# TODO
# - cleanup dead links from /etc/openssl/certs after -update uninstall
+# - https://bugzilla.mozilla.org/show_bug.cgi?id=549701 and
+# http://groups.google.com/group/mozilla.dev.security.policy/browse_thread/thread/b6493a285ba79998#
+# - add certs noted in TODO file
+#
Summary: Common CA Certificates PEM files
Summary(pl.UTF-8): Pliki PEM popularnych certyfikatów CA
Name: ca-certificates
-Version: 20090814
-Release: 6
-License: distributable
+Version: 20120623
+Release: 4
+License: GPL v2 (scripts), MPL v2 (mozilla certs), distributable (other certs)
Group: Libraries
Source0: ftp://ftp.debian.org/debian/pool/main/c/ca-certificates/%{name}_%{version}.tar.gz
-# Source0-md5: 307052c985bec7f9a00eb84293eef779
+# Source0-md5: 5105d4cc086f0d4ecf7bf2e4c4667289
Source1: https://www.verisign.com/support/thawte-roots.zip
-# Source1-md5: 3e50e5facce6b6bfbf68271d066005fa
+# Source1-md5: a3709cc0279ef3fca4f86ea775066b18
Source2: http://www.certum.pl/keys/CA.pem
# Source2-md5: 35610177afc9c64e70f1ce62c1885496
Source3: http://www.certum.pl/keys/level1.pem
# Source17-md5: e25cc655d3ebe920ca9c187e3dde9191
Source18: http://crt.tcs.terena.org/TERENACodeSigningCA.crt
# Source18-md5: 74c9f511ab03a4e6b7462e310abfa89b
+Source19: http://www.sk.ee/upload/files/JUUR-SK.PEM.cer
+# Source19-md5: 805784c06c9eff3771a4b9bd631cd3f5
+Source20: http://www.sk.ee/upload/files/ESTEID-SK.PEM.cer
+# Source20-md5: 387beee5b8539ab7d91628f486295899
+Source21: http://www.sk.ee/upload/files/ESTEID-SK%202007.PEM.cer#/ESTEID-SK_2007.PEM.cer
+# Source21-md5: 2b1a2a77f565d68fdf5f19f6cc3a5600
+Source22: http://www.sk.ee/upload/files/ESTEID-SK%202011.pem.cer#/ESTEID-SK_2011.pem.cer
+# Source22-md5: cfcc1e592cb0ff305158a7e32730546c
Patch0: %{name}-undebianize.patch
Patch1: %{name}-more-certs.patch
Patch2: %{name}-etc-certs.patch
Patch3: %{name}-c_rehash.sh.patch
Patch4: %{name}-endline.patch
-Patch5: %{name}-mozilla.patch
+Patch5: %{name}-DESTDIR.patch
+Patch6: %{name}.d.patch
URL: http://www.cacert.org/
BuildRequires: openssl-tools
BuildRequires: python
BuildRequires: python-modules
+BuildRequires: rpm >= 4.4.9-56
BuildRequires: sed >= 4.0
BuildRequires: unzip
Obsoletes: certificates
BuildRoot: %{tmpdir}/%{name}-%{version}-root-%(id -u -n)
%define certsdir /etc/certs
+%define openssldir /etc/openssl/certs
%description
Common CA Certificates PEM files.
Group: Libraries
Requires: %{name} = %{version}-%{release}
Requires: mktemp
+%if "%{pld_release}" == "ac"
+Requires: openssl-tools >= 0.9.7m-6.3
+%else
Requires: openssl-tools >= 0.9.8i-3
+%endif
%description update
Script and data for updating CA Certificates database.
%patch3 -p1
%patch4 -p1
%patch5 -p1
+%patch6 -p1
+
+%{__sed} -i -e 's,@openssldir@,%{openssldir},' sbin/update-ca-certificates*
%{__unzip} -qq %{SOURCE1} -d thawte
-# resolve file name clash
-mv 'thawte/Thawte Roots/Thawte Extended Validation/thawte Primary Root CA - G1 (EV)/thawte_Primary_Root_CA.pem' \
- 'thawte/Thawte Roots/Thawte Extended Validation/thawte Primary Root CA - G1 (EV)/thawte_Primary_Root_CA_CC.pem'
-find thawte/ -name *.pem | while read f ; do
- ff=$(echo $f | sed -e 's|[ ,]|_|g' -e 's|[()]|=|g')
- cp "$f" "thawte/$(basename "$ff" .pem).crt"
+find thawte/ -name *.pem -o -name *.txt| while read f ; do
+ if (file "$f" | grep -q "PEM"); then
+ ff=$(echo $f | sed -e 's|[ ,]|_|g' -e 's|[()]|=|g')
+ nname=$(basename "$ff" .pem)
+ nname=$(basename "$nname" .txt)
+ nname=$(basename "$nname" _b64)
+ cp -pi "$f" "thawte/${nname}.crt"
+ else
+ echo "Skipping $f, doesn't look like PEM CERT"
+ fi
done
install -d certum
-install %{SOURCE2} certum
-install %{SOURCE3} certum
-install %{SOURCE4} certum
-install %{SOURCE5} certum
-install %{SOURCE6} certum
-install %{SOURCE7} certum
-install %{SOURCE8} certum
-install %{SOURCE9} certum
-install %{SOURCE10} certum
-install %{SOURCE11} certum
-install %{SOURCE12} certum
-install %{SOURCE13} certum
+cp -pi %{SOURCE2} certum
+cp -pi %{SOURCE3} certum
+cp -pi %{SOURCE4} certum
+cp -pi %{SOURCE5} certum
+cp -pi %{SOURCE6} certum
+cp -pi %{SOURCE7} certum
+cp -pi %{SOURCE8} certum
+cp -pi %{SOURCE9} certum
+cp -pi %{SOURCE10} certum
+cp -pi %{SOURCE11} certum
+cp -pi %{SOURCE12} certum
+cp -pi %{SOURCE13} certum
for a in certum/*.pem; do
- mv "$a" "${a%.pem}.crt"
+ mv -i "$a" "${a%.pem}.crt"
+done
+
+# http://www.sk.ee/en/Repository/certs/rootcertificates
+# JUUR-SK, ESTEID-SK and ESTEID-SK 2007, ESTEID-SK 2011
+install -d esteid
+cp -pi %{SOURCE19} esteid
+cp -pi %{SOURCE20} esteid
+cp -pi %{SOURCE21} esteid/ESTEID-SK_2007.crt
+cp -pi %{SOURCE22} esteid/ESTEID-SK_2011.crt
+for a in esteid/*.PEM.cer; do
+ mv -i "$a" "${a%.PEM.cer}.crt"
done
+%build
install -d terena
openssl x509 -inform DER -in %{SOURCE14} -outform PEM -out terena/$(basename %{SOURCE14})
openssl x509 -inform DER -in %{SOURCE15} -outform PEM -out terena/$(basename %{SOURCE15})
openssl x509 -inform DER -in %{SOURCE17} -outform PEM -out terena/$(basename %{SOURCE17})
openssl x509 -inform DER -in %{SOURCE18} -outform PEM -out terena/$(basename %{SOURCE18})
-%build
%{__make}
# We have those and more in specific dirs
-rm mozilla/{Thawte,thawte,Certum,IGC_A,Deutsche_Telekom_Root_CA_2}*.crt
+rm mozilla/{Thawte,thawte,Certum,IGC_A,Deutsche_Telekom_Root_CA_2,Juur-SK}*.crt
+
+# See TODO
+# rm mozilla/RSA_Security_1024_v3.crt
%install
rm -rf $RPM_BUILD_ROOT
-install -d $RPM_BUILD_ROOT{%{_datadir}/%{name},%{_sbindir},%{certsdir}}
-
+install -d $RPM_BUILD_ROOT{%{_datadir}/%{name},%{_sbindir},%{certsdir},%{_sysconfdir}/ca-certificates.d}
%{__make} install \
DESTDIR=$RPM_BUILD_ROOT
find . -name '*.crt' | sort | cut -b3-
) > $RPM_BUILD_ROOT%{_sysconfdir}/ca-certificates.conf
-find $RPM_BUILD_ROOT%{_datadir}/ca-certificates -name '*.crt' | while read cert ; do
- cat "$cert" >> $RPM_BUILD_ROOT%{certsdir}/ca-certificates.crt
- echo >>$RPM_BUILD_ROOT%{certsdir}/ca-certificates.crt
-done
+# build %{certsdir}/ca-certificates.crt
+install -d $RPM_BUILD_ROOT%{openssldir}
+./sbin/update-ca-certificates --destdir $RPM_BUILD_ROOT
+rm -rf $RPM_BUILD_ROOT%{openssldir}
%clean
rm -rf $RPM_BUILD_ROOT
%files
%defattr(644,root,root,755)
+%doc debian/README.Debian debian/changelog
%config(noreplace) %verify(not md5 mtime size) %{certsdir}/ca-certificates.crt
%files update
%defattr(644,root,root,755)
%attr(755,root,root) %{_sbindir}/update-ca-certificates
%config(noreplace) %verify(not md5 mtime size) %{_sysconfdir}/ca-certificates.conf
+%dir %{_sysconfdir}/ca-certificates.d
%{_datadir}/ca-certificates