]> git.pld-linux.org Git - packages/ca-certificates.git/blame - ca-certificates.spec
Rel 6; make sure we don't include expired certs
[packages/ca-certificates.git] / ca-certificates.spec
CommitLineData
8b300985 1# TODO
7d6b3825
JR
2# - https://bugzilla.mozilla.org/show_bug.cgi?id=549701 and
3# http://groups.google.com/group/mozilla.dev.security.policy/browse_thread/thread/b6493a285ba79998#
8afb3237
ER
4# - make amsn use system certs
5# - make pidgin use system certs
354e0f44 6# - swap %{certsdir}/ca-certificates.crt /etc/pki/tls/certs/ca-bundle.crt regards file vs symlink
7d6b3825 7#
460ad8a7
JB
8# Conditional build:
9%bcond_without tests # skip duplicates check
9a2204c0 10
8bb152c1 11Summary: Common CA Certificates PEM files
500a6231 12Summary(pl.UTF-8): Pliki PEM popularnych certyfikatów CA
8bb152c1 13Name: ca-certificates
63b09917 14%define ver_date 20210119
2615c0a7 15Version: %{ver_date}
0818a432 16Release: 6
c26c6065 17License: GPL v2 (scripts), MPL v2 (mozilla certs), distributable (other certs)
9a2204c0 18Group: Base
2615c0a7 19Source0: http://ftp.debian.org/debian/pool/main/c/ca-certificates/%{name}_%{version}.tar.xz
63b09917 20# Source0-md5: c02582bf9ae338e558617291897615eb
ed111db5
JR
21Source2: http://www.certum.pl/keys/CA.pem
22# Source2-md5: 35610177afc9c64e70f1ce62c1885496
a4e3ff05
AZ
23Source14: http://www.certum.pl/CTNCA.pem
24# Source14-md5: 231b5b8bf05c5e93a9b2ebc4186eb6f7
25Source15: http://repository.certum.pl/class1casha2.pem
26# Source15-md5: b52dde6e2618a21965afbe6d6676d09f
27Source16: http://repository.certum.pl/dvcasha2.pem
28# Source16-md5: 88ce64a84375c95ab6f7c8515dd2a117
29Source17: http://repository.certum.pl/ovcasha2.pem
30# Source17-md5: 3149c923bd23469d6b14caa6334f8b63
31Source18: http://repository.certum.pl/evcasha2.pem
32# Source18-md5: ac54dc6cf3af7e243879b1c8b4aca8a3
33#Source19: http://repository.certum.pl/dvcasha2.pem
34## Source19-md5: 88ce64a84375c95ab6f7c8515dd2a117
35Source20: http://repository.certum.pl/gscasha2.pem
36# Source20-md5: a29d37f95dafc08cef36015922e3b0d3
a4e3ff05
AZ
37Source23: http://crt.tcs.terena.org/TERENAPersonalCA.crt
38# Source23-md5: 53eaa497c8fb0b79f14fe9f69693689a
39Source24: http://crt.tcs.terena.org/TERENAeSciencePersonalCA.crt
40# Source24-md5: e25cc655d3ebe920ca9c187e3dde9191
a4e3ff05
AZ
41Source29: http://www.sk.ee/upload/files/ESTEID-SK%202011.pem.cer?/ESTEID-SK_2011.pem.cer
42# Source29-md5: cfcc1e592cb0ff305158a7e32730546c
a0243bec
AO
43Source30: http://www.terena.org/activities/tcs/repository/sha2/TERENA_SSL_CA_2.pem
44# Source30-md5: 96700974350cecfcfbd904d52c3a3942
45Source31: http://www.terena.org/activities/tcs/repository/sha2/TERENA_Personal_CA_2.pem
46# Source31-md5: d40e5c821f8559faf5bcd55eac5e1371
47Source32: http://www.terena.org/activities/tcs/repository/sha2/TERENA_Code_Signing_CA_2.pem
48# Source32-md5: 69ff653e730adf87ff59bf373950b357
49Source33: http://www.terena.org/activities/tcs/repository-g3/TERENA_SSL_CA_3.pem
50# Source33-md5: b22ed904900ed6b3bc129f9a35ba5a66
51Source34: http://www.terena.org/activities/tcs/repository-g3/TERENA_Personal_CA_3.pem
52# Source34-md5: eb5ddefe94750c2f8d4f11cb1f3af911
53Source35: http://www.terena.org/activities/tcs/repository-g3/TERENA_Code_Signing_CA_3.pem
54# Source35-md5: 43375a208fba0a5e73f1912faa4db86d
55Source36: http://www.terena.org/activities/tcs/repository-g3/TERENA_SSL_High_Assurance_CA_3.pem
56# Source36-md5: 6e00d9ede4460e739eb285ea023299f0
4619b3d9 57Patch0: %{name}-undebianize.patch
ed111db5 58Patch1: %{name}-more-certs.patch
c7360e68 59Patch2: %{name}-etc-certs.patch
0e9b9979 60
93ad0ea1
JR
61Patch5: %{name}-DESTDIR.patch
62Patch6: %{name}.d.patch
ad8e5716 63Patch7: no-openssl-rehash.patch
4d7c72ae 64URL: https://packages.debian.org/sid/ca-certificates
c3918bf2 65BuildRequires: openssl-tools
d75b32da 66BuildRequires: python >= 1:2.6
65bcbc85 67BuildRequires: python-modules
9af0daca 68BuildRequires: rpm >= 4.4.9-56
55905e01 69BuildRequires: sed >= 4.0
fba66a45 70BuildRequires: tar >= 1:1.22
ed111db5 71BuildRequires: unzip
fba66a45 72BuildRequires: xz
ed111db5 73Obsoletes: certificates
5352fc69 74BuildArch: noarch
8bb152c1
ER
75BuildRoot: %{tmpdir}/%{name}-%{version}-root-%(id -u -n)
76
850133d0 77%define certsdir /etc/certs
94338ec5 78%define openssldir /etc/openssl/certs
850133d0 79
8bb152c1 80%description
500a6231
JB
81Common CA Certificates PEM files.
82
83%description -l pl.UTF-8
84Pliki PEM popularnych certyfikatów CA.
8bb152c1 85
302ace1c
JR
86%package update
87Summary: Script for updating CA Certificates database
88Summary(pl.UTF-8): Skrypt do odświeżania bazy certyfikatów CA
89Group: Libraries
6c894e75 90Requires: %{name} = %{version}-%{release}
74154eae 91Requires: mktemp
9af0daca 92%if "%{pld_release}" == "ac"
9b4bd725 93Requires: openssl-tools >= 0.9.7m-6.3
9af0daca 94%else
c3918bf2 95Requires: openssl-tools >= 0.9.8i-3
9af0daca 96%endif
302ace1c
JR
97
98%description update
99Script and data for updating CA Certificates database.
100
6c894e75 101%description update -l pl.UTF-8
302ace1c
JR
102Skrypt i dane do odświeżania bazy certyfikatów CA.
103
8bb152c1 104%prep
cf6c55ff
JP
105%setup -qc
106cd work
ed111db5
JR
107%patch0 -p1
108%patch1 -p1
c7360e68 109%patch2 -p1
0e9b9979 110
835b9580 111%patch5 -p1
94338ec5 112%patch6 -p1
ad8e5716 113%patch7 -p1
ed111db5 114
9af0daca
ER
115%{__sed} -i -e 's,@openssldir@,%{openssldir},' sbin/update-ca-certificates*
116
ed111db5 117install -d certum
1180a18f 118cp -pi %{SOURCE2} certum
a4e3ff05
AZ
119cp -pi %{SOURCE14} certum
120cp -pi %{SOURCE15} certum
121cp -pi %{SOURCE16} certum
122cp -pi %{SOURCE17} certum
123cp -pi %{SOURCE18} certum
124#cp -pi %{SOURCE19} certum
125cp -pi %{SOURCE20} certum
ebf0e82f 126for a in certum/*.pem; do
ca146b29 127 mv -i "$a" "${a%.pem}.crt"
ed111db5
JR
128done
129
1180a18f 130# http://www.sk.ee/en/Repository/certs/rootcertificates
b9b07ae7 131# ESTEID-SK 2011
2190f9b1 132install -d esteid
a4e3ff05 133cp -pi %{SOURCE29} esteid/ESTEID-SK_2011.crt
2190f9b1 134
ed111db5 135%build
cf6c55ff 136cd work
277121c2 137install -d terena
a4e3ff05
AZ
138openssl x509 -inform DER -in %{SOURCE23} -outform PEM -out terena/$(basename %{SOURCE23})
139openssl x509 -inform DER -in %{SOURCE24} -outform PEM -out terena/$(basename %{SOURCE24})
a0243bec
AO
140cp %{SOURCE30} terena/$(basename %{SOURCE30} .pem).crt
141cp %{SOURCE31} terena/$(basename %{SOURCE31} .pem).crt
142cp %{SOURCE32} terena/$(basename %{SOURCE32} .pem).crt
143sed 's/\r//' %{SOURCE33} > terena/$(basename %{SOURCE33} .pem).crt
144sed 's/\r//' %{SOURCE34} > terena/$(basename %{SOURCE34} .pem).crt
145sed 's/\r//' %{SOURCE35} > terena/$(basename %{SOURCE35} .pem).crt
146sed 's/\r//' %{SOURCE36} > terena/$(basename %{SOURCE36} .pem).crt
277121c2 147
ed111db5
JR
148%{__make}
149
150# We have those and more in specific dirs
cf6c55ff 151%{__rm} mozilla/Certum*.crt
2e4da516 152
0818a432
AM
153make_sure_expired_and_rm() {
154 cert="$1"
155 rm -rf pld-tests
156 install -d pld-tests
157 cat "$cert" | awk '/^-+BEGIN/ { i++; } /^-+BEGIN/, /^-+END/ { print > "pld-tests/" i ".extracted.crt" }'
158 for tmpcert in pld-tests/*.extracted.crt; do
159 # check expiration date
160 EXPDATE=$(openssl x509 -enddate -noout -in "$tmpcert")
161 EXPDATE=${EXPDATE#notAfter=}
162 EXPDATETIMESTAMP=$(date +"%s" -d "$EXPDATE")
163 NOWTIMESTAMP=$(date +"%s")
164 # mksh is 32bit only
165 if /usr/bin/test "$EXPDATETIMESTAMP" -ge "$NOWTIMESTAMP"; then
166 echo "$cert ($tmpcert): not expired! ${EXPDATE}"
167 return 1
168 fi
169 done
170 rm "$cert"
171 return 0
172}
173
174# expired
175make_sure_expired_and_rm mozilla/Sonera_Class_2_Root_CA.crt
176make_sure_expired_and_rm mozilla/DST_Root_CA_X3.crt
177make_sure_expired_and_rm mozilla/QuoVadis_Root_CA.crt
178
7d6b3825 179# See TODO
460ad8a7 180# %{__rm} mozilla/RSA_Security_1024_v3.crt
7d6b3825 181
8bb152c1
ER
182%install
183rm -rf $RPM_BUILD_ROOT
cf6c55ff 184cd work
354e0f44 185install -d $RPM_BUILD_ROOT{%{_datadir}/%{name},%{_sbindir},%{certsdir},/etc/pki/tls/certs,%{_sysconfdir}/ca-certificates.d}
8bb152c1
ER
186%{__make} install \
187 DESTDIR=$RPM_BUILD_ROOT
188
55905e01
JR
189find $RPM_BUILD_ROOT%{_datadir}/ca-certificates -name '*.crt' -exec sed -i -e 's/\r$//' {} \;
190
8bb152c1
ER
191(
192cd $RPM_BUILD_ROOT%{_datadir}/ca-certificates
193find . -name '*.crt' | sort | cut -b3-
194) > $RPM_BUILD_ROOT%{_sysconfdir}/ca-certificates.conf
195
94338ec5
ER
196# build %{certsdir}/ca-certificates.crt
197install -d $RPM_BUILD_ROOT%{openssldir}
198./sbin/update-ca-certificates --destdir $RPM_BUILD_ROOT
199rm -rf $RPM_BUILD_ROOT%{openssldir}
8bb152c1 200
354e0f44
ER
201ln -s %{certsdir}/ca-certificates.crt $RPM_BUILD_ROOT/etc/pki/tls/certs/ca-bundle.crt
202
2e4da516
AM
203%if %{with tests}
204install -d pld-tests
205cd pld-tests
206
207# check for duplicates (to avoid X509_STORE_add_cert "cert already in hash table" problem)
cf6c55ff 208cat $RPM_BUILD_ROOT%{certsdir}/ca-certificates.crt | awk '/^-+BEGIN/ { i++; } /^-+BEGIN/, /^-+END/ { print > i ".extracted.crt" }'
2e4da516
AM
209for cert in *.extracted.crt; do
210 openssl x509 -in "$cert" -noout -sha1 -fingerprint > "$cert.fingerprint"
0818a432
AM
211
212
213 # check expiration date
214 EXPDATE=$(openssl x509 -enddate -noout -in "$cert")
215 EXPDATE=${EXPDATE#notAfter=}
216 EXPDATETIMESTAMP=$(date +"%s" -d "$EXPDATE")
217 NOWTIMESTAMP=$(date +"%s")
218 # mksh is 32bit only
219 if /usr/bin/test "$EXPDATETIMESTAMP" -lt "$NOWTIMESTAMP"; then
220 echo "!!! Expired certificate: $cert"
221 openssl x509 -subject -issuer -startdate -enddate -email -alias -noout -in "$cert"
222 echo "Fingerprint: $(cat "$cert.fingerprint")"
223 echo "\n\n"
224 exit 1
225 fi
2e4da516 226done
0818a432 227
2e4da516
AM
228DUPLICATES=$(sort *.fingerprint | uniq -c | sort -nr | awk ' { if ($1 != 1) { print $0; } } ')
229if [ -n "$DUPLICATES" ]; then
230 echo -e "\n\nFound duplicates for certificates (count, type, fingerprint):\n\n$DUPLICATES\n\nFailing..."
231 exit 1
232fi
233cd ..
234%endif
235
f1df9d48
JK
236# The Debian path might be hard-coded in some binaries we cannot fix
237# like the Steam client
0923a3c6
JK
238install -d $RPM_BUILD_ROOT/etc/ssl/certs
239ln -s %{certsdir}/ca-certificates.crt $RPM_BUILD_ROOT/etc/ssl/certs
f1df9d48 240
8bb152c1
ER
241%clean
242rm -rf $RPM_BUILD_ROOT
243
302ace1c 244%post update
ed9496cb 245%{_sbindir}/update-ca-certificates --fresh || :
8bb152c1 246
6587a0f2
JP
247%postun update
248/usr/bin/find "%{openssldir}" -xtype l -delete || :
249
8acc02c4
JP
250%pretrans
251if [ -L /etc/ssl/certs ]; then
252 rm -f /etc/ssl/certs
253fi
254
8bb152c1
ER
255%files
256%defattr(644,root,root,755)
cf6c55ff 257%doc work/debian/{README.Debian,changelog}
a4417de9 258%dir /etc/pki/tls
354e0f44 259%dir /etc/pki/tls/certs
f1df9d48 260%dir /etc/ssl
0923a3c6
JK
261%dir /etc/ssl/certs
262/etc/ssl/certs/ca-certificates.crt
354e0f44 263%config(noreplace) %verify(not md5 mtime size) /etc/pki/tls/certs/ca-bundle.crt
7bc3bef8 264%verify(not md5 mtime size) %{certsdir}/ca-certificates.crt
302ace1c
JR
265
266%files update
267%defattr(644,root,root,755)
8bb152c1 268%attr(755,root,root) %{_sbindir}/update-ca-certificates
302ace1c 269%config(noreplace) %verify(not md5 mtime size) %{_sysconfdir}/ca-certificates.conf
53d36f70 270%dir %{_sysconfdir}/ca-certificates.d
8bb152c1 271%{_datadir}/ca-certificates
This page took 0.45928 seconds and 4 git commands to generate.