Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

ca-certificates-2+git20170807.10b2785-lp150.6.3.1 RPM for noarch

From OpenSuSE Ports Leap 15.0 updates for noarch

Name: ca-certificates Distribution: openSUSE Leap 15.0
Version: 2+git20170807.10b2785 Vendor: openSUSE
Release: lp150.6.3.1 Build date: Fri Oct 5 17:02:52 2018
Group: Productivity/Networking/Security Build host: obs-arm-4
Size: 28711 Source RPM: ca-certificates-2+git20170807.10b2785-lp150.6.3.1.src.rpm
Packager: http://bugs.opensuse.org
Url: https://github.com/openSUSE/ca-certificates
Summary: Utilities for system wide CA certificate installation
Update-ca-certificates is intended to keep the certificate stores of
SSL libraries like OpenSSL or GnuTLS in sync with the system's CA
certificate store that is managed by p11-kit.

Provides

Requires

License

GPL-2.0-or-later

Changelog

* Wed Sep 19 2018 Jason Sikes <jsikes@suse.de>
  - Changed "openssl" requirement to "openssl(cli)"
    * (bsc#1101470)
* Tue Mar 20 2018 kukuk@suse.de
  - Use %license instead of %doc [bsc#1082318]
* Thu Dec 14 2017 kukuk@suse.de
  - Revert last change since we fixed systemd-preset-branding and
    this requires is no longer needed.
* Fri Dec 08 2017 kukuk@suse.com
  - Re-add systemd requires, else package will be installed to early
    and services never enabled [bsc#1071776].
* Thu Nov 23 2017 kukuk@suse.de
  - Don't require systemd, since we could be used in environments
    like container images, where we don't have systemd. If systemd
    is installed the systemd units will be used, else they are not
    needed.
* Mon Aug 07 2017 lnussel@suse.de
  - Update to version 2+git20170807.10b2785:
    * Check TRANSACTIONAL_UPDATE is set (boo#1045942)
    * Add systemd units
* Mon Jun 19 2017 kukuk@suse.de
  - Run update-ca-certificate by systemd unit when the content of
    one of the paths changes. Needed for read-only root and/or
    transactional updates.
* Wed Nov 11 2015 lnussel@suse.de
  - Update to version 2+git20151110.c15593c:
    + set proper umask (boo#948724)
* Wed Mar 25 2015 lnussel@suse.de
  - require p11-kit-tools >= 0.23.1
* Tue Mar 24 2015 lnussel@suse.de
  - Update to version 2+git20150324.e3ee392:
    + p11-kit 0.23.1 supports pem-directory-hash now
  - use service file to generate tarball
* Sat Nov 08 2014 Led <ledest@gmail.com>
  - fix bashism in postun script
* Tue Aug 05 2014 lnussel@suse.de
  - use rpm -qf to determine if a ssl cert is owned by some other
    package and therefore doesn't need to be migrated (related to
    bnc#890205).
* Mon Aug 04 2014 lnussel@suse.de
  - add p11 kit header to set label of migrated certificates to the
    file name of the previous one (bnc#890205)
* Wed Jul 30 2014 lnussel@suse.de
  - removed the version in the Obsoletes. The package in SLE11 got
    version updated (bnc#887099).
* Thu Jul 17 2014 meissner@suse.com
  - clarify the start order of the generators, as certbundle.run
    semi-depends on etc_ssl.run via a timestamp. (bnc#883386)
* Mon Jun 23 2014 lnussel@suse.de
  - fix directory permissions for real this time (bnc#871639)
* Wed Jun 04 2014 lnussel@suse.de
  - don't keep certificates with marker (bnc#875647)
* Thu May 08 2014 lnussel@suse.de
  - copy custom pem files in /etc/ssl/certs to /etc/pki/anchors on
    update (bnc#875647)
* Mon Apr 07 2014 lnussel@suse.de
  - Fix typo in man page
* Fri Apr 04 2014 lnussel@suse.de
  - package correct permissions of generated  directories (bnc#871639)
* Fri Dec 06 2013 lnussel@suse.de
  - etc_ssl.run: fix typo
  - turn /etc/ssl/certs into a symlink to /var/lib/ca-certificates/pem
* Wed Oct 16 2013 lnussel@suse.de
  - fix typo in README (bnc#845500)
  - remove old extractcerts.pl
* Tue Aug 27 2013 lnussel@suse.de
  - re-enable the CA bundle again for glib-networking (bnc#825903)
* Tue Aug 27 2013 lnussel@suse.de
  - make sure we have p11-kit >= 0.19.3 which has the 'trust' command
    (bnc#836560)
* Mon Aug 05 2013 lnussel@suse.de
  - don't remove symlinks to other locations in /etc/ssl/certs
  - use the trust binary instead of p11-kit to extract trust
* Thu Jun 27 2013 lnussel@suse.de
  - disable generating ca-bundle for now again so people don't submit
    new packages that use this file.
* Mon Jun 24 2013 hrvoje.senjan@gmail.com
  - Explicitly require p11-kit, otherwise trusted certificates won't
    be generated
* Mon Jun 24 2013 lnussel@suse.de
  - update manpage
* Thu Jun 20 2013 lnussel@suse.de
  - use p11-kit to generate the files
* Fri May 04 2012 lnussel@suse.de
  - give hint about SSL_CTX_set_default_verify_paths in cert bundle
* Mon Oct 24 2011 coolo@suse.com
  - require coreutils for %post script
* Mon Jun 20 2011 lnussel@suse.de
  - fix spurious rpm warning if no java exists (bnc#634793)
  - move java.run to java-ca-certificates
* Mon Sep 27 2010 lnussel@suse.de
  - catch FileNotFoundException (bnc#623365)
* Fri May 21 2010 mvyskocil@suse.cz
  * Use the gcc-java and fastjar for build to avoid dependency problems
    * build keystore.class only to allow noarch package
* Wed May 19 2010 lnussel@suse.de
  - create java bundles
* Tue Apr 27 2010 lnussel@suse.de
  - also use hooks from /usr/lib/ca-certificates/update.d
  - replace bundle file with symlink to file in /var as it's auto
    generated
* Wed Apr 21 2010 lnussel@suse.de
  - force rebuilding all certificate stores in %post
    This also makes sure we update the hash links in /etc/ssl/certs
    as openssl changed the hash format between 0.9.8 and 1.0
* Thu Apr 08 2010 lnussel@suse.de
  - actually install certbundle.run (bnc#594501)
* Thu Apr 08 2010 lnussel@suse.de
  - it's ca-bundle.pem rather than cert.pem
* Thu Apr 08 2010 lnussel@suse.de
  - obsolete openssl-certs (bnc#594434)
  - update manpage (bnc#594501)
* Thu Apr 01 2010 lnussel@suse.de
  - include /etc/ca-certificates.conf as %ghost
* Fri Mar 26 2010 lnussel@suse.de
  - generate ca-bundle with hook script
  - don't use trusted certificates in ca-bundle file for compatibility
    with gnutls
* Wed Mar 24 2010 lnussel@suse.de
  - new package

Files

/etc/ca-certificates
/etc/ca-certificates/update.d
/etc/pki
/etc/pki/trust
/etc/pki/trust/anchors
/etc/pki/trust/blacklist
/etc/ssl/ca-bundle.pem
/etc/ssl/certs
/usr/lib/ca-certificates
/usr/lib/ca-certificates/update.d
/usr/lib/ca-certificates/update.d/50java.run
/usr/lib/ca-certificates/update.d/70openssl.run
/usr/lib/ca-certificates/update.d/80etc_ssl.run
/usr/lib/ca-certificates/update.d/99certbundle.run
/usr/lib/systemd/system/ca-certificates.path
/usr/lib/systemd/system/ca-certificates.service
/usr/sbin/rcca-certificates
/usr/sbin/update-ca-certificates
/usr/share/doc/packages/ca-certificates
/usr/share/doc/packages/ca-certificates/README
/usr/share/licenses/ca-certificates
/usr/share/licenses/ca-certificates/COPYING
/usr/share/man/man8/update-ca-certificates.8.gz
/usr/share/pki
/usr/share/pki/trust
/usr/share/pki/trust/anchors
/usr/share/pki/trust/blacklist
/var/lib/ca-certificates
/var/lib/ca-certificates/ca-bundle.pem
/var/lib/ca-certificates/java-cacerts
/var/lib/ca-certificates/openssl
/var/lib/ca-certificates/pem


Generated by rpm2html 1.8.1

Fabrice Bellet, Sat Jan 18 00:47:03 2020