/* walled garden */
-char const *cvs_id = "$Id: garden.c,v 1.20 2004/12/16 08:49:53 bodea Exp $";
+char const *cvs_id = "$Id: garden.c,v 1.21 2005/03/10 03:31:25 bodea Exp $";
int plugin_api_version = PLUGIN_API_VERSION;
static struct pluginfuncs *p = 0;
#define F_GARDEN 1
#define F_CLEANUP 2
-int garden_session(sessiont *s, int flag);
+int garden_session(sessiont *s, int flag, char *newuser);
int plugin_post_auth(struct param_post_auth *data)
{
return PLUGIN_RET_OK; // Slaves don't do walled garden processing.
if (data->s->walled_garden)
- garden_session(data->s, F_GARDEN);
+ garden_session(data->s, F_GARDEN, 0);
return PLUGIN_RET_OK;
}
return PLUGIN_RET_OK; // Slaves don't do walled garden processing.
if (data->s->walled_garden)
- garden_session(data->s, F_CLEANUP);
+ garden_session(data->s, F_CLEANUP, 0);
return PLUGIN_RET_OK;
}
char *plugin_control_help[] = {
" garden USER|SID Put user into the walled garden",
- " ungarden SID Release session from garden",
+ " ungarden SID [USER] Release session from garden",
0
};
flag = data->argv[0][0] == 'g' ? F_GARDEN : F_UNGARDEN;
- if (data->argc != 2)
+ if (data->argc < 2 || data->argc > 3 || (data->argc > 2 && flag == F_GARDEN))
{
data->response = NSCTL_RES_ERR;
- data->additional = "one argument required: username or session id";
+ data->additional = flag == F_GARDEN
+ ? "requires username or session id"
+ : "requires session id and optional username";
+
return PLUGIN_RET_STOP;
}
return PLUGIN_RET_STOP;
}
- garden_session(s, flag);
+ garden_session(s, flag, data->argc > 2 ? data->argv[2] : 0);
p->session_changed(session);
data->response = NSCTL_RES_OK;
int plugin_new_session_master(sessiont *s)
{
if (s->walled_garden)
- garden_session(s, F_GARDEN);
+ garden_session(s, F_GARDEN, 0);
return PLUGIN_RET_OK;
}
-int garden_session(sessiont *s, int flag)
+int garden_session(sessiont *s, int flag, char *newuser)
{
char cmd[2048];
sessionidt sess;
// Normal User
p->log(2, sess, s->tunnel, "Un-Garden user %s (%s)\n", s->user, p->fmtaddr(htonl(s->ip), 0));
+ if (newuser)
+ {
+ snprintf(s->user, MAXUSER, "%s", newuser);
+ p->log(2, sess, s->tunnel, " Setting username to %s\n", s->user);
+ }
+
// Kick off any duplicate usernames
// but make sure not to kick off ourself
if (s->ip && !s->die && (other = p->get_session_by_username(s->user)) && s != p->get_session_by_id(other)) {
// L2TPNS Global Stuff
-// $Id: l2tpns.h,v 1.57 2005/02/14 06:58:39 bodea Exp $
+// $Id: l2tpns.h,v 1.58 2005/03/10 03:31:25 bodea Exp $
#ifndef __L2TPNS_H__
#define __L2TPNS_H__
#define MAXCONTROL 1000 // max length control message we ever send...
#define MAXETHER (1500+18) // max packet we try sending to tun
#define MAXTEL 96 // telephone number
+#define MAXUSER 128 // username
+#define MAXPASS 128 // password
#define MAXPLUGINS 20 // maximum number of plugins to load
#define MAXRADSERVER 10 // max radius servers
#define MAXROUTE 10 // max static routes per session
uint8_t flags1; // additional flags (currently unused);
char random_vector[MAXTEL];
int random_vector_length;
- char user[129]; // user (needed in seesion for radius stop messages) (can we reduce this? --mo)
+ char user[MAXUSER]; // user (needed in seesion for radius stop messages)
char called[MAXTEL]; // called number
char calling[MAXTEL]; // calling number
uint32_t tx_connect_speed;