blob: fed00c95b9f09c74c554a05cc576ea66e2014585 [file] [log] [blame]
Andrew Morgan2c9c0532007-07-10 20:50:21 -07001#
Andrew Morgan2c9c0532007-07-10 20:50:21 -07002## Optional prefixes:
3#
4
Rolf Eike Beer6f8b1202016-05-10 17:57:11 +02005# common 'packaging' directory
Andrew Morgan2c9c0532007-07-10 20:50:21 -07006
Mike Frysinger76f6f0a2008-02-16 16:52:31 -05007FAKEROOT=$(DESTDIR)
Andrew Morgan2c9c0532007-07-10 20:50:21 -07008
9# Autoconf-style prefixes are activated when $(prefix) is defined.
Andrew G Morgan93308182013-12-24 10:08:05 -080010# Otherwise binaries and libraries are installed in /{lib,sbin}/,
Andrew Morgan2c9c0532007-07-10 20:50:21 -070011# header files in /usr/include/ and documentation in /usr/man/man?/.
Andrew G. Morgan85748f42010-08-08 17:42:11 -070012# These choices are motivated by the fact that getcap and setcap are
13# administrative operations that could be needed to recover a system.
Andrew Morgan2c9c0532007-07-10 20:50:21 -070014
Andrew Morgan5216fff2007-07-10 22:38:22 -070015ifndef lib
Andrew G Morgan93308182013-12-24 10:08:05 -080016lib=$(shell ldd /usr/bin/ld|egrep "ld-linux|ld.so"|cut -d/ -f2)
Andrew Morgan5216fff2007-07-10 22:38:22 -070017endif
18
Andrew Morgan2c9c0532007-07-10 20:50:21 -070019ifdef prefix
20exec_prefix=$(prefix)
21lib_prefix=$(exec_prefix)
22inc_prefix=$(lib_prefix)
Andrew Morgan5216fff2007-07-10 22:38:22 -070023man_prefix=$(prefix)/share
Andrew Morgan2c9c0532007-07-10 20:50:21 -070024else
25prefix=/usr
26exec_prefix=
27lib_prefix=$(exec_prefix)
28inc_prefix=$(prefix)
Andrew Morgan5216fff2007-07-10 22:38:22 -070029man_prefix=$(prefix)/share
Andrew Morgan2c9c0532007-07-10 20:50:21 -070030endif
31
32# Target directories
33
Benedikt Morbach0ee94212014-05-20 23:30:53 +020034MANDIR=$(man_prefix)/man
35SBINDIR=$(exec_prefix)/sbin
36INCDIR=$(inc_prefix)/include
37LIBDIR=$(lib_prefix)/$(lib)
Rolf Eike Beer48f44c62016-05-10 17:55:17 +020038PKGCONFIGDIR=$(LIBDIR)/pkgconfig
Andrew G. Morgan1a61e6f2019-12-07 17:23:41 -080039GOPKGDIR=$(prefix)/share/gocode/src
Andrew Morgan2c9c0532007-07-10 20:50:21 -070040
Andrew Morgan370a70f2007-07-17 21:50:12 -070041# common defines for libcap
42LIBTITLE=libcap
Andrew Morganf782a972007-11-07 22:14:24 -080043VERSION=2
Andrew G. Morgan7f519552020-06-02 21:07:49 -070044MINOR=36
Andrew Morgan2c9c0532007-07-10 20:50:21 -070045#
46
47# Compilation specifics
48
Andrew G Morganc3290662014-01-01 17:56:31 -080049KERNEL_HEADERS := $(topdir)/libcap/include/uapi
50IPATH += -fPIC -I$(KERNEL_HEADERS) -I$(topdir)/libcap/include
Andrew G. Morgan8bdd0ef2008-09-10 19:50:50 -070051
Rolf Eike Beerad120c12016-05-10 18:06:55 +020052CC := $(CROSS_COMPILE)gcc
Rolf Eike Beer44a15c12016-05-10 18:01:22 +020053DEFINES := -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64
54CFLAGS := -O2 $(DEFINES)
Andrew G. Morgan953e7f12008-06-02 22:02:01 -070055BUILD_CC := $(CC)
Rolf Eike Beer44a15c12016-05-10 18:01:22 +020056BUILD_CFLAGS := -O2 $(DEFINES) $(IPATH)
Rolf Eike Beerad120c12016-05-10 18:06:55 +020057AR := $(CROSS_COMPILE)ar
58RANLIB := $(CROSS_COMPILE)ranlib
Andrew G. Morgan953e7f12008-06-02 22:02:01 -070059DEBUG = -g #-DDEBUG
Torsten Werner7ebd7c52009-09-30 21:23:15 +020060WARNINGS=-Wall -Wwrite-strings \
Andrew Morgan2c9c0532007-07-10 20:50:21 -070061 -Wpointer-arith -Wcast-qual -Wcast-align \
Andrew Morgan5216fff2007-07-10 22:38:22 -070062 -Wstrict-prototypes -Wmissing-prototypes \
63 -Wnested-externs -Winline -Wshadow
Andrew Morgancd45c572007-08-13 23:16:50 -070064LD=$(CC) -Wl,-x -shared
Andrew G. Morgan953e7f12008-06-02 22:02:01 -070065LDFLAGS := #-g
Andrew G. Morgane9f55d92019-12-02 20:48:13 -080066LIBCAPLIB := -L$(topdir)/libcap -lcap
67LIBPSXLIB := -L$(topdir)/libcap -lpsx -lpthread
68
Matthieu Crapet3c228702014-03-28 14:11:15 +010069BUILD_GPERF := $(shell which gperf >/dev/null 2>/dev/null && echo yes)
Andrew Morgan2c9c0532007-07-10 20:50:21 -070070
Andrew Morgan54f055e2007-07-21 22:18:02 -070071SYSTEM_HEADERS = /usr/include
Andrew Morgan2c9c0532007-07-10 20:50:21 -070072INCS=$(topdir)/libcap/include/sys/capability.h
Andrew G. Morgan953e7f12008-06-02 22:02:01 -070073LDFLAGS += -L$(topdir)/libcap
Torsten Werner7ebd7c52009-09-30 21:23:15 +020074CFLAGS += -Dlinux $(WARNINGS) $(DEBUG)
Andrew G. Morgan953e7f12008-06-02 22:02:01 -070075PAM_CAP := $(shell if [ -f /usr/include/security/pam_modules.h ]; then echo yes ; else echo no ; fi)
Matthieu Crapet3c228702014-03-28 14:11:15 +010076INDENT := $(shell if [ -n "$$(which indent 2>/dev/null)" ]; then echo "| indent -kr" ; fi)
Andrew G. Morgan0a42b492008-10-19 19:37:28 -070077DYNAMIC := $(shell if [ ! -d "$(topdir)/.git" ]; then echo yes; fi)
78
Andrew G. Morgan0615d992019-05-19 14:57:20 -070079GOLANG := $(shell if [ -n "$(shell go version 2>/dev/null)" ]; then echo yes ; else echo no ; fi)
80ifeq ($(GOLANG),yes)
81GOROOT := $(shell go env GOROOT)
Andrew G. Morgan2d2b7022019-11-16 09:14:22 -080082GOCGO := $(shell if [ "$(shell go env CGO_ENABLED)" = 1 ]; then echo yes ; else echo no ; fi)
Andrew G. Morgan0615d992019-05-19 14:57:20 -070083GOOSARCH := $(shell go env GOHOSTOS)_$(shell go env GOHOSTARCH)
Andrew G. Morganb2b267e2019-11-30 18:33:42 -080084CGO_CFLAGS := -I$(topdir)/libcap/include
85CGO_LDFLAGS := -L$(topdir)/libcap
86CGO_LDFLAGS_ALLOW := -Wl,-wrap,.+
Andrew G. Morgane305dd22019-12-07 08:04:58 -080087CGO_REQUIRED=$(shell $(topdir)/go/cgo-required.sh)
Andrew G. Morgan0615d992019-05-19 14:57:20 -070088endif
89
Andrew G. Morgancbca9ab2020-04-05 19:31:19 -070090# If you want capsh to launch with something other than /bin/bash
91# build like this:
92#
93# make CAPSH_SHELL='-DSHELL=\"/bin/sh\"'
94#
95# or undefine the following:
96#CAPSH_SHELL := '-DSHELL="/bin/sh"'
97
Andrew G. Morgan2b5f5632019-12-13 17:30:23 -080098# When installing setcap, you can arrange for the installation process
99# to set its inheritable bit to be able to place capabilities on files.
100# It can be used in conjunction with pam_cap (associated with su and
101# certain users say) to make it useful for specially blessed users.
Andrew G. Morgan85748f42010-08-08 17:42:11 -0700102#
Andrew G. Morgan2b5f5632019-12-13 17:30:23 -0800103# make RAISE_SETFCAP=yes install
Andrew G. Morgan85748f42010-08-08 17:42:11 -0700104#
Andrew G. Morgan2b5f5632019-12-13 17:30:23 -0800105# This is now defaulted to no because some distributions have started
106# shipping with all users blessed with full inheritable sets which makes
107# no sense whatsoever!
108#
109# Indeed, it looks alarmingly like these distributions are recreating
110# the environment for what became known as the sendmail-capabilities
111# bug from 2000:
112#
113# https://sites.google.com/site/fullycapable/Home/thesendmailcapabilitiesissue
114#
115# they are also nullifying the difference between a p-bit and an i-bit.
116#
117# Folk really should read this document, which explains there is a really
118# important difference being lost here:
119#
120# https://static.googleusercontent.com/media/research.google.com/en//pubs/archive/33528.pdf
121#
122# In the context of this tree, on such such systems, a yes setting will
123# guarantee that every user, by default, is able to bless any binary with
124# any capability - a ready made local exploit machanism.
125RAISE_SETFCAP := no
126
127# If set to yes, this will cause the go "web" demo app to force the needed p
128# bit to be able to bind to port 80 without running as root.
129RAISE_GO_FILECAP := no
Andrew G. Morgan85748f42010-08-08 17:42:11 -0700130
Andrew Morgan2c9c0532007-07-10 20:50:21 -0700131# Global cleanup stuff
132
133LOCALCLEAN=rm -f *~ core
134DISTCLEAN=@find . \( -name '*.orig' -o -name '*.rej' \) | xargs rm -f