/mandos/release

To get this branch, use:
bzr branch http://bzr.recompile.se/loggerhead/mandos/release

« back to all changes in this revision

Viewing changes to Makefile

  • Committer: Björn Påhlsson
  • Date: 2008-07-20 02:52:20 UTC
  • Revision ID: belorn@braxen-20080720025220-r5u0388uy9iu23h6
Added following support:
Pluginbased client handler
rewritten Mandos client
       Avahi instead of udp server discovery
       openpgp encrypted key support
Passprompt stand alone application for direct console input
Added logging for Mandos server

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
WARN:=-O -Wall -Wextra -Wdouble-promotion -Wformat=2 -Winit-self \
2
 
        -Wmissing-include-dirs -Wswitch-default -Wswitch-enum \
3
 
        -Wunused -Wuninitialized -Wstrict-overflow=5 \
4
 
        -Wsuggest-attribute=pure -Wsuggest-attribute=const \
5
 
        -Wsuggest-attribute=noreturn -Wfloat-equal -Wundef -Wshadow \
6
 
        -Wunsafe-loop-optimizations -Wpointer-arith \
7
 
        -Wbad-function-cast -Wcast-qual -Wcast-align -Wwrite-strings \
8
 
        -Wconversion -Wlogical-op -Waggregate-return \
9
 
        -Wstrict-prototypes -Wold-style-definition \
10
 
        -Wmissing-format-attribute -Wnormalized=nfc -Wpacked \
11
 
        -Wredundant-decls -Wnested-externs -Winline -Wvla \
12
 
        -Wvolatile-register-var -Woverlength-strings
13
 
 
14
 
#DEBUG:=-ggdb3 -fsanitize=address $(SANITIZE)
15
 
## Check which sanitizing options can be used
16
 
#SANITIZE:=$(foreach option,$(ALL_SANITIZE_OPTIONS),$(shell \
17
 
#       echo 'int main(){}' | $(CC) --language=c $(option) \
18
 
#       /dev/stdin -o /dev/null >/dev/null 2>&1 && echo $(option)))
19
 
# <https://developerblog.redhat.com/2014/10/16/gcc-undefined-behavior-sanitizer-ubsan/>
20
 
ALL_SANITIZE_OPTIONS:=-fsanitize=leak -fsanitize=undefined \
21
 
        -fsanitize=shift -fsanitize=integer-divide-by-zero \
22
 
        -fsanitize=unreachable -fsanitize=vla-bound -fsanitize=null \
23
 
        -fsanitize=return -fsanitize=signed-integer-overflow \
24
 
        -fsanitize=bounds -fsanitize=alignment \
25
 
        -fsanitize=object-size -fsanitize=float-divide-by-zero \
26
 
        -fsanitize=float-cast-overflow -fsanitize=nonnull-attribute \
27
 
        -fsanitize=returns-nonnull-attribute -fsanitize=bool \
28
 
        -fsanitize=enum -fsanitize-address-use-after-scope
29
 
 
30
 
# For info about _FORTIFY_SOURCE, see feature_test_macros(7)
31
 
# and <https://gcc.gnu.org/ml/gcc-patches/2004-09/msg02055.html>.
32
 
FORTIFY:=-fstack-protector-all -fPIC
33
 
CPPFLAGS+=-D_FORTIFY_SOURCE=3
34
 
LINK_FORTIFY_LD:=-z relro -z now
35
 
LINK_FORTIFY:=
36
 
 
37
 
# If BROKEN_PIE is set, do not build with -pie
38
 
ifndef BROKEN_PIE
39
 
FORTIFY += -fPIE
40
 
LINK_FORTIFY += -pie
41
 
endif
42
 
#COVERAGE=--coverage
43
 
OPTIMIZE:=-Os -fno-strict-aliasing
44
 
LANGUAGE:=-std=gnu11
45
 
CPPFLAGS+=-D_FILE_OFFSET_BITS=64
46
 
htmldir:=man
47
 
version:=1.8.16
48
 
SED:=sed
49
 
PKG_CONFIG?=pkg-config
50
 
 
51
 
USER:=$(firstword $(subst :, ,$(shell getent passwd _mandos \
52
 
        || getent passwd nobody || echo 65534)))
53
 
GROUP:=$(firstword $(subst :, ,$(shell getent group _mandos \
54
 
        || getent group nogroup || echo 65534)))
55
 
 
56
 
LINUXVERSION:=$(shell uname --kernel-release)
57
 
 
58
 
## Use these settings for a traditional /usr/local install
59
 
# PREFIX:=$(DESTDIR)/usr/local
60
 
# CONFDIR:=$(DESTDIR)/etc/mandos
61
 
# KEYDIR:=$(DESTDIR)/etc/mandos/keys
62
 
# MANDIR:=$(PREFIX)/man
63
 
# INITRAMFSTOOLS:=$(DESTDIR)/etc/initramfs-tools
64
 
# DRACUTMODULE:=$(DESTDIR)/usr/lib/dracut/modules.d/90mandos
65
 
# STATEDIR:=$(DESTDIR)/var/lib/mandos
66
 
# LIBDIR:=$(PREFIX)/lib
67
 
# DBUSPOLICYDIR:=$(DESTDIR)/etc/dbus-1/system.d
68
 
##
69
 
 
70
 
## These settings are for a package-type install
71
 
PREFIX:=$(DESTDIR)/usr
72
 
CONFDIR:=$(DESTDIR)/etc/mandos
73
 
KEYDIR:=$(DESTDIR)/etc/keys/mandos
74
 
MANDIR:=$(PREFIX)/share/man
75
 
INITRAMFSTOOLS:=$(DESTDIR)/usr/share/initramfs-tools
76
 
DRACUTMODULE:=$(DESTDIR)/usr/lib/dracut/modules.d/90mandos
77
 
STATEDIR:=$(DESTDIR)/var/lib/mandos
78
 
LIBDIR:=$(shell \
79
 
        for d in \
80
 
        "/usr/lib/`dpkg-architecture \
81
 
                        -qDEB_HOST_MULTIARCH 2>/dev/null`" \
82
 
        "`rpm --eval='%{_libdir}' 2>/dev/null`" /usr/lib; do \
83
 
                if [ -d "$$d" -a "$$d" = "$${d%/}" ]; then \
84
 
                        echo "$(DESTDIR)$$d"; \
85
 
                        break; \
86
 
                fi; \
87
 
        done)
88
 
DBUSPOLICYDIR:=$(DESTDIR)/usr/share/dbus-1/system.d
89
 
##
90
 
 
91
 
SYSTEMD:=$(DESTDIR)$(shell $(PKG_CONFIG) systemd \
92
 
                        --variable=systemdsystemunitdir)
93
 
TMPFILES:=$(DESTDIR)$(shell $(PKG_CONFIG) systemd \
94
 
                        --variable=tmpfilesdir)
95
 
SYSUSERS:=$(DESTDIR)$(shell $(PKG_CONFIG) systemd \
96
 
                        --variable=sysusersdir)
97
 
 
98
 
GNUTLS_CFLAGS:=$(shell $(PKG_CONFIG) --cflags-only-I gnutls)
99
 
GNUTLS_LIBS:=$(shell $(PKG_CONFIG) --libs gnutls)
100
 
AVAHI_CFLAGS:=$(shell $(PKG_CONFIG) --cflags-only-I avahi-core)
101
 
AVAHI_LIBS:=$(shell $(PKG_CONFIG) --libs avahi-core)
102
 
GPGME_CFLAGS:=$(shell $(PKG_CONFIG) --cflags-only-I gpgme 2>/dev/null \
103
 
        || gpgme-config --cflags; getconf LFS_CFLAGS)
104
 
GPGME_LIBS:=$(shell $(PKG_CONFIG) --libs gpgme 2>/dev/null \
105
 
        || gpgme-config --libs; getconf LFS_LIBS; \
106
 
        getconf LFS_LDFLAGS)
107
 
LIBNL3_CFLAGS:=$(shell $(PKG_CONFIG) --cflags-only-I libnl-route-3.0)
108
 
LIBNL3_LIBS:=$(shell $(PKG_CONFIG) --libs libnl-route-3.0)
109
 
GLIB_CFLAGS:=$(shell $(PKG_CONFIG) --cflags glib-2.0)
110
 
GLIB_LIBS:=$(shell $(PKG_CONFIG) --libs glib-2.0)
111
 
 
112
 
# Do not change these two
113
 
CFLAGS+=$(WARN) $(DEBUG) $(FORTIFY) $(COVERAGE) $(OPTIMIZE) \
114
 
        $(LANGUAGE) -DVERSION='"$(version)"'
115
 
LDFLAGS+=-Xlinker --as-needed $(COVERAGE) $(LINK_FORTIFY) $(strip \
116
 
        ) $(foreach flag,$(LINK_FORTIFY_LD),-Xlinker $(flag))
117
 
 
118
 
# Commands to format a DocBook <refentry> document into a manual page
119
 
DOCBOOKTOMAN=$(strip cd $(dir $<); xsltproc --nonet --xinclude \
120
 
        --param man.charmap.use.subset          0 \
121
 
        --param make.year.ranges                1 \
122
 
        --param make.single.year.ranges         1 \
123
 
        --param man.output.quietly              1 \
124
 
        --param man.authors.section.enabled     0 \
125
 
        /usr/share/xml/docbook/stylesheet/nwalsh/manpages/docbook.xsl \
126
 
        $(notdir $<); \
127
 
        if locale --all 2>/dev/null | grep --regexp='^en_US\.utf8$$' \
128
 
        && command -v man >/dev/null; then LANG=en_US.UTF-8 \
129
 
        MANWIDTH=80 man --warnings --encoding=UTF-8 --local-file \
130
 
        $(notdir $@); fi >/dev/null)
131
 
 
132
 
DOCBOOKTOHTML=$(strip xsltproc --nonet --xinclude \
133
 
        --param make.year.ranges                1 \
134
 
        --param make.single.year.ranges         1 \
135
 
        --param man.output.quietly              1 \
136
 
        --param man.authors.section.enabled     0 \
137
 
        --param citerefentry.link               1 \
138
 
        --output $@ \
139
 
        /usr/share/xml/docbook/stylesheet/nwalsh/xhtml/docbook.xsl \
140
 
        $<; $(HTMLPOST) $@)
141
 
# Fix citerefentry links
142
 
HTMLPOST:=$(SED) --in-place \
143
 
        --expression='s/\(<a class="citerefentry" href="\)\("><span class="citerefentry"><span class="refentrytitle">\)\([^<]*\)\(<\/span>(\)\([^)]*\)\()<\/span><\/a>\)/\1\3.\5\2\3\4\5\6/g'
144
 
 
145
 
PLUGINS:=plugins.d/password-prompt plugins.d/mandos-client \
146
 
        plugins.d/usplash plugins.d/splashy plugins.d/askpass-fifo \
147
 
        plugins.d/plymouth
148
 
PLUGIN_HELPERS:=plugin-helpers/mandos-client-iprouteadddel
149
 
CPROGS:=plugin-runner dracut-module/password-agent $(PLUGINS) \
150
 
        $(PLUGIN_HELPERS)
151
 
PROGS:=mandos mandos-keygen mandos-ctl mandos-monitor $(CPROGS)
152
 
DOCS:=mandos.8 mandos-keygen.8 mandos-monitor.8 mandos-ctl.8 \
153
 
        mandos.conf.5 mandos-clients.conf.5 plugin-runner.8mandos \
154
 
        dracut-module/password-agent.8mandos \
155
 
        plugins.d/mandos-client.8mandos \
156
 
        plugins.d/password-prompt.8mandos plugins.d/usplash.8mandos \
157
 
        plugins.d/splashy.8mandos plugins.d/askpass-fifo.8mandos \
158
 
        plugins.d/plymouth.8mandos intro.8mandos
159
 
 
160
 
htmldocs:=$(addsuffix .xhtml,$(DOCS))
161
 
 
162
 
objects:=$(addsuffix .o,$(CPROGS))
163
 
 
164
 
.PHONY: all
165
 
all: $(PROGS) mandos.lsm
166
 
 
167
 
.PHONY: doc
168
 
doc: $(DOCS)
169
 
 
170
 
.PHONY: html
171
 
html: $(htmldocs)
172
 
 
173
 
%.5: %.xml common.ent legalnotice.xml
174
 
        $(DOCBOOKTOMAN)
175
 
%.5.xhtml: %.xml common.ent legalnotice.xml
176
 
        $(DOCBOOKTOHTML)
177
 
 
178
 
%.8: %.xml common.ent legalnotice.xml
179
 
        $(DOCBOOKTOMAN)
180
 
%.8.xhtml: %.xml common.ent legalnotice.xml
181
 
        $(DOCBOOKTOHTML)
182
 
 
183
 
%.8mandos: %.xml common.ent legalnotice.xml
184
 
        $(DOCBOOKTOMAN)
185
 
%.8mandos.xhtml: %.xml common.ent legalnotice.xml
186
 
        $(DOCBOOKTOHTML)
187
 
 
188
 
intro.8mandos: intro.xml common.ent legalnotice.xml
189
 
        $(DOCBOOKTOMAN)
190
 
intro.8mandos.xhtml: intro.xml common.ent legalnotice.xml
191
 
        $(DOCBOOKTOHTML)
192
 
 
193
 
mandos.8: mandos.xml common.ent mandos-options.xml overview.xml \
194
 
                legalnotice.xml
195
 
        $(DOCBOOKTOMAN)
196
 
mandos.8.xhtml: mandos.xml common.ent mandos-options.xml \
197
 
                overview.xml legalnotice.xml
198
 
        $(DOCBOOKTOHTML)
199
 
 
200
 
mandos-keygen.8: mandos-keygen.xml common.ent overview.xml \
201
 
                legalnotice.xml
202
 
        $(DOCBOOKTOMAN)
203
 
mandos-keygen.8.xhtml: mandos-keygen.xml common.ent overview.xml \
204
 
                 legalnotice.xml
205
 
        $(DOCBOOKTOHTML)
206
 
 
207
 
mandos-monitor.8: mandos-monitor.xml common.ent overview.xml \
208
 
                legalnotice.xml
209
 
        $(DOCBOOKTOMAN)
210
 
mandos-monitor.8.xhtml: mandos-monitor.xml common.ent overview.xml \
211
 
                 legalnotice.xml
212
 
        $(DOCBOOKTOHTML)
213
 
 
214
 
mandos-ctl.8: mandos-ctl.xml common.ent overview.xml \
215
 
                legalnotice.xml
216
 
        $(DOCBOOKTOMAN)
217
 
mandos-ctl.8.xhtml: mandos-ctl.xml common.ent overview.xml \
218
 
                 legalnotice.xml
219
 
        $(DOCBOOKTOHTML)
220
 
 
221
 
mandos.conf.5: mandos.conf.xml common.ent mandos-options.xml \
222
 
                legalnotice.xml
223
 
        $(DOCBOOKTOMAN)
224
 
mandos.conf.5.xhtml: mandos.conf.xml common.ent mandos-options.xml \
225
 
                legalnotice.xml
226
 
        $(DOCBOOKTOHTML)
227
 
 
228
 
plugin-runner.8mandos: plugin-runner.xml common.ent overview.xml \
229
 
                legalnotice.xml
230
 
        $(DOCBOOKTOMAN)
231
 
plugin-runner.8mandos.xhtml: plugin-runner.xml common.ent \
232
 
                overview.xml legalnotice.xml
233
 
        $(DOCBOOKTOHTML)
234
 
 
235
 
dracut-module/password-agent.8mandos: \
236
 
                dracut-module/password-agent.xml common.ent \
237
 
                overview.xml legalnotice.xml
238
 
        $(DOCBOOKTOMAN)
239
 
dracut-module/password-agent.8mandos.xhtml: \
240
 
                dracut-module/password-agent.xml common.ent \
241
 
                overview.xml legalnotice.xml
242
 
        $(DOCBOOKTOHTML)
243
 
 
244
 
plugins.d/mandos-client.8mandos: plugins.d/mandos-client.xml \
245
 
                                        common.ent \
246
 
                                        mandos-options.xml \
247
 
                                        overview.xml legalnotice.xml
248
 
        $(DOCBOOKTOMAN)
249
 
plugins.d/mandos-client.8mandos.xhtml: plugins.d/mandos-client.xml \
250
 
                                        common.ent \
251
 
                                        mandos-options.xml \
252
 
                                        overview.xml legalnotice.xml
253
 
        $(DOCBOOKTOHTML)
254
 
 
255
 
# Update all these files with version number $(version)
256
 
common.ent: Makefile
257
 
        $(strip $(SED) --in-place \
258
 
                --expression='s/^\(<!ENTITY version "\)[^"]*">$$/\1$(version)">/' \
259
 
                $@)
260
 
 
261
 
mandos: Makefile
262
 
        $(strip $(SED) --in-place \
263
 
                --expression='s/^\(version = "\)[^"]*"$$/\1$(version)"/' \
264
 
                $@)
265
 
 
266
 
mandos-keygen: Makefile
267
 
        $(strip $(SED) --in-place \
268
 
                --expression='s/^\(VERSION="\)[^"]*"$$/\1$(version)"/' \
269
 
                $@)
270
 
 
271
 
mandos-ctl: Makefile
272
 
        $(strip $(SED) --in-place \
273
 
                --expression='s/^\(version = "\)[^"]*"$$/\1$(version)"/' \
274
 
                $@)
275
 
 
276
 
mandos-monitor: Makefile
277
 
        $(strip $(SED) --in-place \
278
 
                --expression='s/^\(version = "\)[^"]*"$$/\1$(version)"/' \
279
 
                $@)
280
 
 
281
 
mandos.lsm: Makefile
282
 
        $(strip $(SED) --in-place \
283
 
                --expression='s/^\(Version:\).*/\1\t$(version)/' \
284
 
                $@)
285
 
        $(strip $(SED) --in-place \
286
 
                --expression='s/^\(Entered-date:\).*/\1\t$(shell date --rfc-3339=date --reference=Makefile)/' \
287
 
                $@)
288
 
        $(strip $(SED) --in-place \
289
 
                --expression='s/\(mandos_\)[0-9.]\+\(\.orig\.tar\.gz\)/\1$(version)\2/' \
290
 
                $@)
291
 
 
292
 
# Need to add the GnuTLS, Avahi and GPGME libraries
293
 
plugins.d/mandos-client: CFLAGS += $(GNUTLS_CFLAGS) $(strip \
294
 
        ) $(AVAHI_CFLAGS) $(GPGME_CFLAGS)
295
 
plugins.d/mandos-client: LDLIBS += $(GNUTLS_LIBS) $(strip \
296
 
        ) $(AVAHI_LIBS) $(GPGME_LIBS)
297
 
 
298
 
# Need to add the libnl-route library
299
 
plugin-helpers/mandos-client-iprouteadddel: CFLAGS += $(LIBNL3_CFLAGS)
300
 
plugin-helpers/mandos-client-iprouteadddel: LDLIBS += $(LIBNL3_LIBS)
301
 
 
302
 
# Need to add the GLib and pthread libraries
303
 
dracut-module/password-agent: CFLAGS += $(GLIB_CFLAGS)
304
 
# Note: -lpthread is unnecessary with the GNU C library 2.34 or later
305
 
dracut-module/password-agent: LDLIBS += $(GLIB_LIBS) -lpthread
306
 
 
307
 
.PHONY: clean
 
1
CFLAGS="-Wall -std=gnu99"
 
2
LDFLAGS=-lgnutls
 
3
 
 
4
all: plugbasedclient
 
5
 
308
6
clean:
309
 
        -rm --force $(CPROGS) $(objects) $(htmldocs) $(DOCS) core
310
 
 
311
 
.PHONY: distclean
312
 
distclean: clean
313
 
.PHONY: mostlyclean
314
 
mostlyclean: clean
315
 
.PHONY: maintainer-clean
316
 
maintainer-clean: clean
317
 
        -rm --force --recursive keydir confdir statedir
318
 
 
319
 
.PHONY: check
320
 
check: all
321
 
        ./mandos --check
322
 
        ./mandos-ctl --check
323
 
        ./mandos-keygen --version
324
 
        ./plugin-runner --version
325
 
        ./plugin-helpers/mandos-client-iprouteadddel --version
326
 
        ./dracut-module/password-agent --test
327
 
 
328
 
# Run the client with a local config and key
329
 
.PHONY: run-client
330
 
run-client: all keydir/seckey.txt keydir/pubkey.txt \
331
 
                        keydir/tls-privkey.pem keydir/tls-pubkey.pem
332
 
        @echo '######################################################'
333
 
        @echo '# The following error messages are harmless and can  #'
334
 
        @echo '#  be safely ignored:                                #'
335
 
        @echo '## From plugin-runner:                               #'
336
 
        @echo '# setgid: Operation not permitted                    #'
337
 
        @echo '# setuid: Operation not permitted                    #'
338
 
        @echo '## From askpass-fifo:                                #'
339
 
        @echo '# mkfifo: Permission denied                          #'
340
 
        @echo '## From mandos-client:                               #'
341
 
        @echo '# Failed to raise privileges: Operation not permi... #'
342
 
        @echo '# Warning: network hook "*" exited with status *     #'
343
 
        @echo '# ioctl SIOCSIFFLAGS +IFF_UP: Operation not permi... #'
344
 
        @echo '# Failed to bring up interface "*": Operation not... #'
345
 
        @echo '#                                                    #'
346
 
        @echo '# (The messages are caused by not running as root,   #'
347
 
        @echo '# but you should NOT run "make run-client" as root   #'
348
 
        @echo '# unless you also unpacked and compiled Mandos as    #'
349
 
        @echo '# root, which is also NOT recommended.)              #'
350
 
        @echo '######################################################'
351
 
# We set GNOME_KEYRING_CONTROL to block pam_gnome_keyring
352
 
        ./plugin-runner --plugin-dir=plugins.d \
353
 
                --plugin-helper-dir=plugin-helpers \
354
 
                --config-file=plugin-runner.conf \
355
 
                --options-for=mandos-client:--seckey=keydir/seckey.txt,--pubkey=keydir/pubkey.txt,--tls-privkey=keydir/tls-privkey.pem,--tls-pubkey=keydir/tls-pubkey.pem,--network-hook-dir=network-hooks.d \
356
 
                --env-for=mandos-client:GNOME_KEYRING_CONTROL= \
357
 
                $(CLIENTARGS)
358
 
 
359
 
# Used by run-client
360
 
keydir/seckey.txt keydir/pubkey.txt keydir/tls-privkey.pem keydir/tls-pubkey.pem: mandos-keygen
361
 
        install --directory keydir
362
 
        ./mandos-keygen --dir keydir --force
363
 
        if ! [ -e keydir/tls-privkey.pem ]; then \
364
 
                install --mode=u=rw /dev/null keydir/tls-privkey.pem; \
365
 
        fi
366
 
        if ! [ -e keydir/tls-pubkey.pem ]; then \
367
 
                install --mode=u=rw /dev/null keydir/tls-pubkey.pem; \
368
 
        fi
369
 
 
370
 
# Run the server with a local config
371
 
.PHONY: run-server
372
 
run-server: confdir/mandos.conf confdir/clients.conf statedir
373
 
        ./mandos --debug --no-dbus --configdir=confdir \
374
 
                --statedir=statedir $(SERVERARGS)
375
 
 
376
 
# Used by run-server
377
 
confdir/mandos.conf: mandos.conf
378
 
        install --directory confdir
379
 
        install --mode=u=rw,go=r $^ $@
380
 
confdir/clients.conf: clients.conf keydir/seckey.txt keydir/tls-pubkey.pem
381
 
        install --directory confdir
382
 
        install --mode=u=rw $< $@
383
 
# Add a client password
384
 
        ./mandos-keygen --dir keydir --password --no-ssh >> $@
385
 
statedir:
386
 
        install --directory statedir
387
 
 
388
 
.PHONY: install
389
 
install: install-server install-client-nokey
390
 
 
391
 
.PHONY: install-html
392
 
install-html: html
393
 
        install --directory $(htmldir)
394
 
        install --mode=u=rw,go=r --target-directory=$(htmldir) \
395
 
                $(htmldocs)
396
 
 
397
 
.PHONY: install-server
398
 
install-server: doc
399
 
        install --directory $(CONFDIR)
400
 
        if install --directory --mode=u=rwx --owner=$(USER) \
401
 
                --group=$(GROUP) $(STATEDIR); then \
402
 
                :; \
403
 
        elif install --directory --mode=u=rwx $(STATEDIR); then \
404
 
                chown -- $(USER):$(GROUP) $(STATEDIR) || :; \
405
 
        fi
406
 
        if [ "$(TMPFILES)" != "$(DESTDIR)" \
407
 
                        -a -d "$(TMPFILES)" ]; then \
408
 
                install --mode=u=rw,go=r tmpfiles.d-mandos.conf \
409
 
                        $(TMPFILES)/mandos.conf; \
410
 
        fi
411
 
        if [ "$(SYSUSERS)" != "$(DESTDIR)" \
412
 
                        -a -d "$(SYSUSERS)" ]; then \
413
 
                install --mode=u=rw,go=r sysusers.d-mandos.conf \
414
 
                        $(SYSUSERS)/mandos.conf; \
415
 
        fi
416
 
        install --mode=u=rwx,go=rx mandos $(PREFIX)/sbin/mandos
417
 
        install --mode=u=rwx,go=rx --target-directory=$(PREFIX)/sbin \
418
 
                mandos-ctl
419
 
        install --mode=u=rwx,go=rx --target-directory=$(PREFIX)/sbin \
420
 
                mandos-monitor
421
 
        install --mode=u=rw,go=r --target-directory=$(CONFDIR) \
422
 
                mandos.conf
423
 
        install --mode=u=rw --target-directory=$(CONFDIR) \
424
 
                clients.conf
425
 
        install --mode=u=rw,go=r dbus-mandos.conf \
426
 
                $(DBUSPOLICYDIR)/mandos.conf
427
 
        install --mode=u=rwx,go=rx init.d-mandos \
428
 
                $(DESTDIR)/etc/init.d/mandos
429
 
        if [ "$(SYSTEMD)" != "$(DESTDIR)" -a -d "$(SYSTEMD)" ]; then \
430
 
                install --mode=u=rw,go=r mandos.service $(SYSTEMD); \
431
 
        fi
432
 
        install --mode=u=rw,go=r default-mandos \
433
 
                $(DESTDIR)/etc/default/mandos
434
 
        if [ -z $(DESTDIR) ]; then \
435
 
                update-rc.d mandos defaults 25 15;\
436
 
        fi
437
 
        gzip --best --to-stdout mandos.8 \
438
 
                > $(MANDIR)/man8/mandos.8.gz
439
 
        gzip --best --to-stdout mandos-monitor.8 \
440
 
                > $(MANDIR)/man8/mandos-monitor.8.gz
441
 
        gzip --best --to-stdout mandos-ctl.8 \
442
 
                > $(MANDIR)/man8/mandos-ctl.8.gz
443
 
        gzip --best --to-stdout mandos.conf.5 \
444
 
                > $(MANDIR)/man5/mandos.conf.5.gz
445
 
        gzip --best --to-stdout mandos-clients.conf.5 \
446
 
                > $(MANDIR)/man5/mandos-clients.conf.5.gz
447
 
        gzip --best --to-stdout intro.8mandos \
448
 
                > $(MANDIR)/man8/intro.8mandos.gz
449
 
 
450
 
.PHONY: install-client-nokey
451
 
install-client-nokey: all doc
452
 
        install --directory $(LIBDIR)/mandos $(CONFDIR)
453
 
        install --directory --mode=u=rwx $(KEYDIR) \
454
 
                $(LIBDIR)/mandos/plugins.d \
455
 
                $(LIBDIR)/mandos/plugin-helpers
456
 
        if [ "$(SYSUSERS)" != "$(DESTDIR)" \
457
 
                        -a -d "$(SYSUSERS)" ]; then \
458
 
                install --mode=u=rw,go=r sysusers.d-mandos.conf \
459
 
                        $(SYSUSERS)/mandos-client.conf; \
460
 
        fi
461
 
        if [ "$(CONFDIR)" != "$(LIBDIR)/mandos" ]; then \
462
 
                install --mode=u=rwx \
463
 
                        --directory "$(CONFDIR)/plugins.d" \
464
 
                        "$(CONFDIR)/plugin-helpers"; \
465
 
        fi
466
 
        install --mode=u=rwx,go=rx --directory \
467
 
                "$(CONFDIR)/network-hooks.d"
468
 
        install --mode=u=rwx,go=rx \
469
 
                --target-directory=$(LIBDIR)/mandos plugin-runner
470
 
        install --mode=u=rwx,go=rx \
471
 
                --target-directory=$(LIBDIR)/mandos \
472
 
                mandos-to-cryptroot-unlock
473
 
        install --mode=u=rwx,go=rx --target-directory=$(PREFIX)/sbin \
474
 
                mandos-keygen
475
 
        install --mode=u=rwx,go=rx \
476
 
                --target-directory=$(LIBDIR)/mandos/plugins.d \
477
 
                plugins.d/password-prompt
478
 
        install --mode=u=rwxs,go=rx \
479
 
                --target-directory=$(LIBDIR)/mandos/plugins.d \
480
 
                plugins.d/mandos-client
481
 
        install --mode=u=rwxs,go=rx \
482
 
                --target-directory=$(LIBDIR)/mandos/plugins.d \
483
 
                plugins.d/usplash
484
 
        install --mode=u=rwxs,go=rx \
485
 
                --target-directory=$(LIBDIR)/mandos/plugins.d \
486
 
                plugins.d/splashy
487
 
        install --mode=u=rwxs,go=rx \
488
 
                --target-directory=$(LIBDIR)/mandos/plugins.d \
489
 
                plugins.d/askpass-fifo
490
 
        install --mode=u=rwxs,go=rx \
491
 
                --target-directory=$(LIBDIR)/mandos/plugins.d \
492
 
                plugins.d/plymouth
493
 
        install --mode=u=rwx,go=rx \
494
 
                --target-directory=$(LIBDIR)/mandos/plugin-helpers \
495
 
                plugin-helpers/mandos-client-iprouteadddel
496
 
        install initramfs-tools-hook \
497
 
                $(INITRAMFSTOOLS)/hooks/mandos
498
 
        install --mode=u=rw,go=r initramfs-tools-conf \
499
 
                $(INITRAMFSTOOLS)/conf.d/mandos-conf
500
 
        install --mode=u=rw,go=r initramfs-tools-conf-hook \
501
 
                $(INITRAMFSTOOLS)/conf-hooks.d/zz-mandos
502
 
        install initramfs-tools-script \
503
 
                $(INITRAMFSTOOLS)/scripts/init-premount/mandos
504
 
        install initramfs-tools-script-stop \
505
 
                $(INITRAMFSTOOLS)/scripts/local-premount/mandos
506
 
        install --directory $(DRACUTMODULE)
507
 
        install --mode=u=rw,go=r --target-directory=$(DRACUTMODULE) \
508
 
                dracut-module/ask-password-mandos.path \
509
 
                dracut-module/ask-password-mandos.service
510
 
        install --mode=u=rwxs,go=rx \
511
 
                --target-directory=$(DRACUTMODULE) \
512
 
                dracut-module/module-setup.sh \
513
 
                dracut-module/cmdline-mandos.sh \
514
 
                dracut-module/password-agent
515
 
        install --mode=u=rw,go=r plugin-runner.conf $(CONFDIR)
516
 
        gzip --best --to-stdout mandos-keygen.8 \
517
 
                > $(MANDIR)/man8/mandos-keygen.8.gz
518
 
        gzip --best --to-stdout plugin-runner.8mandos \
519
 
                > $(MANDIR)/man8/plugin-runner.8mandos.gz
520
 
        gzip --best --to-stdout plugins.d/mandos-client.8mandos \
521
 
                > $(MANDIR)/man8/mandos-client.8mandos.gz
522
 
        gzip --best --to-stdout plugins.d/password-prompt.8mandos \
523
 
                > $(MANDIR)/man8/password-prompt.8mandos.gz
524
 
        gzip --best --to-stdout plugins.d/usplash.8mandos \
525
 
                > $(MANDIR)/man8/usplash.8mandos.gz
526
 
        gzip --best --to-stdout plugins.d/splashy.8mandos \
527
 
                > $(MANDIR)/man8/splashy.8mandos.gz
528
 
        gzip --best --to-stdout plugins.d/askpass-fifo.8mandos \
529
 
                > $(MANDIR)/man8/askpass-fifo.8mandos.gz
530
 
        gzip --best --to-stdout plugins.d/plymouth.8mandos \
531
 
                > $(MANDIR)/man8/plymouth.8mandos.gz
532
 
        gzip --best --to-stdout dracut-module/password-agent.8mandos \
533
 
                > $(MANDIR)/man8/password-agent.8mandos.gz
534
 
 
535
 
.PHONY: install-client
536
 
install-client: install-client-nokey
537
 
# Post-installation stuff
538
 
        -$(PREFIX)/sbin/mandos-keygen --dir "$(KEYDIR)"
539
 
        if command -v update-initramfs >/dev/null; then \
540
 
            update-initramfs -k all -u; \
541
 
        elif command -v dracut >/dev/null; then \
542
 
            for initrd in $(DESTDIR)/boot/initr*-$(LINUXVERSION); do \
543
 
                if [ -w "$$initrd" ]; then \
544
 
                    chmod go-r "$$initrd"; \
545
 
                    dracut --force "$$initrd"; \
546
 
                fi; \
547
 
            done; \
548
 
        fi
549
 
        echo "Now run mandos-keygen --password --dir $(KEYDIR)"
550
 
 
551
 
.PHONY: uninstall
552
 
uninstall: uninstall-server uninstall-client
553
 
 
554
 
.PHONY: uninstall-server
555
 
uninstall-server:
556
 
        -rm --force $(PREFIX)/sbin/mandos \
557
 
                $(PREFIX)/sbin/mandos-ctl \
558
 
                $(PREFIX)/sbin/mandos-monitor \
559
 
                $(MANDIR)/man8/mandos.8.gz \
560
 
                $(MANDIR)/man8/mandos-monitor.8.gz \
561
 
                $(MANDIR)/man8/mandos-ctl.8.gz \
562
 
                $(MANDIR)/man5/mandos.conf.5.gz \
563
 
                $(MANDIR)/man5/mandos-clients.conf.5.gz
564
 
        update-rc.d -f mandos remove
565
 
        -rmdir $(CONFDIR)
566
 
 
567
 
.PHONY: uninstall-client
568
 
uninstall-client:
569
 
# Refuse to uninstall client if /etc/crypttab is explicitly configured
570
 
# to use it.
571
 
        ! grep --regexp='^ *[^ #].*keyscript=[^,=]*/mandos/' \
572
 
                $(DESTDIR)/etc/crypttab
573
 
        -rm --force $(PREFIX)/sbin/mandos-keygen \
574
 
                $(LIBDIR)/mandos/plugin-runner \
575
 
                $(LIBDIR)/mandos/plugins.d/password-prompt \
576
 
                $(LIBDIR)/mandos/plugins.d/mandos-client \
577
 
                $(LIBDIR)/mandos/plugins.d/usplash \
578
 
                $(LIBDIR)/mandos/plugins.d/splashy \
579
 
                $(LIBDIR)/mandos/plugins.d/askpass-fifo \
580
 
                $(LIBDIR)/mandos/plugins.d/plymouth \
581
 
                $(INITRAMFSTOOLS)/hooks/mandos \
582
 
                $(INITRAMFSTOOLS)/conf-hooks.d/mandos \
583
 
                $(INITRAMFSTOOLS)/scripts/init-premount/mandos \
584
 
                $(INITRAMFSTOOLS)/scripts/local-premount/mandos \
585
 
                $(DRACUTMODULE)/ask-password-mandos.path \
586
 
                $(DRACUTMODULE)/ask-password-mandos.service \
587
 
                $(DRACUTMODULE)/module-setup.sh \
588
 
                $(DRACUTMODULE)/cmdline-mandos.sh \
589
 
                $(DRACUTMODULE)/password-agent \
590
 
                $(MANDIR)/man8/mandos-keygen.8.gz \
591
 
                $(MANDIR)/man8/plugin-runner.8mandos.gz \
592
 
                $(MANDIR)/man8/mandos-client.8mandos.gz
593
 
                $(MANDIR)/man8/password-prompt.8mandos.gz \
594
 
                $(MANDIR)/man8/usplash.8mandos.gz \
595
 
                $(MANDIR)/man8/splashy.8mandos.gz \
596
 
                $(MANDIR)/man8/askpass-fifo.8mandos.gz \
597
 
                $(MANDIR)/man8/plymouth.8mandos.gz \
598
 
                $(MANDIR)/man8/password-agent.8mandos.gz \
599
 
        -rmdir $(LIBDIR)/mandos/plugins.d $(CONFDIR)/plugins.d \
600
 
                 $(LIBDIR)/mandos $(CONFDIR) $(KEYDIR) $(DRACUTMODULE)
601
 
        if command -v update-initramfs >/dev/null; then \
602
 
            update-initramfs -k all -u; \
603
 
        elif command -v dracut >/dev/null; then \
604
 
            for initrd in $(DESTDIR)/boot/initr*-$(LINUXVERSION); do \
605
 
                test -w "$$initrd" && dracut --force "$$initrd"; \
606
 
            done; \
607
 
        fi
608
 
 
609
 
.PHONY: purge
610
 
purge: purge-server purge-client
611
 
 
612
 
.PHONY: purge-server
613
 
purge-server: uninstall-server
614
 
        -rm --force $(CONFDIR)/mandos.conf $(CONFDIR)/clients.conf \
615
 
                $(DESTDIR)/etc/dbus-1/system.d/mandos.conf
616
 
                $(DESTDIR)/etc/default/mandos \
617
 
                $(DESTDIR)/etc/init.d/mandos \
618
 
                $(SYSTEMD)/mandos.service \
619
 
                $(DESTDIR)/run/mandos.pid \
620
 
                $(DESTDIR)/var/run/mandos.pid
621
 
        -rmdir $(CONFDIR)
622
 
 
623
 
.PHONY: purge-client
624
 
purge-client: uninstall-client
625
 
        -shred --remove $(KEYDIR)/seckey.txt $(KEYDIR)/tls-privkey.pem
626
 
        -rm --force $(CONFDIR)/plugin-runner.conf \
627
 
                $(KEYDIR)/pubkey.txt $(KEYDIR)/seckey.txt \
628
 
                $(KEYDIR)/tls-pubkey.txt $(KEYDIR)/tls-privkey.txt
629
 
        -rmdir $(KEYDIR) $(CONFDIR)/plugins.d $(CONFDIR)
 
7
        rm -f plugbasedclient
 
8
 
 
9
client_debug: client
 
10
        mv -f client client.tmp
 
11
        $(MAKE) client CXXFLAGS="$(CXXFLAGS) -DDEBUG -DCERT_ROOT=\\\"./\\\""
 
12
        mv client client_debug
 
13
        mv client.tmp client