Blame SPECS/ca-certificates.spec

77503b
%define pkidir %{_sysconfdir}/pki
77503b
%define catrustdir %{_sysconfdir}/pki/ca-trust
77503b
%define classic_tls_bundle ca-bundle.crt
77503b
%define openssl_format_trust_bundle ca-bundle.trust.crt
77503b
%define p11_format_bundle ca-bundle.trust.p11-kit
77503b
%define legacy_default_bundle ca-bundle.legacy.default.crt
77503b
%define legacy_disable_bundle ca-bundle.legacy.disable.crt
77503b
%define java_bundle java/cacerts
77503b
77503b
Summary: The Mozilla CA root certificate bundle
77503b
Name: ca-certificates
77503b
77503b
# For the package version number, we use: year.{upstream version}
77503b
#
77503b
# The {upstream version} can be found as symbol
77503b
# NSS_BUILTINS_LIBRARY_VERSION in file nss/lib/ckfw/builtins/nssckbi.h
77503b
# which corresponds to the data in file nss/lib/ckfw/builtins/certdata.txt.
77503b
#
77503b
# The files should be taken from a released version of NSS, as published
77503b
# at https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/
77503b
#
77503b
# The versions that are used by the latest released version of 
77503b
# Mozilla Firefox should be available from:
77503b
# https://hg.mozilla.org/releases/mozilla-release/raw-file/default/security/nss/lib/ckfw/builtins/nssckbi.h
77503b
# https://hg.mozilla.org/releases/mozilla-release/raw-file/default/security/nss/lib/ckfw/builtins/certdata.txt
77503b
#
77503b
# The most recent development versions of the files can be found at
77503b
# http://hg.mozilla.org/projects/nss/raw-file/default/lib/ckfw/builtins/nssckbi.h
77503b
# http://hg.mozilla.org/projects/nss/raw-file/default/lib/ckfw/builtins/certdata.txt
77503b
# (but these files might have not yet been released).
77503b
#
77503b
# (until 2012.87 the version was based on the cvs revision ID of certdata.txt,
77503b
# but in 2013 the NSS projected was migrated to HG. Old version 2012.87 is 
77503b
# equivalent to new version 2012.1.93, which would break the requirement 
77503b
# to have increasing version numbers. However, the new scheme will work, 
77503b
# because all future versions will start with 2013 or larger.)
77503b
77503b
Version: 2020.2.50
77503b
# for y-stream, please always use 91 <= release  < 100 (91,92,93)
77503b
# for z-stream release branches, please use 90 <= release  < 91 (90.0, 90.1, ...)
77503b
Release: 94%{?dist}
77503b
License: Public Domain
77503b
77503b
URL: https://fedoraproject.org/wiki/CA-Certificates
77503b
77503b
#Please always update both certdata.txt and nssckbi.h
77503b
Source0: certdata.txt
77503b
Source1: nssckbi.h
77503b
Source2: update-ca-trust
77503b
Source3: trust-fixes
77503b
Source4: certdata2pem.py
77503b
Source5: ca-legacy.conf
77503b
Source6: ca-legacy
77503b
Source9: ca-legacy.8.txt
77503b
Source10: update-ca-trust.8.txt
77503b
Source11: README.usr
77503b
Source12: README.etc
77503b
Source13: README.extr
77503b
Source14: README.java
77503b
Source15: README.openssl
77503b
Source16: README.pem
77503b
Source17: README.edk2
77503b
Source18: README.src
77503b
77503b
BuildArch: noarch
77503b
77503b
Requires(post): bash
77503b
Requires(post): grep
77503b
Requires(post): sed
77503b
Requires(post): coreutils
77503b
Requires: bash
77503b
Requires: grep
77503b
Requires: sed
77503b
Requires(post): p11-kit >= 0.24
77503b
Requires(post): p11-kit-trust >= 0.24
77503b
Requires: p11-kit >= 0.24
77503b
Requires: p11-kit-trust >= 0.24
77503b
77503b
BuildRequires: perl-interpreter
77503b
BuildRequires: python3
77503b
BuildRequires: openssl
77503b
BuildRequires: asciidoc
77503b
BuildRequires: libxslt
77503b
77503b
%description
77503b
This package contains the set of CA certificates chosen by the
77503b
Mozilla Foundation for use with the Internet PKI.
77503b
77503b
%prep
77503b
rm -rf %{name}
77503b
mkdir %{name}
77503b
mkdir %{name}/certs
77503b
mkdir %{name}/certs/legacy-default
77503b
mkdir %{name}/certs/legacy-disable
77503b
mkdir %{name}/java
77503b
77503b
%build
77503b
pushd %{name}/certs
77503b
 pwd
77503b
 cp %{SOURCE0} .
77503b
 python3 %{SOURCE4} >c2p.log 2>c2p.err
77503b
popd
77503b
pushd %{name}
77503b
 (
77503b
   cat <
77503b
# This is a bundle of X.509 certificates of public Certificate
77503b
# Authorities.  It was generated from the Mozilla root CA list.
77503b
# These certificates and trust/distrust attributes use the file format accepted
77503b
# by the p11-kit-trust module.
77503b
#
77503b
# Source: nss/lib/ckfw/builtins/certdata.txt
77503b
# Source: nss/lib/ckfw/builtins/nssckbi.h
77503b
#
77503b
# Generated from:
77503b
EOF
77503b
   cat %{SOURCE1}  |grep -w NSS_BUILTINS_LIBRARY_VERSION | awk '{print "# " $2 " " $3}';
77503b
   echo '#';
77503b
 ) > %{p11_format_bundle}
77503b
77503b
 touch %{legacy_default_bundle}
77503b
 NUM_LEGACY_DEFAULT=`find certs/legacy-default -type f | wc -l`
77503b
 if [ $NUM_LEGACY_DEFAULT -ne 0 ]; then
77503b
     for f in certs/legacy-default/*.crt; do 
77503b
       echo "processing $f"
77503b
       tbits=`sed -n '/^# openssl-trust/{s/^.*=//;p;}' $f`
77503b
       alias=`sed -n '/^# alias=/{s/^.*=//;p;q;}' $f | sed "s/'//g" | sed 's/"//g'`
77503b
       targs=""
77503b
       if [ -n "$tbits" ]; then
77503b
          for t in $tbits; do
77503b
             targs="${targs} -addtrust $t"
77503b
          done
77503b
       fi
77503b
       if [ -n "$targs" ]; then
77503b
          echo "legacy default flags $targs for $f" >> info.trust
77503b
          openssl x509 -text -in "$f" -trustout $targs -setalias "$alias" >> %{legacy_default_bundle}
77503b
       fi
77503b
     done
77503b
 fi
77503b
77503b
 touch %{legacy_disable_bundle}
77503b
 NUM_LEGACY_DISABLE=`find certs/legacy-disable -type f | wc -l`
77503b
 if [ $NUM_LEGACY_DISABLE -ne 0 ]; then
77503b
     for f in certs/legacy-disable/*.crt; do 
77503b
       echo "processing $f"
77503b
       tbits=`sed -n '/^# openssl-trust/{s/^.*=//;p;}' $f`
77503b
       alias=`sed -n '/^# alias=/{s/^.*=//;p;q;}' $f | sed "s/'//g" | sed 's/"//g'`
77503b
       targs=""
77503b
       if [ -n "$tbits" ]; then
77503b
          for t in $tbits; do
77503b
             targs="${targs} -addtrust $t"
77503b
          done
77503b
       fi
77503b
       if [ -n "$targs" ]; then
77503b
          echo "legacy disable flags $targs for $f" >> info.trust
77503b
          openssl x509 -text -in "$f" -trustout $targs -setalias "$alias" >> %{legacy_disable_bundle}
77503b
       fi
77503b
     done
77503b
 fi
77503b
77503b
 P11FILES=`find certs -name \*.tmp-p11-kit | wc -l`
77503b
 if [ $P11FILES -ne 0 ]; then
77503b
   for p in certs/*.tmp-p11-kit; do 
77503b
     cat "$p" >> %{p11_format_bundle}
77503b
   done
77503b
 fi
77503b
 # Append our trust fixes
77503b
 cat %{SOURCE3} >> %{p11_format_bundle}
77503b
popd
77503b
77503b
#manpage
77503b
cp %{SOURCE10} %{name}/update-ca-trust.8.txt
77503b
asciidoc.py -v -d manpage -b docbook %{name}/update-ca-trust.8.txt
77503b
xsltproc --nonet -o %{name}/update-ca-trust.8 /usr/share/asciidoc/docbook-xsl/manpage.xsl %{name}/update-ca-trust.8.xml
77503b
77503b
cp %{SOURCE9} %{name}/ca-legacy.8.txt
77503b
asciidoc.py -v -d manpage -b docbook %{name}/ca-legacy.8.txt
77503b
xsltproc --nonet -o %{name}/ca-legacy.8 /usr/share/asciidoc/docbook-xsl/manpage.xsl %{name}/ca-legacy.8.xml
77503b
77503b
77503b
%install
77503b
rm -rf $RPM_BUILD_ROOT
77503b
mkdir -p -m 755 $RPM_BUILD_ROOT%{pkidir}/tls/certs
77503b
mkdir -p -m 755 $RPM_BUILD_ROOT%{pkidir}/java
77503b
mkdir -p -m 755 $RPM_BUILD_ROOT%{_sysconfdir}/ssl
77503b
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/source
77503b
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/source/anchors
77503b
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/source/blocklist
77503b
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/extracted
77503b
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/extracted/pem
77503b
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/extracted/openssl
77503b
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/extracted/java
77503b
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/extracted/edk2
77503b
mkdir -p -m 755 $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-source
77503b
mkdir -p -m 755 $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-source/anchors
77503b
mkdir -p -m 755 $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-source/blocklist
77503b
mkdir -p -m 755 $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-legacy
77503b
mkdir -p -m 755 $RPM_BUILD_ROOT%{_bindir}
77503b
mkdir -p -m 755 $RPM_BUILD_ROOT%{_mandir}/man8
77503b
77503b
install -p -m 644 %{name}/update-ca-trust.8 $RPM_BUILD_ROOT%{_mandir}/man8
77503b
install -p -m 644 %{name}/ca-legacy.8 $RPM_BUILD_ROOT%{_mandir}/man8
77503b
install -p -m 644 %{SOURCE11} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-source/README
77503b
install -p -m 644 %{SOURCE12} $RPM_BUILD_ROOT%{catrustdir}/README
77503b
install -p -m 644 %{SOURCE13} $RPM_BUILD_ROOT%{catrustdir}/extracted/README
77503b
install -p -m 644 %{SOURCE14} $RPM_BUILD_ROOT%{catrustdir}/extracted/java/README
77503b
install -p -m 644 %{SOURCE15} $RPM_BUILD_ROOT%{catrustdir}/extracted/openssl/README
77503b
install -p -m 644 %{SOURCE16} $RPM_BUILD_ROOT%{catrustdir}/extracted/pem/README
77503b
install -p -m 644 %{SOURCE17} $RPM_BUILD_ROOT%{catrustdir}/extracted/edk2/README
77503b
install -p -m 644 %{SOURCE18} $RPM_BUILD_ROOT%{catrustdir}/source/README
77503b
77503b
install -p -m 644 %{name}/%{p11_format_bundle} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-source/%{p11_format_bundle}
77503b
77503b
install -p -m 644 %{name}/%{legacy_default_bundle} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-legacy/%{legacy_default_bundle}
77503b
install -p -m 644 %{name}/%{legacy_disable_bundle} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-legacy/%{legacy_disable_bundle}
77503b
77503b
install -p -m 644 %{SOURCE5} $RPM_BUILD_ROOT%{catrustdir}/ca-legacy.conf
77503b
77503b
touch -r %{SOURCE0} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-source/%{p11_format_bundle}
77503b
77503b
touch -r %{SOURCE0} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-legacy/%{legacy_default_bundle}
77503b
touch -r %{SOURCE0} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-legacy/%{legacy_disable_bundle}
77503b
77503b
# TODO: consider to dynamically create the update-ca-trust script from within
77503b
#       this .spec file, in order to have the output file+directory names at once place only.
77503b
install -p -m 755 %{SOURCE2} $RPM_BUILD_ROOT%{_bindir}/update-ca-trust
77503b
77503b
install -p -m 755 %{SOURCE6} $RPM_BUILD_ROOT%{_bindir}/ca-legacy
77503b
77503b
# touch ghosted files that will be extracted dynamically
77503b
# Set chmod 444 to use identical permission
77503b
touch $RPM_BUILD_ROOT%{catrustdir}/extracted/pem/tls-ca-bundle.pem
77503b
chmod 444 $RPM_BUILD_ROOT%{catrustdir}/extracted/pem/tls-ca-bundle.pem
77503b
touch $RPM_BUILD_ROOT%{catrustdir}/extracted/pem/email-ca-bundle.pem
77503b
chmod 444 $RPM_BUILD_ROOT%{catrustdir}/extracted/pem/email-ca-bundle.pem
77503b
touch $RPM_BUILD_ROOT%{catrustdir}/extracted/pem/objsign-ca-bundle.pem
77503b
chmod 444 $RPM_BUILD_ROOT%{catrustdir}/extracted/pem/objsign-ca-bundle.pem
77503b
touch $RPM_BUILD_ROOT%{catrustdir}/extracted/openssl/%{openssl_format_trust_bundle}
77503b
chmod 444 $RPM_BUILD_ROOT%{catrustdir}/extracted/openssl/%{openssl_format_trust_bundle}
77503b
touch $RPM_BUILD_ROOT%{catrustdir}/extracted/%{java_bundle}
77503b
chmod 444 $RPM_BUILD_ROOT%{catrustdir}/extracted/%{java_bundle}
77503b
touch $RPM_BUILD_ROOT%{catrustdir}/extracted/edk2/cacerts.bin
77503b
chmod 444 $RPM_BUILD_ROOT%{catrustdir}/extracted/edk2/cacerts.bin
77503b
77503b
# /etc/ssl symlinks for 3rd-party tools and cross-distro compatibility
77503b
ln -s /etc/pki/tls/certs \
77503b
    $RPM_BUILD_ROOT%{_sysconfdir}/ssl/certs
77503b
ln -s %{catrustdir}/extracted/pem/tls-ca-bundle.pem \
77503b
    $RPM_BUILD_ROOT%{_sysconfdir}/ssl/cert.pem
77503b
ln -s /etc/pki/tls/openssl.cnf \
77503b
    $RPM_BUILD_ROOT%{_sysconfdir}/ssl/openssl.cnf
77503b
ln -s /etc/pki/tls/ct_log_list.cnf \
77503b
    $RPM_BUILD_ROOT%{_sysconfdir}/ssl/ct_log_list.cnf
77503b
# legacy filenames
77503b
ln -s %{catrustdir}/extracted/pem/tls-ca-bundle.pem \
77503b
    $RPM_BUILD_ROOT%{pkidir}/tls/cert.pem
77503b
ln -s %{catrustdir}/extracted/pem/tls-ca-bundle.pem \
77503b
    $RPM_BUILD_ROOT%{pkidir}/tls/certs/%{classic_tls_bundle}
77503b
ln -s %{catrustdir}/extracted/openssl/%{openssl_format_trust_bundle} \
77503b
    $RPM_BUILD_ROOT%{pkidir}/tls/certs/%{openssl_format_trust_bundle}
77503b
ln -s %{catrustdir}/extracted/%{java_bundle} \
77503b
    $RPM_BUILD_ROOT%{pkidir}/%{java_bundle}
77503b
77503b
77503b
%pre
77503b
if [ $1 -gt 1 ] ; then
77503b
  # Upgrade or Downgrade.
77503b
  # If the classic filename is a regular file, then we are upgrading
77503b
  # from an old package and we will move it to an .rpmsave backup file.
77503b
  # If the filename is a symbolic link, then we are good already.
77503b
  # If the system will later be downgraded to an old package with regular 
77503b
  # files, and afterwards updated again to a newer package with symlinks,
77503b
  # and the old .rpmsave backup file didn't get cleaned up,
77503b
  # then we don't backup again. We keep the older backup file.
77503b
  # In other words, if an .rpmsave file already exists, we don't overwrite it.
77503b
  #
77503b
  if ! test -e %{pkidir}/%{java_bundle}.rpmsave; then
77503b
    # no backup yet
77503b
    if test -e %{pkidir}/%{java_bundle}; then
77503b
      # a file exists
77503b
        if ! test -L %{pkidir}/%{java_bundle}; then
77503b
        # it's an old regular file, not a link
77503b
        mv -f %{pkidir}/%{java_bundle} %{pkidir}/%{java_bundle}.rpmsave
77503b
      fi
77503b
    fi
77503b
  fi
77503b
77503b
  if ! test -e %{pkidir}/tls/certs/%{classic_tls_bundle}.rpmsave; then
77503b
    # no backup yet
77503b
    if test -e %{pkidir}/tls/certs/%{classic_tls_bundle}; then
77503b
      # a file exists
77503b
      if ! test -L %{pkidir}/tls/certs/%{classic_tls_bundle}; then
77503b
        # it's an old regular file, not a link
77503b
        mv -f %{pkidir}/tls/certs/%{classic_tls_bundle} %{pkidir}/tls/certs/%{classic_tls_bundle}.rpmsave
77503b
      fi
77503b
    fi
77503b
  fi
77503b
77503b
  if ! test -e %{pkidir}/tls/certs/%{openssl_format_trust_bundle}.rpmsave; then
77503b
    # no backup yet
77503b
    if test -e %{pkidir}/tls/certs/%{openssl_format_trust_bundle}; then
77503b
      # a file exists
77503b
      if ! test -L %{pkidir}/tls/certs/%{openssl_format_trust_bundle}; then
77503b
        # it's an old regular file, not a link
77503b
        mv -f %{pkidir}/tls/certs/%{openssl_format_trust_bundle} %{pkidir}/tls/certs/%{openssl_format_trust_bundle}.rpmsave
77503b
      fi
77503b
    fi
77503b
  fi
77503b
fi
77503b
77503b
77503b
%post
77503b
#if [ $1 -gt 1 ] ; then
77503b
#  # when upgrading or downgrading
77503b
#fi
77503b
# if ln is available, go ahead and run the ca-legacy and update
77503b
# scripts. If not, wait until %posttrans.
77503b
if [ -x %{_bindir}/ln ]; then
77503b
%{_bindir}/ca-legacy install
77503b
%{_bindir}/update-ca-trust
77503b
fi
77503b
77503b
%posttrans
77503b
# When coreutils is installing with ca-certificates
77503b
# we need to wait until coreutils install to
77503b
# run our update since update requires ln to complete.
77503b
# There is a circular dependency here where
77503b
# ca-certificates depends on coreutils
77503b
# coreutils depends on openssl
77503b
# openssl depends on ca-certificates
77503b
# so we run the scripts here too, in case we couldn't run them in
77503b
# post. If we *could* run them in post this is an unnecessary
77503b
# duplication, but it shouldn't hurt anything
77503b
%{_bindir}/ca-legacy install
77503b
%{_bindir}/update-ca-trust
77503b
77503b
%files
77503b
%dir %{_sysconfdir}/ssl
77503b
%dir %{pkidir}/tls
77503b
%dir %{pkidir}/tls/certs
77503b
%dir %{pkidir}/java
77503b
%dir %{catrustdir}
77503b
%dir %{catrustdir}/source
77503b
%dir %{catrustdir}/source/anchors
77503b
%dir %{catrustdir}/source/blocklist
77503b
%dir %{catrustdir}/extracted
77503b
%dir %{catrustdir}/extracted/pem
77503b
%dir %{catrustdir}/extracted/openssl
77503b
%dir %{catrustdir}/extracted/java
77503b
%dir %{_datadir}/pki
77503b
%dir %{_datadir}/pki/ca-trust-source
77503b
%dir %{_datadir}/pki/ca-trust-source/anchors
77503b
%dir %{_datadir}/pki/ca-trust-source/blocklist
77503b
%dir %{_datadir}/pki/ca-trust-legacy
77503b
77503b
%config(noreplace) %{catrustdir}/ca-legacy.conf
77503b
77503b
%{_mandir}/man8/update-ca-trust.8.gz
77503b
%{_mandir}/man8/ca-legacy.8.gz
77503b
%{_datadir}/pki/ca-trust-source/README
77503b
%{catrustdir}/README
77503b
%{catrustdir}/extracted/README
77503b
%{catrustdir}/extracted/java/README
77503b
%{catrustdir}/extracted/openssl/README
77503b
%{catrustdir}/extracted/pem/README
77503b
%{catrustdir}/extracted/edk2/README
77503b
%{catrustdir}/source/README
77503b
77503b
# symlinks for old locations
77503b
%{pkidir}/tls/cert.pem
77503b
%{pkidir}/tls/certs/%{classic_tls_bundle}
77503b
%{pkidir}/tls/certs/%{openssl_format_trust_bundle}
77503b
%{pkidir}/%{java_bundle}
77503b
# symlinks to cross-distro compatibility files and directory
77503b
%{_sysconfdir}/ssl/certs
77503b
%{_sysconfdir}/ssl/cert.pem
77503b
%{_sysconfdir}/ssl/openssl.cnf
77503b
%{_sysconfdir}/ssl/ct_log_list.cnf
77503b
77503b
# primary bundle file with trust
77503b
%{_datadir}/pki/ca-trust-source/%{p11_format_bundle}
77503b
77503b
%{_datadir}/pki/ca-trust-legacy/%{legacy_default_bundle}
77503b
%{_datadir}/pki/ca-trust-legacy/%{legacy_disable_bundle}
77503b
# update/extract tool
77503b
%{_bindir}/update-ca-trust
77503b
%{_bindir}/ca-legacy
77503b
%ghost %{catrustdir}/source/ca-bundle.legacy.crt
77503b
# files extracted files
77503b
%ghost %{catrustdir}/extracted/pem/tls-ca-bundle.pem
77503b
%ghost %{catrustdir}/extracted/pem/email-ca-bundle.pem
77503b
%ghost %{catrustdir}/extracted/pem/objsign-ca-bundle.pem
77503b
%ghost %{catrustdir}/extracted/openssl/%{openssl_format_trust_bundle}
77503b
%ghost %{catrustdir}/extracted/%{java_bundle}
77503b
%ghost %{catrustdir}/extracted/edk2/cacerts.bin
77503b
77503b
77503b
%changelog
77503b
* Mon Nov 1 2021 Bob Relyea <rrelyea@redhat.com> - 2020.2.50-94
77503b
- remove blacklist directory and references now that p11-kit has been updated.
77503b
77503b
* Mon Aug 09 2021 Mohan Boddu <mboddu@redhat.com> - 2020.2.50-93
77503b
- Rebuilt for IMA sigs, glibc 2.34, aarch64 flags
77503b
  Related: rhbz#1991688
77503b
77503b
* Tue Jun 22 2021 Mohan Boddu <mboddu@redhat.com> - 2020.2.50-92
77503b
- Rebuilt for RHEL 9 BETA for openssl 3.0
77503b
  Related: rhbz#1971065
77503b
77503b
* Wed Jun 16 2021 Bob Relyea <rrelyea@redhat.com> - 2020.2.50-90
77503b
-   Update to CKBI 2.50 from NSS 3.67
77503b
-      Removing:
77503b
-       # Certificate "QuoVadis Root CA"
77503b
-       # Certificate "Sonera Class 2 Root CA"
77503b
-       # Certificate "Trustis FPS Root CA"
77503b
-      Adding:
77503b
-       # Certificate "GLOBALTRUST 2020"
77503b
-       # Certificate "ANF Secure Server Root CA"
77503b
-       # Certificate "Certum EC-384 CA"
77503b
-       # Certificate "Certum Trusted Root CA"
77503b
77503b
* Thu Apr 15 2021 Mohan Boddu <mboddu@redhat.com> - 2020.2.41-8
77503b
- Rebuilt for RHEL 9 BETA on Apr 15th 2021. Related: rhbz#1947937
77503b
77503b
* Tue Jan 26 2021 Fedora Release Engineering <releng@fedoraproject.org> - 2020.2.41-7
77503b
- Rebuilt for https://fedoraproject.org/wiki/Fedora_34_Mass_Rebuild
77503b
77503b
* Wed Jan 13 2021 Bob Relyea <rrelyea@redhat.com> - 2020.2.41-6
77503b
- remove unnecessarily divisive terms, take 1.
77503b
-   in ca-certificates there are 3 cases:
77503b
-   1) master refering to the fedora master branch in the fetch.sh script.
77503b
-      This can only be changed once fedora changes the master branch name.
77503b
-   2) a reference to the 'master bundle' in this file: this has been changed
77503b
-      to 'primary bundle'.
77503b
-   3) a couple of blacklist directories owned by this package, but used to
77503b
-      p11-kit. New 'blocklist' directories have been created, but p11-kit
77503b
-      needs to be updated before the old blacklist directories can be removed
77503b
-      and the man pages corrected.
77503b
77503b
* Mon Nov 09 2020 Christian Heimes <cheimes@redhat.com> - 2020.2.41-5
77503b
- Add cross-distro compatibility symlinks to /etc/ssl (rhbz#1895619)
77503b
77503b
* Mon Jul 27 2020 Fedora Release Engineering <releng@fedoraproject.org> - 2020.2.41-4
77503b
- Rebuilt for https://fedoraproject.org/wiki/Fedora_33_Mass_Rebuild
77503b
77503b
* Tue Jun 16 2020 Adam Williamson <awilliam@redhat.com> - 2020.2.41-3
77503b
- Fix up broken %post and %postinstall scriptlet changes from -2
77503b
77503b
* Wed Jun 10 2020 Bob Relyea <rrelyea@redhat.com> - 2020.2.41-2
77503b
- Update to CKBI 2.41 from NSS 3.53.0
77503b
-    Removing:
77503b
-     # Certificate "AddTrust Low-Value Services Root"
77503b
-     # Certificate "AddTrust External Root"
77503b
-     # Certificate "Staat der Nederlanden Root CA - G2"
77503b
77503b
* Tue Jan 28 2020 Daiki Ueno <dueno@redhat.com> - 2020.2.40-3
77503b
- Update versioned dependency on p11-kit
77503b
77503b
* Wed Jan 22 2020 Daiki Ueno <dueno@redhat.com> - 2020.2.40-2
77503b
- Update to CKBI 2.40 from NSS 3.48
77503b
-    Removing:
77503b
-     # Certificate "UTN USERFirst Email Root CA"
77503b
-     # Certificate "Certplus Class 2 Primary CA"
77503b
-     # Certificate "Deutsche Telekom Root CA 2"
77503b
-     # Certificate "Swisscom Root CA 2"
77503b
-     # Certificate "Certinomis - Root CA"
77503b
-    Adding:
77503b
-     # Certificate "Entrust Root Certification Authority - G4"
77503b
- certdata2pem.py: emit flags for CKA_NSS_{SERVER,EMAIL}_DISTRUST_AFTER
77503b
77503b
* Wed Jul 24 2019 Fedora Release Engineering <releng@fedoraproject.org> - 2019.2.32-3
77503b
- Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild
77503b
77503b
* Wed Jun 19 2019 Bob Relyea <rrelyea@redhat.com> 2019.2.32-2
77503b
 - Update to CKBI 2.32 from NSS 3.44
77503b
   Removing: 
77503b
    # Certificate "Visa eCommerce Root"
77503b
    # Certificate "AC Raiz Certicamara S.A."
77503b
    # Certificate "Certplus Root CA G1"
77503b
    # Certificate "Certplus Root CA G2"
77503b
    # Certificate "OpenTrust Root CA G1"
77503b
    # Certificate "OpenTrust Root CA G2"
77503b
    # Certificate "OpenTrust Root CA G3"
77503b
   Adding: 
77503b
    # Certificate "GTS Root R1"
77503b
    # Certificate "GTS Root R2"
77503b
    # Certificate "GTS Root R3"
77503b
    # Certificate "GTS Root R4"
77503b
    # Certificate "UCA Global G2 Root"
77503b
    # Certificate "UCA Extended Validation Root"
77503b
    # Certificate "Certigna Root CA"
77503b
    # Certificate "emSign Root CA - G1"
77503b
    # Certificate "emSign ECC Root CA - G3"
77503b
    # Certificate "emSign Root CA - C1"
77503b
    # Certificate "emSign ECC Root CA - C3"
77503b
    # Certificate "Hongkong Post Root CA 3"
77503b
77503b
* Thu Jan 31 2019 Fedora Release Engineering <releng@fedoraproject.org> - 2018.2.26-3
77503b
- Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild
77503b
77503b
* Mon Sep 24 2018 Bob Relyea <rrelyea@redhat.com> - 2018.2.26-2
77503b
- Update to CKBI 2.26 from NSS 3.39
77503b
77503b
* Thu Jul 12 2018 Fedora Release Engineering <releng@fedoraproject.org> - 2018.2.24-6
77503b
- Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild
77503b
77503b
* Thu Jun 28 2018 Kai Engert <kaie@redhat.com> - 2018.2.24-5
77503b
- Ported scripts to python3
77503b
77503b
* Mon Jun 11 2018 Daiki Ueno <dueno@redhat.com> - 2018.2.24-4
77503b
- Extract certificate bundle in EDK2 format, suggested by Laszlo Ersek
77503b
77503b
* Mon Jun 04 2018 Kai Engert <kaie@redhat.com> - 2018.2.24-3
77503b
- Adjust ghost file permissions, rhbz#1564432
77503b
77503b
* Fri May 18 2018 Kai Engert <kaie@redhat.com> - 2018.2.24-2
77503b
- Update to CKBI 2.24 from NSS 3.37
77503b
77503b
* Wed Mar 14 2018 Iryna Shcherbina <ishcherb@redhat.com> - 2018.2.22-4
77503b
- Update Python 2 dependency declarations to new packaging standards
77503b
  (See https://fedoraproject.org/wiki/FinalizingFedoraSwitchtoPython3)
77503b
77503b
* Fri Feb 23 2018 Patrick Uiterwijk <puiterwijk@redhat.com> - 2018.2.22-3
77503b
- Add post dep on coreutils for ln(1)
77503b
77503b
* Tue Feb 06 2018 Kai Engert <kaie@redhat.com> - 2018.2.22-2
77503b
- Update to CKBI 2.22 from NSS 3.35
77503b
77503b
* Mon Jan 22 2018 Kai Engert <kaie@redhat.com> - 2017.2.20-6
77503b
- Depend on bash, grep, sed. Required for ca-legacy script execution.
77503b
- p11-kit is already required at %%post execution time. (rhbz#1537127)
77503b
77503b
* Fri Jan 19 2018 Kai Engert <kaie@redhat.com> - 2017.2.20-5
77503b
- Use the force, script! (Which sln did by default).
77503b
77503b
* Fri Jan 19 2018 Kai Engert <kaie@redhat.com> - 2017.2.20-4
77503b
- stop using sln in ca-legacy script.
77503b
77503b
* Fri Jan 19 2018 Kai Engert <kaie@redhat.com> - 2017.2.20-3
77503b
- Use ln -s, because sln was removed from glibc. rhbz#1536349
77503b
77503b
* Mon Nov 27 2017 Kai Engert <kaie@redhat.com> - 2017.2.20-2
77503b
- Update to CKBI 2.20 from NSS 3.34.1
77503b
77503b
* Tue Aug 15 2017 Kai Engert <kaie@redhat.com> - 2017.2.16-4
77503b
- Set P11_KIT_NO_USER_CONFIG=1 to prevent p11-kit from reading user
77503b
  configuration files (rhbz#1478172).
77503b
77503b
* Wed Jul 26 2017 Fedora Release Engineering <releng@fedoraproject.org> - 2017.2.16-3
77503b
- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild
77503b
77503b
* Wed Jul 19 2017 Kai Engert <kaie@redhat.com> - 2017.2.16-2
77503b
- Update to (yet unreleased) CKBI 2.16 which is planned for NSS 3.32.
77503b
  Mozilla removed all trust bits for code signing.
77503b
77503b
* Wed Apr 26 2017 Kai Engert <kaie@redhat.com> - 2017.2.14-2
77503b
- Update to CKBI 2.14 from NSS 3.30.2
77503b
77503b
* Thu Feb 23 2017 Kai Engert <kaie@redhat.com> - 2017.2.11-5
77503b
- For CAs trusted by Mozilla, set attribute nss-mozilla-ca-policy: true
77503b
- Set attribute modifiable: false
77503b
- Require p11-kit 0.23.4
77503b
77503b
* Mon Feb 13 2017 Kai Engert <kaie@redhat.com> - 2017.2.11-4
77503b
- Changed the packaged bundle to use the flexible p11-kit-object-v1 file format,
77503b
  as a preparation to fix bugs in the interaction between p11-kit-trust and
77503b
  Mozilla applications, such as Firefox, Thunderbird etc.
77503b
- Changed update-ca-trust to add comments to extracted PEM format files.
77503b
- Added an utility to help with comparing output of the trust dump command.
77503b
77503b
* Fri Feb 10 2017 Fedora Release Engineering <releng@fedoraproject.org> - 2017.2.11-3
77503b
- Rebuilt for https://fedoraproject.org/wiki/Fedora_26_Mass_Rebuild
77503b
77503b
* Wed Jan 11 2017 Kai Engert <kaie@redhat.com> - 2017.2.11-2
77503b
- Update to CKBI 2.11 from NSS 3.28.1
77503b
77503b
* Thu Sep 29 2016 Kai Engert <kaie@redhat.com> - 2016.2.10-2
77503b
- Update to CKBI 2.10 from NSS 3.27
77503b
77503b
* Tue Aug 16 2016 Kai Engert <kaie@redhat.com> - 2016.2.9-3
77503b
- Revert to the unmodified upstream CA list, changing the legacy trust
77503b
  to an empty list. Keeping the ca-legacy tool and existing config,
77503b
  however, the configuration has no effect after this change.
77503b
77503b
* Tue Aug 16 2016 Kai Engert <kaie@redhat.com> - 2016.2.9-2
77503b
- Update to CKBI 2.9 from NSS 3.26 with legacy modifications
77503b
77503b
* Fri Jul 15 2016 Kai Engert <kaie@redhat.com> - 2016.2.8-2
77503b
- Update to CKBI 2.8 from NSS 3.25 with legacy modifications
77503b
77503b
* Tue May 10 2016 Kai Engert <kaie@redhat.com> - 2016.2.7-5
77503b
- Only create backup files if there is an original file (bug 999017).
77503b
77503b
* Tue May 10 2016 Kai Engert <kaie@redhat.com> - 2016.2.7-4
77503b
- Use sln, not ln, to avoid the dependency on coreutils.
77503b
77503b
* Mon Apr 25 2016 Kai Engert <kaie@redhat.com> - 2016.2.7-3
77503b
- Fix typos in a manual page and in a README file.
77503b
77503b
* Wed Mar 16 2016 Kai Engert <kaie@redhat.com> - 2016.2.7-2
77503b
- Update to CKBI 2.7 from NSS 3.23 with legacy modifications
77503b
77503b
* Wed Feb 03 2016 Fedora Release Engineering <releng@fedoraproject.org> - 2015.2.6-3
77503b
- Rebuilt for https://fedoraproject.org/wiki/Fedora_24_Mass_Rebuild
77503b
77503b
* Mon Nov 23 2015 Kai Engert <kaie@redhat.com> - 2015.2.6-2
77503b
- Update to CKBI 2.6 from NSS 3.21 with legacy modifications
77503b
77503b
* Thu Aug 13 2015 Kai Engert <kaie@redhat.com> - 2015.2.5-2
77503b
- Update to CKBI 2.5 from NSS 3.19.3 with legacy modifications
77503b
77503b
* Wed Jun 17 2015 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2015.2.4-3
77503b
- Rebuilt for https://fedoraproject.org/wiki/Fedora_23_Mass_Rebuild
77503b
77503b
* Tue May 05 2015 Kai Engert <kaie@redhat.com> - 2015.2.4-2
77503b
- Update to CKBI 2.4 from NSS 3.18.1 with legacy modifications
77503b
77503b
* Tue May 05 2015 Kai Engert <kaie@redhat.com> - 2015.2.3-4
77503b
- Fixed a typo in the ca-legacy manual page.
77503b
77503b
* Tue Mar 31 2015 Kai Engert <kaie@redhat.com> - 2015.2.3-3
77503b
- Don't use "enable" as a value for the legacy configuration, instead
77503b
  of the value "default", to make it clear that this preference isn't
77503b
  a promise to keep certificates enabled, but rather that we only
77503b
  keep them enabled as long as it's considered necessary.
77503b
- Changed the configuration file, the ca-legacy utility and filenames
77503b
  to use the term "default" (instead of the term "enable").
77503b
- Added a manual page for the ca-legacy utility.
77503b
- Fixed the ca-legacy utility to handle absence of the configuration
77503b
  setting and treat absence as the default setting.
77503b
77503b
* Fri Mar 20 2015 Kai Engert <kaie@redhat.com> - 2015.2.3-2
77503b
- Update to CKBI 2.3 from NSS 3.18 with legacy modifications
77503b
- Fixed a mistake in the legacy handling of the upstream 2.2 release:
77503b
  Removed two AOL certificates from the legacy group, because
77503b
  upstream didn't remove them as part of phasing out 1024-bit
77503b
  certificates, which means it isn't necessary to keep them.
77503b
- Fixed a mistake in the legacy handling of the upstream 2.1 release:
77503b
  Moved two NetLock certificates into the legacy group.
77503b
77503b
* Tue Dec 16 2014 Kai Engert <kaie@redhat.com> - 2014.2.2-2
77503b
- Update to CKBI 2.2 from NSS 3.17.3 with legacy modifications
77503b
- Update project URL
77503b
- Cleanup
77503b
77503b
* Sat Nov 15 2014 Peter Lemenkov <lemenkov@gmail.com> - 2014.2.1-7
77503b
- Restore Requires: coreutils
77503b
77503b
* Fri Nov 14 2014 Peter Lemenkov <lemenkov@gmail.com> - 2014.2.1-6
77503b
- A proper fix for rhbz#1158343
77503b
77503b
* Wed Oct 29 2014 Kai Engert <kaie@redhat.com> - 2014.2.1-5
77503b
- add Requires: coreutils (rhbz#1158343)
77503b
77503b
* Tue Oct 28 2014 Kai Engert <kaie@redhat.com> - 2014.2.1-4
77503b
- Introduce the ca-legacy utility and a ca-legacy.conf configuration file.
77503b
  By default, legacy roots required for OpenSSL/GnuTLS compatibility
77503b
  are kept enabled. Using the ca-legacy utility, the legacy roots can be
77503b
  disabled. If disabled, the system will use the trust set as provided
77503b
  by the upstream Mozilla CA list. (See also: rhbz#1158197)
77503b
77503b
* Sun Sep 21 2014 Kai Engert <kaie@redhat.com> - 2014.2.1-3
77503b
- Temporarily re-enable several legacy root CA certificates because of
77503b
  compatibility issues with software based on OpenSSL/GnuTLS,
77503b
  see rhbz#1144808
77503b
77503b
* Thu Aug 14 2014 Kai Engert <kaie@redhat.com> - 2014.2.1-2
77503b
- Update to CKBI 2.1 from NSS 3.16.4
77503b
- Fix rhbz#1130226
77503b
77503b
* Sat Jun 07 2014 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2013.1.97-3
77503b
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
77503b
77503b
* Wed Mar 19 2014 Kai Engert <kaie@redhat.com> - 2013.1.97-2
77503b
- Update to CKBI 1.97 from NSS 3.16
77503b
77503b
* Mon Feb 10 2014 Kai Engert <kaie@redhat.com> - 2013.1.96-3
77503b
- Remove openjdk build dependency
77503b
77503b
* Sat Jan 25 2014 Ville Skyttä <ville.skytta@iki.fi> - 2013.1.96-2
77503b
- Own the %%{_datadir}/pki dir.
77503b
77503b
* Thu Jan 09 2014 Kai Engert <kaie@redhat.com> - 2013.1.96-1
77503b
- Update to CKBI 1.96 from NSS 3.15.4
77503b
77503b
* Tue Dec 17 2013 Kai Engert <kaie@redhat.com> - 2013.1.95-1
77503b
- Update to CKBI 1.95 from NSS 3.15.3.1
77503b
77503b
* Fri Sep 06 2013 Kai Engert <kaie@redhat.com> - 2013.1.94-18
77503b
- Update the Entrust root stapled extension for compatibility with 
77503b
  p11-kit version 0.19.2, patch by Stef Walter, rhbz#988745
77503b
77503b
* Tue Sep 03 2013 Kai Engert <kaie@redhat.com> - 2013.1.94-17
77503b
- merge manual improvement from f19
77503b
77503b
* Sat Aug 03 2013 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2013.1.94-16
77503b
- Rebuilt for https://fedoraproject.org/wiki/Fedora_20_Mass_Rebuild
77503b
77503b
* Tue Jul 09 2013 Kai Engert <kaie@redhat.com> - 2013.1.94-15
77503b
- clarification updates to manual page
77503b
77503b
* Mon Jul 08 2013 Kai Engert <kaie@redhat.com> - 2013.1.94-14
77503b
- added a manual page and related build requirements
77503b
- simplify the README files now that we have a manual page
77503b
- set a certificate alias in trusted bundle (thanks to Ludwig Nussel)
77503b
77503b
* Mon May 27 2013 Kai Engert <kaie@redhat.com> - 2013.1.94-13
77503b
- use correct command in README files, rhbz#961809
77503b
77503b
* Mon May 27 2013 Kai Engert <kaie@redhat.com> - 2013.1.94-12
77503b
- update to version 1.94 provided by NSS 3.15 (beta)
77503b
77503b
* Mon Apr 22 2013 Kai Engert <kaie@redhat.com> - 2012.87-12
77503b
- Use both label and serial to identify cert during conversion, rhbz#927601
77503b
- Add myself as contributor to certdata2.pem.py and remove use of rcs/ident.
77503b
  (thanks to Michael Shuler for suggesting to do so)
77503b
- Update source URLs and comments, add source file for version information.
77503b
77503b
* Tue Mar 19 2013 Kai Engert <kaie@redhat.com> - 2012.87-11
77503b
- adjust to changed and new functionality provided by p11-kit 0.17.3
77503b
- updated READMEs to describe the new directory-specific treatment of files
77503b
- ship a new file that contains certificates with neutral trust
77503b
- ship a new file that contains distrust objects, and also staple a 
77503b
  basic constraint extension to one legacy root contained in the
77503b
  Mozilla CA list
77503b
- adjust the build script to dynamically produce most of above files
77503b
- add and own the anchors and blacklist subdirectories
77503b
- file generate-cacerts.pl is no longer required
77503b
77503b
* Fri Mar 08 2013 Kai Engert <kaie@redhat.com> - 2012.87-9
77503b
- Major rework for the Fedora SharedSystemCertificates feature.
77503b
- Only ship a PEM bundle file using the BEGIN TRUSTED CERTIFICATE file format.
77503b
- Require the p11-kit package that contains tools to automatically create
77503b
  other file format bundles.
77503b
- Convert old file locations to symbolic links that point to dynamically
77503b
  generated files.
77503b
- Old files, which might have been locally modified, will be saved in backup 
77503b
  files with .rpmsave extension.
77503b
- Added a update-ca-certificates script which can be used to regenerate
77503b
  the merged trusted output.
77503b
- Refer to the various README files that have been added for more detailed
77503b
  explanation of the new system.
77503b
- No longer require rsc for building.
77503b
- Add explanation for the future version numbering scheme,
77503b
  because the old numbering scheme was based on upstream using cvs,
77503b
  which is no longer true, and therefore can no longer be used.
77503b
- Includes changes from rhbz#873369.
77503b
77503b
* Thu Mar 07 2013 Kai Engert <kaie@redhat.com> - 2012.87-2.fc19.1
77503b
- Ship trust bundle file in /usr/share/pki/ca-trust-source/, temporarily in addition.
77503b
  This location will soon become the only place containing this file.
77503b
77503b
* Wed Feb 13 2013 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2012.87-2
77503b
- Rebuilt for https://fedoraproject.org/wiki/Fedora_19_Mass_Rebuild
77503b
77503b
* Fri Jan 04 2013 Paul Wouters <pwouters@redhat.com> - 2012.87-1
77503b
- Updated to r1.87 to blacklist mis-issued turktrust CA certs
77503b
77503b
* Wed Oct 24 2012 Paul Wouters <pwouters@redhat.com> - 2012.86-2
77503b
- Updated blacklist with 20 entries (Diginotar, Trustwave, Comodo(?)
77503b
- Fix to certdata2pem.py to also check for CKT_NSS_NOT_TRUSTED 
77503b
77503b
* Tue Oct 23 2012 Paul Wouters <pwouters@redhat.com> - 2012.86-1
77503b
- update to r1.86
77503b
77503b
* Mon Jul 23 2012 Joe Orton <jorton@redhat.com> - 2012.85-2
77503b
- add openssl to BuildRequires
77503b
77503b
* Mon Jul 23 2012 Joe Orton <jorton@redhat.com> - 2012.85-1
77503b
- update to r1.85
77503b
77503b
* Wed Jul 18 2012 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2012.81-2
77503b
- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild
77503b
77503b
* Mon Feb 13 2012 Joe Orton <jorton@redhat.com> - 2012.81-1
77503b
- update to r1.81
77503b
77503b
* Thu Jan 12 2012 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2011.80-2
77503b
- Rebuilt for https://fedoraproject.org/wiki/Fedora_17_Mass_Rebuild
77503b
77503b
* Wed Nov  9 2011 Joe Orton <jorton@redhat.com> - 2011.80-1
77503b
- update to r1.80
77503b
- fix handling of certs with dublicate Subject names (#733032)
77503b
77503b
* Thu Sep  1 2011 Joe Orton <jorton@redhat.com> - 2011.78-1
77503b
- update to r1.78, removing trust from DigiNotar root (#734679)
77503b
77503b
* Wed Aug  3 2011 Joe Orton <jorton@redhat.com> - 2011.75-1
77503b
- update to r1.75
77503b
77503b
* Wed Apr 20 2011 Joe Orton <jorton@redhat.com> - 2011.74-1
77503b
- update to r1.74
77503b
77503b
* Tue Feb 08 2011 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2011.70-2
77503b
- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild
77503b
77503b
* Wed Jan 12 2011 Joe Orton <jorton@redhat.com> - 2011.70-1
77503b
- update to r1.70
77503b
77503b
* Tue Nov  9 2010 Joe Orton <jorton@redhat.com> - 2010.65-3
77503b
- update to r1.65
77503b
77503b
* Wed Apr  7 2010 Joe Orton <jorton@redhat.com> - 2010.63-3
77503b
- package /etc/ssl/certs symlink for third-party apps (#572725)
77503b
77503b
* Wed Apr  7 2010 Joe Orton <jorton@redhat.com> - 2010.63-2
77503b
- rebuild
77503b
77503b
* Wed Apr  7 2010 Joe Orton <jorton@redhat.com> - 2010.63-1
77503b
- update to certdata.txt r1.63
77503b
- use upstream RCS version in Version
77503b
77503b
* Fri Mar 19 2010 Joe Orton <jorton@redhat.com> - 2010-4
77503b
- fix ca-bundle.crt (#575111)
77503b
77503b
* Thu Mar 18 2010 Joe Orton <jorton@redhat.com> - 2010-3
77503b
- update to certdata.txt r1.58
77503b
- add /etc/pki/tls/certs/ca-bundle.trust.crt using 'TRUSTED CERTICATE' format
77503b
- exclude ECC certs from the Java cacerts database
77503b
- catch keytool failures
77503b
- fail parsing certdata.txt on finding untrusted but not blacklisted cert
77503b
77503b
* Fri Jan 15 2010 Joe Orton <jorton@redhat.com> - 2010-2
77503b
- fix Java cacert database generation: use Subject rather than Issuer
77503b
  for alias name; add diagnostics; fix some alias names.
77503b
77503b
* Mon Jan 11 2010 Joe Orton <jorton@redhat.com> - 2010-1
77503b
- adopt Python certdata.txt parsing script from Debian
77503b
77503b
* Fri Jul 24 2009 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2009-2
77503b
- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild
77503b
77503b
* Wed Jul 22 2009 Joe Orton <jorton@redhat.com> 2009-1
77503b
- update to certdata.txt r1.53
77503b
77503b
* Mon Feb 23 2009 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2008-8
77503b
- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild
77503b
77503b
* Tue Oct 14 2008 Joe Orton <jorton@redhat.com> 2008-7
77503b
- update to certdata.txt r1.49
77503b
77503b
* Wed Jun 25 2008 Thomas Fitzsimmons <fitzsim@redhat.com> - 2008-6
77503b
- Change generate-cacerts.pl to produce pretty aliases.
77503b
77503b
* Mon Jun  2 2008 Joe Orton <jorton@redhat.com> 2008-5
77503b
- include /etc/pki/tls/cert.pem symlink to ca-bundle.crt
77503b
77503b
* Tue May 27 2008 Joe Orton <jorton@redhat.com> 2008-4
77503b
- use package name for temp dir, recreate it in prep
77503b
77503b
* Tue May 27 2008 Joe Orton <jorton@redhat.com> 2008-3
77503b
- fix source script perms
77503b
- mark packaged files as config(noreplace)
77503b
77503b
* Tue May 27 2008 Joe Orton <jorton@redhat.com> 2008-2
77503b
- add (but don't use) mkcabundle.pl
77503b
- tweak description
77503b
- use /usr/bin/keytool directly; BR java-openjdk
77503b
77503b
* Tue May 27 2008 Joe Orton <jorton@redhat.com> 2008-1
77503b
- Initial build (#448497)