Script 'mail_helper' called by obssrc
Hello community,
here is the log from the commit of package ca-certificates for openSUSE:Factory
checked in at 2023-04-08 17:38:24
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/ca-certificates (Old)
and /work/SRC/openSUSE:Factory/.ca-certificates.new.19717 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "ca-certificates"
Sat Apr 8 17:38:24 2023 rev:52 rq:1077676 version:2+git20230406.2dae8b7
Changes:
--------
--- /work/SRC/openSUSE:Factory/ca-certificates/ca-certificates.changes
2021-10-12 21:49:54.831919866 +0200
+++
/work/SRC/openSUSE:Factory/.ca-certificates.new.19717/ca-certificates.changes
2023-04-08 17:38:26.957834271 +0200
@@ -1,0 +2,8 @@
+Thu Apr 06 08:03:11 UTC 2023 - [email protected]
+
+- Update to version 2+git20230406.2dae8b7:
+ * Build in place support
+ * Fix up argument parsing
+ * merge spec file into git
+
+-------------------------------------------------------------------
Old:
----
ca-certificates-2+git20210723.27a0476.obscpio
ca-certificates-2+git20211004.3efbea9.obscpio
New:
----
ca-certificates-2+git20230406.2dae8b7.obscpio
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ ca-certificates.spec ++++++
--- /var/tmp/diff_new_pack.IMEOM1/_old 2023-04-08 17:38:27.785839025 +0200
+++ /var/tmp/diff_new_pack.IMEOM1/_new 2023-04-08 17:38:27.789839047 +0200
@@ -1,7 +1,7 @@
#
# spec file for package ca-certificates
#
-# Copyright (c) 2021 SUSE LLC
+# Copyright (c) 2023 SUSE LLC
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
@@ -16,6 +16,16 @@
#
+%if 0%{?_build_in_place}
+%define git_version %(git log '-n1' '--date=format:%Y%m%d'
'--no-show-signature' "--pretty=format:+git%cd.%h")
+BuildRequires: git-core
+%else
+# this is required for obs' source validator. It's
+# 20-files-present-and-referenced ignores all conditionals. So the
+# definition of git_version actually happens always.
+%define git_version %{nil}
+%endif
+
# the ca bundle file was meant as compat option for e.g.
# proprietary packages. It's not meant to be used at all.
# unfortunately glib-networking has such a complicated abstraction
@@ -28,7 +38,7 @@
%define ssletcdir %{_sysconfdir}/ssl
%define cabundle /var/lib/ca-certificates/ca-bundle.pem
%define sslcerts %{ssletcdir}/certs
-Version: 2+git20211004.3efbea9
+Version: 2+git20230406.2dae8b7%{git_version}
Release: 0
Summary: Utilities for system wide CA certificate installation
License: GPL-2.0-or-later
++++++ _service ++++++
--- /var/tmp/diff_new_pack.IMEOM1/_old 2023-04-08 17:38:27.825839254 +0200
+++ /var/tmp/diff_new_pack.IMEOM1/_new 2023-04-08 17:38:27.829839277 +0200
@@ -2,9 +2,10 @@
<service name="obs_scm" mode="manual">
<param name="version">2</param>
<param name="versionformat">2+git%cd.%h</param>
- <param name="url">http://github.com/openSUSE/ca-certificates.git</param>
+ <param name="url">https://github.com/openSUSE/ca-certificates.git</param>
<param name="scm">git</param>
<param name="changesgenerate">enable</param>
+ <param name="extract">ca-certificates.spec</param>
</service>
<service name="set_version" mode="manual"/>
<service mode="buildtime" name="tar"/>
++++++ _servicedata ++++++
--- /var/tmp/diff_new_pack.IMEOM1/_old 2023-04-08 17:38:27.853839415 +0200
+++ /var/tmp/diff_new_pack.IMEOM1/_new 2023-04-08 17:38:27.857839437 +0200
@@ -1,6 +1,8 @@
<servicedata>
<service name="tar_scm">
<param
name="url">http://github.com/openSUSE/ca-certificates.git</param>
- <param
name="changesrevision">15986b230062fc4355616d0c63180811704b0933</param></service></servicedata>
+ <param
name="changesrevision">d16f02666b959e10f5bc64b6ab26b398f388ad0b</param></service><service
name="tar_scm">
+ <param
name="url">https://github.com/openSUSE/ca-certificates.git</param>
+ <param
name="changesrevision">2dae8b77c250506dc1bf862351c3a5de89a08e90</param></service></servicedata>
(No newline at EOF)
++++++ ca-certificates-2+git20210723.27a0476.obscpio ->
ca-certificates-2+git20230406.2dae8b7.obscpio ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/ca-certificates-2+git20210723.27a0476/ca-certificates.spec
new/ca-certificates-2+git20230406.2dae8b7/ca-certificates.spec
--- old/ca-certificates-2+git20210723.27a0476/ca-certificates.spec
1970-01-01 01:00:00.000000000 +0100
+++ new/ca-certificates-2+git20230406.2dae8b7/ca-certificates.spec
2023-04-06 10:02:54.000000000 +0200
@@ -0,0 +1,148 @@
+#
+# spec file for package ca-certificates
+#
+# Copyright (c) 2021 SUSE LLC
+#
+# All modifications and additions to the file contributed by third parties
+# remain the property of their copyright owners, unless otherwise agreed
+# upon. The license for this file, and modifications and additions to the
+# file, is the same license as for the pristine package itself (unless the
+# license for the pristine package is not an Open Source License, in which
+# case the license is the MIT License). An "Open Source License" is a
+# license that conforms to the Open Source Definition (Version 1.9)
+# published by the Open Source Initiative.
+
+# Please submit bugfixes or comments via https://bugs.opensuse.org/
+#
+
+%if 0%{?_build_in_place}
+%define git_version %(git log '-n1' '--date=format:%Y%m%d'
'--no-show-signature' "--pretty=format:+git%cd.%h")
+BuildRequires: git-core
+%else
+# this is required for obs' source validator. It's
+# 20-files-present-and-referenced ignores all conditionals. So the
+# definition of git_version actually happens always.
+%define git_version %{nil}
+%endif
+
+# the ca bundle file was meant as compat option for e.g.
+# proprietary packages. It's not meant to be used at all.
+# unfortunately glib-networking has such a complicated abstraction
+# on top of gnutls that we have to live with the bundle for now
+%bcond_without cabundle
+
+BuildRequires: p11-kit-devel
+
+Name: ca-certificates
+%define ssletcdir %{_sysconfdir}/ssl
+%define cabundle /var/lib/ca-certificates/ca-bundle.pem
+%define sslcerts %{ssletcdir}/certs
+Version: 2%{git_version}
+Release: 0
+Summary: Utilities for system wide CA certificate installation
+License: GPL-2.0-or-later
+Group: Productivity/Networking/Security
+Source0: ca-certificates-%{version}.tar
+BuildRoot: %{_tmppath}/%{name}-%{version}-build
+URL: https://github.com/openSUSE/ca-certificates
+#
+Requires: /usr/bin/readlink
+Requires: p11-kit
+Requires: p11-kit-tools >= 0.23.1
+# needed for post
+Requires(post): p11-kit-tools /usr/bin/readlink
+Recommends: ca-certificates-mozilla
+# no need for a separate Java package anymore. The bundle is
+# created by C code.
+Obsoletes: java-ca-certificates = 1
+Provides: java-ca-certificates = %version-%release
+BuildArch: noarch
+
+%description
+Update-ca-certificates is intended to keep the certificate stores of
+SSL libraries like OpenSSL or GnuTLS in sync with the system's CA
+certificate store that is managed by p11-kit.
+
+%prep
+%setup -q
+
+%build
+
+%install
+%if %{without cabundle}
+rm -f certbundle.run
+%endif
+%make_install
+ln -s service %{buildroot}%{_sbindir}/rcca-certificates
+install -d -m 755 %{buildroot}%{trustdir_cfg}/{anchors,blacklist}
+install -d -m 755 %{buildroot}%{trustdir_static}/{anchors,blacklist}
+install -d -m 755 %{buildroot}%{ssletcdir}
+install -d -m 755 %{buildroot}/etc/ca-certificates/update.d
+install -d -m 755 %{buildroot}%{_prefix}/lib/ca-certificates/update.d
+install -d -m 555 %{buildroot}/var/lib/ca-certificates/pem
+install -d -m 555 %{buildroot}/var/lib/ca-certificates/openssl
+install -d -m 755 %{buildroot}/%{_prefix}/lib/systemd/system
+ln -s ../../var/lib/ca-certificates/pem %{buildroot}%{sslcerts}
+%if %{with cabundle}
+install -D -m 444 /dev/null %{buildroot}/%{cabundle}
+ln -s %{cabundle} %{buildroot}%{ssletcdir}/ca-bundle.pem
+%endif
+install -D -m 444 /dev/null %{buildroot}/var/lib/ca-certificates/java-cacerts
+
+%pre
+%service_add_pre ca-certificates.path ca-certificates.service
+
+%post
+# force rebuilding all certificate stores.
+update-ca-certificates -f || true
+%service_add_post ca-certificates.path ca-certificates.service
+
+%preun
+%service_del_preun ca-certificates.path ca-certificates.service
+
+%postun
+if [ "$1" -eq 0 ]; then
+ rm -rf /var/lib/ca-certificates/pem /var/lib/ca-certificates/openssl
+fi
+%service_del_postun ca-certificates.path ca-certificates.service
+
+%clean
+rm -rf %{buildroot}
+
+%files
+%defattr(-, root, root)
+%license COPYING
+%doc README
+%dir %{pkidir_cfg}
+%dir %{trustdir_cfg}
+%dir %{trustdir_cfg}/anchors
+%dir %{trustdir_cfg}/blacklist
+%dir %{pkidir_static}
+%dir %{trustdir_static}
+%dir %{trustdir_static}/anchors
+%dir %{trustdir_static}/blacklist
+%dir %ssletcdir
+%sslcerts
+%ghost /var/lib/ca-certificates/java-cacerts
+%dir /etc/ca-certificates
+%dir /etc/ca-certificates/update.d
+%dir %{_prefix}/lib/ca-certificates
+%dir %{_prefix}/lib/ca-certificates/update.d
+%{_prefix}/lib/systemd/system/*
+%dir /var/lib/ca-certificates
+%dir /var/lib/ca-certificates/pem
+%dir /var/lib/ca-certificates/openssl
+%{_sbindir}/rcca-certificates
+%{_sbindir}/update-ca-certificates
+%{_mandir}/man8/update-ca-certificates.8*
+%{_prefix}/lib/ca-certificates/update.d/*java.run
+%{_prefix}/lib/ca-certificates/update.d/*etc_ssl.run
+%{_prefix}/lib/ca-certificates/update.d/*openssl.run
+#
+%if %{with cabundle}
+%{ssletcdir}/ca-bundle.pem
+%ghost %{cabundle}
+%{_prefix}/lib/ca-certificates/update.d/*certbundle.run
+%endif
+
+%changelog
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/ca-certificates-2+git20210723.27a0476/certbundle.run
new/ca-certificates-2+git20230406.2dae8b7/certbundle.run
--- old/ca-certificates-2+git20210723.27a0476/certbundle.run 2021-07-23
14:22:15.000000000 +0200
+++ new/ca-certificates-2+git20230406.2dae8b7/certbundle.run 2023-04-06
10:02:54.000000000 +0200
@@ -37,5 +37,6 @@
mv -f "$cafile.new" "$cafile"
if ! test -e $destdir/etc/ssl/ca-bundle.pem && ! test -L
$destdir/etc/ssl/ca-bundle.pem; then
[ -z "$verbose" ] || echo "restoring $destdir/etc/ssl/ca-bundle.pem ..."
+ install -d -m 0755 $destdir/etc/ssl
ln -s ../../var/lib/ca-certificates/ca-bundle.pem
$destdir/etc/ssl/ca-bundle.pem
fi
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/ca-certificates-2+git20210723.27a0476/etc_ssl.run
new/ca-certificates-2+git20230406.2dae8b7/etc_ssl.run
--- old/ca-certificates-2+git20210723.27a0476/etc_ssl.run 2021-07-23
14:22:15.000000000 +0200
+++ new/ca-certificates-2+git20230406.2dae8b7/etc_ssl.run 2023-04-06
10:02:54.000000000 +0200
@@ -46,7 +46,7 @@
-*) echo "invalid option: $1" >&2; exit 1 ;;
esac
-mkdir -p "${destdir}$pemdir"
+install -d -m 0755 "${destdir}$pemdir"
trust extract --purpose=server-auth --filter=ca-anchors
--format=pem-directory-hash -f "${destdir}$pemdir"
# fix up /etc/ssl/certs if it's not a link pointing to
/var/lib/ca-certificates/pem
@@ -55,5 +55,6 @@
if [ -d "$etccertsdir" ]; then
mv -Tv --backup=numbered "$etccertsdir" "$etccertsdir.old"
fi
+ install -d -m 0755 "${etccertsdir%/*}"
ln -Tsv --backup=numbered "../..$pemdir" "$etccertsdir"
-fi
\ No newline at end of file
+fi
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/ca-certificates-2+git20210723.27a0476/openssl.run
new/ca-certificates-2+git20230406.2dae8b7/openssl.run
--- old/ca-certificates-2+git20210723.27a0476/openssl.run 2021-07-23
14:22:15.000000000 +0200
+++ new/ca-certificates-2+git20230406.2dae8b7/openssl.run 2023-04-06
10:02:54.000000000 +0200
@@ -15,7 +15,7 @@
done
[ -z "$verbose" ] || echo "creating $cadir ..."
-mkdir -p "$cadir"
+install -d -m 0755 -p "$cadir"
trust extract --format=openssl-directory --filter=ca-anchors --overwrite $cadir
# vim: syntax=sh
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/ca-certificates-2+git20210723.27a0476/update-ca-certificates
new/ca-certificates-2+git20230406.2dae8b7/update-ca-certificates
--- old/ca-certificates-2+git20210723.27a0476/update-ca-certificates
2021-07-23 14:22:15.000000000 +0200
+++ new/ca-certificates-2+git20230406.2dae8b7/update-ca-certificates
2023-04-06 10:02:54.000000000 +0200
@@ -46,20 +46,23 @@
exit 0
}
-for arg in "$@"; do
- case "$arg" in
- -v|--verbose) verbose='-v' ;;
- -f|--fresh) fresh='-f' ;;
- -r|--root)
- shift
- destdir=$1
- if [ -z $destdir ]; then
- echo "-r option requires parameter <directory>"
- exit 1
- fi
- ;;
- -h|--help) help_and_exit ;;
- -*) echo "invalid option: $1" >&2; exit 1 ;;
+args=("$@")
+while [ $# -gt 0 ]; do
+ param="$1"
+ arg="$2"
+ test "$arg" = "${arg#-}" || arg=
+ shift
+ case "$param" in
+ -v|--verbose) verbose='-v' ;;
+ -f|--fresh) fresh='-f' ;;
+ -r|--root) destdir="$arg"; shift
+ if [ -z "$destdir" ]; then
+ echo "-r option requires parameter <directory>"
+ exit 1
+ fi
+ ;;
+ -h|--help) help_and_exit ;;
+ -*) echo "invalid option: $param" >&2; exit 1 ;;
esac
done
@@ -75,12 +78,15 @@
esac
rm -f /etc/pki/trust/.updated
-mkdir -p "$statedir"
+export destdir
+
+install -d -m 0755 "$destdir/$statedir"
# serialize calls if we can
if [ -z "$_CA_CERTIFICATES_LOCKED" -a -x /usr/bin/flock ]; then
export _CA_CERTIFICATES_LOCKED="1"
- exec /usr/bin/flock "$statedir" "$0" "$@"
- echo "failed to lock $statedir\n" >&2
+ set -- "${args[@]}"
+ exec /usr/bin/flock "$destdir/$statedir" "$0" "$@"
+ echo "failed to lock $destdir/$statedir\n" >&2
exit 1
fi
@@ -104,3 +110,4 @@
fi
"$f" $fresh $verbose
done < <(find_hooks|sort -k 1,1 -u)
+chmod 0555 "$destdir/$statedir"
++++++ ca-certificates.obsinfo ++++++
--- /var/tmp/diff_new_pack.IMEOM1/_old 2023-04-08 17:38:27.989840196 +0200
+++ /var/tmp/diff_new_pack.IMEOM1/_new 2023-04-08 17:38:27.993840219 +0200
@@ -1,6 +1,5 @@
name: ca-certificates
-version: 2+git20211004.3efbea9
-mtime: 1633335598
-commit: 3efbea9d908d0ecf3678aeef8ade884c0c155175
-
+version: 2+git20230406.2dae8b7
+mtime: 1680768174
+commit: 2dae8b77c250506dc1bf862351c3a5de89a08e90