/mandos/trunk

To get this branch, use:
bzr branch http://bzr.recompile.se/loggerhead/mandos/trunk

« back to all changes in this revision

Viewing changes to Makefile

  • Committer: Teddy Hogeborn
  • Date: 2024-11-17 18:43:11 UTC
  • Revision ID: teddy@recompile.se-20241117184311-ox25kvngy62h209g
Debian package: Avoid suggesting a C compiler unnecessarily

The list of suggested packages, meant to enable the "mandos" program
to find the correct value of SO_BINDTODEVICE by using a C compiler,
are not necessary when Python 3.3 or later is used, since it has the
SO_BINDTODEVICE constant defined in the "socket" module.  Also, Python
2.6 or older has the same constant in the old "IN" module.  Therefore,
we should suggest these Python versions as alternatives to a C
compiler, so that a C compiler is not installed unnecessarily.

debian/control (Package: mandos/Suggests): Add "python3 (>= 3.3)" and
"python (<= 2.6)" as alternatives to "libc6-dev | libc-dev" and
"c-compiler".

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
WARN=-O -Wall -Wformat=2 -Winit-self -Wmissing-include-dirs \
2
 
        -Wswitch-default -Wswitch-enum -Wunused-parameter \
3
 
        -Wstrict-aliasing=1 -Wextra -Wfloat-equal -Wundef -Wshadow \
 
1
WARN:=-O -Wall -Wextra -Wdouble-promotion -Wformat=2 -Winit-self \
 
2
        -Wmissing-include-dirs -Wswitch-default -Wswitch-enum \
 
3
        -Wunused -Wuninitialized -Wstrict-overflow=5 \
 
4
        -Wsuggest-attribute=pure -Wsuggest-attribute=const \
 
5
        -Wsuggest-attribute=noreturn -Wfloat-equal -Wundef -Wshadow \
4
6
        -Wunsafe-loop-optimizations -Wpointer-arith \
5
7
        -Wbad-function-cast -Wcast-qual -Wcast-align -Wwrite-strings \
6
 
        -Wconversion -Wstrict-prototypes -Wold-style-definition \
7
 
        -Wpacked -Wnested-externs -Winline -Wvolatile-register-var
8
 
#       -Wunreachable-code
9
 
#DEBUG=-ggdb3
10
 
# For info about _FORTIFY_SOURCE, see
11
 
# <http://www.kernel.org/doc/man-pages/online/pages/man7/feature_test_macros.7.html>
12
 
# and <http://gcc.gnu.org/ml/gcc-patches/2004-09/msg02055.html>.
13
 
FORTIFY=-D_FORTIFY_SOURCE=2 -fstack-protector-all -fPIC
14
 
LINK_FORTIFY_LD=-z relro -z now
15
 
LINK_FORTIFY=
 
8
        -Wconversion -Wlogical-op -Waggregate-return \
 
9
        -Wstrict-prototypes -Wold-style-definition \
 
10
        -Wmissing-format-attribute -Wnormalized=nfc -Wpacked \
 
11
        -Wredundant-decls -Wnested-externs -Winline -Wvla \
 
12
        -Wvolatile-register-var -Woverlength-strings
 
13
 
 
14
#DEBUG:=-ggdb3 -fsanitize=address $(SANITIZE)
 
15
## Check which sanitizing options can be used
 
16
#SANITIZE:=$(foreach option,$(ALL_SANITIZE_OPTIONS),$(shell \
 
17
#       echo 'int main(){}' | $(CC) --language=c $(option) \
 
18
#       /dev/stdin -o /dev/null >/dev/null 2>&1 && echo $(option)))
 
19
# <https://developerblog.redhat.com/2014/10/16/gcc-undefined-behavior-sanitizer-ubsan/>
 
20
ALL_SANITIZE_OPTIONS:=-fsanitize=leak -fsanitize=undefined \
 
21
        -fsanitize=shift -fsanitize=integer-divide-by-zero \
 
22
        -fsanitize=unreachable -fsanitize=vla-bound -fsanitize=null \
 
23
        -fsanitize=return -fsanitize=signed-integer-overflow \
 
24
        -fsanitize=bounds -fsanitize=alignment \
 
25
        -fsanitize=object-size -fsanitize=float-divide-by-zero \
 
26
        -fsanitize=float-cast-overflow -fsanitize=nonnull-attribute \
 
27
        -fsanitize=returns-nonnull-attribute -fsanitize=bool \
 
28
        -fsanitize=enum -fsanitize-address-use-after-scope
 
29
 
 
30
# For info about _FORTIFY_SOURCE, see feature_test_macros(7)
 
31
# and <https://gcc.gnu.org/ml/gcc-patches/2004-09/msg02055.html>.
 
32
FORTIFY:=-fstack-protector-all -fPIC
 
33
CPPFLAGS+=-D_FORTIFY_SOURCE=3
 
34
LINK_FORTIFY_LD:=-z relro -z now
 
35
LINK_FORTIFY:=
16
36
 
17
37
# If BROKEN_PIE is set, do not build with -pie
18
38
ifndef BROKEN_PIE
20
40
LINK_FORTIFY += -pie
21
41
endif
22
42
#COVERAGE=--coverage
23
 
OPTIMIZE=-Os
24
 
LANGUAGE=-std=gnu99
25
 
htmldir=man
26
 
version=1.6.1
27
 
SED=sed
28
 
 
29
 
USER=$(firstword $(subst :, ,$(shell getent passwd _mandos || getent passwd nobody || echo 65534)))
30
 
GROUP=$(firstword $(subst :, ,$(shell getent group _mandos || getent group nobody || echo 65534)))
 
43
OPTIMIZE:=-Os -fno-strict-aliasing
 
44
LANGUAGE:=-std=gnu11
 
45
CPPFLAGS+=-D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64
 
46
htmldir:=man
 
47
version:=1.8.17
 
48
SED:=sed
 
49
PKG_CONFIG?=pkg-config
 
50
 
 
51
USER:=$(firstword $(subst :, ,$(shell getent passwd _mandos \
 
52
        || getent passwd nobody || echo 65534)))
 
53
GROUP:=$(firstword $(subst :, ,$(shell getent group _mandos \
 
54
        || getent group nogroup || echo 65534)))
 
55
 
 
56
LINUXVERSION:=$(shell uname --kernel-release)
31
57
 
32
58
## Use these settings for a traditional /usr/local install
33
 
# PREFIX=$(DESTDIR)/usr/local
34
 
# CONFDIR=$(DESTDIR)/etc/mandos
35
 
# KEYDIR=$(DESTDIR)/etc/mandos/keys
36
 
# MANDIR=$(PREFIX)/man
37
 
# INITRAMFSTOOLS=$(DESTDIR)/etc/initramfs-tools
38
 
# STATEDIR=$(DESTDIR)/var/lib/mandos
 
59
# PREFIX:=$(DESTDIR)/usr/local
 
60
# BINDIR:=$(PREFIX)/sbin
 
61
# CONFDIR:=$(DESTDIR)/etc/mandos
 
62
# KEYDIR:=$(DESTDIR)/etc/mandos/keys
 
63
# MANDIR:=$(PREFIX)/man
 
64
# INITRAMFSTOOLS:=$(DESTDIR)/etc/initramfs-tools
 
65
# DRACUTMODULE:=$(DESTDIR)/usr/lib/dracut/modules.d/90mandos
 
66
# STATEDIR:=$(DESTDIR)/var/lib/mandos
 
67
# LIBDIR:=$(PREFIX)/lib
 
68
# DBUSPOLICYDIR:=$(DESTDIR)/etc/dbus-1/system.d
39
69
##
40
70
 
41
71
## These settings are for a package-type install
42
 
PREFIX=$(DESTDIR)/usr
43
 
CONFDIR=$(DESTDIR)/etc/mandos
44
 
KEYDIR=$(DESTDIR)/etc/keys/mandos
45
 
MANDIR=$(PREFIX)/share/man
46
 
INITRAMFSTOOLS=$(DESTDIR)/usr/share/initramfs-tools
47
 
STATEDIR=$(DESTDIR)/var/lib/mandos
 
72
PREFIX:=$(DESTDIR)/usr
 
73
BINDIR:=$(PREFIX)/sbin
 
74
CONFDIR:=$(DESTDIR)/etc/mandos
 
75
KEYDIR:=$(DESTDIR)/etc/keys/mandos
 
76
MANDIR:=$(PREFIX)/share/man
 
77
INITRAMFSTOOLS:=$(DESTDIR)/usr/share/initramfs-tools
 
78
DRACUTMODULE:=$(DESTDIR)/usr/lib/dracut/modules.d/90mandos
 
79
STATEDIR:=$(DESTDIR)/var/lib/mandos
 
80
LIBDIR:=$(shell \
 
81
        for d in \
 
82
        "/usr/lib/`dpkg-architecture \
 
83
                        -qDEB_HOST_MULTIARCH 2>/dev/null`" \
 
84
        "`rpm --eval='%{_libdir}' 2>/dev/null`" /usr/lib; do \
 
85
                if [ -d "$$d" -a "$$d" = "$${d%/}" ]; then \
 
86
                        echo "$(DESTDIR)$$d"; \
 
87
                        break; \
 
88
                fi; \
 
89
        done)
 
90
DBUSPOLICYDIR:=$(DESTDIR)/usr/share/dbus-1/system.d
48
91
##
49
92
 
50
 
GNUTLS_CFLAGS=$(shell pkg-config --cflags-only-I gnutls)
51
 
GNUTLS_LIBS=$(shell pkg-config --libs gnutls)
52
 
AVAHI_CFLAGS=$(shell pkg-config --cflags-only-I avahi-core)
53
 
AVAHI_LIBS=$(shell pkg-config --libs avahi-core)
54
 
GPGME_CFLAGS=$(shell gpgme-config --cflags; getconf LFS_CFLAGS)
55
 
GPGME_LIBS=$(shell gpgme-config --libs; getconf LFS_LIBS; \
 
93
SYSTEMD:=$(DESTDIR)$(shell $(PKG_CONFIG) systemd \
 
94
                        --variable=systemdsystemunitdir)
 
95
TMPFILES:=$(DESTDIR)$(shell $(PKG_CONFIG) systemd \
 
96
                        --variable=tmpfilesdir)
 
97
SYSUSERS:=$(DESTDIR)$(shell $(PKG_CONFIG) systemd \
 
98
                        --variable=sysusersdir)
 
99
 
 
100
GNUTLS_CFLAGS:=$(shell $(PKG_CONFIG) --cflags-only-I gnutls)
 
101
GNUTLS_LIBS:=$(shell $(PKG_CONFIG) --libs gnutls)
 
102
AVAHI_CFLAGS:=$(shell $(PKG_CONFIG) --cflags-only-I avahi-core)
 
103
AVAHI_LIBS:=$(shell $(PKG_CONFIG) --libs avahi-core)
 
104
GPGME_CFLAGS:=$(shell $(PKG_CONFIG) --cflags-only-I gpgme 2>/dev/null \
 
105
        || gpgme-config --cflags; getconf LFS_CFLAGS)
 
106
GPGME_LIBS:=$(shell $(PKG_CONFIG) --libs gpgme 2>/dev/null \
 
107
        || gpgme-config --libs; getconf LFS_LIBS; \
56
108
        getconf LFS_LDFLAGS)
 
109
LIBNL3_CFLAGS:=$(shell $(PKG_CONFIG) --cflags-only-I libnl-route-3.0)
 
110
LIBNL3_LIBS:=$(shell $(PKG_CONFIG) --libs libnl-route-3.0)
 
111
GLIB_CFLAGS:=$(shell $(PKG_CONFIG) --cflags glib-2.0)
 
112
GLIB_LIBS:=$(shell $(PKG_CONFIG) --libs glib-2.0)
57
113
 
58
114
# Do not change these two
59
115
CFLAGS+=$(WARN) $(DEBUG) $(FORTIFY) $(COVERAGE) $(OPTIMIZE) \
60
 
        $(LANGUAGE) $(GNUTLS_CFLAGS) $(AVAHI_CFLAGS) $(GPGME_CFLAGS) \
61
 
        -DVERSION='"$(version)"'
62
 
LDFLAGS+=-Xlinker --as-needed $(COVERAGE) $(LINK_FORTIFY) $(foreach flag,$(LINK_FORTIFY_LD),-Xlinker $(flag))
 
116
        $(LANGUAGE) -DVERSION='"$(version)"'
 
117
LDFLAGS+=-Xlinker --as-needed $(COVERAGE) $(LINK_FORTIFY) $(strip \
 
118
        ) $(foreach flag,$(LINK_FORTIFY_LD),-Xlinker $(flag))
63
119
 
64
120
# Commands to format a DocBook <refentry> document into a manual page
65
121
DOCBOOKTOMAN=$(strip cd $(dir $<); xsltproc --nonet --xinclude \
70
126
        --param man.authors.section.enabled     0 \
71
127
        /usr/share/xml/docbook/stylesheet/nwalsh/manpages/docbook.xsl \
72
128
        $(notdir $<); \
73
 
        $(MANPOST) $(notdir $@);\
74
129
        if locale --all 2>/dev/null | grep --regexp='^en_US\.utf8$$' \
75
 
        && type man 2>/dev/null; then LANG=en_US.UTF-8 MANWIDTH=80 \
76
 
        man --warnings --encoding=UTF-8 --local-file $(notdir $@); \
77
 
        fi >/dev/null)
78
 
# DocBook-to-man post-processing to fix a '\n' escape bug
79
 
MANPOST=$(SED) --in-place --expression='s,\\\\en,\\en,g;s,\\n,\\en,g'
 
130
        && command -v man >/dev/null; then LANG=en_US.UTF-8 \
 
131
        MANWIDTH=80 man --warnings --encoding=UTF-8 --local-file \
 
132
        $(notdir $@); fi >/dev/null)
80
133
 
81
134
DOCBOOKTOHTML=$(strip xsltproc --nonet --xinclude \
82
135
        --param make.year.ranges                1 \
88
141
        /usr/share/xml/docbook/stylesheet/nwalsh/xhtml/docbook.xsl \
89
142
        $<; $(HTMLPOST) $@)
90
143
# Fix citerefentry links
91
 
HTMLPOST=$(SED) --in-place \
 
144
HTMLPOST:=$(SED) --in-place \
92
145
        --expression='s/\(<a class="citerefentry" href="\)\("><span class="citerefentry"><span class="refentrytitle">\)\([^<]*\)\(<\/span>(\)\([^)]*\)\()<\/span><\/a>\)/\1\3.\5\2\3\4\5\6/g'
93
146
 
94
 
PLUGINS=plugins.d/password-prompt plugins.d/mandos-client \
 
147
PLUGINS:=plugins.d/password-prompt plugins.d/mandos-client \
95
148
        plugins.d/usplash plugins.d/splashy plugins.d/askpass-fifo \
96
149
        plugins.d/plymouth
97
 
CPROGS=plugin-runner $(PLUGINS)
98
 
PROGS=mandos mandos-keygen mandos-ctl mandos-monitor $(CPROGS)
99
 
DOCS=mandos.8 mandos-keygen.8 mandos-monitor.8 mandos-ctl.8 \
 
150
PLUGIN_HELPERS:=plugin-helpers/mandos-client-iprouteadddel
 
151
CPROGS:=plugin-runner dracut-module/password-agent $(PLUGINS) \
 
152
        $(PLUGIN_HELPERS)
 
153
PROGS:=mandos mandos-keygen mandos-ctl mandos-monitor $(CPROGS)
 
154
DOCS:=mandos.8 mandos-keygen.8 mandos-monitor.8 mandos-ctl.8 \
100
155
        mandos.conf.5 mandos-clients.conf.5 plugin-runner.8mandos \
 
156
        dracut-module/password-agent.8mandos \
101
157
        plugins.d/mandos-client.8mandos \
102
158
        plugins.d/password-prompt.8mandos plugins.d/usplash.8mandos \
103
159
        plugins.d/splashy.8mandos plugins.d/askpass-fifo.8mandos \
104
160
        plugins.d/plymouth.8mandos intro.8mandos
105
161
 
106
 
htmldocs=$(addsuffix .xhtml,$(DOCS))
107
 
 
108
 
objects=$(addsuffix .o,$(CPROGS))
109
 
 
 
162
htmldocs:=$(addsuffix .xhtml,$(DOCS))
 
163
 
 
164
objects:=$(addsuffix .o,$(CPROGS))
 
165
 
 
166
.PHONY: all
110
167
all: $(PROGS) mandos.lsm
111
168
 
 
169
.PHONY: doc
112
170
doc: $(DOCS)
113
171
 
 
172
.PHONY: html
114
173
html: $(htmldocs)
115
174
 
116
175
%.5: %.xml common.ent legalnotice.xml
175
234
                overview.xml legalnotice.xml
176
235
        $(DOCBOOKTOHTML)
177
236
 
 
237
dracut-module/password-agent.8mandos: \
 
238
                dracut-module/password-agent.xml common.ent \
 
239
                overview.xml legalnotice.xml
 
240
        $(DOCBOOKTOMAN)
 
241
dracut-module/password-agent.8mandos.xhtml: \
 
242
                dracut-module/password-agent.xml common.ent \
 
243
                overview.xml legalnotice.xml
 
244
        $(DOCBOOKTOHTML)
 
245
 
178
246
plugins.d/mandos-client.8mandos: plugins.d/mandos-client.xml \
179
247
                                        common.ent \
180
248
                                        mandos-options.xml \
223
291
                --expression='s/\(mandos_\)[0-9.]\+\(\.orig\.tar\.gz\)/\1$(version)\2/' \
224
292
                $@)
225
293
 
226
 
plugins.d/mandos-client: plugins.d/mandos-client.c
227
 
        $(LINK.c) $^ -lrt $(GNUTLS_LIBS) $(AVAHI_LIBS) $(strip\
228
 
                ) $(GPGME_LIBS) $(LOADLIBES) $(LDLIBS) -o $@
229
 
 
230
 
.PHONY : all doc html clean distclean run-client run-server install \
231
 
        install-server install-client uninstall uninstall-server \
232
 
        uninstall-client purge purge-server purge-client
233
 
 
 
294
# Does the linker support the --no-warn-execstack option?
 
295
ifeq ($(shell echo 'int main(){}'|$(CC) --language=c /dev/stdin -o /dev/null -Xlinker --no-warn-execstack >/dev/null 2>&1 && echo yes),yes)
 
296
# These programs use nested functions, which uses an executable stack
 
297
plugin-runner: LDFLAGS += -Xlinker --no-warn-execstack
 
298
dracut-module/password-agent: LDFLAGS += -Xlinker --no-warn-execstack
 
299
plugins.d/password-prompt: LDFLAGS += -Xlinker --no-warn-execstack
 
300
plugins.d/mandos-client: LDFLAGS += -Xlinker --no-warn-execstack
 
301
plugins.d/plymouth: LDFLAGS += -Xlinker --no-warn-execstack
 
302
endif
 
303
 
 
304
# Need to add the GnuTLS, Avahi and GPGME libraries
 
305
plugins.d/mandos-client: CFLAGS += $(GNUTLS_CFLAGS) $(strip \
 
306
        ) $(AVAHI_CFLAGS) $(GPGME_CFLAGS)
 
307
plugins.d/mandos-client: LDLIBS += $(GNUTLS_LIBS) $(strip \
 
308
        ) $(AVAHI_LIBS) $(GPGME_LIBS)
 
309
 
 
310
# Need to add the libnl-route library
 
311
plugin-helpers/mandos-client-iprouteadddel: CFLAGS += $(LIBNL3_CFLAGS)
 
312
plugin-helpers/mandos-client-iprouteadddel: LDLIBS += $(LIBNL3_LIBS)
 
313
 
 
314
# Need to add the GLib and pthread libraries
 
315
dracut-module/password-agent: CFLAGS += $(GLIB_CFLAGS)
 
316
# Note: -lpthread is unnecessary with the GNU C library 2.34 or later
 
317
dracut-module/password-agent: LDLIBS += $(GLIB_LIBS) -lpthread
 
318
 
 
319
.PHONY: clean
234
320
clean:
235
321
        -rm --force $(CPROGS) $(objects) $(htmldocs) $(DOCS) core
236
322
 
 
323
.PHONY: distclean
237
324
distclean: clean
 
325
.PHONY: mostlyclean
238
326
mostlyclean: clean
 
327
.PHONY: maintainer-clean
239
328
maintainer-clean: clean
240
329
        -rm --force --recursive keydir confdir statedir
241
330
 
242
 
check:  all
 
331
.PHONY: check
 
332
check: all
243
333
        ./mandos --check
244
334
        ./mandos-ctl --check
 
335
        ./mandos-keygen --version
 
336
        ./plugin-runner --version
 
337
        ./plugin-helpers/mandos-client-iprouteadddel --version
 
338
        ./dracut-module/password-agent --test
245
339
 
246
340
# Run the client with a local config and key
247
 
run-client: all keydir/seckey.txt keydir/pubkey.txt
248
 
        @echo "###################################################################"
249
 
        @echo "# The following error messages are harmless and can be safely     #"
250
 
        @echo "# ignored.  The messages are caused by not running as root, but   #"
251
 
        @echo "# you should NOT run \"make run-client\" as root unless you also    #"
252
 
        @echo "# unpacked and compiled Mandos as root, which is NOT recommended. #"
253
 
        @echo "# From plugin-runner: setuid: Operation not permitted             #"
254
 
        @echo "# From askpass-fifo:  mkfifo: Permission denied                   #"
255
 
        @echo "# From mandos-client: setuid: Operation not permitted             #"
256
 
        @echo "#                     seteuid: Operation not permitted            #"
257
 
        @echo "#                     klogctl: Operation not permitted            #"
258
 
        @echo "###################################################################"
 
341
.PHONY: run-client
 
342
run-client: all keydir/seckey.txt keydir/pubkey.txt \
 
343
                        keydir/tls-privkey.pem keydir/tls-pubkey.pem
 
344
        @echo '######################################################'
 
345
        @echo '# The following error messages are harmless and can  #'
 
346
        @echo '#  be safely ignored:                                #'
 
347
        @echo '## From plugin-runner:                               #'
 
348
        @echo '# setgid: Operation not permitted                    #'
 
349
        @echo '# setuid: Operation not permitted                    #'
 
350
        @echo '## From askpass-fifo:                                #'
 
351
        @echo '# mkfifo: Permission denied                          #'
 
352
        @echo '## From mandos-client:                               #'
 
353
        @echo '# Failed to raise privileges: Operation not permi... #'
 
354
        @echo '# Warning: network hook "*" exited with status *     #'
 
355
        @echo '# ioctl SIOCSIFFLAGS +IFF_UP: Operation not permi... #'
 
356
        @echo '# Failed to bring up interface "*": Operation not... #'
 
357
        @echo '#                                                    #'
 
358
        @echo '# (The messages are caused by not running as root,   #'
 
359
        @echo '# but you should NOT run "make run-client" as root   #'
 
360
        @echo '# unless you also unpacked and compiled Mandos as    #'
 
361
        @echo '# root, which is also NOT recommended.)              #'
 
362
        @echo '######################################################'
 
363
# We set GNOME_KEYRING_CONTROL to block pam_gnome_keyring
259
364
        ./plugin-runner --plugin-dir=plugins.d \
 
365
                --plugin-helper-dir=plugin-helpers \
260
366
                --config-file=plugin-runner.conf \
261
 
                --options-for=mandos-client:--seckey=keydir/seckey.txt,--pubkey=keydir/pubkey.txt,--network-hook-dir=network-hooks.d \
 
367
                --options-for=mandos-client:--seckey=keydir/seckey.txt,--pubkey=keydir/pubkey.txt,--tls-privkey=keydir/tls-privkey.pem,--tls-pubkey=keydir/tls-pubkey.pem,--network-hook-dir=network-hooks.d \
 
368
                --env-for=mandos-client:GNOME_KEYRING_CONTROL= \
262
369
                $(CLIENTARGS)
263
370
 
264
371
# Used by run-client
265
 
keydir/seckey.txt keydir/pubkey.txt: mandos-keygen
 
372
keydir/seckey.txt keydir/pubkey.txt keydir/tls-privkey.pem keydir/tls-pubkey.pem: mandos-keygen
266
373
        install --directory keydir
267
374
        ./mandos-keygen --dir keydir --force
 
375
        if ! [ -e keydir/tls-privkey.pem ]; then \
 
376
                install --mode=u=rw /dev/null keydir/tls-privkey.pem; \
 
377
        fi
 
378
        if ! [ -e keydir/tls-pubkey.pem ]; then \
 
379
                install --mode=u=rw /dev/null keydir/tls-pubkey.pem; \
 
380
        fi
268
381
 
269
382
# Run the server with a local config
 
383
.PHONY: run-server
270
384
run-server: confdir/mandos.conf confdir/clients.conf statedir
271
385
        ./mandos --debug --no-dbus --configdir=confdir \
272
386
                --statedir=statedir $(SERVERARGS)
273
387
 
274
388
# Used by run-server
275
389
confdir/mandos.conf: mandos.conf
276
 
        install --directory confdir
277
 
        install --mode=u=rw,go=r $^ $@
278
 
confdir/clients.conf: clients.conf keydir/seckey.txt
279
 
        install --directory confdir
280
 
        install --mode=u=rw $< $@
 
390
        install -D --mode=u=rw,go=r $^ $@
 
391
confdir/clients.conf: clients.conf keydir/seckey.txt keydir/tls-pubkey.pem
 
392
        install -D --mode=u=rw $< $@
281
393
# Add a client password
282
 
        ./mandos-keygen --dir keydir --password >> $@
 
394
        ./mandos-keygen --dir keydir --password --no-ssh >> $@
283
395
statedir:
284
396
        install --directory statedir
285
397
 
 
398
.PHONY: install
286
399
install: install-server install-client-nokey
287
400
 
 
401
.PHONY: install-html
288
402
install-html: html
289
 
        install --directory $(htmldir)
290
 
        install --mode=u=rw,go=r --target-directory=$(htmldir) \
 
403
        install -D --mode=u=rw,go=r --target-directory=$(htmldir) \
291
404
                $(htmldocs)
292
405
 
 
406
.PHONY: install-server
293
407
install-server: doc
294
 
        install --directory $(CONFDIR)
295
 
        install --directory --mode=u=rwx --owner=$(USER) \
296
 
                --group=$(GROUP) $(STATEDIR)
297
 
        install --mode=u=rwx,go=rx mandos $(PREFIX)/sbin/mandos
298
 
        install --mode=u=rwx,go=rx --target-directory=$(PREFIX)/sbin \
 
408
        if install --directory --mode=u=rwx --owner=$(USER) \
 
409
                --group=$(GROUP) $(STATEDIR); then \
 
410
                :; \
 
411
        elif install --directory --mode=u=rwx $(STATEDIR); then \
 
412
                chown -- $(USER):$(GROUP) $(STATEDIR) || :; \
 
413
        fi
 
414
        if [ "$(TMPFILES)" != "$(DESTDIR)" ]; then \
 
415
                install -D --mode=u=rw,go=r tmpfiles.d-mandos.conf \
 
416
                        $(TMPFILES)/mandos.conf; \
 
417
        fi
 
418
        if [ "$(SYSUSERS)" != "$(DESTDIR)" ]; then \
 
419
                install -D --mode=u=rw,go=r sysusers.d-mandos.conf \
 
420
                        $(SYSUSERS)/mandos.conf; \
 
421
        fi
 
422
        install --directory $(BINDIR)
 
423
        install --mode=u=rwx,go=rx --target-directory=$(BINDIR) mandos
 
424
        install --mode=u=rwx,go=rx --target-directory=$(BINDIR) \
299
425
                mandos-ctl
300
 
        install --mode=u=rwx,go=rx --target-directory=$(PREFIX)/sbin \
 
426
        install --mode=u=rwx,go=rx --target-directory=$(BINDIR) \
301
427
                mandos-monitor
 
428
        install --directory $(CONFDIR)
302
429
        install --mode=u=rw,go=r --target-directory=$(CONFDIR) \
303
430
                mandos.conf
304
431
        install --mode=u=rw --target-directory=$(CONFDIR) \
305
432
                clients.conf
306
 
        install --mode=u=rw,go=r dbus-mandos.conf \
307
 
                $(DESTDIR)/etc/dbus-1/system.d/mandos.conf
308
 
        install --mode=u=rwx,go=rx init.d-mandos \
 
433
        install -D --mode=u=rw,go=r dbus-mandos.conf \
 
434
                $(DBUSPOLICYDIR)/mandos.conf
 
435
        install -D --mode=u=rwx,go=rx init.d-mandos \
309
436
                $(DESTDIR)/etc/init.d/mandos
310
 
        install --mode=u=rw,go=r default-mandos \
 
437
        if [ "$(SYSTEMD)" != "$(DESTDIR)" ]; then \
 
438
                install -D --mode=u=rw,go=r mandos.service \
 
439
                        $(SYSTEMD); \
 
440
        fi
 
441
        install -D --mode=u=rw,go=r default-mandos \
311
442
                $(DESTDIR)/etc/default/mandos
312
443
        if [ -z $(DESTDIR) ]; then \
313
444
                update-rc.d mandos defaults 25 15;\
314
445
        fi
 
446
        install --directory $(MANDIR)/man8 $(MANDIR)/man5
315
447
        gzip --best --to-stdout mandos.8 \
316
448
                > $(MANDIR)/man8/mandos.8.gz
317
449
        gzip --best --to-stdout mandos-monitor.8 \
325
457
        gzip --best --to-stdout intro.8mandos \
326
458
                > $(MANDIR)/man8/intro.8mandos.gz
327
459
 
 
460
.PHONY: install-client-nokey
328
461
install-client-nokey: all doc
329
 
        install --directory $(PREFIX)/lib/mandos $(CONFDIR)
330
462
        install --directory --mode=u=rwx $(KEYDIR) \
331
 
                $(PREFIX)/lib/mandos/plugins.d
332
 
        if [ "$(CONFDIR)" != "$(PREFIX)/lib/mandos" ]; then \
333
 
                install --mode=u=rwx \
334
 
                        --directory "$(CONFDIR)/plugins.d"; \
335
 
        fi
336
 
        install --mode=u=rwx,go=rx --directory \
 
463
                $(LIBDIR)/mandos/plugins.d \
 
464
                $(LIBDIR)/mandos/plugin-helpers
 
465
        if [ "$(SYSUSERS)" != "$(DESTDIR)" ]; then \
 
466
                install -D --mode=u=rw,go=r sysusers.d-mandos.conf \
 
467
                        $(SYSUSERS)/mandos-client.conf; \
 
468
        fi
 
469
        if [ "$(CONFDIR)" != "$(LIBDIR)/mandos" ]; then \
 
470
                install --directory \
 
471
                        --mode=u=rwx "$(CONFDIR)/plugins.d" \
 
472
                        "$(CONFDIR)/plugin-helpers"; \
 
473
        fi
 
474
        install --directory --mode=u=rwx,go=rx \
337
475
                "$(CONFDIR)/network-hooks.d"
338
476
        install --mode=u=rwx,go=rx \
339
 
                --target-directory=$(PREFIX)/lib/mandos plugin-runner
340
 
        install --mode=u=rwx,go=rx --target-directory=$(PREFIX)/sbin \
 
477
                --target-directory=$(LIBDIR)/mandos plugin-runner
 
478
        install --mode=u=rwx,go=rx \
 
479
                --target-directory=$(LIBDIR)/mandos \
 
480
                mandos-to-cryptroot-unlock
 
481
        install --directory $(BINDIR)
 
482
        install --mode=u=rwx,go=rx --target-directory=$(BINDIR) \
341
483
                mandos-keygen
342
 
        install --mode=u=rwx,go=rx --target-directory=$(PREFIX)/sbin \
343
 
                mandos-change-keytype
344
484
        install --mode=u=rwx,go=rx \
345
 
                --target-directory=$(PREFIX)/lib/mandos/plugins.d \
 
485
                --target-directory=$(LIBDIR)/mandos/plugins.d \
346
486
                plugins.d/password-prompt
347
487
        install --mode=u=rwxs,go=rx \
348
 
                --target-directory=$(PREFIX)/lib/mandos/plugins.d \
 
488
                --target-directory=$(LIBDIR)/mandos/plugins.d \
349
489
                plugins.d/mandos-client
350
490
        install --mode=u=rwxs,go=rx \
351
 
                --target-directory=$(PREFIX)/lib/mandos/plugins.d \
 
491
                --target-directory=$(LIBDIR)/mandos/plugins.d \
352
492
                plugins.d/usplash
353
493
        install --mode=u=rwxs,go=rx \
354
 
                --target-directory=$(PREFIX)/lib/mandos/plugins.d \
 
494
                --target-directory=$(LIBDIR)/mandos/plugins.d \
355
495
                plugins.d/splashy
356
496
        install --mode=u=rwxs,go=rx \
357
 
                --target-directory=$(PREFIX)/lib/mandos/plugins.d \
 
497
                --target-directory=$(LIBDIR)/mandos/plugins.d \
358
498
                plugins.d/askpass-fifo
359
499
        install --mode=u=rwxs,go=rx \
360
 
                --target-directory=$(PREFIX)/lib/mandos/plugins.d \
 
500
                --target-directory=$(LIBDIR)/mandos/plugins.d \
361
501
                plugins.d/plymouth
362
 
        install initramfs-tools-hook \
 
502
        install --mode=u=rwx,go=rx \
 
503
                --target-directory=$(LIBDIR)/mandos/plugin-helpers \
 
504
                plugin-helpers/mandos-client-iprouteadddel
 
505
        install -D initramfs-tools-hook \
363
506
                $(INITRAMFSTOOLS)/hooks/mandos
364
 
        install --mode=u=rw,go=r initramfs-tools-hook-conf \
365
 
                $(INITRAMFSTOOLS)/conf-hooks.d/mandos
366
 
        install initramfs-tools-script \
 
507
        install -D --mode=u=rw,go=r initramfs-tools-conf \
 
508
                $(INITRAMFSTOOLS)/conf.d/mandos-conf
 
509
        install -D --mode=u=rw,go=r initramfs-tools-conf-hook \
 
510
                $(INITRAMFSTOOLS)/conf-hooks.d/zz-mandos
 
511
        install -D initramfs-tools-script \
367
512
                $(INITRAMFSTOOLS)/scripts/init-premount/mandos
 
513
        install -D initramfs-tools-script-stop \
 
514
                $(INITRAMFSTOOLS)/scripts/local-premount/mandos
 
515
        install -D --mode=u=rw,go=r \
 
516
                --target-directory=$(DRACUTMODULE) \
 
517
                dracut-module/ask-password-mandos.path \
 
518
                dracut-module/ask-password-mandos.service
 
519
        install --mode=u=rwxs,go=rx \
 
520
                --target-directory=$(DRACUTMODULE) \
 
521
                dracut-module/module-setup.sh \
 
522
                dracut-module/cmdline-mandos.sh \
 
523
                dracut-module/password-agent
368
524
        install --mode=u=rw,go=r plugin-runner.conf $(CONFDIR)
 
525
        install --directory $(MANDIR)/man8
369
526
        gzip --best --to-stdout mandos-keygen.8 \
370
527
                > $(MANDIR)/man8/mandos-keygen.8.gz
371
528
        gzip --best --to-stdout plugin-runner.8mandos \
382
539
                > $(MANDIR)/man8/askpass-fifo.8mandos.gz
383
540
        gzip --best --to-stdout plugins.d/plymouth.8mandos \
384
541
                > $(MANDIR)/man8/plymouth.8mandos.gz
 
542
        gzip --best --to-stdout dracut-module/password-agent.8mandos \
 
543
                > $(MANDIR)/man8/password-agent.8mandos.gz
385
544
 
 
545
.PHONY: install-client
386
546
install-client: install-client-nokey
387
547
# Post-installation stuff
388
 
        -$(PREFIX)/sbin/mandos-keygen --dir "$(KEYDIR)"
389
 
        update-initramfs -k all -u
 
548
        -$(BINDIR)/mandos-keygen --dir "$(KEYDIR)"
 
549
        if command -v update-initramfs >/dev/null; then \
 
550
            update-initramfs -k all -u; \
 
551
        elif command -v dracut >/dev/null; then \
 
552
            for initrd in $(DESTDIR)/boot/initr*-$(LINUXVERSION); do \
 
553
                if [ -w "$$initrd" ]; then \
 
554
                    chmod go-r "$$initrd"; \
 
555
                    dracut --force "$$initrd"; \
 
556
                fi; \
 
557
            done; \
 
558
        fi
390
559
        echo "Now run mandos-keygen --password --dir $(KEYDIR)"
391
560
 
 
561
.PHONY: uninstall
392
562
uninstall: uninstall-server uninstall-client
393
563
 
 
564
.PHONY: uninstall-server
394
565
uninstall-server:
395
 
        -rm --force $(PREFIX)/sbin/mandos \
396
 
                $(PREFIX)/sbin/mandos-ctl \
397
 
                $(PREFIX)/sbin/mandos-monitor \
 
566
        -rm --force $(BINDIR)/mandos \
 
567
                $(BINDIR)/mandos-ctl \
 
568
                $(BINDIR)/mandos-monitor \
398
569
                $(MANDIR)/man8/mandos.8.gz \
399
570
                $(MANDIR)/man8/mandos-monitor.8.gz \
400
571
                $(MANDIR)/man8/mandos-ctl.8.gz \
403
574
        update-rc.d -f mandos remove
404
575
        -rmdir $(CONFDIR)
405
576
 
 
577
.PHONY: uninstall-client
406
578
uninstall-client:
407
579
# Refuse to uninstall client if /etc/crypttab is explicitly configured
408
580
# to use it.
409
581
        ! grep --regexp='^ *[^ #].*keyscript=[^,=]*/mandos/' \
410
582
                $(DESTDIR)/etc/crypttab
411
 
        -rm --force $(PREFIX)/sbin/mandos-keygen \
412
 
                $(PREFIX)/sbin/mandos-change-keytype \
413
 
                $(PREFIX)/lib/mandos/plugin-runner \
414
 
                $(PREFIX)/lib/mandos/plugins.d/password-prompt \
415
 
                $(PREFIX)/lib/mandos/plugins.d/mandos-client \
416
 
                $(PREFIX)/lib/mandos/plugins.d/usplash \
417
 
                $(PREFIX)/lib/mandos/plugins.d/splashy \
418
 
                $(PREFIX)/lib/mandos/plugins.d/askpass-fifo \
419
 
                $(PREFIX)/lib/mandos/plugins.d/plymouth \
 
583
        -rm --force $(BINDIR)/mandos-keygen \
 
584
                $(LIBDIR)/mandos/plugin-runner \
 
585
                $(LIBDIR)/mandos/plugins.d/password-prompt \
 
586
                $(LIBDIR)/mandos/plugins.d/mandos-client \
 
587
                $(LIBDIR)/mandos/plugins.d/usplash \
 
588
                $(LIBDIR)/mandos/plugins.d/splashy \
 
589
                $(LIBDIR)/mandos/plugins.d/askpass-fifo \
 
590
                $(LIBDIR)/mandos/plugins.d/plymouth \
420
591
                $(INITRAMFSTOOLS)/hooks/mandos \
421
592
                $(INITRAMFSTOOLS)/conf-hooks.d/mandos \
422
593
                $(INITRAMFSTOOLS)/scripts/init-premount/mandos \
 
594
                $(INITRAMFSTOOLS)/scripts/local-premount/mandos \
 
595
                $(DRACUTMODULE)/ask-password-mandos.path \
 
596
                $(DRACUTMODULE)/ask-password-mandos.service \
 
597
                $(DRACUTMODULE)/module-setup.sh \
 
598
                $(DRACUTMODULE)/cmdline-mandos.sh \
 
599
                $(DRACUTMODULE)/password-agent \
423
600
                $(MANDIR)/man8/mandos-keygen.8.gz \
424
601
                $(MANDIR)/man8/plugin-runner.8mandos.gz \
425
602
                $(MANDIR)/man8/mandos-client.8mandos.gz
428
605
                $(MANDIR)/man8/splashy.8mandos.gz \
429
606
                $(MANDIR)/man8/askpass-fifo.8mandos.gz \
430
607
                $(MANDIR)/man8/plymouth.8mandos.gz \
431
 
        -rmdir $(PREFIX)/lib/mandos/plugins.d $(CONFDIR)/plugins.d \
432
 
                 $(PREFIX)/lib/mandos $(CONFDIR) $(KEYDIR)
433
 
        update-initramfs -k all -u
 
608
                $(MANDIR)/man8/password-agent.8mandos.gz \
 
609
        -rmdir $(LIBDIR)/mandos/plugins.d $(CONFDIR)/plugins.d \
 
610
                 $(LIBDIR)/mandos $(CONFDIR) $(KEYDIR) $(DRACUTMODULE)
 
611
        if command -v update-initramfs >/dev/null; then \
 
612
            update-initramfs -k all -u; \
 
613
        elif command -v dracut >/dev/null; then \
 
614
            for initrd in $(DESTDIR)/boot/initr*-$(LINUXVERSION); do \
 
615
                test -w "$$initrd" && dracut --force "$$initrd"; \
 
616
            done; \
 
617
        fi
434
618
 
 
619
.PHONY: purge
435
620
purge: purge-server purge-client
436
621
 
 
622
.PHONY: purge-server
437
623
purge-server: uninstall-server
438
624
        -rm --force $(CONFDIR)/mandos.conf $(CONFDIR)/clients.conf \
439
625
                $(DESTDIR)/etc/dbus-1/system.d/mandos.conf
440
626
                $(DESTDIR)/etc/default/mandos \
441
627
                $(DESTDIR)/etc/init.d/mandos \
442
 
                $(DESTDIR)/run/mandos.pid
 
628
                $(DESTDIR)/run/mandos.pid \
 
629
                $(DESTDIR)/var/run/mandos.pid
 
630
        if [ "$(SYSTEMD)" != "$(DESTDIR)" -a -d "$(SYSTEMD)" ]; then \
 
631
                -rm --force -- $(SYSTEMD)/mandos.service; \
 
632
        fi
443
633
        -rmdir $(CONFDIR)
444
634
 
 
635
.PHONY: purge-client
445
636
purge-client: uninstall-client
446
 
        -shred --remove $(KEYDIR)/seckey.txt
 
637
        -shred --remove $(KEYDIR)/seckey.txt $(KEYDIR)/tls-privkey.pem
447
638
        -rm --force $(CONFDIR)/plugin-runner.conf \
448
 
                $(KEYDIR)/pubkey.txt $(KEYDIR)/seckey.txt
 
639
                $(KEYDIR)/pubkey.txt $(KEYDIR)/seckey.txt \
 
640
                $(KEYDIR)/tls-pubkey.txt $(KEYDIR)/tls-privkey.txt
449
641
        -rmdir $(KEYDIR) $(CONFDIR)/plugins.d $(CONFDIR)