Your message dated Tue, 19 Jul 2022 14:36:38 +0000
with message-id <e1odol0-000ink...@fasolo.debian.org>
and subject line Bug#922981: fixed in ca-certificates-java 20220719
has caused the Debian Bug report #922981,
regarding ca-certificates-java: /etc/ca-certificates/update.d/jks-keystore
doesn't update /etc/ssl/certs/java/cacerts
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
922981: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922981
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: ca-certificates-java
Version: 20170929~deb9u1
Severity: normal
Dear Maintainer,
* What led up to the situation?
Executing gradlew script leading to following error :
java.security.InvalidAlgorithmParameterException: the trustAnchors
parameter must be
non-empty
* What exactly did you do (or not do) that was effective (or
ineffective)?
When I ran "sudo update-ca-certificates -f" error still appeared;
After running "sudo rm /etc/ssl/certs/java/cacerts" and then again
"sudo update-ca-certificates -f"
Error disappeared
* What was the outcome of this action?
resolution of the error
* What outcome did you expect instead?
I expected "sudo update-ca-certificates -f" to automatically update the
file
-- System Information:
Debian Release: 9.8
APT prefers stable-updates
APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)
Kernel: Linux 4.9.0-7-amd64 (SMP w/1 CPU core)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8),
LANGUAGE=en_GB:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
Versions of packages ca-certificates-java depends on:
ii ca-certificates 20161130+nmu1+deb9u1
ii libnss3 2:3.26.2-1.1+deb9u1
ii openjdk-11-jre-headless [java7-runtime-headless] 11.0.2+9-3~bpo9+1
ii openjdk-8-jre-headless [java7-runtime-headless] 8u181-b13-2~deb9u1
ca-certificates-java recommends no packages.
ca-certificates-java suggests no packages.
-- Configuration Files:
/etc/default/cacerts [Errno 13] Permission denied: '/etc/default/cacerts'
-- no debconf information
--- End Message ---
--- Begin Message ---
Source: ca-certificates-java
Source-Version: 20220719
Done: Matthias Klose <d...@debian.org>
We believe that the bug you reported is fixed in the latest version of
ca-certificates-java, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 922...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Matthias Klose <d...@debian.org> (supplier of updated ca-certificates-java
package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Tue, 19 Jul 2022 16:02:33 +0200
Source: ca-certificates-java
Architecture: source
Version: 20220719
Distribution: unstable
Urgency: medium
Maintainer: Debian Java Maintainers
<pkg-java-maintain...@lists.alioth.debian.org>
Changed-By: Matthias Klose <d...@debian.org>
Closes: 688415 767272 776860 795244 864331 908858 922981 929685 940297 994152
Changes:
ca-certificates-java (20220719) unstable; urgency=medium
.
[ Andreas Beckmann ]
* Team upload.
* Switch to debhelper-compat (= 13).
* Set Rules-Requires-Root: no.
* UpdateCertificates.java: Ignore empty lines in stdin. (Closes: #795244)
* Avoid warning about missing /etc/ssl/certs/java/cacerts on initial
install.
* Do not be satisfied by java7-runtime-headless.
* Remove support for upgrading from versions predating wheezy.
* Clean up misplaced symlinks in the root directory left over by ancient
versions. (Closes: #688415)
* Drop libnss3 manipulations, no longer needed since openjdk-6-jre-headless
at least.
* Add update-ca-certificates-java trigger and let jks-keystore record the
pending certificate updates and postpone them to the processing of this
trigger. (Closes: #908858)
* Add update-ca-certificates-java-fresh trigger, will be activated by
update-ca-certificates -f. (Closes: #922981)
* Remove obsolete certificates when building a fresh cacerts file.
(Closes: #767272)
* Bump ca-certificates dependency to 20210120.
* Skip Java certificates setup if no JRE is available.
* Add trigger on /usr/lib/jvm to perform Java certificates setup if a JRE
becomes available.
* Demote JRE dependency to Recommends to break dependency cycle.
(Closes: #929685, #940297)
* Foreign architecture JREs that place java in PATH are also usable.
(Closes: #776860, #864331)
.
[ Matthias Klose ]
* Support Java 18-21. Closes: #994152.
* Bump Standards-Version to 4.6.0.
Checksums-Sha1:
ede5cff6cf6ed0b4258b2828ed63baa99ccddd14 1808 ca-certificates-java_20220719.dsc
3b18d00913c73c5e735ef4dcebee3b7c47fefc2b 17204
ca-certificates-java_20220719.tar.xz
5907f7961d191928f1e60081a018f9d2ca08ba89 10746
ca-certificates-java_20220719_source.buildinfo
Checksums-Sha256:
d14b15145e0af9c7b3f054af00d13542a7b0192ce3e27afdf890b627090f89c3 1808
ca-certificates-java_20220719.dsc
a627585de3e0c827300094f113dd3326e92744abfabadef55d122d7f980e28ad 17204
ca-certificates-java_20220719.tar.xz
9f0339174bd78888e2ac2c9156bcbec36a3306c53338782fabf39be8c0db5824 10746
ca-certificates-java_20220719_source.buildinfo
Files:
1174a0a91cd5d5c5065802d8d2465f0e 1808 java optional
ca-certificates-java_20220719.dsc
cda24b44319098d0fdd633e7dd59be5c 17204 java optional
ca-certificates-java_20220719.tar.xz
0f3fcd50d3012b49f20f32c058a182e6 10746 java optional
ca-certificates-java_20220719_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=cN37
-----END PGP SIGNATURE-----
--- End Message ---