/mandos/trunk

To get this branch, use:
bzr branch http://bzr.recompile.se/loggerhead/mandos/trunk

« back to all changes in this revision

Viewing changes to debian/mandos-client.postinst

  • Committer: Teddy Hogeborn
  • Date: 2024-09-08 03:42:04 UTC
  • Revision ID: teddy@recompile.se-20240908034204-tg279mkobq5soxei
Use new package name "libgpgme11t64" when available

* initramfs-tools-hook (libgpgme11_version): Add "libgpgme11t64" as an
  alternative to libgpgme11.

Closes: #1077927
Reported-By: Aaron D. Johnson <debbugreporter@fnord.greeley.co.us>
Suggested-by: Aaron D. Johnson <debbugreporter@fnord.greeley.co.us>
Closes-Bug: #2068014
Reported-By: Christian Rusa <christian@rusa.at>
Suggested-by: Christian Rusa <christian@rusa.at>

Show diffs side-by-side

added added

removed removed

Lines of Context:
23
23
update_initramfs()
24
24
{
25
25
    if command -v update-initramfs >/dev/null; then
26
 
        update-initramfs -k all -u 1>&2
 
26
        update-initramfs -k all -u
27
27
    elif command -v dracut >/dev/null; then
28
28
        dracut_version="`dpkg-query --showformat='${Version}' --show dracut`"
29
29
        if dpkg --compare-versions "$dracut_version" lt 043-1 \
51
51
                        /boot/initrd.img-"$kversion"
52
52
            fi
53
53
            if [ "$kversion" != "*" ]; then
54
 
                /etc/kernel/postinst.d/dracut "$kversion" 1>&2
 
54
                /etc/kernel/postinst.d/dracut "$kversion"
55
55
            fi
56
56
        done
57
57
    fi
70
70
    if dpkg --compare-versions "$2" lt "1.0.3-1"; then
71
71
        case "`getent passwd mandos`" in
72
72
            *:Mandos\ password\ system,,,:/nonexistent:/bin/false)
73
 
                usermod --login _mandos mandos 1>&2
74
 
                groupmod --new-name _mandos mandos 1>&2
 
73
                usermod --login _mandos mandos
 
74
                groupmod --new-name _mandos mandos
75
75
                return
76
76
                ;;
77
77
        esac
80
80
    if ! getent passwd _mandos >/dev/null; then
81
81
        adduser --system --force-badname --quiet --home /nonexistent \
82
82
            --no-create-home --group --disabled-password \
83
 
            --gecos "Mandos password system" _mandos 1>&2
 
83
            --gecos "Mandos password system" _mandos
84
84
    fi
85
85
}
86
86
 
90
90
    # mandos-keygen
91
91
    if ! [ -r /etc/keys/mandos/pubkey.txt \
92
92
              -a -r /etc/keys/mandos/seckey.txt ]; then
93
 
        mandos-keygen 1>&2
94
 
        gpg-connect-agent KILLAGENT /bye 1>&2 || :
 
93
        mandos-keygen
 
94
        gpg-connect-agent KILLAGENT /bye || :
95
95
        return 0
96
96
    fi
97
97
 
102
102
        if ! certtool --password='' \
103
103
             --load-privkey=/etc/keys/mandos/tls-privkey.pem \
104
104
             --outfile=/dev/null --pubkey-info --no-text \
105
 
              1>&2 2>/dev/null; then
 
105
             2>/dev/null; then
106
106
            shred --remove -- /etc/keys/mandos/tls-privkey.pem \
107
107
                  2>/dev/null || :
108
108
            rm --force -- /etc/keys/mandos/tls-pubkey.pem
121
121
 
122
122
    if certtool --generate-privkey --password='' \
123
123
                --outfile "$TLS_PRIVKEYTMP" --sec-param ultra \
124
 
                --key-type=ed25519 --pkcs8 --no-text 1>&2 \
125
 
                2>/dev/null; then
 
124
                --key-type=ed25519 --pkcs8 --no-text 2>/dev/null; then
126
125
 
127
126
        local umask=$(umask)
128
127
        umask 077
133
132
        if ! certtool --password='' \
134
133
             --load-privkey=/etc/keys/mandos/tls-privkey.pem \
135
134
             --outfile=/etc/keys/mandos/tls-pubkey.pem --pubkey-info \
136
 
             --no-text 1>&2 2>/dev/null; then
 
135
             --no-text 2>/dev/null; then
137
136
            # Otherwise try OpenSSL
138
137
            if ! openssl pkey -in /etc/keys/mandos/tls-privkey.pem \
139
 
                 -out /etc/keys/mandos/tls-pubkey.pem -pubout \
140
 
                 1>&2; then
 
138
                 -out /etc/keys/mandos/tls-pubkey.pem -pubout; then
141
139
                rm --force /etc/keys/mandos/tls-pubkey.pem
142
140
                # None of the commands succeded; give up
143
141
                umask $umask
169
167
    DHFILE="`mktemp -t mandos-client-dh-parameters.XXXXXXXXXX.pem`"
170
168
    # First try certtool from GnuTLS
171
169
    if ! certtool --generate-dh-params --sec-param high \
172
 
         --outfile "$DHFILE" 1>&2; then
 
170
         --outfile "$DHFILE"; then
173
171
        # Otherwise try OpenSSL
174
172
        if ! openssl genpkey -genparam -algorithm DH -out "$DHFILE" \
175
 
             -pkeyopt dh_paramgen_prime_len:3072 1>&2; then
 
173
             -pkeyopt dh_paramgen_prime_len:3072; then
176
174
            # None of the commands succeded; give up
177
 
            rm --force -- "$DHFILE"
 
175
            rm -- "$DHFILE"
178
176
            return 1
179
177
        fi
180
178
    fi
183
181
    sed --in-place --expression='1i-----BEGIN DH PARAMETERS-----' \
184
182
            "$DHFILE"
185
183
    cp --archive "$DHFILE" /etc/keys/mandos/dhparams.pem
186
 
    rm --force -- "$DHFILE"
 
184
    rm -- "$DHFILE"
187
185
}
188
186
 
189
187
case "$1" in