X-Git-Url: http://git.pld-linux.org/?a=blobdiff_plain;f=ca-certificates.spec;h=2acda34341ef80aa799217f5a4ce4b1e3f245307;hb=63b09917a97a706619caad739f87b65022752558;hp=84f19e08375a9fd6062ed9e26fd024c7d9c9ea93;hpb=1b451e702038b3a0903011791bee5e561fe193e1;p=packages%2Fca-certificates.git diff --git a/ca-certificates.spec b/ca-certificates.spec index 84f19e0..2acda34 100644 --- a/ca-certificates.spec +++ b/ca-certificates.spec @@ -1,5 +1,4 @@ # TODO -# - cleanup dead links from /etc/openssl/certs after -update uninstall # - https://bugzilla.mozilla.org/show_bug.cgi?id=549701 and # http://groups.google.com/group/mozilla.dev.security.policy/browse_thread/thread/b6493a285ba79998# # - make amsn use system certs @@ -12,13 +11,13 @@ Summary: Common CA Certificates PEM files Summary(pl.UTF-8): Pliki PEM popularnych certyfikatów CA Name: ca-certificates -%define ver_date 20161130 -Version: %{ver_date}+nmu1 +%define ver_date 20210119 +Version: %{ver_date} Release: 1 License: GPL v2 (scripts), MPL v2 (mozilla certs), distributable (other certs) Group: Base -Source0: ftp://ftp.debian.org/debian/pool/main/c/ca-certificates/%{name}_%{version}.tar.xz -# Source0-md5: a09e8b63126188fd0ed77f6fbaf5d35f +Source0: http://ftp.debian.org/debian/pool/main/c/ca-certificates/%{name}_%{version}.tar.xz +# Source0-md5: c02582bf9ae338e558617291897615eb Source2: http://www.certum.pl/keys/CA.pem # Source2-md5: 35610177afc9c64e70f1ce62c1885496 Source3: http://www.certum.pl/keys/level1.pem @@ -89,16 +88,13 @@ Source35: http://www.terena.org/activities/tcs/repository-g3/TERENA_Code_Signing # Source35-md5: 43375a208fba0a5e73f1912faa4db86d Source36: http://www.terena.org/activities/tcs/repository-g3/TERENA_SSL_High_Assurance_CA_3.pem # Source36-md5: 6e00d9ede4460e739eb285ea023299f0 -Source38: https://letsencrypt.org/certs/letsencryptauthorityx1.pem.txt -# Source38-md5: 7a4c9a537127f609035ad7f4019defdb -Source39: https://letsencrypt.org/certs/letsencryptauthorityx2.pem.txt -# Source39-md5: 27b0b8f7ef14356d8f717bc083c43ef1 Patch0: %{name}-undebianize.patch Patch1: %{name}-more-certs.patch Patch2: %{name}-etc-certs.patch -Patch3: %{name}-c_rehash.sh.patch + Patch5: %{name}-DESTDIR.patch Patch6: %{name}.d.patch +Patch7: no-openssl-rehash.patch URL: https://packages.debian.org/sid/ca-certificates BuildRequires: openssl-tools BuildRequires: python >= 1:2.6 @@ -140,13 +136,15 @@ Script and data for updating CA Certificates database. Skrypt i dane do odświeżania bazy certyfikatów CA. %prep -%setup -q -n %{name}-%{ver_date} +%setup -qc +cd work %patch0 -p1 %patch1 -p1 %patch2 -p1 -%patch3 -p1 + %patch5 -p1 %patch6 -p1 +%patch7 -p1 %{__sed} -i -e 's,@openssldir@,%{openssldir},' sbin/update-ca-certificates* @@ -185,12 +183,8 @@ for a in esteid/*.PEM.cer; do mv -i "$a" "${a%.PEM.cer}.crt" done -# 2eecd52 - add letsencrypt certificates (approved by mozilla) -install -d mozilla -cp -pi %{SOURCE38} mozilla/$(basename %{SOURCE38} .pem.txt).crt -cp -pi %{SOURCE39} mozilla/$(basename %{SOURCE39} .pem.txt).crt - %build +cd work install -d terena openssl x509 -inform DER -in %{SOURCE21} -outform PEM -out terena/$(basename %{SOURCE21}) openssl x509 -inform DER -in %{SOURCE22} -outform PEM -out terena/$(basename %{SOURCE22}) @@ -208,13 +202,14 @@ sed 's/\r//' %{SOURCE36} > terena/$(basename %{SOURCE36} .pem).crt %{__make} # We have those and more in specific dirs -%{__rm} mozilla/{Certum,IGC_A,Deutsche_Telekom_Root_CA_2,Juur-SK}*.crt +%{__rm} mozilla/Certum*.crt # See TODO # %{__rm} mozilla/RSA_Security_1024_v3.crt %install rm -rf $RPM_BUILD_ROOT +cd work install -d $RPM_BUILD_ROOT{%{_datadir}/%{name},%{_sbindir},%{certsdir},/etc/pki/tls/certs,%{_sysconfdir}/ca-certificates.d} %{__make} install \ DESTDIR=$RPM_BUILD_ROOT @@ -238,7 +233,7 @@ install -d pld-tests cd pld-tests # check for duplicates (to avoid X509_STORE_add_cert "cert already in hash table" problem) -cat $RPM_BUILD_ROOT%{certsdir}/ca-certificates.crt | awk '/BEGIN/ { i++; } /BEGIN/, /END/ { print > i ".extracted.crt" }' +cat $RPM_BUILD_ROOT%{certsdir}/ca-certificates.crt | awk '/^-+BEGIN/ { i++; } /^-+BEGIN/, /^-+END/ { print > i ".extracted.crt" }' for cert in *.extracted.crt; do openssl x509 -in "$cert" -noout -sha1 -fingerprint > "$cert.fingerprint" done @@ -250,17 +245,28 @@ fi cd .. %endif +# The Debian path might be hard-coded in some binaries we cannot fix +# like the Steam client +install -d $RPM_BUILD_ROOT/etc/ssl/certs +ln -s %{certsdir}/ca-certificates.crt $RPM_BUILD_ROOT/etc/ssl/certs + %clean rm -rf $RPM_BUILD_ROOT %post update %{_sbindir}/update-ca-certificates --fresh || : +%postun update +/usr/bin/find "%{openssldir}" -xtype l -delete || : + %files %defattr(644,root,root,755) -%doc debian/README.Debian debian/changelog +%doc work/debian/{README.Debian,changelog} %dir /etc/pki/tls %dir /etc/pki/tls/certs +%dir /etc/ssl +%dir /etc/ssl/certs +/etc/ssl/certs/ca-certificates.crt %config(noreplace) %verify(not md5 mtime size) /etc/pki/tls/certs/ca-bundle.crt %config(noreplace) %verify(not md5 mtime size) %{certsdir}/ca-certificates.crt