20240203 (patches unapplied)

Imported using git-ubuntu import.
This commit is contained in:
Julien Cristau 2024-02-04 10:41:43 +01:00 committed by git-ubuntu importer
parent eb333b4167
commit a78c2b0743
Notes: git-ubuntu importer 2024-02-04 16:39:08 +00:00
  [ Jeffrey Walton ]
  * update-ca-certificates man page updates
  * fix shellcheck warnings (closes: #1058658, #981663)
  [ Gioele Barabucci ]
  * Use standard dh sequence (closes: #1050112)
  [ Julien Cristau ]
  * Update Mozilla certificate authority bundle to version 2.64
    The following certificate authorities were added (+):
    + Atos TrustedRoot Root CA ECC TLS 2021
    + Atos TrustedRoot Root CA RSA TLS 2021
    + BJCA Global Root CA1
    + BJCA Global Root CA2
    + CommScope Public Trust ECC Root-01
    + CommScope Public Trust ECC Root-02
    + CommScope Public Trust RSA Root-01
    + CommScope Public Trust RSA Root-02
    + Sectigo Public Server Authentication Root E46
    + Sectigo Public Server Authentication Root R46
    + SSL.com TLS ECC Root CA 2022
    + SSL.com TLS RSA Root CA 2022
    + TrustAsia Global Root CA G3
    + TrustAsia Global Root CA G4
    The following certificate authorities were removed (-):
    - Autoridad de Certificacion Firmaprofesional CIF A62634068
    - E-Tugra Certification Authority (closes: #1032916)
    - E-Tugra Global Root CA ECC v3
    - E-Tugra Global Root CA RSA v3
    - Hongkong Post Root CA 1
    - TrustCor ECA-1
    - TrustCor RootCert CA-1
    - TrustCor RootCert CA-2 (closes: #1023945)
12 changed files with 3084 additions and 2693 deletions

2
debian/ca-certificates.install vendored Normal file
View file

@ -0,0 +1,2 @@
usr/sbin/
usr/share/ca-certificates/

1
debian/ca-certificates.manpages vendored Normal file
View file

@ -0,0 +1 @@
sbin/update-ca-certificates.8

38
debian/changelog vendored
View file

@ -1,3 +1,41 @@
ca-certificates (20240203) unstable; urgency=medium
[ Jeffrey Walton ]
* update-ca-certificates man page updates
* fix shellcheck warnings (closes: #1058658, #981663)
[ Gioele Barabucci ]
* Use standard dh sequence (closes: #1050112)
[ Julien Cristau ]
* Update Mozilla certificate authority bundle to version 2.64
The following certificate authorities were added (+):
+ Atos TrustedRoot Root CA ECC TLS 2021
+ Atos TrustedRoot Root CA RSA TLS 2021
+ BJCA Global Root CA1
+ BJCA Global Root CA2
+ CommScope Public Trust ECC Root-01
+ CommScope Public Trust ECC Root-02
+ CommScope Public Trust RSA Root-01
+ CommScope Public Trust RSA Root-02
+ Sectigo Public Server Authentication Root E46
+ Sectigo Public Server Authentication Root R46
+ SSL.com TLS ECC Root CA 2022
+ SSL.com TLS RSA Root CA 2022
+ TrustAsia Global Root CA G3
+ TrustAsia Global Root CA G4
The following certificate authorities were removed (-):
- Autoridad de Certificacion Firmaprofesional CIF A62634068
- E-Tugra Certification Authority (closes: #1032916)
- E-Tugra Global Root CA ECC v3
- E-Tugra Global Root CA RSA v3
- Hongkong Post Root CA 1
- TrustCor ECA-1
- TrustCor RootCert CA-1
- TrustCor RootCert CA-2 (closes: #1023945)
-- Julien Cristau <jcristau@debian.org> Sun, 04 Feb 2024 10:41:43 +0100
ca-certificates (20230311) unstable; urgency=medium ca-certificates (20230311) unstable; urgency=medium
[ Đoàn Trần Công Danh ] [ Đoàn Trần Công Danh ]

1
debian/clean vendored Normal file
View file

@ -0,0 +1 @@
debian/config.initial_certs

View file

3
debian/control vendored
View file

@ -4,7 +4,8 @@ Priority: optional
Maintainer: Julien Cristau <jcristau@debian.org> Maintainer: Julien Cristau <jcristau@debian.org>
Build-Depends: debhelper-compat (= 13), po-debconf Build-Depends: debhelper-compat (= 13), po-debconf
Build-Depends-Indep: python3, openssl, python3-cryptography Build-Depends-Indep: python3, openssl, python3-cryptography
Standards-Version: 4.5.0.2 Standards-Version: 4.6.2
Rules-Requires-Root: no
Vcs-Git: https://salsa.debian.org/debian/ca-certificates.git Vcs-Git: https://salsa.debian.org/debian/ca-certificates.git
Vcs-Browser: https://salsa.debian.org/debian/ca-certificates Vcs-Browser: https://salsa.debian.org/debian/ca-certificates

78
debian/rules vendored
View file

@ -5,83 +5,21 @@
# Uncomment this to turn on verbose mode. # Uncomment this to turn on verbose mode.
#export DH_VERBOSE=1 #export DH_VERBOSE=1
configure: configure-stamp %:
configure-stamp: dh $@
dh_testdir
# Add here commands to configure the package.
touch configure-stamp
build: build-arch build-indep
build-arch: build-stamp
build-indep: build-stamp
build-stamp: configure-stamp
dh_testdir
# Add here commands to compile the package.
$(MAKE)
touch build-stamp
clean:
dh_testdir
dh_testroot
rm -f build-stamp configure-stamp debian/config
# Add here commands to clean up after the build process.
[ ! -f Makefile ] || $(MAKE) clean
execute_before_dh_clean:
debconf-updatepo debconf-updatepo
dh_clean execute_before_dh_install:
install: build
dh_testdir
dh_testroot
dh_prep
dh_installdirs
# Add here commands to install the package into debian/ca-certificates.
$(MAKE) install DESTDIR=$(CURDIR)/debian/ca-certificates $(MAKE) install DESTDIR=$(CURDIR)/debian/ca-certificates
(cd $(CURDIR)/debian/ca-certificates/usr/share/ca-certificates; \
crts=""; \
for crt in $$(find . -type f -name '*.crt' -print | LC_ALL=C sort); \
do \
crt=$$(echo $$crt | sed -e 's/\.\///'); \
if test "$$crts" = ""; then \
crts="$$crt"; \
else \
crts="$$crts, $$crt"; \
fi; \
done; \
cd $(CURDIR)/debian; \
sed -e "s|#INITIAL_CERTS#|$$crts|" \
config.in > config)
# udeb handling # udeb handling
install -d -m 0755 "$(CURDIR)/debian/ca-certificates-udeb/etc/ssl/certs" install -d -m 0755 "$(CURDIR)/debian/ca-certificates-udeb/etc/ssl/certs"
(cd mozilla; \ (cd mozilla; \
$(MAKE) install CERTSDIR="$(CURDIR)/debian/ca-certificates-udeb/etc/ssl/certs") $(MAKE) install CERTSDIR="$(CURDIR)/debian/ca-certificates-udeb/etc/ssl/certs")
openssl rehash -v "$(CURDIR)/debian/ca-certificates-udeb/etc/ssl/certs" openssl rehash -v "$(CURDIR)/debian/ca-certificates-udeb/etc/ssl/certs"
# Build architecture-independent files here. override_dh_installdebconf:
binary-indep: build install find $(CURDIR)/debian/ca-certificates/usr/share/ca-certificates -type f -name '*.crt' -printf '%P\n' | \
dh_testdir LC_ALL=C sort | sed -e '$$! s/$$/, /' | tr -d '\n' > debian/config.initial_certs
dh_testroot dh_installdebconf -n -DINITIAL_CERTS=@debian/config.initial_certs
dh_link
dh_installdebconf -n
dh_installdocs
dh_installexamples
dh_installman sbin/update-ca-certificates.8
dh_installchangelogs
dh_compress -X examples
dh_fixperms
dh_installdeb
dh_gencontrol
dh_md5sums
dh_builddeb
# Build architecture-dependent files here.
binary-arch: build install
# We have nothing to do by default.
binary: binary-indep binary-arch
.PHONY: build clean binary-indep binary-arch binary install configure

View file

@ -9,6 +9,7 @@ clean:
-rm -f *.crt -rm -f *.crt
install: install:
install -d $(CERTSDIR)
for p in *.crt; do \ for p in *.crt; do \
install -m 644 $$p $(CERTSDIR)/$$p ; \ install -m 644 $$p $(CERTSDIR)/$$p ; \
done done

File diff suppressed because it is too large Load diff

View file

@ -46,8 +46,8 @@
* It's recommend to switch back to 0 after having reached version 98/99. * It's recommend to switch back to 0 after having reached version 98/99.
*/ */
#define NSS_BUILTINS_LIBRARY_VERSION_MAJOR 2 #define NSS_BUILTINS_LIBRARY_VERSION_MAJOR 2
#define NSS_BUILTINS_LIBRARY_VERSION_MINOR 60 #define NSS_BUILTINS_LIBRARY_VERSION_MINOR 64
#define NSS_BUILTINS_LIBRARY_VERSION "2.60" #define NSS_BUILTINS_LIBRARY_VERSION "2.64"
/* These version numbers detail the semantic changes to the ckfw engine. */ /* These version numbers detail the semantic changes to the ckfw engine. */
#define NSS_BUILTINS_HARDWARE_VERSION_MAJOR 1 #define NSS_BUILTINS_HARDWARE_VERSION_MAJOR 1

View file

@ -114,13 +114,13 @@ remove() {
cd "$ETCCERTSDIR" cd "$ETCCERTSDIR"
if [ "$fresh" = 1 ]; then if [ "$fresh" = 1 ]; then
echo "Clearing symlinks in $ETCCERTSDIR..." echo "Clearing symlinks in $ETCCERTSDIR..."
find . -type l -print | while read symlink find . -type l -print | while read -r symlink
do do
case $(readlink "$symlink") in case $(readlink "$symlink") in
$CERTSDIR*|$LOCALCERTSDIR*) rm -f $symlink;; $CERTSDIR*|$LOCALCERTSDIR*) rm -f "$symlink";;
esac esac
done done
find . -type l -print | while read symlink find . -type l -print | while read -r symlink
do do
test -f "$symlink" || rm -f "$symlink" test -f "$symlink" || rm -f "$symlink"
done done
@ -131,7 +131,7 @@ echo "Updating certificates in $ETCCERTSDIR..."
# Add default certificate authorities if requested # Add default certificate authorities if requested
if [ "$default" = 1 ]; then if [ "$default" = 1 ]; then
find -L "$CERTSDIR" -type f -name '*.crt' | sort | while read crt find -L "$CERTSDIR" -type f -name '*.crt' | sort | while read -r crt
do do
add "$crt" add "$crt"
done done
@ -139,12 +139,12 @@ fi
# Handle certificates that should be removed. This is an explicit act # Handle certificates that should be removed. This is an explicit act
# by prefixing lines in the configuration files with exclamation marks (!). # by prefixing lines in the configuration files with exclamation marks (!).
sed -n -e '/^$/d' -e 's/^!//p' "$CERTSCONF" | while read crt sed -n -e '/^$/d' -e 's/^!//p' "$CERTSCONF" | while read -r crt
do do
remove "$CERTSDIR/$crt" remove "$CERTSDIR/$crt"
done done
sed -e '/^$/d' -e '/^#/d' -e '/^!/d' "$CERTSCONF" | while read crt sed -e '/^$/d' -e '/^#/d' -e '/^!/d' "$CERTSCONF" | while read -r crt
do do
if ! test -f "$CERTSDIR/$crt" if ! test -f "$CERTSDIR/$crt"
then then
@ -158,7 +158,7 @@ done
# administrator. # administrator.
if [ -d "$LOCALCERTSDIR" ] if [ -d "$LOCALCERTSDIR" ]
then then
find -L "$LOCALCERTSDIR" -type f -name '*.crt' | sort | while read crt find -L "$LOCALCERTSDIR" -type f -name '*.crt' | sort | while read -r crt
do do
add "$crt" add "$crt"
done done
@ -172,7 +172,7 @@ then
# only run if set of files has changed # only run if set of files has changed
# Remove orphan symlinks found in ETCCERTSDIR to prevent `openssl rehash` # Remove orphan symlinks found in ETCCERTSDIR to prevent `openssl rehash`
# from exiting with an error. See #895482, #895473. # from exiting with an error. See #895482, #895473.
find $ETCCERTSDIR -type l ! -exec test -e {} \; -print | while read orphan find "$ETCCERTSDIR" -type l ! -exec test -e {} \; -print | while read -r orphan
do do
rm -f "$orphan" rm -f "$orphan"
if [ "$verbose" = 1 ]; then if [ "$verbose" = 1 ]; then
@ -204,7 +204,7 @@ then
echo "Running hooks in $HOOKSDIR..." echo "Running hooks in $HOOKSDIR..."
VERBOSE_ARG= VERBOSE_ARG=
[ "$verbose" = 0 ] || VERBOSE_ARG="--verbose" [ "$verbose" = 0 ] || VERBOSE_ARG="--verbose"
eval run-parts "$VERBOSE_ARG" --test -- "$HOOKSDIR" | while read hook eval run-parts "$VERBOSE_ARG" --test -- "$HOOKSDIR" | while read -r hook
do do
( cat "$ADDED" ( cat "$ADDED"
cat "$REMOVED" ) | "$hook" || echo "E: $hook exited with code $?." cat "$REMOVED" ) | "$hook" || echo "E: $hook exited with code $?."

View file

@ -25,19 +25,27 @@ This manual page documents briefly the
.B update-ca-certificates .B update-ca-certificates
command. command.
.PP .PP
\fBupdate-ca-certificates\fP is a program that updates the directory \fBupdate-ca-certificates\fP is a program that manages the collection of
/etc/ssl/certs to hold SSL certificates and generates ca-certificates.crt, TLS certificates for the local machine and generates ca-certificates.crt.
a concatenated single-file list of certificates. ca-certificates.crt is a single-file of concatenated certificates.
The collection of individual certificates is stored at /etc/ssl/certs.
.PP .PP
It reads the file /etc/ca-certificates.conf. Each line gives a pathname of The program reads the configuration file /etc/ca-certificates.conf. Each line
a CA certificate under /usr/share/ca-certificates that should be trusted. gives a pathname of a CA certificate under /usr/share/ca-certificates that
Lines that begin with "#" are comment lines and thus ignored. should be trusted. Lines that begin with "#" are comment lines and thus ignored.
Lines that begin with "!" are deselected, causing the deactivation of the CA Lines that begin with "!" are deselected, causing the deactivation of the CA
certificate in question. Certificates must have a .crt extension in order to certificate in question.
be included by update-ca-certificates.
.PP .PP
Furthermore all certificates with a .crt extension found below Certificates must be in PEM format and have a .crt extension in order to be
/usr/local/share/ca-certificates are also included as implicitly trusted. included by update-ca-certificates. Furthermore, all certificates with a .crt
extension found below /usr/local/share/ca-certificates are also included and
implicitly trusted.
.PP
To add one or more certificates to the machine, copy the certificates in PEM
format with the *.crt extension to /usr/local/share/ca-certificates. There
should be one certificate per file, and not multiple certificates in a single
file. Then run update-ca-certificates to merge the new certificates into the
existing machine store at /etc/ssl/certs.
.PP .PP
Before terminating, \fBupdate-ca-certificates\fP invokes Before terminating, \fBupdate-ca-certificates\fP invokes
\fBrun-parts\fP on /etc/ca-certificates/update.d and calls each hook with \fBrun-parts\fP on /etc/ca-certificates/update.d and calls each hook with
@ -54,20 +62,37 @@ Be verbose. Output \fBopenssl rehash\fP.
.TP .TP
.B \-f, \-\-fresh .B \-f, \-\-fresh
Fresh updates. Remove symlinks in /etc/ssl/certs directory. Fresh updates. Remove symlinks in /etc/ssl/certs directory.
.TP
.B \-\-certsconf
Change the configuration file. By default, the file
/etc/ca-certificates.conf is used.
.TP
.B \-\-certsdir
Change the certificate directory. By default, the directory
/usr/share/ca-certificates is used.
.TP
.B \-\-localcertsdir
Change the local certificate directory. By default, the directory
/usr/local/share/ca-certificates is used.
.TP
.B \-\-etccertsdir
Change the /etc certificate directory. By default, the directory
/etc/ssl/certs is used.
.TP
.SH FILES .SH FILES
.TP .TP
.I /etc/ca-certificates.conf .I /etc/ca-certificates.conf
A configuration file. A configuration file.
.TP .TP
.I /etc/ssl/certs/ca-certificates.crt .I /etc/ssl/certs/ca-certificates.crt
A single-file version of CA certificates. This holds A single-file version of CA certificates. This holds all CA certificates
all CA certificates that you activated in /etc/ca-certificates.conf. that were activated in /etc/ca-certificates.conf.
.TP .TP
.I /usr/share/ca-certificates .I /usr/share/ca-certificates
Directory of CA certificates. Directory of CA certificates provided by the distribution.
.TP .TP
.I /usr/local/share/ca-certificates .I /usr/local/share/ca-certificates
Directory of local CA certificates (with .crt extension). Directory of local CA certificates, with .crt extension, provided by the user.
.SH SEE ALSO .SH SEE ALSO
.BR openssl (1) .BR openssl (1)
.SH AUTHOR .SH AUTHOR