/mandos/release

To get this branch, use:
bzr branch http://bzr.recompile.se/loggerhead/mandos/release

« back to all changes in this revision

Viewing changes to Makefile

  • Committer: Teddy Hogeborn
  • Date: 2024-09-09 01:36:41 UTC
  • mto: This revision was merged to the branch mainline in revision 410.
  • Revision ID: teddy@recompile.se-20240909013641-6zu6kx2f7meu134k
Make all required directories when installing

When installing into a normal system, one can assume that target
directories, such as /usr/bin, already exists.  But when installing
into a subdirectory for the purpose of creating a package, one cannot
assume that all directories already exist.  Therefore, when
installing, we must not check if any directories exist, and must
instead always create any directories we want to install into.

* Makefile (confdir/mandos.conf, confdir/clients.conf, install-html):
  Use the "-D" option to "install" instead of creating the directory
  separately.
  (install-server): Move creation of $(CONFDIR) down to before it is
  needed.  Don't check if the $(TMPFILES) or $(SYSUSERS) directories
  exist; instead create them by using the "-D" option to "install".
  Create the $(PREFIX)/sbin directory.  Always use
  "--target-directory" if possible; i.e. if the file name is the same.
  Create the $(DBUSPOLICYDIR) and $(DESTDIR)/etc/init.d directories by
  using the "-D" option to "install".  Don't check if the $(SYSTEMD)
  directory exists; instead create it by using the "-D" option to
  "install".  Create the $(DESTDIR)/etc/default and $(MANDIR)/man8
  directories by using the "-D" option to "install".  Create the
  $(MANDIR)/man5 directories explicitly.
  (install-client-nokey): Remove unnecessary creation of the
  $(CONFDIR) directory.  Don't check if the $(SYSUSERS) directory
  exists; instead create it by using the "-D" option to "install".
  Move the "--directory" argument to be the first argument, for
  clarity.  Create the $(PREFIX)/sbin directory.  Use the "-D"
  argument to "install" when installing
  $(INITRAMFSTOOLS)/hooks/mandos,
  $(INITRAMFSTOOLS)/conf.d/mandos-conf,
  $(INITRAMFSTOOLS)/conf-hooks.d/zz-mandos,
  $(INITRAMFSTOOLS)/scripts/init-premount/mandos,
  $(INITRAMFSTOOLS)/scripts/local-premount/mandos,
  $(DRACUTMODULE)/ask-password-mandos.path, and
  $(DRACUTMODULE)/dracut-module/ask-password-mandos.service.  Create
  the $(MANDIR)/man8 directory.

Reported-By: Erich Eckner <erich@eckner.net>
Thanks: Erich Eckner <erich@eckner.net> for analysis

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
WARN=-O -Wall -Wformat=2 -Winit-self -Wmissing-include-dirs \
2
 
        -Wswitch-default -Wswitch-enum -Wunused-parameter \
3
 
        -Wstrict-aliasing=1 -Wextra -Wfloat-equal -Wundef -Wshadow \
 
1
WARN:=-O -Wall -Wextra -Wdouble-promotion -Wformat=2 -Winit-self \
 
2
        -Wmissing-include-dirs -Wswitch-default -Wswitch-enum \
 
3
        -Wunused -Wuninitialized -Wstrict-overflow=5 \
 
4
        -Wsuggest-attribute=pure -Wsuggest-attribute=const \
 
5
        -Wsuggest-attribute=noreturn -Wfloat-equal -Wundef -Wshadow \
4
6
        -Wunsafe-loop-optimizations -Wpointer-arith \
5
7
        -Wbad-function-cast -Wcast-qual -Wcast-align -Wwrite-strings \
6
 
        -Wconversion -Wstrict-prototypes -Wold-style-definition \
7
 
        -Wpacked -Wnested-externs -Winline -Wvolatile-register-var
8
 
#       -Wunreachable-code 
9
 
#DEBUG=-ggdb3
10
 
# For info about _FORTIFY_SOURCE, see
11
 
# <http://www.kernel.org/doc/man-pages/online/pages/man7/feature_test_macros.7.html>
12
 
# and <http://gcc.gnu.org/ml/gcc-patches/2004-09/msg02055.html>.
13
 
FORTIFY=-D_FORTIFY_SOURCE=2 -fstack-protector-all -fPIC
14
 
LINK_FORTIFY_LD=-z relro -z now
15
 
LINK_FORTIFY=
 
8
        -Wconversion -Wlogical-op -Waggregate-return \
 
9
        -Wstrict-prototypes -Wold-style-definition \
 
10
        -Wmissing-format-attribute -Wnormalized=nfc -Wpacked \
 
11
        -Wredundant-decls -Wnested-externs -Winline -Wvla \
 
12
        -Wvolatile-register-var -Woverlength-strings
 
13
 
 
14
#DEBUG:=-ggdb3 -fsanitize=address $(SANITIZE)
 
15
## Check which sanitizing options can be used
 
16
#SANITIZE:=$(foreach option,$(ALL_SANITIZE_OPTIONS),$(shell \
 
17
#       echo 'int main(){}' | $(CC) --language=c $(option) \
 
18
#       /dev/stdin -o /dev/null >/dev/null 2>&1 && echo $(option)))
 
19
# <https://developerblog.redhat.com/2014/10/16/gcc-undefined-behavior-sanitizer-ubsan/>
 
20
ALL_SANITIZE_OPTIONS:=-fsanitize=leak -fsanitize=undefined \
 
21
        -fsanitize=shift -fsanitize=integer-divide-by-zero \
 
22
        -fsanitize=unreachable -fsanitize=vla-bound -fsanitize=null \
 
23
        -fsanitize=return -fsanitize=signed-integer-overflow \
 
24
        -fsanitize=bounds -fsanitize=alignment \
 
25
        -fsanitize=object-size -fsanitize=float-divide-by-zero \
 
26
        -fsanitize=float-cast-overflow -fsanitize=nonnull-attribute \
 
27
        -fsanitize=returns-nonnull-attribute -fsanitize=bool \
 
28
        -fsanitize=enum -fsanitize-address-use-after-scope
 
29
 
 
30
# For info about _FORTIFY_SOURCE, see feature_test_macros(7)
 
31
# and <https://gcc.gnu.org/ml/gcc-patches/2004-09/msg02055.html>.
 
32
FORTIFY:=-fstack-protector-all -fPIC
 
33
CPPFLAGS+=-D_FORTIFY_SOURCE=3
 
34
LINK_FORTIFY_LD:=-z relro -z now
 
35
LINK_FORTIFY:=
16
36
 
17
37
# If BROKEN_PIE is set, do not build with -pie
18
38
ifndef BROKEN_PIE
20
40
LINK_FORTIFY += -pie
21
41
endif
22
42
#COVERAGE=--coverage
23
 
OPTIMIZE=-Os
24
 
LANGUAGE=-std=gnu99
25
 
htmldir=man
26
 
version=1.0.14
27
 
SED=sed
 
43
OPTIMIZE:=-Os -fno-strict-aliasing
 
44
LANGUAGE:=-std=gnu11
 
45
CPPFLAGS+=-D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64
 
46
htmldir:=man
 
47
version:=1.8.16
 
48
SED:=sed
 
49
PKG_CONFIG?=pkg-config
 
50
 
 
51
USER:=$(firstword $(subst :, ,$(shell getent passwd _mandos \
 
52
        || getent passwd nobody || echo 65534)))
 
53
GROUP:=$(firstword $(subst :, ,$(shell getent group _mandos \
 
54
        || getent group nogroup || echo 65534)))
 
55
 
 
56
LINUXVERSION:=$(shell uname --kernel-release)
28
57
 
29
58
## Use these settings for a traditional /usr/local install
30
 
# PREFIX=$(DESTDIR)/usr/local
31
 
# CONFDIR=$(DESTDIR)/etc/mandos
32
 
# KEYDIR=$(DESTDIR)/etc/mandos/keys
33
 
# MANDIR=$(PREFIX)/man
34
 
# INITRAMFSTOOLS=$(DESTDIR)/etc/initramfs-tools
 
59
# PREFIX:=$(DESTDIR)/usr/local
 
60
# CONFDIR:=$(DESTDIR)/etc/mandos
 
61
# KEYDIR:=$(DESTDIR)/etc/mandos/keys
 
62
# MANDIR:=$(PREFIX)/man
 
63
# INITRAMFSTOOLS:=$(DESTDIR)/etc/initramfs-tools
 
64
# DRACUTMODULE:=$(DESTDIR)/usr/lib/dracut/modules.d/90mandos
 
65
# STATEDIR:=$(DESTDIR)/var/lib/mandos
 
66
# LIBDIR:=$(PREFIX)/lib
 
67
# DBUSPOLICYDIR:=$(DESTDIR)/etc/dbus-1/system.d
35
68
##
36
69
 
37
70
## These settings are for a package-type install
38
 
PREFIX=$(DESTDIR)/usr
39
 
CONFDIR=$(DESTDIR)/etc/mandos
40
 
KEYDIR=$(DESTDIR)/etc/keys/mandos
41
 
MANDIR=$(PREFIX)/share/man
42
 
INITRAMFSTOOLS=$(DESTDIR)/usr/share/initramfs-tools
 
71
PREFIX:=$(DESTDIR)/usr
 
72
CONFDIR:=$(DESTDIR)/etc/mandos
 
73
KEYDIR:=$(DESTDIR)/etc/keys/mandos
 
74
MANDIR:=$(PREFIX)/share/man
 
75
INITRAMFSTOOLS:=$(DESTDIR)/usr/share/initramfs-tools
 
76
DRACUTMODULE:=$(DESTDIR)/usr/lib/dracut/modules.d/90mandos
 
77
STATEDIR:=$(DESTDIR)/var/lib/mandos
 
78
LIBDIR:=$(shell \
 
79
        for d in \
 
80
        "/usr/lib/`dpkg-architecture \
 
81
                        -qDEB_HOST_MULTIARCH 2>/dev/null`" \
 
82
        "`rpm --eval='%{_libdir}' 2>/dev/null`" /usr/lib; do \
 
83
                if [ -d "$$d" -a "$$d" = "$${d%/}" ]; then \
 
84
                        echo "$(DESTDIR)$$d"; \
 
85
                        break; \
 
86
                fi; \
 
87
        done)
 
88
DBUSPOLICYDIR:=$(DESTDIR)/usr/share/dbus-1/system.d
43
89
##
44
90
 
45
 
GNUTLS_CFLAGS=$(shell pkg-config --cflags-only-I gnutls)
46
 
GNUTLS_LIBS=$(shell pkg-config --libs gnutls)
47
 
AVAHI_CFLAGS=$(shell pkg-config --cflags-only-I avahi-core)
48
 
AVAHI_LIBS=$(shell pkg-config --libs avahi-core)
49
 
GPGME_CFLAGS=$(shell gpgme-config --cflags; getconf LFS_CFLAGS)
50
 
GPGME_LIBS=$(shell gpgme-config --libs; getconf LFS_LIBS; \
 
91
SYSTEMD:=$(DESTDIR)$(shell $(PKG_CONFIG) systemd \
 
92
                        --variable=systemdsystemunitdir)
 
93
TMPFILES:=$(DESTDIR)$(shell $(PKG_CONFIG) systemd \
 
94
                        --variable=tmpfilesdir)
 
95
SYSUSERS:=$(DESTDIR)$(shell $(PKG_CONFIG) systemd \
 
96
                        --variable=sysusersdir)
 
97
 
 
98
GNUTLS_CFLAGS:=$(shell $(PKG_CONFIG) --cflags-only-I gnutls)
 
99
GNUTLS_LIBS:=$(shell $(PKG_CONFIG) --libs gnutls)
 
100
AVAHI_CFLAGS:=$(shell $(PKG_CONFIG) --cflags-only-I avahi-core)
 
101
AVAHI_LIBS:=$(shell $(PKG_CONFIG) --libs avahi-core)
 
102
GPGME_CFLAGS:=$(shell $(PKG_CONFIG) --cflags-only-I gpgme 2>/dev/null \
 
103
        || gpgme-config --cflags; getconf LFS_CFLAGS)
 
104
GPGME_LIBS:=$(shell $(PKG_CONFIG) --libs gpgme 2>/dev/null \
 
105
        || gpgme-config --libs; getconf LFS_LIBS; \
51
106
        getconf LFS_LDFLAGS)
 
107
LIBNL3_CFLAGS:=$(shell $(PKG_CONFIG) --cflags-only-I libnl-route-3.0)
 
108
LIBNL3_LIBS:=$(shell $(PKG_CONFIG) --libs libnl-route-3.0)
 
109
GLIB_CFLAGS:=$(shell $(PKG_CONFIG) --cflags glib-2.0)
 
110
GLIB_LIBS:=$(shell $(PKG_CONFIG) --libs glib-2.0)
52
111
 
53
112
# Do not change these two
54
 
CFLAGS=$(WARN) $(DEBUG) $(FORTIFY) $(COVERAGE) $(OPTIMIZE) \
55
 
        $(LANGUAGE) $(GNUTLS_CFLAGS) $(AVAHI_CFLAGS) $(GPGME_CFLAGS) \
56
 
        -DVERSION='"$(version)"'
57
 
LDFLAGS=$(COVERAGE) $(LINK_FORTIFY) $(foreach flag,$(LINK_FORTIFY_LD),-Xlinker $(flag))
 
113
CFLAGS+=$(WARN) $(DEBUG) $(FORTIFY) $(COVERAGE) $(OPTIMIZE) \
 
114
        $(LANGUAGE) -DVERSION='"$(version)"'
 
115
LDFLAGS+=-Xlinker --as-needed $(COVERAGE) $(LINK_FORTIFY) $(strip \
 
116
        ) $(foreach flag,$(LINK_FORTIFY_LD),-Xlinker $(flag))
58
117
 
59
118
# Commands to format a DocBook <refentry> document into a manual page
60
119
DOCBOOKTOMAN=$(strip cd $(dir $<); xsltproc --nonet --xinclude \
63
122
        --param make.single.year.ranges         1 \
64
123
        --param man.output.quietly              1 \
65
124
        --param man.authors.section.enabled     0 \
66
 
         /usr/share/xml/docbook/stylesheet/nwalsh/manpages/docbook.xsl \
 
125
        /usr/share/xml/docbook/stylesheet/nwalsh/manpages/docbook.xsl \
67
126
        $(notdir $<); \
68
 
        $(MANPOST) $(notdir $@))
69
 
# DocBook-to-man post-processing to fix a '\n' escape bug
70
 
MANPOST=$(SED) --in-place --expression='s,\\\\en,\\en,g;s,\\n,\\en,g'
 
127
        if locale --all 2>/dev/null | grep --regexp='^en_US\.utf8$$' \
 
128
        && command -v man >/dev/null; then LANG=en_US.UTF-8 \
 
129
        MANWIDTH=80 man --warnings --encoding=UTF-8 --local-file \
 
130
        $(notdir $@); fi >/dev/null)
71
131
 
72
132
DOCBOOKTOHTML=$(strip xsltproc --nonet --xinclude \
73
133
        --param make.year.ranges                1 \
79
139
        /usr/share/xml/docbook/stylesheet/nwalsh/xhtml/docbook.xsl \
80
140
        $<; $(HTMLPOST) $@)
81
141
# Fix citerefentry links
82
 
HTMLPOST=$(SED) --in-place \
 
142
HTMLPOST:=$(SED) --in-place \
83
143
        --expression='s/\(<a class="citerefentry" href="\)\("><span class="citerefentry"><span class="refentrytitle">\)\([^<]*\)\(<\/span>(\)\([^)]*\)\()<\/span><\/a>\)/\1\3.\5\2\3\4\5\6/g'
84
144
 
85
 
PLUGINS=plugins.d/password-prompt plugins.d/mandos-client \
 
145
PLUGINS:=plugins.d/password-prompt plugins.d/mandos-client \
86
146
        plugins.d/usplash plugins.d/splashy plugins.d/askpass-fifo \
87
147
        plugins.d/plymouth
88
 
CPROGS=plugin-runner $(PLUGINS)
89
 
PROGS=mandos mandos-keygen mandos-ctl $(CPROGS)
90
 
DOCS=mandos.8 plugin-runner.8mandos mandos-keygen.8 \
 
148
PLUGIN_HELPERS:=plugin-helpers/mandos-client-iprouteadddel
 
149
CPROGS:=plugin-runner dracut-module/password-agent $(PLUGINS) \
 
150
        $(PLUGIN_HELPERS)
 
151
PROGS:=mandos mandos-keygen mandos-ctl mandos-monitor $(CPROGS)
 
152
DOCS:=mandos.8 mandos-keygen.8 mandos-monitor.8 mandos-ctl.8 \
 
153
        mandos.conf.5 mandos-clients.conf.5 plugin-runner.8mandos \
 
154
        dracut-module/password-agent.8mandos \
91
155
        plugins.d/mandos-client.8mandos \
92
 
        plugins.d/password-prompt.8mandos mandos.conf.5 \
93
 
        plugins.d/usplash.8mandos plugins.d/splashy.8mandos \
94
 
        plugins.d/askpass-fifo.8mandos mandos-clients.conf.5
95
 
 
96
 
htmldocs=$(addsuffix .xhtml,$(DOCS))
97
 
 
98
 
objects=$(addsuffix .o,$(CPROGS))
99
 
 
 
156
        plugins.d/password-prompt.8mandos plugins.d/usplash.8mandos \
 
157
        plugins.d/splashy.8mandos plugins.d/askpass-fifo.8mandos \
 
158
        plugins.d/plymouth.8mandos intro.8mandos
 
159
 
 
160
htmldocs:=$(addsuffix .xhtml,$(DOCS))
 
161
 
 
162
objects:=$(addsuffix .o,$(CPROGS))
 
163
 
 
164
.PHONY: all
100
165
all: $(PROGS) mandos.lsm
101
166
 
 
167
.PHONY: doc
102
168
doc: $(DOCS)
103
169
 
 
170
.PHONY: html
104
171
html: $(htmldocs)
105
172
 
106
173
%.5: %.xml common.ent legalnotice.xml
118
185
%.8mandos.xhtml: %.xml common.ent legalnotice.xml
119
186
        $(DOCBOOKTOHTML)
120
187
 
 
188
intro.8mandos: intro.xml common.ent legalnotice.xml
 
189
        $(DOCBOOKTOMAN)
 
190
intro.8mandos.xhtml: intro.xml common.ent legalnotice.xml
 
191
        $(DOCBOOKTOHTML)
 
192
 
121
193
mandos.8: mandos.xml common.ent mandos-options.xml overview.xml \
122
194
                legalnotice.xml
123
195
        $(DOCBOOKTOMAN)
132
204
                 legalnotice.xml
133
205
        $(DOCBOOKTOHTML)
134
206
 
 
207
mandos-monitor.8: mandos-monitor.xml common.ent overview.xml \
 
208
                legalnotice.xml
 
209
        $(DOCBOOKTOMAN)
 
210
mandos-monitor.8.xhtml: mandos-monitor.xml common.ent overview.xml \
 
211
                 legalnotice.xml
 
212
        $(DOCBOOKTOHTML)
 
213
 
 
214
mandos-ctl.8: mandos-ctl.xml common.ent overview.xml \
 
215
                legalnotice.xml
 
216
        $(DOCBOOKTOMAN)
 
217
mandos-ctl.8.xhtml: mandos-ctl.xml common.ent overview.xml \
 
218
                 legalnotice.xml
 
219
        $(DOCBOOKTOHTML)
 
220
 
135
221
mandos.conf.5: mandos.conf.xml common.ent mandos-options.xml \
136
222
                legalnotice.xml
137
223
        $(DOCBOOKTOMAN)
146
232
                overview.xml legalnotice.xml
147
233
        $(DOCBOOKTOHTML)
148
234
 
 
235
dracut-module/password-agent.8mandos: \
 
236
                dracut-module/password-agent.xml common.ent \
 
237
                overview.xml legalnotice.xml
 
238
        $(DOCBOOKTOMAN)
 
239
dracut-module/password-agent.8mandos.xhtml: \
 
240
                dracut-module/password-agent.xml common.ent \
 
241
                overview.xml legalnotice.xml
 
242
        $(DOCBOOKTOHTML)
 
243
 
149
244
plugins.d/mandos-client.8mandos: plugins.d/mandos-client.xml \
150
245
                                        common.ent \
151
246
                                        mandos-options.xml \
178
273
                --expression='s/^\(version = "\)[^"]*"$$/\1$(version)"/' \
179
274
                $@)
180
275
 
 
276
mandos-monitor: Makefile
 
277
        $(strip $(SED) --in-place \
 
278
                --expression='s/^\(version = "\)[^"]*"$$/\1$(version)"/' \
 
279
                $@)
 
280
 
181
281
mandos.lsm: Makefile
182
282
        $(strip $(SED) --in-place \
183
283
                --expression='s/^\(Version:\).*/\1\t$(version)/' \
189
289
                --expression='s/\(mandos_\)[0-9.]\+\(\.orig\.tar\.gz\)/\1$(version)\2/' \
190
290
                $@)
191
291
 
192
 
plugins.d/mandos-client: plugins.d/mandos-client.c
193
 
        $(LINK.c) $(GNUTLS_LIBS) $(AVAHI_LIBS) $(GPGME_LIBS) $(strip\
194
 
                ) $(COMMON) $^ $(LOADLIBES) $(LDLIBS) -o $@
195
 
 
196
 
.PHONY : all doc html clean distclean run-client run-server install \
197
 
        install-server install-client uninstall uninstall-server \
198
 
        uninstall-client purge purge-server purge-client
199
 
 
 
292
# Need to add the GnuTLS, Avahi and GPGME libraries
 
293
plugins.d/mandos-client: CFLAGS += $(GNUTLS_CFLAGS) $(strip \
 
294
        ) $(AVAHI_CFLAGS) $(GPGME_CFLAGS)
 
295
plugins.d/mandos-client: LDLIBS += $(GNUTLS_LIBS) $(strip \
 
296
        ) $(AVAHI_LIBS) $(GPGME_LIBS)
 
297
 
 
298
# Need to add the libnl-route library
 
299
plugin-helpers/mandos-client-iprouteadddel: CFLAGS += $(LIBNL3_CFLAGS)
 
300
plugin-helpers/mandos-client-iprouteadddel: LDLIBS += $(LIBNL3_LIBS)
 
301
 
 
302
# Need to add the GLib and pthread libraries
 
303
dracut-module/password-agent: CFLAGS += $(GLIB_CFLAGS)
 
304
# Note: -lpthread is unnecessary with the GNU C library 2.34 or later
 
305
dracut-module/password-agent: LDLIBS += $(GLIB_LIBS) -lpthread
 
306
 
 
307
.PHONY: clean
200
308
clean:
201
309
        -rm --force $(CPROGS) $(objects) $(htmldocs) $(DOCS) core
202
310
 
 
311
.PHONY: distclean
203
312
distclean: clean
 
313
.PHONY: mostlyclean
204
314
mostlyclean: clean
 
315
.PHONY: maintainer-clean
205
316
maintainer-clean: clean
206
 
        -rm --force --recursive keydir confdir
 
317
        -rm --force --recursive keydir confdir statedir
207
318
 
208
 
check:  all
 
319
.PHONY: check
 
320
check: all
209
321
        ./mandos --check
 
322
        ./mandos-ctl --check
 
323
        ./mandos-keygen --version
 
324
        ./plugin-runner --version
 
325
        ./plugin-helpers/mandos-client-iprouteadddel --version
 
326
        ./dracut-module/password-agent --test
210
327
 
211
328
# Run the client with a local config and key
212
 
run-client: all keydir/seckey.txt keydir/pubkey.txt
213
 
        @echo "###################################################################"
214
 
        @echo "# The following error messages are harmless and can be safely     #"
215
 
        @echo "# ignored.  The messages are caused by not running as root, but   #"
216
 
        @echo "# you should NOT run \"make run-client\" as root unless you also    #"
217
 
        @echo "# unpacked and compiled Mandos as root, which is NOT recommended. #"
218
 
        @echo "# From plugin-runner: setuid: Operation not permitted             #"
219
 
        @echo "# From askpass-fifo:  mkfifo: Permission denied                   #"
220
 
        @echo "# From mandos-client: setuid: Operation not permitted             #"
221
 
        @echo "#                     seteuid: Operation not permitted            #"
222
 
        @echo "#                     klogctl: Operation not permitted            #"
223
 
        @echo "###################################################################"
 
329
.PHONY: run-client
 
330
run-client: all keydir/seckey.txt keydir/pubkey.txt \
 
331
                        keydir/tls-privkey.pem keydir/tls-pubkey.pem
 
332
        @echo '######################################################'
 
333
        @echo '# The following error messages are harmless and can  #'
 
334
        @echo '#  be safely ignored:                                #'
 
335
        @echo '## From plugin-runner:                               #'
 
336
        @echo '# setgid: Operation not permitted                    #'
 
337
        @echo '# setuid: Operation not permitted                    #'
 
338
        @echo '## From askpass-fifo:                                #'
 
339
        @echo '# mkfifo: Permission denied                          #'
 
340
        @echo '## From mandos-client:                               #'
 
341
        @echo '# Failed to raise privileges: Operation not permi... #'
 
342
        @echo '# Warning: network hook "*" exited with status *     #'
 
343
        @echo '# ioctl SIOCSIFFLAGS +IFF_UP: Operation not permi... #'
 
344
        @echo '# Failed to bring up interface "*": Operation not... #'
 
345
        @echo '#                                                    #'
 
346
        @echo '# (The messages are caused by not running as root,   #'
 
347
        @echo '# but you should NOT run "make run-client" as root   #'
 
348
        @echo '# unless you also unpacked and compiled Mandos as    #'
 
349
        @echo '# root, which is also NOT recommended.)              #'
 
350
        @echo '######################################################'
 
351
# We set GNOME_KEYRING_CONTROL to block pam_gnome_keyring
224
352
        ./plugin-runner --plugin-dir=plugins.d \
 
353
                --plugin-helper-dir=plugin-helpers \
225
354
                --config-file=plugin-runner.conf \
226
 
                --options-for=mandos-client:--seckey=keydir/seckey.txt,--pubkey=keydir/pubkey.txt \
 
355
                --options-for=mandos-client:--seckey=keydir/seckey.txt,--pubkey=keydir/pubkey.txt,--tls-privkey=keydir/tls-privkey.pem,--tls-pubkey=keydir/tls-pubkey.pem,--network-hook-dir=network-hooks.d \
 
356
                --env-for=mandos-client:GNOME_KEYRING_CONTROL= \
227
357
                $(CLIENTARGS)
228
358
 
229
359
# Used by run-client
230
 
keydir/seckey.txt keydir/pubkey.txt: mandos-keygen
 
360
keydir/seckey.txt keydir/pubkey.txt keydir/tls-privkey.pem keydir/tls-pubkey.pem: mandos-keygen
231
361
        install --directory keydir
232
362
        ./mandos-keygen --dir keydir --force
 
363
        if ! [ -e keydir/tls-privkey.pem ]; then \
 
364
                install --mode=u=rw /dev/null keydir/tls-privkey.pem; \
 
365
        fi
 
366
        if ! [ -e keydir/tls-pubkey.pem ]; then \
 
367
                install --mode=u=rw /dev/null keydir/tls-pubkey.pem; \
 
368
        fi
233
369
 
234
370
# Run the server with a local config
235
 
run-server: confdir/mandos.conf confdir/clients.conf
236
 
        @echo "#################################################################"
237
 
        @echo "# NOTE: Please IGNORE the error about \"Could not open file      #"
238
 
        @echo "# u'/var/run/mandos.pid'\" -  it is harmless and is caused by    #"
239
 
        @echo "# the server not running as root.  Do NOT run \"make run-server\" #"
240
 
        @echo "# server as root if you didn't also unpack and compile it thus. #"
241
 
        @echo "#################################################################"
242
 
        ./mandos --debug --no-dbus --configdir=confdir $(SERVERARGS)
 
371
.PHONY: run-server
 
372
run-server: confdir/mandos.conf confdir/clients.conf statedir
 
373
        ./mandos --debug --no-dbus --configdir=confdir \
 
374
                --statedir=statedir $(SERVERARGS)
243
375
 
244
376
# Used by run-server
245
377
confdir/mandos.conf: mandos.conf
246
 
        install --directory confdir
247
 
        install --mode=u=rw,go=r $^ $@
248
 
confdir/clients.conf: clients.conf keydir/seckey.txt
249
 
        install --directory confdir
250
 
        install --mode=u=rw $< $@
 
378
        install -D --mode=u=rw,go=r $^ $@
 
379
confdir/clients.conf: clients.conf keydir/seckey.txt keydir/tls-pubkey.pem
 
380
        install -D --mode=u=rw $< $@
251
381
# Add a client password
252
 
        ./mandos-keygen --dir keydir --password >> $@
 
382
        ./mandos-keygen --dir keydir --password --no-ssh >> $@
 
383
statedir:
 
384
        install --directory statedir
253
385
 
 
386
.PHONY: install
254
387
install: install-server install-client-nokey
255
388
 
 
389
.PHONY: install-html
256
390
install-html: html
257
 
        install --directory $(htmldir)
258
 
        install --mode=u=rw,go=r --target-directory=$(htmldir) \
 
391
        install -D --mode=u=rw,go=r --target-directory=$(htmldir) \
259
392
                $(htmldocs)
260
393
 
 
394
.PHONY: install-server
261
395
install-server: doc
 
396
        if install --directory --mode=u=rwx --owner=$(USER) \
 
397
                --group=$(GROUP) $(STATEDIR); then \
 
398
                :; \
 
399
        elif install --directory --mode=u=rwx $(STATEDIR); then \
 
400
                chown -- $(USER):$(GROUP) $(STATEDIR) || :; \
 
401
        fi
 
402
        if [ "$(TMPFILES)" != "$(DESTDIR)" ]; then \
 
403
                install -D --mode=u=rw,go=r tmpfiles.d-mandos.conf \
 
404
                        $(TMPFILES)/mandos.conf; \
 
405
        fi
 
406
        if [ "$(SYSUSERS)" != "$(DESTDIR)" ]; then \
 
407
                install -D --mode=u=rw,go=r sysusers.d-mandos.conf \
 
408
                        $(SYSUSERS)/mandos.conf; \
 
409
        fi
 
410
        install --directory $(PREFIX)/sbin
 
411
        install --mode=u=rwx,go=rx --target-directory=$(PREFIX)/sbin \
 
412
                mandos
 
413
        install --mode=u=rwx,go=rx --target-directory=$(PREFIX)/sbin \
 
414
                mandos-ctl
 
415
        install --mode=u=rwx,go=rx --target-directory=$(PREFIX)/sbin \
 
416
                mandos-monitor
262
417
        install --directory $(CONFDIR)
263
 
        install --mode=u=rwx,go=rx mandos $(PREFIX)/sbin/mandos
264
418
        install --mode=u=rw,go=r --target-directory=$(CONFDIR) \
265
419
                mandos.conf
266
420
        install --mode=u=rw --target-directory=$(CONFDIR) \
267
421
                clients.conf
268
 
        install --mode=u=rw,go=r dbus-mandos.conf \
269
 
                $(DESTDIR)/etc/dbus-1/system.d/mandos.conf
270
 
        install --mode=u=rwx,go=rx init.d-mandos \
 
422
        install -D --mode=u=rw,go=r dbus-mandos.conf \
 
423
                $(DBUSPOLICYDIR)/mandos.conf
 
424
        install -D --mode=u=rwx,go=rx init.d-mandos \
271
425
                $(DESTDIR)/etc/init.d/mandos
272
 
        install --mode=u=rw,go=r default-mandos \
 
426
        if [ "$(SYSTEMD)" != "$(DESTDIR)" ]; then \
 
427
                install -D --mode=u=rw,go=r mandos.service \
 
428
                        $(SYSTEMD); \
 
429
        fi
 
430
        install -D --mode=u=rw,go=r default-mandos \
273
431
                $(DESTDIR)/etc/default/mandos
274
432
        if [ -z $(DESTDIR) ]; then \
275
433
                update-rc.d mandos defaults 25 15;\
276
434
        fi
 
435
        install --directory $(MANDIR)/man8 $(MANDIR)/man5
277
436
        gzip --best --to-stdout mandos.8 \
278
437
                > $(MANDIR)/man8/mandos.8.gz
 
438
        gzip --best --to-stdout mandos-monitor.8 \
 
439
                > $(MANDIR)/man8/mandos-monitor.8.gz
 
440
        gzip --best --to-stdout mandos-ctl.8 \
 
441
                > $(MANDIR)/man8/mandos-ctl.8.gz
279
442
        gzip --best --to-stdout mandos.conf.5 \
280
443
                > $(MANDIR)/man5/mandos.conf.5.gz
281
444
        gzip --best --to-stdout mandos-clients.conf.5 \
282
445
                > $(MANDIR)/man5/mandos-clients.conf.5.gz
 
446
        gzip --best --to-stdout intro.8mandos \
 
447
                > $(MANDIR)/man8/intro.8mandos.gz
283
448
 
 
449
.PHONY: install-client-nokey
284
450
install-client-nokey: all doc
285
 
        install --directory $(PREFIX)/lib/mandos $(CONFDIR)
286
451
        install --directory --mode=u=rwx $(KEYDIR) \
287
 
                $(PREFIX)/lib/mandos/plugins.d
288
 
        if [ "$(CONFDIR)" != "$(PREFIX)/lib/mandos" ]; then \
289
 
                install --mode=u=rwx \
290
 
                        --directory "$(CONFDIR)/plugins.d"; \
291
 
        fi
292
 
        install --mode=u=rwx,go=rx \
293
 
                --target-directory=$(PREFIX)/lib/mandos plugin-runner
 
452
                $(LIBDIR)/mandos/plugins.d \
 
453
                $(LIBDIR)/mandos/plugin-helpers
 
454
        if [ "$(SYSUSERS)" != "$(DESTDIR)" ]; then \
 
455
                install -D --mode=u=rw,go=r sysusers.d-mandos.conf \
 
456
                        $(SYSUSERS)/mandos-client.conf; \
 
457
        fi
 
458
        if [ "$(CONFDIR)" != "$(LIBDIR)/mandos" ]; then \
 
459
                install --directory \
 
460
                        --mode=u=rwx "$(CONFDIR)/plugins.d" \
 
461
                        "$(CONFDIR)/plugin-helpers"; \
 
462
        fi
 
463
        install --directory --mode=u=rwx,go=rx \
 
464
                "$(CONFDIR)/network-hooks.d"
 
465
        install --mode=u=rwx,go=rx \
 
466
                --target-directory=$(LIBDIR)/mandos plugin-runner
 
467
        install --mode=u=rwx,go=rx \
 
468
                --target-directory=$(LIBDIR)/mandos \
 
469
                mandos-to-cryptroot-unlock
 
470
        install --directory $(PREFIX)/sbin
294
471
        install --mode=u=rwx,go=rx --target-directory=$(PREFIX)/sbin \
295
472
                mandos-keygen
296
473
        install --mode=u=rwx,go=rx \
297
 
                --target-directory=$(PREFIX)/lib/mandos/plugins.d \
 
474
                --target-directory=$(LIBDIR)/mandos/plugins.d \
298
475
                plugins.d/password-prompt
299
476
        install --mode=u=rwxs,go=rx \
300
 
                --target-directory=$(PREFIX)/lib/mandos/plugins.d \
 
477
                --target-directory=$(LIBDIR)/mandos/plugins.d \
301
478
                plugins.d/mandos-client
302
479
        install --mode=u=rwxs,go=rx \
303
 
                --target-directory=$(PREFIX)/lib/mandos/plugins.d \
 
480
                --target-directory=$(LIBDIR)/mandos/plugins.d \
304
481
                plugins.d/usplash
305
482
        install --mode=u=rwxs,go=rx \
306
 
                --target-directory=$(PREFIX)/lib/mandos/plugins.d \
 
483
                --target-directory=$(LIBDIR)/mandos/plugins.d \
307
484
                plugins.d/splashy
308
485
        install --mode=u=rwxs,go=rx \
309
 
                --target-directory=$(PREFIX)/lib/mandos/plugins.d \
 
486
                --target-directory=$(LIBDIR)/mandos/plugins.d \
310
487
                plugins.d/askpass-fifo
311
488
        install --mode=u=rwxs,go=rx \
312
 
                --target-directory=$(PREFIX)/lib/mandos/plugins.d \
 
489
                --target-directory=$(LIBDIR)/mandos/plugins.d \
313
490
                plugins.d/plymouth
314
 
        install initramfs-tools-hook \
 
491
        install --mode=u=rwx,go=rx \
 
492
                --target-directory=$(LIBDIR)/mandos/plugin-helpers \
 
493
                plugin-helpers/mandos-client-iprouteadddel
 
494
        install -D initramfs-tools-hook \
315
495
                $(INITRAMFSTOOLS)/hooks/mandos
316
 
        install --mode=u=rw,go=r initramfs-tools-hook-conf \
317
 
                $(INITRAMFSTOOLS)/conf-hooks.d/mandos
318
 
        install initramfs-tools-script \
 
496
        install -D --mode=u=rw,go=r initramfs-tools-conf \
 
497
                $(INITRAMFSTOOLS)/conf.d/mandos-conf
 
498
        install -D --mode=u=rw,go=r initramfs-tools-conf-hook \
 
499
                $(INITRAMFSTOOLS)/conf-hooks.d/zz-mandos
 
500
        install -D initramfs-tools-script \
319
501
                $(INITRAMFSTOOLS)/scripts/init-premount/mandos
 
502
        install -D initramfs-tools-script-stop \
 
503
                $(INITRAMFSTOOLS)/scripts/local-premount/mandos
 
504
        install -D --mode=u=rw,go=r \
 
505
                --target-directory=$(DRACUTMODULE) \
 
506
                dracut-module/ask-password-mandos.path \
 
507
                dracut-module/ask-password-mandos.service
 
508
        install --mode=u=rwxs,go=rx \
 
509
                --target-directory=$(DRACUTMODULE) \
 
510
                dracut-module/module-setup.sh \
 
511
                dracut-module/cmdline-mandos.sh \
 
512
                dracut-module/password-agent
320
513
        install --mode=u=rw,go=r plugin-runner.conf $(CONFDIR)
 
514
        install --directory $(MANDIR)/man8
321
515
        gzip --best --to-stdout mandos-keygen.8 \
322
516
                > $(MANDIR)/man8/mandos-keygen.8.gz
323
517
        gzip --best --to-stdout plugin-runner.8mandos \
324
518
                > $(MANDIR)/man8/plugin-runner.8mandos.gz
 
519
        gzip --best --to-stdout plugins.d/mandos-client.8mandos \
 
520
                > $(MANDIR)/man8/mandos-client.8mandos.gz
325
521
        gzip --best --to-stdout plugins.d/password-prompt.8mandos \
326
522
                > $(MANDIR)/man8/password-prompt.8mandos.gz
327
 
        gzip --best --to-stdout plugins.d/mandos-client.8mandos \
328
 
                > $(MANDIR)/man8/mandos-client.8mandos.gz
329
523
        gzip --best --to-stdout plugins.d/usplash.8mandos \
330
524
                > $(MANDIR)/man8/usplash.8mandos.gz
331
525
        gzip --best --to-stdout plugins.d/splashy.8mandos \
332
526
                > $(MANDIR)/man8/splashy.8mandos.gz
333
527
        gzip --best --to-stdout plugins.d/askpass-fifo.8mandos \
334
528
                > $(MANDIR)/man8/askpass-fifo.8mandos.gz
 
529
        gzip --best --to-stdout plugins.d/plymouth.8mandos \
 
530
                > $(MANDIR)/man8/plymouth.8mandos.gz
 
531
        gzip --best --to-stdout dracut-module/password-agent.8mandos \
 
532
                > $(MANDIR)/man8/password-agent.8mandos.gz
335
533
 
 
534
.PHONY: install-client
336
535
install-client: install-client-nokey
337
536
# Post-installation stuff
338
537
        -$(PREFIX)/sbin/mandos-keygen --dir "$(KEYDIR)"
339
 
        update-initramfs -k all -u
 
538
        if command -v update-initramfs >/dev/null; then \
 
539
            update-initramfs -k all -u; \
 
540
        elif command -v dracut >/dev/null; then \
 
541
            for initrd in $(DESTDIR)/boot/initr*-$(LINUXVERSION); do \
 
542
                if [ -w "$$initrd" ]; then \
 
543
                    chmod go-r "$$initrd"; \
 
544
                    dracut --force "$$initrd"; \
 
545
                fi; \
 
546
            done; \
 
547
        fi
340
548
        echo "Now run mandos-keygen --password --dir $(KEYDIR)"
341
549
 
 
550
.PHONY: uninstall
342
551
uninstall: uninstall-server uninstall-client
343
552
 
 
553
.PHONY: uninstall-server
344
554
uninstall-server:
345
555
        -rm --force $(PREFIX)/sbin/mandos \
 
556
                $(PREFIX)/sbin/mandos-ctl \
 
557
                $(PREFIX)/sbin/mandos-monitor \
346
558
                $(MANDIR)/man8/mandos.8.gz \
 
559
                $(MANDIR)/man8/mandos-monitor.8.gz \
 
560
                $(MANDIR)/man8/mandos-ctl.8.gz \
347
561
                $(MANDIR)/man5/mandos.conf.5.gz \
348
562
                $(MANDIR)/man5/mandos-clients.conf.5.gz
349
563
        update-rc.d -f mandos remove
350
564
        -rmdir $(CONFDIR)
351
565
 
 
566
.PHONY: uninstall-client
352
567
uninstall-client:
353
568
# Refuse to uninstall client if /etc/crypttab is explicitly configured
354
569
# to use it.
355
570
        ! grep --regexp='^ *[^ #].*keyscript=[^,=]*/mandos/' \
356
571
                $(DESTDIR)/etc/crypttab
357
572
        -rm --force $(PREFIX)/sbin/mandos-keygen \
358
 
                $(PREFIX)/lib/mandos/plugin-runner \
359
 
                $(PREFIX)/lib/mandos/plugins.d/password-prompt \
360
 
                $(PREFIX)/lib/mandos/plugins.d/mandos-client \
361
 
                $(PREFIX)/lib/mandos/plugins.d/usplash \
362
 
                $(PREFIX)/lib/mandos/plugins.d/splashy \
363
 
                $(PREFIX)/lib/mandos/plugins.d/askpass-fifo \
364
 
                $(PREFIX)/lib/mandos/plugins.d/plymouth \
 
573
                $(LIBDIR)/mandos/plugin-runner \
 
574
                $(LIBDIR)/mandos/plugins.d/password-prompt \
 
575
                $(LIBDIR)/mandos/plugins.d/mandos-client \
 
576
                $(LIBDIR)/mandos/plugins.d/usplash \
 
577
                $(LIBDIR)/mandos/plugins.d/splashy \
 
578
                $(LIBDIR)/mandos/plugins.d/askpass-fifo \
 
579
                $(LIBDIR)/mandos/plugins.d/plymouth \
365
580
                $(INITRAMFSTOOLS)/hooks/mandos \
366
581
                $(INITRAMFSTOOLS)/conf-hooks.d/mandos \
367
582
                $(INITRAMFSTOOLS)/scripts/init-premount/mandos \
 
583
                $(INITRAMFSTOOLS)/scripts/local-premount/mandos \
 
584
                $(DRACUTMODULE)/ask-password-mandos.path \
 
585
                $(DRACUTMODULE)/ask-password-mandos.service \
 
586
                $(DRACUTMODULE)/module-setup.sh \
 
587
                $(DRACUTMODULE)/cmdline-mandos.sh \
 
588
                $(DRACUTMODULE)/password-agent \
 
589
                $(MANDIR)/man8/mandos-keygen.8.gz \
368
590
                $(MANDIR)/man8/plugin-runner.8mandos.gz \
369
 
                $(MANDIR)/man8/mandos-keygen.8.gz \
 
591
                $(MANDIR)/man8/mandos-client.8mandos.gz
370
592
                $(MANDIR)/man8/password-prompt.8mandos.gz \
371
593
                $(MANDIR)/man8/usplash.8mandos.gz \
372
594
                $(MANDIR)/man8/splashy.8mandos.gz \
373
595
                $(MANDIR)/man8/askpass-fifo.8mandos.gz \
374
 
                $(MANDIR)/man8/mandos-client.8mandos.gz
375
 
        -rmdir $(PREFIX)/lib/mandos/plugins.d $(CONFDIR)/plugins.d \
376
 
                 $(PREFIX)/lib/mandos $(CONFDIR) $(KEYDIR)
377
 
        update-initramfs -k all -u
 
596
                $(MANDIR)/man8/plymouth.8mandos.gz \
 
597
                $(MANDIR)/man8/password-agent.8mandos.gz \
 
598
        -rmdir $(LIBDIR)/mandos/plugins.d $(CONFDIR)/plugins.d \
 
599
                 $(LIBDIR)/mandos $(CONFDIR) $(KEYDIR) $(DRACUTMODULE)
 
600
        if command -v update-initramfs >/dev/null; then \
 
601
            update-initramfs -k all -u; \
 
602
        elif command -v dracut >/dev/null; then \
 
603
            for initrd in $(DESTDIR)/boot/initr*-$(LINUXVERSION); do \
 
604
                test -w "$$initrd" && dracut --force "$$initrd"; \
 
605
            done; \
 
606
        fi
378
607
 
 
608
.PHONY: purge
379
609
purge: purge-server purge-client
380
610
 
 
611
.PHONY: purge-server
381
612
purge-server: uninstall-server
382
613
        -rm --force $(CONFDIR)/mandos.conf $(CONFDIR)/clients.conf \
383
614
                $(DESTDIR)/etc/dbus-1/system.d/mandos.conf
384
615
                $(DESTDIR)/etc/default/mandos \
385
616
                $(DESTDIR)/etc/init.d/mandos \
 
617
                $(DESTDIR)/run/mandos.pid \
386
618
                $(DESTDIR)/var/run/mandos.pid
 
619
        if [ "$(SYSTEMD)" != "$(DESTDIR)" -a -d "$(SYSTEMD)" ]; then \
 
620
                -rm --force -- $(SYSTEMD)/mandos.service; \
 
621
        fi
387
622
        -rmdir $(CONFDIR)
388
623
 
 
624
.PHONY: purge-client
389
625
purge-client: uninstall-client
390
 
        -shred --remove $(KEYDIR)/seckey.txt
 
626
        -shred --remove $(KEYDIR)/seckey.txt $(KEYDIR)/tls-privkey.pem
391
627
        -rm --force $(CONFDIR)/plugin-runner.conf \
392
 
                $(KEYDIR)/pubkey.txt $(KEYDIR)/seckey.txt
 
628
                $(KEYDIR)/pubkey.txt $(KEYDIR)/seckey.txt \
 
629
                $(KEYDIR)/tls-pubkey.txt $(KEYDIR)/tls-privkey.txt
393
630
        -rmdir $(KEYDIR) $(CONFDIR)/plugins.d $(CONFDIR)