From 5a21c7cb25b4626d5f21771496b83eb8396e4af8 Mon Sep 17 00:00:00 2001 From: CentOS Sources Date: Oct 22 2019 23:02:17 +0000 Subject: import java-1.7.0-openjdk-1.7.0.231-2.6.19.3.el7 --- diff --git a/.gitignore b/.gitignore new file mode 100644 index 0000000..9127a62 --- /dev/null +++ b/.gitignore @@ -0,0 +1,4 @@ +SOURCES/class-rewriter.tar.gz +SOURCES/openjdk-icedtea-2.6.19.tar.xz +SOURCES/pulseaudio.tar.gz +SOURCES/systemtap-tapset-2.6.19.tar.xz diff --git a/.java-1.7.0-openjdk.metadata b/.java-1.7.0-openjdk.metadata new file mode 100644 index 0000000..69e44f3 --- /dev/null +++ b/.java-1.7.0-openjdk.metadata @@ -0,0 +1,4 @@ +fcc167de17354efb6e52cb387eb3e7dbb0316b53 SOURCES/class-rewriter.tar.gz +c2e2b8d2db547950595444dcf045f361fd11669e SOURCES/openjdk-icedtea-2.6.19.tar.xz +fb72b6b1f4735ad9b5799d0b5058b0b1dec67b17 SOURCES/pulseaudio.tar.gz +38b74f261642b087ada2dc4063bf2b468d865b0e SOURCES/systemtap-tapset-2.6.19.tar.xz diff --git a/SOURCES/README.src b/SOURCES/README.src new file mode 100644 index 0000000..7a54b1b --- /dev/null +++ b/SOURCES/README.src @@ -0,0 +1,2 @@ +The java-1.7.0-openjdk-src subpackage contains the complete class library +source code for use by IDE indexers and debuggers. diff --git a/SOURCES/TestCryptoLevel.java b/SOURCES/TestCryptoLevel.java new file mode 100644 index 0000000..b32b7ae --- /dev/null +++ b/SOURCES/TestCryptoLevel.java @@ -0,0 +1,72 @@ +/* TestCryptoLevel -- Ensure unlimited crypto policy is in use. + Copyright (C) 2012 Red Hat, Inc. + +This program is free software: you can redistribute it and/or modify +it under the terms of the GNU Affero General Public License as +published by the Free Software Foundation, either version 3 of the +License, or (at your option) any later version. + +This program is distributed in the hope that it will be useful, +but WITHOUT ANY WARRANTY; without even the implied warranty of +MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +GNU Affero General Public License for more details. + +You should have received a copy of the GNU Affero General Public License +along with this program. If not, see . +*/ + +import java.lang.reflect.Field; +import java.lang.reflect.Method; +import java.lang.reflect.InvocationTargetException; + +import java.security.Permission; +import java.security.PermissionCollection; + +public class TestCryptoLevel +{ + public static void main(String[] args) + throws NoSuchFieldException, ClassNotFoundException, + IllegalAccessException, InvocationTargetException + { + Class cls = null; + Method def = null, exempt = null; + + try + { + cls = Class.forName("javax.crypto.JceSecurity"); + } + catch (ClassNotFoundException ex) + { + System.err.println("Running a non-Sun JDK."); + System.exit(0); + } + try + { + def = cls.getDeclaredMethod("getDefaultPolicy"); + exempt = cls.getDeclaredMethod("getExemptPolicy"); + } + catch (NoSuchMethodException ex) + { + System.err.println("Running IcedTea with the original crypto patch."); + System.exit(0); + } + def.setAccessible(true); + exempt.setAccessible(true); + PermissionCollection defPerms = (PermissionCollection) def.invoke(null); + PermissionCollection exemptPerms = (PermissionCollection) exempt.invoke(null); + Class apCls = Class.forName("javax.crypto.CryptoAllPermission"); + Field apField = apCls.getDeclaredField("INSTANCE"); + apField.setAccessible(true); + Permission allPerms = (Permission) apField.get(null); + if (defPerms.implies(allPerms) && (exemptPerms == null || exemptPerms.implies(allPerms))) + { + System.err.println("Running with the unlimited policy."); + System.exit(0); + } + else + { + System.err.println("WARNING: Running with a restricted crypto policy."); + System.exit(-1); + } + } +} diff --git a/SOURCES/fsg.sh b/SOURCES/fsg.sh new file mode 100644 index 0000000..d4eda6c --- /dev/null +++ b/SOURCES/fsg.sh @@ -0,0 +1,140 @@ +#!/bin/sh + +if [ "x$1" = "xhelp" ] ; then + echo "PR2124 - the path to the PR2124 patch to apply (optional; downloaded if unavailable)" + exit 1; +fi + +if [ "x${TMPDIR}" = "x" ]; then + echo "Using default temporary directory of /tmp"; + TMPDIR=/tmp +fi + +echo "Further liberating OpenJDK..." + +# PRx denotes bug x in the IcedTea bug database (http://icedtea.classpath.org/bugzilla/show_bug.cgi?id=x) +# Sx denotes bug x in the Sun bug database (http://bugs.sun.com/bugdatabase/view_bug.do?bug_id=x) + +# PR146/S6713083 +# Remove binaries +rm -vf \ + openjdk/jdk/test/sun/management/windows/revokeall.exe \ + openjdk/jdk/test/sun/management/jmxremote/bootstrap/linux-i586/launcher \ + openjdk/jdk/test/sun/management/jmxremote/bootstrap/solaris-sparc/launcher \ + openjdk/jdk/test/sun/management/jmxremote/bootstrap/solaris-i586/launcher + +rm -vf \ + openjdk/jdk/test/java/nio/channels/spi/SelectorProvider/inheritedChannel/lib/linux-i586/libLauncher.so \ + openjdk/jdk/test/java/nio/channels/spi/SelectorProvider/inheritedChannel/lib/solaris-i586/libLauncher.so \ + openjdk/jdk/test/java/nio/channels/spi/SelectorProvider/inheritedChannel/lib/solaris-sparc/libLauncher.so \ + openjdk/jdk/test/java/nio/channels/spi/SelectorProvider/inheritedChannel/lib/solaris-sparcv9/libLauncher.so \ + openjdk/jdk/test/tools/launcher/lib/i386/lib32/lib32/liblibrary.so \ + openjdk/jdk/test/tools/launcher/lib/i386/lib32/liblibrary.so \ + openjdk/jdk/test/tools/launcher/lib/sparc/lib32/lib32/liblibrary.so \ + openjdk/jdk/test/tools/launcher/lib/sparc/lib32/liblibrary.so \ + openjdk/jdk/test/tools/launcher/lib/sparc/lib64/lib64/liblibrary.so \ + openjdk/jdk/test/tools/launcher/lib/sparc/lib64/liblibrary.so + +rm -vf \ + openjdk/jdk/test/java/util/Locale/data/deflocale.exe \ + openjdk/jdk/test/java/util/Locale/data/deflocale.jds3 \ + openjdk/jdk/test/java/util/Locale/data/deflocale.rhel4 \ + openjdk/jdk/test/java/util/Locale/data/deflocale.sh \ + openjdk/jdk/test/java/util/Locale/data/deflocale.sol10 \ + openjdk/jdk/test/java/util/Locale/data/deflocale.winvista \ + openjdk/jdk/test/java/util/Locale/data/deflocale.winxp \ + +# Remove test sources with questionable license headers. +rm -vf \ + openjdk/jdk/test/java/util/ResourceBundle/Bug4168625Resource3.java \ + openjdk/jdk/test/java/util/ResourceBundle/Bug4168625Resource3_en_IE.java \ + openjdk/jdk/test/java/util/ResourceBundle/Bug4165815Test.java \ + openjdk/jdk/test/java/util/ResourceBundle/Bug4177489_Resource_jf.java \ + openjdk/jdk/test/java/util/ResourceBundle/Bug4168625Resource3_en_CA.java \ + openjdk/jdk/test/java/util/ResourceBundle/Bug4168625Getter.java \ + openjdk/jdk/test/java/util/ResourceBundle/Bug4177489Test.java \ + openjdk/jdk/test/java/util/ResourceBundle/Bug4168625Resource.java \ + openjdk/jdk/test/java/util/ResourceBundle/Bug4168625Resource2.java \ + openjdk/jdk/test/java/util/ResourceBundle/Bug4168625Resource3_en_US.java \ + openjdk/jdk/test/java/util/ResourceBundle/Bug4083270Test.java \ + openjdk/jdk/test/java/util/ResourceBundle/Bug4168625Resource3_en.java \ + openjdk/jdk/test/java/util/ResourceBundle/Bug4177489_Resource.java \ + openjdk/jdk/test/java/util/ResourceBundle/Bug4168625Test.java \ + openjdk/jdk/test/java/util/ResourceBundle/Bug4168625Resource2_en_US.java \ + openjdk/jdk/test/java/util/ResourceBundle/Bug4168625Class.java \ + openjdk/jdk/test/java/util/Locale/Bug4175998Test.java \ + openjdk/jdk/test/java/util/ResourceBundle/RBTestFmwk.java \ + openjdk/jdk/test/java/util/ResourceBundle/TestResource_fr.java \ + openjdk/jdk/test/java/util/ResourceBundle/Bug4179766Resource.java \ + openjdk/jdk/test/java/util/ResourceBundle/Bug4179766Getter.java \ + openjdk/jdk/test/java/util/ResourceBundle/Bug4179766Class.java \ + openjdk/jdk/test/java/util/ResourceBundle/TestResource.java \ + openjdk/jdk/test/java/util/ResourceBundle/FakeTestResource.java \ + openjdk/jdk/test/java/util/ResourceBundle/TestResource_de.java \ + openjdk/jdk/test/java/util/ResourceBundle/TestBug4179766.java \ + openjdk/jdk/test/java/util/ResourceBundle/TestResource_fr_CH.java \ + openjdk/jdk/test/java/util/ResourceBundle/ResourceBundleTest.java \ + openjdk/jdk/test/java/util/ResourceBundle/TestResource_it.java \ + openjdk/jdk/test/java/util/Locale/PrintDefaultLocale.java \ + openjdk/jdk/test/java/util/Locale/LocaleTest.java \ + openjdk/jdk/test/java/util/Locale/LocaleTestFmwk.java \ + openjdk/jdk/test/java/util/Locale/Bug4184873Test.java \ + openjdk/jdk/test/sun/text/resources/LocaleDataTest.java + +# Remove J2DBench sources, some of which have questionable license +# headers. +rm -rvf \ + openjdk/jdk/src/share/demo/java2d/J2DBench + +# BEGIN Debian/Ubuntu additions + +# binary files +rm -vf \ + openjdk/jdk/test/sun/net/idn/nfscis.spp + +# TODO +#$ find openjdk -name '*.jar' -o -name '*.class'|grep -v test + +# PR140, S6695776 +# Also see patches/icedtea-jscheme.patch +rm -rvf openjdk/corba/src/share/classes/com/sun/tools/corba/se/logutil/lib +rm -rvf openjdk/corba/src/share/classes/com/sun/tools/corba/se/logutil/scripts + +# PR139, S6710791 +rm -vf \ + openjdk/hotspot/agent/kk/src/share/lib/maf-1_0.jar \ + openjdk/hotspot/agent/kk/src/share/lib/jlfgr-1_0.jar \ + +# END Debian/Ubuntu additions + +echo "Removing support for proprietary SNMP plug" +rm -rvf openjdk/jdk/src/share/classes/sun/management/snmp +rm -rvf openjdk/jdk/src/share/classes/com/sun/jmx/snmp +rm -rvf openjdk/jdk/test/com/sun/jmx/snmp + +echo "Removing registration tests" +rm -rvf openjdk/jdk/test/com/sun/servicetag + +echo "Removing EC source code we don't build" +rm -rvf openjdk/jdk/src/share/native/sun/security/ec/impl + +# Requires IcedTea patch PR2124 (not included) +echo "Syncing EC list with NSS" +if [ "x$PR2124" = "x" ] ; then +# get pr2124.patch (from http://icedtea.classpath.org//hg/icedtea7) +# Do not push it or publish it (see http://icedtea.classpath.org/bugzilla/show_bug.cgi?id=2124) + TMPPR2124=${TMPDIR}/pr2124.patch + PR2124=${TMPPR2124} + wget -O ${PR2124} http://icedtea.classpath.org/hg/icedtea7/raw-file/tip/patches/pr2124.patch +fi +echo "Applying ${PR2124}" +if ! patch -Np0 < ${PR2124} ; then + echo "Patching failed."; + exit 1; +fi +echo "Cleaning up after patch application..." +find . -name '*.orig' | xargs rm -vf +if [ "x$TMPPR2124" != "x" ] ; then + rm -vf ${TMPPR2124} +fi + diff --git a/SOURCES/java-abrt-launcher b/SOURCES/java-abrt-launcher new file mode 100644 index 0000000..681ef43 --- /dev/null +++ b/SOURCES/java-abrt-launcher @@ -0,0 +1,7 @@ +#!/bin/bash +if [ -e @LIB_DIR@ ] ; then + exec -a java @JAVA_PATH@ -agentpath:@LIB_DIR@=abrt=on "$@" +else + exec -a java @JAVA_PATH@ "$@" +fi + diff --git a/SOURCES/jconsole.desktop b/SOURCES/jconsole.desktop new file mode 100644 index 0000000..f7904c6 --- /dev/null +++ b/SOURCES/jconsole.desktop @@ -0,0 +1,10 @@ +[Desktop Entry] +Name=OpenJDK Monitoring & Management Console #ARCH# +Comment=Monitor and manage OpenJDK applications for #ARCH# +Exec=/usr/bin/jconsole +Icon=java-1.7.0 +Terminal=false +Type=Application +StartupWMClass=sun-tools-jconsole-JConsole +Categories=Development;Monitor;Java; +Version=1.0 diff --git a/SOURCES/jdk8076221-pr2809-disable_rc4_cipher_suites.patch b/SOURCES/jdk8076221-pr2809-disable_rc4_cipher_suites.patch new file mode 100644 index 0000000..5aa43ff --- /dev/null +++ b/SOURCES/jdk8076221-pr2809-disable_rc4_cipher_suites.patch @@ -0,0 +1,600 @@ +# HG changeset patch +# User xuelei +# Date 1453868482 0 +# Wed Jan 27 04:21:22 2016 +0000 +# Node ID 8d589911411743fa38badf69c10aa067eaa996b7 +# Parent ceb95f0d38d7ab09762dd7ff33bb855f3088a6b5 +8076221, PR2809: Disable RC4 cipher suites +Reviewed-by: wetmore + +diff --git openjdk.orig/jdk/src/share/lib/security/java.security-linux openjdk/jdk/src/share/lib/security/java.security-linux +--- openjdk.orig/jdk/src/share/lib/security/java.security-linux ++++ openjdk/jdk/src/share/lib/security/java.security-linux +@@ -556,8 +556,8 @@ + # + # Example: + # jdk.tls.disabledAlgorithms=MD5, SSLv3, DSA, RSA keySize < 2048 +-jdk.tls.disabledAlgorithms=SSLv3, DES, MD5withRSA, DH keySize < 1024, \ +- EC keySize < 224, RC4_40, 3DES_EDE_CBC, anon, NULL ++jdk.tls.disabledAlgorithms=SSLv3, RC4, DES, MD5withRSA, DH keySize < 1024, \ ++ EC keySize < 224, 3DES_EDE_CBC, anon, NULL + + # Legacy algorithms for Secure Socket Layer/Transport Layer Security (SSL/TLS) + # processing in JSSE implementation. +diff --git openjdk.orig/jdk/src/share/lib/security/java.security-macosx openjdk/jdk/src/share/lib/security/java.security-macosx +--- openjdk.orig/jdk/src/share/lib/security/java.security-macosx ++++ openjdk/jdk/src/share/lib/security/java.security-macosx +@@ -561,8 +561,8 @@ + # + # Example: + # jdk.tls.disabledAlgorithms=MD5, SSLv3, DSA, RSA keySize < 2048 +-jdk.tls.disabledAlgorithms=SSLv3, DES, MD5withRSA, DH keySize < 1024, \ +- EC keySize < 224, RC4_40, 3DES_EDE_CBC, anon, NULL ++jdk.tls.disabledAlgorithms=SSLv3, RC4, DES, MD5withRSA, DH keySize < 1024, \ ++ EC keySize < 224, 3DES_EDE_CBC, anon, NULL + + # Legacy algorithms for Secure Socket Layer/Transport Layer Security (SSL/TLS) + # processing in JSSE implementation. +diff --git openjdk.orig/jdk/src/share/lib/security/java.security-solaris openjdk/jdk/src/share/lib/security/java.security-solaris +--- openjdk.orig/jdk/src/share/lib/security/java.security-solaris ++++ openjdk/jdk/src/share/lib/security/java.security-solaris +@@ -560,8 +560,8 @@ + # + # Example: + # jdk.tls.disabledAlgorithms=MD5, SSLv3, DSA, RSA keySize < 2048 +-jdk.tls.disabledAlgorithms=SSLv3, DES, MD5withRSA, DH keySize < 1024, \ +- EC keySize < 224, RC4_40, 3DES_EDE_CBC, anon, NULL ++jdk.tls.disabledAlgorithms=SSLv3, RC4, DES, MD5withRSA, DH keySize < 1024, \ ++ EC keySize < 224, 3DES_EDE_CBC, anon, NULL + + # Legacy algorithms for Secure Socket Layer/Transport Layer Security (SSL/TLS) + # processing in JSSE implementation. +diff --git openjdk.orig/jdk/src/share/lib/security/java.security-windows openjdk/jdk/src/share/lib/security/java.security-windows +--- openjdk.orig/jdk/src/share/lib/security/java.security-windows ++++ openjdk/jdk/src/share/lib/security/java.security-windows +@@ -561,8 +561,8 @@ + # + # Example: + # jdk.tls.disabledAlgorithms=MD5, SSLv3, DSA, RSA keySize < 2048 +-jdk.tls.disabledAlgorithms=SSLv3, DES, MD5withRSA, DH keySize < 1024, \ +- EC keySize < 224, RC4_40, 3DES_EDE_CBC, anon, NULL ++jdk.tls.disabledAlgorithms=SSLv3, RC4, DES, MD5withRSA, DH keySize < 1024, \ ++ EC keySize < 224, 3DES_EDE_CBC, anon, NULL + + # Legacy algorithms for Secure Socket Layer/Transport Layer Security (SSL/TLS) + # processing in JSSE implementation. +diff --git openjdk.orig/jdk/test/javax/net/ssl/ciphersuites/DisabledAlgorithms.java openjdk/jdk/test/javax/net/ssl/ciphersuites/DisabledAlgorithms.java +new file mode 100644 +--- /dev/null ++++ openjdk/jdk/test/javax/net/ssl/ciphersuites/DisabledAlgorithms.java +@@ -0,0 +1,362 @@ ++/* ++ * Copyright (c) 2015, Oracle and/or its affiliates. All rights reserved. ++ * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. ++ * ++ * This code is free software; you can redistribute it and/or modify it ++ * under the terms of the GNU General Public License version 2 only, as ++ * published by the Free Software Foundation. ++ * ++ * This code is distributed in the hope that it will be useful, but WITHOUT ++ * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or ++ * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License ++ * version 2 for more details (a copy is included in the LICENSE file that ++ * accompanied this code). ++ * ++ * You should have received a copy of the GNU General Public License version ++ * 2 along with this work; if not, write to the Free Software Foundation, ++ * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. ++ * ++ * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA ++ * or visit www.oracle.com if you need additional information or have any ++ * questions. ++ */ ++ ++import java.io.BufferedInputStream; ++import java.io.BufferedOutputStream; ++import java.io.IOException; ++import java.io.InputStream; ++import java.io.OutputStream; ++import java.security.NoSuchAlgorithmException; ++import java.security.Security; ++import java.util.concurrent.TimeUnit; ++import javax.net.ssl.SSLContext; ++import javax.net.ssl.SSLHandshakeException; ++import javax.net.ssl.SSLServerSocket; ++import javax.net.ssl.SSLServerSocketFactory; ++import javax.net.ssl.SSLSocket; ++import javax.net.ssl.SSLSocketFactory; ++ ++/** ++ * @test ++ * @bug 8076221 ++ * @summary Check if weak cipher suites are disabled ++ * @run main/othervm DisabledAlgorithms default ++ * @run main/othervm DisabledAlgorithms empty ++ */ ++public class DisabledAlgorithms { ++ ++ private static final String pathToStores = ++ "../../../../sun/security/ssl/etc"; ++ private static final String keyStoreFile = "keystore"; ++ private static final String trustStoreFile = "truststore"; ++ private static final String passwd = "passphrase"; ++ ++ private static final String keyFilename = ++ System.getProperty("test.src", "./") + "/" + pathToStores + ++ "/" + keyStoreFile; ++ ++ private static final String trustFilename = ++ System.getProperty("test.src", "./") + "/" + pathToStores + ++ "/" + trustStoreFile; ++ ++ // supported RC4 cipher suites ++ // it does not contain KRB5 cipher suites because they need a KDC ++ private static final String[] rc4_ciphersuites = new String[] { ++ "TLS_ECDHE_ECDSA_WITH_RC4_128_SHA", ++ "TLS_ECDHE_RSA_WITH_RC4_128_SHA", ++ "SSL_RSA_WITH_RC4_128_SHA", ++ "TLS_ECDH_ECDSA_WITH_RC4_128_SHA", ++ "TLS_ECDH_RSA_WITH_RC4_128_SHA", ++ "SSL_RSA_WITH_RC4_128_MD5", ++ "TLS_ECDH_anon_WITH_RC4_128_SHA", ++ "SSL_DH_anon_WITH_RC4_128_MD5" ++ }; ++ ++ public static void main(String[] args) throws Exception { ++ if (args.length < 1) { ++ throw new RuntimeException("No parameters specified"); ++ } ++ ++ System.setProperty("javax.net.ssl.keyStore", keyFilename); ++ System.setProperty("javax.net.ssl.keyStorePassword", passwd); ++ System.setProperty("javax.net.ssl.trustStore", trustFilename); ++ System.setProperty("javax.net.ssl.trustStorePassword", passwd); ++ ++ switch (args[0]) { ++ case "default": ++ // use default jdk.tls.disabledAlgorithms ++ System.out.println("jdk.tls.disabledAlgorithms = " ++ + Security.getProperty("jdk.tls.disabledAlgorithms")); ++ ++ // check if RC4 cipher suites can't be used by default ++ checkFailure(rc4_ciphersuites); ++ break; ++ case "empty": ++ // reset jdk.tls.disabledAlgorithms ++ Security.setProperty("jdk.tls.disabledAlgorithms", ""); ++ System.out.println("jdk.tls.disabledAlgorithms = " ++ + Security.getProperty("jdk.tls.disabledAlgorithms")); ++ ++ // check if RC4 cipher suites can be used ++ // if jdk.tls.disabledAlgorithms is empty ++ checkSuccess(rc4_ciphersuites); ++ break; ++ default: ++ throw new RuntimeException("Wrong parameter: " + args[0]); ++ } ++ } ++ ++ /* ++ * Checks if that specified cipher suites cannot be used. ++ */ ++ private static void checkFailure(String[] ciphersuites) throws Exception { ++ try (SSLServer server = SSLServer.init(ciphersuites)) { ++ startNewThread(server); ++ while (!server.isRunning()) { ++ sleep(); ++ } ++ ++ int port = server.getPort(); ++ for (String ciphersuite : ciphersuites) { ++ try (SSLClient client = SSLClient.init(port, ciphersuite)) { ++ client.connect(); ++ throw new RuntimeException("Expected SSLHandshakeException " ++ + "not thrown"); ++ } catch (SSLHandshakeException e) { ++ System.out.println("Expected exception on client side: " ++ + e); ++ } ++ } ++ ++ server.stop(); ++ while (server.isRunning()) { ++ sleep(); ++ } ++ ++ if (!server.sslError()) { ++ throw new RuntimeException("Expected SSL exception " ++ + "not thrown on server side"); ++ } ++ } ++ ++ } ++ ++ /* ++ * Checks if specified cipher suites can be used. ++ */ ++ private static void checkSuccess(String[] ciphersuites) throws Exception { ++ try (SSLServer server = SSLServer.init(ciphersuites)) { ++ startNewThread(server); ++ while (!server.isRunning()) { ++ sleep(); ++ } ++ ++ int port = server.getPort(); ++ for (String ciphersuite : ciphersuites) { ++ try (SSLClient client = SSLClient.init(port, ciphersuite)) { ++ client.connect(); ++ String negotiated = client.getNegotiatedCipherSuite(); ++ System.out.println("Negotiated cipher suite: " ++ + negotiated); ++ if (!negotiated.equals(ciphersuite)) { ++ throw new RuntimeException("Unexpected cipher suite: " ++ + negotiated); ++ } ++ } ++ } ++ ++ server.stop(); ++ while (server.isRunning()) { ++ sleep(); ++ } ++ ++ if (server.error()) { ++ throw new RuntimeException("Unexpected error on server side"); ++ } ++ } ++ ++ } ++ ++ private static Thread startNewThread(SSLServer server) { ++ Thread serverThread = new Thread(server, "SSL server thread"); ++ serverThread.setDaemon(true); ++ serverThread.start(); ++ return serverThread; ++ } ++ ++ private static void sleep() { ++ try { ++ TimeUnit.MILLISECONDS.sleep(50); ++ } catch (InterruptedException e) { ++ // do nothing ++ } ++ } ++ ++ static class SSLServer implements Runnable, AutoCloseable { ++ ++ private final SSLServerSocket ssocket; ++ private volatile boolean stopped = false; ++ private volatile boolean running = false; ++ private volatile boolean sslError = false; ++ private volatile boolean otherError = false; ++ ++ private SSLServer(SSLServerSocket ssocket) { ++ this.ssocket = ssocket; ++ } ++ ++ @Override ++ public void run() { ++ System.out.println("Server: started"); ++ running = true; ++ while (!stopped) { ++ try (SSLSocket socket = (SSLSocket) ssocket.accept()) { ++ System.out.println("Server: accepted client connection"); ++ InputStream in = socket.getInputStream(); ++ OutputStream out = socket.getOutputStream(); ++ int b = in.read(); ++ if (b < 0) { ++ throw new IOException("Unexpected EOF"); ++ } ++ System.out.println("Server: send data: " + b); ++ out.write(b); ++ out.flush(); ++ socket.getSession().invalidate(); ++ } catch (SSLHandshakeException e) { ++ System.out.println("Server: run: " + e); ++ sslError = true; ++ } catch (IOException e) { ++ if (!stopped) { ++ System.out.println("Server: run: " + e); ++ e.printStackTrace(); ++ otherError = true; ++ } ++ } ++ } ++ ++ System.out.println("Server: finished"); ++ running = false; ++ } ++ ++ int getPort() { ++ return ssocket.getLocalPort(); ++ } ++ ++ String[] getEnabledCiperSuites() { ++ return ssocket.getEnabledCipherSuites(); ++ } ++ ++ boolean isRunning() { ++ return running; ++ } ++ ++ boolean sslError() { ++ return sslError; ++ } ++ ++ boolean error() { ++ return sslError || otherError; ++ } ++ ++ void stop() { ++ stopped = true; ++ if (!ssocket.isClosed()) { ++ try { ++ ssocket.close(); ++ } catch (IOException e) { ++ System.out.println("Server: close: " + e); ++ } ++ } ++ } ++ ++ @Override ++ public void close() { ++ stop(); ++ } ++ ++ static SSLServer init(String[] ciphersuites) ++ throws IOException { ++ SSLServerSocketFactory ssf = (SSLServerSocketFactory) ++ SSLServerSocketFactory.getDefault(); ++ SSLServerSocket ssocket = (SSLServerSocket) ++ ssf.createServerSocket(0); ++ ++ if (ciphersuites != null) { ++ System.out.println("Server: enable cipher suites: " ++ + java.util.Arrays.toString(ciphersuites)); ++ ssocket.setEnabledCipherSuites(ciphersuites); ++ } ++ ++ return new SSLServer(ssocket); ++ } ++ } ++ ++ static class SSLClient implements AutoCloseable { ++ ++ private final SSLSocket socket; ++ ++ private SSLClient(SSLSocket socket) { ++ this.socket = socket; ++ } ++ ++ void connect() throws IOException { ++ System.out.println("Client: connect to server"); ++ try ( ++ BufferedInputStream bis = new BufferedInputStream( ++ socket.getInputStream()); ++ BufferedOutputStream bos = new BufferedOutputStream( ++ socket.getOutputStream())) { ++ bos.write('x'); ++ bos.flush(); ++ ++ int read = bis.read(); ++ if (read < 0) { ++ throw new IOException("Client: couldn't read a response"); ++ } ++ socket.getSession().invalidate(); ++ } ++ } ++ ++ String[] getEnabledCiperSuites() { ++ return socket.getEnabledCipherSuites(); ++ } ++ ++ String getNegotiatedCipherSuite() { ++ return socket.getSession().getCipherSuite(); ++ } ++ ++ @Override ++ public void close() throws Exception { ++ if (!socket.isClosed()) { ++ try { ++ socket.close(); ++ } catch (IOException e) { ++ System.out.println("Client: close: " + e); ++ } ++ } ++ } ++ ++ static SSLClient init(int port) ++ throws NoSuchAlgorithmException, IOException { ++ return init(port, null); ++ } ++ ++ static SSLClient init(int port, String ciphersuite) ++ throws NoSuchAlgorithmException, IOException { ++ SSLContext context = SSLContext.getDefault(); ++ SSLSocketFactory ssf = (SSLSocketFactory) ++ context.getSocketFactory(); ++ SSLSocket socket = (SSLSocket) ssf.createSocket("localhost", port); ++ ++ if (ciphersuite != null) { ++ System.out.println("Client: enable cipher suite: " ++ + ciphersuite); ++ socket.setEnabledCipherSuites(new String[] { ciphersuite }); ++ } ++ ++ return new SSLClient(socket); ++ } ++ ++ } ++ ++ ++} +diff --git openjdk.orig/jdk/test/sun/security/krb5/auto/SSL.java openjdk/jdk/test/sun/security/krb5/auto/SSL.java +--- openjdk.orig/jdk/test/sun/security/krb5/auto/SSL.java ++++ openjdk/jdk/test/sun/security/krb5/auto/SSL.java +@@ -1,5 +1,5 @@ + /* +- * Copyright (c) 2009, 2011, Oracle and/or its affiliates. All rights reserved. ++ * Copyright (c) 2009, 2015, Oracle and/or its affiliates. All rights reserved. + * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. + * + * This code is free software; you can redistribute it and/or modify it +@@ -40,6 +40,7 @@ + import java.net.InetAddress; + import javax.net.ssl.*; + import java.security.Principal; ++import java.security.Security; + import java.util.Date; + import sun.security.jgss.GSSUtil; + import sun.security.krb5.PrincipalName; +@@ -54,6 +55,9 @@ + private static volatile int port; + + public static void main(String[] args) throws Exception { ++ // reset the security property to make sure that the algorithms ++ // and keys used in this test are not disabled. ++ Security.setProperty("jdk.tls.disabledAlgorithms", ""); + + krb5Cipher = args[0]; + +diff --git openjdk.orig/jdk/test/sun/security/ssl/CipherSuite/NoDesRC4CiphSuite.java openjdk/jdk/test/sun/security/ssl/CipherSuite/NoDesRC4CiphSuite.java +--- openjdk.orig/jdk/test/sun/security/ssl/CipherSuite/NoDesRC4CiphSuite.java ++++ openjdk/jdk/test/sun/security/ssl/CipherSuite/NoDesRC4CiphSuite.java +@@ -95,12 +95,9 @@ + allGood &= testEngOnlyDisabled(DES_CS_LIST_NAMES); + + // Disabled RC4 tests +- /* +- RC4 is not yet disabled, as 8076221 has not been backported + allGood &= testDefaultCase(RC4_CS_LIST); + allGood &= testEngAddDisabled(RC4_CS_LIST_NAMES, RC4_CS_LIST); + allGood &= testEngOnlyDisabled(RC4_CS_LIST_NAMES); +- */ + + if (allGood) { + System.err.println("All tests passed"); +diff --git openjdk.orig/jdk/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/ClientHandshaker/CipherSuiteOrder.java openjdk/jdk/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/ClientHandshaker/CipherSuiteOrder.java +--- openjdk.orig/jdk/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/ClientHandshaker/CipherSuiteOrder.java ++++ openjdk/jdk/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/ClientHandshaker/CipherSuiteOrder.java +@@ -1,5 +1,5 @@ + /* +- * Copyright (c) 2001, 2002, Oracle and/or its affiliates. All rights reserved. ++ * Copyright (c) 2001, 2015, Oracle and/or its affiliates. All rights reserved. + * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. + * + * This code is free software; you can redistribute it and/or modify it +@@ -36,7 +36,7 @@ + */ + + import java.io.*; +-import java.net.*; ++import java.security.Security; + import javax.net.ssl.*; + + public class CipherSuiteOrder { +@@ -198,6 +198,10 @@ + volatile Exception clientException = null; + + public static void main(String[] args) throws Exception { ++ // reset the security property to make sure that the algorithms ++ // and keys used in this test are not disabled. ++ Security.setProperty("jdk.tls.disabledAlgorithms", ""); ++ + String keyFilename = + System.getProperty("test.src", "./") + "/" + pathToStores + + "/" + keyStoreFile; +diff --git openjdk.orig/jdk/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/DHKeyExchange/DHEKeySizing.java openjdk/jdk/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/DHKeyExchange/DHEKeySizing.java +--- openjdk.orig/jdk/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/DHKeyExchange/DHEKeySizing.java ++++ openjdk/jdk/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/DHKeyExchange/DHEKeySizing.java +@@ -103,10 +103,10 @@ + import java.security.Security; + import java.security.KeyStore; + import java.security.KeyFactory; ++import java.security.Security; + import java.security.cert.Certificate; + import java.security.cert.CertificateFactory; + import java.security.spec.PKCS8EncodedKeySpec; +-import java.security.spec.*; + import java.security.interfaces.*; + import sun.misc.BASE64Decoder; + +diff --git openjdk.orig/jdk/test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/CheckStatus.java openjdk/jdk/test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/CheckStatus.java +--- openjdk.orig/jdk/test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/CheckStatus.java ++++ openjdk/jdk/test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/CheckStatus.java +@@ -1,5 +1,5 @@ + /* +- * Copyright (c) 2003, 2011, Oracle and/or its affiliates. All rights reserved. ++ * Copyright (c) 2003, 2015, Oracle and/or its affiliates. All rights reserved. + * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. + * + * This code is free software; you can redistribute it and/or modify it +@@ -622,6 +622,9 @@ + } + + public static void main(String args[]) throws Exception { ++ // reset the security property to make sure that the algorithms ++ // and keys used in this test are not disabled. ++ Security.setProperty("jdk.tls.disabledAlgorithms", ""); + + CheckStatus cs; + +diff --git openjdk.orig/jdk/test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/ConnectionTest.java openjdk/jdk/test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/ConnectionTest.java +--- openjdk.orig/jdk/test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/ConnectionTest.java ++++ openjdk/jdk/test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/ConnectionTest.java +@@ -33,6 +33,8 @@ + * The code could certainly be tightened up a lot. + * + * @author Brad Wetmore ++ * ++ * @run main/othervm ConnectionTest + */ + + import javax.net.ssl.*; +@@ -672,6 +674,10 @@ + } + + public static void main(String args[]) throws Exception { ++ // reset the security property to make sure that the algorithms ++ // and keys used in this test are not disabled. ++ Security.setProperty("jdk.tls.disabledAlgorithms", ""); ++ + ConnectionTest ct = new ConnectionTest(); + ct.test(); + } +diff --git openjdk.orig/jdk/test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/LargeBufs.java openjdk/jdk/test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/LargeBufs.java +--- openjdk.orig/jdk/test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/LargeBufs.java ++++ openjdk/jdk/test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/LargeBufs.java +@@ -180,6 +180,9 @@ + } + + public static void main(String args[]) throws Exception { ++ // reset the security property to make sure that the algorithms ++ // and keys used in this test are not disabled. ++ Security.setProperty("jdk.tls.disabledAlgorithms", ""); + + LargeBufs test; + +diff --git openjdk.orig/jdk/test/sun/security/ssl/javax/net/ssl/TLSv11/GenericStreamCipher.java openjdk/jdk/test/sun/security/ssl/javax/net/ssl/TLSv11/GenericStreamCipher.java +--- openjdk.orig/jdk/test/sun/security/ssl/javax/net/ssl/TLSv11/GenericStreamCipher.java ++++ openjdk/jdk/test/sun/security/ssl/javax/net/ssl/TLSv11/GenericStreamCipher.java +@@ -37,7 +37,7 @@ + */ + + import java.io.*; +-import java.net.*; ++import java.security.Security; + import javax.net.ssl.*; + + public class GenericStreamCipher { +@@ -165,6 +165,10 @@ + volatile Exception clientException = null; + + public static void main(String[] args) throws Exception { ++ // reset the security property to make sure that the algorithms ++ // and keys used in this test are not disabled. ++ Security.setProperty("jdk.tls.disabledAlgorithms", ""); ++ + String keyFilename = + System.getProperty("test.src", ".") + "/" + pathToStores + + "/" + keyStoreFile; diff --git a/SOURCES/jdk8226318-rh1738637-class_lookup_crash.patch b/SOURCES/jdk8226318-rh1738637-class_lookup_crash.patch new file mode 100644 index 0000000..7e3823e --- /dev/null +++ b/SOURCES/jdk8226318-rh1738637-class_lookup_crash.patch @@ -0,0 +1,29 @@ +# HG changeset patch +# User mbalao +# Date 1560878590 10800 +# Tue Jun 18 14:23:10 2019 -0300 +# Node ID d790adc3bb57a28b26502814839a9308112a35a0 +# Parent c066fa11f8ede0ab75742aba76823341d8e36e87 +8226318: Class Loader Dependencies improvements +Reviewed-by: adinn + +diff --git openjdk.orig/hotspot/src/share/vm/classfile/classLoaderDependencies.cpp openjdk/hotspot/src/share/vm/classfile/classLoaderDependencies.cpp +--- openjdk.orig/hotspot/src/share/vm/classfile/classLoaderDependencies.cpp ++++ openjdk/hotspot/src/share/vm/classfile/classLoaderDependencies.cpp +@@ -76,6 +76,7 @@ + + // Must handle over GC points + assert (last != NULL, "dependencies should be initialized"); ++ objArrayHandle head_handle(THREAD, list_head); + objArrayHandle last_handle(THREAD, last); + + // Create a new dependency node with fields for (class_loader, next) +@@ -86,7 +87,7 @@ + objArrayHandle new_dependency(THREAD, deps); + + // Add the dependency under lock +- ClassLoaderDependencies::locked_add(objArrayHandle(THREAD, list_head), ++ ClassLoaderDependencies::locked_add(head_handle, + last_handle, + new_dependency, + THREAD); diff --git a/SOURCES/nss.cfg b/SOURCES/nss.cfg new file mode 100644 index 0000000..377a39c --- /dev/null +++ b/SOURCES/nss.cfg @@ -0,0 +1,5 @@ +name = NSS +nssLibraryDirectory = @NSS_LIBDIR@ +nssDbMode = noDb +attributes = compatibility +handleStartupErrors = ignoreMultipleInitialisation diff --git a/SOURCES/policytool.desktop b/SOURCES/policytool.desktop new file mode 100644 index 0000000..b0841b3 --- /dev/null +++ b/SOURCES/policytool.desktop @@ -0,0 +1,10 @@ +[Desktop Entry] +Name=OpenJDK Policy Tool #ARCH# +Comment=Manage OpenJDK policy files for #ARCH# +Exec=/usr/bin/policytool +Icon=java-1.7.0 +Terminal=false +Type=Application +StartupWMClass=sun-security-tools-PolicyTool +Categories=Development;Java; +Version=1.0 diff --git a/SOURCES/pr1834-rh1022017-reduce_ellipticcurvesextension_to_provide_only_three_nss_supported_nist_curves_23_24_25.patch b/SOURCES/pr1834-rh1022017-reduce_ellipticcurvesextension_to_provide_only_three_nss_supported_nist_curves_23_24_25.patch new file mode 100644 index 0000000..8165340 --- /dev/null +++ b/SOURCES/pr1834-rh1022017-reduce_ellipticcurvesextension_to_provide_only_three_nss_supported_nist_curves_23_24_25.patch @@ -0,0 +1,28 @@ +diff --git a/src/share/classes/sun/security/ssl/EllipticCurvesExtension.java b/src/share/classes/sun/security/ssl/EllipticCurvesExtension.java +--- openjdk/jdk/src/share/classes/sun/security/ssl/EllipticCurvesExtension.java ++++ openjdk/jdk/src/share/classes/sun/security/ssl/EllipticCurvesExtension.java +@@ -168,20 +168,10 @@ + "contains no supported elliptic curves"); + } + } else { // default curves +- int[] ids; +- if (requireFips) { +- ids = new int[] { +- // only NIST curves in FIPS mode +- 23, 24, 25, 9, 10, 11, 12, 13, 14, +- }; +- } else { +- ids = new int[] { +- // NIST curves first +- 23, 24, 25, 9, 10, 11, 12, 13, 14, +- // non-NIST curves +- 22, +- }; +- } ++ int[] ids = new int[] { ++ // NSS currently only supports these three NIST curves ++ 23, 24, 25 ++ }; + + idList = new ArrayList<>(ids.length); + for (int curveId : ids) { diff --git a/SOURCES/pr3393-rh1273760-support_rsaandmgf1_with_sha_in_pkcs11.patch b/SOURCES/pr3393-rh1273760-support_rsaandmgf1_with_sha_in_pkcs11.patch new file mode 100644 index 0000000..6cab1d1 --- /dev/null +++ b/SOURCES/pr3393-rh1273760-support_rsaandmgf1_with_sha_in_pkcs11.patch @@ -0,0 +1,220 @@ +diff --git openjdk.orig/jdk/src/share/classes/sun/security/pkcs11/P11Signature.java openjdk/jdk/src/share/classes/sun/security/pkcs11/P11Signature.java +--- openjdk.orig/jdk/src/share/classes/sun/security/pkcs11/P11Signature.java ++++ openjdk/jdk/src/share/classes/sun/security/pkcs11/P11Signature.java +@@ -87,8 +87,8 @@ + // name of the key algorithm, currently either RSA or DSA + private final String keyAlgorithm; + +- // mechanism id +- private final long mechanism; ++ // mechanism ++ private final CK_MECHANISM mechanism; + + // digest algorithm OID, if we encode RSA signature ourselves + private final ObjectIdentifier digestOID; +@@ -138,11 +138,62 @@ + super(); + this.token = token; + this.algorithm = algorithm; +- this.mechanism = mechanism; ++ CK_MECHANISM ckMechanism = new CK_MECHANISM(mechanism); ++ final CK_RSA_PKCS_PSS_PARAMS mechParams; + byte[] buffer = null; + ObjectIdentifier digestOID = null; + MessageDigest md = null; + switch ((int)mechanism) { ++ case (int)CKM_SHA1_RSA_PKCS_PSS: ++ mechParams = new CK_RSA_PKCS_PSS_PARAMS(); ++ mechParams.hashAlg = CKM_SHA_1; ++ mechParams.mgf = CKG_MGF1_SHA1; ++ mechParams.sLen = 20; ++ ckMechanism = new CK_MECHANISM(mechanism, mechParams); ++ this.keyAlgorithm = "RSA"; ++ this.type = T_UPDATE; ++ buffer = new byte[1]; ++ break; ++ case (int)CKM_SHA224_RSA_PKCS_PSS: ++ mechParams = new CK_RSA_PKCS_PSS_PARAMS(); ++ mechParams.hashAlg = CKM_SHA224; ++ mechParams.mgf = CKG_MGF1_SHA224; ++ mechParams.sLen = 28; ++ ckMechanism = new CK_MECHANISM(mechanism, mechParams); ++ this.keyAlgorithm = "RSA"; ++ this.type = T_UPDATE; ++ buffer = new byte[1]; ++ break; ++ case (int)CKM_SHA256_RSA_PKCS_PSS: ++ mechParams = new CK_RSA_PKCS_PSS_PARAMS(); ++ mechParams.hashAlg = CKM_SHA256; ++ mechParams.mgf = CKG_MGF1_SHA256; ++ mechParams.sLen = 32; ++ ckMechanism = new CK_MECHANISM(mechanism, mechParams); ++ this.keyAlgorithm = "RSA"; ++ this.type = T_UPDATE; ++ buffer = new byte[1]; ++ break; ++ case (int)CKM_SHA384_RSA_PKCS_PSS: ++ mechParams = new CK_RSA_PKCS_PSS_PARAMS(); ++ mechParams.hashAlg = CKM_SHA384; ++ mechParams.mgf = CKG_MGF1_SHA384; ++ mechParams.sLen = 48; ++ ckMechanism = new CK_MECHANISM(mechanism, mechParams); ++ this.keyAlgorithm = "RSA"; ++ this.type = T_UPDATE; ++ buffer = new byte[1]; ++ break; ++ case (int)CKM_SHA512_RSA_PKCS_PSS: ++ mechParams = new CK_RSA_PKCS_PSS_PARAMS(); ++ mechParams.hashAlg = CKM_SHA512; ++ mechParams.mgf = CKG_MGF1_SHA512; ++ mechParams.sLen = 64; ++ ckMechanism = new CK_MECHANISM(mechanism, mechParams); ++ this.keyAlgorithm = "RSA"; ++ this.type = T_UPDATE; ++ buffer = new byte[1]; ++ break; + case (int)CKM_MD2_RSA_PKCS: + case (int)CKM_MD5_RSA_PKCS: + case (int)CKM_SHA1_RSA_PKCS: +@@ -232,6 +283,7 @@ + default: + throw new ProviderException("Unknown mechanism: " + mechanism); + } ++ this.mechanism = ckMechanism; + this.buffer = buffer; + this.digestOID = digestOID; + this.md = md; +@@ -314,10 +366,10 @@ + } + if (mode == M_SIGN) { + token.p11.C_SignInit(session.id(), +- new CK_MECHANISM(mechanism), p11Key.keyID); ++ mechanism, p11Key.keyID); + } else { + token.p11.C_VerifyInit(session.id(), +- new CK_MECHANISM(mechanism), p11Key.keyID); ++ mechanism, p11Key.keyID); + } + initialized = true; + } catch (PKCS11Exception e) { +@@ -399,7 +451,8 @@ + } else if (algorithm.equals("SHA512withRSA")) { + encodedLength = 83; + } else { +- throw new ProviderException("Unknown signature algo: " + algorithm); ++ encodedLength = 0; ++ //throw new ProviderException("Unknown signature algo: " + algorithm); + } + if (encodedLength > maxDataSize) { + throw new InvalidKeyException +@@ -568,7 +621,7 @@ + if (type == T_DIGEST) { + digest = md.digest(); + } else { // T_RAW +- if (mechanism == CKM_DSA) { ++ if (mechanism.mechanism == CKM_DSA) { + if (bytesProcessed != buffer.length) { + throw new SignatureException + ("Data for RawDSA must be exactly 20 bytes long"); +@@ -588,7 +641,7 @@ + signature = token.p11.C_Sign(session.id(), digest); + } else { // RSA + byte[] data = encodeSignature(digest); +- if (mechanism == CKM_RSA_X_509) { ++ if (mechanism.mechanism == CKM_RSA_X_509) { + data = pkcs1Pad(data); + } + signature = token.p11.C_Sign(session.id(), data); +@@ -623,7 +676,7 @@ + if (type == T_DIGEST) { + digest = md.digest(); + } else { // T_RAW +- if (mechanism == CKM_DSA) { ++ if (mechanism.mechanism == CKM_DSA) { + if (bytesProcessed != buffer.length) { + throw new SignatureException + ("Data for RawDSA must be exactly 20 bytes long"); +@@ -643,7 +696,7 @@ + token.p11.C_Verify(session.id(), digest, signature); + } else { // RSA + byte[] data = encodeSignature(digest); +- if (mechanism == CKM_RSA_X_509) { ++ if (mechanism.mechanism == CKM_RSA_X_509) { + data = pkcs1Pad(data); + } + token.p11.C_Verify(session.id(), data, signature); +diff --git openjdk.orig/jdk/src/share/classes/sun/security/pkcs11/SunPKCS11.java openjdk/jdk/src/share/classes/sun/security/pkcs11/SunPKCS11.java +--- openjdk.orig/jdk/src/share/classes/sun/security/pkcs11/SunPKCS11.java ++++ openjdk/jdk/src/share/classes/sun/security/pkcs11/SunPKCS11.java +@@ -729,6 +729,16 @@ + d(SIG, "SHA512withRSA", P11Signature, + s("1.2.840.113549.1.1.13", "OID.1.2.840.113549.1.1.13"), + m(CKM_SHA512_RSA_PKCS, CKM_RSA_PKCS, CKM_RSA_X_509)); ++ d(SIG, "SHA1withRSAandMGF1", P11Signature, ++ m(CKM_SHA1_RSA_PKCS_PSS)); ++ d(SIG, "SHA224withRSAandMGF1", P11Signature, ++ m(CKM_SHA224_RSA_PKCS_PSS)); ++ d(SIG, "SHA256withRSAandMGF1", P11Signature, ++ m(CKM_SHA256_RSA_PKCS_PSS)); ++ d(SIG, "SHA384withRSAandMGF1", P11Signature, ++ m(CKM_SHA384_RSA_PKCS_PSS)); ++ d(SIG, "SHA512withRSAandMGF1", P11Signature, ++ m(CKM_SHA512_RSA_PKCS_PSS)); + + d(KG, "SunTlsRsaPremasterSecret", + "sun.security.pkcs11.P11TlsRsaPremasterSecretGenerator", +diff --git openjdk.orig/jdk/src/share/classes/sun/security/pkcs11/Token.java openjdk/jdk/src/share/classes/sun/security/pkcs11/Token.java +--- openjdk.orig/jdk/src/share/classes/sun/security/pkcs11/Token.java ++++ openjdk/jdk/src/share/classes/sun/security/pkcs11/Token.java +@@ -377,6 +377,10 @@ + return keyStore; + } + ++ CK_MECHANISM_INFO getMechanismInfo(CK_MECHANISM mechanism) throws PKCS11Exception { ++ return getMechanismInfo(mechanism.mechanism); ++ } ++ + CK_MECHANISM_INFO getMechanismInfo(long mechanism) throws PKCS11Exception { + CK_MECHANISM_INFO result = mechInfoMap.get(mechanism); + if (result == null) { +diff --git openjdk.orig/jdk/src/share/classes/sun/security/pkcs11/wrapper/CK_MECHANISM.java openjdk/jdk/src/share/classes/sun/security/pkcs11/wrapper/CK_MECHANISM.java +--- openjdk.orig/jdk/src/share/classes/sun/security/pkcs11/wrapper/CK_MECHANISM.java ++++ openjdk/jdk/src/share/classes/sun/security/pkcs11/wrapper/CK_MECHANISM.java +@@ -116,6 +116,10 @@ + init(mechanism, params); + } + ++ public CK_MECHANISM(long mechanism, CK_RSA_PKCS_PSS_PARAMS params) { ++ init(mechanism, params); ++ } ++ + public CK_MECHANISM(long mechanism, CK_SSL3_KEY_MAT_PARAMS params) { + init(mechanism, params); + } +diff --git openjdk.orig/jdk/src/share/classes/sun/security/pkcs11/wrapper/PKCS11Constants.java openjdk/jdk/src/share/classes/sun/security/pkcs11/wrapper/PKCS11Constants.java +--- openjdk.orig/jdk/src/share/classes/sun/security/pkcs11/wrapper/PKCS11Constants.java ++++ openjdk/jdk/src/share/classes/sun/security/pkcs11/wrapper/PKCS11Constants.java +@@ -458,6 +458,12 @@ + public static final long CKM_SHA384_RSA_PKCS = 0x00000041L; + public static final long CKM_SHA512_RSA_PKCS = 0x00000042L; + ++ // v2.30 ++ public static final long CKM_SHA256_RSA_PKCS_PSS = 0x00000043L; ++ public static final long CKM_SHA384_RSA_PKCS_PSS = 0x00000044L; ++ public static final long CKM_SHA512_RSA_PKCS_PSS = 0x00000045L; ++ ++ + public static final long CKM_RC2_KEY_GEN = 0x00000100L; + public static final long CKM_RC2_ECB = 0x00000101L; + public static final long CKM_RC2_CBC = 0x00000102L; +@@ -919,6 +925,10 @@ + + /* The following MGFs are defined */ + public static final long CKG_MGF1_SHA1 = 0x00000001L; ++ public static final long CKG_MGF1_SHA256 = 0x00000002L; ++ public static final long CKG_MGF1_SHA384 = 0x00000003L; ++ public static final long CKG_MGF1_SHA512 = 0x00000004L; ++ + // new for v2.20 amendment 3 + public static final long CKG_MGF1_SHA224 = 0x00000005L; + diff --git a/SOURCES/remove-buildids.sh b/SOURCES/remove-buildids.sh new file mode 100644 index 0000000..b31ecf6 --- /dev/null +++ b/SOURCES/remove-buildids.sh @@ -0,0 +1,28 @@ +#!/bin/bash + +JAVA_HOME=$1 + +# remove build id in ELF file $1 +remove_buildid() { + echo "Removing build id from $1" + objcopy --rename-section=.note.gnu.build-id=.ignore.note.gnu.build-id "$1" +} + +remove_buildids_in() { + for f in $(find $1 -type f) ; do + echo "$f" + if [ -f $f ]; then + file $f | grep ELF > /dev/null 2>&1 + is_elf=$? + if [ $is_elf -eq 0 ] ; then + remove_buildid $f + fi + fi + done +} + +remove_buildids_in ${JAVA_HOME}/bin +remove_buildids_in ${JAVA_HOME}/lib +remove_buildids_in ${JAVA_HOME}/demo +remove_buildids_in ${JAVA_HOME}/jre/bin +remove_buildids_in ${JAVA_HOME}/jre/lib diff --git a/SOURCES/remove-intree-libraries.sh b/SOURCES/remove-intree-libraries.sh new file mode 100644 index 0000000..1aa81b8 --- /dev/null +++ b/SOURCES/remove-intree-libraries.sh @@ -0,0 +1,82 @@ +#!/bin/sh + +ZIP_SRC=openjdk/jdk/src/share/native/java/util/zip/zlib +JPEG_SRC=openjdk/jdk/src/share/native/sun/awt/image/jpeg/jpeg-6b +GIF_SRC=openjdk/jdk/src/share/native/sun/awt/giflib +PNG_SRC=openjdk/jdk/src/share/native/sun/awt/libpng +LCMS_SRC=openjdk/jdk/src/share/native/sun/java2d/cmm/lcms +PCSC_SRC=openjdk/jdk/src/solaris/native/sun/security/smartcardio/MUSCLE + +echo "Removing built-in libs (they will be linked)" + +echo "Removing zlib" +if [ ! -d ${ZIP_SRC} ]; then + echo "${ZIP_SRC} does not exist. Refusing to proceed." + exit 1 +fi +rm -rvf ${ZIP_SRC} + +echo "Removing libjpeg" +if [ ! -f ${JPEG_SRC}/jdhuff.c ]; then # some file that sound definitely exist + echo "${JPEG_SRC} does not contain jpeg sources. Refusing to proceed." + exit 1 +fi + +rm -rvf ${JPEG_SRC} + +echo "Removing giflib" +if [ ! -d ${GIF_SRC} ]; then + echo "${GIF_SRC} does not exist. Refusing to proceed." + exit 1 +fi +rm -rvf ${GIF_SRC} + +echo "Removing libpng" +if [ ! -d ${PNG_SRC} ]; then + echo "${PNG_SRC} does not exist. Refusing to proceed." + exit 1 +fi +rm -rvf ${PNG_SRC} + +# LCMS 2 is disabled until security issues are resolved +if [ ! true ]; then +echo "Removing lcms" +if [ ! -d ${LCMS_SRC} ]; then + echo "${LCMS_SRC} does not exist. Refusing to proceed." + exit 1 +fi +rm -vf ${LCMS_SRC}/cmscam02.c +rm -vf ${LCMS_SRC}/cmscgats.c +rm -vf ${LCMS_SRC}/cmscnvrt.c +rm -vf ${LCMS_SRC}/cmserr.c +rm -vf ${LCMS_SRC}/cmsgamma.c +rm -vf ${LCMS_SRC}/cmsgmt.c +rm -vf ${LCMS_SRC}/cmsintrp.c +rm -vf ${LCMS_SRC}/cmsio0.c +rm -vf ${LCMS_SRC}/cmsio1.c +rm -vf ${LCMS_SRC}/cmslut.c +rm -vf ${LCMS_SRC}/cmsmd5.c +rm -vf ${LCMS_SRC}/cmsmtrx.c +rm -vf ${LCMS_SRC}/cmsnamed.c +rm -vf ${LCMS_SRC}/cmsopt.c +rm -vf ${LCMS_SRC}/cmspack.c +rm -vf ${LCMS_SRC}/cmspcs.c +rm -vf ${LCMS_SRC}/cmsplugin.c +rm -vf ${LCMS_SRC}/cmsps2.c +rm -vf ${LCMS_SRC}/cmssamp.c +rm -vf ${LCMS_SRC}/cmssm.c +rm -vf ${LCMS_SRC}/cmstypes.c +rm -vf ${LCMS_SRC}/cmsvirt.c +rm -vf ${LCMS_SRC}/cmswtpnt.c +rm -vf ${LCMS_SRC}/cmsxform.c +rm -vf ${LCMS_SRC}/lcms2.h +rm -vf ${LCMS_SRC}/lcms2_internal.h +rm -vf ${LCMS_SRC}/lcms2_plugin.h +fi + +echo "Removing libpcsc headers" +if [ ! -d ${PCSC_SRC} ]; then + echo "${PCSC_SRC} does not exist. Refusing to proceed." + exit 1 +fi +rm -rvf ${PCSC_SRC} diff --git a/SOURCES/repackReproduciblePolycies.sh b/SOURCES/repackReproduciblePolycies.sh new file mode 100644 index 0000000..271cb74 --- /dev/null +++ b/SOURCES/repackReproduciblePolycies.sh @@ -0,0 +1,37 @@ +#!/bin/sh +# https://bugzilla.redhat.com/show_bug.cgi?id=1142153 +M=META-INF/MANIFEST.MF +#P=/usr/lib/jvm/java/jre/lib/security +P=$1/lib/security +for f in local_policy.jar US_export_policy.jar ; do +ORIG=$P/$f +echo "processing $f ($ORIG)" +if [ ! -f $ORIG ]; then + echo "File not found! $ORIG" + continue +fi +d=`mktemp -d` +NW=$d/$f + pushd $d + jar xf $ORIG + cat $M +# sed -i "s/Created-By.*/Created-By: 1.7.0/g" $M + sed -i "s/Created-By.*/Created-By: $2/g" $M + cat $M + find . -exec touch -t 201401010000 {} + + zip -rX $f * + popd + echo "replacing $ORIG" + touch -t 201401010000 $ORIG + md5sum $ORIG + sha256sum $ORIG + echo "by $NW" + md5sum $NW + sha256sum $NW + touch -t 201401010000 $NW + cp $NW $ORIG + md5sum $ORIG + sha256sum $ORIG + touch -t 201401010000 $ORIG + rm -rfv $d +done diff --git a/SOURCES/rh1648241-abrt_friendly_hs_log_jdk7.patch b/SOURCES/rh1648241-abrt_friendly_hs_log_jdk7.patch new file mode 100644 index 0000000..dba02bd --- /dev/null +++ b/SOURCES/rh1648241-abrt_friendly_hs_log_jdk7.patch @@ -0,0 +1,35 @@ +--- openjdk/hotspot/src/share/vm/utilities/vmError.cpp 2012-02-02 16:17:24.476664897 +0100 ++++ openjdk/hotspot/src/share/vm/utilities/vmError.cpp 2012-02-02 16:17:24.476664897 +0100 +@@ -929,6 +929,7 @@ + } + } + ++ /* + if (fd == -1) { + const char *cwd = os::get_current_directory(buffer, sizeof(buffer)); + size_t len = strlen(cwd); +@@ -938,6 +939,24 @@ + os::file_separator(), os::current_process_id()); + fd = open(buffer, O_RDWR | O_CREAT | O_EXCL, 0666); + } ++ */ ++ ++ if (fd == -1) { ++ const char * tmpdir = os::get_temp_directory(); ++ // try temp directory if it exists. ++ if (tmpdir != NULL && tmpdir[0] != '\0') { ++ jio_snprintf(buffer, sizeof(buffer), "%s%sjvm-%u", ++ tmpdir, os::file_separator(), os::current_process_id()); ++ // if mkdir() failed, hs_err will be created in temporary directory ++ if (!mkdir(buffer, 0700)) { // only read+execute flags are needed ++ // but we need to write into the directory too ++ jio_snprintf(buffer, sizeof(buffer), "%s%sjvm-%u%shs_error.log", ++ tmpdir, os::file_separator(), os::current_process_id(), ++ os::file_separator()); ++ fd = open(buffer, O_WRONLY | O_CREAT | O_EXCL, 0444); // read-only file ++ } ++ } ++ } + + if (fd == -1) { + const char * tmpdir = os::get_temp_directory(); diff --git a/SOURCES/rh1648242-accessible_toolkit_crash_do_not_break_jvm.patch b/SOURCES/rh1648242-accessible_toolkit_crash_do_not_break_jvm.patch new file mode 100644 index 0000000..222dcfb --- /dev/null +++ b/SOURCES/rh1648242-accessible_toolkit_crash_do_not_break_jvm.patch @@ -0,0 +1,16 @@ +diff -uNr openjdk-orig/jdk/src/share/classes/java/awt/Toolkit.java openjdk/jdk/src/share/classes/java/awt/Toolkit.java +--- openjdk-orig/jdk/src/share/classes/java/awt/Toolkit.java 2009-01-23 11:59:47.000000000 -0500 ++++ openjdk/jdk/src/share/classes/java/awt/Toolkit.java 2009-01-23 12:05:20.000000000 -0500 +@@ -871,7 +871,11 @@ + return null; + } + }); +- loadAssistiveTechnologies(); ++ try { ++ loadAssistiveTechnologies(); ++ } catch ( AWTError error) { ++ // ignore silently ++ } + } finally { + // Make sure to always re-enable the JIT. + java.lang.Compiler.enable(); diff --git a/SOURCES/rh1648254-javadoc_generated_during_all_variants_of_buid.patch b/SOURCES/rh1648254-javadoc_generated_during_all_variants_of_buid.patch new file mode 100644 index 0000000..8a130e4 --- /dev/null +++ b/SOURCES/rh1648254-javadoc_generated_during_all_variants_of_buid.patch @@ -0,0 +1,35 @@ +--- oldMakefile 2008-07-02 17:48:01.000000000 -0400 ++++ openjdk/Makefile 2008-07-02 17:48:09.000000000 -0400 +@@ -199,19 +199,19 @@ + + create_fresh_product_bootdir: FRC + $(MAKE) ALT_OUTPUTDIR=$(ABS_BOOTDIR_OUTPUTDIR) \ +- GENERATE_DOCS=false \ ++ GENERATE_DOCS=true \ + BOOT_CYCLE_SETTINGS= \ + build_product_image + + create_fresh_debug_bootdir: FRC + $(MAKE) ALT_OUTPUTDIR=$(ABS_BOOTDIR_OUTPUTDIR) \ +- GENERATE_DOCS=false \ ++ GENERATE_DOCS=true \ + BOOT_CYCLE_DEBUG_SETTINGS= \ + build_debug_image + + create_fresh_fastdebug_bootdir: FRC + $(MAKE) ALT_OUTPUTDIR=$(ABS_BOOTDIR_OUTPUTDIR) \ +- GENERATE_DOCS=false \ ++ GENERATE_DOCS=true \ + BOOT_CYCLE_DEBUG_SETTINGS= \ + build_fastdebug_image + +@@ -262,7 +262,7 @@ + $(MAKE) \ + ALT_OUTPUTDIR=$(ABS_OUTPUTDIR)/$(REL_JDK_OUTPUTDIR) \ + DEBUG_NAME=$(DEBUG_NAME) \ +- GENERATE_DOCS=false \ ++ GENERATE_DOCS=true \ + $(if $(findstring true,$(BUILD_INSTALL)),BUILD_INSTALL_BUNDLES=true,) \ + CREATE_DEBUGINFO_BUNDLES=true \ + $(BOOT_CYCLE_DEBUG_SETTINGS) \ + diff --git a/SOURCES/rh1648259-libsaproc_libjsig_compiled_with_g_to_provide_correct_debuginfo.patch b/SOURCES/rh1648259-libsaproc_libjsig_compiled_with_g_to_provide_correct_debuginfo.patch new file mode 100644 index 0000000..11776ef --- /dev/null +++ b/SOURCES/rh1648259-libsaproc_libjsig_compiled_with_g_to_provide_correct_debuginfo.patch @@ -0,0 +1,20 @@ +--- openjdk/hotspot/build/linux/makefiles/saproc.make_back 2009-12-14 13:35:46.000000000 +0100 ++++ openjdk/hotspot/make/linux/makefiles/saproc.make 2009-12-14 13:36:47.000000000 +0100 +@@ -95,6 +95,7 @@ + $(ALT_SAINCDIR) \ + $(SASRCFILES) \ + $(SA_LFLAGS) \ ++ -g \ + $(SA_DEBUG_CFLAGS) \ + $(EXTRA_CFLAGS) \ + -o $@ \ +--- openjdk/hotspot/build/linux/makefiles/jsig.make_back 2009-12-14 13:34:56.000000000 +0100 ++++ openjdk/hotspot/make/linux/makefiles/jsig.make 2009-12-14 13:35:31.000000000 +0100 +@@ -59,6 +59,7 @@ + $(LIBJSIG): $(JSIGSRCDIR)/jsig.c $(LIBJSIG_MAPFILE) + @echo Making signal interposition lib... + $(QUIETLY) $(CC) $(SYMFLAG) $(ARCHFLAG) $(SHARED_FLAG) $(PICFLAG) \ ++ -g \ + $(LFLAGS_JSIG) $(JSIG_DEBUG_CFLAGS) $(EXTRA_CFLAGS) -o $@ $< -ldl + $(QUIETLY) [ -f $(LIBJSIG_G) ] || { ln -s $@ $(LIBJSIG_G); } + ifeq ($(ENABLE_FULL_DEBUG_SYMBOLS),1) diff --git a/SOURCES/rh1648643-comment_out_freetype_check.patch b/SOURCES/rh1648643-comment_out_freetype_check.patch new file mode 100644 index 0000000..15c2d67 --- /dev/null +++ b/SOURCES/rh1648643-comment_out_freetype_check.patch @@ -0,0 +1,22 @@ +diff -up openjdk/jdk/make/common/shared/Sanity.gmk.sav openjdk/jdk/make/common/shared/Sanity.gmk +--- openjdk/jdk/make/common/shared/Sanity.gmk.sav 2012-02-14 16:12:48.000000000 -0500 ++++ openjdk/jdk/make/common/shared/Sanity.gmk 2012-03-07 17:31:26.153840755 -0500 +@@ -814,12 +814,12 @@ ifdef OPENJDK + @(($(CD) $(BUILDDIR)/tools/freetypecheck && $(MAKE)) || \ + $(ECHO) "Failed to build freetypecheck." ) > $@ + +- sane-freetype: $(TEMPDIR)/freetypeinfo +- @if [ "`$(CAT) $< | $(GREP) Fail`" != "" ]; then \ +- $(ECHO) "ERROR: FreeType version " $(REQUIRED_FREETYPE_VERSION) \ +- " or higher is required. \n" \ +- "`$(CAT) $<` \n" >> $(ERROR_FILE) ; \ +- fi ++# sane-freetype: $(TEMPDIR)/freetypeinfo ++# @if [ "`$(CAT) $< | $(GREP) Fail`" != "" ]; then \ ++# $(ECHO) "ERROR: FreeType version " $(REQUIRED_FREETYPE_VERSION) \ ++# " or higher is required. \n" \ ++# "`$(CAT) $<` \n" >> $(ERROR_FILE) ; \ ++# fi + else + #do nothing (cross-compiling) + sane-freetype: diff --git a/SOURCES/rh1648644-java_access_bridge_privlidged_security.patch b/SOURCES/rh1648644-java_access_bridge_privlidged_security.patch new file mode 100644 index 0000000..bd59cad --- /dev/null +++ b/SOURCES/rh1648644-java_access_bridge_privlidged_security.patch @@ -0,0 +1,21 @@ +diff --git a/src/share/lib/security/java.security-linux b/src/share/lib/security/java.security-linux +--- openjdk/jdk/src/share/lib/security/java.security-linux ++++ openjdk/jdk/src/share/lib/security/java.security-linux +@@ -168,6 +168,8 @@ + com.sun.org.glassfish.,\ + jdk.xml.internal.,\ + oracle.jrockit.jfr.,\ ++ org.GNOME.Accessibility.,\ ++ org.GNOME.Bonobo.,\ + org.jcp.xml.dsig.internal. + # + # List of comma-separated packages that start with or equal this string +@@ -211,6 +213,8 @@ + com.sun.org.glassfish.,\ + jdk.xml.internal.,\ + oracle.jrockit.jfr.,\ ++ org.GNOME.Accessibility.,\ ++ org.GNOME.Bonobo.,\ + org.jcp.xml.dsig.internal. + # + # Determines whether this properties file can be appended to diff --git a/SOURCES/rh1648645-java_access_bridge_loading_java_version_privileged_tck.patch b/SOURCES/rh1648645-java_access_bridge_loading_java_version_privileged_tck.patch new file mode 100644 index 0000000..36a23c0 --- /dev/null +++ b/SOURCES/rh1648645-java_access_bridge_loading_java_version_privileged_tck.patch @@ -0,0 +1,25 @@ +--- java-access-bridge-1.22.0/bridge/org/GNOME/Accessibility/JavaBridge.java.orig 2008-05-22 11:27:00.000000000 -0400 ++++ java-access-bridge-1.22.0/bridge/org/GNOME/Accessibility/JavaBridge.java 2008-05-22 11:28:02.000000000 -0400 +@@ -34,6 +34,9 @@ + import javax.accessibility.AccessibleRole; + import javax.accessibility.AccessibleText; + import javax.accessibility.AccessibleEditableText; ++import java.security.PrivilegedAction; ++import java.security.AccessController; ++ + + public class JavaBridge { + +@@ -332,7 +335,11 @@ + System.err.println ("Java Accessibility Bridge for GNOME loaded.\n"); + + // Not sure what kind of arguments should be sent to ORB +- String vm_rev = System.getProperty("java.version"); ++ String vm_rev = (String) AccessController.doPrivileged(new PrivilegedAction() { ++ public java.lang.Object run() { ++ return System.getProperty("java.version"); ++ } ++ }); + + if (vm_rev.compareTo("1.4.0") < 0) { + System.err.println("WARNING: Java Accessibility Bridge " + diff --git a/SOURCES/rh1649760-make_alsa_based_mixer_default_when_pulseaudio_build.patch b/SOURCES/rh1649760-make_alsa_based_mixer_default_when_pulseaudio_build.patch new file mode 100644 index 0000000..271a323 --- /dev/null +++ b/SOURCES/rh1649760-make_alsa_based_mixer_default_when_pulseaudio_build.patch @@ -0,0 +1,16 @@ +--- openjdk/jdk/src/share/lib/sound.properties 2008-08-28 04:15:18.000000000 -0400 ++++ openjdk/jdk/src/share/lib/sound.properties 2008-10-03 16:59:21.000000000 -0400 +@@ -37,3 +37,13 @@ + # Specify the default Receiver by provider and name: + # javax.sound.midi.Receiver=com.sun.media.sound.MidiProvider#SunMIDI1 + # ++ ++# javax.sound.sampled.Clip=org.classpath.icedtea.pulseaudio.PulseAudioMixerProvider ++# javax.sound.sampled.Port=org.classpath.icedtea.pulseaudio.PulseAudioMixerProvider ++# javax.sound.sampled.SourceDataLine=org.classpath.icedtea.pulseaudio.PulseAudioMixerProvider ++# javax.sound.sampled.TargetDataLine=org.classpath.icedtea.pulseaudio.PulseAudioMixerProvider ++ ++javax.sound.sampled.Clip=com.sun.media.sound.DirectAudioDeviceProvider ++javax.sound.sampled.Port=com.sun.media.sound.PortMixerProvider ++javax.sound.sampled.SourceDataLine=com.sun.media.sound.DirectAudioDeviceProvider ++javax.sound.sampled.TargetDataLine=com.sun.media.sound.DirectAudioDeviceProvider diff --git a/SOURCES/rh1649777-add_rhino_support_jdk7.patch b/SOURCES/rh1649777-add_rhino_support_jdk7.patch new file mode 100644 index 0000000..bd8ab68 --- /dev/null +++ b/SOURCES/rh1649777-add_rhino_support_jdk7.patch @@ -0,0 +1,157 @@ +diff -ur openjdk.orig/jdk/make/com/sun/Makefile openjdk/jdk/make/com/sun/Makefile +--- openjdk.orig/jdk/make/com/sun/Makefile 2012-02-14 16:12:48.000000000 -0500 ++++ openjdk/jdk/make/com/sun/Makefile 2012-02-22 14:25:10.327518016 -0500 +@@ -31,13 +31,6 @@ + PRODUCT = sun + include $(BUILDDIR)/common/Defs.gmk + +-ifndef OPENJDK +- ORG_EXISTS := $(call DirExists,$(CLOSED_SRC)/share/classes/sun/org,,) +- ifneq ("$(ORG_EXISTS)", "") +- SCRIPT_SUBDIR = script +- endif +-endif +- + # jarsigner is part of JRE + SUBDIRS = java security net/ssl jarsigner + +@@ -45,7 +38,7 @@ + SUBDIRS_desktop = image + SUBDIRS_enterprise = crypto/provider jndi \ + org rowset net/httpserver +-SUBDIRS_misc = $(SCRIPT_SUBDIR) tracing nio demo ++SUBDIRS_misc = script tracing nio demo + + # Omit mirror since it's built with the apt tool. + SUBDIRS_tools = tools +diff -ur openjdk.orig/jdk/make/com/sun/script/Makefile openjdk/jdk/make/com/sun/script/Makefile +--- openjdk.orig/jdk/make/com/sun/script/Makefile 2012-02-14 16:12:48.000000000 -0500 ++++ openjdk/jdk/make/com/sun/script/Makefile 2012-02-22 14:10:53.325225237 -0500 +@@ -31,6 +31,8 @@ + + AUTO_FILES_JAVA_DIRS = com/sun/script + ++OTHER_JAVACFLAGS = -classpath $(RHINO_JAR) ++ + # + # Files that need to be copied + # +diff -ur openjdk.orig/jdk/make/common/Release.gmk openjdk/jdk/make/common/Release.gmk +--- openjdk.orig/jdk/make/common/Release.gmk 2012-02-14 16:12:48.000000000 -0500 ++++ openjdk/jdk/make/common/Release.gmk 2012-02-22 14:10:53.325225237 -0500 +@@ -766,6 +766,7 @@ + $(CP) $(RT_JAR) $(JRE_IMAGE_DIR)/lib/rt.jar + $(CP) $(RESOURCES_JAR) $(JRE_IMAGE_DIR)/lib/resources.jar + $(CP) $(JSSE_JAR) $(JRE_IMAGE_DIR)/lib/jsse.jar ++ $(CP) $(RHINO_JAR) $(JRE_IMAGE_DIR)/lib/rhino.jar + ifneq ($(JFR_JAR),) + $(CP) $(JFR_JAR) $(JRE_IMAGE_DIR)/lib/jfr.jar + endif +diff -ur openjdk.orig/jdk/src/share/classes/com/sun/script/javascript/ExternalScriptable.java openjdk/jdk/src/share/classes/com/sun/script/javascript/ExternalScriptable.java +--- openjdk.orig/jdk/src/share/classes/com/sun/script/javascript/ExternalScriptable.java 2012-02-14 16:12:49.000000000 -0500 ++++ openjdk/jdk/src/share/classes/com/sun/script/javascript/ExternalScriptable.java 2012-02-22 14:10:53.325225237 -0500 +@@ -24,7 +24,7 @@ + */ + + package com.sun.script.javascript; +-import sun.org.mozilla.javascript.internal.*; ++import sun.org.mozilla.javascript.*; + import javax.script.*; + import java.util.*; + +diff -ur openjdk.orig/jdk/src/share/classes/com/sun/script/javascript/JavaAdapter.java openjdk/jdk/src/share/classes/com/sun/script/javascript/JavaAdapter.java +--- openjdk.orig/jdk/src/share/classes/com/sun/script/javascript/JavaAdapter.java 2012-02-14 16:12:49.000000000 -0500 ++++ openjdk/jdk/src/share/classes/com/sun/script/javascript/JavaAdapter.java 2012-02-22 14:10:53.325225237 -0500 +@@ -26,7 +26,7 @@ + package com.sun.script.javascript; + + import javax.script.Invocable; +-import sun.org.mozilla.javascript.internal.*; ++import sun.org.mozilla.javascript.*; + + /** + * This class implements Rhino-like JavaAdapter to help implement a Java +diff -ur openjdk.orig/jdk/src/share/classes/com/sun/script/javascript/JSAdapter.java openjdk/jdk/src/share/classes/com/sun/script/javascript/JSAdapter.java +--- openjdk.orig/jdk/src/share/classes/com/sun/script/javascript/JSAdapter.java 2012-02-14 16:12:49.000000000 -0500 ++++ openjdk/jdk/src/share/classes/com/sun/script/javascript/JSAdapter.java 2012-02-22 14:10:53.326225216 -0500 +@@ -25,7 +25,7 @@ + + package com.sun.script.javascript; + +-import sun.org.mozilla.javascript.internal.*; ++import sun.org.mozilla.javascript.*; + import java.util.*; + + /** +diff -ur openjdk.orig/jdk/src/share/classes/com/sun/script/javascript/RhinoClassShutter.java openjdk/jdk/src/share/classes/com/sun/script/javascript/RhinoClassShutter.java +--- openjdk.orig/jdk/src/share/classes/com/sun/script/javascript/RhinoClassShutter.java 2012-02-14 16:12:49.000000000 -0500 ++++ openjdk/jdk/src/share/classes/com/sun/script/javascript/RhinoClassShutter.java 2012-02-22 14:10:53.326225216 -0500 +@@ -26,7 +26,7 @@ + package com.sun.script.javascript; + + import java.util.*; +-import sun.org.mozilla.javascript.internal.*; ++import sun.org.mozilla.javascript.*; + + /** + * This class prevents script access to certain sensitive classes. +diff -ur openjdk.orig/jdk/src/share/classes/com/sun/script/javascript/RhinoCompiledScript.java openjdk/jdk/src/share/classes/com/sun/script/javascript/RhinoCompiledScript.java +--- openjdk.orig/jdk/src/share/classes/com/sun/script/javascript/RhinoCompiledScript.java 2012-02-14 16:12:49.000000000 -0500 ++++ openjdk/jdk/src/share/classes/com/sun/script/javascript/RhinoCompiledScript.java 2012-02-22 14:10:53.326225216 -0500 +@@ -25,7 +25,7 @@ + + package com.sun.script.javascript; + import javax.script.*; +-import sun.org.mozilla.javascript.internal.*; ++import sun.org.mozilla.javascript.*; + + /** + * Represents compiled JavaScript code. +diff -ur openjdk.orig/jdk/src/share/classes/com/sun/script/javascript/RhinoScriptEngineFactory.java openjdk/jdk/src/share/classes/com/sun/script/javascript/RhinoScriptEngineFactory.java +--- openjdk.orig/jdk/src/share/classes/com/sun/script/javascript/RhinoScriptEngineFactory.java 2012-02-14 16:12:49.000000000 -0500 ++++ openjdk/jdk/src/share/classes/com/sun/script/javascript/RhinoScriptEngineFactory.java 2012-02-22 14:10:53.326225216 -0500 +@@ -26,7 +26,7 @@ + package com.sun.script.javascript; + import javax.script.*; + import java.util.*; +-import sun.org.mozilla.javascript.internal.*; ++import sun.org.mozilla.javascript.*; + import com.sun.script.util.*; + + /** +diff -ur openjdk.orig/jdk/src/share/classes/com/sun/script/javascript/RhinoScriptEngine.java openjdk/jdk/src/share/classes/com/sun/script/javascript/RhinoScriptEngine.java +--- openjdk.orig/jdk/src/share/classes/com/sun/script/javascript/RhinoScriptEngine.java 2012-02-14 16:12:49.000000000 -0500 ++++ openjdk/jdk/src/share/classes/com/sun/script/javascript/RhinoScriptEngine.java 2012-02-22 14:10:53.327225198 -0500 +@@ -26,7 +26,7 @@ + package com.sun.script.javascript; + import com.sun.script.util.*; + import javax.script.*; +-import sun.org.mozilla.javascript.internal.*; ++import sun.org.mozilla.javascript.*; + import java.lang.reflect.Method; + import java.io.*; + import java.security.*; +diff -ur openjdk.orig/jdk/src/share/classes/com/sun/script/javascript/RhinoTopLevel.java openjdk/jdk/src/share/classes/com/sun/script/javascript/RhinoTopLevel.java +--- openjdk.orig/jdk/src/share/classes/com/sun/script/javascript/RhinoTopLevel.java 2012-02-14 16:12:49.000000000 -0500 ++++ openjdk/jdk/src/share/classes/com/sun/script/javascript/RhinoTopLevel.java 2012-02-22 14:10:53.327225198 -0500 +@@ -25,7 +25,7 @@ + + package com.sun.script.javascript; + +-import sun.org.mozilla.javascript.internal.*; ++import sun.org.mozilla.javascript.*; + import javax.script.*; + import java.security.AccessControlContext; + +diff -ur openjdk.orig/jdk/src/share/classes/com/sun/script/javascript/RhinoWrapFactory.java openjdk/jdk/src/share/classes/com/sun/script/javascript/RhinoWrapFactory.java +--- openjdk.orig/jdk/src/share/classes/com/sun/script/javascript/RhinoWrapFactory.java 2012-02-14 16:12:49.000000000 -0500 ++++ openjdk/jdk/src/share/classes/com/sun/script/javascript/RhinoWrapFactory.java 2012-02-22 14:10:53.327225198 -0500 +@@ -27,7 +27,7 @@ + + import java.lang.reflect.*; + import static sun.security.util.SecurityConstants.*; +-import sun.org.mozilla.javascript.internal.*; ++import sun.org.mozilla.javascript.*; + + /** + * This wrap factory is used for security reasons. JSR 223 script diff --git a/SPECS/java-1.7.0-openjdk.spec b/SPECS/java-1.7.0-openjdk.spec new file mode 100644 index 0000000..c419dea --- /dev/null +++ b/SPECS/java-1.7.0-openjdk.spec @@ -0,0 +1,2452 @@ +# The -g flag says to use strip -g instead of full strip on DSOs or EXEs. +# This fixes detailed NMT and other tools which need minimal debug info. +# See: https://bugzilla.redhat.com/show_bug.cgi?id=1520879 +%global _find_debuginfo_opts -g + +# If debug is 1, OpenJDK is built with all debug info present. +%global debug 0 + +# we remove the build id notes explicitly to avoid generating (potentially +# conflicting) files in the -debuginfo package +%undefine _missing_build_ids_terminate_build + +%global icedtea_version 2.6.19 +%global icedtea_snapshot %{nil} +%global hg_tag icedtea-%{icedtea_version}%{icedtea_snapshot} + +%global aarch64 aarch64 arm64 armv8 +#sometimes we need to distinguish big and little endian PPC64 +%global ppc64le ppc64le +%global ppc64be ppc64 ppc64p7 +%global multilib_arches %{power64} sparc64 x86_64 +%global jit_arches %{ix86} x86_64 sparcv9 sparc64 %{ppc64be} %{ppc64le} %{aarch64} + +# With disabled nss is NSS deactivated, so in NSS_LIBDIR can be wrong path +# the initialisation must be here. LAter the pkg-connfig have bugy behaviour +#looks liekopenjdk RPM specific bug +# Always set this so the nss.cfg file is not broken +%global NSS_LIBDIR %(pkg-config --variable=libdir nss) +%global NSS_LIBS %(pkg-config --libs nss) +%global NSS_CFLAGS %(pkg-config --cflags nss-softokn) +# see https://bugzilla.redhat.com/show_bug.cgi?id=1332456 +%global NSSSOFTOKN_BUILDTIME_NUMBER %(pkg-config --modversion nss-softokn || : ) +%global NSS_BUILDTIME_NUMBER %(pkg-config --modversion nss || : ) +#this is worakround for processing of requires during srpm creation +%global NSSSOFTOKN_BUILDTIME_VERSION %(if [ "x%{NSSSOFTOKN_BUILDTIME_NUMBER}" == "x" ] ; then echo "" ;else echo ">= %{NSSSOFTOKN_BUILDTIME_NUMBER}" ;fi) +%global NSS_BUILDTIME_VERSION %(if [ "x%{NSS_BUILDTIME_NUMBER}" == "x" ] ; then echo "" ;else echo ">= %{NSS_BUILDTIME_NUMBER}" ;fi) + +# Fix for https://bugzilla.redhat.com/show_bug.cgi?id=1111349. +# See also https://bugzilla.redhat.com/show_bug.cgi?id=1590796 +# as to why some libraries *cannot* be excluded. In particular, +# these are: +# libjsig.so, libjava.so, libjawt.so, libjvm.so and libverify.so +%global _privatelibs libatk-wrapper[.]so.*|libattach[.]so.*|libawt_headless[.]so.*|libawt[.]so.*|libawt_xawt[.]so.*|libdt_socket[.]so.*|libfontmanager[.]so.*|libhprof[.]so.*|libinstrument[.]so.*|libj2gss[.]so.*|libj2pcsc[.]so.*|libj2pkcs11[.]so.*|libjaas_unix[.]so.*|libjava_crw_demo[.]so.*|libjavajpeg[.]so.*|libjdwp[.]so.*|libjli[.]so.*|libjsdt[.]so.*|libjsoundalsa[.]so.*|libjsound[.]so.*|libmawt[.]so.*|libmanagement[.]so.*|libmlib_image[.]so.*|libnet[.]so.*|libnio[.]so.*|libnpt[.]so.*|libsaproc[.]so.*|libjavasctp[.]so.*|libjavalcms[.]so.*|libjavagtk[.]so.*|libsplashscreen[.]so.*|libsunec[.]so.*|libunpack[.]so.*|libzip[.]so.*|lib[.]so\\(SUNWprivate_.* + +%global __provides_exclude ^(%{_privatelibs})$ +%global __requires_exclude ^(%{_privatelibs})$ + +# In some cases, the arch used by the JDK does +# not match _arch. +# Also, in some cases, the machine name used by SystemTap +# does not match that given by _build_cpu +%ifarch x86_64 +%global archbuild amd64 +%global archinstall amd64 +%global stapinstall x86_64 +%endif +%ifarch ppc +%global archbuild ppc +%global archinstall ppc +%global archdef PPC +%global stapinstall powerpc +%endif +%ifarch %{ppc64be} +%global archbuild ppc64 +%global archinstall ppc64 +%global archdef PPC +%global stapinstall powerpc +%endif +%ifarch %{ppc64le} +%global archbuild ppc64le +%global archinstall ppc64le +%global archdef PPC64 +%global stapinstall powerpc +%endif +%ifarch %{ix86} +%global archbuild i586 +%global archinstall i386 +%global stapinstall i386 +%endif +%ifarch ia64 +%global archbuild ia64 +%global archinstall ia64 +%global stapinstall ia64 +%endif +%ifarch s390 +%global archbuild s390 +%global archinstall s390 +%global archdef S390 +%global stapinstall s390 +%endif +%ifarch s390x +%global archbuild s390x +%global archinstall s390x +%global archdef S390 +%global stapinstall s390 +%endif +%ifarch %{arm} +%global archbuild arm +%global archinstall arm +%global archdef ARM +%global stapinstall arm +%endif +%ifarch %{aarch64} +%global archbuild aarch64 +%global archinstall aarch64 +%global archdef AARCH64 +%global stapinstall arm64 +%endif +# 32 bit sparc, optimized for v9 +%ifarch sparcv9 +%global archbuild sparc +%global archinstall sparc +%global stapinstall %{_build_cpu} +%endif +# 64 bit sparc +%ifarch sparc64 +%global archbuild sparcv9 +%global archinstall sparcv9 +%global stapinstall %{_build_cpu} +%endif +%ifnarch %{jit_arches} +%global archbuild %{_arch} +%global archinstall %{_arch} +%endif + +%if %{debug} +%global debugbuild debug_build +%else +%global debugbuild %{nil} +%endif + +# If hsbootstrap is 1, build HotSpot alone first and use that in the bootstrap JDK +# You can turn this on to avoid issues where HotSpot is broken in the bootstrap JDK +%ifarch %{jit_arches} +%global hsbootstrap 1 +%else +%global hsbootstrap 0 +%endif + +%global with_pulseaudio 1 + +%ifarch %{jit_arches} +%global with_systemtap 1 +%else +%global with_systemtap 0 +%endif + +# Convert an absolute path to a relative path. Each symbolic link is +# specified relative to the directory in which it is installed so that +# it will resolve properly within chrooted installations. +%global script 'use File::Spec; print File::Spec->abs2rel($ARGV[0], $ARGV[1])' +%global abs2rel %{__perl} -e %{script} + +# Hard-code libdir on 64-bit architectures to make the 64-bit JDK +# simply be another alternative. +%global LIBDIR %{_libdir} +#backuped original one +%ifarch %{multilib_arches} +%global syslibdir %{_prefix}/lib64 +%global _libdir %{_prefix}/lib +%else +%global syslibdir %{_libdir} +%endif + +# Standard JPackage naming and versioning defines. +%global origin openjdk +%global top_level_dir_name %{origin} +%global updatever 231 +%global buildver 01 +# Keep priority on 7digits in case updatever>9 +%global priority 1700%{updatever} +%global javaver 1.7.0 + +%global sdkdir %{uniquesuffix} +%global jrelnk jre-%{javaver}-%{origin}-%{version}-%{release}.%{_arch} + +%global jredir %{sdkdir}/jre +%global sdkbindir %{_jvmdir}/%{sdkdir}/bin +%global jrebindir %{_jvmdir}/%{jredir}/bin +%global jvmjardir %{_jvmjardir}/%{uniquesuffix} + +%global rpm_state_dir %{_localstatedir}/lib/rpm-state/ + +%global fullversion %{name}-%{version}-%{release} + +%global uniquesuffix %{fullversion}.%{_arch} +#we can copy the javadoc to not arched dir, or made it not noarch +%global uniquejavadocdir %{fullversion} + +%ifarch %{jit_arches} +# Where to install systemtap tapset (links) +# We would like these to be in a package specific subdir, +# but currently systemtap doesn't support that, so we have to +# use the root tapset dir for now. To distinquish between 64 +# and 32 bit architectures we place the tapsets under the arch +# specific dir (note that systemtap will only pickup the tapset +# for the primary arch for now). Systemtap uses the machine name +# aka build_cpu as architecture specific directory name. +%global tapsetroot /usr/share/systemtap +%global tapsetdir %{tapsetroot}/tapset/%{stapinstall} +%endif + +%if %{debug} +%global buildoutputdir %{top_level_dir_name}/build/linux-%{archbuild}-debug +%else +%global buildoutputdir %{top_level_dir_name}/build/linux-%{archbuild} +%endif + +# Prevent brp-java-repack-jars from being run. +%global __jar_repack 0 + +Name: java-%{javaver}-%{origin} +Version: %{javaver}.%{updatever} +Release: %{icedtea_version}%{icedtea_snapshot}.3%{?dist} +# java-1.5.0-ibm from jpackage.org set Epoch to 1 for unknown reasons, +# and this change was brought into RHEL-4. java-1.5.0-ibm packages +# also included the epoch in their virtual provides. This created a +# situation where in-the-wild java-1.5.0-ibm packages provided "java = +# 1:1.5.0". In RPM terms, "1.6.0 < 1:1.5.0" since 1.6.0 is +# interpreted as 0:1.6.0. So the "java >= 1.6.0" requirement would be +# satisfied by the 1:1.5.0 packages. Thus we need to set the epoch in +# JDK package >= 1.6.0 to 1, and packages referring to JDK virtual +# provides >= 1.6.0 must specify the epoch, "java >= 1:1.6.0". +Epoch: 1 +Summary: OpenJDK Runtime Environment +Group: Development/Languages + +# HotSpot code is licensed under GPLv2 +# JDK library code is licensed under GPLv2 with the Classpath exception +# The Apache license is used in code taken from Apache projects (primarily JAXP & JAXWS) +# DOM levels 2 & 3 and the XML digital signature schemas are licensed under the W3C Software License +# The JSR166 concurrency code is in the public domain +# The BSD and MIT licenses are used for a number of third-party libraries (see THIRD_PARTY_README) +# The OpenJDK source tree includes the JPEG library (IJG), zlib & libpng (zlib), giflib and LCMS (MIT) +# The test code includes copies of NSS under the Mozilla Public License v2.0 +# The PCSClite headers are under a BSD with advertising license +# The elliptic curve cryptography (ECC) source code is licensed under the LGPLv2.1 or any later version +# JavaScript support is provided by Rhino, which is licensed under MPLv1.1 +License: ASL 1.1 and ASL 2.0 and BSD and BSD with advertising and GPL+ and GPLv2 and GPLv2 with exceptions and IJG and LGPLv2+ and MIT and MPLv1.1 and MPLv2.0 and Public Domain and W3C and zlib +URL: http://openjdk.java.net/ + +# Source from upstream IcedTea 2.x project. To regenerate, use +# VERSION=icedtea-${icedtea_version} FILE_NAME_ROOT=openjdk-${VERSION} +# REPO_ROOT= generate_source_tarball.sh +Source0: openjdk-icedtea-%{icedtea_version}%{icedtea_snapshot}.tar.xz + +# README file +# This source is under maintainer's/java-team's control +Source2: README.src + +# Sources 6-12 are taken from hg clone http://icedtea.classpath.org/hg/icedtea7 +# Unless said differently, there is directory with required sources which should be enough to pack/rename + +# Class rewrite to rewrite rhino hierarchy +Source5: class-rewriter.tar.gz + +# Systemtap tapsets. Zipped up to keep it small. +# last update from IcedTea 2.6.19 +Source6: systemtap-tapset-2.6.19.tar.xz + +# .desktop files. +Source7: policytool.desktop +Source77: jconsole.desktop + +# nss configuration file +Source8: nss.cfg + +# FIXME: Taken from IcedTea snapshot 877ad5f00f69, but needs to be moved out +# hg clone -r 877ad5f00f69 http://icedtea.classpath.org/hg/icedtea7 +Source9: pulseaudio.tar.gz + +# Removed libraries that we link instead +Source10: remove-intree-libraries.sh + +#http://icedtea.classpath.org/hg/icedtea7/file/933d082ec889/fsg.sh +# file to clean tarball, should be ketp updated as possible +Source1111: fsg.sh + +# Remove build ids from binaries +Source11: remove-buildids.sh + +# Ensure we aren't using the limited crypto policy +Source12: TestCryptoLevel.java + +Source13: java-abrt-launcher + +Source20: repackReproduciblePolycies.sh + +# RPM/distribution specific patches + +# Allow TCK to pass with access bridge wired in +Patch1: rh1648645-java_access_bridge_loading_java_version_privileged_tck.patch + +# Disable access to access-bridge packages by untrusted apps +Patch3: rh1648644-java_access_bridge_privlidged_security.patch + +# Ignore AWTError when assistive technologies are loaded +Patch4: rh1648242-accessible_toolkit_crash_do_not_break_jvm.patch + +# Build docs even in debug +Patch5: rh1648254-javadoc_generated_during_all_variants_of_buid.patch + +# Add debuginfo where missing +Patch6: rh1648259-libsaproc_libjsig_compiled_with_g_to_provide_correct_debuginfo.patch + +# +# OpenJDK specific patches +# + +# Add rhino support +Patch100: rh1649777-add_rhino_support_jdk7.patch + +Patch106: rh1648643-comment_out_freetype_check.patch + +# allow to create hs_pid.log in tmp (in 700 permissions) if working directory is unwritable +Patch200: rh1648241-abrt_friendly_hs_log_jdk7.patch + +# +# Optional component packages +# + +# Make the ALSA based mixer the default when building with the pulseaudio based +# mixer +Patch300: rh1649760-make_alsa_based_mixer_default_when_pulseaudio_build.patch + +# Make the curves reported by Java's SSL implementation match those of NSS +Patch400: pr1834-rh1022017-reduce_ellipticcurvesextension_to_provide_only_three_nss_supported_nist_curves_23_24_25.patch + +# Temporary patches + +# 8076221, PR2809: Backport "8076221: Disable RC4 cipher suites" (will appear in 2.7.0) +Patch500: jdk8076221-pr2809-disable_rc4_cipher_suites.patch +# PR3393, RH1273760: Support using RSAandMGF1 with the SHA hash algorithms in the PKCS11 provider (will appear in 2.7.0) +Patch501: pr3393-rh1273760-support_rsaandmgf1_with_sha_in_pkcs11.patch +# JDK-8226318, RH1738637: Fix crash in Class.forName (will appear in 7u241/2.6.20) +Patch502: jdk8226318-rh1738637-class_lookup_crash.patch +# End of tmp patches + +BuildRequires: autoconf +BuildRequires: automake +BuildRequires: gcc-c++ +BuildRequires: alsa-lib-devel +BuildRequires: cups-devel +BuildRequires: desktop-file-utils +BuildRequires: giflib-devel +# LCMS 2 is disabled until security issues are resolved +#BuildRequires: lcms2-devel >= 2.5 +BuildRequires: libX11-devel +BuildRequires: libXi-devel +BuildRequires: libXp-devel +BuildRequires: libXt-devel +BuildRequires: libXtst-devel +BuildRequires: libjpeg-devel +BuildRequires: libpng-devel +BuildRequires: wget +BuildRequires: xorg-x11-proto-devel +BuildRequires: ant +BuildRequires: libXinerama-devel +# Provides lsb_release for generating distro id in jdk_generic_profile.sh +BuildRequires: redhat-lsb-core +BuildRequires: rhino +BuildRequires: zip +BuildRequires: xorg-x11-fonts-Type1 +BuildRequires: zlib > 1.2.3-6 +# Require a build JDK which has a working jar uf (PR1437 / RH1207129) +BuildRequires: java-1.7.0-openjdk-devel >= 1.7.0.111-2.6.7.2 +BuildRequires: fontconfig +BuildRequires: at-spi-devel +BuildRequires: gawk +BuildRequires: pkgconfig >= 0.9.0 +BuildRequires: xorg-x11-utils +# Requirements for setting up the nss.cfg +BuildRequires: nss-devel +# Required for NIO2 +BuildRequires: libattr-devel +# Build requirements for SunEC system NSS support +BuildRequires: nss-softokn-freebl-devel >= 3.16.1 +# Required for smartcard support +BuildRequires: pcsc-lite-devel +# Required for SCTP support +BuildRequires: lksctp-tools-devel +# Required for fallback native proxy support +BuildRequires: GConf2-devel +# PulseAudio build requirements. +%if %{with_pulseaudio} +BuildRequires: pulseaudio-libs-devel >= 0.9.11 +%endif +# Zero-assembler build requirement. +%ifnarch %{jit_arches} +BuildRequires: libffi-devel >= 3.0.10 +%endif + +# cacerts build requirement. +BuildRequires: openssl +# execstack build requirement. +# no prelink on ARM yet +%ifnarch %{arm} %{aarch64} %{ppc64le} +BuildRequires: prelink +%endif +%ifarch %{jit_arches} +#systemtap build requirement. +BuildRequires: systemtap-sdt-devel +%endif + +Requires: xorg-x11-fonts-Type1 +#requires rest of java +Requires: %{name}-headless = %{epoch}:%{version}-%{release} +OrderWithRequires: %{name}-headless = %{epoch}:%{version}-%{release} + + +# Standard JPackage base provides. +Provides: jre-%{javaver}-%{origin} = %{epoch}:%{version}-%{release} +Provides: jre-%{origin} = %{epoch}:%{version}-%{release} +Provides: jre-%{javaver} = %{epoch}:%{version}-%{release} +Provides: java-%{javaver} = %{epoch}:%{version}-%{release} +Provides: jre = %{javaver} +Provides: java-%{origin} = %{epoch}:%{version}-%{release} +Provides: java = %{epoch}:%{javaver} +# Standard JPackage extensions provides. +Provides: java-fonts = %{epoch}:%{version} + +# Obsolete older 1.6 packages as it cannot use the new bytecode +# Obsoletes: java-1.6.0-openjdk +# Obsoletes: java-1.6.0-openjdk-demo +# Obsoletes: java-1.6.0-openjdk-devel +# Obsoletes: java-1.6.0-openjdk-javadoc +# Obsoletes: java-1.6.0-openjdk-src + +%description +The OpenJDK runtime environment. + +%package headless +Summary: The OpenJDK runtime environment without audio and video support +Group: Development/Languages + +# Require /etc/pki/java/cacerts. +Requires: ca-certificates +# Require jpackage-utils for ant. +Requires: jpackage-utils >= 1.7.3-1jpp.2 +# Require zoneinfo data provided by tzdata-java subpackage. +Requires: tzdata-java +# there is a need to depend on the exact version of NSS +Requires: nss%{?_isa} %{NSS_BUILDTIME_VERSION} +Requires: nss-softokn%{?_isa} %{NSSSOFTOKN_BUILDTIME_VERSION} +# tool to copy jdk's configs - should be Recommends only, but then only dnf/yum eforce it, not rpm transaction and so no configs are persisted when pure rpm -u is run. I t may be consiedered as regression +Requires: copy-jdk-configs >= 3.3-9 +OrderWithRequires: copy-jdk-configs +# Post requires alternatives to install tool alternatives. +Requires(post): %{_sbindir}/alternatives +# in version 1.7 and higher for --family switch +Requires(post): chkconfig >= 1.7 +# Postun requires alternatives to uninstall tool alternatives. +Requires(postun): %{_sbindir}/alternatives +# in version 1.7 and higher for --family switch +Requires(postun): chkconfig >= 1.7 + +Provides: jre-%{javaver}-%{origin}-headless = %{epoch}:%{version}-%{release} +Provides: jre-%{origin}-headless = %{epoch}:%{version}-%{release} +Provides: jre-%{javaver}-headless = %{epoch}:%{version}-%{release} +Provides: java-%{javaver}-headless = %{epoch}:%{version}-%{release} +Provides: jre-headless = %{epoch}:%{javaver} +Provides: java-%{origin}-headless = %{epoch}:%{version}-%{release} +Provides: java-headless = %{epoch}:%{javaver} +# Standard JPackage extensions provides. +Provides: jndi = %{epoch}:%{version} +Provides: jndi-ldap = %{epoch}:%{version} +Provides: jndi-cos = %{epoch}:%{version} +Provides: jndi-rmi = %{epoch}:%{version} +Provides: jndi-dns = %{epoch}:%{version} +Provides: jaas = %{epoch}:%{version} +Provides: jsse = %{epoch}:%{version} +Provides: jce = %{epoch}:%{version} +Provides: jdbc-stdext = 4.1 +Provides: java-sasl = %{epoch}:%{version} + +%description headless +The OpenJDK runtime environment without audio and video + +%package devel +Summary: OpenJDK Development Environment +Group: Development/Tools + +# Require base package. +Requires: %{name} = %{epoch}:%{version}-%{release} +OrderWithRequires: %{name}-headless = %{epoch}:%{version}-%{release} +# Post requires alternatives to install tool alternatives. +Requires(post): %{_sbindir}/alternatives +# in version 1.7 and higher for --family switch +Requires(post): chkconfig >= 1.7 +# Postun requires alternatives to uninstall tool alternatives. +Requires(postun): %{_sbindir}/alternatives +# in version 1.7 and higher for --family switch +Requires(postun): chkconfig >= 1.7 + +# Standard JPackage devel provides. +Provides: java-sdk-%{javaver}-%{origin} = %{epoch}:%{version} +Provides: java-sdk-%{javaver} = %{epoch}:%{version} +Provides: java-sdk-%{origin} = %{epoch}:%{version} +Provides: java-sdk = %{epoch}:%{javaver} +Provides: java-%{javaver}-devel = %{epoch}:%{version} +Provides: java-devel-%{origin} = %{epoch}:%{version} +Provides: java-devel = %{epoch}:%{javaver} + + +%description devel +The OpenJDK development tools. + +%package demo +Summary: OpenJDK Demos +Group: Development/Languages + +Requires: %{name} = %{epoch}:%{version}-%{release} +OrderWithRequires: %{name}-headless = %{epoch}:%{version}-%{release} + +%description demo +The OpenJDK demos. + +%package src +Summary: OpenJDK Source Bundle +Group: Development/Languages + +Requires: %{name} = %{epoch}:%{version}-%{release} + +%description src +The OpenJDK source bundle. + +%package javadoc +Summary: OpenJDK API Documentation +Group: Documentation +Requires: jpackage-utils +BuildArch: noarch + +OrderWithRequires: %{name}-headless = %{epoch}:%{version}-%{release} +# Post requires alternatives to install javadoc alternative. +Requires(post): %{_sbindir}/alternatives +# in version 1.7 and higher for --family switch +Requires(post): chkconfig >= 1.7 +# Postun requires alternatives to uninstall javadoc alternative. +Requires(postun): %{_sbindir}/alternatives +# in version 1.7 and higher for --family switch +Requires(postun): chkconfig >= 1.7 + +# Standard JPackage javadoc provides. +Provides: java-javadoc = %{epoch}:%{version}-%{release} +Provides: java-%{javaver}-javadoc = %{epoch}:%{version}-%{release} + +%description javadoc +The OpenJDK API documentation. + +%package accessibility +Summary: OpenJDK accessibility connector +Requires: java-atk-wrapper +Requires: %{name} = %{epoch}:%{version}-%{release} +OrderWithRequires: %{name}-headless = %{epoch}:%{version}-%{release} + +%description accessibility +Enables accessibility support in OpenJDK by using java-at-wrapper. This allows compatible at-spi2 based accessibility programs to work for AWT and Swing-based programs. +Please note, the java-atk-wrapper is still in beta, and also OpenJDK itself is still in phase of tuning to be working with accessibility features. +Although working pretty fine, there are known issues with accessibility on, so do not rather install this package unless you really need. + +%prep +%setup -q -c -n %{uniquesuffix} -T -a 0 +# https://bugzilla.redhat.com/show_bug.cgi?id=1189084 +prioritylength=`expr length %{priority}` +if [ $prioritylength -ne 7 ] ; then + echo "priority must be 7 digits in total, violated" + exit 14 +fi +cp %{SOURCE2} . + +# OpenJDK patches +%patch100 + +# pulseaudio support +%if %{with_pulseaudio} +%patch300 +%endif + +# Temporary fixes +%patch500 +%patch501 +%patch502 +# End of temporary fixes + +# ECC fix +%patch400 + +# Add systemtap patches if enabled +%if %{with_systemtap} +%endif + +# Remove libraries that are linked +sh %{SOURCE10} + +# Extract the rewriter (to rewrite rhino classes) +tar xzf %{SOURCE5} + +# Extract systemtap tapsets +%if %{with_systemtap} + +tar xf %{SOURCE6} + +for file in tapset/*.in; do + + OUTPUT_FILE=`echo $file | sed -e s:\.stp\.in$:-%{version}-%{release}.stp:g` + sed -e s:@ABS_SERVER_LIBJVM_SO@:%{_jvmdir}/%{sdkdir}/jre/lib/%{archinstall}/server/libjvm.so:g $file > $file.1 +# FIXME this should really be %if %{has_client_jvm} +%ifarch %{ix86} + sed -e s:@ABS_CLIENT_LIBJVM_SO@:%{_jvmdir}/%{sdkdir}/jre/lib/%{archinstall}/client/libjvm.so:g $file.1 > $OUTPUT_FILE +%else + sed -e '/@ABS_CLIENT_LIBJVM_SO@/d' $file.1 > $OUTPUT_FILE +%endif + sed -i -e s:@INSTALL_ARCH_DIR@:%{archinstall}:g $OUTPUT_FILE + sed -i -e s:@prefix@:%{_jvmdir}/%{sdkdir $suffix}/:g $OUTPUT_FILE + +done + +%endif + +# Pulseaudio +%if %{with_pulseaudio} +tar xzf %{SOURCE9} +%endif + + +%patch3 +%patch4 + +%if %{debug} +%patch5 +%patch6 +%endif + +%patch106 +%patch200 + +%build +# How many cpu's do we have? +export NUM_PROC=`/usr/bin/getconf _NPROCESSORS_ONLN 2> /dev/null || :` +export NUM_PROC=${NUM_PROC:-1} + +# Build IcedTea and OpenJDK. +%ifarch s390x sparc64 alpha %{power64} %{aarch64} +export ARCH_DATA_MODEL=64 +%endif +%ifarch alpha +%global archflags "-mieee" +%endif + +# Filter out flags from the optflags macro that cause problems with the OpenJDK build +# We filter out -O flags so that the optimisation of HotSpot is not lowered from O3 to O2 +# We filter out -Wall which will otherwise cause HotSpot to produce hundreds of thousands of warnings (100+mb logs) +# We replace it with -Wformat (required by -Werror=format-security) and -Wno-cpp to avoid FORTIFY_SOURCE warnings +# We filter out -fexceptions as the HotSpot build explicitly does -fno-exceptions and it's otherwise the default for C++ +%global ourflags %(echo %optflags | sed -e 's|-Wall|-Wformat=2 -Wno-cpp -Wno-error=format-nonliteral|') +# Disable RPM CFLAGS for now as the change appears to cause crashes on x86 RHEL 7.5 multilib +#%global ourcppflags %(echo %ourflags | sed -e 's|-fexceptions||' | sed -r -e 's|-O[0-9]*||') +%global ourcppflags "-fstack-protector-strong" +%global ourldflags %{__global_ldflags} + +# Build the re-written rhino jar +mkdir -p rhino/{old,new} + +# Compile the rewriter +(cd rewriter + javac com/redhat/rewriter/ClassRewriter.java +) + +# Extract rhino.jar contents and rewrite +(cd rhino/old + jar xf /usr/share/java/rhino.jar +) + +java -cp rewriter com.redhat.rewriter.ClassRewriter \ + $PWD/rhino/old \ + $PWD/rhino/new \ + org.mozilla \ + sun.org.mozilla + +(cd rhino/old + for file in `find -type f -not -name '*.class'` ; do + new_file=../new/`echo $file | sed -e 's#org#sun/org#'` + mkdir -pv `dirname $new_file` + cp -v $file $new_file + sed -ie 's#org\.mozilla#sun.org.mozilla#g' $new_file + done +) + +(cd rhino/new + jar cfm ../rhino.jar META-INF/MANIFEST.MF sun +) + +export SYSTEM_JDK_DIR=/usr/lib/jvm/java-1.7.0-openjdk + +# Temporary workaround for ppc64le ; RH1191652 +# Need to work around the jre arch directory being +# ppc64 instead of the expected ppc64le +# Taken from IcedTea7 bootstrap-directory-stage1 & PR1765 +%ifarch %{ppc64le} +STAGE1_BOOT_RUNTIME=jdk/jre/lib/rt.jar +mkdir -p jdk/bin +ln -sfv ${SYSTEM_JDK_DIR}/bin/java jdk/bin/java +ln -sfv ${SYSTEM_JDK_DIR}/bin/javah jdk/bin/javah +ln -sfv ${SYSTEM_JDK_DIR}/bin/rmic jdk/bin/rmic +ln -sfv ${SYSTEM_JDK_DIR}/bin/jar jdk/bin/jar +ln -sfv ${SYSTEM_JDK_DIR}/bin/native2ascii jdk/bin/native2ascii +ln -sfv ${SYSTEM_JDK_DIR}/bin/javac jdk/bin/javac +ln -sfv ${SYSTEM_JDK_DIR}/bin/javap jdk/bin/javap +ln -sfv ${SYSTEM_JDK_DIR}/bin/idlj jdk/bin/idlj +mkdir -p jdk/lib/modules +mkdir -p jdk/jre/lib && \ +cp ${SYSTEM_JDK_DIR}/jre/lib/rt.jar ${STAGE1_BOOT_RUNTIME} && \ +chmod u+w ${STAGE1_BOOT_RUNTIME} +mkdir -p jdk/lib && \ +ln -sfv ${SYSTEM_JDK_DIR}/lib/tools.jar jdk/lib/tools.jar ; \ +# Workaround some older ppc64le builds installing to 'ppc64' rather than 'ppc64le' +if test -d ${SYSTEM_JDK_DIR}/jre/lib/ppc64 ; then \ + ln -sfv ${SYSTEM_JDK_DIR}/jre/lib/ppc64 \ + jdk/jre/lib/%{archinstall} ; \ +else \ + ln -sfv ${SYSTEM_JDK_DIR}/jre/lib/%{archinstall} \ + jdk/jre/lib/ ; \ +fi +if ! test -d jdk/jre/lib/%{archinstall}; \ + then \ + ln -sfv ./%{archbuild} \ + jdk/jre/lib/%{archinstall}; \ +fi +mkdir -p jdk/include && \ +for i in ${SYSTEM_JDK_DIR}/include/*; do \ + test -r ${i} | continue; \ + i=`basename ${i}`; \ + rm -f jdk/include/${i}; \ + ln -sv ${SYSTEM_JDK_DIR}/include/${i} jdk/include/${i}; \ +done; +export JDK_TO_BUILD_WITH=${PWD}/jdk +%else +export JDK_TO_BUILD_WITH=${SYSTEM_JDK_DIR} +%endif + + +pushd openjdk >& /dev/null + +export ALT_BOOTDIR="$JDK_TO_BUILD_WITH" + +# Save old umask as jdk_generic_profile overwrites it +oldumask=`umask` + +# Set generic profile +%ifnarch %{jit_arches} +export ZERO_BUILD=true +%endif +# LCMS 2 is disabled until security issues are resolved +export LCMS_CFLAGS="disabled" +export LCMS_LIBS="disabled" +export PKGVERSION="rhel-%{release}-%{_arch} u%{updatever}-b%{buildver}" + +source jdk/make/jdk_generic_profile.sh + +# Restore old umask +umask $oldumask + +# LCMS 2 is disabled until security issues are resolved +export SYSTEM_LCMS=false + +# Variable used in hs_err hook on build failures +top_dir_abs_path=$(pwd)/%{top_level_dir_name} + +%if %{hsbootstrap} + +mkdir bootstrap + +make \ + UNLIMITED_CRYPTO=true \ + ANT="/usr/bin/ant" \ + DISTRO_NAME="Red Hat Enterprise Linux 7" \ + DISTRO_PACKAGE_VERSION="${PKGVERSION}" \ + JDK_UPDATE_VERSION=`printf "%02d" %{updatever}` \ + JDK_BUILD_NUMBER=b`printf "%02d" %{buildver}` \ + JRE_RELEASE_VERSION=%{javaver}_`printf "%02d" %{updatever}`-b`printf "%02d" %{buildver}` \ + MILESTONE="fcs" \ + ALT_PARALLEL_COMPILE_JOBS="$NUM_PROC" \ + HOTSPOT_BUILD_JOBS="$NUM_PROC" \ + STATIC_CXX="false" \ + RHINO_JAR="$PWD/../rhino/rhino.jar" \ + GENSRCDIR="$PWD/generated.build" \ + FT2_CFLAGS="`pkg-config --cflags freetype2` " \ + FT2_LIBS="`pkg-config --libs freetype2` " \ + DEBUG_CLASSFILES="true" \ + DEBUG_BINARIES="true" \ + STRIP_POLICY="no_strip" \ + JAVAC_WARNINGS_FATAL="false" \ + INSTALL_LOCATION=%{_jvmdir}/%{sdkdir} \ + SYSTEM_NSS="true" \ + NSS_LIBS="%{NSS_LIBS} -lfreebl" \ + NSS_CFLAGS="%{NSS_CFLAGS}" \ + ECC_JUST_SUITE_B="true" \ + SYSTEM_GSETTINGS="true" \ + BUILD_JAXP=false BUILD_JAXWS=false BUILD_LANGTOOLS=false BUILD_JDK=false BUILD_CORBA=false \ + ALT_JDK_IMPORT_PATH=${JDK_TO_BUILD_WITH} ALT_OUTPUTDIR=${PWD}/bootstrap \ + EXTRA_CFLAGS="%{ourcppflags}" EXTRA_LDFLAGS="%{ourldflags}" \ + %{debugbuild} || ( pwd; find $top_dir_abs_path -name "hs_err_pid*.log" | xargs cat && false ) + +export VM_DIR=bootstrap-vm/jre/lib/%{archinstall}/server +cp -dR $(readlink -e ${SYSTEM_JDK_DIR}) bootstrap-vm +rm -vf ${VM_DIR}/libjvm.so +if [ ! -e ${VM_DIR} ] ; then mkdir -p ${VM_DIR}; fi +cp -av bootstrap/hotspot/import/jre/lib/%{archinstall}/server/libjvm.so ${VM_DIR} + +export ALT_BOOTDIR=${PWD}/bootstrap-vm + +%endif + +# ENABLE_FULL_DEBUG_SYMBOLS=0 is the internal HotSpot option +# to turn off the stripping of debuginfo. FULL_DEBUG_SYMBOLS +# does the same for product builds, but is ignored on non-product builds. +make \ + UNLIMITED_CRYPTO=true \ + ANT="/usr/bin/ant" \ + DISTRO_NAME="Red Hat Enterprise Linux 7" \ + DISTRO_PACKAGE_VERSION="${PKGVERSION}" \ + JDK_UPDATE_VERSION=`printf "%02d" %{updatever}` \ + JDK_BUILD_NUMBER=b`printf "%02d" %{buildver}` \ + JRE_RELEASE_VERSION=%{javaver}_`printf "%02d" %{updatever}`-b`printf "%02d" %{buildver}` \ + MILESTONE="fcs" \ + ALT_PARALLEL_COMPILE_JOBS="$NUM_PROC" \ + HOTSPOT_BUILD_JOBS="$NUM_PROC" \ + STATIC_CXX="false" \ + RHINO_JAR="$PWD/../rhino/rhino.jar" \ + GENSRCDIR="$PWD/generated.build" \ + FT2_CFLAGS="`pkg-config --cflags freetype2` " \ + FT2_LIBS="`pkg-config --libs freetype2` " \ + DEBUG_CLASSFILES="true" \ + DEBUG_BINARIES="true" \ + STRIP_POLICY="no_strip" \ + JAVAC_WARNINGS_FATAL="false" \ + INSTALL_LOCATION=%{_jvmdir}/%{sdkdir} \ + SYSTEM_NSS="true" \ + NSS_LIBS="%{NSS_LIBS} -lfreebl" \ + NSS_CFLAGS="%{NSS_CFLAGS}" \ + ECC_JUST_SUITE_B="true" \ + SYSTEM_GSETTINGS="true" \ + EXTRA_CFLAGS="%{ourcppflags}" EXTRA_LDFLAGS="%{ourldflags}" \ + %{debugbuild} || ( pwd; find $top_dir_abs_path -name "hs_err_pid*.log" | xargs cat && false ) + +popd >& /dev/null + +export JAVA_HOME=$(pwd)/%{buildoutputdir}/j2sdk-image + +# Install java-abrt-launcher +mkdir $JAVA_HOME/jre-abrt +mkdir $JAVA_HOME/jre-abrt/bin +mv $JAVA_HOME/jre/bin/java $JAVA_HOME/jre-abrt/bin/java +ln -s %{_jvmdir}/%{sdkdir}/jre/lib $JAVA_HOME/jre-abrt/lib +cat %{SOURCE13} | sed -e s:@JAVA_PATH@:%{_jvmdir}/%{sdkdir}/jre-abrt/bin/java:g -e s:@LIB_DIR@:%{LIBDIR}/libabrt-java-connector.so:g > $JAVA_HOME/jre/bin/java +chmod 755 $JAVA_HOME/jre/bin/java + +# Install nss.cfg right away as we will be using the JRE above +cp -a %{SOURCE8} $JAVA_HOME/jre/lib/security/ +sed -i -e s:@NSS_LIBDIR@:%{NSS_LIBDIR}:g $JAVA_HOME/jre/lib/security/nss.cfg + +# Build pulseaudio and install it to JDK build location +%if %{with_pulseaudio} +pushd pulseaudio +# IT_CFLAGS="-g" is needed so that debug info symbols get produced. +# See RHBZ#1657863. +make JAVA_HOME=$JAVA_HOME -f Makefile.pulseaudio IT_CFLAGS="-g" +cp -pPRf build/native/libpulse-java.so $JAVA_HOME/jre/lib/%{archinstall}/ +cp -pPRf build/pulse-java.jar $JAVA_HOME/jre/lib/ext/ +popd +%endif + +# Copy tz.properties +echo "sun.zoneinfo.dir=/usr/share/javazi" >> $JAVA_HOME/jre/lib/tz.properties + +#remove all fontconfig files. This change should be usptreamed soon +rm -f %{buildoutputdir}/j2re-image/lib/fontconfig*.properties.src +rm -f %{buildoutputdir}/j2re-image/lib/fontconfig*.bfc +rm -f %{buildoutputdir}/j2sdk-image/jre/lib/fontconfig*.properties.src +rm -f %{buildoutputdir}/j2sdk-image/jre/lib/fontconfig*.bfc +rm -f %{buildoutputdir}/lib/fontconfig*.properties.src +rm -f %{buildoutputdir}/lib/fontconfig*.bfc + +# Check unlimited policy has been used +$JAVA_HOME/bin/javac -d . %{SOURCE12} +$JAVA_HOME/bin/java TestCryptoLevel + +sh %{SOURCE11} ${JAVA_HOME} + +%check +export JAVA_HOME=$(pwd)/%{buildoutputdir $suffix}/j2sdk-image + + +%install +rm -rf $RPM_BUILD_ROOT +STRIP_KEEP_SYMTAB=libjvm* + +# There used to be a link to the soundfont. +# This is now obsolete following the inclusion of 8140620/PR2710 + +pushd %{buildoutputdir}/j2sdk-image + +#install jsa directories so we can owe them +mkdir -p $RPM_BUILD_ROOT%{_jvmdir}/%{jredir}/lib/%{archinstall}/server/ +mkdir -p $RPM_BUILD_ROOT%{_jvmdir}/%{jredir}/lib/%{archinstall}/client/ + + # Install main files. + install -d -m 755 $RPM_BUILD_ROOT%{_jvmdir}/%{sdkdir} + cp -a jre-abrt bin include lib src.zip $RPM_BUILD_ROOT%{_jvmdir}/%{sdkdir} + install -d -m 755 $RPM_BUILD_ROOT%{_jvmdir}/%{jredir} + cp -a jre/bin jre/lib $RPM_BUILD_ROOT%{_jvmdir}/%{jredir} + cp -a ASSEMBLY_EXCEPTION LICENSE THIRD_PARTY_README $RPM_BUILD_ROOT%{_jvmdir}/%{sdkdir} + +%ifarch %{jit_arches} + # Install systemtap support files. + install -dm 755 $RPM_BUILD_ROOT%{_jvmdir}/%{sdkdir}/tapset + cp -a $RPM_BUILD_DIR/%{uniquesuffix}/tapset/*.stp $RPM_BUILD_ROOT%{_jvmdir}/%{sdkdir}/tapset/ + install -d -m 755 $RPM_BUILD_ROOT%{tapsetdir} + pushd $RPM_BUILD_ROOT%{tapsetdir} + RELATIVE=$(%{abs2rel} %{_jvmdir}/%{sdkdir}/tapset %{tapsetdir}) + ln -sf $RELATIVE/*.stp . + popd +%endif + + # Install cacerts symlink. + rm -f $RPM_BUILD_ROOT%{_jvmdir}/%{jredir}/lib/security/cacerts + pushd $RPM_BUILD_ROOT%{_jvmdir}/%{jredir}/lib/security + RELATIVE=$(%{abs2rel} %{_sysconfdir}/pki/java \ + %{_jvmdir}/%{jredir}/lib/security) + ln -sf $RELATIVE/cacerts . + popd + + # Install extension symlinks. + install -d -m 755 $RPM_BUILD_ROOT%{jvmjardir} + pushd $RPM_BUILD_ROOT%{jvmjardir} + RELATIVE=$(%{abs2rel} %{_jvmdir}/%{jredir}/lib %{jvmjardir}) + ln -sf $RELATIVE/jsse.jar jsse-%{version}.jar + ln -sf $RELATIVE/jce.jar jce-%{version}.jar + ln -sf $RELATIVE/rt.jar jndi-%{version}.jar + ln -sf $RELATIVE/rt.jar jndi-ldap-%{version}.jar + ln -sf $RELATIVE/rt.jar jndi-cos-%{version}.jar + ln -sf $RELATIVE/rt.jar jndi-rmi-%{version}.jar + ln -sf $RELATIVE/rt.jar jaas-%{version}.jar + ln -sf $RELATIVE/rt.jar jdbc-stdext-%{version}.jar + ln -sf jdbc-stdext-%{version}.jar jdbc-stdext-3.0.jar + ln -sf $RELATIVE/rt.jar sasl-%{version}.jar + for jar in *-%{version}.jar + do + if [ x%{version} != x%{javaver} ] + then + ln -sf $jar $(echo $jar | sed "s|-%{version}.jar|-%{javaver}.jar|g") + fi + ln -sf $jar $(echo $jar | sed "s|-%{version}.jar|.jar|g") + done + popd + + # Install JCE policy symlinks. + install -d -m 755 $RPM_BUILD_ROOT%{_jvmprivdir}/%{uniquesuffix}/jce/vanilla + + # Install versioned symlinks. + pushd $RPM_BUILD_ROOT%{_jvmdir} + ln -sf %{jredir} %{jrelnk} + popd + + pushd $RPM_BUILD_ROOT%{_jvmjardir} + ln -sf %{sdkdir} %{jrelnk} + popd + + # Remove javaws man page + rm -f man/man1/javaws* + + # Install man pages. + install -d -m 755 $RPM_BUILD_ROOT%{_mandir}/man1 + for manpage in man/man1/* + do + # Convert man pages to UTF8 encoding. + iconv -f ISO_8859-1 -t UTF8 $manpage -o $manpage.tmp + mv -f $manpage.tmp $manpage + install -m 644 -p $manpage $RPM_BUILD_ROOT%{_mandir}/man1/$(basename \ + $manpage .1)-%{uniquesuffix}.1 + done + + # Install demos and samples. + cp -a demo $RPM_BUILD_ROOT%{_jvmdir}/%{sdkdir} + mkdir -p sample/rmi + mv bin/java-rmi.cgi sample/rmi + cp -a sample $RPM_BUILD_ROOT%{_jvmdir}/%{sdkdir} + +popd + + +# Install Javadoc documentation. +install -d -m 755 $RPM_BUILD_ROOT%{_javadocdir} +cp -a %{buildoutputdir}/docs $RPM_BUILD_ROOT%{_javadocdir}/%{uniquejavadocdir} + +# Install icons and menu entries. +for s in 16 24 32 48 ; do + install -D -p -m 644 \ + %{top_level_dir_name}/jdk/src/solaris/classes/sun/awt/X11/java-icon${s}.png \ + $RPM_BUILD_ROOT%{_datadir}/icons/hicolor/${s}x${s}/apps/java-%{javaver}.png +done + +# Install desktop files. +install -d -m 755 $RPM_BUILD_ROOT%{_datadir}/{applications,pixmaps} +for e in %{SOURCE7} %{SOURCE77} ; do + sed -i "s/#ARCH#/%{_arch}-%{release}/g" $e + sed -i "s|/usr/bin|%{sdkbindir}/|g" $e + desktop-file-install --vendor=%{uniquesuffix} --mode=644 \ + --dir=$RPM_BUILD_ROOT%{_datadir}/applications $e +done + +# Install /etc/.java/.systemPrefs/ directory +# See https://bugzilla.redhat.com/show_bug.cgi?id=741821 +mkdir -p $RPM_BUILD_ROOT%{_sysconfdir}/.java/.systemPrefs + +# Find JRE directories. +find $RPM_BUILD_ROOT%{_jvmdir}/%{jredir} -type d \ + | grep -v jre/lib/security \ + | sed 's|'$RPM_BUILD_ROOT'|%dir |' \ + > %{name}.files-headless +# Find JRE files. +find $RPM_BUILD_ROOT%{_jvmdir}/%{jredir} -type f -o -type l \ + | grep -v jre/lib/security \ + | sed 's|'$RPM_BUILD_ROOT'||' \ + > %{name}.files.all +#split %{name}.files to %{name}.files-headless and %{name}.files +#see https://bugzilla.redhat.com/show_bug.cgi?id=875408 +NOT_HEADLESS=\ +"%{_jvmdir}/%{uniquesuffix}/jre/lib/%{archinstall}/libjsoundalsa.so +%{_jvmdir}/%{uniquesuffix}/jre/lib/%{archinstall}/libpulse-java.so +%{_jvmdir}/%{uniquesuffix}/jre/lib/%{archinstall}/libsplashscreen.so +%{_jvmdir}/%{uniquesuffix}/jre/lib/%{archinstall}/libjavagtk.so +%{_jvmdir}/%{uniquesuffix}/jre/lib/%{archinstall}/xawt/libmawt.so +%{_jvmdir}/%{uniquesuffix}/jre/bin/policytool +%{_jvmdir}/%{uniquesuffix}/jre-abrt/lib/%{archinstall}/libjsoundalsa.so +%{_jvmdir}/%{uniquesuffix}/jre-abrt/lib/%{archinstall}/libpulse-java.so +%{_jvmdir}/%{uniquesuffix}/jre-abrt/lib/%{archinstall}/libsplashscreen.so +%{_jvmdir}/%{uniquesuffix}/jre-abrt/lib/%{archinstall}/libjavagtk.so +%{_jvmdir}/%{uniquesuffix}/jre-abrt/lib/%{archinstall}/xawt/libmawt.so" +#filter %{name}.files from %{name}.files.all to %{name}.files-headless +ALL=`cat %{name}.files.all` +for file in $ALL ; do + INLCUDE="NO" ; + for blacklist in $NOT_HEADLESS ; do +#we can not match normally, because rpmbuild will evaluate !0 result as script failure + q=`expr match "$file" "$blacklist"` || : + l=`expr length "$blacklist"` || : + if [ $q -eq $l ]; then + INLCUDE="YES" ; + fi; + done + if [ "x$INLCUDE" = "xNO" ]; then + echo "$file" >> %{name}.files-headless + else + echo "$file" >> %{name}.files + fi +done +# Find demo directories. +find $RPM_BUILD_ROOT%{_jvmdir}/%{sdkdir}/demo \ + $RPM_BUILD_ROOT%{_jvmdir}/%{sdkdir}/sample -type d \ + | sed 's|'$RPM_BUILD_ROOT'|%dir |' \ + > %{name}-demo.files + +# FIXME: remove SONAME entries from demo DSOs. See +# https://bugzilla.redhat.com/show_bug.cgi?id=436497 + +# Find non-documentation demo files. +find $RPM_BUILD_ROOT%{_jvmdir}/%{sdkdir}/demo \ + $RPM_BUILD_ROOT%{_jvmdir}/%{sdkdir}/sample \ + -type f -o -type l | sort \ + | grep -v README \ + | sed 's|'$RPM_BUILD_ROOT'||' \ + >> %{name}-demo.files +# Find documentation demo files. +find $RPM_BUILD_ROOT%{_jvmdir}/%{sdkdir}/demo \ + $RPM_BUILD_ROOT%{_jvmdir}/%{sdkdir}/sample \ + -type f -o -type l | sort \ + | grep README \ + | sed 's|'$RPM_BUILD_ROOT'||' \ + | sed 's|^|%doc |' \ + >> %{name}-demo.files + +# Create links which leads to separately installed java-atk-bridge and allow configuration +# links points to java-atk-wrapper - an dependence + pushd $RPM_BUILD_ROOT/%{_jvmdir}/%{jredir}/lib/%{archinstall} + ln -s %{syslibdir}/java-atk-wrapper/libatk-wrapper.so.0 libatk-wrapper.so + popd + pushd $RPM_BUILD_ROOT/%{_jvmdir}/%{jredir}/lib/ext + ln -s %{syslibdir}/java-atk-wrapper/java-atk-wrapper.jar java-atk-wrapper.jar + popd + pushd $RPM_BUILD_ROOT/%{_jvmdir}/%{jredir}/lib/ + echo "#Config file to enable java-atk-wrapper" > accessibility.properties + echo "" >> accessibility.properties + echo "assistive_technologies=org.GNOME.Accessibility.AtkWrapper" >> accessibility.properties + echo "" >> accessibility.properties + popd + +bash %{SOURCE20} $RPM_BUILD_ROOT/%{_jvmdir}/%{jredir} %{javaver} +# https://bugzilla.redhat.com/show_bug.cgi?id=1183793 +touch -t 201401010000 $RPM_BUILD_ROOT/%{_jvmdir}/%{jredir $suffix}/lib/security/java.security + +# intentioanlly only for non-debug +%pretrans headless -p +-- see https://bugzilla.redhat.com/show_bug.cgi?id=1038092 for whole issue +-- see https://bugzilla.redhat.com/show_bug.cgi?id=1290388 for pretrans over pre +-- if copy-jdk-configs is in transaction, it installs in pretrans to temp +-- if copy_jdk_configs is in temp, then it means that copy-jdk-configs is in tranasction and so is +-- preferred over one in %%{_libexecdir}. If it is not in transaction, then depends +-- whether copy-jdk-configs is installed or not. If so, then configs are copied +-- (copy_jdk_configs from %%{_libexecdir} used) or not copied at all +local posix = require "posix" +local debug = false + +SOURCE1 = "%{rpm_state_dir}/copy_jdk_configs.lua" +SOURCE2 = "%{_libexecdir}/copy_jdk_configs.lua" + +local stat1 = posix.stat(SOURCE1, "type"); +local stat2 = posix.stat(SOURCE2, "type"); + + if (stat1 ~= nil) then + if (debug) then + print(SOURCE1 .." exists - copy-jdk-configs in transaction, using this one.") + end; + package.path = package.path .. ";" .. SOURCE1 +else + if (stat2 ~= nil) then + if (debug) then + print(SOURCE2 .." exists - copy-jdk-configs alrady installed and NOT in transation. Using.") + end; + package.path = package.path .. ";" .. SOURCE2 + else + if (debug) then + print(SOURCE1 .." does NOT exists") + print(SOURCE2 .." does NOT exists") + print("No config files will be copied") + end + return + end +end +-- run contetn of included file with fake args +arg = {"--currentjvm", "%{uniquesuffix %{nil}}", "--jvmdir", "%{_jvmdir %{nil}}", "--origname", "%{name}", "--origjavaver", "%{javaver}", "--arch", "%{_arch}", "--temp", "%{rpm_state_dir}/%{name}.%{_arch}"} +require "copy_jdk_configs.lua" + +%post +update-desktop-database %{_datadir}/applications &> /dev/null || : +/bin/touch --no-create %{_datadir}/icons/hicolor &>/dev/null || : +exit 0 + + +%post headless +%ifarch %{jit_arches} +# MetaspaceShared::generate_vtable_methods not implemented for PPC JIT +%ifnarch %{power64} +#see https://bugzilla.redhat.com/show_bug.cgi?id=513605 +%{jrebindir}/java -Xshare:dump >/dev/null 2>/dev/null +%endif +%endif + +ext=.gz +alternatives \ + --install %{_bindir}/java java %{jrebindir}/java %{priority} --family %{name}.%{_arch} \ + --slave %{_jvmdir}/jre jre %{_jvmdir}/%{jredir} \ + --slave %{_jvmjardir}/jre jre_exports %{jvmjardir} \ + --slave %{_bindir}/keytool keytool %{jrebindir}/keytool \ + --slave %{_bindir}/orbd orbd %{jrebindir}/orbd \ + --slave %{_bindir}/pack200 pack200 %{jrebindir}/pack200 \ + --slave %{_bindir}/rmid rmid %{jrebindir}/rmid \ + --slave %{_bindir}/rmiregistry rmiregistry %{jrebindir}/rmiregistry \ + --slave %{_bindir}/servertool servertool %{jrebindir}/servertool \ + --slave %{_bindir}/tnameserv tnameserv %{jrebindir}/tnameserv \ + --slave %{_bindir}/unpack200 unpack200 %{jrebindir}/unpack200 \ + --slave %{_mandir}/man1/java.1$ext java.1$ext \ + %{_mandir}/man1/java-%{uniquesuffix}.1$ext \ + --slave %{_mandir}/man1/keytool.1$ext keytool.1$ext \ + %{_mandir}/man1/keytool-%{uniquesuffix}.1$ext \ + --slave %{_mandir}/man1/orbd.1$ext orbd.1$ext \ + %{_mandir}/man1/orbd-%{uniquesuffix}.1$ext \ + --slave %{_mandir}/man1/pack200.1$ext pack200.1$ext \ + %{_mandir}/man1/pack200-%{uniquesuffix}.1$ext \ + --slave %{_mandir}/man1/rmid.1$ext rmid.1$ext \ + %{_mandir}/man1/rmid-%{uniquesuffix}.1$ext \ + --slave %{_mandir}/man1/rmiregistry.1$ext rmiregistry.1$ext \ + %{_mandir}/man1/rmiregistry-%{uniquesuffix}.1$ext \ + --slave %{_mandir}/man1/servertool.1$ext servertool.1$ext \ + %{_mandir}/man1/servertool-%{uniquesuffix}.1$ext \ + --slave %{_mandir}/man1/tnameserv.1$ext tnameserv.1$ext \ + %{_mandir}/man1/tnameserv-%{uniquesuffix}.1$ext \ + --slave %{_mandir}/man1/unpack200.1$ext unpack200.1$ext \ + %{_mandir}/man1/unpack200-%{uniquesuffix}.1$ext + +for X in %{origin} %{javaver} ; do + alternatives \ + --install %{_jvmdir}/jre-"$X" \ + jre_"$X" %{_jvmdir}/%{jredir} %{priority} --family %{name}.%{_arch} \ + --slave %{_jvmjardir}/jre-"$X" \ + jre_"$X"_exports %{jvmjardir} +done + +update-alternatives --install %{_jvmdir}/jre-%{javaver}-%{origin} jre_%{javaver}_%{origin} %{_jvmdir}/%{jrelnk} %{priority} --family %{name}.%{_arch} \ +--slave %{_jvmjardir}/jre-%{javaver} jre_%{javaver}_%{origin}_exports %{jvmjardir} + +update-desktop-database %{_datadir}/applications &> /dev/null || : + +/bin/touch --no-create %{_datadir}/icons/hicolor &>/dev/null || : + +# see pretrans where this file is declared +# also see that pretrans is only for nondebug +if [ ! "%1" == %{debug_suffix} ]; then + if [ -f %{_libexecdir}/copy_jdk_configs_fixFiles.sh ] ; then + sh %{_libexecdir}/copy_jdk_configs_fixFiles.sh %{rpm_state_dir}/%{name}.%{_arch} %{_jvmdir}/%{sdkdir %%1} + fi +fi + + +exit 0 + +%postun +update-desktop-database %{_datadir}/applications &> /dev/null || : + +if [ $1 -eq 0 ] ; then + /bin/touch --no-create %{_datadir}/icons/hicolor &>/dev/null + /usr/bin/gtk-update-icon-cache %{_datadir}/icons/hicolor &>/dev/null || : +fi + +exit 0 + + +%postun headless + alternatives --remove java %{jrebindir}/java + alternatives --remove jre_%{origin} %{_jvmdir}/%{jredir} + alternatives --remove jre_%{javaver} %{_jvmdir}/%{jredir} + alternatives --remove jre_%{javaver}_%{origin} %{_jvmdir}/%{jrelnk} + +exit 0 + +%posttrans +/usr/bin/gtk-update-icon-cache %{_datadir}/icons/hicolor &>/dev/null || : + + + +%post devel +ext=.gz +alternatives \ + --install %{_bindir}/javac javac %{sdkbindir}/javac %{priority} --family %{name}.%{_arch} \ + --slave %{_jvmdir}/java java_sdk %{_jvmdir}/%{sdkdir} \ + --slave %{_jvmjardir}/java java_sdk_exports %{_jvmjardir}/%{sdkdir} \ + --slave %{_bindir}/appletviewer appletviewer %{sdkbindir}/appletviewer \ + --slave %{_bindir}/apt apt %{sdkbindir}/apt \ + --slave %{_bindir}/extcheck extcheck %{sdkbindir}/extcheck \ + --slave %{_bindir}/idlj idlj %{sdkbindir}/idlj \ + --slave %{_bindir}/jar jar %{sdkbindir}/jar \ + --slave %{_bindir}/jarsigner jarsigner %{sdkbindir}/jarsigner \ + --slave %{_bindir}/javadoc javadoc %{sdkbindir}/javadoc \ + --slave %{_bindir}/javah javah %{sdkbindir}/javah \ + --slave %{_bindir}/javap javap %{sdkbindir}/javap \ + --slave %{_bindir}/jcmd jcmd %{sdkbindir}/jcmd \ + --slave %{_bindir}/jconsole jconsole %{sdkbindir}/jconsole \ + --slave %{_bindir}/jdb jdb %{sdkbindir}/jdb \ + --slave %{_bindir}/jhat jhat %{sdkbindir}/jhat \ + --slave %{_bindir}/jinfo jinfo %{sdkbindir}/jinfo \ + --slave %{_bindir}/jmap jmap %{sdkbindir}/jmap \ + --slave %{_bindir}/jps jps %{sdkbindir}/jps \ + --slave %{_bindir}/jrunscript jrunscript %{sdkbindir}/jrunscript \ + --slave %{_bindir}/jsadebugd jsadebugd %{sdkbindir}/jsadebugd \ + --slave %{_bindir}/jstack jstack %{sdkbindir}/jstack \ + --slave %{_bindir}/jstat jstat %{sdkbindir}/jstat \ + --slave %{_bindir}/jstatd jstatd %{sdkbindir}/jstatd \ + --slave %{_bindir}/native2ascii native2ascii %{sdkbindir}/native2ascii \ + --slave %{_bindir}/policytool policytool %{sdkbindir}/policytool \ + --slave %{_bindir}/rmic rmic %{sdkbindir}/rmic \ + --slave %{_bindir}/schemagen schemagen %{sdkbindir}/schemagen \ + --slave %{_bindir}/serialver serialver %{sdkbindir}/serialver \ + --slave %{_bindir}/wsgen wsgen %{sdkbindir}/wsgen \ + --slave %{_bindir}/wsimport wsimport %{sdkbindir}/wsimport \ + --slave %{_bindir}/xjc xjc %{sdkbindir}/xjc \ + --slave %{_mandir}/man1/appletviewer.1$ext appletviewer.1$ext \ + %{_mandir}/man1/appletviewer-%{uniquesuffix}.1$ext \ + --slave %{_mandir}/man1/apt.1$ext apt.1$ext \ + %{_mandir}/man1/apt-%{uniquesuffix}.1$ext \ + --slave %{_mandir}/man1/extcheck.1$ext extcheck.1$ext \ + %{_mandir}/man1/extcheck-%{uniquesuffix}.1$ext \ + --slave %{_mandir}/man1/jar.1$ext jar.1$ext \ + %{_mandir}/man1/jar-%{uniquesuffix}.1$ext \ + --slave %{_mandir}/man1/jarsigner.1$ext jarsigner.1$ext \ + %{_mandir}/man1/jarsigner-%{uniquesuffix}.1$ext \ + --slave %{_mandir}/man1/javac.1$ext javac.1$ext \ + %{_mandir}/man1/javac-%{uniquesuffix}.1$ext \ + --slave %{_mandir}/man1/javadoc.1$ext javadoc.1$ext \ + %{_mandir}/man1/javadoc-%{uniquesuffix}.1$ext \ + --slave %{_mandir}/man1/javah.1$ext javah.1$ext \ + %{_mandir}/man1/javah-%{uniquesuffix}.1$ext \ + --slave %{_mandir}/man1/javap.1$ext javap.1$ext \ + %{_mandir}/man1/javap-%{uniquesuffix}.1$ext \ + --slave %{_mandir}/man1/jconsole.1$ext jconsole.1$ext \ + %{_mandir}/man1/jconsole-%{uniquesuffix}.1$ext \ + --slave %{_mandir}/man1/jdb.1$ext jdb.1$ext \ + %{_mandir}/man1/jdb-%{uniquesuffix}.1$ext \ + --slave %{_mandir}/man1/jhat.1$ext jhat.1$ext \ + %{_mandir}/man1/jhat-%{uniquesuffix}.1$ext \ + --slave %{_mandir}/man1/jinfo.1$ext jinfo.1$ext \ + %{_mandir}/man1/jinfo-%{uniquesuffix}.1$ext \ + --slave %{_mandir}/man1/jmap.1$ext jmap.1$ext \ + %{_mandir}/man1/jmap-%{uniquesuffix}.1$ext \ + --slave %{_mandir}/man1/jps.1$ext jps.1$ext \ + %{_mandir}/man1/jps-%{uniquesuffix}.1$ext \ + --slave %{_mandir}/man1/jrunscript.1$ext jrunscript.1$ext \ + %{_mandir}/man1/jrunscript-%{uniquesuffix}.1$ext \ + --slave %{_mandir}/man1/jsadebugd.1$ext jsadebugd.1$ext \ + %{_mandir}/man1/jsadebugd-%{uniquesuffix}.1$ext \ + --slave %{_mandir}/man1/jstack.1$ext jstack.1$ext \ + %{_mandir}/man1/jstack-%{uniquesuffix}.1$ext \ + --slave %{_mandir}/man1/jstat.1$ext jstat.1$ext \ + %{_mandir}/man1/jstat-%{uniquesuffix}.1$ext \ + --slave %{_mandir}/man1/jstatd.1$ext jstatd.1$ext \ + %{_mandir}/man1/jstatd-%{uniquesuffix}.1$ext \ + --slave %{_mandir}/man1/native2ascii.1$ext native2ascii.1$ext \ + %{_mandir}/man1/native2ascii-%{uniquesuffix}.1$ext \ + --slave %{_mandir}/man1/policytool.1$ext policytool.1$ext \ + %{_mandir}/man1/policytool-%{uniquesuffix}.1$ext \ + --slave %{_mandir}/man1/rmic.1$ext rmic.1$ext \ + %{_mandir}/man1/rmic-%{uniquesuffix}.1$ext \ + --slave %{_mandir}/man1/schemagen.1$ext schemagen.1$ext \ + %{_mandir}/man1/schemagen-%{uniquesuffix}.1$ext \ + --slave %{_mandir}/man1/serialver.1$ext serialver.1$ext \ + %{_mandir}/man1/serialver-%{uniquesuffix}.1$ext \ + --slave %{_mandir}/man1/wsgen.1$ext wsgen.1$ext \ + %{_mandir}/man1/wsgen-%{uniquesuffix}.1$ext \ + --slave %{_mandir}/man1/wsimport.1$ext wsimport.1$ext \ + %{_mandir}/man1/wsimport-%{uniquesuffix}.1$ext \ + --slave %{_mandir}/man1/xjc.1$ext xjc.1$ext \ + %{_mandir}/man1/xjc-%{uniquesuffix}.1$ext + +for X in %{origin} %{javaver} ; do + alternatives \ + --install %{_jvmdir}/java-"$X" \ + java_sdk_"$X" %{_jvmdir}/%{sdkdir} %{priority} --family %{name}.%{_arch} \ + --slave %{_jvmjardir}/java-"$X" \ + java_sdk_"$X"_exports %{_jvmjardir}/%{sdkdir} +done + +update-alternatives --install %{_jvmdir}/java-%{javaver}-%{origin} java_sdk_%{javaver}_%{origin} %{_jvmdir}/%{sdkdir} %{priority} --family %{name}.%{_arch} \ +--slave %{_jvmjardir}/java-%{javaver}-%{origin} java_sdk_%{javaver}_%{origin}_exports %{_jvmjardir}/%{sdkdir} + +update-desktop-database %{_datadir}/applications &> /dev/null || : +/bin/touch --no-create %{_datadir}/icons/hicolor &>/dev/null || : + +exit 0 + +%postun devel + alternatives --remove javac %{sdkbindir}/javac + alternatives --remove java_sdk_%{origin} %{_jvmdir}/%{sdkdir} + alternatives --remove java_sdk_%{javaver} %{_jvmdir}/%{sdkdir} + alternatives --remove java_sdk_%{javaver}_%{origin} %{_jvmdir}/%{sdkdir} + +update-desktop-database %{_datadir}/applications &> /dev/null || : + +if [ $1 -eq 0 ] ; then + /bin/touch --no-create %{_datadir}/icons/hicolor &>/dev/null + /usr/bin/gtk-update-icon-cache %{_datadir}/icons/hicolor &>/dev/null || : +fi + +exit 0 + +%posttrans devel +/usr/bin/gtk-update-icon-cache %{_datadir}/icons/hicolor &>/dev/null || : + + +%post javadoc +alternatives \ + --install %{_javadocdir}/java javadocdir %{_javadocdir}/%{uniquejavadocdir}/api \ + %{priority} --family %{name} + +exit 0 + +%postun javadoc + alternatives --remove javadocdir %{_javadocdir}/%{uniquejavadocdir}/api + +exit 0 + + +%files -f %{name}.files +%defattr(-,root,root,-) +%{_datadir}/icons/hicolor/*x*/apps/java-%{javaver}.png +%{_datadir}/applications/*policytool.desktop +%{_mandir}/man1/policytool-%{uniquesuffix}.1* + +# important note, see https://bugzilla.redhat.com/show_bug.cgi?id=1038092 for whole issue +# all config/norepalce files (and more) have to be declared in pretrans. See pretrans +%files headless -f %{name}.files-headless +%defattr(-,root,root,-) +%doc %{_jvmdir}/%{sdkdir}/ASSEMBLY_EXCEPTION +%doc %{_jvmdir}/%{sdkdir}/LICENSE +%doc %{_jvmdir}/%{sdkdir}/THIRD_PARTY_README +%dir %{_jvmdir}/%{sdkdir} +%dir %{_jvmdir}/%{sdkdir}/jre/lib/ +%dir %{_jvmdir}/%{sdkdir}/jre/lib/%{archinstall} +%ifarch x86_64 +%dir %{_jvmdir}/%{sdkdir}/jre/lib/%{archinstall}/xawt +%endif +%{_jvmdir}/%{jrelnk} +%{_jvmjardir}/%{jrelnk} +%{_jvmprivdir}/* +%{jvmjardir} +%dir %{_jvmdir}/%{jredir}/lib/security +%{_jvmdir}/%{jredir}/lib/security/cacerts +%dir %{_jvmdir}/%{jredir %%1}/lib/security/policy/unlimited/ +%dir %{_jvmdir}/%{jredir %%1}/lib/security/policy/limited/ +%dir %{_jvmdir}/%{jredir %%1}/lib/security/policy/ +%config(noreplace) %{_jvmdir}/%{jredir}/lib/security/policy/unlimited/US_export_policy.jar +%config(noreplace) %{_jvmdir}/%{jredir}/lib/security/policy/unlimited/local_policy.jar +%config(noreplace) %{_jvmdir}/%{jredir}/lib/security/policy/limited/US_export_policy.jar +%config(noreplace) %{_jvmdir}/%{jredir}/lib/security/policy/limited/local_policy.jar +%config(noreplace) %{_jvmdir}/%{jredir}/lib/security/java.policy +%config(noreplace) %{_jvmdir}/%{jredir}/lib/security/java.security +%config(noreplace) %{_jvmdir}/%{jredir}/lib/security/blacklisted.certs +%config(noreplace) %{_jvmdir}/%{jredir}/lib/logging.properties +%{_mandir}/man1/java-%{uniquesuffix}.1* +%{_mandir}/man1/keytool-%{uniquesuffix}.1* +%{_mandir}/man1/orbd-%{uniquesuffix}.1* +%{_mandir}/man1/pack200-%{uniquesuffix}.1* +%{_mandir}/man1/rmid-%{uniquesuffix}.1* +%{_mandir}/man1/rmiregistry-%{uniquesuffix}.1* +%{_mandir}/man1/servertool-%{uniquesuffix}.1* +%{_mandir}/man1/tnameserv-%{uniquesuffix}.1* +%{_mandir}/man1/unpack200-%{uniquesuffix}.1* +%config(noreplace) %{_jvmdir}/%{jredir}/lib/security/nss.cfg +# removed %%{_jvmdir}/%%{jredir}/lib/audio/ +# see soundfont in %%install +%ifarch %{jit_arches} +%attr(444, root, root) %ghost %{_jvmdir}/%{jredir}/lib/%{archinstall}/server/classes.jsa +%attr(444, root, root) %ghost %{_jvmdir}/%{jredir}/lib/%{archinstall}/client/classes.jsa +%endif +%{_jvmdir}/%{jredir}/lib/%{archinstall}/server/ +%{_jvmdir}/%{jredir}/lib/%{archinstall}/client/ +%{_sysconfdir}/.java/ +%{_sysconfdir}/.java/.systemPrefs +%{_jvmdir}/%{sdkdir}/jre-abrt + + +%files devel +%defattr(-,root,root,-) +%doc %{_jvmdir}/%{sdkdir}/ASSEMBLY_EXCEPTION +%doc %{_jvmdir}/%{sdkdir}/LICENSE +%doc %{_jvmdir}/%{sdkdir}/THIRD_PARTY_README +%dir %{_jvmdir}/%{sdkdir}/bin +%dir %{_jvmdir}/%{sdkdir}/include +%dir %{_jvmdir}/%{sdkdir}/lib +%ifarch %{jit_arches} +%dir %{_jvmdir}/%{sdkdir}/tapset +%endif +%{_jvmdir}/%{sdkdir}/bin/* +%{_jvmdir}/%{sdkdir}/include/* +%{_jvmdir}/%{sdkdir}/lib/* +%ifarch %{jit_arches} +%{_jvmdir}/%{sdkdir}/tapset/*.stp +%endif +%{_jvmjardir}/%{sdkdir} +%{_datadir}/applications/*jconsole.desktop +%{_mandir}/man1/appletviewer-%{uniquesuffix}.1* +%{_mandir}/man1/apt-%{uniquesuffix}.1* +%{_mandir}/man1/extcheck-%{uniquesuffix}.1* +%{_mandir}/man1/idlj-%{uniquesuffix}.1* +%{_mandir}/man1/jar-%{uniquesuffix}.1* +%{_mandir}/man1/jarsigner-%{uniquesuffix}.1* +%{_mandir}/man1/javac-%{uniquesuffix}.1* +%{_mandir}/man1/javadoc-%{uniquesuffix}.1* +%{_mandir}/man1/javah-%{uniquesuffix}.1* +%{_mandir}/man1/javap-%{uniquesuffix}.1* +%{_mandir}/man1/jconsole-%{uniquesuffix}.1* +%{_mandir}/man1/jcmd-%{uniquesuffix}.1* +%{_mandir}/man1/jdb-%{uniquesuffix}.1* +%{_mandir}/man1/jhat-%{uniquesuffix}.1* +%{_mandir}/man1/jinfo-%{uniquesuffix}.1* +%{_mandir}/man1/jmap-%{uniquesuffix}.1* +%{_mandir}/man1/jps-%{uniquesuffix}.1* +%{_mandir}/man1/jrunscript-%{uniquesuffix}.1* +%{_mandir}/man1/jsadebugd-%{uniquesuffix}.1* +%{_mandir}/man1/jstack-%{uniquesuffix}.1* +%{_mandir}/man1/jstat-%{uniquesuffix}.1* +%{_mandir}/man1/jstatd-%{uniquesuffix}.1* +%{_mandir}/man1/native2ascii-%{uniquesuffix}.1* +%{_mandir}/man1/rmic-%{uniquesuffix}.1* +%{_mandir}/man1/schemagen-%{uniquesuffix}.1* +%{_mandir}/man1/serialver-%{uniquesuffix}.1* +%{_mandir}/man1/wsgen-%{uniquesuffix}.1* +%{_mandir}/man1/wsimport-%{uniquesuffix}.1* +%{_mandir}/man1/xjc-%{uniquesuffix}.1* +%ifarch %{jit_arches} +%{tapsetroot} +%endif + +%files demo -f %{name}-demo.files +%defattr(-,root,root,-) +%doc %{_jvmdir}/%{sdkdir}/LICENSE + +%files src +%defattr(-,root,root,-) +%doc README.src +%{_jvmdir}/%{sdkdir}/src.zip + +%files javadoc +%defattr(-,root,root,-) +%doc %{_javadocdir}/%{uniquejavadocdir} +%doc %{buildoutputdir}/j2sdk-image/jre/LICENSE + +%files accessibility +%{_jvmdir}/%{jredir}/lib/%{archinstall}/libatk-wrapper.so +%{_jvmdir}/%{jredir}/lib/ext/java-atk-wrapper.jar +%{_jvmdir}/%{jredir}/lib/accessibility.properties + +%changelog +* Fri Aug 23 2019 Andrew Hughes - 1:1.7.0.231-2.6.19.3 +- Fix crash in Class.forName0 +- Resolves: rhbz#1738637 + +* Tue Jul 16 2019 Andrew Hughes - 1:1.7.0.231-2.6.19.2 +- Add missing hyphen in tapset filename. +- Resolves: rhbz#1724452 + +* Tue Jul 16 2019 Andrew Hughes - 1:1.7.0.231-2.6.19.1 +- Update tapset filename matching pattern. +- Resolves: rhbz#1724452 + +* Tue Jul 16 2019 Andrew Hughes - 1:1.7.0.231-2.6.19.1 +- Bump to 2.6.19 (including tapsets) and OpenJDK 7u231-b01. +- Fix fsg.sh to fail if patching fails. +- Resolves: rhbz#1724452 + +* Tue Apr 16 2019 Andrew Hughes - 1:1.7.0.221-2.6.18.1 +- Bump to 2.6.18 and OpenJDK 7u221-b02. +- Resolves: rhbz#1693468 + +* Fri Mar 29 2019 Andrew Hughes - 1:1.7.0.211-2.6.17.2 +- Synchronise Requires with java-1.8.0-openjdk +- Replace liblcms.so and libsctp.so in _privatelibs with libjavalcms.so and libjavasctp.so +- Add libjavagtk.so and libmawt.so to _privatelibs +- Remove duplicate fontconfig build requirement +- Remove unneeded Requires for fontconfig, lcms2 and libjpeg (all dynamically linked against) +- Add _isa to NSS requirements +- Move policytool desktop file and man page to java-1.7.0-openjdk where the binary is +- Resolves: rhbz#1608957 + +* Mon Feb 25 2019 Andrew Hughes - 1:1.7.0.211-2.6.17.1 +- Bump to 2.6.17. +- Adjust jdk8076221-pr2809-disable_rc4_cipher_suites.patch to apply after 8211883 +- Regenerate pr3393-rh1273760-support_rsaandmgf1_with_sha_in_pkcs11.patch against current sources +- Resolves: rhbz#1661577 + +* Thu Feb 21 2019 Andrew Hughes - 1:1.7.0.201-2.6.17pre01.0 +- Bump to 2.6.17pre01. +- Add support for icedtea_snapshot so we can build pre-releases. +- Resolves: rhbz#1661577 + +* Fri Dec 07 2018 Severin Gehwolf - 1:1.7.0.201-2.6.16.4 +- Added %%global _find_debuginfo_opts -g +- Resolves: rhbz#1010786 + +* Wed Nov 07 2018 Andrew Hughes - 1:1.7.0.201-2.6.16.2 +- Bump release so y-stream takes priority over z-stream. +- Resolves: rhbz#1633817 + +* Mon Oct 22 2018 Andrew Hughes - 1:1.7.0.201-2.6.16.1 +- Bump to 2.6.16 and u201b00. +- Update 8076221/PR2809 (disable RC4) to apply after 8208350 (disable DES) +- Resolves: rhbz#1633817 + +* Sun Jul 22 2018 Andrew Hughes - 1:1.7.0.191-2.6.15.5 +- Bump to revised 2.6.15 tarball with PR3616 -notimestamp javadoc fix +- Resolves: rhbz#1594249 + +* Thu Jul 19 2018 Andrew Hughes - 1:1.7.0.191-2.6.15.4 +- Bump to revised 2.6.15 tarball with jdk7u191-b01 +- Resolves: rhbz#1594249 + +* Mon Jul 16 2018 Severin Gehwolf - 1:1.7.0.191-2.6.15.3 +- Fix hook to show hs_err*.log files on failures. +- Resolves: rhbz#1600969 + +* Mon Jul 16 2018 Severin Gehwolf - 1:1.7.0.191-2.6.15.3 +- Fix requires/provides filters for internal libs. See RHBZ#1590796 +- Resolves: rhbz#1600969 + +* Wed Jul 11 2018 Andrew Hughes - 1:1.7.0.191-2.6.15.2 +- Bump to revised 2.6.15 tarball with PR3604 +- Resolves: rhbz#1594249 + +* Tue Jul 03 2018 Andrew Hughes - 1:1.7.0.191-2.6.15.1 +- Bump to 2.6.15 and u191b00. +- Drop PR3608/RH1566890/CVE-2018-3639 patch now applied upstream. +- Resolves: rhbz#1594249 + +* Tue Jul 03 2018 Severin Gehwolf - 1:1.7.0.181-2.6.14.11 +- Add hook to show hs_err*.log files on failures. +- Resolves: rhbz#1594249 + +* Tue Jul 03 2018 Andrew Hughes - 1:1.7.0.181-2.6.14.11 +- Cleanup RH1566890 patch and differentiate from java-1.8.0-openjdk version. +- Resolves: rhbz#1594249 + +* Wed Jun 20 2018 Jiri Vanek - 1:1.7.0.181-2.6.14.11 +- jsa files changed to 444 to pass rpm verification +- Add reg-ex for filtering private libraries' provides/requires. +- Resolves: rhbz#1594249 + +* Tue May 22 2018 Andrew Hughes - 1:1.7.0.181-2.6.14.10 +- Fix patch files to appease git apply --stat +- Resolves: rhbz#1578561 + +* Thu Apr 26 2018 Jiri Vanek - 1:1.7.0.181-2.6.14.9 +- added and applied 1566890_embargoed20180521.patch +- Resolves: rhbz#1578561 + +* Thu Apr 26 2018 Jiri Vanek - 1:1.7.0.181-2.6.14.6 +- added depndence on latest c-j-c who do not have the incorrect jre-abrt handling +- Resolves: rhbz#1559766 + +* Fri Apr 20 2018 Andrew Hughes - 1:1.7.0.181-2.6.14.4 +- Bump release so RHEL 7.6 version is higher than RHEL 7.5.z. +- Resolves: rhbz#1559766 + +* Fri Apr 20 2018 Andrew Hughes - 1:1.7.0.181-2.6.14.2 +- Fix invalid license 'LGPL+' (should be LGPLv2+ for ECC code) and add missing ones +- Resolves: rhbz#1559766 + +* Thu Apr 19 2018 Andrew Hughes - 1:1.7.0.181-2.6.14.1 +- Bump to 2.6.14 and u181b00. +- Drop 8197981 Zero 32-bit patch now applied upstream. +- Update RC4 patch (8076221/PR2809) to apply after 8175075 (disable 3DES) +- Resolves: rhbz#1559766 + +* Wed Feb 21 2018 Andrew Hughes - 1:1.7.0.171-2.6.13.2 +- Remove archflags for now. +- Resolves: rhbz#1528233 + +* Wed Feb 21 2018 Andrew Hughes - 1:1.7.0.171-2.6.13.2 +- Make archflags inclusion conditional. +- Resolves: rhbz#1528233 + +* Wed Feb 21 2018 Andrew Hughes - 1:1.7.0.171-2.6.13.2 +- Only define archflags when needed +- Resolves: rhbz#1528233 + +* Wed Feb 21 2018 Andrew Hughes - 1:1.7.0.171-2.6.13.2 +- Get rid of troublesome CFLAGS altogether. +- Resolves: rhbz#1528233 + +* Wed Feb 21 2018 Andrew Hughes - 1:1.7.0.171-2.6.13.2 +- Leading spaces due to empty CFLAGS causes build error +- Resolves: rhbz#1528233 + +* Wed Feb 21 2018 Andrew Hughes - 1:1.7.0.171-2.6.13.2 +- Rebuild with RPM optimisation flags disabled due to issues on x86 multilib +- Resolves: rhbz#1528233 + +* Thu Feb 15 2018 Andrew Hughes - 1:1.7.0.171-2.6.13.1 +- Spoke too soon... fix missing return statement in src/os_cpu/linux_zero/vm/os_linux_zero.cpp (non-LP64 only) +- Resolves: rhbz#1528233 + +* Thu Feb 15 2018 Andrew Hughes - 1:1.7.0.171-2.6.13.1 +- Update to new tarball with AArch64 return value fixes, dropping local patch. +- Drop -Wno-error=return-type now they appear to be fixed. +- Resolves: rhbz#1528233 + +* Wed Feb 14 2018 Andrew Hughes - 1:1.7.0.171-2.6.13.1 +- Extend pr3393-rh1273760-support_rsaandmgf1_with_sha_in_pkcs11.patch so Token.getMechanismInfo can handle CK_MECHANISM +- Fix missing return statement in hotspot/src/cpu/aarch64/vm/vm_version_aarch64.cpp +- Resolves: rhbz#1528233 + +* Tue Feb 13 2018 Andrew Hughes - 1:1.7.0.171-2.6.13.1 +- Fix missing return statement in hotspot/src/os_cpu/linux_aarch64/vm/os_linux_aarch64.cpp +- Temporarily add -Wno-error=return-type so we can catch them all. +- Resolves: rhbz#1528233 + +* Tue Feb 13 2018 Andrew Hughes - 1:1.7.0.171-2.6.13.1 +- Fix missing return statement in hotspot/src/cpu/aarch64/vm/c1_LIRAssembler_aarch64.cpp. +- Resolves: rhbz#1528233 + +* Tue Feb 13 2018 Andrew Hughes - 1:1.7.0.171-2.6.13.1 +- Bump to 2.6.13 and u171b01. +- Update rh1648644-java_access_bridge_privlidged_security.patch to apply after 8186080 +- Drop PR3497 AArch64 patch now applied upstream. +- Update RC4 patch (8076221/PR2809) to apply after 8148108 (DH lower limit increase) +- Resolves: rhbz#1528233 + +* Tue Feb 13 2018 Andrew Hughes - 1:1.7.0.161-2.6.12.2 +- Turn off -Werror for format-nonliteral +- Resolves: rhbz#1528233 + +* Tue Feb 13 2018 Andrew Hughes - 1:1.7.0.161-2.6.12.2 +- Need to quote ourcppflags/ourldflags so as not to break on spaces. +- Add flags to both make invocations. +- Drop -fstack-protector-strong addition as provided by distro. +- Resolves: rhbz#1528233 + +* Tue Feb 13 2018 Andrew Hughes - 1:1.7.0.161-2.6.12.2 +- Use distro build flags as we do for OpenJDK 8. +- Resolves: rhbz#1528233 + +* Tue Nov 28 2017 Andrew Hughes - 1:1.7.0.161-2.6.12.1 +- Turn on hsbootstrap for JIT arches +- Resolves: rhbz#1499207 + +* Tue Nov 28 2017 Andrew Hughes - 1:1.7.0.161-2.6.12.1 +- Remove superfluous %%1 from policy JAR file path. +- Resolves: rhbz#1499207 + +* Tue Nov 28 2017 Andrew Hughes - 1:1.7.0.161-2.6.12.1 +- Add missing implementation of Matcher::pass_original_key_for_aes() on AArch64 (PR3497) +- Resolves: rhbz#1499207 + +* Tue Nov 28 2017 Andrew Hughes - 1:1.7.0.161-2.6.12.1 +- Update location of policy JAR files following 8157561. +- Resolves: rhbz#1499207 + +* Tue Nov 28 2017 Andrew Hughes - 1:1.7.0.161-2.6.12.1 +- Fix name of SystemTap tarball, following update. +- Resolves: rhbz#1499207 + +* Tue Nov 28 2017 Andrew Hughes - 1:1.7.0.161-2.6.12.1 +- Bump to 2.6.12 and u161b00. +- Update SystemTap tapsets to version in IcedTea 2.6.12pre01 to fix RH1492139. +- Drop 8185716, 8145438, 8138745 and 8075484 patches, all applied upstream. +- Update location of OpenJDK zlib system library source code in remove-intree-libraries.sh +- Resolves: rhbz#1499207 + +* Thu Oct 26 2017 Andrew Hughes - 1:1.7.0.151-2.6.11.4 +- Add backport of 8075484/PR3473/RH1490713 (SocketInputStream.socketRead0 hang) +- Resolves: rhbz#1490713 + +* Thu Oct 26 2017 Andrew Hughes - 1:1.7.0.151-2.6.11.4 +- Add backport of 8138745/PR3465/RH1484399 (-XX:+ExitOnOutOfMemoryError) +- Resolves: rhbz#1484399 + +* Thu Oct 26 2017 Andrew Hughes - 1:1.7.0.151-2.6.11.3 +- Fix crashing virtual machine ("Field too big for insn") on AArch64 +- Resolves: rhbz#1482244 + +* Wed Aug 02 2017 Andrew Hughes - 1:1.7.0.151-2.6.11.2 +- Bump to 2.6.11 and u151b00. +- Update java-access-bridge-security.patch to apply against 2.6.11. +- Drop 7177216 merge fix which is applied upstream. +- Apply fix for 8185716 so ppc uses correct ins_encode format +- Resolves: rhbz#1466509 + +* Tue Jun 13 2017 Jiri Vanek - 1:1.7.0.141-2.6.10.5 +- make to use latest c-j-c and so fix persisting issues with java.security and other configfiles +- aligned with this change, applied repackReproduciblePolycies.sh +- 1183793 is missing blocker +- Resolves: rhbz#1448880 + +* Wed Jun 07 2017 Andrew Hughes - 1:1.7.0.141-2.6.10.4 +- Fix merge error with "native2ascii changes file permissions of input file" +- Resolves: rhbz#1446700 + +* Wed May 17 2017 Andrew Hughes - 1:1.7.0.141-2.6.10.3 +- Add support for using RSAandMGF1 with the SHA hash algorithms in the PKCS11 provider +- Resolves: rhbz#1273760 + +* Wed May 03 2017 Andrew Hughes - 1:1.7.0.141-2.6.10.2 +- Bump to u141b02 to include S8011123 fix for TCK failure. +- Resolves: rhbz#1438751 + +* Thu Apr 27 2017 Andrew Hughes - 1:1.7.0.141-2.6.10.1 +- Bump to u141b01 to include S8043723 fix for s390. +- Resolves: rhbz#1438751 + +* Thu Apr 27 2017 Andrew Hughes - 1:1.7.0.141-2.6.10.1 +- Bump to 2.6.10 and u141b00. +- Add more detailed output to fsg.sh and generate_source_tarball.sh. +- Update md5sum list with checksum for the new java.security file. +- Drop 8173783 backport which is now applied upstream. +- Resolves: rhbz#1438751 + +* Wed Apr 05 2017 Andrew Hughes - 1:1.7.0.131-2.6.9.3 +- Backport "8173783: IllegalArgumentException: jdk.tls.namedGroups" +- Apply backports before local RPM fixes so they will be the same as when applied upstream +- Adjust RH1022017 following application of 8173783 +- Resolves: rhbz#1422738 + +* Tue Apr 04 2017 Andrew Hughes - 1:1.7.0.131-2.6.9.2 +- Introduce stapinstall variable to set SystemTap arch directory correctly (e.g. arm64 on aarch64) +- Update jstack tapset to handle AArch64 +- Handle unsupported architectures by calling the error function rather than a parse failure +- ABS_JAVA_HOME_DIR is no longer used in the updated tapsets +- Resolves: rhbz#1373986 + +* Tue Feb 07 2017 Andrew Hughes - 1:1.7.0.131-2.6.9.1 +- Bump to 2.6.9 and u131b00. +- Remove patch application debris in fsg.sh. +- Re-generate PR2809 and RH1022017 against 2.6.9. +- Update md5sum list with checksum for the new java.security file. +- Add blacklisted.certs to installation file list. +- Resolves: rhbz#1410612 + +* Mon Jan 09 2017 Andrew Hughes - 1:1.7.0.121-2.6.8.1 +- Bump release for rhel-7.4 branch. Fix "luncher" typo. +- Resolves: rhbz#1383251 + +* Mon Oct 31 2016 Andrew Hughes - 1:1.7.0.121-2.6.8.0 +- Turn off HotSpot bootstrap to see if it resolves build issues. +- Resolves: rhbz#1381990 + +* Fri Oct 28 2016 Andrew Hughes - 1:1.7.0.121-2.6.8.0 +- Bump to 2.6.8 and u121b00. +- Drop patches (S7081817, S8140344, S8145017 and S8162344) applied upstream. +- Update md5sum list with checksum for the new java.security file. +- Resolves: rhbz#1381990 + +* Mon Sep 05 2016 Andrew Hughes - 1:1.7.0.111-2.6.7.7 +- Rebuild java-1.7.0-openjdk for GCC aarch64 stack epilogue code generation fix (RH1372747) +- Resolves: rhbz#1350042 + +* Wed Aug 31 2016 Jiri Vanek - 1:1.7.0.111-2.6.7.6 +- declared check_sum_presented_in_spec and used in prep and check +- it is checking that latest packed java.security is mentioned in listing +- Resolves: rhbz#1350042 + +* Wed Aug 31 2016 Jiri Vanek - 1:1.7.0.111-2.6.7.6 +- New variable, @prefix@, needs to be substituted in tapsets (rhbz1371005) +- Resolves: rhbz#1350042 + +* Wed Aug 31 2016 Andrew Hughes - 1:1.7.0.111-2.6.7.5 +- Change to disable RC4 did not add MD5 checksum of previous java.security file from 2016/01 +- Resolves: rhbz#1350042 + +* Tue Jul 26 2016 Andrew Hughes - 1:1.7.0.111-2.6.7.4 +- Require a version of java-1.7.0-openjdk-devel with a working jar uf +- Use readlink rather than a wildcard to resolve the system JDK directory +- Resolves: rhbz#1350042 + +* Fri Jul 22 2016 Andrew Hughes - 1:1.7.0.111-2.6.7.3 +- Add additional changes to 8162344 to fix issues which only show up on a full build. +- Resolves: rhbz#1350042 + +* Fri Jul 22 2016 Andrew Hughes - 1:1.7.0.111-2.6.7.3 +- Bump to jdk7u111 b01 to fix TCK regressions (7081817 & 8162344) +- Resolves: rhbz#1350042 + +* Thu Jul 21 2016 Andrew Hughes - 1:1.7.0.111-2.6.7.2 +- Reset permissions of resources.jar to avoid it only being readable by root (PR1437). +- Resolves: rhbz#1350042 + +* Wed Jul 20 2016 Andrew Hughes - 1:1.7.0.111-2.6.7.1 +- Bump to 2.6.7 and u111b00. +- Update SystemTap bundle with fix for PR3091/RH1204159 +- Drop patches (PR2938, PR2939, PR3012, PR3013 and PR1437) applied upstream. +- Resolves: rhbz#1350042 + +* Thu Jun 30 2016 Andrew Hughes - 1:1.7.0.101-2.6.6.6 +- Add fix for PR1437 which reapplies 7175845 fix lost in merge. +- Resolves: rhbz#1207129 + +* Thu Jun 30 2016 Andrew Hughes - 1:1.7.0.101-2.6.6.6 +- Add fix for 8069181/PR3012 and pre-requisites from PR3013. +- Add bug information for backports from last CPU. +- Resolves: rhbz#1015612 + +* Tue Jun 21 2016 Jiri Vanek - 1:1.7.0.101-2.6.6.4 +- luascripts extracted and used from separate package +- added requirement on at least build time nss +- added --family and dependence on chkconfig >=1.7 +- in adition, family is restricted by arch +- Resolves: rhbz#1296441 +- Resolves: rhbz#1296413 + +* Tue Jun 07 2016 Jiri Vanek - 1:1.7.0.101-2.6.6.3 +- added requires for copy-jdk-configs, to help with https://projects.engineering.redhat.com/browse/RCM-3654 +- Resolves: rhbz#1296441 + +* Tue Apr 19 2016 Jiri Vanek - 1:1.7.0.101-2.6.6.2 +- added Patch666 fontpath.patch to fix tck regressions +- Resolves: rhbz#1325428 + +* Mon Apr 18 2016 Andrew Hughes - 1:1.7.0.101-2.6.6.1 +- Fix ztos handling in templateTable_ppc_64.cpp to be same as others in 7. +- Resolves: rhbz#1325428 + +* Mon Apr 18 2016 Andrew Hughes - 1:1.7.0.101-2.6.6.1 +- Bump to 2.6.6 and u101b00. +- Drop AArch64 patch (PR2914) included in 2.6.6 +- Drop a leading zero from the priority as the update version is now three digits +- Update PR2809 patch to apply against 2.6.6. +- Resolves: rhbz#1325428 + +* Mon Apr 18 2016 Andrew Hughes - 1:1.7.0.99-2.6.5.5 +- Backout S4858370. +- Resolves: rhbz#1284948 + +* Wed Apr 06 2016 Andrew Hughes - 1:1.7.0.99-2.6.5.4 +- Replace 8146709 backout with fix from Andrew Haley +- Resolves: rhbz#1310061 + +* Tue Apr 05 2016 Andrew Hughes - 1:1.7.0.99-2.6.5.3 +- Backout 8146709 to try and fix build on AArch64 +- Resolves: rhbz#1310061 + +* Mon Apr 04 2016 Andrew Hughes - 1:1.7.0.99-2.6.5.2 +- Add fix for S4858370. +- Resolves: rhbz#1284948 + +* Thu Mar 24 2016 Andrew Hughes - 1:1.7.0.99-2.6.5.1 +- Bump to 2.6.5 and u99b00. +- Correct check for fsg.sh in tarball creation script +- Drop AArch64 ADRP backports (8143067, 8146709) included in 2.6.5 +- Resolves: rhbz#1320659 + +* Thu Mar 03 2016 Andrew Hughes - 1:1.7.0.95-2.6.4.3 +- Add AArch64 ADRP backports +- Resolves: rhbz#1310061 + +* Wed Jan 27 2016 Andrew Hughes - 1:1.7.0.95-2.6.4.2 +- Disable RC4 by default. +- Resolves: rhbz#1302385 + +* Tue Jan 19 2016 Andrew Hughes - 1:1.7.0.95-2.6.4.1 +- Bump to 2.6.4 and u95b00. +- Backport tarball creation script from OpenJDK 8 RPMs and update fsg.sh to work with it. +- Drop 8072932or8074489 patch as applied upstream in u91b01. +- Add MD5 checksums for last two version of the java.security file. +- Correct date of ChangeLog entry below. +- Resolves: rhbz#1295769 + +* Thu Nov 12 2015 Jiri Vanek - 1:1.7.0.91-2.6.2.4 +- fixed headless to become headless again + - jre/lib/archinstall/libjavagtk.so + - jre/bin/policytool + - jre-abrt/lib/archinstall/libjavagtk.so + - all three added to not headless exclude list +- see rhbz1141123 +- Resolves: rhbz#1278987 + +* Tue Oct 20 2015 Jiri Vanek - 1:1.7.0.91-2.6.2.3 +- added and applied patch500 8072932or8074489.patch to fix tck failure +- Resolves: rhbz#1271923 + +* Mon Oct 19 2015 Andrew Hughes - 1:1.7.0.91-2.6.2.2 +- Turn off deletion of in-tree LCMS sources as we now need them. +- Resolves: rhbz#1271923 + +* Mon Oct 19 2015 Andrew Hughes - 1:1.7.0.91-2.6.2.1 +- Bump to 2.6.2 and u91b00. +- Disable system LCMS 2 for now until security of it can be verified. +- Drop patches for PR2560/RH1245855 as now applied upstream. +- Sync minor changes from RHEL 6 spec file. +- Resolves: rhbz#1271923 + +* Wed Oct 14 2015 Jiri Vanek - 1:1.7.0.85-2.6.1.7 +- removed link to soundfont. Unused in rhel7 and will be fixed upstream +- Resolves: rhbz#1257653 + +* Mon Aug 31 2015 Jiri Vanek - 1:1.7.0.85-2.6.1.6 +- bumped release to allow update testing of previous chnageset +- Resolves: rhbz#1235159 + +* Mon Aug 31 2015 Jiri Vanek - 1:1.7.0.85-2.6.1.5 +- removed rm -rf in headless post +- Resolves: rhbz#1235159 + +* Mon Jul 27 2015 Andrew Hughes - 1:1.7.0.85-2.6.1.4 +- Backport JDWP null fixes. +- Resolves: rhbz#1245855 + +* Thu Jul 23 2015 Andrew Hughes - 1:1.7.0.85-2.6.1.3 +- Backport fixes for debugger crash +- Resolves: rhbz#1245855 + +* Sat Jul 11 2015 Andrew Hughes - 1:1.7.0.85-2.6.1.2 +- Bump upstream tarball to u25b01 to fix issue with 8075374 backport. +- Resolves: rhbz#1235159 + +* Thu Jul 09 2015 Andrew Hughes - 1:1.7.0.85-2.6.1.1 +- Update OpenJDK tarball so correct version is used. +- Resolves: rhbz#1235159 + +* Thu Jul 09 2015 Andrew Hughes - 1:1.7.0.85-2.6.1.0 +- Add additional java.security md5sum from January CPU +- Resolves: rhbz#1235159 + +* Thu Jul 09 2015 Andrew Hughes - 1:1.7.0.85-2.6.1.0 +- Bump to 2.6.1 and u85b00. +- Resolves: rhbz#1235159 + +* Wed Jul 08 2015 Andrew Hughes - 1:1.7.0.80-2.6.0.1 +- Pass SYSTEM_GSETTINGS="true" to the OpenJDK build to explicitly enable the GSettings API. +- Resolves: rhbz#1194226 + +* Wed Jul 08 2015 Andrew Hughes - 1:1.7.0.80-2.6.0.0 +- Add GConf2-devel dependency for native proxy fallback support. +- Remove libxslt dependency pulled in from IcedTea builds. +- Reduce redhat-lsb dependency to redhat-lsb-core (lsb_release) +- Resolves: rhbz#1194226 + +* Wed Jul 08 2015 Andrew Hughes - 1:1.7.0.80-2.6.0.0 +- Bump to 2.6.0 and u80b32. +- Drop upstreamed patches and separate AArch64 HotSpot. +- Add dependencies on pcsc-lite-devel (PR2496) and lksctp-tools-devel (PR2446) +- Only run -Xshare:dump on JIT archs other than power64 as port lacks support +- Update remove-intree-libraries script to cover LCMS and PCSC headers. +- Resolves: rhbz#1194226 + +* Wed Jun 24 2015 Andrew Hughes - 1:1.7.0.79-2.5.5.4 +- Fix name resolution when /etc/resolv.conf lists an IPv6 nameserver +- Resolves: rhbz#1203666 + +* Wed Apr 29 2015 Andrew Hughes - 1:1.7.0.79-2.5.5.3 +- Re-based SunEC changes onto latest RPM from private branch +- Resolves: rhbz#1121210 + +* Fri Apr 24 2015 Andrew Hughes - 1:1.7.0.79-2.5.5.2 +- Fix crash on ppc64le when running Apache Oozie +- Resolves: rhbz#1201393 + +* Fri Apr 10 2015 Jiri Vanek - 1:1.7.0.79-2.5.5.1 +- repacked sources +- Resolves: rhbz#1209073 + +* Tue Apr 07 2015 Andrew Hughes - 1:1.7.0.79-2.5.5.0 +- Bump to 2.5.5 using OpenJDK 7u79 b14. +- Update OpenJDK tarball creation comments +- Remove test case for RH1191652 now fix has been verified. +- Drop AArch64 version of RH1191652 HotSpot patch as included upstream. +- Resolves: rhbz#1209073 + +* Wed Mar 04 2015 Andrew Hughes - 1:1.7.0.75-2.5.4.7 +- ppc64le now has pulseaudio +- Resolves: rhbz#1191652 + +* Tue Mar 03 2015 Andrew Hughes - 1:1.7.0.75-2.5.4.6 +- Fix use of unapproved bug ID (resolved as duplicate) in changelog entry. +- Resolves: rhbz#1191652 + +* Tue Mar 03 2015 Andrew Hughes - 1:1.7.0.75-2.5.4.6 +- Provide AArch64 version of RH1191652 HotSpot patch. +- Resolves: rhbz#1191652 + +* Fri Feb 27 2015 Andrew Hughes - 1:1.7.0.75-2.5.4.5 +- Turn off hsbootstrap on all archs +- Resolves: rhbz#1191652 + +* Fri Feb 27 2015 Andrew Hughes - 1:1.7.0.75-2.5.4.5 +- Add missing bracket. +- Resolves: rhbz#1191652 + +* Fri Feb 27 2015 Andrew Hughes - 1:1.7.0.75-2.5.4.5 +- Turn off hsbootstrap on all archs +- Resolves: rhbz#1191652 + +* Fri Feb 27 2015 Andrew Hughes - 1:1.7.0.75-2.5.4.5 +- Add missing bracket. +- Resolves: rhbz#1191652 + +* Fri Feb 27 2015 Andrew Hughes - 1:1.7.0.75-2.5.4.5 +- Ensure VM directory exists before copying libjvm.so +- Resolves: rhbz#1191652 + +* Fri Feb 27 2015 Andrew Hughes - 1:1.7.0.75-2.5.4.5 +- Fix path to libjvm.so used in hsbootstrap to a more general one. +- Resolves: rhbz#1191652 + +* Thu Feb 26 2015 Andrew Hughes - 1:1.7.0.75-2.5.4.5 +- Fix hsbootstrap option on ppc64le where JDK_TO_BUILD_WITH is changed. +- Print uname to feedback to upstream OpenJDK. +- Resolves: rhbz#1191652 + +* Thu Feb 26 2015 Andrew Hughes - 1:1.7.0.75-2.5.4.5 +- Test a hsbootstrap build on ppc64le +- Resolves: rhbz#1191652 + +* Fri Feb 13 2015 Andrew Hughes - 1:1.7.0.75-2.5.4.5 +- Adjust archbuild instead as JDK build is now using ppc64le +- Resolves: rhbz#1191652 + +* Fri Feb 13 2015 Andrew Hughes - 1:1.7.0.75-2.5.4.5 +- Add ppc64le defines for javax.sound +- Resolves: rhbz#1191652 + +* Fri Feb 13 2015 Andrew Hughes - 1:1.7.0.75-2.5.4.5 +- Add jvm.cfg for ppc64le +- Resolves: rhbz#1191652 + +* Fri Feb 13 2015 Andrew Hughes - 1:1.7.0.75-2.5.4.5 +- Adjust archbuild instead as JDK build is now using ppc64le +- Resolves: rhbz#1191652 + +* Fri Feb 13 2015 Andrew Hughes - 1:1.7.0.75-2.5.4.5 +- Add ppc64le defines for javax.sound +- Resolves: rhbz#1191652 + +* Fri Feb 13 2015 Andrew Hughes - 1:1.7.0.75-2.5.4.5 +- Add jvm.cfg for ppc64le +- Resolves: rhbz#1191652 + +* Fri Feb 13 2015 Andrew Hughes - 1:1.7.0.75-2.5.4.5 +- Add patch for RH1191652 on the JDK side +- Resolves: rhbz#1191652 + +* Fri Feb 13 2015 Andrew Hughes - 1:1.7.0.75-2.5.4.5 +- Adjust archinstall and ppc64le workaround to establish jre/lib/ppc64le +- Resolves: rhbz#1191652 + +* Fri Feb 13 2015 Andrew Hughes - 1:1.7.0.75-2.5.4.5 +- Fix patch for RH1191652 to override LIBARCH on ppc64le as there is no BUILDARCH +- Resolves: rhbz#1191652 + +* Fri Feb 13 2015 Andrew Hughes - 1:1.7.0.75-2.5.4.5 +- Fix patch for RH1191652 to apply against 2.5 (original against HEAD) +- Resolves: rhbz#1191652 + +* Fri Feb 13 2015 Andrew Hughes - 1:1.7.0.75-2.5.4.5 +- Fix patch for RH1191652 to override LIBARCH on ppc64le as there is no BUILDARCH +- Resolves: rhbz#1191652 + +* Fri Feb 13 2015 Andrew Hughes - 1:1.7.0.75-2.5.4.5 +- Fix patch for RH1191652 to apply against 2.5 (original against HEAD) +- Resolves: rhbz#1191652 + +* Fri Feb 13 2015 Andrew Hughes - 1:1.7.0.75-2.5.4.5 +- Use arch name of ppc64le on ppc64le rather than ppc64. +- Resolves: rhbz#1191652 + +* Mon Feb 02 2015 Andrew Hughes - 1:1.7.0.75-2.5.4.4 +- Symlink ppc64 directory to ppc64le +- Run test application to print architecture-specific paths stored in the JDK +- Resolves: rhbz#1191652 + +* Tue Jan 27 2015 Jiri Vanek - 1:1.7.0.75-2.5.4.3 +- removed source14 remove-origin-from-rpaths (1169097) +- removed build requirement for chrpath +- Resolves: rhbz#1180298 + +* Fri Jan 16 2015 Severin Gehwolf - 1:1.7.0.75-2.5.4.2 +- Replace unmodified java.security file via headless post scriptlet. +- Resolves: rhbz#1180298 + +* Sun Jan 11 2015 Andrew Hughes - 1:1.7.0.75-2.5.4.1 +- Fix macro expansion in changelog +- Resolves: rhbz#1180298 + +* Fri Jan 09 2015 Andrew Hughes - 1:1.7.0.75-2.5.4.1 +- Fix elliptic curve list as part of fsg.sh +- Resolves: rhbz#1180298 + +* Fri Jan 09 2015 Andrew Hughes - 1:1.7.0.75-2.5.4.1 +- Bump release so that the RHEL 7.1 version is built on AArch64. +- Resolves: rhbz#1180298 + +* Fri Jan 09 2015 Andrew Hughes - 1:1.7.0.75-2.5.4.0 +- Bump to 2.5.4 using OpenJDK 7u75 b13. +- Bump AArch64 port to 2.6.0pre17. +- Fix rh1648241-rh1648241-abrt_friendly_hs_log_jdk7.patch to apply again and enable on all archs. +- Remove OpenJDK 8 / AArch64 version of PStack patch as this is no longer needed. +- Resolves: rhbz#1180298 + +* Tue Dec 16 2014 Jiri Vanek - 1:1.7.0.71-2.5.3.4 +- aarch64 sources updated to most recent stable tag +- adapted patch4030 PStack-808293-aarch64.patch +- removed upstreamed CPU patches (patch500-509, 20141014*) +- Resolves: rhbz#1125260 + +* Mon Oct 06 2014 Andrew Hughes - 1:1.7.0.71-2.5.3.3 +- Set ENABLE_FULL_DEBUG_SYMBOLS=0 for aarch64 to retain debuginfo in files. +- Resolves: rhbz#1148894 + +* Sat Oct 04 2014 Andrew Hughes - 1:1.7.0.71-2.5.3.2 +- Add HS security patches for aarch64. +- Resolves: rhbz#1148894 + +* Fri Oct 03 2014 Andrew Hughes - 1:1.7.0.71-2.5.3.1 +- Bump to 2.5.3 for latest security fixes. +- Remove obsolete patches and CFLAGS which are now upstream. +- Add hsbootstrap option to pre-build HotSpot when required. +- Resolves: rhbz#1148894 + +* Thu Oct 02 2014 Severin Gehwolf - 1.7.0.65-2.5.1.12 +- Bump release for self-build. +- Resolves: RHBZ#1125557. + +* Tue Sep 23 2014 Severin Gehwolf - 1.7.0.65-2.5.1.11 +- Add hotspot compiler flag -fno-tree-vectorize which fixes the segfault in + the bytecode verifier on ppc/ppc64. + +* Tue Sep 23 2014 Severin Gehwolf - 1.7.0.65-2.5.1.10 +- Add patches for PPC zero build. +- Fixes stack overflow problem. See RHBZ#1015432. +- Fixes missing memory barrier in Atomic::xchg* +- Fixes missing PPC32/PPC64 defines for Zero builds on power. + +* Mon Sep 22 2014 Severin Gehwolf - 1.7.0.65-2.5.1.9 +- Remove obsolete PPC/PPC64 patches. + +* Thu Sep 11 2014 Omair Majid - 1.7.0.65-2.5.1.8 +- Update aarch64 port to jdk7u60_b04_aarch64_834 +- Resolves: rhbz#1082779 + +* Tue Aug 19 2014 Jiri Vanek - 1.7.0.65-2.5.1.7 +- added and applied patch666 stackoverflow-ppc32_64-20140828.patch +- returned ppc (rebuild in brew must be done by 2.4.x) +- Resolves: rhbz#1125557 + +* Tue Aug 19 2014 Jiri Vanek - 1.7.0.65-2.5.1.6 +- added ExcludeArch: ppc +- Resolves: rhbz#1125557 + +* Mon Aug 04 2014 Andrew Hughes - 1:1.7.0.65-2.5.1.5 +- Add workaround to build on ppc64le where arch directory is still ppc64le, not ppc64 +- Resolves: rhbz#1125557 + +* Wed Jul 30 2014 Omair Majid - 1.7.0.65-2.5.1.4 +- Bump release to build package on aarch64 +- Resolves: rhbz#1082779 + +* Wed Jul 30 2014 Jiri Vanek - 1.7.0.65-2.5.1.3 +- Update aarch64 to latest version +- Resolves: rhbz#1082779 + +* Thu Jul 17 2014 Andrew Hughes - 1:1.7.0.65-2.5.1.3 +- NSS_LIBS should be set from nss pkgconfig, not nss-softokn +- Resolves: rhbz#1121210 + +* Mon Jul 14 2014 Jiri Vanek - 1.7.0.65-2.5.1.2 +- added and applied fix for samrtcard io patch405, pr1864_smartcardIO.patch +- Resolves: rhbz#1115877 + +* Mon Jul 07 2014 Jiri Vanek - 1.7.0.65-2.5.1.1 +- updated to security patched icedtea7-forest-2.5.1 +- Resolves: rhbz#1115877 + +* Wed Jul 02 2014 Jiri Vanek - 1.7.0.60-2.5.0.3 +- updated to icedtea7-forest-2.5.0 (rh1114934) +- Resolves: rhbz#1099566 + +* Tue Jul 01 2014 Andrew Hughes - 1:1.7.0.60-2.5.0.2 +- Add nss-softokn dependency for SunEC provider +- Resolves: rhbz#1121210 + +* Mon Jun 30 2014 Andrew Hughes - 1:1.7.0.60-2.5.0.1 +- Enable SunEC provider with system NSS support. +- Resolves: rhbz#1121210 + +* Fri May 30 2014 Andrew John Hughes - 1.7.0.55-2.4.7.2 +- Remove NSS patches. Issues with PKCS11 provider mean it shouldn't be enabled. +- Always setup nss.cfg and depend on nss-devel at build-time to do so. +- This allows users who wish to use PKCS11+NSS to just add it to java.security. +- Patches to PKCS11 provider will be included upstream in 2.4.8 (ETA July 2014) +- Resolves: rhbz#1099565 + +* Tue May 20 2014 Jiri Vanek - 1.7.0.55-2.4.7.0.el7 +- bumped to future icedtea-forest 2.4.7 +- updatever set to 55, buildver se to 13, release reset to 0 +- removed upstreamed patch402 gstackbounds.patch +- removed Requires: rhino, BuildRequires is enough +- ppc64 repalced by power64 macro +- patch111 applied as dry-run (6.6 forward port) +- nss enabled, but notused as default (6.6 forward port) +- Resolves: rhbz#1099565 + +* Fri Apr 04 2014 Jiri Vanek - 1.7.0.51-2.4.5.5.el7 +- added OrderWithRequires on headless where possible +- Resolves: rhbz#1038092 + +* Thu Mar 27 2014 Jiri Vanek - 1.7.0.51-2.4.5.3.el7 +- synced lua script from fedora. +- Resolves: rhbz#1038092 + +* Fri Mar 14 2014 Jiri Vanek - 1.7.0.51-2.4.5.2.el7 +- added fstack-protector-strong to CFLAGS +- Resolves: rhbz#1070816 + +* Thu Mar 06 2014 Jiri Vanek - 1.7.0.51-2.4.5.1.el7 +- diabled NSS. Missuisng 1038092 for it as it is in hurry. +- Related: rhbz#1038092 + +* Thu Jan 30 2014 Jiri Vanek - 1.7.0.51-2.4.5.0.el7 +- updated to icedtea 2.4.5 + sync with f21 + - http://blog.fuseyism.com/index.php/2014/01/29/icedtea-2-4-5-released/ +- removed buildRequires: pulseaudio >= 0.9.11, as not neccessary + - but kept libs-devel) +- removed upstreamed or unwonted patches (thanx to gnu_andrew to pointing them out) + - patch410 1015432.patch (upstreamed) + - patch411 1029588.patch + - patch412 zero-x32.diff + - patch104 java-1.7.0-ppc-zero-jdk.patch + - patch105 java-1.7.0-ppc-zero-hotspot.patch +- patch402 gstackbounds.patch and patch403 PStack-808293.patch applied always + (again thanx to gnu_andrew) +- merged other gnu_andrew's changes + - FT2_CFLAGS and FT2_LIBS hardoced values replaced by correct pkg-config calls + - buildver bumbed to 31 +- added build requires nss-devel +- removed build requires mercurial +- added JRE_RELEASE_VERSION and ALT_PARALLEL_COMPILE_JOBS into make call +- Related: rhbz1038092 + +* Tue Jan 28 2014 Daniel Mach - 1.7.0.51-2.4.4.1 +- Mass rebuild 2014-01-24 + +* Fri Jan 10 2014 Jiri Vanek - 1.7.0.51-2.4.4.0.el7 +- updated to security icedtea 2.4.4 + - icedtea_version set to 2.4.4 + - updatever bumped to 51 + - release reset to 0 +- sync with fedora + - added and applied patch411 1029588.patch (rh 1029588) + - added aand applied patch410, 1015432 (rh 1015432) + - and so removed patch121 FixPPC64StackOverflow.patch +- added patch412 zero-x32.diff to try to fix zero builds build +- Resolves: rhbz#1053280 + +* Fri Dec 27 2013 Daniel Mach - 1.7.0.45-2.4.3.5.el7 +- Mass rebuild 2013-12-27 + +* Thu Oct 31 2013 Jiri Vanek - 1.7.0.40-2.4.3.4.fel7 +- Removed obsoletes for java-1.6.0-openjdk* , until decided its presence in el7 +- Resolves:rhbz#1018680 + +* Thu Oct 31 2013 Jiri Vanek - 1.7.0.40-2.4.3.3.fel7 +- just bumped release, need to confirm, that patch121, FixPPC64StackOverflow.patch + really works +- Resolves:rhbz#1018680 + +* Wed Oct 16 2013 Jiri Vanek - 1.7.0.40-2.4.3.2.fel7 +- added and applied patch121, FixPPC64StackOverflow.patch +- all redundant ppc64 strings replaced by power64 macro +- Resolves:rhbz#1018680 + +* Wed Oct 16 2013 Jiri Vanek - 1.7.0.40-2.4.3.1.fel7 +- updated to new CPU sources 2.4.3 +- Resolves:rhbz#1018680 + +* Mon Oct 14 2013 Jiri Vanek - 1.7.0.40-2.4.3.0.fel7 +- updated to latest CPU sources 2.4.3 +- Resolves:rhbz#1018680 + +* Mon Oct 14 2013 Jiri Vanek - 1.7.0.40-2.4.2.12.fel7 +- jdk splitted to headless and rest +- Resolves:rhbz#875408 + +* Fri Oct 04 2013 Jiri Vanek - 1.7.0.40-2.4.2.11.fel7 +- another tapset fix +- Resolves:rhbz#875408 + +* Fri Oct 04 2013 Jiri Vanek - 1.7.0.40-2.4.2.10.fel7 +- abrt changed to soft dependece +- Resolves:rhbz#875408 + +* Thu Oct 03 2013 Jiri Vanek - 1.7.0.40-2.4.2.9.el7 +- renamed tapset source to be "versioned" +- improved agent placement +- Resolves:rhbz#875408 + +* Wed Oct 02 2013 Jiri Vanek - 1.7.0.40-2.4.2.8.el7 +- updated tapset to current head (825824) +- Resolves:rhbz#875408 + +* Tue Oct 01 2013 Jiri Vanek - 1.7.0.40-2.4.2.7.el7 +- fixed incorrect _jvmdir/jre-javaver_origin to _jvmdir/jre-javaver-origin link +- Resolves:rhbz#875408 + +* Tue Oct 01 2013 Jiri Vanek - 1.7.0.40-2.4.2.6.el7 +- syncing with f20 - abrt connector +- Resolves:rhbz#875408 + +* Tue Oct 01 2013 Jiri Vanek - 1.7.0.40-2.4.2.3.el7 +- syncing with f19/rhel-6.5 +- Resolves:rhbz#875408 + + +* Wed Aug 07 2013 Deepak Bhole - 1.7.0.25-2.3.12.3.el7 +- Removed obsoletes for java-1.6.0-openjdk* + +* Fri Jul 26 2013 Jiri Vanek - 1.7.0.25-2.3.12.2.el7 +- refreshed icedtea7-forest 2.3.12 +- fix broken jre_exports alternatives links (thanx to orion bug #979128) + +* Thu Jul 25 2013 Jiri Vanek - 1.7.0.25-2.3.11.0.el7 +- added new alternatives jre-1.7.0-openjdk and java-1.7.0-openjdk +- finally merged arm and main source tarballs +- updated to icedtea 2.3.11 + - http://blog.fuseyism.com/index.php/2013/07/25/icedtea-2-3-11-released/ +- added removal of new jre-1.7.0-openjdk and java-1.7.0-openjdk alternatives +- removed patch 400, rhino for 2.1 and other 2.1 conditional stuff +- removed patch 103 arm-fixes.patch +- removed "dir" from files which was duplicating jre in sdk + +* Fri Jul 19 2013 Jiri Vanek - 1.7.0.25-2.3.10.6.el7 +- jrelnk is now just lnk, everything is pointing through jredir + +* Thu Jul 18 2013 Jiri Vanek - 1.7.0.25-2.3.10.6.el7 +- minor cleaning +- sdklnk removed, and substitued by sdkdir + +* Wed Jul 03 2013 Jiri Vanek - 1.7.0.25-2.3.10.5.fel7 +- moved to xz compression of sources +- updated 2.1 tarball + +* Thu Jun 27 2013 Jiri Vanek - 1.7.0.25-2.3.10.4.el7 +- Sync with upstream IcedTea7-forest 2.3.10 tag +- Fixes regressions as introduced with 1.7.0.25-2.3.10.3.el6: + rhbz#978005, rhbz#977979, rhbz#976693, IcedTeaBZ#1487. +- all patch commands repalced by patch macro + - updated java-1.7.0-openjdk-ppc-zero-hotspot.patch to pass without loose patching + +* Wed Jun 19 2013 Jiri Vanek - 1.7.0.25-2.3.10.3.el7 +- update of IcedTea7-forest 2.3.10 tarball +- removed patch1000 MBeanFix.patch to fix regressions caused by security patches + + +* Thu Jun 13 2013 Jiri Vanek - 1.7.0.25-2.3.10.2.el7 +- added patch1000 MBeanFix.patch to fix regressions caused by security patches + +* Thu Jun 13 2013 Jiri Vanek - 1.7.0.25-2.3.10.1.el7 +- arm tarball updated to 2.1.9 +- build bumped to 25 + +* Wed Jun 12 2013 Jiri Vanek - 1.7.0.19-2.3.10.0.el7 +- fixed RH972717 by enabling patch110 java-1.7.0-openjdk-nss-icedtea-e9c857dcb964.patch +- temporarly swithced to intree lcms as it have security fixes (patch 500) + - added GENSRCDIR="$PWD/generated.build" to be able to + - removed (build)requires lcms2(-devel) +- Updated to latest IcedTea7-forest 2.3.10 + +* Wed Jun 05 2013 Jiri Vanek - 1.7.0.19-2.3.9.14.fc19 +- Added client/server directories so they can be owned +- Renamed patch 107 to 200 +- Added nss support from 6.5 +- Added fix for RH857717, owned /etc/.java/ and /etc/.java/.systemPrefs +- Removed ant-nodeps, should not be needed + +* Tue May 28 2013 Jiri Vanek - 1.7.0.19-2.3.9.13.el7 +- javadoc put into fully versioned directory, but without arch (to be kept noarch) + - uniquejavadocdir +- updated to latest 2.3.9 tarball - fixing the rhbz#967436 + +* Mon May 27 2013 Omair Majid - 1.7.0.19-2.3.9.12.el7 +- Allowed multiple OpenJDKs to be installed in parallel +- Removed archname +- Added arch to all, not only multilib arches +- uniquesuffix is now holding fully versioned name +- Intorduced source11 remove-buildids.sh + +* Fri May 17 2013 Omair Majid - 1.7.0.19-2.3.9.12.el7 +- Replace %%{name} with %%{uniquesuffix} where it's used as a unique suffix. + +* Thu May 16 2013 Jiri Vanek +- added variable arm_arches as restriction to some cases of not jit_arches + +* Tue May 14 2013 Jiri Vanek +- patch402 gstackbounds.patch applied only to jit arches +- patch403 PStack-808293.patch likewise + +* Mon May 13 2013 Jiri Vanek +- initial, not buildable, sync with f19