2
# $1 = action ('configure' or 'reconfigure')
3
# $2 = current-installed-version
8
this_version='20040809'
10
if test -f /etc/ca-certificates.conf; then
11
CERTSCONF=/etc/ca-certificates.conf
16
# CERTS_DISABLED: certs that user dont trust
17
CERTS_DISABLED=$(sed -ne 's/^!\(.*\)/\1/p' $CERTSCONF)
19
# CERTS_TRUST: certs that user already trust
20
CERTS_TRUST=$(sed -e '/^#/d' -e '/^!/d' $CERTSCONF)
23
# CERTS_AVAILABLE: certs that user can choices
26
# CERTS_ENABLED: certs that user already trusted
29
# CERTS_LIST: certs that will be installed
30
CERTS_LIST="spi-inc.org/spi-ca.crt, mozilla/ABAecom_=sub.__Am._Bankers_Assn.=_Root_CA.crt, mozilla/AOL_Time_Warner_Root_Certification_Authority_1.crt, mozilla/AOL_Time_Warner_Root_Certification_Authority_2.crt, mozilla/AddTrust_External_Root.crt, mozilla/AddTrust_Low-Value_Services_Root.crt, mozilla/AddTrust_Public_Services_Root.crt, mozilla/AddTrust_Qualified_Certificates_Root.crt, mozilla/America_Online_Root_Certification_Authority_1.crt, mozilla/America_Online_Root_Certification_Authority_2.crt, mozilla/Baltimore_CyberTrust_Root.crt, mozilla/Digital_Signature_Trust_Co._Global_CA_1.crt, mozilla/Digital_Signature_Trust_Co._Global_CA_2.crt, mozilla/Digital_Signature_Trust_Co._Global_CA_3.crt, mozilla/Digital_Signature_Trust_Co._Global_CA_4.crt, mozilla/Entrust.net_Global_Secure_Personal_CA.crt, mozilla/Entrust.net_Global_Secure_Server_CA.crt, mozilla/Entrust.net_Premium_2048_Secure_Server_CA.crt, mozilla/Entrust.net_Secure_Personal_CA.crt, mozilla/Entrust.net_Secure_Server_CA.crt, mozilla/Equifax_Secure_CA.crt, mozilla/Equifax_Secure_Global_eBusiness_CA.crt, mozilla/Equifax_Secure_eBusiness_CA_1.crt, mozilla/Equifax_Secure_eBusiness_CA_2.crt, mozilla/GTE_CyberTrust_Global_Root.crt, mozilla/GTE_CyberTrust_Root_CA.crt, mozilla/GeoTrust_Global_CA.crt, mozilla/GlobalSign_Root_CA.crt, mozilla/RSA_Root_Certificate_1.crt, mozilla/RSA_Security_1024_v3.crt, mozilla/RSA_Security_2048_v3.crt, mozilla/TC_TrustCenter__Germany__Class_2_CA.crt, mozilla/TC_TrustCenter__Germany__Class_3_CA.crt, mozilla/Thawte_Personal_Basic_CA.crt, mozilla/Thawte_Personal_Freemail_CA.crt, mozilla/Thawte_Personal_Premium_CA.crt, mozilla/Thawte_Premium_Server_CA.crt, mozilla/Thawte_Server_CA.crt, mozilla/Thawte_Time_Stamping_CA.crt, mozilla/UTN-USER_First-Network_Applications.crt, mozilla/ValiCert_Class_1_VA.crt, mozilla/ValiCert_Class_2_VA.crt, mozilla/Verisign_Class_1_Public_Primary_Certification_Authority.crt, mozilla/Verisign_Class_1_Public_Primary_Certification_Authority_-_G2.crt, mozilla/Verisign_Class_1_Public_Primary_Certification_Authority_-_G3.crt, mozilla/Verisign_Class_1_Public_Primary_OCSP_Responder.crt, mozilla/Verisign_Class_2_Public_Primary_Certification_Authority.crt, mozilla/Verisign_Class_2_Public_Primary_Certification_Authority_-_G2.crt, mozilla/Verisign_Class_2_Public_Primary_Certification_Authority_-_G3.crt, mozilla/Verisign_Class_2_Public_Primary_OCSP_Responder.crt, mozilla/Verisign_Class_3_Public_Primary_Certification_Authority.crt, mozilla/Verisign_Class_3_Public_Primary_Certification_Authority_-_G2.crt, mozilla/Verisign_Class_3_Public_Primary_Certification_Authority_-_G3.crt, mozilla/Verisign_Class_3_Public_Primary_OCSP_Responder.crt, mozilla/Verisign_Class_4_Public_Primary_Certification_Authority_-_G2.crt, mozilla/Verisign_Class_4_Public_Primary_Certification_Authority_-_G3.crt, mozilla/Verisign_RSA_Secure_Server_CA.crt, mozilla/Verisign_Secure_Server_OCSP_Responder.crt, mozilla/Verisign_Time_Stamping_Authority_CA.crt, mozilla/Visa_International_Global_Root_2.crt, mozilla/Visa_eCommerce_Root.crt, mozilla/beTRUSTed_Root_CA-Baltimore_Implementation.crt, mozilla/beTRUSTed_Root_CA.crt, mozilla/beTRUSTed_Root_CA_-_Entrust_Implementation.crt, mozilla/beTRUSTed_Root_CA_-_RSA_Implementation.crt, brasil.gov.br/brasil.gov.br.crt, signet.pl/signet_ca1_pem.crt, signet.pl/signet_ca2_pem.crt, signet.pl/signet_ca3_pem.crt, signet.pl/signet_ocspklasa2_pem.crt, signet.pl/signet_ocspklasa3_pem.crt, signet.pl/signet_pca2_pem.crt, signet.pl/signet_pca3_pem.crt, signet.pl/signet_rootca_pem.crt, signet.pl/signet_tsa1_pem.crt, quovadis.bm/QuoVadis_Root_Certification_Authority.crt"
32
# CERTS_NEW: new certificates that will be installed
37
echo "$1" | tr ',' '\n' | sed -e 's/^[[:space:]]*//' | while read ca
39
if echo "$2" | grep -q "$ca" > /dev/null 2>&1; then
45
. /usr/share/debconf/confmodule || exit
49
db_title "ca-certificates configuration"
50
db_input medium ca-certificates/trust_new_crts || true
54
if db_get ca-certificates/trust_new_crts; then
59
if db_fget ca-certificates/enable_crts seen; then
62
# XXX: in case reconfigure, force to select all available certificates
63
if test "$action" = "reconfigure" || test "$DEBCONF_RECONFIGURE" = "1"; then
68
if test -d /usr/share/ca-certificates; then
69
cd /usr/share/ca-certificates
70
crts=$( (find . -type f -name '*.crt' -print | sed -e 's/^\.\///'; \
71
echo "$CERTS_LIST" | tr ',' '\n' | sed -e 's/^[[:space:]]*//') | \
75
if test "$CERTS_AVAILABLE" = ""; then
76
CERTS_AVAILABLE="$crt"
78
CERTS_AVAILABLE="$CERTS_AVAILABLE, $crt"
80
if echo "$CERTS_DISABLED" | grep -F -q -x "$crt" > /dev/null 2>&1; then
81
: # echo "I: ignore $crt"
82
elif echo "$CERTS_TRUST" | grep -F -q -x "$crt" > /dev/null 2>&1; then
84
if test "$CERTS_ENABLED" = ""; then
87
CERTS_ENABLED="$CERTS_ENABLED, $crt"
91
if test "$trust_new" = "yes"; then
92
if test "$CERTS_ENABLED" = ""; then
95
CERTS_ENABLED="$CERTS_ENABLED, $crt"
97
elif test "$trust_new" = "ask"; then
98
if test "$CERTS_NEW" = ""; then
101
CERTS_NEW="$CERTS_NEW, $crt"
104
: # trust_new=no, default disabled
109
# initial installation
110
CERTS_AVAILABLE="$CERTS_LIST"
111
CERTS_ENABLED="$CERTS_AVAILABLE"
112
# XXX: ca-certificates/enable_crts should be used, so no need to ask new
119
if db_get ca-certificates/enable_crts; then
124
if dpkg --compare-versions "$cur_version" lt 20040808; then
125
db_fset ca-certificates/new_crts seen false
127
if db_fget ca-certificates/new_crts seen; then
130
if members "$CERTS_NEW" "$enable_crts"; then
131
# already selected new_crts?
134
db_subst ca-certificates/new_crts new_crts "$CERTS_NEW"
136
if test "$trust_new" = "ask" && test "$new_seen" = "true"; then
137
# XXX: run this again in postinst
138
CERTS_ENABLED="$enable_crts"
141
if test "$trust_new" = "ask" && test "$CERTS_NEW" != "" && test "$new_seen" = "false"; then
142
# New certificates added
143
db_fset ca-certificates/new_crts seen false
144
db_title "ca-certificates configuration"
145
db_input critical ca-certificates/new_crts || true
148
if db_get ca-certificates/new_crts; then
149
if test "$CERTS_ENABLED" = ""; then
152
CERTS_ENABLED="$CERTS_ENABLED, $RET"
155
# XXX: old certificates keep current state?
158
# mark seen true, so that dont ask again while postinst
159
db_fset ca-certificates/new_crts seen true
161
db_set ca-certificates/enable_crts "$CERTS_ENABLED"
162
db_subst ca-certificates/enable_crts enable_crts "$CERTS_AVAILABLE"
163
if test "$seen" != true; then
164
db_fset ca-certificates/enable_crts seen false
166
db_title "ca-certificates configuration"
167
db_input low ca-certificates/enable_crts || true