d4b2f2
%global systemd 1
d4b2f2
%global	sysvinit 0
d4b2f2
d4b2f2
%global systemdsysv 0
d4b2f2
d4b2f2
%global tmpfiles 1
d4b2f2
d4b2f2
%global sysvinitdir %{_initddir}
d4b2f2
f1f50d
%bcond_without xmlrpc
f1f50d
d4b2f2
Name:		certmonger
718d03
Version:	0.79.17
718d03
Release:	2%{?dist}
d4b2f2
Summary:	Certificate status monitor and PKI enrollment client
d4b2f2
d4b2f2
Group:		System Environment/Daemons
d4b2f2
License:	GPLv3+
d4b2f2
URL:		http://pagure.io/certmonger/
d4b2f2
Source0:	http://releases.pagure.org/certmonger/certmonger-%{version}.tar.gz
718d03
#Source1:	http://releases.pagure.org/certmonger/certmonger-%%{version}.tar.gz.sig
d4b2f2
718d03
Patch0001:	0001-Revert-Remove-the-certmaster-CA-from-the-028-dbus-te.patch
718d03
Patch0002:	0002-Don-t-run-the-002-keygen-tests-when-root.patch
f1f50d
d4b2f2
BuildRequires:	autoconf
d4b2f2
BuildRequires:	automake
d4b2f2
BuildRequires:	gettext-devel
d4b2f2
BuildRequires:	gcc
d4b2f2
BuildRequires:	openldap-devel
d4b2f2
BuildRequires:	libidn2-devel
d4b2f2
BuildRequires:	python3-dbus
d4b2f2
BuildRequires:	dbus-devel
d4b2f2
BuildRequires:	nspr-devel
d4b2f2
BuildRequires:	nss-devel
d4b2f2
BuildRequires:	openssl-devel
d4b2f2
BuildRequires:	libuuid-devel
d4b2f2
BuildRequires:	libtalloc-devel, libtevent-devel
d4b2f2
BuildRequires:	libcurl-devel
f1f50d
BuildRequires:	libxml2-devel
f1f50d
%if %{with xmlrpc}
f1f50d
BuildRequires:	xmlrpc-c-devel
f1f50d
%endif
f1f50d
BuildRequires:	jansson-devel
d4b2f2
# Required for 'make check':
d4b2f2
#  for diff and cmp
d4b2f2
BuildRequires:	diffutils
d4b2f2
#  for expect
d4b2f2
BuildRequires:	expect
d4b2f2
#  for certutil and pk12util
d4b2f2
BuildRequires:	nss-tools
d4b2f2
#  for openssl
d4b2f2
BuildRequires:	openssl
d4b2f2
#  for dbus-launch
d4b2f2
BuildRequires:	/usr/bin/dbus-launch
d4b2f2
#  for dos2unix
d4b2f2
BuildRequires:	/usr/bin/dos2unix
d4b2f2
BuildRequires:	/usr/bin/unix2dos
d4b2f2
#  for which
d4b2f2
BuildRequires:	/usr/bin/which
d4b2f2
BuildRequires:	popt-devel
d4b2f2
#  for make check
d4b2f2
BuildRequires:	python3-devel
f1f50d
BuildRequires:	krb5-devel
d4b2f2
d4b2f2
# we need a running system bus
d4b2f2
Requires:	dbus
d4b2f2
Requires(post):	%{_bindir}/dbus-send
d4b2f2
d4b2f2
%if %{systemd}
d4b2f2
BuildRequires:	systemd-units
d4b2f2
Requires(post):	systemd-units
d4b2f2
Requires(preun):	systemd-units, dbus, sed
d4b2f2
Requires(postun):	systemd-units
d4b2f2
%endif
d4b2f2
d4b2f2
%if %{systemdsysv}
d4b2f2
Requires(post):	systemd-sysv
d4b2f2
%global systemdsysvsave \
d4b2f2
# Save the current service runlevel info, in case the user wants \
d4b2f2
# to apply the enabled status manually later, by running \
d4b2f2
#   "systemd-sysv-convert --apply certmonger". \
d4b2f2
%{_bindir}/systemd-sysv-convert --save certmonger >/dev/null 2>&1 ||:
d4b2f2
%else
d4b2f2
%global systemdsysvsave %{nil}
d4b2f2
%endif
d4b2f2
d4b2f2
%if %{sysvinit}
d4b2f2
Requires(post):	/sbin/chkconfig, /sbin/service
d4b2f2
Requires(preun):	/sbin/chkconfig, /sbin/service, dbus, sed
d4b2f2
%endif
d4b2f2
d4b2f2
d4b2f2
%description
d4b2f2
Certmonger is a service which is primarily concerned with getting your
d4b2f2
system enrolled with a certificate authority (CA) and keeping it enrolled.
d4b2f2
d4b2f2
%prep
f1f50d
%autosetup -p1
d4b2f2
d4b2f2
%build
d4b2f2
autoreconf -i -f
d4b2f2
%configure \
d4b2f2
%if %{systemd}
d4b2f2
	--enable-systemd \
d4b2f2
%endif
d4b2f2
%if %{sysvinit}
d4b2f2
	--enable-sysvinit=%{sysvinitdir} \
d4b2f2
%endif
d4b2f2
%if %{tmpfiles}
d4b2f2
	--enable-tmpfiles \
d4b2f2
%endif
a223c4
	--with-homedir=/run/certmonger \
f1f50d
%if %{with xmlrpc}
f1f50d
	--with-xmlrpc \
f1f50d
%endif
a223c4
	--with-tmpdir=/run/certmonger --enable-pie --enable-now
f1f50d
%if %{with xmlrpc}
d4b2f2
# For some reason, some versions of xmlrpc-c-config in Fedora and RHEL just
d4b2f2
# tell us about libxmlrpc_client, but we need more.  Work around.
d4b2f2
make %{?_smp_mflags} XMLRPC_LIBS="-lxmlrpc_client -lxmlrpc_util -lxmlrpc"
f1f50d
%else
f1f50d
make %{?_smp_mflags}
f1f50d
%endif
d4b2f2
d4b2f2
%install
d4b2f2
rm -rf $RPM_BUILD_ROOT
d4b2f2
make install DESTDIR=$RPM_BUILD_ROOT
d4b2f2
mkdir -p $RPM_BUILD_ROOT/%{_localstatedir}/lib/certmonger/{cas,requests}
a223c4
install -m755 -d $RPM_BUILD_ROOT/run/certmonger
d4b2f2
%{find_lang} %{name}
d4b2f2
d4b2f2
%check
d4b2f2
# Seed then openssl RNG if not set
d4b2f2
if [ ! -e $HOME/.rnd ] ; then
d4b2f2
	openssl rand -writerand $HOME/.rnd
d4b2f2
fi
d4b2f2
make check
d4b2f2
d4b2f2
%post
d4b2f2
if test $1 -eq 1 ; then
d4b2f2
	%{_bindir}/dbus-send --system --type=method_call --dest=org.freedesktop.DBus / org.freedesktop.DBus.ReloadConfig 2>&1 || :
d4b2f2
fi
f1f50d
%if %{without xmlrpc}
f1f50d
# remove any existing certmaster CA configuration
f1f50d
if test $1 -gt 1 ; then
f1f50d
	%{_bindir}/getcert remove-ca -c certmaster 2>&1 || :
f1f50d
fi
f1f50d
%endif
d4b2f2
%if %{systemd}
d4b2f2
if test $1 -eq 1 ; then
d4b2f2
	/bin/systemctl daemon-reload >/dev/null 2>&1 || :
d4b2f2
fi
d4b2f2
%endif
d4b2f2
%if %{sysvinit}
d4b2f2
/sbin/chkconfig --add certmonger
d4b2f2
%endif
d4b2f2
d4b2f2
%triggerin -- certmonger < 0.58
d4b2f2
if test $1 -gt 1 ; then
d4b2f2
	# If the daemon is running, remove knowledge of the dogtag renewer.
d4b2f2
	objpath=`dbus-send --system --reply-timeout=10000 --dest=org.fedorahosted.certmonger --print-reply=o /org/fedorahosted/certmonger org.fedorahosted.certmonger.find_ca_by_nickname string:dogtag-ipa-renew-agent 2> /dev/null | sed -r 's,^ +,,g' || true`
d4b2f2
	if test -n "$objpath" ; then
d4b2f2
		dbus-send --system --dest=org.fedorahosted.certmonger --print-reply /org/fedorahosted/certmonger org.fedorahosted.certmonger.remove_known_ca objpath:"$objpath" >/dev/null 2> /dev/null
d4b2f2
	fi
d4b2f2
	# Remove the data file, in case it isn't running.
d4b2f2
	for cafile in %{_localstatedir}/lib/certmonger/cas/* ; do
d4b2f2
		if grep -q '^id=dogtag-ipa-renew-agent$' "$cafile" ; then
d4b2f2
			rm -f "$cafile"
d4b2f2
		fi
d4b2f2
	done
d4b2f2
fi
d4b2f2
exit 0
d4b2f2
d4b2f2
%postun
d4b2f2
%if %{systemd}
d4b2f2
/bin/systemctl daemon-reload >/dev/null 2>&1 || :
d4b2f2
if [ $1 -ge 1 ] ; then
d4b2f2
	/bin/systemctl try-restart certmonger.service >/dev/null 2>&1 || :
d4b2f2
fi
d4b2f2
%endif
d4b2f2
%if %{sysvinit}
d4b2f2
if test $1 -gt 0 ; then
d4b2f2
	/sbin/service certmonger condrestart 2>&1 > /dev/null
d4b2f2
fi
d4b2f2
%endif
d4b2f2
exit 0
d4b2f2
d4b2f2
%preun
d4b2f2
%if %{systemd}
d4b2f2
if test $1 -eq 0 ; then
d4b2f2
	/bin/systemctl --no-reload disable certmonger.service > /dev/null 2>&1 || :
d4b2f2
	/bin/systemctl stop certmonger.service > /dev/null 2>&1 || :
d4b2f2
fi
d4b2f2
%endif
d4b2f2
%if %{sysvinit}
d4b2f2
if test $1 -eq 0 ; then
d4b2f2
	/sbin/service certmonger stop 2>&1 > /dev/null
d4b2f2
	/sbin/chkconfig --del certmonger
d4b2f2
fi
d4b2f2
%endif
d4b2f2
exit 0
d4b2f2
d4b2f2
%if %{systemd}
d4b2f2
%triggerun -- certmonger < 0.43
d4b2f2
%{systemdsysvsave}
d4b2f2
# Do this because the old package's %%postun doesn't know we need to do it.
d4b2f2
/sbin/chkconfig --del certmonger >/dev/null 2>&1 || :
d4b2f2
# Do this because the old package's %%postun wouldn't have tried.
d4b2f2
/bin/systemctl try-restart certmonger.service >/dev/null 2>&1 || :
d4b2f2
exit 0
d4b2f2
%endif
d4b2f2
d4b2f2
%files -f %{name}.lang
d4b2f2
%defattr(-,root,root,-)
d4b2f2
%doc README.md LICENSE STATUS doc/*.txt
d4b2f2
%config(noreplace) %{_sysconfdir}/dbus-1/system.d/*
d4b2f2
%{_datadir}/dbus-1/services/*
d4b2f2
%dir %{_sysconfdir}/certmonger
d4b2f2
%config(noreplace) %{_sysconfdir}/certmonger/certmonger.conf
a223c4
%dir /run/certmonger
d4b2f2
%{_bindir}/*
d4b2f2
%{_sbindir}/certmonger
d4b2f2
%{_mandir}/man*/*
d4b2f2
%{_libexecdir}/%{name}
d4b2f2
%{_localstatedir}/lib/certmonger
d4b2f2
%if %{sysvinit}
d4b2f2
%{sysvinitdir}/certmonger
d4b2f2
%endif
d4b2f2
%if %{tmpfiles}
d4b2f2
%attr(0644,root,root) %config(noreplace) %{_tmpfilesdir}/certmonger.conf
d4b2f2
%endif
d4b2f2
%if %{systemd}
d4b2f2
%{_unitdir}/*
d4b2f2
%{_datadir}/dbus-1/system-services/*
d4b2f2
%endif
d4b2f2
d4b2f2
%changelog
718d03
* Wed Dec  7 2022 Rob Crittenden <rcritten@redhat.com> - 0.79.17-2
718d03
- Skip the keygen tests when executed as root.
718d03
718d03
* Tue Dec  6 2022 Rob Crittenden <rcritten@redhat.com> - 0.79.17-1
718d03
- Update to upstream 0.79.17 (#2139523)
718d03
- Certificate format validation when adding the SCEP server's CA (#2150025)
718d03
- Certmonger SCEP renewal should not use old challenges (#2150030)
718d03
- certmonger SEGV during rekey in FIPS mode (#2150070)
718d03
ac6aa4
* Mon Oct 18 2021 Rob Crittenden <rcritten@redhat.com> - 0.79.13-5
ac6aa4
- certmonger creates CSRs with invalid DER syntax for X509v3 extensions
ac6aa4
  with critical=FALSE (#2012258)
ac6aa4
ac6aa4
* Wed Oct 06 2021 Rob Crittenden <rcritten@redhat.com> - 0.79.13-4
ac6aa4
- Certmonger SCEP renewal should not use old challenges (#1577570)
ac6aa4
- Certmonger segfault after cert renewal request (#1881500)
ac6aa4
- Include certificate NotBefore date in output of the 'getcert list' command
ac6aa4
  (#1940261)
ac6aa4
- Certmonger certificates stuck in NEED_GUIDANCE (#2001079)
ac6aa4
774055
* Wed Apr 28 2021 Rob Crittenden <rcritten@redhat.com> - 0.79.13-3
774055
- Fix local CA to work under FIPS (#1950132)
774055
f1f50d
* Tue Nov 10 2020 Rob Crittenden <rcritten@redhat.com> - 0.79.13-2
f1f50d
- Rebuild with xmlrpc-c support enabled (#1687698)
f1f50d
f1f50d
* Wed Oct 28 2020 Rob Crittenden <rcritten@redhat.com> - 0.79.13-1
f1f50d
- Rebase to 0.79.13 (#1891743)
f1f50d
 
a223c4
* Thu Jul 30 2020 Rob Crittenden <rcritten@redhat.com> - 0.79.7-15
a223c4
- Replace the previous fix for dbus restarting with PartOf in the
a223c4
  certmonger systemd service file to link the two (#1687698)
a223c4
a223c4
* Tue Jun  2 2020 Rob Crittenden <rcritten@redhat.com> - 0.79.7-14
a223c4
- Include &message=CA-IDENT with GetCACaps/GetCACert requests (#1843009)
a223c4
a223c4
* Mon May 18 2020 Rob Crittenden <rcritten@redhat.com> - 0.79.7-13
a223c4
- Exit gracefully if dbus is restarted (#1687698)
a223c4
a223c4
* Thu May 14 2020 Rob Crittenden <rcritten@redhat.com> - 0.79.7-12
a223c4
- Add long command-line options to man pages and help output (#1782838)
a223c4
a223c4
* Mon May  4 2020 Rob Crittenden <rcritten@redhat.com> - 0.79.7-11
a223c4
- Fix test failure in 039-fromfile
a223c4
a223c4
* Mon May  4 2020 Rob Crittenden <rcritten@redhat.com> - 0.79.7-10
a223c4
- Ensure that files read in have a trailing new-line (#1829490)
a223c4
a223c4
* Thu Apr 30 2020 Rob Crittenden <rcritten@redhat.com> - 0.79.7-9
a223c4
- Call the secport equivalent of PR_ErrorToString
a223c4
- Remove a couple of unused varaibles found by coverity
a223c4
a223c4
* Mon Apr 13 2020 Rob Crittenden <rcritten@redhat.com> - 0.79.7-8
a223c4
- Move systemd tmpfiles from /var/run to /run (#1804928)
a223c4
- Improve logging in the SCEP helper (#1807691)
a223c4
- Fix sort order of certificates passed into PKCS7_verify (#1808052)
a223c4
- Add -N option to SCEP helper to separate web server chain from
a223c4
  SCEP issuer chain (#1808613)
a223c4
- Add template profile, MS v2 template and issuer to getcert list
a223c4
  output (#1734451)
a223c4
a223c4
* Tue Dec 17 2019 Rob Crittenden <rcritten@redhat.com> - 0.79.7-7
a223c4
- Update gating requirements
a223c4
0af72f
* Mon Dec 16 2019 Rob Crittenden <rcritten@redhat.com> - 0.79.7-6
0af72f
- Rebuild
0af72f
0af72f
* Mon Dec  2 2019 Rob Crittenden <rcritten@redhat.com> - 0.79.7-5
0af72f
- Fix use-after-free issue when retrieving CA chain (#1710632)
0af72f
0af72f
* Mon Dec  2 2019 Rob Crittenden <rcritten@redhat.com> - 0.79.7-4
0af72f
- Optimize closing of file descriptors on fork (#1763745)
0af72f
- Remove NOMODDB flag flag from context init, look for full tokens (#1746543)
0af72f
- Retrieve full IPA CA chain (#1710632)
0af72f
9890c6
* Tue May 14 2019 Rob Crittenden <rcritten@redhat.com> - 0.79.7-3
9890c6
- Rebuild for new annobin (#1708095)
9890c6
9890c6
* Fri May 10 2019 Rob Crittenden <rcritten@redhat.com> - 0.79.7-2
9890c6
- Rebuild for new annobin (#1708095)
9890c6
9890c6
* Thu May  9 2019 Alexander Bokovoy <abokovoy@redhat.com> - 0.79.7-1
9890c6
- Rebase to 0.79.7 (#1708095)
9890c6
d4b2f2
* Mon Oct  8 2018 Rob Crittenden <rcritten@redhat.com> - 0.79.6-5
d4b2f2
- Address more issues uncovered by static analysis (#1632449)
d4b2f2
d4b2f2
* Tue Oct  2 2018 Rob Crittenden <rcritten@redhat.com> - 0.79.6-4
d4b2f2
- Improve handling of NSS tokens (#1624930)
d4b2f2
- Pull in upstream fixes discovered in coverity and clang (#1632449)
d4b2f2
d4b2f2
* Mon Aug 13 2018 Rob Crittenden <rcritten@redhat.com> - 0.79.6-3
d4b2f2
- Add BuildRequires on python3-devel (#1615507)
d4b2f2
d4b2f2
* Thu Aug  2 2018 Rob Crittenden <rcritten@redhat.com> - 0.79.6-2
d4b2f2
- Fix test failure on some platforms
d4b2f2
d4b2f2
* Wed Aug  1 2018 Rob Crittenden <rcritten@redhat.com> - 0.79.6-1
d4b2f2
- Update to upstream 0.79.6
d4b2f2
- Fix unit tests to work with python 3
d4b2f2
d4b2f2
* Fri Feb 23 2018 Rob Crittenden <rcritten@redhat.com> 0.79.5-6
d4b2f2
- Fix unit tests. NSS crypto policy disallows keys < 1024
d4b2f2
d4b2f2
* Wed Feb 21 2018 Rob Crittenden <rcritten@redhat.com> 0.79.5-5
d4b2f2
- Add BuildRequires on gcc
d4b2f2
d4b2f2
* Wed Feb 07 2018 Fedora Release Engineering <releng@fedoraproject.org> - 0.79.5-4
d4b2f2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild
d4b2f2
d4b2f2
* Wed Jan 10 2018 Rob Crittenden <rcritten@redhat.com> 0.79.5-3
d4b2f2
- Remove BR on mktemp. It is now provided by coreutils.
d4b2f2
- Patch to fix NSS handling of keys in sqlite databases
d4b2f2
- Patches to fix tests now that sqlite is the NSS default.
d4b2f2
d4b2f2
* Wed Oct  4 2017 Rob Crittenden <rcritten@redhat.com> 0.79.5-2
d4b2f2
- Switch BR from /usr/include/popt.h to popt-devel
d4b2f2
d4b2f2
* Fri Sep  1 2017 Rob Crittenden <rcritten@redhat.com> 0.79.5-1
d4b2f2
- update to 0.79.5:
d4b2f2
   - getcert start-tracking: use issuer option when specified
d4b2f2
   - add support for specifying the MS certificate template
d4b2f2
   - Reformat certificates returned by Dogtag to strip extra newline
d4b2f2
d4b2f2
* Wed Aug 16 2017 Rob Crittenden <rcritten@redhat.com> 0.79.4-2
d4b2f2
- Reformat certificates returned by Dogtag. Dogtag was including
d4b2f2
  a spurious newline before -----END CERTIFICATE-----
d4b2f2
d4b2f2
* Mon Aug  7 2017 Rob Crittenden <rcritten@redhat.com> 0.79.4-1
d4b2f2
- update to 0.79.4
d4b2f2
  - fix CA option name for ipa cert-request
d4b2f2
  - fix minor memory leak
d4b2f2
  - fix build warnings
d4b2f2
  - fix an incorrect date in the .spec changelog
d4b2f2
  - bump gettext version to avoid warning
d4b2f2
d4b2f2
* Wed Aug 02 2017 Fedora Release Engineering <releng@fedoraproject.org> - 0.79.3-3
d4b2f2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Binutils_Mass_Rebuild
d4b2f2
d4b2f2
* Wed Jul 26 2017 Fedora Release Engineering <releng@fedoraproject.org> - 0.79.3-2
d4b2f2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild
d4b2f2
d4b2f2
* Tue Feb 28 2017 Nalin Dahyabhai <nalin@redhat.com> 0.79.3-1
d4b2f2
- update to 0.79.3:
d4b2f2
  - fix self-signing self-test cases that used DSA or EC keys
d4b2f2
d4b2f2
* Mon Feb 27 2017 Nalin Dahyabhai <nalin@redhat.com> 0.79.2-2
d4b2f2
- update %%docs list because README is now README.md
d4b2f2
d4b2f2
* Mon Feb 27 2017 Nalin Dahyabhai <nalin@redhat.com> 0.79.2-1
d4b2f2
- update to 0.79.2:
d4b2f2
  - fix 'make distcheck' target
d4b2f2
d4b2f2
* Sun Feb 19 2017 Nalin Dahyabhai <nalin@redhat.com> 0.79.1-1
d4b2f2
- update to 0.79.1:
d4b2f2
  - update translations
d4b2f2
  - fix 'make archive' target
d4b2f2
d4b2f2
* Sun Feb 19 2017 Nalin Dahyabhai <nalin@redhat.com> 0.79-1
d4b2f2
- update to 0.79:
d4b2f2
  - getcert now offers an option (-X) for requesting processing by a particular
d4b2f2
    CA if the server we're contacting is running more than one
d4b2f2
  - getcert also offers options (--for-ca, --not-for-ca, --ca-path-length) for
d4b2f2
    requesting BasicConstraints values
d4b2f2
  - getcert now displays times in local time instead of UTC, which was
d4b2f2
    previously the only way they were displayed; the --utc option can often be
d4b2f2
    used to switch back to its previous behavior
d4b2f2
  - the SCEP enrollment helper now correctly issues GetCACertChain requests to
d4b2f2
    SCEP servers, instead of issuing a GetCAChain request, which isn't part of
d4b2f2
    the protocol; from report by Jason Garland
d4b2f2
  - when issuing SCEP requests, the ID of the CA included in the HTTP request
d4b2f2
    is now URL-encoded, as it should be
d4b2f2
  - renewal or notification-of-impending-expiration logic is now triggered
d4b2f2
    closer to TTL thresholds rather than waiting for a periodic check to pass a
d4b2f2
    threshold
d4b2f2
  - properly builds with OpenSSL 1.1, thanks to Lukas Slebodnik and Tomas Mraz
d4b2f2
    for a lot of the legwork
d4b2f2
- resync .spec file with Fedora
d4b2f2
- upstream project migrated from fedorahosted.org to pagure.io
d4b2f2
d4b2f2
* Fri Feb 10 2017 Fedora Release Engineering <releng@fedoraproject.org> - 0.78.6-6
d4b2f2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_26_Mass_Rebuild
d4b2f2
d4b2f2
* Sat Jan 21 2017 Igor Gnatenko <ignatenko@redhat.com> - 0.78.6-5
d4b2f2
- Rebuild for xmlrpc-c
d4b2f2
d4b2f2
* Wed Jul  6 2016 Nalin Dahyabhai <nalin@redhat.com> 0.78.6-4
d4b2f2
- add backported fix to wait a reasonable amount of time after calling the
d4b2f2
  'resubmit' method for a new certificate to be issued when we're exercising
d4b2f2
  the D-Bus API during tests (Jan Cholasta, #1351052)
d4b2f2
d4b2f2
* Wed Jul  6 2016 Nalin Dahyabhai <nalin@redhat.com> 0.78.6-3
d4b2f2
- instead of using killall to send a SIGHUP to the system bus daemon in %%post
d4b2f2
  to get it to reload its configuration, use dbus-send to send a ReloadConfig
d4b2f2
  request over the bus (should fix #1277573)
d4b2f2
d4b2f2
* Wed Feb 03 2016 Fedora Release Engineering <releng@fedoraproject.org> - 0.78.6-2
d4b2f2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_24_Mass_Rebuild
d4b2f2
d4b2f2
* Wed Jan 13 2016 Nalin Dahyabhai <nalin@redhat.com> 0.78.6-1
d4b2f2
- document the -R, -N, -o, and -t flags for dogtag-ipa-renew-agent-submit
d4b2f2
- stop checking that we can generate 512 bit keys during self-tests
d4b2f2
d4b2f2
* Thu Nov 12 2015 Nalin Dahyabhai <nalin@redhat.com> 0.78.5-1
d4b2f2
- fix a possible uninitialized memory read (possibly #1260871)
d4b2f2
- log a diagnostic error when we fail to initialize libkrb5
d4b2f2
d4b2f2
* Tue Aug  4 2015 Nalin Dahyabhai <nalin@redhat.com> 0.78.4-1
d4b2f2
- fix the "getcert start-tracking" -L and -l options (#1249753)
d4b2f2
- output diagnostics about the second request when scep-submit encounters an
d4b2f2
  error during a second request to the SCEP server
d4b2f2
d4b2f2
* Mon Jul 20 2015 Nalin Dahyabhai <nalin@redhat.com> 0.78.3-1
d4b2f2
- call poptGetOptArg() correctly, to fix parsing of the -R flag to scep-submit
d4b2f2
  and the -O and -o flags to dogtag-submit (#1244914)
d4b2f2
d4b2f2
* Thu Jul  9 2015 Nalin Dahyabhai <nalin@redhat.com> 0.78.2-1
d4b2f2
- tweak initialization so that we set up for providing our D-Bus API before we
d4b2f2
  register our name with the bus, so that we can handle any requests that
d4b2f2
  arrive before the acknowledgement of that registration
d4b2f2
- on systems that run systemd, add the right data file so that the service gets
d4b2f2
  started when someone tries to talk to the daemon (ticket #38)
d4b2f2
- correctly check for error responses when sending GetCAChain requests to SCEP
d4b2f2
  servers
d4b2f2
d4b2f2
* Sun Jun 21 2015 Nalin Dahyabhai <nalin@redhat.com> 0.78.1-1
d4b2f2
- self-tests: assume that certutil won't generate DSA keys with more than 1024
d4b2f2
  bits, and will often short us by a few
d4b2f2
d4b2f2
* Sat Jun 20 2015 Nalin Dahyabhai <nalin@redhat.com> 0.78-1
d4b2f2
- switch to using popt for parsing command line arguments, continuing to
d4b2f2
  use old help text for now so that we can catch up with translations (print
d4b2f2
  old text for --help, new text (with longopts!) for -H)
d4b2f2
- add some plumbing for eventually receiving per-certificate roots in
d4b2f2
  addition to issued certificates and chain certificates
d4b2f2
- add a "rekey" command to getcert, for triggering enrollment using a new
d4b2f2
  key pair (#1087932)
d4b2f2
- scep-submit: check for the Renewal capability, and default to taking
d4b2f2
  advantage of it during rekeying, unless the new -n flag is specified to it
d4b2f2
- dogtag-submit: add flags for passing user names, UDNs, passwords, and PINs
d4b2f2
  to the helper (part of ticket #12)
d4b2f2
- dogtag-submit: add a flag for using the agent creds to do TLS client auth
d4b2f2
  while submitting enrollment requests (more of ticket #12)
d4b2f2
- dogtag-submit: handle cases where we submit a request and the server
d4b2f2
  returns a success code rather than just queuing the request (#12 again)
d4b2f2
- ipa-submit: pass requested profile names to the server as an argument
d4b2f2
  named "profile_id"; if the server gives us an "unrecognized argument"
d4b2f2
  error, retry without it for compatibility's sake (part of IPA ticket #57)
d4b2f2
- keygen: fix a possible crash if keygen fails to return a key from NSS
d4b2f2
- correct the certmonger(8) man page's description of the -c flag, which it
d4b2f2
  used to call the -C flag
d4b2f2
- add logic for setting ownership and permissions on certificates and keys
d4b2f2
  when saving them to disk
d4b2f2
- add configuration options "max_key_lifetime" and "max_key_use_count" for
d4b2f2
  making automatic renewal prefer rekeying
d4b2f2
d4b2f2
* Wed Jun 17 2015 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.77.5-2
d4b2f2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_23_Mass_Rebuild
d4b2f2
d4b2f2
* Thu May 28 2015 Nalin Dahyabhai <nalin@redhat.com> 0.77.5-1
d4b2f2
- pass $CERTMONGER_REQ_IP_ADDRESS to enrollment helpers if the signing request
d4b2f2
  includes IP address subjectAltName values
d4b2f2
- correctly verify signatures on SCEP server replies when the signer is neither
d4b2f2
  the top-level CA nor the RA (feedback in #1161768)
d4b2f2
- correctly verify signatures on SCEP server replies when there is more than
d4b2f2
  one certificate in the chain between the RA and the top-level CA (feedback in
d4b2f2
  #1161768)
d4b2f2
d4b2f2
* Fri May 15 2015 Nalin Dahyabhai <nalin@redhat.com> 0.77.4-1
d4b2f2
- don't display PINs in "getcert list" output (#42)
d4b2f2
- clean up launching of a private instance in "getcert"
d4b2f2
- expand on the don't-delete-private-key fix from 0.77.3 by letting NSS's
d4b2f2
  own safety checks have an effect
d4b2f2
- backport record-keeping of key generation dates and counts of how many
d4b2f2
  times we've gotten certificates using a given key pair
d4b2f2
d4b2f2
* Thu May  7 2015 Nalin Dahyabhai <nalin@redhat.com> 0.77.3-1
d4b2f2
- fix a data loss bug when saving renewed certificates to NSS databases - the
d4b2f2
  private key could be removed in error since 0.77
d4b2f2
- fixes for bugs found by static analysis
d4b2f2
- fix self-tests when built with OpenSSL 1.0.2
d4b2f2
d4b2f2
* Tue Apr 14 2015 Nalin Dahyabhai <nalin@redhat.com> 0.77.2-1
d4b2f2
- expose the certificate's not-valid-before and not-valid-after dates as a
d4b2f2
  property over D-Bus (ticket #41)
d4b2f2
- give the local signer its own configuration option to set the lifetime
d4b2f2
  of its signing certificate, falling back to the lifetime configured for
d4b2f2
  the self-signer as a default to match the previous behavior
d4b2f2
- fix a potential read segfault parsing the output of an enrollment helper,
d4b2f2
  introduced in 0.77 (thanks to Steve Neuharth)
d4b2f2
- read the ns-certtype extension value in certificates
d4b2f2
- request an enrollment certtype extension to CSRs if we have a profile name
d4b2f2
  that we want to use (ticket #17, possibly part of IPA ticket #57)
d4b2f2
d4b2f2
* Fri Feb 27 2015 Nalin Dahyabhai <nalin@redhat.com> 0.77.1-1
d4b2f2
- update to 0.77
d4b2f2
  - add initial, still rough, SCEP support (#1140241,#1161768)
d4b2f2
    - add an scep-submit helper to handle part of it
d4b2f2
  - getcert: add add-ca/add-scep-ca/modify-ca/remove-ca commands
d4b2f2
  - getcert: add -l, -L flags to request/resubmit/start-tracking commands
d4b2f2
    to provide a way to set a ChallengePassword in signing requests
d4b2f2
  - lay some groundwork for rekeying support
d4b2f2
  - bundled dogtag enrollment helpers now output debugging info to stderr (#)
d4b2f2
  - ipa-getcert: fix a crash when using DNS discovery to locate servers (#39)
d4b2f2
  - getcert: fix displaying of pre-request pre-/post-save commands (#1178190,
d4b2f2
    #1181022, patch by David Kupka)
d4b2f2
  - use Zanata for translations
d4b2f2
  - getcert list: list the certificate's profile name, if it contains one
d4b2f2
d4b2f2
* Tue Nov 18 2014 Nalin Dahyabhai <nalin@redhat.com> 0.76.8-1
d4b2f2
- dogtag-submit: accept additional options to pass to the server when
d4b2f2
  approving requests using agent creds (#1165155, patch by Jan Cholasta)
d4b2f2
- getcert: print help output when 'status' isn't given any args (#1163541)
d4b2f2
d4b2f2
* Tue Nov 11 2014 Nalin Dahyabhai <nalin@redhat.com> 0.76.7-1
d4b2f2
- correctly read CA not-valid-after dates on 32-bit machines (also reported by
d4b2f2
  Natxo Asenjo), so that we don't spin on polling them (#1163023)
d4b2f2
d4b2f2
* Mon Nov 10 2014 Nalin Dahyabhai <nalin@redhat.com> 0.76.6-1
d4b2f2
- don't discard the priority value in DNS SRV records
d4b2f2
d4b2f2
* Mon Nov 10 2014 Nalin Dahyabhai <nalin@redhat.com> 0.76.5-1
d4b2f2
- avoid premature exit on CA data analysis failures (should fix an issue
d4b2f2
  reported by Natxo Asenjo)
d4b2f2
d4b2f2
* Mon Nov 10 2014 Nalin Dahyabhai <nalin@redhat.com> 0.76.4-1
d4b2f2
- fix a failure in self-tests
d4b2f2
d4b2f2
* Mon Nov 10 2014 Nalin Dahyabhai <nalin@redhat.com> 0.76.3-1
d4b2f2
- fixes for bugs found by static analysis
d4b2f2
- handle IDN correctly when doing service location using SRV records
d4b2f2
- documentation updates
d4b2f2
d4b2f2
* Wed Nov  5 2014 Nalin Dahyabhai <nalin@redhat.com>
d4b2f2
- rework the state machine so that we save an issued certificate's associated
d4b2f2
  CA certificates, then re-read the certificate, then run the post hook and
d4b2f2
  issue notifications, in that order, instead of saving CA certificates after
d4b2f2
  running the post hook, which was always a surprising order (#1131700)
d4b2f2
- add a generic dogtag-submit helper that doesn't include any IPA defaults,
d4b2f2
  to make it easier to know the difference between paramenters it requires
d4b2f2
  and parameters which are optional (#12)
d4b2f2
d4b2f2
* Tue Nov  4 2014 Nalin Dahyabhai <nalin@redhat.com> 0.76.2-1
d4b2f2
- ipa-submit: when we fail to locate/contact LDAP or XML-RPC servers,
d4b2f2
  use discovery to find them (#1136900)
d4b2f2
d4b2f2
* Fri Oct 31 2014 Nalin Dahyabhai <nalin@redhat.com> 0.76.1-1
d4b2f2
- allow for 'certmonger -P abstract:...' to work, too
d4b2f2
d4b2f2
* Fri Oct 31 2014 Nalin Dahyabhai <nalin@redhat.com> 0.76-1
d4b2f2
- require a single certificate to be specified to 'getcert status' (#1148001,
d4b2f2
  #1163541, #1163539)
d4b2f2
- shorten the default help message which getcert prints when it's not given
d4b2f2
  a specific command (#1131704)
d4b2f2
- add private listener (-l, -L, -P) mode to certmonger, to allow it to listen
d4b2f2
  for connections directly from clients running under the same UID
d4b2f2
- add a command mode (-c) to certmonger, in which once it's started, it
d4b2f2
  launches a specified command, and after that command exits, the daemon exits
d4b2f2
- when getcert is invoked with no bus running, if it's running as root, run
d4b2f2
  certmonger in private listener mode with the same invocation of getcert as
d4b2f2
  the command to start and wait for (#1134497)
d4b2f2
d4b2f2
* Thu Aug 28 2014 Nalin Dahyabhai <nalin@redhat.com> 0.75.14-1
d4b2f2
- make pathname canonicalization slightly smarter, to handle ".." in
d4b2f2
  locations (#1131758)
d4b2f2
- updates to self-tests (#1144082)
d4b2f2
d4b2f2
* Thu Aug 21 2014 Kevin Fenzi <kevin@scrye.com> - 0.75.13-2
d4b2f2
- Rebuild for rpm bug 1131960
d4b2f2
d4b2f2
* Mon Aug 18 2014 Nalin Dahyabhai <nalin@redhat.com> 0.75.13-1
d4b2f2
- add a missing test case file (whoops)
d4b2f2
d4b2f2
* Mon Aug 18 2014 Nalin Dahyabhai <nalin@redhat.com> 0.75.12-1
d4b2f2
- correct encoding/decoding of variant-typed data which we receive and send
d4b2f2
  as part of the org.freedesktop.DBus.Properties interface over the bus, and
d4b2f2
  add some tests for them (based on patch from David Kupka, ticket #36)
d4b2f2
d4b2f2
* Fri Aug 15 2014 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.75.10-2
d4b2f2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild
d4b2f2
d4b2f2
* Tue Aug 12 2014 Nalin Dahyabhai <nalin@redhat.com> 0.75.11-1
d4b2f2
- when getcert is passed a -a flag, to indicate that CA root certificates
d4b2f2
  should be stored in the specified database, don't ignore locations which
d4b2f2
  don't include a storage scheme (#1129537)
d4b2f2
- when called to 'start-tracking' with the -a or -F flags, if we have
d4b2f2
  applicable certificates on-hand for a CA that we're either told to use
d4b2f2
  or which we decide is the correct one, save the certificates (#1129696)
d4b2f2
d4b2f2
* Tue Aug  5 2014 Nalin Dahyabhai <nalin@redhat.com> 0.75.10-1
d4b2f2
- when attempting to contact an IPA LDAP server, if no "ldap_uri" is set in
d4b2f2
  default.conf, and no "host" is set either, try to construct the server URI
d4b2f2
  using the "server" setting (#1126985)
d4b2f2
d4b2f2
* Thu Jul 31 2014 Nalin Dahyabhai <nalin@redhat.com> 0.75.9-1
d4b2f2
- avoid potential use-after-free after a CA is removed dynamically (thanks to
d4b2f2
  Keenan Brock) (#1125342)
d4b2f2
- add a "external-helper" property to CA objects
d4b2f2
d4b2f2
* Mon Jul 21 2014 Nalin Dahyabhai <nalin@redhat.com> 0.75.8-1
d4b2f2
- add a 'refresh' option to the getcert command
d4b2f2
- add a '-a' flag to the getcert command's 'refresh-ca' option
d4b2f2
d4b2f2
* Thu Jul 17 2014 Nalin Dahyabhai <nalin@redhat.com> 0.75.7-2
d4b2f2
- reintroduce package Requires: on systemd-sysv on F19 and EL6 and older,
d4b2f2
  conditionalized it so that it's ignored on newer releases, and make
d4b2f2
  whether or not we call systemd-sysv-convert in triggers depend on that,
d4b2f2
  too (#1104138)
d4b2f2
d4b2f2
* Thu Jul 17 2014 Nalin Dahyabhai <nalin@redhat.com> 0.75.7-1
d4b2f2
- fix an inconsistency in how we parse cookie values returned by CA helpers,
d4b2f2
  in that single-line values would lose the end-of-line after a daemon
d4b2f2
  restart, but not before
d4b2f2
- handle timeout values and exit status values when calling CA helpers
d4b2f2
  in non-SUBMIT, non-POLL modes (#1118468)
d4b2f2
- rework how we save CA certificates so that we save CA certificates associated
d4b2f2
  with end-entity certificates when we save that end-entity certificate, which
d4b2f2
  requires running all of the involved pre- and post-save commands
d4b2f2
- drop package Requires: on systemd-sysv (#1104138)
d4b2f2
d4b2f2
* Thu Jun 26 2014 Nalin Dahyabhai <nalin@redhat.com> 0.75.6-1
d4b2f2
- avoid potential use-after-free and read overrun after a CA is added
d4b2f2
  dynamically (thanks to Jan Cholasta)
d4b2f2
d4b2f2
* Fri Jun 20 2014 Nalin Dahyabhai <nalin@redhat.com> 0.75.5-1
d4b2f2
- documentation updates
d4b2f2
d4b2f2
* Fri Jun 20 2014 Nalin Dahyabhai <nalin@redhat.com> 0.75.4-2
d4b2f2
- add a %%trigger to remove knowledge of the "dogtag-ipa-renew-agent" CA
d4b2f2
  when we detect certmonger versions prior to 0.58 being installed, to
d4b2f2
  avoid cases where some older versions choke on CAs with nicknames that
d4b2f2
  contain characters that can't legally be part of a D-Bus name (#948993)
d4b2f2
d4b2f2
* Thu Jun 19 2014 Nalin Dahyabhai <nalin@redhat.com> 0.75.4-1
d4b2f2
- fix creation and packaging of the "local" CA's data directory
d4b2f2
d4b2f2
* Wed Jun 18 2014 Nalin Dahyabhai <nalin@redhat.com> 0.75.3-1
d4b2f2
- read and cache whether or not we saw a noOCSPcheck extension in certificates
d4b2f2
- documentation updates
d4b2f2
d4b2f2
* Mon Jun 16 2014 Nalin Dahyabhai <nalin@redhat.com> 0.75.2-1
d4b2f2
- when generating keys using OpenSSL, if key generation fails, try
d4b2f2
  again with the default key size, in case we're in FIPS mode
d4b2f2
- documentation updates
d4b2f2
d4b2f2
* Sat Jun 14 2014 Nalin Dahyabhai <nalin@redhat.com> 0.75.1-1
d4b2f2
- log the state in 'getcert status' verbose mode
d4b2f2
d4b2f2
* Fri Jun 13 2014 Nalin Dahyabhai <nalin@redhat.com> 0.75-1
d4b2f2
- add a -w (wait) flag to the getcert's request/resubmit/start-tracking
d4b2f2
  commands, and add a non-waiting status command
d4b2f2
d4b2f2
* Wed Jun 11 2014 Nalin Dahyabhai <nalin@redhat.com> 0.74.96-1
d4b2f2
- make the trust settings we apply to CA-supplied certificates while
d4b2f2
  saving them to NSS databases run-time configurable
d4b2f2
- fix compiling against EL5-era OpenSSL
d4b2f2
- when saving CA certificates we pull from an IPA server, nickname
d4b2f2
  it using the realm name with " IPA CA" appended rather than just
d4b2f2
  naming it "IPA CA"
d4b2f2
- fix the local signer so that when it issues itself a new certificate,
d4b2f2
  it uses the same subject name
d4b2f2
- add a -w flag to getcert's request, resubmit, and start-tracking
d4b2f2
  commands, telling it to wait until either the certificate is issued,
d4b2f2
  we get to a state where we know that we won't be able to get one, or
d4b2f2
  we are waiting for a CA
d4b2f2
d4b2f2
* Mon Jun  9 2014 Nalin Dahyabhai <nalin@redhat.com> 0.74.95-1
d4b2f2
- add the "local" signer, a local toy CA that signs anything you'll
d4b2f2
  ask it to sign
d4b2f2
d4b2f2
* Sat Jun 07 2014 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.74-2
d4b2f2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
d4b2f2
d4b2f2
* Fri Jun  6 2014 Nalin Dahyabhai <nalin@redhat.com> 0.74.94-1
d4b2f2
- fix self-test errors that we trigger with new OpenSSL
d4b2f2
- fix a build error that would sometimes happen when we're told to
d4b2f2
  build PIE binaries
d4b2f2
- quiet a compile warning
d4b2f2
d4b2f2
* Thu Jun  5 2014 Nalin Dahyabhai <nalin@redhat.com> 0.74.93-1
d4b2f2
- add some self-tests
d4b2f2
- simplify the internal submit-to-CA logic
d4b2f2
- fixes for more problems found through static analysis
d4b2f2
d4b2f2
* Tue Jun  3 2014 Nalin Dahyabhai <nalin@redhat.com> 0.74.92-1
d4b2f2
- retrieve CA information from CAs, if the helpers can do so, and
d4b2f2
  add a command to explicitly refresh that data: "getcert refresh-ca"
d4b2f2
- offer to save CA certificates to files and databases, when specified with
d4b2f2
  new -a and -F flags to getcert request/resubmit/start-tracking (#1098208,
d4b2f2
  trac #31)
d4b2f2
- add IP address subject alternate names when getcert request/resubmit
d4b2f2
  is passed the -A option (trac #35)
d4b2f2
- read and cache the freshestCRL extension in certificates
d4b2f2
- properly interpret KDC-unreachable errors encountered in the IPA
d4b2f2
  submission error as a server-unreachable error that we will retry,
d4b2f2
  rather than a misconfiguration error which we won't
d4b2f2
- don't let tests get tripped up by new formatting used in dos2unix status
d4b2f2
  messages (#1099080)
d4b2f2
- updated translations
d4b2f2
- be explicit that we are going to use bashisms in test scripts by calling
d4b2f2
  the shell interpreter as 'bash' rather than 'sh' (trac #27)
d4b2f2
d4b2f2
* Thu Apr  3 2014 Nalin Dahyabhai <nalin@redhat.com> 0.74-1
d4b2f2
- also save state when we exit due to SIGHUP
d4b2f2
- don't get tripped up when enrollment helpers hand us certificates which
d4b2f2
  include CRLF line terminators (ticket #25)
d4b2f2
- be tolerant of certificate issuer names, subject names, DNS, email, and
d4b2f2
  Kerberos principal namem subjectAltNames, and crl distribution point URLs
d4b2f2
  that contain newlines
d4b2f2
- read and cache the certificate template extension in certificates
d4b2f2
- enforce different minimum key sizes depending on the type of key we're
d4b2f2
  trying to generate
d4b2f2
- store DER versions of subject, issuer and template subject, if we have
d4b2f2
  them (Jan Cholasta, ticket #26)
d4b2f2
- when generating signing requests with subject names that don't quite parse
d4b2f2
  as subject names, encode what we're given as PrintableString rather than
d4b2f2
  as a UTF8String
d4b2f2
- always chdir() to a known location at startup, even if we're not becoming
d4b2f2
  a daemon
d4b2f2
- fix a couple of memory leaks (static analysis)
d4b2f2
- add missing buildrequires: on which
d4b2f2
d4b2f2
* Thu Feb 20 2014 Nalin Dahyabhai <nalin@redhat.com> 0.73-1
d4b2f2
- updates to 0.73
d4b2f2
  - getcert no longer claims to be stuck when a CA is unreachable,
d4b2f2
    because the daemon isn't actually stuck
d4b2f2
d4b2f2
* Mon Feb 17 2014 Nalin Dahyabhai <nalin@redhat.com>
d4b2f2
- updates to 0.73
d4b2f2
  - also pass the key type to enrollment helpers in the environment as
d4b2f2
    a the value of "CERTMONGER_KEY_TYPE"
d4b2f2
d4b2f2
* Mon Feb 10 2014 Nalin Dahyabhai <nalin@redhat.com>
d4b2f2
- move the tmpfiles.d file from /etc/tmpfiles.d to %%{_tmpfilesdir},
d4b2f2
  where it belongs (#1180978)
d4b2f2
d4b2f2
* Mon Feb 10 2014 Nalin Dahyabhai <nalin@redhat.com>
d4b2f2
- updates for 0.73
d4b2f2
  - set the flag to encode EC public key parameters using named curves
d4b2f2
    instead of the default of all-the-details when using OpenSSL
d4b2f2
  - don't break when NSS supports secp521r1 but OpenSSL doesn't
d4b2f2
  - also pass the CA nickname to enrollment helpers in the environment as
d4b2f2
    a text value in "CERTMONGER_CA_NICKNAME", so they can use that value
d4b2f2
    when reading configuration settings
d4b2f2
  - also pass the SPKAC value to enrollment helpers in the environment as
d4b2f2
    a base64 value in "CERTMONGER_SPKAC"
d4b2f2
  - also pass the request's SubjectPublicKeyInfo value to enrollment helpers
d4b2f2
    in the environment as a base64 value in "CERTMONGER_SPKI" (part of #16)
d4b2f2
  - when generating signing requests using NSS, be more accommodating of
d4b2f2
    requested subject names that don't parse properly
d4b2f2
d4b2f2
* Mon Feb  3 2014 Nalin Dahyabhai <nalin@redhat.com> 0.72-1
d4b2f2
- update to 0.72
d4b2f2
  - support generating DSA parameters and keys on sufficiently-new OpenSSL
d4b2f2
    and NSS
d4b2f2
  - support generating EC keys when OpenSSL and NSS support it, using key
d4b2f2
    size to select the curve to use from among secp256r1, secp384r1,
d4b2f2
    secp521r1 (which are the ones that are usually available, though
d4b2f2
    secp521r1 isn't always, even if the other two are)
d4b2f2
  - stop trying to cache public key parameters at all and instead cache public
d4b2f2
    key info properly
d4b2f2
  - encode the friendlyName attribute in signing requests as a BMPString,
d4b2f2
    not as a PrintableString
d4b2f2
  - catch more filesystem permissions problems earlier (more of #996581)
d4b2f2
d4b2f2
* Mon Jan 27 2014 Nalin Dahyabhai <nalin@redhat.com> 0.71-1
d4b2f2
- check for cases where we fail to allocate memory while reading a request
d4b2f2
  or CA entry from disk (John Haxby)
d4b2f2
- only handle one watch at a time, which should avoid abort() during
d4b2f2
  attempts to reconnect to the message bus after losing our connection
d4b2f2
  to it (#1055521)
d4b2f2
d4b2f2
* Fri Jan 24 2014 Daniel Mach <dmach@redhat.com> - 0.70-2
d4b2f2
- Mass rebuild 2014-01-24
d4b2f2
d4b2f2
* Thu Jan  2 2014 Nalin Dahyabhai <nalin@redhat.com> 0.70-1
d4b2f2
- add a --with-homedir option to configure, and use it, since subprocesses
d4b2f2
  which we run and which use NSS may attempt to write to $HOME/.pki, and
d4b2f2
  0.69's strategy of setting that to "/" was rightly hitting SELinux policy
d4b2f2
  denials (#1047798)
d4b2f2
d4b2f2
* Fri Dec 27 2013 Daniel Mach <dmach@redhat.com> - 0.69-2
d4b2f2
- Mass rebuild 2013-12-27
d4b2f2
d4b2f2
* Mon Dec  9 2013 Nalin Dahyabhai <nalin@redhat.com> 0.69-1
d4b2f2
- tweak how we decide whether we're on the master or a minion when we're
d4b2f2
  told to use certmaster as a CA
d4b2f2
- clean up one of the tests so that it doesn't have to work around internal
d4b2f2
  logging producing duplicate messages
d4b2f2
- when logging errors while setting up to contact xmlrpc servers, explicitly
d4b2f2
  note that the error is client-side
d4b2f2
- don't abort() due to incorrect locking when an attempt to save an issued
d4b2f2
  certificate to the designated location fails (part of #1032760/#1033333,
d4b2f2
  ticket #22)
d4b2f2
- when reading an issued certificate from an enrollment helper, ignore
d4b2f2
  noise before or after the certificate itself (more of #1032760/1033333,
d4b2f2
  ticket #22)
d4b2f2
- run subprocesses in a cleaned-up environment (more of #1032760/1033333,
d4b2f2
  ticket #22)
d4b2f2
- clear the ca-error that we saved when we had an error talking to the CA if we
d4b2f2
  subsequently succeed in talking to the CA
d4b2f2
- various other static-analysis fixes
d4b2f2
d4b2f2
* Thu Aug 29 2013 Nalin Dahyabhai <nalin@redhat.com> 0.68-1
d4b2f2
- notice when the OpenSSL RNG isn't seeded
d4b2f2
- notice when saving certificates or keys fails due to filesystem-related
d4b2f2
  permission denial (#996581)
d4b2f2
d4b2f2
* Tue Aug  6 2013 Nalin Dahyabhai <nalin@redhat.com> 0.67-3
d4b2f2
- pull up a patch from master to adapt self-tests to certutil's diagnostic
d4b2f2
  output having changed (#992050)
d4b2f2
d4b2f2
* Sat Aug 03 2013 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.67-2
d4b2f2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_20_Mass_Rebuild
d4b2f2
d4b2f2
* Mon Mar 11 2013 Nalin Dahyabhai <nalin@redhat.com> 0.67-1
d4b2f2
- when saving certificates to NSS databases, try to preserve the trust
d4b2f2
  value assigned to a previously-present certificate with the same nickname
d4b2f2
  and subject, if one is found
d4b2f2
- when saving certificates to NSS databases, also prune certificates from
d4b2f2
  the database which have both the same nickname and subject as the one
d4b2f2
  we're adding, to avoid tripping up tools that only fetch one certificate
d4b2f2
  by nickname
d4b2f2
d4b2f2
* Wed Feb 13 2013 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.65-2
d4b2f2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_19_Mass_Rebuild
d4b2f2
d4b2f2
* Wed Jan 23 2013 Nalin Dahyabhai <nalin@redhat.com> 0.66-1
d4b2f2
- build as position-independent executables with early binding (#883966)
d4b2f2
- also don't tag the unit file as a configuration file (internal tooling)
d4b2f2
d4b2f2
* Wed Jan 23 2013 Nalin Dahyabhai <nalin@redhat.com> 0.65-2
d4b2f2
- don't tag the D-Bus session .service file as a configuration file (internal
d4b2f2
  tooling)
d4b2f2
d4b2f2
* Tue Jan  8 2013 Nalin Dahyabhai <nalin@redhat.com> 0.65-1
d4b2f2
- fix a crash in the self-tests
d4b2f2
d4b2f2
* Tue Jan  8 2013 Nalin Dahyabhai <nalin@redhat.com> 0.64-1
d4b2f2
- at startup, if we resume the state machine for a given certificate to a state
d4b2f2
  which expects to have the newly-added lock already acquired, acquire it
d4b2f2
  before moving on with the certificate's work (still aimed at fixing #883484)
d4b2f2
d4b2f2
* Tue Dec 18 2012 Nalin Dahyabhai <nalin@redhat.com> 0.63-1
d4b2f2
- serialize access to NSS databases and the running of pre- and post-save
d4b2f2
  commands which might also access them (possibly fixing part of #883484)
d4b2f2
d4b2f2
* Thu Nov 29 2012 Nalin Dahyabhai <nalin@redhat.com> 0.62-1
d4b2f2
- add a -u flag to getcert to enable requesting a keyUsage extension value
d4b2f2
- request subjectKeyIdentifier extensions from CAs, and include them in
d4b2f2
  self-signed certificates
d4b2f2
- request basicConstraints from CAs, defaulting to requests for end-entity
d4b2f2
  certificates
d4b2f2
- when requesting CA certificates, also request authorityKeyIdentifier
d4b2f2
- add support for requesting CRL distribution point and authorityInfoAccess
d4b2f2
  extensions that specify OCSP responder locations
d4b2f2
- don't crash when OpenSSL can't build a template certificate from a request
d4b2f2
  when we're in FIPS mode
d4b2f2
- put NSS in FIPS mode, when the system booted that way, except when we're
d4b2f2
  trying to write certificates to a database
d4b2f2
- fix CSR generation and self-signing in FIPS mode with NSS
d4b2f2
- fix self-signing in FIPS mode with OpenSSL
d4b2f2
- new languages from the translation team: mai, ml, nn, ga
d4b2f2
d4b2f2
* Tue Nov 27 2012 Nalin Dahyabhai <nalin@redhat.com> 0.61-3
d4b2f2
- backport change from git to not choke if X509_REQ_to_X509() fails when we're
d4b2f2
  self-signing using OpenSSL
d4b2f2
- backport another change from git to represent this as a CA-rejected error
d4b2f2
d4b2f2
* Mon Sep 24 2012 Nalin Dahyabhai <nalin@redhat.com> 0.61-1
d4b2f2
- fix a regression in reading old request tracking files where the
d4b2f2
  request was in state NEED_TO_NOTIFY or NOTIFYING
d4b2f2
d4b2f2
* Wed Sep  5 2012 Nalin Dahyabhai <nalin@redhat.com> 0.60-1
d4b2f2
- adjust internals of logic for talking to dogtag to at least have a
d4b2f2
  concept of non-agent cases
d4b2f2
- when talking to an IPA server's internal Dogtag instance, infer which
d4b2f2
  ports the CA is listening on from the "dogtag_version" setting in the
d4b2f2
  IPA configuration (Ade Lee)
d4b2f2
- send a notification (or log a message, whatever) when we save a new
d4b2f2
  certificate (#766167)
d4b2f2
d4b2f2
* Mon Jul 30 2012 Nalin Dahyabhai <nalin@redhat.com>
d4b2f2
- fix a bad %%preun scriptlet
d4b2f2
d4b2f2
* Wed Jul 18 2012 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.59-2
d4b2f2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild
d4b2f2
d4b2f2
* Fri Jun 29 2012 Nalin Dahyabhai <nalin@redhat.com> 0.59-1
d4b2f2
- mostly documentation updates
d4b2f2
d4b2f2
* Fri Jun 29 2012 Nalin Dahyabhai <nalin@redhat.com> 0.58-1
d4b2f2
- add a "dogtag-ipa-renew-agent" CA so that we can renew certificates using
d4b2f2
  an IPA server's internal Dogtag instance
d4b2f2
- export the requested profile and old certificate to enrollment helpers
d4b2f2
- make libxml and libcurl into hard build-time requirements
d4b2f2
- serialize all pre/save/post sequences to make sure that stop/save/start
d4b2f2
  doesn't become stop1/save1/stop2/start1/save2/start2 when we're stopping
d4b2f2
  a service while we muck with more than one of its certificates
d4b2f2
d4b2f2
* Fri Jun 15 2012 Nalin Dahyabhai <nalin@redhat.com>
d4b2f2
- add a command option (-T) to getcert for specifying which enrollment
d4b2f2
  profile to tell a CA that we're using, in case it cares (#10)
d4b2f2
d4b2f2
* Thu Jun 14 2012 Nalin Dahyabhai <nalin@redhat.com> 0.57-1
d4b2f2
- clarify that the command passed to getcert -C is a "post"-save command
d4b2f2
- add a "pre"-save command option to getcert, specified with the -B flag (#9)
d4b2f2
- after we notify of an impending not-valid-after approaching, don't do it
d4b2f2
  again immediately
d4b2f2
d4b2f2
* Sat Mar  3 2012 Nalin Dahyabhai <nalin@redhat.com> 0.56-1
d4b2f2
- when a caller sets the is-default flag on a CA, and another CA is no longer
d4b2f2
  the default, emit the PropertiesChanged signal on the CA which is not the
d4b2f2
  default, instead on the new default a second time
d4b2f2
- drop some dead code from the D-Bus message handlers (static analysis,
d4b2f2
  #796813)
d4b2f2
- cache public keys when we read private keys
d4b2f2
- go back to printing an error indicating that we're missing a required
d4b2f2
  argument when we're missing a required argument, not that the option is
d4b2f2
  invalid (broken since 0.51, #796542)
d4b2f2
d4b2f2
* Wed Feb 15 2012 Nalin Dahyabhai <nalin@redhat.com> 0.55-1
d4b2f2
- allow root to use our implementation of org.freedesktop.DBus.Properties
d4b2f2
- take more care to not emit useless PropertiesChanged signals
d4b2f2
d4b2f2
* Wed Feb 15 2012 Nalin Dahyabhai <nalin@redhat.com> 0.54-1
d4b2f2
- fix setting the group ID when spawning the post-save command
d4b2f2
d4b2f2
* Tue Feb 14 2012 Nalin Dahyabhai <nalin@redhat.com> 0.53-1
d4b2f2
- large changes to the D-Bus glue, exposing a lot of data which we were
d4b2f2
  providing via D-Bus getter methods as properties, and providing more
d4b2f2
  accurate introspection data
d4b2f2
- emit a signal when the daemon saves a certificate to the destination
d4b2f2
  location, and provide an option to have the daemon spawn an arbitrary
d4b2f2
  command at that point, too (#766167)
d4b2f2
- enable starting the service by default on RHEL (#765600)
d4b2f2
d4b2f2
* Thu Jan 12 2012 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.52-2
d4b2f2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_17_Mass_Rebuild
d4b2f2
d4b2f2
* Fri Dec 16 2011 Nalin Dahyabhai <nalin@redhat.com> 0.52-1
d4b2f2
- note that SELinux usually confines us to writing only to cert_t in
d4b2f2
  doc/getting-started.txt (#765599)
d4b2f2
- fix crashes when we add a request during our first run when we're
d4b2f2
  populating the hard-coded CA list
d4b2f2
- properly deal with cases where a path is passed to us is "./XXX"
d4b2f2
- in session mode, create our data directories as we go
d4b2f2
d4b2f2
* Tue Dec  6 2011 Nalin Dahyabhai <nalin@redhat.com> 0.51-1
d4b2f2
- api: lift restrictions on characters used in request and CA nicknames by
d4b2f2
  making their object names not incorporate their nicknames
d4b2f2
- api: add find_request_by_nickname and find_ca_by_nickname
d4b2f2
- certmonger-ipa-submit.8: list -k, -K, -t in the summary, document -K
d4b2f2
- getcert: print "invalid option" error messages ourselves (#756291)
d4b2f2
- ipa-submit: supply a Referer: header when submitting requests to IPA
d4b2f2
  (#750617, needed for #747710)
d4b2f2
d4b2f2
* Fri Oct 14 2011 Nalin Dahyabhai <nalin@redhat.com> 0.50-1
d4b2f2
- really fix these this time:
d4b2f2
 - getcert: error out when "list -c" finds no matching CA (#743488)
d4b2f2
 - getcert: error out when "list -i" finds no matching request (#743485)
d4b2f2
d4b2f2
* Wed Oct 12 2011 Nalin Dahyabhai <nalin@redhat.com> 0.49-1
d4b2f2
- when using an NSS database, skip loading the module database (#743042)
d4b2f2
- when using an NSS database, skip loading root certs
d4b2f2
- generate SPKAC values when generating CSRs, though we don't do anything
d4b2f2
  with SPKAC values yet
d4b2f2
- internally maintain and use challenge passwords, if we have them
d4b2f2
- behave better when certificates have shorter lifetimes
d4b2f2
- add/recognize/handle notification type "none"
d4b2f2
- getcert: error out when "list -c" finds no matching CA (#743488)
d4b2f2
- getcert: error out when "list -i" finds no matching request (#743485)
d4b2f2
d4b2f2
* Thu Sep 29 2011 Nalin Dahyabhai <nalin@redhat.com> 0.48-1
d4b2f2
- don't incorrectly assume that CERT_ImportCerts() returns a NULL-terminated
d4b2f2
  array (#742348)
d4b2f2
d4b2f2
* Tue Sep 27 2011 Nalin Dahyabhai <nalin@redhat.com> 0.47-1
d4b2f2
- getcert: distinguish between {stat() succeeds but isn't a directory} and
d4b2f2
  {stat() failed} when printing an error message (#739903)
d4b2f2
- getcert resubmit/start-tracking: when we're looking for an existing request
d4b2f2
  by ID, and we don't find one, note that specifically (#741262)
d4b2f2
d4b2f2
* Mon Aug 29 2011 Stephen Gallagher <sgallagh@redhat.com> - 0.46-1.1
d4b2f2
- Rebuild against fixed libtevent version
d4b2f2
d4b2f2
* Mon Aug 15 2011 Nalin Dahyabhai <nalin@redhat.com> 0.46-1
d4b2f2
- treat the ability to access keys in an NSS database without using a PIN,
d4b2f2
  when we've been told we need one, as an error (#692766, really this time)
d4b2f2
d4b2f2
* Thu Aug 11 2011 Nalin Dahyabhai <nalin@redhat.com> 0.45-1
d4b2f2
- modify the systemd .service file to be a proper 'dbus' service (more
d4b2f2
  of #718172)
d4b2f2
d4b2f2
* Thu Aug 11 2011 Nalin Dahyabhai <nalin@redhat.com> 0.44-1
d4b2f2
- check specifically for cases where a specified token that we need to
d4b2f2
  use just isn't present for whatever reason (#697058)
d4b2f2
d4b2f2
* Wed Aug 10 2011 Nalin Dahyabhai <nalin@redhat.com> 0.43-1
d4b2f2
- add a -K option to ipa-submit, to use the current ccache, which makes
d4b2f2
  it easier to test
d4b2f2
d4b2f2
* Fri Aug  5 2011 Nalin Dahyabhai <nalin@redhat.com>
d4b2f2
- if xmlrpc-c's struct xmlrpc_curl_xportparms has a gss_delegate field, set
d4b2f2
  it to TRUE when we're doing Negotiate auth (#727864, #727863, #727866)
d4b2f2
d4b2f2
* Wed Jul 13 2011 Nalin Dahyabhai <nalin@redhat.com>
d4b2f2
- treat the ability to access keys in an NSS database without using a PIN,
d4b2f2
  when we've been told we need one, as an error (#692766)
d4b2f2
- when handling "getcert resubmit" requests, if we don't have a key yet,
d4b2f2
  make sure we go all the way back to generating one (#694184)
d4b2f2
- getcert: try to clean up tests for NSS and PEM file locations (#699059)
d4b2f2
- don't try to set reconnect-on-exit policy unless we managed to connect
d4b2f2
  to the bus (#712500)
d4b2f2
- handle cases where we specify a token but the storage token isn't
d4b2f2
  known (#699552)
d4b2f2
- getcert: recognize -i and storage options to narrow down which requests
d4b2f2
  the user wants to know about (#698772)
d4b2f2
- output hints when the daemon has startup problems, too (#712075)
d4b2f2
- add flags to specify whether we're bus-activated or not, so that we can
d4b2f2
  exit if we have nothing to do after handling a request received over
d4b2f2
  the bus if some specified amount of time has passed
d4b2f2
- explicitly disallow non-root access in the D-Bus configuration (#712072)
d4b2f2
- migrate to systemd on releases newer than Fedora 15 or RHEL 6 (#718172)
d4b2f2
- fix a couple of incorrect calls to talloc_asprintf() (#721392)
d4b2f2
d4b2f2
* Wed Apr 13 2011 Nalin Dahyabhai <nalin@redhat.com> 0.42-1
d4b2f2
- getcert: fix a buffer overrun preparing a request for the daemon when
d4b2f2
  there are more parameters to encode than space in the array (#696185)
d4b2f2
- updated translations: de, es, id, pl, ru, uk
d4b2f2
d4b2f2
* Mon Apr 11 2011 Nalin Dahyabhai <nalin@redhat.com> 0.41-1
d4b2f2
- read information about the keys we've just generated before proceeding
d4b2f2
  to generating a CSR (part of #694184, part of #695675)
d4b2f2
- when processing a "resubmit" request from getcert, go back to key
d4b2f2
  generation if we don't have keys yet, else go back to CSR generation as
d4b2f2
  before (#694184, #695675)
d4b2f2
- configure with --with-tmpdir=/var/run/certmonger and own /var/run/certmonger
d4b2f2
  (#687899), and add a systemd tmpfiles.d control file for creating
d4b2f2
  /var/run/certmonger on Fedora 15 and later
d4b2f2
- let session instances exit when they get disconnected from the bus
d4b2f2
- use a lock file to make sure there's only one session instance messing
d4b2f2
  around with the user's files at a time
d4b2f2
- fix errors saving certificates to NSS databases when there's already a
d4b2f2
  certificate there with the same nickname (#695672)
d4b2f2
- make key and certificate location output from 'getcert list' more properly
d4b2f2
  translatable (#7)
d4b2f2
d4b2f2
* Mon Mar 28 2011 Nalin Dahyabhai <nalin@redhat.com> 0.40-1
d4b2f2
- update to 0.40
d4b2f2
  - fix validation check on EKU OIDs in getcert (#691351)
d4b2f2
  - get session bus mode sorted
d4b2f2
  - add a list of recognized EKU values to the getcert-request man page
d4b2f2
d4b2f2
* Fri Mar 25 2011 Nalin Dahyabhai <nalin@redhat.com> 0.39-1
d4b2f2
- update to 0.39
d4b2f2
  - fix use of an uninitialized variable in the xmlrpc-based submission
d4b2f2
    helpers (#690886)
d4b2f2
d4b2f2
* Thu Mar 24 2011 Nalin Dahyabhai <nalin@redhat.com> 0.38-1
d4b2f2
- update to 0.38
d4b2f2
  - catch cases where we can't read a PIN file, but we never have to log
d4b2f2
    in to the token to access the private key (more of #688229)
d4b2f2
d4b2f2
* Tue Mar 22 2011 Nalin Dahyabhai <nalin@redhat.com> 0.37-1
d4b2f2
- update to 0.37
d4b2f2
  - be more careful about checking if we can read a PIN file successfully
d4b2f2
    before we even call an API that might need us to try (#688229)
d4b2f2
  - fix strict aliasing warnings
d4b2f2
d4b2f2
* Tue Mar 22 2011 Nalin Dahyabhai <nalin@redhat.com> 0.36-1
d4b2f2
- update to 0.36
d4b2f2
  - fix some use-after-free bugs in the daemon (#689776)
d4b2f2
  - fix a copy/paste error in certmonger-ipa-submit(8)
d4b2f2
  - getcert now suppresses error details when not given its new -v option
d4b2f2
    (#683926, more of #681641/#652047)
d4b2f2
  - updated translations
d4b2f2
    - de, es, pl, ru, uk
d4b2f2
    - indonesian translation is now for "id" rather than "in"
d4b2f2
d4b2f2
* Wed Mar  2 2011 Nalin Dahyabhai <nalin@redhat.com> 0.35.1-1
d4b2f2
- fix a self-test that broke because one-year-from-now is now a day's worth
d4b2f2
  of seconds further out than it was a few days ago
d4b2f2
d4b2f2
* Mon Feb 14 2011 Nalin Dahyabhai <nalin@redhat.com> 0.35-1
d4b2f2
- update to 0.35
d4b2f2
  - self-test fixes to rebuild properly in mock (#670322)
d4b2f2
d4b2f2
* Tue Feb 08 2011 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.34-2
d4b2f2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild
d4b2f2
d4b2f2
* Fri Jan 14 2011 Nalin Dahyabhai <nalin@redhat.com> 0.34-1
d4b2f2
- update to 0.34
d4b2f2
  - explicitly note the number of requests we're tracking in the output of
d4b2f2
    "getcert list" (#652049)
d4b2f2
  - try to offer some suggestions when we get certain specific errors back
d4b2f2
    in "getcert" (#652047)
d4b2f2
  - updated translations
d4b2f2
    - es
d4b2f2
d4b2f2
* Thu Dec 23 2010 Nalin Dahyabhai <nalin@redhat.com> 0.33-1
d4b2f2
- update to 0.33
d4b2f2
  - new translations
d4b2f2
    - id by Okta Purnama Rahadian!
d4b2f2
  - updated translations
d4b2f2
    - pl, uk
d4b2f2
  - roll up assorted fixes for defects
d4b2f2
d4b2f2
* Fri Nov 12 2010 Nalin Dahyabhai <nalin@redhat.com> 0.32-2
d4b2f2
- depend on the e2fsprogs libuuid on Fedora and RHEL releases where it's
d4b2f2
  not part of util-linux-ng
d4b2f2
d4b2f2
* Wed Oct 13 2010 Nalin Dahyabhai <nalin@redhat.com> 0.32-1
d4b2f2
- oops, rfc5280 says we shouldn't be populating unique identifiers, so
d4b2f2
  make it a configuration option and default the behavior to off
d4b2f2
d4b2f2
* Tue Oct 12 2010 Nalin Dahyabhai <nalin@redhat.com> 0.31-1
d4b2f2
- start populating the optional unique identifier fields in self-signed
d4b2f2
  certificates
d4b2f2
d4b2f2
* Thu Sep 30 2010 Nalin Dahyabhai <nalin@redhat.com> 0.30-4
d4b2f2
- explicitly require "dbus" to try to ensure we have a running system bus
d4b2f2
  when we get started (#639126)
d4b2f2
d4b2f2
* Wed Sep 29 2010 jkeating - 0.30-3
d4b2f2
- Rebuilt for gcc bug 634757
d4b2f2
d4b2f2
* Thu Sep 23 2010 Nalin Dahyabhai <nalin@redhat.com> 0.30-2
d4b2f2
- try to SIGHUP the messagebus daemon at first install so that it'll
d4b2f2
  let us claim our service name if it isn't restarted before we are
d4b2f2
  first started (#636876)
d4b2f2
d4b2f2
* Wed Aug 25 2010 Nalin Dahyabhai <nalin@redhat.com> 0.30-1
d4b2f2
- update to 0.30
d4b2f2
  - fix errors computing the time at the end of an interval that were
d4b2f2
    caught by self-tests
d4b2f2
d4b2f2
* Mon Aug 23 2010 Nalin Dahyabhai <nalin@redhat.com> 0.29-1
d4b2f2
- update to 0.29
d4b2f2
  - fix 64-bit cleanliness issue using libdbus
d4b2f2
  - actually include the full set of tests in tarballs
d4b2f2
d4b2f2
* Tue Aug 17 2010 Nalin Dahyabhai <nalin@redhat.com> 0.28-1
d4b2f2
- update to 0.28
d4b2f2
  - fix self-signing certificate notBefore and notAfter values on 32-bit
d4b2f2
    machines
d4b2f2
d4b2f2
* Tue Aug 17 2010 Nalin Dahyabhai <nalin@redhat.com> 0.27-1
d4b2f2
- update to 0.27
d4b2f2
  - portability and test fixes
d4b2f2
d4b2f2
* Fri Aug 13 2010 Nalin Dahyabhai <nalin@redhat.com> 0.26-1
d4b2f2
- update to 0.26
d4b2f2
  - when canceling a submission request that's being handled by a helper,
d4b2f2
    reap the child process's status after killing it (#624120)
d4b2f2
d4b2f2
* Fri Aug 13 2010 Nalin Dahyabhai <nalin@redhat.com> 0.25-1
d4b2f2
- update to 0.25
d4b2f2
  - new translations
d4b2f2
    - in by Okta Purnama Rahadian!
d4b2f2
  - fix detection of cases where we can't access a private key in an NSS
d4b2f2
    database because we don't have the PIN
d4b2f2
  - teach '*getcert start-tracking' about the -p and -P options which the
d4b2f2
    '*getcert request' commands already understand (#621670), and also
d4b2f2
    the -U, -K, -E, and -D flags
d4b2f2
  - double-check that the nicknames of keys we get back from
d4b2f2
    PK11_ListPrivKeysInSlot() match the desired nickname before accepting
d4b2f2
    them as matches, so that our tests won't all blow up on EL5
d4b2f2
  - fix dynamic addition and removal of CAs implemented through helpers
d4b2f2
d4b2f2
* Mon Jun 28 2010 Nalin Dahyabhai <nalin@redhat.com> 0.24-4
d4b2f2
- init script: ensure that the subsys lock is created whenever we're called to
d4b2f2
  "start" when we're already running (even more of #596719)
d4b2f2
d4b2f2
* Tue Jun 15 2010 Nalin Dahyabhai <nalin@redhat.com> 0.24-3
d4b2f2
- more gracefully handle manual daemon startups and cleaning up of unexpected
d4b2f2
  crashes (still more of #596719)
d4b2f2
d4b2f2
* Thu Jun 10 2010 Nalin Dahyabhai <nalin@redhat.com> 0.24-2
d4b2f2
- don't create the daemon pidfile until after we've connected to the D-Bus
d4b2f2
  (still more of #596719)
d4b2f2
d4b2f2
* Tue Jun  8 2010 Nalin Dahyabhai <nalin@redhat.com> 0.24-1
d4b2f2
- update to 0.24
d4b2f2
  - keep the lock on the pid file, if we have one, when we fork, and cancel
d4b2f2
    daemon startup if we can't gain ownership of the lock (the rest of #596719)
d4b2f2
  - make the man pages note which external configuration files we consult when
d4b2f2
    submitting requests to certmaster and ipa CAs
d4b2f2
d4b2f2
* Thu May 27 2010 Nalin Dahyabhai <nalin@redhat.com> 0.23-1
d4b2f2
- update to 0.23
d4b2f2
  - new translations
d4b2f2
    - pl by Piotr DrÄ…g!
d4b2f2
  - cancel daemon startup if we can't gain ownership of our well-known
d4b2f2
    service name on the DBus (#596719)
d4b2f2
d4b2f2
* Fri May 14 2010 Nalin Dahyabhai <nalin@redhat.com> 0.22-1
d4b2f2
- update to 0.22
d4b2f2
  - new translations
d4b2f2
    - de by Fabian Affolter!
d4b2f2
  - certmaster-submit: don't fall over when we can't find a certmaster.conf
d4b2f2
    or a minion.conf (i.e., certmaster isn't installed) (#588932)
d4b2f2
  - when reading extension values from certificates, prune out duplicate
d4b2f2
    principal names, email addresses, and hostnames
d4b2f2
d4b2f2
* Tue May  4 2010 Nalin Dahyabhai <nalin@redhat.com> 0.21-1
d4b2f2
- update to 0.21
d4b2f2
  - getcert/*-getcert: relay the desired CA to the local service, whether
d4b2f2
    specified on the command line (in getcert) or as a built-in hard-wired
d4b2f2
    default (in *-getcert) (#584983)
d4b2f2
  - flesh out the default certmonger.conf so that people can get a feel for
d4b2f2
    the expected formatting (Jenny Galipeau)
d4b2f2
d4b2f2
* Wed Apr 21 2010 Nalin Dahyabhai <nalin@redhat.com> 0.20-1
d4b2f2
- update to 0.20
d4b2f2
  - correctly parse certificate validity periods given in years (spotted by
d4b2f2
    Stephen Gallagher)
d4b2f2
  - setup for translation
d4b2f2
    - es by Héctor Daniel Cabrera!
d4b2f2
    - ru by Yulia Poyarkova!
d4b2f2
    - uk by Yuri Chornoivan!
d4b2f2
  - fix unpreprocessed defaults in certmonger.conf's man page
d4b2f2
  - tweak the IPA-specific message that indicates a principal name also needs
d4b2f2
    to be specified if we're not using the default subject name (#579542)
d4b2f2
  - make the validity period of self-signed certificates into a configuration
d4b2f2
    setting and not a piece of the state information we track about the signer
d4b2f2
  - init script: exit with status 2 instead of 1 when invoked with an
d4b2f2
    unrecognized argument (#584517)
d4b2f2
d4b2f2
* Tue Mar 23 2010 Nalin Dahyabhai <nalin@redhat.com> 0.19-1
d4b2f2
- update to 0.19
d4b2f2
  - correctly initialize NSS databases that need to be using a PIN
d4b2f2
  - add certmonger.conf, for customizing notification timings and settings,
d4b2f2
    and use of digests other than the previously-hard-coded SHA256, and
d4b2f2
    drop those settings from individual requests
d4b2f2
  - up the default self-sign validity interval from 30 days to 365 days
d4b2f2
  - drop the first default notification interval from 30 days to 28 days
d4b2f2
    (these two combined to create a fun always-reissuing loop earlier)
d4b2f2
  - record the token which contains the key or certificate when we're
d4b2f2
    storing them in an NSS database, and report it
d4b2f2
  - improve handling of cases where we're supposed to use a PIN but we
d4b2f2
    either don't have one or we have the wrong one
d4b2f2
  - teach getcert to accept a PIN file's name or a PIN value when adding
d4b2f2
    a new entry
d4b2f2
  - update the IPA submission helper to use the new 'request_cert' signature
d4b2f2
    that's landing soon
d4b2f2
  - more tests
d4b2f2
d4b2f2
* Fri Feb 12 2010 Nalin Dahyabhai <nalin@redhat.com> 0.18-1
d4b2f2
- update to 0.18
d4b2f2
  - add support for using encrypted storage for keys, using PIN values
d4b2f2
    supplied directly or read from files whose names are supplied
d4b2f2
  - don't choke on NSS database locations that use the "sql:" or "dbm:"
d4b2f2
    prefix
d4b2f2
d4b2f2
* Mon Jan 25 2010 Nalin Dahyabhai <nalin@redhat.com> 0.17-2
d4b2f2
- make the D-Bus configuration file (noreplace) (#541072)
d4b2f2
- make the %%check section and the deps we have just for it conditional on
d4b2f2
  the same macro (#541072)
d4b2f2
d4b2f2
* Wed Jan  6 2010 Nalin Dahyabhai <nalin@redhat.com> 0.17-1
d4b2f2
- update to 0.17
d4b2f2
  - fix a hang in the daemon (Rob Crittenden)
d4b2f2
  - documentation updates
d4b2f2
  - fix parsing of submission results from IPA (Rob Crittenden)
d4b2f2
d4b2f2
* Fri Dec 11 2009 Nalin Dahyabhai <nalin@redhat.com> 0.16-1
d4b2f2
- update to 0.16
d4b2f2
  - set a umask at startup (Dan Walsh)
d4b2f2
d4b2f2
* Tue Dec  8 2009 Nalin Dahyabhai <nalin@redhat.com> 0.15-1
d4b2f2
- update to 0.15
d4b2f2
  - notice that a directory with a trailing '/' is the same location as the
d4b2f2
    directory without it
d4b2f2
  - fix handling of the pid file when we write one (by actually giving it
d4b2f2
    contents)
d4b2f2
d4b2f2
* Wed Nov 25 2009 Nalin Dahyabhai <nalin@redhat.com> 0.14-1
d4b2f2
- update to 0.14
d4b2f2
  - check key and certificate location at add-time to make sure they're
d4b2f2
    absolute paths to files or directories, as appropriate
d4b2f2
  - IPA: dig into the 'result' item if the named result value we're looking
d4b2f2
    for isn't in the result struct
d4b2f2
d4b2f2
* Tue Nov 24 2009 Nalin Dahyabhai <nalin@redhat.com> 0.13-1
d4b2f2
- update to 0.13
d4b2f2
  - change the default so that we default to trying to auto-refresh
d4b2f2
    certificates unless told otherwise
d4b2f2
  - preemptively enforce limitations on request nicknames so that they
d4b2f2
    make valid D-Bus object path components
d4b2f2
d4b2f2
* Tue Nov 24 2009 Nalin Dahyabhai <nalin@redhat.com> 0.12-1
d4b2f2
- update to 0.12
d4b2f2
  - add a crucial bit of error reporting when CAs reject our requests
d4b2f2
  - count the number of configured CAs correctly
d4b2f2
d4b2f2
* Mon Nov 23 2009 Nalin Dahyabhai <nalin@redhat.com> 0.11-1
d4b2f2
- update to 0.11
d4b2f2
  - add XML-RPC submission for certmaster and IPA
d4b2f2
  - prune entries with duplicate names from the data store
d4b2f2
d4b2f2
* Fri Nov 13 2009 Nalin Dahyabhai <nalin@redhat.com> 0.10-1
d4b2f2
- update to 0.10
d4b2f2
  - add some compiler warnings and then fix them
d4b2f2
d4b2f2
* Fri Nov 13 2009 Nalin Dahyabhai <nalin@redhat.com> 0.9-1
d4b2f2
- update to 0.9
d4b2f2
  - run external submission helpers correctly
d4b2f2
  - fix signing of signing requests generated for keys stored in files
d4b2f2
  - only care about new interface and route notifications from netlink,
d4b2f2
    and ignore notifications that don't come from pid 0
d4b2f2
  - fix logic for determining expiration status
d4b2f2
  - correct the version number in self-signed certificates
d4b2f2
d4b2f2
* Tue Nov 10 2009 Nalin Dahyabhai <nalin@redhat.com> 0.8-1
d4b2f2
- update to 0.8
d4b2f2
  - encode windows UPN values in requests correctly
d4b2f2
  - watch for netlink routing changes and restart stalled submission requests
d4b2f2
  - 'getcert resubmit' can force a regeneration of the CSR and submission
d4b2f2
d4b2f2
* Fri Nov  6 2009 Nalin Dahyabhai <nalin@redhat.com> 0.7-1
d4b2f2
- update to 0.7
d4b2f2
  - first cut at a getting-started document
d4b2f2
  - refactor some internal key handling with NSS
d4b2f2
  - check for duplicate request nicknames at add-time
d4b2f2
d4b2f2
* Tue Nov  3 2009 Nalin Dahyabhai <nalin@redhat.com> 0.6-1
d4b2f2
- update to 0.6
d4b2f2
  - man pages
d4b2f2
  - 'getcert stop-tracking' actually makes the server forget now
d4b2f2
  - 'getcert request -e' was redundant, dropped the -e option
d4b2f2
  - 'getcert request -i' now sets the request nickname
d4b2f2
  - 'getcert start-tracking -i' now sets the request nickname
d4b2f2
d4b2f2
* Mon Nov  2 2009 Nalin Dahyabhai <nalin@redhat.com> 0.5-1
d4b2f2
- update to 0.5
d4b2f2
  - packaging fixes
d4b2f2
  - add a selfsign-getcert client
d4b2f2
  - self-signed certs now get basic constraints and their own serial numbers
d4b2f2
  - accept id-ms-kp-sc-logon as a named EKU value in a request
d4b2f2
d4b2f2
* Thu Oct 29 2009 Nalin Dahyabhai <nalin@redhat.com> 0.4-1
d4b2f2
- update to 0.4
d4b2f2
d4b2f2
* Thu Oct 22 2009 Nalin Dahyabhai <nalin@redhat.com> 0.1-1
d4b2f2
- update to 0.1
d4b2f2
d4b2f2
* Sun Oct 18 2009 Nalin Dahyabhai <nalin@redhat.com> 0.0-1
d4b2f2
- initial package