aboutsummaryrefslogtreecommitdiff
path: root/Makefile
AgeCommit message (Collapse)Author
2024-08-03prepare release 2.12.1Omar Polo
2024-06-17sync .d includes and DISTFILESOmar Polo
2024-06-17add support for the proxy protocol v1Christoph Liebender
This allows to use proxies like nginx or haproxy in front of gmid and still have the correct information about the originating client. This will need explicit opt-in via the `proxy-v1' listen flag which will be added in a follow-up commit. Merges https://github.com/omar-polo/gmid/pull/30
2024-06-10alignOmar Polo
2024-01-24change the default PUBKEY for the verify-release targetOmar Polo
doesn't play well with minor releases such as 2.0.1 since for them I reuse the 2.0 key.
2024-01-11install titan tooOmar Polo
while here, sort the binaries and the manpages by section and name.
2024-01-10fix release target; add verify-releaseOmar Polo
2024-01-10add signify pubkeysOmar Polo
2024-01-10fix SRCS and DISTFILES; forgot iri.h, landlock is long goneOmar Polo
2023-10-18`make lint' to check titan.1 tooOmar Polo
2023-10-14pass LDFLAGS before LIBSOmar Polo
2023-08-23remove configure.local{,.example}Omar Polo
unused, un-updated and ignored for quite some time now.
2023-08-23resurrect landlock supportOmar Polo
this time targetting ABI level 3; partially based on how claudio@ handled it in rpki-client. Fun how this bit of code has come full circle (gmid inspired what I wrote for got, which inspired what was written for rpki-client, which has come back.)
2023-08-23bundle libtlsOmar Polo
gmid (like all other daemons that want to do privsep crypto) has a very close relationship with libtls and need to stay in sync with it. OpenBSD' libtls was recently changed to use OpenSSL' EC_KEY_METHOD instead of the older ECDSA_METHOD, on the gmid side we have to do the same otherwise failures happens at runtime. In a similar manner, privsep crypto is silently broken in the current libretls (next version should fix it.) The proper solution would be to complete the signer APIs so that applications don't need to dive into the library' internals, but that's a mid-term goal, for the immediate bundling the 'little' libtls is the lesser evil. The configure script has gained a new (undocumented for the time being) flag `--with-libtls=bundled|system' to control which libtls to use. It defaults to `bundled' except for OpenBSD where it uses the `system' one. Note that OpenBSD versions before 7.3 (inclusive) ought to use --with-libtls=bundled too since they still do ECDSA_METHOD.
2023-08-22sync DISTFILESOmar Polo
2023-08-03two more missing ge -> gemexpOmar Polo
2023-07-25rename ge -> gemexpOmar Polo
gemserv is already taken...
2023-07-25add missing -include titan.dOmar Polo
2023-07-22add titan(1) -- a draft titan clientOmar Polo
2023-06-24there's no more any `static' targetOmar Polo
2023-06-24add a `lint' maintainer target to check the manpagesOmar Polo
2023-06-23use REGRESS_HOST to specify the host to listen to; use in CIOmar Polo
some CI envs don't like `listen on localhost' but tolerate INADDR_ANY or IN6ADDR_ANY_INIT.
2023-06-23add missing -include of *.d filesOmar Polo
2023-06-14add `release' targetOmar Polo
2023-06-13rework the configure scriptOmar Polo
now it resembles less oconfigure and more the configure scripts I'm using in my recent projects. I'd argue it's more easy to use it.
2023-06-11add a privsep crypto engineOmar Polo
Incorporate the OpenSMTPD' privsep crypto engine. The idea behind it is to never load the certificate' private keys in a networked process, instead they are loaded in a separate process (the `crypto' one) which signs payloads on the behalf of the server processes. This way, we greatly reduce the risk of leaking the certificate' private key should the server process be compromised. This currently compiles only on LibreSSL (portable fix is in the way).
2023-06-08move logger() prototype to gmid.h and delete logger.hOmar Polo
2023-06-08make ge work againOmar Polo
2023-06-08sync DISTFILESOmar Polo
2023-06-08use -MMD if the compiler supports itOmar Polo
it's better than the previous Makefile.depend approach since this automatically adapts to the included headers without requiring manual intervention to regen the list.
2023-06-08remove Makefile.dependOmar Polo
2023-06-08reformatOmar Polo
2023-06-08rework the daemon to do fork+execOmar Polo
It uses the 'common' proc.c from various OpenBSD-daemons. gmid grew organically bit by bit and it was also the first place where I tried to implement privsep. It wasn't done very well, in fact the parent process (that retains root privileges) just fork()s a generation of servers, all sharing *exactly* the same address space. No good! Now, we fork() and re-exec() ourselves, so that each process has a fresh address space. Some features (require client ca for example) are temporarly disabled, will be fixed in subsequent commits. The "ge" program is also temporarly disabled as it needs tweaks to do privsep too.
2023-06-06switch to the more usual log.cOmar Polo
2023-06-06rename log.[ch] to logger.[ch]Omar Polo
2023-06-06move config-related code to config.cOmar Polo
reuse it in ge too.
2023-06-05+log.hOmar Polo
2023-05-08add tags targetOmar Polo
2023-05-08drop landlock/seccomp and capsicum supportOmar Polo
it reached a point where this stuff is not maintenable. I'd like to move forward with gmid, but the restriction of capsicum and the linux environment at large that make landlock unusable (how can you resolve DNS portably when under landlock?) -and don't get me started on seccomp- makes it impossible for me to do any work. So, I prefer removing the crap, resuming working on gmid by cleaning stuff and consolidating the features, improving various things etc... and then eventually see how to introduce some sandboxing again on other systems. Patches to resume sandboxing are, as always, welcome!
2022-10-31rework `make dist'Omar Polo
2022-09-10update dependsOmar Polo
2022-09-08adjust install/uninstall targetOmar Polo
gmid.1 was moved as gmid.8 and now we have `ge' too
2022-09-07add ge: gemini export!Omar Polo
2022-09-06get rid of the CGI supportOmar Polo
I really want to get rid of the `executor' process hack for CGI scripts and its escalation to allow fastcgi and proxying to work on non-OpenBSD. This drops the CGI support and the `executor' process entirely and is the first step towards gmid 2.0. It also allows to have more secure defaults. On non-OpenBSD systems this means that the sandbox will be deactivated as soon as fastcgi or proxying are used: you can't open sockets under FreeBSD' capsicum(4) and I don't want to go thru the pain of making it work under linux' seccomp/landlock. Patches are always welcome however. For folks using CGI scripts (hey, I'm one of you!) not all hope is lost: fcgiwrap or OpenBSD' slowcgi(8) are ways to run CGI scripts as they were FastCGI applications. fixes for the documentation and to the non-OpenBSD sandboxes will follow.
2022-07-07include contrib/ in distAnna “CyberTailor”
2022-07-04add missing manpage for gg1.8.4Omar Polo
2022-07-04typoOmar Polo
2022-07-04include Makefile.depend tooOmar Polo
2022-07-04refactor the makefile / configureOmar Polo
steal more (good) stuff from mandoc-portable :)
2022-07-04the install target ought to depend on gg tooOmar Polo