Your message dated Tue, 19 Jul 2022 14:36:38 +0000 with message-id <[email protected]> and subject line Bug#922981: fixed in ca-certificates-java 20220719 has caused the Debian Bug report #922981, regarding ca-certificates-java: /etc/ca-certificates/update.d/jks-keystore doesn't update /etc/ssl/certs/java/cacerts to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) -- 922981: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922981 Debian Bug Tracking System Contact [email protected] with problems
--- Begin Message ---Package: ca-certificates-java Version: 20170929~deb9u1 Severity: normal Dear Maintainer, * What led up to the situation? Executing gradlew script leading to following error : java.security.InvalidAlgorithmParameterException: the trustAnchors parameter must be non-empty * What exactly did you do (or not do) that was effective (or ineffective)? When I ran "sudo update-ca-certificates -f" error still appeared; After running "sudo rm /etc/ssl/certs/java/cacerts" and then again "sudo update-ca-certificates -f" Error disappeared * What was the outcome of this action? resolution of the error * What outcome did you expect instead? I expected "sudo update-ca-certificates -f" to automatically update the file -- System Information: Debian Release: 9.8 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 4.9.0-7-amd64 (SMP w/1 CPU core) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), LANGUAGE=en_GB:en (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages ca-certificates-java depends on: ii ca-certificates 20161130+nmu1+deb9u1 ii libnss3 2:3.26.2-1.1+deb9u1 ii openjdk-11-jre-headless [java7-runtime-headless] 11.0.2+9-3~bpo9+1 ii openjdk-8-jre-headless [java7-runtime-headless] 8u181-b13-2~deb9u1 ca-certificates-java recommends no packages. ca-certificates-java suggests no packages. -- Configuration Files: /etc/default/cacerts [Errno 13] Permission denied: '/etc/default/cacerts' -- no debconf information
--- End Message ---
--- Begin Message ---Source: ca-certificates-java Source-Version: 20220719 Done: Matthias Klose <[email protected]> We believe that the bug you reported is fixed in the latest version of ca-certificates-java, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [email protected], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Matthias Klose <[email protected]> (supplier of updated ca-certificates-java package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [email protected]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Tue, 19 Jul 2022 16:02:33 +0200 Source: ca-certificates-java Architecture: source Version: 20220719 Distribution: unstable Urgency: medium Maintainer: Debian Java Maintainers <[email protected]> Changed-By: Matthias Klose <[email protected]> Closes: 688415 767272 776860 795244 864331 908858 922981 929685 940297 994152 Changes: ca-certificates-java (20220719) unstable; urgency=medium . [ Andreas Beckmann ] * Team upload. * Switch to debhelper-compat (= 13). * Set Rules-Requires-Root: no. * UpdateCertificates.java: Ignore empty lines in stdin. (Closes: #795244) * Avoid warning about missing /etc/ssl/certs/java/cacerts on initial install. * Do not be satisfied by java7-runtime-headless. * Remove support for upgrading from versions predating wheezy. * Clean up misplaced symlinks in the root directory left over by ancient versions. (Closes: #688415) * Drop libnss3 manipulations, no longer needed since openjdk-6-jre-headless at least. * Add update-ca-certificates-java trigger and let jks-keystore record the pending certificate updates and postpone them to the processing of this trigger. (Closes: #908858) * Add update-ca-certificates-java-fresh trigger, will be activated by update-ca-certificates -f. (Closes: #922981) * Remove obsolete certificates when building a fresh cacerts file. (Closes: #767272) * Bump ca-certificates dependency to 20210120. * Skip Java certificates setup if no JRE is available. * Add trigger on /usr/lib/jvm to perform Java certificates setup if a JRE becomes available. * Demote JRE dependency to Recommends to break dependency cycle. (Closes: #929685, #940297) * Foreign architecture JREs that place java in PATH are also usable. (Closes: #776860, #864331) . [ Matthias Klose ] * Support Java 18-21. Closes: #994152. * Bump Standards-Version to 4.6.0. Checksums-Sha1: ede5cff6cf6ed0b4258b2828ed63baa99ccddd14 1808 ca-certificates-java_20220719.dsc 3b18d00913c73c5e735ef4dcebee3b7c47fefc2b 17204 ca-certificates-java_20220719.tar.xz 5907f7961d191928f1e60081a018f9d2ca08ba89 10746 ca-certificates-java_20220719_source.buildinfo Checksums-Sha256: d14b15145e0af9c7b3f054af00d13542a7b0192ce3e27afdf890b627090f89c3 1808 ca-certificates-java_20220719.dsc a627585de3e0c827300094f113dd3326e92744abfabadef55d122d7f980e28ad 17204 ca-certificates-java_20220719.tar.xz 9f0339174bd78888e2ac2c9156bcbec36a3306c53338782fabf39be8c0db5824 10746 ca-certificates-java_20220719_source.buildinfo Files: 1174a0a91cd5d5c5065802d8d2465f0e 1808 java optional ca-certificates-java_20220719.dsc cda24b44319098d0fdd633e7dd59be5c 17204 java optional ca-certificates-java_20220719.tar.xz 0f3fcd50d3012b49f20f32c058a182e6 10746 java optional ca-certificates-java_20220719_source.buildinfo -----BEGIN PGP SIGNATURE----- iQJEBAEBCAAuFiEE1WVxuIqLuvFAv2PWvX6qYHePpvUFAmLWvB8QHGRva29AZGVi aWFuLm9yZwAKCRC9fqpgd4+m9eAiD/9/ZwUApYp7yxJmK8xCi63C54SGp5qJYQ0q rQpifmLCFlOqwirkp7S/oLC4N1trIKynyug8Rj+FM8zqXzWXBiQj0DfGJys4xw0H 1Fzgl0chrjI9oOm49dYE99YRWBSawPtF6Vi7z1CxXhsTTbfqSjD1qKVsKoun3N4V PHQylXEZqs2xz4AY/O6dCFSlHZsTNuj8rXx+WhZySUPZSDDVZT1f5L98v9iQuKrP RRRYXJBeWb4Qx+L1cPoN+wkiOU1b7/3DPaN9O6vWXtZE1ek6Azb2ZU0XesEwhanq t07vjgQTzqoyWHaibl2Lt/BrGHwXjt+2QGb7chip3bn6xjOxhapsmR6An0ILZCCa zSxGX5q6nHqLD+km3TxTbkYJB/Xx8p66k97DPK6E6Ms7jytMrTimunemcjgC2jHf 5TG5B78RtPG5OHIso3oDpHsA1l1SaX5sE8SRwPsYiFUeogCkkpp/FLwN/5rPUj9+ 75xgtoYmAUwgn3Ms/uvY+YrPbLSmg34SgMsk4E1rhFTJzdgRXcKVJ4Cl0FqAjlcG CoUGSl4lFpkdWq+OhjJ6ceKd2bDisWoQN4NjLOW0dITimVQbNeArUkh/4HLS52MH BlNr6sQ4I4RzWjaGph8ezRmCKl7jP5G2FWTzkCfxrAPWHBQdM1fyKVPWiYiyb9QP 9eLFCVzugg== =cN37 -----END PGP SIGNATURE-----
--- End Message ---

