AeroGear Crypto Java 0.1.2 released
by Bruno Oliveira
Good morning, just to let you know we released today the bits for digital signatures and some bug fixes.
Have a happy new year sweet hearts.
--
abstractj
2 years, 4 months
Chrome Push Messages
by Lucas Holmquist
Hello,
now that the 1.0.0-final is pretty much out for the UnifiedPush Server, i’m starting to look at the new API that Chrome apps use for sending push notifications.
the TL;DR of it is, it’s basically the same as Android now.( no more refresh tokens and access tokens and such )
So the question is, do we need to have a deprecation period on what is currently there?
The v1 of the chrome pushMessaging api has become legacy and it is recommended to use the new stuff. https://developer.chrome.com/apps/cloudMessagingV1
While i have looked to deeply, it’s possible we can use the same “Variant” structure for Chrome Apps, Since they will be using the same Network
wdyt?
-Luke
9 years, 8 months
[Android] KeyCloak Authenticator
by Summers Pittman
<tldr>DEVELOPERS WILL NEVER HAVE TO WRITE ANOTHER LINE OF AUTH LOGIC
AGAIN!</tldr>
Over the weekend I tried my hand at writing a Android Account
Authenticator for KeyCloak. This lets Android manage the KeyCloak
account, fetch tokens, provide tokens to other apps etc. KeyCloak
Authenticator let's you drop your keycloak.json file into an apk and
access your KeyCloak Account with one line of code from any application
on your Android device.
Right now this is very much in the "I have an itch needing scratching"
phase. It doesn't do any robust error handling, hasn't been testing off
the golden scenario, has no integration with any of the AeroGear stuff,
etc. Take a moment to watch the Demo and look at the demo project.
Video Demo :
https://plus.google.com/103442292643366117394/posts/WSFbdodMsej
The Demo video uses Android's native account menu to request from the
authenticator a KeyCloak account. This launches the authenticator's
activity which will retrieve the credentials for Android and store
them. When I am back in the settings page and showing off the stored
account, this is all native Android UI and not part of the KeyCloak
authenticator.
When I launch the Demo application this is a separate application from
the authenticator apk. The Demo project fetches the KeyCloak account
from Android and gets its auth token. Then it makes a request to
KeyCloak's account service to fetch the user's account data.
In the demo app there are three lines of code related to auth.
final Account account = am.getAccountsByType("org.keycloak.Account")[0];
String token = am.getAuthToken(account, "org.keycloak.Account.token",
null, null, null, null).getResult().getString(AccountManager.KEY_AUTHTOKEN);
and
provider.setDefaultHeader("Authorization", "bearer " + token);
The first two lines fetch the account and token from Android. The
second line attaches the account's auth token to the web request to the
server.
So now what? I'll probably use this for my projects/demos because it
makes my work easier. Right now it doesn't have any connection to any
of the "official" projects (Again, I wrote this over the weekend to see
if I could) however it may be quite useful to someone. In the project's
README I've included a (incomplete) list of things that don't work.
wdyt?
Links :
Project : https://github.com/secondsun/keycloak-android-authenticator
Video Demo :
https://plus.google.com/103442292643366117394/posts/WSFbdodMsej
Demo Source :
https://github.com/secondsun/keycloak-account-authenticator-demo/
--
Summers Pittman
>>Phone:404 941 4698
>>Java is my crack.
9 years, 10 months
Safari Push notifications
by Lucas Holmquist
Hello,
So i’ve decided to take today and try and add Safari Push notifications into the UPS. When i tried about a year ago, i was successful, but i had lots of duplicated code since it is very close to the iOS variant.
basically, the only real difference is that Safari notifications use the Production cert only. The other slight difference is how you send the message to the APNs service
I wondering if now is the time to start changing the variant names, so iOSVariant would become APNsVariant(or something like that).
This would also change the endpoint at which we connect from ‘ios' to ‘apns’ . Since this is sort of a breaking change, from a curl perspective, does this need to wait until a Major release?
plus this might make the current db migration stuff that is in progress more complex too
I have no problems keeping it separate, and then in a later release merging things together
wdyt?
-Luke
9 years, 10 months
text/html Requests instead of application/json
by Marc Pires
Hi guys, i'm having a little trouble with an app i'm developing. Doing a
post request against an API, I receive from the server that my request is
going as text/html instead application/json, text/javascript or text/json
that the API expects.
As I never had this problem before, i research the docs but did not found
the reference yet, so how can i define my request to go as application/json
instead text/html
--
Desenvolvedor IOS, Rails, RIA
http://www.linkedin.com/in/marcpires
http://about.me/marcelo_pires
9 years, 11 months
Eating our own dog food, or TOTP demos for AeroGear
by Bruno Oliveira
Good morning,
TOTP was implemented on AeroGear for iOS[1] and Android[2] two years
ago. On conferences most of the developers get amazed with our API.
Although we don't have any app published on Google Play or App Store. I
think it's time to release our demos and get some feedback from our
community.
Into this way we can exercise things like:
- Properly store the shared secret
- Password protection with offline authentication
- If we are very confident, sync the TOTPs across authorized devices
At the moment, we don't need to do so much once most of our demos are
already on GH. I think it's just the matter of release it.
Thoughts?
[1] - https://github.com/aerogear/aerogear-otp-ios-demo
[2] - https://github.com/aerogear/aerogear-otp-android-demo
--
abstractj
PGP: 0x84DC9914
9 years, 11 months
Node.js / Passport.js thoughts (was: Re: OAuth2, OpenID connect and AeroGear)
by Matthias Wessendorf
Hello team!
On Thu, Oct 9, 2014 at 4:49 AM, Bruno Oliveira <bruno(a)abstractj.org> wrote:
> Note: Not only for Keycloak, but also compatible with other technologies
> like passport on Node.js.
Great point on being compatible with passport.js! To ensure our OAuth2
client SDKs do work against node.js (w/ passport.js), how about we build a
Node.js based version of our "Shoot-n-Share backend" ([1]), that is
protected by Passport.js?
It could be a (simple) a 'clone' of our java version. I think for Luke, our
Node.js pro, it would be a fairly simple task :)
On the client side, the Android/iOS versions of Shoot-n-Share would simply
offer a new upload target for Passport.js, instead of 'just' FB,
Google-Drive and Keycloak.
That way we will also learn how much Passport.js is actually different,
similar to what we learned on how Google/FB are different ;-)
Another interesting aspect of this is that, once we are ready to release
our OAuth2 SDKs, it would be awesome to actually ship a node.js based demo
as well, instead of just a Java-based backend demo. That would clearly
show, our client libs are working across different backend technologies.
Any thoughts?
-Matthias
[1] https://github.com/aerogear/aerogear-backend-cookbook/tree/master/Shoot
> In the end, OAuth2 is just a protocol and
> should support other servers.
>
> - Should we provide examples for OpenID connect? Or abstractions?
>
> To track this issue, we have the following Jira[3] and another for
> OpenID connect[4]. Fell free to link to your respective project.
>
>
> [1] -
>
> http://transcripts.jboss.org/meeting/irc.freenode.org/aerogear/2014/aerog...
>
> [2] - https://gist.github.com/abstractj/04136c6df85cea5f35d1
>
> [3] - https://issues.jboss.org/browse/AGSEC-180
>
> [4] - https://issues.jboss.org/browse/AGSEC-190
> --
>
> abstractj
> PGP: 0x84DC9914
> _______________________________________________
> aerogear-dev mailing list
> aerogear-dev(a)lists.jboss.org
> https://lists.jboss.org/mailman/listinfo/aerogear-dev
>
--
Matthias Wessendorf
blog: http://matthiaswessendorf.wordpress.com/
sessions: http://www.slideshare.net/mwessendorf
twitter: http://twitter.com/mwessendorf
9 years, 11 months
setting up aerogear behind nginx proxy
by chale
Hi,
I need some help. I am trying to setup aerogear behind a nginx proxy
server that has ssl enabled and I am running into issues. Anytime i try to
go to /ag-push I see this in the logs
RROR [org.apache.catalina.connector.CoyoteAdapter]
(http--10.128.93.235-8080-5) An exception or error occurred in the container
during the request processing: java.lang.RuntimeException: Unable to resolve
realm public key remotely, status = 403
at
org.keycloak.adapters.AdapterDeploymentContext.resolveRealmKey(AdapterDeploymentContext.java:69)
[keycloak-adapter-core-1.0-final.jar:]
at
org.keycloak.adapters.AdapterDeploymentContext.resolveDeployment(AdapterDeploymentContext.java:55)
[keycloak-adapter-core-1.0-final.jar:]
at
org.keycloak.adapters.as7.AuthenticatedActionsValve.invoke(AuthenticatedActionsValve.java:45)
[keycloak-as7-adapter-1.0-final.jar:]
at
org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:397)
[jbossweb-7.0.13.Final.jar:]
at
org.keycloak.adapters.as7.KeycloakAuthenticatorValve.invoke(KeycloakAuthenticatorValve.java:135)
[keycloak-as7-adapter-1.0-final.jar:]
at
org.jboss.as.web.security.SecurityContextAssociationValve.invoke(SecurityContextAssociationValve.java:153)
[jboss-as-web-7.1.1.Final.jar:7.1.1.Final]
at
org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:155)
[jbossweb-7.0.13.Final.jar:]
at
org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:102)
[jbossweb-7.0.13.Final.jar:]
at
org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:109)
[jbossweb-7.0.13.Final.jar:]
at
org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:368)
[jbossweb-7.0.13.Final.jar:]
at
org.apache.coyote.http11.Http11Processor.process(Http11Processor.java:877)
[jbossweb-7.0.13.Final.jar:]
at
org.apache.coyote.http11.Http11Protocol$Http11ConnectionHandler.process(Http11Protocol.java:671)
[jbossweb-7.0.13.Final.jar:]
at org.apache.tomcat.util.net.JIoEndpoint$Worker.run(JIoEndpoint.java:930)
[jbossweb-7.0.13.Final.jar:]
at java.lang.Thread.run(Thread.java:745) [rt.jar:1.7.0_65]
Does anyone have any advice or experience on how to go about setting up
aerogear behind an nginx proxy?
--
View this message in context: http://aerogear-dev.1069024.n5.nabble.com/setting-up-aerogear-behind-ngin...
Sent from the aerogear-dev mailing list archive at Nabble.com.
9 years, 11 months