X-Git-Url: http://git.pld-linux.org/?p=packages%2Fca-certificates.git;a=blobdiff_plain;f=ca-certificates.spec;h=64bf18aeb806208d0ca6001a6272ad0940fbf87d;hp=e0d859abfa9ea28100c5f3e731e97ed9473b0101;hb=4d7c72ae9657fea9c583a90870055ee775385a7c;hpb=4c4c2875c4094a7b9114c922f820da692147c374 diff --git a/ca-certificates.spec b/ca-certificates.spec index e0d859a..64bf18a 100644 --- a/ca-certificates.spec +++ b/ca-certificates.spec @@ -1,14 +1,22 @@ +# TODO +# - cleanup dead links from /etc/openssl/certs after -update uninstall +# - https://bugzilla.mozilla.org/show_bug.cgi?id=549701 and +# http://groups.google.com/group/mozilla.dev.security.policy/browse_thread/thread/b6493a285ba79998# +# - make amsn use system certs +# - make pidgin use system certs +# - swap %{certsdir}/ca-certificates.crt /etc/pki/tls/certs/ca-bundle.crt regards file vs symlink +# Summary: Common CA Certificates PEM files Summary(pl.UTF-8): Pliki PEM popularnych certyfikatów CA Name: ca-certificates -Version: 20080809 -Release: 1 -License: distributable +Version: 20150426 +Release: 2 +License: GPL v2 (scripts), MPL v2 (mozilla certs), distributable (other certs) Group: Libraries -Source0: ftp://ftp.debian.org/debian/pool/main/c/ca-certificates/%{name}_%{version}.tar.gz -# Source0-md5: c155f5059006b94ad0aea7018161ab37 -Source1: https://www.verisign.com/support/thawte-roots.zip -# Source1-md5: a3709cc0279ef3fca4f86ea775066b18 +Source0: ftp://ftp.debian.org/debian/pool/main/c/ca-certificates/%{name}_%{version}.tar.xz +# Source0-md5: 717455f13fb31fd014a11a468ea3895d +Source1: https://www.verisign.com/support/thawte-roots.zip +# Source1-md5: 21a284ebdc6e8f4178d5cc10fb9e1ef2 Source2: http://www.certum.pl/keys/CA.pem # Source2-md5: 35610177afc9c64e70f1ce62c1885496 Source3: http://www.certum.pl/keys/level1.pem @@ -33,83 +41,218 @@ Source12: http://www.certum.pl/keys/class3.pem # Source12-md5: 07bc97e21da092ba53535c7379e1b58b Source13: http://www.certum.pl/keys/class4.pem # Source13-md5: 99ef61d509539af89f1c025b67245965 +Source14: http://www.certum.pl/CTNCA.pem +# Source14-md5: 231b5b8bf05c5e93a9b2ebc4186eb6f7 +Source15: http://repository.certum.pl/class1casha2.pem +# Source15-md5: b52dde6e2618a21965afbe6d6676d09f +Source16: http://repository.certum.pl/dvcasha2.pem +# Source16-md5: 88ce64a84375c95ab6f7c8515dd2a117 +Source17: http://repository.certum.pl/ovcasha2.pem +# Source17-md5: 3149c923bd23469d6b14caa6334f8b63 +Source18: http://repository.certum.pl/evcasha2.pem +# Source18-md5: ac54dc6cf3af7e243879b1c8b4aca8a3 +#Source19: http://repository.certum.pl/dvcasha2.pem +## Source19-md5: 88ce64a84375c95ab6f7c8515dd2a117 +Source20: http://repository.certum.pl/gscasha2.pem +# Source20-md5: a29d37f95dafc08cef36015922e3b0d3 +Source21: http://crt.tcs.terena.org/TERENASSLCA.crt +# Source21-md5: f62cd1546a8ef14e31ba1ce8eecd234a +Source22: http://crt.tcs.terena.org/TERENAeScienceSSLCA.crt +# Source22-md5: 5feea35ab01a373f115219706f1f57bd +Source23: http://crt.tcs.terena.org/TERENAPersonalCA.crt +# Source23-md5: 53eaa497c8fb0b79f14fe9f69693689a +Source24: http://crt.tcs.terena.org/TERENAeSciencePersonalCA.crt +# Source24-md5: e25cc655d3ebe920ca9c187e3dde9191 +Source25: http://crt.tcs.terena.org/TERENACodeSigningCA.crt +# Source25-md5: 74c9f511ab03a4e6b7462e310abfa89b +Source26: http://www.sk.ee/upload/files/JUUR-SK.PEM.cer +# Source26-md5: 805784c06c9eff3771a4b9bd631cd3f5 +Source27: http://www.sk.ee/upload/files/ESTEID-SK.PEM.cer +# Source27-md5: 387beee5b8539ab7d91628f486295899 +Source28: http://www.sk.ee/upload/files/ESTEID-SK%202007.PEM.cer?/ESTEID-SK_2007.PEM.cer +# Source28-md5: 2b1a2a77f565d68fdf5f19f6cc3a5600 +Source29: http://www.sk.ee/upload/files/ESTEID-SK%202011.pem.cer?/ESTEID-SK_2011.pem.cer +# Source29-md5: cfcc1e592cb0ff305158a7e32730546c +Source30: http://www.terena.org/activities/tcs/repository/sha2/TERENA_SSL_CA_2.pem +# Source30-md5: 96700974350cecfcfbd904d52c3a3942 +Source31: http://www.terena.org/activities/tcs/repository/sha2/TERENA_Personal_CA_2.pem +# Source31-md5: d40e5c821f8559faf5bcd55eac5e1371 +Source32: http://www.terena.org/activities/tcs/repository/sha2/TERENA_Code_Signing_CA_2.pem +# Source32-md5: 69ff653e730adf87ff59bf373950b357 +Source33: http://www.terena.org/activities/tcs/repository-g3/TERENA_SSL_CA_3.pem +# Source33-md5: b22ed904900ed6b3bc129f9a35ba5a66 +Source34: http://www.terena.org/activities/tcs/repository-g3/TERENA_Personal_CA_3.pem +# Source34-md5: eb5ddefe94750c2f8d4f11cb1f3af911 +Source35: http://www.terena.org/activities/tcs/repository-g3/TERENA_Code_Signing_CA_3.pem +# Source35-md5: 43375a208fba0a5e73f1912faa4db86d +Source36: http://www.terena.org/activities/tcs/repository-g3/TERENA_SSL_High_Assurance_CA_3.pem +# Source36-md5: 6e00d9ede4460e739eb285ea023299f0 Patch0: %{name}-undebianize.patch Patch1: %{name}-more-certs.patch Patch2: %{name}-etc-certs.patch -URL: http://www.cacert.org/ -BuildRequires: ruby +Patch3: %{name}-c_rehash.sh.patch +Patch5: %{name}-DESTDIR.patch +Patch6: %{name}.d.patch +URL: https://packages.debian.org/sid/ca-certificates +BuildRequires: openssl-tools +BuildRequires: python +BuildRequires: python-modules +BuildRequires: rpm >= 4.4.9-56 +BuildRequires: sed >= 4.0 +BuildRequires: tar >= 1:1.22 BuildRequires: unzip -Requires: mktemp -Requires: openssl >= 0.9.8i-2 -Requires: openssl-tools-perl >= 0.9.8i-2 -Requires: rpm-whiteout >= 1.7 +BuildRequires: xz Obsoletes: certificates BuildArch: noarch BuildRoot: %{tmpdir}/%{name}-%{version}-root-%(id -u -n) +%define certsdir /etc/certs +%define openssldir /etc/openssl/certs + %description Common CA Certificates PEM files. %description -l pl.UTF-8 Pliki PEM popularnych certyfikatów CA. +%package update +Summary: Script for updating CA Certificates database +Summary(pl.UTF-8): Skrypt do odświeżania bazy certyfikatów CA +Group: Libraries +Requires: %{name} = %{version}-%{release} +Requires: mktemp +%if "%{pld_release}" == "ac" +Requires: openssl-tools >= 0.9.7m-6.3 +%else +Requires: openssl-tools >= 0.9.8i-3 +%endif + +%description update +Script and data for updating CA Certificates database. + +%description update -l pl.UTF-8 +Skrypt i dane do odświeżania bazy certyfikatów CA. + %prep -%setup -q -n %{name} +%setup -q %patch0 -p1 %patch1 -p1 %patch2 -p1 +%patch3 -p1 +%patch5 -p1 +%patch6 -p1 + +%{__sed} -i -e 's,@openssldir@,%{openssldir},' sbin/update-ca-certificates* -unzip %{SOURCE1} '*_b64.txt' -d thawte/ -for I in thawte/{,*/}*.txt; do - mv "$I" "`echo $I | sed -e 's|_b64.txt|.crt|' -e 's|/.*/|/|'`" +%{__unzip} -qq %{SOURCE1} -d thawte + +find thawte/ -name *.pem -o -name *.txt| while read f ; do + if (file "$f" | grep -q "PEM"); then + ff=$(echo $f | sed -e 's|[ ,]|_|g' -e 's|[()]|=|g') + nname=$(basename "$ff" .pem) + nname=$(basename "$nname" .txt) + nname=$(basename "$nname" _b64) + cp -pi "$f" "thawte/${nname}.crt" + else + echo "Skipping $f, doesn't look like PEM CERT" + fi done install -d certum -install %{SOURCE2} certum -install %{SOURCE3} certum -install %{SOURCE4} certum -install %{SOURCE5} certum -install %{SOURCE6} certum -install %{SOURCE7} certum -install %{SOURCE8} certum -install %{SOURCE9} certum -install %{SOURCE10} certum -install %{SOURCE11} certum -install %{SOURCE12} certum -install %{SOURCE13} certum -for I in certum/*.pem; do - mv "$I" "`echo $I | sed -e 's|pem|crt|'`" +cp -pi %{SOURCE2} certum +cp -pi %{SOURCE3} certum +cp -pi %{SOURCE4} certum +cp -pi %{SOURCE5} certum +cp -pi %{SOURCE6} certum +cp -pi %{SOURCE7} certum +cp -pi %{SOURCE8} certum +cp -pi %{SOURCE9} certum +cp -pi %{SOURCE10} certum +cp -pi %{SOURCE11} certum +cp -pi %{SOURCE12} certum +cp -pi %{SOURCE13} certum +cp -pi %{SOURCE14} certum +cp -pi %{SOURCE15} certum +cp -pi %{SOURCE16} certum +cp -pi %{SOURCE17} certum +cp -pi %{SOURCE18} certum +#cp -pi %{SOURCE19} certum +cp -pi %{SOURCE20} certum +for a in certum/*.pem; do + mv -i "$a" "${a%.pem}.crt" +done + +# http://www.sk.ee/en/Repository/certs/rootcertificates +# JUUR-SK, ESTEID-SK and ESTEID-SK 2007, ESTEID-SK 2011 +install -d esteid +cp -pi %{SOURCE26} esteid +cp -pi %{SOURCE27} esteid +cp -pi %{SOURCE28} esteid/ESTEID-SK_2007.crt +cp -pi %{SOURCE29} esteid/ESTEID-SK_2011.crt +for a in esteid/*.PEM.cer; do + mv -i "$a" "${a%.PEM.cer}.crt" done %build +install -d terena +openssl x509 -inform DER -in %{SOURCE21} -outform PEM -out terena/$(basename %{SOURCE21}) +openssl x509 -inform DER -in %{SOURCE22} -outform PEM -out terena/$(basename %{SOURCE22}) +openssl x509 -inform DER -in %{SOURCE23} -outform PEM -out terena/$(basename %{SOURCE23}) +openssl x509 -inform DER -in %{SOURCE24} -outform PEM -out terena/$(basename %{SOURCE24}) +openssl x509 -inform DER -in %{SOURCE25} -outform PEM -out terena/$(basename %{SOURCE25}) +cp %{SOURCE30} terena/$(basename %{SOURCE30} .pem).crt +cp %{SOURCE31} terena/$(basename %{SOURCE31} .pem).crt +cp %{SOURCE32} terena/$(basename %{SOURCE32} .pem).crt +sed 's/\r//' %{SOURCE33} > terena/$(basename %{SOURCE33} .pem).crt +sed 's/\r//' %{SOURCE34} > terena/$(basename %{SOURCE34} .pem).crt +sed 's/\r//' %{SOURCE35} > terena/$(basename %{SOURCE35} .pem).crt +sed 's/\r//' %{SOURCE36} > terena/$(basename %{SOURCE36} .pem).crt + %{__make} # We have those and more in specific dirs -rm mozilla/{Thawte,thawte,Certum}*.crt +rm mozilla/{thawte,Certum,IGC_A,Deutsche_Telekom_Root_CA_2,Juur-SK}*.crt + +# See TODO +# rm mozilla/RSA_Security_1024_v3.crt %install rm -rf $RPM_BUILD_ROOT -install -d $RPM_BUILD_ROOT{%{_datadir}/%{name},%{_sbindir},/etc/openssl} - +install -d $RPM_BUILD_ROOT{%{_datadir}/%{name},%{_sbindir},%{certsdir},/etc/pki/tls/certs,%{_sysconfdir}/ca-certificates.d} %{__make} install \ DESTDIR=$RPM_BUILD_ROOT +find $RPM_BUILD_ROOT%{_datadir}/ca-certificates -name '*.crt' -exec sed -i -e 's/\r$//' {} \; + ( cd $RPM_BUILD_ROOT%{_datadir}/ca-certificates find . -name '*.crt' | sort | cut -b3- ) > $RPM_BUILD_ROOT%{_sysconfdir}/ca-certificates.conf -touch $RPM_BUILD_ROOT/etc/openssl/ca-certificates.crt +# build %{certsdir}/ca-certificates.crt +install -d $RPM_BUILD_ROOT%{openssldir} +./sbin/update-ca-certificates --destdir $RPM_BUILD_ROOT +rm -rf $RPM_BUILD_ROOT%{openssldir} + +ln -s %{certsdir}/ca-certificates.crt $RPM_BUILD_ROOT/etc/pki/tls/certs/ca-bundle.crt %clean rm -rf $RPM_BUILD_ROOT -%post -%{_sbindir}/update-ca-certificates || : +%post update +%{_sbindir}/update-ca-certificates --fresh || : %files %defattr(644,root,root,755) -%config(noreplace) %verify(not md5 mtime size) /etc/openssl/ca-certificates.crt -%config(noreplace) %verify(not md5 mtime size) %{_sysconfdir}/ca-certificates.conf +%doc debian/README.Debian debian/changelog +%dir /etc/pki/tls +%dir /etc/pki/tls/certs +%config(noreplace) %verify(not md5 mtime size) /etc/pki/tls/certs/ca-bundle.crt +%config(noreplace) %verify(not md5 mtime size) %{certsdir}/ca-certificates.crt + +%files update +%defattr(644,root,root,755) %attr(755,root,root) %{_sbindir}/update-ca-certificates +%config(noreplace) %verify(not md5 mtime size) %{_sysconfdir}/ca-certificates.conf +%dir %{_sysconfdir}/ca-certificates.d %{_datadir}/ca-certificates