]> git.pld-linux.org Git - packages/ca-certificates.git/blobdiff - ca-certificates.spec
- versioned Obsoletes
[packages/ca-certificates.git] / ca-certificates.spec
index 2c8572485b89ed454d8bf67b1ea938db7389482d..6c24859dff8c080b8211996dd40003693b05a86a 100644 (file)
@@ -1,5 +1,4 @@
 # TODO
-# - cleanup dead links from /etc/openssl/certs after -update uninstall
 # - https://bugzilla.mozilla.org/show_bug.cgi?id=549701 and
 #   http://groups.google.com/group/mozilla.dev.security.policy/browse_thread/thread/b6493a285ba79998#
 # - make amsn use system certs
 Summary:       Common CA Certificates PEM files
 Summary(pl.UTF-8):     Pliki PEM popularnych certyfikatów CA
 Name:          ca-certificates
-Version:       20160104
-Release:       4
+%define        ver_date        20240203
+Version:       %{ver_date}
+Release:       1
 License:       GPL v2 (scripts), MPL v2 (mozilla certs), distributable (other certs)
 Group:         Base
-Source0:       ftp://ftp.debian.org/debian/pool/main/c/ca-certificates/%{name}_%{version}.tar.xz
-# Source0-md5: d9665a83d0d3ef8176a38e6aa20458e9
-
+Source0:       http://ftp.debian.org/debian/pool/main/c/ca-certificates/%{name}_%{version}.tar.xz
+# Source0-md5: 228129ccf8cd99b991d771c44dd4052c
 Source2:       http://www.certum.pl/keys/CA.pem
 # Source2-md5: 35610177afc9c64e70f1ce62c1885496
-Source3:       http://www.certum.pl/keys/level1.pem
-# Source3-md5: ba2d2e234ef9cfd2e6e5f810c964862e
-Source4:       http://www.certum.pl/keys/level2.pem
-# Source4-md5: d06578a04e8cb23071f3870430ea0cf0
-Source5:       http://www.certum.pl/keys/level3.pem
-# Source5-md5: 47b67c63a52236576fc0d1150327c962
-Source6:       http://www.certum.pl/keys/level4.pem
-# Source6-md5: f1f8a65d177745311a1e99f029ae5d71
-Source7:       http://www.certum.pl/keys/vs.pem
-# Source7-md5: 8da19ffc48c5dcc2868b1aa55f1d5983
-Source8:       http://www.certum.pl/keys/na.pem
-# Source8-md5: ba571cb35e7672ff7ae95132ac1bfec4
-Source9:       http://www.certum.pl/keys/tsa.pem
-# Source9-md5: 1a7b3faf8ed00f4d80297de74862e102
-Source10:      http://www.certum.pl/keys/class1.pem
-# Source10-md5:        058436b132ea2df6972821f546104a16
-Source11:      http://www.certum.pl/keys/class2.pem
-# Source11-md5:        5caf7fe99b1fc6e63c40b3d081711d1b
-Source12:      http://www.certum.pl/keys/class3.pem
-# Source12-md5:        07bc97e21da092ba53535c7379e1b58b
-Source13:      http://www.certum.pl/keys/class4.pem
-# Source13-md5:        99ef61d509539af89f1c025b67245965
 Source14:      http://www.certum.pl/CTNCA.pem
 # Source14-md5:        231b5b8bf05c5e93a9b2ebc4186eb6f7
 Source15:      http://repository.certum.pl/class1casha2.pem
@@ -57,22 +34,10 @@ Source18:   http://repository.certum.pl/evcasha2.pem
 ## Source19-md5:       88ce64a84375c95ab6f7c8515dd2a117
 Source20:      http://repository.certum.pl/gscasha2.pem
 # Source20-md5:        a29d37f95dafc08cef36015922e3b0d3
-Source21:      http://crt.tcs.terena.org/TERENASSLCA.crt
-# Source21-md5:        f62cd1546a8ef14e31ba1ce8eecd234a
-Source22:      http://crt.tcs.terena.org/TERENAeScienceSSLCA.crt
-# Source22-md5:        5feea35ab01a373f115219706f1f57bd
 Source23:      http://crt.tcs.terena.org/TERENAPersonalCA.crt
 # Source23-md5:        53eaa497c8fb0b79f14fe9f69693689a
 Source24:      http://crt.tcs.terena.org/TERENAeSciencePersonalCA.crt
 # Source24-md5:        e25cc655d3ebe920ca9c187e3dde9191
-Source25:      http://crt.tcs.terena.org/TERENACodeSigningCA.crt
-# Source25-md5:        74c9f511ab03a4e6b7462e310abfa89b
-Source26:      http://www.sk.ee/upload/files/JUUR-SK.PEM.cer
-# Source26-md5:        805784c06c9eff3771a4b9bd631cd3f5
-Source27:      http://www.sk.ee/upload/files/ESTEID-SK.PEM.cer
-# Source27-md5:        387beee5b8539ab7d91628f486295899
-Source28:      http://www.sk.ee/upload/files/ESTEID-SK%202007.PEM.cer?/ESTEID-SK_2007.PEM.cer
-# Source28-md5:        2b1a2a77f565d68fdf5f19f6cc3a5600
 Source29:      http://www.sk.ee/upload/files/ESTEID-SK%202011.pem.cer?/ESTEID-SK_2011.pem.cer
 # Source29-md5:        cfcc1e592cb0ff305158a7e32730546c
 Source30:      http://www.terena.org/activities/tcs/repository/sha2/TERENA_SSL_CA_2.pem
@@ -89,28 +54,25 @@ Source35:   http://www.terena.org/activities/tcs/repository-g3/TERENA_Code_Signing
 # Source35-md5:        43375a208fba0a5e73f1912faa4db86d
 Source36:      http://www.terena.org/activities/tcs/repository-g3/TERENA_SSL_High_Assurance_CA_3.pem
 # Source36-md5:        6e00d9ede4460e739eb285ea023299f0
-Source37:      https://letsencrypt.org/certs/isrgrootx1.pem.txt
-# Source37-md5:        c73c30ef692eb5be150caad88210e891
-Source38:      https://letsencrypt.org/certs/letsencryptauthorityx1.pem.txt
-# Source38-md5:        7a4c9a537127f609035ad7f4019defdb
-Source39:      https://letsencrypt.org/certs/letsencryptauthorityx2.pem.txt
-# Source39-md5:        27b0b8f7ef14356d8f717bc083c43ef1
 Patch0:                %{name}-undebianize.patch
 Patch1:                %{name}-more-certs.patch
 Patch2:                %{name}-etc-certs.patch
-Patch3:                %{name}-c_rehash.sh.patch
-Patch5:                %{name}-DESTDIR.patch
-Patch6:                %{name}.d.patch
+Patch3:                %{name}-DESTDIR.patch
+Patch4:                %{name}.d.patch
+Patch5:                no-openssl-rehash.patch
+Patch6:                blacklist.patch
 URL:           https://packages.debian.org/sid/ca-certificates
 BuildRequires: openssl-tools
-BuildRequires: python >= 1:2.6
-BuildRequires: python-modules
+BuildRequires: python3
+BuildRequires: python3-cryptography
+BuildRequires: python3-packaging
+BuildRequires: python3-modules
 BuildRequires: rpm >= 4.4.9-56
 BuildRequires: sed >= 4.0
 BuildRequires: tar >= 1:1.22
 BuildRequires: unzip
 BuildRequires: xz
-Obsoletes:     certificates
+Obsoletes:     certificates < 1.2
 BuildArch:     noarch
 BuildRoot:     %{tmpdir}/%{name}-%{version}-root-%(id -u -n)
 
@@ -143,11 +105,12 @@ Skrypt i dane do odświeżania bazy certyfikatów CA.
 
 %prep
 %setup -qc
-mv %{name}/* .
+cd ca-certificates
 %patch0 -p1
 %patch1 -p1
 %patch2 -p1
 %patch3 -p1
+%patch4 -p1
 %patch5 -p1
 %patch6 -p1
 
@@ -155,17 +118,6 @@ mv %{name}/* .
 
 install -d certum
 cp -pi %{SOURCE2} certum
-cp -pi %{SOURCE3} certum
-cp -pi %{SOURCE4} certum
-cp -pi %{SOURCE5} certum
-cp -pi %{SOURCE6} certum
-cp -pi %{SOURCE7} certum
-cp -pi %{SOURCE8} certum
-cp -pi %{SOURCE9} certum
-cp -pi %{SOURCE10} certum
-cp -pi %{SOURCE11} certum
-cp -pi %{SOURCE12} certum
-cp -pi %{SOURCE13} certum
 cp -pi %{SOURCE14} certum
 cp -pi %{SOURCE15} certum
 cp -pi %{SOURCE16} certum
@@ -178,30 +130,15 @@ for a in certum/*.pem; do
 done
 
 # http://www.sk.ee/en/Repository/certs/rootcertificates
-# JUUR-SK, ESTEID-SK and ESTEID-SK 2007, ESTEID-SK 2011
+# ESTEID-SK 2011
 install -d esteid
-cp -pi %{SOURCE26} esteid
-cp -pi %{SOURCE27} esteid
-cp -pi %{SOURCE28} esteid/ESTEID-SK_2007.crt
 cp -pi %{SOURCE29} esteid/ESTEID-SK_2011.crt
-for a in esteid/*.PEM.cer; do
-       mv -i "$a" "${a%.PEM.cer}.crt"
-done
-
-# 2eecd52 - add letsencrypt certificates (approved by mozilla) <Arkadiusz Miśkiewicz>
-# https://bugzilla.mozilla.org/show_bug.cgi?id=1204656
-install -d mozilla
-cp -pi %{SOURCE37} mozilla/$(basename %{SOURCE37} .pem.txt).crt
-cp -pi %{SOURCE38} mozilla/$(basename %{SOURCE38} .pem.txt).crt
-cp -pi %{SOURCE39} mozilla/$(basename %{SOURCE39} .pem.txt).crt
 
 %build
+cd ca-certificates
 install -d terena
-openssl x509 -inform DER -in %{SOURCE21} -outform PEM -out terena/$(basename %{SOURCE21})
-openssl x509 -inform DER -in %{SOURCE22} -outform PEM -out terena/$(basename %{SOURCE22})
 openssl x509 -inform DER -in %{SOURCE23} -outform PEM -out terena/$(basename %{SOURCE23})
 openssl x509 -inform DER -in %{SOURCE24} -outform PEM -out terena/$(basename %{SOURCE24})
-openssl x509 -inform DER -in %{SOURCE25} -outform PEM -out terena/$(basename %{SOURCE25})
 cp %{SOURCE30} terena/$(basename %{SOURCE30} .pem).crt
 cp %{SOURCE31} terena/$(basename %{SOURCE31} .pem).crt
 cp %{SOURCE32} terena/$(basename %{SOURCE32} .pem).crt
@@ -213,13 +150,35 @@ sed 's/\r//' %{SOURCE36} > terena/$(basename %{SOURCE36} .pem).crt
 %{__make}
 
 # We have those and more in specific dirs
-%{__rm} mozilla/{Certum,IGC_A,Deutsche_Telekom_Root_CA_2,Juur-SK}*.crt
+%{__rm} mozilla/Certum*.crt
+
+make_sure_expired_and_rm() {
+       cert="$1"
+       rm -rf pld-tests
+       install -d pld-tests
+       cat "$cert" |  awk '/^-+BEGIN/ { i++; } /^-+BEGIN/, /^-+END/ { print > "pld-tests/" i ".extracted.crt" }'
+       for tmpcert in pld-tests/*.extracted.crt; do
+               # check expiration date
+               EXPDATE=$(openssl x509 -enddate -noout -in "$tmpcert")
+               EXPDATE=${EXPDATE#notAfter=}
+               EXPDATETIMESTAMP=$(date +"%s" -d "$EXPDATE")
+               NOWTIMESTAMP=$(date +"%s")
+               # mksh is 32bit only
+               if /usr/bin/test "$EXPDATETIMESTAMP" -ge "$NOWTIMESTAMP"; then
+                       echo "$cert ($tmpcert): not expired! ${EXPDATE}"
+                       return 1
+               fi
+       done
+       rm "$cert"
+       return 0
+}
 
 # See TODO
 # %{__rm} mozilla/RSA_Security_1024_v3.crt
 
 %install
 rm -rf $RPM_BUILD_ROOT
+cd ca-certificates
 install -d $RPM_BUILD_ROOT{%{_datadir}/%{name},%{_sbindir},%{certsdir},/etc/pki/tls/certs,%{_sysconfdir}/ca-certificates.d}
 %{__make} install \
        DESTDIR=$RPM_BUILD_ROOT
@@ -243,10 +202,26 @@ install -d pld-tests
 cd pld-tests
 
 # check for duplicates (to avoid X509_STORE_add_cert "cert already in hash table" problem)
-cat $RPM_BUILD_ROOT/%{certsdir}/ca-certificates.crt | awk '/BEGIN/ { i++; } /BEGIN/, /END/ { print > i ".extracted.crt" }'
+cat $RPM_BUILD_ROOT%{certsdir}/ca-certificates.crt | awk '/^-+BEGIN/ { i++; } /^-+BEGIN/, /^-+END/ { print > i ".extracted.crt" }'
 for cert in *.extracted.crt; do
        openssl x509 -in "$cert" -noout -sha1 -fingerprint > "$cert.fingerprint"
+
+
+       # check expiration date
+       EXPDATE=$(openssl x509 -enddate -noout -in "$cert")
+       EXPDATE=${EXPDATE#notAfter=}
+       EXPDATETIMESTAMP=$(date +"%s" -d "$EXPDATE")
+       NOWTIMESTAMP=$(date +"%s")
+       # mksh is 32bit only
+       if /usr/bin/test "$EXPDATETIMESTAMP" -lt "$NOWTIMESTAMP"; then
+               echo "!!! Expired certificate: $cert"
+               openssl x509 -subject -issuer -startdate -enddate -email -alias -noout -in "$cert"
+               echo "Fingerprint: $(cat "$cert.fingerprint")"
+               echo "\n\n"
+               exit 1
+       fi
 done
+
 DUPLICATES=$(sort *.fingerprint | uniq -c | sort -nr | awk ' { if ($1 != 1) { print $0; } } ')
 if [ -n "$DUPLICATES" ]; then
        echo -e "\n\nFound duplicates for certificates (count, type, fingerprint):\n\n$DUPLICATES\n\nFailing..."
@@ -255,19 +230,36 @@ fi
 cd ..
 %endif
 
+# The Debian path might be hard-coded in some binaries we cannot fix
+# like the Steam client
+install -d $RPM_BUILD_ROOT/etc/ssl/certs
+ln -s %{certsdir}/ca-certificates.crt $RPM_BUILD_ROOT/etc/ssl/certs
+
 %clean
 rm -rf $RPM_BUILD_ROOT
 
 %post update
 %{_sbindir}/update-ca-certificates --fresh || :
 
+%postun update
+/usr/bin/find "%{openssldir}" -xtype l -delete || :
+
+%pretrans -p <lua>
+local mode = posix.stat("/etc/ssl/certs")
+if mode and mode["type"] == "link" then
+       posix.unlink("/etc/ssl/certs")
+end
+
 %files
 %defattr(644,root,root,755)
-%doc debian/README.Debian debian/changelog
+%doc ca-certificates/debian/{README.Debian,changelog}
 %dir /etc/pki/tls
 %dir /etc/pki/tls/certs
+%dir /etc/ssl
+%dir /etc/ssl/certs
+/etc/ssl/certs/ca-certificates.crt
 %config(noreplace) %verify(not md5 mtime size) /etc/pki/tls/certs/ca-bundle.crt
-%config(noreplace) %verify(not md5 mtime size) %{certsdir}/ca-certificates.crt
+%verify(not md5 mtime size) %{certsdir}/ca-certificates.crt
 
 %files update
 %defattr(644,root,root,755)
This page took 0.278099 seconds and 4 git commands to generate.