d01a981
%define pkidir %{_sysconfdir}/pki
Kai Engert d538ada
%define catrustdir %{_sysconfdir}/pki/ca-trust
Kai Engert d538ada
%define classic_tls_bundle ca-bundle.crt
Kai Engert f0b0be2
%define openssl_format_trust_bundle ca-bundle.trust.crt
Kai Engert f0b0be2
%define p11_format_bundle ca-bundle.trust.p11-kit
Kai Engert 40d3667
%define legacy_default_bundle ca-bundle.legacy.default.crt
Kai Engert e24bfeb
%define legacy_disable_bundle ca-bundle.legacy.disable.crt
Kai Engert d538ada
%define java_bundle java/cacerts
d01a981
d01a981
Summary: The Mozilla CA root certificate bundle
d01a981
Name: ca-certificates
Kai Engert d538ada
Kai Engert d538ada
# For the package version number, we use: year.{upstream version}
Kai Engert d538ada
#
Kai Engert 5df4185
# The {upstream version} can be found as symbol
Kai Engert 5df4185
# NSS_BUILTINS_LIBRARY_VERSION in file nss/lib/ckfw/builtins/nssckbi.h
Kai Engert 5df4185
# which corresponds to the data in file nss/lib/ckfw/builtins/certdata.txt.
Kai Engert 5df4185
#
Kai Engert 5df4185
# The files should be taken from a released version of NSS, as published
Kai Engert 5df4185
# at https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/
Kai Engert 5df4185
#
Kai Engert 5df4185
# The versions that are used by the latest released version of 
Kai Engert 5df4185
# Mozilla Firefox should be available from:
Kai Engert b2e71a9
# https://hg.mozilla.org/releases/mozilla-release/raw-file/default/security/nss/lib/ckfw/builtins/nssckbi.h
Kai Engert b2e71a9
# https://hg.mozilla.org/releases/mozilla-release/raw-file/default/security/nss/lib/ckfw/builtins/certdata.txt
Kai Engert d538ada
#
Kai Engert 5df4185
# The most recent development versions of the files can be found at
Kai Engert 5df4185
# http://hg.mozilla.org/projects/nss/raw-file/default/lib/ckfw/builtins/nssckbi.h
Kai Engert 5df4185
# http://hg.mozilla.org/projects/nss/raw-file/default/lib/ckfw/builtins/certdata.txt
Kai Engert 5df4185
# (but these files might have not yet been released).
Kai Engert 5df4185
#
Kai Engert d538ada
# (until 2012.87 the version was based on the cvs revision ID of certdata.txt,
Kai Engert d538ada
# but in 2013 the NSS projected was migrated to HG. Old version 2012.87 is 
Kai Engert d538ada
# equivalent to new version 2012.1.93, which would break the requirement 
Kai Engert d538ada
# to have increasing version numbers. However, the new scheme will work, 
Kai Engert d538ada
# because all future versions will start with 2013 or larger.)
Kai Engert d538ada
8f8095b
Version: 2023.2.60_v7.0.306
f4842fa
# for Rawhide, please always use release >= 2
Kai Engert 18eedda
# for Fedora release branches, please use release < 2 (1.0, 1.1, ...)
Frantisek Krenzelok 8d9b235
Release: 1.0%{?dist}
d01a981
License: Public Domain
Kai Engert d538ada
Kai Engert a1c2aec
URL: https://fedoraproject.org/wiki/CA-Certificates
Kai Engert d538ada
Kai Engert b2e71a9
#Please always update both certdata.txt and nssckbi.h
5f392b3
Source0: certdata.txt
Kai Engert b2e71a9
Source1: nssckbi.h
Kai Engert b2e71a9
Source2: update-ca-trust
Kai Engert b2e71a9
Source3: trust-fixes
Kai Engert b2e71a9
Source4: certdata2pem.py
Kai Engert e24bfeb
Source5: ca-legacy.conf
Kai Engert e24bfeb
Source6: ca-legacy
Kai Engert 40d3667
Source9: ca-legacy.8.txt
Kai Engert 9ac574b
Source10: update-ca-trust.8.txt
Kai Engert d538ada
Source11: README.usr
Kai Engert d538ada
Source12: README.etc
Kai Engert d538ada
Source13: README.extr
Kai Engert d538ada
Source14: README.java
Kai Engert d538ada
Source15: README.openssl
Kai Engert d538ada
Source16: README.pem
6220683
Source17: README.edk2
6220683
Source18: README.src
1c8b67f
Source19: README.etcssl
Kai Engert d538ada
d01a981
BuildArch: noarch
d01a981
Kai Engert 756b8b4
Requires(post): bash
Kai Engert 756b8b4
Requires(post): grep
Kai Engert 756b8b4
Requires(post): sed
09838f0
Requires(post): coreutils
Kai Engert 756b8b4
Requires: bash
Kai Engert 756b8b4
Requires: grep
Kai Engert 756b8b4
Requires: sed
1c8b67f
Requires(post): p11-kit >= 0.23
1c8b67f
Requires(post): p11-kit-trust >= 0.23
1c8b67f
Requires: p11-kit >= 0.23
1c8b67f
Requires: p11-kit-trust >= 0.23
Kai Engert 756b8b4
a2a1b6c
BuildRequires: perl-interpreter
Kai Engert 1a2c011
BuildRequires: python3
Kai Engert d538ada
BuildRequires: openssl
Kai Engert 9ac574b
BuildRequires: asciidoc
Kai Engert 9ac574b
BuildRequires: libxslt
Kai Engert d538ada
d01a981
%description
d01a981
This package contains the set of CA certificates chosen by the
d01a981
Mozilla Foundation for use with the Internet PKI.
d01a981
d01a981
%prep
d01a981
rm -rf %{name}
Kai Engert d538ada
mkdir %{name}
Kai Engert d538ada
mkdir %{name}/certs
Kai Engert 40d3667
mkdir %{name}/certs/legacy-default
Kai Engert e24bfeb
mkdir %{name}/certs/legacy-disable
Kai Engert d538ada
mkdir %{name}/java
d01a981
d01a981
%build
5f392b3
pushd %{name}/certs
Kai Engert 34f352d
 pwd
Kai Engert d538ada
 cp %{SOURCE0} .
Kai Engert 1a2c011
 python3 %{SOURCE4} >c2p.log 2>c2p.err
5f392b3
popd
d01a981
pushd %{name}
5f392b3
 (
5f392b3
   cat <
5f392b3
# This is a bundle of X.509 certificates of public Certificate
5f392b3
# Authorities.  It was generated from the Mozilla root CA list.
Kai Engert f0b0be2
# These certificates and trust/distrust attributes use the file format accepted
Kai Engert f0b0be2
# by the p11-kit-trust module.
708646c
#
Kai Engert b2e71a9
# Source: nss/lib/ckfw/builtins/certdata.txt
Kai Engert b2e71a9
# Source: nss/lib/ckfw/builtins/nssckbi.h
708646c
#
708646c
# Generated from:
708646c
EOF
Kai Engert b2e71a9
   cat %{SOURCE1}  |grep -w NSS_BUILTINS_LIBRARY_VERSION | awk '{print "# " $2 " " $3}';
708646c
   echo '#';
Kai Engert f0b0be2
 ) > %{p11_format_bundle}
Kai Engert e24bfeb
Kai Engert 552fa4a
 touch %{legacy_default_bundle}
Kai Engert 552fa4a
 NUM_LEGACY_DEFAULT=`find certs/legacy-default -type f | wc -l`
Kai Engert 552fa4a
 if [ $NUM_LEGACY_DEFAULT -ne 0 ]; then
Kai Engert 552fa4a
     for f in certs/legacy-default/*.crt; do 
Kai Engert 552fa4a
       echo "processing $f"
Kai Engert 552fa4a
       tbits=`sed -n '/^# openssl-trust/{s/^.*=//;p;}' $f`
Kai Engert 552fa4a
       alias=`sed -n '/^# alias=/{s/^.*=//;p;q;}' $f | sed "s/'//g" | sed 's/"//g'`
Kai Engert 552fa4a
       targs=""
Kai Engert 552fa4a
       if [ -n "$tbits" ]; then
Kai Engert 552fa4a
          for t in $tbits; do
Kai Engert 552fa4a
             targs="${targs} -addtrust $t"
Kai Engert 552fa4a
          done
Kai Engert 552fa4a
       fi
Kai Engert 552fa4a
       if [ -n "$targs" ]; then
Kai Engert 552fa4a
          echo "legacy default flags $targs for $f" >> info.trust
Kai Engert 552fa4a
          openssl x509 -text -in "$f" -trustout $targs -setalias "$alias" >> %{legacy_default_bundle}
Kai Engert 552fa4a
       fi
Kai Engert 552fa4a
     done
Kai Engert 552fa4a
 fi
Kai Engert e24bfeb
Kai Engert 552fa4a
 touch %{legacy_disable_bundle}
Kai Engert 552fa4a
 NUM_LEGACY_DISABLE=`find certs/legacy-disable -type f | wc -l`
Kai Engert 552fa4a
 if [ $NUM_LEGACY_DISABLE -ne 0 ]; then
Kai Engert 552fa4a
     for f in certs/legacy-disable/*.crt; do 
Kai Engert 552fa4a
       echo "processing $f"
Kai Engert 552fa4a
       tbits=`sed -n '/^# openssl-trust/{s/^.*=//;p;}' $f`
Kai Engert 552fa4a
       alias=`sed -n '/^# alias=/{s/^.*=//;p;q;}' $f | sed "s/'//g" | sed 's/"//g'`
Kai Engert 552fa4a
       targs=""
Kai Engert 552fa4a
       if [ -n "$tbits" ]; then
Kai Engert 552fa4a
          for t in $tbits; do
Kai Engert 552fa4a
             targs="${targs} -addtrust $t"
Kai Engert 552fa4a
          done
Kai Engert 552fa4a
       fi
Kai Engert 552fa4a
       if [ -n "$targs" ]; then
Kai Engert 552fa4a
          echo "legacy disable flags $targs for $f" >> info.trust
Kai Engert 552fa4a
          openssl x509 -text -in "$f" -trustout $targs -setalias "$alias" >> %{legacy_disable_bundle}
Kai Engert 552fa4a
       fi
Kai Engert 552fa4a
     done
Kai Engert 552fa4a
 fi
Kai Engert e24bfeb
Kai Engert f0b0be2
 P11FILES=`find certs -name \*.tmp-p11-kit | wc -l`
Kai Engert e24bfeb
 if [ $P11FILES -ne 0 ]; then
Kai Engert f0b0be2
   for p in certs/*.tmp-p11-kit; do 
Kai Engert f0b0be2
     cat "$p" >> %{p11_format_bundle}
Kai Engert e24bfeb
   done
Kai Engert e24bfeb
 fi
Kai Engert 34f352d
 # Append our trust fixes
Kai Engert f0b0be2
 cat %{SOURCE3} >> %{p11_format_bundle}
56a6866
popd
Kai Engert d538ada
Kai Engert 9ac574b
#manpage
Kai Engert 9ac574b
cp %{SOURCE10} %{name}/update-ca-trust.8.txt
Kai Engert 9ac574b
asciidoc.py -v -d manpage -b docbook %{name}/update-ca-trust.8.txt
Kai Engert 9ac574b
xsltproc --nonet -o %{name}/update-ca-trust.8 /usr/share/asciidoc/docbook-xsl/manpage.xsl %{name}/update-ca-trust.8.xml
Kai Engert 9ac574b
Kai Engert 40d3667
cp %{SOURCE9} %{name}/ca-legacy.8.txt
Kai Engert 40d3667
asciidoc.py -v -d manpage -b docbook %{name}/ca-legacy.8.txt
Kai Engert 40d3667
xsltproc --nonet -o %{name}/ca-legacy.8 /usr/share/asciidoc/docbook-xsl/manpage.xsl %{name}/ca-legacy.8.xml
Kai Engert 40d3667
d01a981
d01a981
%install
d01a981
rm -rf $RPM_BUILD_ROOT
Kai Engert d538ada
mkdir -p -m 755 $RPM_BUILD_ROOT%{pkidir}/tls/certs
Kai Engert d538ada
mkdir -p -m 755 $RPM_BUILD_ROOT%{pkidir}/java
Kai Engert d538ada
mkdir -p -m 755 $RPM_BUILD_ROOT%{_sysconfdir}/ssl
Kai Engert d538ada
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/source
Kai Engert 34f352d
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/source/anchors
1c8b67f
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/source/blacklist
05fc0cc
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/source/blocklist
Kai Engert d538ada
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/extracted
Kai Engert d538ada
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/extracted/pem
Kai Engert d538ada
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/extracted/openssl
Kai Engert d538ada
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/extracted/java
6220683
mkdir -p -m 755 $RPM_BUILD_ROOT%{catrustdir}/extracted/edk2
Kai Engert d538ada
mkdir -p -m 755 $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-source
Kai Engert 34f352d
mkdir -p -m 755 $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-source/anchors
1c8b67f
mkdir -p -m 755 $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-source/blacklist
05fc0cc
mkdir -p -m 755 $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-source/blocklist
Kai Engert e24bfeb
mkdir -p -m 755 $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-legacy
Kai Engert d538ada
mkdir -p -m 755 $RPM_BUILD_ROOT%{_bindir}
Kai Engert 9ac574b
mkdir -p -m 755 $RPM_BUILD_ROOT%{_mandir}/man8
d01a981
Kai Engert 9ac574b
install -p -m 644 %{name}/update-ca-trust.8 $RPM_BUILD_ROOT%{_mandir}/man8
Kai Engert 40d3667
install -p -m 644 %{name}/ca-legacy.8 $RPM_BUILD_ROOT%{_mandir}/man8
Kai Engert d538ada
install -p -m 644 %{SOURCE11} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-source/README
Kai Engert d538ada
install -p -m 644 %{SOURCE12} $RPM_BUILD_ROOT%{catrustdir}/README
Kai Engert d538ada
install -p -m 644 %{SOURCE13} $RPM_BUILD_ROOT%{catrustdir}/extracted/README
Kai Engert d538ada
install -p -m 644 %{SOURCE14} $RPM_BUILD_ROOT%{catrustdir}/extracted/java/README
Kai Engert d538ada
install -p -m 644 %{SOURCE15} $RPM_BUILD_ROOT%{catrustdir}/extracted/openssl/README
Kai Engert d538ada
install -p -m 644 %{SOURCE16} $RPM_BUILD_ROOT%{catrustdir}/extracted/pem/README
6220683
install -p -m 644 %{SOURCE17} $RPM_BUILD_ROOT%{catrustdir}/extracted/edk2/README
6220683
install -p -m 644 %{SOURCE18} $RPM_BUILD_ROOT%{catrustdir}/source/README
1c8b67f
install -p -m 644 %{SOURCE19} $RPM_BUILD_ROOT%{_sysconfdir}/ssl/README
Kai Engert 0ecb427
Kai Engert f0b0be2
install -p -m 644 %{name}/%{p11_format_bundle} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-source/%{p11_format_bundle}
Kai Engert e24bfeb
Kai Engert 40d3667
install -p -m 644 %{name}/%{legacy_default_bundle} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-legacy/%{legacy_default_bundle}
Kai Engert e24bfeb
install -p -m 644 %{name}/%{legacy_disable_bundle} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-legacy/%{legacy_disable_bundle}
Kai Engert e24bfeb
Kai Engert e24bfeb
install -p -m 644 %{SOURCE5} $RPM_BUILD_ROOT%{catrustdir}/ca-legacy.conf
Kai Engert e24bfeb
Kai Engert f0b0be2
touch -r %{SOURCE0} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-source/%{p11_format_bundle}
Kai Engert 0ecb427
Kai Engert 40d3667
touch -r %{SOURCE0} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-legacy/%{legacy_default_bundle}
Kai Engert e24bfeb
touch -r %{SOURCE0} $RPM_BUILD_ROOT%{_datadir}/pki/ca-trust-legacy/%{legacy_disable_bundle}
Kai Engert e24bfeb
Kai Engert d538ada
# TODO: consider to dynamically create the update-ca-trust script from within
Kai Engert d538ada
#       this .spec file, in order to have the output file+directory names at once place only.
Kai Engert b2e71a9
install -p -m 755 %{SOURCE2} $RPM_BUILD_ROOT%{_bindir}/update-ca-trust
d01a981
Kai Engert e24bfeb
install -p -m 755 %{SOURCE6} $RPM_BUILD_ROOT%{_bindir}/ca-legacy
Kai Engert e24bfeb
Kai Engert d538ada
# touch ghosted files that will be extracted dynamically
Kai Engert 3986396
# Set chmod 444 to use identical permission
Kai Engert d538ada
touch $RPM_BUILD_ROOT%{catrustdir}/extracted/pem/tls-ca-bundle.pem
Kai Engert 3986396
chmod 444 $RPM_BUILD_ROOT%{catrustdir}/extracted/pem/tls-ca-bundle.pem
Kai Engert d538ada
touch $RPM_BUILD_ROOT%{catrustdir}/extracted/pem/email-ca-bundle.pem
Kai Engert 3986396
chmod 444 $RPM_BUILD_ROOT%{catrustdir}/extracted/pem/email-ca-bundle.pem
Kai Engert d538ada
touch $RPM_BUILD_ROOT%{catrustdir}/extracted/pem/objsign-ca-bundle.pem
Kai Engert 3986396
chmod 444 $RPM_BUILD_ROOT%{catrustdir}/extracted/pem/objsign-ca-bundle.pem
Kai Engert f0b0be2
touch $RPM_BUILD_ROOT%{catrustdir}/extracted/openssl/%{openssl_format_trust_bundle}
Kai Engert 3986396
chmod 444 $RPM_BUILD_ROOT%{catrustdir}/extracted/openssl/%{openssl_format_trust_bundle}
Kai Engert d538ada
touch $RPM_BUILD_ROOT%{catrustdir}/extracted/%{java_bundle}
Kai Engert 3986396
chmod 444 $RPM_BUILD_ROOT%{catrustdir}/extracted/%{java_bundle}
6220683
touch $RPM_BUILD_ROOT%{catrustdir}/extracted/edk2/cacerts.bin
6220683
chmod 444 $RPM_BUILD_ROOT%{catrustdir}/extracted/edk2/cacerts.bin
d01a981
1c8b67f
# /etc/ssl is provided in a Debian compatible form for (bad) code that
1c8b67f
# expects it: https://bugzilla.redhat.com/show_bug.cgi?id=1053882
1c8b67f
ln -s %{catrustdir}/extracted/pem/directory-hash \
Kai Engert 5300aa7
    $RPM_BUILD_ROOT%{_sysconfdir}/ssl/certs
9bd23da
ln -s %{catrustdir}/extracted/pem/tls-ca-bundle.pem \
9bd23da
    $RPM_BUILD_ROOT%{_sysconfdir}/ssl/cert.pem
9bd23da
ln -s /etc/pki/tls/openssl.cnf \
9bd23da
    $RPM_BUILD_ROOT%{_sysconfdir}/ssl/openssl.cnf
9bd23da
ln -s /etc/pki/tls/ct_log_list.cnf \
9bd23da
    $RPM_BUILD_ROOT%{_sysconfdir}/ssl/ct_log_list.cnf
Kai Engert d538ada
# legacy filenames
Kai Engert 078e3f0
ln -s %{catrustdir}/extracted/pem/tls-ca-bundle.pem \
Kai Engert 5300aa7
    $RPM_BUILD_ROOT%{pkidir}/tls/cert.pem
Kai Engert 078e3f0
ln -s %{catrustdir}/extracted/pem/tls-ca-bundle.pem \
Kai Engert 5300aa7
    $RPM_BUILD_ROOT%{pkidir}/tls/certs/%{classic_tls_bundle}
Kai Engert 078e3f0
ln -s %{catrustdir}/extracted/openssl/%{openssl_format_trust_bundle} \
Kai Engert f0b0be2
    $RPM_BUILD_ROOT%{pkidir}/tls/certs/%{openssl_format_trust_bundle}
Kai Engert 078e3f0
ln -s %{catrustdir}/extracted/%{java_bundle} \
Kai Engert 5300aa7
    $RPM_BUILD_ROOT%{pkidir}/%{java_bundle}
c9fb114
Kai Engert d538ada
Kai Engert d538ada
%pre
Kai Engert d538ada
if [ $1 -gt 1 ] ; then
Kai Engert d538ada
  # Upgrade or Downgrade.
Kai Engert d538ada
  # If the classic filename is a regular file, then we are upgrading
Kai Engert d538ada
  # from an old package and we will move it to an .rpmsave backup file.
Kai Engert d538ada
  # If the filename is a symbolic link, then we are good already.
Kai Engert d538ada
  # If the system will later be downgraded to an old package with regular 
Kai Engert d538ada
  # files, and afterwards updated again to a newer package with symlinks,
Kai Engert d538ada
  # and the old .rpmsave backup file didn't get cleaned up,
Kai Engert d538ada
  # then we don't backup again. We keep the older backup file.
Kai Engert d538ada
  # In other words, if an .rpmsave file already exists, we don't overwrite it.
Kai Engert d538ada
  #
Kai Engert d538ada
  if ! test -e %{pkidir}/%{java_bundle}.rpmsave; then
Kai Engert d538ada
    # no backup yet
Kai Engert 8867a18
    if test -e %{pkidir}/%{java_bundle}; then
Kai Engert 8867a18
      # a file exists
Kai Engert 8867a18
        if ! test -L %{pkidir}/%{java_bundle}; then
Kai Engert 8867a18
        # it's an old regular file, not a link
Kai Engert 8867a18
        mv -f %{pkidir}/%{java_bundle} %{pkidir}/%{java_bundle}.rpmsave
Kai Engert 8867a18
      fi
Kai Engert d538ada
    fi
Kai Engert d538ada
  fi
Kai Engert d538ada
Kai Engert d538ada
  if ! test -e %{pkidir}/tls/certs/%{classic_tls_bundle}.rpmsave; then
Kai Engert d538ada
    # no backup yet
Kai Engert 8867a18
    if test -e %{pkidir}/tls/certs/%{classic_tls_bundle}; then
Kai Engert 8867a18
      # a file exists
Kai Engert 8867a18
      if ! test -L %{pkidir}/tls/certs/%{classic_tls_bundle}; then
Kai Engert 8867a18
        # it's an old regular file, not a link
Kai Engert 8867a18
        mv -f %{pkidir}/tls/certs/%{classic_tls_bundle} %{pkidir}/tls/certs/%{classic_tls_bundle}.rpmsave
Kai Engert 8867a18
      fi
Kai Engert d538ada
    fi
Kai Engert d538ada
  fi
Kai Engert d538ada
Kai Engert f0b0be2
  if ! test -e %{pkidir}/tls/certs/%{openssl_format_trust_bundle}.rpmsave; then
Kai Engert d538ada
    # no backup yet
Kai Engert f0b0be2
    if test -e %{pkidir}/tls/certs/%{openssl_format_trust_bundle}; then
Kai Engert 8867a18
      # a file exists
Kai Engert f0b0be2
      if ! test -L %{pkidir}/tls/certs/%{openssl_format_trust_bundle}; then
Kai Engert 8867a18
        # it's an old regular file, not a link
Kai Engert f0b0be2
        mv -f %{pkidir}/tls/certs/%{openssl_format_trust_bundle} %{pkidir}/tls/certs/%{openssl_format_trust_bundle}.rpmsave
Kai Engert 8867a18
      fi
Kai Engert d538ada
    fi
Kai Engert d538ada
  fi
Kai Engert d538ada
fi
Kai Engert d538ada
Kai Engert d538ada
Kai Engert d538ada
%post
Kai Engert d538ada
#if [ $1 -gt 1 ] ; then
Kai Engert d538ada
#  # when upgrading or downgrading
Kai Engert d538ada
#fi
9a68b05
# if ln is available, go ahead and run the ca-legacy and update
a430e41
# scripts. If not, wait until %posttrans.
a430e41
if [ -x %{_bindir}/ln ]; then
Kai Engert e24bfeb
%{_bindir}/ca-legacy install
Kai Engert d538ada
%{_bindir}/update-ca-trust
9a68b05
fi
Kai Engert d538ada
9a68b05
%posttrans
9a68b05
# When coreutils is installing with ca-certificates
9a68b05
# we need to wait until coreutils install to
9a68b05
# run our update since update requires ln to complete.
9a68b05
# There is a circular dependency here where
9a68b05
# ca-certificates depends on coreutils
9a68b05
# coreutils depends on openssl
9a68b05
# openssl depends on ca-certificates
a430e41
# so we run the scripts here too, in case we couldn't run them in
a430e41
# post. If we *could* run them in post this is an unnecessary
a430e41
# duplication, but it shouldn't hurt anything
9a68b05
%{_bindir}/ca-legacy install
9a68b05
%{_bindir}/update-ca-trust
Kai Engert d538ada
d01a981
%files
Kai Engert d538ada
%dir %{_sysconfdir}/ssl
d01a981
%dir %{pkidir}/tls
d01a981
%dir %{pkidir}/tls/certs
Kai Engert d538ada
%dir %{pkidir}/java
Kai Engert d538ada
%dir %{catrustdir}
Kai Engert d538ada
%dir %{catrustdir}/source
Kai Engert 34f352d
%dir %{catrustdir}/source/anchors
1c8b67f
%dir %{catrustdir}/source/blacklist
05fc0cc
%dir %{catrustdir}/source/blocklist
Kai Engert d538ada
%dir %{catrustdir}/extracted
Kai Engert d538ada
%dir %{catrustdir}/extracted/pem
Kai Engert d538ada
%dir %{catrustdir}/extracted/openssl
Kai Engert d538ada
%dir %{catrustdir}/extracted/java
a14dcb4
%dir %{_datadir}/pki
Kai Engert 34f352d
%dir %{_datadir}/pki/ca-trust-source
Kai Engert 34f352d
%dir %{_datadir}/pki/ca-trust-source/anchors
1c8b67f
%dir %{_datadir}/pki/ca-trust-source/blacklist
05fc0cc
%dir %{_datadir}/pki/ca-trust-source/blocklist
Kai Engert e24bfeb
%dir %{_datadir}/pki/ca-trust-legacy
Kai Engert e24bfeb
Kai Engert e24bfeb
%config(noreplace) %{catrustdir}/ca-legacy.conf
Kai Engert d538ada
Kai Engert 9ac574b
%{_mandir}/man8/update-ca-trust.8.gz
Kai Engert 40d3667
%{_mandir}/man8/ca-legacy.8.gz
Kai Engert d538ada
%{_datadir}/pki/ca-trust-source/README
Kai Engert d538ada
%{catrustdir}/README
Kai Engert d538ada
%{catrustdir}/extracted/README
Kai Engert d538ada
%{catrustdir}/extracted/java/README
Kai Engert d538ada
%{catrustdir}/extracted/openssl/README
Kai Engert d538ada
%{catrustdir}/extracted/pem/README
6220683
%{catrustdir}/extracted/edk2/README
Kai Engert d538ada
%{catrustdir}/source/README
Kai Engert d538ada
Kai Engert d538ada
# symlinks for old locations
866d688
%{pkidir}/tls/cert.pem
Kai Engert d538ada
%{pkidir}/tls/certs/%{classic_tls_bundle}
Kai Engert f0b0be2
%{pkidir}/tls/certs/%{openssl_format_trust_bundle}
Kai Engert d538ada
%{pkidir}/%{java_bundle}
1c8b67f
# Hybrid hash directory with bundle file for Debian compatibility
1c8b67f
# See https://bugzilla.redhat.com/show_bug.cgi?id=1053882
c9fb114
%{_sysconfdir}/ssl/certs
1c8b67f
%{_sysconfdir}/ssl/README
9bd23da
%{_sysconfdir}/ssl/cert.pem
9bd23da
%{_sysconfdir}/ssl/openssl.cnf
9bd23da
%{_sysconfdir}/ssl/ct_log_list.cnf
Kai Engert f0b0be2
05fc0cc
# primary bundle file with trust
Kai Engert f0b0be2
%{_datadir}/pki/ca-trust-source/%{p11_format_bundle}
Kai Engert f0b0be2
Kai Engert 40d3667
%{_datadir}/pki/ca-trust-legacy/%{legacy_default_bundle}
Kai Engert e24bfeb
%{_datadir}/pki/ca-trust-legacy/%{legacy_disable_bundle}
Kai Engert d538ada
# update/extract tool
Kai Engert d538ada
%{_bindir}/update-ca-trust
Kai Engert e24bfeb
%{_bindir}/ca-legacy
Kai Engert e24bfeb
%ghost %{catrustdir}/source/ca-bundle.legacy.crt
Kai Engert d538ada
# files extracted files
Kai Engert d538ada
%ghost %{catrustdir}/extracted/pem/tls-ca-bundle.pem
Kai Engert d538ada
%ghost %{catrustdir}/extracted/pem/email-ca-bundle.pem
Kai Engert d538ada
%ghost %{catrustdir}/extracted/pem/objsign-ca-bundle.pem
Kai Engert f0b0be2
%ghost %{catrustdir}/extracted/openssl/%{openssl_format_trust_bundle}
Kai Engert d538ada
%ghost %{catrustdir}/extracted/%{java_bundle}
6220683
%ghost %{catrustdir}/extracted/edk2/cacerts.bin
Kai Engert d538ada
d01a981
d01a981
%changelog
8f8095b
*Tue Aug 01 2023 Robert Relyea <rrelyea@redhat.com> - 2023.2.60_v7.0.306-1.0
8f8095b
- Update to CKBI 2.60_v7.0.306 from NSS 3.91
8f8095b
-    Removing:
8f8095b
-     # Certificate "OpenTrust Root CA G1"
8f8095b
-     # Certificate "Swedish Government Root Authority v1"
8f8095b
-     # Certificate "DigiNotar Root CA G2"
8f8095b
-     # Certificate "Federal Common Policy CA"
8f8095b
-     # Certificate "TC TrustCenter Universal CA III"
8f8095b
-     # Certificate "CCA India 2007"
8f8095b
-     # Certificate "ipsCA Global CA Root"
8f8095b
-     # Certificate "ipsCA Main CA Root"
8f8095b
-     # Certificate "Macao Post eSignTrust Root Certification Authority"
8f8095b
-     # Certificate "InfoNotary CSP Root"
8f8095b
-     # Certificate "DigiNotar Root CA"
8f8095b
-     # Certificate "Root CA"
8f8095b
-     # Certificate "GPKIRootCA"
8f8095b
-     # Certificate "D-TRUST Qualified Root CA 1 2007:PN"
8f8095b
-     # Certificate "TC TrustCenter Universal CA I"
8f8095b
-     # Certificate "TC TrustCenter Universal CA II"
8f8095b
-     # Certificate "TC TrustCenter Class 2 CA II"
8f8095b
-     # Certificate "TC TrustCenter Class 4 CA II"
8f8095b
-     # Certificate "TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı"
8f8095b
-     # Certificate "CertRSA01"
8f8095b
-     # Certificate "KISA RootCA 3"
8f8095b
-     # Certificate "A-CERT ADVANCED"
8f8095b
-     # Certificate "A-Trust-Qual-01"
8f8095b
-     # Certificate "A-Trust-nQual-01"
8f8095b
-     # Certificate "Serasa Certificate Authority II"
8f8095b
-     # Certificate "TDC Internet"
8f8095b
-     # Certificate "America Online Root Certification Authority 2"
8f8095b
-     # Certificate "RSA Security Inc"
8f8095b
-     # Certificate "Public Notary Root"
8f8095b
-     # Certificate "Autoridade Certificadora Raiz Brasileira"
8f8095b
-     # Certificate "Post.Trust Root CA"
8f8095b
-     # Certificate "Entrust.net Secure Server Certification Authority"
8f8095b
-     # Certificate "ePKI EV SSL Certification Authority - G1"
8f8095b
-    Adding:
8f8095b
-     # Certificate "BJCA Global Root CA1"
8f8095b
-     # Certificate "BJCA Global Root CA2"
8f8095b
-     # Certificate "Symantec Enterprise Mobile Root for Microsoft"
8f8095b
-     # Certificate "A-Trust-Root-05"
8f8095b
-     # Certificate "ADOCA02"
8f8095b
-     # Certificate "StartCom Certification Authority G2"
8f8095b
-     # Certificate "ATHEX Root CA"
8f8095b
-     # Certificate "EBG Elektronik Sertifika Hizmet Sağlayıcısı"
8f8095b
-     # Certificate "GeoTrust Primary Certification Authority"
8f8095b
-     # Certificate "thawte Primary Root CA"
8f8095b
-     # Certificate "VeriSign Class 3 Public Primary Certification Authority - G5"
8f8095b
-     # Certificate "America Online Root Certification Authority 1"
8f8095b
-     # Certificate "Juur-SK"
8f8095b
-     # Certificate "ComSign CA"
8f8095b
-     # Certificate "ComSign Secured CA"
8f8095b
-     # Certificate "ComSign Advanced Security CA"
8f8095b
-     # Certificate "Sonera Class2 CA"
8f8095b
-     # Certificate "VeriSign Class 3 Public Primary Certification Authority - G3"
8f8095b
-     # Certificate "VeriSign, Inc."
8f8095b
-     # Certificate "GTE CyberTrust Global Root"
8f8095b
-     # Certificate "Equifax Secure Global eBusiness CA-1"
8f8095b
-     # Certificate "Equifax"
8f8095b
-     # Certificate "Class 1 Primary CA"
8f8095b
-     # Certificate "Swiss Government Root CA III"
8f8095b
-     # Certificate "Application CA G4 Root"
8f8095b
-     # Certificate "SSC GDL CA Root A"
8f8095b
-     # Certificate "GlobalSign Code Signing Root E45"
8f8095b
-     # Certificate "GlobalSign Code Signing Root R45"
8f8095b
-     # Certificate "Entrust Code Signing Root Certification Authority - CSBR1"
8f8095b
Frantisek Krenzelok 8d9b235
*Wed Jan 18 2023 Frantisek Krenzelok <krenzelok.frantisek@gmail.com> - 2023.2.60-1.0
Frantisek Krenzelok 8d9b235
- Update to CKBI 2.60 from NSS 3.86
Frantisek Krenzelok 8d9b235
-    Removing:
Frantisek Krenzelok 8d9b235
-     # Certificate "Camerfirma Global Chambersign Root"
Frantisek Krenzelok 8d9b235
-     # Certificate "Staat der Nederlanden EV Root CA"
Frantisek Krenzelok 8d9b235
-    Adding:
Frantisek Krenzelok 8d9b235
-     # Certificate "DigiCert TLS ECC P384 Root G5"
Frantisek Krenzelok 8d9b235
-     # Certificate "DigiCert TLS RSA4096 Root G5"
Frantisek Krenzelok 8d9b235
-     # Certificate "DigiCert SMIME ECC P384 Root G5"
Frantisek Krenzelok 8d9b235
-     # Certificate "DigiCert SMIME RSA4096 Root G5"
Frantisek Krenzelok 8d9b235
-     # Certificate "Certainly Root R1"
Frantisek Krenzelok 8d9b235
-     # Certificate "Certainly Root E1"
Frantisek Krenzelok 8d9b235
-     # Certificate "E-Tugra Global Root CA RSA v3"
Frantisek Krenzelok 8d9b235
-     # Certificate "E-Tugra Global Root CA ECC v3"
Frantisek Krenzelok 8d9b235
-     # Certificate "DIGITALSIGN GLOBAL ROOT RSA CA"
Frantisek Krenzelok 8d9b235
-     # Certificate "DIGITALSIGN GLOBAL ROOT ECDSA CA"
Frantisek Krenzelok 8d9b235
-     # Certificate "Global Chambersign Root"
Frantisek Krenzelok 8d9b235
3e24439
*Thu Jul 28 2022 Bob Relyea <rrelyea@redhat.com> - 2022.2.54-5
3e24439
- Update to CKBI 2.54 from NSS 3.79
3e24439
-    Removing:
3e24439
-     # Certificate "TrustCor ECA-1"
3e24439
-     # Certificate "TrustCor RootCert CA-2"
3e24439
-     # Certificate "TrustCor RootCert CA-1"
3e24439
-     # Certificate "Network Solutions Certificate Authority"
3e24439
-     # Certificate "COMODO Certification Authority"
3e24439
-     # Certificate "Autoridad de Certificacion Raiz del Estado Venezolano"
3e24439
-     # Certificate "Microsec e-Szigno Root CA 2009"
3e24439
-     # Certificate "TWCA Root Certification Authority"
3e24439
-     # Certificate "Izenpe.com"
3e24439
-     # Certificate "state-institutions"
3e24439
-     # Certificate "GlobalSign"
3e24439
-     # Certificate "Common Policy"
3e24439
-     # Certificate "A-Trust-nQual-03"
3e24439
-     # Certificate "A-Trust-Qual-02"
3e24439
-     # Certificate "Autoridad de Certificacion Firmaprofesional CIF A62634068"
3e24439
-     # Certificate "Government Root Certification Authority"
3e24439
-     # Certificate "AC Raíz Certicámara S.A."
3e24439
d4451d3
*Wed Jul 27 2022 Bob Relyea <rrelyea@redhat.com> - 2022.2.54-4
d4451d3
- Update to CKBI 2.54 from NSS 3.79
d4451d3
082ca85
* Wed Jul 20 2022 Fedora Release Engineering <releng@fedoraproject.org> - 2022.2.54-3
082ca85
- Rebuilt for https://fedoraproject.org/wiki/Fedora_37_Mass_Rebuild
082ca85
f6b8f45
*Fri Jul 15 2022 Bob Relyea <rrelyea@redhat.com> - 2022.2.54-2
f6b8f45
- Update to CKBI 2.54 from NSS 3.79
f6b8f45
-    Removing:
f6b8f45
-     # Certificate "GlobalSign Root CA - R2"
f6b8f45
-     # Certificate "DST Root CA X3"
f6b8f45
-     # Certificate "Explicitly Distrusted DigiNotar PKIoverheid G2"
f6b8f45
-    Adding:
f6b8f45
-     # Certificate "Autoridad de Certificacion Firmaprofesional CIF A62634068"
f6b8f45
-     # Certificate "vTrus ECC Root CA"
f6b8f45
-     # Certificate "vTrus Root CA"
f6b8f45
-     # Certificate "ISRG Root X2"
f6b8f45
-     # Certificate "HiPKI Root CA - G1"
f6b8f45
-     # Certificate "Telia Root CA v2"
f6b8f45
-     # Certificate "D-TRUST BR Root CA 1 2020"
f6b8f45
-     # Certificate "D-TRUST EV Root CA 1 2020"
f6b8f45
-     # Certificate "CAEDICOM Root"
f6b8f45
-     # Certificate "I.CA Root CA/RSA"
f6b8f45
-     # Certificate "MULTICERT Root Certification Authority 01"
f6b8f45
-     # Certificate "Certification Authority of WoSign G2"
f6b8f45
-     # Certificate "CA WoSign ECC Root"
f6b8f45
-     # Certificate "CCA India 2015 SPL"
f6b8f45
-     # Certificate "Swedish Government Root Authority v3"
f6b8f45
-     # Certificate "Swedish Government Root Authority v2"
f6b8f45
-     # Certificate "Tunisian Root Certificate Authority - TunRootCA2"
f6b8f45
-     # Certificate "OpenTrust Root CA G1"
f6b8f45
-     # Certificate "OpenTrust Root CA G2"
f6b8f45
-     # Certificate "OpenTrust Root CA G3"
f6b8f45
-     # Certificate "Certplus Root CA G1"
f6b8f45
-     # Certificate "Certplus Root CA G2"
f6b8f45
-     # Certificate "Government Root Certification Authority"
f6b8f45
-     # Certificate "A-Trust-Qual-02"
f6b8f45
-     # Certificate "Thailand National Root Certification Authority - G1"
f6b8f45
-     # Certificate "TrustCor ECA-1"
f6b8f45
-     # Certificate "TrustCor RootCert CA-2"
f6b8f45
-     # Certificate "TrustCor RootCert CA-1"
f6b8f45
-     # Certificate "Certification Authority of WoSign"
f6b8f45
-     # Certificate "CA 沃通根证书"
f6b8f45
-     # Certificate "SSC GDL CA Root B"
f6b8f45
-     # Certificate "SAPO Class 2 Root CA"
f6b8f45
-     # Certificate "SAPO Class 3 Root CA"
f6b8f45
-     # Certificate "SAPO Class 4 Root CA"
f6b8f45
-     # Certificate "CA Disig Root R1"
f6b8f45
-     # Certificate "Autoridad Certificadora Raíz Nacional de Uruguay"
f6b8f45
-     # Certificate "ApplicationCA2 Root"
f6b8f45
-     # Certificate "GlobalSign"
f6b8f45
-     # Certificate "Symantec Class 3 Public Primary Certification Authority - G6"
f6b8f45
-     # Certificate "Symantec Class 3 Public Primary Certification Authority - G4"
f6b8f45
-     # Certificate "Halcom Root CA"
f6b8f45
-     # Certificate "Swisscom Root EV CA 2"
f6b8f45
-     # Certificate "CFCA GT CA"
f6b8f45
-     # Certificate "Digidentity L3 Root CA - G2"
f6b8f45
-     # Certificate "SITHS Root CA v1"
f6b8f45
-     # Certificate "Macao Post eSignTrust Root Certification Authority (G02)"
f6b8f45
-     # Certificate "Autoridade Certificadora Raiz Brasileira v2"
f6b8f45
-     # Certificate "Swisscom Root CA 2"
f6b8f45
-     # Certificate "IGC/A AC racine Etat francais"
f6b8f45
-     # Certificate "PersonalID Trustworthy RootCA 2011"
f6b8f45
-     # Certificate "Swedish Government Root Authority v1"
f6b8f45
-     # Certificate "Swiss Government Root CA II"
f6b8f45
-     # Certificate "Swiss Government Root CA I"
f6b8f45
-     # Certificate "Network Solutions Certificate Authority"
f6b8f45
-     # Certificate "COMODO Certification Authority"
f6b8f45
-     # Certificate "LuxTrust Global Root"
f6b8f45
-     # Certificate "AC1 RAIZ MTIN"
f6b8f45
-     # Certificate "Microsoft Root Certificate Authority 2011"
f6b8f45
-     # Certificate "CCA India 2011"
f6b8f45
-     # Certificate "ANCERT Certificados Notariales V2"
f6b8f45
-     # Certificate "ANCERT Certificados CGN V2"
f6b8f45
-     # Certificate "EE Certification Centre Root CA"
f6b8f45
-     # Certificate "DigiNotar Root CA G2"
f6b8f45
-     # Certificate "Federal Common Policy CA"
f6b8f45
-     # Certificate "Autoridad de Certificacion Raiz del Estado Venezolano"
f6b8f45
-     # Certificate "Autoridad de Certificacion Raiz del Estado Venezolano"
f6b8f45
-     # Certificate "China Internet Network Information Center EV Certificates Root"
f6b8f45
-     # Certificate "Verizon Global Root CA"
f6b8f45
-     # Certificate "SwissSign Silver Root CA - G3"
f6b8f45
-     # Certificate "SwissSign Platinum Root CA - G3"
f6b8f45
-     # Certificate "SwissSign Gold Root CA - G3"
f6b8f45
-     # Certificate "Microsec e-Szigno Root CA 2009"
f6b8f45
-     # Certificate "SITHS CA v3"
f6b8f45
-     # Certificate "Certinomis - Autorité Racine"
f6b8f45
-     # Certificate "ANF Server CA"
f6b8f45
-     # Certificate "Thawte Premium Server CA"
f6b8f45
-     # Certificate "Thawte Server CA"
f6b8f45
-     # Certificate "TC TrustCenter Universal CA III"
f6b8f45
-     # Certificate "KEYNECTIS ROOT CA"
f6b8f45
-     # Certificate "I.CA - Standard Certification Authority, 09/2009"
f6b8f45
-     # Certificate "I.CA - Qualified Certification Authority, 09/2009"
f6b8f45
-     # Certificate "VI Registru Centras RCSC (RootCA)"
f6b8f45
-     # Certificate "CCA India 2007"
f6b8f45
-     # Certificate "Autoridade Certificadora Raiz Brasileira v1"
f6b8f45
-     # Certificate "ipsCA Global CA Root"
f6b8f45
-     # Certificate "ipsCA Main CA Root"
f6b8f45
-     # Certificate "Actalis Authentication CA G1"
f6b8f45
-     # Certificate "A-Trust-Qual-03"
f6b8f45
-     # Certificate "AddTrust External CA Root"
f6b8f45
-     # Certificate "ECRaizEstado"
f6b8f45
-     # Certificate "Configuration"
f6b8f45
-     # Certificate "FNMT-RCM"
f6b8f45
-     # Certificate "StartCom Certification Authority"
f6b8f45
-     # Certificate "TWCA Root Certification Authority"
f6b8f45
-     # Certificate "VeriSign Class 3 Public Primary Certification Authority - G4"
f6b8f45
-     # Certificate "thawte Primary Root CA - G2"
f6b8f45
-     # Certificate "GeoTrust Primary Certification Authority - G2"
f6b8f45
-     # Certificate "VeriSign Universal Root Certification Authority"
f6b8f45
-     # Certificate "thawte Primary Root CA - G3"
f6b8f45
-     # Certificate "GeoTrust Primary Certification Authority - G3"
f6b8f45
-     # Certificate "E-ME SSI (RCA)"
f6b8f45
-     # Certificate "ACEDICOM Root"
f6b8f45
-     # Certificate "Autoridad Certificadora Raiz de la Secretaria de Economia"
f6b8f45
-     # Certificate "Correo Uruguayo - Root CA"
f6b8f45
-     # Certificate "CNNIC ROOT"
f6b8f45
-     # Certificate "Common Policy"
f6b8f45
-     # Certificate "Macao Post eSignTrust Root Certification Authority"
f6b8f45
-     # Certificate "Staat der Nederlanden Root CA - G2"
f6b8f45
-     # Certificate "NetLock Platina (Class Platinum) Főtanúsítvány"
f6b8f45
-     # Certificate "AC Raíz Certicámara S.A."
f6b8f45
-     # Certificate "Cisco Root CA 2048"
f6b8f45
-     # Certificate "CA Disig"
f6b8f45
-     # Certificate "InfoNotary CSP Root"
f6b8f45
-     # Certificate "UCA Global Root"
f6b8f45
-     # Certificate "UCA Root"
f6b8f45
-     # Certificate "DigiNotar Root CA"
f6b8f45
-     # Certificate "Starfield Services Root Certificate Authority"
f6b8f45
-     # Certificate "I.CA - Qualified root certificate"
f6b8f45
-     # Certificate "I.CA - Standard root certificate"
f6b8f45
-     # Certificate "e-Guven Kok Elektronik Sertifika Hizmet Saglayicisi"
f6b8f45
-     # Certificate "Japanese Government"
f6b8f45
-     # Certificate "AdminCA-CD-T01"
f6b8f45
-     # Certificate "Admin-Root-CA"
f6b8f45
-     # Certificate "Izenpe.com"
f6b8f45
-     # Certificate "TÜBİTAK UEKAE Kök Sertifika Hizmet Sağlayıcısı - Sürüm 3"
f6b8f45
-     # Certificate "Halcom CA FO"
f6b8f45
-     # Certificate "Halcom CA PO 2"
f6b8f45
-     # Certificate "Root CA"
f6b8f45
-     # Certificate "GPKIRootCA"
f6b8f45
-     # Certificate "ACNLB"
f6b8f45
-     # Certificate "state-institutions"
f6b8f45
-     # Certificate "state-institutions"
f6b8f45
-     # Certificate "SECOM Trust Systems CO.,LTD."
f6b8f45
-     # Certificate "D-TRUST Qualified Root CA 1 2007:PN"
f6b8f45
-     # Certificate "D-TRUST Root Class 2 CA 2007"
f6b8f45
-     # Certificate "D-TRUST Root Class 3 CA 2007"
f6b8f45
-     # Certificate "SSC Root CA A"
f6b8f45
-     # Certificate "SSC Root CA B"
f6b8f45
-     # Certificate "SSC Root CA C"
f6b8f45
-     # Certificate "Autoridad de Certificacion de la Abogacia"
f6b8f45
-     # Certificate "Root CA Generalitat Valenciana"
f6b8f45
-     # Certificate "VAS Latvijas Pasts SSI(RCA)"
f6b8f45
-     # Certificate "ANCERT Certificados CGN"
f6b8f45
-     # Certificate "ANCERT Certificados Notariales"
f6b8f45
-     # Certificate "ANCERT Corporaciones de Derecho Publico"
f6b8f45
-     # Certificate "GLOBALTRUST"
f6b8f45
-     # Certificate "Certipost E-Trust TOP Root CA"
f6b8f45
-     # Certificate "Certipost E-Trust Primary Qualified CA"
f6b8f45
-     # Certificate "Certipost E-Trust Primary Normalised CA"
f6b8f45
-     # Certificate "GlobalSign"
f6b8f45
-     # Certificate "IGC/A"
f6b8f45
-     # Certificate "S-TRUST Authentication and Encryption Root CA 2005:PN"
f6b8f45
-     # Certificate "TC TrustCenter Universal CA I"
f6b8f45
-     # Certificate "TC TrustCenter Universal CA II"
f6b8f45
-     # Certificate "TC TrustCenter Class 2 CA II"
f6b8f45
-     # Certificate "TC TrustCenter Class 4 CA II"
f6b8f45
-     # Certificate "Swisscom Root CA 1"
f6b8f45
-     # Certificate "Microsec e-Szigno Root CA"
f6b8f45
-     # Certificate "LGPKI"
f6b8f45
-     # Certificate "AC RAIZ DNIE"
f6b8f45
-     # Certificate "Common Policy"
f6b8f45
-     # Certificate "TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı"
f6b8f45
-     # Certificate "A-Trust-nQual-03"
f6b8f45
-     # Certificate "A-Trust-nQual-03"
f6b8f45
-     # Certificate "CertRSA01"
f6b8f45
-     # Certificate "KISA RootCA 1"
f6b8f45
-     # Certificate "KISA RootCA 3"
f6b8f45
-     # Certificate "NetLock Minositett Kozjegyzoi (Class QA) Tanusitvanykiado"
f6b8f45
-     # Certificate "A-CERT ADVANCED"
f6b8f45
-     # Certificate "A-Trust-Qual-01"
f6b8f45
-     # Certificate "A-Trust-nQual-01"
f6b8f45
-     # Certificate "A-Trust-Qual-02"
f6b8f45
-     # Certificate "Staat der Nederlanden Root CA"
f6b8f45
-     # Certificate "Serasa Certificate Authority II"
f6b8f45
-     # Certificate "TDC Internet"
f6b8f45
-     # Certificate "America Online Root Certification Authority 2"
f6b8f45
-     # Certificate "Autoridad de Certificacion Firmaprofesional CIF A62634068"
f6b8f45
-     # Certificate "Government Root Certification Authority"
f6b8f45
-     # Certificate "RSA Security Inc"
f6b8f45
-     # Certificate "Public Notary Root"
f6b8f45
-     # Certificate "GeoTrust Global CA"
f6b8f45
-     # Certificate "GeoTrust Global CA 2"
f6b8f45
-     # Certificate "GeoTrust Universal CA"
f6b8f45
-     # Certificate "GeoTrust Universal CA 2"
f6b8f45
-     # Certificate "QuoVadis Root Certification Authority"
f6b8f45
-     # Certificate "Autoridade Certificadora Raiz Brasileira"
f6b8f45
-     # Certificate "Post.Trust Root CA"
f6b8f45
-     # Certificate "Microsoft Root Authority"
f6b8f45
-     # Certificate "Microsoft Root Certificate Authority"
f6b8f45
-     # Certificate "Microsoft Root Certificate Authority 2010"
f6b8f45
-     # Certificate "Entrust.net Secure Server Certification Authority"
f6b8f45
-     # Certificate "UTN-USERFirst-Object"
f6b8f45
-     # Certificate "BYTE Root Certification Authority 001"
f6b8f45
-     # Certificate "CISRCA1"
f6b8f45
-     # Certificate "ePKI Root Certification Authority - G2"
f6b8f45
-     # Certificate "ePKI EV SSL Certification Authority - G1"
f6b8f45
-     # Certificate "AC Raíz Certicámara S.A."
f6b8f45
-     # Certificate "SSL.com EV Root Certification Authority RSA"
f6b8f45
-     # Certificate "LuxTrust Global Root 2"
f6b8f45
-     # Certificate "ACA ROOT"
f6b8f45
-     # Certificate "Security Communication ECC RootCA1"
f6b8f45
-     # Certificate "Security Communication RootCA3"
f6b8f45
-     # Certificate "CHAMBERS OF COMMERCE ROOT - 2016"
f6b8f45
-     # Certificate "Network Solutions RSA Certificate Authority"
f6b8f45
-     # Certificate "Network Solutions ECC Certificate Authority"
f6b8f45
-     # Certificate "Australian Defence Public Root CA"
f6b8f45
-     # Certificate "SI-TRUST Root"
f6b8f45
-     # Certificate "Halcom Root Certificate Authority"
f6b8f45
-     # Certificate "Application CA G3 Root"
f6b8f45
-     # Certificate "GLOBALTRUST 2015"
f6b8f45
-     # Certificate "Microsoft ECC Product Root Certificate Authority 2018"
f6b8f45
-     # Certificate "emSign Root CA - G2"
f6b8f45
-     # Certificate "emSign Root CA - C2"
f6b8f45
-     # Certificate "Microsoft ECC TS Root Certificate Authority 2018"
f6b8f45
-     # Certificate "DigiCert CS ECC P384 Root G5"
f6b8f45
-     # Certificate "DigiCert CS RSA4096 Root G5"
f6b8f45
-     # Certificate "DigiCert RSA4096 Root G5"
f6b8f45
-     # Certificate "DigiCert ECC P384 Root G5"
f6b8f45
-     # Certificate "HARICA Code Signing RSA Root CA 2021"
f6b8f45
-     # Certificate "HARICA Code Signing ECC Root CA 2021"
f6b8f45
-     # Certificate "Microsoft Identity Verification Root Certificate Authority 2020"
f6b8f45
421e34b
* Wed Jan 19 2022 Fedora Release Engineering <releng@fedoraproject.org> - 2021.2.52-3
421e34b
- Rebuilt for https://fedoraproject.org/wiki/Fedora_36_Mass_Rebuild
421e34b
662998d
*Mon Dec 13 2021 Bob Relyea <rrelyea@redhat.com> - 2021.2.52-2
662998d
- Update to CKBI 2.52 from NSS 3.72
662998d
-    Adding:
662998d
-     # Certificate "TunTrust Root CA"
662998d
-     # Certificate "HARICA TLS RSA Root CA 2021"
662998d
-     # Certificate "HARICA TLS ECC Root CA 2021"
662998d
-     # Certificate "HARICA Client RSA Root CA 2021"
662998d
-     # Certificate "HARICA Client ECC Root CA 2021"
662998d
1c8b67f
*Mon Dec 6 2021 Bob Relyea <rrelyea@redhat.com> - 2021.2.50-5
1c8b67f
- integrate Adam William's /etc/ssl/certs with Debian-compatibility
1c8b67f
- back out blocklist change since p11-kit .24 is not yet available on rawhide
1c8b67f
40ecfc5
*Mon Nov 1 2021 Bob Relyea <rrelyea@redhat.com> - 2021.2.50-4
40ecfc5
- remove blacklist directory now that pk11-kit is using blocklist
40ecfc5
dff1c3c
* Wed Jul 21 2021 Fedora Release Engineering <releng@fedoraproject.org> - 2021.2.50-3
dff1c3c
- Rebuilt for https://fedoraproject.org/wiki/Fedora_35_Mass_Rebuild
dff1c3c
6d22249
*Wed Jun 16 2021 Bob Relyea <rrelyea@redhat.com> - 2021.2.50-2
6d22249
- Update to CKBI 2.50 from NSS 3.67
6d22249
-    Removing:
6d22249
-     # Certificate "Trustis FPS Root CA"
6d22249
-     # Certificate "GlobalSign Code Signing Root R45"
6d22249
-     # Certificate "GlobalSign Code Signing Root E45"
6d22249
-     # Certificate "Halcom Root Certificate Authority"
6d22249
-     # Certificate "Symantec Class 3 Public Primary Certification Authority - G6"
6d22249
-     # Certificate "GLOBALTRUST"
6d22249
-     # Certificate "MULTICERT Root Certification Authority 01"
6d22249
-     # Certificate "Verizon Global Root CA"
6d22249
-     # Certificate "Tunisian Root Certificate Authority - TunRootCA2"
6d22249
-     # Certificate "CAEDICOM Root"
6d22249
-     # Certificate "COMODO Certification Authority"
6d22249
-     # Certificate "Security Communication ECC RootCA1"
6d22249
-     # Certificate "Security Communication RootCA3"
6d22249
-     # Certificate "AC RAIZ DNIE"
6d22249
-     # Certificate "VeriSign Class 3 Public Primary Certification Authority - G3"
6d22249
-     # Certificate "VeriSign Class 3 Public Primary Certification Authority - G5"
6d22249
-     # Certificate "VeriSign Universal Root Certification Authority"
6d22249
-     # Certificate "GeoTrust Global CA"
6d22249
-     # Certificate "GeoTrust Primary Certification Authority"
6d22249
-     # Certificate "thawte Primary Root CA"
6d22249
-     # Certificate "thawte Primary Root CA - G2"
6d22249
-     # Certificate "thawte Primary Root CA - G3"
6d22249
-     # Certificate "GeoTrust Primary Certification Authority - G3"
6d22249
-     # Certificate "GeoTrust Primary Certification Authority - G2"
6d22249
-     # Certificate "GeoTrust Universal CA"
6d22249
-     # Certificate "NetLock Platina (Class Platinum) Főtanúsítvány"
6d22249
-     # Certificate "GLOBALTRUST 2015"
6d22249
-     # Certificate "emSign Root CA - G2"
6d22249
-     # Certificate "emSign Root CA - C2"
6d22249
-    Adding:
6d22249
-     # Certificate "GLOBALTRUST 2020"
6d22249
-     # Certificate "ANF Secure Server Root CA"
6d22249
c4c1a32
*Tue May 25 2021 Bob Relyea <rrelyea@redhat.com> - 2021.2.48-2
c4c1a32
- Update to CKBI 2.48 from NSS 3.64
c4c1a32
-    Removing:
c4c1a32
-     # Certificate "Verisign Class 3 Public Primary Certification Authority - G3"
c4c1a32
-     # Certificate "GeoTrust Universal CA 2"
c4c1a32
-     # Certificate "QuoVadis Root CA"
c4c1a32
-     # Certificate "Sonera Class 2 Root CA"
c4c1a32
-     # Certificate "Taiwan GRCA"
c4c1a32
-     # Certificate "VeriSign Class 3 Public Primary Certification Authority - G4"
c4c1a32
-     # Certificate "EE Certification Centre Root CA"
c4c1a32
-     # Certificate "LuxTrust Global Root 2"
c4c1a32
-     # Certificate "Symantec Class 1 Public Primary Certification Authority - G4"
c4c1a32
-     # Certificate "Symantec Class 2 Public Primary Certification Authority - G4"
c4c1a32
-    Adding:
c4c1a32
-     # Certificate "Microsoft ECC Root Certificate Authority 2017"
c4c1a32
-     # Certificate "Microsoft RSA Root Certificate Authority 2017"
c4c1a32
-     # Certificate "e-Szigno Root CA 2017"
c4c1a32
-     # Certificate "certSIGN Root CA G2"
c4c1a32
-     # Certificate "Trustwave Global Certification Authority"
c4c1a32
-     # Certificate "Trustwave Global ECC P256 Certification Authority"
c4c1a32
-     # Certificate "Trustwave Global ECC P384 Certification Authority"
c4c1a32
-     # Certificate "NAVER Global Root Certification Authority"
c4c1a32
-     # Certificate "AC RAIZ FNMT-RCM SERVIDORES SEGUROS"
c4c1a32
-     # Certificate "GlobalSign Secure Mail Root R45"
c4c1a32
-     # Certificate "GlobalSign Secure Mail Root E45"
c4c1a32
-     # Certificate "GlobalSign Root R46"
c4c1a32
-     # Certificate "GlobalSign Root E46"
c4c1a32
-     # Certificate "Certum EC-384 CA"
c4c1a32
-     # Certificate "Certum Trusted Root CA"
c4c1a32
-     # Certificate "GlobalSign Code Signing Root R45"
c4c1a32
-     # Certificate "GlobalSign Code Signing Root E45"
c4c1a32
-     # Certificate "Halcom Root Certificate Authority"
c4c1a32
-     # Certificate "Symantec Class 3 Public Primary Certification Authority - G6"
c4c1a32
-     # Certificate "GLOBALTRUST"
c4c1a32
-     # Certificate "MULTICERT Root Certification Authority 01"
c4c1a32
-     # Certificate "Verizon Global Root CA"
c4c1a32
-     # Certificate "Tunisian Root Certificate Authority - TunRootCA2"
c4c1a32
-     # Certificate "CAEDICOM Root"
c4c1a32
-     # Certificate "COMODO Certification Authority"
c4c1a32
-     # Certificate "Security Communication ECC RootCA1"
c4c1a32
-     # Certificate "Security Communication RootCA3"
c4c1a32
-     # Certificate "AC RAIZ DNIE"
c4c1a32
-     # Certificate "VeriSign Class 3 Public Primary Certification Authority - G3"
c4c1a32
-     # Certificate "NetLock Platina (Class Platinum) Főtanúsítvány"
c4c1a32
-     # Certificate "GLOBALTRUST 2015"
c4c1a32
-     # Certificate "emSign Root CA - G2"
c4c1a32
-     # Certificate "emSign Root CA - C2"
c4c1a32
0fa62ae
* Tue Jan 26 2021 Fedora Release Engineering <releng@fedoraproject.org> - 2020.2.41-7
0fa62ae
- Rebuilt for https://fedoraproject.org/wiki/Fedora_34_Mass_Rebuild
0fa62ae
05fc0cc
* Wed Jan 13 2021 Bob Relyea <rrelyea@redhat.com> - 2020.2.41-6
05fc0cc
- remove unnecessarily divisive terms, take 1.
05fc0cc
-   in ca-certificates there are 3 cases:
05fc0cc
-   1) master refering to the fedora master branch in the fetch.sh script.
05fc0cc
-      This can only be changed once fedora changes the master branch name.
05fc0cc
-   2) a reference to the 'master bundle' in this file: this has been changed
05fc0cc
-      to 'primary bundle'.
05fc0cc
-   3) a couple of blacklist directories owned by this package, but used to
05fc0cc
-      p11-kit. New 'blocklist' directories have been created, but p11-kit
05fc0cc
-      needs to be updated before the old blacklist directories can be removed
05fc0cc
-      and the man pages corrected.
05fc0cc
9bd23da
* Mon Nov 09 2020 Christian Heimes <cheimes@redhat.com> - 2020.2.41-5
9bd23da
- Add cross-distro compatibility symlinks to /etc/ssl (rhbz#1895619)
9bd23da
5221e00
* Mon Jul 27 2020 Fedora Release Engineering <releng@fedoraproject.org> - 2020.2.41-4
5221e00
- Rebuilt for https://fedoraproject.org/wiki/Fedora_33_Mass_Rebuild
5221e00
5f1176f
* Tue Jun 16 2020 Adam Williamson <awilliam@redhat.com> - 2020.2.41-3
5f1176f
- Fix up broken %post and %postinstall scriptlet changes from -2
5f1176f
5f1176f
* Wed Jun 10 2020 Bob Relyea <rrelyea@redhat.com> - 2020.2.41-2
9a68b05
- Update to CKBI 2.41 from NSS 3.53.0
9a68b05
-    Removing:
9a68b05
-     # Certificate "AddTrust Low-Value Services Root"
9a68b05
-     # Certificate "AddTrust External Root"
9a68b05
-     # Certificate "Staat der Nederlanden Root CA - G2"
9a68b05
00da4d0
* Tue Jan 28 2020 Daiki Ueno <dueno@redhat.com> - 2020.2.40-3
00da4d0
- Update versioned dependency on p11-kit
00da4d0
5f1176f
* Wed Jan 22 2020 Daiki Ueno <dueno@redhat.com> - 2020.2.40-2
eaf3ef8
- Update to CKBI 2.40 from NSS 3.48
eaf3ef8
-    Removing:
eaf3ef8
-     # Certificate "UTN USERFirst Email Root CA"
eaf3ef8
-     # Certificate "Certplus Class 2 Primary CA"
eaf3ef8
-     # Certificate "Deutsche Telekom Root CA 2"
eaf3ef8
-     # Certificate "Swisscom Root CA 2"
eaf3ef8
-     # Certificate "Certinomis - Root CA"
eaf3ef8
-    Adding:
eaf3ef8
-     # Certificate "Entrust Root Certification Authority - G4"
eaf3ef8
- certdata2pem.py: emit flags for CKA_NSS_{SERVER,EMAIL}_DISTRUST_AFTER
eaf3ef8
8702798
* Wed Jul 24 2019 Fedora Release Engineering <releng@fedoraproject.org> - 2019.2.32-3
8702798
- Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild
8702798
5f1176f
* Wed Jun 19 2019 Bob Relyea <rrelyea@redhat.com> 2019.2.32-2
605570b
 - Update to CKBI 2.32 from NSS 3.44
605570b
   Removing: 
605570b
    # Certificate "Visa eCommerce Root"
605570b
    # Certificate "AC Raiz Certicamara S.A."
605570b
    # Certificate "Certplus Root CA G1"
605570b
    # Certificate "Certplus Root CA G2"
605570b
    # Certificate "OpenTrust Root CA G1"
605570b
    # Certificate "OpenTrust Root CA G2"
605570b
    # Certificate "OpenTrust Root CA G3"
605570b
   Adding: 
605570b
    # Certificate "GTS Root R1"
605570b
    # Certificate "GTS Root R2"
605570b
    # Certificate "GTS Root R3"
605570b
    # Certificate "GTS Root R4"
605570b
    # Certificate "UCA Global G2 Root"
605570b
    # Certificate "UCA Extended Validation Root"
605570b
    # Certificate "Certigna Root CA"
605570b
    # Certificate "emSign Root CA - G1"
605570b
    # Certificate "emSign ECC Root CA - G3"
605570b
    # Certificate "emSign Root CA - C1"
605570b
    # Certificate "emSign ECC Root CA - C3"
605570b
    # Certificate "Hongkong Post Root CA 3"
605570b
4f5bce3
* Thu Jan 31 2019 Fedora Release Engineering <releng@fedoraproject.org> - 2018.2.26-3
4f5bce3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild
4f5bce3
439a513
* Mon Sep 24 2018 Bob Relyea <rrelyea@redhat.com> - 2018.2.26-2
439a513
- Update to CKBI 2.26 from NSS 3.39
439a513
46d2f25
* Thu Jul 12 2018 Fedora Release Engineering <releng@fedoraproject.org> - 2018.2.24-6
46d2f25
- Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild
46d2f25
Kai Engert 1a2c011
* Thu Jun 28 2018 Kai Engert <kaie@redhat.com> - 2018.2.24-5
Kai Engert 1a2c011
- Ported scripts to python3
Kai Engert 1a2c011
6220683
* Mon Jun 11 2018 Daiki Ueno <dueno@redhat.com> - 2018.2.24-4
6220683
- Extract certificate bundle in EDK2 format, suggested by Laszlo Ersek
6220683
Kai Engert 3986396
* Mon Jun 04 2018 Kai Engert <kaie@redhat.com> - 2018.2.24-3
Kai Engert 3986396
- Adjust ghost file permissions, rhbz#1564432
Kai Engert 3986396
Kai Engert 342574e
* Fri May 18 2018 Kai Engert <kaie@redhat.com> - 2018.2.24-2
Kai Engert 342574e
- Update to CKBI 2.24 from NSS 3.37
Kai Engert 342574e
77a1f2a
* Wed Mar 14 2018 Iryna Shcherbina <ishcherb@redhat.com> - 2018.2.22-4
77a1f2a
- Update Python 2 dependency declarations to new packaging standards
77a1f2a
  (See https://fedoraproject.org/wiki/FinalizingFedoraSwitchtoPython3)
77a1f2a
09838f0
* Fri Feb 23 2018 Patrick Uiterwijk <puiterwijk@redhat.com> - 2018.2.22-3
09838f0
- Add post dep on coreutils for ln(1)
09838f0
Kai Engert a77bc27
* Tue Feb 06 2018 Kai Engert <kaie@redhat.com> - 2018.2.22-2
Kai Engert a77bc27
- Update to CKBI 2.22 from NSS 3.35
Kai Engert a77bc27
Kai Engert 756b8b4
* Mon Jan 22 2018 Kai Engert <kaie@redhat.com> - 2017.2.20-6
Kai Engert 756b8b4
- Depend on bash, grep, sed. Required for ca-legacy script execution.
Kai Engert 756b8b4
- p11-kit is already required at %%post execution time. (rhbz#1537127)
Kai Engert 756b8b4
Kai Engert 4d1e9c7
* Fri Jan 19 2018 Kai Engert <kaie@redhat.com> - 2017.2.20-5
Kai Engert 4d1e9c7
- Use the force, script! (Which sln did by default).
Kai Engert 4d1e9c7
Kai Engert 201f66b
* Fri Jan 19 2018 Kai Engert <kaie@redhat.com> - 2017.2.20-4
Kai Engert 201f66b
- stop using sln in ca-legacy script.
Kai Engert 201f66b
Kai Engert 078e3f0
* Fri Jan 19 2018 Kai Engert <kaie@redhat.com> - 2017.2.20-3
Kai Engert 078e3f0
- Use ln -s, because sln was removed from glibc. rhbz#1536349
Kai Engert 078e3f0
Kai Engert e3a2f67
* Mon Nov 27 2017 Kai Engert <kaie@redhat.com> - 2017.2.20-2
Kai Engert e3a2f67
- Update to CKBI 2.20 from NSS 3.34.1
Kai Engert e3a2f67
Kai Engert 6b317cb
* Tue Aug 15 2017 Kai Engert <kaie@redhat.com> - 2017.2.16-4
Kai Engert 7a69d0d
- Set P11_KIT_NO_USER_CONFIG=1 to prevent p11-kit from reading user
Kai Engert 7a69d0d
  configuration files (rhbz#1478172).
Kai Engert 7a69d0d
c735381
* Wed Jul 26 2017 Fedora Release Engineering <releng@fedoraproject.org> - 2017.2.16-3
c735381
- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild
c735381
Kai Engert 7accaab
* Wed Jul 19 2017 Kai Engert <kaie@redhat.com> - 2017.2.16-2
Kai Engert 7accaab
- Update to (yet unreleased) CKBI 2.16 which is planned for NSS 3.32.
Kai Engert 7accaab
  Mozilla removed all trust bits for code signing.
Kai Engert 7accaab
Kai Engert 6cea01c
* Wed Apr 26 2017 Kai Engert <kaie@redhat.com> - 2017.2.14-2
Kai Engert 6cea01c
- Update to CKBI 2.14 from NSS 3.30.2
Kai Engert 6cea01c
Kai Engert c1c2757
* Thu Feb 23 2017 Kai Engert <kaie@redhat.com> - 2017.2.11-5
Kai Engert c1c2757
- For CAs trusted by Mozilla, set attribute nss-mozilla-ca-policy: true
Kai Engert c1c2757
- Set attribute modifiable: false
Kai Engert c1c2757
- Require p11-kit 0.23.4
Kai Engert c1c2757
Kai Engert f0b0be2
* Mon Feb 13 2017 Kai Engert <kaie@redhat.com> - 2017.2.11-4
Kai Engert f0b0be2
- Changed the packaged bundle to use the flexible p11-kit-object-v1 file format,
Kai Engert f0b0be2
  as a preparation to fix bugs in the interaction between p11-kit-trust and
Kai Engert f0b0be2
  Mozilla applications, such as Firefox, Thunderbird etc.
Kai Engert f0b0be2
- Changed update-ca-trust to add comments to extracted PEM format files.
Kai Engert f0b0be2
- Added an utility to help with comparing output of the trust dump command.
Kai Engert f0b0be2
b1bece4
* Fri Feb 10 2017 Fedora Release Engineering <releng@fedoraproject.org> - 2017.2.11-3
b1bece4
- Rebuilt for https://fedoraproject.org/wiki/Fedora_26_Mass_Rebuild
b1bece4
Kai Engert 1926916
* Wed Jan 11 2017 Kai Engert <kaie@redhat.com> - 2017.2.11-2
Kai Engert 1926916
- Update to CKBI 2.11 from NSS 3.28.1
Kai Engert 1926916
Kai Engert f0b0be2
* Thu Sep 29 2016 Kai Engert <kaie@redhat.com> - 2016.2.10-2
Kai Engert 00af3f9
- Update to CKBI 2.10 from NSS 3.27
Kai Engert 00af3f9
Kai Engert 552fa4a
* Tue Aug 16 2016 Kai Engert <kaie@redhat.com> - 2016.2.9-3
Kai Engert 552fa4a
- Revert to the unmodified upstream CA list, changing the legacy trust
Kai Engert 552fa4a
  to an empty list. Keeping the ca-legacy tool and existing config,
Kai Engert 552fa4a
  however, the configuration has no effect after this change.
Kai Engert 552fa4a
Kai Engert 02204a0
* Tue Aug 16 2016 Kai Engert <kaie@redhat.com> - 2016.2.9-2
Kai Engert 02204a0
- Update to CKBI 2.9 from NSS 3.26 with legacy modifications
Kai Engert 02204a0
Kai Engert 54fae46
* Fri Jul 15 2016 Kai Engert <kaie@redhat.com> - 2016.2.8-2
Kai Engert 54fae46
- Update to CKBI 2.8 from NSS 3.25 with legacy modifications
Kai Engert 54fae46
Kai Engert 8867a18
* Tue May 10 2016 Kai Engert <kaie@redhat.com> - 2016.2.7-5
Kai Engert 8867a18
- Only create backup files if there is an original file (bug 999017).
Kai Engert 8867a18
Kai Engert 5300aa7
* Tue May 10 2016 Kai Engert <kaie@redhat.com> - 2016.2.7-4
Kai Engert 5300aa7
- Use sln, not ln, to avoid the dependency on coreutils.
Kai Engert 5300aa7
Kai Engert de9cf5d
* Mon Apr 25 2016 Kai Engert <kaie@redhat.com> - 2016.2.7-3
Kai Engert de9cf5d
- Fix typos in a manual page and in a README file.
Kai Engert de9cf5d
Kai Engert 5367492
* Wed Mar 16 2016 Kai Engert <kaie@redhat.com> - 2016.2.7-2
Kai Engert 5367492
- Update to CKBI 2.7 from NSS 3.23 with legacy modifications
Kai Engert 5367492
199d06c
* Wed Feb 03 2016 Fedora Release Engineering <releng@fedoraproject.org> - 2015.2.6-3
199d06c
- Rebuilt for https://fedoraproject.org/wiki/Fedora_24_Mass_Rebuild
199d06c
Kai Engert da979a1
* Mon Nov 23 2015 Kai Engert <kaie@redhat.com> - 2015.2.6-2
Kai Engert da979a1
- Update to CKBI 2.6 from NSS 3.21 with legacy modifications
Kai Engert da979a1
Kai Engert 87f9238
* Thu Aug 13 2015 Kai Engert <kaie@redhat.com> - 2015.2.5-2
Kai Engert 87f9238
- Update to CKBI 2.5 from NSS 3.19.3 with legacy modifications
Kai Engert 87f9238
298b407
* Wed Jun 17 2015 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2015.2.4-3
298b407
- Rebuilt for https://fedoraproject.org/wiki/Fedora_23_Mass_Rebuild
298b407
Kai Engert b2076a0
* Tue May 05 2015 Kai Engert <kaie@redhat.com> - 2015.2.4-2
Kai Engert b2076a0
- Update to CKBI 2.4 from NSS 3.18.1 with legacy modifications
Kai Engert b2076a0
Kai Engert 4111120
* Tue May 05 2015 Kai Engert <kaie@redhat.com> - 2015.2.3-4
Kai Engert 4111120
- Fixed a typo in the ca-legacy manual page.
Kai Engert 4111120
Kai Engert 40d3667
* Tue Mar 31 2015 Kai Engert <kaie@redhat.com> - 2015.2.3-3
Kai Engert 40d3667
- Don't use "enable" as a value for the legacy configuration, instead
Kai Engert 40d3667
  of the value "default", to make it clear that this preference isn't
Kai Engert 40d3667
  a promise to keep certificates enabled, but rather that we only
Kai Engert 40d3667
  keep them enabled as long as it's considered necessary.
Kai Engert 40d3667
- Changed the configuration file, the ca-legacy utility and filenames
Kai Engert 40d3667
  to use the term "default" (instead of the term "enable").
Kai Engert 40d3667
- Added a manual page for the ca-legacy utility.
Kai Engert 40d3667
- Fixed the ca-legacy utility to handle absence of the configuration
Kai Engert 40d3667
  setting and treat absence as the default setting.
Kai Engert 40d3667
Kai Engert b18dd49
* Fri Mar 20 2015 Kai Engert <kaie@redhat.com> - 2015.2.3-2
Kai Engert b18dd49
- Update to CKBI 2.3 from NSS 3.18 with legacy modifications
Kai Engert b1d00ef
- Fixed a mistake in the legacy handling of the upstream 2.2 release:
Kai Engert b1d00ef
  Removed two AOL certificates from the legacy group, because
Kai Engert b1d00ef
  upstream didn't remove them as part of phasing out 1024-bit
Kai Engert b1d00ef
  certificates, which means it isn't necessary to keep them.
Kai Engert b1d00ef
- Fixed a mistake in the legacy handling of the upstream 2.1 release:
Kai Engert b1d00ef
  Moved two NetLock certificates into the legacy group.
Kai Engert b1d00ef
Kai Engert 053dde8
* Tue Dec 16 2014 Kai Engert <kaie@redhat.com> - 2014.2.2-2
Kai Engert 053dde8
- Update to CKBI 2.2 from NSS 3.17.3 with legacy modifications
Kai Engert a1c2aec
- Update project URL
Kai Engert a1c2aec
- Cleanup
Kai Engert a1c2aec
0c19add
* Sat Nov 15 2014 Peter Lemenkov <lemenkov@gmail.com> - 2014.2.1-7
0c19add
- Restore Requires: coreutils
0c19add
d8e353c
* Fri Nov 14 2014 Peter Lemenkov <lemenkov@gmail.com> - 2014.2.1-6
d8e353c
- A proper fix for rhbz#1158343
d8e353c
Kai Engert d7defef
* Wed Oct 29 2014 Kai Engert <kaie@redhat.com> - 2014.2.1-5
Kai Engert d7defef
- add Requires: coreutils (rhbz#1158343)
Kai Engert d7defef
Kai Engert e24bfeb
* Tue Oct 28 2014 Kai Engert <kaie@redhat.com> - 2014.2.1-4
Kai Engert e24bfeb
- Introduce the ca-legacy utility and a ca-legacy.conf configuration file.
Kai Engert e24bfeb
  By default, legacy roots required for OpenSSL/GnuTLS compatibility
Kai Engert e24bfeb
  are kept enabled. Using the ca-legacy utility, the legacy roots can be
Kai Engert e24bfeb
  disabled. If disabled, the system will use the trust set as provided
Kai Engert e24bfeb
  by the upstream Mozilla CA list. (See also: rhbz#1158197)
Kai Engert e24bfeb
Kai Engert f81c301
* Sun Sep 21 2014 Kai Engert <kaie@redhat.com> - 2014.2.1-3
Kai Engert f81c301
- Temporarily re-enable several legacy root CA certificates because of
Kai Engert f81c301
  compatibility issues with software based on OpenSSL/GnuTLS,
Kai Engert f81c301
  see rhbz#1144808
Kai Engert f81c301
Kai Engert 18eedda
* Thu Aug 14 2014 Kai Engert <kaie@redhat.com> - 2014.2.1-2
Kai Engert 18eedda
- Update to CKBI 2.1 from NSS 3.16.4
Kai Engert 18eedda
- Fix rhbz#1130226
Kai Engert 18eedda
b0943c5
* Sat Jun 07 2014 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2013.1.97-3
b0943c5
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
b0943c5
Kai Engert f176bca
* Wed Mar 19 2014 Kai Engert <kaie@redhat.com> - 2013.1.97-2
Kai Engert f176bca
- Update to CKBI 1.97 from NSS 3.16
Kai Engert f176bca
Kai Engert 4a1396f
* Mon Feb 10 2014 Kai Engert <kaie@redhat.com> - 2013.1.96-3
Kai Engert 278ac24
- Remove openjdk build dependency
Kai Engert 278ac24
a14dcb4
* Sat Jan 25 2014 Ville Skyttä <ville.skytta@iki.fi> - 2013.1.96-2
a14dcb4
- Own the %%{_datadir}/pki dir.
a14dcb4
Kai Engert 5df4185
* Thu Jan 09 2014 Kai Engert <kaie@redhat.com> - 2013.1.96-1
Kai Engert 5df4185
- Update to CKBI 1.96 from NSS 3.15.4
Kai Engert 5df4185
Kai Engert 9a4d41a
* Tue Dec 17 2013 Kai Engert <kaie@redhat.com> - 2013.1.95-1
Kai Engert 9a4d41a
- Update to CKBI 1.95 from NSS 3.15.3.1
Kai Engert 9a4d41a
Kai Engert 10e748b
* Fri Sep 06 2013 Kai Engert <kaie@redhat.com> - 2013.1.94-18
Kai Engert 10e748b
- Update the Entrust root stapled extension for compatibility with 
Kai Engert 10e748b
  p11-kit version 0.19.2, patch by Stef Walter, rhbz#988745
Kai Engert 10e748b
Kai Engert e3e96c2
* Tue Sep 03 2013 Kai Engert <kaie@redhat.com> - 2013.1.94-17
Kai Engert e3e96c2
- merge manual improvement from f19
Kai Engert e3e96c2
04d3dc5
* Sat Aug 03 2013 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2013.1.94-16
04d3dc5
- Rebuilt for https://fedoraproject.org/wiki/Fedora_20_Mass_Rebuild
04d3dc5
Kai Engert 540618e
* Tue Jul 09 2013 Kai Engert <kaie@redhat.com> - 2013.1.94-15
Kai Engert 540618e
- clarification updates to manual page
Kai Engert 540618e
Kai Engert 9ac574b
* Mon Jul 08 2013 Kai Engert <kaie@redhat.com> - 2013.1.94-14
Kai Engert 9ac574b
- added a manual page and related build requirements
Kai Engert 9ac574b
- simplify the README files now that we have a manual page
Kai Engert 9ac574b
- set a certificate alias in trusted bundle (thanks to Ludwig Nussel)
Kai Engert 9ac574b
Kai Engert 6c5dbfb
* Mon May 27 2013 Kai Engert <kaie@redhat.com> - 2013.1.94-13
Kai Engert 6c5dbfb
- use correct command in README files, rhbz#961809
Kai Engert 6c5dbfb
Kai Engert 6c5dbfb
* Mon May 27 2013 Kai Engert <kaie@redhat.com> - 2013.1.94-12
Kai Engert 2dc4526
- update to version 1.94 provided by NSS 3.15 (beta)
Kai Engert 2dc4526
Kai Engert b2e71a9
* Mon Apr 22 2013 Kai Engert <kaie@redhat.com> - 2012.87-12
Kai Engert b2e71a9
- Use both label and serial to identify cert during conversion, rhbz#927601
Kai Engert b2e71a9
- Add myself as contributor to certdata2.pem.py and remove use of rcs/ident.
Kai Engert b2e71a9
  (thanks to Michael Shuler for suggesting to do so)
Kai Engert b2e71a9
- Update source URLs and comments, add source file for version information.
Kai Engert b2e71a9
Kai Engert 34f352d
* Tue Mar 19 2013 Kai Engert <kaie@redhat.com> - 2012.87-11
Kai Engert 34f352d
- adjust to changed and new functionality provided by p11-kit 0.17.3
Kai Engert 34f352d
- updated READMEs to describe the new directory-specific treatment of files
Kai Engert 34f352d
- ship a new file that contains certificates with neutral trust
Kai Engert 34f352d
- ship a new file that contains distrust objects, and also staple a 
Kai Engert 34f352d
  basic constraint extension to one legacy root contained in the
Kai Engert 34f352d
  Mozilla CA list
Kai Engert 34f352d
- adjust the build script to dynamically produce most of above files
Kai Engert 34f352d
- add and own the anchors and blacklist subdirectories
Kai Engert 34f352d
- file generate-cacerts.pl is no longer required
Kai Engert 34f352d
Kai Engert d538ada
* Fri Mar 08 2013 Kai Engert <kaie@redhat.com> - 2012.87-9
Kai Engert d538ada
- Major rework for the Fedora SharedSystemCertificates feature.
Kai Engert d538ada
- Only ship a PEM bundle file using the BEGIN TRUSTED CERTIFICATE file format.
Kai Engert d538ada
- Require the p11-kit package that contains tools to automatically create
Kai Engert d538ada
  other file format bundles.
Kai Engert d538ada
- Convert old file locations to symbolic links that point to dynamically
Kai Engert d538ada
  generated files.
Kai Engert d538ada
- Old files, which might have been locally modified, will be saved in backup 
Kai Engert d538ada
  files with .rpmsave extension.
Kai Engert d538ada
- Added a update-ca-certificates script which can be used to regenerate
Kai Engert d538ada
  the merged trusted output.
Kai Engert d538ada
- Refer to the various README files that have been added for more detailed
Kai Engert d538ada
  explanation of the new system.
Kai Engert d538ada
- No longer require rsc for building.
Kai Engert d538ada
- Add explanation for the future version numbering scheme,
Kai Engert d538ada
  because the old numbering scheme was based on upstream using cvs,
Kai Engert d538ada
  which is no longer true, and therefore can no longer be used.
Kai Engert d538ada
- Includes changes from rhbz#873369.
Kai Engert d538ada
Kai Engert 0ecb427
* Thu Mar 07 2013 Kai Engert <kaie@redhat.com> - 2012.87-2.fc19.1
Kai Engert 0ecb427
- Ship trust bundle file in /usr/share/pki/ca-trust-source/, temporarily in addition.
Kai Engert 0ecb427
  This location will soon become the only place containing this file.
Kai Engert 0ecb427
dc13997
* Wed Feb 13 2013 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2012.87-2
dc13997
- Rebuilt for https://fedoraproject.org/wiki/Fedora_19_Mass_Rebuild
dc13997
73800e1
* Fri Jan 04 2013 Paul Wouters <pwouters@redhat.com> - 2012.87-1
73800e1
- Updated to r1.87 to blacklist mis-issued turktrust CA certs
73800e1
829cbef
* Wed Oct 24 2012 Paul Wouters <pwouters@redhat.com> - 2012.86-2
829cbef
- Updated blacklist with 20 entries (Diginotar, Trustwave, Comodo(?)
829cbef
- Fix to certdata2pem.py to also check for CKT_NSS_NOT_TRUSTED 
829cbef
b65d8a8
* Tue Oct 23 2012 Paul Wouters <pwouters@redhat.com> - 2012.86-1
b65d8a8
- update to r1.86
b65d8a8
bc18e50
* Mon Jul 23 2012 Joe Orton <jorton@redhat.com> - 2012.85-2
bc18e50
- add openssl to BuildRequires
bc18e50
df639e3
* Mon Jul 23 2012 Joe Orton <jorton@redhat.com> - 2012.85-1
df639e3
- update to r1.85
df639e3
816ae11
* Wed Jul 18 2012 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2012.81-2
816ae11
- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild
816ae11
229976a
* Mon Feb 13 2012 Joe Orton <jorton@redhat.com> - 2012.81-1
229976a
- update to r1.81
229976a
8c27f26
* Thu Jan 12 2012 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2011.80-2
8c27f26
- Rebuilt for https://fedoraproject.org/wiki/Fedora_17_Mass_Rebuild
8c27f26
229976a
* Wed Nov  9 2011 Joe Orton <jorton@redhat.com> - 2011.80-1
Joe Orton 5968244
- update to r1.80
Joe Orton 5968244
- fix handling of certs with dublicate Subject names (#733032)
Joe Orton 5968244
f098063
* Thu Sep  1 2011 Joe Orton <jorton@redhat.com> - 2011.78-1
f098063
- update to r1.78, removing trust from DigiNotar root (#734679)
f098063
fbef645
* Wed Aug  3 2011 Joe Orton <jorton@redhat.com> - 2011.75-1
fbef645
- update to r1.75
fbef645
37d25f7
* Wed Apr 20 2011 Joe Orton <jorton@redhat.com> - 2011.74-1
37d25f7
- update to r1.74
37d25f7
9ee01c7
* Tue Feb 08 2011 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2011.70-2
9ee01c7
- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild
9ee01c7
bf4a1f1
* Wed Jan 12 2011 Joe Orton <jorton@redhat.com> - 2011.70-1
bf4a1f1
- update to r1.70
bf4a1f1
96465e8
* Tue Nov  9 2010 Joe Orton <jorton@redhat.com> - 2010.65-3
96465e8
- update to r1.65
96465e8
c9fb114
* Wed Apr  7 2010 Joe Orton <jorton@redhat.com> - 2010.63-3
c9fb114
- package /etc/ssl/certs symlink for third-party apps (#572725)
c9fb114
58bb64f
* Wed Apr  7 2010 Joe Orton <jorton@redhat.com> - 2010.63-2
58bb64f
- rebuild
58bb64f
b62ba6e
* Wed Apr  7 2010 Joe Orton <jorton@redhat.com> - 2010.63-1
b62ba6e
- update to certdata.txt r1.63
b62ba6e
- use upstream RCS version in Version
b62ba6e
dc70b1f
* Fri Mar 19 2010 Joe Orton <jorton@redhat.com> - 2010-4
dc70b1f
- fix ca-bundle.crt (#575111)
dc70b1f
708646c
* Thu Mar 18 2010 Joe Orton <jorton@redhat.com> - 2010-3
708646c
- update to certdata.txt r1.58
708646c
- add /etc/pki/tls/certs/ca-bundle.trust.crt using 'TRUSTED CERTICATE' format
708646c
- exclude ECC certs from the Java cacerts database
708646c
- catch keytool failures
708646c
- fail parsing certdata.txt on finding untrusted but not blacklisted cert
708646c
56a6866
* Fri Jan 15 2010 Joe Orton <jorton@redhat.com> - 2010-2
56a6866
- fix Java cacert database generation: use Subject rather than Issuer
56a6866
  for alias name; add diagnostics; fix some alias names.
56a6866
5f392b3
* Mon Jan 11 2010 Joe Orton <jorton@redhat.com> - 2010-1
5f392b3
- adopt Python certdata.txt parsing script from Debian
5f392b3
0bfc15e
* Fri Jul 24 2009 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2009-2
0bfc15e
- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild
0bfc15e
5406f40
* Wed Jul 22 2009 Joe Orton <jorton@redhat.com> 2009-1
5406f40
- update to certdata.txt r1.53
5406f40
a42172d
* Mon Feb 23 2009 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2008-8
a42172d
- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild
a42172d
e908127
* Tue Oct 14 2008 Joe Orton <jorton@redhat.com> 2008-7
e908127
- update to certdata.txt r1.49
e908127
Thomas Fitzsimmons 180c47e
* Wed Jun 25 2008 Thomas Fitzsimmons <fitzsim@redhat.com> - 2008-6
Thomas Fitzsimmons 180c47e
- Change generate-cacerts.pl to produce pretty aliases.
Thomas Fitzsimmons 180c47e
65c3b04
* Mon Jun  2 2008 Joe Orton <jorton@redhat.com> 2008-5
65c3b04
- include /etc/pki/tls/cert.pem symlink to ca-bundle.crt
65c3b04
d01a981
* Tue May 27 2008 Joe Orton <jorton@redhat.com> 2008-4
d01a981
- use package name for temp dir, recreate it in prep
d01a981
d01a981
* Tue May 27 2008 Joe Orton <jorton@redhat.com> 2008-3
d01a981
- fix source script perms
d01a981
- mark packaged files as config(noreplace)
d01a981
d01a981
* Tue May 27 2008 Joe Orton <jorton@redhat.com> 2008-2
d01a981
- add (but don't use) mkcabundle.pl
d01a981
- tweak description
d01a981
- use /usr/bin/keytool directly; BR java-openjdk
d01a981
d01a981
* Tue May 27 2008 Joe Orton <jorton@redhat.com> 2008-1
d01a981
- Initial build (#448497)