Blame SPECS/ca-certificates.spec

206e80
%define pkidir %{_sysconfdir}/pki
206e80
%define catrustdir %{_sysconfdir}/pki/ca-trust
206e80
%define classic_tls_bundle ca-bundle.crt
206e80
%define openssl_format_trust_bundle ca-bundle.trust.crt
206e80
%define p11_format_bundle ca-bundle.trust.p11-kit
206e80
%define legacy_default_bundle ca-bundle.legacy.default.crt
206e80
%define legacy_disable_bundle ca-bundle.legacy.disable.crt
206e80
%define java_bundle java/cacerts
206e80
206e80
Summary: The Mozilla CA root certificate bundle
206e80
Name: ca-certificates
206e80
206e80
# For the package version number, we use: year.{upstream version}
206e80
#
206e80
# The {upstream version} can be found as symbol
206e80
# NSS_BUILTINS_LIBRARY_VERSION in file nss/lib/ckfw/builtins/nssckbi.h
206e80
# which corresponds to the data in file nss/lib/ckfw/builtins/certdata.txt.
206e80
#
206e80
# The files should be taken from a released version of NSS, as published
206e80
# at https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/
206e80
#
206e80
# The versions that are used by the latest released version of 
206e80
# Mozilla Firefox should be available from:
206e80
# https://hg.mozilla.org/releases/mozilla-release/raw-file/default/security/nss/lib/ckfw/builtins/nssckbi.h
206e80
# https://hg.mozilla.org/releases/mozilla-release/raw-file/default/security/nss/lib/ckfw/builtins/certdata.txt
206e80
#
206e80
# The most recent development versions of the files can be found at
206e80
# http://hg.mozilla.org/projects/nss/raw-file/default/lib/ckfw/builtins/nssckbi.h
206e80
# http://hg.mozilla.org/projects/nss/raw-file/default/lib/ckfw/builtins/certdata.txt
206e80
# (but these files might have not yet been released).
206e80
#
206e80
# (until 2012.87 the version was based on the cvs revision ID of certdata.txt,
206e80
# but in 2013 the NSS projected was migrated to HG. Old version 2012.87 is 
206e80
# equivalent to new version 2012.1.93, which would break the requirement 
206e80
# to have increasing version numbers. However, the new scheme will work, 
206e80
# because all future versions will start with 2013 or larger.)
206e80
206e80
Version: 2019.2.32
206e80
# On RHEL 7.x, please keep the release version >= 70
206e80
# When rebasing on Y-Stream (7.y), use 71, 72, 73, ...
206e80
# When rebasing on Z-Stream (7.y.z), use 70.0, 70.1, 70.2, ...
206e80
Release: 76%{?dist}
206e80
License: Public Domain
206e80
206e80
Group: System Environment/Base
206e80
URL: http://www.mozilla.org/
206e80
206e80
#Please always update both certdata.txt and nssckbi.h
206e80
Source0: certdata.txt
206e80
Source1: nssckbi.h
206e80
Source2: update-ca-trust
206e80
Source3: trust-fixes
206e80
Source4: certdata2pem.py
206e80
Source5: ca-legacy.conf
206e80
Source6: ca-legacy
206e80
Source9: ca-legacy.8.txt
206e80
Source10: update-ca-trust.8.txt
206e80
Source11: README.usr
206e80
Source12: README.etc
206e80
Source13: README.extr
206e80
Source14: README.java
206e80
Source15: README.openssl
206e80
Source16: README.pem
206e80
Source17: README.src
206e80
Source18: README.ca-certificates
206e80
206e80
BuildArch: noarch
206e80
206e80
Requires: p11-kit >= 0.23.5
206e80
Requires: p11-kit-trust >= 0.23.5
206e80
BuildRequires: perl
206e80
BuildRequires: python
206e80
BuildRequires: openssl
206e80
BuildRequires: asciidoc
206e80
BuildRequires: libxslt
206e80
206e80
%description
206e80
This package contains the set of CA certificates chosen by the
206e80
Mozilla Foundation for use with the Internet PKI.
206e80
206e80
%prep
206e80
rm -rf %{name}
206e80
mkdir %{name}
206e80
mkdir %{name}/certs
206e80
mkdir %{name}/certs/legacy-default
206e80
mkdir %{name}/certs/legacy-disable
206e80
mkdir %{name}/java
206e80
206e80
%build
206e80
pushd %{name}/certs
206e80
 pwd
206e80
 cp %{SOURCE0} .
206e80
 python %{SOURCE4} >c2p.log 2>c2p.err
206e80
popd
206e80
pushd %{name}
206e80
 (
206e80
   cat <
206e80
# This is a bundle of X.509 certificates of public Certificate
206e80
# Authorities.  It was generated from the Mozilla root CA list.
206e80
# These certificates and trust/distrust attributes use the file format accepted
206e80
# by the p11-kit-trust module.
206e80
#
206e80
# Source: nss/lib/ckfw/builtins/certdata.txt
206e80
# Source: nss/lib/ckfw/builtins/nssckbi.h
206e80
#
206e80
# Generated from:
206e80
EOF
206e80
   cat %{SOURCE1}  |grep -w NSS_BUILTINS_LIBRARY_VERSION | awk '{print "# " $2 " " $3}';
206e80
   echo '#';
206e80
 ) > %{p11_format_bundle}
206e80
206e80
 touch %{legacy_default_bundle}
206e80
 NUM_LEGACY_DEFAULT=`find certs/legacy-default -type f | wc -l`
206e80
 if [ $NUM_LEGACY_DEFAULT -ne 0 ]; then
206e80
     for f in certs/legacy-default/*.crt; do 
206e80
       echo "processing $f"
206e80
       tbits=`sed -n '/^# openssl-trust/{s/^.*=//;p;}' $f`
206e80
       alias=`sed -n '/^# alias=/{s/^.*=//;p;q;}' $f | sed "s/'//g" | sed 's/"//g'`
206e80
       targs=""
206e80
       if [ -n "$tbits" ]; then
206e80
          for t in $tbits; do
206e80
             targs="${targs} -addtrust $t"
206e80
          done
206e80
       fi
206e80
       if [ -n "$targs" ]; then
206e80
          echo "legacy default flags $targs for $f" >> info.trust
206e80
          openssl x509 -text -in "$f" -trustout $targs -setalias "$alias" >> %{legacy_default_bundle}
206e80
       fi
206e80
     done
206e80
 fi
206e80
206e80
 touch %{legacy_disable_bundle}
206e80
 NUM_LEGACY_DISABLE=`find certs/legacy-disable -type f | wc -l`
206e80
 if [ $NUM_LEGACY_DISABLE -ne 0 ]; then
206e80
     for f in certs/legacy-disable/*.crt; do 
206e80
       echo "processing $f"
206e80
       tbits=`sed -n '/^# openssl-trust/{s/^.*=//;p;}' $f`
206e80
       alias=`sed -n '/^# alias=/{s/^.*=//;p;q;}' $f | sed "s/'//g" | sed 's/"//g'`
206e80
       targs=""
206e80
       if [ -n "$tbits" ]; then
206e80
          for t in $tbits; do
206e80
             targs="${targs} -addtrust $t"
206e80
          done
206e80
       fi
206e80
       if [ -n "$targs" ]; then
206e80
          echo "legacy disable flags $targs for $f" >> info.trust
206e80
          openssl x509 -text -in "$f" -trustout $targs -setalias "$alias" >> %{legacy_disable_bundle}
206e80
       fi
206e80
     done
206e80
 fi
206e80
206e80
 P11FILES=`find certs -name \*.tmp-p11-kit | wc -l`
206e80
 if [ $P11FILES -ne 0 ]; then
206e80
   for p in certs/*.tmp-p11-kit; do 
206e80
     cat "$p" >> %{p11_format_bundle}
206e80
   done
206e80
 fi
206e80
 # Append our trust fixes
206e80
 cat %{SOURCE3} >> %{p11_format_bundle}
206e80
popd
206e80
206e80
#manpage
206e80
cp %{SOURCE10} %{name}/update-ca-trust.8.txt
206e80
asciidoc.py -v -d manpage -b docbook %{name}/update-ca-trust.8.txt
206e80
xsltproc --nonet -o %{name}/update-ca-trust.8 /usr/share/asciidoc/docbook-xsl/manpage.xsl %{name}/update-ca-trust.8.xml
206e80
206e80
cp %{SOURCE9} %{name}/ca-legacy.8.txt
206e80
asciidoc.py -v -d manpage -b docbook %{name}/ca-legacy.8.txt
206e80
xsltproc --nonet -o %{name}/ca-legacy.8 /usr/share/asciidoc/docbook-xsl/manpage.xsl %{name}/ca-legacy.8.xml
206e80
206e80
206e80
%install
206e80
rm -rf $RPM_BUILD_ROOT
206e80
mkdir -p -m 755 $RPM_BUILD_ROOT%{pkidir}/tls/certs
206e80
mkdir -p -m 755 $RPM_BUILD_ROOT%{pkidir}/java
206e80
mkdir -p -m 755 $RPM_BUILD_ROOT%{_sysconfdir}/ssl
206e80
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/source
206e80
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/source/anchors
206e80
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/source/blacklist
206e80
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/extracted
206e80
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/extracted/pem
206e80
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/extracted/openssl
206e80
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/extracted/java
206e80
mkdir -p -m 755 $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-source
206e80
mkdir -p -m 755 $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-source/anchors
206e80
mkdir -p -m 755 $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-source/blacklist
206e80
mkdir -p -m 755 $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-legacy
206e80
mkdir -p -m 755 $RPM_BUILD_ROOT%{_bindir}
206e80
mkdir -p -m 755 $RPM_BUILD_ROOT%{_mandir}/man8
206e80
206e80
install -p -m 644 %{name}/update-ca-trust.8 $RPM_BUILD_ROOT%{_mandir}/man8
206e80
install -p -m 644 %{name}/ca-legacy.8 $RPM_BUILD_ROOT%{_mandir}/man8
206e80
install -p -m 644 %{SOURCE11} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-source/README
206e80
install -p -m 644 %{SOURCE12} $RPM_BUILD_ROOT%{catrustdir}/README
206e80
install -p -m 644 %{SOURCE13} $RPM_BUILD_ROOT%{catrustdir}/extracted/README
206e80
install -p -m 644 %{SOURCE14} $RPM_BUILD_ROOT%{catrustdir}/extracted/java/README
206e80
install -p -m 644 %{SOURCE15} $RPM_BUILD_ROOT%{catrustdir}/extracted/openssl/README
206e80
install -p -m 644 %{SOURCE16} $RPM_BUILD_ROOT%{catrustdir}/extracted/pem/README
206e80
install -p -m 644 %{SOURCE17} $RPM_BUILD_ROOT%{catrustdir}/source/README
206e80
206e80
mkdir -p -m 755 $RPM_BUILD_ROOT%{_datadir}/doc/%{name}-%{version}
206e80
install -p -m 644 %{SOURCE18} $RPM_BUILD_ROOT%{_datadir}/doc/%{name}-%{version}/README
206e80
206e80
install -p -m 644 %{name}/%{p11_format_bundle} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-source/%{p11_format_bundle}
206e80
206e80
install -p -m 644 %{name}/%{legacy_default_bundle} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-legacy/%{legacy_default_bundle}
206e80
install -p -m 644 %{name}/%{legacy_disable_bundle} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-legacy/%{legacy_disable_bundle}
206e80
206e80
install -p -m 644 %{SOURCE5} $RPM_BUILD_ROOT%{catrustdir}/ca-legacy.conf
206e80
206e80
touch -r %{SOURCE0} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-source/%{p11_format_bundle}
206e80
206e80
touch -r %{SOURCE0} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-legacy/%{legacy_default_bundle}
206e80
touch -r %{SOURCE0} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-legacy/%{legacy_disable_bundle}
206e80
206e80
# TODO: consider to dynamically create the update-ca-trust script from within
206e80
#       this .spec file, in order to have the output file+directory names at once place only.
206e80
install -p -m 755 %{SOURCE2} $RPM_BUILD_ROOT%{_bindir}/update-ca-trust
206e80
206e80
install -p -m 755 %{SOURCE6} $RPM_BUILD_ROOT%{_bindir}/ca-legacy
206e80
206e80
# touch ghosted files that will be extracted dynamically
206e80
touch $RPM_BUILD_ROOT%{catrustdir}/extracted/pem/tls-ca-bundle.pem
206e80
touch $RPM_BUILD_ROOT%{catrustdir}/extracted/pem/email-ca-bundle.pem
206e80
touch $RPM_BUILD_ROOT%{catrustdir}/extracted/pem/objsign-ca-bundle.pem
206e80
touch $RPM_BUILD_ROOT%{catrustdir}/extracted/openssl/%{openssl_format_trust_bundle}
206e80
touch $RPM_BUILD_ROOT%{catrustdir}/extracted/%{java_bundle}
206e80
206e80
# /etc/ssl/certs symlink for 3rd-party tools
206e80
sln ../pki/tls/certs \
206e80
    $RPM_BUILD_ROOT%{_sysconfdir}/ssl/certs
206e80
# legacy filenames
206e80
sln %{catrustdir}/extracted/pem/tls-ca-bundle.pem \
206e80
    $RPM_BUILD_ROOT%{pkidir}/tls/cert.pem
206e80
sln %{catrustdir}/extracted/pem/tls-ca-bundle.pem \
206e80
    $RPM_BUILD_ROOT%{pkidir}/tls/certs/%{classic_tls_bundle}
206e80
sln %{catrustdir}/extracted/openssl/%{openssl_format_trust_bundle} \
206e80
    $RPM_BUILD_ROOT%{pkidir}/tls/certs/%{openssl_format_trust_bundle}
206e80
sln %{catrustdir}/extracted/%{java_bundle} \
206e80
    $RPM_BUILD_ROOT%{pkidir}/%{java_bundle}
206e80
206e80
%clean
206e80
rm -rf $RPM_BUILD_ROOT
206e80
206e80
206e80
%pre
206e80
if [ $1 -gt 1 ] ; then
206e80
  # Upgrade or Downgrade.
206e80
  # If the classic filename is a regular file, then we are upgrading
206e80
  # from an old package and we will move it to an .rpmsave backup file.
206e80
  # If the filename is a symbolic link, then we are good already.
206e80
  # If the system will later be downgraded to an old package with regular 
206e80
  # files, and afterwards updated again to a newer package with symlinks,
206e80
  # and the old .rpmsave backup file didn't get cleaned up,
206e80
  # then we don't backup again. We keep the older backup file.
206e80
  # In other words, if an .rpmsave file already exists, we don't overwrite it.
206e80
  #
206e80
  if ! test -e %{pkidir}/%{java_bundle}.rpmsave; then
206e80
    # no backup yet
206e80
    if test -e %{pkidir}/%{java_bundle}; then
206e80
      # a file exists
206e80
	  if ! test -L %{pkidir}/%{java_bundle}; then
206e80
        # it's an old regular file, not a link
206e80
        mv -f %{pkidir}/%{java_bundle} %{pkidir}/%{java_bundle}.rpmsave
206e80
      fi
206e80
    fi
206e80
  fi
206e80
206e80
  if ! test -e %{pkidir}/tls/certs/%{classic_tls_bundle}.rpmsave; then
206e80
    # no backup yet
206e80
    if test -e %{pkidir}/tls/certs/%{classic_tls_bundle}; then
206e80
      # a file exists
206e80
      if ! test -L %{pkidir}/tls/certs/%{classic_tls_bundle}; then
206e80
        # it's an old regular file, not a link
206e80
        mv -f %{pkidir}/tls/certs/%{classic_tls_bundle} %{pkidir}/tls/certs/%{classic_tls_bundle}.rpmsave
206e80
      fi
206e80
    fi
206e80
  fi
206e80
206e80
  if ! test -e %{pkidir}/tls/certs/%{openssl_format_trust_bundle}.rpmsave; then
206e80
    # no backup yet
206e80
    if test -e %{pkidir}/tls/certs/%{openssl_format_trust_bundle}; then
206e80
      # a file exists
206e80
      if ! test -L %{pkidir}/tls/certs/%{openssl_format_trust_bundle}; then
206e80
        # it's an old regular file, not a link
206e80
        mv -f %{pkidir}/tls/certs/%{openssl_format_trust_bundle} %{pkidir}/tls/certs/%{openssl_format_trust_bundle}.rpmsave
206e80
      fi
206e80
    fi
206e80
  fi
206e80
fi
206e80
206e80
206e80
%post
206e80
#if [ $1 -gt 1 ] ; then
206e80
#  # when upgrading or downgrading
206e80
#fi
206e80
%{_bindir}/ca-legacy install
206e80
%{_bindir}/update-ca-trust
206e80
206e80
206e80
%files
206e80
%defattr(-,root,root,-)
206e80
206e80
%dir %{_sysconfdir}/ssl
206e80
%dir %{pkidir}/tls
206e80
%dir %{pkidir}/tls/certs
206e80
%dir %{pkidir}/java
206e80
%dir %{catrustdir}
206e80
%dir %{catrustdir}/source
206e80
%dir %{catrustdir}/source/anchors
206e80
%dir %{catrustdir}/source/blacklist
206e80
%dir %{catrustdir}/extracted
206e80
%dir %{catrustdir}/extracted/pem
206e80
%dir %{catrustdir}/extracted/openssl
206e80
%dir %{catrustdir}/extracted/java
206e80
%dir %{_datadir}/pki
206e80
%dir %{_datadir}/pki/ca-trust-source
206e80
%dir %{_datadir}/pki/ca-trust-source/anchors
206e80
%dir %{_datadir}/pki/ca-trust-source/blacklist
206e80
%dir %{_datadir}/pki/ca-trust-legacy
206e80
206e80
%config(noreplace) %{catrustdir}/ca-legacy.conf
206e80
206e80
%{_mandir}/man8/update-ca-trust.8.gz
206e80
%{_mandir}/man8/ca-legacy.8.gz
206e80
%{_datadir}/pki/ca-trust-source/README
206e80
%{catrustdir}/README
206e80
%{catrustdir}/extracted/README
206e80
%{catrustdir}/extracted/java/README
206e80
%{catrustdir}/extracted/openssl/README
206e80
%{catrustdir}/extracted/pem/README
206e80
%{catrustdir}/source/README
206e80
%{_datadir}/doc/%{name}-%{version}/README
206e80
206e80
# symlinks for old locations
206e80
%{pkidir}/tls/cert.pem
206e80
%{pkidir}/tls/certs/%{classic_tls_bundle}
206e80
%{pkidir}/tls/certs/%{openssl_format_trust_bundle}
206e80
%{pkidir}/%{java_bundle}
206e80
# symlink directory
206e80
%{_sysconfdir}/ssl/certs
206e80
206e80
# master bundle file with trust
206e80
%{_datadir}/pki/ca-trust-source/%{p11_format_bundle}
206e80
206e80
%{_datadir}/pki/ca-trust-legacy/%{legacy_default_bundle}
206e80
%{_datadir}/pki/ca-trust-legacy/%{legacy_disable_bundle}
206e80
# update/extract tool
206e80
%{_bindir}/update-ca-trust
206e80
%{_bindir}/ca-legacy
206e80
%ghost %{catrustdir}/source/ca-bundle.legacy.crt
206e80
# files extracted files
206e80
%ghost %{catrustdir}/extracted/pem/tls-ca-bundle.pem
206e80
%ghost %{catrustdir}/extracted/pem/email-ca-bundle.pem
206e80
%ghost %{catrustdir}/extracted/pem/objsign-ca-bundle.pem
206e80
%ghost %{catrustdir}/extracted/openssl/%{openssl_format_trust_bundle}
206e80
%ghost %{catrustdir}/extracted/%{java_bundle}
206e80
206e80
206e80
%changelog
206e80
*Fri Jun 21 2019 Bob Relyea <rrelyea@redhat.com> - 2019.2.32-76
206e80
- Update to CKBI 2.32 from NSS 3.44
206e80
-   Removing:
206e80
-   # Certificate "Visa eCommerce Root"
206e80
-   # Certificate "AC Raiz Certicamara S.A."
206e80
-   # Certificate "TC TrustCenter Class 3 CA II"
206e80
-   # Certificate "ComSign CA"
206e80
-   # Certificate "S-TRUST Universal Root CA"
206e80
-   # Certificate "TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H5"
206e80
-   # Certificate "Certplus Root CA G1"
206e80
-   # Certificate "Certplus Root CA G2"
206e80
-   # Certificate "OpenTrust Root CA G1"
206e80
-   # Certificate "OpenTrust Root CA G2"
206e80
-   # Certificate "OpenTrust Root CA G3"
206e80
-  Adding:
206e80
-   # Certificate "GlobalSign Root CA - R6"
206e80
-   # Certificate "OISTE WISeKey Global Root GC CA"
206e80
-   # Certificate "GTS Root R1"
206e80
-   # Certificate "GTS Root R2"
206e80
-   # Certificate "GTS Root R3"
206e80
-   # Certificate "GTS Root R4"
206e80
-   # Certificate "UCA Global G2 Root"
206e80
-   # Certificate "UCA Extended Validation Root"
206e80
-   # Certificate "Certigna Root CA"
206e80
-   # Certificate "emSign Root CA - G1"
206e80
-   # Certificate "emSign ECC Root CA - G3"
206e80
-   # Certificate "emSign Root CA - C1"
206e80
-   # Certificate "emSign ECC Root CA - C3"
206e80
-   # Certificate "Hongkong Post Root CA 3"
206e80
206e80
* Wed Mar 14 2018 Kai Engert <kaie@redhat.com> - 2018.2.22-70.0
206e80
- Update to CKBI 2.22 from NSS 3.35
206e80
206e80
* Wed Nov 29 2017 Kai Engert <kaie@redhat.com> - 2017.2.20-71
206e80
- Update to CKBI 2.20 from NSS 3.34.1
206e80
206e80
* Thu Oct 26 2017 Kai Engert <kaie@redhat.com> - 2017.2.18-71
206e80
- Update to CKBI 2.18 (pre-release snapshot)
206e80
206e80
* Tue Sep 26 2017 Kai Engert <kaie@redhat.com> - 2017.2.16-71
206e80
- Update to CKBI 2.16 from NSS 3.32. In addition to removals/additions,
206e80
  Mozilla removed code signing trust from all CAs (rhbz#1472933)
206e80
206e80
* Fri Apr 28 2017 Kai Engert <kaie@redhat.com> - 2017.2.14-71
206e80
- Update to CKBI 2.14 from NSS 3.30.2
206e80
206e80
* Fri Mar 10 2017 Kai Engert <kaie@redhat.com> - 2017.2.11-73
206e80
- No longer trust legacy CAs
206e80
206e80
* Fri Mar 10 2017 Kai Engert <kaie@redhat.com> - 2017.2.11-72
206e80
- Changed the packaged bundle to use the flexible p11-kit-object-v1 file format,
206e80
  as a preparation to fix bugs in the interaction between p11-kit-trust and
206e80
  Mozilla applications, such as Firefox, Thunderbird etc.
206e80
- For CAs trusted by Mozilla, set attribute nss-mozilla-ca-policy: true
206e80
- Require p11-kit 0.23.5
206e80
- Added an utility to help with comparing output of the trust dump command.
206e80
206e80
* Tue Jan 17 2017 Kai Engert <kaie@redhat.com> - 2017.2.11-71
206e80
- Update to CKBI 2.11 from NSS 3.28.1 with legacy modifications.
206e80
- Use comments in extracted bundle files.
206e80
- Change packaging script to support empty legacy bundles.
206e80
206e80
* Tue May 10 2016 Kai Engert <kaie@redhat.com> - 2016.2.6-73
206e80
- Use sln, not ln, to avoid the dependency on coreutils (rhbz#1328586)
206e80
206e80
* Mon Apr 25 2016 Kai Engert <kaie@redhat.com> - 2015.2.6-72
206e80
- Fixed a typo in a manual page (rhbz#1303960)
206e80
206e80
* Wed Jan 27 2016 Kai Engert <kaie@redhat.com> - 2015.2.6-71
206e80
- Update to CKBI 2.6 from NSS 3.21 with legacy modifications.
206e80
206e80
* Thu Apr 23 2015 Kai Engert <kaie@redhat.com> - 2015.2.4-71
206e80
- Update to CKBI 2.4 from NSS 3.18.1 with legacy modifications.
206e80
206e80
* Tue Apr 14 2015 Kai Engert <kaie@redhat.com> - 2015.2.3-72
206e80
- Fix a typo in the ca-legacy manual page (rhbz#1208850)
206e80
206e80
* Tue Mar 31 2015 Kai Engert <kaie@redhat.com> - 2015.2.3-71
206e80
- Update to CKBI 2.3 from NSS 3.18 with legacy modifications.
206e80
- Add an alternative version of the "Thawte Premium Server CA" root,
206e80
  which carries a SHA1-RSA signature, to allow OpenJDK to verify applets
206e80
  which contain that version of the root certificate.
206e80
  This change doesn't add trust for another key, because both versions
206e80
  of the certificate use the same public key (rhbz#1170982).
206e80
- Add a patch to the source RPM that documents the changes from the
206e80
  upstream version.
206e80
- Introduce the ca-legacy utility, a manual page, and the ca-legacy.conf
206e80
  configuration file.
206e80
- The new scriptlets require the coreutils package.
206e80
- Remove the obsolete blacklist.txt file.
206e80
206e80
* Wed Sep 17 2014 Stef Walter <stefw@redhat.com> - 2014.1.98-72
206e80
- The BasicConstraints fix for Entrust Root is no longer necessary.
206e80
  In addition it was invalid for p11-kit 0.20.x. rhbz#1130485
206e80
206e80
* Wed Sep 03 2014 Kai Engert <kaie@redhat.com> - 2014.1.98-71
206e80
- Update to CKBI 1.98 from NSS 3.16.1
206e80
- building on RHEL 7 no longer requires java-openjdk
206e80
- added more detailed instructions for release numbers on RHEL branches,
206e80
  to avoid problems when rebasing on both z- and y-stream branches.
206e80
206e80
* Fri Dec 27 2013 Daniel Mach <dmach@redhat.com> - 2013.1.95-71
206e80
- Mass rebuild 2013-12-27
206e80
206e80
* Tue Dec 17 2013 Kai Engert <kaie@redhat.com> - 2013.1.95-70.1
206e80
- Update to CKBI 1.95 from NSS 3.15.3.1
206e80
206e80
* Fri Oct 18 2013 Kai Engert <kaie@redhat.com> - 2013.1.94-70.1
206e80
- Only create backup files if there is an original file, rhbz#999017
206e80
206e80
* Tue Sep 03 2013 Kai Engert <kaie@redhat.com> - 2013.1.94-70.0
206e80
- Update to CKBI 1.94 from NSS 3.15
206e80
206e80
* Wed Jul 17 2013 Kai Engert <kaie@redhat.com> - 2012.87-70.1
206e80
- improve manpage
206e80
206e80
* Tue Jul 09 2013 Kai Engert <kaie@redhat.com> - 2012.87-70.0
206e80
- use a release version that 's larger than on rhel 6
206e80
206e80
* Tue Jul 09 2013 Kai Engert <kaie@redhat.com> - 2012.87-10.4
206e80
- clarification updates to manual page
206e80
206e80
* Mon Jul 08 2013 Kai Engert <kaie@redhat.com> - 2012.87-10.3
206e80
- added a manual page and related build requirements
206e80
- simplify the README files now that we have a manual page
206e80
- set a certificate alias in trusted bundle (thanks to Ludwig Nussel)
206e80
206e80
* Mon May 27 2013 Kai Engert <kaie@redhat.com> - 2012.87-10.2
206e80
- use correct command in README files, rhbz#961809
206e80
206e80
* Mon Apr 22 2013 Kai Engert <kaie@redhat.com> - 2012.87-10.1
206e80
- Add myself as contributor to certdata2.pem.py and remove use of rcs/ident.
206e80
  (thanks to Michael Shuler for suggesting to do so)
206e80
- Update source URLs and comments, add source file for version information.
206e80
206e80
* Wed Mar 27 2013 Kai Engert <kaie@redhat.com> - 2012.87-10.0
206e80
- Use both label and serial to identify cert during conversion, rhbz#927601 
206e80
206e80
* Tue Mar 19 2013 Kai Engert <kaie@redhat.com> - 2012.87-9.fc19.1
206e80
- adjust to changed and new functionality provided by p11-kit 0.17.3
206e80
- updated READMEs to describe the new directory-specific treatment of files
206e80
- ship a new file that contains certificates with neutral trust
206e80
- ship a new file that contains distrust objects, and also staple a 
206e80
  basic constraint extension to one legacy root contained in the
206e80
  Mozilla CA list
206e80
- adjust the build script to dynamically produce most of above files
206e80
- add and own the anchors and blacklist subdirectories
206e80
- file generate-cacerts.pl is no longer required
206e80
206e80
* Fri Mar 08 2013 Kai Engert <kaie@redhat.com> - 2012.87-9
206e80
- Major rework for the Fedora SharedSystemCertificates feature.
206e80
- Only ship a PEM bundle file using the BEGIN TRUSTED CERTIFICATE file format.
206e80
- Require the p11-kit package that contains tools to automatically create
206e80
  other file format bundles.
206e80
- Convert old file locations to symbolic links that point to dynamically
206e80
  generated files.
206e80
- Old files, which might have been locally modified, will be saved in backup 
206e80
  files with .rpmsave extension.
206e80
- Added a update-ca-certificates script which can be used to regenerate
206e80
  the merged trusted output.
206e80
- Refer to the various README files that have been added for more detailed
206e80
  explanation of the new system.
206e80
- No longer require rsc for building.
206e80
- Add explanation for the future version numbering scheme,
206e80
  because the old numbering scheme was based on upstream using cvs,
206e80
  which is no longer true, and therefore can no longer be used.
206e80
- Includes changes from rhbz#873369.
206e80
206e80
* Thu Mar 07 2013 Kai Engert <kaie@redhat.com> - 2012.87-2.fc19.1
206e80
- Ship trust bundle file in /usr/share/pki/ca-trust-source/, temporarily in addition.
206e80
  This location will soon become the only place containing this file.
206e80
206e80
* Wed Feb 13 2013 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2012.87-2
206e80
- Rebuilt for https://fedoraproject.org/wiki/Fedora_19_Mass_Rebuild
206e80
206e80
* Fri Jan 04 2013 Paul Wouters <pwouters@redhat.com> - 2012.87-1
206e80
- Updated to r1.87 to blacklist mis-issued turktrust CA certs
206e80
206e80
* Wed Oct 24 2012 Paul Wouters <pwouters@redhat.com> - 2012.86-2
206e80
- Updated blacklist with 20 entries (Diginotar, Trustwave, Comodo(?)
206e80
- Fix to certdata2pem.py to also check for CKT_NSS_NOT_TRUSTED 
206e80
206e80
* Tue Oct 23 2012 Paul Wouters <pwouters@redhat.com> - 2012.86-1
206e80
- update to r1.86
206e80
206e80
* Mon Jul 23 2012 Joe Orton <jorton@redhat.com> - 2012.85-2
206e80
- add openssl to BuildRequires
206e80
206e80
* Mon Jul 23 2012 Joe Orton <jorton@redhat.com> - 2012.85-1
206e80
- update to r1.85
206e80
206e80
* Wed Jul 18 2012 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2012.81-2
206e80
- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild
206e80
206e80
* Mon Feb 13 2012 Joe Orton <jorton@redhat.com> - 2012.81-1
206e80
- update to r1.81
206e80
206e80
* Thu Jan 12 2012 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2011.80-2
206e80
- Rebuilt for https://fedoraproject.org/wiki/Fedora_17_Mass_Rebuild
206e80
206e80
* Wed Nov  9 2011 Joe Orton <jorton@redhat.com> - 2011.80-1
206e80
- update to r1.80
206e80
- fix handling of certs with dublicate Subject names (#733032)
206e80
206e80
* Thu Sep  1 2011 Joe Orton <jorton@redhat.com> - 2011.78-1
206e80
- update to r1.78, removing trust from DigiNotar root (#734679)
206e80
206e80
* Wed Aug  3 2011 Joe Orton <jorton@redhat.com> - 2011.75-1
206e80
- update to r1.75
206e80
206e80
* Wed Apr 20 2011 Joe Orton <jorton@redhat.com> - 2011.74-1
206e80
- update to r1.74
206e80
206e80
* Tue Feb 08 2011 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2011.70-2
206e80
- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild
206e80
206e80
* Wed Jan 12 2011 Joe Orton <jorton@redhat.com> - 2011.70-1
206e80
- update to r1.70
206e80
206e80
* Tue Nov  9 2010 Joe Orton <jorton@redhat.com> - 2010.65-3
206e80
- update to r1.65
206e80
206e80
* Wed Apr  7 2010 Joe Orton <jorton@redhat.com> - 2010.63-3
206e80
- package /etc/ssl/certs symlink for third-party apps (#572725)
206e80
206e80
* Wed Apr  7 2010 Joe Orton <jorton@redhat.com> - 2010.63-2
206e80
- rebuild
206e80
206e80
* Wed Apr  7 2010 Joe Orton <jorton@redhat.com> - 2010.63-1
206e80
- update to certdata.txt r1.63
206e80
- use upstream RCS version in Version
206e80
206e80
* Fri Mar 19 2010 Joe Orton <jorton@redhat.com> - 2010-4
206e80
- fix ca-bundle.crt (#575111)
206e80
206e80
* Thu Mar 18 2010 Joe Orton <jorton@redhat.com> - 2010-3
206e80
- update to certdata.txt r1.58
206e80
- add /etc/pki/tls/certs/ca-bundle.trust.crt using 'TRUSTED CERTICATE' format
206e80
- exclude ECC certs from the Java cacerts database
206e80
- catch keytool failures
206e80
- fail parsing certdata.txt on finding untrusted but not blacklisted cert
206e80
206e80
* Fri Jan 15 2010 Joe Orton <jorton@redhat.com> - 2010-2
206e80
- fix Java cacert database generation: use Subject rather than Issuer
206e80
  for alias name; add diagnostics; fix some alias names.
206e80
206e80
* Mon Jan 11 2010 Joe Orton <jorton@redhat.com> - 2010-1
206e80
- adopt Python certdata.txt parsing script from Debian
206e80
206e80
* Fri Jul 24 2009 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2009-2
206e80
- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild
206e80
206e80
* Wed Jul 22 2009 Joe Orton <jorton@redhat.com> 2009-1
206e80
- update to certdata.txt r1.53
206e80
206e80
* Mon Feb 23 2009 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2008-8
206e80
- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild
206e80
206e80
* Tue Oct 14 2008 Joe Orton <jorton@redhat.com> 2008-7
206e80
- update to certdata.txt r1.49
206e80
206e80
* Wed Jun 25 2008 Thomas Fitzsimmons <fitzsim@redhat.com> - 2008-6
206e80
- Change generate-cacerts.pl to produce pretty aliases.
206e80
206e80
* Mon Jun  2 2008 Joe Orton <jorton@redhat.com> 2008-5
206e80
- include /etc/pki/tls/cert.pem symlink to ca-bundle.crt
206e80
206e80
* Tue May 27 2008 Joe Orton <jorton@redhat.com> 2008-4
206e80
- use package name for temp dir, recreate it in prep
206e80
206e80
* Tue May 27 2008 Joe Orton <jorton@redhat.com> 2008-3
206e80
- fix source script perms
206e80
- mark packaged files as config(noreplace)
206e80
206e80
* Tue May 27 2008 Joe Orton <jorton@redhat.com> 2008-2
206e80
- add (but don't use) mkcabundle.pl
206e80
- tweak description
206e80
- use /usr/bin/keytool directly; BR java-openjdk
206e80
206e80
* Tue May 27 2008 Joe Orton <jorton@redhat.com> 2008-1
206e80
- Initial build (#448497)