Files
authentik/internal/outpost/radius/api.go
Jens Langhammer 8da54d5811 more refactor
Signed-off-by: Jens Langhammer <jens@goauthentik.io>
2025-07-01 22:43:00 +02:00

70 lines
1.8 KiB
Go

package radius
import (
"context"
"errors"
"net"
"sort"
"strings"
log "github.com/sirupsen/logrus"
"goauthentik.io/internal/outpost/ak"
"goauthentik.io/internal/outpost/radius/eap/protocol"
)
func parseCIDRs(raw string) []*net.IPNet {
parts := strings.Split(raw, ",")
cidrs := make([]*net.IPNet, len(parts))
for i, p := range parts {
_, ipnet, err := net.ParseCIDR(strings.TrimSpace(p))
if err != nil {
log.WithError(err).WithField("cidr", p).Error("Failed to parse CIDR")
continue
}
cidrs[i] = ipnet
}
sort.Slice(cidrs, func(i, j int) bool {
_, bi := cidrs[i].Mask.Size()
_, bj := cidrs[j].Mask.Size()
return bi < bj
})
return cidrs
}
func (rs *RadiusServer) Refresh() error {
apiProviders, err := ak.Paginator(rs.ac.Client.OutpostsApi.OutpostsRadiusList(context.Background()), ak.PaginatorOptions{
PageSize: 100,
Logger: rs.log,
})
if err != nil {
return err
}
if len(apiProviders) < 1 {
return errors.New("no radius provider defined")
}
providers := make(map[int32]*ProviderInstance)
for _, provider := range apiProviders {
existing, ok := rs.providers[provider.Pk]
state := map[string]*protocol.State{}
if ok {
state = existing.eapState
}
logger := log.WithField("logger", "authentik.outpost.radius").WithField("provider", provider.Name)
providers[provider.Pk] = &ProviderInstance{
SharedSecret: []byte(provider.GetSharedSecret()),
ClientNetworks: parseCIDRs(provider.GetClientNetworks()),
MFASupport: provider.GetMfaSupport(),
appSlug: provider.ApplicationSlug,
flowSlug: provider.AuthFlowSlug,
certId: provider.GetCertificate(),
providerId: provider.Pk,
s: rs,
log: logger,
eapState: state,
}
}
rs.providers = providers
rs.log.Info("Update providers")
return nil
}