Page 1 sur 1

[RESOLU] Authentification Console WAPT

Posté : 15 mai 2020 - 16:20
par beryl
Bonjour,

J'ai un WAPT Console version 1.8.1.6756.
Le serveur est sous Windows 2012 R2.

Lorsque je saisis le mot de passe (qui me semble est le bon) la fenêtre qui demande les identifiants disparait durant 1 seconde, puis réapparait me demandant de saisir les identifiants.

- Lorsque le mot de passe est erroné est-ce que WAPT affiche un message d'erreur ?
- J'ai redémarré les services, pas de changement, j'ai redémarré le système pas de changement.

Auriez-vous une idée de ce que je peux faire ?
Merci

au niveau des log, je pense que le problème a eu lieu le 11 mai

Code : Tout sélectionner

2020-03-17 11:21:34,549 [waptws         ] WARNING SocketIO connection refused for uuid , sid a88d959eebca4f6fa897d32dd9ea23d6: Missing source host uuid, instance 
2020-04-20 07:55:48,575 [waptws         ] WARNING Invalid session None
Traceback (most recent call last):
  File "c:\wapt\waptserver\server.py", line 2554, in <module>
    socketio.run(app, host='127.0.0.1', log=logger,  port=port, debug=options.devel, log_output = True, use_reloader=options.devel, max_size=app.conf['max_clients'])
  File "c:\wapt\lib\site-packages\flask_socketio\__init__.py", line 571, in run
    run_server()
  File "c:\wapt\lib\site-packages\flask_socketio\__init__.py", line 566, in run_server
    log_output=log_output, **kwargs)
  File "c:\wapt\lib\site-packages\eventlet\wsgi.py", line 1000, in server
    greenio.shutdown_safe(cs[1])
  File "c:\wapt\lib\site-packages\eventlet\greenio\base.py", line 498, in shutdown_safe
    return sock.shutdown(socket.SHUT_RDWR)
  File "c:\wapt\lib\socket.py", line 228, in meth
    return getattr(self._sock,name)(*args)
socket.error: [Errno 10054] Une connexion existante a dû être fermée par l’hôte distant
2020-05-11 15:40:02,661 [waptserver     ] CRITICAL add_host failed Exception('register_host: No uuid supplied',)
2020-05-11 15:40:07,723 [waptserver     ] CRITICAL Get_websocket_auth_token failed EWaptAuthenticationFailure('No uuid supplied',)
2020-05-11 15:40:07,832 [waptws         ] WARNING SocketIO connection refused for uuid , sid 55b0d9760cb94a4eb3b8465a9135f420: Missing source host uuid, instance 
2020-05-11 15:40:19,364 [waptserver     ] CRITICAL update_host failed Exception('register_host: No uuid supplied',)
2020-05-11 15:40:20,411 [waptserver     ] CRITICAL add_host failed Exception('register_host: No uuid supplied',)

Re: Authentification Console WAPT

Posté : 15 mai 2020 - 18:31
par dcardon
En effet la fenêtre de login ne fait pas de message particulier quand les identifiants de connexions sont incorrects.

Par rapport aux log socketio est utilisé par les agent wapt pour les websocket, pas par l'authentification sur la console. Le problème doit être ailleurs.

Est ce que vous pourriez relancer votre serveur avec des log en mode debug et vérifier ce qu'il n'y a pas un autre message d'erreur.

Cordialement,

Denis

Re: Authentification Console WAPT

Posté : 15 mai 2020 - 21:37
par beryl
Merci pour votre retour.
dans ngnix-access
j'ai cela

Code : Tout sélectionner

10.0.0.23 - admin [15/May/2020:21:26:59 +0200] "POST /api/v3/login HTTP/1.0" 401 52 "-" "waptconsole/1.8.1.6756"
10.0.0.23 - admin [15/May/2020:21:27:00 +0200] "POST /api/v3/login HTTP/1.0" 401 52 "-" "waptconsole/1.8.1.6756"
-> Donc erreur 401
dans nssm_waptserver
j'ai cela

Code : Tout sélectionner

2020-05-15 21:03:51,273 [waptws         ] WARNING SocketIO connection refused for uuid , sid 6636b0fd2c0b42b5909e082de0644bc1: Missing source host uuid, instance 
2020-05-15 21:05:51,440 [waptserver     ] CRITICAL Get_websocket_auth_token failed EWaptAuthenticationFailure('No uuid supplied',)
Pour activer les log en mode debug il suffit d'ajouter la ligne

Code : Tout sélectionner

loglevel = debug
a la fin du fichier C:\wapt\conf\waptserver.ini ?

Re: Authentification Console WAPT

Posté : 15 mai 2020 - 21:57
par beryl

Code : Tout sélectionner

2020-05-15 21:58:18,490 [waptserver     ] INFO Using config file c:\wapt\conf\waptserver.ini
2020-05-15 21:58:19,315 [waptws         ] INFO Server initialized for eventlet.
2020-05-15 21:58:19,316 [waptserver     ] INFO Load database configuration
2020-05-15 21:58:19,316 [waptdb         ] INFO Initializing a DB connection pool for db host None:5432 db_name:wapt. Size:90
2020-05-15 21:58:19,318 [waptdb         ] INFO Connecting to waptdb explicitely. Count: 0
2020-05-15 21:58:19,318 [peewee.pool    ] DEBUG No connection available in pool.
2020-05-15 21:58:19,374 [peewee.pool    ] DEBUG Created new connection 44181024.
2020-05-15 21:58:19,434 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,460 [waptdb         ] INFO Current DB: {'host': None, 'password': None, 'port': 5432, 'user': 'wapt'} version: 1.8.1.0
2020-05-15 21:58:19,460 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,463 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,466 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,469 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribas" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,470 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,473 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,476 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,477 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,480 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,483 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,486 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,487 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,490 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,493 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,494 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,496 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,499 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,500 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,503 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,505 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,506 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,509 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,510 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,513 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,515 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,517 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,519 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,522 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,523 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,526 [peewee         ] DEBUG ('SELECT "t1"."key", "t1"."value" FROM "serverattribs" AS "t1" WHERE ("t1"."key" = %s) LIMIT %s OFFSET %s', [u'db_version', 1, 0])
2020-05-15 21:58:19,529 [peewee         ] DEBUG ('SELECT "t1"."id", "t1"."created_on", "t1"."created_by", "t1"."updated_on", "t1"."updated_by", "t1"."name", "t1"."auth_method", "t1"."description", "t1"."user_certificate", "t1"."user_fingerprint_sha1", "t1"."user_fingerprint_sha256" FROM "waptusers" AS "t1" WHERE ("t1"."name" = %s) LIMIT %s OFFSET %s', [u'admin', 1, 0])
2020-05-15 21:58:19,561 [peewee         ] DEBUG ('UPDATE "waptusers" SET "created_on" = %s, "created_by" = %s, "updated_on" = %s, "updated_by" = %s, "name" = %s, "auth_method" = %s, "description" = %s, "user_certificate" = %s, "user_fingerprint_sha1" = %s, "user_fingerprint_sha256" = %s WHERE ("waptusers"."id" = %s)', [datetime.datetime(2020, 3, 11, 10, 15, 54, 253000), None, datetime.datetime(2020, 5, 15, 19, 58, 19, 560000), None, u'admin', None, None, None, None, None, 1])
2020-05-15 21:58:19,575 [waptdb         ] DEBUG Disconnecting from waptdb explicitely. Count: 1
2020-05-15 21:58:19,575 [peewee.pool    ] DEBUG Returning 44181024 to pool.
2020-05-15 21:58:19,575 [waptserver     ] INFO Waptserver starting...
2020-05-15 21:58:19,575 [waptdb         ] INFO Connecting to waptdb explicitely. Count: 0
2020-05-15 21:58:19,576 [waptserver     ] INFO Reset connections SID for former hosts on this server
2020-05-15 21:58:19,579 [peewee         ] DEBUG ('UPDATE "hosts" SET "reachable" = %s, "listening_protocol" = %s, "listening_address" = %s WHERE (("hosts"."listening_protocol" = %s) AND ("hosts"."server_uuid" = %s))', [u'DISCONNECTED', None, None, u'websockets', u'00000000-0000-0000-18d8-730300000000'])
2020-05-15 21:58:19,743 [waptdb         ] DEBUG Disconnecting from waptdb explicitely. Count: 1
2020-05-15 21:58:19,743 [peewee.pool    ] DEBUG Returning 44181024 to pool.
2020-05-15 21:58:19,743 [waptserver     ] INFO Starting socketio/wsgi server on port 8080
2020-05-15 21:58:19,744 [waptserver     ] INFO (3332) wsgi starting up on http://127.0.0.1:8080
2020-05-15 21:58:26,394 [waptserver     ] DEBUG (3332) accepted ('127.0.0.1', 54665)
2020-05-15 21:58:26,476 [waptserver     ] DEBUG wapt admin passwd verification failed
2020-05-15 21:58:26,480 [waptserver     ] INFO 10.0.0.23,127.0.0.1 - - [15/May/2020 21:58:26] "POST /api/v3/login HTTP/1.0" 401 324 0.086000
2020-05-15 21:58:29,493 [waptserver     ] DEBUG (3332) accepted ('127.0.0.1', 54667)
2020-05-15 21:58:29,575 [waptserver     ] DEBUG wapt admin passwd verification failed
2020-05-15 21:58:29,578 [waptserver     ] INFO 10.0.0.23,127.0.0.1 - - [15/May/2020 21:58:29] "POST /api/v3/login HTTP/1.0" 401 324 0.085000
2020-05-15 21:58:32,461 [waptserver     ] DEBUG (3332) accepted ('127.0.0.1', 54670)
2020-05-15 21:58:32,542 [waptserver     ] DEBUG wapt admin passwd verification failed
2020-05-15 21:58:32,546 [waptserver     ] INFO 10.0.0.23,127.0.0.1 - - [15/May/2020 21:58:32] "POST /api/v3/login HTTP/1.0" 401 324 0.084000
2020-05-15 21:58:54,526 [waptserver     ] DEBUG (3332) accepted ('127.0.0.1', 54673)
2020-05-15 21:58:54,536 [waptserver     ] DEBUG (3332) accepted ('127.0.0.1', 54674)
2020-05-15 21:58:54,538 [waptws         ] INFO a2dd6ecfdb3f4b98b3eaf83a11b0a218: Sending packet OPEN data {'pingInterval': 25000, 'pingTimeout': 60000, 'upgrades': ['websocket'], 'sid': 'a2dd6ecfdb3f4b98b3eaf83a11b0a218'}
2020-05-15 21:58:54,539 [waptws         ] INFO Unauthenticated Socket.IO connection from wapt client sid a2dd6ecfdb3f4b98b3eaf83a11b0a218 (uuid: 07FD1C18-35A8-4E04-8DE7-1D45AD58D929)
2020-05-15 21:58:54,539 [waptdb         ] INFO Connecting to waptdb explicitely. Count: 0
2020-05-15 21:58:54,540 [peewee         ] DEBUG ('UPDATE "hosts" SET "server_uuid" = %s, "listening_protocol" = %s, "listening_address" = %s, "listening_timestamp" = %s, "last_seen_on" = %s WHERE ("hosts"."uuid" = %s)', [u'00000000-0000-0000-18d8-730300000000', u'websockets', u'a2dd6ecfdb3f4b98b3eaf83a11b0a218', u'2020-05-15T21:58:54.540000', u'2020-05-15T21:58:54.540000', u'07FD1C18-35A8-4E04-8DE7-1D45AD58D929'])
2020-05-15 21:58:54,542 [waptws         ] INFO 44e558a037934e14addd70e413a9e385: Sending packet OPEN data {'pingInterval': 25000, 'pingTimeout': 60000, 'upgrades': ['websocket'], 'sid': '44e558a037934e14addd70e413a9e385'}
2020-05-15 21:58:54,542 [waptws         ] INFO Unauthenticated Socket.IO connection from wapt client sid 44e558a037934e14addd70e413a9e385 (uuid: 1538058D-B393-D013-D0C3-5FD23A93AFBB)
2020-05-15 21:58:54,543 [waptdb         ] INFO Connecting to waptdb explicitely. Count: 1
2020-05-15 21:58:54,543 [peewee.pool    ] DEBUG No connection available in pool.
2020-05-15 21:58:54,569 [waptdb         ] DEBUG Disconnecting from waptdb explicitely. Count: 1
2020-05-15 21:58:54,575 [peewee.pool    ] DEBUG Created new connection 44182240.
2020-05-15 21:58:54,576 [peewee         ] DEBUG ('UPDATE "hosts" SET "server_uuid" = %s, "listening_protocol" = %s, "listening_address" = %s, "listening_timestamp" = %s, "last_seen_on" = %s WHERE ("hosts"."uuid" = %s)', [u'00000000-0000-0000-18d8-730300000000', u'websockets', u'44e558a037934e14addd70e413a9e385', u'2020-05-15T21:58:54.576000', u'2020-05-15T21:58:54.576000', u'1538058D-B393-D013-D0C3-5FD23A93AFBB'])
2020-05-15 21:58:54,578 [peewee.pool    ] DEBUG Returning 44181024 to pool.
2020-05-15 21:58:54,578 [waptws         ] INFO a2dd6ecfdb3f4b98b3eaf83a11b0a218: Sending packet MESSAGE data 0
2020-05-15 21:58:54,578 [waptserver     ] INFO 127.0.0.1 - - [15/May/2020 21:58:54] "GET /socket.io/?token=eyJhbGciOiJIUzUxMiIsImV4cCI6MTU4OTYxNTQ1MiwiaWF0IjoxNTg5NTcyMjUyfQ.eyJ1dWlkIjoiMDdGRDFDMTgtMzVBOC00RTA0LThERTctMUQ0NUFENThEOTI5Iiwic2VydmVyX3V1aWQiOiIwMDAwMDAwMC0wMDAwLTAwMDAtMThkOC03MzAzMDAwMDAwMDAifQ.d3YTkczLP_0TkubO4qRkK3DaHpufzs837sHg7IEd-asqH8h_7S7nhoXUI4JYku3CvfTuvlmxL9ca-JmTS3M-Ww&uuid=07FD1C18-35A8-4E04-8DE7-1D45AD58D929&EIO=3&transport=polling&t=1589572734429-0 HTTP/1.1" 200 325 0.043000
2020-05-15 21:58:54,582 [waptserver     ] DEBUG (3332) accepted ('127.0.0.1', 54676)
2020-05-15 21:58:54,592 [waptws         ] INFO 912d5137ee1b4502a0f997fa741a9ba5: Sending packet OPEN data {'pingInterval': 25000, 'pingTimeout': 60000, 'upgrades': ['websocket'], 'sid': '912d5137ee1b4502a0f997fa741a9ba5'}
2020-05-15 21:58:54,594 [waptws         ] INFO Unauthenticated Socket.IO connection from wapt client sid 912d5137ee1b4502a0f997fa741a9ba5 (uuid: 4C4C4544-0042-4710-8033-CAC04F303332)
2020-05-15 21:58:54,594 [waptdb         ] INFO Connecting to waptdb explicitely. Count: 1
2020-05-15 21:58:54,595 [peewee         ] DEBUG ('UPDATE "hosts" SET "server_uuid" = %s, "listening_protocol" = %s, "listening_address" = %s, "listening_timestamp" = %s, "last_seen_on" = %s WHERE ("hosts"."uuid" = %s)', [u'00000000-0000-0000-18d8-730300000000', u'websockets', u'912d5137ee1b4502a0f997fa741a9ba5', u'2020-05-15T21:58:54.595000', u'2020-05-15T21:58:54.595000', u'4C4C4544-0042-4710-8033-CAC04F303332'])
2020-05-15 21:58:54,604 [waptdb         ] DEBUG Disconnecting from waptdb explicitely. Count: 2
2020-05-15 21:58:54,605 [peewee.pool    ] DEBUG Returning 44182240 to pool.
2020-05-15 21:58:54,605 [waptws         ] INFO 44e558a037934e14addd70e413a9e385: Sending packet MESSAGE data 0
2020-05-15 21:58:54,605 [waptserver     ] INFO 127.0.0.1 - - [15/May/2020 21:58:54] "GET /socket.io/?token=eyJhbGciOiJIUzUxMiIsImV4cCI6MTU4OTYxNTQ1MiwiaWF0IjoxNTg5NTcyMjUyfQ.eyJ1dWlkIjoiMTUzODA1OEQtQjM5My1EMDEzLUQwQzMtNUZEMjNBOTNBRkJCIiwic2VydmVyX3V1aWQiOiIwMDAwMDAwMC0wMDAwLTAwMDAtMThkOC03MzAzMDAwMDAwMDAifQ.l9cJxDuweJl0iw3hRmou7DFszQnpTYWZ-AuIWNNkIgngbw_K5cF8aCiCGxtAp99zXYBbW1aoXRQWF7m3VtYLTg&uuid=1538058D-B393-D013-D0C3-5FD23A93AFBB&EIO=3&transport=polling&t=1589572734422-0 HTTP/1.1" 200 325 0.064000
2020-05-15 21:58:54,619 [waptdb         ] DEBUG Disconnecting from waptdb explicitely. Count: 1
2020-05-15 21:58:54,619 [peewee.pool    ] DEBUG Returning 44181024 to pool.
2020-05-15 21:58:54,621 [waptws         ] INFO 912d5137ee1b4502a0f997fa741a9ba5: Sending packet MESSAGE data 0
2020-05-15 21:58:54,621 [waptserver     ] INFO 127.0.0.1 - - [15/May/2020 21:58:54] "GET /socket.io/?token=eyJhbGciOiJIUzUxMiIsImV4cCI6MTU4OTYxNTQ1MiwiaWF0IjoxNTg5NTcyMjUyfQ.eyJ1dWlkIjoiNEM0QzQ1NDQtMDA0Mi00NzEwLTgwMzMtQ0FDMDRGMzAzMzMyIiwic2VydmVyX3V1aWQiOiIwMDAwMDAwMC0wMDAwLTAwMDAtMThkOC03MzAzMDAwMDAwMDAifQ.8DESXqSU1eO3E-A83jol1xCJbYtxhvu16pQ3W1kUTQMRkP1zuqPcGx7D-Ng9QJkkfEb-6YyCD-TD0EDAFQq4zA&uuid=4C4C4544-0042-4710-8033-CAC04F303332&EIO=3&transport=polling&t=1589572734381-0 HTTP/1.1" 200 325 0.029000
2020-05-15 21:58:54,641 [waptserver     ] DEBUG (3332) accepted ('127.0.0.1', 54677)
2020-05-15 21:58:54,641 [waptserver     ] DEBUG (3332) accepted ('127.0.0.1', 54678)
2020-05-15 21:58:54,642 [waptws         ] INFO 966cb7ee35144e09b6c414611d8c468b: Sending packet OPEN data {'pingInterval': 25000, 'pingTimeout': 60000, 'upgrades': ['websocket'], 'sid': '966cb7ee35144e09b6c414611d8c468b'}
2020-05-15 21:58:54,644 [waptws         ] INFO Unauthenticated Socket.IO connection from wapt client sid 966cb7ee35144e09b6c414611d8c468b (uuid: 3ECE3423-7C37-E611-8160-4CCC6A341464)
2020-05-15 21:58:54,644 [waptdb         ] INFO Connecting to waptdb explicitely. Count: 0
2020-05-15 21:58:54,645 [peewee         ] DEBUG ('UPDATE "hosts" SET "server_uuid" = %s, "listening_protocol" = %s, "listening_address" = %s, "listening_timestamp" = %s, "last_seen_on" = %s WHERE ("hosts"."uuid" = %s)', [u'00000000-0000-0000-18d8-730300000000', u'websockets', u'966cb7ee35144e09b6c414611d8c468b', u'2020-05-15T21:58:54.645000', u'2020-05-15T21:58:54.645000', u'3ECE3423-7C37-E611-8160-4CCC6A341464'])
2020-05-15 21:58:54,647 [waptws         ] INFO 746c197c3a9d4f51a0cb3a6f2decbce6: Sending packet OPEN data {'pingInterval': 25000, 'pingTimeout': 60000, 'upgrades': ['websocket'], 'sid': '746c197c3a9d4f51a0cb3a6f2decbce6'}
2020-05-15 21:58:54,648 [waptws         ] INFO Unauthenticated Socket.IO connection from wapt client sid 746c197c3a9d4f51a0cb3a6f2decbce6 (uuid: 4C4C4544-004C-4A10-8030-C6C04F594B32)
2020-05-15 21:58:54,648 [waptdb         ] INFO Connecting to waptdb explicitely. Count: 1
2020-05-15 21:58:54,650 [peewee         ] DEBUG ('UPDATE "hosts" SET "server_uuid" = %s, "listening_protocol" = %s, "listening_address" = %s, "listening_timestamp" = %s, "last_seen_on" = %s WHERE ("hosts"."uuid" = %s)', [u'00000000-0000-0000-18d8-730300000000', u'websockets', u'746c197c3a9d4f51a0cb3a6f2decbce6', u'2020-05-15T21:58:54.649000', u'2020-05-15T21:58:54.649000', u'4C4C4544-004C-4A10-8030-C6C04F594B32'])
2020-05-15 21:58:54,651 [waptserver     ] DEBUG (3332) accepted ('127.0.0.1', 54679)
2020-05-15 21:58:54,661 [waptws         ] INFO a2dd6ecfdb3f4b98b3eaf83a11b0a218: Received request to upgrade to websocket
2020-05-15 21:58:54,677 [waptdb         ] DEBUG Disconnecting from waptdb explicitely. Count: 2
2020-05-15 21:58:54,677 [peewee.pool    ] DEBUG Returning 44181024 to pool.
2020-05-15 21:58:54,677 [waptws         ] INFO 966cb7ee35144e09b6c414611d8c468b: Sending packet MESSAGE data 0
2020-05-15 21:58:54,677 [waptserver     ] INFO 127.0.0.1 - - [15/May/2020 21:58:54] "GET /socket.io/?token=eyJhbGciOiJIUzUxMiIsImV4cCI6MTU4OTYxNTQ1MiwiaWF0IjoxNTg5NTcyMjUyfQ.eyJ1dWlkIjoiM0VDRTM0MjMtN0MzNy1FNjExLTgxNjAtNENDQzZBMzQxNDY0Iiwic2VydmVyX3V1aWQiOiIwMDAwMDAwMC0wMDAwLTAwMDAtMThkOC03MzAzMDAwMDAwMDAifQ.3tDitg6yRP-jFDsaaP71rykBu8J0pnykz24kMLT8M5Bsh4HVajV30s-86HF6MejvAtVNz9RPCM384xMkZ59l8A&uuid=3ECE3423-7C37-E611-8160-4CCC6A341464&EIO=3&transport=polling&t=1589572734593-0 HTTP/1.1" 200 325 0.036000
2020-05-15 21:58:54,686 [waptdb         ] DEBUG Disconnecting from waptdb explicitely. Count: 1
2020-05-15 21:58:54,686 [peewee.pool    ] DEBUG Returning 44182240 to pool.
2020-05-15 21:58:54,686 [waptws         ] INFO 746c197c3a9d4f51a0cb3a6f2decbce6: Sending packet MESSAGE data 0
2020-05-15 21:58:54,687 [waptserver     ] INFO 127.0.0.1 - - [15/May/2020 21:58:54] "GET /socket.io/?token=eyJhbGciOiJIUzUxMiIsImV4cCI6MTU4OTYxNTM5MSwiaWF0IjoxNTg5NTcyMTkxfQ.eyJ1dWlkIjoiNEM0QzQ1NDQtMDA0Qy00QTEwLTgwMzAtQzZDMDRGNTk0QjMyIiwic2VydmVyX3V1aWQiOiIwMDAwMDAwMC0wMDAwLTAwMDAtMThkOC03MzAzMDAwMDAwMDAifQ.Y8CkuXcDuIskqOMMbyIkEM_rvPpHfjMFpCiXBamU1tgwPSFKu4eL3G0hukfzG-26bsytqlyCY5zFGVOtEg0KIA&uuid=4C4C4544-004C-4A10-8030-C6C04F594B32&EIO=3&transport=polling&t=1589572734586-0 HTTP/1.1" 200 325 0.040000
2020-05-15 21:58:54,785 [waptserver     ] DEBUG (3332) accepted ('127.0.0.1', 54680)
2020-05-15 21:58:54,832 [waptserver     ] DEBUG (3332) accepted ('127.0.0.1', 54681)
2020-05-15 21:58:54,834 [waptws         ] INFO 44e558a037934e14addd70e413a9e385: Received request to upgrade to websocket
2020-05-15 21:58:54,835 [waptws         ] INFO 912d5137ee1b4502a0f997fa741a9ba5: Received request to upgrade to websocket
2020-05-15 21:58:54,835 [waptws         ] INFO a2dd6ecfdb3f4b98b3eaf83a11b0a218: Upgrade to websocket successful
2020-05-15 21:58:54,835 [waptserver     ] DEBUG (3332) accepted ('127.0.0.1', 54682)
2020-05-15 21:58:54,836 [waptws         ] INFO 966cb7ee35144e09b6c414611d8c468b: Received request to upgrade to websocket
2020-05-15 21:58:54,839 [waptserver     ] DEBUG (3332) accepted ('127.0.0.1', 54683)
2020-05-15 21:58:54,851 [waptws         ] INFO 746c197c3a9d4f51a0cb3a6f2decbce6: Received request to upgrade to websocket
2020-05-15 21:58:54,855 [waptws         ] INFO 44e558a037934e14addd70e413a9e385: Upgrade to websocket successful
2020-05-15 21:58:54,857 [waptws         ] INFO 966cb7ee35144e09b6c414611d8c468b: Upgrade to websocket successful
2020-05-15 21:58:54,858 [waptws         ] INFO 746c197c3a9d4f51a0cb3a6f2decbce6: Upgrade to websocket successful
2020-05-15 21:58:54,858 [waptws         ] INFO 746c197c3a9d4f51a0cb3a6f2decbce6: Received packet PING data None
2020-05-15 21:58:54,858 [waptws         ] INFO 746c197c3a9d4f51a0cb3a6f2decbce6: Sending packet PONG data None
2020-05-15 21:58:54,858 [waptws         ] INFO 746c197c3a9d4f51a0cb3a6f2decbce6: Received packet PING data None
2020-05-15 21:58:54,858 [waptws         ] INFO 746c197c3a9d4f51a0cb3a6f2decbce6: Sending packet PONG data None
2020-05-15 21:58:54,859 [waptws         ] INFO 912d5137ee1b4502a0f997fa741a9ba5: Upgrade to websocket successful
2020-05-15 21:58:55,316 [waptserver     ] DEBUG (3332) accepted ('127.0.0.1', 54684)
2020-05-15 21:58:55,319 [waptws         ] INFO 74a1bc2a3f2c4f178299032f3360b5d7: Sending packet OPEN data {'pingInterval': 25000, 'pingTimeout': 60000, 'upgrades': ['websocket'], 'sid': '74a1bc2a3f2c4f178299032f3360b5d7'}
2020-05-15 21:58:55,319 [waptws         ] INFO Unauthenticated Socket.IO connection from wapt client sid 74a1bc2a3f2c4f178299032f3360b5d7 (uuid: 5B047FC3-076E-4871-86BB-992CB958F6CC)
2020-05-15 21:58:55,321 [waptdb         ] INFO Connecting to waptdb explicitely. Count: 0
2020-05-15 21:58:55,322 [peewee         ] DEBUG ('UPDATE "hosts" SET "server_uuid" = %s, "listening_protocol" = %s, "listening_address" = %s, "listening_timestamp" = %s, "last_seen_on" = %s WHERE ("hosts"."uuid" = %s)', [u'00000000-0000-0000-18d8-730300000000', u'websockets', u'74a1bc2a3f2c4f178299032f3360b5d7', u'2020-05-15T21:58:55.321000', u'2020-05-15T21:58:55.321000', u'5B047FC3-076E-4871-86BB-992CB958F6CC'])
2020-05-15 21:58:55,338 [waptdb         ] DEBUG Disconnecting from waptdb explicitely. Count: 1
2020-05-15 21:58:55,338 [peewee.pool    ] DEBUG Returning 44181024 to pool.
2020-05-15 21:58:55,339 [waptws         ] INFO 74a1bc2a3f2c4f178299032f3360b5d7: Sending packet MESSAGE data 0
2020-05-15 21:58:55,339 [waptserver     ] INFO 127.0.0.1 - - [15/May/2020 21:58:55] "GET /socket.io/?uuid=5B047FC3-076E-4871-86BB-992CB958F6CC&EIO=3&transport=polling&t=1589572735313-0 HTTP/1.1" 200 325 0.021000
2020-05-15 21:58:56,299 [waptserver     ] DEBUG (3332) accepted ('127.0.0.1', 54687)
2020-05-15 21:58:56,388 [waptserver     ] DEBUG wapt admin passwd verification failed
2020-05-15 21:58:56,392 [waptserver     ] INFO 10.0.0.23,127.0.0.1 - - [15/May/2020 21:58:56] "POST /api/v3/login HTTP/1.0" 401 324 0.090000
2020-05-15 21:58:56,395 [waptserver     ] DEBUG (3332) accepted ('127.0.0.1', 54689)
2020-05-15 21:58:56,397 [waptws         ] INFO 74a1bc2a3f2c4f178299032f3360b5d7: Received request to upgrade to websocket
2020-05-15 21:58:56,403 [waptws         ] INFO 74a1bc2a3f2c4f178299032f3360b5d7: Upgrade to websocket successful
2020-05-15 21:59:08,849 [waptws         ] INFO 966cb7ee35144e09b6c414611d8c468b: Received packet PING data None
2020-05-15 21:59:08,849 [waptws         ] INFO 966cb7ee35144e09b6c414611d8c468b: Sending packet PONG data None
2020-05-15 21:59:08,911 [waptws         ] INFO 966cb7ee35144e09b6c414611d8c468b: Received packet MESSAGE data 2["wapt_pong"]
2020-05-15 21:59:08,911 [waptws         ] INFO received event "wapt_pong" from 966cb7ee35144e09b6c414611d8c468b [/]
2020-05-15 21:59:08,911 [waptws         ] DEBUG Socket.IO pong from wapt client sid 966cb7ee35144e09b6c414611d8c468b (uuid: 3ECE3423-7C37-E611-8160-4CCC6A341464)
2020-05-15 21:59:08,911 [waptdb         ] INFO Connecting to waptdb explicitely. Count: 0
2020-05-15 21:59:08,911 [peewee         ] DEBUG ('UPDATE "hosts" SET "reachable" = %s, "server_uuid" = %s, "listening_protocol" = %s, "listening_address" = %s, "listening_timestamp" = %s WHERE ("hosts"."uuid" = %s)', [u'OK', u'00000000-0000-0000-18d8-730300000000', u'websockets', u'966cb7ee35144e09b6c414611d8c468b', u'2020-05-15T21:59:08.912000', u'3ECE3423-7C37-E611-8160-4CCC6A341464'])
2020-05-15 21:59:08,927 [waptdb         ] DEBUG Disconnecting from waptdb explicitely. Count: 1
2020-05-15 21:59:08,944 [peewee.pool    ] DEBUG Returning 44181024 to pool.
2020-05-15 21:59:08,944 [waptws         ] INFO 966cb7ee35144e09b6c414611d8c468b: Received packet PING data None
2020-05-15 21:59:08,944 [waptws         ] INFO 966cb7ee35144e09b6c414611d8c468b: Sending packet PONG data None
Umh déja mon mot de passe est faux ou il ne le reconnait pas... je suis vraiment septique

Me recommandez vous de modifier mon mot de passe ?
Ou le problème est ailleurs ?

Re: Authentification Console WAPT

Posté : 18 mai 2020 - 14:15
par dcardon
Est ce que vous n'auriez pas un accent dans votre mdp? Il y a un bug d'encoding avec les caractères accentués. Si c'est le cas il faudrait ré-initialiser le mdp, cf. viewtopic.php?t=2014

Cordialement,

Denis

Re: Authentification Console WAPT

Posté : 18 mai 2020 - 16:46
par beryl
Merci beaucoup @dcardon, j'ai réussi à rouvrir ma console WAPT.

Il n'y avait pas de caractère accentué, mais il y avait des caractères spéciaux.

Je reste assez perplexe par le problème (j’utilise un gestionnaire de mot de passe, donc le mot de passe était généré aléatoirement par le gestionnaire et hormis des copier/coller, le Mot de passe était très compliqué.
Je viens de mettre un truc de neuneu, je verrais par la suite, car cette affaire m’a un peu fait peur !

Re: [RÉSOLU] Authentification Console WAPT

Posté : 18 mai 2020 - 17:50
par dcardon
rebonjour,

ok, c'est un bug connu assez tordu qui est lié un pb de compatiblité utf8 dans la librarie Python4Lazarus qu'on utilise pour connecter le code Lazarus de l'interface graphique et le code python du backend.

Le problème va probablement disparaitre de lui même lors de la bascule en python3 qui devrait arriver avec d'ici le début de l'été avec la version WAPT 2.0.

Entre temps je vais voir pour rajouter un filtre lors du changement du mdp pour éviter ce soucis.

Cordialement,

Denis

Re: [RESOLU] Authentification Console WAPT

Posté : 18 mai 2020 - 17:55
par beryl
Un grand merci à vous !