[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: FW: REST integration



Hi Rainer,

Thanks but the url is actually a HTTPS.

Regards,
Tony



-----Original Message-----
From: ftpapi-bounces@xxxxxxxxxxxxxxxxxxxxxx
[mailto:ftpapi-bounces@xxxxxxxxxxxxxxxxxxxxxx] On Behalf Of Rainer Ross
Sent: Saturday, July 2, 2016 9:06 PM
To: HTTPAPI and FTPAPI Projects <ftpapi@xxxxxxxxxxxxxxxxxxxxxx>
Subject: Re: FW: REST integration


Hi Tony,

take Chrome Postman to test the post request - look at sreenshot

Best regards

Rainer

-- 
Rainer Ross
IT-Beratung
www.myhofi.com
Hotels finden - leicht gemacht
Sitz:   Schmalholzstr. 27, 86916 Kaufering
Tel:    0171/9637923
Ust-ID: DE154580259



Am 02.07.2016 um 06:00 schrieb Tony Cesarios:
>     Hi,
>
>
>     Does anyone know using rc=http_url_post command if I wanted to have
the
>     data where about' s within the command should it be inserted, I think
>     my problem with getting a "unsupported-grant-type" error is that the
>     data I'm trying to send isn't in the right section or format.
>
>
>     I've inserted a copy of my program and are open to suggestions on
>     getting the interface working.
>
>
>     Regards,
>
>     Tony Cesarios
>
>
>
>     Here's the dump from HTTPAPI if it helps.
>
>
>     HTTPAPI Ver 1.23 released
>     2008-04-24
>
>     OS/400 Ver
>     V7R1M0
>
>
>
>     New iconv() objects set, PostRem=1208. PostLoc=1208. ProtRem=819.
>     ProtLoc=0
>
>     File CCSID changed
>     to1208
>
>     http_url_post():
>     entered
>
>     http_persist_open():
>     entered
>
>     http_long_ParseURL():
>     entered
>
>     DNS resolver retrans:
>     2
>
>     DNS resolver retry  :
>     2
>
>     DNS resolver options:
>     x'00000136'
>
>     DNS default domain:
>     [1]PETERSTEVENS.COM.AU
>
>     DNS server found:
>     172.16.1.20
>
>     https_init():
>     entered
>
>
-----------------------------------------------------------------------
>     --------------
>
>     Dump of local-side certificate
>     information:
>
>
-----------------------------------------------------------------------
>     --------------
>
>     Dump of server-side certificate
>     information:
>
>
-----------------------------------------------------------------------
>     --------------
>
>     Cert Validation Code =
>     6000
>
>     -----BEGIN
>     CERTIFICATE-----
>
>     MIICyjCCAbKgAwIBAgIQGpVT56MDf7JJlY/xMep6IDANBgkqhkiG9w0BAQUFADAO
>
>     MQwwCgYDVQQDEwNBRlMwHhcNMTYwNjIyMDkyNTI0WhcNMTcwNjIyMDAwMDAwWjAO
>
>     MQwwCgYDVQQDEwNBRlMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCm
>
>     GgG+Sw+no7BIBaEsAvoAQvnHISviKtHI/yjmxCsqG7v/QF+ENTlYil4FWTCIBGZr
>
>     dShWxyUeEhTwmTXY7drkOQKn/iLZcpqyIdsCDaqBZGpoWmZxeTFIsQmQGRRoXDM1
>
>     qFB4vaO7WIgSrDd5RaWj8bn6/MgxDtjRTFnEsC3apBglivWVA//knvm3V264MdiP
>
>     59uXPyQ/bgT+z76Eq5kSP2oMzRXbkqqxG1evcqwluyB3uY+zyo9u5/BABPzmbKAU
>
>     to4d0OYwJgr5b3VX5PiXG/aFmmlGzdeZF4tPkJenBeqkM5+B4CLcLMX++9bJzOS3
>
>     m4XLq+0VHoC5hlmQPNUhAgMBAAGjJDAiMAsGA1UdDwQEAwIEMDATBgNVHSUEDDAK
>
>     BggrBgEFBQcDATANBgkqhkiG9w0BAQUFAAOCAQEAT/GQTkCj60CZRTiWiaSx5dUV
>
>     LclrKcnT9+5BjctbhYP4YtaHfjN3GbZwqslcqlepTau7aV9Prj9PlIJtYug+W531
>
>     WQJSGe6LGk5uKsU1mFBPVWzDr57gfAWcnT3UO2O9deFDBLOOn/8XJHTcDpdAMmC/
>
>     DjPX32AyZxeUOmGR4Bi5oHB1i7NESnwTxRFRiQ/OgGV9Kdr+8TB5gL/9iwmPxBFE
>
>     Ei74epRaRHLfxhKsBZ2VSw9CQaPy1beCenWjuIsZmPPDnJk+IPYOZiD9hvG/ud8m
>
>     buIAybGcsfT+aSJFOYG7vetPjmC2rsoJ8hpXuq54jooDtuRrSFMC8K30Ht419Q==
>
>     -----END
>     CERTIFICATE-----
>
>     Serial Number:
>     1A:95:53:E7:A3:03:7F:B2:49:95:8F:F1:31:EA:7A:20
>
>     Common Name:
>     AFS
>
>     Issuer CN:
>     AFS
>
>     Version:
>     3
>
>     not before:
>     20160622192524
>
>     Unknown Field: 19:25:24
>     22-06-2016
>
>     not after:
>     20170622100000
>
>     Unknown Field: 10:00:00
>     22-06-2017
>
>     pub key alg: 1.2.840.113549.1.1.5
>
>
>
>     Protocol Used: TLS Version
>     1
>
>     http_persist_post(): entered
>
>     http_long_ParseURL():
>     entered
>
>     do_post():
>     entered
>
>     POST /adfAPI/token?grant_type=password&username=PSI&password=Rohit66
>     HTTP/1.1
>
>     Host:
>     202.47.1.145
>
>     User-Agent:
>     http-api/1.23
>
>     Content-Type:
>     application/json;charset=UTF-8
>
>     Expect:
>     100-continue
>
>     Content-Length:
>     0
>
>
>
>
>
>     recvresp():
>     entered
>
>     SetError() #43: CommSSL_Read:
>     time-out!
>
>     senddoc():
>     entered
>
>     recvresp():
>     entered
>
>     HTTP/1.1 400 Bad Request
>
>     Cache-Control:
>     no-cache
>
>     Pragma:
>     no-cache
>
>     Content-Length: 34
>
>     Content-Type:
>     application/json;charset=UTF-8
>
>     Expires:
>     -1
>
>     Server: Microsoft-IIS/8.0
>
>     X-Powered-By:
>     [2]ASP.NET
>
>     Date: Fri, 01 Jul 2016 23:03:13 GMT
>
>
>
>     SetError() #13: HTTP/1.1 400 Bad Request
>
>     recvdoc parms: identity 34
>
>     header_load_cookies() entered
>
>     recvdoc(): entered
>
>     SetError() #0:
>
>     {"error":"unsupported_grant_type"}
>
>     SetError() #13: HTTP/1.1 400 Bad Request
>
>     http_close(): entered
>
> References
>
>     1. http://PETERSTEVENS.COM.AU/
>     2. http://ASP.NET/
>
>
>
> -----------------------------------------------------------------------
> This is the FTPAPI mailing list.  To unsubscribe, please go to:
> http://www.scottklement.com/mailman/listinfo/ftpapi
> -----------------------------------------------------------------------




-----------------------------------------------------------------------
This is the FTPAPI mailing list.  To unsubscribe, please go to:
http://www.scottklement.com/mailman/listinfo/ftpapi
-----------------------------------------------------------------------