Initialize for crypto-policies
This commit is contained in:
commit
357c714c71
8 changed files with 446 additions and 0 deletions
3
.crypto-policies.metadata
Normal file
3
.crypto-policies.metadata
Normal file
|
@ -0,0 +1,3 @@
|
||||||
|
0c6f285b8e09f3435510f035c6f5fa831c86a80d10eb416fb326abe39d891ae1 crypto-policies.7.gz
|
||||||
|
38d354ec0f44850e13078f8dfa237cf7faea69f51cd4aab612f310f0f9fff500 fedora-crypto-policies-20210917.c9d86d1.tar.gz
|
||||||
|
da85dc41627504bafad10aa0905699ca5f19d854f6a890c7bd87ec73d8e32a21 update-crypto-policies.8.gz
|
3
.gitignore
vendored
Normal file
3
.gitignore
vendored
Normal file
|
@ -0,0 +1,3 @@
|
||||||
|
crypto-policies.7.gz
|
||||||
|
fedora-crypto-policies-20210917.c9d86d1.tar.gz
|
||||||
|
update-crypto-policies.8.gz
|
2
README.SUSE
Normal file
2
README.SUSE
Normal file
|
@ -0,0 +1,2 @@
|
||||||
|
Currently only OpenSSL and GnuTLS policies are supported.
|
||||||
|
The rest of the modules ignore the policy settings for the time being.
|
72
crypto-policies-FIPS.patch
Normal file
72
crypto-policies-FIPS.patch
Normal file
|
@ -0,0 +1,72 @@
|
||||||
|
Index: fedora-crypto-policies/Makefile
|
||||||
|
===================================================================
|
||||||
|
--- fedora-crypto-policies.orig/Makefile
|
||||||
|
+++ fedora-crypto-policies/Makefile
|
||||||
|
@@ -5,8 +5,8 @@ MANDIR?=/usr/share/man
|
||||||
|
CONFDIR?=/etc/crypto-policies
|
||||||
|
DESTDIR?=
|
||||||
|
MAN7PAGES=crypto-policies.7
|
||||||
|
-MAN8PAGES=update-crypto-policies.8 fips-finish-install.8 fips-mode-setup.8
|
||||||
|
-SCRIPTS=update-crypto-policies fips-finish-install fips-mode-setup
|
||||||
|
+MAN8PAGES=update-crypto-policies.8 fips-finish-install.8
|
||||||
|
+SCRIPTS=update-crypto-policies fips-finish-install
|
||||||
|
NUM_PROCS = $$(getconf _NPROCESSORS_ONLN)
|
||||||
|
PYVERSION = -3
|
||||||
|
DIFFTOOL?=meld
|
||||||
|
Index: fedora-crypto-policies/crypto-policies.7.txt
|
||||||
|
===================================================================
|
||||||
|
--- fedora-crypto-policies.orig/crypto-policies.7.txt
|
||||||
|
+++ fedora-crypto-policies/crypto-policies.7.txt
|
||||||
|
@@ -144,9 +144,6 @@ PROVIDED POLICIES
|
||||||
|
|
||||||
|
*FIPS*::
|
||||||
|
A policy to aid conformance to the *FIPS 140-2* requirements.
|
||||||
|
- This policy is used internally by the *fips-mode-setup(8)* tool
|
||||||
|
- which can switch the system into the *FIPS 140-2* mode.
|
||||||
|
- This policy provides at least 112-bit security.
|
||||||
|
|
||||||
|
* MACs: all *HMAC* with *SHA1* or better
|
||||||
|
* Curves: all prime >= 256 bits
|
||||||
|
@@ -255,12 +252,6 @@ COMMANDS
|
||||||
|
back ends and allows the system administrator to change the active
|
||||||
|
cryptographic policy.
|
||||||
|
|
||||||
|
-*fips-mode-setup(8)*::
|
||||||
|
- This command allows the system administrator to enable, or disable the
|
||||||
|
- system FIPS mode and also apply the *FIPS* cryptographic policy
|
||||||
|
- which limits the allowed algorithms and protocols to these allowed by
|
||||||
|
- the FIPS 140-2 requirements.
|
||||||
|
-
|
||||||
|
|
||||||
|
NOTES
|
||||||
|
-----
|
||||||
|
@@ -427,7 +418,7 @@ FILES
|
||||||
|
|
||||||
|
SEE ALSO
|
||||||
|
--------
|
||||||
|
-update-crypto-policies(8), fips-mode-setup(8)
|
||||||
|
+update-crypto-policies(8)
|
||||||
|
|
||||||
|
|
||||||
|
AUTHOR
|
||||||
|
Index: fedora-crypto-policies/python/update-crypto-policies.py
|
||||||
|
===================================================================
|
||||||
|
--- fedora-crypto-policies.orig/python/update-crypto-policies.py
|
||||||
|
+++ fedora-crypto-policies/python/update-crypto-policies.py
|
||||||
|
@@ -344,16 +344,12 @@ def apply_policy(pconfig, profile=None,
|
||||||
|
eprint("Warning: Using 'update-crypto-policies --set FIPS' "
|
||||||
|
"is not sufficient for")
|
||||||
|
eprint(" FIPS compliance.")
|
||||||
|
- eprint(" Use 'fips-mode-setup --enable' "
|
||||||
|
- "command instead.")
|
||||||
|
elif fips_mode():
|
||||||
|
eprint("Warning: Using 'update-crypto-policies --set' "
|
||||||
|
"in FIPS mode will make the system")
|
||||||
|
eprint(" non-compliant with FIPS.")
|
||||||
|
eprint(" It can also break "
|
||||||
|
"the ssh access to the system.")
|
||||||
|
- eprint(" Use 'fips-mode-setup --disable' "
|
||||||
|
- "to disable the system FIPS mode.")
|
||||||
|
|
||||||
|
if base_dir == DEFAULT_BASE_DIR:
|
||||||
|
if not os.geteuid() == 0:
|
28
crypto-policies-no-build-manpages.patch
Normal file
28
crypto-policies-no-build-manpages.patch
Normal file
|
@ -0,0 +1,28 @@
|
||||||
|
Index: fedora-crypto-policies/Makefile
|
||||||
|
===================================================================
|
||||||
|
--- fedora-crypto-policies.orig/Makefile
|
||||||
|
+++ fedora-crypto-policies/Makefile
|
||||||
|
@@ -22,9 +22,9 @@ install: $(MANPAGES)
|
||||||
|
mkdir -p $(DESTDIR)$(MANDIR)/man7
|
||||||
|
mkdir -p $(DESTDIR)$(MANDIR)/man8
|
||||||
|
mkdir -p $(DESTDIR)$(BINDIR)
|
||||||
|
- install -p -m 644 $(MAN7PAGES) $(DESTDIR)$(MANDIR)/man7
|
||||||
|
- install -p -m 644 $(MAN8PAGES) $(DESTDIR)$(MANDIR)/man8
|
||||||
|
- install -p -m 755 $(SCRIPTS) $(DESTDIR)$(BINDIR)
|
||||||
|
+# install -p -m 644 $(MAN7PAGES) $(DESTDIR)$(MANDIR)/man7
|
||||||
|
+# install -p -m 644 $(MAN8PAGES) $(DESTDIR)$(MANDIR)/man8
|
||||||
|
+# install -p -m 755 $(SCRIPTS) $(DESTDIR)$(BINDIR)
|
||||||
|
mkdir -p $(DESTDIR)$(DIR)/
|
||||||
|
install -p -m 644 default-config $(DESTDIR)$(DIR)
|
||||||
|
install -p -m 644 output/reload-cmds.sh $(DESTDIR)$(DIR)
|
||||||
|
@@ -106,8 +106,8 @@ clean:
|
||||||
|
rm -rf output
|
||||||
|
|
||||||
|
%: %.txt
|
||||||
|
- asciidoc.py -v -d manpage -b docbook $<
|
||||||
|
- xsltproc --nonet -o $@ /usr/share/asciidoc/docbook-xsl/manpage.xsl $@.xml
|
||||||
|
+ # asciidoc -v -d manpage -b docbook $<
|
||||||
|
+ # xsltproc --nonet -o $@ /etc/asciidoc/docbook-xsl/manpage.xsl $@.xml
|
||||||
|
|
||||||
|
dist:
|
||||||
|
rm -rf crypto-policies && git clone . crypto-policies && rm -rf crypto-policies/.git/ && tar -czf crypto-policies-git$(VERSION).tar.gz crypto-policies && rm -rf crypto-policies
|
13
crypto-policies-test_supported_modules_only.patch
Normal file
13
crypto-policies-test_supported_modules_only.patch
Normal file
|
@ -0,0 +1,13 @@
|
||||||
|
Index: fedora-crypto-policies/Makefile
|
||||||
|
===================================================================
|
||||||
|
--- fedora-crypto-policies.orig/Makefile
|
||||||
|
+++ fedora-crypto-policies/Makefile
|
||||||
|
@@ -56,8 +56,6 @@ check:
|
||||||
|
tests/openssl.pl
|
||||||
|
tests/gnutls.pl
|
||||||
|
tests/nss.py
|
||||||
|
- tests/java.pl
|
||||||
|
- tests/krb5.py
|
||||||
|
top_srcdir=. tests/update-crypto-policies.sh
|
||||||
|
|
||||||
|
# Alternative, equivalent ways to write the same policies
|
122
crypto-policies.changes
Normal file
122
crypto-policies.changes
Normal file
|
@ -0,0 +1,122 @@
|
||||||
|
* Fri Sep 24 2021 pmonreal@suse.com
|
||||||
|
- Remove the scripts and documentation regarding
|
||||||
|
fips-finish-install and test-fips-setup
|
||||||
|
* Add crypto-policies-FIPS.patch
|
||||||
|
* Fri Sep 24 2021 pmonreal@suse.com
|
||||||
|
- Update to version 20210917.c9d86d1:
|
||||||
|
* openssl: fix disabling ChaCha20
|
||||||
|
* pacify pylint 2.11: use format strings
|
||||||
|
* pacify pylint 2.11: specify explicit encoding
|
||||||
|
* fix minor things found by new pylint
|
||||||
|
* update-crypto-policies: --check against regenerated
|
||||||
|
* update-crypto-policies: fix --check's walking order
|
||||||
|
* policygenerators/gnutls: revert disabling DTLS0.9...
|
||||||
|
* policygenerators/java: add javasystem backend
|
||||||
|
* LEGACY: bump 1023 key size to 1024
|
||||||
|
* cryptopolicies: fix 'and' in deprecation warnings
|
||||||
|
* *ssh: condition ecdh-sha2-nistp384 on SECP384R1
|
||||||
|
* nss: hopefully the last fix for nss sigalgs check
|
||||||
|
* cryptopolicies: Python 3.10 compatibility
|
||||||
|
* nss: postponing check + testing at least something
|
||||||
|
* Rename 'policy modules' to 'subpolicies'
|
||||||
|
* validation.rules: fix a missing word in error
|
||||||
|
* cryptopolicies: raise errors right after warnings
|
||||||
|
* update-crypto-policies: capitalize warnings
|
||||||
|
* cryptopolicies: syntax-precheck scope errors
|
||||||
|
* .gitlab-ci.yml, Makefile: enable codespell
|
||||||
|
* all: fix several typos
|
||||||
|
* docs: don't leave zero TLS/DTLS protocols on
|
||||||
|
* openssl: separate TLS/DTLS MinProtocol/MaxProtocol
|
||||||
|
* alg_lists: order protocols new-to-old for consistency
|
||||||
|
* alg_lists: max_{d,}tls_version
|
||||||
|
* update-crypto-policies: fix pregenerated + local.d
|
||||||
|
* openssh: allow validation with pre-8.5
|
||||||
|
* .gitlab-ci.yml: run commit-range against upstream
|
||||||
|
* openssh: Use the new name for PubkeyAcceptedKeyTypes
|
||||||
|
* sha1_in_dnssec: deprecate
|
||||||
|
* .gitlab-ci.yml: test commit ranges
|
||||||
|
* FIPS:OSPP: sign = -*-SHA2-224
|
||||||
|
* scoped policies: documentation update
|
||||||
|
* scoped policies: use new features to the fullest...
|
||||||
|
* scoped policies: rewrite + minimal policy changes
|
||||||
|
* scoped policies: rewrite preparations
|
||||||
|
* nss: postponing the version check again, to 3.64
|
||||||
|
- Remove patches fixed upstream: crypto-policies-typos.patch
|
||||||
|
- Rebase: crypto-policies-test_supported_modules_only.patch
|
||||||
|
- Merge crypto-policies-asciidoc.patch into
|
||||||
|
crypto-policies-no-build-manpages.patch
|
||||||
|
* Thu Feb 25 2021 pmonreal@suse.com
|
||||||
|
- Update to version 20210225.05203d2:
|
||||||
|
* Disable DTLS0.9 protocol in the DEFAULT policy.
|
||||||
|
* policies/FIPS: insignificant reformatting
|
||||||
|
* policygenerators/libssh: respect ssh_certs
|
||||||
|
* policies/modules/OSPP: tighten to follow RHEL 8
|
||||||
|
* crypto-policies(7): drop not-reenableable comment
|
||||||
|
* follow up on disabling RC4
|
||||||
|
* Thu Feb 25 2021 pmonreal@suse.com
|
||||||
|
- Remove not needed scripts: fips-finish-install fips-mode-setup
|
||||||
|
* Wed Feb 24 2021 pmonreal@suse.com
|
||||||
|
- Disable DTLS0.9 protocol in GnuTLS DEFAULT policy. [bsc#1180938]
|
||||||
|
* The minimum DTLS protocol version in the DEFAULT and FUTURE
|
||||||
|
policies is DTLS1.2.
|
||||||
|
* Fixed upstream: 05203d21f6d0ea9bbdb351e4600f1e273720bb8e
|
||||||
|
* Wed Feb 17 2021 pmonreal@suse.com
|
||||||
|
- Update to version 20210213.5c710c0: [bsc#1180938]
|
||||||
|
* setup_directories(): perform safer creation of directories
|
||||||
|
* save_config(): avoid re-opening output file for each iteration
|
||||||
|
* save_config(): break after first match to avoid unnecessary stat() calls
|
||||||
|
* CryptoPolicy.parse(): actually stop parsing line on syntax error
|
||||||
|
* ProfileConfig.parse_string(): correctly extended subpolicies
|
||||||
|
* Exclude RC4 from LEGACY
|
||||||
|
* Introduce rc4_md5_in_krb5 to narrow AD_SUPPORT
|
||||||
|
* code style: fix 'not in' membership testing
|
||||||
|
* pylintrc: tighten up a bit
|
||||||
|
* formatting: avoid long lines
|
||||||
|
* formatting: use f-strings instead of format()
|
||||||
|
* formatting: reformat all python code with autopep8
|
||||||
|
* nss: postponing the version check again, to 3.61
|
||||||
|
* Revert "Unfortunately we have to keep ignoring the openssh check for sk-"
|
||||||
|
* Tue Feb 9 2021 dimstar@opensuse.org
|
||||||
|
- Use tar_scm service, not obs_scm: With crypto-policies entering
|
||||||
|
Ring0 (distro bootstrap) we want to be sure to keep the buildtime
|
||||||
|
deps as low as possible.
|
||||||
|
- Add python3-base BuildRequires: previously, OBS' tar service
|
||||||
|
pulled this in for us.
|
||||||
|
* Mon Feb 8 2021 pmonreal@suse.com
|
||||||
|
- Add a BuildIgnore for crypto-policies
|
||||||
|
* Mon Feb 8 2021 pmonreal@suse.com
|
||||||
|
- Use gzip instead of xz in obscpio and sources
|
||||||
|
* Fri Feb 5 2021 pmonreal@suse.com
|
||||||
|
- Do not build the manpages to avoid build cycles
|
||||||
|
- Add crypto-policies-no-build-manpages.patch
|
||||||
|
* Tue Feb 2 2021 dimstar@opensuse.org
|
||||||
|
- Convert to use a proper git source _service:
|
||||||
|
+ To update, one just needs to update the commit/revision in the
|
||||||
|
_service file and run `osc service dr`.
|
||||||
|
+ The version of the package is defined by the commit date of the
|
||||||
|
revision, followed by the abbreviated git hash (The same
|
||||||
|
revision used before results thus in a downgrade to 20210118,
|
||||||
|
but as this is a alltime new package, this is acceptable.
|
||||||
|
* Tue Feb 2 2021 pmonreal@suse.com
|
||||||
|
- Update to git version 20210127
|
||||||
|
* Bump Python requirement to 3.6
|
||||||
|
* Output sigalgs required by nss >=3.59
|
||||||
|
* Do not require bind during build
|
||||||
|
* Break build cycles with openssl and gnutls
|
||||||
|
* Thu Jan 21 2021 pmonreal@suse.com
|
||||||
|
- Update to git version 20210118
|
||||||
|
* Output sigalgs required by nss >=3.59
|
||||||
|
* Bump Python requirement to 3.6
|
||||||
|
* Kerberos 5: Fix policy generator to account for macs
|
||||||
|
* Add AES-192 support (non-TLS scenarios)
|
||||||
|
* Add documentation of the --check option
|
||||||
|
* Thu Jan 21 2021 pmonreal@suse.com
|
||||||
|
- Fix the man pages generation
|
||||||
|
- Add crypto-policies-asciidoc.patch
|
||||||
|
* Thu Jan 21 2021 pmonreal@suse.com
|
||||||
|
- Test only supported modules
|
||||||
|
- Add crypto-policies-test_supported_modules_only.patch
|
||||||
|
* Tue Dec 22 2020 pmonreal@suse.com
|
||||||
|
- Add crypto-policies-typos.patch to fix some typos
|
||||||
|
* Thu Nov 12 2020 vcizek@suse.com
|
||||||
|
- Initial packaging, git version 20200918 (jsc#SLE-15832)
|
203
crypto-policies.spec
Normal file
203
crypto-policies.spec
Normal file
|
@ -0,0 +1,203 @@
|
||||||
|
#
|
||||||
|
# spec file for package crypto-policies
|
||||||
|
#
|
||||||
|
# Copyright (c) 2022-2023 ZhuningOS
|
||||||
|
#
|
||||||
|
|
||||||
|
|
||||||
|
%global _python_bytecompile_extra 0
|
||||||
|
Name: crypto-policies
|
||||||
|
Version: 20210917.c9d86d1
|
||||||
|
Release: 150400.1.7
|
||||||
|
Summary: System-wide crypto policies
|
||||||
|
License: LGPL-2.1-or-later
|
||||||
|
Group: Productivity/Networking/Security
|
||||||
|
URL: https://gitlab.com/redhat-crypto/fedora-%{name}
|
||||||
|
Source0: fedora-%{name}-%{version}.tar.gz
|
||||||
|
Source1: README.SUSE
|
||||||
|
Source2: crypto-policies.7.gz
|
||||||
|
Source3: update-crypto-policies.8.gz
|
||||||
|
Patch0: crypto-policies-test_supported_modules_only.patch
|
||||||
|
Patch1: crypto-policies-no-build-manpages.patch
|
||||||
|
Patch2: crypto-policies-FIPS.patch
|
||||||
|
BuildRequires: python3-base
|
||||||
|
# For testing, the following buildrequires need to be uncommented.
|
||||||
|
# BuildRequires: asciidoc
|
||||||
|
# BuildRequires: bind
|
||||||
|
# BuildRequires: gnutls >= 3.6.0
|
||||||
|
# BuildRequires: java-devel
|
||||||
|
# BuildRequires: libxslt
|
||||||
|
# BuildRequires: openssl
|
||||||
|
# BuildRequires: perl
|
||||||
|
# BuildRequires: python3-coverage
|
||||||
|
# BuildRequires: python3-devel >= 3.6
|
||||||
|
# BuildRequires: python3-flake8
|
||||||
|
# BuildRequires: python3-pylint
|
||||||
|
# BuildRequires: python3-pytest
|
||||||
|
# BuildRequires: perl(File::Copy)
|
||||||
|
# BuildRequires: perl(File::Temp)
|
||||||
|
# BuildRequires: perl(File::Which)
|
||||||
|
# BuildRequires: perl(File::pushd)
|
||||||
|
Recommends: crypto-policies-scripts
|
||||||
|
Conflicts: gnutls < 3.7.0
|
||||||
|
#Conflicts: libreswan < 3.28
|
||||||
|
Conflicts: nss < 3.44.0
|
||||||
|
#Conflicts: openssh < 8.2p1
|
||||||
|
#!BuildIgnore: crypto-policies
|
||||||
|
BuildArch: noarch
|
||||||
|
|
||||||
|
%description
|
||||||
|
This package provides pre-built configuration files with
|
||||||
|
cryptographic policies for various cryptographic back-ends,
|
||||||
|
such as SSL/TLS libraries.
|
||||||
|
|
||||||
|
%package scripts
|
||||||
|
Summary: Tool to switch between crypto policies
|
||||||
|
Requires: %{name} = %{version}-%{release}
|
||||||
|
|
||||||
|
%description scripts
|
||||||
|
This package provides a tool update-crypto-policies, which applies
|
||||||
|
the policies provided by the crypto-policies package. These can be
|
||||||
|
either the pre-built policies from the base package or custom policies
|
||||||
|
defined in simple policy definition files.
|
||||||
|
|
||||||
|
%prep
|
||||||
|
%autosetup -p1 -n fedora-%{name}-%{version}
|
||||||
|
|
||||||
|
%build
|
||||||
|
%make_build
|
||||||
|
|
||||||
|
%install
|
||||||
|
mkdir -p -m 755 %{buildroot}%{_datarootdir}/crypto-policies/
|
||||||
|
mkdir -p -m 755 %{buildroot}%{_datarootdir}/crypto-policies/back-ends/
|
||||||
|
mkdir -p -m 755 %{buildroot}%{_sysconfdir}/crypto-policies/back-ends/
|
||||||
|
mkdir -p -m 755 %{buildroot}%{_sysconfdir}/crypto-policies/state/
|
||||||
|
mkdir -p -m 755 %{buildroot}%{_sysconfdir}/crypto-policies/local.d/
|
||||||
|
mkdir -p -m 755 %{buildroot}%{_sysconfdir}/crypto-policies/policies/
|
||||||
|
mkdir -p -m 755 %{buildroot}%{_sysconfdir}/crypto-policies/policies/modules/
|
||||||
|
mkdir -p -m 755 %{buildroot}%{_bindir}
|
||||||
|
|
||||||
|
make DESTDIR=%{buildroot} DIR=%{_datarootdir}/crypto-policies MANDIR=%{_mandir} %{?_smp_mflags} install
|
||||||
|
|
||||||
|
# Install the manpages
|
||||||
|
mkdir -p -m 755 %{buildroot}%{_mandir}/
|
||||||
|
mkdir -p -m 755 %{buildroot}%{_mandir}/man7/
|
||||||
|
mkdir -p -m 755 %{buildroot}%{_mandir}/man8/
|
||||||
|
cp %{SOURCE2} %{buildroot}%{_mandir}/man7/
|
||||||
|
cp %{SOURCE3} %{buildroot}%{_mandir}/man8/
|
||||||
|
|
||||||
|
# Install the executable files
|
||||||
|
install -p -m 755 update-crypto-policies %{buildroot}%{_bindir}/
|
||||||
|
|
||||||
|
install -p -m 644 default-config %{buildroot}%{_sysconfdir}/crypto-policies/config
|
||||||
|
touch %{buildroot}%{_sysconfdir}/crypto-policies/state/current
|
||||||
|
touch %{buildroot}%{_sysconfdir}/crypto-policies/state/CURRENT.pol
|
||||||
|
|
||||||
|
# Drop pre-generated GOST-ONLY policy, we do not need to ship the files
|
||||||
|
rm -rf %{buildroot}%{_datarootdir}/crypto-policies/GOST-ONLY
|
||||||
|
|
||||||
|
# Remove fips-finish-install and test-fips-setup scripts and man
|
||||||
|
find -type f -name fips-finish-install -delete
|
||||||
|
find -type f -name fips-finish-install.8.txt -delete
|
||||||
|
find -type f -name test-fips-setup.sh -delete
|
||||||
|
|
||||||
|
# Create back-end configs for mounting with read-only /etc/
|
||||||
|
for d in LEGACY DEFAULT FUTURE FIPS ; do
|
||||||
|
mkdir -p -m 755 %{buildroot}%{_datarootdir}/crypto-policies/back-ends/$d
|
||||||
|
for f in %{buildroot}%{_datarootdir}/crypto-policies/$d/* ; do
|
||||||
|
ln $f %{buildroot}%{_datarootdir}/crypto-policies/back-ends/$d/$(basename $f .txt).config
|
||||||
|
done
|
||||||
|
done
|
||||||
|
|
||||||
|
for f in %{buildroot}%{_datarootdir}/crypto-policies/DEFAULT/* ; do
|
||||||
|
ln -sf %{_datarootdir}/crypto-policies/DEFAULT/$(basename $f) %{buildroot}%{_sysconfdir}/crypto-policies/back-ends/$(basename $f .txt).config
|
||||||
|
done
|
||||||
|
|
||||||
|
%py3_compile %{buildroot}%{_datadir}/crypto-policies/python
|
||||||
|
|
||||||
|
cp %{SOURCE1} %{buildroot}%{_sysconfdir}/crypto-policies
|
||||||
|
|
||||||
|
%check
|
||||||
|
%make_build test || :
|
||||||
|
|
||||||
|
%post -p <lua>
|
||||||
|
if not posix.access("%{_sysconfdir}/crypto-policies/config") then
|
||||||
|
local policy = "DEFAULT"
|
||||||
|
local cf = io.open("/proc/sys/crypto/fips_enabled", "r")
|
||||||
|
if cf then
|
||||||
|
if cf:read() == "1" then
|
||||||
|
policy = "FIPS"
|
||||||
|
end
|
||||||
|
cf:close()
|
||||||
|
end
|
||||||
|
cf = io.open("%{_sysconfdir}/crypto-policies/config", "w")
|
||||||
|
if cf then
|
||||||
|
cf:write(policy.."\n")
|
||||||
|
cf:close()
|
||||||
|
end
|
||||||
|
cf = io.open("%{_sysconfdir}/crypto-policies/state/current", "w")
|
||||||
|
if cf then
|
||||||
|
cf:write(policy.."\n")
|
||||||
|
cf:close()
|
||||||
|
end
|
||||||
|
local policypath = "%{_datarootdir}/crypto-policies/"..policy
|
||||||
|
for fn in posix.files(policypath) do
|
||||||
|
if fn ~= "." and fn ~= ".." then
|
||||||
|
local backend = fn:gsub(".*/", ""):gsub("%%..*", "")
|
||||||
|
local cfgfn = "%{_sysconfdir}/crypto-policies/back-ends/"..backend..".config"
|
||||||
|
posix.unlink(cfgfn)
|
||||||
|
posix.symlink(policypath.."/"..fn, cfgfn)
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
%posttrans scripts
|
||||||
|
%{_bindir}/update-crypto-policies --no-check >/dev/null 2>/dev/null || :
|
||||||
|
|
||||||
|
%files
|
||||||
|
%dir %{_sysconfdir}/crypto-policies/
|
||||||
|
%dir %{_sysconfdir}/crypto-policies/back-ends/
|
||||||
|
%dir %{_sysconfdir}/crypto-policies/state/
|
||||||
|
%dir %{_sysconfdir}/crypto-policies/local.d/
|
||||||
|
%dir %{_sysconfdir}/crypto-policies/policies/
|
||||||
|
%dir %{_sysconfdir}/crypto-policies/policies/modules/
|
||||||
|
%dir %{_datarootdir}/crypto-policies/
|
||||||
|
|
||||||
|
%{_sysconfdir}/crypto-policies/README.SUSE
|
||||||
|
%ghost %config(missingok,noreplace) %{_sysconfdir}/crypto-policies/config
|
||||||
|
|
||||||
|
%ghost %config(missingok,noreplace) %{_sysconfdir}/crypto-policies/back-ends/gnutls.config
|
||||||
|
%ghost %config(missingok,noreplace) %{_sysconfdir}/crypto-policies/back-ends/openssl.config
|
||||||
|
%ghost %config(missingok,noreplace) %{_sysconfdir}/crypto-policies/back-ends/opensslcnf.config
|
||||||
|
%ghost %config(missingok,noreplace) %{_sysconfdir}/crypto-policies/back-ends/openssh.config
|
||||||
|
%ghost %config(missingok,noreplace) %{_sysconfdir}/crypto-policies/back-ends/opensshserver.config
|
||||||
|
%ghost %config(missingok,noreplace) %{_sysconfdir}/crypto-policies/back-ends/nss.config
|
||||||
|
%ghost %config(missingok,noreplace) %{_sysconfdir}/crypto-policies/back-ends/bind.config
|
||||||
|
%ghost %config(missingok,noreplace) %{_sysconfdir}/crypto-policies/back-ends/java.config
|
||||||
|
%ghost %config(missingok,noreplace) %{_sysconfdir}/crypto-policies/back-ends/javasystem.config
|
||||||
|
%ghost %config(missingok,noreplace) %{_sysconfdir}/crypto-policies/back-ends/krb5.config
|
||||||
|
%ghost %config(missingok,noreplace) %{_sysconfdir}/crypto-policies/back-ends/libreswan.config
|
||||||
|
%ghost %config(missingok,noreplace) %{_sysconfdir}/crypto-policies/back-ends/libssh.config
|
||||||
|
|
||||||
|
%ghost %{_sysconfdir}/crypto-policies/state/current
|
||||||
|
%ghost %{_sysconfdir}/crypto-policies/state/CURRENT.pol
|
||||||
|
|
||||||
|
%{_mandir}/man7/crypto-policies.7%{?ext_man}
|
||||||
|
%{_datarootdir}/crypto-policies/LEGACY
|
||||||
|
%{_datarootdir}/crypto-policies/DEFAULT
|
||||||
|
%{_datarootdir}/crypto-policies/FUTURE
|
||||||
|
%{_datarootdir}/crypto-policies/FIPS
|
||||||
|
%{_datarootdir}/crypto-policies/EMPTY
|
||||||
|
%{_datarootdir}/crypto-policies/back-ends
|
||||||
|
%{_datarootdir}/crypto-policies/default-config
|
||||||
|
%{_datarootdir}/crypto-policies/reload-cmds.sh
|
||||||
|
%{_datarootdir}/crypto-policies/policies
|
||||||
|
|
||||||
|
%license COPYING.LESSER
|
||||||
|
|
||||||
|
%files scripts
|
||||||
|
%{_bindir}/update-crypto-policies
|
||||||
|
%{_mandir}/man8/update-crypto-policies.8%{?ext_man}
|
||||||
|
%{_datarootdir}/crypto-policies/python
|
||||||
|
|
||||||
|
%changelog
|
Loading…
Add table
Reference in a new issue