Pagina 1 di 1

[RISOLTO] Autenticazione della console WAPT

Pubblicato: 15 maggio 2020 - 16:20
di Beryl
Buongiorno,

Ho una console WAPT versione 1.8.1.6756.
Il server esegue Windows 2012 R2.

Quando inserisco la password (che sembra essere quella corretta) la finestra che chiede le credenziali scompare per 1 secondo, poi riappare chiedendomi di inserire le credenziali.

- Quando la password è errata, WAPT visualizza un messaggio di errore?
- Ho riavviato i servizi, nessun cambiamento, ho riavviato il sistema, nessun cambiamento.

Hai idea di cosa posso fare?
GRAZIE

In base ai registri, credo che il problema si sia verificato l'11 maggio.

Codice: Seleziona tutto

2020-03-17 11:21:34,549 [waptws         ] WARNING SocketIO connection refused for uuid , sid a88d959eebca4f6fa897d32dd9ea23d6: Missing source host uuid, instance 
2020-04-20 07:55:48,575 [waptws         ] WARNING Invalid session None
Traceback (most recent call last):
  File "c:\wapt\waptserver\server.py", line 2554, in <module>
    socketio.run(app, host='127.0.0.1', log=logger,  port=port, debug=options.devel, log_output = True, use_reloader=options.devel, max_size=app.conf['max_clients'])
  File "c:\wapt\lib\site-packages\flask_socketio\__init__.py", line 571, in run
    run_server()
  File "c:\wapt\lib\site-packages\flask_socketio\__init__.py", line 566, in run_server
    log_output=log_output, **kwargs)
  File "c:\wapt\lib\site-packages\eventlet\wsgi.py", line 1000, in server
    greenio.shutdown_safe(cs[1])
  File "c:\wapt\lib\site-packages\eventlet\greenio\base.py", line 498, in shutdown_safe
    return sock.shutdown(socket.SHUT_RDWR)
  File "c:\wapt\lib\socket.py", line 228, in meth
    return getattr(self._sock,name)(*args)
socket.error: [Errno 10054] Une connexion existante a dû être fermée par l’hôte distant
2020-05-11 15:40:02,661 [waptserver     ] CRITICAL add_host failed Exception('register_host: No uuid supplied',)
2020-05-11 15:40:07,723 [waptserver     ] CRITICAL Get_websocket_auth_token failed EWaptAuthenticationFailure('No uuid supplied',)
2020-05-11 15:40:07,832 [waptws         ] WARNING SocketIO connection refused for uuid , sid 55b0d9760cb94a4eb3b8465a9135f420: Missing source host uuid, instance 
2020-05-11 15:40:19,364 [waptserver     ] CRITICAL update_host failed Exception('register_host: No uuid supplied',)
2020-05-11 15:40:20,411 [waptserver     ] CRITICAL add_host failed Exception('register_host: No uuid supplied',)

Re: Autenticazione della console WAPT

Pubblicato: 15 maggio 2020 - 18:31
di dcardon
In effetti, la finestra di accesso non visualizza alcun messaggio specifico quando le credenziali di accesso sono errate.

Per quanto riguarda i log, Socket.IO viene utilizzato dagli agenti WAPT per i WebSocket, non dall'autenticazione tramite console. Il problema deve risiedere altrove.

Potresti riavviare il server con i log di debug e verificare la presenza di altri messaggi di errore?

Cordiali saluti,

Denis

Re: Autenticazione della console WAPT

Pubblicato: 15 maggio 2020 - 21:37
di Beryl
Grazie per il tuo feedback.
In accesso nginix
Ho questo

Codice: Seleziona tutto

10.0.0.23 - admin [15/May/2020:21:26:59 +0200] "POST /api/v3/login HTTP/1.0" 401 52 "-" "waptconsole/1.8.1.6756"
10.0.0.23 - admin [15/May/2020:21:27:00 +0200] "POST /api/v3/login HTTP/1.0" 401 52 "-" "waptconsole/1.8.1.6756"
-> Quindi, errore 401
In nssm_waptserver
Ho questo

Codice: Seleziona tutto

2020-05-15 21:03:51,273 [waptws         ] WARNING SocketIO connection refused for uuid , sid 6636b0fd2c0b42b5909e082de0644bc1: Missing source host uuid, instance 
2020-05-15 21:05:51,440 [waptserver     ] CRITICAL Get_websocket_auth_token failed EWaptAuthenticationFailure('No uuid supplied',)
Per abilitare la registrazione in modalità debug, è sufficiente aggiungere la riga

Codice: Seleziona tutto

loglevel = debug
alla fine del file C:\wapt\conf\waptserver.ini?

Re: Autenticazione della console WAPT

Pubblicato: 15 maggio 2020 - 21:57
di Beryl

Codice: Seleziona tutto

2020-05-15 21:58:18,490 [waptserver     ] INFO Using config file c:\wapt\conf\waptserver.ini
2020-05-15 21:58:19,315 [waptws         ] INFO Server initialized for eventlet.
2020-05-15 21:58:19,316 [waptserver     ] INFO Load database configuration
2020-05-15 21:58:19,316 [waptdb         ] INFO Initializing a DB connection pool for db host None:5432 db_name:wapt. Size:90
2020-05-15 21:58:19,318 [waptdb         ] INFO Connecting to waptdb explicitely. Count: 0
2020-05-15 21:58:19,318 [peewee.pool    ] DEBUG No connection available in pool.
2020-05-15 21:58:19,374 [peewee.pool    ] DEBUG Created new connection 44181024.
2020-05-15 21:58:19,434 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,460 [waptdb         ] INFO Current DB: {'host': None, 'password': None, 'port': 5432, 'user': 'wapt'} version: 1.8.1.0
2020-05-15 21:58:19,460 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,463 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,466 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,469 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribas" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,470 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,473 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,476 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,477 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,480 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,483 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,486 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,487 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,490 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,493 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,494 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,496 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,499 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,500 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,503 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,505 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,506 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,509 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,510 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,513 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,515 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,517 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,519 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,522 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,523 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,526 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,529 [peewee         ] DEBUG ('SELECT "t1"."id", "t1"."created_on", "t1"."created_by", "t1"."updated_on", "t1"."updated_by", "t1"."name", "t1"."auth_method", "t1"."description", "t1"."user_certificate", "t1"."user_fingerprint_sha1", "t1"."user_fingerprint_sha256" FROM "waptusers" AS "t1" WHERE ("t1"."name" = %s) LIMIT %s OFFSET %s', [u'admin', 1, 0])
2020-05-15 21:58:19,561 [peewee         ] DEBUG ('UPDATE "waptusers" SET "created_on" = %s, "created_by" = %s, "updated_on" = %s, "updated_by" = %s, "name" = %s, "auth_method" = %s, "description" = %s, "user_certificate" = %s, "user_fingerprint_sha1" = %s, "user_fingerprint_sha256" = %s WHERE ("waptusers"."id" = %s)', [datetime.datetime(2020, 3, 11, 10, 15, 54, 253000), None, datetime.datetime(2020, 5, 15, 19, 58, 19, 560000), None, u'admin', None, None, None, None, None, 1])
2020-05-15 21:58:19,575 [waptdb         ] DEBUG Disconnecting from waptdb explicitely. Count: 1
2020-05-15 21:58:19,575 [peewee.pool    ] DEBUG Returning 44181024 to pool.
2020-05-15 21:58:19,575 [waptserver     ] INFO Waptserver starting...
2020-05-15 21:58:19,575 [waptdb         ] INFO Connecting to waptdb explicitely. Count: 0
2020-05-15 21:58:19,576 [waptserver     ] INFO Reset connections SID for former hosts on this server
2020-05-15 21:58:19,579 [peewee         ] DEBUG ('UPDATE "hosts" SET "reachable" = %s, "listening_protocol" = %s, "listening_address" = %s WHERE (("hosts"."listening_protocol" = %s) AND ("hosts"."server_uuid" = %s))', [u'DISCONNECTED', None, None, u'websockets', u'00000000-0000-0000-18d8-730300000000'])
2020-05-15 21:58:19,743 [waptdb         ] DEBUG Disconnecting from waptdb explicitely. Count: 1
2020-05-15 21:58:19,743 [peewee.pool    ] DEBUG Returning 44181024 to pool.
2020-05-15 21:58:19,743 [waptserver     ] INFO Starting socketio/wsgi server on port 8080
2020-05-15 21:58:19,744 [waptserver     ] INFO (3332) wsgi starting up on http://127.0.0.1:8080
2020-05-15 21:58:26,394 [waptserver     ] DEBUG (3332) accepted ('127.0.0.1', 54665)
2020-05-15 21:58:26,476 [waptserver     ] DEBUG wapt admin passwd verification failed
2020-05-15 21:58:26,480 [waptserver     ] INFO 10.0.0.23,127.0.0.1 - - [15/May/2020 21:58:26] "POST /api/v3/login HTTP/1.0" 401 324 0.086000
2020-05-15 21:58:29,493 [waptserver     ] DEBUG (3332) accepted ('127.0.0.1', 54667)
2020-05-15 21:58:29,575 [waptserver     ] DEBUG wapt admin passwd verification failed
2020-05-15 21:58:29,578 [waptserver     ] INFO 10.0.0.23,127.0.0.1 - - [15/May/2020 21:58:29] "POST /api/v3/login HTTP/1.0" 401 324 0.085000
2020-05-15 21:58:32,461 [waptserver     ] DEBUG (3332) accepted ('127.0.0.1', 54670)
2020-05-15 21:58:32,542 [waptserver     ] DEBUG wapt admin passwd verification failed
2020-05-15 21:58:32,546 [waptserver     ] INFO 10.0.0.23,127.0.0.1 - - [15/May/2020 21:58:32] "POST /api/v3/login HTTP/1.0" 401 324 0.084000
2020-05-15 21:58:54,526 [waptserver     ] DEBUG (3332) accepted ('127.0.0.1', 54673)
2020-05-15 21:58:54,536 [waptserver     ] DEBUG (3332) accepted ('127.0.0.1', 54674)
2020-05-15 21:58:54,538 [waptws         ] INFO a2dd6ecfdb3f4b98b3eaf83a11b0a218: Sending packet OPEN data {'pingInterval': 25000, 'pingTimeout': 60000, 'upgrades': ['websocket'], 'sid': 'a2dd6ecfdb3f4b98b3eaf83a11b0a218'}
2020-05-15 21:58:54,539 [waptws         ] INFO Unauthenticated Socket.IO connection from wapt client sid a2dd6ecfdb3f4b98b3eaf83a11b0a218 (uuid: 07FD1C18-35A8-4E04-8DE7-1D45AD58D929)
2020-05-15 21:58:54,539 [waptdb         ] INFO Connecting to waptdb explicitely. Count: 0
2020-05-15 21:58:54,540 [peewee         ] DEBUG ('UPDATE "hosts" SET "server_uuid" = %s, "listening_protocol" = %s, "listening_address" = %s, "listening_timestamp" = %s, "last_seen_on" = %s WHERE ("hosts"."uuid" = %s)', [u'00000000-0000-0000-18d8-730300000000', u'websockets', u'a2dd6ecfdb3f4b98b3eaf83a11b0a218', u'2020-05-15T21:58:54.540000', u'2020-05-15T21:58:54.540000', u'07FD1C18-35A8-4E04-8DE7-1D45AD58D929'])
2020-05-15 21:58:54,542 [waptws         ] INFO 44e558a037934e14addd70e413a9e385: Sending packet OPEN data {'pingInterval': 25000, 'pingTimeout': 60000, 'upgrades': ['websocket'], 'sid': '44e558a037934e14addd70e413a9e385'}
2020-05-15 21:58:54,542 [waptws         ] INFO Unauthenticated Socket.IO connection from wapt client sid 44e558a037934e14addd70e413a9e385 (uuid: 1538058D-B393-D013-D0C3-5FD23A93AFBB)
2020-05-15 21:58:54,543 [waptdb         ] INFO Connecting to waptdb explicitely. Count: 1
2020-05-15 21:58:54,543 [peewee.pool    ] DEBUG No connection available in pool.
2020-05-15 21:58:54,569 [waptdb         ] DEBUG Disconnecting from waptdb explicitely. Count: 1
2020-05-15 21:58:54,575 [peewee.pool    ] DEBUG Created new connection 44182240.
2020-05-15 21:58:54,576 [peewee         ] DEBUG ('UPDATE "hosts" SET "server_uuid" = %s, "listening_protocol" = %s, "listening_address" = %s, "listening_timestamp" = %s, "last_seen_on" = %s WHERE ("hosts"."uuid" = %s)', [u'00000000-0000-0000-18d8-730300000000', u'websockets', u'44e558a037934e14addd70e413a9e385', u'2020-05-15T21:58:54.576000', u'2020-05-15T21:58:54.576000', u'1538058D-B393-D013-D0C3-5FD23A93AFBB'])
2020-05-15 21:58:54,578 [peewee.pool    ] DEBUG Returning 44181024 to pool.
2020-05-15 21:58:54,578 [waptws         ] INFO a2dd6ecfdb3f4b98b3eaf83a11b0a218: Sending packet MESSAGE data 0
2020-05-15 21:58:54,578 [waptserver     ] INFO 127.0.0.1 - - [15/May/2020 21:58:54] "GET /socket.io/?token=eyJhbGciOiJIUzUxMiIsImV4cCI6MTU4OTYxNTQ1MiwiaWF0IjoxNTg5NTcyMjUyfQ.eyJ1dWlkIjoiMDdGRDFDMTgtMzVBOC00RTA0LThERTctMUQ0NUFENThEOTI5Iiwic2VydmVyX3V1aWQiOiIwMDAwMDAwMC0wMDAwLTAwMDAtMThkOC03MzAzMDAwMDAwMDAifQ.d3YTkczLP_0TkubO4qRkK3DaHpufzs837sHg7IEd-asqH8h_7S7nhoXUI4JYku3CvfTuvlmxL9ca-JmTS3M-Ww&uuid=07FD1C18-35A8-4E04-8DE7-1D45AD58D929&EIO=3&transport=polling&t=1589572734429-0 HTTP/1.1" 200 325 0.043000
2020-05-15 21:58:54,582 [waptserver     ] DEBUG (3332) accepted ('127.0.0.1', 54676)
2020-05-15 21:58:54,592 [waptws         ] INFO 912d5137ee1b4502a0f997fa741a9ba5: Sending packet OPEN data {'pingInterval': 25000, 'pingTimeout': 60000, 'upgrades': ['websocket'], 'sid': '912d5137ee1b4502a0f997fa741a9ba5'}
2020-05-15 21:58:54,594 [waptws         ] INFO Unauthenticated Socket.IO connection from wapt client sid 912d5137ee1b4502a0f997fa741a9ba5 (uuid: 4C4C4544-0042-4710-8033-CAC04F303332)
2020-05-15 21:58:54,594 [waptdb         ] INFO Connecting to waptdb explicitely. Count: 1
2020-05-15 21:58:54,595 [peewee         ] DEBUG ('UPDATE "hosts" SET "server_uuid" = %s, "listening_protocol" = %s, "listening_address" = %s, "listening_timestamp" = %s, "last_seen_on" = %s WHERE ("hosts"."uuid" = %s)', [u'00000000-0000-0000-18d8-730300000000', u'websockets', u'912d5137ee1b4502a0f997fa741a9ba5', u'2020-05-15T21:58:54.595000', u'2020-05-15T21:58:54.595000', u'4C4C4544-0042-4710-8033-CAC04F303332'])
2020-05-15 21:58:54,604 [waptdb         ] DEBUG Disconnecting from waptdb explicitely. Count: 2
2020-05-15 21:58:54,605 [peewee.pool    ] DEBUG Returning 44182240 to pool.
2020-05-15 21:58:54,605 [waptws         ] INFO 44e558a037934e14addd70e413a9e385: Sending packet MESSAGE data 0
2020-05-15 21:58:54,605 [waptserver     ] INFO 127.0.0.1 - - [15/May/2020 21:58:54] "GET /socket.io/?token=eyJhbGciOiJIUzUxMiIsImV4cCI6MTU4OTYxNTQ1MiwiaWF0IjoxNTg5NTcyMjUyfQ.eyJ1dWlkIjoiMTUzODA1OEQtQjM5My1EMDEzLUQwQzMtNUZEMjNBOTNBRkJCIiwic2VydmVyX3V1aWQiOiIwMDAwMDAwMC0wMDAwLTAwMDAtMThkOC03MzAzMDAwMDAwMDAifQ.l9cJxDuweJl0iw3hRmou7DFszQnpTYWZ-AuIWNNkIgngbw_K5cF8aCiCGxtAp99zXYBbW1aoXRQWF7m3VtYLTg&uuid=1538058D-B393-D013-D0C3-5FD23A93AFBB&EIO=3&transport=polling&t=1589572734422-0 HTTP/1.1" 200 325 0.064000
2020-05-15 21:58:54,619 [waptdb         ] DEBUG Disconnecting from waptdb explicitely. Count: 1
2020-05-15 21:58:54,619 [peewee.pool    ] DEBUG Returning 44181024 to pool.
2020-05-15 21:58:54,621 [waptws         ] INFO 912d5137ee1b4502a0f997fa741a9ba5: Sending packet MESSAGE data 0
2020-05-15 21:58:54,621 [waptserver     ] INFO 127.0.0.1 - - [15/May/2020 21:58:54] "GET /socket.io/?token=eyJhbGciOiJIUzUxMiIsImV4cCI6MTU4OTYxNTQ1MiwiaWF0IjoxNTg5NTcyMjUyfQ.eyJ1dWlkIjoiNEM0QzQ1NDQtMDA0Mi00NzEwLTgwMzMtQ0FDMDRGMzAzMzMyIiwic2VydmVyX3V1aWQiOiIwMDAwMDAwMC0wMDAwLTAwMDAtMThkOC03MzAzMDAwMDAwMDAifQ.8DESXqSU1eO3E-A83jol1xCJbYtxhvu16pQ3W1kUTQMRkP1zuqPcGx7D-Ng9QJkkfEb-6YyCD-TD0EDAFQq4zA&uuid=4C4C4544-0042-4710-8033-CAC04F303332&EIO=3&transport=polling&t=1589572734381-0 HTTP/1.1" 200 325 0.029000
2020-05-15 21:58:54,641 [waptserver     ] DEBUG (3332) accepted ('127.0.0.1', 54677)
2020-05-15 21:58:54,641 [waptserver     ] DEBUG (3332) accepted ('127.0.0.1', 54678)
2020-05-15 21:58:54,642 [waptws         ] INFO 966cb7ee35144e09b6c414611d8c468b: Sending packet OPEN data {'pingInterval': 25000, 'pingTimeout': 60000, 'upgrades': ['websocket'], 'sid': '966cb7ee35144e09b6c414611d8c468b'}
2020-05-15 21:58:54,644 [waptws         ] INFO Unauthenticated Socket.IO connection from wapt client sid 966cb7ee35144e09b6c414611d8c468b (uuid: 3ECE3423-7C37-E611-8160-4CCC6A341464)
2020-05-15 21:58:54,644 [waptdb         ] INFO Connecting to waptdb explicitely. Count: 0
2020-05-15 21:58:54,645 [peewee         ] DEBUG ('UPDATE "hosts" SET "server_uuid" = %s, "listening_protocol" = %s, "listening_address" = %s, "listening_timestamp" = %s, "last_seen_on" = %s WHERE ("hosts"."uuid" = %s)', [u'00000000-0000-0000-18d8-730300000000', u'websockets', u'966cb7ee35144e09b6c414611d8c468b', u'2020-05-15T21:58:54.645000', u'2020-05-15T21:58:54.645000', u'3ECE3423-7C37-E611-8160-4CCC6A341464'])
2020-05-15 21:58:54,647 [waptws         ] INFO 746c197c3a9d4f51a0cb3a6f2decbce6: Sending packet OPEN data {'pingInterval': 25000, 'pingTimeout': 60000, 'upgrades': ['websocket'], 'sid': '746c197c3a9d4f51a0cb3a6f2decbce6'}
2020-05-15 21:58:54,648 [waptws         ] INFO Unauthenticated Socket.IO connection from wapt client sid 746c197c3a9d4f51a0cb3a6f2decbce6 (uuid: 4C4C4544-004C-4A10-8030-C6C04F594B32)
2020-05-15 21:58:54,648 [waptdb         ] INFO Connecting to waptdb explicitely. Count: 1
2020-05-15 21:58:54,650 [peewee         ] DEBUG ('UPDATE "hosts" SET "server_uuid" = %s, "listening_protocol" = %s, "listening_address" = %s, "listening_timestamp" = %s, "last_seen_on" = %s WHERE ("hosts"."uuid" = %s)', [u'00000000-0000-0000-18d8-730300000000', u'websockets', u'746c197c3a9d4f51a0cb3a6f2decbce6', u'2020-05-15T21:58:54.649000', u'2020-05-15T21:58:54.649000', u'4C4C4544-004C-4A10-8030-C6C04F594B32'])
2020-05-15 21:58:54,651 [waptserver     ] DEBUG (3332) accepted ('127.0.0.1', 54679)
2020-05-15 21:58:54,661 [waptws         ] INFO a2dd6ecfdb3f4b98b3eaf83a11b0a218: Received request to upgrade to websocket
2020-05-15 21:58:54,677 [waptdb         ] DEBUG Disconnecting from waptdb explicitely. Count: 2
2020-05-15 21:58:54,677 [peewee.pool    ] DEBUG Returning 44181024 to pool.
2020-05-15 21:58:54,677 [waptws         ] INFO 966cb7ee35144e09b6c414611d8c468b: Sending packet MESSAGE data 0
2020-05-15 21:58:54,677 [waptserver     ] INFO 127.0.0.1 - - [15/May/2020 21:58:54] "GET /socket.io/?token=eyJhbGciOiJIUzUxMiIsImV4cCI6MTU4OTYxNTQ1MiwiaWF0IjoxNTg5NTcyMjUyfQ.eyJ1dWlkIjoiM0VDRTM0MjMtN0MzNy1FNjExLTgxNjAtNENDQzZBMzQxNDY0Iiwic2VydmVyX3V1aWQiOiIwMDAwMDAwMC0wMDAwLTAwMDAtMThkOC03MzAzMDAwMDAwMDAifQ.3tDitg6yRP-jFDsaaP71rykBu8J0pnykz24kMLT8M5Bsh4HVajV30s-86HF6MejvAtVNz9RPCM384xMkZ59l8A&uuid=3ECE3423-7C37-E611-8160-4CCC6A341464&EIO=3&transport=polling&t=1589572734593-0 HTTP/1.1" 200 325 0.036000
2020-05-15 21:58:54,686 [waptdb         ] DEBUG Disconnecting from waptdb explicitely. Count: 1
2020-05-15 21:58:54,686 [peewee.pool    ] DEBUG Returning 44182240 to pool.
2020-05-15 21:58:54,686 [waptws         ] INFO 746c197c3a9d4f51a0cb3a6f2decbce6: Sending packet MESSAGE data 0
2020-05-15 21:58:54,687 [waptserver     ] INFO 127.0.0.1 - - [15/May/2020 21:58:54] "GET /socket.io/?token=eyJhbGciOiJIUzUxMiIsImV4cCI6MTU4OTYxNTM5MSwiaWF0IjoxNTg5NTcyMTkxfQ.eyJ1dWlkIjoiNEM0QzQ1NDQtMDA0Qy00QTEwLTgwMzAtQzZDMDRGNTk0QjMyIiwic2VydmVyX3V1aWQiOiIwMDAwMDAwMC0wMDAwLTAwMDAtMThkOC03MzAzMDAwMDAwMDAifQ.Y8CkuXcDuIskqOMMbyIkEM_rvPpHfjMFpCiXBamU1tgwPSFKu4eL3G0hukfzG-26bsytqlyCY5zFGVOtEg0KIA&uuid=4C4C4544-004C-4A10-8030-C6C04F594B32&EIO=3&transport=polling&t=1589572734586-0 HTTP/1.1" 200 325 0.040000
2020-05-15 21:58:54,785 [waptserver     ] DEBUG (3332) accepted ('127.0.0.1', 54680)
2020-05-15 21:58:54,832 [waptserver     ] DEBUG (3332) accepted ('127.0.0.1', 54681)
2020-05-15 21:58:54,834 [waptws         ] INFO 44e558a037934e14addd70e413a9e385: Received request to upgrade to websocket
2020-05-15 21:58:54,835 [waptws         ] INFO 912d5137ee1b4502a0f997fa741a9ba5: Received request to upgrade to websocket
2020-05-15 21:58:54,835 [waptws         ] INFO a2dd6ecfdb3f4b98b3eaf83a11b0a218: Upgrade to websocket successful
2020-05-15 21:58:54,835 [waptserver     ] DEBUG (3332) accepted ('127.0.0.1', 54682)
2020-05-15 21:58:54,836 [waptws         ] INFO 966cb7ee35144e09b6c414611d8c468b: Received request to upgrade to websocket
2020-05-15 21:58:54,839 [waptserver     ] DEBUG (3332) accepted ('127.0.0.1', 54683)
2020-05-15 21:58:54,851 [waptws         ] INFO 746c197c3a9d4f51a0cb3a6f2decbce6: Received request to upgrade to websocket
2020-05-15 21:58:54,855 [waptws         ] INFO 44e558a037934e14addd70e413a9e385: Upgrade to websocket successful
2020-05-15 21:58:54,857 [waptws         ] INFO 966cb7ee35144e09b6c414611d8c468b: Upgrade to websocket successful
2020-05-15 21:58:54,858 [waptws         ] INFO 746c197c3a9d4f51a0cb3a6f2decbce6: Upgrade to websocket successful
2020-05-15 21:58:54,858 [waptws         ] INFO 746c197c3a9d4f51a0cb3a6f2decbce6: Received packet PING data None
2020-05-15 21:58:54,858 [waptws         ] INFO 746c197c3a9d4f51a0cb3a6f2decbce6: Sending packet PONG data None
2020-05-15 21:58:54,858 [waptws         ] INFO 746c197c3a9d4f51a0cb3a6f2decbce6: Received packet PING data None
2020-05-15 21:58:54,858 [waptws         ] INFO 746c197c3a9d4f51a0cb3a6f2decbce6: Sending packet PONG data None
2020-05-15 21:58:54,859 [waptws         ] INFO 912d5137ee1b4502a0f997fa741a9ba5: Upgrade to websocket successful
2020-05-15 21:58:55,316 [waptserver     ] DEBUG (3332) accepted ('127.0.0.1', 54684)
2020-05-15 21:58:55,319 [waptws         ] INFO 74a1bc2a3f2c4f178299032f3360b5d7: Sending packet OPEN data {'pingInterval': 25000, 'pingTimeout': 60000, 'upgrades': ['websocket'], 'sid': '74a1bc2a3f2c4f178299032f3360b5d7'}
2020-05-15 21:58:55,319 [waptws         ] INFO Unauthenticated Socket.IO connection from wapt client sid 74a1bc2a3f2c4f178299032f3360b5d7 (uuid: 5B047FC3-076E-4871-86BB-992CB958F6CC)
2020-05-15 21:58:55,321 [waptdb         ] INFO Connecting to waptdb explicitely. Count: 0
2020-05-15 21:58:55,322 [peewee         ] DEBUG ('UPDATE "hosts" SET "server_uuid" = %s, "listening_protocol" = %s, "listening_address" = %s, "listening_timestamp" = %s, "last_seen_on" = %s WHERE ("hosts"."uuid" = %s)', [u'00000000-0000-0000-18d8-730300000000', u'websockets', u'74a1bc2a3f2c4f178299032f3360b5d7', u'2020-05-15T21:58:55.321000', u'2020-05-15T21:58:55.321000', u'5B047FC3-076E-4871-86BB-992CB958F6CC'])
2020-05-15 21:58:55,338 [waptdb         ] DEBUG Disconnecting from waptdb explicitely. Count: 1
2020-05-15 21:58:55,338 [peewee.pool    ] DEBUG Returning 44181024 to pool.
2020-05-15 21:58:55,339 [waptws         ] INFO 74a1bc2a3f2c4f178299032f3360b5d7: Sending packet MESSAGE data 0
2020-05-15 21:58:55,339 [waptserver     ] INFO 127.0.0.1 - - [15/May/2020 21:58:55] "GET /socket.io/?uuid=5B047FC3-076E-4871-86BB-992CB958F6CC&EIO=3&transport=polling&t=1589572735313-0 HTTP/1.1" 200 325 0.021000
2020-05-15 21:58:56,299 [waptserver     ] DEBUG (3332) accepted ('127.0.0.1', 54687)
2020-05-15 21:58:56,388 [waptserver     ] DEBUG wapt admin passwd verification failed
2020-05-15 21:58:56,392 [waptserver     ] INFO 10.0.0.23,127.0.0.1 - - [15/May/2020 21:58:56] "POST /api/v3/login HTTP/1.0" 401 324 0.090000
2020-05-15 21:58:56,395 [waptserver     ] DEBUG (3332) accepted ('127.0.0.1', 54689)
2020-05-15 21:58:56,397 [waptws         ] INFO 74a1bc2a3f2c4f178299032f3360b5d7: Received request to upgrade to websocket
2020-05-15 21:58:56,403 [waptws         ] INFO 74a1bc2a3f2c4f178299032f3360b5d7: Upgrade to websocket successful
2020-05-15 21:59:08,849 [waptws         ] INFO 966cb7ee35144e09b6c414611d8c468b: Received packet PING data None
2020-05-15 21:59:08,849 [waptws         ] INFO 966cb7ee35144e09b6c414611d8c468b: Sending packet PONG data None
2020-05-15 21:59:08,911 [waptws         ] INFO 966cb7ee35144e09b6c414611d8c468b: Received packet MESSAGE data 2["wapt_pong"]
2020-05-15 21:59:08,911 [waptws         ] INFO received event "wapt_pong" from 966cb7ee35144e09b6c414611d8c468b [/]
2020-05-15 21:59:08,911 [waptws         ] DEBUG Socket.IO pong from wapt client sid 966cb7ee35144e09b6c414611d8c468b (uuid: 3ECE3423-7C37-E611-8160-4CCC6A341464)
2020-05-15 21:59:08,911 [waptdb         ] INFO Connecting to waptdb explicitely. Count: 0
2020-05-15 21:59:08,911 [peewee         ] DEBUG ('UPDATE "hosts" SET "reachable" = %s, "server_uuid" = %s, "listening_protocol" = %s, "listening_address" = %s, "listening_timestamp" = %s WHERE ("hosts"."uuid" = %s)', [u'OK', u'00000000-0000-0000-18d8-730300000000', u'websockets', u'966cb7ee35144e09b6c414611d8c468b', u'2020-05-15T21:59:08.912000', u'3ECE3423-7C37-E611-8160-4CCC6A341464'])
2020-05-15 21:59:08,927 [waptdb         ] DEBUG Disconnecting from waptdb explicitely. Count: 1
2020-05-15 21:59:08,944 [peewee.pool    ] DEBUG Returning 44181024 to pool.
2020-05-15 21:59:08,944 [waptws         ] INFO 966cb7ee35144e09b6c414611d8c468b: Received packet PING data None
2020-05-15 21:59:08,944 [waptws         ] INFO 966cb7ee35144e09b6c414611d8c468b: Sending packet PONG data None
Ehm, o la mia password è sbagliata o non la riconosce... Sono davvero scettico.

Mi consigli di farlo? cambiare la mia password ?
Oppure il problema è altrove?

Re: Autenticazione della console WAPT

Pubblicato: 18 maggio 2020 - 14:15
di dcardon
È possibile che la tua password contenga un carattere accentato? Si è verificato un errore di codifica con i caratteri accentati. In tal caso, dovrai reimpostare la password. Consulta viewtopic.php?t=2014.

Cordiali saluti,

Denis

Re: Autenticazione della console WAPT

Pubblicato: 18 maggio 2020 - 16:46
di Beryl
Grazie mille @dcardon, sono riuscito a riaprire la mia console WAPT.

Non c'erano caratteri accentati, ma c'erano caratteri speciali.

Sono ancora piuttosto perplesso dal problema (uso un gestore di password, quindi la password è stata generata casualmente dal gestore e, a parte il copia/incolla, era molto complessa).
Ho appena inserito qualcosa di sciocco; vedrò come va, perché tutta questa storia mi ha spaventato un po'!

Oggetto: [RISOLTO] Autenticazione console WAPT

Pubblicato: 18 maggio 2020 - 17:50
di dcardon
Ciao di nuovo,

ok, si tratta di un bug noto ma piuttosto complesso, legato a un problema di compatibilità UTF-8 nella libreria Python4Lazarus, che utilizziamo per collegare il codice Lazarus per l'interfaccia grafica e il codice Python per il backend.

Il problema probabilmente scomparirà da solo quando passeremo a Python 3, cosa che dovrebbe avvenire all'inizio dell'estate con la versione 2.0 di WAPT.

Nel frattempo, cercherò di aggiungere un filtro quando viene modificata la password per evitare questo problema.

Cordiali saluti,

Denis

Re: [RISOLTO] Autenticazione della console WAPT

Pubblicato: 18 maggio 2020 - 17:55
di Beryl
Grazie mille!