@@ -36,8 +36,13 @@ const PASSWD_PROMPT: &str = "Enter YubiHSM Password: ";
36
36
const PASSWD_NEW : & str = "Enter new password: " ;
37
37
const PASSWD_NEW_2 : & str = "Enter password again to confirm: " ;
38
38
39
+ const INPUT_PATH : & str = "/usr/share/oks" ;
40
+ const VERIFIER_PATH : & str = "/usr/share/oks/verifier.json" ;
41
+
42
+ const OUTPUT_PATH : & str = "/var/lib/oks" ;
43
+ const STATE_PATH : & str = "/var/lib/oks/ca-state" ;
44
+
39
45
const GEN_PASSWD_LENGTH : usize = 16 ;
40
- const VERIFIER_FILE : & str = "verifier.json" ;
41
46
42
47
// when we write out signed certs to the file system this suffix is appended
43
48
const CERT_SUFFIX : & str = "cert.pem" ;
@@ -55,11 +60,11 @@ struct Args {
55
60
verbose : bool ,
56
61
57
62
/// Directory where we put certs and attestations
58
- #[ clap( long, env, default_value = "output" ) ]
63
+ #[ clap( long, env, default_value = OUTPUT_PATH ) ]
59
64
output : PathBuf ,
60
65
61
66
/// Directory where we put KeySpec, CA state and backups
62
- #[ clap( long, env, default_value = "ca-state" ) ]
67
+ #[ clap( long, env, default_value = STATE_PATH ) ]
63
68
state : PathBuf ,
64
69
65
70
/// 'usb' or 'http'
@@ -96,10 +101,10 @@ enum Command {
96
101
/// is equivalent to executing `hsm initialize`, `hsm generate`,
97
102
/// `ca initialize`, and `ca sign`.
98
103
Ceremony {
99
- #[ clap( long, env, default_value = "input" ) ]
104
+ #[ clap( long, env, default_value = INPUT_PATH ) ]
100
105
csr_spec : PathBuf ,
101
106
102
- #[ clap( long, env, default_value = "input" ) ]
107
+ #[ clap( long, env, default_value = INPUT_PATH ) ]
103
108
key_spec : PathBuf ,
104
109
105
110
/// Path to the YubiHSM PKCS#11 module
@@ -126,7 +131,7 @@ enum CaCommand {
126
131
/// Initialize an OpenSSL CA for the given key.
127
132
Initialize {
128
133
/// Spec file describing the CA signing key
129
- #[ clap( long, env, default_value = "input" ) ]
134
+ #[ clap( long, env, default_value = INPUT_PATH ) ]
130
135
key_spec : PathBuf ,
131
136
132
137
/// Path to the YubiHSM PKCS#11 module
@@ -141,7 +146,7 @@ enum CaCommand {
141
146
/// Use the CA associated with the provided key spec to sign the
142
147
/// provided CSR.
143
148
Sign {
144
- #[ clap( long, env, default_value = "input" ) ]
149
+ #[ clap( long, env, default_value = INPUT_PATH ) ]
145
150
csr_spec : PathBuf ,
146
151
} ,
147
152
}
@@ -175,7 +180,7 @@ enum HsmCommand {
175
180
#[ clap( flatten) ]
176
181
auth_method : AuthInputArg ,
177
182
178
- #[ clap( long, env, default_value = "input" ) ]
183
+ #[ clap( long, env, default_value = INPUT_PATH ) ]
179
184
key_spec : PathBuf ,
180
185
} ,
181
186
@@ -195,13 +200,13 @@ enum HsmCommand {
195
200
/// Restore a previously split aes256-ccm-wrap key
196
201
// assume default auth for passwd, chose share src: stdio / cdr
197
202
Restore {
198
- #[ clap( long, env, default_value = "input" ) ]
203
+ #[ clap( long, env, default_value = INPUT_PATH ) ]
199
204
backups : PathBuf ,
200
205
201
206
#[ clap( flatten) ]
202
207
share_method : ShareInputArg ,
203
208
204
- #[ clap( long, env, default_value = "input /verifier.json" ) ]
209
+ #[ clap( long, env, default_value = "/usr/share/oks /verifier.json" ) ]
205
210
verifier : PathBuf ,
206
211
} ,
207
212
@@ -350,7 +355,7 @@ fn do_ceremony<P: AsRef<Path>>(
350
355
let ( shares, verifier) = wrap. split ( & mut hsm) ?;
351
356
let verifier = serde_json:: to_string ( & verifier) ?;
352
357
debug ! ( "JSON: {}" , verifier) ;
353
- let verifier_path = args. output . join ( VERIFIER_FILE ) ;
358
+ let verifier_path = args. output . join ( VERIFIER_PATH ) ;
354
359
debug ! (
355
360
"Serializing verifier as json to: {}" ,
356
361
verifier_path. display( )
@@ -754,7 +759,7 @@ fn main() -> Result<()> {
754
759
let ( shares, verifier) = wrap. split ( & mut hsm) ?;
755
760
let verifier = serde_json:: to_string ( & verifier) ?;
756
761
debug ! ( "JSON: {}" , verifier) ;
757
- let verifier_path = args. output . join ( VERIFIER_FILE ) ;
762
+ let verifier_path = args. output . join ( VERIFIER_PATH ) ;
758
763
debug ! (
759
764
"Serializing verifier as json to: {}" ,
760
765
verifier_path. display( )
0 commit comments