]> git.pld-linux.org Git - packages/ca-certificates.git/blob - ca-certificates.spec
Rel 6; make sure we don't include expired certs
[packages/ca-certificates.git] / ca-certificates.spec
1 # TODO
2 # - https://bugzilla.mozilla.org/show_bug.cgi?id=549701 and
3 #   http://groups.google.com/group/mozilla.dev.security.policy/browse_thread/thread/b6493a285ba79998#
4 # - make amsn use system certs
5 # - make pidgin use system certs
6 # - swap %{certsdir}/ca-certificates.crt /etc/pki/tls/certs/ca-bundle.crt regards file vs symlink
7 #
8 # Conditional build:
9 %bcond_without  tests   # skip duplicates check
10
11 Summary:        Common CA Certificates PEM files
12 Summary(pl.UTF-8):      Pliki PEM popularnych certyfikatów CA
13 Name:           ca-certificates
14 %define ver_date        20210119
15 Version:        %{ver_date}
16 Release:        6
17 License:        GPL v2 (scripts), MPL v2 (mozilla certs), distributable (other certs)
18 Group:          Base
19 Source0:        http://ftp.debian.org/debian/pool/main/c/ca-certificates/%{name}_%{version}.tar.xz
20 # Source0-md5:  c02582bf9ae338e558617291897615eb
21 Source2:        http://www.certum.pl/keys/CA.pem
22 # Source2-md5:  35610177afc9c64e70f1ce62c1885496
23 Source14:       http://www.certum.pl/CTNCA.pem
24 # Source14-md5: 231b5b8bf05c5e93a9b2ebc4186eb6f7
25 Source15:       http://repository.certum.pl/class1casha2.pem
26 # Source15-md5: b52dde6e2618a21965afbe6d6676d09f
27 Source16:       http://repository.certum.pl/dvcasha2.pem
28 # Source16-md5: 88ce64a84375c95ab6f7c8515dd2a117
29 Source17:       http://repository.certum.pl/ovcasha2.pem
30 # Source17-md5: 3149c923bd23469d6b14caa6334f8b63
31 Source18:       http://repository.certum.pl/evcasha2.pem
32 # Source18-md5: ac54dc6cf3af7e243879b1c8b4aca8a3
33 #Source19:      http://repository.certum.pl/dvcasha2.pem
34 ## Source19-md5:        88ce64a84375c95ab6f7c8515dd2a117
35 Source20:       http://repository.certum.pl/gscasha2.pem
36 # Source20-md5: a29d37f95dafc08cef36015922e3b0d3
37 Source23:       http://crt.tcs.terena.org/TERENAPersonalCA.crt
38 # Source23-md5: 53eaa497c8fb0b79f14fe9f69693689a
39 Source24:       http://crt.tcs.terena.org/TERENAeSciencePersonalCA.crt
40 # Source24-md5: e25cc655d3ebe920ca9c187e3dde9191
41 Source29:       http://www.sk.ee/upload/files/ESTEID-SK%202011.pem.cer?/ESTEID-SK_2011.pem.cer
42 # Source29-md5: cfcc1e592cb0ff305158a7e32730546c
43 Source30:       http://www.terena.org/activities/tcs/repository/sha2/TERENA_SSL_CA_2.pem
44 # Source30-md5: 96700974350cecfcfbd904d52c3a3942
45 Source31:       http://www.terena.org/activities/tcs/repository/sha2/TERENA_Personal_CA_2.pem
46 # Source31-md5: d40e5c821f8559faf5bcd55eac5e1371
47 Source32:       http://www.terena.org/activities/tcs/repository/sha2/TERENA_Code_Signing_CA_2.pem
48 # Source32-md5: 69ff653e730adf87ff59bf373950b357
49 Source33:       http://www.terena.org/activities/tcs/repository-g3/TERENA_SSL_CA_3.pem
50 # Source33-md5: b22ed904900ed6b3bc129f9a35ba5a66
51 Source34:       http://www.terena.org/activities/tcs/repository-g3/TERENA_Personal_CA_3.pem
52 # Source34-md5: eb5ddefe94750c2f8d4f11cb1f3af911
53 Source35:       http://www.terena.org/activities/tcs/repository-g3/TERENA_Code_Signing_CA_3.pem
54 # Source35-md5: 43375a208fba0a5e73f1912faa4db86d
55 Source36:       http://www.terena.org/activities/tcs/repository-g3/TERENA_SSL_High_Assurance_CA_3.pem
56 # Source36-md5: 6e00d9ede4460e739eb285ea023299f0
57 Patch0:         %{name}-undebianize.patch
58 Patch1:         %{name}-more-certs.patch
59 Patch2:         %{name}-etc-certs.patch
60
61 Patch5:         %{name}-DESTDIR.patch
62 Patch6:         %{name}.d.patch
63 Patch7:         no-openssl-rehash.patch
64 URL:            https://packages.debian.org/sid/ca-certificates
65 BuildRequires:  openssl-tools
66 BuildRequires:  python >= 1:2.6
67 BuildRequires:  python-modules
68 BuildRequires:  rpm >= 4.4.9-56
69 BuildRequires:  sed >= 4.0
70 BuildRequires:  tar >= 1:1.22
71 BuildRequires:  unzip
72 BuildRequires:  xz
73 Obsoletes:      certificates
74 BuildArch:      noarch
75 BuildRoot:      %{tmpdir}/%{name}-%{version}-root-%(id -u -n)
76
77 %define         certsdir        /etc/certs
78 %define         openssldir      /etc/openssl/certs
79
80 %description
81 Common CA Certificates PEM files.
82
83 %description -l pl.UTF-8
84 Pliki PEM popularnych certyfikatów CA.
85
86 %package update
87 Summary:        Script for updating CA Certificates database
88 Summary(pl.UTF-8):      Skrypt do odświeżania bazy certyfikatów CA
89 Group:          Libraries
90 Requires:       %{name} = %{version}-%{release}
91 Requires:       mktemp
92 %if "%{pld_release}" == "ac"
93 Requires:       openssl-tools >= 0.9.7m-6.3
94 %else
95 Requires:       openssl-tools >= 0.9.8i-3
96 %endif
97
98 %description update
99 Script and data for updating CA Certificates database.
100
101 %description update -l pl.UTF-8
102 Skrypt i dane do odświeżania bazy certyfikatów CA.
103
104 %prep
105 %setup -qc
106 cd work
107 %patch0 -p1
108 %patch1 -p1
109 %patch2 -p1
110
111 %patch5 -p1
112 %patch6 -p1
113 %patch7 -p1
114
115 %{__sed} -i -e 's,@openssldir@,%{openssldir},' sbin/update-ca-certificates*
116
117 install -d certum
118 cp -pi %{SOURCE2} certum
119 cp -pi %{SOURCE14} certum
120 cp -pi %{SOURCE15} certum
121 cp -pi %{SOURCE16} certum
122 cp -pi %{SOURCE17} certum
123 cp -pi %{SOURCE18} certum
124 #cp -pi %{SOURCE19} certum
125 cp -pi %{SOURCE20} certum
126 for a in certum/*.pem; do
127         mv -i "$a" "${a%.pem}.crt"
128 done
129
130 # http://www.sk.ee/en/Repository/certs/rootcertificates
131 # ESTEID-SK 2011
132 install -d esteid
133 cp -pi %{SOURCE29} esteid/ESTEID-SK_2011.crt
134
135 %build
136 cd work
137 install -d terena
138 openssl x509 -inform DER -in %{SOURCE23} -outform PEM -out terena/$(basename %{SOURCE23})
139 openssl x509 -inform DER -in %{SOURCE24} -outform PEM -out terena/$(basename %{SOURCE24})
140 cp %{SOURCE30} terena/$(basename %{SOURCE30} .pem).crt
141 cp %{SOURCE31} terena/$(basename %{SOURCE31} .pem).crt
142 cp %{SOURCE32} terena/$(basename %{SOURCE32} .pem).crt
143 sed 's/\r//' %{SOURCE33} > terena/$(basename %{SOURCE33} .pem).crt
144 sed 's/\r//' %{SOURCE34} > terena/$(basename %{SOURCE34} .pem).crt
145 sed 's/\r//' %{SOURCE35} > terena/$(basename %{SOURCE35} .pem).crt
146 sed 's/\r//' %{SOURCE36} > terena/$(basename %{SOURCE36} .pem).crt
147
148 %{__make}
149
150 # We have those and more in specific dirs
151 %{__rm} mozilla/Certum*.crt
152
153 make_sure_expired_and_rm() {
154         cert="$1"
155         rm -rf pld-tests
156         install -d pld-tests
157         cat "$cert" |  awk '/^-+BEGIN/ { i++; } /^-+BEGIN/, /^-+END/ { print > "pld-tests/" i ".extracted.crt" }'
158         for tmpcert in pld-tests/*.extracted.crt; do
159                 # check expiration date
160                 EXPDATE=$(openssl x509 -enddate -noout -in "$tmpcert")
161                 EXPDATE=${EXPDATE#notAfter=}
162                 EXPDATETIMESTAMP=$(date +"%s" -d "$EXPDATE")
163                 NOWTIMESTAMP=$(date +"%s")
164                 # mksh is 32bit only
165                 if /usr/bin/test "$EXPDATETIMESTAMP" -ge "$NOWTIMESTAMP"; then
166                         echo "$cert ($tmpcert): not expired! ${EXPDATE}"
167                         return 1
168                 fi
169         done
170         rm "$cert"
171         return 0
172 }
173
174 # expired
175 make_sure_expired_and_rm mozilla/Sonera_Class_2_Root_CA.crt
176 make_sure_expired_and_rm mozilla/DST_Root_CA_X3.crt
177 make_sure_expired_and_rm mozilla/QuoVadis_Root_CA.crt
178
179 # See TODO
180 # %{__rm} mozilla/RSA_Security_1024_v3.crt
181
182 %install
183 rm -rf $RPM_BUILD_ROOT
184 cd work
185 install -d $RPM_BUILD_ROOT{%{_datadir}/%{name},%{_sbindir},%{certsdir},/etc/pki/tls/certs,%{_sysconfdir}/ca-certificates.d}
186 %{__make} install \
187         DESTDIR=$RPM_BUILD_ROOT
188
189 find $RPM_BUILD_ROOT%{_datadir}/ca-certificates -name '*.crt' -exec sed -i -e 's/\r$//' {} \;
190
191 (
192 cd $RPM_BUILD_ROOT%{_datadir}/ca-certificates
193 find . -name '*.crt' | sort | cut -b3-
194 ) > $RPM_BUILD_ROOT%{_sysconfdir}/ca-certificates.conf
195
196 # build %{certsdir}/ca-certificates.crt
197 install -d $RPM_BUILD_ROOT%{openssldir}
198 ./sbin/update-ca-certificates --destdir $RPM_BUILD_ROOT
199 rm -rf $RPM_BUILD_ROOT%{openssldir}
200
201 ln -s %{certsdir}/ca-certificates.crt $RPM_BUILD_ROOT/etc/pki/tls/certs/ca-bundle.crt
202
203 %if %{with tests}
204 install -d pld-tests
205 cd pld-tests
206
207 # check for duplicates (to avoid X509_STORE_add_cert "cert already in hash table" problem)
208 cat $RPM_BUILD_ROOT%{certsdir}/ca-certificates.crt | awk '/^-+BEGIN/ { i++; } /^-+BEGIN/, /^-+END/ { print > i ".extracted.crt" }'
209 for cert in *.extracted.crt; do
210         openssl x509 -in "$cert" -noout -sha1 -fingerprint > "$cert.fingerprint"
211
212
213         # check expiration date
214         EXPDATE=$(openssl x509 -enddate -noout -in "$cert")
215         EXPDATE=${EXPDATE#notAfter=}
216         EXPDATETIMESTAMP=$(date +"%s" -d "$EXPDATE")
217         NOWTIMESTAMP=$(date +"%s")
218         # mksh is 32bit only
219         if /usr/bin/test "$EXPDATETIMESTAMP" -lt "$NOWTIMESTAMP"; then
220                 echo "!!! Expired certificate: $cert"
221                 openssl x509 -subject -issuer -startdate -enddate -email -alias -noout -in "$cert"
222                 echo "Fingerprint: $(cat "$cert.fingerprint")"
223                 echo "\n\n"
224                 exit 1
225         fi
226 done
227
228 DUPLICATES=$(sort *.fingerprint | uniq -c | sort -nr | awk ' { if ($1 != 1) { print $0; } } ')
229 if [ -n "$DUPLICATES" ]; then
230         echo -e "\n\nFound duplicates for certificates (count, type, fingerprint):\n\n$DUPLICATES\n\nFailing..."
231         exit 1
232 fi
233 cd ..
234 %endif
235
236 # The Debian path might be hard-coded in some binaries we cannot fix
237 # like the Steam client
238 install -d $RPM_BUILD_ROOT/etc/ssl/certs
239 ln -s %{certsdir}/ca-certificates.crt $RPM_BUILD_ROOT/etc/ssl/certs
240
241 %clean
242 rm -rf $RPM_BUILD_ROOT
243
244 %post update
245 %{_sbindir}/update-ca-certificates --fresh || :
246
247 %postun update
248 /usr/bin/find "%{openssldir}" -xtype l -delete || :
249
250 %pretrans
251 if [ -L /etc/ssl/certs ]; then
252         rm -f /etc/ssl/certs
253 fi
254
255 %files
256 %defattr(644,root,root,755)
257 %doc work/debian/{README.Debian,changelog}
258 %dir /etc/pki/tls
259 %dir /etc/pki/tls/certs
260 %dir /etc/ssl
261 %dir /etc/ssl/certs
262 /etc/ssl/certs/ca-certificates.crt
263 %config(noreplace) %verify(not md5 mtime size) /etc/pki/tls/certs/ca-bundle.crt
264 %verify(not md5 mtime size) %{certsdir}/ca-certificates.crt
265
266 %files update
267 %defattr(644,root,root,755)
268 %attr(755,root,root) %{_sbindir}/update-ca-certificates
269 %config(noreplace) %verify(not md5 mtime size) %{_sysconfdir}/ca-certificates.conf
270 %dir %{_sysconfdir}/ca-certificates.d
271 %{_datadir}/ca-certificates
This page took 0.074383 seconds and 3 git commands to generate.