Blame SPECS/ca-certificates.spec

d77b68
%define pkidir %{_sysconfdir}/pki
d77b68
%define catrustdir %{_sysconfdir}/pki/ca-trust
d77b68
%define classic_tls_bundle ca-bundle.crt
d77b68
%define openssl_format_trust_bundle ca-bundle.trust.crt
d77b68
%define p11_format_bundle ca-bundle.trust.p11-kit
d77b68
%define legacy_default_bundle ca-bundle.legacy.default.crt
d77b68
%define legacy_disable_bundle ca-bundle.legacy.disable.crt
d77b68
%define java_bundle java/cacerts
d77b68
d77b68
Summary: The Mozilla CA root certificate bundle
d77b68
Name: ca-certificates
d77b68
d77b68
# For the package version number, we use: year.{upstream version}
d77b68
#
d77b68
# The {upstream version} can be found as symbol
d77b68
# NSS_BUILTINS_LIBRARY_VERSION in file nss/lib/ckfw/builtins/nssckbi.h
d77b68
# which corresponds to the data in file nss/lib/ckfw/builtins/certdata.txt.
d77b68
#
d77b68
# The files should be taken from a released version of NSS, as published
d77b68
# at https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/
d77b68
#
d77b68
# The versions that are used by the latest released version of 
d77b68
# Mozilla Firefox should be available from:
d77b68
# https://hg.mozilla.org/releases/mozilla-release/raw-file/default/security/nss/lib/ckfw/builtins/nssckbi.h
d77b68
# https://hg.mozilla.org/releases/mozilla-release/raw-file/default/security/nss/lib/ckfw/builtins/certdata.txt
d77b68
#
d77b68
# The most recent development versions of the files can be found at
d77b68
# http://hg.mozilla.org/projects/nss/raw-file/default/lib/ckfw/builtins/nssckbi.h
d77b68
# http://hg.mozilla.org/projects/nss/raw-file/default/lib/ckfw/builtins/certdata.txt
d77b68
# (but these files might have not yet been released).
d77b68
#
d77b68
# (until 2012.87 the version was based on the cvs revision ID of certdata.txt,
d77b68
# but in 2013 the NSS projected was migrated to HG. Old version 2012.87 is 
d77b68
# equivalent to new version 2012.1.93, which would break the requirement 
d77b68
# to have increasing version numbers. However, the new scheme will work, 
d77b68
# because all future versions will start with 2013 or larger.)
d77b68
d77b68
Version: 2019.2.32
d77b68
# On RHEL 7.x, please keep the release version >= 70
d77b68
# When rebasing on Y-Stream (7.y), use 71, 72, 73, ...
d77b68
# When rebasing on Z-Stream (7.y.z), use 70.0, 70.1, 70.2, ...
d77b68
Release: 76%{?dist}
d77b68
License: Public Domain
d77b68
d77b68
Group: System Environment/Base
d77b68
URL: http://www.mozilla.org/
d77b68
d77b68
#Please always update both certdata.txt and nssckbi.h
d77b68
Source0: certdata.txt
d77b68
Source1: nssckbi.h
d77b68
Source2: update-ca-trust
d77b68
Source3: trust-fixes
d77b68
Source4: certdata2pem.py
d77b68
Source5: ca-legacy.conf
d77b68
Source6: ca-legacy
d77b68
Source9: ca-legacy.8.txt
d77b68
Source10: update-ca-trust.8.txt
d77b68
Source11: README.usr
d77b68
Source12: README.etc
d77b68
Source13: README.extr
d77b68
Source14: README.java
d77b68
Source15: README.openssl
d77b68
Source16: README.pem
d77b68
Source17: README.src
d77b68
Source18: README.ca-certificates
d77b68
d77b68
BuildArch: noarch
d77b68
d77b68
Requires: p11-kit >= 0.23.5
d77b68
Requires: p11-kit-trust >= 0.23.5
d77b68
BuildRequires: perl
d77b68
BuildRequires: python
d77b68
BuildRequires: openssl
d77b68
BuildRequires: asciidoc
d77b68
BuildRequires: libxslt
d77b68
d77b68
%description
d77b68
This package contains the set of CA certificates chosen by the
d77b68
Mozilla Foundation for use with the Internet PKI.
d77b68
d77b68
%prep
d77b68
rm -rf %{name}
d77b68
mkdir %{name}
d77b68
mkdir %{name}/certs
d77b68
mkdir %{name}/certs/legacy-default
d77b68
mkdir %{name}/certs/legacy-disable
d77b68
mkdir %{name}/java
d77b68
d77b68
%build
d77b68
pushd %{name}/certs
d77b68
 pwd
d77b68
 cp %{SOURCE0} .
d77b68
 python %{SOURCE4} >c2p.log 2>c2p.err
d77b68
popd
d77b68
pushd %{name}
d77b68
 (
d77b68
   cat <
d77b68
# This is a bundle of X.509 certificates of public Certificate
d77b68
# Authorities.  It was generated from the Mozilla root CA list.
d77b68
# These certificates and trust/distrust attributes use the file format accepted
d77b68
# by the p11-kit-trust module.
d77b68
#
d77b68
# Source: nss/lib/ckfw/builtins/certdata.txt
d77b68
# Source: nss/lib/ckfw/builtins/nssckbi.h
d77b68
#
d77b68
# Generated from:
d77b68
EOF
d77b68
   cat %{SOURCE1}  |grep -w NSS_BUILTINS_LIBRARY_VERSION | awk '{print "# " $2 " " $3}';
d77b68
   echo '#';
d77b68
 ) > %{p11_format_bundle}
d77b68
d77b68
 touch %{legacy_default_bundle}
d77b68
 NUM_LEGACY_DEFAULT=`find certs/legacy-default -type f | wc -l`
d77b68
 if [ $NUM_LEGACY_DEFAULT -ne 0 ]; then
d77b68
     for f in certs/legacy-default/*.crt; do 
d77b68
       echo "processing $f"
d77b68
       tbits=`sed -n '/^# openssl-trust/{s/^.*=//;p;}' $f`
d77b68
       alias=`sed -n '/^# alias=/{s/^.*=//;p;q;}' $f | sed "s/'//g" | sed 's/"//g'`
d77b68
       targs=""
d77b68
       if [ -n "$tbits" ]; then
d77b68
          for t in $tbits; do
d77b68
             targs="${targs} -addtrust $t"
d77b68
          done
d77b68
       fi
d77b68
       if [ -n "$targs" ]; then
d77b68
          echo "legacy default flags $targs for $f" >> info.trust
d77b68
          openssl x509 -text -in "$f" -trustout $targs -setalias "$alias" >> %{legacy_default_bundle}
d77b68
       fi
d77b68
     done
d77b68
 fi
d77b68
d77b68
 touch %{legacy_disable_bundle}
d77b68
 NUM_LEGACY_DISABLE=`find certs/legacy-disable -type f | wc -l`
d77b68
 if [ $NUM_LEGACY_DISABLE -ne 0 ]; then
d77b68
     for f in certs/legacy-disable/*.crt; do 
d77b68
       echo "processing $f"
d77b68
       tbits=`sed -n '/^# openssl-trust/{s/^.*=//;p;}' $f`
d77b68
       alias=`sed -n '/^# alias=/{s/^.*=//;p;q;}' $f | sed "s/'//g" | sed 's/"//g'`
d77b68
       targs=""
d77b68
       if [ -n "$tbits" ]; then
d77b68
          for t in $tbits; do
d77b68
             targs="${targs} -addtrust $t"
d77b68
          done
d77b68
       fi
d77b68
       if [ -n "$targs" ]; then
d77b68
          echo "legacy disable flags $targs for $f" >> info.trust
d77b68
          openssl x509 -text -in "$f" -trustout $targs -setalias "$alias" >> %{legacy_disable_bundle}
d77b68
       fi
d77b68
     done
d77b68
 fi
d77b68
d77b68
 P11FILES=`find certs -name \*.tmp-p11-kit | wc -l`
d77b68
 if [ $P11FILES -ne 0 ]; then
d77b68
   for p in certs/*.tmp-p11-kit; do 
d77b68
     cat "$p" >> %{p11_format_bundle}
d77b68
   done
d77b68
 fi
d77b68
 # Append our trust fixes
d77b68
 cat %{SOURCE3} >> %{p11_format_bundle}
d77b68
popd
d77b68
d77b68
#manpage
d77b68
cp %{SOURCE10} %{name}/update-ca-trust.8.txt
d77b68
asciidoc.py -v -d manpage -b docbook %{name}/update-ca-trust.8.txt
d77b68
xsltproc --nonet -o %{name}/update-ca-trust.8 /usr/share/asciidoc/docbook-xsl/manpage.xsl %{name}/update-ca-trust.8.xml
d77b68
d77b68
cp %{SOURCE9} %{name}/ca-legacy.8.txt
d77b68
asciidoc.py -v -d manpage -b docbook %{name}/ca-legacy.8.txt
d77b68
xsltproc --nonet -o %{name}/ca-legacy.8 /usr/share/asciidoc/docbook-xsl/manpage.xsl %{name}/ca-legacy.8.xml
d77b68
d77b68
d77b68
%install
d77b68
rm -rf $RPM_BUILD_ROOT
d77b68
mkdir -p -m 755 $RPM_BUILD_ROOT%{pkidir}/tls/certs
d77b68
mkdir -p -m 755 $RPM_BUILD_ROOT%{pkidir}/java
d77b68
mkdir -p -m 755 $RPM_BUILD_ROOT%{_sysconfdir}/ssl
d77b68
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/source
d77b68
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/source/anchors
d77b68
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/source/blacklist
d77b68
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/extracted
d77b68
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/extracted/pem
d77b68
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/extracted/openssl
d77b68
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/extracted/java
d77b68
mkdir -p -m 755 $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-source
d77b68
mkdir -p -m 755 $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-source/anchors
d77b68
mkdir -p -m 755 $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-source/blacklist
d77b68
mkdir -p -m 755 $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-legacy
d77b68
mkdir -p -m 755 $RPM_BUILD_ROOT%{_bindir}
d77b68
mkdir -p -m 755 $RPM_BUILD_ROOT%{_mandir}/man8
d77b68
d77b68
install -p -m 644 %{name}/update-ca-trust.8 $RPM_BUILD_ROOT%{_mandir}/man8
d77b68
install -p -m 644 %{name}/ca-legacy.8 $RPM_BUILD_ROOT%{_mandir}/man8
d77b68
install -p -m 644 %{SOURCE11} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-source/README
d77b68
install -p -m 644 %{SOURCE12} $RPM_BUILD_ROOT%{catrustdir}/README
d77b68
install -p -m 644 %{SOURCE13} $RPM_BUILD_ROOT%{catrustdir}/extracted/README
d77b68
install -p -m 644 %{SOURCE14} $RPM_BUILD_ROOT%{catrustdir}/extracted/java/README
d77b68
install -p -m 644 %{SOURCE15} $RPM_BUILD_ROOT%{catrustdir}/extracted/openssl/README
d77b68
install -p -m 644 %{SOURCE16} $RPM_BUILD_ROOT%{catrustdir}/extracted/pem/README
d77b68
install -p -m 644 %{SOURCE17} $RPM_BUILD_ROOT%{catrustdir}/source/README
d77b68
d77b68
mkdir -p -m 755 $RPM_BUILD_ROOT%{_datadir}/doc/%{name}-%{version}
d77b68
install -p -m 644 %{SOURCE18} $RPM_BUILD_ROOT%{_datadir}/doc/%{name}-%{version}/README
d77b68
d77b68
install -p -m 644 %{name}/%{p11_format_bundle} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-source/%{p11_format_bundle}
d77b68
d77b68
install -p -m 644 %{name}/%{legacy_default_bundle} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-legacy/%{legacy_default_bundle}
d77b68
install -p -m 644 %{name}/%{legacy_disable_bundle} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-legacy/%{legacy_disable_bundle}
d77b68
d77b68
install -p -m 644 %{SOURCE5} $RPM_BUILD_ROOT%{catrustdir}/ca-legacy.conf
d77b68
d77b68
touch -r %{SOURCE0} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-source/%{p11_format_bundle}
d77b68
d77b68
touch -r %{SOURCE0} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-legacy/%{legacy_default_bundle}
d77b68
touch -r %{SOURCE0} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-legacy/%{legacy_disable_bundle}
d77b68
d77b68
# TODO: consider to dynamically create the update-ca-trust script from within
d77b68
#       this .spec file, in order to have the output file+directory names at once place only.
d77b68
install -p -m 755 %{SOURCE2} $RPM_BUILD_ROOT%{_bindir}/update-ca-trust
d77b68
d77b68
install -p -m 755 %{SOURCE6} $RPM_BUILD_ROOT%{_bindir}/ca-legacy
d77b68
d77b68
# touch ghosted files that will be extracted dynamically
d77b68
touch $RPM_BUILD_ROOT%{catrustdir}/extracted/pem/tls-ca-bundle.pem
d77b68
touch $RPM_BUILD_ROOT%{catrustdir}/extracted/pem/email-ca-bundle.pem
d77b68
touch $RPM_BUILD_ROOT%{catrustdir}/extracted/pem/objsign-ca-bundle.pem
d77b68
touch $RPM_BUILD_ROOT%{catrustdir}/extracted/openssl/%{openssl_format_trust_bundle}
d77b68
touch $RPM_BUILD_ROOT%{catrustdir}/extracted/%{java_bundle}
d77b68
d77b68
# /etc/ssl/certs symlink for 3rd-party tools
d77b68
sln ../pki/tls/certs \
d77b68
    $RPM_BUILD_ROOT%{_sysconfdir}/ssl/certs
d77b68
# legacy filenames
d77b68
sln %{catrustdir}/extracted/pem/tls-ca-bundle.pem \
d77b68
    $RPM_BUILD_ROOT%{pkidir}/tls/cert.pem
d77b68
sln %{catrustdir}/extracted/pem/tls-ca-bundle.pem \
d77b68
    $RPM_BUILD_ROOT%{pkidir}/tls/certs/%{classic_tls_bundle}
d77b68
sln %{catrustdir}/extracted/openssl/%{openssl_format_trust_bundle} \
d77b68
    $RPM_BUILD_ROOT%{pkidir}/tls/certs/%{openssl_format_trust_bundle}
d77b68
sln %{catrustdir}/extracted/%{java_bundle} \
d77b68
    $RPM_BUILD_ROOT%{pkidir}/%{java_bundle}
d77b68
d77b68
%clean
d77b68
rm -rf $RPM_BUILD_ROOT
d77b68
d77b68
d77b68
%pre
d77b68
if [ $1 -gt 1 ] ; then
d77b68
  # Upgrade or Downgrade.
d77b68
  # If the classic filename is a regular file, then we are upgrading
d77b68
  # from an old package and we will move it to an .rpmsave backup file.
d77b68
  # If the filename is a symbolic link, then we are good already.
d77b68
  # If the system will later be downgraded to an old package with regular 
d77b68
  # files, and afterwards updated again to a newer package with symlinks,
d77b68
  # and the old .rpmsave backup file didn't get cleaned up,
d77b68
  # then we don't backup again. We keep the older backup file.
d77b68
  # In other words, if an .rpmsave file already exists, we don't overwrite it.
d77b68
  #
d77b68
  if ! test -e %{pkidir}/%{java_bundle}.rpmsave; then
d77b68
    # no backup yet
d77b68
    if test -e %{pkidir}/%{java_bundle}; then
d77b68
      # a file exists
d77b68
	  if ! test -L %{pkidir}/%{java_bundle}; then
d77b68
        # it's an old regular file, not a link
d77b68
        mv -f %{pkidir}/%{java_bundle} %{pkidir}/%{java_bundle}.rpmsave
d77b68
      fi
d77b68
    fi
d77b68
  fi
d77b68
d77b68
  if ! test -e %{pkidir}/tls/certs/%{classic_tls_bundle}.rpmsave; then
d77b68
    # no backup yet
d77b68
    if test -e %{pkidir}/tls/certs/%{classic_tls_bundle}; then
d77b68
      # a file exists
d77b68
      if ! test -L %{pkidir}/tls/certs/%{classic_tls_bundle}; then
d77b68
        # it's an old regular file, not a link
d77b68
        mv -f %{pkidir}/tls/certs/%{classic_tls_bundle} %{pkidir}/tls/certs/%{classic_tls_bundle}.rpmsave
d77b68
      fi
d77b68
    fi
d77b68
  fi
d77b68
d77b68
  if ! test -e %{pkidir}/tls/certs/%{openssl_format_trust_bundle}.rpmsave; then
d77b68
    # no backup yet
d77b68
    if test -e %{pkidir}/tls/certs/%{openssl_format_trust_bundle}; then
d77b68
      # a file exists
d77b68
      if ! test -L %{pkidir}/tls/certs/%{openssl_format_trust_bundle}; then
d77b68
        # it's an old regular file, not a link
d77b68
        mv -f %{pkidir}/tls/certs/%{openssl_format_trust_bundle} %{pkidir}/tls/certs/%{openssl_format_trust_bundle}.rpmsave
d77b68
      fi
d77b68
    fi
d77b68
  fi
d77b68
fi
d77b68
d77b68
d77b68
%post
d77b68
#if [ $1 -gt 1 ] ; then
d77b68
#  # when upgrading or downgrading
d77b68
#fi
d77b68
%{_bindir}/ca-legacy install
d77b68
%{_bindir}/update-ca-trust
d77b68
d77b68
d77b68
%files
d77b68
%defattr(-,root,root,-)
d77b68
d77b68
%dir %{_sysconfdir}/ssl
d77b68
%dir %{pkidir}/tls
d77b68
%dir %{pkidir}/tls/certs
d77b68
%dir %{pkidir}/java
d77b68
%dir %{catrustdir}
d77b68
%dir %{catrustdir}/source
d77b68
%dir %{catrustdir}/source/anchors
d77b68
%dir %{catrustdir}/source/blacklist
d77b68
%dir %{catrustdir}/extracted
d77b68
%dir %{catrustdir}/extracted/pem
d77b68
%dir %{catrustdir}/extracted/openssl
d77b68
%dir %{catrustdir}/extracted/java
d77b68
%dir %{_datadir}/pki
d77b68
%dir %{_datadir}/pki/ca-trust-source
d77b68
%dir %{_datadir}/pki/ca-trust-source/anchors
d77b68
%dir %{_datadir}/pki/ca-trust-source/blacklist
d77b68
%dir %{_datadir}/pki/ca-trust-legacy
d77b68
d77b68
%config(noreplace) %{catrustdir}/ca-legacy.conf
d77b68
d77b68
%{_mandir}/man8/update-ca-trust.8.gz
d77b68
%{_mandir}/man8/ca-legacy.8.gz
d77b68
%{_datadir}/pki/ca-trust-source/README
d77b68
%{catrustdir}/README
d77b68
%{catrustdir}/extracted/README
d77b68
%{catrustdir}/extracted/java/README
d77b68
%{catrustdir}/extracted/openssl/README
d77b68
%{catrustdir}/extracted/pem/README
d77b68
%{catrustdir}/source/README
d77b68
%{_datadir}/doc/%{name}-%{version}/README
d77b68
d77b68
# symlinks for old locations
d77b68
%{pkidir}/tls/cert.pem
d77b68
%{pkidir}/tls/certs/%{classic_tls_bundle}
d77b68
%{pkidir}/tls/certs/%{openssl_format_trust_bundle}
d77b68
%{pkidir}/%{java_bundle}
d77b68
# symlink directory
d77b68
%{_sysconfdir}/ssl/certs
d77b68
d77b68
# master bundle file with trust
d77b68
%{_datadir}/pki/ca-trust-source/%{p11_format_bundle}
d77b68
d77b68
%{_datadir}/pki/ca-trust-legacy/%{legacy_default_bundle}
d77b68
%{_datadir}/pki/ca-trust-legacy/%{legacy_disable_bundle}
d77b68
# update/extract tool
d77b68
%{_bindir}/update-ca-trust
d77b68
%{_bindir}/ca-legacy
d77b68
%ghost %{catrustdir}/source/ca-bundle.legacy.crt
d77b68
# files extracted files
d77b68
%ghost %{catrustdir}/extracted/pem/tls-ca-bundle.pem
d77b68
%ghost %{catrustdir}/extracted/pem/email-ca-bundle.pem
d77b68
%ghost %{catrustdir}/extracted/pem/objsign-ca-bundle.pem
d77b68
%ghost %{catrustdir}/extracted/openssl/%{openssl_format_trust_bundle}
d77b68
%ghost %{catrustdir}/extracted/%{java_bundle}
d77b68
d77b68
d77b68
%changelog
d77b68
*Fri Jun 21 2019 Bob Relyea <rrelyea@redhat.com> - 2019.2.32-76
d77b68
- Update to CKBI 2.32 from NSS 3.44
d77b68
-   Removing:
d77b68
-   # Certificate "Visa eCommerce Root"
d77b68
-   # Certificate "AC Raiz Certicamara S.A."
d77b68
-   # Certificate "TC TrustCenter Class 3 CA II"
d77b68
-   # Certificate "ComSign CA"
d77b68
-   # Certificate "S-TRUST Universal Root CA"
d77b68
-   # Certificate "TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H5"
d77b68
-   # Certificate "Certplus Root CA G1"
d77b68
-   # Certificate "Certplus Root CA G2"
d77b68
-   # Certificate "OpenTrust Root CA G1"
d77b68
-   # Certificate "OpenTrust Root CA G2"
d77b68
-   # Certificate "OpenTrust Root CA G3"
d77b68
-  Adding:
d77b68
-   # Certificate "GlobalSign Root CA - R6"
d77b68
-   # Certificate "OISTE WISeKey Global Root GC CA"
d77b68
-   # Certificate "GTS Root R1"
d77b68
-   # Certificate "GTS Root R2"
d77b68
-   # Certificate "GTS Root R3"
d77b68
-   # Certificate "GTS Root R4"
d77b68
-   # Certificate "UCA Global G2 Root"
d77b68
-   # Certificate "UCA Extended Validation Root"
d77b68
-   # Certificate "Certigna Root CA"
d77b68
-   # Certificate "emSign Root CA - G1"
d77b68
-   # Certificate "emSign ECC Root CA - G3"
d77b68
-   # Certificate "emSign Root CA - C1"
d77b68
-   # Certificate "emSign ECC Root CA - C3"
d77b68
-   # Certificate "Hongkong Post Root CA 3"
d77b68
d77b68
* Wed Mar 14 2018 Kai Engert <kaie@redhat.com> - 2018.2.22-70.0
d77b68
- Update to CKBI 2.22 from NSS 3.35
d77b68
d77b68
* Wed Nov 29 2017 Kai Engert <kaie@redhat.com> - 2017.2.20-71
d77b68
- Update to CKBI 2.20 from NSS 3.34.1
d77b68
d77b68
* Thu Oct 26 2017 Kai Engert <kaie@redhat.com> - 2017.2.18-71
d77b68
- Update to CKBI 2.18 (pre-release snapshot)
d77b68
d77b68
* Tue Sep 26 2017 Kai Engert <kaie@redhat.com> - 2017.2.16-71
d77b68
- Update to CKBI 2.16 from NSS 3.32. In addition to removals/additions,
d77b68
  Mozilla removed code signing trust from all CAs (rhbz#1472933)
d77b68
d77b68
* Fri Apr 28 2017 Kai Engert <kaie@redhat.com> - 2017.2.14-71
d77b68
- Update to CKBI 2.14 from NSS 3.30.2
d77b68
d77b68
* Fri Mar 10 2017 Kai Engert <kaie@redhat.com> - 2017.2.11-73
d77b68
- No longer trust legacy CAs
d77b68
d77b68
* Fri Mar 10 2017 Kai Engert <kaie@redhat.com> - 2017.2.11-72
d77b68
- Changed the packaged bundle to use the flexible p11-kit-object-v1 file format,
d77b68
  as a preparation to fix bugs in the interaction between p11-kit-trust and
d77b68
  Mozilla applications, such as Firefox, Thunderbird etc.
d77b68
- For CAs trusted by Mozilla, set attribute nss-mozilla-ca-policy: true
d77b68
- Require p11-kit 0.23.5
d77b68
- Added an utility to help with comparing output of the trust dump command.
d77b68
d77b68
* Tue Jan 17 2017 Kai Engert <kaie@redhat.com> - 2017.2.11-71
d77b68
- Update to CKBI 2.11 from NSS 3.28.1 with legacy modifications.
d77b68
- Use comments in extracted bundle files.
d77b68
- Change packaging script to support empty legacy bundles.
d77b68
d77b68
* Tue May 10 2016 Kai Engert <kaie@redhat.com> - 2016.2.6-73
d77b68
- Use sln, not ln, to avoid the dependency on coreutils (rhbz#1328586)
d77b68
d77b68
* Mon Apr 25 2016 Kai Engert <kaie@redhat.com> - 2015.2.6-72
d77b68
- Fixed a typo in a manual page (rhbz#1303960)
d77b68
d77b68
* Wed Jan 27 2016 Kai Engert <kaie@redhat.com> - 2015.2.6-71
d77b68
- Update to CKBI 2.6 from NSS 3.21 with legacy modifications.
d77b68
d77b68
* Thu Apr 23 2015 Kai Engert <kaie@redhat.com> - 2015.2.4-71
d77b68
- Update to CKBI 2.4 from NSS 3.18.1 with legacy modifications.
d77b68
d77b68
* Tue Apr 14 2015 Kai Engert <kaie@redhat.com> - 2015.2.3-72
d77b68
- Fix a typo in the ca-legacy manual page (rhbz#1208850)
d77b68
d77b68
* Tue Mar 31 2015 Kai Engert <kaie@redhat.com> - 2015.2.3-71
d77b68
- Update to CKBI 2.3 from NSS 3.18 with legacy modifications.
d77b68
- Add an alternative version of the "Thawte Premium Server CA" root,
d77b68
  which carries a SHA1-RSA signature, to allow OpenJDK to verify applets
d77b68
  which contain that version of the root certificate.
d77b68
  This change doesn't add trust for another key, because both versions
d77b68
  of the certificate use the same public key (rhbz#1170982).
d77b68
- Add a patch to the source RPM that documents the changes from the
d77b68
  upstream version.
d77b68
- Introduce the ca-legacy utility, a manual page, and the ca-legacy.conf
d77b68
  configuration file.
d77b68
- The new scriptlets require the coreutils package.
d77b68
- Remove the obsolete blacklist.txt file.
d77b68
d77b68
* Wed Sep 17 2014 Stef Walter <stefw@redhat.com> - 2014.1.98-72
d77b68
- The BasicConstraints fix for Entrust Root is no longer necessary.
d77b68
  In addition it was invalid for p11-kit 0.20.x. rhbz#1130485
d77b68
d77b68
* Wed Sep 03 2014 Kai Engert <kaie@redhat.com> - 2014.1.98-71
d77b68
- Update to CKBI 1.98 from NSS 3.16.1
d77b68
- building on RHEL 7 no longer requires java-openjdk
d77b68
- added more detailed instructions for release numbers on RHEL branches,
d77b68
  to avoid problems when rebasing on both z- and y-stream branches.
d77b68
d77b68
* Fri Dec 27 2013 Daniel Mach <dmach@redhat.com> - 2013.1.95-71
d77b68
- Mass rebuild 2013-12-27
d77b68
d77b68
* Tue Dec 17 2013 Kai Engert <kaie@redhat.com> - 2013.1.95-70.1
d77b68
- Update to CKBI 1.95 from NSS 3.15.3.1
d77b68
d77b68
* Fri Oct 18 2013 Kai Engert <kaie@redhat.com> - 2013.1.94-70.1
d77b68
- Only create backup files if there is an original file, rhbz#999017
d77b68
d77b68
* Tue Sep 03 2013 Kai Engert <kaie@redhat.com> - 2013.1.94-70.0
d77b68
- Update to CKBI 1.94 from NSS 3.15
d77b68
d77b68
* Wed Jul 17 2013 Kai Engert <kaie@redhat.com> - 2012.87-70.1
d77b68
- improve manpage
d77b68
d77b68
* Tue Jul 09 2013 Kai Engert <kaie@redhat.com> - 2012.87-70.0
d77b68
- use a release version that 's larger than on rhel 6
d77b68
d77b68
* Tue Jul 09 2013 Kai Engert <kaie@redhat.com> - 2012.87-10.4
d77b68
- clarification updates to manual page
d77b68
d77b68
* Mon Jul 08 2013 Kai Engert <kaie@redhat.com> - 2012.87-10.3
d77b68
- added a manual page and related build requirements
d77b68
- simplify the README files now that we have a manual page
d77b68
- set a certificate alias in trusted bundle (thanks to Ludwig Nussel)
d77b68
d77b68
* Mon May 27 2013 Kai Engert <kaie@redhat.com> - 2012.87-10.2
d77b68
- use correct command in README files, rhbz#961809
d77b68
d77b68
* Mon Apr 22 2013 Kai Engert <kaie@redhat.com> - 2012.87-10.1
d77b68
- Add myself as contributor to certdata2.pem.py and remove use of rcs/ident.
d77b68
  (thanks to Michael Shuler for suggesting to do so)
d77b68
- Update source URLs and comments, add source file for version information.
d77b68
d77b68
* Wed Mar 27 2013 Kai Engert <kaie@redhat.com> - 2012.87-10.0
d77b68
- Use both label and serial to identify cert during conversion, rhbz#927601 
d77b68
d77b68
* Tue Mar 19 2013 Kai Engert <kaie@redhat.com> - 2012.87-9.fc19.1
d77b68
- adjust to changed and new functionality provided by p11-kit 0.17.3
d77b68
- updated READMEs to describe the new directory-specific treatment of files
d77b68
- ship a new file that contains certificates with neutral trust
d77b68
- ship a new file that contains distrust objects, and also staple a 
d77b68
  basic constraint extension to one legacy root contained in the
d77b68
  Mozilla CA list
d77b68
- adjust the build script to dynamically produce most of above files
d77b68
- add and own the anchors and blacklist subdirectories
d77b68
- file generate-cacerts.pl is no longer required
d77b68
d77b68
* Fri Mar 08 2013 Kai Engert <kaie@redhat.com> - 2012.87-9
d77b68
- Major rework for the Fedora SharedSystemCertificates feature.
d77b68
- Only ship a PEM bundle file using the BEGIN TRUSTED CERTIFICATE file format.
d77b68
- Require the p11-kit package that contains tools to automatically create
d77b68
  other file format bundles.
d77b68
- Convert old file locations to symbolic links that point to dynamically
d77b68
  generated files.
d77b68
- Old files, which might have been locally modified, will be saved in backup 
d77b68
  files with .rpmsave extension.
d77b68
- Added a update-ca-certificates script which can be used to regenerate
d77b68
  the merged trusted output.
d77b68
- Refer to the various README files that have been added for more detailed
d77b68
  explanation of the new system.
d77b68
- No longer require rsc for building.
d77b68
- Add explanation for the future version numbering scheme,
d77b68
  because the old numbering scheme was based on upstream using cvs,
d77b68
  which is no longer true, and therefore can no longer be used.
d77b68
- Includes changes from rhbz#873369.
d77b68
d77b68
* Thu Mar 07 2013 Kai Engert <kaie@redhat.com> - 2012.87-2.fc19.1
d77b68
- Ship trust bundle file in /usr/share/pki/ca-trust-source/, temporarily in addition.
d77b68
  This location will soon become the only place containing this file.
d77b68
d77b68
* Wed Feb 13 2013 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2012.87-2
d77b68
- Rebuilt for https://fedoraproject.org/wiki/Fedora_19_Mass_Rebuild
d77b68
d77b68
* Fri Jan 04 2013 Paul Wouters <pwouters@redhat.com> - 2012.87-1
d77b68
- Updated to r1.87 to blacklist mis-issued turktrust CA certs
d77b68
d77b68
* Wed Oct 24 2012 Paul Wouters <pwouters@redhat.com> - 2012.86-2
d77b68
- Updated blacklist with 20 entries (Diginotar, Trustwave, Comodo(?)
d77b68
- Fix to certdata2pem.py to also check for CKT_NSS_NOT_TRUSTED 
d77b68
d77b68
* Tue Oct 23 2012 Paul Wouters <pwouters@redhat.com> - 2012.86-1
d77b68
- update to r1.86
d77b68
d77b68
* Mon Jul 23 2012 Joe Orton <jorton@redhat.com> - 2012.85-2
d77b68
- add openssl to BuildRequires
d77b68
d77b68
* Mon Jul 23 2012 Joe Orton <jorton@redhat.com> - 2012.85-1
d77b68
- update to r1.85
d77b68
d77b68
* Wed Jul 18 2012 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2012.81-2
d77b68
- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild
d77b68
d77b68
* Mon Feb 13 2012 Joe Orton <jorton@redhat.com> - 2012.81-1
d77b68
- update to r1.81
d77b68
d77b68
* Thu Jan 12 2012 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2011.80-2
d77b68
- Rebuilt for https://fedoraproject.org/wiki/Fedora_17_Mass_Rebuild
d77b68
d77b68
* Wed Nov  9 2011 Joe Orton <jorton@redhat.com> - 2011.80-1
d77b68
- update to r1.80
d77b68
- fix handling of certs with dublicate Subject names (#733032)
d77b68
d77b68
* Thu Sep  1 2011 Joe Orton <jorton@redhat.com> - 2011.78-1
d77b68
- update to r1.78, removing trust from DigiNotar root (#734679)
d77b68
d77b68
* Wed Aug  3 2011 Joe Orton <jorton@redhat.com> - 2011.75-1
d77b68
- update to r1.75
d77b68
d77b68
* Wed Apr 20 2011 Joe Orton <jorton@redhat.com> - 2011.74-1
d77b68
- update to r1.74
d77b68
d77b68
* Tue Feb 08 2011 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2011.70-2
d77b68
- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild
d77b68
d77b68
* Wed Jan 12 2011 Joe Orton <jorton@redhat.com> - 2011.70-1
d77b68
- update to r1.70
d77b68
d77b68
* Tue Nov  9 2010 Joe Orton <jorton@redhat.com> - 2010.65-3
d77b68
- update to r1.65
d77b68
d77b68
* Wed Apr  7 2010 Joe Orton <jorton@redhat.com> - 2010.63-3
d77b68
- package /etc/ssl/certs symlink for third-party apps (#572725)
d77b68
d77b68
* Wed Apr  7 2010 Joe Orton <jorton@redhat.com> - 2010.63-2
d77b68
- rebuild
d77b68
d77b68
* Wed Apr  7 2010 Joe Orton <jorton@redhat.com> - 2010.63-1
d77b68
- update to certdata.txt r1.63
d77b68
- use upstream RCS version in Version
d77b68
d77b68
* Fri Mar 19 2010 Joe Orton <jorton@redhat.com> - 2010-4
d77b68
- fix ca-bundle.crt (#575111)
d77b68
d77b68
* Thu Mar 18 2010 Joe Orton <jorton@redhat.com> - 2010-3
d77b68
- update to certdata.txt r1.58
d77b68
- add /etc/pki/tls/certs/ca-bundle.trust.crt using 'TRUSTED CERTICATE' format
d77b68
- exclude ECC certs from the Java cacerts database
d77b68
- catch keytool failures
d77b68
- fail parsing certdata.txt on finding untrusted but not blacklisted cert
d77b68
d77b68
* Fri Jan 15 2010 Joe Orton <jorton@redhat.com> - 2010-2
d77b68
- fix Java cacert database generation: use Subject rather than Issuer
d77b68
  for alias name; add diagnostics; fix some alias names.
d77b68
d77b68
* Mon Jan 11 2010 Joe Orton <jorton@redhat.com> - 2010-1
d77b68
- adopt Python certdata.txt parsing script from Debian
d77b68
d77b68
* Fri Jul 24 2009 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2009-2
d77b68
- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild
d77b68
d77b68
* Wed Jul 22 2009 Joe Orton <jorton@redhat.com> 2009-1
d77b68
- update to certdata.txt r1.53
d77b68
d77b68
* Mon Feb 23 2009 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2008-8
d77b68
- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild
d77b68
d77b68
* Tue Oct 14 2008 Joe Orton <jorton@redhat.com> 2008-7
d77b68
- update to certdata.txt r1.49
d77b68
d77b68
* Wed Jun 25 2008 Thomas Fitzsimmons <fitzsim@redhat.com> - 2008-6
d77b68
- Change generate-cacerts.pl to produce pretty aliases.
d77b68
d77b68
* Mon Jun  2 2008 Joe Orton <jorton@redhat.com> 2008-5
d77b68
- include /etc/pki/tls/cert.pem symlink to ca-bundle.crt
d77b68
d77b68
* Tue May 27 2008 Joe Orton <jorton@redhat.com> 2008-4
d77b68
- use package name for temp dir, recreate it in prep
d77b68
d77b68
* Tue May 27 2008 Joe Orton <jorton@redhat.com> 2008-3
d77b68
- fix source script perms
d77b68
- mark packaged files as config(noreplace)
d77b68
d77b68
* Tue May 27 2008 Joe Orton <jorton@redhat.com> 2008-2
d77b68
- add (but don't use) mkcabundle.pl
d77b68
- tweak description
d77b68
- use /usr/bin/keytool directly; BR java-openjdk
d77b68
d77b68
* Tue May 27 2008 Joe Orton <jorton@redhat.com> 2008-1
d77b68
- Initial build (#448497)