Blame SPECS/ca-certificates.spec

13173e
%define pkidir %{_sysconfdir}/pki
13173e
%define catrustdir %{_sysconfdir}/pki/ca-trust
13173e
%define classic_tls_bundle ca-bundle.crt
13173e
%define openssl_format_trust_bundle ca-bundle.trust.crt
13173e
%define p11_format_bundle ca-bundle.trust.p11-kit
13173e
%define legacy_default_bundle ca-bundle.legacy.default.crt
13173e
%define legacy_disable_bundle ca-bundle.legacy.disable.crt
13173e
%define java_bundle java/cacerts
13173e
13173e
Summary: The Mozilla CA root certificate bundle
13173e
Name: ca-certificates
13173e
13173e
# For the package version number, we use: year.{upstream version}
13173e
#
13173e
# The {upstream version} can be found as symbol
13173e
# NSS_BUILTINS_LIBRARY_VERSION in file nss/lib/ckfw/builtins/nssckbi.h
13173e
# which corresponds to the data in file nss/lib/ckfw/builtins/certdata.txt.
13173e
#
13173e
# The files should be taken from a released version of NSS, as published
13173e
# at https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/
13173e
#
13173e
# The versions that are used by the latest released version of 
13173e
# Mozilla Firefox should be available from:
13173e
# https://hg.mozilla.org/releases/mozilla-release/raw-file/default/security/nss/lib/ckfw/builtins/nssckbi.h
13173e
# https://hg.mozilla.org/releases/mozilla-release/raw-file/default/security/nss/lib/ckfw/builtins/certdata.txt
13173e
#
13173e
# The most recent development versions of the files can be found at
13173e
# http://hg.mozilla.org/projects/nss/raw-file/default/lib/ckfw/builtins/nssckbi.h
13173e
# http://hg.mozilla.org/projects/nss/raw-file/default/lib/ckfw/builtins/certdata.txt
13173e
# (but these files might have not yet been released).
13173e
#
13173e
# (until 2012.87 the version was based on the cvs revision ID of certdata.txt,
13173e
# but in 2013 the NSS projected was migrated to HG. Old version 2012.87 is 
13173e
# equivalent to new version 2012.1.93, which would break the requirement 
13173e
# to have increasing version numbers. However, the new scheme will work, 
13173e
# because all future versions will start with 2013 or larger.)
13173e
d66206
Version: 2020.2.41
5d77ef
# On RHEL 8.x, please keep the release version >= 80
5d77ef
# When rebasing on Y-Stream (8.y), use 81, 82, 83, ...
5d77ef
# When rebasing on Z-Stream (8.y.z), use 80.0, 80.1, 80.2, ..
5d77ef
Release: 80.0%{?dist}
13173e
License: Public Domain
13173e
13173e
Group: System Environment/Base
13173e
URL: https://fedoraproject.org/wiki/CA-Certificates
13173e
13173e
#Please always update both certdata.txt and nssckbi.h
13173e
Source0: certdata.txt
13173e
Source1: nssckbi.h
13173e
Source2: update-ca-trust
13173e
Source3: trust-fixes
13173e
Source4: certdata2pem.py
13173e
Source5: ca-legacy.conf
13173e
Source6: ca-legacy
13173e
Source9: ca-legacy.8.txt
13173e
Source10: update-ca-trust.8.txt
13173e
Source11: README.usr
13173e
Source12: README.etc
13173e
Source13: README.extr
13173e
Source14: README.java
13173e
Source15: README.openssl
13173e
Source16: README.pem
13173e
Source17: README.edk2
13173e
Source18: README.src
13173e
13173e
BuildArch: noarch
13173e
13173e
Requires(post): bash
13173e
Requires(post): grep
13173e
Requires(post): sed
13173e
Requires(post): coreutils
13173e
Requires: bash
13173e
Requires: grep
13173e
Requires: sed
13173e
Requires(post): p11-kit >= 0.23.12
13173e
Requires(post): p11-kit-trust >= 0.23.12
13173e
Requires: p11-kit >= 0.23.12
13173e
Requires: p11-kit-trust >= 0.23.12
13173e
13173e
BuildRequires: perl-interpreter
5d77ef
BuildRequires: python3-devel
13173e
BuildRequires: openssl
13173e
BuildRequires: asciidoc
13173e
BuildRequires: libxslt
13173e
13173e
%description
13173e
This package contains the set of CA certificates chosen by the
13173e
Mozilla Foundation for use with the Internet PKI.
13173e
13173e
%prep
13173e
rm -rf %{name}
13173e
mkdir %{name}
13173e
mkdir %{name}/certs
13173e
mkdir %{name}/certs/legacy-default
13173e
mkdir %{name}/certs/legacy-disable
13173e
mkdir %{name}/java
13173e
13173e
%build
13173e
pushd %{name}/certs
13173e
 pwd
13173e
 cp %{SOURCE0} .
13173e
 %{__python3} %{SOURCE4} >c2p.log 2>c2p.err
13173e
popd
13173e
pushd %{name}
13173e
 (
13173e
   cat <
13173e
# This is a bundle of X.509 certificates of public Certificate
13173e
# Authorities.  It was generated from the Mozilla root CA list.
13173e
# These certificates and trust/distrust attributes use the file format accepted
13173e
# by the p11-kit-trust module.
13173e
#
13173e
# Source: nss/lib/ckfw/builtins/certdata.txt
13173e
# Source: nss/lib/ckfw/builtins/nssckbi.h
13173e
#
13173e
# Generated from:
13173e
EOF
13173e
   cat %{SOURCE1}  |grep -w NSS_BUILTINS_LIBRARY_VERSION | awk '{print "# " $2 " " $3}';
13173e
   echo '#';
13173e
 ) > %{p11_format_bundle}
13173e
13173e
 touch %{legacy_default_bundle}
13173e
 NUM_LEGACY_DEFAULT=`find certs/legacy-default -type f | wc -l`
13173e
 if [ $NUM_LEGACY_DEFAULT -ne 0 ]; then
13173e
     for f in certs/legacy-default/*.crt; do 
13173e
       echo "processing $f"
13173e
       tbits=`sed -n '/^# openssl-trust/{s/^.*=//;p;}' $f`
13173e
       alias=`sed -n '/^# alias=/{s/^.*=//;p;q;}' $f | sed "s/'//g" | sed 's/"//g'`
13173e
       targs=""
13173e
       if [ -n "$tbits" ]; then
13173e
          for t in $tbits; do
13173e
             targs="${targs} -addtrust $t"
13173e
          done
13173e
       fi
13173e
       if [ -n "$targs" ]; then
13173e
          echo "legacy default flags $targs for $f" >> info.trust
13173e
          openssl x509 -text -in "$f" -trustout $targs -setalias "$alias" >> %{legacy_default_bundle}
13173e
       fi
13173e
     done
13173e
 fi
13173e
13173e
 touch %{legacy_disable_bundle}
13173e
 NUM_LEGACY_DISABLE=`find certs/legacy-disable -type f | wc -l`
13173e
 if [ $NUM_LEGACY_DISABLE -ne 0 ]; then
13173e
     for f in certs/legacy-disable/*.crt; do 
13173e
       echo "processing $f"
13173e
       tbits=`sed -n '/^# openssl-trust/{s/^.*=//;p;}' $f`
13173e
       alias=`sed -n '/^# alias=/{s/^.*=//;p;q;}' $f | sed "s/'//g" | sed 's/"//g'`
13173e
       targs=""
13173e
       if [ -n "$tbits" ]; then
13173e
          for t in $tbits; do
13173e
             targs="${targs} -addtrust $t"
13173e
          done
13173e
       fi
13173e
       if [ -n "$targs" ]; then
13173e
          echo "legacy disable flags $targs for $f" >> info.trust
13173e
          openssl x509 -text -in "$f" -trustout $targs -setalias "$alias" >> %{legacy_disable_bundle}
13173e
       fi
13173e
     done
13173e
 fi
13173e
13173e
 P11FILES=`find certs -name \*.tmp-p11-kit | wc -l`
13173e
 if [ $P11FILES -ne 0 ]; then
13173e
   for p in certs/*.tmp-p11-kit; do 
13173e
     cat "$p" >> %{p11_format_bundle}
13173e
   done
13173e
 fi
13173e
 # Append our trust fixes
13173e
 cat %{SOURCE3} >> %{p11_format_bundle}
13173e
popd
13173e
13173e
#manpage
13173e
cp %{SOURCE10} %{name}/update-ca-trust.8.txt
13173e
asciidoc.py -v -d manpage -b docbook %{name}/update-ca-trust.8.txt
13173e
xsltproc --nonet -o %{name}/update-ca-trust.8 /usr/share/asciidoc/docbook-xsl/manpage.xsl %{name}/update-ca-trust.8.xml
13173e
13173e
cp %{SOURCE9} %{name}/ca-legacy.8.txt
13173e
asciidoc.py -v -d manpage -b docbook %{name}/ca-legacy.8.txt
13173e
xsltproc --nonet -o %{name}/ca-legacy.8 /usr/share/asciidoc/docbook-xsl/manpage.xsl %{name}/ca-legacy.8.xml
13173e
13173e
13173e
%install
13173e
rm -rf $RPM_BUILD_ROOT
13173e
mkdir -p -m 755 $RPM_BUILD_ROOT%{pkidir}/tls/certs
13173e
mkdir -p -m 755 $RPM_BUILD_ROOT%{pkidir}/java
13173e
mkdir -p -m 755 $RPM_BUILD_ROOT%{_sysconfdir}/ssl
13173e
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/source
13173e
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/source/anchors
13173e
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/source/blacklist
13173e
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/extracted
13173e
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/extracted/pem
13173e
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/extracted/openssl
13173e
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/extracted/java
13173e
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/extracted/edk2
13173e
mkdir -p -m 755 $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-source
13173e
mkdir -p -m 755 $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-source/anchors
13173e
mkdir -p -m 755 $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-source/blacklist
13173e
mkdir -p -m 755 $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-legacy
13173e
mkdir -p -m 755 $RPM_BUILD_ROOT%{_bindir}
13173e
mkdir -p -m 755 $RPM_BUILD_ROOT%{_mandir}/man8
13173e
13173e
install -p -m 644 %{name}/update-ca-trust.8 $RPM_BUILD_ROOT%{_mandir}/man8
13173e
install -p -m 644 %{name}/ca-legacy.8 $RPM_BUILD_ROOT%{_mandir}/man8
13173e
install -p -m 644 %{SOURCE11} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-source/README
13173e
install -p -m 644 %{SOURCE12} $RPM_BUILD_ROOT%{catrustdir}/README
13173e
install -p -m 644 %{SOURCE13} $RPM_BUILD_ROOT%{catrustdir}/extracted/README
13173e
install -p -m 644 %{SOURCE14} $RPM_BUILD_ROOT%{catrustdir}/extracted/java/README
13173e
install -p -m 644 %{SOURCE15} $RPM_BUILD_ROOT%{catrustdir}/extracted/openssl/README
13173e
install -p -m 644 %{SOURCE16} $RPM_BUILD_ROOT%{catrustdir}/extracted/pem/README
13173e
install -p -m 644 %{SOURCE17} $RPM_BUILD_ROOT%{catrustdir}/extracted/edk2/README
13173e
install -p -m 644 %{SOURCE18} $RPM_BUILD_ROOT%{catrustdir}/source/README
13173e
13173e
install -p -m 644 %{name}/%{p11_format_bundle} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-source/%{p11_format_bundle}
13173e
13173e
install -p -m 644 %{name}/%{legacy_default_bundle} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-legacy/%{legacy_default_bundle}
13173e
install -p -m 644 %{name}/%{legacy_disable_bundle} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-legacy/%{legacy_disable_bundle}
13173e
13173e
install -p -m 644 %{SOURCE5} $RPM_BUILD_ROOT%{catrustdir}/ca-legacy.conf
13173e
13173e
touch -r %{SOURCE0} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-source/%{p11_format_bundle}
13173e
13173e
touch -r %{SOURCE0} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-legacy/%{legacy_default_bundle}
13173e
touch -r %{SOURCE0} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-legacy/%{legacy_disable_bundle}
13173e
13173e
# TODO: consider to dynamically create the update-ca-trust script from within
13173e
#       this .spec file, in order to have the output file+directory names at once place only.
13173e
install -p -m 755 %{SOURCE2} $RPM_BUILD_ROOT%{_bindir}/update-ca-trust
13173e
13173e
install -p -m 755 %{SOURCE6} $RPM_BUILD_ROOT%{_bindir}/ca-legacy
13173e
13173e
# touch ghosted files that will be extracted dynamically
13173e
# Set chmod 444 to use identical permission
13173e
touch $RPM_BUILD_ROOT%{catrustdir}/extracted/pem/tls-ca-bundle.pem
13173e
chmod 444 $RPM_BUILD_ROOT%{catrustdir}/extracted/pem/tls-ca-bundle.pem
13173e
touch $RPM_BUILD_ROOT%{catrustdir}/extracted/pem/email-ca-bundle.pem
13173e
chmod 444 $RPM_BUILD_ROOT%{catrustdir}/extracted/pem/email-ca-bundle.pem
13173e
touch $RPM_BUILD_ROOT%{catrustdir}/extracted/pem/objsign-ca-bundle.pem
13173e
chmod 444 $RPM_BUILD_ROOT%{catrustdir}/extracted/pem/objsign-ca-bundle.pem
13173e
touch $RPM_BUILD_ROOT%{catrustdir}/extracted/openssl/%{openssl_format_trust_bundle}
13173e
chmod 444 $RPM_BUILD_ROOT%{catrustdir}/extracted/openssl/%{openssl_format_trust_bundle}
13173e
touch $RPM_BUILD_ROOT%{catrustdir}/extracted/%{java_bundle}
13173e
chmod 444 $RPM_BUILD_ROOT%{catrustdir}/extracted/%{java_bundle}
13173e
touch $RPM_BUILD_ROOT%{catrustdir}/extracted/edk2/cacerts.bin
13173e
chmod 444 $RPM_BUILD_ROOT%{catrustdir}/extracted/edk2/cacerts.bin
13173e
13173e
# /etc/ssl/certs symlink for 3rd-party tools
13173e
ln -s ../pki/tls/certs \
13173e
    $RPM_BUILD_ROOT%{_sysconfdir}/ssl/certs
13173e
# legacy filenames
13173e
ln -s %{catrustdir}/extracted/pem/tls-ca-bundle.pem \
13173e
    $RPM_BUILD_ROOT%{pkidir}/tls/cert.pem
13173e
ln -s %{catrustdir}/extracted/pem/tls-ca-bundle.pem \
13173e
    $RPM_BUILD_ROOT%{pkidir}/tls/certs/%{classic_tls_bundle}
13173e
ln -s %{catrustdir}/extracted/openssl/%{openssl_format_trust_bundle} \
13173e
    $RPM_BUILD_ROOT%{pkidir}/tls/certs/%{openssl_format_trust_bundle}
13173e
ln -s %{catrustdir}/extracted/%{java_bundle} \
13173e
    $RPM_BUILD_ROOT%{pkidir}/%{java_bundle}
13173e
13173e
13173e
%pre
13173e
if [ $1 -gt 1 ] ; then
13173e
  # Upgrade or Downgrade.
13173e
  # If the classic filename is a regular file, then we are upgrading
13173e
  # from an old package and we will move it to an .rpmsave backup file.
13173e
  # If the filename is a symbolic link, then we are good already.
13173e
  # If the system will later be downgraded to an old package with regular 
13173e
  # files, and afterwards updated again to a newer package with symlinks,
13173e
  # and the old .rpmsave backup file didn't get cleaned up,
13173e
  # then we don't backup again. We keep the older backup file.
13173e
  # In other words, if an .rpmsave file already exists, we don't overwrite it.
13173e
  #
13173e
  if ! test -e %{pkidir}/%{java_bundle}.rpmsave; then
13173e
    # no backup yet
13173e
    if test -e %{pkidir}/%{java_bundle}; then
13173e
      # a file exists
13173e
        if ! test -L %{pkidir}/%{java_bundle}; then
13173e
        # it's an old regular file, not a link
13173e
        mv -f %{pkidir}/%{java_bundle} %{pkidir}/%{java_bundle}.rpmsave
13173e
      fi
13173e
    fi
13173e
  fi
13173e
13173e
  if ! test -e %{pkidir}/tls/certs/%{classic_tls_bundle}.rpmsave; then
13173e
    # no backup yet
13173e
    if test -e %{pkidir}/tls/certs/%{classic_tls_bundle}; then
13173e
      # a file exists
13173e
      if ! test -L %{pkidir}/tls/certs/%{classic_tls_bundle}; then
13173e
        # it's an old regular file, not a link
13173e
        mv -f %{pkidir}/tls/certs/%{classic_tls_bundle} %{pkidir}/tls/certs/%{classic_tls_bundle}.rpmsave
13173e
      fi
13173e
    fi
13173e
  fi
13173e
13173e
  if ! test -e %{pkidir}/tls/certs/%{openssl_format_trust_bundle}.rpmsave; then
13173e
    # no backup yet
13173e
    if test -e %{pkidir}/tls/certs/%{openssl_format_trust_bundle}; then
13173e
      # a file exists
13173e
      if ! test -L %{pkidir}/tls/certs/%{openssl_format_trust_bundle}; then
13173e
        # it's an old regular file, not a link
13173e
        mv -f %{pkidir}/tls/certs/%{openssl_format_trust_bundle} %{pkidir}/tls/certs/%{openssl_format_trust_bundle}.rpmsave
13173e
      fi
13173e
    fi
13173e
  fi
13173e
fi
13173e
13173e
%post
13173e
#if [ $1 -gt 1 ] ; then
13173e
#  # when upgrading or downgrading
13173e
#fi
d66206
# if ln is available, go ahead and run the ca-legacy and update
d66206
# scripts. If not, wait until %posttrans.
d66206
if [ -x %{_bindir}/ln ]; then
13173e
%{_bindir}/ca-legacy install
13173e
%{_bindir}/update-ca-trust
d66206
fi
13173e
d66206
%posttrans
d66206
# When coreutils is installing with ca-certificates
d66206
# we need to wait until coreutils install to
d66206
# run our update since update requires ln to complete.
d66206
# There is a circular dependency here where
d66206
# ca-certificates depends on coreutils
d66206
# coreutils depends on openssl
d66206
# openssl depends on ca-certificates
d66206
# so we run the scripts here too, in case we couldn't run them in
d66206
# post. If we *could* run them in post this is an unnecessary
d66206
# duplication, but it shouldn't hurt anything
d66206
%{_bindir}/ca-legacy install
d66206
%{_bindir}/update-ca-trust
13173e
13173e
%files
13173e
%defattr(-,root,root,-)
13173e
13173e
%dir %{_sysconfdir}/ssl
13173e
%dir %{pkidir}/tls
13173e
%dir %{pkidir}/tls/certs
13173e
%dir %{pkidir}/java
13173e
%dir %{catrustdir}
13173e
%dir %{catrustdir}/source
13173e
%dir %{catrustdir}/source/anchors
13173e
%dir %{catrustdir}/source/blacklist
13173e
%dir %{catrustdir}/extracted
13173e
%dir %{catrustdir}/extracted/pem
13173e
%dir %{catrustdir}/extracted/openssl
13173e
%dir %{catrustdir}/extracted/java
13173e
%dir %{_datadir}/pki
13173e
%dir %{_datadir}/pki/ca-trust-source
13173e
%dir %{_datadir}/pki/ca-trust-source/anchors
13173e
%dir %{_datadir}/pki/ca-trust-source/blacklist
13173e
%dir %{_datadir}/pki/ca-trust-legacy
13173e
13173e
%config(noreplace) %{catrustdir}/ca-legacy.conf
13173e
13173e
%{_mandir}/man8/update-ca-trust.8.gz
13173e
%{_mandir}/man8/ca-legacy.8.gz
13173e
%{_datadir}/pki/ca-trust-source/README
13173e
%{catrustdir}/README
13173e
%{catrustdir}/extracted/README
13173e
%{catrustdir}/extracted/java/README
13173e
%{catrustdir}/extracted/openssl/README
13173e
%{catrustdir}/extracted/pem/README
13173e
%{catrustdir}/extracted/edk2/README
13173e
%{catrustdir}/source/README
13173e
13173e
# symlinks for old locations
13173e
%{pkidir}/tls/cert.pem
13173e
%{pkidir}/tls/certs/%{classic_tls_bundle}
13173e
%{pkidir}/tls/certs/%{openssl_format_trust_bundle}
13173e
%{pkidir}/%{java_bundle}
13173e
# symlink directory
13173e
%{_sysconfdir}/ssl/certs
13173e
13173e
# master bundle file with trust
13173e
%{_datadir}/pki/ca-trust-source/%{p11_format_bundle}
13173e
13173e
%{_datadir}/pki/ca-trust-legacy/%{legacy_default_bundle}
13173e
%{_datadir}/pki/ca-trust-legacy/%{legacy_disable_bundle}
13173e
# update/extract tool
13173e
%{_bindir}/update-ca-trust
13173e
%{_bindir}/ca-legacy
13173e
%ghost %{catrustdir}/source/ca-bundle.legacy.crt
13173e
# files extracted files
13173e
%ghost %{catrustdir}/extracted/pem/tls-ca-bundle.pem
13173e
%ghost %{catrustdir}/extracted/pem/email-ca-bundle.pem
13173e
%ghost %{catrustdir}/extracted/pem/objsign-ca-bundle.pem
13173e
%ghost %{catrustdir}/extracted/openssl/%{openssl_format_trust_bundle}
13173e
%ghost %{catrustdir}/extracted/%{java_bundle}
13173e
%ghost %{catrustdir}/extracted/edk2/cacerts.bin
13173e
13173e
13173e
%changelog
d66206
*Wed Jun 10 2020 Bob Relyea <rrelyea@redhat.com> - 2020.2.41-80.0
d66206
- Update to CKBI 2.41 from NSS 3.53.0
d66206
-    Removing:
d66206
-     # Certificate "AddTrust Low-Value Services Root"
d66206
-     # Certificate "AddTrust External Root"
d66206
-     # Certificate "UTN USERFirst Email Root CA"
d66206
-     # Certificate "Certplus Class 2 Primary CA"
d66206
-     # Certificate "Deutsche Telekom Root CA 2"
d66206
-     # Certificate "Staat der Nederlanden Root CA - G2"
d66206
-     # Certificate "Swisscom Root CA 2"
d66206
-     # Certificate "Certinomis - Root CA"
d66206
-    Adding:
d66206
-     # Certificate "Entrust Root Certification Authority - G4"
d66206
d66206
*Fri Jun 21 2019 Bob Relyea <rrelyea@redhat.com> - 2019.2.32-1
5d77ef
- Update to CKBI 2.32 from NSS 3.44
5d77ef
-  Removing:
5d77ef
-   # Certificate "Visa eCommerce Root"
5d77ef
-   # Certificate "AC Raiz Certicamara S.A."
5d77ef
-   # Certificate "ComSign CA"
5d77ef
-   # Certificate "Certplus Root CA G1"
5d77ef
-   # Certificate "Certplus Root CA G2"
5d77ef
-   # Certificate "OpenTrust Root CA G1"
5d77ef
-   # Certificate "OpenTrust Root CA G2"
5d77ef
-   # Certificate "OpenTrust Root CA G3"
5d77ef
-  Adding:
5d77ef
-   # Certificate "GlobalSign Root CA - R6"
5d77ef
-   # Certificate "OISTE WISeKey Global Root GC CA"
5d77ef
-   # Certificate "GTS Root R1"
5d77ef
-   # Certificate "GTS Root R2"
5d77ef
-   # Certificate "GTS Root R3"
5d77ef
-   # Certificate "GTS Root R4"
5d77ef
-   # Certificate "UCA Global G2 Root"
5d77ef
-   # Certificate "UCA Extended Validation Root"
5d77ef
-   # Certificate "Certigna Root CA"
5d77ef
-   # Certificate "emSign Root CA - G1"
5d77ef
-   # Certificate "emSign ECC Root CA - G3"
5d77ef
-   # Certificate "emSign Root CA - C1"
5d77ef
-   # Certificate "emSign ECC Root CA - C3"
5d77ef
-   # Certificate "Hongkong Post Root CA 3"
5d77ef
5d77ef
* Fri May 10 2019 Robert Relyea <rrelyea@redhat.com> - 2018.2.24-6.1
5d77ef
- Test gating
5d77ef
13173e
* Mon Aug 13 2018 Tomáš Mráz <tmraz@redhat.com> - 2018.2.24-6
13173e
- Use __python3 macro when invoking Python
13173e
13173e
* Thu Jun 28 2018 Kai Engert <kaie@redhat.com> - 2018.2.24-5
13173e
- Ported scripts to python3
13173e
13173e
* Mon Jun 11 2018 Daiki Ueno <dueno@redhat.com> - 2018.2.24-4
13173e
- Extract certificate bundle in EDK2 format, suggested by Laszlo Ersek
13173e
13173e
* Mon Jun 04 2018 Kai Engert <kaie@redhat.com> - 2018.2.24-3
13173e
- Adjust ghost file permissions, rhbz#1564432
13173e
13173e
* Fri May 18 2018 Kai Engert <kaie@redhat.com> - 2018.2.24-2
13173e
- Update to CKBI 2.24 from NSS 3.37
13173e
13173e
* Wed Mar 14 2018 Iryna Shcherbina <ishcherb@redhat.com> - 2018.2.22-4
13173e
- Update Python 2 dependency declarations to new packaging standards
13173e
  (See https://fedoraproject.org/wiki/FinalizingFedoraSwitchtoPython3)
13173e
13173e
* Fri Feb 23 2018 Patrick Uiterwijk <puiterwijk@redhat.com> - 2018.2.22-3
13173e
- Add post dep on coreutils for ln(1)
13173e
13173e
* Tue Feb 06 2018 Kai Engert <kaie@redhat.com> - 2018.2.22-2
13173e
- Update to CKBI 2.22 from NSS 3.35
13173e
13173e
* Mon Jan 22 2018 Kai Engert <kaie@redhat.com> - 2017.2.20-6
13173e
- Depend on bash, grep, sed. Required for ca-legacy script execution.
13173e
- p11-kit is already required at %%post execution time. (rhbz#1537127)
13173e
13173e
* Fri Jan 19 2018 Kai Engert <kaie@redhat.com> - 2017.2.20-5
13173e
- Use the force, script! (Which sln did by default).
13173e
13173e
* Fri Jan 19 2018 Kai Engert <kaie@redhat.com> - 2017.2.20-4
13173e
- stop using sln in ca-legacy script.
13173e
13173e
* Fri Jan 19 2018 Kai Engert <kaie@redhat.com> - 2017.2.20-3
13173e
- Use ln -s, because sln was removed from glibc. rhbz#1536349
13173e
13173e
* Mon Nov 27 2017 Kai Engert <kaie@redhat.com> - 2017.2.20-2
13173e
- Update to CKBI 2.20 from NSS 3.34.1
13173e
13173e
* Tue Aug 15 2017 Kai Engert <kaie@redhat.com> - 2017.2.16-4
13173e
- Set P11_KIT_NO_USER_CONFIG=1 to prevent p11-kit from reading user
13173e
  configuration files (rhbz#1478172).
13173e
13173e
* Wed Jul 26 2017 Fedora Release Engineering <releng@fedoraproject.org> - 2017.2.16-3
13173e
- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild
13173e
13173e
* Wed Jul 19 2017 Kai Engert <kaie@redhat.com> - 2017.2.16-2
13173e
- Update to (yet unreleased) CKBI 2.16 which is planned for NSS 3.32.
13173e
  Mozilla removed all trust bits for code signing.
13173e
13173e
* Wed Apr 26 2017 Kai Engert <kaie@redhat.com> - 2017.2.14-2
13173e
- Update to CKBI 2.14 from NSS 3.30.2
13173e
13173e
* Thu Feb 23 2017 Kai Engert <kaie@redhat.com> - 2017.2.11-5
13173e
- For CAs trusted by Mozilla, set attribute nss-mozilla-ca-policy: true
13173e
- Set attribute modifiable: false
13173e
- Require p11-kit 0.23.4
13173e
13173e
* Mon Feb 13 2017 Kai Engert <kaie@redhat.com> - 2017.2.11-4
13173e
- Changed the packaged bundle to use the flexible p11-kit-object-v1 file format,
13173e
  as a preparation to fix bugs in the interaction between p11-kit-trust and
13173e
  Mozilla applications, such as Firefox, Thunderbird etc.
13173e
- Changed update-ca-trust to add comments to extracted PEM format files.
13173e
- Added an utility to help with comparing output of the trust dump command.
13173e
13173e
* Fri Feb 10 2017 Fedora Release Engineering <releng@fedoraproject.org> - 2017.2.11-3
13173e
- Rebuilt for https://fedoraproject.org/wiki/Fedora_26_Mass_Rebuild
13173e
13173e
* Wed Jan 11 2017 Kai Engert <kaie@redhat.com> - 2017.2.11-2
13173e
- Update to CKBI 2.11 from NSS 3.28.1
13173e
13173e
* Thu Sep 29 2016 Kai Engert <kaie@redhat.com> - 2016.2.10-2
13173e
- Update to CKBI 2.10 from NSS 3.27
13173e
13173e
* Tue Aug 16 2016 Kai Engert <kaie@redhat.com> - 2016.2.9-3
13173e
- Revert to the unmodified upstream CA list, changing the legacy trust
13173e
  to an empty list. Keeping the ca-legacy tool and existing config,
13173e
  however, the configuration has no effect after this change.
13173e
13173e
* Tue Aug 16 2016 Kai Engert <kaie@redhat.com> - 2016.2.9-2
13173e
- Update to CKBI 2.9 from NSS 3.26 with legacy modifications
13173e
13173e
* Fri Jul 15 2016 Kai Engert <kaie@redhat.com> - 2016.2.8-2
13173e
- Update to CKBI 2.8 from NSS 3.25 with legacy modifications
13173e
13173e
* Tue May 10 2016 Kai Engert <kaie@redhat.com> - 2016.2.7-5
13173e
- Only create backup files if there is an original file (bug 999017).
13173e
13173e
* Tue May 10 2016 Kai Engert <kaie@redhat.com> - 2016.2.7-4
13173e
- Use sln, not ln, to avoid the dependency on coreutils.
13173e
13173e
* Mon Apr 25 2016 Kai Engert <kaie@redhat.com> - 2016.2.7-3
13173e
- Fix typos in a manual page and in a README file.
13173e
13173e
* Wed Mar 16 2016 Kai Engert <kaie@redhat.com> - 2016.2.7-2
13173e
- Update to CKBI 2.7 from NSS 3.23 with legacy modifications
13173e
13173e
* Wed Feb 03 2016 Fedora Release Engineering <releng@fedoraproject.org> - 2015.2.6-3
13173e
- Rebuilt for https://fedoraproject.org/wiki/Fedora_24_Mass_Rebuild
13173e
13173e
* Mon Nov 23 2015 Kai Engert <kaie@redhat.com> - 2015.2.6-2
13173e
- Update to CKBI 2.6 from NSS 3.21 with legacy modifications
13173e
13173e
* Thu Aug 13 2015 Kai Engert <kaie@redhat.com> - 2015.2.5-2
13173e
- Update to CKBI 2.5 from NSS 3.19.3 with legacy modifications
13173e
13173e
* Wed Jun 17 2015 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2015.2.4-3
13173e
- Rebuilt for https://fedoraproject.org/wiki/Fedora_23_Mass_Rebuild
13173e
13173e
* Tue May 05 2015 Kai Engert <kaie@redhat.com> - 2015.2.4-2
13173e
- Update to CKBI 2.4 from NSS 3.18.1 with legacy modifications
13173e
13173e
* Tue May 05 2015 Kai Engert <kaie@redhat.com> - 2015.2.3-4
13173e
- Fixed a typo in the ca-legacy manual page.
13173e
13173e
* Tue Mar 31 2015 Kai Engert <kaie@redhat.com> - 2015.2.3-3
13173e
- Don't use "enable" as a value for the legacy configuration, instead
13173e
  of the value "default", to make it clear that this preference isn't
13173e
  a promise to keep certificates enabled, but rather that we only
13173e
  keep them enabled as long as it's considered necessary.
13173e
- Changed the configuration file, the ca-legacy utility and filenames
13173e
  to use the term "default" (instead of the term "enable").
13173e
- Added a manual page for the ca-legacy utility.
13173e
- Fixed the ca-legacy utility to handle absence of the configuration
13173e
  setting and treat absence as the default setting.
13173e
13173e
* Fri Mar 20 2015 Kai Engert <kaie@redhat.com> - 2015.2.3-2
13173e
- Update to CKBI 2.3 from NSS 3.18 with legacy modifications
13173e
- Fixed a mistake in the legacy handling of the upstream 2.2 release:
13173e
  Removed two AOL certificates from the legacy group, because
13173e
  upstream didn't remove them as part of phasing out 1024-bit
13173e
  certificates, which means it isn't necessary to keep them.
13173e
- Fixed a mistake in the legacy handling of the upstream 2.1 release:
13173e
  Moved two NetLock certificates into the legacy group.
13173e
13173e
* Tue Dec 16 2014 Kai Engert <kaie@redhat.com> - 2014.2.2-2
13173e
- Update to CKBI 2.2 from NSS 3.17.3 with legacy modifications
13173e
- Update project URL
13173e
- Cleanup
13173e
13173e
* Sat Nov 15 2014 Peter Lemenkov <lemenkov@gmail.com> - 2014.2.1-7
13173e
- Restore Requires: coreutils
13173e
13173e
* Fri Nov 14 2014 Peter Lemenkov <lemenkov@gmail.com> - 2014.2.1-6
13173e
- A proper fix for rhbz#1158343
13173e
13173e
* Wed Oct 29 2014 Kai Engert <kaie@redhat.com> - 2014.2.1-5
13173e
- add Requires: coreutils (rhbz#1158343)
13173e
13173e
* Tue Oct 28 2014 Kai Engert <kaie@redhat.com> - 2014.2.1-4
13173e
- Introduce the ca-legacy utility and a ca-legacy.conf configuration file.
13173e
  By default, legacy roots required for OpenSSL/GnuTLS compatibility
13173e
  are kept enabled. Using the ca-legacy utility, the legacy roots can be
13173e
  disabled. If disabled, the system will use the trust set as provided
13173e
  by the upstream Mozilla CA list. (See also: rhbz#1158197)
13173e
13173e
* Sun Sep 21 2014 Kai Engert <kaie@redhat.com> - 2014.2.1-3
13173e
- Temporarily re-enable several legacy root CA certificates because of
13173e
  compatibility issues with software based on OpenSSL/GnuTLS,
13173e
  see rhbz#1144808
13173e
13173e
* Thu Aug 14 2014 Kai Engert <kaie@redhat.com> - 2014.2.1-2
13173e
- Update to CKBI 2.1 from NSS 3.16.4
13173e
- Fix rhbz#1130226
13173e
13173e
* Sat Jun 07 2014 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2013.1.97-3
13173e
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
13173e
13173e
* Wed Mar 19 2014 Kai Engert <kaie@redhat.com> - 2013.1.97-2
13173e
- Update to CKBI 1.97 from NSS 3.16
13173e
13173e
* Mon Feb 10 2014 Kai Engert <kaie@redhat.com> - 2013.1.96-3
13173e
- Remove openjdk build dependency
13173e
13173e
* Sat Jan 25 2014 Ville Skyttä <ville.skytta@iki.fi> - 2013.1.96-2
13173e
- Own the %%{_datadir}/pki dir.
13173e
13173e
* Thu Jan 09 2014 Kai Engert <kaie@redhat.com> - 2013.1.96-1
13173e
- Update to CKBI 1.96 from NSS 3.15.4
13173e
13173e
* Tue Dec 17 2013 Kai Engert <kaie@redhat.com> - 2013.1.95-1
13173e
- Update to CKBI 1.95 from NSS 3.15.3.1
13173e
13173e
* Fri Sep 06 2013 Kai Engert <kaie@redhat.com> - 2013.1.94-18
13173e
- Update the Entrust root stapled extension for compatibility with 
13173e
  p11-kit version 0.19.2, patch by Stef Walter, rhbz#988745
13173e
13173e
* Tue Sep 03 2013 Kai Engert <kaie@redhat.com> - 2013.1.94-17
13173e
- merge manual improvement from f19
13173e
13173e
* Sat Aug 03 2013 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2013.1.94-16
13173e
- Rebuilt for https://fedoraproject.org/wiki/Fedora_20_Mass_Rebuild
13173e
13173e
* Tue Jul 09 2013 Kai Engert <kaie@redhat.com> - 2013.1.94-15
13173e
- clarification updates to manual page
13173e
13173e
* Mon Jul 08 2013 Kai Engert <kaie@redhat.com> - 2013.1.94-14
13173e
- added a manual page and related build requirements
13173e
- simplify the README files now that we have a manual page
13173e
- set a certificate alias in trusted bundle (thanks to Ludwig Nussel)
13173e
13173e
* Mon May 27 2013 Kai Engert <kaie@redhat.com> - 2013.1.94-13
13173e
- use correct command in README files, rhbz#961809
13173e
13173e
* Mon May 27 2013 Kai Engert <kaie@redhat.com> - 2013.1.94-12
13173e
- update to version 1.94 provided by NSS 3.15 (beta)
13173e
13173e
* Mon Apr 22 2013 Kai Engert <kaie@redhat.com> - 2012.87-12
13173e
- Use both label and serial to identify cert during conversion, rhbz#927601
13173e
- Add myself as contributor to certdata2.pem.py and remove use of rcs/ident.
13173e
  (thanks to Michael Shuler for suggesting to do so)
13173e
- Update source URLs and comments, add source file for version information.
13173e
13173e
* Tue Mar 19 2013 Kai Engert <kaie@redhat.com> - 2012.87-11
13173e
- adjust to changed and new functionality provided by p11-kit 0.17.3
13173e
- updated READMEs to describe the new directory-specific treatment of files
13173e
- ship a new file that contains certificates with neutral trust
13173e
- ship a new file that contains distrust objects, and also staple a 
13173e
  basic constraint extension to one legacy root contained in the
13173e
  Mozilla CA list
13173e
- adjust the build script to dynamically produce most of above files
13173e
- add and own the anchors and blacklist subdirectories
13173e
- file generate-cacerts.pl is no longer required
13173e
13173e
* Fri Mar 08 2013 Kai Engert <kaie@redhat.com> - 2012.87-9
13173e
- Major rework for the Fedora SharedSystemCertificates feature.
13173e
- Only ship a PEM bundle file using the BEGIN TRUSTED CERTIFICATE file format.
13173e
- Require the p11-kit package that contains tools to automatically create
13173e
  other file format bundles.
13173e
- Convert old file locations to symbolic links that point to dynamically
13173e
  generated files.
13173e
- Old files, which might have been locally modified, will be saved in backup 
13173e
  files with .rpmsave extension.
13173e
- Added a update-ca-certificates script which can be used to regenerate
13173e
  the merged trusted output.
13173e
- Refer to the various README files that have been added for more detailed
13173e
  explanation of the new system.
13173e
- No longer require rsc for building.
13173e
- Add explanation for the future version numbering scheme,
13173e
  because the old numbering scheme was based on upstream using cvs,
13173e
  which is no longer true, and therefore can no longer be used.
13173e
- Includes changes from rhbz#873369.
13173e
13173e
* Thu Mar 07 2013 Kai Engert <kaie@redhat.com> - 2012.87-2.fc19.1
13173e
- Ship trust bundle file in /usr/share/pki/ca-trust-source/, temporarily in addition.
13173e
  This location will soon become the only place containing this file.
13173e
13173e
* Wed Feb 13 2013 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2012.87-2
13173e
- Rebuilt for https://fedoraproject.org/wiki/Fedora_19_Mass_Rebuild
13173e
13173e
* Fri Jan 04 2013 Paul Wouters <pwouters@redhat.com> - 2012.87-1
13173e
- Updated to r1.87 to blacklist mis-issued turktrust CA certs
13173e
13173e
* Wed Oct 24 2012 Paul Wouters <pwouters@redhat.com> - 2012.86-2
13173e
- Updated blacklist with 20 entries (Diginotar, Trustwave, Comodo(?)
13173e
- Fix to certdata2pem.py to also check for CKT_NSS_NOT_TRUSTED 
13173e
13173e
* Tue Oct 23 2012 Paul Wouters <pwouters@redhat.com> - 2012.86-1
13173e
- update to r1.86
13173e
13173e
* Mon Jul 23 2012 Joe Orton <jorton@redhat.com> - 2012.85-2
13173e
- add openssl to BuildRequires
13173e
13173e
* Mon Jul 23 2012 Joe Orton <jorton@redhat.com> - 2012.85-1
13173e
- update to r1.85
13173e
13173e
* Wed Jul 18 2012 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2012.81-2
13173e
- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild
13173e
13173e
* Mon Feb 13 2012 Joe Orton <jorton@redhat.com> - 2012.81-1
13173e
- update to r1.81
13173e
13173e
* Thu Jan 12 2012 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2011.80-2
13173e
- Rebuilt for https://fedoraproject.org/wiki/Fedora_17_Mass_Rebuild
13173e
13173e
* Wed Nov  9 2011 Joe Orton <jorton@redhat.com> - 2011.80-1
13173e
- update to r1.80
13173e
- fix handling of certs with dublicate Subject names (#733032)
13173e
13173e
* Thu Sep  1 2011 Joe Orton <jorton@redhat.com> - 2011.78-1
13173e
- update to r1.78, removing trust from DigiNotar root (#734679)
13173e
13173e
* Wed Aug  3 2011 Joe Orton <jorton@redhat.com> - 2011.75-1
13173e
- update to r1.75
13173e
13173e
* Wed Apr 20 2011 Joe Orton <jorton@redhat.com> - 2011.74-1
13173e
- update to r1.74
13173e
13173e
* Tue Feb 08 2011 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2011.70-2
13173e
- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild
13173e
13173e
* Wed Jan 12 2011 Joe Orton <jorton@redhat.com> - 2011.70-1
13173e
- update to r1.70
13173e
13173e
* Tue Nov  9 2010 Joe Orton <jorton@redhat.com> - 2010.65-3
13173e
- update to r1.65
13173e
13173e
* Wed Apr  7 2010 Joe Orton <jorton@redhat.com> - 2010.63-3
13173e
- package /etc/ssl/certs symlink for third-party apps (#572725)
13173e
13173e
* Wed Apr  7 2010 Joe Orton <jorton@redhat.com> - 2010.63-2
13173e
- rebuild
13173e
13173e
* Wed Apr  7 2010 Joe Orton <jorton@redhat.com> - 2010.63-1
13173e
- update to certdata.txt r1.63
13173e
- use upstream RCS version in Version
13173e
13173e
* Fri Mar 19 2010 Joe Orton <jorton@redhat.com> - 2010-4
13173e
- fix ca-bundle.crt (#575111)
13173e
13173e
* Thu Mar 18 2010 Joe Orton <jorton@redhat.com> - 2010-3
13173e
- update to certdata.txt r1.58
13173e
- add /etc/pki/tls/certs/ca-bundle.trust.crt using 'TRUSTED CERTICATE' format
13173e
- exclude ECC certs from the Java cacerts database
13173e
- catch keytool failures
13173e
- fail parsing certdata.txt on finding untrusted but not blacklisted cert
13173e
13173e
* Fri Jan 15 2010 Joe Orton <jorton@redhat.com> - 2010-2
13173e
- fix Java cacert database generation: use Subject rather than Issuer
13173e
  for alias name; add diagnostics; fix some alias names.
13173e
13173e
* Mon Jan 11 2010 Joe Orton <jorton@redhat.com> - 2010-1
13173e
- adopt Python certdata.txt parsing script from Debian
13173e
13173e
* Fri Jul 24 2009 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2009-2
13173e
- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild
13173e
13173e
* Wed Jul 22 2009 Joe Orton <jorton@redhat.com> 2009-1
13173e
- update to certdata.txt r1.53
13173e
13173e
* Mon Feb 23 2009 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2008-8
13173e
- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild
13173e
13173e
* Tue Oct 14 2008 Joe Orton <jorton@redhat.com> 2008-7
13173e
- update to certdata.txt r1.49
13173e
13173e
* Wed Jun 25 2008 Thomas Fitzsimmons <fitzsim@redhat.com> - 2008-6
13173e
- Change generate-cacerts.pl to produce pretty aliases.
13173e
13173e
* Mon Jun  2 2008 Joe Orton <jorton@redhat.com> 2008-5
13173e
- include /etc/pki/tls/cert.pem symlink to ca-bundle.crt
13173e
13173e
* Tue May 27 2008 Joe Orton <jorton@redhat.com> 2008-4
13173e
- use package name for temp dir, recreate it in prep
13173e
13173e
* Tue May 27 2008 Joe Orton <jorton@redhat.com> 2008-3
13173e
- fix source script perms
13173e
- mark packaged files as config(noreplace)
13173e
13173e
* Tue May 27 2008 Joe Orton <jorton@redhat.com> 2008-2
13173e
- add (but don't use) mkcabundle.pl
13173e
- tweak description
13173e
- use /usr/bin/keytool directly; BR java-openjdk
13173e
13173e
* Tue May 27 2008 Joe Orton <jorton@redhat.com> 2008-1
13173e
- Initial build (#448497)