Blob Blame History Raw
#!/bin/sh

#set -vx
set -eu

# For backwards compatibility reasons, future versions of this script must
# support the syntax "update-ca-trust extract" trigger the generation of output
# files in $DEST.

DEST=/etc/pki/ca-trust/extracted

# Prevent p11-kit from reading user configuration files.
export P11_KIT_NO_USER_CONFIG=1

usage() {
	fold -s -w 76 >&2 <<-EOF
		Usage: $0 [extract] [-o DIR|--output=DIR]

		Update the system trust store in $DEST.

		COMMANDS
		(absent/empty command): Same as the extract command described below.

		extract: Instruct update-ca-trust to scan the source configuration in
		/usr/share/pki/ca-trust-source and /etc/pki/ca-trust/source and produce
		updated versions of the consolidated configuration files stored below
		the $DEST directory hierarchy.

		EXTRACT OPTIONS
		-o DIR, --output=DIR: Write the extracted trust store into the given
		directory instead of updating $DEST.
	EOF
}

extract() {
	USER_DEST=

	if ! TEMP=$(getopt -o "ho:" --long "help,output:" -n "$0" -- "$@"); then
		echo >&2 ""
		usage
		exit 1
	fi
	eval set -- "$TEMP"
	unset TEMP

	while true; do
		case "$1" in
			"-o"|"--output")
				USER_DEST=$2
				shift 2
				continue
			;;
			"--")
				shift
				break
			;;
			*)
				usage
				exit 1
			;;
		esac
	done
	if [ $# -ne 0 ]; then
		echo >&2 "Error: Unexpected positional arguments:" "$@"
		echo >&2
		usage
		exit
	fi

	if [ -n "$USER_DEST" ]; then
		DEST=$USER_DEST
	fi

	# Attempt to create the directories if they do not exist yet (rhbz#2241240)
	mkdir -p \
		"$DEST"/openssl \
		"$DEST"/pem \
		"$DEST"/java \
		"$DEST"/edk2

	# OpenSSL PEM bundle that includes trust flags
	# (BEGIN TRUSTED CERTIFICATE)
	/usr/bin/p11-kit extract --format=openssl-bundle --filter=certificates --overwrite --comment "$DEST/openssl/ca-bundle.trust.crt"
	/usr/bin/p11-kit extract --format=pem-bundle --filter=ca-anchors --overwrite --comment --purpose server-auth "$DEST/pem/tls-ca-bundle.pem"
	/usr/bin/p11-kit extract --format=pem-bundle --filter=ca-anchors --overwrite --comment --purpose email "$DEST/pem/email-ca-bundle.pem"
	/usr/bin/p11-kit extract --format=pem-bundle --filter=ca-anchors --overwrite --comment --purpose code-signing "$DEST/pem/objsign-ca-bundle.pem"
	/usr/bin/p11-kit extract --format=java-cacerts --filter=ca-anchors --overwrite --purpose server-auth "$DEST/java/cacerts"
	/usr/bin/p11-kit extract --format=edk2-cacerts --filter=ca-anchors --overwrite --purpose=server-auth "$DEST/edk2/cacerts.bin"
	# Hashed directory of BEGIN TRUSTED-style certs (usable as OpenSSL CApath and
	# by GnuTLS)
	/usr/bin/p11-kit extract --format=pem-directory-hash --filter=ca-anchors --overwrite --purpose server-auth "$DEST/pem/directory-hash"

	# p11-kit extract will have made this directory unwritable; when run with
	# CAP_DAC_OVERRIDE this does not matter, but in container use cases that may
	# not be the case. See rhbz#2241240.
	chmod u+w "$DEST/pem/directory-hash"

	# Debian compatibility: their /etc/ssl/certs has this bundle
	/usr/bin/ln -s ../tls-ca-bundle.pem "$DEST/pem/directory-hash/ca-certificates.crt"
	# Backwards compatibility: RHEL/Fedora provided a /etc/ssl/certs/ca-bundle.crt
	# since https://bugzilla.redhat.com/show_bug.cgi?id=572725
	/usr/bin/ln -s ../tls-ca-bundle.pem "$DEST/pem/directory-hash/ca-bundle.crt"

	# Remove write permissions again
	chmod u-w "$DEST/pem/directory-hash"
}

if [ "$#" -lt 1 ]; then
	set -- extract
fi
case "$1" in
	"extract")
		shift
		extract "$@"
	;;
	"--"*|"-"*)
		# First parameter seems to be an option, assume the command is 'extract'
		extract "$@"
	;;
	*)
		echo >&2 "Error: Unknown command: $1"
		echo >&2
		usage
		exit 1
	;;
esac