X-Git-Url: http://git.pld-linux.org/?a=blobdiff_plain;ds=sidebyside;f=ca-certificates.spec;h=a15d10c649feb52a1427d82c2441c7475d2e8eb1;hb=2615c0a;hp=95b3acd919108b3a8e3171a4448a6451d108d0e5;hpb=76b4b9b99b55b4b7eb112239fb24228aae83973e;p=packages%2Fca-certificates.git diff --git a/ca-certificates.spec b/ca-certificates.spec index 95b3acd..a15d10c 100644 --- a/ca-certificates.spec +++ b/ca-certificates.spec @@ -6,17 +6,19 @@ # - make pidgin use system certs # - swap %{certsdir}/ca-certificates.crt /etc/pki/tls/certs/ca-bundle.crt regards file vs symlink # +# Conditional build: +%bcond_without tests # skip duplicates check + Summary: Common CA Certificates PEM files Summary(pl.UTF-8): Pliki PEM popularnych certyfikatów CA Name: ca-certificates -Version: 20150426 +%define ver_date 20170717 +Version: %{ver_date} Release: 1 License: GPL v2 (scripts), MPL v2 (mozilla certs), distributable (other certs) -Group: Libraries -Source0: ftp://ftp.debian.org/debian/pool/main/c/ca-certificates/%{name}_%{version}.tar.xz -# Source0-md5: 717455f13fb31fd014a11a468ea3895d -Source1: https://www.verisign.com/support/thawte-roots.zip -# Source1-md5: 21a284ebdc6e8f4178d5cc10fb9e1ef2 +Group: Base +Source0: http://ftp.debian.org/debian/pool/main/c/ca-certificates/%{name}_%{version}.tar.xz +# Source0-md5: 55a6bb6b98afb16b3cde8e3ad1e262eb Source2: http://www.certum.pl/keys/CA.pem # Source2-md5: 35610177afc9c64e70f1ce62c1885496 Source3: http://www.certum.pl/keys/level1.pem @@ -73,16 +75,33 @@ Source28: http://www.sk.ee/upload/files/ESTEID-SK%202007.PEM.cer?/ESTEID-SK_2007 # Source28-md5: 2b1a2a77f565d68fdf5f19f6cc3a5600 Source29: http://www.sk.ee/upload/files/ESTEID-SK%202011.pem.cer?/ESTEID-SK_2011.pem.cer # Source29-md5: cfcc1e592cb0ff305158a7e32730546c - +Source30: http://www.terena.org/activities/tcs/repository/sha2/TERENA_SSL_CA_2.pem +# Source30-md5: 96700974350cecfcfbd904d52c3a3942 +Source31: http://www.terena.org/activities/tcs/repository/sha2/TERENA_Personal_CA_2.pem +# Source31-md5: d40e5c821f8559faf5bcd55eac5e1371 +Source32: http://www.terena.org/activities/tcs/repository/sha2/TERENA_Code_Signing_CA_2.pem +# Source32-md5: 69ff653e730adf87ff59bf373950b357 +Source33: http://www.terena.org/activities/tcs/repository-g3/TERENA_SSL_CA_3.pem +# Source33-md5: b22ed904900ed6b3bc129f9a35ba5a66 +Source34: http://www.terena.org/activities/tcs/repository-g3/TERENA_Personal_CA_3.pem +# Source34-md5: eb5ddefe94750c2f8d4f11cb1f3af911 +Source35: http://www.terena.org/activities/tcs/repository-g3/TERENA_Code_Signing_CA_3.pem +# Source35-md5: 43375a208fba0a5e73f1912faa4db86d +Source36: http://www.terena.org/activities/tcs/repository-g3/TERENA_SSL_High_Assurance_CA_3.pem +# Source36-md5: 6e00d9ede4460e739eb285ea023299f0 +Source38: https://letsencrypt.org/certs/letsencryptauthorityx1.pem.txt +# Source38-md5: 7a4c9a537127f609035ad7f4019defdb +Source39: https://letsencrypt.org/certs/letsencryptauthorityx2.pem.txt +# Source39-md5: 27b0b8f7ef14356d8f717bc083c43ef1 Patch0: %{name}-undebianize.patch Patch1: %{name}-more-certs.patch Patch2: %{name}-etc-certs.patch Patch3: %{name}-c_rehash.sh.patch Patch5: %{name}-DESTDIR.patch Patch6: %{name}.d.patch -URL: http://www.cacert.org/ +URL: https://packages.debian.org/sid/ca-certificates BuildRequires: openssl-tools -BuildRequires: python +BuildRequires: python >= 1:2.6 BuildRequires: python-modules BuildRequires: rpm >= 4.4.9-56 BuildRequires: sed >= 4.0 @@ -121,7 +140,7 @@ Script and data for updating CA Certificates database. Skrypt i dane do odświeżania bazy certyfikatów CA. %prep -%setup -q +%setup -q -n %{name} %patch0 -p1 %patch1 -p1 %patch2 -p1 @@ -131,20 +150,6 @@ Skrypt i dane do odświeżania bazy certyfikatów CA. %{__sed} -i -e 's,@openssldir@,%{openssldir},' sbin/update-ca-certificates* -%{__unzip} -qq %{SOURCE1} -d thawte - -find thawte/ -name *.pem -o -name *.txt| while read f ; do - if (file "$f" | grep -q "PEM"); then - ff=$(echo $f | sed -e 's|[ ,]|_|g' -e 's|[()]|=|g') - nname=$(basename "$ff" .pem) - nname=$(basename "$nname" .txt) - nname=$(basename "$nname" _b64) - cp -pi "$f" "thawte/${nname}.crt" - else - echo "Skipping $f, doesn't look like PEM CERT" - fi -done - install -d certum cp -pi %{SOURCE2} certum cp -pi %{SOURCE3} certum @@ -180,6 +185,11 @@ for a in esteid/*.PEM.cer; do mv -i "$a" "${a%.PEM.cer}.crt" done +# 2eecd52 - add letsencrypt certificates (approved by mozilla) +install -d mozilla +cp -pi %{SOURCE38} mozilla/$(basename %{SOURCE38} .pem.txt).crt +cp -pi %{SOURCE39} mozilla/$(basename %{SOURCE39} .pem.txt).crt + %build install -d terena openssl x509 -inform DER -in %{SOURCE21} -outform PEM -out terena/$(basename %{SOURCE21}) @@ -187,14 +197,21 @@ openssl x509 -inform DER -in %{SOURCE22} -outform PEM -out terena/$(basename %{S openssl x509 -inform DER -in %{SOURCE23} -outform PEM -out terena/$(basename %{SOURCE23}) openssl x509 -inform DER -in %{SOURCE24} -outform PEM -out terena/$(basename %{SOURCE24}) openssl x509 -inform DER -in %{SOURCE25} -outform PEM -out terena/$(basename %{SOURCE25}) +cp %{SOURCE30} terena/$(basename %{SOURCE30} .pem).crt +cp %{SOURCE31} terena/$(basename %{SOURCE31} .pem).crt +cp %{SOURCE32} terena/$(basename %{SOURCE32} .pem).crt +sed 's/\r//' %{SOURCE33} > terena/$(basename %{SOURCE33} .pem).crt +sed 's/\r//' %{SOURCE34} > terena/$(basename %{SOURCE34} .pem).crt +sed 's/\r//' %{SOURCE35} > terena/$(basename %{SOURCE35} .pem).crt +sed 's/\r//' %{SOURCE36} > terena/$(basename %{SOURCE36} .pem).crt %{__make} # We have those and more in specific dirs -rm mozilla/{thawte,Certum,IGC_A,Deutsche_Telekom_Root_CA_2,Juur-SK}*.crt +%{__rm} mozilla/{Certum,Deutsche_Telekom_Root_CA_2}*.crt # See TODO -# rm mozilla/RSA_Security_1024_v3.crt +# %{__rm} mozilla/RSA_Security_1024_v3.crt %install rm -rf $RPM_BUILD_ROOT @@ -216,6 +233,23 @@ rm -rf $RPM_BUILD_ROOT%{openssldir} ln -s %{certsdir}/ca-certificates.crt $RPM_BUILD_ROOT/etc/pki/tls/certs/ca-bundle.crt +%if %{with tests} +install -d pld-tests +cd pld-tests + +# check for duplicates (to avoid X509_STORE_add_cert "cert already in hash table" problem) +cat $RPM_BUILD_ROOT%{certsdir}/ca-certificates.crt | awk '/BEGIN/ { i++; } /BEGIN/, /END/ { print > i ".extracted.crt" }' +for cert in *.extracted.crt; do + openssl x509 -in "$cert" -noout -sha1 -fingerprint > "$cert.fingerprint" +done +DUPLICATES=$(sort *.fingerprint | uniq -c | sort -nr | awk ' { if ($1 != 1) { print $0; } } ') +if [ -n "$DUPLICATES" ]; then + echo -e "\n\nFound duplicates for certificates (count, type, fingerprint):\n\n$DUPLICATES\n\nFailing..." + exit 1 +fi +cd .. +%endif + %clean rm -rf $RPM_BUILD_ROOT