Multiple changes and documentation.

This commit is contained in:
Alex Rennie-Lis 2024-06-08 11:11:20 +01:00
parent a3e0cc381b
commit f051bed335
3 changed files with 68 additions and 42 deletions

View File

@ -16,9 +16,63 @@ Sinatra provides for this simple use case:
- A Dockerfile (and docker-compose) to encapsulate the server within a docker container. - A Dockerfile (and docker-compose) to encapsulate the server within a docker container.
- Optional default VLAN support to support unknown MAC addresses, e.g. into a guest network. - Optional default VLAN support to support unknown MAC addresses, e.g. into a guest network.
# Configuration
Optional configuration is via environment variables.
### SINATRA_PORT_RADIUS_AUTH
Sets the listening port for RADIUS authentication.
Default: 1812
### SINATRA_PORT_RADIUS_ACCT
Sets the listening port for RADIUS accounting
Default: 1813
### SINATRA_PORT_API
Sets the listening port for the API
Default: 8088
### SINATRA_STORAGE
Sets the storage type and location for data. The format is type://location.
Supported types are:
##### json
Uses a serialised JSON data file. e.g. json://./data
Default: json://./data
### SINATRA_CLIENT_SECRET
Sets the shared secret for RADIUS clients
Default: password
### SINATRA_DEFAULT_VLAN
Sets the default VLAN ID for unauthenticated users. If false, users must pass authentication.
Default: false
### SINATRA_MAC_AUTH_ONLY
Sets whether usernames and passwords should be processed as MAC addresses.
If true, then all input formats are normalised to lowercase alphanumeric strings, e.g. aabbccddeeff
Default: false
### SINATRA_SESSION_DURATION
Sets the RADIUS session duration in minutes.
Default: 60
### SINATRA_TIME_RULES
Sets whether time rules are to be processed.
If true, then all registered users must have at least one 'allow' rule defined.
Default: false
# Feature roadmap # Feature roadmap
- Mass-import from CSV - Mass-import from CSV
- Time-based authentication
- Time-limited access
- Connection accounting (with REST API endpoints for data access) - Connection accounting (with REST API endpoints for data access)

View File

@ -1,6 +1,6 @@
// Baseline // Baseline
const product = 'NetRadius'; const product = 'NetRadius';
const version = '0.2.0'; const version = '0.4.0';
// Load dependencies // Load dependencies
const dgram = require ('dgram'); const dgram = require ('dgram');
@ -13,44 +13,16 @@ const handlers = require ('./lib/handlers.js');
// Load configuration // Load configuration
log.write (product + ' v' + version); log.write (product + ' v' + version);
config = {}; config = { ports: {} };
try { config.ports.radius_authentication = process.env['SINATRA_PORT_RADIUS_AUTH'] || 1812;
config = JSON.parse (fs.readFileSync ('./config.json').toString ()); config.ports.radius_accounting = process.env['SINATRA_PORT_RADIUS_ACCT'] || 1813;
} config.ports.api = process.env['SINATRA_PORT_API'] || 8088;
catch (error) { config.storage = process.env['SINATRA_STORAGE'] || "json:./data.json";
log.write ('Cannot open or read configuration file.'); config.client_secret = process.env['SINATRA_CLIENT_SECRET'] || "password";
log.write ('Using defaults'); config.default_vlan = process.env['SINATRA_DEFAULT_VLAN'] || false;
config = { config.mac_auth_only = process.env['SINATRA_MAC_AUTH_ONLY'] || false;
ports: { config.session_duration = process.env['SINATRA_SESSION_DURATION'] || 60;
radius_authentication: 1812, config.time_rules = process.env['SINATRA_TIME_RULES'] || false;
radius_accounting: 1813,
api: 8088
},
storage: "json:./data.json",
client_secret: "password",
default_vlan_enabled: false,
mac_auth_only: false,
session_duration: 60,
time_rules_enabled: false
}
}
if (process.env['SINATRA_PORT_RADIUS_AUTH']) config.ports.radius_authentication = process.env['SINATRA_PORT_RADIUS_AUTH'];
if (process.env['SINATRA_PORT_RADIUS_ACCT']) config.ports.radius_accounting = process.env['SINATRA_PORT_RADIUS_ACCT'];
if (process.env['SINATRA_PORT_API']) config.ports.api = process.env['SINATRA_PORT_API'];
if (process.env['SINATRA_STORAGE']) config.storage = process.env['SINATRA_STORAGE'];
if (process.env['SINATRA_DEFAULT_VLAN']) config.default_vlan_enabled = process.env['SINATRA_DEFAULT_VLAN'];
if (process.env['SINATRA_DEFAULT_VLAN_ID']) config.default_vlan_id = process.env['SINATRA_DEFAULT_VLAN_ID'];
if (process.env['SINATRA_CLIENT_SECRET']) config.client_secret = process.env['SINATRA_CLIENT_SECRET'];
if (process.env['SINATRA_MAC_AUTH_ONLY']) config.mac_auth_only = process.env['SINATRA_MAC_AUTH_ONLY'];
if (process.env['SINATRA_SESSION_DURATION']) config.session_duration = process.env['SINATRA_SESSION_DURATION'];
if (process.env['SINATRA_TIME_RULES']) config.time_rules_enabled = process.env['SINATRA_TIME_RULES'];
// Set defaults
if (!config.ports.radius_authentication) config.ports.radius_authentication = 1812;
if (!config.ports.radius_accounting) config.ports.radius_accounting = 1813;
if (!config.ports.api) config.ports.api = 8088;
if (!config.session_duration) config.session_duration = 60;
if (!config.time_rules_enabled) config.time_rules_enabled = false;
// Display active configuration // Display active configuration
log.write ('Using configuration: ' + JSON.stringify (config)); log.write ('Using configuration: ' + JSON.stringify (config));

View File

@ -41,7 +41,7 @@ const resolveRange = (str) => {
module.exports = { module.exports = {
checkAuth: (rules = []) => { checkAuth: (rules = []) => {
var authorised = false; var authorised = false;
if (config.time_rules_enabled) { if (config.time_rules) {
if (rules.length > 0) { if (rules.length > 0) {
var now = new Date (); var now = new Date ();
var minuteOfDay = (now.getHours () * 60) + now.getMinutes (); // 0 - 1439 var minuteOfDay = (now.getHours () * 60) + now.getMinutes (); // 0 - 1439