On Wed, Apr 1, 2020 at 9:26 AM Erinn Looney-Triggs <[email protected]> wrote: > We have found a solution of sorts by using Dell's plugins: > https://exchange.nagios.org/directory/Plugins/Hardware/Server-Hardware/Dell/Dell-EMC-OpenManage-Plug-2Din-for-Nagios-Core/details > which essentially do what we want. Somewhere in those scripts is (I am > sure) an API key that is being used to pull this information from their > API. So essentially we just use their tools because they made it such a > huge PITA to query the data independently.
Oh but that's beautiful, thanks for pointing that out. I gave a quick look at this Dell-provided Nagios plugin, and indeed, there's an hard-coded API key (v4) in it, that is used to get the warranty information, and which still works. It's tentatively hidden in a jar file, but really, this is brilliant. So not only did they not update their own tools to use the new "improved security" v5 API, but they're hard-coding API credentials in their official products (it's here: https://www.dell.com/support/home/us/en/19/Drivers/DriversDetails?driverid=25R9X). And they obviously kept that old v4 key active while deactivating all of their customers' and forcing them down the OAuth2 road. Congratulations, Dell, you certainly won a prize here. Cheers, -- Kilian _______________________________________________ Linux-PowerEdge mailing list [email protected] https://lists.us.dell.com/mailman/listinfo/linux-poweredge
