Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package java-17-openjdk for openSUSE:Factory 
checked in at 2021-11-08 17:24:23
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/java-17-openjdk (Old)
 and      /work/SRC/openSUSE:Factory/.java-17-openjdk.new.1890 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "java-17-openjdk"

Mon Nov  8 17:24:23 2021 rev:6 rq:929873 version:17.0.1.0

Changes:
--------
--- /work/SRC/openSUSE:Factory/java-17-openjdk/java-17-openjdk.changes  
2021-10-23 00:51:56.677146982 +0200
+++ 
/work/SRC/openSUSE:Factory/.java-17-openjdk.new.1890/java-17-openjdk.changes    
    2021-11-08 17:25:09.856731922 +0100
@@ -1,0 +2,30 @@
+Fri Nov  5 16:52:14 UTC 2021 - Fridrich Strba <fst...@suse.com>
+
+- Modified patch:
+  * fips.patch
+    + return in native code after generating java.io.IOException
+
+-------------------------------------------------------------------
+Thu Nov  4 07:44:09 UTC 2021 - Fridrich Strba <fst...@suse.com>
+
+- Modified patches:
+  * PStack-808293.patch
+  * adlc-parser.patch
+  * alternative-tzdb_dat.patch
+  * disable-doclint-by-default.patch
+  * java-atk-wrapper-security.patch
+  * jaw-jdk10.patch
+  * jaw-misc.patch
+  * loadAssistiveTechnologies.patch
+  * memory-limits.patch
+  * multiple-pkcs11-library-init.patch
+  * ppc_stack_overflow_fix.patch
+  * system-crypto-policy.patch
+  * system-pcsclite.patch
+  * zero-ranges.patch
+    + Rediff to apply all hunks without shifts
+  * fips.patch
+    + Fix unused function compiler warning found in systemconf.c
+    + Allow plain key import
+
+-------------------------------------------------------------------

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ java-17-openjdk.spec ++++++
--- /var/tmp/diff_new_pack.tQpeXA/_old  2021-11-08 17:25:11.152732773 +0100
+++ /var/tmp/diff_new_pack.tQpeXA/_new  2021-11-08 17:25:11.156732777 +0100
@@ -537,7 +537,7 @@
 
 # Setup nss.fips.cfg
 sed -e "s:@NSS_LIBDIR@:%{NSS_LIBDIR}:g" %{SOURCE13} > nss.fips.cfg
-sed -i -e "s:@NSS_SECMOD@:/etc/pki/nssdb:g" nss.fips.cfg
+sed -i -e "s:@NSS_SECMOD@:sql\:/etc/pki/nssdb:g" nss.fips.cfg
 
 %build
 

++++++ PStack-808293.patch ++++++
--- /var/tmp/diff_new_pack.tQpeXA/_old  2021-11-08 17:25:11.200732806 +0100
+++ /var/tmp/diff_new_pack.tQpeXA/_new  2021-11-08 17:25:11.200732806 +0100
@@ -1,6 +1,6 @@
 --- 
jdk10/src/jdk.hotspot.agent/share/classes/sun/jvm/hotspot/tools/PStack.java     
   2016-01-21 19:16:09.000000000 +0100
 +++ 
jdk10/src/jdk.hotspot.agent/share/classes/sun/jvm/hotspot/tools/PStack.java     
   2016-01-29 15:49:47.815913736 +0100
-@@ -88,7 +89,8 @@
+@@ -101,7 +102,8 @@
                 if (jthread != null) {
                    jthread.printThreadInfoOn(out);
                 }
@@ -10,7 +10,7 @@
                    ClosestSymbol sym = f.closestSymbolToPC();
                    Address pc = f.pc();
                    out.print(pc + "\t");
-@@ -158,10 +160,19 @@
+@@ -183,10 +185,19 @@
                           }
                        }
                    }

++++++ adlc-parser.patch ++++++
--- /var/tmp/diff_new_pack.tQpeXA/_old  2021-11-08 17:25:11.244732834 +0100
+++ /var/tmp/diff_new_pack.tQpeXA/_new  2021-11-08 17:25:11.244732834 +0100
@@ -1,6 +1,6 @@
 --- jdk10/src/hotspot/share/adlc/formsopt.cpp  2014-07-03 21:56:12.000000000 
+0200
 +++ jdk10/src/hotspot/share/adlc/formsopt.cpp  2014-07-14 11:43:21.900408570 
+0200
-@@ -347,6 +347,7 @@
+@@ -445,6 +445,7 @@
    _return_value = NULL;
    _c_return_value = NULL;
    _interpreter_frame_pointer_reg = NULL;

++++++ alternative-tzdb_dat.patch ++++++
--- /var/tmp/diff_new_pack.tQpeXA/_old  2021-11-08 17:25:11.252732839 +0100
+++ /var/tmp/diff_new_pack.tQpeXA/_new  2021-11-08 17:25:11.256732842 +0100
@@ -63,7 +63,7 @@
  import java.util.SimpleTimeZone;
  import java.util.concurrent.ConcurrentHashMap;
  import java.util.zip.CRC32;
-@@ -251,7 +252,15 @@
+@@ -252,7 +253,15 @@
          AccessController.doPrivileged(new PrivilegedAction<Void>() {
              public Void run() {
                  try {
@@ -80,7 +80,7 @@
                      try (DataInputStream dis = new DataInputStream(
                               new BufferedInputStream(new FileInputStream(
                                   new File(libDir, "tzdb.dat"))))) {
-@@ -265,6 +274,28 @@
+@@ -266,6 +275,28 @@
          });
      }
  

++++++ disable-doclint-by-default.patch ++++++
--- /var/tmp/diff_new_pack.tQpeXA/_old  2021-11-08 17:25:11.276732855 +0100
+++ /var/tmp/diff_new_pack.tQpeXA/_new  2021-11-08 17:25:11.280732858 +0100
@@ -1,6 +1,6 @@
 --- jdk15/test/langtools/jdk/javadoc/tool/doclint/DocLintTest.java     
2020-03-11 22:25:18.000000000 +0100
 +++ jdk15/test/langtools/jdk/javadoc/tool/doclint/DocLintTest.java     
2020-03-17 19:11:23.870026518 +0100
-@@ -147,12 +147,12 @@
+@@ -155,12 +155,12 @@
              files = List.of(new TestJFO("Test.java", code));
  
              test(List.of(htmlVersion),

++++++ fips.patch ++++++
++++ 1608 lines (skipped)
++++ between /work/SRC/openSUSE:Factory/java-17-openjdk/fips.patch
++++ and /work/SRC/openSUSE:Factory/.java-17-openjdk.new.1890/fips.patch

++++++ java-atk-wrapper-security.patch ++++++
--- /var/tmp/diff_new_pack.tQpeXA/_old  2021-11-08 17:25:11.324732886 +0100
+++ /var/tmp/diff_new_pack.tQpeXA/_new  2021-11-08 17:25:11.324732886 +0100
@@ -1,6 +1,6 @@
 --- jdk10/src/java.base/share/conf/security/java.security      2017-01-23 
23:56:02.000000000 +0100
 +++ jdk10/src/java.base/share/conf/security/java.security      2017-01-27 
08:41:10.551819770 +0100
-@@ -304,6 +304,8 @@
+@@ -307,6 +307,8 @@
  #
  package.access=sun.misc.,\
                 sun.reflect.,\
@@ -9,7 +9,7 @@
  
  #
  # List of comma-separated packages that start with or equal this string
-@@ -316,6 +318,8 @@
+@@ -319,6 +321,8 @@
  #
  package.definition=sun.misc.,\
                     sun.reflect.,\

++++++ jaw-jdk10.patch ++++++
--- /var/tmp/diff_new_pack.tQpeXA/_old  2021-11-08 17:25:11.352732905 +0100
+++ /var/tmp/diff_new_pack.tQpeXA/_new  2021-11-08 17:25:11.356732907 +0100
@@ -1,6 +1,6 @@
 --- java-atk-wrapper-0.33.2/configure.ac       2017-11-06 13:37:11.504756491 
+0100
 +++ java-atk-wrapper-0.33.2/configure.ac       2017-11-06 13:37:47.224756626 
+0100
-@@ -64,7 +64,7 @@
+@@ -63,7 +63,7 @@
  # java wrapper
  
  AM_CONDITIONAL(USER, test `whoami` = "root")
@@ -9,7 +9,7 @@
  JAVA_ERROR_MESSAGE="Java $JAVA_REQUIRED or later is required to build 
java-access-bridge"
  
  AC_ARG_VAR([JAVA_HOME],[Java Runtime Environment location])
-@@ -170,6 +170,8 @@
+@@ -163,6 +163,8 @@
      wrapper/org/GNOME/Makefile
      wrapper/org/GNOME/Accessibility/Makefile
      wrapper/org/GNOME/Accessibility/AtkWrapper.java

++++++ jaw-misc.patch ++++++
--- /var/tmp/diff_new_pack.tQpeXA/_old  2021-11-08 17:25:11.364732913 +0100
+++ /var/tmp/diff_new_pack.tQpeXA/_new  2021-11-08 17:25:11.364732913 +0100
@@ -17,7 +17,7 @@
  JAVA_ERROR_MESSAGE="Java $JAVA_REQUIRED or later is required to build 
java-access-bridge"
  
  AC_ARG_VAR([JAVA_HOME],[Java Runtime Environment location])
-@@ -98,12 +98,6 @@ if test -z "$JAVAC"; then
+@@ -109,12 +108,6 @@ if test -z "$JAVAC"; then
  fi
  AC_SUBST(JAVAC)
  

++++++ loadAssistiveTechnologies.patch ++++++
--- /var/tmp/diff_new_pack.tQpeXA/_old  2021-11-08 17:25:11.396732934 +0100
+++ /var/tmp/diff_new_pack.tQpeXA/_new  2021-11-08 17:25:11.396732934 +0100
@@ -1,6 +1,6 @@
 --- openjdk/src/java.desktop/share/classes/java/awt/Toolkit.java
 +++ openjdk/src/java.desktop/share/classes/java/awt/Toolkit.java
-@@ -594,9 +594,13 @@
+@@ -601,9 +601,13 @@
                  !(toolkit instanceof HeadlessToolkit)) {
                  toolkit = new HeadlessToolkit(toolkit);
              }

++++++ memory-limits.patch ++++++
--- /var/tmp/diff_new_pack.tQpeXA/_old  2021-11-08 17:25:11.404732940 +0100
+++ /var/tmp/diff_new_pack.tQpeXA/_new  2021-11-08 17:25:11.404732940 +0100
@@ -1,6 +1,6 @@
 --- jdk11/src/hotspot/share/gc/shared/gc_globals.hpp   2018-04-20 
08:14:25.796265133 +0200
 +++ jdk11/src/hotspot/share/gc/shared/gc_globals.hpp   2018-04-20 
08:15:53.656690011 +0200
-@@ -640,7 +640,7 @@
+@@ -593,7 +593,7 @@
            "Initial heap size (in bytes); zero means use ergonomics")        \
            constraint(InitialHeapSizeConstraintFunc,AfterErgo)               \
                                                                              \

++++++ multiple-pkcs11-library-init.patch ++++++
--- /var/tmp/diff_new_pack.tQpeXA/_old  2021-11-08 17:25:11.416732947 +0100
+++ /var/tmp/diff_new_pack.tQpeXA/_new  2021-11-08 17:25:11.416732947 +0100
@@ -1,6 +1,6 @@
 --- 
jdk10/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/Config.java     
   2016-12-20 23:13:34.000000000 +0100
 +++ 
jdk10/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/Config.java     
   2016-12-22 11:45:10.418651583 +0100
-@@ -51,6 +51,7 @@
+@@ -52,6 +52,7 @@
      static final int ERR_HALT       = 1;
      static final int ERR_IGNORE_ALL = 2;
      static final int ERR_IGNORE_LIB = 3;
@@ -8,7 +8,7 @@
  
      // same as allowSingleThreadedModules but controlled via a system property
      // and applied to all providers. if set to false, no SunPKCS11 instances
-@@ -992,6 +993,8 @@
+@@ -1019,6 +1020,8 @@
              handleStartupErrors = ERR_IGNORE_LIB;
          } else if (val.equals("halt")) {
              handleStartupErrors = ERR_HALT;
@@ -19,7 +19,7 @@
          }
 --- 
jdk10/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/SunPKCS11.java  
   2016-12-20 23:13:34.000000000 +0100
 +++ 
jdk10/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/SunPKCS11.java  
   2016-12-22 11:45:10.418651583 +0100
-@@ -174,26 +174,37 @@
+@@ -179,26 +179,37 @@
                  String nssLibraryDirectory = config.getNssLibraryDirectory();
                  String nssSecmodDirectory = config.getNssSecmodDirectory();
                  boolean nssOptimizeSpace = config.getNssOptimizeSpace();

++++++ ppc_stack_overflow_fix.patch ++++++
--- /var/tmp/diff_new_pack.tQpeXA/_old  2021-11-08 17:25:11.472732984 +0100
+++ /var/tmp/diff_new_pack.tQpeXA/_new  2021-11-08 17:25:11.472732984 +0100
@@ -1,6 +1,6 @@
---- jdk16/src/hotspot/cpu/zero/stack_zero.hpp  2016-12-27 22:00:30.000000000 
+0100
-+++ jdk16/src/hotspot/cpu/zero/stack_zero.hpp  2017-01-09 08:35:53.221098668 
+0100
-@@ -96,7 +96,7 @@
+--- a/src/hotspot/cpu/zero/stack_zero.hpp      2016-12-27 22:00:30.000000000 
+0100
++++ b/src/hotspot/cpu/zero/stack_zero.hpp      2017-01-09 08:35:53.221098668 
+0100
+@@ -97,7 +97,7 @@
    int shadow_pages_size() const {
      return _shadow_pages_size;
    }
@@ -9,9 +9,9 @@
  
   public:
    void overflow_check(int required_words, TRAPS);
---- jdk16/src/hotspot/cpu/zero/stack_zero.inline.hpp   2016-12-27 
22:00:30.000000000 +0100
-+++ jdk16/src/hotspot/cpu/zero/stack_zero.inline.hpp   2017-01-09 
08:35:53.221098668 +0100
-@@ -47,11 +47,11 @@
+--- a/src/hotspot/cpu/zero/stack_zero.inline.hpp       2016-12-27 
22:00:30.000000000 +0100
++++ b/src/hotspot/cpu/zero/stack_zero.inline.hpp       2017-01-09 
08:35:53.221098668 +0100
+@@ -46,11 +46,11 @@
  // This method returns the amount of ABI stack available for us
  // to use under normal circumstances.  Note that the returned
  // value can be negative.

++++++ system-crypto-policy.patch ++++++
--- /var/tmp/diff_new_pack.tQpeXA/_old  2021-11-08 17:25:11.484732992 +0100
+++ /var/tmp/diff_new_pack.tQpeXA/_new  2021-11-08 17:25:11.484732992 +0100
@@ -1,5 +1,5 @@
---- openjdk/src/java.base/share/classes/java/security/Security.java    
2021-03-16 07:15:49.742093294 +0100
-+++ openjdk/src/java.base/share/classes/java/security/Security.java    
2021-03-16 07:16:54.394507360 +0100
+--- a/src/java.base/share/classes/java/security/Security.java
++++ b/src/java.base/share/classes/java/security/Security.java
 @@ -47,6 +47,9 @@
   * implementation-specific location, which is typically the properties file
   * {@code conf/security/java.security} in the Java installation directory.
@@ -21,7 +21,7 @@
      /* The java.security properties */
      private static Properties props;
  
-@@ -98,6 +105,7 @@
+@@ -99,6 +106,7 @@
                  if (sdebug != null) {
                      sdebug.println("reading security properties file: " +
                                  propFile);
@@ -29,11 +29,10 @@
                  }
              } catch (IOException e) {
                  if (sdebug != null) {
-@@ -183,6 +191,33 @@
-                 }
+@@ -185,6 +193,33 @@
              }
          }
-+
+ 
 +        String disableSystemProps = 
System.getProperty("java.security.disableSystemPropertiesFile");
 +        if (disableSystemProps == null &&
 +            "true".equalsIgnoreCase(props.getProperty
@@ -60,22 +59,23 @@
 +                }
 +            }
 +        }
- 
++
          if (!loadedProps) {
              initializeStatic();
---- openjdk/src/java.base/share/conf/security/java.security    2021-03-16 
07:15:49.798093653 +0100
-+++ openjdk/src/java.base/share/conf/security/java.security    2021-03-16 
11:38:01.416893125 +0100
-@@ -336,6 +336,13 @@
+             if (sdebug != null) {
+--- a/src/java.base/share/conf/security/java.security
++++ b/src/java.base/share/conf/security/java.security
+@@ -330,6 +330,13 @@
+ #
  security.overridePropertiesFile=true
  
- #
++#
 +# Determines whether this properties file will be appended to
 +# using the system properties file stored at
 +# /etc/crypto-policies/back-ends/java.config
 +#
 +security.useSystemPropertiesFile=true
 +
-+#
+ #
  # Determines the default key and trust manager factory algorithms for
  # the javax.net.ssl package.
- #

++++++ system-pcsclite.patch ++++++
--- /var/tmp/diff_new_pack.tQpeXA/_old  2021-11-08 17:25:11.496732999 +0100
+++ /var/tmp/diff_new_pack.tQpeXA/_new  2021-11-08 17:25:11.496732999 +0100
@@ -52,7 +52,7 @@
 +])
 --- jdk15/make/autoconf/spec.gmk.in    2020-05-07 13:35:09.825368428 +0200
 +++ jdk15/make/autoconf/spec.gmk.in    2020-05-07 13:37:41.358280752 +0200
-@@ -769,6 +769,7 @@
+@@ -767,6 +767,7 @@
  # Build setup
  USE_EXTERNAL_LIBJPEG:=@USE_EXTERNAL_LIBJPEG@
  USE_EXTERNAL_LIBGIF:=@USE_EXTERNAL_LIBGIF@

++++++ zero-ranges.patch ++++++
--- /var/tmp/diff_new_pack.tQpeXA/_old  2021-11-08 17:25:11.512733010 +0100
+++ /var/tmp/diff_new_pack.tQpeXA/_new  2021-11-08 17:25:11.516733013 +0100
@@ -1,6 +1,6 @@
 --- jdk10/src/hotspot/cpu/zero/globals_zero.hpp        2016-01-21 
19:16:09.000000000 +0100
 +++ jdk10/src/hotspot/cpu/zero/globals_zero.hpp        2016-01-29 
15:52:57.611610069 +0100
-@@ -50,9 +50,9 @@
+@@ -53,9 +53,9 @@
  #define DEFAULT_STACK_SHADOW_PAGES (5 LP64_ONLY(+1) DEBUG_ONLY(+3))
  #define DEFAULT_STACK_RESERVED_PAGES (0)
  

Reply via email to