2 # - cleanup dead links from /etc/openssl/certs after -update uninstall
3 # - https://bugzilla.mozilla.org/show_bug.cgi?id=549701 and
4 # http://groups.google.com/group/mozilla.dev.security.policy/browse_thread/thread/b6493a285ba79998#
5 # - make amsn use system certs
6 # - make pidgin use system certs
7 # - swap %{certsdir}/ca-certificates.crt /etc/pki/tls/certs/ca-bundle.crt regards file vs symlink
10 %bcond_without tests # skip duplicates check
12 Summary: Common CA Certificates PEM files
13 Summary(pl.UTF-8): Pliki PEM popularnych certyfikatów CA
17 License: GPL v2 (scripts), MPL v2 (mozilla certs), distributable (other certs)
19 Source0: ftp://ftp.debian.org/debian/pool/main/c/ca-certificates/%{name}_%{version}.tar.xz
20 # Source0-md5: d9665a83d0d3ef8176a38e6aa20458e9
21 Source1: https://www.verisign.com/support/thawte-roots.zip
22 # Source1-md5: 21a284ebdc6e8f4178d5cc10fb9e1ef2
23 Source2: http://www.certum.pl/keys/CA.pem
24 # Source2-md5: 35610177afc9c64e70f1ce62c1885496
25 Source3: http://www.certum.pl/keys/level1.pem
26 # Source3-md5: ba2d2e234ef9cfd2e6e5f810c964862e
27 Source4: http://www.certum.pl/keys/level2.pem
28 # Source4-md5: d06578a04e8cb23071f3870430ea0cf0
29 Source5: http://www.certum.pl/keys/level3.pem
30 # Source5-md5: 47b67c63a52236576fc0d1150327c962
31 Source6: http://www.certum.pl/keys/level4.pem
32 # Source6-md5: f1f8a65d177745311a1e99f029ae5d71
33 Source7: http://www.certum.pl/keys/vs.pem
34 # Source7-md5: 8da19ffc48c5dcc2868b1aa55f1d5983
35 Source8: http://www.certum.pl/keys/na.pem
36 # Source8-md5: ba571cb35e7672ff7ae95132ac1bfec4
37 Source9: http://www.certum.pl/keys/tsa.pem
38 # Source9-md5: 1a7b3faf8ed00f4d80297de74862e102
39 Source10: http://www.certum.pl/keys/class1.pem
40 # Source10-md5: 058436b132ea2df6972821f546104a16
41 Source11: http://www.certum.pl/keys/class2.pem
42 # Source11-md5: 5caf7fe99b1fc6e63c40b3d081711d1b
43 Source12: http://www.certum.pl/keys/class3.pem
44 # Source12-md5: 07bc97e21da092ba53535c7379e1b58b
45 Source13: http://www.certum.pl/keys/class4.pem
46 # Source13-md5: 99ef61d509539af89f1c025b67245965
47 Source14: http://www.certum.pl/CTNCA.pem
48 # Source14-md5: 231b5b8bf05c5e93a9b2ebc4186eb6f7
49 Source15: http://repository.certum.pl/class1casha2.pem
50 # Source15-md5: b52dde6e2618a21965afbe6d6676d09f
51 Source16: http://repository.certum.pl/dvcasha2.pem
52 # Source16-md5: 88ce64a84375c95ab6f7c8515dd2a117
53 Source17: http://repository.certum.pl/ovcasha2.pem
54 # Source17-md5: 3149c923bd23469d6b14caa6334f8b63
55 Source18: http://repository.certum.pl/evcasha2.pem
56 # Source18-md5: ac54dc6cf3af7e243879b1c8b4aca8a3
57 #Source19: http://repository.certum.pl/dvcasha2.pem
58 ## Source19-md5: 88ce64a84375c95ab6f7c8515dd2a117
59 Source20: http://repository.certum.pl/gscasha2.pem
60 # Source20-md5: a29d37f95dafc08cef36015922e3b0d3
61 Source21: http://crt.tcs.terena.org/TERENASSLCA.crt
62 # Source21-md5: f62cd1546a8ef14e31ba1ce8eecd234a
63 Source22: http://crt.tcs.terena.org/TERENAeScienceSSLCA.crt
64 # Source22-md5: 5feea35ab01a373f115219706f1f57bd
65 Source23: http://crt.tcs.terena.org/TERENAPersonalCA.crt
66 # Source23-md5: 53eaa497c8fb0b79f14fe9f69693689a
67 Source24: http://crt.tcs.terena.org/TERENAeSciencePersonalCA.crt
68 # Source24-md5: e25cc655d3ebe920ca9c187e3dde9191
69 Source25: http://crt.tcs.terena.org/TERENACodeSigningCA.crt
70 # Source25-md5: 74c9f511ab03a4e6b7462e310abfa89b
71 Source26: http://www.sk.ee/upload/files/JUUR-SK.PEM.cer
72 # Source26-md5: 805784c06c9eff3771a4b9bd631cd3f5
73 Source27: http://www.sk.ee/upload/files/ESTEID-SK.PEM.cer
74 # Source27-md5: 387beee5b8539ab7d91628f486295899
75 Source28: http://www.sk.ee/upload/files/ESTEID-SK%202007.PEM.cer?/ESTEID-SK_2007.PEM.cer
76 # Source28-md5: 2b1a2a77f565d68fdf5f19f6cc3a5600
77 Source29: http://www.sk.ee/upload/files/ESTEID-SK%202011.pem.cer?/ESTEID-SK_2011.pem.cer
78 # Source29-md5: cfcc1e592cb0ff305158a7e32730546c
79 Source30: http://www.terena.org/activities/tcs/repository/sha2/TERENA_SSL_CA_2.pem
80 # Source30-md5: 96700974350cecfcfbd904d52c3a3942
81 Source31: http://www.terena.org/activities/tcs/repository/sha2/TERENA_Personal_CA_2.pem
82 # Source31-md5: d40e5c821f8559faf5bcd55eac5e1371
83 Source32: http://www.terena.org/activities/tcs/repository/sha2/TERENA_Code_Signing_CA_2.pem
84 # Source32-md5: 69ff653e730adf87ff59bf373950b357
85 Source33: http://www.terena.org/activities/tcs/repository-g3/TERENA_SSL_CA_3.pem
86 # Source33-md5: b22ed904900ed6b3bc129f9a35ba5a66
87 Source34: http://www.terena.org/activities/tcs/repository-g3/TERENA_Personal_CA_3.pem
88 # Source34-md5: eb5ddefe94750c2f8d4f11cb1f3af911
89 Source35: http://www.terena.org/activities/tcs/repository-g3/TERENA_Code_Signing_CA_3.pem
90 # Source35-md5: 43375a208fba0a5e73f1912faa4db86d
91 Source36: http://www.terena.org/activities/tcs/repository-g3/TERENA_SSL_High_Assurance_CA_3.pem
92 # Source36-md5: 6e00d9ede4460e739eb285ea023299f0
93 Source37: https://letsencrypt.org/certs/isrgrootx1.pem.txt
94 # Source37-md5: c73c30ef692eb5be150caad88210e891
95 Source38: https://letsencrypt.org/certs/letsencryptauthorityx1.pem.txt
96 # Source38-md5: 7a4c9a537127f609035ad7f4019defdb
97 Source39: https://letsencrypt.org/certs/letsencryptauthorityx2.pem.txt
98 # Source39-md5: 27b0b8f7ef14356d8f717bc083c43ef1
99 Patch0: %{name}-undebianize.patch
100 Patch1: %{name}-more-certs.patch
101 Patch2: %{name}-etc-certs.patch
102 Patch3: %{name}-c_rehash.sh.patch
103 Patch5: %{name}-DESTDIR.patch
104 Patch6: %{name}.d.patch
105 URL: https://packages.debian.org/sid/ca-certificates
106 BuildRequires: openssl-tools
107 BuildRequires: python >= 1:2.6
108 BuildRequires: python-modules
109 BuildRequires: rpm >= 4.4.9-56
110 BuildRequires: sed >= 4.0
111 BuildRequires: tar >= 1:1.22
114 Obsoletes: certificates
116 BuildRoot: %{tmpdir}/%{name}-%{version}-root-%(id -u -n)
118 %define certsdir /etc/certs
119 %define openssldir /etc/openssl/certs
122 Common CA Certificates PEM files.
124 %description -l pl.UTF-8
125 Pliki PEM popularnych certyfikatów CA.
128 Summary: Script for updating CA Certificates database
129 Summary(pl.UTF-8): Skrypt do odświeżania bazy certyfikatów CA
131 Requires: %{name} = %{version}-%{release}
133 %if "%{pld_release}" == "ac"
134 Requires: openssl-tools >= 0.9.7m-6.3
136 Requires: openssl-tools >= 0.9.8i-3
140 Script and data for updating CA Certificates database.
142 %description update -l pl.UTF-8
143 Skrypt i dane do odświeżania bazy certyfikatów CA.
155 %{__sed} -i -e 's,@openssldir@,%{openssldir},' sbin/update-ca-certificates*
157 %{__unzip} -qq %{SOURCE1} -d thawte
159 find thawte/ -name *.pem -o -name *.txt| while read f ; do
160 if (file "$f" | grep -q "PEM"); then
161 ff=$(echo $f | sed -e 's|[ ,]|_|g' -e 's|[()]|=|g')
162 nname=$(basename "$ff" .pem)
163 nname=$(basename "$nname" .txt)
164 nname=$(basename "$nname" _b64)
165 cp -pi "$f" "thawte/${nname}.crt"
167 echo "Skipping $f, doesn't look like PEM CERT"
172 cp -pi %{SOURCE2} certum
173 cp -pi %{SOURCE3} certum
174 cp -pi %{SOURCE4} certum
175 cp -pi %{SOURCE5} certum
176 cp -pi %{SOURCE6} certum
177 cp -pi %{SOURCE7} certum
178 cp -pi %{SOURCE8} certum
179 cp -pi %{SOURCE9} certum
180 cp -pi %{SOURCE10} certum
181 cp -pi %{SOURCE11} certum
182 cp -pi %{SOURCE12} certum
183 cp -pi %{SOURCE13} certum
184 cp -pi %{SOURCE14} certum
185 cp -pi %{SOURCE15} certum
186 cp -pi %{SOURCE16} certum
187 cp -pi %{SOURCE17} certum
188 cp -pi %{SOURCE18} certum
189 #cp -pi %{SOURCE19} certum
190 cp -pi %{SOURCE20} certum
191 for a in certum/*.pem; do
192 mv -i "$a" "${a%.pem}.crt"
195 # http://www.sk.ee/en/Repository/certs/rootcertificates
196 # JUUR-SK, ESTEID-SK and ESTEID-SK 2007, ESTEID-SK 2011
198 cp -pi %{SOURCE26} esteid
199 cp -pi %{SOURCE27} esteid
200 cp -pi %{SOURCE28} esteid/ESTEID-SK_2007.crt
201 cp -pi %{SOURCE29} esteid/ESTEID-SK_2011.crt
202 for a in esteid/*.PEM.cer; do
203 mv -i "$a" "${a%.PEM.cer}.crt"
206 # 2eecd52 - add letsencrypt certificates (approved by mozilla) <Arkadiusz Miśkiewicz>
207 # https://bugzilla.mozilla.org/show_bug.cgi?id=1204656
209 cp -pi %{SOURCE37} mozilla/$(basename %{SOURCE37} .pem.txt).crt
210 cp -pi %{SOURCE38} mozilla/$(basename %{SOURCE38} .pem.txt).crt
211 cp -pi %{SOURCE39} mozilla/$(basename %{SOURCE39} .pem.txt).crt
215 openssl x509 -inform DER -in %{SOURCE21} -outform PEM -out terena/$(basename %{SOURCE21})
216 openssl x509 -inform DER -in %{SOURCE22} -outform PEM -out terena/$(basename %{SOURCE22})
217 openssl x509 -inform DER -in %{SOURCE23} -outform PEM -out terena/$(basename %{SOURCE23})
218 openssl x509 -inform DER -in %{SOURCE24} -outform PEM -out terena/$(basename %{SOURCE24})
219 openssl x509 -inform DER -in %{SOURCE25} -outform PEM -out terena/$(basename %{SOURCE25})
220 cp %{SOURCE30} terena/$(basename %{SOURCE30} .pem).crt
221 cp %{SOURCE31} terena/$(basename %{SOURCE31} .pem).crt
222 cp %{SOURCE32} terena/$(basename %{SOURCE32} .pem).crt
223 sed 's/\r//' %{SOURCE33} > terena/$(basename %{SOURCE33} .pem).crt
224 sed 's/\r//' %{SOURCE34} > terena/$(basename %{SOURCE34} .pem).crt
225 sed 's/\r//' %{SOURCE35} > terena/$(basename %{SOURCE35} .pem).crt
226 sed 's/\r//' %{SOURCE36} > terena/$(basename %{SOURCE36} .pem).crt
230 # We have those and more in specific dirs
231 %{__rm} mozilla/{thawte,Certum,IGC_A,Deutsche_Telekom_Root_CA_2,Juur-SK}*.crt
233 # Duplicate with Verisign_Class_3_Public_Primary_Certification_Authority_2.crt
234 %{__rm} thawte/Class_3_Public_Primary_Certification_Authority.crt
237 # %{__rm} mozilla/RSA_Security_1024_v3.crt
240 rm -rf $RPM_BUILD_ROOT
241 install -d $RPM_BUILD_ROOT{%{_datadir}/%{name},%{_sbindir},%{certsdir},/etc/pki/tls/certs,%{_sysconfdir}/ca-certificates.d}
243 DESTDIR=$RPM_BUILD_ROOT
245 find $RPM_BUILD_ROOT%{_datadir}/ca-certificates -name '*.crt' -exec sed -i -e 's/\r$//' {} \;
248 cd $RPM_BUILD_ROOT%{_datadir}/ca-certificates
249 find . -name '*.crt' | sort | cut -b3-
250 ) > $RPM_BUILD_ROOT%{_sysconfdir}/ca-certificates.conf
252 # build %{certsdir}/ca-certificates.crt
253 install -d $RPM_BUILD_ROOT%{openssldir}
254 ./sbin/update-ca-certificates --destdir $RPM_BUILD_ROOT
255 rm -rf $RPM_BUILD_ROOT%{openssldir}
257 ln -s %{certsdir}/ca-certificates.crt $RPM_BUILD_ROOT/etc/pki/tls/certs/ca-bundle.crt
263 # check for duplicates (to avoid X509_STORE_add_cert "cert already in hash table" problem)
264 cat $RPM_BUILD_ROOT/%{certsdir}/ca-certificates.crt | awk '/BEGIN/ { i++; } /BEGIN/, /END/ { print > i ".extracted.crt" }'
265 for cert in *.extracted.crt; do
266 openssl x509 -in "$cert" -noout -sha1 -fingerprint > "$cert.fingerprint"
268 DUPLICATES=$(sort *.fingerprint | uniq -c | sort -nr | awk ' { if ($1 != 1) { print $0; } } ')
269 if [ -n "$DUPLICATES" ]; then
270 echo -e "\n\nFound duplicates for certificates (count, type, fingerprint):\n\n$DUPLICATES\n\nFailing..."
277 rm -rf $RPM_BUILD_ROOT
280 %{_sbindir}/update-ca-certificates --fresh || :
283 %defattr(644,root,root,755)
284 %doc debian/README.Debian debian/changelog
286 %dir /etc/pki/tls/certs
287 %config(noreplace) %verify(not md5 mtime size) /etc/pki/tls/certs/ca-bundle.crt
288 %config(noreplace) %verify(not md5 mtime size) %{certsdir}/ca-certificates.crt
291 %defattr(644,root,root,755)
292 %attr(755,root,root) %{_sbindir}/update-ca-certificates
293 %config(noreplace) %verify(not md5 mtime size) %{_sysconfdir}/ca-certificates.conf
294 %dir %{_sysconfdir}/ca-certificates.d
295 %{_datadir}/ca-certificates