# TODO
-# - cleanup dead links from /etc/openssl/certs after -update uninstall
# - https://bugzilla.mozilla.org/show_bug.cgi?id=549701 and
# http://groups.google.com/group/mozilla.dev.security.policy/browse_thread/thread/b6493a285ba79998#
# - make amsn use system certs
Summary: Common CA Certificates PEM files
Summary(pl.UTF-8): Pliki PEM popularnych certyfikatów CA
Name: ca-certificates
-%define ver_date 20161130
-Version: %{ver_date}+nmu1
+%define ver_date 20210119
+Version: %{ver_date}
Release: 1
License: GPL v2 (scripts), MPL v2 (mozilla certs), distributable (other certs)
Group: Base
-Source0: ftp://ftp.debian.org/debian/pool/main/c/ca-certificates/%{name}_%{version}.tar.xz
-# Source0-md5: a09e8b63126188fd0ed77f6fbaf5d35f
+Source0: http://ftp.debian.org/debian/pool/main/c/ca-certificates/%{name}_%{version}.tar.xz
+# Source0-md5: c02582bf9ae338e558617291897615eb
Source2: http://www.certum.pl/keys/CA.pem
# Source2-md5: 35610177afc9c64e70f1ce62c1885496
Source3: http://www.certum.pl/keys/level1.pem
# Source35-md5: 43375a208fba0a5e73f1912faa4db86d
Source36: http://www.terena.org/activities/tcs/repository-g3/TERENA_SSL_High_Assurance_CA_3.pem
# Source36-md5: 6e00d9ede4460e739eb285ea023299f0
-Source38: https://letsencrypt.org/certs/letsencryptauthorityx1.pem.txt
-# Source38-md5: 7a4c9a537127f609035ad7f4019defdb
-Source39: https://letsencrypt.org/certs/letsencryptauthorityx2.pem.txt
-# Source39-md5: 27b0b8f7ef14356d8f717bc083c43ef1
Patch0: %{name}-undebianize.patch
Patch1: %{name}-more-certs.patch
Patch2: %{name}-etc-certs.patch
-Patch3: %{name}-c_rehash.sh.patch
+
Patch5: %{name}-DESTDIR.patch
Patch6: %{name}.d.patch
+Patch7: no-openssl-rehash.patch
URL: https://packages.debian.org/sid/ca-certificates
BuildRequires: openssl-tools
BuildRequires: python >= 1:2.6
Skrypt i dane do odświeżania bazy certyfikatów CA.
%prep
-%setup -q -n %{name}-%{ver_date}
+%setup -qc
+cd work
%patch0 -p1
%patch1 -p1
%patch2 -p1
-%patch3 -p1
+
%patch5 -p1
%patch6 -p1
+%patch7 -p1
%{__sed} -i -e 's,@openssldir@,%{openssldir},' sbin/update-ca-certificates*
mv -i "$a" "${a%.PEM.cer}.crt"
done
-# 2eecd52 - add letsencrypt certificates (approved by mozilla) <Arkadiusz Miśkiewicz>
-install -d mozilla
-cp -pi %{SOURCE38} mozilla/$(basename %{SOURCE38} .pem.txt).crt
-cp -pi %{SOURCE39} mozilla/$(basename %{SOURCE39} .pem.txt).crt
-
%build
+cd work
install -d terena
openssl x509 -inform DER -in %{SOURCE21} -outform PEM -out terena/$(basename %{SOURCE21})
openssl x509 -inform DER -in %{SOURCE22} -outform PEM -out terena/$(basename %{SOURCE22})
%{__make}
# We have those and more in specific dirs
-%{__rm} mozilla/{Certum,IGC_A,Deutsche_Telekom_Root_CA_2,Juur-SK}*.crt
+%{__rm} mozilla/Certum*.crt
# See TODO
# %{__rm} mozilla/RSA_Security_1024_v3.crt
%install
rm -rf $RPM_BUILD_ROOT
+cd work
install -d $RPM_BUILD_ROOT{%{_datadir}/%{name},%{_sbindir},%{certsdir},/etc/pki/tls/certs,%{_sysconfdir}/ca-certificates.d}
%{__make} install \
DESTDIR=$RPM_BUILD_ROOT
cd pld-tests
# check for duplicates (to avoid X509_STORE_add_cert "cert already in hash table" problem)
-cat $RPM_BUILD_ROOT%{certsdir}/ca-certificates.crt | awk '/BEGIN/ { i++; } /BEGIN/, /END/ { print > i ".extracted.crt" }'
+cat $RPM_BUILD_ROOT%{certsdir}/ca-certificates.crt | awk '/^-+BEGIN/ { i++; } /^-+BEGIN/, /^-+END/ { print > i ".extracted.crt" }'
for cert in *.extracted.crt; do
openssl x509 -in "$cert" -noout -sha1 -fingerprint > "$cert.fingerprint"
done
cd ..
%endif
+# The Debian path might be hard-coded in some binaries we cannot fix
+# like the Steam client
+install -d $RPM_BUILD_ROOT/etc/ssl/certs
+ln -s %{certsdir}/ca-certificates.crt $RPM_BUILD_ROOT/etc/ssl/certs
+
%clean
rm -rf $RPM_BUILD_ROOT
%post update
%{_sbindir}/update-ca-certificates --fresh || :
+%postun update
+/usr/bin/find "%{openssldir}" -xtype l -delete || :
+
%files
%defattr(644,root,root,755)
-%doc debian/README.Debian debian/changelog
+%doc work/debian/{README.Debian,changelog}
%dir /etc/pki/tls
%dir /etc/pki/tls/certs
+%dir /etc/ssl
+%dir /etc/ssl/certs
+/etc/ssl/certs/ca-certificates.crt
%config(noreplace) %verify(not md5 mtime size) /etc/pki/tls/certs/ca-bundle.crt
%config(noreplace) %verify(not md5 mtime size) %{certsdir}/ca-certificates.crt