Page MenuHomeSolus

D7096.id.diff
No OneTemporary

D7096.id.diff

diff --git a/README b/README
deleted file mode 100644
--- a/README
+++ /dev/null
@@ -1 +0,0 @@
-Placeholder README for Solus Operating System packages
diff --git a/actions.py b/actions.py
deleted file mode 100644
--- a/actions.py
+++ /dev/null
@@ -1,14 +0,0 @@
-
-#!/usr/bin/python
-
-
-from pisi.actionsapi import shelltools, get, autotools, pisitools
-
-from pisi.actionsapi.shelltools import system
-
-def build():
- system ("./build_certs.sh")
-
-def install():
- pisitools.insinto ("/etc/ssl/certs", "certs/*.pem")
- pisitools.insinto ("/etc/ssl/certs", "BLFS-ca-bundle*.crt", "ca-certificates.crt")
diff --git a/comar/package.py b/comar/package.py
deleted file mode 100644
--- a/comar/package.py
+++ /dev/null
@@ -1,6 +0,0 @@
-#!/usr/bin/env python
-import os
-
-def postInstall(fromVersion, fromRelease, toVersion, toRelease):
- os.system ("c_rehash")
-
diff --git a/component.xml b/component.xml
deleted file mode 100644
--- a/component.xml
+++ /dev/null
@@ -1,3 +0,0 @@
-<PISI>
- <Name>system.base</Name>
-</PISI>
diff --git a/files/build_certs.sh b/files/build_certs.sh
deleted file mode 100755
--- a/files/build_certs.sh
+++ /dev/null
@@ -1,8 +0,0 @@
-#!/bin/bash
-
-url="http://anduin.linuxfromscratch.org/BLFS/other/certdata.txt"
-
-curl $url -o certdata.txt &&
-unset url &&
-./make-ca.sh &&
-./remove-expired-certs.sh certs
diff --git a/files/make-ca.sh b/files/make-ca.sh
deleted file mode 100755
--- a/files/make-ca.sh
+++ /dev/null
@@ -1,102 +0,0 @@
-#!/bin/sh
-# Begin make-ca.sh
-# Script to populate OpenSSL's CApath from a bundle of PEM formatted CAs
-#
-# The file certdata.txt must exist in the local directory
-# Version number is obtained from the version of the data.
-#
-# Authors: DJ Lucas
-# Bruce Dubbs
-#
-# Version 20120211
-
-# Some data in the certs have UTF-8 characters
-export LANG=en_US.utf8
-
-certdata="certdata.txt"
-
-if [ ! -r $certdata ]; then
- echo "$certdata must be in the local directory"
- exit 1
-fi
-
-REVISION=$(grep CVS_ID $certdata | cut -f4 -d'$')
-
-if [ -z "${REVISION}" ]; then
- echo "$certfile has no 'Revision' in CVS_ID"
- exit 1
-fi
-
-VERSION=$(echo $REVISION | cut -f2 -d" ")
-
-TEMPDIR=$(mktemp -d)
-TRUSTATTRIBUTES="CKA_TRUST_SERVER_AUTH"
-BUNDLE="BLFS-ca-bundle-${VERSION}.crt"
-CONVERTSCRIPT="./make-cert.pl"
-SSLDIR="/etc/ssl"
-
-mkdir "${TEMPDIR}/certs"
-
-# Get a list of starting lines for each cert
-CERTBEGINLIST=$(grep -n "^# Certificate" "${certdata}" | cut -d ":" -f1)
-
-# Get a list of ending lines for each cert
-CERTENDLIST=`grep -n "^CKA_TRUST_STEP_UP_APPROVED" "${certdata}" | cut -d ":" -f 1`
-
-# Start a loop
-for certbegin in ${CERTBEGINLIST}; do
- for certend in ${CERTENDLIST}; do
- if test "${certend}" -gt "${certbegin}"; then
- break
- fi
- done
-
- # Dump to a temp file with the name of the file as the beginning line number
- sed -n "${certbegin},${certend}p" "${certdata}" > "${TEMPDIR}/certs/${certbegin}.tmp"
-done
-
-unset CERTBEGINLIST CERTDATA CERTENDLIST certbegin certend
-
-mkdir -p certs
-rm -f certs/* # Make sure the directory is clean
-
-for tempfile in ${TEMPDIR}/certs/*.tmp; do
- # Make sure that the cert is trusted...
- grep "CKA_TRUST_SERVER_AUTH" "${tempfile}" | \
- egrep "TRUST_UNKNOWN|NOT_TRUSTED" > /dev/null
-
- if test "${?}" = "0"; then
- # Throw a meaningful error and remove the file
- cp "${tempfile}" tempfile.cer
- perl ${CONVERTSCRIPT} > tempfile.crt
- keyhash=$(openssl x509 -noout -in tempfile.crt -hash)
- echo "Certificate ${keyhash} is not trusted! Removing..."
- rm -f tempfile.cer tempfile.crt "${tempfile}"
- continue
- fi
-
- # If execution made it to here in the loop, the temp cert is trusted
- # Find the cert data and generate a cert file for it
-
- cp "${tempfile}" tempfile.cer
- perl ${CONVERTSCRIPT} > tempfile.crt
- keyhash=$(openssl x509 -noout -in tempfile.crt -hash)
- if [ "$(file -b --mime-encoding tempfile.crt)" = "iso-8859-1" ]; then
- iconv -f iso-8859-1 -t ascii//TRANSLIT tempfile.crt -o tempfile.crt
- echo "Fix encoding for ${keyhash}"
- fi
- mv tempfile.crt "certs/${keyhash}.pem"
- rm -f tempfile.cer "${tempfile}"
- echo "Created ${keyhash}.pem"
-done
-
-# Remove blacklisted files
-# MD5 Collision Proof of Concept CA
-if test -f certs/8f111d69.pem; then
- echo "Certificate 8f111d69 is not trusted! Removing..."
- rm -f certs/8f111d69.pem
-fi
-
-# Finally, generate the bundle and clean up.
-cat certs/*.pem > ${BUNDLE}
-rm -r "${TEMPDIR}"
diff --git a/files/make-cert.pl b/files/make-cert.pl
deleted file mode 100755
--- a/files/make-cert.pl
+++ /dev/null
@@ -1,49 +0,0 @@
-#!/usr/bin/perl -w
-
-# Used to generate PEM encoded files from Mozilla certdata.txt.
-# Run as ./make-cert.pl > certificate.crt
-#
-# Parts of this script courtesy of RedHat (mkcabundle.pl)
-#
-# This script modified for use with single file data (tempfile.cer) extracted
-# from certdata.txt, taken from the latest version in the Mozilla NSS source.
-# mozilla/security/nss/lib/ckfw/builtins/certdata.txt
-#
-# Authors: DJ Lucas
-# Bruce Dubbs
-#
-# Version 20120211
-
-my $certdata = './tempfile.cer';
-
-open( IN, "cat $certdata|" )
- || die "could not open $certdata";
-
-my $incert = 0;
-
-while ( <IN> )
-{
- if ( /^CKA_VALUE MULTILINE_OCTAL/ )
- {
- $incert = 1;
- open( OUT, "|openssl x509 -text -inform DER -fingerprint" )
- || die "could not pipe to openssl x509";
- }
-
- elsif ( /^END/ && $incert )
- {
- close( OUT );
- $incert = 0;
- print "\n\n";
- }
-
- elsif ($incert)
- {
- my @bs = split( /\\/ );
- foreach my $b (@bs)
- {
- chomp $b;
- printf( OUT "%c", oct($b) ) unless $b eq '';
- }
- }
-}
diff --git a/files/remove-expired-certs.sh b/files/remove-expired-certs.sh
deleted file mode 100755
--- a/files/remove-expired-certs.sh
+++ /dev/null
@@ -1,53 +0,0 @@
-#!/bin/sh
-# Begin /usr/sbin/remove-expired-certs.sh
-#
-# Version 20120211
-
-# Make sure the date is parsed correctly on all systems
-mydate()
-{
- local y=$( echo $1 | cut -d" " -f4 )
- local M=$( echo $1 | cut -d" " -f1 )
- local d=$( echo $1 | cut -d" " -f2 )
- local m
-
- if [ ${d} -lt 10 ]; then d="0${d}"; fi
-
- case $M in
- Jan) m="01";;
- Feb) m="02";;
- Mar) m="03";;
- Apr) m="04";;
- May) m="05";;
- Jun) m="06";;
- Jul) m="07";;
- Aug) m="08";;
- Sep) m="09";;
- Oct) m="10";;
- Nov) m="11";;
- Dec) m="12";;
- esac
-
- certdate="${y}${m}${d}"
-}
-
-OPENSSL=/usr/bin/openssl
-DIR=/etc/ssl/certs
-
-if [ $# -gt 0 ]; then
- DIR="$1"
-fi
-
-certs=$( find ${DIR} -type f -name "*.pem" -o -name "*.crt" )
-today=$( date +%Y%m%d )
-
-for cert in $certs; do
- notafter=$( $OPENSSL x509 -enddate -in "${cert}" -noout )
- date=$( echo ${notafter} | sed 's/^notAfter=//' )
- mydate "$date"
-
- if [ ${certdate} -lt ${today} ]; then
- echo "${cert} expired on ${certdate}! Removing..."
- rm -f "${cert}"
- fi
-done
diff --git a/package.yml b/package.yml
new file mode 100644
--- /dev/null
+++ b/package.yml
@@ -0,0 +1,25 @@
+name : ca-certs
+version : 20200513
+release : 39
+source :
+ - https://hg.mozilla.org/releases/mozilla-release/raw-file/default/security/nss/lib/ckfw/builtins/certdata.txt : f3bdcd74612952da8476a9d4147f50b29ad0710b7dd95b4c8690500209986d70
+ - https://raw.githubusercontent.com/agl/extract-nss-root-certs/492d8c9/convert_mozilla_certdata.go : 30afd0ca1df9b7788b830485645c4a2f72b07c1c9eb5c66941ae3d0b87e9e623
+license :
+ - Apache-2.0 # Conversion script
+ - MPL-2.0 # Actual cert file
+component : system.base
+summary : Certificate Authority Files
+description: |
+ The Public Key Inrastructure is used for many security issues in a Linux system. In order for a certificate to be trusted, it must be signed by a trusted agent called a Certificate Authority (CA).
+extract : no
+builddeps :
+ - golang
+setup : |
+ ln -s $sources/* $workdir
+build : |
+ go run convert_mozilla_certdata.go --to-files
+
+ # The bundle generation could be a usysconf trigger in future.
+ cat *.pem > ca-certificates.crt
+install : |
+ install -Dm00644 *.pem ca-certificates.crt -t $installdir/etc/ssl/certs
diff --git a/pspec.xml b/pspec.xml
deleted file mode 100644
--- a/pspec.xml
+++ /dev/null
@@ -1,348 +0,0 @@
-<?xml version="1.0" ?>
-<!DOCTYPE PISI SYSTEM "https://getsol.us/standard/pisi-spec.dtd">
-<PISI>
- <Source>
- <Name>ca-certs</Name>
- <Packager>
- <Name>Ikey Doherty</Name>
- <Email>ikey.doherty@gmail.com</Email>
- </Packager>
- <Summary>Certificate Authority Files</Summary>
- <Description>The Public Key Inrastructure is used for many security issues in a Linux system. In order for a certificate to be trusted, it must be signed by a trusted agent called a Certificate Authority (CA)</Description>
- <License>MPL-1.0</License>
- <Archive sha1sum="083029a13c0c475bf42a4232c68a9caa6dbc763e" type="binary">https://getsol.us/sources/README</Archive>
-
- <AdditionalFiles>
- <AdditionalFile permission="0755" target="build_certs.sh">build_certs.sh</AdditionalFile>
- <AdditionalFile permission="0755" target="make-ca.sh">make-ca.sh</AdditionalFile>
- <AdditionalFile permission="0755" target="make-cert.pl">make-cert.pl</AdditionalFile>
- <AdditionalFile permission="0755" target="remove-expired-certs.sh">remove-expired-certs.sh</AdditionalFile>
- </AdditionalFiles>
-
- <BuildDependencies>
- <Dependency>curl</Dependency>
- <Dependency>openssl</Dependency>
- </BuildDependencies>
- </Source>
-
- <Package>
- <Name>ca-certs</Name>
- <Files>
- <Path fileType="data">/etc/ssl</Path>
- </Files>
- <Provides>
- <COMAR script="package.py">System.Package</COMAR>
- </Provides>
- <RuntimeDependencies>
- <Dependency>curl</Dependency>
- <Dependency>openssl</Dependency>
- </RuntimeDependencies>
- </Package>
-
- <History>
- <Update release="38" type="security">
- <Date>01-09-2020</Date>
- <Version>20200109</Version>
- <Comment>Package bump</Comment>
- <Name>Pierre-Yves</Name>
- <Email>pyu@riseup.net</Email>
- </Update>
-
- <Update release="37" type="security">
- <Date>10-07-2019</Date>
- <Version>20190710</Version>
- <Comment>Package bump</Comment>
- <Name>Pierre-Yves</Name>
- <Email>pyu@riseup.net</Email>
- </Update>
-
- <Update release="36" type="security">
- <Date>18-02-2019</Date>
- <Version>20190218</Version>
- <Comment>Package bump</Comment>
- <Name>Pierre-Yves</Name>
- <Email>pyu@riseup.net</Email>
- </Update>
-
- <Update release="35" type="security">
- <Date>10-20-2018</Date>
- <Version>20181020</Version>
- <Comment>Package bump</Comment>
- <Name>Pierre-Yves</Name>
- <Email>pyu@riseup.net</Email>
- </Update>
-
- <Update release="34" type="security">
- <Date>05-22-2018</Date>
- <Version>20180516</Version>
- <Comment>Package bump</Comment>
- <Name>Ikey Doherty</Name>
- <Email>ikey@solus-project.com</Email>
- </Update>
-
- <Update release="33" type="security">
- <Date>05-04-2018</Date>
- <Version>20180422</Version>
- <Comment>Update system certificates to 20180422</Comment>
- <Name>Ikey Doherty</Name>
- <Email>ikey@solus-project.com</Email>
- </Update>
-
- <Update release="32" type="security">
- <Date>04-12-2018</Date>
- <Version>20180326</Version>
- <Comment>Update system certificates to 20180326</Comment>
- <Name>Ikey Doherty</Name>
- <Email>ikey@solus-project.com</Email>
- </Update>
-
- <Update release="31" type="security">
- <Date>01-13-2018</Date>
- <Version>20180110</Version>
- <Comment>Update system certificates to 20180110</Comment>
- <Name>Ikey Doherty</Name>
- <Email>ikey@solus-project.com</Email>
- </Update>
-
- <Update release="30" type="security">
- <Date>12-26-2017</Date>
- <Version>20171221</Version>
- <Comment>Package bump</Comment>
- <Name>Ikey Doherty</Name>
- <Email>ikey@solus-project.com</Email>
- </Update>
-
- <Update release="29" type="security">
- <Date>11-30-2017</Date>
- <Version>20171129</Version>
- <Comment>Update system certificates to 20171129</Comment>
- <Name>Ikey Doherty</Name>
- <Email>ikey@solus-project.com</Email>
- </Update>
-
- <Update release="28" type="security">
- <Date>11-24-2017</Date>
- <Version>20171115</Version>
- <Comment>Update system certificates to 20171115</Comment>
- <Name>Ikey Doherty</Name>
- <Email>ikey@solus-project.com</Email>
- </Update>
-
- <Update release="27" type="security">
- <Date>11-14-2017</Date>
- <Version>20171112</Version>
- <Comment>Update system certificates to version 20171112</Comment>
- <Name>Ikey Doherty</Name>
- <Email>ikey@solus-project.com</Email>
- </Update>
-
- <Update release="26" type="security">
- <Date>11-08-2017</Date>
- <Version>20171106</Version>
- <Comment>Update system certificates to version 20171106</Comment>
- <Name>Ikey Doherty</Name>
- <Email>ikey@solus-project.com</Email>
- </Update>
-
- <Update release="25" type="security">
- <Date>10-04-2017</Date>
- <Version>20170928</Version>
- <Comment>Update system certificates to version 20170928</Comment>
- <Name>Ikey Doherty</Name>
- <Email>ikey@solus-project.com</Email>
- </Update>
-
- <Update release="24" type="security">
- <Date>08-08-2017</Date>
- <Version>20170803</Version>
- <Comment>Update certificates to version 20170803</Comment>
- <Name>Ikey Doherty</Name>
- <Email>ikey@solus-project.com</Email>
- </Update>
-
- <Update release="23" type="security">
- <Date>05-04-2017</Date>
- <Version>20170427</Version>
- <Comment>Update to version 20170427</Comment>
- <Name>Ikey Doherty</Name>
- <Email>ikey@solus-project.com</Email>
- </Update>
-
- <Update release="22">
- <Date>04-13-2017</Date>
- <Version>20170411</Version>
- <Comment>Package bump</Comment>
- <Name>Ikey Doherty</Name>
- <Email>ikey@solus-project.com</Email>
- </Update>
-
- <Update release="21">
- <Date>02-24-2017</Date>
- <Version>20170217</Version>
- <Comment>Update to 20170217 snapshot</Comment>
- <Name>Ikey Doherty</Name>
- <Email>ikey@solus-project.com</Email>
- </Update>
-
- <Update release="20">
- <Date>01-28-2017</Date>
- <Version>20170125</Version>
- <Comment>Update to 20170125 snapshot</Comment>
- <Name>Ikey Doherty</Name>
- <Email>ikey@solus-project.com</Email>
- </Update>
-
- <Update release="19">
- <Date>12-08-2016</Date>
- <Version>20161124</Version>
- <Comment>Update to 20161124 snapshot</Comment>
- <Name>Ikey Doherty</Name>
- <Email>ikey@solus-project.com</Email>
- </Update>
-
- <Update release="18">
- <Date>10-20-2016</Date>
- <Version>20161018</Version>
- <Comment>Package bump</Comment>
- <Name>Ikey Doherty</Name>
- <Email>ikey@solus-project.com</Email>
- </Update>
-
- <Update release="17">
- <Date>10-16-2016</Date>
- <Version>1.87</Version>
- <Comment>Package bump</Comment>
- <Name>Ikey Doherty</Name>
- <Email>ikey@solus-project.com</Email>
- </Update>
-
- <Update release="16">
- <Date>04-07-2016</Date>
- <Version>1.87</Version>
- <Comment>Package bump</Comment>
- <Name>Ikey Doherty</Name>
- <Email>ikey@solus-project.com</Email>
- </Update>
-
- <Update release="15">
- <Date>03-08-2016</Date>
- <Version>1.87</Version>
- <Comment>Package bump</Comment>
- <Name>Ikey Doherty</Name>
- <Email>ikey@solus-project.com</Email>
- </Update>
-
- <Update release="14">
- <Date>03-05-2016</Date>
- <Version>1.87</Version>
- <Comment>Package bump</Comment>
- <Name>Ikey Doherty</Name>
- <Email>ikey@solus-project.com</Email>
- </Update>
-
- <Update release="13">
- <Date>12-17-2015</Date>
- <Version>1.87</Version>
- <Comment>Package bump</Comment>
- <Name>Ikey Doherty</Name>
- <Email>ikey@solus-project.com</Email>
- </Update>
-
- <Update release="12">
- <Date>12-02-2015</Date>
- <Version>1.87</Version>
- <Comment>Package bump</Comment>
- <Name>Ikey Doherty</Name>
- <Email>ikey@solus-project.com</Email>
- </Update>
-
- <Update release="11">
- <Date>11-09-2015</Date>
- <Version>1.87</Version>
- <Comment>Package bump</Comment>
- <Name>Ikey Doherty</Name>
- <Email>ikey@solus-project.com</Email>
- </Update>
-
- <Update release="10">
- <Date>10-27-2015</Date>
- <Version>1.87</Version>
- <Comment>Package bump</Comment>
- <Name>Ikey Doherty</Name>
- <Email>ikey@solus-project.com</Email>
- </Update>
-
- <Update release="9">
- <Date>06-17-2015</Date>
- <Version>1.87</Version>
- <Comment>Package bump</Comment>
- <Name>Ikey Doherty</Name>
- <Email>ikey@solus-project.com</Email>
- </Update>
-
- <Update release="8">
- <Date>05-01-2015</Date>
- <Version>1.87</Version>
- <Comment>Package bump</Comment>
- <Name>Ikey Doherty</Name>
- <Email>ikey@solus-project.com</Email>
- </Update>
-
- <Update release="7">
- <Date>04-21-2015</Date>
- <Version>1.87</Version>
- <Comment>Udate for security</Comment>
- <Name>Ikey Doherty</Name>
- <Email>ikey@solus-project.com</Email>
- </Update>
-
- <Update release="6">
- <Date>09-04-2014</Date>
- <Version>1.87</Version>
- <Comment>Routine update for security</Comment>
- <Name>Ikey Doherty</Name>
- <Email>ikey.doherty@gmail.com</Email>
- </Update>
-
- <Update release="5">
- <Date>03-22-2013</Date>
- <Version>1.87</Version>
- <Comment>Update URI for new bootstrap</Comment>
- <Name>Ikey Doherty</Name>
- <Email>ikey.doherty@gmail.com</Email>
- </Update>
-
- <Update release="4">
- <Date>05-25-2013</Date>
- <Version>1.87</Version>
- <Comment>Use more standard naming for ca-certificates</Comment>
- <Name>Ikey Doherty</Name>
- <Email>ikey@solusos.com</Email>
- </Update>
-
- <Update release="3">
- <Date>05-23-2013</Date>
- <Version>1.87</Version>
- <Comment>Move ca-certs into system.base</Comment>
- <Name>Ikey Doherty</Name>
- <Email>ikey@solusos.com</Email>
- </Update>
-
- <Update release="2">
- <Date>04-13-2013</Date>
- <Version>1.87</Version>
- <Comment>Add dependencies, and a postInstall to run c_rehash</Comment>
- <Name>Ikey Doherty</Name>
- <Email>ikey@solusos.com</Email>
- </Update>
-
- <Update release="1">
- <Date>04-13-2013</Date>
- <Version>1.87</Version>
- <Comment>Add ca-certs to repositories</Comment>
- <Name>Ikey Doherty</Name>
- <Email>ikey@solusos.com</Email>
- </Update>
- </History>
-
-</PISI>
diff --git a/pspec_x86_64.xml b/pspec_x86_64.xml
new file mode 100644
--- /dev/null
+++ b/pspec_x86_64.xml
@@ -0,0 +1,173 @@
+<PISI>
+ <Source>
+ <Name>ca-certs</Name>
+ <Packager>
+ <Name>Fabio Forni</Name>
+ <Email>livingsilver94.solus@redaril.me</Email>
+ </Packager>
+ <License>Apache-2.0</License>
+ <License>MPL-2.0</License>
+ <PartOf>system.base</PartOf>
+ <Summary xml:lang="en">Certificate Authority Files</Summary>
+ <Description xml:lang="en">The Public Key Inrastructure is used for many security issues in a Linux system. In order for a certificate to be trusted, it must be signed by a trusted agent called a Certificate Authority (CA).
+</Description>
+ <Archive type="binary" sha1sum="79eb0752a961b8e0d15c77d298c97498fbc89c5a">https://getsol.us/sources/README.Solus</Archive>
+ </Source>
+ <Package>
+ <Name>ca-certs</Name>
+ <Summary xml:lang="en">Certificate Authority Files</Summary>
+ <Description xml:lang="en">The Public Key Inrastructure is used for many security issues in a Linux system. In order for a certificate to be trusted, it must be signed by a trusted agent called a Certificate Authority (CA).
+</Description>
+ <PartOf>system.base</PartOf>
+ <Files>
+ <Path fileType="config">/etc/ssl/certs/ACCVRAIZ1.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/AC_RAIZ_FNMT-RCM.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Actalis_Authentication_Root_CA.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/AddTrust_External_Root.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/AffirmTrust_Commercial.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/AffirmTrust_Networking.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/AffirmTrust_Premium.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/AffirmTrust_Premium_ECC.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Amazon_Root_CA_1.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Amazon_Root_CA_2.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Amazon_Root_CA_3.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Amazon_Root_CA_4.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Atos_TrustedRoot_2011.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Autoridad_de_Certificacion_Firmaprofesional_CIF_A62634068.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Baltimore_CyberTrust_Root.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Buypass_Class_2_Root_CA.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Buypass_Class_3_Root_CA.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/CA_Disig_Root_R2.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/CFCA_EV_ROOT.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/COMODO_Certification_Authority.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/COMODO_ECC_Certification_Authority.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/COMODO_RSA_Certification_Authority.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Certigna.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Certigna_Root_CA.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Certum_Trusted_Network_CA.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Certum_Trusted_Network_CA_2.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Chambers_of_Commerce_Root_-_2008.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Comodo_AAA_Services_root.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Cybertrust_Global_Root.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/D-TRUST_Root_Class_3_CA_2_2009.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/D-TRUST_Root_Class_3_CA_2_EV_2009.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/DST_Root_CA_X3.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/DigiCert_Assured_ID_Root_CA.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/DigiCert_Assured_ID_Root_G2.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/DigiCert_Assured_ID_Root_G3.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/DigiCert_Global_Root_CA.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/DigiCert_Global_Root_G2.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/DigiCert_Global_Root_G3.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/DigiCert_High_Assurance_EV_Root_CA.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/DigiCert_Trusted_Root_G4.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/E-Tugra_Certification_Authority.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/EC-ACC.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/EE_Certification_Centre_Root_CA.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Entrust.net_Premium_2048_Secure_Server_CA.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Entrust_Root_Certification_Authority.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Entrust_Root_Certification_Authority_-_EC1.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Entrust_Root_Certification_Authority_-_G2.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Entrust_Root_Certification_Authority_-_G4.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/GDCA_TrustAUTH_R5_ROOT.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/GTS_Root_R1.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/GTS_Root_R2.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/GTS_Root_R3.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/GTS_Root_R4.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/GeoTrust_Global_CA.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/GeoTrust_Primary_Certification_Authority.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/GeoTrust_Primary_Certification_Authority_-_G2.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/GeoTrust_Primary_Certification_Authority_-_G3.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/GeoTrust_Universal_CA.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/GeoTrust_Universal_CA_2.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/GlobalSign_ECC_Root_CA_-_R4.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/GlobalSign_ECC_Root_CA_-_R5.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/GlobalSign_Root_CA.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/GlobalSign_Root_CA_-_R2.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/GlobalSign_Root_CA_-_R3.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/GlobalSign_Root_CA_-_R6.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Global_Chambersign_Root_-_2008.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Go_Daddy_Class_2_CA.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Go_Daddy_Root_Certificate_Authority_-_G2.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Hellenic_Academic_and_Research_Institutions_ECC_RootCA_2015.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Hellenic_Academic_and_Research_Institutions_RootCA_2011.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Hellenic_Academic_and_Research_Institutions_RootCA_2015.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Hongkong_Post_Root_CA_1.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Hongkong_Post_Root_CA_3.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/ISRG_Root_X1.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/IdenTrust_Commercial_Root_CA_1.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/IdenTrust_Public_Sector_Root_CA_1.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Izenpe.com.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/LuxTrust_Global_Root_2.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Microsec_e-Szigno_Root_CA_2009.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/NetLock_Arany_(Class_Gold)_Főtanúsítvány.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Network_Solutions_Certificate_Authority.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/OISTE_WISeKey_Global_Root_GA_CA.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/OISTE_WISeKey_Global_Root_GB_CA.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/OISTE_WISeKey_Global_Root_GC_CA.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/QuoVadis_Root_CA.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/QuoVadis_Root_CA_1_G3.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/QuoVadis_Root_CA_2.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/QuoVadis_Root_CA_2_G3.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/QuoVadis_Root_CA_3.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/QuoVadis_Root_CA_3_G3.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/SSL.com_EV_Root_Certification_Authority_ECC.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/SSL.com_EV_Root_Certification_Authority_RSA_R2.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/SSL.com_Root_Certification_Authority_ECC.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/SSL.com_Root_Certification_Authority_RSA.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/SZAFIR_ROOT_CA2.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/SecureSign_RootCA11.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/SecureTrust_CA.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Secure_Global_CA.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Security_Communication_RootCA2.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Security_Communication_Root_CA.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Sonera_Class_2_Root_CA.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Staat_der_Nederlanden_EV_Root_CA.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Staat_der_Nederlanden_Root_CA_-_G2.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Staat_der_Nederlanden_Root_CA_-_G3.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Starfield_Class_2_CA.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Starfield_Root_Certificate_Authority_-_G2.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Starfield_Services_Root_Certificate_Authority_-_G2.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/SwissSign_Gold_CA_-_G2.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/SwissSign_Silver_CA_-_G2.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/T-TeleSec_GlobalRoot_Class_2.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/T-TeleSec_GlobalRoot_Class_3.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/TUBITAK_Kamu_SM_SSL_Kok_Sertifikasi_-_Surum_1.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/TWCA_Global_Root_CA.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/TWCA_Root_Certification_Authority.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Taiwan_GRCA.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/TeliaSonera_Root_CA_v1.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/TrustCor_ECA-1.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/TrustCor_RootCert_CA-1.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/TrustCor_RootCert_CA-2.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Trustis_FPS_Root_CA.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/UCA_Extended_Validation_Root.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/UCA_Global_G2_Root.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/USERTrust_ECC_Certification_Authority.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/USERTrust_RSA_Certification_Authority.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/VeriSign_Class_3_Public_Primary_Certification_Authority_-_G4.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/VeriSign_Class_3_Public_Primary_Certification_Authority_-_G5.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/VeriSign_Universal_Root_Certification_Authority.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/Verisign_Class_3_Public_Primary_Certification_Authority_-_G3.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/XRamp_Global_CA_Root.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/ca-certificates.crt</Path>
+ <Path fileType="config">/etc/ssl/certs/certSIGN_ROOT_CA.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/ePKI_Root_Certification_Authority.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/emSign_ECC_Root_CA_-_C3.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/emSign_ECC_Root_CA_-_G3.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/emSign_Root_CA_-_C1.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/emSign_Root_CA_-_G1.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/thawte_Primary_Root_CA.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/thawte_Primary_Root_CA_-_G2.pem</Path>
+ <Path fileType="config">/etc/ssl/certs/thawte_Primary_Root_CA_-_G3.pem</Path>
+ </Files>
+ </Package>
+ <History>
+ <Update release="39">
+ <Date>2020-05-13</Date>
+ <Version>20200513</Version>
+ <Comment>Packaging update</Comment>
+ <Name>Fabio Forni</Name>
+ <Email>livingsilver94.solus@redaril.me</Email>
+ </Update>
+ </History>
+</PISI>
\ No newline at end of file

File Metadata

Mime Type
text/plain
Expires
May 3 2023, 5:27 PM (14 w, 2 d ago)
Storage Engine
blob
Storage Format
Raw Data
Storage Handle
5805030
Default Alt Text
D7096.id.diff (34 KB)

Event Timeline