1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
use std::time::Duration;
use kanidm_proto::v1::{OperationError, RadiusAuthToken};
use time::OffsetDateTime;
use uuid::Uuid;
use crate::entry::{Entry, EntryCommitted, EntryReduced};
use crate::idm::group::Group;
use crate::prelude::*;
#[derive(Debug, Clone)]
pub(crate) struct RadiusAccount {
pub name: String,
pub displayname: String,
pub uuid: Uuid,
pub groups: Vec<Group>,
pub radius_secret: String,
pub valid_from: Option<OffsetDateTime>,
pub expire: Option<OffsetDateTime>,
}
impl RadiusAccount {
pub(crate) fn try_from_entry_reduced(
value: &Entry<EntryReduced, EntryCommitted>,
qs: &mut QueryServerReadTransaction,
) -> Result<Self, OperationError> {
if !value.attribute_equality("class", &PVCLASS_ACCOUNT) {
return Err(OperationError::InvalidAccountState(
"Missing class: account".to_string(),
));
}
let radius_secret = value
.get_ava_single_secret("radius_secret")
.ok_or_else(|| {
OperationError::InvalidAccountState("Missing attribute: radius_secret".to_string())
})?
.to_string();
let name = value
.get_ava_single_iname("name")
.map(|s| s.to_string())
.ok_or_else(|| {
OperationError::InvalidAccountState("Missing attribute: name".to_string())
})?;
let uuid = value.get_uuid();
let displayname = value
.get_ava_single_utf8("displayname")
.map(|s| s.to_string())
.ok_or_else(|| {
OperationError::InvalidAccountState("Missing attribute: displayname".to_string())
})?;
let groups = Group::try_from_account_entry_red_ro(value, qs)?;
let valid_from = value.get_ava_single_datetime("account_valid_from");
let expire = value.get_ava_single_datetime("account_expire");
Ok(RadiusAccount {
name,
displayname,
uuid,
groups,
radius_secret,
valid_from,
expire,
})
}
fn is_within_valid_time(&self, ct: Duration) -> bool {
let cot = OffsetDateTime::unix_epoch() + ct;
let vmin = if let Some(vft) = &self.valid_from {
vft < &cot
} else {
true
};
let vmax = if let Some(ext) = &self.expire {
&cot < ext
} else {
true
};
vmin && vmax
}
pub(crate) fn to_radiusauthtoken(
&self,
ct: Duration,
) -> Result<RadiusAuthToken, OperationError> {
if !self.is_within_valid_time(ct) {
return Err(OperationError::InvalidAccountState(
"Account Expired".to_string(),
));
}
Ok(RadiusAuthToken {
name: self.name.clone(),
displayname: self.displayname.clone(),
uuid: self.uuid.as_hyphenated().to_string(),
secret: self.radius_secret.clone(),
groups: self.groups.iter().map(|g| g.to_proto()).collect(),
})
}
}