “-” “-”
2019-12-10T12:51:26.356200+00:00 mtcap API: [SESSION] Starting FCGI Request [349]
2019-12-10T12:51:26.357322+00:00 mtcap API: [SESSION] Response Started
2019-12-10T12:51:26.358155+00:00 mtcap API: [SESSION] Authorized Agent [] Permission [admin] IP [127.0.0.1] Port [] Token []
2019-12-10T12:51:26.358749+00:00 mtcap API: [ROUTER][GET][waninfo/wans]
2019-12-10T12:51:26.502364+00:00 mtcap API: [SESSION] Ending FCGI Request [349] as [RESPONDER]
2019-12-10T12:51:26.508261+00:00 mtcap lighttpd[3909]: ^ localhost – [10/Dec/2019:12:51:26 +0000] “GET /api/waninfo/wans HTTP/1.1” 200 1352 “-” “-”
2019-12-10T12:51:36.129324+00:00 mtcap API: [SESSION] Starting FCGI Request [350]
2019-12-10T12:51:36.131180+00:00 mtcap API: [SESSION] count 46 total 46 v_mStdIn.size 1
2019-12-10T12:51:36.131601+00:00 mtcap API: [SESSION] Response Started
2019-12-10T12:51:37.131087+00:00 mtcap API: pam_unix(api:session): session opened for user admin by (uid=0)
2019-12-10T12:51:37.135492+00:00 mtcap API: [SESSION] Authorized Agent [admin] Permission [admin] IP [192.168.2.2] Port [50864] Token [E3C1528DC8F2793FF214B26FCFDB1]
2019-12-10T12:51:37.136516+00:00 mtcap API: [SESSION] Ending FCGI Request [350] as [RESPONDER]
2019-12-10T12:51:37.139004+00:00 mtcap lighttpd[3909]: 192.168.2.2 192.168.2.1 – [10/Dec/2019:12:51:36 +0000] “POST /api/login HTTP/1.1” 200 319 “-” “curl/7.35.0”
2019-12-10T12:51:56.512499+00:00 mtcap API: [SESSION] Starting FCGI Request [351]
2019-12-10T12:51:56.513664+00:00 mtcap API: [SESSION] Response Started
2019-12-10T12:51:56.514497+00:00 mtcap API: [SESSION] Authorized Agent [] Permission [admin] IP [127.0.0.1] Port [] Token []
2019-12-10T12:51:56.515214+00:00 mtcap API: [ROUTER][GET][waninfo/wans]
2019-12-10T12:51:56.661023+00:00 mtcap API: [SESSION] Ending FCGI Request [351] as [RESPONDER]
2019-12-10T12:51:56.663275+00:00 mtcap lighttpd[3909]: ^ localhost – [10/Dec/2019:12:51:56 +0000] “GET /api/waninfo/wans HTTP/1.1” 200 1352 “-” “-”
2019-12-10T12:51:57.834360+00:00 mtcap API: [SESSION] Starting FCGI Request [352]
2019-12-10T12:51:57.836290+00:00 mtcap API: [SESSION] count 111 total 111 v_mStdIn.size 1
2019-12-10T12:51:57.836705+00:00 mtcap API: [SESSION] Response Started
2019-12-10T12:51:57.838761+00:00 mtcap API: [SESSION] Authorized Agent [admin] Permission [admin] IP [192.168.2.2] Port [50864] Token [E3C1528DC8F2793FF214B26FCFDB1]
2019-12-10T12:51:57.841679+00:00 mtcap API: [ROUTER][ADD][command/firmware_pre_upgrade]
2019-12-10T12:51:57.843016+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Pre Upgrading System Firmware
2019-12-10T12:51:57.844117+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Firmware Upgrade Info: null
2019-12-10T12:51:57.845201+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Firmware file size of not provided or not valid
^C
root@mtcap:/var/config/home/admin# tail -f /var/log/api.log
2019-12-10T12:52:52.439913+00:00 mtcap API: [CMDCTRLR] Stopping node-red
2019-12-10T12:52:52.483823+00:00 mtcap API: [CMDCTRLR] Stopping Lora Network Server
2019-12-10T12:52:52.540734+00:00 mtcap API: [SESSION] Ending FCGI Request [355] as [RESPONDER]
2019-12-10T12:52:52.567407+00:00 mtcap lighttpd[3909]: 192.168.2.2 192.168.2.1 – [10/Dec/2019:12:52:51 +0000] “POST /api/command/firmware_pre_upgrade HTTP/1.1” 200 45 “-” “curl/7.35.0”
2019-12-10T12:52:56.988752+00:00 mtcap API: [SESSION] Starting FCGI Request [356]
2019-12-10T12:52:56.991023+00:00 mtcap API: [SESSION] Response Started
2019-12-10T12:52:56.993067+00:00 mtcap API: [SESSION] Authorized Agent [] Permission [admin] IP [127.0.0.1] Port [] Token []
2019-12-10T12:52:56.994460+00:00 mtcap API: [ROUTER][GET][waninfo/wans]
2019-12-10T12:52:57.139427+00:00 mtcap API: [SESSION] Ending FCGI Request [356] as [RESPONDER]
2019-12-10T12:52:57.141679+00:00 mtcap lighttpd[3909]: ^ localhost – [10/Dec/2019:12:52:56 +0000] “GET /api/waninfo/wans HTTP/1.1” 200 1352 “-” “-”
2019-12-10T12:53:01.865013+00:00 mtcap API: [SESSION] Starting FCGI Request [357]
2019-12-10T12:53:01.866484+00:00 mtcap API: [SESSION] Response Started
2019-12-10T12:53:01.867333+00:00 mtcap API: [SESSION] Authorized Agent [] Permission [admin] IP [127.0.0.1] Port [] Token []
2019-12-10T12:53:01.868057+00:00 mtcap API: [ROUTER][GET][syslog]
2019-12-10T12:53:01.869334+00:00 mtcap API: [SESSION] Ending FCGI Request [357] as [RESPONDER]
2019-12-10T12:53:01.879031+00:00 mtcap lighttpd[3909]: ^ localhost – [10/Dec/2019:12:53:01 +0000] “GET /api/syslog HTTP/1.1” 200 314 “-” “-”
2019-12-10T12:53:02.548040+00:00 mtcap API: [SESSION] Starting FCGI Request [358]
2019-12-10T12:53:02.549709+00:00 mtcap API: [SESSION] count 111 total 111 v_mStdIn.size 1
2019-12-10T12:53:02.551776+00:00 mtcap API: [SESSION] Response Started
2019-12-10T12:53:02.554708+00:00 mtcap API: [SESSION] Authorized Agent [admin] Permission [admin] IP [192.168.2.2] Port [50864] Token [E3C1528DC8F2793FF214B26FCFDB1]
2019-12-10T12:53:02.556161+00:00 mtcap API: [ROUTER][ADD][command/firmware_pre_upgrade]
2019-12-10T12:53:02.557510+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Pre Upgrading System Firmware
2019-12-10T12:53:02.558909+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Firmware Upgrade Info: null
2019-12-10T12:53:02.559153+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Firmware file size of not provided or not valid
=================================================…Still no luck.
-
AuthorPosts
- You must be logged in to reply to this topic.