Blob


1 /*
2 * Copyright (c) 2021 Omar Polo <op@omarpolo.com>
3 *
4 * Permission to use, copy, modify, and distribute this software for any
5 * purpose with or without fee is hereby granted, provided that the above
6 * copyright notice and this permission notice appear in all copies.
7 *
8 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
9 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
10 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
11 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
12 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
13 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
14 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
15 */
17 #ifndef KAMID_H
18 #define KAMID_H
20 #include <limits.h>
21 #include <stdint.h>
22 #include <tls.h>
24 /* TODO: make these customizable */
25 #define KD_CONF_FILE "/etc/kamid.conf"
26 #define KD_USER "_kamid"
27 #define KD_SOCKET "/var/run/kamid.sock"
29 #define IMSG_DATA_SIZE(imsg) ((imsg).hdr.len - IMSG_HEADER_SIZE)
31 enum imsg_type {
32 IMSG_NONE,
33 IMSG_CTL_LOG_VERBOSE,
34 IMSG_CTL_RELOAD,
35 IMSG_CTL_DEBUG,
36 IMSG_CTL_DEBUG_BACK, /* kd_debug_info */
37 IMSG_CTL_DEBUG_END,
38 IMSG_STARTUP,
39 IMSG_RECONF_CONF,
40 IMSG_RECONF_PKI,
41 IMSG_RECONF_PKI_CERT,
42 IMSG_RECONF_PKI_KEY,
43 IMSG_RECONF_LISTEN,
44 IMSG_RECONF_END,
45 IMSG_AUTH, /* kd_auth_proc */
46 IMSG_AUTH_TLS, /* kd_auth_req */
47 IMSG_CONN_GONE,
48 IMSG_BUF,
49 IMSG_MSIZE,
50 IMSG_CLOSE,
51 };
53 struct kd_options_conf {
54 /* ... */
55 };
57 struct table;
59 #define L_NONE 0x0
60 #define L_TLS 0x1
61 struct kd_listen_conf {
62 STAILQ_ENTRY(kd_listen_conf) entry;
63 uint32_t id;
64 uint32_t flags;
65 int fd;
66 char iface[LINE_MAX];
67 uint16_t port;
69 /* certificate hash => (virtual) user */
70 struct table *auth_table;
72 /* virtual user => local user */
73 struct table *virtual_table;
75 /* (virtual) user => export directory */
76 struct table *userdata_table;
78 char pki[LINE_MAX];
79 struct event ev;
80 struct tls *ctx;
81 };
83 struct kd_pki_conf {
84 STAILQ_ENTRY(kd_pki_conf) entry;
85 char name[LINE_MAX];
86 uint8_t *cert;
87 size_t certlen;
88 uint8_t *key;
89 size_t keylen;
90 struct tls_config *tlsconf;
91 };
93 struct kd_tables_conf {
94 STAILQ_ENTRY(kd_tables_conf) entry;
95 struct table *table;
96 };
98 struct kd_conf {
99 struct kd_options_conf kd_options;
100 STAILQ_HEAD(kd_pki_conf_head, kd_pki_conf) pki_head;
101 STAILQ_HEAD(kd_tables_conf_head, kd_tables_conf) table_head;
102 STAILQ_HEAD(kd_listen_conf_head, kd_listen_conf) listen_head;
103 };
105 struct kd_auth_req {
106 uint32_t listen_id;
107 char hash[128+1];
108 };
110 struct kd_auth_proc {
111 char uname[LOGIN_NAME_MAX];
112 char dir[PATH_MAX];
113 };
115 struct kd_debug_info {
116 uint32_t client_id;
117 uint32_t fid;
118 char path[NAME_MAX];
119 };
121 /* kamid.c */
122 extern int verbose;
123 int main_reload(void);
124 int main_imsg_compose_listener(int, int, uint32_t, const void *, uint16_t);
125 void merge_config(struct kd_conf *, struct kd_conf *);
127 struct kd_conf *config_new_empty(void);
128 void config_clear(struct kd_conf *);
130 /* parse.y */
131 struct kd_conf *parse_config(const char *);
132 int cmdline_symset(char *);
133 void clear_config(struct kd_conf *);
135 #endif