conduit.aep.testing@gmail.com
Forum Replies Created
-
AuthorPosts
-
conduit.aep.testing@gmail.com
ParticipantVirtualBox:~/Documents/python/review-12-16-19/review/ssh-login$ curl -i -k -d “username=admin&password=Testing1234&submit=Login” –dump-header headers https://192.168.2.1/api/loginHTTP/1.1 200 OK
Set-Cookie: token=A95A1836ECEE92134A5688B17DAEFB5F; Path=/; Secure
Cache-Control: no-cache
Content-type: application/json
Access-Control-Allow-Origin: *
Content-Security-Policy: default-src ‘self’; script-src ‘unsafe-inline’ ‘unsafe-eval’ ‘self’; style-src ‘unsafe-inline’ https://fonts.googleapis.com ‘self’; font-src https://fonts.gstatic.com ‘self’; connect-src ‘self’; img-src ‘self’ data:
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
X-Content-Type-Options: nosniff
Referrer-Policy: strict-origin-when-cross-origin
Feature-Policy: accelerometer ‘none’; camera ‘none’; geolocation ‘none’; gyroscope ‘none’; payment ‘none’; usb ‘none’
Strict-Transport-Security: max-age=31536000
Content-Length: 322
Date: Tue, 10 Dec 2019 13:12:16 GMT{
“code” : 200,
“result” : {
“address” : “192.168.2.2”,
“isipcuser” : false,
“isremoteuser” : false,
“permission” : “admin”,
“port” : “51016”,
“timestamp” : “13:12:16:474”,
“token” : “A95A1836ECEE92134A5688B17DAEFB5F”,
“user” : “admin”
},
“status” : “success”
}
VirtualBox:~/Documents/python/review-12-16-19/review/ssh-login$ curl -i -k -b headers -X POST -d ‘{“info”:{“fileName” : “MTCAP_5.1.2_upgrade-signed.bin”,”fileSize” : 106219520}}’ https://192.168.2.1/api/command/firmware_pre_upgradeHTTP/1.1 200 OK
Set-Cookie: token=A95A1836ECEE92134A5688B17DAEFB5F; Path=/; Secure
Cache-Control: no-cache
Content-type: application/json
Access-Control-Allow-Origin: *
Content-Security-Policy: default-src ‘self’; script-src ‘unsafe-inline’ ‘unsafe-eval’ ‘self’; style-src ‘unsafe-inline’ https://fonts.googleapis.com ‘self’; font-src https://fonts.gstatic.com ‘self’; connect-src ‘self’; img-src ‘self’ data:
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
X-Content-Type-Options: nosniff
Referrer-Policy: strict-origin-when-cross-origin
Feature-Policy: accelerometer ‘none’; camera ‘none’; geolocation ‘none’; gyroscope ‘none’; payment ‘none’; usb ‘none’
Strict-Transport-Security: max-age=31536000
Content-Length: 45
Date: Tue, 10 Dec 2019 13:13:20 GMT{
“code” : 200,
“status” : “success”
}/var/log/api:
=============
root@mtcap:/var/config/home/admin# tail -f /var/log/api.log
2019-12-10T12:50:56.202133+00:00 mtcap API: [SESSION] Authorized Agent [] Permission [admin] IP [127.0.0.1] Port [] Token []
2019-12-10T12:50:56.202872+00:00 mtcap API: [ROUTER][GET][waninfo/wans]
2019-12-10T12:50:56.344193+00:00 mtcap API: [SESSION] Ending FCGI Request [347] as [RESPONDER]
2019-12-10T12:50:56.346449+00:00 mtcap lighttpd[3909]: ^ localhost – [10/Dec/2019:12:50:56 +0000] “GET /api/waninfo/wans HTTP/1.1” 200 1352 “-” “-”
2019-12-10T12:51:01.881197+00:00 mtcap API: [SESSION] Starting FCGI Request [348]
2019-12-10T12:51:01.882596+00:00 mtcap API: [SESSION] Response Started
2019-12-10T12:51:01.883444+00:00 mtcap API: [SESSION] Authorized Agent [] Permission [admin] IP [127.0.0.1] Port [] Token []
2019-12-10T12:51:01.884181+00:00 mtcap API: [ROUTER][GET][syslog]
2019-12-10T12:51:01.885425+00:00 mtcap API: [SESSION] Ending FCGI Request [348] as [RESPONDER]
2019-12-10T12:51:01.895475+00:00 mtcap lighttpd[3909]: ^ localhost – [10/Dec/2019:12:51:01 +0000] “GET /api/syslog HTTP/1.1” 200 314 “-” “-”
2019-12-10T12:51:26.356200+00:00 mtcap API: [SESSION] Starting FCGI Request [349]
2019-12-10T12:51:26.357322+00:00 mtcap API: [SESSION] Response Started
2019-12-10T12:51:26.358155+00:00 mtcap API: [SESSION] Authorized Agent [] Permission [admin] IP [127.0.0.1] Port [] Token []
2019-12-10T12:51:26.358749+00:00 mtcap API: [ROUTER][GET][waninfo/wans]
2019-12-10T12:51:26.502364+00:00 mtcap API: [SESSION] Ending FCGI Request [349] as [RESPONDER]
2019-12-10T12:51:26.508261+00:00 mtcap lighttpd[3909]: ^ localhost – [10/Dec/2019:12:51:26 +0000] “GET /api/waninfo/wans HTTP/1.1” 200 1352 “-” “-”
2019-12-10T12:51:36.129324+00:00 mtcap API: [SESSION] Starting FCGI Request [350]
2019-12-10T12:51:36.131180+00:00 mtcap API: [SESSION] count 46 total 46 v_mStdIn.size 1
2019-12-10T12:51:36.131601+00:00 mtcap API: [SESSION] Response Started
2019-12-10T12:51:37.131087+00:00 mtcap API: pam_unix(api:session): session opened for user admin by (uid=0)
2019-12-10T12:51:37.135492+00:00 mtcap API: [SESSION] Authorized Agent [admin] Permission [admin] IP [192.168.2.2] Port [50864] Token [E3C1528DC8F2793FF214B26FCFDB1]
2019-12-10T12:51:37.136516+00:00 mtcap API: [SESSION] Ending FCGI Request [350] as [RESPONDER]
2019-12-10T12:51:37.139004+00:00 mtcap lighttpd[3909]: 192.168.2.2 192.168.2.1 – [10/Dec/2019:12:51:36 +0000] “POST /api/login HTTP/1.1” 200 319 “-” “curl/7.35.0”
2019-12-10T12:51:56.512499+00:00 mtcap API: [SESSION] Starting FCGI Request [351]
2019-12-10T12:51:56.513664+00:00 mtcap API: [SESSION] Response Started
2019-12-10T12:51:56.514497+00:00 mtcap API: [SESSION] Authorized Agent [] Permission [admin] IP [127.0.0.1] Port [] Token []
2019-12-10T12:51:56.515214+00:00 mtcap API: [ROUTER][GET][waninfo/wans]
2019-12-10T12:51:56.661023+00:00 mtcap API: [SESSION] Ending FCGI Request [351] as [RESPONDER]
2019-12-10T12:51:56.663275+00:00 mtcap lighttpd[3909]: ^ localhost – [10/Dec/2019:12:51:56 +0000] “GET /api/waninfo/wans HTTP/1.1” 200 1352 “-” “-”
2019-12-10T12:51:57.834360+00:00 mtcap API: [SESSION] Starting FCGI Request [352]
2019-12-10T12:51:57.836290+00:00 mtcap API: [SESSION] count 111 total 111 v_mStdIn.size 1
2019-12-10T12:51:57.836705+00:00 mtcap API: [SESSION] Response Started
2019-12-10T12:51:57.838761+00:00 mtcap API: [SESSION] Authorized Agent [admin] Permission [admin] IP [192.168.2.2] Port [50864] Token [E3C1528DC8F2793FF214B26FCFDB1]
2019-12-10T12:51:57.841679+00:00 mtcap API: [ROUTER][ADD][command/firmware_pre_upgrade]
2019-12-10T12:51:57.843016+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Pre Upgrading System Firmware
2019-12-10T12:51:57.844117+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Firmware Upgrade Info: null
2019-12-10T12:51:57.845201+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Firmware file size of not provided or not valid
^C
root@mtcap:/var/config/home/admin# tail -f /var/log/api.log
2019-12-10T12:52:52.439913+00:00 mtcap API: [CMDCTRLR] Stopping node-red
2019-12-10T12:52:52.483823+00:00 mtcap API: [CMDCTRLR] Stopping Lora Network Server
2019-12-10T12:52:52.540734+00:00 mtcap API: [SESSION] Ending FCGI Request [355] as [RESPONDER]
2019-12-10T12:52:52.567407+00:00 mtcap lighttpd[3909]: 192.168.2.2 192.168.2.1 – [10/Dec/2019:12:52:51 +0000] “POST /api/command/firmware_pre_upgrade HTTP/1.1” 200 45 “-” “curl/7.35.0”
2019-12-10T12:52:56.988752+00:00 mtcap API: [SESSION] Starting FCGI Request [356]
2019-12-10T12:52:56.991023+00:00 mtcap API: [SESSION] Response Started
2019-12-10T12:52:56.993067+00:00 mtcap API: [SESSION] Authorized Agent [] Permission [admin] IP [127.0.0.1] Port [] Token []
2019-12-10T12:52:56.994460+00:00 mtcap API: [ROUTER][GET][waninfo/wans]
2019-12-10T12:52:57.139427+00:00 mtcap API: [SESSION] Ending FCGI Request [356] as [RESPONDER]
2019-12-10T12:52:57.141679+00:00 mtcap lighttpd[3909]: ^ localhost – [10/Dec/2019:12:52:56 +0000] “GET /api/waninfo/wans HTTP/1.1” 200 1352 “-” “-”
2019-12-10T12:53:01.865013+00:00 mtcap API: [SESSION] Starting FCGI Request [357]
2019-12-10T12:53:01.866484+00:00 mtcap API: [SESSION] Response Started
2019-12-10T12:53:01.867333+00:00 mtcap API: [SESSION] Authorized Agent [] Permission [admin] IP [127.0.0.1] Port [] Token []
2019-12-10T12:53:01.868057+00:00 mtcap API: [ROUTER][GET][syslog]
2019-12-10T12:53:01.869334+00:00 mtcap API: [SESSION] Ending FCGI Request [357] as [RESPONDER]
2019-12-10T12:53:01.879031+00:00 mtcap lighttpd[3909]: ^ localhost – [10/Dec/2019:12:53:01 +0000] “GET /api/syslog HTTP/1.1” 200 314 “-” “-”
2019-12-10T12:53:02.548040+00:00 mtcap API: [SESSION] Starting FCGI Request [358]
2019-12-10T12:53:02.549709+00:00 mtcap API: [SESSION] count 111 total 111 v_mStdIn.size 1
2019-12-10T12:53:02.551776+00:00 mtcap API: [SESSION] Response Started
2019-12-10T12:53:02.554708+00:00 mtcap API: [SESSION] Authorized Agent [admin] Permission [admin] IP [192.168.2.2] Port [50864] Token [E3C1528DC8F2793FF214B26FCFDB1]
2019-12-10T12:53:02.556161+00:00 mtcap API: [ROUTER][ADD][command/firmware_pre_upgrade]
2019-12-10T12:53:02.557510+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Pre Upgrading System Firmware
2019-12-10T12:53:02.558909+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Firmware Upgrade Info: null
2019-12-10T12:53:02.559153+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Firmware file size of not provided or not valid
=================================================…Still no luck.
conduit.aep.testing@gmail.com
ParticipantUbuntu:
=======VirtualBox:~/Documents/python/review-12-16-19/review/ssh-login$ curl -i -k -b headers -X POST -d ‘{“info”:{“filename” : “MTCAP_5.1.2_upgrade-signed.bin”,”size” : 106219520,”type” : “application/octet-stream”}}’ https://192.168.2.1/api/command/firmware_pre_upgrade
HTTP/1.1 200 OK
Set-Cookie: token=E3C1528DC8F2793FF214B26FCFDB1; Path=/; Secure
Cache-Control: no-cache
Content-type: application/json
Access-Control-Allow-Origin: *
Content-Security-Policy: default-src ‘self’; script-src ‘unsafe-inline’ ‘unsafe-eval’ ‘self’; style-src ‘unsafe-inline’ https://fonts.googleapis.com ‘self’; font-src https://fonts.gstatic.com ‘self’; connect-src ‘self’; img-src ‘self’ data:
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
X-Content-Type-Options: nosniff
Referrer-Policy: strict-origin-when-cross-origin
Feature-Policy: accelerometer ‘none’; camera ‘none’; geolocation ‘none’; gyroscope ‘none’; payment ‘none’; usb ‘none’
Strict-Transport-Security: max-age=31536000
Content-Length: 45
Date: Tue, 10 Dec 2019 12:53:03 GMT{
“code” : 200,
“status” : “success”
}======================================
/var/log/api:
============root@mtcap:/var/config/home/admin# tail -f /var/log/api.log
2019-12-10T12:52:52.439913+00:00 mtcap API: [CMDCTRLR] Stopping node-red
2019-12-10T12:52:52.483823+00:00 mtcap API: [CMDCTRLR] Stopping Lora Network Server
2019-12-10T12:52:52.540734+00:00 mtcap API: [SESSION] Ending FCGI Request [355] as [RESPONDER]
2019-12-10T12:52:52.567407+00:00 mtcap lighttpd[3909]: 192.168.2.2 192.168.2.1 – [10/Dec/2019:12:52:51 +0000] “POST /api/command/firmware_pre_upgrade HTTP/1.1” 200 45 “-” “curl/7.35.0”
2019-12-10T12:52:56.988752+00:00 mtcap API: [SESSION] Starting FCGI Request [356]
2019-12-10T12:52:56.991023+00:00 mtcap API: [SESSION] Response Started
2019-12-10T12:52:56.993067+00:00 mtcap API: [SESSION] Authorized Agent [] Permission [admin] IP [127.0.0.1] Port [] Token []
2019-12-10T12:52:56.994460+00:00 mtcap API: [ROUTER][GET][waninfo/wans]
2019-12-10T12:52:57.139427+00:00 mtcap API: [SESSION] Ending FCGI Request [356] as [RESPONDER]
2019-12-10T12:52:57.141679+00:00 mtcap lighttpd[3909]: ^ localhost – [10/Dec/2019:12:52:56 +0000] “GET /api/waninfo/wans HTTP/1.1” 200 1352 “-” “-”
2019-12-10T12:53:01.865013+00:00 mtcap API: [SESSION] Starting FCGI Request [357]
2019-12-10T12:53:01.866484+00:00 mtcap API: [SESSION] Response Started
2019-12-10T12:53:01.867333+00:00 mtcap API: [SESSION] Authorized Agent [] Permission [admin] IP [127.0.0.1] Port [] Token []
2019-12-10T12:53:01.868057+00:00 mtcap API: [ROUTER][GET][syslog]
2019-12-10T12:53:01.869334+00:00 mtcap API: [SESSION] Ending FCGI Request [357] as [RESPONDER]
2019-12-10T12:53:01.879031+00:00 mtcap lighttpd[3909]: ^ localhost – [10/Dec/2019:12:53:01 +0000] “GET /api/syslog HTTP/1.1” 200 314 “-” “-”
2019-12-10T12:53:02.548040+00:00 mtcap API: [SESSION] Starting FCGI Request [358]
2019-12-10T12:53:02.549709+00:00 mtcap API: [SESSION] count 111 total 111 v_mStdIn.size 1
2019-12-10T12:53:02.551776+00:00 mtcap API: [SESSION] Response Started
2019-12-10T12:53:02.554708+00:00 mtcap API: [SESSION] Authorized Agent [admin] Permission [admin] IP [192.168.2.2] Port [50864] Token [E3C1528DC8F2793FF214B26FCFDB1]
2019-12-10T12:53:02.556161+00:00 mtcap API: [ROUTER][ADD][command/firmware_pre_upgrade]
2019-12-10T12:53:02.557510+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Pre Upgrading System Firmware
2019-12-10T12:53:02.558909+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Firmware Upgrade Info: null
2019-12-10T12:53:02.559153+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Firmware file size of not provided or not valid
======================================I have tried it and still same issue.
conduit.aep.testing@gmail.com
ParticipantIt looks like the WEB GUI is issuing the command – /firmware_pre_upgrade/ before calling the: /firmware_upgrade/ api:
=============================
…
(X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36″
2019-12-10T11:27:43.770751+00:00 mtcap API: [SESSION] Starting FCGI Request [11967]
2019-12-10T11:27:43.772712+00:00 mtcap API: [SESSION] count 75 total 75 v_mStdIn.size 1
2019-12-10T11:27:43.773126+00:00 mtcap API: [SESSION] Response Started
2019-12-10T11:27:43.775291+00:00 mtcap API: [SESSION] Authorized Web User [admin] Permission [admin] IP [192.168.2.2] Port [50638] Token [21FD52652E3E13B924E5A896F4CE56]
2019-12-10T11:27:43.776094+00:00 mtcap API: [ROUTER][ADD][command/firmware_pre_upgrade]
2019-12-10T11:27:43.776575+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Pre Upgrading System Firmware
2019-12-10T11:27:43.779963+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Firmware Upgrade Info: {#012 “info” : {#012 “fileName” : “MTCAP_5.1.2_upgrade-signed.bin”,#012 “fileSize” : 106219520#012 }#012}
2019-12-10T11:27:44.588975+00:00 mtcap API: [CMDCTRLR] Stopping node-red
2019-12-10T11:27:44.670628+00:00 mtcap API: [CMDCTRLR] Stopping Lora Network Server
2019-12-10T11:27:44.767586+00:00 mtcap API: [SESSION] Ending FCGI Request [11967] as [RESPONDER]========================
However, I tried it with the curl command and I am getting the following:====================================================
Ubuntu:
=======VirtualBox:~/Documents/python/review-12-16-19/review/ssh-login$ curl -i -k -b headers -X POST -d ‘{“filename” : “MTCAP_5.1.2_upgrade-signed.bin”,”size” : 106219520,”type” : “application/octet-stream”}’ https://192.168.2.1/api/command/firmware_pre_upgrade
HTTP/1.1 200 OK
Set-Cookie: token=FB76B78DB94B40AAEE3028F79BEDFC7E; Path=/; Secure
Cache-Control: no-cache
Content-type: application/json
Access-Control-Allow-Origin: *
Content-Security-Policy: default-src ‘self’; script-src ‘unsafe-inline’ ‘unsafe-eval’ ‘self’; style-src ‘unsafe-inline’ https://fonts.googleapis.com ‘self’; font-src https://fonts.gstatic.com ‘self’; connect-src ‘self’; img-src ‘self’ data:
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
X-Content-Type-Options: nosniff
Referrer-Policy: strict-origin-when-cross-origin
Feature-Policy: accelerometer ‘none’; camera ‘none’; geolocation ‘none’; gyroscope ‘none’; payment ‘none’; usb ‘none’
Strict-Transport-Security: max-age=31536000
Content-Length: 45
Date: Tue, 10 Dec 2019 11:48:04 GMT{
“code” : 200,
“status” : “success”
}
=========================================
/var/log/api.log:
=================
2019-12-10T12:05:07.698380+00:00 mtcap API: [SESSION] count 102 total 102 v_mStdIn.size 1
2019-12-10T12:05:07.700389+00:00 mtcap API: [SESSION] Response Started
2019-12-10T12:05:07.703221+00:00 mtcap API: [SESSION] AUTHORIZATION FAILED! IP [192.168.2.2] Port [50768] Code [401 Unauthorized]
2019-12-10T12:05:07.704377+00:00 mtcap API: [SESSION] Ending FCGI Request [208] as [RESPONDER]
2019-12-10T12:05:07.707988+00:00 mtcap lighttpd[3909]: 192.168.2.2 192.168.2.1 – [10/Dec/2019:12:05:07 +0000] “POST /api/command/firmware_pre_upgrade HTTP/1.1” 401 77 “-” “curl/7.35.0”
2019-12-10T12:05:10.627122+00:00 mtcap API: [SESSION] Starting FCGI Request [209]
2019-12-10T12:05:10.629636+00:00 mtcap API: [SESSION] Response Started
2019-12-10T12:05:10.631303+00:00 mtcap API: [SESSION] Authorized Agent [] Permission [admin] IP [127.0.0.1] Port [] Token []
2019-12-10T12:05:10.632687+00:00 mtcap API: [ROUTER][GET][waninfo/wans]
2019-12-10T12:05:10.780381+00:00 mtcap API: [SESSION] Ending FCGI Request [209] as [RESPONDER]
2019-12-10T12:05:10.783049+00:00 mtcap lighttpd[3909]: ^ localhost – [10/Dec/2019:12:05:10 +0000] “GET /api/waninfo/wans HTTP/1.1” 200 1352 “-” “-”
2019-12-10T12:05:33.380307+00:00 mtcap API: [SESSION] Starting FCGI Request [210]
2019-12-10T12:05:33.382136+00:00 mtcap API: [SESSION] count 46 total 46 v_mStdIn.size 1
2019-12-10T12:05:33.382554+00:00 mtcap API: [SESSION] Response Started
2019-12-10T12:05:34.039155+00:00 mtcap API: pam_unix(api:session): session opened for user admin by (uid=0)
2019-12-10T12:05:34.044183+00:00 mtcap API: [SESSION] Authorized Agent [admin] Permission [admin] IP [192.168.2.2] Port [50770] Token [8897D444E53E7DDE688E60D4ADDB9D56]
2019-12-10T12:05:34.046503+00:00 mtcap API: [SESSION] Ending FCGI Request [210] as [RESPONDER]
2019-12-10T12:05:34.049653+00:00 mtcap lighttpd[3909]: 192.168.2.2 192.168.2.1 – [10/Dec/2019:12:05:33 +0000] “POST /api/login HTTP/1.1” 200 321 “-” “curl/7.35.0”
2019-12-10T12:05:40.791852+00:00 mtcap API: [SESSION] Starting FCGI Request [211]
2019-12-10T12:05:40.794456+00:00 mtcap API: [SESSION] Response Started
2019-12-10T12:05:40.796385+00:00 mtcap API: [SESSION] Authorized Agent [] Permission [admin] IP [127.0.0.1] Port [] Token []
2019-12-10T12:05:40.798208+00:00 mtcap API: [ROUTER][GET][waninfo/wans]
2019-12-10T12:05:40.944203+00:00 mtcap API: [SESSION] Ending FCGI Request [211] as [RESPONDER]
2019-12-10T12:05:40.946445+00:00 mtcap lighttpd[3909]: ^ localhost – [10/Dec/2019:12:05:40 +0000] “GET /api/waninfo/wans HTTP/1.1” 200 1352 “-” “-”
2019-12-10T12:05:43.160795+00:00 mtcap API: [SESSION] Starting FCGI Request [212]
2019-12-10T12:05:43.162730+00:00 mtcap API: [SESSION] count 102 total 102 v_mStdIn.size 1
2019-12-10T12:05:43.163139+00:00 mtcap API: [SESSION] Response Started
2019-12-10T12:05:43.165203+00:00 mtcap API: [SESSION] Authorized Agent [admin] Permission [admin] IP [192.168.2.2] Port [50770] Token [8897D444E53E7DDE688E60D4ADDB9D56]
2019-12-10T12:05:43.166007+00:00 mtcap API: [ROUTER][ADD][command/firmware_pre_upgrade]
2019-12-10T12:05:43.166524+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Pre Upgrading System Firmware
2019-12-10T12:05:43.166776+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Firmware Upgrade Info: null
2019-12-10T12:05:43.166990+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Firmware file size of not provided or not valid=========================================
Any ideas?
conduit.aep.testing@gmail.com
Participant/var/log/messages:
==================
2019-12-10T10:54:54.846805+00:00 mtcap watchdog: User-Space Watchdog Running : [ /dev/watchdog ] opts [ ]
2019-12-10T10:59:42.904570+00:00 mtcap firmware_upgrade: info: Starting firmware upgrade procedure
2019-12-10T10:59:43.092039+00:00 mtcap firmware_upgrade: error: Cannot list upgrade package content
2019-12-10T10:59:43.121356+00:00 mtcap firmware_upgrade: info: Firmware upgrade procedure exited with 92 code
2019-12-10T10:59:49.687091+00:00 mtcap 2019-12-10 10:59:49,684 – aep-utils – INFO – (‘Successfully queried nodeRed enabled: {\n “code” : 200,\n “result” : true,\n “status” : “success”\n}\n’,)
==================Notes: If I am using the same MTCAP_5.1.2_upgrade-signed.bin and upgrade via WEB GUI, it worked.
-
AuthorPosts