Compare commits

...

10 Commits

Author SHA1 Message Date
openeuler-ci-bot
5623c7dfd1
!43 [sync] PR-35: delete the unsecure certificates
From: @openeuler-sync-bot 
Reviewed-by: @HuaxinLuGitee 
Signed-off-by: @HuaxinLuGitee
2023-11-07 01:42:17 +00:00
wangjiang
992600ec94 delete the unsecure certificates
(cherry picked from commit e0af59401fa26ffe7107826bcbe2de9e385a0229)
2023-11-06 17:36:05 +08:00
openeuler-ci-bot
2133a008ea
!32 [sync] PR-29: upgrade version to 2023.2.60
From: @openeuler-sync-bot 
Reviewed-by: @HuaxinLuGitee 
Signed-off-by: @HuaxinLuGitee
2023-06-08 13:34:41 +00:00
wangjiang
9b71a9daf9 upgrade version to 2023.2.60
(cherry picked from commit ef13d657f79502bca6cbdf9e569c0b51c80d8643)
2023-06-08 16:19:38 +08:00
openeuler-ci-bot
732afef4a2
!24 [sync] PR-22: lagging install ca-legacy and update-ca-trust
From: @openeuler-sync-bot 
Reviewed-by: @xiezhipeng1 
Signed-off-by: @xiezhipeng1
2022-11-02 01:43:45 +00:00
wangjiang
c62e0bb324 lagging install ca-legacy and update-ca-trust
(cherry picked from commit e1143b9358ddeb4ea582071aa7ede876473c65bf)
2022-11-01 16:10:27 +08:00
openeuler-ci-bot
5524c135b2 !21 [sync] PR-20: upgrade version to 2021.2.52
Merge pull request !21 from openeuler-sync-bot/sync-pr20-master-to-openEuler-22.03-LTS-Next
2021-12-28 09:54:59 +00:00
Anonymous_Z
673174f218 upgrade version to 2021.2.52
(cherry picked from commit 1b0ee743c786bd80f04877e1c83aaa09a79efb2b)
2021-12-25 10:46:38 +08:00
openeuler-ci-bot
bfe4218213 !19 Refresh the original certificate file and delete the insecure certificates
From: @run-is-pig
Reviewed-by: @overweight
Signed-off-by: @overweight
2021-06-11 03:26:10 +00:00
liuyumeng
a7ad500f87 Refresh the original the original certificate file and delete the insercure certificates 2021-06-10 14:40:56 +08:00
3 changed files with 6115 additions and 2638 deletions

View File

@ -35,10 +35,10 @@ Name: ca-certificates
# to have increasing version numbers. However, the new scheme will work,
# because all future versions will start with 2013 or larger.)
Version: 2020.2.46
Version: 2023.2.60
# for Rawhide, please always use release >= 2
# for Fedora release branches, please use release < 2 (1.0, 1.1, ...)
Release: 1
Release: 2
License: Public Domain
Group: System Environment/Base
@ -307,9 +307,18 @@ fi
#if [ $1 -gt 1 ] ; then
# # when upgrading or downgrading
#fi
# When coreutils is installing with ca-certificates
# we need to wait until coreutils install to
# run our update since update requires ln to complete.
if [ -x %{_bindir}/ln ]; then
%{_bindir}/ca-legacy install
%{_bindir}/update-ca-trust
fi
%posttrans
# we run the scripts here too, in case we couldn't run them in post
%{_bindir}/ca-legacy install
%{_bindir}/update-ca-trust
%files
%dir %{_sysconfdir}/ssl
@ -370,6 +379,21 @@ fi
%changelog
* Mon Nov 06 2023 wangjiang <wangjiang37@h-partners.com> - 2023.2.60-2
- delete the unsecure certificates
* Tue Jun 06 2023 wangjiang <wangjiang37@h-partners.com> - 2023.2.60-1
- upgrade version to 2023.2.60
* Sat Oct 22 2022 wangjiang <wangjiang37@h-partners.com> - 2021.2.52-2
- lagging install ca-legacy and update-ca-trust
* Wed Dec 1 2021 liudabo <liudabo1@huawei.com> - 2021.2.52-1
- upgrade version to 2021.2.52
* Thu Jun 10 2021 liudabo <liudabo1@huawei.com> - 2021.2.46-2
- Refresh the original the original certificate file and delete the insercure certificates
* Fri Mar 12 2021 yixiangzhike <zhangxingliang3@huawei.com> - 2020.2.46-1
- Update to the latest released version 2020.2.46

File diff suppressed because it is too large Load Diff

View File

@ -46,8 +46,8 @@
* It's recommend to switch back to 0 after having reached version 98/99.
*/
#define NSS_BUILTINS_LIBRARY_VERSION_MAJOR 2
#define NSS_BUILTINS_LIBRARY_VERSION_MINOR 46
#define NSS_BUILTINS_LIBRARY_VERSION "2.46"
#define NSS_BUILTINS_LIBRARY_VERSION_MINOR 60
#define NSS_BUILTINS_LIBRARY_VERSION "2.60"
/* These version numbers detail the semantic changes to the ckfw engine. */
#define NSS_BUILTINS_HARDWARE_VERSION_MAJOR 1