The following HTTP headers are sent with nearly every HTTP request
from the OUYA console to the servers.
+``Accept-Encoding``
+ ``gzip``
+
+ The OUYA understands gzip compression
``Accept-Language``
``en-US,en``
-``X-OUYA-VersionCode``
- ``16``
-``X-OUYA-Console-Id``
- ``015d4b33bc64141b``
-
- Serial number you see when running ``$ adb devices``
+``User-Agent``
+ ``OUYA 0 1.00 1.2.1427_r1``
``X-OUYA-AuthToken``
``96bfeaae-212d-447b-b4bf-caa5e86c0502``
Authentication token one got from logging in.
Only sent when logged in.
+``X-OUYA-Console-Id``
+ ``015d4b33bc64141b``
+
+ Serial number you see when running ``$ adb devices``
``X-OUYA-Console-Wifi-MAC-Address``
``B8:5A:F7:82:3C:C8``
+``X-OUYA-Device``
+ ``ouya_1_1``
+
+ Probably hardware revision
``X-OUYA-Firmware-Version``
``1.2.1427_r1``
+``X-OUYA-VersionCode``
+ ``16``
``X-Token``
``96bfeaae-212d-447b-b4bf-caa5e86c0502``
Same as ``X-OUYA-AuthToken``.
FIXME: Why two token headers?
-``X-OUYA-Device``
- ``ouya_1_1``
- Probably hardware revision
+ FIXME: Why ``auth_token`` GET parameter when there are headers?
+
+
+Headers to ignore
+=================
``Cookie``
``__cfduid=da019d762142461c19f162c0ee443f9c71434577887``
- ??? FIXME
+ Comes from the cloudflare error page. Can be ignored.
``Cookie2``
``$Version=1``
??? FIXME
-``Accept-Encoding``
- ``gzip``
- The OUYA understands gzip compression
-``User-Agent``
- ``OUYA 0 1.00 1.2.1427_r1``
+ Not on the cloudflare error page.