6cf4d9
%define pkidir %{_sysconfdir}/pki
6cf4d9
%define catrustdir %{_sysconfdir}/pki/ca-trust
6cf4d9
%define classic_tls_bundle ca-bundle.crt
6cf4d9
%define openssl_format_trust_bundle ca-bundle.trust.crt
6cf4d9
%define p11_format_bundle ca-bundle.trust.p11-kit
6cf4d9
%define legacy_default_bundle ca-bundle.legacy.default.crt
6cf4d9
%define legacy_disable_bundle ca-bundle.legacy.disable.crt
6cf4d9
%define java_bundle java/cacerts
6cf4d9
6cf4d9
Summary: The Mozilla CA root certificate bundle
6cf4d9
Name: ca-certificates
6cf4d9
6cf4d9
# For the package version number, we use: year.{upstream version}
6cf4d9
#
6cf4d9
# The {upstream version} can be found as symbol
6cf4d9
# NSS_BUILTINS_LIBRARY_VERSION in file nss/lib/ckfw/builtins/nssckbi.h
6cf4d9
# which corresponds to the data in file nss/lib/ckfw/builtins/certdata.txt.
6cf4d9
#
6cf4d9
# The files should be taken from a released version of NSS, as published
6cf4d9
# at https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/
6cf4d9
#
6cf4d9
# The versions that are used by the latest released version of 
6cf4d9
# Mozilla Firefox should be available from:
6cf4d9
# https://hg.mozilla.org/releases/mozilla-release/raw-file/default/security/nss/lib/ckfw/builtins/nssckbi.h
6cf4d9
# https://hg.mozilla.org/releases/mozilla-release/raw-file/default/security/nss/lib/ckfw/builtins/certdata.txt
6cf4d9
#
6cf4d9
# The most recent development versions of the files can be found at
6cf4d9
# http://hg.mozilla.org/projects/nss/raw-file/default/lib/ckfw/builtins/nssckbi.h
6cf4d9
# http://hg.mozilla.org/projects/nss/raw-file/default/lib/ckfw/builtins/certdata.txt
6cf4d9
# (but these files might have not yet been released).
6cf4d9
#
6cf4d9
# (until 2012.87 the version was based on the cvs revision ID of certdata.txt,
6cf4d9
# but in 2013 the NSS projected was migrated to HG. Old version 2012.87 is 
6cf4d9
# equivalent to new version 2012.1.93, which would break the requirement 
6cf4d9
# to have increasing version numbers. However, the new scheme will work, 
6cf4d9
# because all future versions will start with 2013 or larger.)
6cf4d9
b8a5d2
Version: 2022.2.54
6cf4d9
# for y-stream, please always use 91 <= release  < 100 (91,92,93)
6cf4d9
# for z-stream release branches, please use 90 <= release  < 91 (90.0, 90.1, ...)
b8a5d2
Release: 90.2%{?dist}
6cf4d9
License: Public Domain
6cf4d9
6cf4d9
URL: https://fedoraproject.org/wiki/CA-Certificates
6cf4d9
6cf4d9
#Please always update both certdata.txt and nssckbi.h
6cf4d9
Source0: certdata.txt
6cf4d9
Source1: nssckbi.h
6cf4d9
Source2: update-ca-trust
6cf4d9
Source3: trust-fixes
6cf4d9
Source4: certdata2pem.py
6cf4d9
Source5: ca-legacy.conf
6cf4d9
Source6: ca-legacy
6cf4d9
Source9: ca-legacy.8.txt
6cf4d9
Source10: update-ca-trust.8.txt
6cf4d9
Source11: README.usr
6cf4d9
Source12: README.etc
6cf4d9
Source13: README.extr
6cf4d9
Source14: README.java
6cf4d9
Source15: README.openssl
6cf4d9
Source16: README.pem
6cf4d9
Source17: README.edk2
6cf4d9
Source18: README.src
6cf4d9
6cf4d9
BuildArch: noarch
6cf4d9
6cf4d9
Requires(post): bash
6cf4d9
Requires(post): grep
6cf4d9
Requires(post): sed
6cf4d9
Requires(post): coreutils
6cf4d9
Requires: bash
6cf4d9
Requires: grep
6cf4d9
Requires: sed
5c5864
Requires(post): p11-kit >= 0.24
5c5864
Requires(post): p11-kit-trust >= 0.24
5c5864
Requires: p11-kit >= 0.24
5c5864
Requires: p11-kit-trust >= 0.24
6cf4d9
6cf4d9
BuildRequires: perl-interpreter
6cf4d9
BuildRequires: python3
6cf4d9
BuildRequires: openssl
6cf4d9
BuildRequires: asciidoc
6cf4d9
BuildRequires: libxslt
6cf4d9
6cf4d9
%description
6cf4d9
This package contains the set of CA certificates chosen by the
6cf4d9
Mozilla Foundation for use with the Internet PKI.
6cf4d9
6cf4d9
%prep
6cf4d9
rm -rf %{name}
6cf4d9
mkdir %{name}
6cf4d9
mkdir %{name}/certs
6cf4d9
mkdir %{name}/certs/legacy-default
6cf4d9
mkdir %{name}/certs/legacy-disable
6cf4d9
mkdir %{name}/java
6cf4d9
6cf4d9
%build
6cf4d9
pushd %{name}/certs
6cf4d9
 pwd
6cf4d9
 cp %{SOURCE0} .
6cf4d9
 python3 %{SOURCE4} >c2p.log 2>c2p.err
6cf4d9
popd
6cf4d9
pushd %{name}
6cf4d9
 (
6cf4d9
   cat <
6cf4d9
# This is a bundle of X.509 certificates of public Certificate
6cf4d9
# Authorities.  It was generated from the Mozilla root CA list.
6cf4d9
# These certificates and trust/distrust attributes use the file format accepted
6cf4d9
# by the p11-kit-trust module.
6cf4d9
#
6cf4d9
# Source: nss/lib/ckfw/builtins/certdata.txt
6cf4d9
# Source: nss/lib/ckfw/builtins/nssckbi.h
6cf4d9
#
6cf4d9
# Generated from:
6cf4d9
EOF
6cf4d9
   cat %{SOURCE1}  |grep -w NSS_BUILTINS_LIBRARY_VERSION | awk '{print "# " $2 " " $3}';
6cf4d9
   echo '#';
6cf4d9
 ) > %{p11_format_bundle}
6cf4d9
6cf4d9
 touch %{legacy_default_bundle}
6cf4d9
 NUM_LEGACY_DEFAULT=`find certs/legacy-default -type f | wc -l`
6cf4d9
 if [ $NUM_LEGACY_DEFAULT -ne 0 ]; then
6cf4d9
     for f in certs/legacy-default/*.crt; do 
6cf4d9
       echo "processing $f"
6cf4d9
       tbits=`sed -n '/^# openssl-trust/{s/^.*=//;p;}' $f`
6cf4d9
       alias=`sed -n '/^# alias=/{s/^.*=//;p;q;}' $f | sed "s/'//g" | sed 's/"//g'`
6cf4d9
       targs=""
6cf4d9
       if [ -n "$tbits" ]; then
6cf4d9
          for t in $tbits; do
6cf4d9
             targs="${targs} -addtrust $t"
6cf4d9
          done
6cf4d9
       fi
6cf4d9
       if [ -n "$targs" ]; then
6cf4d9
          echo "legacy default flags $targs for $f" >> info.trust
6cf4d9
          openssl x509 -text -in "$f" -trustout $targs -setalias "$alias" >> %{legacy_default_bundle}
6cf4d9
       fi
6cf4d9
     done
6cf4d9
 fi
6cf4d9
6cf4d9
 touch %{legacy_disable_bundle}
6cf4d9
 NUM_LEGACY_DISABLE=`find certs/legacy-disable -type f | wc -l`
6cf4d9
 if [ $NUM_LEGACY_DISABLE -ne 0 ]; then
6cf4d9
     for f in certs/legacy-disable/*.crt; do 
6cf4d9
       echo "processing $f"
6cf4d9
       tbits=`sed -n '/^# openssl-trust/{s/^.*=//;p;}' $f`
6cf4d9
       alias=`sed -n '/^# alias=/{s/^.*=//;p;q;}' $f | sed "s/'//g" | sed 's/"//g'`
6cf4d9
       targs=""
6cf4d9
       if [ -n "$tbits" ]; then
6cf4d9
          for t in $tbits; do
6cf4d9
             targs="${targs} -addtrust $t"
6cf4d9
          done
6cf4d9
       fi
6cf4d9
       if [ -n "$targs" ]; then
6cf4d9
          echo "legacy disable flags $targs for $f" >> info.trust
6cf4d9
          openssl x509 -text -in "$f" -trustout $targs -setalias "$alias" >> %{legacy_disable_bundle}
6cf4d9
       fi
6cf4d9
     done
6cf4d9
 fi
6cf4d9
6cf4d9
 P11FILES=`find certs -name \*.tmp-p11-kit | wc -l`
6cf4d9
 if [ $P11FILES -ne 0 ]; then
6cf4d9
   for p in certs/*.tmp-p11-kit; do 
6cf4d9
     cat "$p" >> %{p11_format_bundle}
6cf4d9
   done
6cf4d9
 fi
6cf4d9
 # Append our trust fixes
6cf4d9
 cat %{SOURCE3} >> %{p11_format_bundle}
6cf4d9
popd
6cf4d9
6cf4d9
#manpage
6cf4d9
cp %{SOURCE10} %{name}/update-ca-trust.8.txt
6cf4d9
asciidoc.py -v -d manpage -b docbook %{name}/update-ca-trust.8.txt
6cf4d9
xsltproc --nonet -o %{name}/update-ca-trust.8 /usr/share/asciidoc/docbook-xsl/manpage.xsl %{name}/update-ca-trust.8.xml
6cf4d9
6cf4d9
cp %{SOURCE9} %{name}/ca-legacy.8.txt
6cf4d9
asciidoc.py -v -d manpage -b docbook %{name}/ca-legacy.8.txt
6cf4d9
xsltproc --nonet -o %{name}/ca-legacy.8 /usr/share/asciidoc/docbook-xsl/manpage.xsl %{name}/ca-legacy.8.xml
6cf4d9
6cf4d9
6cf4d9
%install
6cf4d9
rm -rf $RPM_BUILD_ROOT
6cf4d9
mkdir -p -m 755 $RPM_BUILD_ROOT%{pkidir}/tls/certs
6cf4d9
mkdir -p -m 755 $RPM_BUILD_ROOT%{pkidir}/java
6cf4d9
mkdir -p -m 755 $RPM_BUILD_ROOT%{_sysconfdir}/ssl
6cf4d9
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/source
6cf4d9
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/source/anchors
6cf4d9
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/source/blocklist
6cf4d9
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/extracted
6cf4d9
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/extracted/pem
6cf4d9
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/extracted/openssl
6cf4d9
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/extracted/java
6cf4d9
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/extracted/edk2
6cf4d9
mkdir -p -m 755 $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-source
6cf4d9
mkdir -p -m 755 $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-source/anchors
6cf4d9
mkdir -p -m 755 $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-source/blocklist
6cf4d9
mkdir -p -m 755 $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-legacy
6cf4d9
mkdir -p -m 755 $RPM_BUILD_ROOT%{_bindir}
6cf4d9
mkdir -p -m 755 $RPM_BUILD_ROOT%{_mandir}/man8
6cf4d9
6cf4d9
install -p -m 644 %{name}/update-ca-trust.8 $RPM_BUILD_ROOT%{_mandir}/man8
6cf4d9
install -p -m 644 %{name}/ca-legacy.8 $RPM_BUILD_ROOT%{_mandir}/man8
6cf4d9
install -p -m 644 %{SOURCE11} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-source/README
6cf4d9
install -p -m 644 %{SOURCE12} $RPM_BUILD_ROOT%{catrustdir}/README
6cf4d9
install -p -m 644 %{SOURCE13} $RPM_BUILD_ROOT%{catrustdir}/extracted/README
6cf4d9
install -p -m 644 %{SOURCE14} $RPM_BUILD_ROOT%{catrustdir}/extracted/java/README
6cf4d9
install -p -m 644 %{SOURCE15} $RPM_BUILD_ROOT%{catrustdir}/extracted/openssl/README
6cf4d9
install -p -m 644 %{SOURCE16} $RPM_BUILD_ROOT%{catrustdir}/extracted/pem/README
6cf4d9
install -p -m 644 %{SOURCE17} $RPM_BUILD_ROOT%{catrustdir}/extracted/edk2/README
6cf4d9
install -p -m 644 %{SOURCE18} $RPM_BUILD_ROOT%{catrustdir}/source/README
6cf4d9
6cf4d9
install -p -m 644 %{name}/%{p11_format_bundle} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-source/%{p11_format_bundle}
6cf4d9
6cf4d9
install -p -m 644 %{name}/%{legacy_default_bundle} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-legacy/%{legacy_default_bundle}
6cf4d9
install -p -m 644 %{name}/%{legacy_disable_bundle} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-legacy/%{legacy_disable_bundle}
6cf4d9
6cf4d9
install -p -m 644 %{SOURCE5} $RPM_BUILD_ROOT%{catrustdir}/ca-legacy.conf
6cf4d9
6cf4d9
touch -r %{SOURCE0} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-source/%{p11_format_bundle}
6cf4d9
6cf4d9
touch -r %{SOURCE0} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-legacy/%{legacy_default_bundle}
6cf4d9
touch -r %{SOURCE0} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-legacy/%{legacy_disable_bundle}
6cf4d9
6cf4d9
# TODO: consider to dynamically create the update-ca-trust script from within
6cf4d9
#       this .spec file, in order to have the output file+directory names at once place only.
6cf4d9
install -p -m 755 %{SOURCE2} $RPM_BUILD_ROOT%{_bindir}/update-ca-trust
6cf4d9
6cf4d9
install -p -m 755 %{SOURCE6} $RPM_BUILD_ROOT%{_bindir}/ca-legacy
6cf4d9
6cf4d9
# touch ghosted files that will be extracted dynamically
6cf4d9
# Set chmod 444 to use identical permission
6cf4d9
touch $RPM_BUILD_ROOT%{catrustdir}/extracted/pem/tls-ca-bundle.pem
6cf4d9
chmod 444 $RPM_BUILD_ROOT%{catrustdir}/extracted/pem/tls-ca-bundle.pem
6cf4d9
touch $RPM_BUILD_ROOT%{catrustdir}/extracted/pem/email-ca-bundle.pem
6cf4d9
chmod 444 $RPM_BUILD_ROOT%{catrustdir}/extracted/pem/email-ca-bundle.pem
6cf4d9
touch $RPM_BUILD_ROOT%{catrustdir}/extracted/pem/objsign-ca-bundle.pem
6cf4d9
chmod 444 $RPM_BUILD_ROOT%{catrustdir}/extracted/pem/objsign-ca-bundle.pem
6cf4d9
touch $RPM_BUILD_ROOT%{catrustdir}/extracted/openssl/%{openssl_format_trust_bundle}
6cf4d9
chmod 444 $RPM_BUILD_ROOT%{catrustdir}/extracted/openssl/%{openssl_format_trust_bundle}
6cf4d9
touch $RPM_BUILD_ROOT%{catrustdir}/extracted/%{java_bundle}
6cf4d9
chmod 444 $RPM_BUILD_ROOT%{catrustdir}/extracted/%{java_bundle}
6cf4d9
touch $RPM_BUILD_ROOT%{catrustdir}/extracted/edk2/cacerts.bin
6cf4d9
chmod 444 $RPM_BUILD_ROOT%{catrustdir}/extracted/edk2/cacerts.bin
6cf4d9
6cf4d9
# /etc/ssl symlinks for 3rd-party tools and cross-distro compatibility
6cf4d9
ln -s /etc/pki/tls/certs \
6cf4d9
    $RPM_BUILD_ROOT%{_sysconfdir}/ssl/certs
6cf4d9
ln -s %{catrustdir}/extracted/pem/tls-ca-bundle.pem \
6cf4d9
    $RPM_BUILD_ROOT%{_sysconfdir}/ssl/cert.pem
6cf4d9
ln -s /etc/pki/tls/openssl.cnf \
6cf4d9
    $RPM_BUILD_ROOT%{_sysconfdir}/ssl/openssl.cnf
6cf4d9
ln -s /etc/pki/tls/ct_log_list.cnf \
6cf4d9
    $RPM_BUILD_ROOT%{_sysconfdir}/ssl/ct_log_list.cnf
6cf4d9
# legacy filenames
6cf4d9
ln -s %{catrustdir}/extracted/pem/tls-ca-bundle.pem \
6cf4d9
    $RPM_BUILD_ROOT%{pkidir}/tls/cert.pem
6cf4d9
ln -s %{catrustdir}/extracted/pem/tls-ca-bundle.pem \
6cf4d9
    $RPM_BUILD_ROOT%{pkidir}/tls/certs/%{classic_tls_bundle}
6cf4d9
ln -s %{catrustdir}/extracted/openssl/%{openssl_format_trust_bundle} \
6cf4d9
    $RPM_BUILD_ROOT%{pkidir}/tls/certs/%{openssl_format_trust_bundle}
6cf4d9
ln -s %{catrustdir}/extracted/%{java_bundle} \
6cf4d9
    $RPM_BUILD_ROOT%{pkidir}/%{java_bundle}
6cf4d9
6cf4d9
6cf4d9
%pre
6cf4d9
if [ $1 -gt 1 ] ; then
6cf4d9
  # Upgrade or Downgrade.
6cf4d9
  # If the classic filename is a regular file, then we are upgrading
6cf4d9
  # from an old package and we will move it to an .rpmsave backup file.
6cf4d9
  # If the filename is a symbolic link, then we are good already.
6cf4d9
  # If the system will later be downgraded to an old package with regular 
6cf4d9
  # files, and afterwards updated again to a newer package with symlinks,
6cf4d9
  # and the old .rpmsave backup file didn't get cleaned up,
6cf4d9
  # then we don't backup again. We keep the older backup file.
6cf4d9
  # In other words, if an .rpmsave file already exists, we don't overwrite it.
6cf4d9
  #
6cf4d9
  if ! test -e %{pkidir}/%{java_bundle}.rpmsave; then
6cf4d9
    # no backup yet
6cf4d9
    if test -e %{pkidir}/%{java_bundle}; then
6cf4d9
      # a file exists
6cf4d9
        if ! test -L %{pkidir}/%{java_bundle}; then
6cf4d9
        # it's an old regular file, not a link
6cf4d9
        mv -f %{pkidir}/%{java_bundle} %{pkidir}/%{java_bundle}.rpmsave
6cf4d9
      fi
6cf4d9
    fi
6cf4d9
  fi
6cf4d9
6cf4d9
  if ! test -e %{pkidir}/tls/certs/%{classic_tls_bundle}.rpmsave; then
6cf4d9
    # no backup yet
6cf4d9
    if test -e %{pkidir}/tls/certs/%{classic_tls_bundle}; then
6cf4d9
      # a file exists
6cf4d9
      if ! test -L %{pkidir}/tls/certs/%{classic_tls_bundle}; then
6cf4d9
        # it's an old regular file, not a link
6cf4d9
        mv -f %{pkidir}/tls/certs/%{classic_tls_bundle} %{pkidir}/tls/certs/%{classic_tls_bundle}.rpmsave
6cf4d9
      fi
6cf4d9
    fi
6cf4d9
  fi
6cf4d9
6cf4d9
  if ! test -e %{pkidir}/tls/certs/%{openssl_format_trust_bundle}.rpmsave; then
6cf4d9
    # no backup yet
6cf4d9
    if test -e %{pkidir}/tls/certs/%{openssl_format_trust_bundle}; then
6cf4d9
      # a file exists
6cf4d9
      if ! test -L %{pkidir}/tls/certs/%{openssl_format_trust_bundle}; then
6cf4d9
        # it's an old regular file, not a link
6cf4d9
        mv -f %{pkidir}/tls/certs/%{openssl_format_trust_bundle} %{pkidir}/tls/certs/%{openssl_format_trust_bundle}.rpmsave
6cf4d9
      fi
6cf4d9
    fi
6cf4d9
  fi
6cf4d9
fi
6cf4d9
6cf4d9
6cf4d9
%post
6cf4d9
#if [ $1 -gt 1 ] ; then
6cf4d9
#  # when upgrading or downgrading
6cf4d9
#fi
6cf4d9
# if ln is available, go ahead and run the ca-legacy and update
6cf4d9
# scripts. If not, wait until %posttrans.
6cf4d9
if [ -x %{_bindir}/ln ]; then
6cf4d9
%{_bindir}/ca-legacy install
6cf4d9
%{_bindir}/update-ca-trust
6cf4d9
fi
6cf4d9
6cf4d9
%posttrans
6cf4d9
# When coreutils is installing with ca-certificates
6cf4d9
# we need to wait until coreutils install to
6cf4d9
# run our update since update requires ln to complete.
6cf4d9
# There is a circular dependency here where
6cf4d9
# ca-certificates depends on coreutils
6cf4d9
# coreutils depends on openssl
6cf4d9
# openssl depends on ca-certificates
6cf4d9
# so we run the scripts here too, in case we couldn't run them in
6cf4d9
# post. If we *could* run them in post this is an unnecessary
6cf4d9
# duplication, but it shouldn't hurt anything
6cf4d9
%{_bindir}/ca-legacy install
6cf4d9
%{_bindir}/update-ca-trust
6cf4d9
6cf4d9
%files
6cf4d9
%dir %{_sysconfdir}/ssl
6cf4d9
%dir %{pkidir}/tls
6cf4d9
%dir %{pkidir}/tls/certs
6cf4d9
%dir %{pkidir}/java
6cf4d9
%dir %{catrustdir}
6cf4d9
%dir %{catrustdir}/source
6cf4d9
%dir %{catrustdir}/source/anchors
6cf4d9
%dir %{catrustdir}/source/blocklist
6cf4d9
%dir %{catrustdir}/extracted
6cf4d9
%dir %{catrustdir}/extracted/pem
6cf4d9
%dir %{catrustdir}/extracted/openssl
6cf4d9
%dir %{catrustdir}/extracted/java
6cf4d9
%dir %{_datadir}/pki
6cf4d9
%dir %{_datadir}/pki/ca-trust-source
6cf4d9
%dir %{_datadir}/pki/ca-trust-source/anchors
6cf4d9
%dir %{_datadir}/pki/ca-trust-source/blocklist
6cf4d9
%dir %{_datadir}/pki/ca-trust-legacy
6cf4d9
6cf4d9
%config(noreplace) %{catrustdir}/ca-legacy.conf
6cf4d9
6cf4d9
%{_mandir}/man8/update-ca-trust.8.gz
6cf4d9
%{_mandir}/man8/ca-legacy.8.gz
6cf4d9
%{_datadir}/pki/ca-trust-source/README
6cf4d9
%{catrustdir}/README
6cf4d9
%{catrustdir}/extracted/README
6cf4d9
%{catrustdir}/extracted/java/README
6cf4d9
%{catrustdir}/extracted/openssl/README
6cf4d9
%{catrustdir}/extracted/pem/README
6cf4d9
%{catrustdir}/extracted/edk2/README
6cf4d9
%{catrustdir}/source/README
6cf4d9
6cf4d9
# symlinks for old locations
6cf4d9
%{pkidir}/tls/cert.pem
6cf4d9
%{pkidir}/tls/certs/%{classic_tls_bundle}
6cf4d9
%{pkidir}/tls/certs/%{openssl_format_trust_bundle}
6cf4d9
%{pkidir}/%{java_bundle}
6cf4d9
# symlinks to cross-distro compatibility files and directory
6cf4d9
%{_sysconfdir}/ssl/certs
6cf4d9
%{_sysconfdir}/ssl/cert.pem
6cf4d9
%{_sysconfdir}/ssl/openssl.cnf
6cf4d9
%{_sysconfdir}/ssl/ct_log_list.cnf
6cf4d9
6cf4d9
# primary bundle file with trust
6cf4d9
%{_datadir}/pki/ca-trust-source/%{p11_format_bundle}
6cf4d9
6cf4d9
%{_datadir}/pki/ca-trust-legacy/%{legacy_default_bundle}
6cf4d9
%{_datadir}/pki/ca-trust-legacy/%{legacy_disable_bundle}
6cf4d9
# update/extract tool
6cf4d9
%{_bindir}/update-ca-trust
6cf4d9
%{_bindir}/ca-legacy
6cf4d9
%ghost %{catrustdir}/source/ca-bundle.legacy.crt
6cf4d9
# files extracted files
6cf4d9
%ghost %{catrustdir}/extracted/pem/tls-ca-bundle.pem
6cf4d9
%ghost %{catrustdir}/extracted/pem/email-ca-bundle.pem
6cf4d9
%ghost %{catrustdir}/extracted/pem/objsign-ca-bundle.pem
6cf4d9
%ghost %{catrustdir}/extracted/openssl/%{openssl_format_trust_bundle}
6cf4d9
%ghost %{catrustdir}/extracted/%{java_bundle}
6cf4d9
%ghost %{catrustdir}/extracted/edk2/cacerts.bin
6cf4d9
6cf4d9
6cf4d9
%changelog
b8a5d2
*Thu Jul 28 2022 Bob Relyea <rrelyea@redhat.com> - 2022.2.54-90.2
b8a5d2
- Update to CKBI 2.54 from NSS 3.79
b8a5d2
-    Removing:
b8a5d2
-     # Certificate "TrustCor ECA-1"
b8a5d2
-     # Certificate "TrustCor RootCert CA-2"
b8a5d2
-     # Certificate "TrustCor RootCert CA-1"
b8a5d2
-     # Certificate "Network Solutions Certificate Authority"
b8a5d2
-     # Certificate "COMODO Certification Authority"
b8a5d2
-     # Certificate "Autoridad de Certificacion Raiz del Estado Venezolano"
b8a5d2
-     # Certificate "Microsec e-Szigno Root CA 2009"
b8a5d2
-     # Certificate "TWCA Root Certification Authority"
b8a5d2
-     # Certificate "Izenpe.com"
b8a5d2
-     # Certificate "state-institutions"
b8a5d2
-     # Certificate "GlobalSign"
b8a5d2
-     # Certificate "Common Policy"
b8a5d2
-     # Certificate "A-Trust-nQual-03"
b8a5d2
-     # Certificate "A-Trust-Qual-02"
b8a5d2
-     # Certificate "Autoridad de Certificacion Firmaprofesional CIF A62634068"
b8a5d2
-     # Certificate "Government Root Certification Authority"
b8a5d2
-     # Certificate "AC Raíz Certicámara S.A."
b8a5d2
b8a5d2
*Wed Jul 27 2022 Bob Relyea <rrelyea@redhat.com> - 2022.2.54-90.1
b8a5d2
- Update to CKBI 2.54 from NSS 3.79
b8a5d2
b8a5d2
*Fri Jul 15 2022 Bob Relyea <rrelyea@redhat.com> - 2022.2.54-90.0
b8a5d2
- Update to CKBI 2.54 from NSS 3.79
b8a5d2
-    Removing:
b8a5d2
-     # Certificate "GlobalSign Root CA - R2"
b8a5d2
-     # Certificate "DST Root CA X3"
b8a5d2
-     # Certificate "Explicitly Distrusted DigiNotar PKIoverheid G2"
b8a5d2
-    Adding:
b8a5d2
-     # Certificate "TunTrust Root CA"
b8a5d2
-     # Certificate "HARICA TLS RSA Root CA 2021"
b8a5d2
-     # Certificate "HARICA TLS ECC Root CA 2021"
b8a5d2
-     # Certificate "HARICA Client RSA Root CA 2021"
b8a5d2
-     # Certificate "HARICA Client ECC Root CA 2021"
b8a5d2
-     # Certificate "Autoridad de Certificacion Firmaprofesional CIF A62634068"
b8a5d2
-     # Certificate "vTrus ECC Root CA"
b8a5d2
-     # Certificate "vTrus Root CA"
b8a5d2
-     # Certificate "ISRG Root X2"
b8a5d2
-     # Certificate "HiPKI Root CA - G1"
b8a5d2
-     # Certificate "Telia Root CA v2"
b8a5d2
-     # Certificate "D-TRUST BR Root CA 1 2020"
b8a5d2
-     # Certificate "D-TRUST EV Root CA 1 2020"
b8a5d2
-     # Certificate "CAEDICOM Root"
b8a5d2
-     # Certificate "I.CA Root CA/RSA"
b8a5d2
-     # Certificate "MULTICERT Root Certification Authority 01"
b8a5d2
-     # Certificate "Certification Authority of WoSign G2"
b8a5d2
-     # Certificate "CA WoSign ECC Root"
b8a5d2
-     # Certificate "CCA India 2015 SPL"
b8a5d2
-     # Certificate "Swedish Government Root Authority v3"
b8a5d2
-     # Certificate "Swedish Government Root Authority v2"
b8a5d2
-     # Certificate "Tunisian Root Certificate Authority - TunRootCA2"
b8a5d2
-     # Certificate "OpenTrust Root CA G1"
b8a5d2
-     # Certificate "OpenTrust Root CA G2"
b8a5d2
-     # Certificate "OpenTrust Root CA G3"
b8a5d2
-     # Certificate "Certplus Root CA G1"
b8a5d2
-     # Certificate "Certplus Root CA G2"
b8a5d2
-     # Certificate "Government Root Certification Authority"
b8a5d2
-     # Certificate "A-Trust-Qual-02"
b8a5d2
-     # Certificate "Thailand National Root Certification Authority - G1"
b8a5d2
-     # Certificate "TrustCor ECA-1"
b8a5d2
-     # Certificate "TrustCor RootCert CA-2"
b8a5d2
-     # Certificate "TrustCor RootCert CA-1"
b8a5d2
-     # Certificate "Certification Authority of WoSign"
b8a5d2
-     # Certificate "CA 沃通根证书"
b8a5d2
-     # Certificate "SSC GDL CA Root B"
b8a5d2
-     # Certificate "SAPO Class 2 Root CA"
b8a5d2
-     # Certificate "SAPO Class 3 Root CA"
b8a5d2
-     # Certificate "SAPO Class 4 Root CA"
b8a5d2
-     # Certificate "CA Disig Root R1"
b8a5d2
-     # Certificate "Autoridad Certificadora Raíz Nacional de Uruguay"
b8a5d2
-     # Certificate "ApplicationCA2 Root"
b8a5d2
-     # Certificate "GlobalSign"
b8a5d2
-     # Certificate "Symantec Class 3 Public Primary Certification Authority - G6"
b8a5d2
-     # Certificate "Symantec Class 3 Public Primary Certification Authority - G4"
b8a5d2
-     # Certificate "Halcom Root CA"
b8a5d2
-     # Certificate "Swisscom Root EV CA 2"
b8a5d2
-     # Certificate "CFCA GT CA"
b8a5d2
-     # Certificate "Digidentity L3 Root CA - G2"
b8a5d2
-     # Certificate "SITHS Root CA v1"
b8a5d2
-     # Certificate "Macao Post eSignTrust Root Certification Authority (G02)"
b8a5d2
-     # Certificate "Autoridade Certificadora Raiz Brasileira v2"
b8a5d2
-     # Certificate "Swisscom Root CA 2"
b8a5d2
-     # Certificate "IGC/A AC racine Etat francais"
b8a5d2
-     # Certificate "PersonalID Trustworthy RootCA 2011"
b8a5d2
-     # Certificate "Swedish Government Root Authority v1"
b8a5d2
-     # Certificate "Swiss Government Root CA II"
b8a5d2
-     # Certificate "Swiss Government Root CA I"
b8a5d2
-     # Certificate "Network Solutions Certificate Authority"
b8a5d2
-     # Certificate "COMODO Certification Authority"
b8a5d2
-     # Certificate "LuxTrust Global Root"
b8a5d2
-     # Certificate "AC1 RAIZ MTIN"
b8a5d2
-     # Certificate "Microsoft Root Certificate Authority 2011"
b8a5d2
-     # Certificate "CCA India 2011"
b8a5d2
-     # Certificate "ANCERT Certificados Notariales V2"
b8a5d2
-     # Certificate "ANCERT Certificados CGN V2"
b8a5d2
-     # Certificate "EE Certification Centre Root CA"
b8a5d2
-     # Certificate "DigiNotar Root CA G2"
b8a5d2
-     # Certificate "Federal Common Policy CA"
b8a5d2
-     # Certificate "Autoridad de Certificacion Raiz del Estado Venezolano"
b8a5d2
-     # Certificate "Autoridad de Certificacion Raiz del Estado Venezolano"
b8a5d2
-     # Certificate "China Internet Network Information Center EV Certificates Root"
b8a5d2
-     # Certificate "Verizon Global Root CA"
b8a5d2
-     # Certificate "SwissSign Silver Root CA - G3"
b8a5d2
-     # Certificate "SwissSign Platinum Root CA - G3"
b8a5d2
-     # Certificate "SwissSign Gold Root CA - G3"
b8a5d2
-     # Certificate "Microsec e-Szigno Root CA 2009"
b8a5d2
-     # Certificate "SITHS CA v3"
b8a5d2
-     # Certificate "Certinomis - Autorité Racine"
b8a5d2
-     # Certificate "ANF Server CA"
b8a5d2
-     # Certificate "Thawte Premium Server CA"
b8a5d2
-     # Certificate "Thawte Server CA"
b8a5d2
-     # Certificate "TC TrustCenter Universal CA III"
b8a5d2
-     # Certificate "KEYNECTIS ROOT CA"
b8a5d2
-     # Certificate "I.CA - Standard Certification Authority, 09/2009"
b8a5d2
-     # Certificate "I.CA - Qualified Certification Authority, 09/2009"
b8a5d2
-     # Certificate "VI Registru Centras RCSC (RootCA)"
b8a5d2
-     # Certificate "CCA India 2007"
b8a5d2
-     # Certificate "Autoridade Certificadora Raiz Brasileira v1"
b8a5d2
-     # Certificate "ipsCA Global CA Root"
b8a5d2
-     # Certificate "ipsCA Main CA Root"
b8a5d2
-     # Certificate "Actalis Authentication CA G1"
b8a5d2
-     # Certificate "A-Trust-Qual-03"
b8a5d2
-     # Certificate "AddTrust External CA Root"
b8a5d2
-     # Certificate "ECRaizEstado"
b8a5d2
-     # Certificate "Configuration"
b8a5d2
-     # Certificate "FNMT-RCM"
b8a5d2
-     # Certificate "StartCom Certification Authority"
b8a5d2
-     # Certificate "TWCA Root Certification Authority"
b8a5d2
-     # Certificate "VeriSign Class 3 Public Primary Certification Authority - G4"
b8a5d2
-     # Certificate "thawte Primary Root CA - G2"
b8a5d2
-     # Certificate "GeoTrust Primary Certification Authority - G2"
b8a5d2
-     # Certificate "VeriSign Universal Root Certification Authority"
b8a5d2
-     # Certificate "thawte Primary Root CA - G3"
b8a5d2
-     # Certificate "GeoTrust Primary Certification Authority - G3"
b8a5d2
-     # Certificate "E-ME SSI (RCA)"
b8a5d2
-     # Certificate "ACEDICOM Root"
b8a5d2
-     # Certificate "Autoridad Certificadora Raiz de la Secretaria de Economia"
b8a5d2
-     # Certificate "Correo Uruguayo - Root CA"
b8a5d2
-     # Certificate "CNNIC ROOT"
b8a5d2
-     # Certificate "Common Policy"
b8a5d2
-     # Certificate "Macao Post eSignTrust Root Certification Authority"
b8a5d2
-     # Certificate "Staat der Nederlanden Root CA - G2"
b8a5d2
-     # Certificate "NetLock Platina (Class Platinum) Főtanúsítvány"
b8a5d2
-     # Certificate "AC Raíz Certicámara S.A."
b8a5d2
-     # Certificate "Cisco Root CA 2048"
b8a5d2
-     # Certificate "CA Disig"
b8a5d2
-     # Certificate "InfoNotary CSP Root"
b8a5d2
-     # Certificate "UCA Global Root"
b8a5d2
-     # Certificate "UCA Root"
b8a5d2
-     # Certificate "DigiNotar Root CA"
b8a5d2
-     # Certificate "Starfield Services Root Certificate Authority"
b8a5d2
-     # Certificate "I.CA - Qualified root certificate"
b8a5d2
-     # Certificate "I.CA - Standard root certificate"
b8a5d2
-     # Certificate "e-Guven Kok Elektronik Sertifika Hizmet Saglayicisi"
b8a5d2
-     # Certificate "Japanese Government"
b8a5d2
-     # Certificate "AdminCA-CD-T01"
b8a5d2
-     # Certificate "Admin-Root-CA"
b8a5d2
-     # Certificate "Izenpe.com"
b8a5d2
-     # Certificate "TÜBİTAK UEKAE Kök Sertifika Hizmet Sağlayıcısı - Sürüm 3"
b8a5d2
-     # Certificate "Halcom CA FO"
b8a5d2
-     # Certificate "Halcom CA PO 2"
b8a5d2
-     # Certificate "Root CA"
b8a5d2
-     # Certificate "GPKIRootCA"
b8a5d2
-     # Certificate "ACNLB"
b8a5d2
-     # Certificate "state-institutions"
b8a5d2
-     # Certificate "state-institutions"
b8a5d2
-     # Certificate "SECOM Trust Systems CO.,LTD."
b8a5d2
-     # Certificate "D-TRUST Qualified Root CA 1 2007:PN"
b8a5d2
-     # Certificate "D-TRUST Root Class 2 CA 2007"
b8a5d2
-     # Certificate "D-TRUST Root Class 3 CA 2007"
b8a5d2
-     # Certificate "SSC Root CA A"
b8a5d2
-     # Certificate "SSC Root CA B"
b8a5d2
-     # Certificate "SSC Root CA C"
b8a5d2
-     # Certificate "Autoridad de Certificacion de la Abogacia"
b8a5d2
-     # Certificate "Root CA Generalitat Valenciana"
b8a5d2
-     # Certificate "VAS Latvijas Pasts SSI(RCA)"
b8a5d2
-     # Certificate "ANCERT Certificados CGN"
b8a5d2
-     # Certificate "ANCERT Certificados Notariales"
b8a5d2
-     # Certificate "ANCERT Corporaciones de Derecho Publico"
b8a5d2
-     # Certificate "GLOBALTRUST"
b8a5d2
-     # Certificate "Certipost E-Trust TOP Root CA"
b8a5d2
-     # Certificate "Certipost E-Trust Primary Qualified CA"
b8a5d2
-     # Certificate "Certipost E-Trust Primary Normalised CA"
b8a5d2
-     # Certificate "GlobalSign"
b8a5d2
-     # Certificate "IGC/A"
b8a5d2
-     # Certificate "S-TRUST Authentication and Encryption Root CA 2005:PN"
b8a5d2
-     # Certificate "TC TrustCenter Universal CA I"
b8a5d2
-     # Certificate "TC TrustCenter Universal CA II"
b8a5d2
-     # Certificate "TC TrustCenter Class 2 CA II"
b8a5d2
-     # Certificate "TC TrustCenter Class 4 CA II"
b8a5d2
-     # Certificate "Swisscom Root CA 1"
b8a5d2
-     # Certificate "Microsec e-Szigno Root CA"
b8a5d2
-     # Certificate "LGPKI"
b8a5d2
-     # Certificate "AC RAIZ DNIE"
b8a5d2
-     # Certificate "Common Policy"
b8a5d2
-     # Certificate "TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı"
b8a5d2
-     # Certificate "A-Trust-nQual-03"
b8a5d2
-     # Certificate "A-Trust-nQual-03"
b8a5d2
-     # Certificate "CertRSA01"
b8a5d2
-     # Certificate "KISA RootCA 1"
b8a5d2
-     # Certificate "KISA RootCA 3"
b8a5d2
-     # Certificate "NetLock Minositett Kozjegyzoi (Class QA) Tanusitvanykiado"
b8a5d2
-     # Certificate "A-CERT ADVANCED"
b8a5d2
-     # Certificate "A-Trust-Qual-01"
b8a5d2
-     # Certificate "A-Trust-nQual-01"
b8a5d2
-     # Certificate "A-Trust-Qual-02"
b8a5d2
-     # Certificate "Staat der Nederlanden Root CA"
b8a5d2
-     # Certificate "Serasa Certificate Authority II"
b8a5d2
-     # Certificate "TDC Internet"
b8a5d2
-     # Certificate "America Online Root Certification Authority 2"
b8a5d2
-     # Certificate "Autoridad de Certificacion Firmaprofesional CIF A62634068"
b8a5d2
-     # Certificate "Government Root Certification Authority"
b8a5d2
-     # Certificate "RSA Security Inc"
b8a5d2
-     # Certificate "Public Notary Root"
b8a5d2
-     # Certificate "GeoTrust Global CA"
b8a5d2
-     # Certificate "GeoTrust Global CA 2"
b8a5d2
-     # Certificate "GeoTrust Universal CA"
b8a5d2
-     # Certificate "GeoTrust Universal CA 2"
b8a5d2
-     # Certificate "QuoVadis Root Certification Authority"
b8a5d2
-     # Certificate "Autoridade Certificadora Raiz Brasileira"
b8a5d2
-     # Certificate "Post.Trust Root CA"
b8a5d2
-     # Certificate "Microsoft Root Authority"
b8a5d2
-     # Certificate "Microsoft Root Certificate Authority"
b8a5d2
-     # Certificate "Microsoft Root Certificate Authority 2010"
b8a5d2
-     # Certificate "Entrust.net Secure Server Certification Authority"
b8a5d2
-     # Certificate "UTN-USERFirst-Object"
b8a5d2
-     # Certificate "BYTE Root Certification Authority 001"
b8a5d2
-     # Certificate "CISRCA1"
b8a5d2
-     # Certificate "ePKI Root Certification Authority - G2"
b8a5d2
-     # Certificate "ePKI EV SSL Certification Authority - G1"
b8a5d2
-     # Certificate "AC Raíz Certicámara S.A."
b8a5d2
-     # Certificate "SSL.com EV Root Certification Authority RSA"
b8a5d2
-     # Certificate "LuxTrust Global Root 2"
b8a5d2
-     # Certificate "ACA ROOT"
b8a5d2
-     # Certificate "Security Communication ECC RootCA1"
b8a5d2
-     # Certificate "Security Communication RootCA3"
b8a5d2
-     # Certificate "CHAMBERS OF COMMERCE ROOT - 2016"
b8a5d2
-     # Certificate "Network Solutions RSA Certificate Authority"
b8a5d2
-     # Certificate "Network Solutions ECC Certificate Authority"
b8a5d2
-     # Certificate "Australian Defence Public Root CA"
b8a5d2
-     # Certificate "SI-TRUST Root"
b8a5d2
-     # Certificate "Halcom Root Certificate Authority"
b8a5d2
-     # Certificate "Application CA G3 Root"
b8a5d2
-     # Certificate "GLOBALTRUST 2015"
b8a5d2
-     # Certificate "Microsoft ECC Product Root Certificate Authority 2018"
b8a5d2
-     # Certificate "emSign Root CA - G2"
b8a5d2
-     # Certificate "emSign Root CA - C2"
b8a5d2
-     # Certificate "Microsoft ECC TS Root Certificate Authority 2018"
b8a5d2
-     # Certificate "DigiCert CS ECC P384 Root G5"
b8a5d2
-     # Certificate "DigiCert CS RSA4096 Root G5"
b8a5d2
-     # Certificate "DigiCert RSA4096 Root G5"
b8a5d2
-     # Certificate "DigiCert ECC P384 Root G5"
b8a5d2
-     # Certificate "HARICA Code Signing RSA Root CA 2021"
b8a5d2
-     # Certificate "HARICA Code Signing ECC Root CA 2021"
b8a5d2
-     # Certificate "Microsoft Identity Verification Root Certificate Authority 2020"
b8a5d2
5c5864
* Mon Nov 1 2021 Bob Relyea <rrelyea@redhat.com> - 2020.2.50-94
5c5864
- remove blacklist directory and references now that p11-kit has been updated.
5c5864
6cf4d9
* Mon Aug 09 2021 Mohan Boddu <mboddu@redhat.com> - 2020.2.50-93
6cf4d9
- Rebuilt for IMA sigs, glibc 2.34, aarch64 flags
6cf4d9
  Related: rhbz#1991688
6cf4d9
6cf4d9
* Tue Jun 22 2021 Mohan Boddu <mboddu@redhat.com> - 2020.2.50-92
6cf4d9
- Rebuilt for RHEL 9 BETA for openssl 3.0
6cf4d9
  Related: rhbz#1971065
6cf4d9
6cf4d9
* Wed Jun 16 2021 Bob Relyea <rrelyea@redhat.com> - 2020.2.50-90
6cf4d9
-   Update to CKBI 2.50 from NSS 3.67
6cf4d9
-      Removing:
6cf4d9
-       # Certificate "QuoVadis Root CA"
6cf4d9
-       # Certificate "Sonera Class 2 Root CA"
6cf4d9
-       # Certificate "Trustis FPS Root CA"
6cf4d9
-      Adding:
6cf4d9
-       # Certificate "GLOBALTRUST 2020"
6cf4d9
-       # Certificate "ANF Secure Server Root CA"
6cf4d9
-       # Certificate "Certum EC-384 CA"
6cf4d9
-       # Certificate "Certum Trusted Root CA"
6cf4d9
6cf4d9
* Thu Apr 15 2021 Mohan Boddu <mboddu@redhat.com> - 2020.2.41-8
6cf4d9
- Rebuilt for RHEL 9 BETA on Apr 15th 2021. Related: rhbz#1947937
6cf4d9
6cf4d9
* Tue Jan 26 2021 Fedora Release Engineering <releng@fedoraproject.org> - 2020.2.41-7
6cf4d9
- Rebuilt for https://fedoraproject.org/wiki/Fedora_34_Mass_Rebuild
6cf4d9
6cf4d9
* Wed Jan 13 2021 Bob Relyea <rrelyea@redhat.com> - 2020.2.41-6
6cf4d9
- remove unnecessarily divisive terms, take 1.
6cf4d9
-   in ca-certificates there are 3 cases:
6cf4d9
-   1) master refering to the fedora master branch in the fetch.sh script.
6cf4d9
-      This can only be changed once fedora changes the master branch name.
6cf4d9
-   2) a reference to the 'master bundle' in this file: this has been changed
6cf4d9
-      to 'primary bundle'.
6cf4d9
-   3) a couple of blacklist directories owned by this package, but used to
6cf4d9
-      p11-kit. New 'blocklist' directories have been created, but p11-kit
6cf4d9
-      needs to be updated before the old blacklist directories can be removed
6cf4d9
-      and the man pages corrected.
6cf4d9
6cf4d9
* Mon Nov 09 2020 Christian Heimes <cheimes@redhat.com> - 2020.2.41-5
6cf4d9
- Add cross-distro compatibility symlinks to /etc/ssl (rhbz#1895619)
6cf4d9
6cf4d9
* Mon Jul 27 2020 Fedora Release Engineering <releng@fedoraproject.org> - 2020.2.41-4
6cf4d9
- Rebuilt for https://fedoraproject.org/wiki/Fedora_33_Mass_Rebuild
6cf4d9
6cf4d9
* Tue Jun 16 2020 Adam Williamson <awilliam@redhat.com> - 2020.2.41-3
6cf4d9
- Fix up broken %post and %postinstall scriptlet changes from -2
6cf4d9
6cf4d9
* Wed Jun 10 2020 Bob Relyea <rrelyea@redhat.com> - 2020.2.41-2
6cf4d9
- Update to CKBI 2.41 from NSS 3.53.0
6cf4d9
-    Removing:
6cf4d9
-     # Certificate "AddTrust Low-Value Services Root"
6cf4d9
-     # Certificate "AddTrust External Root"
6cf4d9
-     # Certificate "Staat der Nederlanden Root CA - G2"
6cf4d9
6cf4d9
* Tue Jan 28 2020 Daiki Ueno <dueno@redhat.com> - 2020.2.40-3
6cf4d9
- Update versioned dependency on p11-kit
6cf4d9
6cf4d9
* Wed Jan 22 2020 Daiki Ueno <dueno@redhat.com> - 2020.2.40-2
6cf4d9
- Update to CKBI 2.40 from NSS 3.48
6cf4d9
-    Removing:
6cf4d9
-     # Certificate "UTN USERFirst Email Root CA"
6cf4d9
-     # Certificate "Certplus Class 2 Primary CA"
6cf4d9
-     # Certificate "Deutsche Telekom Root CA 2"
6cf4d9
-     # Certificate "Swisscom Root CA 2"
6cf4d9
-     # Certificate "Certinomis - Root CA"
6cf4d9
-    Adding:
6cf4d9
-     # Certificate "Entrust Root Certification Authority - G4"
6cf4d9
- certdata2pem.py: emit flags for CKA_NSS_{SERVER,EMAIL}_DISTRUST_AFTER
6cf4d9
6cf4d9
* Wed Jul 24 2019 Fedora Release Engineering <releng@fedoraproject.org> - 2019.2.32-3
6cf4d9
- Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild
6cf4d9
6cf4d9
* Wed Jun 19 2019 Bob Relyea <rrelyea@redhat.com> 2019.2.32-2
6cf4d9
 - Update to CKBI 2.32 from NSS 3.44
6cf4d9
   Removing: 
6cf4d9
    # Certificate "Visa eCommerce Root"
6cf4d9
    # Certificate "AC Raiz Certicamara S.A."
6cf4d9
    # Certificate "Certplus Root CA G1"
6cf4d9
    # Certificate "Certplus Root CA G2"
6cf4d9
    # Certificate "OpenTrust Root CA G1"
6cf4d9
    # Certificate "OpenTrust Root CA G2"
6cf4d9
    # Certificate "OpenTrust Root CA G3"
6cf4d9
   Adding: 
6cf4d9
    # Certificate "GTS Root R1"
6cf4d9
    # Certificate "GTS Root R2"
6cf4d9
    # Certificate "GTS Root R3"
6cf4d9
    # Certificate "GTS Root R4"
6cf4d9
    # Certificate "UCA Global G2 Root"
6cf4d9
    # Certificate "UCA Extended Validation Root"
6cf4d9
    # Certificate "Certigna Root CA"
6cf4d9
    # Certificate "emSign Root CA - G1"
6cf4d9
    # Certificate "emSign ECC Root CA - G3"
6cf4d9
    # Certificate "emSign Root CA - C1"
6cf4d9
    # Certificate "emSign ECC Root CA - C3"
6cf4d9
    # Certificate "Hongkong Post Root CA 3"
6cf4d9
6cf4d9
* Thu Jan 31 2019 Fedora Release Engineering <releng@fedoraproject.org> - 2018.2.26-3
6cf4d9
- Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild
6cf4d9
6cf4d9
* Mon Sep 24 2018 Bob Relyea <rrelyea@redhat.com> - 2018.2.26-2
6cf4d9
- Update to CKBI 2.26 from NSS 3.39
6cf4d9
6cf4d9
* Thu Jul 12 2018 Fedora Release Engineering <releng@fedoraproject.org> - 2018.2.24-6
6cf4d9
- Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild
6cf4d9
6cf4d9
* Thu Jun 28 2018 Kai Engert <kaie@redhat.com> - 2018.2.24-5
6cf4d9
- Ported scripts to python3
6cf4d9
6cf4d9
* Mon Jun 11 2018 Daiki Ueno <dueno@redhat.com> - 2018.2.24-4
6cf4d9
- Extract certificate bundle in EDK2 format, suggested by Laszlo Ersek
6cf4d9
6cf4d9
* Mon Jun 04 2018 Kai Engert <kaie@redhat.com> - 2018.2.24-3
6cf4d9
- Adjust ghost file permissions, rhbz#1564432
6cf4d9
6cf4d9
* Fri May 18 2018 Kai Engert <kaie@redhat.com> - 2018.2.24-2
6cf4d9
- Update to CKBI 2.24 from NSS 3.37
6cf4d9
6cf4d9
* Wed Mar 14 2018 Iryna Shcherbina <ishcherb@redhat.com> - 2018.2.22-4
6cf4d9
- Update Python 2 dependency declarations to new packaging standards
6cf4d9
  (See https://fedoraproject.org/wiki/FinalizingFedoraSwitchtoPython3)
6cf4d9
6cf4d9
* Fri Feb 23 2018 Patrick Uiterwijk <puiterwijk@redhat.com> - 2018.2.22-3
6cf4d9
- Add post dep on coreutils for ln(1)
6cf4d9
6cf4d9
* Tue Feb 06 2018 Kai Engert <kaie@redhat.com> - 2018.2.22-2
6cf4d9
- Update to CKBI 2.22 from NSS 3.35
6cf4d9
6cf4d9
* Mon Jan 22 2018 Kai Engert <kaie@redhat.com> - 2017.2.20-6
6cf4d9
- Depend on bash, grep, sed. Required for ca-legacy script execution.
6cf4d9
- p11-kit is already required at %%post execution time. (rhbz#1537127)
6cf4d9
6cf4d9
* Fri Jan 19 2018 Kai Engert <kaie@redhat.com> - 2017.2.20-5
6cf4d9
- Use the force, script! (Which sln did by default).
6cf4d9
6cf4d9
* Fri Jan 19 2018 Kai Engert <kaie@redhat.com> - 2017.2.20-4
6cf4d9
- stop using sln in ca-legacy script.
6cf4d9
6cf4d9
* Fri Jan 19 2018 Kai Engert <kaie@redhat.com> - 2017.2.20-3
6cf4d9
- Use ln -s, because sln was removed from glibc. rhbz#1536349
6cf4d9
6cf4d9
* Mon Nov 27 2017 Kai Engert <kaie@redhat.com> - 2017.2.20-2
6cf4d9
- Update to CKBI 2.20 from NSS 3.34.1
6cf4d9
6cf4d9
* Tue Aug 15 2017 Kai Engert <kaie@redhat.com> - 2017.2.16-4
6cf4d9
- Set P11_KIT_NO_USER_CONFIG=1 to prevent p11-kit from reading user
6cf4d9
  configuration files (rhbz#1478172).
6cf4d9
6cf4d9
* Wed Jul 26 2017 Fedora Release Engineering <releng@fedoraproject.org> - 2017.2.16-3
6cf4d9
- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild
6cf4d9
6cf4d9
* Wed Jul 19 2017 Kai Engert <kaie@redhat.com> - 2017.2.16-2
6cf4d9
- Update to (yet unreleased) CKBI 2.16 which is planned for NSS 3.32.
6cf4d9
  Mozilla removed all trust bits for code signing.
6cf4d9
6cf4d9
* Wed Apr 26 2017 Kai Engert <kaie@redhat.com> - 2017.2.14-2
6cf4d9
- Update to CKBI 2.14 from NSS 3.30.2
6cf4d9
6cf4d9
* Thu Feb 23 2017 Kai Engert <kaie@redhat.com> - 2017.2.11-5
6cf4d9
- For CAs trusted by Mozilla, set attribute nss-mozilla-ca-policy: true
6cf4d9
- Set attribute modifiable: false
6cf4d9
- Require p11-kit 0.23.4
6cf4d9
6cf4d9
* Mon Feb 13 2017 Kai Engert <kaie@redhat.com> - 2017.2.11-4
6cf4d9
- Changed the packaged bundle to use the flexible p11-kit-object-v1 file format,
6cf4d9
  as a preparation to fix bugs in the interaction between p11-kit-trust and
6cf4d9
  Mozilla applications, such as Firefox, Thunderbird etc.
6cf4d9
- Changed update-ca-trust to add comments to extracted PEM format files.
6cf4d9
- Added an utility to help with comparing output of the trust dump command.
6cf4d9
6cf4d9
* Fri Feb 10 2017 Fedora Release Engineering <releng@fedoraproject.org> - 2017.2.11-3
6cf4d9
- Rebuilt for https://fedoraproject.org/wiki/Fedora_26_Mass_Rebuild
6cf4d9
6cf4d9
* Wed Jan 11 2017 Kai Engert <kaie@redhat.com> - 2017.2.11-2
6cf4d9
- Update to CKBI 2.11 from NSS 3.28.1
6cf4d9
6cf4d9
* Thu Sep 29 2016 Kai Engert <kaie@redhat.com> - 2016.2.10-2
6cf4d9
- Update to CKBI 2.10 from NSS 3.27
6cf4d9
6cf4d9
* Tue Aug 16 2016 Kai Engert <kaie@redhat.com> - 2016.2.9-3
6cf4d9
- Revert to the unmodified upstream CA list, changing the legacy trust
6cf4d9
  to an empty list. Keeping the ca-legacy tool and existing config,
6cf4d9
  however, the configuration has no effect after this change.
6cf4d9
6cf4d9
* Tue Aug 16 2016 Kai Engert <kaie@redhat.com> - 2016.2.9-2
6cf4d9
- Update to CKBI 2.9 from NSS 3.26 with legacy modifications
6cf4d9
6cf4d9
* Fri Jul 15 2016 Kai Engert <kaie@redhat.com> - 2016.2.8-2
6cf4d9
- Update to CKBI 2.8 from NSS 3.25 with legacy modifications
6cf4d9
6cf4d9
* Tue May 10 2016 Kai Engert <kaie@redhat.com> - 2016.2.7-5
6cf4d9
- Only create backup files if there is an original file (bug 999017).
6cf4d9
6cf4d9
* Tue May 10 2016 Kai Engert <kaie@redhat.com> - 2016.2.7-4
6cf4d9
- Use sln, not ln, to avoid the dependency on coreutils.
6cf4d9
6cf4d9
* Mon Apr 25 2016 Kai Engert <kaie@redhat.com> - 2016.2.7-3
6cf4d9
- Fix typos in a manual page and in a README file.
6cf4d9
6cf4d9
* Wed Mar 16 2016 Kai Engert <kaie@redhat.com> - 2016.2.7-2
6cf4d9
- Update to CKBI 2.7 from NSS 3.23 with legacy modifications
6cf4d9
6cf4d9
* Wed Feb 03 2016 Fedora Release Engineering <releng@fedoraproject.org> - 2015.2.6-3
6cf4d9
- Rebuilt for https://fedoraproject.org/wiki/Fedora_24_Mass_Rebuild
6cf4d9
6cf4d9
* Mon Nov 23 2015 Kai Engert <kaie@redhat.com> - 2015.2.6-2
6cf4d9
- Update to CKBI 2.6 from NSS 3.21 with legacy modifications
6cf4d9
6cf4d9
* Thu Aug 13 2015 Kai Engert <kaie@redhat.com> - 2015.2.5-2
6cf4d9
- Update to CKBI 2.5 from NSS 3.19.3 with legacy modifications
6cf4d9
6cf4d9
* Wed Jun 17 2015 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2015.2.4-3
6cf4d9
- Rebuilt for https://fedoraproject.org/wiki/Fedora_23_Mass_Rebuild
6cf4d9
6cf4d9
* Tue May 05 2015 Kai Engert <kaie@redhat.com> - 2015.2.4-2
6cf4d9
- Update to CKBI 2.4 from NSS 3.18.1 with legacy modifications
6cf4d9
6cf4d9
* Tue May 05 2015 Kai Engert <kaie@redhat.com> - 2015.2.3-4
6cf4d9
- Fixed a typo in the ca-legacy manual page.
6cf4d9
6cf4d9
* Tue Mar 31 2015 Kai Engert <kaie@redhat.com> - 2015.2.3-3
6cf4d9
- Don't use "enable" as a value for the legacy configuration, instead
6cf4d9
  of the value "default", to make it clear that this preference isn't
6cf4d9
  a promise to keep certificates enabled, but rather that we only
6cf4d9
  keep them enabled as long as it's considered necessary.
6cf4d9
- Changed the configuration file, the ca-legacy utility and filenames
6cf4d9
  to use the term "default" (instead of the term "enable").
6cf4d9
- Added a manual page for the ca-legacy utility.
6cf4d9
- Fixed the ca-legacy utility to handle absence of the configuration
6cf4d9
  setting and treat absence as the default setting.
6cf4d9
6cf4d9
* Fri Mar 20 2015 Kai Engert <kaie@redhat.com> - 2015.2.3-2
6cf4d9
- Update to CKBI 2.3 from NSS 3.18 with legacy modifications
6cf4d9
- Fixed a mistake in the legacy handling of the upstream 2.2 release:
6cf4d9
  Removed two AOL certificates from the legacy group, because
6cf4d9
  upstream didn't remove them as part of phasing out 1024-bit
6cf4d9
  certificates, which means it isn't necessary to keep them.
6cf4d9
- Fixed a mistake in the legacy handling of the upstream 2.1 release:
6cf4d9
  Moved two NetLock certificates into the legacy group.
6cf4d9
6cf4d9
* Tue Dec 16 2014 Kai Engert <kaie@redhat.com> - 2014.2.2-2
6cf4d9
- Update to CKBI 2.2 from NSS 3.17.3 with legacy modifications
6cf4d9
- Update project URL
6cf4d9
- Cleanup
6cf4d9
6cf4d9
* Sat Nov 15 2014 Peter Lemenkov <lemenkov@gmail.com> - 2014.2.1-7
6cf4d9
- Restore Requires: coreutils
6cf4d9
6cf4d9
* Fri Nov 14 2014 Peter Lemenkov <lemenkov@gmail.com> - 2014.2.1-6
6cf4d9
- A proper fix for rhbz#1158343
6cf4d9
6cf4d9
* Wed Oct 29 2014 Kai Engert <kaie@redhat.com> - 2014.2.1-5
6cf4d9
- add Requires: coreutils (rhbz#1158343)
6cf4d9
6cf4d9
* Tue Oct 28 2014 Kai Engert <kaie@redhat.com> - 2014.2.1-4
6cf4d9
- Introduce the ca-legacy utility and a ca-legacy.conf configuration file.
6cf4d9
  By default, legacy roots required for OpenSSL/GnuTLS compatibility
6cf4d9
  are kept enabled. Using the ca-legacy utility, the legacy roots can be
6cf4d9
  disabled. If disabled, the system will use the trust set as provided
6cf4d9
  by the upstream Mozilla CA list. (See also: rhbz#1158197)
6cf4d9
6cf4d9
* Sun Sep 21 2014 Kai Engert <kaie@redhat.com> - 2014.2.1-3
6cf4d9
- Temporarily re-enable several legacy root CA certificates because of
6cf4d9
  compatibility issues with software based on OpenSSL/GnuTLS,
6cf4d9
  see rhbz#1144808
6cf4d9
6cf4d9
* Thu Aug 14 2014 Kai Engert <kaie@redhat.com> - 2014.2.1-2
6cf4d9
- Update to CKBI 2.1 from NSS 3.16.4
6cf4d9
- Fix rhbz#1130226
6cf4d9
6cf4d9
* Sat Jun 07 2014 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2013.1.97-3
6cf4d9
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
6cf4d9
6cf4d9
* Wed Mar 19 2014 Kai Engert <kaie@redhat.com> - 2013.1.97-2
6cf4d9
- Update to CKBI 1.97 from NSS 3.16
6cf4d9
6cf4d9
* Mon Feb 10 2014 Kai Engert <kaie@redhat.com> - 2013.1.96-3
6cf4d9
- Remove openjdk build dependency
6cf4d9
6cf4d9
* Sat Jan 25 2014 Ville Skyttä <ville.skytta@iki.fi> - 2013.1.96-2
6cf4d9
- Own the %%{_datadir}/pki dir.
6cf4d9
6cf4d9
* Thu Jan 09 2014 Kai Engert <kaie@redhat.com> - 2013.1.96-1
6cf4d9
- Update to CKBI 1.96 from NSS 3.15.4
6cf4d9
6cf4d9
* Tue Dec 17 2013 Kai Engert <kaie@redhat.com> - 2013.1.95-1
6cf4d9
- Update to CKBI 1.95 from NSS 3.15.3.1
6cf4d9
6cf4d9
* Fri Sep 06 2013 Kai Engert <kaie@redhat.com> - 2013.1.94-18
6cf4d9
- Update the Entrust root stapled extension for compatibility with 
6cf4d9
  p11-kit version 0.19.2, patch by Stef Walter, rhbz#988745
6cf4d9
6cf4d9
* Tue Sep 03 2013 Kai Engert <kaie@redhat.com> - 2013.1.94-17
6cf4d9
- merge manual improvement from f19
6cf4d9
6cf4d9
* Sat Aug 03 2013 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2013.1.94-16
6cf4d9
- Rebuilt for https://fedoraproject.org/wiki/Fedora_20_Mass_Rebuild
6cf4d9
6cf4d9
* Tue Jul 09 2013 Kai Engert <kaie@redhat.com> - 2013.1.94-15
6cf4d9
- clarification updates to manual page
6cf4d9
6cf4d9
* Mon Jul 08 2013 Kai Engert <kaie@redhat.com> - 2013.1.94-14
6cf4d9
- added a manual page and related build requirements
6cf4d9
- simplify the README files now that we have a manual page
6cf4d9
- set a certificate alias in trusted bundle (thanks to Ludwig Nussel)
6cf4d9
6cf4d9
* Mon May 27 2013 Kai Engert <kaie@redhat.com> - 2013.1.94-13
6cf4d9
- use correct command in README files, rhbz#961809
6cf4d9
6cf4d9
* Mon May 27 2013 Kai Engert <kaie@redhat.com> - 2013.1.94-12
6cf4d9
- update to version 1.94 provided by NSS 3.15 (beta)
6cf4d9
6cf4d9
* Mon Apr 22 2013 Kai Engert <kaie@redhat.com> - 2012.87-12
6cf4d9
- Use both label and serial to identify cert during conversion, rhbz#927601
6cf4d9
- Add myself as contributor to certdata2.pem.py and remove use of rcs/ident.
6cf4d9
  (thanks to Michael Shuler for suggesting to do so)
6cf4d9
- Update source URLs and comments, add source file for version information.
6cf4d9
6cf4d9
* Tue Mar 19 2013 Kai Engert <kaie@redhat.com> - 2012.87-11
6cf4d9
- adjust to changed and new functionality provided by p11-kit 0.17.3
6cf4d9
- updated READMEs to describe the new directory-specific treatment of files
6cf4d9
- ship a new file that contains certificates with neutral trust
6cf4d9
- ship a new file that contains distrust objects, and also staple a 
6cf4d9
  basic constraint extension to one legacy root contained in the
6cf4d9
  Mozilla CA list
6cf4d9
- adjust the build script to dynamically produce most of above files
6cf4d9
- add and own the anchors and blacklist subdirectories
6cf4d9
- file generate-cacerts.pl is no longer required
6cf4d9
6cf4d9
* Fri Mar 08 2013 Kai Engert <kaie@redhat.com> - 2012.87-9
6cf4d9
- Major rework for the Fedora SharedSystemCertificates feature.
6cf4d9
- Only ship a PEM bundle file using the BEGIN TRUSTED CERTIFICATE file format.
6cf4d9
- Require the p11-kit package that contains tools to automatically create
6cf4d9
  other file format bundles.
6cf4d9
- Convert old file locations to symbolic links that point to dynamically
6cf4d9
  generated files.
6cf4d9
- Old files, which might have been locally modified, will be saved in backup 
6cf4d9
  files with .rpmsave extension.
6cf4d9
- Added a update-ca-certificates script which can be used to regenerate
6cf4d9
  the merged trusted output.
6cf4d9
- Refer to the various README files that have been added for more detailed
6cf4d9
  explanation of the new system.
6cf4d9
- No longer require rsc for building.
6cf4d9
- Add explanation for the future version numbering scheme,
6cf4d9
  because the old numbering scheme was based on upstream using cvs,
6cf4d9
  which is no longer true, and therefore can no longer be used.
6cf4d9
- Includes changes from rhbz#873369.
6cf4d9
6cf4d9
* Thu Mar 07 2013 Kai Engert <kaie@redhat.com> - 2012.87-2.fc19.1
6cf4d9
- Ship trust bundle file in /usr/share/pki/ca-trust-source/, temporarily in addition.
6cf4d9
  This location will soon become the only place containing this file.
6cf4d9
6cf4d9
* Wed Feb 13 2013 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2012.87-2
6cf4d9
- Rebuilt for https://fedoraproject.org/wiki/Fedora_19_Mass_Rebuild
6cf4d9
6cf4d9
* Fri Jan 04 2013 Paul Wouters <pwouters@redhat.com> - 2012.87-1
6cf4d9
- Updated to r1.87 to blacklist mis-issued turktrust CA certs
6cf4d9
6cf4d9
* Wed Oct 24 2012 Paul Wouters <pwouters@redhat.com> - 2012.86-2
6cf4d9
- Updated blacklist with 20 entries (Diginotar, Trustwave, Comodo(?)
6cf4d9
- Fix to certdata2pem.py to also check for CKT_NSS_NOT_TRUSTED 
6cf4d9
6cf4d9
* Tue Oct 23 2012 Paul Wouters <pwouters@redhat.com> - 2012.86-1
6cf4d9
- update to r1.86
6cf4d9
6cf4d9
* Mon Jul 23 2012 Joe Orton <jorton@redhat.com> - 2012.85-2
6cf4d9
- add openssl to BuildRequires
6cf4d9
6cf4d9
* Mon Jul 23 2012 Joe Orton <jorton@redhat.com> - 2012.85-1
6cf4d9
- update to r1.85
6cf4d9
6cf4d9
* Wed Jul 18 2012 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2012.81-2
6cf4d9
- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild
6cf4d9
6cf4d9
* Mon Feb 13 2012 Joe Orton <jorton@redhat.com> - 2012.81-1
6cf4d9
- update to r1.81
6cf4d9
6cf4d9
* Thu Jan 12 2012 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2011.80-2
6cf4d9
- Rebuilt for https://fedoraproject.org/wiki/Fedora_17_Mass_Rebuild
6cf4d9
6cf4d9
* Wed Nov  9 2011 Joe Orton <jorton@redhat.com> - 2011.80-1
6cf4d9
- update to r1.80
6cf4d9
- fix handling of certs with dublicate Subject names (#733032)
6cf4d9
6cf4d9
* Thu Sep  1 2011 Joe Orton <jorton@redhat.com> - 2011.78-1
6cf4d9
- update to r1.78, removing trust from DigiNotar root (#734679)
6cf4d9
6cf4d9
* Wed Aug  3 2011 Joe Orton <jorton@redhat.com> - 2011.75-1
6cf4d9
- update to r1.75
6cf4d9
6cf4d9
* Wed Apr 20 2011 Joe Orton <jorton@redhat.com> - 2011.74-1
6cf4d9
- update to r1.74
6cf4d9
6cf4d9
* Tue Feb 08 2011 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2011.70-2
6cf4d9
- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild
6cf4d9
6cf4d9
* Wed Jan 12 2011 Joe Orton <jorton@redhat.com> - 2011.70-1
6cf4d9
- update to r1.70
6cf4d9
6cf4d9
* Tue Nov  9 2010 Joe Orton <jorton@redhat.com> - 2010.65-3
6cf4d9
- update to r1.65
6cf4d9
6cf4d9
* Wed Apr  7 2010 Joe Orton <jorton@redhat.com> - 2010.63-3
6cf4d9
- package /etc/ssl/certs symlink for third-party apps (#572725)
6cf4d9
6cf4d9
* Wed Apr  7 2010 Joe Orton <jorton@redhat.com> - 2010.63-2
6cf4d9
- rebuild
6cf4d9
6cf4d9
* Wed Apr  7 2010 Joe Orton <jorton@redhat.com> - 2010.63-1
6cf4d9
- update to certdata.txt r1.63
6cf4d9
- use upstream RCS version in Version
6cf4d9
6cf4d9
* Fri Mar 19 2010 Joe Orton <jorton@redhat.com> - 2010-4
6cf4d9
- fix ca-bundle.crt (#575111)
6cf4d9
6cf4d9
* Thu Mar 18 2010 Joe Orton <jorton@redhat.com> - 2010-3
6cf4d9
- update to certdata.txt r1.58
6cf4d9
- add /etc/pki/tls/certs/ca-bundle.trust.crt using 'TRUSTED CERTICATE' format
6cf4d9
- exclude ECC certs from the Java cacerts database
6cf4d9
- catch keytool failures
6cf4d9
- fail parsing certdata.txt on finding untrusted but not blacklisted cert
6cf4d9
6cf4d9
* Fri Jan 15 2010 Joe Orton <jorton@redhat.com> - 2010-2
6cf4d9
- fix Java cacert database generation: use Subject rather than Issuer
6cf4d9
  for alias name; add diagnostics; fix some alias names.
6cf4d9
6cf4d9
* Mon Jan 11 2010 Joe Orton <jorton@redhat.com> - 2010-1
6cf4d9
- adopt Python certdata.txt parsing script from Debian
6cf4d9
6cf4d9
* Fri Jul 24 2009 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2009-2
6cf4d9
- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild
6cf4d9
6cf4d9
* Wed Jul 22 2009 Joe Orton <jorton@redhat.com> 2009-1
6cf4d9
- update to certdata.txt r1.53
6cf4d9
6cf4d9
* Mon Feb 23 2009 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2008-8
6cf4d9
- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild
6cf4d9
6cf4d9
* Tue Oct 14 2008 Joe Orton <jorton@redhat.com> 2008-7
6cf4d9
- update to certdata.txt r1.49
6cf4d9
6cf4d9
* Wed Jun 25 2008 Thomas Fitzsimmons <fitzsim@redhat.com> - 2008-6
6cf4d9
- Change generate-cacerts.pl to produce pretty aliases.
6cf4d9
6cf4d9
* Mon Jun  2 2008 Joe Orton <jorton@redhat.com> 2008-5
6cf4d9
- include /etc/pki/tls/cert.pem symlink to ca-bundle.crt
6cf4d9
6cf4d9
* Tue May 27 2008 Joe Orton <jorton@redhat.com> 2008-4
6cf4d9
- use package name for temp dir, recreate it in prep
6cf4d9
6cf4d9
* Tue May 27 2008 Joe Orton <jorton@redhat.com> 2008-3
6cf4d9
- fix source script perms
6cf4d9
- mark packaged files as config(noreplace)
6cf4d9
6cf4d9
* Tue May 27 2008 Joe Orton <jorton@redhat.com> 2008-2
6cf4d9
- add (but don't use) mkcabundle.pl
6cf4d9
- tweak description
6cf4d9
- use /usr/bin/keytool directly; BR java-openjdk
6cf4d9
6cf4d9
* Tue May 27 2008 Joe Orton <jorton@redhat.com> 2008-1
6cf4d9
- Initial build (#448497)