]>
git.ipfire.org Git - thirdparty/freeradius-server.git/log
Jorge Pereira [Fri, 30 Jun 2023 18:52:54 +0000 (15:52 -0300)]
Fix issue with memory usage after being released.
Alan T. DeKok [Fri, 30 Jun 2023 14:21:39 +0000 (10:21 -0400)]
talloc from the correct parent
Alan T. DeKok [Wed, 28 Jun 2023 15:30:36 +0000 (11:30 -0400)]
remove old comment
Nick Porter [Fri, 30 Jun 2023 08:02:59 +0000 (09:02 +0100)]
Remove package conflict from Coverity build
Nick Porter [Fri, 30 Jun 2023 07:32:58 +0000 (08:32 +0100)]
Ensure each redis_ippool test uses its own pool
Nick Porter [Fri, 30 Jun 2023 07:32:14 +0000 (08:32 +0100)]
Test redis_ippool_tool static assignment behaviour
Nick Porter [Thu, 29 Jun 2023 16:47:07 +0000 (17:47 +0100)]
Use a Lua script for static lease assignment
Adds safety / sanity checks:
- the IP does not already have a static assignment
- the device is not already associated with another IP
- the IP is not already allocated to another device
Nick Porter [Thu, 29 Jun 2023 16:53:51 +0000 (17:53 +0100)]
Correct line numbering in lua_release_cmd script
Max Khon [Wed, 28 Jun 2023 04:35:48 +0000 (11:35 +0700)]
lua_release_cmd: always reset expiry time (for static leases too)
Nick Porter [Thu, 29 Jun 2023 10:34:19 +0000 (11:34 +0100)]
Use separate call environments for each redis ippool method
Nick Porter [Thu, 29 Jun 2023 10:12:05 +0000 (11:12 +0100)]
Split redis IP pool mod_action into action specific functions
Nick Porter [Thu, 29 Jun 2023 08:43:16 +0000 (09:43 +0100)]
Remove IP-Pool.Action and use module methods instead
Alan T. DeKok [Wed, 28 Jun 2023 13:30:49 +0000 (09:30 -0400)]
uodate dynamic clients for dhcpv4 and dhcpv6
It turns out the old code would also _always_ add a client, even
if there was a NAK. Oh well. That's now fixed.
Alan T. DeKok [Wed, 28 Jun 2023 13:20:02 +0000 (09:20 -0400)]
simplify dynamic client config a bit
Alan T. DeKok [Wed, 28 Jun 2023 13:12:42 +0000 (09:12 -0400)]
allow for require_message_authenticator
Alan T. DeKok [Wed, 28 Jun 2023 13:07:56 +0000 (09:07 -0400)]
update documentation for dynamic clients
github-actions[bot] [Wed, 28 Jun 2023 09:34:37 +0000 (09:34 +0000)]
Scheduled fuzzing: Update src/tests/fuzzer-corpus/bfd.tar
Max Khon [Thu, 22 Jun 2023 12:50:07 +0000 (13:50 +0100)]
Document use_tls, tls {}, use_cluster_map
James Jones [Tue, 27 Jun 2023 18:13:44 +0000 (13:13 -0500)]
Check inidital fr_sbuff_in_bstrncpy() calls in BIO_write conversion
CIDs: #
1503916 (tls_log_request_bio_write_cb())
#
1503889 (tls_log_global_bio_write_cb())
James Jones [Fri, 23 Jun 2023 14:17:30 +0000 (09:17 -0500)]
Get rid of now-needless annotation
James Jones [Fri, 23 Jun 2023 15:25:23 +0000 (10:25 -0500)]
Add fr_radius_ok() model
Tells coverity that if fr_radius_ok() returns true, the packet
is valid.
Arran Cudbard-Bell [Tue, 27 Jun 2023 21:09:29 +0000 (17:09 -0400)]
xlat: Don't "cast" octets string to hex. Leave them in their raw binary form
Arran Cudbard-Bell [Tue, 27 Jun 2023 21:09:11 +0000 (17:09 -0400)]
xlat: Make xlat_eval_compiled binary safe
Arran Cudbard-Bell [Tue, 27 Jun 2023 19:09:50 +0000 (15:09 -0400)]
xlat: Concat output boxes from tmpl evaluation when the tmpl was originally quoted
Add regression tests for compound rlm_files keys
Arran Cudbard-Bell [Tue, 27 Jun 2023 21:06:41 +0000 (17:06 -0400)]
Print errors in a form vscode can jump to
Arran Cudbard-Bell [Tue, 27 Jun 2023 21:06:06 +0000 (17:06 -0400)]
unit_test_module: Use modified unescape rules, compare match results properly
Arran Cudbard-Bell [Tue, 27 Jun 2023 18:56:55 +0000 (14:56 -0400)]
unit_test_module: Escape output of xlat functions in tests
Nick Porter [Tue, 27 Jun 2023 12:27:24 +0000 (13:27 +0100)]
Remove conflict from fuzzing job
Nick Porter [Tue, 27 Jun 2023 11:28:26 +0000 (12:28 +0100)]
Remove package conflicts
Nick Porter [Tue, 27 Jun 2023 10:12:34 +0000 (11:12 +0100)]
sql_errno can't be < 0 here
Nick Porter [Mon, 26 Jun 2023 13:04:41 +0000 (14:04 +0100)]
Can't verify fake dynamic client lookup packet as there is no shared secret yet
Alan T. DeKok [Fri, 23 Jun 2023 18:22:57 +0000 (14:22 -0400)]
don't exit until all detached requests have stopped
which (for now) also means keeping detached requests in the
time_order list. That seems reasonable, as that list measures
the total amount of work that this thread is doing
Alan T. DeKok [Fri, 23 Jun 2023 18:22:26 +0000 (14:22 -0400)]
remove old comment
Alan T. DeKok [Fri, 23 Jun 2023 14:06:34 +0000 (10:06 -0400)]
add a dlist per channel, and associate requests with it
so that when a channel closes, we can force-cancel all of the
requests which are associated with it.
Alan T. DeKok [Fri, 23 Jun 2023 12:49:41 +0000 (08:49 -0400)]
use nested
Nick Porter [Fri, 23 Jun 2023 11:39:48 +0000 (12:39 +0100)]
Re-number lines in lua_alloc_cmd
Nick Porter [Fri, 23 Jun 2023 11:32:45 +0000 (12:32 +0100)]
Extend expiry time of dynamic IP owner, if shorter than specified lifetime
Alan T. DeKok [Thu, 22 Jun 2023 19:59:31 +0000 (15:59 -0400)]
ue explicit invalid name for unused heap IDs
Alan T. DeKok [Thu, 22 Jun 2023 19:59:22 +0000 (15:59 -0400)]
set heap IDs properly.
which was changed in most places via commit
4b25265 in August 2021,
but wasn't changed here.
Alan T. DeKok [Thu, 22 Jun 2023 19:52:03 +0000 (15:52 -0400)]
define and use macro for invalid entries
Alan T. DeKok [Thu, 22 Jun 2023 18:05:36 +0000 (14:05 -0400)]
first pass at re-enabling dynamic clients
Alan T. DeKok [Thu, 22 Jun 2023 17:54:42 +0000 (13:54 -0400)]
remove old comment
Alan T. DeKok [Thu, 22 Jun 2023 17:53:58 +0000 (13:53 -0400)]
UNUSED compiler complaint
Alan T. DeKok [Thu, 22 Jun 2023 16:21:09 +0000 (12:21 -0400)]
document how dynamic clients work
so people don't have to read all of the code to figure it out
Alan T. DeKok [Thu, 22 Jun 2023 16:21:01 +0000 (12:21 -0400)]
fix typo
Alan T. DeKok [Thu, 22 Jun 2023 15:39:29 +0000 (11:39 -0400)]
define new / add / deny client sections
They don't do anything, but that will come
Alan T. DeKok [Thu, 22 Jun 2023 14:42:36 +0000 (10:42 -0400)]
fix up error messages for dynamic_clients
we no longer need a dynamic client instance
James Jones [Wed, 21 Jun 2023 17:45:32 +0000 (12:45 -0500)]
Attempt to placate coverity about fr_value_box_init() (CID #
1508484 )
An fr_value_box_t has some members with const-qualified type. The
only way one can assign to it in this context is with an
initializer, which doesn't make sense here, hence the memcpy().
That makes the compilers happy, but coverity notices that
vp points at an fr_value_box_t and considers it a defect, even
though it's all we can do.
In a similar situation elsewhere, coverity notices a parameter
cast from void * to pointer to some structure type. It notices it,
calls it "downcasting" (odd for a non-OOP language) and
considers the allegedly pointed-at structure as tainted--perhaps
alignment issues? We'll attempt a cast to void *, and see whether
coverity will notice how it started out and still complain.
Alan T. DeKok [Thu, 22 Jun 2023 13:57:10 +0000 (09:57 -0400)]
remove request->async->process
it hasn't been used for a while
Alan T. DeKok [Thu, 22 Jun 2023 13:56:26 +0000 (09:56 -0400)]
parent is used
Alan T. DeKok [Thu, 22 Jun 2023 13:48:13 +0000 (09:48 -0400)]
as sent via email
Alan T. DeKok [Wed, 14 Jun 2023 14:12:11 +0000 (10:12 -0400)]
check for invalid packet types in more protocols
Nick Porter [Thu, 22 Jun 2023 13:15:35 +0000 (14:15 +0100)]
Correct locating of fr_tls_conf_t when parsing cache mode
`parent` is the fr_tls_cache_conf_t being populated, which is a member
of the fr_tls_conf_t.
Nick Porter [Thu, 22 Jun 2023 10:42:13 +0000 (11:42 +0100)]
Move tls_conf_parse_cache_mode outside of #ifdef __APPLE__
Max Khon [Wed, 21 Jun 2023 21:20:43 +0000 (22:20 +0100)]
Add "--without rlm_python" support
Max Khon [Wed, 21 Jun 2023 21:27:07 +0000 (22:27 +0100)]
Allow to specify YUM_BUILDDEP_FLAGS (like YUM_BUILDDEP_FLAGS="--define '_without_python 1'")
Arran Cudbard-Bell [Thu, 22 Jun 2023 03:36:08 +0000 (23:36 -0400)]
tls: Mark cache mode function as static
James Jones [Wed, 21 Jun 2023 22:23:43 +0000 (17:23 -0500)]
Typo
Arran Cudbard-Bell [Wed, 21 Jun 2023 21:02:10 +0000 (17:02 -0400)]
Print line numbers in the format vscode likes
Arran Cudbard-Bell [Wed, 21 Jun 2023 21:01:37 +0000 (17:01 -0400)]
Fix build issue
Arran Cudbard-Bell [Wed, 21 Jun 2023 20:25:41 +0000 (16:25 -0400)]
call_env: Write out an explicit result from evaluation so that module calls fail correctly
Arran Cudbard-Bell [Wed, 21 Jun 2023 19:47:57 +0000 (15:47 -0400)]
tls: Process cache mode early
Arran Cudbard-Bell [Wed, 21 Jun 2023 19:47:35 +0000 (15:47 -0400)]
triggers: Don't crash on trigger execution
Arran Cudbard-Bell [Thu, 15 Jun 2023 15:48:22 +0000 (11:48 -0400)]
Grammar
Max Khon [Wed, 14 Jun 2023 20:18:04 +0000 (21:18 +0100)]
fr_redis_cluster_conn_create(): tls session should be allocated in `conn' context
Max Khon [Wed, 14 Jun 2023 19:20:14 +0000 (20:20 +0100)]
redis: Add "use_cluster_map = no": when redis server is configured for TLS
and freeradius TLS is implemented using stunnel, freeradius connects to redis
(stunnel) using plaintext, then tries to open plaintext connection to cluster nodes
which only accept TLS
Max Khon [Wed, 14 Jun 2023 19:19:34 +0000 (20:19 +0100)]
redis: Add "use_tls = yes" support (if hiredis supports SSL).
github-actions[bot] [Wed, 21 Jun 2023 09:35:12 +0000 (09:35 +0000)]
Scheduled fuzzing: Update src/tests/fuzzer-corpus/dhcpv6.tar
github-actions[bot] [Wed, 21 Jun 2023 09:35:10 +0000 (09:35 +0000)]
Scheduled fuzzing: Update src/tests/fuzzer-corpus/dhcpv4.tar
github-actions[bot] [Wed, 21 Jun 2023 09:35:06 +0000 (09:35 +0000)]
Scheduled fuzzing: Update src/tests/fuzzer-corpus/radius.tar
github-actions[bot] [Wed, 21 Jun 2023 09:35:01 +0000 (09:35 +0000)]
Scheduled fuzzing: Update src/tests/fuzzer-corpus/util.tar
github-actions[bot] [Wed, 21 Jun 2023 09:34:58 +0000 (09:34 +0000)]
Scheduled fuzzing: Update src/tests/fuzzer-corpus/tftp.tar
github-actions[bot] [Wed, 21 Jun 2023 09:34:55 +0000 (09:34 +0000)]
Scheduled fuzzing: Update src/tests/fuzzer-corpus/vmps.tar
github-actions[bot] [Wed, 21 Jun 2023 09:34:52 +0000 (09:34 +0000)]
Scheduled fuzzing: Update src/tests/fuzzer-corpus/tacacs.tar
github-actions[bot] [Wed, 21 Jun 2023 09:34:48 +0000 (09:34 +0000)]
Scheduled fuzzing: Update src/tests/fuzzer-corpus/dns.tar
James Jones [Tue, 20 Jun 2023 19:31:41 +0000 (14:31 -0500)]
Move assignment to success (CID #
1504462 ) (#5074)
Coverity looks at control flow in xlat_purify_list() and judges that
success is guaranteed to be false by the time it's checked. We think
that moving the initialization before the unlang_xlat_push_node()
call, which passes it &success, will function the same while
reassuring coverity.
James Jones [Tue, 20 Jun 2023 14:50:01 +0000 (09:50 -0500)]
Model fr_md5_calc() (#5065)
James Jones [Tue, 20 Jun 2023 14:49:29 +0000 (09:49 -0500)]
Rewrite udp_len check in fr_udp_header_check() for coverity (CID #
1504068 ) (#5072)
It wasn't practical to write a single UDP header check function,
so the change to make coverity see that udp_len is valid has to be
there twice.
Nick Porter [Tue, 20 Jun 2023 10:20:44 +0000 (11:20 +0100)]
Typo
Jorge Pereira [Tue, 20 Jun 2023 04:43:51 +0000 (01:43 -0300)]
Some dhcpv6 fixes (#5071)
* dhcpv6: Fix potential memory leak
* dhcpv6: Fix typo in default virtual server
* dhcpv6: Don't crash if 'interface' is empty.
It fixes:
Mon Jun 19 23:40:31 2023: Bootstrapping proto_dhcpv4 "dhcp.dhcpv4"
Mon Jun 19 23:40:31 2023: Bootstrapping proto_dhcpv6 "dhcpv6.all_dhcp_servers_and_relays"
Process 73144 stopped
* thread #1, queue = 'com.apple.main-thread', stop reason = EXC_BAD_ACCESS (code=1, address=0x0)
frame #0: 0x00000001a68c853c libsystem_platform.dylib`_platform_strcmp + 12
libsystem_platform.dylib`:
-> 0x1a68c853c <+12>: ldrb w5, [x1], #0x1
0x1a68c8540 <+16>: subs x3, x4, x5
0x1a68c8544 <+20>: ccmp w4, #0x0, #0x4, eq
0x1a68c8548 <+24>: b.ne 0x1a68c8530 ; <+0>
(lldb) bt
* thread #1, queue = 'com.apple.main-thread', stop reason = EXC_BAD_ACCESS (code=1, address=0x0)
* frame #0: 0x00000001a68c853c libsystem_platform.dylib`_platform_strcmp + 12
frame #1: 0x0000000100368d60 libfreeradius-util.dylib`fr_interface_to_ethernet(interface=0x0000000000000000, ethernet=0x0000600003e041b0) at inet.c:1570:7
frame #2: 0x0000000100ed7c7c proto_dhcpv6_udp.dylib`mod_bootstrap(mctx=0x000000016fdfdd60) at proto_dhcpv6_udp.c:564:9
frame #3: 0x00000001002aecbc libfreeradius-io.dylib`mod_bootstrap(mctx=0x000000016fdfe100) at master.c:2610:41
frame #4: 0x0000000100b85260 proto_dhcpv6.dylib`mod_bootstrap(mctx=0x000000016fdfe890) at proto_dhcpv6.c:470:9
frame #5: 0x0000000100619bd8 libfreeradius-server.dylib`module_bootstrap(mi=0x0000000102214890) at module.c:778:7
frame #6: 0x0000000100619d0c libfreeradius-server.dylib`modules_bootstrap(ml=0x0000600002fa85e0) at module.c:811:7
frame #7: 0x000000010066c9b0 libfreeradius-server.dylib`virtual_servers_bootstrap(config=0x0000000100ff2c30) at virtual_servers.c:1301:6
frame #8: 0x00000001005ce87c libfreeradius-server.dylib`server_init(cs=0x0000000100ff2c30) at base.c:68:6
frame #9: 0x00000001000043a0 radiusd`main(argc=7, argv=0x000000016fdfecb8) at radiusd.c:788:6
Jorge Pereira [Tue, 20 Jun 2023 04:41:38 +0000 (01:41 -0300)]
The option 'tmpdir' is no longer available (#5070)
James Jones [Thu, 15 Jun 2023 23:11:48 +0000 (18:11 -0500)]
Help coverity see validation of option_len (#5064)
Arran Cudbard-Bell [Thu, 15 Jun 2023 15:20:09 +0000 (11:20 -0400)]
xlat: Register xlat protocols _AFTER_ bootstrap has completed
Arran Cudbard-Bell [Thu, 15 Jun 2023 15:17:11 +0000 (11:17 -0400)]
xlat: Expose the protocol xlat registraiton function
Arran Cudbard-Bell [Thu, 15 Jun 2023 15:16:46 +0000 (11:16 -0400)]
xlat: Add module find function
Arran Cudbard-Bell [Wed, 14 Jun 2023 22:11:01 +0000 (18:11 -0400)]
Virtual servers should be freed and unloaded before modules Closes #5062
Arran Cudbard-Bell [Wed, 14 Jun 2023 18:19:05 +0000 (14:19 -0400)]
Update copyright year... now we're in June
Arran Cudbard-Bell [Wed, 14 Jun 2023 18:05:37 +0000 (14:05 -0400)]
eap: Deal with the case where the first response message is not an Identity-Response Closes #5061
Jorge Pereira [Wed, 14 Jun 2023 16:15:38 +0000 (13:15 -0300)]
dhcpclient: Add missing '-r <retries>' help message. (#5058)
* dhcpclient: Add missing '-r <retries>' help message.
* dhcpclient: Better message to avoid bad experience
Even in debug mode (-x), its impossible to know if the client is blocked
or trying something.
James Jones [Wed, 14 Jun 2023 16:15:09 +0000 (11:15 -0500)]
Help coverity see validation of field_len (#5059)
Max Khon [Wed, 14 Jun 2023 16:14:41 +0000 (17:14 +0100)]
Don't set msg callback: required for SSL objects created by SSL_new() from freeradius SSL_CTX (#5056)
Alan T. DeKok [Wed, 14 Jun 2023 14:09:24 +0000 (10:09 -0400)]
double-check for bad packets. Fixes #5060
Alan T. DeKok [Wed, 14 Jun 2023 14:06:17 +0000 (10:06 -0400)]
add definition for decline. Helps with #5060
Alan T. DeKok [Wed, 14 Jun 2023 03:13:57 +0000 (23:13 -0400)]
remove unused label
Alan T. DeKok [Wed, 14 Jun 2023 02:20:51 +0000 (22:20 -0400)]
move "set priority or discard"
to just before "send packet to worker"
Alan T. DeKok [Wed, 14 Jun 2023 02:07:22 +0000 (22:07 -0400)]
remove unused priority from mod_read()
this is now a function of the app (proto_radius), and not the
IO layer (proto_radius_udp)
Alan T. DeKok [Wed, 14 Jun 2023 01:53:11 +0000 (21:53 -0400)]
set the priority if there's a mod_priority_set() function
because the app_io routines probably shouldn't be setting the
priority for each packet.
Alan T. DeKok [Wed, 14 Jun 2023 01:46:49 +0000 (21:46 -0400)]
add mod_priority_set(), as with all of the other listeners
because setting the packet priority is a function of the protocol
(i.e. proto_radius), and not of the IO handler (e.g. proto_radius_udp)
Alan T. DeKok [Wed, 14 Jun 2023 01:35:21 +0000 (21:35 -0400)]
remove is_dup parameter from app_io mod_read()
nothing used it, so it's not necessary.
The base IO routines should just read packets. The code which adds
tracking should instead check for duplicates.
Jorge Pereira [Wed, 14 Jun 2023 00:19:41 +0000 (21:19 -0300)]
More SoH clean-ups
Remove all doc references