GNUmakefile.in 7.92 KB
Newer Older
1
#
Leigh B. Stoller's avatar
Leigh B. Stoller committed
2
# EMULAB-COPYRIGHT
3
# Copyright (c) 2000-2005 University of Utah and the Flux Group.
Leigh B. Stoller's avatar
Leigh B. Stoller committed
4
# All rights reserved.
5
#
Leigh B. Stoller's avatar
Leigh B. Stoller committed
6

7 8 9 10 11 12 13 14
SRCDIR		= @srcdir@
TESTBED_SRCDIR	= @top_srcdir@
EVENTSYS	= @EVENTSYS@
OBJDIR		= ..
SUBDIR		= ssl

include $(OBJDIR)/Makeconf

15
all:	emulab.pem server.pem localnode.pem ronnode.pem pcwa.pem ctrlnode.pem \
16
	capture.pem capture.fingerprint capture.sha1fingerprint \
17
	keys mksig
18

19
remote-site:	emulab.pem capture.pem capture.fingerprint server.pem \
20
	localnode.pem capture.sha1fingerprint apache.pem
21

22 23 24 25 26 27 28 29 30 31
include $(TESTBED_SRCDIR)/GNUmakerules

#
# You do not want to run these targets unless you are sure you
# know what you are doing! You really do not want to install these
# unless you are very sure you know what you are doing. You could
# mess up all the clients when the CA changes out from under them.
#
pems:	emulab.pem server.pem client.pem

32
emulab.pem:	dirsmade emulab.cnf
33 34 35 36
	#
	# Create the Certificate Authority.
	# The certificate (no key!) is installed on both boss and remote nodes.
	#
37
	openssl req -new -x509 -days 2000 -config emulab.cnf \
38 39
		    -keyout cakey.pem -out cacert.pem
	cp cacert.pem emulab.pem
40
	cp cakey.pem emulab.key
41

42
server.pem:	dirsmade server.cnf ca.cnf
43 44 45
	#
	# Create the server side private key and certificate request.
	#
46 47
	openssl req -new -config server.cnf \
		-keyout server_key.pem -out server_req.pem
48 49 50
	#
	# Combine key and cert request.
	#
51
	cat server_key.pem server_req.pem > newreq.pem
52 53 54
	#
	# Sign the server cert request, creating a server certificate.
	#
55 56
	openssl ca -batch -policy policy_match -config ca.cnf \
		-out server_cert.pem \
57 58 59 60 61 62
		-cert cacert.pem -keyfile cakey.pem \
		-infiles newreq.pem
	#
	# Combine the key and the certificate into one file which is installed
	# on boss and used by tmcd.
	#
63
	cat server_key.pem server_cert.pem > server.pem
64 65
	rm -f newreq.pem

66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91
apache.pem:	dirsmade apache.cnf ca.cnf
	#
	# Create the server side private key and certificate request.
	#
	openssl req -new -config apache.cnf \
		-keyout apache_key.pem -out apache_req.pem
	#
	# Combine key and cert request.
	#
	cat apache_key.pem apache_req.pem > newreq.pem
	#
	# Sign the apache cert request, creating a apache certificate.
	#
	openssl ca -batch -policy policy_sslxmlrpc -config ca.cnf \
		-out apache_cert.pem \
		-cert cacert.pem -keyfile cakey.pem \
		-infiles newreq.pem
	#
	# Combine the key and the certificate into one file. This file is
	# is not actually installed though; the separate files will be
	# installed into the apache cert/key directories by install/boss-install
	# when the boss node is created.
	#
	cat apache_key.pem apache_cert.pem > apache.pem
	rm -f newreq.pem

Leigh B. Stoller's avatar
Leigh B. Stoller committed
92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115
capture.pem:	dirsmade capture.cnf ca.cnf
	#
	# Create the server side private key and certificate request.
	#
	openssl req -new -config capture.cnf \
		-keyout capture_key.pem -out capture_req.pem
	#
	# Combine key and cert request.
	#
	cat capture_key.pem capture_req.pem > newreq.pem
	#
	# Sign the capture cert request, creating a capture certificate.
	#
	openssl ca -batch -policy policy_match -config ca.cnf \
		-out capture_cert.pem \
		-cert cacert.pem -keyfile cakey.pem \
		-infiles newreq.pem
	#
	# Combine the key and the certificate into one file which is installed
	# on boss and used by capture.
	#
	cat capture_key.pem capture_cert.pem > capture.pem
	rm -f newreq.pem

116 117 118 119 120 121 122 123 124 125

#
# Generate the fingerprint of the capture certificate
# NOTE: I'd rather use SHA1 than SHA, but we've widely distributed the
# tiptunnel binary, and it needs SHA
#
capture.fingerprint:	capture.pem
	openssl x509 -sha -noout -fingerprint -in capture.pem \
	    > capture.fingerprint

126 127 128 129
capture.sha1fingerprint:	capture.pem
	openssl x509 -sha1 -noout -fingerprint -in capture.pem \
	    > capture.sha1fingerprint

130 131 132
localnode.pem:	dirsmade localnode.cnf ca.cnf $(SRCDIR)/mkclient.sh
	$(SRCDIR)/mkclient.sh localnode

133 134 135
ctrlnode.pem:	dirsmade ctrlnode.cnf ca.cnf $(SRCDIR)/mkclient.sh
	$(SRCDIR)/mkclient.sh ctrlnode

136 137
ronnode.pem:	dirsmade ronnode.cnf ca.cnf $(SRCDIR)/mkclient.sh
	$(SRCDIR)/mkclient.sh ronnode
138

139 140 141
pcplab.pem:		dirsmade pcplab.cnf ca.cnf $(SRCDIR)/mkclient.sh
	$(SRCDIR)/mkclient.sh pcplab

142 143 144
pcwa.pem:		dirsmade pcwa.cnf ca.cnf $(SRCDIR)/mkclient.sh
	$(SRCDIR)/mkclient.sh pcwa

145 146 147 148 149 150 151 152 153 154 155 156 157 158 159
keys:		emulab_privkey.pem emulab_pubkey.pem

emulab_privkey.pem:
	#
	# Generate a priv key for signing stuff. This one gets a
	# passphrase.
	# 
	openssl genrsa -out emulab_privkey.pem -des3

emulab_pubkey.pem:	emulab_privkey.pem
	#
	# Extract a pubkey from the privkey
	# 
	openssl rsa -in emulab_privkey.pem -pubout -out emulab_pubkey.pem

160 161 162 163 164 165 166 167
dirsmade:
	-mkdir -p certs
	-mkdir -p newcerts
	-mkdir -p crl
	echo "01" > serial
	touch index.txt
	touch dirsmade

168 169 170 171 172 173 174
install-dirs:
	-mkdir -p $(INSTALL_DIR)/ssl
	-chmod 770 $(INSTALL_DIR)/ssl
	-mkdir -p $(INSTALL_DIR)/ssl/certs
	-mkdir -p $(INSTALL_DIR)/ssl/newcerts
	-chmod 775 $(INSTALL_DIR)/ssl/newcerts
	-mkdir -p $(INSTALL_DIR)/ssl/crl
Leigh B. Stoller's avatar
Leigh B. Stoller committed
175
	-mkdir -p $(INSTALL_LIBDIR)/ssl
176 177 178 179
	echo "01" > $(INSTALL_DIR)/ssl/serial
	touch $(INSTALL_DIR)/ssl/index.txt
	touch install-dirs

180 181 182
#
# You do not want to run these targets unless you are sure you
# know what you are doing!
183
#
184
install:	install-dirs $(INSTALL_SBINDIR)/mksig
185 186
	@echo "BE VERY CAREFUL! INSTALLING NEW CERTS CAN CAUSE DISASTER!"

187
boss-installX:	$(INSTALL_ETCDIR)/emulab.pem \
188
		$(INSTALL_ETCDIR)/emulab.key \
Leigh B. Stoller's avatar
Leigh B. Stoller committed
189
		$(INSTALL_ETCDIR)/server.pem \
190
		$(INSTALL_ETCDIR)/pcplab.pem \
191
		$(INSTALL_ETCDIR)/pcwa.pem \
192
		$(INSTALL_ETCDIR)/ronnode.pem \
193
		$(INSTALL_ETCDIR)/ctrlnode.pem \
194
		$(INSTALL_ETCDIR)/capture.pem \
195 196
		$(INSTALL_ETCDIR)/capture.fingerprint \
		$(INSTALL_ETCDIR)/capture.sha1fingerprint \
197 198
		$(INSTALL_ETCDIR)/emulab_privkey.pem \
		$(INSTALL_ETCDIR)/emulab_pubkey.pem
199
	$(INSTALL_DATA) usercert.cnf $(INSTALL_LIBDIR)/ssl/usercert.cnf
200
	$(INSTALL_DATA) ca.cnf $(INSTALL_LIBDIR)/ssl/ca.cnf
201
	$(INSTALL_DATA) localnode.pem $(INSTALL_ETCDIR)/client.pem
202
	chmod 640 $(INSTALL_ETCDIR)/emulab.pem
203
	chmod 600 $(INSTALL_ETCDIR)/emulab.key
204 205 206
	chmod 640 $(INSTALL_ETCDIR)/server.pem
	chmod 640 $(INSTALL_ETCDIR)/client.pem
	chmod 640 $(INSTALL_ETCDIR)/pcplab.pem
207
	chmod 640 $(INSTALL_ETCDIR)/ronnode.pem
208
	chmod 640 $(INSTALL_ETCDIR)/ctrlnode.pem
209
	chmod 640 $(INSTALL_ETCDIR)/pcwa.pem
210
	chmod 640 $(INSTALL_ETCDIR)/emulab_privkey.pem
211 212 213
	chmod 640 $(INSTALL_ETCDIR)/capture.pem
	chmod 644 $(INSTALL_ETCDIR)/capture.fingerprint
	chmod 644 $(INSTALL_ETCDIR)/capture.sha1fingerprint
214

215 216 217
remote-site-boss-install:	install-dirs \
		$(INSTALL_ETCDIR)/emulab.pem \
		$(INSTALL_ETCDIR)/emulab.key \
218 219
		$(INSTALL_ETCDIR)/capture.pem \
		$(INSTALL_ETCDIR)/capture.fingerprint \
220
		$(INSTALL_ETCDIR)/capture.sha1fingerprint \
221
		$(INSTALL_ETCDIR)/ctrlnode.pem \
222
		$(INSTALL_ETCDIR)/server.pem
223
	$(INSTALL_DATA) usercert.cnf $(INSTALL_LIBDIR)/ssl/usercert.cnf
224
	$(INSTALL_DATA) ca.cnf $(INSTALL_LIBDIR)/ssl/ca.cnf
225 226
	$(INSTALL_DATA) localnode.pem $(INSTALL_ETCDIR)/client.pem
	chmod 640 $(INSTALL_ETCDIR)/emulab.pem
227
	chmod 600 $(INSTALL_ETCDIR)/emulab.key
228
	chmod 640 $(INSTALL_ETCDIR)/capture.pem
229
	chmod 644 $(INSTALL_ETCDIR)/capture.fingerprint
230
	chmod 644 $(INSTALL_ETCDIR)/capture.sha1fingerprint
231 232
	chmod 640 $(INSTALL_ETCDIR)/server.pem
	chmod 640 $(INSTALL_ETCDIR)/client.pem
233
	chmod 640 $(INSTALL_ETCDIR)/ctrlnode.pem
234

235
client-install:
236 237 238 239
	$(INSTALL_DATA) localnode.pem $(DESTDIR)$(CLIENT_ETCDIR)/client.pem
	$(INSTALL_DATA) emulab.pem $(DESTDIR)$(CLIENT_ETCDIR)/emulab.pem
	$(INSTALL_DATA) emulab_pubkey.pem \
			$(DESTDIR)$(CLIENT_ETCDIR)/emulab_pubkey.pem
240

Leigh B. Stoller's avatar
Leigh B. Stoller committed
241
control-install:	$(INSTALL_ETCDIR)/capture.pem \
242 243
			$(INSTALL_ETCDIR)/emulab.pem
	$(INSTALL_DATA) ctrlnode.pem $(INSTALL_ETCDIR)/client.pem
Leigh B. Stoller's avatar
Leigh B. Stoller committed
244
	chmod 640 $(INSTALL_ETCDIR)/capture.pem
245 246 247
	chmod 640 $(INSTALL_ETCDIR)/client.pem
	chmod 640 $(INSTALL_ETCDIR)/emulab.pem

248 249 250
tipserv-install:	$(INSTALL_SBINDIR)/capture.pem
	chmod 640 $(INSTALL_SBINDIR)/capture.pem

251 252 253
usercert-install:	install-dirs
	-mkdir -p $(INSTALL_LIBDIR)/ssl
	$(INSTALL_DATA) ca.cnf $(INSTALL_LIBDIR)/ssl/ca.cnf
254
	$(INSTALL_DATA) usercert.cnf $(INSTALL_LIBDIR)/ssl/usercert.cnf
255

256
clean:
257 258 259
	@echo "BE VERY CAREFUL! CLEANING THE SSL DIR CAN CAUSE DISASTER!"

cleanX:
260 261
	rm -f *.pem serial index.txt *.old dirsmade *.cnf
	rm -rf newcerts certs