Re: 1.0.0 Release?

2018-12-31 Thread Hadil Sabbagh
Unsubscibe.

> On Dec 31, 2018, at 5:36 PM, Mike Jumper  wrote:
> 
> On Mon, Dec 31, 2018 at 8:59 AM Nick Couchman 
> wrote:
> 
>>> 
>>> 
>>> Pretty good, I'd say. I'll type up draft release notes, etc.
>>> 
>>> - Mike
>>> 
>> 
>> Mike,
>> Any progress on the release notes?  I started working on some myself, if
>> you haven't started on them I can finish up a cut and send those over?
>> 
>> 
> I'm about half done (ish). Some is written while the rest is
> outlined/stubbed. Here's what I have so far:
> 
> https://github.com/mike-jumper/guacamole-website/tree/draft-1.0.0-RC1
> 
> If you'd like to assist, please do. I can pull commits off your fork, etc.
> so that the ultimate pull request has both of our changes.
> 
> - Mike



Re: 1.0.0 Release?

2018-12-31 Thread Mike Jumper
On Mon, Dec 31, 2018 at 8:59 AM Nick Couchman 
wrote:

> >
> >
> > Pretty good, I'd say. I'll type up draft release notes, etc.
> >
> > - Mike
> >
>
> Mike,
> Any progress on the release notes?  I started working on some myself, if
> you haven't started on them I can finish up a cut and send those over?
>
>
I'm about half done (ish). Some is written while the rest is
outlined/stubbed. Here's what I have so far:

https://github.com/mike-jumper/guacamole-website/tree/draft-1.0.0-RC1

If you'd like to assist, please do. I can pull commits off your fork, etc.
so that the ultimate pull request has both of our changes.

- Mike


[GitHub] guacamole-client pull request #351: GUACAMOLE-683: Add OpenID support in Doc...

2018-12-31 Thread krisss85
Github user krisss85 commented on a diff in the pull request:

https://github.com/apache/guacamole-client/pull/351#discussion_r244620966
  
--- Diff: guacamole-docker/bin/start.sh ---
@@ -404,6 +404,37 @@ END
 ln -s /opt/guacamole/radius/guacamole-auth-*.jar "$GUACAMOLE_EXT"
 }
 
+## Adds properties to guacamole.properties which select the OPENID
+## authentication provider, and configure it to connect to the specified 
OPENID
+## provider.
+##
+associate_openid() {
+
+# Verify required parameters are present
+if [ -z "$OPENID_AUTHORIZATION_ENDPOINT" -o -z "$OPENID_CLIENT_ID" ]; 
then
--- End diff --

makes sense indeed, pushed the changes


---


Re: 1.0.0 Release?

2018-12-31 Thread Nick Couchman
On Mon, Dec 31, 2018 at 11:59 AM Nick Couchman 
wrote:

>
>> Pretty good, I'd say. I'll type up draft release notes, etc.
>>
>> - Mike
>>
>
> Mike,
> Any progress on the release notes?  I started working on some myself, if
> you haven't started on them I can finish up a cut and send those over?
>
> Also, I have this one outstanding issue with the RADIUS module and
> challenge authentication that I'm still tracking down.  I don't think it
> needs to block the 1.0.0 release - it could be classified as a "known
> issue" - but I think I've figured out what's going on.  As a reminder, the
> situation occurs when the RADIUS module is stacked with other modules (e.g.
> JDBC), when those other modules authenticate before the RADIUS module, and
> when the RADIUS module requests additional credentials.  When this happens,
> instead of the web app requesting the additional credentials, it just fails
> the authentication.
>
> Based on the debugging I've done, it does not look like the issue is in
> the RADIUS module itself - it looks like maybe the errors thrown by the
> individual modules get stacked or queued, and the first one in the queue is
> the one that the REST API pushes to the web app.  So, it goes something
> like this:
> - User attempts to log in with RADIUS credentials
> - JDBC module fails the authentication, throwing an Invalid Credentials
> Exception.
> - Control is passed to the RADIUS module.
> - RADIUS module needs additional credentials, throwing an Insufficient
> Credentials Exception with the additional required credentials.
> - REST API sends Invalid Credentials to the web app, and authentication
> fails completely.
>
> I've done some debugging and added some logging to confirm that the RADIUS
> module is behaving as expected, but that the 403 returned by the api/tokens
> endpoint in the above scenario only contains the Invalid Credentials
> Exception and not the Insufficient Credentials Exception.
>
> -Nick
>

Figured out what was going on, here, and opened a new JIRA issue (against
the 1.0.0 release) and a pull request that should take care of this issue.

-Nick


[GitHub] guacamole-client pull request #352: GUACAMOLE-684: Insufficient credentials ...

2018-12-31 Thread necouchman
GitHub user necouchman opened a pull request:

https://github.com/apache/guacamole-client/pull/352

GUACAMOLE-684: Insufficient credentials should take precedence over other 
failures

This resolves an issue where, depending on the order of stacked 
authentication modules, `GuacamoleInsufficientCredentialsException`s are 
overriden by `GuacamoleInvalidCredentialsException`s that occur prior to the 
insufficient exceptions.  This particular issue has come up with the RADIUS 
module when it gets a challenge/response and is stacked on top of the JDBC 
module, where the JDBC authentication occurs (and fails) prior to the RADIUS 
authentication attempt, and the additional credentials are never requested.

You can merge this pull request into a Git repository by running:

$ git pull https://github.com/necouchman/guacamole-client jira/684

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/guacamole-client/pull/352.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #352


commit a710558854092a162161d8e66d1634b5831e1824
Author: Nick Couchman 
Date:   2018-12-31T17:37:03Z

GUACAMOLE-684: Insufficient credentials should take precedence over other 
credentials errors.




---


[GitHub] guacamole-client pull request #351: GUACAMOLE-683: Add OpenID support in Doc...

2018-12-31 Thread necouchman
Github user necouchman commented on a diff in the pull request:

https://github.com/apache/guacamole-client/pull/351#discussion_r244603234
  
--- Diff: guacamole-docker/bin/start.sh ---
@@ -404,6 +404,37 @@ END
 ln -s /opt/guacamole/radius/guacamole-auth-*.jar "$GUACAMOLE_EXT"
 }
 
+## Adds properties to guacamole.properties which select the OPENID
+## authentication provider, and configure it to connect to the specified 
OPENID
+## provider.
+##
+associate_openid() {
+
+# Verify required parameters are present
+if [ -z "$OPENID_AUTHORIZATION_ENDPOINT" -o -z "$OPENID_CLIENT_ID" ]; 
then
--- End diff --

According to the OpenID documentation 
(http://guacamole.apache.org/doc/gug/openid-auth.html), the following 
parameters are required:
- openid-authorization-endpoint
- openid-jwks-endpoint
- openid-issuer
- openid-client-id
- openid-redirect-uri

Seems like we should probably check for all of these as required, here, and 
not just the authorization endpoint and client ID?


---


Re: 1.0.0 Release?

2018-12-31 Thread Nick Couchman
>
>
> Pretty good, I'd say. I'll type up draft release notes, etc.
>
> - Mike
>

Mike,
Any progress on the release notes?  I started working on some myself, if
you haven't started on them I can finish up a cut and send those over?

Also, I have this one outstanding issue with the RADIUS module and
challenge authentication that I'm still tracking down.  I don't think it
needs to block the 1.0.0 release - it could be classified as a "known
issue" - but I think I've figured out what's going on.  As a reminder, the
situation occurs when the RADIUS module is stacked with other modules (e.g.
JDBC), when those other modules authenticate before the RADIUS module, and
when the RADIUS module requests additional credentials.  When this happens,
instead of the web app requesting the additional credentials, it just fails
the authentication.

Based on the debugging I've done, it does not look like the issue is in the
RADIUS module itself - it looks like maybe the errors thrown by the
individual modules get stacked or queued, and the first one in the queue is
the one that the REST API pushes to the web app.  So, it goes something
like this:
- User attempts to log in with RADIUS credentials
- JDBC module fails the authentication, throwing an Invalid Credentials
Exception.
- Control is passed to the RADIUS module.
- RADIUS module needs additional credentials, throwing an Insufficient
Credentials Exception with the additional required credentials.
- REST API sends Invalid Credentials to the web app, and authentication
fails completely.

I've done some debugging and added some logging to confirm that the RADIUS
module is behaving as expected, but that the 403 returned by the api/tokens
endpoint in the above scenario only contains the Invalid Credentials
Exception and not the Insufficient Credentials Exception.

-Nick