• Joined on 2025-12-13
uppal synced commits to master at uppal/cgrates from mirror 2026-01-09 18:10:00 +05:00
fe4d8b5924 radagent: check CHAP-Challenge AVP for CHAP auth
d73e9c0803 radagent: use MS-CHAP2-Response for MSCHAPv2
Compare 2 commits »
uppal synced commits to master at uppal/cgrates from mirror 2026-01-08 01:19:59 +05:00
63d36568dc update go-diameter library
uppal synced commits to master at uppal/cgrates from mirror 2026-01-07 00:49:58 +05:00
d41044af3c ips: add basic functionality integration test
55426255b2 ips: add radius IPAM integration test
6695db8df7 updated GetActions api to return negative destinations
Compare 3 commits »
uppal pushed to main at uppal/cgrates-radius 2025-12-24 22:18:22 +05:00
39a45a2151 fixes
uppal pushed to main at uppal/cgrates-radius 2025-12-24 09:16:49 +05:00
5346aad6fb cleanup
uppal pushed to main at uppal/cgrates-radius 2025-12-24 09:09:16 +05:00
2acf4636bb Match exact CGRateS oldtutorial PAP auth pattern
uppal pushed to main at uppal/cgrates-radius 2025-12-24 08:59:33 +05:00
b6c12a5e36 Fix attribute path: use *req.Password like CGRateS tutorial
uppal pushed to main at uppal/cgrates-radius 2025-12-24 08:56:20 +05:00
41847a0793 Fix filter to match User-Name instead of Account
uppal pushed to main at uppal/cgrates-radius 2025-12-24 00:26:13 +05:00
cab4ca64fb Setup PAP auth exactly like CGRateS test configuration
uppal pushed to main at uppal/cgrates-radius 2025-12-23 23:33:23 +05:00
0d78fcf681 Switch to authorization-only approach (like sample config)
uppal pushed to main at uppal/cgrates-radius 2025-12-23 23:32:13 +05:00
8e7894cd30 Simplify: Single PAP auth processor with hardcoded password
uppal pushed to main at uppal/cgrates-radius 2025-12-23 23:31:10 +05:00
d2068924c9 Fix: Add *none request type flag to AuthGetPassword processor
uppal pushed to main at uppal/cgrates-radius 2025-12-23 23:30:03 +05:00
9c21307ad3 Add proper PAP authentication with *strip fix for null padding
uppal pushed to main at uppal/cgrates-radius 2025-12-23 23:24:08 +05:00
dd335be7f5 Bypass auth with *none flag - workaround for PAP null-padding bug
uppal pushed to main at uppal/cgrates-radius 2025-12-23 23:21:27 +05:00
11ee815a44 Simplify PAP auth - hardcode password to test basic flow
uppal pushed to main at uppal/cgrates-radius 2025-12-23 23:20:15 +05:00
03f47078de Use *message flag instead of *dry_run for attributes fetch
uppal pushed to main at uppal/cgrates-radius 2025-12-23 23:15:28 +05:00
ca09317856 Simplify to PAP authentication only for initial testing
uppal pushed to main at uppal/cgrates-radius 2025-12-23 21:13:42 +05:00
f6bcdccf9c Workaround CGRateS MS-CHAPv2 bug - use *event instead of *radauth
uppal pushed to main at uppal/cgrates-radius 2025-12-23 21:08:55 +05:00
918e9c8cff Simplify MS-CHAPv2 auth - remove accounts check that requires MaxUsage
uppal pushed to main at uppal/cgrates-radius 2025-12-23 21:07:08 +05:00
dfb925494c Implement proper MS-CHAPv2 authentication for MikroTik PPPoE