Tue, 23 Apr 2024 08:20:29 UTC | login

Information for build ca-certificates-2020.2.50-94.el9

ID15265
Package Nameca-certificates
Version2020.2.50
Release94.el9
Epoch
DraftFalse
Sourcegit+https://gitlab.com/redhat/centos-stream/rpms/ca-certificates#09eff8709a1ce5271155d17d631a150ea7300c9a
SummaryThe Mozilla CA root certificate bundle
DescriptionThis package contains the set of CA certificates chosen by the Mozilla Foundation for use with the Internet PKI.
Built byrrelyea
State complete
Volume DEFAULT
StartedTue, 16 Nov 2021 18:30:23 UTC
CompletedTue, 16 Nov 2021 18:31:39 UTC
Taskbuild (c9s-candidate, /redhat/centos-stream/rpms/ca-certificates:09eff8709a1ce5271155d17d631a150ea7300c9a)
Extra{'source': {'original_url': 'git+https://gitlab.com/redhat/centos-stream/rpms/ca-certificates#09eff8709a1ce5271155d17d631a150ea7300c9a'}}
Tags
c9s-pending
c9s-pending-signed
c9s-released
RPMs
src
ca-certificates-2020.2.50-94.el9.src.rpm (info) (download)
noarch
ca-certificates-2020.2.50-94.el9.noarch.rpm (info) (download)
Logs
noarch
build.log
hw_info.log
installed_pkgs.log
mock_output.log
noarch_rpmdiff.json
root.log
state.log
Changelog * Mon Nov 01 2021 Bob Relyea <rrelyea@redhat.com> - 2020.2.50-94 - remove blacklist directory and references now that p11-kit has been updated. * Mon Aug 09 2021 Mohan Boddu <mboddu@redhat.com> - 2020.2.50-93 - Rebuilt for IMA sigs, glibc 2.34, aarch64 flags Related: rhbz#1991688 * Tue Jun 22 2021 Mohan Boddu <mboddu@redhat.com> - 2020.2.50-92 - Rebuilt for RHEL 9 BETA for openssl 3.0 Related: rhbz#1971065 * Wed Jun 16 2021 Bob Relyea <rrelyea@redhat.com> - 2020.2.50-90 - Update to CKBI 2.50 from NSS 3.67 - Removing: - # Certificate "QuoVadis Root CA" - # Certificate "Sonera Class 2 Root CA" - # Certificate "Trustis FPS Root CA" - Adding: - # Certificate "GLOBALTRUST 2020" - # Certificate "ANF Secure Server Root CA" - # Certificate "Certum EC-384 CA" - # Certificate "Certum Trusted Root CA" * Thu Apr 15 2021 Mohan Boddu <mboddu@redhat.com> - 2020.2.41-8 - Rebuilt for RHEL 9 BETA on Apr 15th 2021. Related: rhbz#1947937 * Tue Jan 26 2021 Fedora Release Engineering <releng@fedoraproject.org> - 2020.2.41-7 - Rebuilt for https://fedoraproject.org/wiki/Fedora_34_Mass_Rebuild * Wed Jan 13 2021 Bob Relyea <rrelyea@redhat.com> - 2020.2.41-6 - remove unnecessarily divisive terms, take 1. - in ca-certificates there are 3 cases: - 1) master refering to the fedora master branch in the fetch.sh script. - This can only be changed once fedora changes the master branch name. - 2) a reference to the 'master bundle' in this file: this has been changed - to 'primary bundle'. - 3) a couple of blacklist directories owned by this package, but used to - p11-kit. New 'blocklist' directories have been created, but p11-kit - needs to be updated before the old blacklist directories can be removed - and the man pages corrected. * Mon Nov 09 2020 Christian Heimes <cheimes@redhat.com> - 2020.2.41-5 - Add cross-distro compatibility symlinks to /etc/ssl (rhbz#1895619) * Mon Jul 27 2020 Fedora Release Engineering <releng@fedoraproject.org> - 2020.2.41-4 - Rebuilt for https://fedoraproject.org/wiki/Fedora_33_Mass_Rebuild * Tue Jun 16 2020 Adam Williamson <awilliam@redhat.com> - 2020.2.41-3 - Fix up broken %post and %postinstall scriptlet changes from -2 * Wed Jun 10 2020 Bob Relyea <rrelyea@redhat.com> - 2020.2.41-2 - Update to CKBI 2.41 from NSS 3.53.0 - Removing: - # Certificate "AddTrust Low-Value Services Root" - # Certificate "AddTrust External Root" - # Certificate "Staat der Nederlanden Root CA - G2" * Tue Jan 28 2020 Daiki Ueno <dueno@redhat.com> - 2020.2.40-3 - Update versioned dependency on p11-kit * Wed Jan 22 2020 Daiki Ueno <dueno@redhat.com> - 2020.2.40-2 - Update to CKBI 2.40 from NSS 3.48 - Removing: - # Certificate "UTN USERFirst Email Root CA" - # Certificate "Certplus Class 2 Primary CA" - # Certificate "Deutsche Telekom Root CA 2" - # Certificate "Swisscom Root CA 2" - # Certificate "Certinomis - Root CA" - Adding: - # Certificate "Entrust Root Certification Authority - G4" - certdata2pem.py: emit flags for CKA_NSS_{SERVER,EMAIL}_DISTRUST_AFTER