Blob


1 /*
2 * Copyright (c) 2021 Omar Polo <op@omarpolo.com>
3 *
4 * Permission to use, copy, modify, and distribute this software for any
5 * purpose with or without fee is hereby granted, provided that the above
6 * copyright notice and this permission notice appear in all copies.
7 *
8 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
9 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
10 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
11 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
12 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
13 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
14 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
15 */
17 #ifndef KAMID_H
18 #define KAMID_H
20 #include <limits.h>
21 #include <stdint.h>
22 #include <tls.h>
24 /* TODO: make these customizable */
25 #define KD_CONF_FILE "/etc/kamid.conf"
26 #define KD_USER "_kamid"
27 #define KD_SOCKET "/var/run/kamid.sock"
29 #define IMSG_DATA_SIZE(imsg) ((imsg).hdr.len - IMSG_HEADER_SIZE)
31 enum imsg_type {
32 IMSG_NONE,
33 IMSG_CTL_LOG_VERBOSE,
34 IMSG_CTL_RELOAD,
35 IMSG_CONTROLFD,
36 IMSG_STARTUP,
37 IMSG_RECONF_CONF,
38 IMSG_RECONF_PKI,
39 IMSG_RECONF_PKI_CERT,
40 IMSG_RECONF_PKI_KEY,
41 IMSG_RECONF_LISTEN,
42 IMSG_RECONF_END,
43 IMSG_AUTH, /* kd_auth_proc */
44 IMSG_AUTH_TLS, /* kd_auth_req */
45 IMSG_CONN_GONE,
46 IMSG_BUF,
47 IMSG_MSIZE,
48 IMSG_CLOSE,
49 };
51 struct kd_options_conf {
52 /* ... */
53 };
55 struct table;
57 #define L_NONE 0x0
58 #define L_TLS 0x1
59 struct kd_listen_conf {
60 STAILQ_ENTRY(kd_listen_conf) entry;
61 uint32_t id;
62 uint32_t flags;
63 int fd;
64 char iface[LINE_MAX];
65 uint16_t port;
67 /* certificate hash => (virtual) user */
68 struct table *auth_table;
70 /* virtual user => local user */
71 struct table *virtual_table;
73 /* (virtual) user => export directory */
74 struct table *userdata_table;
76 char pki[LINE_MAX];
77 struct event ev;
78 struct tls *ctx;
79 };
81 struct kd_pki_conf {
82 STAILQ_ENTRY(kd_pki_conf) entry;
83 char name[LINE_MAX];
84 uint8_t *cert;
85 size_t certlen;
86 uint8_t *key;
87 size_t keylen;
88 struct tls_config *tlsconf;
89 };
91 struct kd_tables_conf {
92 STAILQ_ENTRY(kd_tables_conf) entry;
93 struct table *table;
94 };
96 struct kd_conf {
97 struct kd_options_conf kd_options;
98 STAILQ_HEAD(kd_pki_conf_head, kd_pki_conf) pki_head;
99 STAILQ_HEAD(kd_tables_conf_head, kd_tables_conf) table_head;
100 STAILQ_HEAD(kd_listen_conf_head, kd_listen_conf) listen_head;
101 };
103 struct kd_auth_req {
104 uint32_t listen_id;
105 char hash[128+1];
106 };
108 struct kd_auth_proc {
109 char uname[LOGIN_NAME_MAX];
110 char dir[PATH_MAX];
111 };
113 /* kamid.c */
114 extern int verbose;
115 int main_imsg_compose_listener(int, int, uint32_t, const void *, uint16_t);
116 void merge_config(struct kd_conf *, struct kd_conf *);
118 struct kd_conf *config_new_empty(void);
119 void config_clear(struct kd_conf *);
121 /* parse.y */
122 struct kd_conf *parse_config(const char *);
123 int cmdline_symset(char *);
125 #endif