6696b9
%if 0%{?fedora} > 15 || 0%{?rhel} > 6
6696b9
%global systemd 1
6696b9
%global	sysvinit 0
6696b9
%else
6696b9
%global systemd 0
6696b9
%global	sysvinit 1
6696b9
%endif
6696b9
6696b9
%if 0%{?fedora} > 15 && 0%{?fedora} < 20
6696b9
%global systemdsysv 1
6696b9
%else
6696b9
%global systemdsysv 0
6696b9
%endif
6696b9
6696b9
%if 0%{?fedora} > 14 || 0%{?rhel} > 6
6696b9
%global tmpfiles 1
6696b9
%else
6696b9
%global tmpfiles 0
6696b9
%endif
6696b9
6696b9
%if 0%{?fedora} > 9 || 0%{?rhel} > 5
6696b9
%global sysvinitdir %{_initddir}
6696b9
%else
6696b9
%global sysvinitdir %{_initrddir}
6696b9
%endif
6696b9
6696b9
Name:		certmonger
6696b9
Version:	0.78.4
10e13a
Release:	10%{?dist}
6696b9
Summary:	Certificate status monitor and PKI enrollment client
6696b9
6696b9
Group:		System Environment/Daemons
6696b9
License:	GPLv3+
10e13a
URL:		https://pagure.io/certmonger/
10e13a
Source0:	https://releases.pagure.org/certmonger/certmonger-%{version}.tar.gz
10e13a
Source1:	https://releases.pagure.org/released/certmonger/certmonger-%{version}.tar.gz.sig
6696b9
BuildRoot:	%(mktemp -ud %{_tmppath}/%{name}-%{version}-%{release}-XXXXXX)
6696b9
6696b9
Patch0001:	0001-Stop-assuming-RSA-512-works.patch
6696b9
Patch0002:	0002-Stop-assuming-RSA-512-works-part-two.patch
6696b9
Patch0003:	0003-Add-issuer-request-option-for-specifying-issuer.patch
6696b9
Patch0004:	0004-Documentation-mark-CERTMONGER_CA_ISSUER-as-0.79.patch
6696b9
Patch0005:	0005-Comment-whitespace-fixup.patch
6696b9
Patch0006:	0006-ipa-submit-Retry-without-ca-on-OptionError.patch
6696b9
Patch0007:	0007-getcert-fix-a-potential-out-of-bounds.patch
6696b9
Patch0008:	0008-Document-the-X-option-in-the-ipa-submit-man-page.patch
6696b9
Patch0009:	0009-Fix-a-flakiness-in-the-028-dbus-test.patch
6696b9
Patch0010:	0010-Set-all-bits-to-1-in-local-CA-Basic-Constraint-to-se.patch
6696b9
Patch0011:	0011-Fix-conversions-of-bit-lengths-to-byte-lengths.patch
10e13a
Patch0012:	0012-Remove-trailing-CR-LF-when-reading-passwords-from-a-.patch
10e13a
Patch0013:	0013-Disable-the-10-iterate-tests-which-randomly-fail.patch
10e13a
Patch0014:	0014-MS-cert-template-add-D-Bus-property-and-storage.patch
10e13a
Patch0015:	0015-MS-cert-template-add-template-extension-to-CSR.patch
10e13a
Patch0016:	0016-MS-cert-template-add-option-to-command-line-programs.patch
10e13a
Patch0017:	0017-MS-cert-template-validate-argument.patch
10e13a
Patch0018:	0018-MS-cert-template-add-tests.patch
10e13a
Patch0019:	0019-Fix-C99-build-error-on-EL7-systems.patch
6696b9
6696b9
Patch1001:	1001-Remove-rekey-feature.patch
6696b9
Patch1002:	1002-Fix-CA-option-name-for-ipa-cert-request.patch
6696b9
6696b9
BuildRequires:	openldap-devel
6696b9
BuildRequires:	dbus-devel, nspr-devel, nss-devel, openssl-devel, libidn-devel
6696b9
%if 0%{?fedora} >= 12 || 0%{?rhel} >= 6
6696b9
BuildRequires:  libuuid-devel
6696b9
%else
6696b9
BuildRequires:  e2fsprogs-devel
6696b9
%endif
6696b9
BuildRequires:	libtalloc-devel, libtevent-devel
6696b9
%if 0%{?rhel} >= 6 || 0%{?fedora} >= 9
6696b9
BuildRequires:	libcurl-devel
6696b9
%else
6696b9
BuildRequires:	curl-devel
6696b9
%endif
6696b9
BuildRequires:	libxml2-devel, xmlrpc-c-devel
6696b9
%if 0%{?rhel} < 6
6696b9
BuildRequires:	bind-libbind-devel
6696b9
%endif
6696b9
# Required for 'make check':
6696b9
#  for diff and cmp
6696b9
BuildRequires:	diffutils
6696b9
#  for expect
6696b9
BuildRequires:	expect
6696b9
#  for mktemp, which was absorbed into coreutils at some point
6696b9
BuildRequires:	mktemp
6696b9
#  for certutil and pk12util
6696b9
BuildRequires:	nss-tools
6696b9
#  for openssl
6696b9
BuildRequires:	openssl
6696b9
#  for dbus-launch
6696b9
BuildRequires:	/usr/bin/dbus-launch
6696b9
#  for dos2unix
6696b9
BuildRequires:	/usr/bin/dos2unix
6696b9
BuildRequires:	/usr/bin/unix2dos
6696b9
#  for which
6696b9
BuildRequires:	/usr/bin/which
6696b9
#  for dbus tests
6696b9
BuildRequires:	dbus-python
6696b9
#  for popt or popt-devel, depending on the build environment
6696b9
BuildRequires: /usr/include/popt.h
10e13a
BuildRequires:  autoconf
10e13a
BuildRequires:  automake
10e13a
BuildRequires:  pkgconfig
10e13a
BuildRequires:  libtool
10e13a
BuildRequires:	gettext-devel
6696b9
6696b9
# we need a running system bus
6696b9
Requires:	dbus
6696b9
10e13a
# for killall in post script
10e13a
Requires:      psmisc
10e13a
6696b9
%if %{systemd}
6696b9
BuildRequires:	systemd-units
6696b9
Requires(post):	systemd-units
6696b9
Requires(preun):	systemd-units, dbus, sed
6696b9
Requires(postun):	systemd-units
6696b9
%endif
6696b9
6696b9
%if %{systemdsysv}
6696b9
Requires(post):	systemd-sysv
6696b9
%global systemdsysvsave \
6696b9
# Save the current service runlevel info, in case the user wants \
6696b9
# to apply the enabled status manually later, by running \
6696b9
#   "systemd-sysv-convert --apply certmonger". \
6696b9
%{_bindir}/systemd-sysv-convert --save certmonger >/dev/null 2>&1 ||:
6696b9
%else
6696b9
%global systemdsysvsave %{nil}
6696b9
%endif
6696b9
6696b9
%if %{sysvinit}
6696b9
Requires(post):	/sbin/chkconfig, /sbin/service
6696b9
Requires(preun):	/sbin/chkconfig, /sbin/service, dbus, sed
6696b9
%endif
6696b9
6696b9
%if 0%{?fedora} >= 15
6696b9
# Certain versions of libtevent have incorrect internal ABI versions.
6696b9
Conflicts: libtevent < 0.9.13
6696b9
%endif
6696b9
6696b9
%description
6696b9
Certmonger is a service which is primarily concerned with getting your
6696b9
system enrolled with a certificate authority (CA) and keeping it enrolled.
6696b9
6696b9
%prep
6696b9
%autosetup -p1
6696b9
6696b9
%if 0%{?rhel} > 0
6696b9
# Enabled by default for RHEL for bug #765600, still disabled by default for
6696b9
# Fedora pending a similar bug report there.
6696b9
sed -i 's,^# chkconfig: - ,# chkconfig: 345 ,g' sysvinit/certmonger.in
6696b9
%endif
6696b9
6696b9
%build
10e13a
autoreconf -i -f
6696b9
%configure \
6696b9
%if %{systemd}
6696b9
	--enable-systemd \
6696b9
%endif
6696b9
%if %{sysvinit}
6696b9
	--enable-sysvinit=%{sysvinitdir} \
6696b9
%endif
6696b9
%if %{tmpfiles}
6696b9
	--enable-tmpfiles \
6696b9
%endif
6696b9
	--with-homedir=/var/run/certmonger \
6696b9
	--with-tmpdir=/var/run/certmonger --enable-pie --enable-now
6696b9
# For some reason, some versions of xmlrpc-c-config in Fedora and RHEL just
6696b9
# tell us about libxmlrpc_client, but we need more.  Work around.
6696b9
make %{?_smp_mflags} XMLRPC_LIBS="-lxmlrpc_client -lxmlrpc_util -lxmlrpc"
6696b9
6696b9
%install
6696b9
rm -rf $RPM_BUILD_ROOT
6696b9
make install DESTDIR=$RPM_BUILD_ROOT
6696b9
mkdir -p $RPM_BUILD_ROOT/%{_localstatedir}/lib/certmonger/{cas,requests}
6696b9
install -m755 -d $RPM_BUILD_ROOT/var/run/certmonger
6696b9
%{find_lang} %{name}
6696b9
6696b9
%check
6696b9
make check
6696b9
6696b9
%clean
6696b9
rm -rf $RPM_BUILD_ROOT
6696b9
6696b9
%post
6696b9
if test $1 -eq 1 ; then
6696b9
	killall -HUP dbus-daemon 2>&1 > /dev/null
6696b9
fi
6696b9
%if %{systemd}
6696b9
if test $1 -eq 1 ; then
6696b9
	/bin/systemctl daemon-reload >/dev/null 2>&1 || :
6696b9
fi
6696b9
%endif
6696b9
%if %{sysvinit}
6696b9
/sbin/chkconfig --add certmonger
6696b9
%endif
6696b9
6696b9
%triggerin -- certmonger < 0.58
6696b9
if test $1 -gt 1 ; then
6696b9
	# If the daemon is running, remove knowledge of the dogtag renewer.
6696b9
	objpath=`dbus-send --system --reply-timeout=10000 --dest=org.fedorahosted.certmonger --print-reply=o /org/fedorahosted/certmonger org.fedorahosted.certmonger.find_ca_by_nickname string:dogtag-ipa-renew-agent 2> /dev/null | sed -r 's,^ +,,g' || true`
6696b9
	if test -n "$objpath" ; then
6696b9
		dbus-send --system --dest=org.fedorahosted.certmonger --print-reply /org/fedorahosted/certmonger org.fedorahosted.certmonger.remove_known_ca objpath:"$objpath" >/dev/null 2> /dev/null
6696b9
	fi
6696b9
	# Remove the data file, in case it isn't running.
6696b9
	for cafile in %{_localstatedir}/lib/certmonger/cas/* ; do
6696b9
		if grep -q '^id=dogtag-ipa-renew-agent$' "$cafile" ; then
6696b9
			rm -f "$cafile"
6696b9
		fi
6696b9
	done
6696b9
fi
6696b9
exit 0
6696b9
6696b9
%postun
6696b9
%if %{systemd}
6696b9
/bin/systemctl daemon-reload >/dev/null 2>&1 || :
6696b9
if [ $1 -ge 1 ] ; then
6696b9
	/bin/systemctl try-restart certmonger.service >/dev/null 2>&1 || :
6696b9
fi
6696b9
%endif
6696b9
%if %{sysvinit}
6696b9
if test $1 -gt 0 ; then
6696b9
	/sbin/service certmonger condrestart 2>&1 > /dev/null
6696b9
fi
6696b9
%endif
6696b9
exit 0
6696b9
6696b9
%preun
6696b9
%if %{systemd}
6696b9
if test $1 -eq 0 ; then
6696b9
	/bin/systemctl --no-reload disable certmonger.service > /dev/null 2>&1 || :
6696b9
	/bin/systemctl stop certmonger.service > /dev/null 2>&1 || :
6696b9
fi
6696b9
%endif
6696b9
%if %{sysvinit}
6696b9
if test $1 -eq 0 ; then
6696b9
	/sbin/service certmonger stop 2>&1 > /dev/null
6696b9
	/sbin/chkconfig --del certmonger
6696b9
fi
6696b9
%endif
6696b9
exit 0
6696b9
6696b9
%if %{systemd}
6696b9
%triggerun -- certmonger < 0.43
6696b9
%{systemdsysvsave}
6696b9
# Do this because the old package's %%postun doesn't know we need to do it.
6696b9
/sbin/chkconfig --del certmonger >/dev/null 2>&1 || :
6696b9
# Do this because the old package's %%postun wouldn't have tried.
6696b9
/bin/systemctl try-restart certmonger.service >/dev/null 2>&1 || :
6696b9
exit 0
6696b9
%endif
6696b9
6696b9
%files -f %{name}.lang
6696b9
%defattr(-,root,root,-)
6696b9
%doc README LICENSE STATUS doc/*.txt
6696b9
%config(noreplace) %{_sysconfdir}/dbus-1/system.d/*
6696b9
%{_datadir}/dbus-1/services/*
6696b9
%dir %{_sysconfdir}/certmonger
6696b9
%config(noreplace) %{_sysconfdir}/certmonger/certmonger.conf
6696b9
%dir /var/run/certmonger
6696b9
%{_bindir}/*
6696b9
%{_sbindir}/certmonger
6696b9
%{_mandir}/man*/*
6696b9
%{_libexecdir}/%{name}
6696b9
%{_localstatedir}/lib/certmonger
6696b9
%if %{sysvinit}
6696b9
%{sysvinitdir}/certmonger
6696b9
%endif
6696b9
%if %{tmpfiles}
6696b9
%attr(0644,root,root) %config(noreplace) %{_tmpfilesdir}/certmonger.conf
6696b9
%endif
6696b9
%if %{systemd}
6696b9
%{_unitdir}/*
6696b9
%{_datadir}/dbus-1/system-services/*
6696b9
%endif
6696b9
6696b9
%changelog
10e13a
* Fri Aug 24 2018 Rob Crittenden <rcritten@redhat.com> - 0.78.4-10
10e13a
- Backport patches to add support for the MS Certificate Template V2
10e13a
  extension (#1622184)
10e13a
10e13a
* Mon Aug 13 2018 Rob Crittenden <rcritten@redhat.com> - 0.78.4-9
10e13a
- Remove patch to pass _PROXY, _proxy, LANG and LC_* environment
10e13a
  variables to helpers. The root cause was a bug in IPA (#1596161)
10e13a
10e13a
* Tue Jul 17 2018 Rob Crittenden <rcritten@redhat.com> - 0.78.4-8
10e13a
- Disable iterate-10 test which fails intermitently (#1596161)
10e13a
- Add BuildRequires for running autoreconf
10e13a
10e13a
* Tue Jul 17 2018 Rob Crittenden <rcritten@redhat.com> - 0.78.4-7
10e13a
- Pass _PROXY, _proxy, LANG and LC_* environment variables to
10e13a
  helpers (#1596161)
10e13a
10e13a
* Tue May 29 2018 Rob Crittenden <rcritten@redhat.com> - 0.78.4-6
10e13a
- Remove reference to unused patch
10e13a
10e13a
* Mon May 21 2018 Rob Crittenden <rcritten@redhat.com> - 0.78.4-5
10e13a
- Add Requires on psmsic for killall in post script (#1458890)
10e13a
- upstream project migrated from fedorahosted.org to pagure.io (#1501723)
10e13a
- Strip CR/LF from passwords read from a file (#1545935)
10e13a
10e13a
* Mon Mar  5 2018 Rob Crittenden <rcritten@redhat.com> - 0.78.4-4
10e13a
- Use required DER encoding when setting CA basic constraint (#1551635)
6696b9
- NSS 3.34 more strictly enforces length checking when verifying signatures
10e13a
  (#1551702)
6696b9
6696b9
* Tue Sep  6 2016 Jan Cholasta <jcholast@redhat.com> - 0.78.4-3
6696b9
- Resolves: #1367683 getcert request command fails to use Sub CA using -X
6696b9
  argument
6696b9
  - Fix CA option name for ipa cert-request
6696b9
6696b9
* Fri Jul  1 2016 Jan Cholasta <jcholast@redhat.com> - 0.78.4-2
6696b9
- Resolves: #1345755 Support for specifying IPA lightweight CA
6696b9
  - Add 'issuer' request option for specifying issuer
6696b9
  - Documentation: mark $CERTMONGER_CA_ISSUER as 0.79
6696b9
  - Comment/whitespace fixup
6696b9
  - ipa-submit: Retry without "ca" on OptionError
6696b9
  - getcert: fix a potential out-of-bounds
6696b9
  - Document the -X option in the ipa-submit man page
6696b9
- Resolves: #1351052 certmonger build for RHEL 7.3 failure
6696b9
  - Stop assuming RSA 512 works
6696b9
  - Stop assuming RSA 512 works, part two
6696b9
  - Fix a flakiness in the 028-dbus test
6696b9
6696b9
* Mon Aug 10 2015 Jan Cholasta <jcholast@redhat.com> - 0.78.4-1
6696b9
- Resolves: #1249753 challenge password not added in csr using start-tracking
6696b9
- Resolves: #1250397 Remove certmonger rekey feature in 7.2
6696b9
  - Remove rekey feature
6696b9
- Related:  #1205756 Rebase certmonger to 0.77 or later
6696b9
  - Update to upstream 0.78.4
6696b9
6696b9
* Fri Jul 24 2015 Jan Cholasta <jcholast@redhat.com> - 0.78.3-1
6696b9
- Resolves: #1244914 scep ca helper does not parse command line options
6696b9
  correctly
6696b9
- Related:  #1205756 Rebase certmonger to 0.77 or later
6696b9
  - Update to upstream 0.78.3
6696b9
6696b9
* Mon Jun 22 2015 Jan Cholasta <jcholast@redhat.com> - 0.78.1-1
6696b9
- Resolves: #1140241 RFE: Add SCEP support to certmonger
6696b9
- Resolves: #1148001 ipa-getcert killed by SIGABRT
6696b9
- Resolves: #1205756 Rebase certmonger to 0.77 or later
6696b9
  - Update to upstream 0.78.1
6696b9
6696b9
* Tue Jan 13 2015 Jan Cholasta <jcholast@redhat.com> - 0.75.14-3
6696b9
- backport change from git to correctly retrieve string values from DBus
6696b9
  property interface replies (#1181022)
6696b9
6696b9
* Wed Nov 19 2014 Jan Cholasta <jcholast@redhat.com> - 0.75.14-2
6696b9
- backport dogtag-submit: accept additional options to pass to the server when
6696b9
  approving requests using agent creds (#1165155)
6696b9
6696b9
* Thu Aug 28 2014 Nalin Dahyabhai <nalin@redhat.com> 0.75.14-1
6696b9
- make pathname canonicalization slightly smarter, to handle ".." in
6696b9
  locations (#1131758)
6696b9
- updates to self-tests (#1144082)
6696b9
6696b9
* Thu Aug 21 2014 Kevin Fenzi <kevin@scrye.com> - 0.75.13-2
6696b9
- Rebuild for rpm bug 1131960
6696b9
6696b9
* Mon Aug 18 2014 Nalin Dahyabhai <nalin@redhat.com> 0.75.13-1
6696b9
- add a missing test case file (whoops)
6696b9
6696b9
* Mon Aug 18 2014 Nalin Dahyabhai <nalin@redhat.com> 0.75.12-1
6696b9
- correct encoding/decoding of variant-typed data which we receive and send
6696b9
  as part of the org.freedesktop.DBus.Properties interface over the bus, and
6696b9
  add some tests for them (based on patch from David Kupka, ticket #36)
6696b9
6696b9
* Fri Aug 15 2014 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.75.10-2
6696b9
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild
6696b9
6696b9
* Tue Aug 12 2014 Nalin Dahyabhai <nalin@redhat.com> 0.75.11-1
6696b9
- when getcert is passed a -a flag, to indicate that CA root certificates
6696b9
  should be stored in the specified database, don't ignore locations which
6696b9
  don't include a storage scheme (#1129537)
6696b9
- when called to 'start-tracking' with the -a or -F flags, if we have
6696b9
  applicable certificates on-hand for a CA that we're either told to use
6696b9
  or which we decide is the correct one, save the certificates (#1129696)
6696b9
6696b9
* Tue Aug  5 2014 Nalin Dahyabhai <nalin@redhat.com> 0.75.10-1
6696b9
- when attempting to contact an IPA LDAP server, if no "ldap_uri" is set in
6696b9
  default.conf, and no "host" is set either, try to construct the server URI
6696b9
  using the "server" setting (#1126985)
6696b9
6696b9
* Thu Jul 31 2014 Nalin Dahyabhai <nalin@redhat.com> 0.75.9-1
6696b9
- avoid potential use-after-free after a CA is removed dynamically (thanks to
6696b9
  Keenan Brock) (#1125342)
6696b9
- add a "external-helper" property to CA objects
6696b9
6696b9
* Mon Jul 21 2014 Nalin Dahyabhai <nalin@redhat.com> 0.75.8-1
6696b9
- add a 'refresh' option to the getcert command
6696b9
- add a '-a' flag to the getcert command's 'refresh-ca' option
6696b9
6696b9
* Thu Jul 17 2014 Nalin Dahyabhai <nalin@redhat.com> 0.75.7-2
6696b9
- reintroduce package Requires: on systemd-sysv on F19 and EL6 and older,
6696b9
  conditionalized it so that it's ignored on newer releases, and make
6696b9
  whether or not we call systemd-sysv-convert in triggers depend on that,
6696b9
  too (#1104138)
6696b9
6696b9
* Thu Jul 17 2014 Nalin Dahyabhai <nalin@redhat.com> 0.75.7-1
6696b9
- fix an inconsistency in how we parse cookie values returned by CA helpers,
6696b9
  in that single-line values would lose the end-of-line after a daemon
6696b9
  restart, but not before
6696b9
- handle timeout values and exit status values when calling CA helpers
6696b9
  in non-SUBMIT, non-POLL modes (#1118468)
6696b9
- rework how we save CA certificates so that we save CA certificates associated
6696b9
  with end-entity certificates when we save that end-entity certificate, which
6696b9
  requires running all of the involved pre- and post-save commands
6696b9
- drop package Requires: on systemd-sysv (#1104138)
6696b9
6696b9
* Thu Jun 26 2014 Nalin Dahyabhai <nalin@redhat.com> 0.75.6-1
6696b9
- avoid potential use-after-free and read overrun after a CA is added
6696b9
  dynamically (thanks to Jan Cholasta)
6696b9
6696b9
* Fri Jun 20 2014 Nalin Dahyabhai <nalin@redhat.com> 0.75.5-1
6696b9
- documentation updates
6696b9
6696b9
* Fri Jun 20 2014 Nalin Dahyabhai <nalin@redhat.com> 0.75.4-2
6696b9
- add a %%trigger to remove knowledge of the "dogtag-ipa-renew-agent" CA
6696b9
  when we detect certmonger versions prior to 0.58 being installed, to
6696b9
  avoid cases where some older versions choke on CAs with nicknames that
6696b9
  contain characters that can't legally be part of a D-Bus name (#948993)
6696b9
6696b9
* Thu Jun 19 2014 Nalin Dahyabhai <nalin@redhat.com> 0.75.4-1
6696b9
- fix creation and packaging of the "local" CA's data directory
6696b9
6696b9
* Wed Jun 18 2014 Nalin Dahyabhai <nalin@redhat.com> 0.75.3-1
6696b9
- read and cache whether or not we saw a noOCSPcheck extension in certificates
6696b9
- documentation updates
6696b9
6696b9
* Mon Jun 16 2014 Nalin Dahyabhai <nalin@redhat.com> 0.75.2-1
6696b9
- when generating keys using OpenSSL, if key generation fails, try
6696b9
  again with the default key size, in case we're in FIPS mode
6696b9
- documentation updates
6696b9
6696b9
* Sat Jun 14 2014 Nalin Dahyabhai <nalin@redhat.com> 0.75.1-1
6696b9
- log the state in 'getcert status' verbose mode
6696b9
6696b9
* Fri Jun 13 2014 Nalin Dahyabhai <nalin@redhat.com> 0.75-1
6696b9
- add a -w (wait) flag to the getcert's request/resubmit/start-tracking
6696b9
  commands, and add a non-waiting status command
6696b9
6696b9
* Wed Jun 11 2014 Nalin Dahyabhai <nalin@redhat.com> 0.74.96-1
6696b9
- make the trust settings we apply to CA-supplied certificates while
6696b9
  saving them to NSS databases run-time configurable
6696b9
- fix compiling against EL5-era OpenSSL
6696b9
- when saving CA certificates we pull from an IPA server, nickname
6696b9
  it using the realm name with " IPA CA" appended rather than just
6696b9
  naming it "IPA CA"
6696b9
- fix the local signer so that when it issues itself a new certificate,
6696b9
  it uses the same subject name
6696b9
- add a -w flag to getcert's request, resubmit, and start-tracking
6696b9
  commands, telling it to wait until either the certificate is issued,
6696b9
  we get to a state where we know that we won't be able to get one, or
6696b9
  we are waiting for a CA
6696b9
6696b9
* Mon Jun  9 2014 Nalin Dahyabhai <nalin@redhat.com> 0.74.95-1
6696b9
- add the "local" signer, a local toy CA that signs anything you'll
6696b9
  ask it to sign
6696b9
6696b9
* Sat Jun 07 2014 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.74-2
6696b9
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
6696b9
6696b9
* Fri Jun  6 2014 Nalin Dahyabhai <nalin@redhat.com> 0.74.94-1
6696b9
- fix self-test errors that we trigger with new OpenSSL
6696b9
- fix a build error that would sometimes happen when we're told to
6696b9
  build PIE binaries
6696b9
- quiet a compile warning
6696b9
6696b9
* Thu Jun  5 2014 Nalin Dahyabhai <nalin@redhat.com> 0.74.93-1
6696b9
- add some self-tests
6696b9
- simplify the internal submit-to-CA logic
6696b9
- fixes for more problems found through static analysis
6696b9
6696b9
* Tue Jun  3 2014 Nalin Dahyabhai <nalin@redhat.com> 0.74.92-1
6696b9
- retrieve CA information from CAs, if the helpers can do so, and
6696b9
  add a command to explicitly refresh that data: "getcert refresh-ca"
6696b9
- offer to save CA certificates to files and databases, when specified with
6696b9
  new -a and -F flags to getcert request/resubmit/start-tracking (#1098208,
6696b9
  trac #31)
6696b9
- add IP address subject alternate names when getcert request/resubmit
6696b9
  is passed the -A option (trac #35)
6696b9
- read and cache the freshestCRL extension in certificates
6696b9
- properly interpret KDC-unreachable errors encountered in the IPA
6696b9
  submission error as a server-unreachable error that we will retry,
6696b9
  rather than a misconfiguration error which we won't
6696b9
- don't let tests get tripped up by new formatting used in dos2unix status
6696b9
  messages (#1099080)
6696b9
- updated translations
6696b9
- be explicit that we are going to use bashisms in test scripts by calling
6696b9
  the shell interpreter as 'bash' rather than 'sh' (trac #27)
6696b9
6696b9
* Thu Apr  3 2014 Nalin Dahyabhai <nalin@redhat.com> 0.74-1
6696b9
- also save state when we exit due to SIGHUP
6696b9
- don't get tripped up when enrollment helpers hand us certificates which
6696b9
  include CRLF line terminators (ticket #25)
6696b9
- be tolerant of certificate issuer names, subject names, DNS, email, and
6696b9
  Kerberos principal namem subjectAltNames, and crl distribution point URLs
6696b9
  that contain newlines
6696b9
- read and cache the certificate template extension in certificates
6696b9
- enforce different minimum key sizes depending on the type of key we're
6696b9
  trying to generate
6696b9
- store DER versions of subject, issuer and template subject, if we have
6696b9
  them (Jan Cholasta, ticket #26)
6696b9
- when generating signing requests with subject names that don't quite parse
6696b9
  as subject names, encode what we're given as PrintableString rather than
6696b9
  as a UTF8String
6696b9
- always chdir() to a known location at startup, even if we're not becoming
6696b9
  a daemon
6696b9
- fix a couple of memory leaks (static analysis)
6696b9
- add missing buildrequires: on which
6696b9
6696b9
* Thu Feb 20 2014 Nalin Dahyabhai <nalin@redhat.com> 0.73-1
6696b9
- updates to 0.73
6696b9
  - getcert no longer claims to be stuck when a CA is unreachable,
6696b9
    because the daemon isn't actually stuck
6696b9
6696b9
* Mon Feb 17 2014 Nalin Dahyabhai <nalin@redhat.com>
6696b9
- updates to 0.73
6696b9
  - also pass the key type to enrollment helpers in the environment as
6696b9
    a the value of "CERTMONGER_KEY_TYPE"
6696b9
6696b9
* Mon Feb 10 2014 Nalin Dahyabhai <nalin@redhat.com>
6696b9
- move the tmpfiles.d file from /etc/tmpfiles.d to %%{_tmpfilesdir},
6696b9
  where it belongs (#1180978)
6696b9
6696b9
* Mon Feb 10 2014 Nalin Dahyabhai <nalin@redhat.com>
6696b9
- updates for 0.73
6696b9
  - set the flag to encode EC public key parameters using named curves
6696b9
    instead of the default of all-the-details when using OpenSSL
6696b9
  - don't break when NSS supports secp521r1 but OpenSSL doesn't
6696b9
  - also pass the CA nickname to enrollment helpers in the environment as
6696b9
    a text value in "CERTMONGER_CA_NICKNAME", so they can use that value
6696b9
    when reading configuration settings
6696b9
  - also pass the SPKAC value to enrollment helpers in the environment as
6696b9
    a base64 value in "CERTMONGER_SPKAC"
6696b9
  - also pass the request's SubjectPublicKeyInfo value to enrollment helpers
6696b9
    in the environment as a base64 value in "CERTMONGER_SPKI" (part of #16)
6696b9
  - when generating signing requests using NSS, be more accommodating of
6696b9
    requested subject names that don't parse properly
6696b9
6696b9
* Mon Feb  3 2014 Nalin Dahyabhai <nalin@redhat.com> 0.72-1
6696b9
- update to 0.72
6696b9
  - support generating DSA parameters and keys on sufficiently-new OpenSSL
6696b9
    and NSS
6696b9
  - support generating EC keys when OpenSSL and NSS support it, using key
6696b9
    size to select the curve to use from among secp256r1, secp384r1,
6696b9
    secp521r1 (which are the ones that are usually available, though
6696b9
    secp521r1 isn't always, even if the other two are)
6696b9
  - stop trying to cache public key parameters at all and instead cache public
6696b9
    key info properly
6696b9
  - encode the friendlyName attribute in signing requests as a BMPString,
6696b9
    not as a PrintableString
6696b9
  - catch more filesystem permissions problems earlier (more of #996581)
6696b9
6696b9
* Mon Jan 27 2014 Nalin Dahyabhai <nalin@redhat.com> 0.71-1
6696b9
- check for cases where we fail to allocate memory while reading a request
6696b9
  or CA entry from disk (John Haxby)
6696b9
- only handle one watch at a time, which should avoid abort() during
6696b9
  attempts to reconnect to the message bus after losing our connection
6696b9
  to it (#1055521)
6696b9
6696b9
* Fri Jan 24 2014 Daniel Mach <dmach@redhat.com> - 0.70-2
6696b9
- Mass rebuild 2014-01-24
6696b9
6696b9
* Thu Jan  2 2014 Nalin Dahyabhai <nalin@redhat.com> 0.70-1
6696b9
- add a --with-homedir option to configure, and use it, since subprocesses
6696b9
  which we run and which use NSS may attempt to write to $HOME/.pki, and
6696b9
  0.69's strategy of setting that to "/" was rightly hitting SELinux policy
6696b9
  denials (#1047798)
6696b9
6696b9
* Fri Dec 27 2013 Daniel Mach <dmach@redhat.com> - 0.69-2
6696b9
- Mass rebuild 2013-12-27
6696b9
6696b9
* Mon Dec  9 2013 Nalin Dahyabhai <nalin@redhat.com> 0.69-1
6696b9
- tweak how we decide whether we're on the master or a minion when we're
6696b9
  told to use certmaster as a CA
6696b9
- clean up one of the tests so that it doesn't have to work around internal
6696b9
  logging producing duplicate messages
6696b9
- when logging errors while setting up to contact xmlrpc servers, explicitly
6696b9
  note that the error is client-side
6696b9
- don't abort() due to incorrect locking when an attempt to save an issued
6696b9
  certificate to the designated location fails (part of #1032760/#1033333,
6696b9
  ticket #22)
6696b9
- when reading an issued certificate from an enrollment helper, ignore
6696b9
  noise before or after the certificate itself (more of #1032760/1033333,
6696b9
  ticket #22)
6696b9
- run subprocesses in a cleaned-up environment (more of #1032760/1033333,
6696b9
  ticket #22)
6696b9
- clear the ca-error that we saved when we had an error talking to the CA if we
6696b9
  subsequently succeed in talking to the CA
6696b9
- various other static-analysis fixes
6696b9
6696b9
* Thu Aug 29 2013 Nalin Dahyabhai <nalin@redhat.com> 0.68-1
6696b9
- notice when the OpenSSL RNG isn't seeded
6696b9
- notice when saving certificates or keys fails due to filesystem-related
6696b9
  permission denial (#996581)
6696b9
6696b9
* Tue Aug  6 2013 Nalin Dahyabhai <nalin@redhat.com> 0.67-3
6696b9
- pull up a patch from master to adapt self-tests to certutil's diagnostic
6696b9
  output having changed (#992050)
6696b9
6696b9
* Sat Aug 03 2013 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.67-2
6696b9
- Rebuilt for https://fedoraproject.org/wiki/Fedora_20_Mass_Rebuild
6696b9
6696b9
* Mon Mar 11 2013 Nalin Dahyabhai <nalin@redhat.com> 0.67-1
6696b9
- when saving certificates to NSS databases, try to preserve the trust
6696b9
  value assigned to a previously-present certificate with the same nickname
6696b9
  and subject, if one is found
6696b9
- when saving certificates to NSS databases, also prune certificates from
6696b9
  the database which have both the same nickname and subject as the one
6696b9
  we're adding, to avoid tripping up tools that only fetch one certificate
6696b9
  by nickname
6696b9
6696b9
* Wed Feb 13 2013 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.65-2
6696b9
- Rebuilt for https://fedoraproject.org/wiki/Fedora_19_Mass_Rebuild
6696b9
6696b9
* Wed Jan 23 2013 Nalin Dahyabhai <nalin@redhat.com> 0.66-1
6696b9
- build as position-independent executables with early binding (#883966)
6696b9
- also don't tag the unit file as a configuration file (internal tooling)
6696b9
6696b9
* Wed Jan 23 2013 Nalin Dahyabhai <nalin@redhat.com> 0.65-2
6696b9
- don't tag the D-Bus session .service file as a configuration file (internal
6696b9
  tooling)
6696b9
6696b9
* Tue Jan  8 2013 Nalin Dahyabhai <nalin@redhat.com> 0.65-1
6696b9
- fix a crash in the self-tests
6696b9
6696b9
* Tue Jan  8 2013 Nalin Dahyabhai <nalin@redhat.com> 0.64-1
6696b9
- at startup, if we resume the state machine for a given certificate to a state
6696b9
  which expects to have the newly-added lock already acquired, acquire it
6696b9
  before moving on with the certificate's work (still aimed at fixing #883484)
6696b9
6696b9
* Tue Dec 18 2012 Nalin Dahyabhai <nalin@redhat.com> 0.63-1
6696b9
- serialize access to NSS databases and the running of pre- and post-save
6696b9
  commands which might also access them (possibly fixing part of #883484)
6696b9
6696b9
* Thu Nov 29 2012 Nalin Dahyabhai <nalin@redhat.com> 0.62-1
6696b9
- add a -u flag to getcert to enable requesting a keyUsage extension value
6696b9
- request subjectKeyIdentifier extensions from CAs, and include them in
6696b9
  self-signed certificates
6696b9
- request basicConstraints from CAs, defaulting to requests for end-entity
6696b9
  certificates
6696b9
- when requesting CA certificates, also request authorityKeyIdentifier
6696b9
- add support for requesting CRL distribution point and authorityInfoAccess
6696b9
  extensions that specify OCSP responder locations
6696b9
- don't crash when OpenSSL can't build a template certificate from a request
6696b9
  when we're in FIPS mode
6696b9
- put NSS in FIPS mode, when the system booted that way, except when we're
6696b9
  trying to write certificates to a database
6696b9
- fix CSR generation and self-signing in FIPS mode with NSS
6696b9
- fix self-signing in FIPS mode with OpenSSL
6696b9
- new languages from the translation team: mai, ml, nn, ga
6696b9
6696b9
* Tue Nov 27 2012 Nalin Dahyabhai <nalin@redhat.com> 0.61-3
6696b9
- backport change from git to not choke if X509_REQ_to_X509() fails when we're
6696b9
  self-signing using OpenSSL
6696b9
- backport another change from git to represent this as a CA-rejected error
6696b9
6696b9
* Mon Sep 24 2012 Nalin Dahyabhai <nalin@redhat.com> 0.61-1
6696b9
- fix a regression in reading old request tracking files where the
6696b9
  request was in state NEED_TO_NOTIFY or NOTIFYING
6696b9
6696b9
* Wed Sep  5 2012 Nalin Dahyabhai <nalin@redhat.com> 0.60-1
6696b9
- adjust internals of logic for talking to dogtag to at least have a
6696b9
  concept of non-agent cases
6696b9
- when talking to an IPA server's internal Dogtag instance, infer which
6696b9
  ports the CA is listening on from the "dogtag_version" setting in the
6696b9
  IPA configuration (Ade Lee)
6696b9
- send a notification (or log a message, whatever) when we save a new
6696b9
  certificate (#766167)
6696b9
6696b9
* Mon Jul 30 2012 Nalin Dahyabhai <nalin@redhat.com>
6696b9
- fix a bad %%preun scriptlet
6696b9
6696b9
* Wed Jul 18 2012 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.59-2
6696b9
- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild
6696b9
6696b9
* Fri Jun 29 2012 Nalin Dahyabhai <nalin@redhat.com> 0.59-1
6696b9
- mostly documentation updates
6696b9
6696b9
* Fri Jun 29 2012 Nalin Dahyabhai <nalin@redhat.com> 0.58-1
6696b9
- add a "dogtag-ipa-renew-agent" CA so that we can renew certificates using
6696b9
  an IPA server's internal Dogtag instance
6696b9
- export the requested profile and old certificate to enrollment helpers
6696b9
- make libxml and libcurl into hard build-time requirements
6696b9
- serialize all pre/save/post sequences to make sure that stop/save/start
6696b9
  doesn't become stop1/save1/stop2/start1/save2/start2 when we're stopping
6696b9
  a service while we muck with more than one of its certificates
6696b9
6696b9
* Fri Jun 15 2012 Nalin Dahyabhai <nalin@redhat.com>
6696b9
- add a command option (-T) to getcert for specifying which enrollment
6696b9
  profile to tell a CA that we're using, in case it cares (#10)
6696b9
6696b9
* Thu Jun 14 2012 Nalin Dahyabhai <nalin@redhat.com> 0.57-1
6696b9
- clarify that the command passed to getcert -C is a "post"-save command
6696b9
- add a "pre"-save command option to getcert, specified with the -B flag (#9)
6696b9
- after we notify of an impending not-valid-after approaching, don't do it
6696b9
  again immediately
6696b9
6696b9
* Sat Mar  3 2012 Nalin Dahyabhai <nalin@redhat.com> 0.56-1
6696b9
- when a caller sets the is-default flag on a CA, and another CA is no longer
6696b9
  the default, emit the PropertiesChanged signal on the CA which is not the
6696b9
  default, instead on the new default a second time
6696b9
- drop some dead code from the D-Bus message handlers (static analysis,
6696b9
  #796813)
6696b9
- cache public keys when we read private keys
6696b9
- go back to printing an error indicating that we're missing a required
6696b9
  argument when we're missing a required argument, not that the option is
6696b9
  invalid (broken since 0.51, #796542)
6696b9
6696b9
* Wed Feb 15 2012 Nalin Dahyabhai <nalin@redhat.com> 0.55-1
6696b9
- allow root to use our implementation of org.freedesktop.DBus.Properties
6696b9
- take more care to not emit useless PropertiesChanged signals
6696b9
6696b9
* Wed Feb 15 2012 Nalin Dahyabhai <nalin@redhat.com> 0.54-1
6696b9
- fix setting the group ID when spawning the post-save command
6696b9
6696b9
* Tue Feb 14 2012 Nalin Dahyabhai <nalin@redhat.com> 0.53-1
6696b9
- large changes to the D-Bus glue, exposing a lot of data which we were
6696b9
  providing via D-Bus getter methods as properties, and providing more
6696b9
  accurate introspection data
6696b9
- emit a signal when the daemon saves a certificate to the destination
6696b9
  location, and provide an option to have the daemon spawn an arbitrary
6696b9
  command at that point, too (#766167)
6696b9
- enable starting the service by default on RHEL (#765600)
6696b9
6696b9
* Thu Jan 12 2012 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.52-2
6696b9
- Rebuilt for https://fedoraproject.org/wiki/Fedora_17_Mass_Rebuild
6696b9
6696b9
* Fri Dec 16 2011 Nalin Dahyabhai <nalin@redhat.com> 0.52-1
6696b9
- note that SELinux usually confines us to writing only to cert_t in
6696b9
  doc/getting-started.txt (#765599)
6696b9
- fix crashes when we add a request during our first run when we're
6696b9
  populating the hard-coded CA list
6696b9
- properly deal with cases where a path is passed to us is "./XXX"
6696b9
- in session mode, create our data directories as we go
6696b9
6696b9
* Tue Dec  6 2011 Nalin Dahyabhai <nalin@redhat.com> 0.51-1
6696b9
- api: lift restrictions on characters used in request and CA nicknames by
6696b9
  making their object names not incorporate their nicknames
6696b9
- api: add find_request_by_nickname and find_ca_by_nickname
6696b9
- certmonger-ipa-submit.8: list -k, -K, -t in the summary, document -K
6696b9
- getcert: print "invalid option" error messages ourselves (#756291)
6696b9
- ipa-submit: supply a Referer: header when submitting requests to IPA
6696b9
  (#750617, needed for #747710)
6696b9
6696b9
* Fri Oct 14 2011 Nalin Dahyabhai <nalin@redhat.com> 0.50-1
6696b9
- really fix these this time:
6696b9
 - getcert: error out when "list -c" finds no matching CA (#743488)
6696b9
 - getcert: error out when "list -i" finds no matching request (#743485)
6696b9
6696b9
* Wed Oct 12 2011 Nalin Dahyabhai <nalin@redhat.com> 0.49-1
6696b9
- when using an NSS database, skip loading the module database (#743042)
6696b9
- when using an NSS database, skip loading root certs
6696b9
- generate SPKAC values when generating CSRs, though we don't do anything
6696b9
  with SPKAC values yet
6696b9
- internally maintain and use challenge passwords, if we have them
6696b9
- behave better when certificates have shorter lifetimes
6696b9
- add/recognize/handle notification type "none"
6696b9
- getcert: error out when "list -c" finds no matching CA (#743488)
6696b9
- getcert: error out when "list -i" finds no matching request (#743485)
6696b9
6696b9
* Thu Sep 29 2011 Nalin Dahyabhai <nalin@redhat.com> 0.48-1
6696b9
- don't incorrectly assume that CERT_ImportCerts() returns a NULL-terminated
6696b9
  array (#742348)
6696b9
6696b9
* Tue Sep 27 2011 Nalin Dahyabhai <nalin@redhat.com> 0.47-1
6696b9
- getcert: distinguish between {stat() succeeds but isn't a directory} and
6696b9
  {stat() failed} when printing an error message (#739903)
6696b9
- getcert resubmit/start-tracking: when we're looking for an existing request
6696b9
  by ID, and we don't find one, note that specifically (#741262)
6696b9
6696b9
* Mon Aug 29 2011 Stephen Gallagher <sgallagh@redhat.com> - 0.46-1.1
6696b9
- Rebuild against fixed libtevent version
6696b9
6696b9
* Mon Aug 15 2011 Nalin Dahyabhai <nalin@redhat.com> 0.46-1
6696b9
- treat the ability to access keys in an NSS database without using a PIN,
6696b9
  when we've been told we need one, as an error (#692766, really this time)
6696b9
6696b9
* Thu Aug 11 2011 Nalin Dahyabhai <nalin@redhat.com> 0.45-1
6696b9
- modify the systemd .service file to be a proper 'dbus' service (more
6696b9
  of #718172)
6696b9
6696b9
* Thu Aug 11 2011 Nalin Dahyabhai <nalin@redhat.com> 0.44-1
6696b9
- check specifically for cases where a specified token that we need to
6696b9
  use just isn't present for whatever reason (#697058)
6696b9
6696b9
* Wed Aug 10 2011 Nalin Dahyabhai <nalin@redhat.com> 0.43-1
6696b9
- add a -K option to ipa-submit, to use the current ccache, which makes
6696b9
  it easier to test
6696b9
6696b9
* Fri Aug  5 2011 Nalin Dahyabhai <nalin@redhat.com>
6696b9
- if xmlrpc-c's struct xmlrpc_curl_xportparms has a gss_delegate field, set
6696b9
  it to TRUE when we're doing Negotiate auth (#727864, #727863, #727866)
6696b9
6696b9
* Wed Jul 13 2011 Nalin Dahyabhai <nalin@redhat.com>
6696b9
- treat the ability to access keys in an NSS database without using a PIN,
6696b9
  when we've been told we need one, as an error (#692766)
6696b9
- when handling "getcert resubmit" requests, if we don't have a key yet,
6696b9
  make sure we go all the way back to generating one (#694184)
6696b9
- getcert: try to clean up tests for NSS and PEM file locations (#699059)
6696b9
- don't try to set reconnect-on-exit policy unless we managed to connect
6696b9
  to the bus (#712500)
6696b9
- handle cases where we specify a token but the storage token isn't
6696b9
  known (#699552)
6696b9
- getcert: recognize -i and storage options to narrow down which requests
6696b9
  the user wants to know about (#698772)
6696b9
- output hints when the daemon has startup problems, too (#712075)
6696b9
- add flags to specify whether we're bus-activated or not, so that we can
6696b9
  exit if we have nothing to do after handling a request received over
6696b9
  the bus if some specified amount of time has passed
6696b9
- explicitly disallow non-root access in the D-Bus configuration (#712072)
6696b9
- migrate to systemd on releases newer than Fedora 15 or RHEL 6 (#718172)
6696b9
- fix a couple of incorrect calls to talloc_asprintf() (#721392)
6696b9
6696b9
* Wed Apr 13 2011 Nalin Dahyabhai <nalin@redhat.com> 0.42-1
6696b9
- getcert: fix a buffer overrun preparing a request for the daemon when
6696b9
  there are more parameters to encode than space in the array (#696185)
6696b9
- updated translations: de, es, id, pl, ru, uk
6696b9
6696b9
* Mon Apr 11 2011 Nalin Dahyabhai <nalin@redhat.com> 0.41-1
6696b9
- read information about the keys we've just generated before proceeding
6696b9
  to generating a CSR (part of #694184, part of #695675)
6696b9
- when processing a "resubmit" request from getcert, go back to key
6696b9
  generation if we don't have keys yet, else go back to CSR generation as
6696b9
  before (#694184, #695675)
6696b9
- configure with --with-tmpdir=/var/run/certmonger and own /var/run/certmonger
6696b9
  (#687899), and add a systemd tmpfiles.d control file for creating
6696b9
  /var/run/certmonger on Fedora 15 and later
6696b9
- let session instances exit when they get disconnected from the bus
6696b9
- use a lock file to make sure there's only one session instance messing
6696b9
  around with the user's files at a time
6696b9
- fix errors saving certificates to NSS databases when there's already a
6696b9
  certificate there with the same nickname (#695672)
6696b9
- make key and certificate location output from 'getcert list' more properly
6696b9
  translatable (#7)
6696b9
6696b9
* Mon Mar 28 2011 Nalin Dahyabhai <nalin@redhat.com> 0.40-1
6696b9
- update to 0.40
6696b9
  - fix validation check on EKU OIDs in getcert (#691351)
6696b9
  - get session bus mode sorted
6696b9
  - add a list of recognized EKU values to the getcert-request man page
6696b9
6696b9
* Fri Mar 25 2011 Nalin Dahyabhai <nalin@redhat.com> 0.39-1
6696b9
- update to 0.39
6696b9
  - fix use of an uninitialized variable in the xmlrpc-based submission
6696b9
    helpers (#690886)
6696b9
6696b9
* Thu Mar 24 2011 Nalin Dahyabhai <nalin@redhat.com> 0.38-1
6696b9
- update to 0.38
6696b9
  - catch cases where we can't read a PIN file, but we never have to log
6696b9
    in to the token to access the private key (more of #688229)
6696b9
6696b9
* Tue Mar 22 2011 Nalin Dahyabhai <nalin@redhat.com> 0.37-1
6696b9
- update to 0.37
6696b9
  - be more careful about checking if we can read a PIN file successfully
6696b9
    before we even call an API that might need us to try (#688229)
6696b9
  - fix strict aliasing warnings
6696b9
6696b9
* Tue Mar 22 2011 Nalin Dahyabhai <nalin@redhat.com> 0.36-1
6696b9
- update to 0.36
6696b9
  - fix some use-after-free bugs in the daemon (#689776)
6696b9
  - fix a copy/paste error in certmonger-ipa-submit(8)
6696b9
  - getcert now suppresses error details when not given its new -v option
6696b9
    (#683926, more of #681641/#652047)
6696b9
  - updated translations
6696b9
    - de, es, pl, ru, uk
6696b9
    - indonesian translation is now for "id" rather than "in"
6696b9
6696b9
* Wed Mar  2 2011 Nalin Dahyabhai <nalin@redhat.com> 0.35.1-1
6696b9
- fix a self-test that broke because one-year-from-now is now a day's worth
6696b9
  of seconds further out than it was a few days ago
6696b9
6696b9
* Mon Feb 14 2011 Nalin Dahyabhai <nalin@redhat.com> 0.35-1
6696b9
- update to 0.35
6696b9
  - self-test fixes to rebuild properly in mock (#670322)
6696b9
6696b9
* Tue Feb 08 2011 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.34-2
6696b9
- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild
6696b9
6696b9
* Fri Jan 14 2011 Nalin Dahyabhai <nalin@redhat.com> 0.34-1
6696b9
- update to 0.34
6696b9
  - explicitly note the number of requests we're tracking in the output of
6696b9
    "getcert list" (#652049)
6696b9
  - try to offer some suggestions when we get certain specific errors back
6696b9
    in "getcert" (#652047)
6696b9
  - updated translations
6696b9
    - es
6696b9
6696b9
* Thu Dec 23 2010 Nalin Dahyabhai <nalin@redhat.com> 0.33-1
6696b9
- update to 0.33
6696b9
  - new translations
6696b9
    - id by Okta Purnama Rahadian!
6696b9
  - updated translations
6696b9
    - pl, uk
6696b9
  - roll up assorted fixes for defects
6696b9
6696b9
* Fri Nov 12 2010 Nalin Dahyabhai <nalin@redhat.com> 0.32-2
6696b9
- depend on the e2fsprogs libuuid on Fedora and RHEL releases where it's
6696b9
  not part of util-linux-ng
6696b9
6696b9
* Wed Oct 13 2010 Nalin Dahyabhai <nalin@redhat.com> 0.32-1
6696b9
- oops, rfc5280 says we shouldn't be populating unique identifiers, so
6696b9
  make it a configuration option and default the behavior to off
6696b9
6696b9
* Tue Oct 12 2010 Nalin Dahyabhai <nalin@redhat.com> 0.31-1
6696b9
- start populating the optional unique identifier fields in self-signed
6696b9
  certificates
6696b9
6696b9
* Thu Sep 30 2010 Nalin Dahyabhai <nalin@redhat.com> 0.30-4
6696b9
- explicitly require "dbus" to try to ensure we have a running system bus
6696b9
  when we get started (#639126)
6696b9
6696b9
* Wed Sep 29 2010 jkeating - 0.30-3
6696b9
- Rebuilt for gcc bug 634757
6696b9
6696b9
* Thu Sep 23 2010 Nalin Dahyabhai <nalin@redhat.com> 0.30-2
6696b9
- try to SIGHUP the messagebus daemon at first install so that it'll
6696b9
  let us claim our service name if it isn't restarted before we are
6696b9
  first started (#636876)
6696b9
6696b9
* Wed Aug 25 2010 Nalin Dahyabhai <nalin@redhat.com> 0.30-1
6696b9
- update to 0.30
6696b9
  - fix errors computing the time at the end of an interval that were
6696b9
    caught by self-tests
6696b9
6696b9
* Mon Aug 23 2010 Nalin Dahyabhai <nalin@redhat.com> 0.29-1
6696b9
- update to 0.29
6696b9
  - fix 64-bit cleanliness issue using libdbus
6696b9
  - actually include the full set of tests in tarballs
6696b9
6696b9
* Tue Aug 17 2010 Nalin Dahyabhai <nalin@redhat.com> 0.28-1
6696b9
- update to 0.28
6696b9
  - fix self-signing certificate notBefore and notAfter values on 32-bit
6696b9
    machines
6696b9
6696b9
* Tue Aug 17 2010 Nalin Dahyabhai <nalin@redhat.com> 0.27-1
6696b9
- update to 0.27
6696b9
  - portability and test fixes
6696b9
6696b9
* Fri Aug 13 2010 Nalin Dahyabhai <nalin@redhat.com> 0.26-1
6696b9
- update to 0.26
6696b9
  - when canceling a submission request that's being handled by a helper,
6696b9
    reap the child process's status after killing it (#624120)
6696b9
6696b9
* Fri Aug 13 2010 Nalin Dahyabhai <nalin@redhat.com> 0.25-1
6696b9
- update to 0.25
6696b9
  - new translations
6696b9
    - in by Okta Purnama Rahadian!
6696b9
  - fix detection of cases where we can't access a private key in an NSS
6696b9
    database because we don't have the PIN
6696b9
  - teach '*getcert start-tracking' about the -p and -P options which the
6696b9
    '*getcert request' commands already understand (#621670), and also
6696b9
    the -U, -K, -E, and -D flags
6696b9
  - double-check that the nicknames of keys we get back from
6696b9
    PK11_ListPrivKeysInSlot() match the desired nickname before accepting
6696b9
    them as matches, so that our tests won't all blow up on EL5
6696b9
  - fix dynamic addition and removal of CAs implemented through helpers
6696b9
6696b9
* Mon Jun 28 2010 Nalin Dahyabhai <nalin@redhat.com> 0.24-4
6696b9
- init script: ensure that the subsys lock is created whenever we're called to
6696b9
  "start" when we're already running (even more of #596719)
6696b9
6696b9
* Tue Jun 15 2010 Nalin Dahyabhai <nalin@redhat.com> 0.24-3
6696b9
- more gracefully handle manual daemon startups and cleaning up of unexpected
6696b9
  crashes (still more of #596719)
6696b9
6696b9
* Thu Jun 10 2010 Nalin Dahyabhai <nalin@redhat.com> 0.24-2
6696b9
- don't create the daemon pidfile until after we've connected to the D-Bus
6696b9
  (still more of #596719)
6696b9
6696b9
* Tue Jun  8 2010 Nalin Dahyabhai <nalin@redhat.com> 0.24-1
6696b9
- update to 0.24
6696b9
  - keep the lock on the pid file, if we have one, when we fork, and cancel
6696b9
    daemon startup if we can't gain ownership of the lock (the rest of #596719)
6696b9
  - make the man pages note which external configuration files we consult when
6696b9
    submitting requests to certmaster and ipa CAs
6696b9
6696b9
* Thu May 27 2010 Nalin Dahyabhai <nalin@redhat.com> 0.23-1
6696b9
- update to 0.23
6696b9
  - new translations
6696b9
    - pl by Piotr DrÄ…g!
6696b9
  - cancel daemon startup if we can't gain ownership of our well-known
6696b9
    service name on the DBus (#596719)
6696b9
6696b9
* Fri May 14 2010 Nalin Dahyabhai <nalin@redhat.com> 0.22-1
6696b9
- update to 0.22
6696b9
  - new translations
6696b9
    - de by Fabian Affolter!
6696b9
  - certmaster-submit: don't fall over when we can't find a certmaster.conf
6696b9
    or a minion.conf (i.e., certmaster isn't installed) (#588932)
6696b9
  - when reading extension values from certificates, prune out duplicate
6696b9
    principal names, email addresses, and hostnames
6696b9
6696b9
* Tue May  4 2010 Nalin Dahyabhai <nalin@redhat.com> 0.21-1
6696b9
- update to 0.21
6696b9
  - getcert/*-getcert: relay the desired CA to the local service, whether
6696b9
    specified on the command line (in getcert) or as a built-in hard-wired
6696b9
    default (in *-getcert) (#584983)
6696b9
  - flesh out the default certmonger.conf so that people can get a feel for
6696b9
    the expected formatting (Jenny Galipeau)
6696b9
6696b9
* Wed Apr 21 2010 Nalin Dahyabhai <nalin@redhat.com> 0.20-1
6696b9
- update to 0.20
6696b9
  - correctly parse certificate validity periods given in years (spotted by
6696b9
    Stephen Gallagher)
6696b9
  - setup for translation
6696b9
    - es by Héctor Daniel Cabrera!
6696b9
    - ru by Yulia Poyarkova!
6696b9
    - uk by Yuri Chornoivan!
6696b9
  - fix unpreprocessed defaults in certmonger.conf's man page
6696b9
  - tweak the IPA-specific message that indicates a principal name also needs
6696b9
    to be specified if we're not using the default subject name (#579542)
6696b9
  - make the validity period of self-signed certificates into a configuration
6696b9
    setting and not a piece of the state information we track about the signer
6696b9
  - init script: exit with status 2 instead of 1 when invoked with an
6696b9
    unrecognized argument (#584517)
6696b9
6696b9
* Tue Mar 23 2010 Nalin Dahyabhai <nalin@redhat.com> 0.19-1
6696b9
- update to 0.19
6696b9
  - correctly initialize NSS databases that need to be using a PIN
6696b9
  - add certmonger.conf, for customizing notification timings and settings,
6696b9
    and use of digests other than the previously-hard-coded SHA256, and
6696b9
    drop those settings from individual requests
6696b9
  - up the default self-sign validity interval from 30 days to 365 days
6696b9
  - drop the first default notification interval from 30 days to 28 days
6696b9
    (these two combined to create a fun always-reissuing loop earlier)
6696b9
  - record the token which contains the key or certificate when we're
6696b9
    storing them in an NSS database, and report it
6696b9
  - improve handling of cases where we're supposed to use a PIN but we
6696b9
    either don't have one or we have the wrong one
6696b9
  - teach getcert to accept a PIN file's name or a PIN value when adding
6696b9
    a new entry
6696b9
  - update the IPA submission helper to use the new 'request_cert' signature
6696b9
    that's landing soon
6696b9
  - more tests
6696b9
6696b9
* Fri Feb 12 2010 Nalin Dahyabhai <nalin@redhat.com> 0.18-1
6696b9
- update to 0.18
6696b9
  - add support for using encrypted storage for keys, using PIN values
6696b9
    supplied directly or read from files whose names are supplied
6696b9
  - don't choke on NSS database locations that use the "sql:" or "dbm:"
6696b9
    prefix
6696b9
6696b9
* Mon Jan 25 2010 Nalin Dahyabhai <nalin@redhat.com> 0.17-2
6696b9
- make the D-Bus configuration file (noreplace) (#541072)
6696b9
- make the %%check section and the deps we have just for it conditional on
6696b9
  the same macro (#541072)
6696b9
6696b9
* Wed Jan  6 2010 Nalin Dahyabhai <nalin@redhat.com> 0.17-1
6696b9
- update to 0.17
6696b9
  - fix a hang in the daemon (Rob Crittenden)
6696b9
  - documentation updates
6696b9
  - fix parsing of submission results from IPA (Rob Crittenden)
6696b9
6696b9
* Fri Dec 11 2009 Nalin Dahyabhai <nalin@redhat.com> 0.16-1
6696b9
- update to 0.16
6696b9
  - set a umask at startup (Dan Walsh)
6696b9
6696b9
* Tue Dec  8 2009 Nalin Dahyabhai <nalin@redhat.com> 0.15-1
6696b9
- update to 0.15
6696b9
  - notice that a directory with a trailing '/' is the same location as the
6696b9
    directory without it
6696b9
  - fix handling of the pid file when we write one (by actually giving it
6696b9
    contents)
6696b9
6696b9
* Wed Nov 25 2009 Nalin Dahyabhai <nalin@redhat.com> 0.14-1
6696b9
- update to 0.14
6696b9
  - check key and certificate location at add-time to make sure they're
6696b9
    absolute paths to files or directories, as appropriate
6696b9
  - IPA: dig into the 'result' item if the named result value we're looking
6696b9
    for isn't in the result struct
6696b9
6696b9
* Tue Nov 24 2009 Nalin Dahyabhai <nalin@redhat.com> 0.13-1
6696b9
- update to 0.13
6696b9
  - change the default so that we default to trying to auto-refresh
6696b9
    certificates unless told otherwise
6696b9
  - preemptively enforce limitations on request nicknames so that they
6696b9
    make valid D-Bus object path components
6696b9
6696b9
* Tue Nov 24 2009 Nalin Dahyabhai <nalin@redhat.com> 0.12-1
6696b9
- update to 0.12
6696b9
  - add a crucial bit of error reporting when CAs reject our requests
6696b9
  - count the number of configured CAs correctly
6696b9
6696b9
* Mon Nov 23 2009 Nalin Dahyabhai <nalin@redhat.com> 0.11-1
6696b9
- update to 0.11
6696b9
  - add XML-RPC submission for certmaster and IPA
6696b9
  - prune entries with duplicate names from the data store
6696b9
6696b9
* Fri Nov 13 2009 Nalin Dahyabhai <nalin@redhat.com> 0.10-1
6696b9
- update to 0.10
6696b9
  - add some compiler warnings and then fix them
6696b9
6696b9
* Fri Nov 13 2009 Nalin Dahyabhai <nalin@redhat.com> 0.9-1
6696b9
- update to 0.9
6696b9
  - run external submission helpers correctly
6696b9
  - fix signing of signing requests generated for keys stored in files
6696b9
  - only care about new interface and route notifications from netlink,
6696b9
    and ignore notifications that don't come from pid 0
6696b9
  - fix logic for determining expiration status
6696b9
  - correct the version number in self-signed certificates
6696b9
6696b9
* Tue Nov 10 2009 Nalin Dahyabhai <nalin@redhat.com> 0.8-1
6696b9
- update to 0.8
6696b9
  - encode windows UPN values in requests correctly
6696b9
  - watch for netlink routing changes and restart stalled submission requests
6696b9
  - 'getcert resubmit' can force a regeneration of the CSR and submission
6696b9
6696b9
* Fri Nov  6 2009 Nalin Dahyabhai <nalin@redhat.com> 0.7-1
6696b9
- update to 0.7
6696b9
  - first cut at a getting-started document
6696b9
  - refactor some internal key handling with NSS
6696b9
  - check for duplicate request nicknames at add-time
6696b9
6696b9
* Tue Nov  3 2009 Nalin Dahyabhai <nalin@redhat.com> 0.6-1
6696b9
- update to 0.6
6696b9
  - man pages
6696b9
  - 'getcert stop-tracking' actually makes the server forget now
6696b9
  - 'getcert request -e' was redundant, dropped the -e option
6696b9
  - 'getcert request -i' now sets the request nickname
6696b9
  - 'getcert start-tracking -i' now sets the request nickname
6696b9
6696b9
* Mon Nov  2 2009 Nalin Dahyabhai <nalin@redhat.com> 0.5-1
6696b9
- update to 0.5
6696b9
  - packaging fixes
6696b9
  - add a selfsign-getcert client
6696b9
  - self-signed certs now get basic constraints and their own serial numbers
6696b9
  - accept id-ms-kp-sc-logon as a named EKU value in a request
6696b9
6696b9
* Thu Oct 29 2009 Nalin Dahyabhai <nalin@redhat.com> 0.4-1
6696b9
- update to 0.4
6696b9
6696b9
* Thu Oct 22 2009 Nalin Dahyabhai <nalin@redhat.com> 0.1-1
6696b9
- update to 0.1
6696b9
6696b9
* Sun Oct 18 2009 Nalin Dahyabhai <nalin@redhat.com> 0.0-1
6696b9
- initial package