Hi, vendor_passthru is a POST request and that might be missing here. curl -i -X POST -H 'Content-Type: application/json' -H 'Accept: application/json' -H "X-Auth-Token:${token}" http://10.105.214.179:6385/v1/nodes/2d70d135-85b5-4f75-b741-0ead90a42b29/vendor_passthru/get_firmware_info Can you just check if the above works for you ? If not, I guess trying you can try a GET on the node to check if the GET listing atleast works. curl -i -X GET -H 'Content-Type: application/json' -H 'Accept: application/json' -H "X-Auth-Token:${token}" http://10.105.214.179:6385/v1/nodes/2d70d135-85b5-4f75-b741-0ead90a42b29 <http://10.105.214.179:6385/v1/nodes/2d70d135-85b5-4f75-b741-0ead90a42b29/vendor_passthru/get_firmware_info> On Fri, Jun 6, 2014 at 2:14 PM, Gopi Krishna Saripuri < saripurigopi at outlook.com> wrote: > Hi, > > I'm using icehouse devstack version. I'm testing the vendor_passthru > methods behavior using curl , But it is failing with 404 not found error. > Here is the query/response. > > curl -H "X-Auth-Token:${token}" > http://10.105.214.179:6385/v1/nodes/2d70d135-85b5-4f75-b741-0ead90a42b29/vendor_passthru/get_firmware_info > > fails with > > {"error_message": "<html>\n <head>\n <title>404 Not Found</title>\n > </head>\n <body>\n <h1>404 Not Found</h1>\n The resource could not be > found.<br /><br />\n\n\n\n </body>\n</html>"} > > > Is there a way to test vendor_passthru from ironic cli, also I didn't see > any support for this in python-ironicclient? > > I'm able to retrieve chassis/nodes/ports. But while testing > vendor_passthru method, it is failing with 404 error. > > Can someone help me with testing the vendor_passthru methods. > > Regards > Gopi Krishna S > > _______________________________________________ > OpenStack-dev mailing list > OpenStack-dev at lists.openstack.org > http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev > > -- Ramesh -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.openstack.org/pipermail/openstack-dev/attachments/20140606/473b77b2/attachment.html>