/mandos/release

To get this branch, use:
bzr branch http://bzr.recompile.se/loggerhead/mandos/release

« back to all changes in this revision

Viewing changes to Makefile

  • Committer: Teddy Hogeborn
  • Date: 2024-09-09 01:36:41 UTC
  • mto: This revision was merged to the branch mainline in revision 410.
  • Revision ID: teddy@recompile.se-20240909013641-6zu6kx2f7meu134k
Make all required directories when installing

When installing into a normal system, one can assume that target
directories, such as /usr/bin, already exists.  But when installing
into a subdirectory for the purpose of creating a package, one cannot
assume that all directories already exist.  Therefore, when
installing, we must not check if any directories exist, and must
instead always create any directories we want to install into.

* Makefile (confdir/mandos.conf, confdir/clients.conf, install-html):
  Use the "-D" option to "install" instead of creating the directory
  separately.
  (install-server): Move creation of $(CONFDIR) down to before it is
  needed.  Don't check if the $(TMPFILES) or $(SYSUSERS) directories
  exist; instead create them by using the "-D" option to "install".
  Create the $(PREFIX)/sbin directory.  Always use
  "--target-directory" if possible; i.e. if the file name is the same.
  Create the $(DBUSPOLICYDIR) and $(DESTDIR)/etc/init.d directories by
  using the "-D" option to "install".  Don't check if the $(SYSTEMD)
  directory exists; instead create it by using the "-D" option to
  "install".  Create the $(DESTDIR)/etc/default and $(MANDIR)/man8
  directories by using the "-D" option to "install".  Create the
  $(MANDIR)/man5 directories explicitly.
  (install-client-nokey): Remove unnecessary creation of the
  $(CONFDIR) directory.  Don't check if the $(SYSUSERS) directory
  exists; instead create it by using the "-D" option to "install".
  Move the "--directory" argument to be the first argument, for
  clarity.  Create the $(PREFIX)/sbin directory.  Use the "-D"
  argument to "install" when installing
  $(INITRAMFSTOOLS)/hooks/mandos,
  $(INITRAMFSTOOLS)/conf.d/mandos-conf,
  $(INITRAMFSTOOLS)/conf-hooks.d/zz-mandos,
  $(INITRAMFSTOOLS)/scripts/init-premount/mandos,
  $(INITRAMFSTOOLS)/scripts/local-premount/mandos,
  $(DRACUTMODULE)/ask-password-mandos.path, and
  $(DRACUTMODULE)/dracut-module/ask-password-mandos.service.  Create
  the $(MANDIR)/man8 directory.

Reported-By: Erich Eckner <erich@eckner.net>
Thanks: Erich Eckner <erich@eckner.net> for analysis

Show diffs side-by-side

added added

removed removed

Lines of Context:
10
10
        -Wmissing-format-attribute -Wnormalized=nfc -Wpacked \
11
11
        -Wredundant-decls -Wnested-externs -Winline -Wvla \
12
12
        -Wvolatile-register-var -Woverlength-strings
13
 
#DEBUG:=-ggdb3 -fsanitize=address 
14
 
# For info about _FORTIFY_SOURCE, see feature_test_macros(7)
15
 
# and <https://gcc.gnu.org/ml/gcc-patches/2004-09/msg02055.html>.
16
 
FORTIFY:=-D_FORTIFY_SOURCE=2 -fstack-protector-all -fPIC
 
13
 
 
14
#DEBUG:=-ggdb3 -fsanitize=address $(SANITIZE)
 
15
## Check which sanitizing options can be used
 
16
#SANITIZE:=$(foreach option,$(ALL_SANITIZE_OPTIONS),$(shell \
 
17
#       echo 'int main(){}' | $(CC) --language=c $(option) \
 
18
#       /dev/stdin -o /dev/null >/dev/null 2>&1 && echo $(option)))
17
19
# <https://developerblog.redhat.com/2014/10/16/gcc-undefined-behavior-sanitizer-ubsan/>
18
20
ALL_SANITIZE_OPTIONS:=-fsanitize=leak -fsanitize=undefined \
19
21
        -fsanitize=shift -fsanitize=integer-divide-by-zero \
23
25
        -fsanitize=object-size -fsanitize=float-divide-by-zero \
24
26
        -fsanitize=float-cast-overflow -fsanitize=nonnull-attribute \
25
27
        -fsanitize=returns-nonnull-attribute -fsanitize=bool \
26
 
        -fsanitize=enum
27
 
# Check which sanitizing options can be used
28
 
SANITIZE:=$(foreach option,$(ALL_SANITIZE_OPTIONS),$(shell \
29
 
        echo 'int main(){}' | $(CC) --language=c $(option) /dev/stdin \
30
 
        -o /dev/null >/dev/null 2>&1 && echo $(option)))
 
28
        -fsanitize=enum -fsanitize-address-use-after-scope
 
29
 
 
30
# For info about _FORTIFY_SOURCE, see feature_test_macros(7)
 
31
# and <https://gcc.gnu.org/ml/gcc-patches/2004-09/msg02055.html>.
 
32
FORTIFY:=-fstack-protector-all -fPIC
 
33
CPPFLAGS+=-D_FORTIFY_SOURCE=3
31
34
LINK_FORTIFY_LD:=-z relro -z now
32
35
LINK_FORTIFY:=
33
36
 
39
42
#COVERAGE=--coverage
40
43
OPTIMIZE:=-Os -fno-strict-aliasing
41
44
LANGUAGE:=-std=gnu11
 
45
CPPFLAGS+=-D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64
42
46
htmldir:=man
43
 
version:=1.8.3
 
47
version:=1.8.16
44
48
SED:=sed
45
 
 
46
 
USER:=$(firstword $(subst :, ,$(shell getent passwd _mandos || getent passwd nobody || echo 65534)))
47
 
GROUP:=$(firstword $(subst :, ,$(shell getent group _mandos || getent group nogroup || echo 65534)))
 
49
PKG_CONFIG?=pkg-config
 
50
 
 
51
USER:=$(firstword $(subst :, ,$(shell getent passwd _mandos \
 
52
        || getent passwd nobody || echo 65534)))
 
53
GROUP:=$(firstword $(subst :, ,$(shell getent group _mandos \
 
54
        || getent group nogroup || echo 65534)))
 
55
 
 
56
LINUXVERSION:=$(shell uname --kernel-release)
48
57
 
49
58
## Use these settings for a traditional /usr/local install
50
59
# PREFIX:=$(DESTDIR)/usr/local
52
61
# KEYDIR:=$(DESTDIR)/etc/mandos/keys
53
62
# MANDIR:=$(PREFIX)/man
54
63
# INITRAMFSTOOLS:=$(DESTDIR)/etc/initramfs-tools
 
64
# DRACUTMODULE:=$(DESTDIR)/usr/lib/dracut/modules.d/90mandos
55
65
# STATEDIR:=$(DESTDIR)/var/lib/mandos
56
66
# LIBDIR:=$(PREFIX)/lib
 
67
# DBUSPOLICYDIR:=$(DESTDIR)/etc/dbus-1/system.d
57
68
##
58
69
 
59
70
## These settings are for a package-type install
62
73
KEYDIR:=$(DESTDIR)/etc/keys/mandos
63
74
MANDIR:=$(PREFIX)/share/man
64
75
INITRAMFSTOOLS:=$(DESTDIR)/usr/share/initramfs-tools
 
76
DRACUTMODULE:=$(DESTDIR)/usr/lib/dracut/modules.d/90mandos
65
77
STATEDIR:=$(DESTDIR)/var/lib/mandos
66
78
LIBDIR:=$(shell \
67
79
        for d in \
68
 
        "/usr/lib/`dpkg-architecture -qDEB_HOST_MULTIARCH 2>/dev/null`" \
 
80
        "/usr/lib/`dpkg-architecture \
 
81
                        -qDEB_HOST_MULTIARCH 2>/dev/null`" \
69
82
        "`rpm --eval='%{_libdir}' 2>/dev/null`" /usr/lib; do \
70
83
                if [ -d "$$d" -a "$$d" = "$${d%/}" ]; then \
71
84
                        echo "$(DESTDIR)$$d"; \
72
85
                        break; \
73
86
                fi; \
74
87
        done)
 
88
DBUSPOLICYDIR:=$(DESTDIR)/usr/share/dbus-1/system.d
75
89
##
76
90
 
77
 
SYSTEMD:=$(DESTDIR)$(shell pkg-config systemd --variable=systemdsystemunitdir)
78
 
TMPFILES:=$(DESTDIR)$(shell pkg-config systemd --variable=tmpfilesdir)
 
91
SYSTEMD:=$(DESTDIR)$(shell $(PKG_CONFIG) systemd \
 
92
                        --variable=systemdsystemunitdir)
 
93
TMPFILES:=$(DESTDIR)$(shell $(PKG_CONFIG) systemd \
 
94
                        --variable=tmpfilesdir)
 
95
SYSUSERS:=$(DESTDIR)$(shell $(PKG_CONFIG) systemd \
 
96
                        --variable=sysusersdir)
79
97
 
80
 
GNUTLS_CFLAGS:=$(shell pkg-config --cflags-only-I gnutls)
81
 
GNUTLS_LIBS:=$(shell pkg-config --libs gnutls)
82
 
AVAHI_CFLAGS:=$(shell pkg-config --cflags-only-I avahi-core)
83
 
AVAHI_LIBS:=$(shell pkg-config --libs avahi-core)
84
 
GPGME_CFLAGS:=$(shell gpgme-config --cflags; getconf LFS_CFLAGS)
85
 
GPGME_LIBS:=$(shell gpgme-config --libs; getconf LFS_LIBS; \
 
98
GNUTLS_CFLAGS:=$(shell $(PKG_CONFIG) --cflags-only-I gnutls)
 
99
GNUTLS_LIBS:=$(shell $(PKG_CONFIG) --libs gnutls)
 
100
AVAHI_CFLAGS:=$(shell $(PKG_CONFIG) --cflags-only-I avahi-core)
 
101
AVAHI_LIBS:=$(shell $(PKG_CONFIG) --libs avahi-core)
 
102
GPGME_CFLAGS:=$(shell $(PKG_CONFIG) --cflags-only-I gpgme 2>/dev/null \
 
103
        || gpgme-config --cflags; getconf LFS_CFLAGS)
 
104
GPGME_LIBS:=$(shell $(PKG_CONFIG) --libs gpgme 2>/dev/null \
 
105
        || gpgme-config --libs; getconf LFS_LIBS; \
86
106
        getconf LFS_LDFLAGS)
87
 
LIBNL3_CFLAGS:=$(shell pkg-config --cflags-only-I libnl-route-3.0)
88
 
LIBNL3_LIBS:=$(shell pkg-config --libs libnl-route-3.0)
 
107
LIBNL3_CFLAGS:=$(shell $(PKG_CONFIG) --cflags-only-I libnl-route-3.0)
 
108
LIBNL3_LIBS:=$(shell $(PKG_CONFIG) --libs libnl-route-3.0)
 
109
GLIB_CFLAGS:=$(shell $(PKG_CONFIG) --cflags glib-2.0)
 
110
GLIB_LIBS:=$(shell $(PKG_CONFIG) --libs glib-2.0)
89
111
 
90
112
# Do not change these two
91
 
CFLAGS+=$(WARN) $(DEBUG) $(FORTIFY) $(SANITIZE) $(COVERAGE) \
92
 
        $(OPTIMIZE) $(LANGUAGE) -DVERSION='"$(version)"'
93
 
LDFLAGS+=-Xlinker --as-needed $(COVERAGE) $(LINK_FORTIFY) $(foreach flag,$(LINK_FORTIFY_LD),-Xlinker $(flag))
 
113
CFLAGS+=$(WARN) $(DEBUG) $(FORTIFY) $(COVERAGE) $(OPTIMIZE) \
 
114
        $(LANGUAGE) -DVERSION='"$(version)"'
 
115
LDFLAGS+=-Xlinker --as-needed $(COVERAGE) $(LINK_FORTIFY) $(strip \
 
116
        ) $(foreach flag,$(LINK_FORTIFY_LD),-Xlinker $(flag))
94
117
 
95
118
# Commands to format a DocBook <refentry> document into a manual page
96
119
DOCBOOKTOMAN=$(strip cd $(dir $<); xsltproc --nonet --xinclude \
102
125
        /usr/share/xml/docbook/stylesheet/nwalsh/manpages/docbook.xsl \
103
126
        $(notdir $<); \
104
127
        if locale --all 2>/dev/null | grep --regexp='^en_US\.utf8$$' \
105
 
        && type man 2>/dev/null; then LANG=en_US.UTF-8 MANWIDTH=80 \
106
 
        man --warnings --encoding=UTF-8 --local-file $(notdir $@); \
107
 
        fi >/dev/null)
 
128
        && command -v man >/dev/null; then LANG=en_US.UTF-8 \
 
129
        MANWIDTH=80 man --warnings --encoding=UTF-8 --local-file \
 
130
        $(notdir $@); fi >/dev/null)
108
131
 
109
132
DOCBOOKTOHTML=$(strip xsltproc --nonet --xinclude \
110
133
        --param make.year.ranges                1 \
123
146
        plugins.d/usplash plugins.d/splashy plugins.d/askpass-fifo \
124
147
        plugins.d/plymouth
125
148
PLUGIN_HELPERS:=plugin-helpers/mandos-client-iprouteadddel
126
 
CPROGS:=plugin-runner $(PLUGINS) $(PLUGIN_HELPERS)
 
149
CPROGS:=plugin-runner dracut-module/password-agent $(PLUGINS) \
 
150
        $(PLUGIN_HELPERS)
127
151
PROGS:=mandos mandos-keygen mandos-ctl mandos-monitor $(CPROGS)
128
152
DOCS:=mandos.8 mandos-keygen.8 mandos-monitor.8 mandos-ctl.8 \
129
153
        mandos.conf.5 mandos-clients.conf.5 plugin-runner.8mandos \
 
154
        dracut-module/password-agent.8mandos \
130
155
        plugins.d/mandos-client.8mandos \
131
156
        plugins.d/password-prompt.8mandos plugins.d/usplash.8mandos \
132
157
        plugins.d/splashy.8mandos plugins.d/askpass-fifo.8mandos \
136
161
 
137
162
objects:=$(addsuffix .o,$(CPROGS))
138
163
 
 
164
.PHONY: all
139
165
all: $(PROGS) mandos.lsm
140
166
 
 
167
.PHONY: doc
141
168
doc: $(DOCS)
142
169
 
 
170
.PHONY: html
143
171
html: $(htmldocs)
144
172
 
145
173
%.5: %.xml common.ent legalnotice.xml
204
232
                overview.xml legalnotice.xml
205
233
        $(DOCBOOKTOHTML)
206
234
 
 
235
dracut-module/password-agent.8mandos: \
 
236
                dracut-module/password-agent.xml common.ent \
 
237
                overview.xml legalnotice.xml
 
238
        $(DOCBOOKTOMAN)
 
239
dracut-module/password-agent.8mandos.xhtml: \
 
240
                dracut-module/password-agent.xml common.ent \
 
241
                overview.xml legalnotice.xml
 
242
        $(DOCBOOKTOHTML)
 
243
 
207
244
plugins.d/mandos-client.8mandos: plugins.d/mandos-client.xml \
208
245
                                        common.ent \
209
246
                                        mandos-options.xml \
252
289
                --expression='s/\(mandos_\)[0-9.]\+\(\.orig\.tar\.gz\)/\1$(version)\2/' \
253
290
                $@)
254
291
 
255
 
# Need to add the GnuTLS, Avahi and GPGME libraries, and can't use
256
 
# -fsanitize=leak because GnuTLS and GPGME both leak memory.
257
 
plugins.d/mandos-client: plugins.d/mandos-client.c
258
 
        $(CC) $(filter-out -fsanitize=leak,$(CFLAGS)) $(strip\
259
 
        ) $(GNUTLS_CFLAGS) $(AVAHI_CFLAGS) $(GPGME_CFLAGS) $(strip\
260
 
                ) $(CPPFLAGS) $(LDFLAGS) $(TARGET_ARCH) $^ $(strip\
261
 
                ) -lrt $(GNUTLS_LIBS) $(AVAHI_LIBS) $(strip\
262
 
                ) $(GPGME_LIBS) $(LOADLIBES) $(LDLIBS) -o $@
263
 
 
264
 
plugin-helpers/mandos-client-iprouteadddel: plugin-helpers/mandos-client-iprouteadddel.c
265
 
        $(LINK.c) $(LIBNL3_CFLAGS) $^ $(LIBNL3_LIBS) $(strip\
266
 
                ) $(LOADLIBES) $(LDLIBS) -o $@
267
 
 
268
 
.PHONY : all doc html clean distclean mostlyclean maintainer-clean \
269
 
        check run-client run-server install install-html \
270
 
        install-server install-client-nokey install-client uninstall \
271
 
        uninstall-server uninstall-client purge purge-server \
272
 
        purge-client
273
 
 
 
292
# Need to add the GnuTLS, Avahi and GPGME libraries
 
293
plugins.d/mandos-client: CFLAGS += $(GNUTLS_CFLAGS) $(strip \
 
294
        ) $(AVAHI_CFLAGS) $(GPGME_CFLAGS)
 
295
plugins.d/mandos-client: LDLIBS += $(GNUTLS_LIBS) $(strip \
 
296
        ) $(AVAHI_LIBS) $(GPGME_LIBS)
 
297
 
 
298
# Need to add the libnl-route library
 
299
plugin-helpers/mandos-client-iprouteadddel: CFLAGS += $(LIBNL3_CFLAGS)
 
300
plugin-helpers/mandos-client-iprouteadddel: LDLIBS += $(LIBNL3_LIBS)
 
301
 
 
302
# Need to add the GLib and pthread libraries
 
303
dracut-module/password-agent: CFLAGS += $(GLIB_CFLAGS)
 
304
# Note: -lpthread is unnecessary with the GNU C library 2.34 or later
 
305
dracut-module/password-agent: LDLIBS += $(GLIB_LIBS) -lpthread
 
306
 
 
307
.PHONY: clean
274
308
clean:
275
309
        -rm --force $(CPROGS) $(objects) $(htmldocs) $(DOCS) core
276
310
 
 
311
.PHONY: distclean
277
312
distclean: clean
 
313
.PHONY: mostlyclean
278
314
mostlyclean: clean
 
315
.PHONY: maintainer-clean
279
316
maintainer-clean: clean
280
317
        -rm --force --recursive keydir confdir statedir
281
318
 
282
 
check:  all
 
319
.PHONY: check
 
320
check: all
283
321
        ./mandos --check
284
322
        ./mandos-ctl --check
 
323
        ./mandos-keygen --version
 
324
        ./plugin-runner --version
 
325
        ./plugin-helpers/mandos-client-iprouteadddel --version
 
326
        ./dracut-module/password-agent --test
285
327
 
286
328
# Run the client with a local config and key
287
 
run-client: all keydir/seckey.txt keydir/pubkey.txt keydir/tls-privkey.pem keydir/tls-pubkey.pem
288
 
        @echo "###################################################################"
289
 
        @echo "# The following error messages are harmless and can be safely     #"
290
 
        @echo "# ignored:                                                        #"
291
 
        @echo "# From plugin-runner: setgid: Operation not permitted             #"
292
 
        @echo "#                     setuid: Operation not permitted             #"
293
 
        @echo "# From askpass-fifo:  mkfifo: Permission denied                   #"
294
 
        @echo "# From mandos-client:                                             #"
295
 
        @echo "#             Failed to raise privileges: Operation not permitted #"
296
 
        @echo "#             Warning: network hook \"*\" exited with status *      #"
297
 
        @echo "#                                                                 #"
298
 
        @echo "# (The messages are caused by not running as root, but you should #"
299
 
        @echo "# NOT run \"make run-client\" as root unless you also unpacked and  #"
300
 
        @echo "# compiled Mandos as root, which is also NOT recommended.)        #"
301
 
        @echo "###################################################################"
 
329
.PHONY: run-client
 
330
run-client: all keydir/seckey.txt keydir/pubkey.txt \
 
331
                        keydir/tls-privkey.pem keydir/tls-pubkey.pem
 
332
        @echo '######################################################'
 
333
        @echo '# The following error messages are harmless and can  #'
 
334
        @echo '#  be safely ignored:                                #'
 
335
        @echo '## From plugin-runner:                               #'
 
336
        @echo '# setgid: Operation not permitted                    #'
 
337
        @echo '# setuid: Operation not permitted                    #'
 
338
        @echo '## From askpass-fifo:                                #'
 
339
        @echo '# mkfifo: Permission denied                          #'
 
340
        @echo '## From mandos-client:                               #'
 
341
        @echo '# Failed to raise privileges: Operation not permi... #'
 
342
        @echo '# Warning: network hook "*" exited with status *     #'
 
343
        @echo '# ioctl SIOCSIFFLAGS +IFF_UP: Operation not permi... #'
 
344
        @echo '# Failed to bring up interface "*": Operation not... #'
 
345
        @echo '#                                                    #'
 
346
        @echo '# (The messages are caused by not running as root,   #'
 
347
        @echo '# but you should NOT run "make run-client" as root   #'
 
348
        @echo '# unless you also unpacked and compiled Mandos as    #'
 
349
        @echo '# root, which is also NOT recommended.)              #'
 
350
        @echo '######################################################'
302
351
# We set GNOME_KEYRING_CONTROL to block pam_gnome_keyring
303
352
        ./plugin-runner --plugin-dir=plugins.d \
304
353
                --plugin-helper-dir=plugin-helpers \
311
360
keydir/seckey.txt keydir/pubkey.txt keydir/tls-privkey.pem keydir/tls-pubkey.pem: mandos-keygen
312
361
        install --directory keydir
313
362
        ./mandos-keygen --dir keydir --force
 
363
        if ! [ -e keydir/tls-privkey.pem ]; then \
 
364
                install --mode=u=rw /dev/null keydir/tls-privkey.pem; \
 
365
        fi
 
366
        if ! [ -e keydir/tls-pubkey.pem ]; then \
 
367
                install --mode=u=rw /dev/null keydir/tls-pubkey.pem; \
 
368
        fi
314
369
 
315
370
# Run the server with a local config
 
371
.PHONY: run-server
316
372
run-server: confdir/mandos.conf confdir/clients.conf statedir
317
373
        ./mandos --debug --no-dbus --configdir=confdir \
318
374
                --statedir=statedir $(SERVERARGS)
319
375
 
320
376
# Used by run-server
321
377
confdir/mandos.conf: mandos.conf
322
 
        install --directory confdir
323
 
        install --mode=u=rw,go=r $^ $@
 
378
        install -D --mode=u=rw,go=r $^ $@
324
379
confdir/clients.conf: clients.conf keydir/seckey.txt keydir/tls-pubkey.pem
325
 
        install --directory confdir
326
 
        install --mode=u=rw $< $@
 
380
        install -D --mode=u=rw $< $@
327
381
# Add a client password
328
382
        ./mandos-keygen --dir keydir --password --no-ssh >> $@
329
383
statedir:
330
384
        install --directory statedir
331
385
 
 
386
.PHONY: install
332
387
install: install-server install-client-nokey
333
388
 
 
389
.PHONY: install-html
334
390
install-html: html
335
 
        install --directory $(htmldir)
336
 
        install --mode=u=rw,go=r --target-directory=$(htmldir) \
 
391
        install -D --mode=u=rw,go=r --target-directory=$(htmldir) \
337
392
                $(htmldocs)
338
393
 
 
394
.PHONY: install-server
339
395
install-server: doc
340
 
        install --directory $(CONFDIR)
341
396
        if install --directory --mode=u=rwx --owner=$(USER) \
342
397
                --group=$(GROUP) $(STATEDIR); then \
343
398
                :; \
344
399
        elif install --directory --mode=u=rwx $(STATEDIR); then \
345
400
                chown -- $(USER):$(GROUP) $(STATEDIR) || :; \
346
401
        fi
347
 
        if [ "$(TMPFILES)" != "$(DESTDIR)" -a -d "$(TMPFILES)" ]; then \
348
 
                install --mode=u=rw,go=r tmpfiles.d-mandos.conf \
 
402
        if [ "$(TMPFILES)" != "$(DESTDIR)" ]; then \
 
403
                install -D --mode=u=rw,go=r tmpfiles.d-mandos.conf \
349
404
                        $(TMPFILES)/mandos.conf; \
350
405
        fi
351
 
        install --mode=u=rwx,go=rx mandos $(PREFIX)/sbin/mandos
 
406
        if [ "$(SYSUSERS)" != "$(DESTDIR)" ]; then \
 
407
                install -D --mode=u=rw,go=r sysusers.d-mandos.conf \
 
408
                        $(SYSUSERS)/mandos.conf; \
 
409
        fi
 
410
        install --directory $(PREFIX)/sbin
 
411
        install --mode=u=rwx,go=rx --target-directory=$(PREFIX)/sbin \
 
412
                mandos
352
413
        install --mode=u=rwx,go=rx --target-directory=$(PREFIX)/sbin \
353
414
                mandos-ctl
354
415
        install --mode=u=rwx,go=rx --target-directory=$(PREFIX)/sbin \
355
416
                mandos-monitor
 
417
        install --directory $(CONFDIR)
356
418
        install --mode=u=rw,go=r --target-directory=$(CONFDIR) \
357
419
                mandos.conf
358
420
        install --mode=u=rw --target-directory=$(CONFDIR) \
359
421
                clients.conf
360
 
        install --mode=u=rw,go=r dbus-mandos.conf \
361
 
                $(DESTDIR)/etc/dbus-1/system.d/mandos.conf
362
 
        install --mode=u=rwx,go=rx init.d-mandos \
 
422
        install -D --mode=u=rw,go=r dbus-mandos.conf \
 
423
                $(DBUSPOLICYDIR)/mandos.conf
 
424
        install -D --mode=u=rwx,go=rx init.d-mandos \
363
425
                $(DESTDIR)/etc/init.d/mandos
364
 
        if [ "$(SYSTEMD)" != "$(DESTDIR)" -a -d "$(SYSTEMD)" ]; then \
365
 
                install --mode=u=rw,go=r mandos.service $(SYSTEMD); \
 
426
        if [ "$(SYSTEMD)" != "$(DESTDIR)" ]; then \
 
427
                install -D --mode=u=rw,go=r mandos.service \
 
428
                        $(SYSTEMD); \
366
429
        fi
367
 
        install --mode=u=rw,go=r default-mandos \
 
430
        install -D --mode=u=rw,go=r default-mandos \
368
431
                $(DESTDIR)/etc/default/mandos
369
432
        if [ -z $(DESTDIR) ]; then \
370
433
                update-rc.d mandos defaults 25 15;\
371
434
        fi
 
435
        install --directory $(MANDIR)/man8 $(MANDIR)/man5
372
436
        gzip --best --to-stdout mandos.8 \
373
437
                > $(MANDIR)/man8/mandos.8.gz
374
438
        gzip --best --to-stdout mandos-monitor.8 \
382
446
        gzip --best --to-stdout intro.8mandos \
383
447
                > $(MANDIR)/man8/intro.8mandos.gz
384
448
 
 
449
.PHONY: install-client-nokey
385
450
install-client-nokey: all doc
386
 
        install --directory $(LIBDIR)/mandos $(CONFDIR)
387
451
        install --directory --mode=u=rwx $(KEYDIR) \
388
452
                $(LIBDIR)/mandos/plugins.d \
389
453
                $(LIBDIR)/mandos/plugin-helpers
 
454
        if [ "$(SYSUSERS)" != "$(DESTDIR)" ]; then \
 
455
                install -D --mode=u=rw,go=r sysusers.d-mandos.conf \
 
456
                        $(SYSUSERS)/mandos-client.conf; \
 
457
        fi
390
458
        if [ "$(CONFDIR)" != "$(LIBDIR)/mandos" ]; then \
391
 
                install --mode=u=rwx \
392
 
                        --directory "$(CONFDIR)/plugins.d" \
 
459
                install --directory \
 
460
                        --mode=u=rwx "$(CONFDIR)/plugins.d" \
393
461
                        "$(CONFDIR)/plugin-helpers"; \
394
462
        fi
395
 
        install --mode=u=rwx,go=rx --directory \
 
463
        install --directory --mode=u=rwx,go=rx \
396
464
                "$(CONFDIR)/network-hooks.d"
397
465
        install --mode=u=rwx,go=rx \
398
466
                --target-directory=$(LIBDIR)/mandos plugin-runner
399
467
        install --mode=u=rwx,go=rx \
400
 
                --target-directory=$(LIBDIR)/mandos mandos-to-cryptroot-unlock
 
468
                --target-directory=$(LIBDIR)/mandos \
 
469
                mandos-to-cryptroot-unlock
 
470
        install --directory $(PREFIX)/sbin
401
471
        install --mode=u=rwx,go=rx --target-directory=$(PREFIX)/sbin \
402
472
                mandos-keygen
403
473
        install --mode=u=rwx,go=rx \
421
491
        install --mode=u=rwx,go=rx \
422
492
                --target-directory=$(LIBDIR)/mandos/plugin-helpers \
423
493
                plugin-helpers/mandos-client-iprouteadddel
424
 
        install initramfs-tools-hook \
 
494
        install -D initramfs-tools-hook \
425
495
                $(INITRAMFSTOOLS)/hooks/mandos
426
 
        install --mode=u=rw,go=r initramfs-tools-conf \
 
496
        install -D --mode=u=rw,go=r initramfs-tools-conf \
427
497
                $(INITRAMFSTOOLS)/conf.d/mandos-conf
428
 
        install initramfs-tools-script \
 
498
        install -D --mode=u=rw,go=r initramfs-tools-conf-hook \
 
499
                $(INITRAMFSTOOLS)/conf-hooks.d/zz-mandos
 
500
        install -D initramfs-tools-script \
429
501
                $(INITRAMFSTOOLS)/scripts/init-premount/mandos
430
 
        install initramfs-tools-script-stop \
 
502
        install -D initramfs-tools-script-stop \
431
503
                $(INITRAMFSTOOLS)/scripts/local-premount/mandos
 
504
        install -D --mode=u=rw,go=r \
 
505
                --target-directory=$(DRACUTMODULE) \
 
506
                dracut-module/ask-password-mandos.path \
 
507
                dracut-module/ask-password-mandos.service
 
508
        install --mode=u=rwxs,go=rx \
 
509
                --target-directory=$(DRACUTMODULE) \
 
510
                dracut-module/module-setup.sh \
 
511
                dracut-module/cmdline-mandos.sh \
 
512
                dracut-module/password-agent
432
513
        install --mode=u=rw,go=r plugin-runner.conf $(CONFDIR)
 
514
        install --directory $(MANDIR)/man8
433
515
        gzip --best --to-stdout mandos-keygen.8 \
434
516
                > $(MANDIR)/man8/mandos-keygen.8.gz
435
517
        gzip --best --to-stdout plugin-runner.8mandos \
446
528
                > $(MANDIR)/man8/askpass-fifo.8mandos.gz
447
529
        gzip --best --to-stdout plugins.d/plymouth.8mandos \
448
530
                > $(MANDIR)/man8/plymouth.8mandos.gz
 
531
        gzip --best --to-stdout dracut-module/password-agent.8mandos \
 
532
                > $(MANDIR)/man8/password-agent.8mandos.gz
449
533
 
 
534
.PHONY: install-client
450
535
install-client: install-client-nokey
451
536
# Post-installation stuff
452
537
        -$(PREFIX)/sbin/mandos-keygen --dir "$(KEYDIR)"
453
 
        update-initramfs -k all -u
 
538
        if command -v update-initramfs >/dev/null; then \
 
539
            update-initramfs -k all -u; \
 
540
        elif command -v dracut >/dev/null; then \
 
541
            for initrd in $(DESTDIR)/boot/initr*-$(LINUXVERSION); do \
 
542
                if [ -w "$$initrd" ]; then \
 
543
                    chmod go-r "$$initrd"; \
 
544
                    dracut --force "$$initrd"; \
 
545
                fi; \
 
546
            done; \
 
547
        fi
454
548
        echo "Now run mandos-keygen --password --dir $(KEYDIR)"
455
549
 
 
550
.PHONY: uninstall
456
551
uninstall: uninstall-server uninstall-client
457
552
 
 
553
.PHONY: uninstall-server
458
554
uninstall-server:
459
555
        -rm --force $(PREFIX)/sbin/mandos \
460
556
                $(PREFIX)/sbin/mandos-ctl \
467
563
        update-rc.d -f mandos remove
468
564
        -rmdir $(CONFDIR)
469
565
 
 
566
.PHONY: uninstall-client
470
567
uninstall-client:
471
568
# Refuse to uninstall client if /etc/crypttab is explicitly configured
472
569
# to use it.
483
580
                $(INITRAMFSTOOLS)/hooks/mandos \
484
581
                $(INITRAMFSTOOLS)/conf-hooks.d/mandos \
485
582
                $(INITRAMFSTOOLS)/scripts/init-premount/mandos \
 
583
                $(INITRAMFSTOOLS)/scripts/local-premount/mandos \
 
584
                $(DRACUTMODULE)/ask-password-mandos.path \
 
585
                $(DRACUTMODULE)/ask-password-mandos.service \
 
586
                $(DRACUTMODULE)/module-setup.sh \
 
587
                $(DRACUTMODULE)/cmdline-mandos.sh \
 
588
                $(DRACUTMODULE)/password-agent \
486
589
                $(MANDIR)/man8/mandos-keygen.8.gz \
487
590
                $(MANDIR)/man8/plugin-runner.8mandos.gz \
488
591
                $(MANDIR)/man8/mandos-client.8mandos.gz
491
594
                $(MANDIR)/man8/splashy.8mandos.gz \
492
595
                $(MANDIR)/man8/askpass-fifo.8mandos.gz \
493
596
                $(MANDIR)/man8/plymouth.8mandos.gz \
 
597
                $(MANDIR)/man8/password-agent.8mandos.gz \
494
598
        -rmdir $(LIBDIR)/mandos/plugins.d $(CONFDIR)/plugins.d \
495
 
                 $(LIBDIR)/mandos $(CONFDIR) $(KEYDIR)
496
 
        update-initramfs -k all -u
 
599
                 $(LIBDIR)/mandos $(CONFDIR) $(KEYDIR) $(DRACUTMODULE)
 
600
        if command -v update-initramfs >/dev/null; then \
 
601
            update-initramfs -k all -u; \
 
602
        elif command -v dracut >/dev/null; then \
 
603
            for initrd in $(DESTDIR)/boot/initr*-$(LINUXVERSION); do \
 
604
                test -w "$$initrd" && dracut --force "$$initrd"; \
 
605
            done; \
 
606
        fi
497
607
 
 
608
.PHONY: purge
498
609
purge: purge-server purge-client
499
610
 
 
611
.PHONY: purge-server
500
612
purge-server: uninstall-server
501
613
        -rm --force $(CONFDIR)/mandos.conf $(CONFDIR)/clients.conf \
502
614
                $(DESTDIR)/etc/dbus-1/system.d/mandos.conf
503
615
                $(DESTDIR)/etc/default/mandos \
504
616
                $(DESTDIR)/etc/init.d/mandos \
505
 
                $(SYSTEMD)/mandos.service \
506
617
                $(DESTDIR)/run/mandos.pid \
507
618
                $(DESTDIR)/var/run/mandos.pid
 
619
        if [ "$(SYSTEMD)" != "$(DESTDIR)" -a -d "$(SYSTEMD)" ]; then \
 
620
                -rm --force -- $(SYSTEMD)/mandos.service; \
 
621
        fi
508
622
        -rmdir $(CONFDIR)
509
623
 
 
624
.PHONY: purge-client
510
625
purge-client: uninstall-client
511
626
        -shred --remove $(KEYDIR)/seckey.txt $(KEYDIR)/tls-privkey.pem
512
627
        -rm --force $(CONFDIR)/plugin-runner.conf \