root/usr.sbin/httpd/config.c
/*      $OpenBSD: config.c,v 1.69 2026/03/02 19:24:58 rsadowski Exp $   */

/*
 * Copyright (c) 2011 - 2015 Reyk Floeter <reyk@openbsd.org>
 *
 * Permission to use, copy, modify, and distribute this software for any
 * purpose with or without fee is hereby granted, provided that the above
 * copyright notice and this permission notice appear in all copies.
 *
 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
 */

#include <sys/types.h>
#include <sys/queue.h>
#include <sys/socket.h>
#include <sys/un.h>
#include <sys/tree.h>
#include <sys/time.h>
#include <sys/uio.h>

#include <unistd.h>
#include <stdlib.h>
#include <stdio.h>
#include <string.h>
#include <imsg.h>

#include "httpd.h"
#include "log.h"

int      config_getserver_config(struct httpd *, struct server *,
            struct imsg *);
int      config_getserver_auth(struct httpd *, struct server_config *);

int
config_init(struct httpd *env)
{
        struct privsep  *ps = env->sc_ps;
        unsigned int     what;

        /* Global configuration */
        if (privsep_process == PROC_PARENT)
                env->sc_prefork_server = SERVER_NUMPROC;

        ps->ps_what[PROC_PARENT] = CONFIG_ALL;
        ps->ps_what[PROC_SERVER] =
            CONFIG_SERVERS|CONFIG_MEDIA|CONFIG_AUTH;
        ps->ps_what[PROC_LOGGER] = CONFIG_SERVERS;

        (void)strlcpy(env->sc_errdocroot, "",
            sizeof(env->sc_errdocroot));

        /* Other configuration */
        what = ps->ps_what[privsep_process];

        if (what & CONFIG_SERVERS) {
                if ((env->sc_servers =
                    calloc(1, sizeof(*env->sc_servers))) == NULL)
                        return (-1);
                TAILQ_INIT(env->sc_servers);
        }

        if (what & CONFIG_MEDIA) {
                if ((env->sc_mediatypes =
                    calloc(1, sizeof(*env->sc_mediatypes))) == NULL)
                        return (-1);
                RB_INIT(env->sc_mediatypes);
        }

        if (what & CONFIG_AUTH) {
                if ((env->sc_auth =
                    calloc(1, sizeof(*env->sc_auth))) == NULL)
                        return (-1);
                TAILQ_INIT(env->sc_auth);
        }

        return (0);
}

void
config_purge(struct httpd *env, unsigned int reset)
{
        struct privsep          *ps = env->sc_ps;
        struct server           *srv;
        struct auth             *auth;
        unsigned int             what;

        what = ps->ps_what[privsep_process] & reset;

        if (what & CONFIG_SERVERS && env->sc_servers != NULL) {
                while ((srv = TAILQ_FIRST(env->sc_servers)) != NULL)
                        server_purge(srv);
        }

        if (what & CONFIG_MEDIA && env->sc_mediatypes != NULL)
                media_purge(env->sc_mediatypes);

        if (what & CONFIG_AUTH && env->sc_auth != NULL) {
                while ((auth = TAILQ_FIRST(env->sc_auth)) != NULL) {
                        auth_free(env->sc_auth, auth);
                        free(auth);
                }
        }
}

int
config_setreset(struct httpd *env, unsigned int reset)
{
        struct privsep  *ps = env->sc_ps;
        int              id;

        for (id = 0; id < PROC_MAX; id++) {
                if ((reset & ps->ps_what[id]) == 0 ||
                    id == privsep_process)
                        continue;
                proc_compose(ps, id, IMSG_CTL_RESET,
                    &reset, sizeof(reset));
        }

        return (0);
}

int
config_getreset(struct httpd *env, struct imsg *imsg)
{
        unsigned int     mode;

        IMSG_SIZE_CHECK(imsg, &mode);
        memcpy(&mode, imsg->data, sizeof(mode));

        config_purge(env, mode);

        return (0);
}

int
config_getcfg(struct httpd *env, struct imsg *imsg)
{
        struct ctl_flags         cf;

        if (IMSG_DATA_SIZE(imsg) != sizeof(cf))
                return (0); /* ignore */

        /* Update runtime flags */
        memcpy(&cf, imsg->data, sizeof(cf));
        env->sc_opts = cf.cf_opts;
        env->sc_flags = cf.cf_flags;
        memcpy(env->sc_tls_sid, cf.cf_tls_sid, sizeof(env->sc_tls_sid));

        if (privsep_process != PROC_PARENT)
                proc_compose(env->sc_ps, PROC_PARENT,
                    IMSG_CFG_DONE, NULL, 0);

        return (0);
}

/*
 * struct server_config is an internal data structure
 * in privileged compartment containing both data and
 * pointers, which is dangerously copied as a whole.
 *
 * This helper function clears all the pointer
 * fields in struct server_config while preserving
 * other data, avoiding pointers being accidentally
 * send to unprivileged compartments, breaking
 * inter-compartment ASLR.
 */
static void
clear_config_server_ptrs(struct server_config *cfg)
{
        cfg->default_type.media_encoding = NULL;

        /* clear all fields expanded from RB_ENTRY */
        memset(&cfg->default_type.media_entry, 0,
            sizeof(cfg->default_type.media_entry));

        cfg->tls_ca = NULL;
        cfg->tls_ca_file = NULL;
        cfg->tls_cert = NULL;
        cfg->tls_cert_file = NULL;
        cfg->tls_crl = NULL;
        cfg->tls_crl_file = NULL;
        cfg->tls_key = NULL;
        cfg->tls_key_file = NULL;
        cfg->tls_ocsp_staple = NULL;
        cfg->tls_ocsp_staple_file = NULL;

        cfg->logaccess = NULL;
        cfg->logerror = NULL;
        cfg->auth = NULL;
        cfg->return_uri = NULL;

        /* clear TAILQ_HEAD */
        memset(&cfg->fcgiparams, 0, sizeof(cfg->fcgiparams));

        /* clear TAILQ_ENTRY */
        memset(&cfg->entry, 0, sizeof(cfg->entry));
}

int
config_setserver(struct httpd *env, struct server *srv)
{
        struct privsep          *ps = env->sc_ps;
        struct server_config     s;
        int                      id;
        int                      fd, n, m;
        struct iovec             iov[6];
        size_t                   c;
        unsigned int             what;

        /* opens listening sockets etc. */
        if (server_privinit(srv) == -1)
                return (-1);

        for (id = 0; id < PROC_MAX; id++) {
                what = ps->ps_what[id];

                if ((what & CONFIG_SERVERS) == 0 || id == privsep_process)
                        continue;

                DPRINTF("%s: sending %s \"%s[%u]\" to %s fd %d", __func__,
                    (srv->srv_conf.flags & SRVFLAG_LOCATION) ?
                    "location" : "server",
                    srv->srv_conf.name, srv->srv_conf.id,
                    ps->ps_title[id], srv->srv_s);

                memcpy(&s, &srv->srv_conf, sizeof(s));

                /* since s is a local, it is safe to clear its pointers directly */
                clear_config_server_ptrs(&s); 

                c = 0;
                iov[c].iov_base = &s;
                iov[c++].iov_len = sizeof(s);
                if (srv->srv_conf.return_uri_len != 0) {
                        iov[c].iov_base = srv->srv_conf.return_uri;
                        iov[c++].iov_len = srv->srv_conf.return_uri_len;
                }

                if (id == PROC_SERVER &&
                    (srv->srv_conf.flags & SRVFLAG_LOCATION) == 0) {
                        /* XXX imsg code will close the fd after 1st call */
                        n = -1;
                        proc_range(ps, id, &n, &m);
                        for (n = 0; n < m; n++) {
                                if (srv->srv_s == -1)
                                        fd = -1;
                                else if ((fd = dup(srv->srv_s)) == -1)
                                        return (-1);
                                if (proc_composev_imsg(ps, id, n,
                                    IMSG_CFG_SERVER, -1, fd, iov, c) != 0) {
                                        log_warn("%s: failed to compose "
                                            "IMSG_CFG_SERVER imsg for `%s'",
                                            __func__, srv->srv_conf.name);
                                        return (-1);
                                }

                                /* Prevent fd exhaustion in the parent. */
                                if (proc_flush_imsg(ps, id, n) == -1) {
                                        log_warn("%s: failed to flush "
                                            "IMSG_CFG_SERVER imsg for `%s'",
                                            __func__, srv->srv_conf.name);
                                        return (-1);
                                }
                        }

                        /* Configure TLS if necessary. */
                        config_setserver_tls(env, srv);
                } else {
                        if (proc_composev(ps, id, IMSG_CFG_SERVER,
                            iov, c) != 0) {
                                log_warn("%s: failed to compose "
                                    "IMSG_CFG_SERVER imsg for `%s'",
                                    __func__, srv->srv_conf.name);
                                return (-1);
                        }

                        /* Configure FCGI parameters if necessary. */
                        config_setserver_fcgiparams(env, srv);
                }
        }

        /* Close server socket early to prevent fd exhaustion in the parent. */
        if (srv->srv_s != -1) {
                close(srv->srv_s);
                srv->srv_s = -1;
        }

        explicit_bzero(&srv->srv_conf.tls_ticket_key,
            sizeof(srv->srv_conf.tls_ticket_key));

        return (0);
}

static int
config_settls(struct httpd *env, struct server *srv, enum tls_config_type type,
    const char *label, uint8_t *data, size_t len)
{
        struct privsep          *ps = env->sc_ps;
        struct server_config    *srv_conf = &srv->srv_conf;
        struct tls_config        tls;
        struct iovec             iov[2];
        size_t                   c;

        if (data == NULL || len == 0)
                return (0);

        DPRINTF("%s: sending tls %s for \"%s[%u]\" to %s fd %d", __func__,
            label, srv_conf->name, srv_conf->id, ps->ps_title[PROC_SERVER],
            srv->srv_s);

        memset(&tls, 0, sizeof(tls));
        tls.id = srv_conf->id;
        tls.tls_type = type;
        tls.tls_len = len;
        tls.tls_chunk_offset = 0;

        while (len > 0) {
                tls.tls_chunk_len = len;
                if (tls.tls_chunk_len > (MAX_IMSG_DATA_SIZE - sizeof(tls)))
                        tls.tls_chunk_len = MAX_IMSG_DATA_SIZE - sizeof(tls);

                c = 0;
                iov[c].iov_base = &tls;
                iov[c++].iov_len = sizeof(tls);
                iov[c].iov_base = data;
                iov[c++].iov_len = tls.tls_chunk_len;

                if (proc_composev(ps, PROC_SERVER, IMSG_CFG_TLS, iov, c) != 0) {
                        log_warn("%s: failed to compose IMSG_CFG_TLS imsg for "
                            "`%s'", __func__, srv_conf->name);
                        return (-1);
                }

                tls.tls_chunk_offset += tls.tls_chunk_len;
                data += tls.tls_chunk_len;
                len -= tls.tls_chunk_len;
        }

        return (0);
}

int
config_getserver_fcgiparams(struct httpd *env, struct imsg *imsg)
{
        struct server           *srv;
        struct server_config    *srv_conf, *iconf;
        struct fastcgi_param    *fp;
        uint32_t                 id;
        size_t                   c, nc, len;
        uint8_t                 *p = imsg->data;

        len = sizeof(nc) + sizeof(id);
        if (IMSG_DATA_SIZE(imsg) < len) {
                log_debug("%s: invalid message length", __func__);
                return (-1);
        }

        memcpy(&nc, p, sizeof(nc));     /* number of params */
        p += sizeof(nc);

        memcpy(&id, p, sizeof(id));     /* server conf id */
        srv_conf = serverconfig_byid(id);
        p += sizeof(id);

        len += nc*sizeof(*fp);
        if (IMSG_DATA_SIZE(imsg) < len) {
                log_debug("%s: invalid message length", __func__);
                return (-1);
        }

        /* Find associated server config */
        TAILQ_FOREACH(srv, env->sc_servers, srv_entry) {
                if (srv->srv_conf.id == id) {
                        srv_conf = &srv->srv_conf;
                        break;
                }
                TAILQ_FOREACH(iconf, &srv->srv_hosts, entry) {
                        if (iconf->id == id) {
                                srv_conf = iconf;
                                break;
                        }
                }
        }

        /* Fetch FCGI parameters */
        for (c = 0; c < nc; c++) {
                if ((fp = calloc(1, sizeof(*fp))) == NULL)
                        fatalx("fcgiparams out of memory");
                memcpy(fp, p, sizeof(*fp));
                TAILQ_INSERT_HEAD(&srv_conf->fcgiparams, fp, entry);

                p += sizeof(*fp);
        }

        return (0);
}

int
config_setserver_fcgiparams(struct httpd *env, struct server *srv)
{
        struct privsep          *ps = env->sc_ps;
        struct server_config    *srv_conf = &srv->srv_conf;
        struct fastcgi_param     *fp;
        struct iovec             *iov;
        size_t                   c = 0, nc = 0;

        DPRINTF("%s: sending fcgiparam for \"%s[%u]\" to %s fd %d", __func__,
            srv_conf->name, srv_conf->id, ps->ps_title[PROC_SERVER],
            srv->srv_s);

        if (TAILQ_EMPTY(&srv_conf->fcgiparams)) /* nothing to do */
                return (0);

        TAILQ_FOREACH(fp, &srv_conf->fcgiparams, entry) {
                nc++;
        }
        if ((iov = calloc(nc + 2, sizeof(*iov))) == NULL)
                return (-1);

        iov[c].iov_base = &nc;                  /* number of params */
        iov[c++].iov_len = sizeof(nc);
        iov[c].iov_base = &srv_conf->id;        /* server config id */
        iov[c++].iov_len = sizeof(srv_conf->id);

        TAILQ_FOREACH(fp, &srv_conf->fcgiparams, entry) {       /* push FCGI params */
                iov[c].iov_base = fp;
                iov[c++].iov_len = sizeof(*fp);
        }
        if (proc_composev(ps, PROC_SERVER, IMSG_CFG_FCGI, iov, c) != 0) {
                log_warn("%s: failed to compose IMSG_CFG_FCGI imsg for "
                    "`%s'", __func__, srv_conf->name);
                free(iov);
                return (-1);
        }
        free(iov);

        return (0);
}

int
config_setserver_tls(struct httpd *env, struct server *srv)
{
        struct server_config    *srv_conf = &srv->srv_conf;

        if ((srv_conf->flags & SRVFLAG_TLS) == 0)
                return (0);

        log_debug("%s: configuring tls for %s", __func__, srv_conf->name);

        if (config_settls(env, srv, TLS_CFG_CA, "ca", srv_conf->tls_ca,
            srv_conf->tls_ca_len) != 0)
                return (-1);

        if (config_settls(env, srv, TLS_CFG_CERT, "cert", srv_conf->tls_cert,
            srv_conf->tls_cert_len) != 0)
                return (-1);

        if (config_settls(env, srv, TLS_CFG_CRL, "crl", srv_conf->tls_crl,
            srv_conf->tls_crl_len) != 0)
                return (-1);

        if (config_settls(env, srv, TLS_CFG_KEY, "key", srv_conf->tls_key,
            srv_conf->tls_key_len) != 0)
                return (-1);

        if (config_settls(env, srv, TLS_CFG_OCSP_STAPLE, "ocsp staple",
            srv_conf->tls_ocsp_staple, srv_conf->tls_ocsp_staple_len) != 0)
                return (-1);

        return (0);
}

int
config_getserver_auth(struct httpd *env, struct server_config *srv_conf)
{
        struct privsep          *ps = env->sc_ps;

        if ((ps->ps_what[privsep_process] & CONFIG_AUTH) == 0 ||
            (srv_conf->flags & SRVFLAG_AUTH) == 0)
                return (0);

        if ((srv_conf->auth = auth_byid(env->sc_auth,
            srv_conf->auth_id)) == NULL)
                return (-1);

        return (0);
}

int
config_getserver_config(struct httpd *env, struct server *srv,
    struct imsg *imsg)
{
#ifdef DEBUG
        struct privsep          *ps = env->sc_ps;
#endif
        struct server_config    *srv_conf, *parent;
        uint8_t                 *p = imsg->data;
        unsigned int             f;
        size_t                   s;

        if ((srv_conf = calloc(1, sizeof(*srv_conf))) == NULL)
                return (-1);

        IMSG_SIZE_CHECK(imsg, srv_conf);
        memcpy(srv_conf, p, sizeof(*srv_conf));
        s = sizeof(*srv_conf);

        /* Reset these variables to avoid free'ing invalid pointers */
        serverconfig_reset(srv_conf);

        if ((IMSG_DATA_SIZE(imsg) - s) < (size_t)srv_conf->return_uri_len) {
                log_debug("%s: invalid message length", __func__);
                goto fail;
        }

        TAILQ_FOREACH(parent, &srv->srv_hosts, entry) {
                if (strcmp(parent->name, srv_conf->name) == 0)
                        break;
        }
        if (parent == NULL)
                parent = &srv->srv_conf;

        if (config_getserver_auth(env, srv_conf) != 0)
                goto fail;

        /*
         * Get variable-length values for the virtual host.  The tls_* ones
         * aren't needed in the virtual hosts unless we implement SNI.
         */
        if (srv_conf->return_uri_len != 0) {
                if ((srv_conf->return_uri = get_data(p + s,
                    srv_conf->return_uri_len)) == NULL)
                        goto fail;
        }

        if (srv_conf->flags & SRVFLAG_LOCATION) {
                /* Inherit configuration from the parent */
                f = SRVFLAG_INDEX|SRVFLAG_NO_INDEX;
                if ((srv_conf->flags & f) == 0) {
                        srv_conf->flags |= parent->flags & f;
                        (void)strlcpy(srv_conf->index, parent->index,
                            sizeof(srv_conf->index));
                }

                f = SRVFLAG_AUTO_INDEX|SRVFLAG_NO_AUTO_INDEX;
                if ((srv_conf->flags & f) == 0)
                        srv_conf->flags |= parent->flags & f;

                f = SRVFLAG_ROOT;
                if ((srv_conf->flags & f) == 0) {
                        srv_conf->flags |= parent->flags & f;
                        (void)strlcpy(srv_conf->root, parent->root,
                            sizeof(srv_conf->root));
                }

                f = SRVFLAG_FCGI|SRVFLAG_NO_FCGI;
                if ((srv_conf->flags & f) == 0)
                        srv_conf->flags |= parent->flags & f;

                f = SRVFLAG_LOG|SRVFLAG_NO_LOG;
                if ((srv_conf->flags & f) == 0) {
                        srv_conf->flags |= parent->flags & f;
                        srv_conf->logformat = parent->logformat;
                }

                f = SRVFLAG_SYSLOG|SRVFLAG_NO_SYSLOG;
                if ((srv_conf->flags & f) == 0)
                        srv_conf->flags |= parent->flags & f;

                f = SRVFLAG_AUTH|SRVFLAG_NO_AUTH;
                if ((srv_conf->flags & f) == 0) {
                        srv_conf->flags |= parent->flags & f;
                        srv_conf->auth = parent->auth;
                        srv_conf->auth_id = parent->auth_id;
                        (void)strlcpy(srv_conf->auth_realm,
                            parent->auth_realm,
                            sizeof(srv_conf->auth_realm));
                }

                f = SRVFLAG_TLS;
                srv_conf->flags |= parent->flags & f;
                srv_conf->tls_flags = parent->tls_flags;

                f = SRVFLAG_ACCESS_LOG;
                if ((srv_conf->flags & f) == 0) {
                        srv_conf->flags |= parent->flags & f;
                        (void)strlcpy(srv_conf->accesslog,
                            parent->accesslog,
                            sizeof(srv_conf->accesslog));
                }

                f = SRVFLAG_ERROR_LOG;
                if ((srv_conf->flags & f) == 0) {
                        srv_conf->flags |= parent->flags & f;
                        (void)strlcpy(srv_conf->errorlog,
                            parent->errorlog,
                            sizeof(srv_conf->errorlog));
                }

                f = SRVFLAG_BLOCK|SRVFLAG_NO_BLOCK;
                if ((srv_conf->flags & f) == 0) {
                        free(srv_conf->return_uri);
                        srv_conf->flags |= parent->flags & f;
                        srv_conf->return_code = parent->return_code;
                        srv_conf->return_uri_len = parent->return_uri_len;
                        if (srv_conf->return_uri_len &&
                            (srv_conf->return_uri =
                            strdup(parent->return_uri)) == NULL)
                                goto fail;
                }

                f = SRVFLAG_DEFAULT_TYPE;
                if ((srv_conf->flags & f) == 0) {
                        srv_conf->flags |= parent->flags & f;
                        memcpy(&srv_conf->default_type,
                            &parent->default_type, sizeof(struct media_type));
                }

                f = SRVFLAG_PATH_REWRITE|SRVFLAG_NO_PATH_REWRITE;
                if ((srv_conf->flags & f) == 0) {
                        srv_conf->flags |= parent->flags & f;
                        (void)strlcpy(srv_conf->path, parent->path,
                            sizeof(srv_conf->path));
                }

                f = SRVFLAG_SERVER_HSTS;
                srv_conf->flags |= parent->flags & f;
                srv_conf->hsts_max_age = parent->hsts_max_age;
                srv_conf->hsts_flags = parent->hsts_flags;

                memcpy(&srv_conf->timeout, &parent->timeout,
                    sizeof(srv_conf->timeout));
                srv_conf->maxrequests = parent->maxrequests;
                srv_conf->maxrequestbody = parent->maxrequestbody;

                srv_conf->flags |= parent->flags & SRVFLAG_ERRDOCS;
                (void)strlcpy(srv_conf->errdocroot, parent->errdocroot,
                    sizeof(srv_conf->errdocroot));

                srv_conf->flags |= parent->flags & SRVFLAG_NO_BANNER;

                DPRINTF("%s: %s %d location \"%s\", "
                    "parent \"%s[%u]\", flags: %s",
                    __func__, ps->ps_title[privsep_process], ps->ps_instance,
                    srv_conf->location, parent->name, parent->id,
                    printb_flags(srv_conf->flags, SRVFLAG_BITS));
        } else {
                /* Add a new "virtual" server */
                DPRINTF("%s: %s %d server \"%s[%u]\", parent \"%s[%u]\", "
                    "flags: %s", __func__,
                    ps->ps_title[privsep_process], ps->ps_instance,
                    srv_conf->name, srv_conf->id, parent->name, parent->id,
                    printb_flags(srv_conf->flags, SRVFLAG_BITS));
        }

        TAILQ_INSERT_TAIL(&srv->srv_hosts, srv_conf, entry);

        return (0);

 fail:
        serverconfig_free(srv_conf);
        free(srv_conf);
        return (-1);
}

int
config_getserver(struct httpd *env, struct imsg *imsg)
{
#ifdef DEBUG
        struct privsep          *ps = env->sc_ps;
#endif
        struct server           *srv = NULL;
        struct server_config     srv_conf;
        uint8_t                 *p = imsg->data;
        size_t                   s;
        int                      fd;

        IMSG_SIZE_CHECK(imsg, &srv_conf);
        memcpy(&srv_conf, p, sizeof(srv_conf));
        s = sizeof(srv_conf);

        /* Reset these variables to avoid free'ing invalid pointers */
        serverconfig_reset(&srv_conf);

        fd = imsg_get_fd(imsg);

        if ((IMSG_DATA_SIZE(imsg) - s) < (size_t)srv_conf.return_uri_len) {
                log_debug("%s: invalid message length", __func__);
                goto fail;
        }

        /* Check if server with matching listening socket already exists */
        if ((srv = server_byaddr((struct sockaddr *)
            &srv_conf.ss, srv_conf.port)) != NULL) {
                /* Add "host" to existing listening server */
                if (fd != -1) {
                        if (srv->srv_s == -1)
                                srv->srv_s = fd;
                        else
                                close(fd);
                }
                return (config_getserver_config(env, srv, imsg));
        }

        if (srv_conf.flags & SRVFLAG_LOCATION)
                fatalx("invalid location");

        /* Otherwise create a new server */
        if ((srv = calloc(1, sizeof(*srv))) == NULL)
                goto fail;

        memcpy(&srv->srv_conf, &srv_conf, sizeof(srv->srv_conf));
        srv->srv_s = fd;

        if (config_getserver_auth(env, &srv->srv_conf) != 0)
                goto fail;

        SPLAY_INIT(&srv->srv_clients);
        TAILQ_INIT(&srv->srv_hosts);

        /*
         * Get all variable-length values for the parent server.
         */
        if (srv->srv_conf.return_uri_len != 0) {
                if ((srv->srv_conf.return_uri = get_data(p + s,
                    srv->srv_conf.return_uri_len)) == NULL)
                        goto fail;
        }

        TAILQ_INSERT_TAIL(&srv->srv_hosts, &srv->srv_conf, entry);
        TAILQ_INSERT_TAIL(env->sc_servers, srv, srv_entry);

        DPRINTF("%s: %s %d configuration \"%s[%u]\", flags: %s", __func__,
            ps->ps_title[privsep_process], ps->ps_instance,
            srv->srv_conf.name, srv->srv_conf.id,
            printb_flags(srv->srv_conf.flags, SRVFLAG_BITS));

        return (0);

 fail:
        if (fd != -1)
                close(fd);
        if (srv != NULL)
                serverconfig_free(&srv->srv_conf);
        free(srv);

        return (-1);
}

static int
config_gettls(struct httpd *env, struct server_config *srv_conf,
    struct tls_config *tls_conf, const char *label, uint8_t *data, size_t len,
    uint8_t **outdata, size_t *outlen)
{
#ifdef DEBUG
        struct privsep          *ps = env->sc_ps;
#endif

        DPRINTF("%s: %s %d getting tls %s (%zu:%zu@%zu) for \"%s[%u]\"",
            __func__, ps->ps_title[privsep_process], ps->ps_instance, label,
            tls_conf->tls_len, len, tls_conf->tls_chunk_offset, srv_conf->name,
            srv_conf->id);

        if (tls_conf->tls_chunk_offset == 0) {
                free(*outdata);
                *outlen = 0;
                if ((*outdata = calloc(1, tls_conf->tls_len)) == NULL)
                        goto fail;
                *outlen = tls_conf->tls_len;
        }

        if (*outdata == NULL) {
                log_debug("%s: tls config invalid chunk sequence", __func__);
                goto fail;
        }

        if (*outlen != tls_conf->tls_len) {
                log_debug("%s: tls config length mismatch (%zu != %zu)",
                    __func__, *outlen, tls_conf->tls_len);
                goto fail;
        }

        if (len > (tls_conf->tls_len - tls_conf->tls_chunk_offset)) {
                log_debug("%s: tls config invalid chunk length", __func__);
                goto fail;
        }

        memcpy(*outdata + tls_conf->tls_chunk_offset, data, len);

        return (0);

 fail:
        return (-1);
}

int
config_getserver_tls(struct httpd *env, struct imsg *imsg)
{
        struct server_config    *srv_conf = NULL;
        struct tls_config        tls_conf;
        uint8_t                 *p = imsg->data;
        size_t                   len;

        IMSG_SIZE_CHECK(imsg, &tls_conf);
        memcpy(&tls_conf, p, sizeof(tls_conf));

        len = tls_conf.tls_chunk_len;

        if ((IMSG_DATA_SIZE(imsg) - sizeof(tls_conf)) < len) {
                log_debug("%s: invalid message length", __func__);
                goto fail;
        }

        p += sizeof(tls_conf);

        if ((srv_conf = serverconfig_byid(tls_conf.id)) == NULL) {
                log_debug("%s: server not found", __func__);
                goto fail;
        }

        switch (tls_conf.tls_type) {
        case TLS_CFG_CA:
                if (config_gettls(env, srv_conf, &tls_conf, "ca", p, len,
                    &srv_conf->tls_ca, &srv_conf->tls_ca_len) != 0)
                        goto fail;
                break;

        case TLS_CFG_CERT:
                if (config_gettls(env, srv_conf, &tls_conf, "cert", p, len,
                    &srv_conf->tls_cert, &srv_conf->tls_cert_len) != 0)
                        goto fail;
                break;

        case TLS_CFG_CRL:
                if (config_gettls(env, srv_conf, &tls_conf, "crl", p, len,
                    &srv_conf->tls_crl, &srv_conf->tls_crl_len) != 0)
                        goto fail;
                break;

        case TLS_CFG_KEY:
                if (config_gettls(env, srv_conf, &tls_conf, "key", p, len,
                    &srv_conf->tls_key, &srv_conf->tls_key_len) != 0)
                        goto fail;
                break;

        case TLS_CFG_OCSP_STAPLE:
                if (config_gettls(env, srv_conf, &tls_conf, "ocsp staple",
                    p, len, &srv_conf->tls_ocsp_staple,
                    &srv_conf->tls_ocsp_staple_len) != 0)
                        goto fail;
                break;

        default:
                log_debug("%s: unknown tls config type %i\n",
                     __func__, tls_conf.tls_type);
                goto fail;
        }

        return (0);

 fail:
        return (-1);
}

int
config_setmedia(struct httpd *env, struct media_type *media)
{
        struct privsep          *ps = env->sc_ps;
        int                      id;
        unsigned int             what;
        struct media_type        mt;

        for (id = 0; id < PROC_MAX; id++) {
                what = ps->ps_what[id];

                if ((what & CONFIG_MEDIA) == 0 || id == privsep_process)
                        continue;

                DPRINTF("%s: sending media \"%s\" to %s", __func__,
                    media->media_name, ps->ps_title[id]);

                /* Send a cleaned-up copy */
                memcpy(&mt, media, sizeof(*media)); 
                mt.media_encoding = NULL;
                memset(&mt.media_entry, 0, sizeof(mt.media_entry));

                proc_compose(ps, id, IMSG_CFG_MEDIA, &mt, sizeof(mt));
        }

        return (0);
}

int
config_getmedia(struct httpd *env, struct imsg *imsg)
{
#ifdef DEBUG
        struct privsep          *ps = env->sc_ps;
#endif
        struct media_type        media;
        uint8_t                 *p = imsg->data;

        IMSG_SIZE_CHECK(imsg, &media);
        memcpy(&media, p, sizeof(media));

        if (media_add(env->sc_mediatypes, &media) == NULL) {
                log_debug("%s: failed to add media \"%s\"",
                    __func__, media.media_name);
                return (-1);
        }

        DPRINTF("%s: %s %d received media \"%s\"", __func__,
            ps->ps_title[privsep_process], ps->ps_instance,
            media.media_name);

        return (0);
}

int
config_setauth(struct httpd *env, struct auth *auth)
{
        struct privsep          *ps = env->sc_ps;
        struct auth              auth_payload;  /* pointer-free payload */
        int                      id;
        unsigned int             what;

        for (id = 0; id < PROC_MAX; id++) {
                what = ps->ps_what[id];

                if ((what & CONFIG_AUTH) == 0 || id == privsep_process)
                        continue;

                DPRINTF("%s: sending auth \"%s[%u]\" to %s", __func__,
                    auth->auth_htpasswd, auth->auth_id, ps->ps_title[id]);


                /* memcpy to avoid modifying auth directly */
                memcpy(&auth_payload, auth, sizeof(*auth)); 

                /* clear pointers */
                memset(&auth_payload.auth_entry, 0, sizeof(auth_payload.auth_entry)); 

                proc_compose(ps, id, IMSG_CFG_AUTH, &auth_payload, sizeof(auth_payload));
        }

        return (0);
}

int
config_getauth(struct httpd *env, struct imsg *imsg)
{
#ifdef DEBUG
        struct privsep          *ps = env->sc_ps;
#endif
        struct auth              auth;
        uint8_t                 *p = imsg->data;

        IMSG_SIZE_CHECK(imsg, &auth);
        memcpy(&auth, p, sizeof(auth));

        if (auth_add(env->sc_auth, &auth) == NULL) {
                log_debug("%s: failed to add auth \"%s[%u]\"",
                    __func__, auth.auth_htpasswd, auth.auth_id);
                return (-1);
        }

        DPRINTF("%s: %s %d received auth \"%s[%u]\"", __func__,
            ps->ps_title[privsep_process], ps->ps_instance,
            auth.auth_htpasswd, auth.auth_id);

        return (0);
}