Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package ca-certificates for openSUSE:Factory 
checked in at 2023-04-08 17:38:24
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/ca-certificates (Old)
 and      /work/SRC/openSUSE:Factory/.ca-certificates.new.19717 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "ca-certificates"

Sat Apr  8 17:38:24 2023 rev:52 rq:1077676 version:2+git20230406.2dae8b7

Changes:
--------
--- /work/SRC/openSUSE:Factory/ca-certificates/ca-certificates.changes  
2021-10-12 21:49:54.831919866 +0200
+++ 
/work/SRC/openSUSE:Factory/.ca-certificates.new.19717/ca-certificates.changes   
    2023-04-08 17:38:26.957834271 +0200
@@ -1,0 +2,8 @@
+Thu Apr 06 08:03:11 UTC 2023 - lnus...@suse.de
+
+- Update to version 2+git20230406.2dae8b7:
+  * Build in place support
+  * Fix up argument parsing
+  * merge spec file into git
+
+-------------------------------------------------------------------

Old:
----
  ca-certificates-2+git20210723.27a0476.obscpio
  ca-certificates-2+git20211004.3efbea9.obscpio

New:
----
  ca-certificates-2+git20230406.2dae8b7.obscpio

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ ca-certificates.spec ++++++
--- /var/tmp/diff_new_pack.IMEOM1/_old  2023-04-08 17:38:27.785839025 +0200
+++ /var/tmp/diff_new_pack.IMEOM1/_new  2023-04-08 17:38:27.789839047 +0200
@@ -1,7 +1,7 @@
 #
 # spec file for package ca-certificates
 #
-# Copyright (c) 2021 SUSE LLC
+# Copyright (c) 2023 SUSE LLC
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -16,6 +16,16 @@
 #
 
 
+%if 0%{?_build_in_place}
+%define git_version %(git log '-n1' '--date=format:%Y%m%d' 
'--no-show-signature' "--pretty=format:+git%cd.%h")
+BuildRequires:  git-core
+%else
+# this is required for obs' source validator. It's
+# 20-files-present-and-referenced ignores all conditionals. So the
+# definition of git_version actually happens always.
+%define git_version %{nil}
+%endif
+
 # the ca bundle file was meant as compat option for e.g.
 # proprietary packages. It's not meant to be used at all.
 # unfortunately glib-networking has such a complicated abstraction
@@ -28,7 +38,7 @@
 %define ssletcdir %{_sysconfdir}/ssl
 %define cabundle  /var/lib/ca-certificates/ca-bundle.pem
 %define sslcerts  %{ssletcdir}/certs
-Version:        2+git20211004.3efbea9
+Version:        2+git20230406.2dae8b7%{git_version}
 Release:        0
 Summary:        Utilities for system wide CA certificate installation
 License:        GPL-2.0-or-later

++++++ _service ++++++
--- /var/tmp/diff_new_pack.IMEOM1/_old  2023-04-08 17:38:27.825839254 +0200
+++ /var/tmp/diff_new_pack.IMEOM1/_new  2023-04-08 17:38:27.829839277 +0200
@@ -2,9 +2,10 @@
   <service name="obs_scm" mode="manual">
     <param name="version">2</param>
     <param name="versionformat">2+git%cd.%h</param>
-    <param name="url">http://github.com/openSUSE/ca-certificates.git</param>
+    <param name="url">https://github.com/openSUSE/ca-certificates.git</param>
     <param name="scm">git</param>
     <param name="changesgenerate">enable</param>
+    <param name="extract">ca-certificates.spec</param>
   </service>
   <service name="set_version" mode="manual"/>
   <service mode="buildtime" name="tar"/>

++++++ _servicedata ++++++
--- /var/tmp/diff_new_pack.IMEOM1/_old  2023-04-08 17:38:27.853839415 +0200
+++ /var/tmp/diff_new_pack.IMEOM1/_new  2023-04-08 17:38:27.857839437 +0200
@@ -1,6 +1,8 @@
 <servicedata>
 <service name="tar_scm">
             <param 
name="url">http://github.com/openSUSE/ca-certificates.git</param>
-          <param 
name="changesrevision">15986b230062fc4355616d0c63180811704b0933</param></service></servicedata>
+          <param 
name="changesrevision">d16f02666b959e10f5bc64b6ab26b398f388ad0b</param></service><service
 name="tar_scm">
+                <param 
name="url">https://github.com/openSUSE/ca-certificates.git</param>
+              <param 
name="changesrevision">2dae8b77c250506dc1bf862351c3a5de89a08e90</param></service></servicedata>
 (No newline at EOF)
 

++++++ ca-certificates-2+git20210723.27a0476.obscpio -> 
ca-certificates-2+git20230406.2dae8b7.obscpio ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/ca-certificates-2+git20210723.27a0476/ca-certificates.spec 
new/ca-certificates-2+git20230406.2dae8b7/ca-certificates.spec
--- old/ca-certificates-2+git20210723.27a0476/ca-certificates.spec      
1970-01-01 01:00:00.000000000 +0100
+++ new/ca-certificates-2+git20230406.2dae8b7/ca-certificates.spec      
2023-04-06 10:02:54.000000000 +0200
@@ -0,0 +1,148 @@
+#
+# spec file for package ca-certificates
+#
+# Copyright (c) 2021 SUSE LLC
+#
+# All modifications and additions to the file contributed by third parties
+# remain the property of their copyright owners, unless otherwise agreed
+# upon. The license for this file, and modifications and additions to the
+# file, is the same license as for the pristine package itself (unless the
+# license for the pristine package is not an Open Source License, in which
+# case the license is the MIT License). An "Open Source License" is a
+# license that conforms to the Open Source Definition (Version 1.9)
+# published by the Open Source Initiative.
+
+# Please submit bugfixes or comments via https://bugs.opensuse.org/
+#
+
+%if 0%{?_build_in_place}
+%define git_version %(git log '-n1' '--date=format:%Y%m%d' 
'--no-show-signature' "--pretty=format:+git%cd.%h")
+BuildRequires:  git-core
+%else
+# this is required for obs' source validator. It's
+# 20-files-present-and-referenced ignores all conditionals. So the
+# definition of git_version actually happens always.
+%define git_version %{nil}
+%endif
+
+# the ca bundle file was meant as compat option for e.g.
+# proprietary packages. It's not meant to be used at all.
+# unfortunately glib-networking has such a complicated abstraction
+# on top of gnutls that we have to live with the bundle for now
+%bcond_without cabundle
+
+BuildRequires:  p11-kit-devel
+
+Name:           ca-certificates
+%define ssletcdir %{_sysconfdir}/ssl
+%define cabundle  /var/lib/ca-certificates/ca-bundle.pem
+%define sslcerts  %{ssletcdir}/certs
+Version:        2%{git_version}
+Release:        0
+Summary:        Utilities for system wide CA certificate installation
+License:        GPL-2.0-or-later
+Group:          Productivity/Networking/Security
+Source0:        ca-certificates-%{version}.tar
+BuildRoot:      %{_tmppath}/%{name}-%{version}-build
+URL:            https://github.com/openSUSE/ca-certificates
+#
+Requires:       /usr/bin/readlink
+Requires:       p11-kit
+Requires:       p11-kit-tools >= 0.23.1
+# needed for post
+Requires(post): p11-kit-tools /usr/bin/readlink
+Recommends:     ca-certificates-mozilla
+# no need for a separate Java package anymore. The bundle is
+# created by C code.
+Obsoletes:      java-ca-certificates = 1
+Provides:       java-ca-certificates = %version-%release
+BuildArch:      noarch
+
+%description
+Update-ca-certificates is intended to keep the certificate stores of
+SSL libraries like OpenSSL or GnuTLS in sync with the system's CA
+certificate store that is managed by p11-kit.
+
+%prep
+%setup -q
+
+%build
+
+%install
+%if %{without cabundle}
+rm -f certbundle.run
+%endif
+%make_install
+ln -s service %{buildroot}%{_sbindir}/rcca-certificates
+install -d -m 755 %{buildroot}%{trustdir_cfg}/{anchors,blacklist}
+install -d -m 755 %{buildroot}%{trustdir_static}/{anchors,blacklist}
+install -d -m 755 %{buildroot}%{ssletcdir}
+install -d -m 755 %{buildroot}/etc/ca-certificates/update.d
+install -d -m 755 %{buildroot}%{_prefix}/lib/ca-certificates/update.d
+install -d -m 555 %{buildroot}/var/lib/ca-certificates/pem
+install -d -m 555 %{buildroot}/var/lib/ca-certificates/openssl
+install -d -m 755 %{buildroot}/%{_prefix}/lib/systemd/system
+ln -s ../../var/lib/ca-certificates/pem %{buildroot}%{sslcerts}
+%if %{with cabundle}
+install -D -m 444 /dev/null %{buildroot}/%{cabundle}
+ln -s %{cabundle} %{buildroot}%{ssletcdir}/ca-bundle.pem
+%endif
+install -D -m 444 /dev/null %{buildroot}/var/lib/ca-certificates/java-cacerts
+
+%pre
+%service_add_pre ca-certificates.path ca-certificates.service
+
+%post
+# force rebuilding all certificate stores.
+update-ca-certificates -f || true
+%service_add_post ca-certificates.path ca-certificates.service
+
+%preun
+%service_del_preun ca-certificates.path ca-certificates.service
+
+%postun
+if [ "$1" -eq 0 ]; then
+       rm -rf /var/lib/ca-certificates/pem /var/lib/ca-certificates/openssl
+fi
+%service_del_postun ca-certificates.path ca-certificates.service
+
+%clean
+rm -rf %{buildroot}
+
+%files
+%defattr(-, root, root)
+%license COPYING
+%doc README
+%dir %{pkidir_cfg}
+%dir %{trustdir_cfg}
+%dir %{trustdir_cfg}/anchors
+%dir %{trustdir_cfg}/blacklist
+%dir %{pkidir_static}
+%dir %{trustdir_static}
+%dir %{trustdir_static}/anchors
+%dir %{trustdir_static}/blacklist
+%dir %ssletcdir
+%sslcerts
+%ghost /var/lib/ca-certificates/java-cacerts
+%dir /etc/ca-certificates
+%dir /etc/ca-certificates/update.d
+%dir %{_prefix}/lib/ca-certificates
+%dir %{_prefix}/lib/ca-certificates/update.d
+%{_prefix}/lib/systemd/system/*
+%dir /var/lib/ca-certificates
+%dir /var/lib/ca-certificates/pem
+%dir /var/lib/ca-certificates/openssl
+%{_sbindir}/rcca-certificates
+%{_sbindir}/update-ca-certificates
+%{_mandir}/man8/update-ca-certificates.8*
+%{_prefix}/lib/ca-certificates/update.d/*java.run
+%{_prefix}/lib/ca-certificates/update.d/*etc_ssl.run
+%{_prefix}/lib/ca-certificates/update.d/*openssl.run
+#
+%if %{with cabundle}
+%{ssletcdir}/ca-bundle.pem
+%ghost %{cabundle}
+%{_prefix}/lib/ca-certificates/update.d/*certbundle.run
+%endif
+
+%changelog
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/ca-certificates-2+git20210723.27a0476/certbundle.run 
new/ca-certificates-2+git20230406.2dae8b7/certbundle.run
--- old/ca-certificates-2+git20210723.27a0476/certbundle.run    2021-07-23 
14:22:15.000000000 +0200
+++ new/ca-certificates-2+git20230406.2dae8b7/certbundle.run    2023-04-06 
10:02:54.000000000 +0200
@@ -37,5 +37,6 @@
 mv -f "$cafile.new" "$cafile"
 if ! test -e $destdir/etc/ssl/ca-bundle.pem && ! test -L 
$destdir/etc/ssl/ca-bundle.pem; then
     [ -z "$verbose" ] || echo "restoring $destdir/etc/ssl/ca-bundle.pem ..."
+    install -d -m 0755 $destdir/etc/ssl
     ln -s ../../var/lib/ca-certificates/ca-bundle.pem 
$destdir/etc/ssl/ca-bundle.pem
 fi
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/ca-certificates-2+git20210723.27a0476/etc_ssl.run 
new/ca-certificates-2+git20230406.2dae8b7/etc_ssl.run
--- old/ca-certificates-2+git20210723.27a0476/etc_ssl.run       2021-07-23 
14:22:15.000000000 +0200
+++ new/ca-certificates-2+git20230406.2dae8b7/etc_ssl.run       2023-04-06 
10:02:54.000000000 +0200
@@ -46,7 +46,7 @@
     -*) echo "invalid option: $1" >&2; exit 1 ;;
 esac
 
-mkdir -p "${destdir}$pemdir"
+install -d -m 0755 "${destdir}$pemdir"
 trust extract --purpose=server-auth --filter=ca-anchors 
--format=pem-directory-hash -f "${destdir}$pemdir"
 
 # fix up /etc/ssl/certs if it's not a link pointing to 
/var/lib/ca-certificates/pem
@@ -55,5 +55,6 @@
     if [ -d "$etccertsdir" ]; then
        mv -Tv --backup=numbered "$etccertsdir" "$etccertsdir.old"
     fi
+    install -d -m 0755 "${etccertsdir%/*}"
     ln -Tsv --backup=numbered "../..$pemdir" "$etccertsdir"
-fi
\ No newline at end of file
+fi
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/ca-certificates-2+git20210723.27a0476/openssl.run 
new/ca-certificates-2+git20230406.2dae8b7/openssl.run
--- old/ca-certificates-2+git20210723.27a0476/openssl.run       2021-07-23 
14:22:15.000000000 +0200
+++ new/ca-certificates-2+git20230406.2dae8b7/openssl.run       2023-04-06 
10:02:54.000000000 +0200
@@ -15,7 +15,7 @@
 done
 
 [ -z "$verbose" ] || echo "creating $cadir ..."
-mkdir -p "$cadir"
+install -d -m 0755 -p "$cadir"
 trust extract --format=openssl-directory --filter=ca-anchors --overwrite $cadir
 
 # vim: syntax=sh
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/ca-certificates-2+git20210723.27a0476/update-ca-certificates 
new/ca-certificates-2+git20230406.2dae8b7/update-ca-certificates
--- old/ca-certificates-2+git20210723.27a0476/update-ca-certificates    
2021-07-23 14:22:15.000000000 +0200
+++ new/ca-certificates-2+git20230406.2dae8b7/update-ca-certificates    
2023-04-06 10:02:54.000000000 +0200
@@ -46,20 +46,23 @@
     exit 0
 }
 
-for arg in "$@"; do
-    case "$arg" in
-        -v|--verbose) verbose='-v' ;;
-        -f|--fresh) fresh='-f' ;;
-               -r|--root)
-                       shift
-                       destdir=$1
-                       if [ -z $destdir ]; then
-                               echo "-r option requires parameter <directory>"
-                               exit 1
-                       fi
-                       ;;
-        -h|--help) help_and_exit ;;
-        -*) echo "invalid option: $1" >&2; exit 1 ;;
+args=("$@")
+while [ $# -gt 0 ]; do
+    param="$1"
+    arg="$2"
+    test "$arg" = "${arg#-}" || arg=
+    shift
+    case "$param" in
+       -v|--verbose) verbose='-v' ;;
+       -f|--fresh) fresh='-f' ;;
+       -r|--root) destdir="$arg"; shift
+           if [ -z "$destdir" ]; then
+               echo "-r option requires parameter <directory>"
+               exit 1
+           fi
+       ;;
+       -h|--help) help_and_exit ;;
+       -*) echo "invalid option: $param" >&2; exit 1 ;;
     esac
 done
 
@@ -75,12 +78,15 @@
 esac
 rm -f /etc/pki/trust/.updated
 
-mkdir -p "$statedir"
+export destdir
+
+install -d -m 0755 "$destdir/$statedir"
 # serialize calls if we can
 if [ -z "$_CA_CERTIFICATES_LOCKED" -a -x /usr/bin/flock ]; then
     export _CA_CERTIFICATES_LOCKED="1"
-    exec /usr/bin/flock "$statedir" "$0" "$@"
-    echo "failed to lock $statedir\n" >&2
+    set -- "${args[@]}"
+    exec /usr/bin/flock "$destdir/$statedir" "$0" "$@"
+    echo "failed to lock $destdir/$statedir\n" >&2
     exit 1
 fi
 
@@ -104,3 +110,4 @@
     fi
     "$f" $fresh $verbose
 done < <(find_hooks|sort -k 1,1 -u)
+chmod 0555 "$destdir/$statedir"

++++++ ca-certificates.obsinfo ++++++
--- /var/tmp/diff_new_pack.IMEOM1/_old  2023-04-08 17:38:27.989840196 +0200
+++ /var/tmp/diff_new_pack.IMEOM1/_new  2023-04-08 17:38:27.993840219 +0200
@@ -1,6 +1,5 @@
 name: ca-certificates
-version: 2+git20211004.3efbea9
-mtime: 1633335598
-commit: 3efbea9d908d0ecf3678aeef8ade884c0c155175
-
+version: 2+git20230406.2dae8b7
+mtime: 1680768174
+commit: 2dae8b77c250506dc1bf862351c3a5de89a08e90
 

Reply via email to