import redhat-release-10.0-14.4.el10

i10c-beta changed/i10c-beta/redhat-release-10.0-14.4.el10
MSVSphere Packaging Team 2 months ago
commit eb5abbfcff
Signed by: sys_gitsync
GPG Key ID: B2B0B9F29E528FE8

4
.gitignore vendored

@ -0,0 +1,4 @@
SOURCES/RHEL-10.0-Beta-swidtag.tar.gz
SOURCES/redhat-release-10.0.tar.gz
SOURCES/redhat-release-productids-10.0-beta-20230822094344.tar.gz
SOURCES/sb-certs-10-2023.9.tar.bz2

@ -0,0 +1,4 @@
0ab0d1bf0a8b56450f42c94fce51f5b2b3340dd1 SOURCES/RHEL-10.0-Beta-swidtag.tar.gz
af5da245a1fc41c7235d72b273d986bb470490c7 SOURCES/redhat-release-10.0.tar.gz
5af8545b54d109e1c3048e67877c8be5b1674ba5 SOURCES/redhat-release-productids-10.0-beta-20230822094344.tar.gz
e86f90eb37f7406489912f745303f5ce700c6758 SOURCES/sb-certs-10-2023.9.tar.bz2

@ -0,0 +1,7 @@
# https://bugzilla.redhat.com/show_bug.cgi?id=1689346
kernel.kptr_restrict = 1
# Source route verification
net.ipv4.conf.default.rp_filter = 1
net.ipv4.conf.*.rp_filter = 1
-net.ipv4.conf.all.rp_filter

@ -0,0 +1,11 @@
# We enable all display managers by default. Since only one can
# actually be enabled at the same time the one which is installed
# first wins
enable gdm.service
enable lightdm.service
enable slim.service
enable lxdm.service
enable sddm.service
enable kdm.service
enable xdm.service

@ -0,0 +1,30 @@
# Enable the D-Bus service (including its socket for socket activation)
# unconditionally. It is used throughout Fedora and required on all machines.
# https://src.fedoraproject.org/rpms/fedora-release/pull-request/4
# https://fedoraproject.org/w/index.php?title=Starting_services_by_default&oldid=377748
enable dbus.socket
enable dbus-broker.service
# Socket-activated pipewire service for individual user sessions
# https://bugzilla.redhat.com/show_bug.cgi?id=1592434
enable pipewire.socket
# Enable the PipeWire PulseAudio compatibility socket interface
# https://bugzilla.redhat.com/show_bug.cgi?id=1904239
# https://bugzilla.redhat.com/show_bug.cgi?id=1907906
# https://fedoraproject.org/wiki/Changes/DefaultPipeWire
enable pipewire-pulse.socket
# https://bugzilla.redhat.com/show_bug.cgi?id=1976006
enable pipewire-media-session.service
# https://bugzilla.redhat.com/show_bug.cgi?id=1979419
enable wireplumber.service
# Enable the session agent for snaps
# https://bugzilla.redhat.com/show_bug.cgi?id=1734371
enable snapd.session-agent.socket
# https://src.fedoraproject.org/rpms/fedora-release/pull-request/80
enable obex.service
enable grub-boot-success.timer
enable pulseaudio.socket

@ -0,0 +1,467 @@
# See https://docs.fedoraproject.org/en-US/packaging-guidelines/DefaultServices/
# for the Fedora policy.
# On Fedora we deviate from some upstream defaults
disable systemd-timesyncd.service
disable systemd-networkd.service
disable systemd-networkd-wait-online.service
# We want to update systemd-boot from packaging scriptlets after updates.
disable systemd-boot-update.service
# https://fedoraproject.org/wiki/Changes/EnableSystemdOomd
enable systemd-oomd.service
# These presets were last validated en-masse on 2015-09-09
# https://fedorahosted.org/fesco/ticket/1472
# System stuff
# https://fedoraproject.org/w/index.php?title=Starting_services_by_default&oldid=377748
enable dbus.socket
enable dbus-broker.service
enable sshd.service
# Locally-running services
enable atd.*
enable crond.*
enable rpcbind.*
# Approved by FESCo - https://fedorahosted.org/fesco/ticket/636
enable chronyd.service
# https://fedoraproject.org/w/index.php?title=Starting_services_by_default&oldid=377748
# https://bugzilla.redhat.com/show_bug.cgi?id=1455704
enable NetworkManager.service
enable NetworkManager-wait-online.service
enable NetworkManager-dispatcher.service
enable ModemManager.service
# Approved by FESCo - https://fedorahosted.org/fesco/ticket/1311
enable auditd.service
# https://bugzilla.redhat.com/show_bug.cgi?id=2258520
enable audit-rules.service
# Locally-running service
enable restorecond.service
# Approved by FESCo - https://fedorahosted.org/fesco/ticket/1166
enable bluetooth.*
# https://fedoraproject.org/w/index.php?title=Starting_services_by_default&oldid=377748
enable avahi-daemon.*
# Default configuration is locally-running only
# CUPS is now socket-activatable for local use-cases, so don't enable cups.service
# https://pagure.io/fesco/issue/1701
enable cups.socket
enable cups.path
# RHELBLD-15232: We need the full service enabled to act as a print server
enable cups.service
# The various syslog implementations
enable rsyslog.*
enable syslog-ng.*
enable sysklogd.*
# Network facing
# https://fedoraproject.org/w/index.php?title=Starting_services_by_default&oldid=377748
enable firewalld.service
# Approved by FESCo - https://fedorahosted.org/fesco/ticket/2627
# Virtualization driver specific daemons. Start by default at boot for VM
# autostart, but shutdown after 2 mins and socket activated thereafter
enable virtqemud.service
enable virtxend.service
enable virtlxcd.service
enable virtvboxd.service
# Sockets for the services listed above, to support socket activation
# after the initial timeout
enable virtqemud.socket
enable virtqemud-ro.socket
enable virtqemud-admin.socket
enable virtxend.socket
enable virtxend-ro.socket
enable virtxend-admin.socket
enable virtlxcd.socket
enable virtlxcd-ro.socket
enable virtlxcd-admin.socket
enable virtvboxd.socket
enable virtvboxd-ro.socket
enable virtvboxd-admin.socket
# Compatibility with libvirtd sockets for old clients (socket activated
# only when required). Note that the -tcp and -tls sockets are kept disabled
# by default, as they require additional configuration before they can work
enable virtproxyd.socket
enable virtproxyd-ro.socket
enable virtproxyd-admin.socket
# Secondary drivers providing supporting functionality to main virtualization
# drivers (socket activated only when required)
enable virtinterfaced.socket
enable virtinterfaced-ro.socket
enable virtinterfaced-admin.socket
enable virtnetworkd.socket
enable virtnetworkd-ro.socket
enable virtnetworkd-admin.socket
enable virtnodedevd.socket
enable virtnodedevd-ro.socket
enable virtnodedevd-admin.socket
enable virtnwfilterd.socket
enable virtnwfilterd-ro.socket
enable virtnwfilterd-admin.socket
enable virtsecretd.socket
enable virtsecretd-ro.socket
enable virtsecretd-admin.socket
enable virtstoraged.socket
enable virtstoraged-ro.socket
enable virtstoraged-admin.socket
# Non-driver support services (socket activated only when required, no
# read-only socket)
enable virtlogd.socket
enable virtlogd-admin.socket
enable virtlockd.socket
enable virtlockd-admin.socket
# https://fedoraproject.org/w/index.php?title=Starting_services_by_default&oldid=377748
enable xinetd.service
# Storage
# Approved by FESCo - https://fedorahosted.org/fesco/ticket/391
enable multipathd.service
# Approved by FESCo - https://fedorahosted.org/fesco/ticket/876
enable libstoragemgmt.service
# Approved by FESCo - https://pagure.io/fesco/issue/2386
enable iscsid.socket
enable iscsiuio.socket
# Approved by FESCo - https://pagure.io/fesco/issue/2943
enable iscsi-starter.service
# iSCSI support for early-boot
# https://bugzilla.redhat.com/show_bug.cgi?id=1930470
enable iscsi-onboot.service
# Locally-running services
enable lvm2-monitor.*
enable lvm2-lvmetad.*
enable dm-event.*
enable dmraid-activation.service
# https://bugzilla.redhat.com/show_bug.cgi?id=855372
enable mdmonitor.service
enable mdmonitor-takeover.service
# https://bugzilla.redhat.com/show_bug.cgi?id=1817491
enable raid-check.timer
# https://bugzilla.redhat.com/show_bug.cgi?id=876237
enable spice-vdagentd.service
# https://bugzilla.redhat.com/show_bug.cgi?id=885406
enable qemu-guest-agent.service
# https://bugzilla.redhat.com/show_bug.cgi?id=928726
enable dnf-makecache.timer
# https://bugzilla.redhat.com/show_bug.cgi?id=1995495
enable rpm-ostree-countme.timer
# https://bugzilla.redhat.com/show_bug.cgi?id=957135
enable vmtoolsd.service
# https://bugzilla.redhat.com/show_bug.cgi?id=976315
enable dkms.service
# https://bugzilla.redhat.com/show_bug.cgi?id=961878
enable ipmi.service
enable ipmievd.service
# https://bugzilla.redhat.com/show_bug.cgi?id=1039351
enable x509watch.timer
# https://bugzilla.redhat.com/show_bug.cgi?id=1060754
enable dnssec-triggerd.service
# https://bugzilla.redhat.com/show_bug.cgi?id=1095353
enable uuidd.socket
# Hardware
# Locally-running service
enable gpm.*
# https://bugzilla.redhat.com/show_bug.cgi?id=1066421
enable gpsd.socket
# https://bugzilla.redhat.com/show_bug.cgi?id=1141607
enable x2gocleansessions.service
# https://issues.redhat.com/browse/RHEL-35582
enable tuned.service
# https://bugzilla.redhat.com/show_bug.cgi?id=1215641
enable unbound-anchor.timer
# https://bugzilla.redhat.com/show_bug.cgi?id=1222495
enable lvm2-lvmpolld.*
# https://fedoraproject.org/wiki/Changes/UEFISecureBootBlacklistUpdates
enable dbxtool.service
# Locally-running services
enable irqbalance.service
enable lm_sensors.service
enable mcelog.*
enable smartd.service
enable pcscd.socket
enable rngd.service
# Other stuff
# Approved by FESCo - https://fedorahosted.org/fesco/ticket/937
# Note: abrt-ccpp.service is excluded in favor of systemd-coredump.
enable abrtd.service
enable abrt-journal-core.service
enable abrt-oops.service
enable abrt-xorg.service
enable abrt-vmcore.service
# Locally-running services
enable kdump.service
enable ksm.service
enable ksmtuned.service
enable rootfs-resize.service
enable sysstat.service
enable sysstat-collect.timer
enable sysstat-summary.timer
enable uuidd.service
enable xendomains.service
enable xenstored.service
enable xenconsoled.service
# Desktop stuff
# Locally-running services
enable accounts-daemon.service
enable rtkit-daemon.service
enable upower.service
enable udisks2.service
enable polkit.service
# https://bugzilla.redhat.com/show_bug.cgi?id=1187072
enable timedatex.service
# https://bugzilla.redhat.com/show_bug.cgi?id=1231745
enable mlocate-updatedb.timer
# https://src.fedoraproject.org/rpms/fedora-release/pull-request/204
enable plocate-updatedb.timer
# https://bugzilla.redhat.com/show_bug.cgi?id=1218999
enable sa-update.timer
# Hyper-V guest support daemons
# https://bugzilla.redhat.com/show_bug.cgi?id=1279322
enable vmtoolsd.service
# mcelog is a utility that collects and decodes Machine Check Exception data
# on x86-32 and x86-64 systems.
# https://bugzilla.redhat.com/show_bug.cgi?id=1302179
enable mcelog.service
# OPAL-prd is a utility specific to ppc64le systems
# It is the "OPAL Processor Recovery Diagnostics Daemon"
# https://bugzilla.redhat.com/show_bug.cgi?id=1312018
enable opal-prd.service
# lircd is the Linux Infrared Control daemon
# Starting with version 0.9.4, it requires no manual configuration
# https://bugzilla.redhat.com/show_bug.cgi?id=1340061
enable lircd.socket
# IPSec management
# https://bugzilla.redhat.com/show_bug.cgi?id=1276285
enable pluto.socket
# https://bugzilla.redhat.com/show_bug.cgi?id=1367932
# Automatically refresh installed snaps
enable snapd.refresh.timer
# Socket activated daemon to manage snaps
enable snapd.socket
# Support for dual-GPU systems
# https://bugzilla.redhat.com/show_bug.cgi?id=1389762
enable switcheroo-control.service
# Support for the DRBD link-cleaning service
# https://bugzilla.redhat.com/show_bug.cgi?id=1399387
enable drbdlinksclean.service
# Enable the System Security Services Daemon
# https://bugzilla.redhat.com/show_bug.cgi?id=1427649
enable sssd.service
# Enable ostree-remount on ostree-based systems
# (Does nothing on non-ostree systems)
# https://bugzilla.redhat.com/show_bug.cgi?id=1451458
enable ostree-remount.service
# Enable Performance Co-Pilot services
# https://bugzilla.redhat.com/show_bug.cgi?id=1472350
enable pmcd.service
enable pmlogger.service
enable pmie.service
# Enable SSSD Kerberos Credential Cache Server
# https://bugzilla.redhat.com/show_bug.cgi?id=1475999
enable sssd-kcm.socket
# sssd-secrets.socket was previously enabled, but as of
# SSSD 2.0 it is not longer needed
# https://bugzilla.redhat.com/show_bug.cgi?id=1615584
# A mechanism to transfer state between the initramfs and the real
# system. Obsolete since /run was introduced, but still used by some
# services.
# https://bugzilla.redhat.com/show_bug.cgi?id=1493479
# https://bugzilla.redhat.com/show_bug.cgi?id=1584645
enable import-state.service
# An initscripts mechanism for readonly root
# https://bugzilla.redhat.com/show_bug.cgi?id=1493479
# https://bugzilla.redhat.com/show_bug.cgi?id=1584645
enable readonly-root.service
# Ensure that any installed kmods are built for the currently-running
# kernel at boot
# https://bugzilla.redhat.com/show_bug.cgi?id=1518258
enable akmods.service
# virtualbox-guest-additions service, yet another virtual-machine guest
# integration agent, this is a locally-running service, Note this has a
# "ConditionVirtualization=|oracle" so it will only run under VirtualBox
# https://bugzilla.redhat.com/show_bug.cgi?id=1534595
enable vboxservice.service
# Mark the system for SELinux autorelabel when appropriate
# https://bugzilla.redhat.com/show_bug.cgi?id=1589720
enable selinux-autorelabel-mark.service
# https://bugzilla.redhat.com/show_bug.cgi?id=1623901
enable cpi.service
# Initialize persistent devices on s390x
enable device_cio_free.service
# Enable the stratis daemon for managing stratis storage
# https://bugzilla.redhat.com/show_bug.cgi?id=1630514
enable stratisd.service
# Enable a service to finalize staged OSTree changes at shutdown
# https://bugzilla.redhat.com/show_bug.cgi?id=1639372
enable ostree-finalize-staged.path
# Enable the Docker daemon socket
# https://bugzilla.redhat.com/show_bug.cgi?id=1655602
enable docker.socket
# Enable the service for adding Fedora OCI repos to flatpak
# https://bugzilla.redhat.com/show_bug.cgi?id=1696225
enable flatpak-add-fedora-repos.service
# Run fstrim weekly on filesystems listed in fstab
enable fstrim.timer
# oneshot to generate kata VM appliance at host bootup
# for the booted kernel
enable kata-osbuilder-generate.service
# Enable rotation of system log files
# https://bugzilla.redhat.com/show_bug.cgi?id=1655153#c4
enable logrotate.timer
# Enable regular update of SpamAssassin data files
# https://bugzilla.redhat.com/show_bug.cgi?id=1651002
enable sa-update.timer
# Enable service to automatically rebuild the RPM database
# on startup when /var/lib/rpm/.rebuilddb exists
# https://bugzilla.redhat.com/show_bug.cgi?id=1826658
enable rpmdb-rebuild.service
# Enable service to automatically migrate the RPM database to /usr
# on startup when /var/lib/rpm/.migratedb exists
# https://bugzilla.redhat.com/show_bug.cgi?id=2044061
enable rpmdb-migrate.service
# Support services for Google Cloud
# Approved by FESCo: https://pagure.io/fesco/issue/2578
enable google-guest-agent.service
enable google-startup-scripts.service
enable google-shutdown-scripts.service
# Support service for Azure
# Approved by FESCo: https://pagure.io/fesco/issue/2849
enable waagent.service
# Certbot (Let's Encrypt)
# https://bugzilla.redhat.com/show_bug.cgi?id=1940211
enable certbot-renew.timer
# enable thermald by default for desktops
# https://pagure.io/fedora-workstation/issue/71
enable thermald.service
# enable uresourced by default for desktops
# https://pagure.io/fesco/issue/2457
enable uresourced.service
# enable power-profiles-daemon
# https://pagure.io/fedora-workstation/issue/191
enable power-profiles-daemon.service
# Enable clevis-luks-askpass.path
# https://bugzilla.redhat.com/show_bug.cgi?id=2101719
enable clevis-luks-askpass.path
# Enable livesys services for live media
# https://bugzilla.redhat.com/show_bug.cgi?id=2148790
enable livesys.service
enable livesys-late.service
# Enable Waydroid
# https://bugzilla.redhat.com/show_bug.cgi?id=2157810
enable waydroid-container.service
# Enable nmstate to apply network configuration from /etc/nmstate/*.yml
# https://github.com/coreos/fedora-coreos-tracker/issues/1175
# https://github.com/coreos/fedora-coreos-config/pull/2269
enable nmstate.service
# Enable nfs-client.target
# https://bugzilla.redhat.com/show_bug.cgi?id=2218006
enable nfs-client.target
# Enable cloud-init services
# https://bugzilla.redhat.com/show_bug.cgi?id=2233948
enable cloud-config.service
enable cloud-final.service
enable cloud-init.service
enable cloud-init-local.service
# Enable kernel-bootcfg-boot-successful.service
# https://bugzilla.redhat.com/show_bug.cgi?id=2239607
enable kernel-bootcfg-boot-successful.service
# Enable pd-mapper service for Thinkpad X13s
# https://bugzilla.redhat.com/show_bug.cgi?id=2255318
enable pd-mapper.service
# The Cockpit web-based system management console
enable cockpit.socket
# https://fedoraproject.org/wiki/Changes/EnableFwupdRefreshByDefault
enable fwupd-refresh.timer

@ -0,0 +1,638 @@
%define debug_package %{nil}
%define product_family Red Hat Enterprise Linux
%define release_name Coughlan
%define base_release_version 10
%define full_release_version 10.0
%define dist_release_version 10
# When moving from Beta to GA, the beta definition needs to be removed,
# not just commented out.
# Also ensure that the appropriate SWID and productids tarball have been
# uploaded to the lookaside cache.
%define beta Beta
%define beta_part %{?beta:-%{beta}}
%define swid_regid redhat.com
%define dist .el%{dist_release_version}
Name: redhat-release
Version: %{full_release_version}
Release: 14.4%{?dist}
Summary: %{product_family} release file
Group: System Environment/Base
License: GPL-2.0-or-later
Provides: redhat-release = %{version}-%{release}
Provides: system-release = %{version}-%{release}
Provides: system-release(releasever) = %{base_release_version}
Provides: base-module(platform:el%{base_release_version})
Recommends: redhat-release-eula
Source0: redhat-release-%{base_release_version}.0.tar.gz
Source1: 85-display-manager.preset
Source2: 90-default.preset
Source3: 99-default-disable.preset
Source4: redhat-release-productids-10.0-beta-20230822094344.tar.gz
Source5: RHEL-%{full_release_version}%{?beta_part}-swidtag.tar.gz
Source6: 50-redhat.conf
Source7: 90-default-user.preset
# Secure Boot Signing Certificates
Source400: sb-certs-10-2023.9.tar.bz2
%description
%{product_family} release files
%package -n redhat-sb-certs
Summary: %{distro} public secureboot certificates
Group: System Environment/Base
Provides: system-sb-certs = %{version}-%{release}
BuildArch: noarch
%description -n redhat-sb-certs
Secure Boot certificates
%package eula
Summary: %{product_family} EULA file
Group: System Environment/Base
%description eula
%{product_family} EULA file
%prep
%setup -q -n redhat-release-%{base_release_version}
%setup -q -n redhat-release-%{base_release_version} -T -D -a 4
%setup -q -n redhat-release-%{base_release_version} -T -D -a 5
%setup -q -n redhat-release-%{base_release_version} -T -D -a 400
%build
echo OK
%install
rm -rf %{buildroot}
# create /etc
mkdir -p %{buildroot}/etc
mkdir -p %{buildroot}/%{_prefix}/lib
# create /etc/system-release and /etc/redhat-release
echo "%{product_family} release %{full_release_version}%{?beta: %{beta}} (%{release_name})" > %{buildroot}/etc/redhat-release
ln -s redhat-release %{buildroot}/etc/system-release
# -------------------------------------------------------------------------
# Definitions for /etc/os-release and for macros in macros.dist. These
# macros are useful for spec files where distribution-specific identifiers
# are used to customize packages.
# Name of vendor / name of distribution. Typically used to identify where
# the binary comes from in --help or --version messages of programs.
# Examples: gdb.spec, clang.spec
%global dist_vendor Red Hat, Inc.
%global dist_name %{product_family}
# URL of the homepage of the distribution
# Example: gstreamer1-plugins-base.spec
%global dist_home_url https://www.redhat.com/
# Bugzilla / bug reporting URLs shown to users.
# Examples: gcc.spec
%global dist_bug_report_url https://issues.redhat.com/
# debuginfod server, as used in elfutils.spec. Not currently available for RHEL
# %global dist_debuginfod_url %{nil}
# -------------------------------------------------------------------------
# create /usr/lib/os-release
cat << EOF >>%{buildroot}/%{_prefix}/lib/os-release
NAME="%{dist_name}"
VERSION="%{full_release_version} (%{release_name})"
ID="rhel"
ID_LIKE="centos fedora"
VERSION_ID="%{full_release_version}"
PLATFORM_ID="platform:el%{base_release_version}"
PRETTY_NAME="%{product_family} %{full_release_version}%{?beta: %{beta}} (%{release_name})"
ANSI_COLOR="0;31"
LOGO="fedora-logo-icon"
CPE_NAME="cpe:/o:redhat:enterprise_linux:%{base_release_version}::baseos"
HOME_URL="%{dist_home_url}"
VENDOR_NAME="Red Hat"
VENDOR_URL="%{dist_home_url}"
DOCUMENTATION_URL="https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/%{base_release_version}"
BUG_REPORT_URL="%{dist_bug_report_url}"
REDHAT_BUGZILLA_PRODUCT="%{product_family} %{base_release_version}"
REDHAT_BUGZILLA_PRODUCT_VERSION=%{full_release_version}
REDHAT_SUPPORT_PRODUCT="%{product_family}"
REDHAT_SUPPORT_PRODUCT_VERSION="%{full_release_version}%{?beta: %{beta}}"
EOF
# create /etc/os-release symlink
ln -s ..%{_prefix}/lib/os-release %{buildroot}/%{_sysconfdir}/os-release
# write cpe to /etc/system/release-cpe
echo "cpe:/o:redhat:enterprise_linux:%{base_release_version}::baseos" | tr [A-Z] [a-z] > %{buildroot}/etc/system-release-cpe
# create /etc/issue, /etc/issue.net and /etc/issue.d
echo '\S' > %{buildroot}/etc/issue
echo 'Kernel \r on an \m' >> %{buildroot}/etc/issue
cp %{buildroot}/etc/issue %{buildroot}/etc/issue.net
echo >> %{buildroot}/etc/issue
mkdir -p %{buildroot}%{_sysconfdir}/issue.d
mkdir -p -m 755 %{buildroot}/etc/pki/rpm-gpg
# Correct GPG keys were fixed in via rhbz#1672230
cp RPM-GPG-KEY-redhat-release %{buildroot}/etc/pki/rpm-gpg/
cp RPM-GPG-KEY-redhat-beta %{buildroot}/etc/pki/rpm-gpg/
cp ISV-Container-signing-key %{buildroot}/etc/pki/rpm-gpg/
chmod 0644 %{buildroot}/etc/pki/rpm-gpg/RPM-GPG-KEY-*
chmod 0644 %{buildroot}/etc/pki/rpm-gpg/ISV-Container-signing-key
# Copy Productids
mkdir -p -m 755 %{buildroot}/etc/pki/product-default
if [ -d redhat-release-productids-%{full_release_version}-*/%{_arch} ]; then
for pem in redhat-release-productids-%{full_release_version}-*/%{_arch}/*.pem; do
install -m 644 $pem %{buildroot}/etc/pki/product-default
done
fi
## set up the dist tag macros
mkdir -p %{buildroot}%{_rpmmacrodir}
cat > %{buildroot}%{_rpmmacrodir}/macros.dist << EOF
# dist macros.
%%rhel %{base_release_version}
%%__bootstrap ~bootstrap
%%el%{base_release_version} 1
%%distcore .el%{base_release_version}
%%dist %%{!?distprefix0:%%{?distprefix}}%%{expand:%%{lua:for i=0,9999 do print("%%{?distprefix" .. i .."}") end}}%%{distcore}%%{?distsuffix}%%{?with_bootstrap:%{__bootstrap}}
%%dist_vendor %{dist_vendor}
%%dist_name %{dist_name}
%%dist_home_url %{dist_home_url}
%%dist_bug_report_url %{dist_bug_report_url}
EOF
### dist tag macros end
# make redhat-release a protected package
install -p -d -m 755 %{buildroot}/etc/dnf/protected.d/
touch redhat-release.conf
echo redhat-release > redhat-release.conf
install -p -c -m 0644 redhat-release.conf %{buildroot}/etc/dnf/protected.d/
rm -f redhat-release.conf
# use unbranded datadir
mkdir -p -m 755 %{buildroot}/%{_datadir}/redhat-release
install -m 644 EULA %{buildroot}/%{_datadir}/redhat-release
# use unbranded docdir
mkdir -p -m 755 %{buildroot}/%{_docdir}/redhat-release
install -m 644 GPL %{buildroot}/%{_docdir}/redhat-release
sed -i 's:@@VERSION@@:%{full_release_version}:' GPL-source-offer
install -m 644 GPL-source-offer %{buildroot}/%{_docdir}/redhat-release
# copy systemd presets
mkdir -p %{buildroot}/%{_prefix}/lib/systemd/system-preset/
mkdir -p %{buildroot}/%{_prefix}/lib/systemd/user-preset
install -m 0644 %{SOURCE1} %{buildroot}/%{_prefix}/lib/systemd/system-preset/
install -m 0644 %{SOURCE2} %{buildroot}/%{_prefix}/lib/systemd/system-preset/
install -m 0644 %{SOURCE3} %{buildroot}/%{_prefix}/lib/systemd/system-preset/
install -m 0644 %{SOURCE7} %{buildroot}%{_prefix}/lib/systemd/user-preset/
install -m 0644 %{SOURCE3} %{buildroot}%{_prefix}/lib/systemd/user-preset/
# copy sysctl presets
mkdir -p %{buildroot}/%{_prefix}/lib/sysctl.d/
install -m 0644 %{SOURCE6} %{buildroot}/%{_prefix}/lib/sysctl.d/
mkdir -p -m 755 %{buildroot}/etc/yum.repos.d
# Copy SWID tags
mkdir -p -m 755 %{buildroot}%{_prefix}/lib/swidtag/%{swid_regid}
if ! [ %{_arch} = "i386" ] ; then
install -p -m 644 RHEL-%{full_release_version}%{?beta_part}-swidtag/com.redhat.RHEL-%{base_release_version}-%{_arch}.swidtag %{buildroot}%{_prefix}/lib/swidtag/%{swid_regid}/
install -p -m 644 RHEL-%{full_release_version}%{?beta_part}-swidtag/com.redhat.RHEL-%{full_release_version}%{?beta_part}-%{_arch}.swidtag %{buildroot}%{_prefix}/lib/swidtag/%{swid_regid}/
fi
mkdir -p -m 755 %{buildroot}/etc/pki/swid/CA/%{swid_regid}
mkdir -p -m 755 %{buildroot}/etc/swid/swidtags.d
ln -sr %{buildroot}%{_prefix}/lib/swidtag/%{swid_regid} %{buildroot}/etc/swid/swidtags.d/%{swid_regid}
install -p -m 644 RHEL-%{full_release_version}%{?beta_part}-swidtag/redhatcodesignca.cert %{buildroot}/etc/pki/swid/CA/%{swid_regid}/
# Copy secureboot certificates
install -d -m 0755 %{buildroot}%{_sysconfdir}/pki/sb-certs/
install -d -m 0755 %{buildroot}%{_datadir}/pki/sb-certs/
# Install aarch64 certs
install -m 644 sb-certs/redhatsecurebootca5.cer %{buildroot}%{_datadir}/pki/sb-certs/secureboot-ca-aarch64.cer
ln -sr %{buildroot}%{_datadir}/pki/sb-certs/secureboot-ca-aarch64.cer %{buildroot}%{_sysconfdir}/pki/sb-certs/secureboot-ca-aarch64.cer
install -m 644 sb-certs/redhatsecureboot501.cer %{buildroot}%{_datadir}/pki/sb-certs/secureboot-kernel-aarch64.cer
ln -sr %{buildroot}%{_datadir}/pki/sb-certs/secureboot-kernel-aarch64.cer %{buildroot}%{_sysconfdir}/pki/sb-certs/secureboot-kernel-aarch64.cer
install -m 644 sb-certs/redhatsecureboot502.cer %{buildroot}%{_datadir}/pki/sb-certs/secureboot-grub2-aarch64.cer
ln -sr %{buildroot}%{_datadir}/pki/sb-certs/secureboot-grub2-aarch64.cer %{buildroot}%{_sysconfdir}/pki/sb-certs/secureboot-grub2-aarch64.cer
install -m 644 sb-certs/redhatsecureboot503.cer %{buildroot}%{_datadir}/pki/sb-certs/secureboot-fwupd-aarch64.cer
ln -sr %{buildroot}%{_datadir}/pki/sb-certs/secureboot-fwupd-aarch64.cer %{buildroot}%{_sysconfdir}/pki/sb-certs/secureboot-fwupd-aarch64.cer
install -m 644 sb-certs/redhatsecureboot504.cer %{buildroot}%{_datadir}/pki/sb-certs/secureboot-uki-virt-aarch64.cer
ln -sr %{buildroot}%{_datadir}/pki/sb-certs/secureboot-uki-virt-aarch64.cer %{buildroot}%{_sysconfdir}/pki/sb-certs/secureboot-uki-virt-aarch64.cer
# Install ppc64le certs
install -m 644 sb-certs/redhatsecurebootca7.cer %{buildroot}%{_datadir}/pki/sb-certs/secureboot-ca-ppc64le.cer
ln -sr %{buildroot}%{_datadir}/pki/sb-certs/secureboot-ca-ppc64le.cer %{buildroot}%{_sysconfdir}/pki/sb-certs/secureboot-ca-ppc64le.cer
install -m 644 sb-certs/redhatsecureboot701.cer %{buildroot}%{_datadir}/pki/sb-certs/secureboot-kernel-ppc64le.cer
ln -sr %{buildroot}%{_datadir}/pki/sb-certs/secureboot-kernel-ppc64le.cer %{buildroot}%{_sysconfdir}/pki/sb-certs/secureboot-kernel-ppc64le.cer
install -m 644 sb-certs/redhatsecureboot701.cer %{buildroot}%{_datadir}/pki/sb-certs/secureboot-grub2-ppc64le.cer
ln -sr %{buildroot}%{_datadir}/pki/sb-certs/secureboot-grub2-ppc64le.cer %{buildroot}%{_sysconfdir}/pki/sb-certs/secureboot-grub2-ppc64le.cer
install -m 644 sb-certs/redhatsecureboot704.cer %{buildroot}%{_datadir}/pki/sb-certs/secureboot-uki-virt-ppc64le.cer
ln -sr %{buildroot}%{_datadir}/pki/sb-certs/secureboot-uki-virt-ppc64le.cer %{buildroot}%{_sysconfdir}/pki/sb-certs/secureboot-uki-virt-ppc64le.cer
# Install s390x certs
install -m 644 sb-certs/redhatsecurebootca3.cer %{buildroot}%{_datadir}/pki/sb-certs/secureboot-ca-s390x.cer
ln -sr %{buildroot}%{_datadir}/pki/sb-certs/secureboot-ca-s390x.cer %{buildroot}%{_sysconfdir}/pki/sb-certs/secureboot-ca-s390x.cer
install -m 644 sb-certs/redhatsecureboot302.cer %{buildroot}%{_datadir}/pki/sb-certs/secureboot-kernel-s390x.cer
ln -sr %{buildroot}%{_datadir}/pki/sb-certs/secureboot-kernel-s390x.cer %{buildroot}%{_sysconfdir}/pki/sb-certs/secureboot-kernel-s390x.cer
install -m 644 sb-certs/redhatsecureboot304.cer %{buildroot}%{_datadir}/pki/sb-certs/secureboot-uki-virt-s390x.cer
ln -sr %{buildroot}%{_datadir}/pki/sb-certs/secureboot-uki-virt-s390x.cer %{buildroot}%{_sysconfdir}/pki/sb-certs/secureboot-uki-virt-s390x.cer
# Install x86_64 certs
install -m 644 sb-certs/redhatsecurebootca5.cer %{buildroot}%{_datadir}/pki/sb-certs/secureboot-ca-x86_64.cer
ln -sr %{buildroot}%{_datadir}/pki/sb-certs/secureboot-ca-x86_64.cer %{buildroot}%{_sysconfdir}/pki/sb-certs/secureboot-ca-x86_64.cer
install -m 644 sb-certs/redhatsecureboot501.cer %{buildroot}%{_datadir}/pki/sb-certs/secureboot-kernel-x86_64.cer
ln -sr %{buildroot}%{_datadir}/pki/sb-certs/secureboot-kernel-x86_64.cer %{buildroot}%{_sysconfdir}/pki/sb-certs/secureboot-kernel-x86_64.cer
install -m 644 sb-certs/redhatsecureboot502.cer %{buildroot}%{_datadir}/pki/sb-certs/secureboot-grub2-x86_64.cer
ln -sr %{buildroot}%{_datadir}/pki/sb-certs/secureboot-grub2-x86_64.cer %{buildroot}%{_sysconfdir}/pki/sb-certs/secureboot-grub2-x86_64.cer
install -m 644 sb-certs/redhatsecureboot503.cer %{buildroot}%{_datadir}/pki/sb-certs/secureboot-fwupd-x86_64.cer
ln -sr %{buildroot}%{_datadir}/pki/sb-certs/secureboot-fwupd-x86_64.cer %{buildroot}%{_sysconfdir}/pki/sb-certs/secureboot-fwupd-x86_64.cer
install -m 644 sb-certs/redhatsecureboot504.cer %{buildroot}%{_datadir}/pki/sb-certs/secureboot-uki-virt-x86_64.cer
ln -sr %{buildroot}%{_datadir}/pki/sb-certs/secureboot-uki-virt-x86_64.cer %{buildroot}%{_sysconfdir}/pki/sb-certs/secureboot-uki-virt-x86_64.cer
%clean
rm -rf %{buildroot}
%files
%defattr(0644,root,root,0755)
/etc/redhat-release
/etc/system-release
%config /etc/os-release
%config /etc/system-release-cpe
%config(noreplace) /etc/issue
%config(noreplace) /etc/issue.net
%dir %{_sysconfdir}/issue.d
/etc/dnf/protected.d/redhat-release.conf
/etc/pki/rpm-gpg/
%{_rpmmacrodir}/macros.dist
%{_docdir}/redhat-release/*
%{_prefix}/lib/systemd/system-preset/*
%{_prefix}/lib/systemd/user-preset/*
%{_prefix}/lib/sysctl.d/50-redhat.conf
%{_prefix}/lib/os-release
/etc/pki/product-default
%dir /etc/yum.repos.d
/etc/swid/swidtags.d
%{_prefix}/lib/swidtag/%{swid_regid}
/etc/pki/swid/CA/%{swid_regid}
%files eula
%defattr(0644,root,root,0755)
%{_datadir}/redhat-release/EULA
%files -n redhat-sb-certs
# Note to future packagers:
# The symlinks are not %config(noreplace) intentionally. We want them to be
# restored if this package is updated.
%dir %{_sysconfdir}/pki/sb-certs
%dir %{_datadir}/pki/sb-certs
%{_sysconfdir}/pki/sb-certs/*.cer
%{_datadir}/pki/sb-certs/*.cer
%changelog
* Tue Nov 26 2024 MSVSphere Packaging Team <packager@msvsphere-os.ru> - 10.0-14.4.el10
- Rebuilt for MSVSphere 10
* Tue Oct 01 2024 Veronika Doubkova <vdoubkov@redhat.com> - 10.0-14.4
- Remove unintentional submodule/file redhat-release
- Related: RHELBLD-15684
* Tue Oct 01 2024 Veronika Doubkova <vdoubkov@redhat.com> - 10.0-14.3
- Enable kdump.service
- Resolves: RHELBLD-15917
* Wed Sep 25 2024 Veronika Dubkova <vdoubkov@redhat.com> - 10.0-14.2
- Add new SHA-256 beta2 key
- Resolves: RHELBLD-15684
* Wed Sep 25 2024 Veronika Doubkova <vdoubkov@redhat.com> - 10.0-14.1
- Fix Release version for beta
- Resolves: RHELBLD-15885
* Wed Sep 25 2024 Veronika Doubkova <vdoubkov@redhat.com> - 10.0-14.0
- Change ID_LIKE to "cento fedora"
- Resolves: RHELBLD-15885
* Wed Aug 14 2024 Veronika Doubkova <vdoubkov@redhat.com> - 10.0-14
- Enable rpcbind.service and rpcbind.socket
- Resolves: RHELBLD-15670
* Wed Aug 14 2024 Veronika Doubkova <vdoubkov@redhat.com> - 10.0-13
- Stop enabling systemd-resolved
- Resolves: RHELBLD-15665
* Fri Aug 02 2024 Veronika Doubkova <vdoubkov@redhat.com> - 10.0-12
- Migrated to SPDX license
- Resolves: RHELBLD-15545
* Fri Aug 02 2024 Veronika Doubkova <vdoubkov@redhat.com> - 10.0-11
- Set VENDOR_NAME and VENDOR_URL in os-release
- Resolves: RHELBLD-15543
* Sun Jun 09 2024 Aviv Sabadra <asabadra@redhat.com> - 10.0-10
- Fix distcore macro initialization
* Thu Jun 06 2024 Aviv Sabadra <asabadra@redhat.com> - 10.0-9
- Add distcore macro to allow dist overrides that don't mask distprefix, distsuffix, or bootstrap macros
- Resolves: RHELBLD-15284
* Wed Jun 05 2024 Veronika Doubkova <vdoubkov@redhat.com> - 10.0-8
- Add new SHA-256 redhat release 2 key
- Resolves: RHELBLD-15138
* Thu May 30 2024 Veronika Doubkova <vdoubkov@redhat.com> - 10.0-7
- Reverted last change in %{_docdir}/redhat-release/*
- Resolves: RHELBLD-15232
* Thu May 30 2024 Veronika Doubkova <vdoubkov@redhat.com> - 10.0-6
- Enable cups.service
- Resolves: RHELBLD-15232
* Tue May 14 2024 Veronika Doubkova <vdoubkov@redhat.com> - 10.0-5
- Enable tuned.service
- Resolves: RHELBLD-15135
* Wed May 01 2024 Brian Stinson <bstinson@redhat.com> - 10.0-4
- Set the appropriate release name for RHEL 10
In honor of Tom Coughlan
Resolves: RHEL-35227
* Wed Apr 24 2024 Veronika Doubkova <vdoubkov@redhat.com> - 10.0-3
- Update BUG_REPORT_URL to use issues.redhat.com
- Resolves: RHELBLD-14752
* Fri Apr 05 2024 Veronika Doubkova <vdoubkov@redhat.com> - 10.0-2
- Add ISV container signing key
- Resolves: RHELBLD-14813
* Thu Mar 14 2024 Veronika Doubkova <vdoubkov@redhat.com> - 10.0-1
- Importing all presets from Fedora ELN
- Resolves: RHELBLD-14714
* Tue Aug 22 2023 Veronika Doubkova <vdoubkov@redhat.com> - 10.0-0
- Initial RHEL10 Beta build
- Resolves: RHELBLD-12707
* Thu Jul 20 2023 Veronika Doubkova <vdoubkov@redhat.com> - 9.4-0.0
- Add RHEL-9.4 Beta product ID certs
- Resolves: RHELBLD-13198
* Thu Apr 06 2023 Stephen Gallagher <sgallagh@redhat.com> - 9.3-0.3
- Enable obex.service
- Resolves: rhbz#2181984
* Tue Feb 21 2023 Stephen Gallagher <sgallagh@redhat.com> - 9.3-0.2
- Remove ostree-readonly-sysroot-migration service from preset
- Resolves: RHELBLD-12180
* Tue Feb 14 2023 Stephen Gallagher <sgallagh@redhat.com> - 9.3-0.1
- Enable ostree-readonly-sysroot-migration service
- Resolves: RHELPLAN-147614
* Thu Jan 19 2023 Aviv Sabadra <asabadra@redhat.com> - 9.3-0.0
- Add RHEL-9.3 Beta product ID certs
- Resolves: RHELBLD-11465
* Mon Dec 12 2022 Veronika Doubkova <vdoubkov@redhat.com> - 9.2-0.10
- Remove redundant slash in the symlink //usr/lib/os-release
- Resolves: RHELBLD-11698
* Wed Nov 09 2022 Veronika Doubkova <vdoubkov@redhat.com> - 9.2-0.9
- Remove the "License" field for the redhat-release-eula subpackage
- Resolves: RHELBLD-11423
* Thu Oct 20 2022 Stephen Gallagher <sgallagh@redhat.com> - 9.2-0.8
- Drop debuginfod_url definition
- Related: rhbz#2112392
* Wed Oct 19 2022 Veronika Doubkova <vdoubkov@redhat.com> - 9.2-0.7
- Change documentation URL
- Resolves: RHELBLD-11161
* Tue Oct 18 2022 Stephen Gallagher <sgallagh@redhat.com> - 9.2-0.6
- Fix debuginfo_url definition
- Related: rhbz#2112392
* Tue Sep 20 2022 Veronika Doubkov <vdoubkov@redhat.com> - 9.2-0.5
- Updated product certificate
- Resolves: RHELBLD-10819
* Mon Sep 12 2022 Amit Shah <amitshah@fedoraproject.org> - 9.2-0.4
- Add new distribution-specific macros for package configurations
* Thu Jul 28 2022 Stephen Gallagher <sgallagh@redhat.com> - 9.2-0.3
- Include %%{?distsuffix} in %%dist definition
- Resolves: rhbz#2100579
* Thu Jul 28 2022 Stephen Gallagher <sgallagh@redhat.com> - 9.2-0.2
- Enable greenboot-service-monitor.service in presets
- Resolves: rhbz#2108625
* Wed Jul 27 2022 Veronika Doubkova <vdoubkov@redhat.com> - 9.2-0.1
- Enable clevis-luks-askpass.path
- Resolves: RHELBLD-10332
* Wed Jul 20 2022 Aviv Sabadra <asabadra@redhat.com> - 9.2-0.0
- Add RHEL-9.2 Beta product ID certs
- Resolves: RHELBLD-10195
* Fri Jul 08 2022 bstinson@redhat.com - 9.1-1.5
- Update ppc64le secureboot certs
- Resolves: rhbz#2104308
* Mon Jun 20 2022 Veronika Doubkova <vdoubkov@redhat.com> - 9.1-1.4
- Updated productIDs
- Resolves: RHELBLD-10117
* Wed Mar 16 2022 Veronika Doubkova <vdoubkov@redhat.com> - 9.1-1.3
- Updated redhat-release-9.0.tar.gz
- Resolves: rhbz#2060785
* Mon Mar 07 2022 Veronika Doubkova <vdoubkov@redhat.com> - 9.1-1.2
- Updated redhat-release-9.0.tar.gz
- Resolves: rhbz#2060346
* Thu Mar 03 2022 Stephen Gallagher <sgallagh@redhat.com> - 9.1-1.1
- Sign grub2 on ppc64le properly
- Related: rhbz#1873860
- Enable switcheroo-control.service
- Resolves: rhbz#2049627
* Wed Feb 02 2022 Aviv Sabadra <asabadra@redhat.com> - 9.1-1.0
- Add RHEL-9.1 Beta product ID certs
Resolves: RHELBLD-8723
* Thu Jan 06 2022 Stephen Gallagher <sgallagh@redhat.com> - 9.0-2.12
- Add LOGO to os-release(5) data
Resolves: rhbz#2031998
* Thu Nov 18 2021 Timothée Ravier <tim@siosm.fr> - 9.0-2.11
- Create and own /etc/issue.d directory
- Resolves: rhbz#2024610
* Fri Nov 12 2021 Stephen Gallagher <sgallagh@redhat.com> - 9.0-2.10
- Add preset to enable WirePlumber by default
- Resolves: rhbz#2022717
* Wed Oct 13 2021 Stephen Gallagher <sgallagh@redhat.com> - 9.0-2.9
- Enable new service presets
- Enable preset for low-memory-monitor
Resolves: rhbz#2013299
- Enable preset for greenboot
Resolves: rhbz#2005552
- Enable preset for power-profiles-daemon
Resolves: rhbz#2011240
* Tue Sep 14 2021 Veronika Doubkova <vdoubkov@redhat.com> - 9.0-2.8
- Fix Beta string
- Resolves: RHELBLD-7362
* Fri Sep 10 2021 Stephen Gallagher <sgallagh@redhat.com> - 9.0-2.7
- Fix incorrect symlink introduced accidentally
- Related: rhbz#2002496
* Thu Sep 09 2021 Stephen Gallagher <sgallagh@redhat.com> - 9.0-2.6
- Add secure boot certificates
- Resolves: rhbz#2002496
* Wed Sep 01 2021 Stephen Gallagher <sgallagh@redhat.com> - 9.0-2.5
- Drop nfs-convert.service preset
- Related: rhbz#1937811
* Tue Aug 17 2021 Veronika Doubkova - 9.0-2.4
- Add product ID certs and SWID tags back to beta
- Resolves: RHELBLD-7109
* Tue Aug 03 2021 Aviv Sabadra <asabadra@redhat.com> - 9.0-2.3
- Add SWID tags.
- Resolves: RHELBLD-6664
* Mon Aug 02 2021 Stephen Gallagher <sgallagh@redhat.com> - 9.0-2.2
- Fix macros test
- Related: rhbz#1985500
* Mon Aug 02 2021 Stephen Gallagher <sgallagh@redhat.com> - 9.0-2.1
- Move RPM macros to /usr on behalf of Neal Gompa
- Resolves: rhbz#1985500
* Thu Jul 29 2021 Aviv Sabadra - 9.0-2.0.el9
- Add RHEL-9.0 GA product ID certs
- Resolves: RHELBLD-6663
* Tue Jul 27 2021 Veronika Doubkova - 9.0-1.8.el9
- Updated ProductIDs
- Resolves: RHELBLD-6794
* Mon Jul 26 2021 Stephen Gallagher <sgallagh@redhat.com> - 9.0-1.7.el9
- Add presets for pipewire services from Neal Gompa
- Related: rhbz#1956854
* Mon Jul 26 2021 Josh Boyer <jwboyer@redhat.com> - 9.0-1.6.el9
- Add preset for SDDM from Neal Gompa
- Resolves: RhBug 1985511
* Fri Jul 02 2021 Veronika Doubkova <vdoubkov@redhat.com> - 9.0-1.5.el9
- Enable logrotate.timer
- Resolves: RHELBLD-6668
* Wed Apr 28 2021 Aviv Sabadra <asabadra@redhat.com> - 9.0-1.4.el9
- Added SWID tags
- Resolves: RHELBLD-1993
* Tue Apr 06 2021 Veronika Doubkova <vdoubkov@redhat.com> - 9.0-1.3.el9
- Modified cpe strings
- Resolves: RHELBLD-5042
* Tue Mar 23 2021 Josh Boyer <jwboyer@redhat.com> - 9.0-1.2.el9
- Add sysctl.d presets
- Resolves: RhBug 1925547
* Wed Mar 10 2021 Veronika Doubkova <vdoubkov@redhat.com> - 9.0-1.1.el9
- Fix typo in changelog
- Related: RHELBLD-4843
* Wed Mar 10 2021 Veronika Doubkova <vdoubkov@redhat.com> - 9.0-1.0.el9
- Bump release to 1.0 and update the define beta
- Resolves: RHELBLD-4843
* Tue Mar 09 2021 Veronika Doubkova <vdoubkov@redhat.com> - 9.0-0.13.el9
- Enable iscsi service files
- Resolves: RHELPLAN-69897
* Wed Feb 17 2021 Aviv Sabadra <asabadra@redhat.com> - 9.0-0.12.el9
- Added SHA256 signed productids
- Resolves: RHELBLD-4538
* Wed Jan 06 2021 Stephen Gallagher <sgallagh@redhat.com> - 9.0-0.11.el9
- Include %%__bootstrap macro to support golang packages
* Wed Dec 16 2020 Josh Boyer <jwboyer@redhat.com> - 9.0-0.10.el9
- Adjust PRETTY_NAME
- Start ostree-mount and mlocate-updatedb by default
- Add DOCUMENTATION_URL
* Tue Dec 15 2020 Aviv Sabadra <asabadra@redhat.com> - 9.0-0.9.el9
- Adding productids. RHELBLD-4065
* Thu Dec 10 2020 Petr Šabata <contyk@redhat.com> - 9.0-0.8.el9
- Reverting the dist tag change post-mass rebuild
* Mon Dec 07 2020 Petr Šabata <contyk@redhat.com> - 9.0-0.7.el9.1
- Bump the %%dist tag to el9.1 for the gcc11 mass rebuild
* Tue Nov 17 2020 Troy Dawson<tdawson@redhat.com> - 9.0-0.7.el9
- Add distprefix to %{dist}
- Cleanup old, unneeded comments
* Mon Nov 02 2020 Stephen Gallagher <sgallagh@redhat.com> - 9.0-0.6.el9
- Add platform definition for modules
- Add codename
* Thu Oct 29 2020 Jan Kaluza <jkaluza@redhat.com> - 9.0-0.5.el9
- Enable dbus and dbus-broker by default to fix Anaconda installer.
* Mon Oct 12 2020 Josh Boyer <jwboyer@redhat.com> - 9.0-0.4.el9
- Adjust EULA
- Resolves: rhbz#1886860
* Sun Oct 11 2020 Aviv Sabadra <asabadra@redhat.com> - 9.0-0.3.el9
- Removed tarballs from the repo
- Resolves: RHELBLD-3105
* Tue Oct 06 2020 Aviv Sabadra <asabadra@redhat.com> - 9.0-0.2.el9
- Add RHEL-9.0 Beta product ID certs
- Resolves: RHELBLD-2542
* Tue Jul 07 2020 Djordje Todorovic <dtodorov@redhat.com>
- Rebuild for RHEL-9.0 bootstrapping
Loading…
Cancel
Save