api.fabaccess-api/user.capnp

73 lines
2.3 KiB
Cap'n Proto
Raw Normal View History

2021-02-01 23:23:12 +01:00
@0xc7941adf5db6bbf0;
using Rust = import "programming_language/rust.capnp";
$Rust.parentModule("schema");
using CSharp = import "programming_language/csharp.capnp";
$CSharp.namespace("FabAccessAPI.Schema");
using General = import "general.capnp";
using Space = import "space.capnp".Space;
2021-08-27 00:28:33 +02:00
using Role = import "role.capnp".Role;
2021-02-01 23:23:12 +01:00
struct User
{
2021-08-27 21:42:36 +02:00
id @0 :General.UUID;
username @1 :Text;
space @2 :Space;
2021-02-01 23:23:12 +01:00
struct UserInfoExtended
{
id @0 :General.UUID;
firstname @1 :Text;
lastname @2 :Text;
address @3 :Address;
struct Address
{ # TODO POST*CODE
text @0 :Text;
}
}
2021-08-27 21:42:36 +02:00
info @3 :Info;
2021-02-01 23:23:12 +01:00
interface Info $CSharp.name("InfoInterface") {
2021-08-27 21:42:36 +02:00
getUserInfoExtended @0 () -> ( userInfoExtended :UserInfoExtended );
2021-02-01 23:23:12 +01:00
}
2021-08-27 21:42:36 +02:00
manage @4 :Manage;
2021-02-01 23:23:12 +01:00
interface Manage $CSharp.name("ManageInterface") {
2021-08-27 21:42:36 +02:00
pwd @0 ( pwd :Text ) -> ();
}
admin @5 :Admin;
interface Admin $CSharp.name("AdminInterface") {
addRole @0 ( role :Role ) -> ();
removeRole @1 ( role :Role ) -> ();
2021-08-26 23:52:36 +02:00
}
2021-08-27 21:42:36 +02:00
cardDESFireEV2 @6 :CardDESFireEV2;
2021-08-27 21:28:31 +02:00
interface CardDESFireEV2 $CSharp.name("CardDESFireInterface") {
2021-08-28 18:15:26 +02:00
# Card authentication using NXP/MiFare DESFire cards.
# These cards have the ability to restrict access for data on the cards using symmetric
# encryption and using a keyed Diffie-Hellman to prevent eavesdropping by any relaying
# party.
getTokenList @0 () -> ( tokens :List(Data) );
# Get a list of all user Token currently bound to an user. This will generally be the number
2021-08-28 18:15:26 +02:00
# of cards they use.
genCardToken @1 () -> ( token :Data );
# Generate a new Token that can be used to access an user in a pseudonymized fashion.
# This call is extremely cheap to make as the server will not store this Token.
2021-08-28 18:15:26 +02:00
bind @2 ( token :Data, auth_key :Data ) -> ();
2021-08-28 18:15:26 +02:00
# Bind a given URL to a given auth key. The server will store both URL and key, so using
# this frequently will force the server to store large amounts of data.
# Trying to bind a new key to an existing URL will fail.
unbind @3 ( token :Text ) -> ();
# Unbind the key associated with the given token. This will fail all future attempts to use
2021-08-28 18:15:26 +02:00
# the card with the associated key.
2021-02-01 23:23:12 +01:00
}
2021-08-28 18:15:26 +02:00
}