]> git.proxmox.com Git - mirror_novnc.git/commitdiff
Add debug logging for Tight authentication
authorPierre Ossman <ossman@cendio.se>
Thu, 7 Jun 2018 12:57:17 +0000 (14:57 +0200)
committerPierre Ossman <ossman@cendio.se>
Thu, 7 Jun 2018 12:57:17 +0000 (14:57 +0200)
Makes it easier to diagnose user issues when we can see what the
server and noVNC are trying to negotiate.

core/rfb.js

index d336d6ccc365c7dcdf6369a095c61bdcb6c093f3..2f4e81550c848a7c73c6205ec2f305399200dec4 100644 (file)
@@ -1006,6 +1006,8 @@ RFB.prototype = {
             serverSupportedTunnelTypes[cap_code] = { vendor: cap_vendor, signature: cap_signature };
         }
 
+        Log.Debug("Server Tight tunnel types: " + serverSupportedTunnelTypes);
+
         // choose the notunnel type
         if (serverSupportedTunnelTypes[0]) {
             if (serverSupportedTunnelTypes[0].vendor != clientSupportedTunnelTypes[0].vendor ||
@@ -1013,6 +1015,7 @@ RFB.prototype = {
                 return this._fail("Client's tunnel type had the incorrect " +
                                   "vendor or signature");
             }
+            Log.Debug("Selected tunnel type: " + clientSupportedTunnelTypes[0]);
             this._sock.send([0, 0, 0, 0]);  // use NOTUNNEL
             return false; // wait until we receive the sub auth count to continue
         } else {
@@ -1058,9 +1061,12 @@ RFB.prototype = {
             serverSupportedTypes.push(capabilities);
         }
 
+        Log.Debug("Server Tight authentication types: " + serverSupportedTypes);
+
         for (let authType in clientSupportedTypes) {
             if (serverSupportedTypes.indexOf(authType) != -1) {
                 this._sock.send([0, 0, 0, clientSupportedTypes[authType]]);
+                Log.Debug("Selected authentication type: " + authType);
 
                 switch (authType) {
                     case 'STDVNOAUTH__':  // no auth