Blob


1 /*
2 * Copyright (c) 2021 Omar Polo <op@omarpolo.com>
3 *
4 * Permission to use, copy, modify, and distribute this software for any
5 * purpose with or without fee is hereby granted, provided that the above
6 * copyright notice and this permission notice appear in all copies.
7 *
8 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
9 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
10 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
11 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
12 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
13 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
14 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
15 */
17 #ifndef KAMID_H
18 #define KAMID_H
20 #include <limits.h>
21 #include <stdint.h>
22 #include <tls.h>
24 /* TODO: make these customizable */
25 #define KD_CONF_FILE "/etc/kamid.conf"
26 #define KD_USER "_kamid"
27 #define KD_SOCKET "/var/run/kamid.sock"
29 #define IMSG_DATA_SIZE(imsg) ((imsg).hdr.len - IMSG_HEADER_SIZE)
31 enum imsg_type {
32 IMSG_NONE,
33 IMSG_CTL_LOG_VERBOSE,
34 IMSG_CTL_RELOAD,
35 IMSG_STARTUP,
36 IMSG_RECONF_CONF,
37 IMSG_RECONF_PKI,
38 IMSG_RECONF_PKI_CERT,
39 IMSG_RECONF_PKI_KEY,
40 IMSG_RECONF_LISTEN,
41 IMSG_RECONF_END,
42 IMSG_AUTH, /* kd_auth_proc */
43 IMSG_AUTH_TLS, /* kd_auth_req */
44 IMSG_CONN_GONE,
45 IMSG_BUF,
46 IMSG_MSIZE,
47 IMSG_CLOSE,
48 };
50 struct kd_options_conf {
51 /* ... */
52 };
54 struct table;
56 #define L_NONE 0x0
57 #define L_TLS 0x1
58 struct kd_listen_conf {
59 STAILQ_ENTRY(kd_listen_conf) entry;
60 uint32_t id;
61 uint32_t flags;
62 int fd;
63 char iface[LINE_MAX];
64 uint16_t port;
66 /* certificate hash => (virtual) user */
67 struct table *auth_table;
69 /* virtual user => local user */
70 struct table *virtual_table;
72 /* (virtual) user => export directory */
73 struct table *userdata_table;
75 char pki[LINE_MAX];
76 struct event ev;
77 struct tls *ctx;
78 };
80 struct kd_pki_conf {
81 STAILQ_ENTRY(kd_pki_conf) entry;
82 char name[LINE_MAX];
83 uint8_t *cert;
84 size_t certlen;
85 uint8_t *key;
86 size_t keylen;
87 struct tls_config *tlsconf;
88 };
90 struct kd_tables_conf {
91 STAILQ_ENTRY(kd_tables_conf) entry;
92 struct table *table;
93 };
95 struct kd_conf {
96 struct kd_options_conf kd_options;
97 STAILQ_HEAD(kd_pki_conf_head, kd_pki_conf) pki_head;
98 STAILQ_HEAD(kd_tables_conf_head, kd_tables_conf) table_head;
99 STAILQ_HEAD(kd_listen_conf_head, kd_listen_conf) listen_head;
100 };
102 struct kd_auth_req {
103 uint32_t listen_id;
104 char hash[128+1];
105 };
107 struct kd_auth_proc {
108 char uname[LOGIN_NAME_MAX];
109 char dir[PATH_MAX];
110 };
112 /* kamid.c */
113 extern int verbose;
114 int main_reload(void);
115 int main_imsg_compose_listener(int, int, uint32_t, const void *, uint16_t);
116 void merge_config(struct kd_conf *, struct kd_conf *);
118 struct kd_conf *config_new_empty(void);
119 void config_clear(struct kd_conf *);
121 /* parse.y */
122 struct kd_conf *parse_config(const char *);
123 int cmdline_symset(char *);
125 #endif