ca-certificates-2+git20170807.10b2785-lp151.7.1 >  A [ܸ/=„+CΌE$,D}WyB$ ݒbI-. g9uX@HqU3?O8|@.#tc0&:Y#̑Ew_*5l,Әڄr-Mbh0jO~9 ifr1>HSSS7׊ . P0 KB=Dpиafݽelz7 P?jȠM2e0940c4f840b6ac87a5f4d51c3c1f5a1fbb1422b4e9fba0d763a73a77e48908159a5425be6b7d7c7e2109477323fced76946bd54j[ܸ/=„pL;,?;d( 2 h $,0CL] w [  p      p    |   <t \ :( h8 p+9!+:#+=1>1?1@1B1F1G2 H2 I3 X3$Y3,Z3l[3t\3x ]3 ^5b7c7d8'e8,f8/l81u8D v8w9 x: y:z:::::::;Cca-certificates2+git20170807.10b2785lp151.7.1Utilities for system wide CA certificate installationUpdate-ca-certificates is intended to keep the certificate stores of SSL libraries like OpenSSL or GnuTLS in sync with the system's CA certificate store that is managed by p11-kit.[lamb21p'openSUSE Leap 15.1openSUSEGPL-2.0-or-laterhttps://bugs.opensuse.orgProductivity/Networking/Securityhttps://github.com/openSUSE/ca-certificateslinuxnoarch# migrate /etc/ssl/certs to a symlink if [ "$1" -ne 0 -a -d /etc/ssl/certs -a ! -L /etc/ssl/certs ]; then # copy custom pem files to new location (bnc#875647) mkdir -p /etc/pki/trust/anchors for cert in /etc/ssl/certs/*.pem; do test -f "$cert" -a ! -L "$cert" || continue read firstline < "$cert" # skip package provided certificates (bnc#875647) if test "${firstline#\# generated by }" != "${firstline}" || rpm -qf "$cert" > /dev/null; then continue fi # create a p11-kit header that set the label of # the certificate to the file name. That ensures # that the certificate gets the same name in # /etc/ssl/certs as before bn="${cert##*/}" ( cat <<-EOF # created by update-ca-certificates from # $cert [p11-kit-object-v1] class: certificate label: "${bn%.pem}" trusted: true EOF cat $cert ) > "/etc/pki/trust/$bn" done mv -T --backup=numbered /etc/ssl/certs /etc/ssl/certs.rpmsave && ln -s /var/lib/ca-certificates/pem /etc/ssl/certs fi test -n "$FIRST_ARG" || FIRST_ARG="$1" # disable migration if initial install under systemd [ -d /var/lib/systemd/migrated ] || mkdir -p /var/lib/systemd/migrated || : if [ "$FIRST_ARG" -eq 1 ]; then for service in ca-certificates.path ca-certificates.service ; do sysv_service="${service%.*}" touch "/var/lib/systemd/migrated/$sysv_service" || : done else for service in ca-certificates.path ca-certificates.service ; do # The tag file might have been left by a preceding # update (see 1059627) rm -f "/run/rpm-ca-certificates-update-$service-new-in-upgrade" if [ ! -e "/usr/lib/systemd/system/$service" ]; then touch "/run/rpm-ca-certificates-update-$service-new-in-upgrade" fi done for service in ca-certificates.path ca-certificates.service ; do sysv_service="${service%.*}" if [ -e /var/lib/systemd/migrated/$sysv_service ]; then continue fi if [ ! -x /usr/sbin/systemd-sysv-convert ]; then continue fi /usr/sbin/systemd-sysv-convert --save $sysv_service || : done fiif [ -s /etc/ca-certificates.conf ]; then while read line; do [ ${line#\!} != "$line" ] || continue cert="${line#\!*/}" ln -s /usr/share/ca-certificates/anchors/"$cert" /etc/pki/trust/blacklist done < /etc/ca-certificates.conf echo "/etc/ca-certificates.conf converted and saved as /etc/ca-certificates.conf.rpmsave" mv /etc/ca-certificates.conf /etc/ca-certificates.conf.rpmsave fi # force rebuilding all certificate stores. # This also makes sure we update the hash links in /etc/ssl/certs # as openssl changed the hash format between 0.9.8 and 1.0 update-ca-certificates -f || true test -n "$FIRST_ARG" || FIRST_ARG="$1" [ -d /var/lib/systemd/migrated ] || mkdir -p /var/lib/systemd/migrated || : if [ "$YAST_IS_RUNNING" != "instsys" -a -x /usr/bin/systemctl ]; then /usr/bin/systemctl daemon-reload || : fi if [ "$FIRST_ARG" -eq 1 ]; then if [ -x /usr/bin/systemctl ]; then /usr/bin/systemctl preset ca-certificates.path ca-certificates.service || : fi elif [ "$FIRST_ARG" -gt 1 ]; then for service in ca-certificates.path ca-certificates.service ; do if [ ! -e "/run/rpm-ca-certificates-update-$service-new-in-upgrade" ]; then continue fi rm -f "/run/rpm-ca-certificates-update-$service-new-in-upgrade" if [ ! -x /usr/bin/systemctl ]; then continue fi /usr/bin/systemctl preset "$service" || : done for service in ca-certificates.path ca-certificates.service ; do sysv_service=${service%.*} if [ -e /var/lib/systemd/migrated/$sysv_service ]; then continue fi if [ ! -x /usr/sbin/systemd-sysv-convert ]; then continue fi /usr/sbin/systemd-sysv-convert --apply $sysv_service || : touch /var/lib/systemd/migrated/$sysv_service || : done fi test -n "$FIRST_ARG" || FIRST_ARG="$1" if [ "$FIRST_ARG" -eq 0 -a -x /usr/bin/systemctl ]; then # Package removal, not upgrade /usr/bin/systemctl --no-reload disable ca-certificates.path ca-certificates.service || : ( test "$YAST_IS_RUNNING" = instsys && exit 0 test -f /etc/sysconfig/services -a \ -z "$DISABLE_STOP_ON_REMOVAL" && . /etc/sysconfig/services test "$DISABLE_STOP_ON_REMOVAL" = yes -o \ "$DISABLE_STOP_ON_REMOVAL" = 1 && exit 0 /usr/bin/systemctl stop ca-certificates.path ca-certificates.service ) || : fiif [ "$1" -eq 0 ]; then rm -rf /var/lib/ca-certificates/pem /var/lib/ca-certificates/openssl fi test -n "$FIRST_ARG" || FIRST_ARG="$1" if [ "$FIRST_ARG" -ge 1 ]; then # Package upgrade, not uninstall if [ -x /usr/bin/systemctl ]; then /usr/bin/systemctl daemon-reload || : ( test "$YAST_IS_RUNNING" = instsys && exit 0 test -f /etc/sysconfig/services -a \ -z "$DISABLE_RESTART_ON_UPDATE" && . /etc/sysconfig/services test "$DISABLE_RESTART_ON_UPDATE" = yes -o \ "$DISABLE_RESTART_ON_UPDATE" = 1 && exit 0 /usr/bin/systemctl try-restart ca-certificates.path ca-certificates.service ) || : fi else # package uninstall for service in ca-certificates.path ca-certificates.service ; do sysv_service="${service%.*}" rm -f "/var/lib/systemd/migrated/$sysv_service" || : done if [ -x /usr/bin/systemctl ]; then /usr/bin/systemctl daemon-reload || : fi fi&: o FWAAAAAAAA큤A큤A큤AAAAA큤AmAm[[[[[[[[[[[[[[[[[[[Yq[Yq[[[[[[[[[[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-certificates/ca-bundle.pem/var/lib/ca-certificates/pemservice@@rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootca-certificates-2+git20170807.10b2785-lp151.7.1.src.rpmca-certificatesjava-ca-certificates@ @     /bin/bash/bin/sh/bin/sh/bin/sh/bin/sh/usr/bin/perlcoreutilsopensslopenssl(cli)p11-kitp11-kit-toolsp11-kit-toolsrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)0.23.13.0.4-14.6.0-14.0-15.2-14.14.1[:@ZZ2gZ*~Z@YV@YGVC-U@UQT^S@SuS@SǺSS @SkqSB@S>R@R^RRQQ)@Q4Q4QONS@M6@L@KuKKKK@K@K@KKKJason Sikes kukuk@suse.dekukuk@suse.dekukuk@suse.comkukuk@suse.delnussel@suse.dekukuk@suse.delnussel@suse.delnussel@suse.delnussel@suse.deLed lnussel@suse.delnussel@suse.delnussel@suse.demeissner@suse.comlnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.dehrvoje.senjan@gmail.comlnussel@suse.delnussel@suse.delnussel@suse.decoolo@suse.comlnussel@suse.delnussel@suse.demvyskocil@suse.czlnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.de- Changed "openssl" requirement to "openssl(cli)" * (bsc#1101470)- Use %license instead of %doc [bsc#1082318]- Revert last change since we fixed systemd-preset-branding and this requires is no longer needed.- Re-add systemd requires, else package will be installed to early and services never enabled [bsc#1071776].- Don't require systemd, since we could be used in environments like container images, where we don't have systemd. If systemd is installed the systemd units will be used, else they are not needed.- Update to version 2+git20170807.10b2785: * Check TRANSACTIONAL_UPDATE is set (boo#1045942) * Add systemd units- Run update-ca-certificate by systemd unit when the content of one of the paths changes. Needed for read-only root and/or transactional updates.- Update to version 2+git20151110.c15593c: + set proper umask (boo#948724)- require p11-kit-tools >= 0.23.1- Update to version 2+git20150324.e3ee392: + p11-kit 0.23.1 supports pem-directory-hash now - use service file to generate tarball- fix bashism in postun script- use rpm -qf to determine if a ssl cert is owned by some other package and therefore doesn't need to be migrated (related to bnc#890205).- add p11 kit header to set label of migrated certificates to the file name of the previous one (bnc#890205)- removed the version in the Obsoletes. The package in SLE11 got version updated (bnc#887099).- clarify the start order of the generators, as certbundle.run semi-depends on etc_ssl.run via a timestamp. (bnc#883386)- fix directory permissions for real this time (bnc#871639)- don't keep certificates with marker (bnc#875647)- copy custom pem files in /etc/ssl/certs to /etc/pki/anchors on update (bnc#875647)- Fix typo in man page- package correct permissions of generated directories (bnc#871639)- etc_ssl.run: fix typo - turn /etc/ssl/certs into a symlink to /var/lib/ca-certificates/pem- fix typo in README (bnc#845500) - remove old extractcerts.pl- re-enable the CA bundle again for glib-networking (bnc#825903)- make sure we have p11-kit >= 0.19.3 which has the 'trust' command (bnc#836560)- don't remove symlinks to other locations in /etc/ssl/certs - use the trust binary instead of p11-kit to extract trust- disable generating ca-bundle for now again so people don't submit new packages that use this file.- Explicitly require p11-kit, otherwise trusted certificates won't be generated- update manpage- use p11-kit to generate the files- give hint about SSL_CTX_set_default_verify_paths in cert bundle- require coreutils for %post script- fix spurious rpm warning if no java exists (bnc#634793) - move java.run to java-ca-certificates- catch FileNotFoundException (bnc#623365)* Use the gcc-java and fastjar for build to avoid dependency problems * build keystore.class only to allow noarch package- create java bundles- also use hooks from /usr/lib/ca-certificates/update.d - replace bundle file with symlink to file in /var as it's auto generated- force rebuilding all certificate stores in %post This also makes sure we update the hash links in /etc/ssl/certs as openssl changed the hash format between 0.9.8 and 1.0- actually install certbundle.run (bnc#594501)- it's ca-bundle.pem rather than cert.pem- obsolete openssl-certs (bnc#594434) - update manpage (bnc#594501)- include /etc/ca-certificates.conf as %ghost- generate ca-bundle with hook script - don't use trusted certificates in ca-bundle file for compatibility with gnutls- new package/bin/sh/bin/sh/bin/sh/bin/shjava-ca-certificatesopenssl-certslamb21 1539354325  2+git20170807.10b2785-lp151.7.12+git20170807.10b2785-lp151.7.11 ca-certificatesupdate.dpkitrustanchorsblacklistca-bundle.pemcertsca-certificatesupdate.d50java.run70openssl.run80etc_ssl.run99certbundle.runca-certificates.pathca-certificates.servicercca-certificatesupdate-ca-certificatesca-certificatesREADMEca-certificatesCOPYINGupdate-ca-certificates.8.gzpkitrustanchorsblacklistca-certificatesca-bundle.pemjava-cacertsopensslpem/etc//etc/ca-certificates//etc/pki//etc/pki/trust//etc/ssl//usr/lib//usr/lib/ca-certificates//usr/lib/ca-certificates/update.d//usr/lib/systemd/system//usr/sbin//usr/share/doc/packages//usr/share/doc/packages/ca-certificates//usr/share/licenses//usr/share/licenses/ca-certificates//usr/share/man/man8//usr/share//usr/share/pki//usr/share/pki/trust//var/lib//var/lib/ca-certificates/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Leap:15.1/standard/bc038ffb6707d6c3e76e73cd8cd7309e-ca-certificatescpioxz5noarch-suse-linuxdirectoryBourne-Again shell script, ASCII text executablePerl script text executableASCII texttroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)emptyRRRRRwu`/{LLca-certificates-mozillautf-8273e4214ba882c741b0b050c28e9bd500079e00da53aa7b38e55a4a6ff1b5e27?@7zXZ !t/*] crt:bLL Dx 6KWК <R1)pvd-)u92 $ {pE}jw:kZk3 qNҪm3>nknhwV- Yv=4-P u~y_* SݽMM".L*@CJqxh_'P9GoY:629swZCcl8r.[B2\/Cw#UpN#uٽs[yI&/>8yFpaNGV@5kH\ YRrWY:wn"TKV _g9-uPTZ__DcɌ{ݝv6ޙ6]4j ZƸ[@:8ɒ,z@ q.]ɥ棯>9*>t6崡c:TҀ#΢j!wx8w}<w.kTXV!Ӵݎ|!|dSR*Q( ,rX3&1X\lz4AcaHPm#tk)"uJh\S;~߯!\q;D]yg,bK oGoq=պ~8M'Cӹrk;8Iܜ |nM0FӐ?稟B'͜tZC_|NXşřu#`rh l'+`WB)CAT?X/@R`֣qOU`u  ]=㿺%1, 9!?1٠nV@YLev3Sު=>)֝XUf=:\ۥILOŒZf.2c-cf(F%S,C/IKk;0U& ،RN5)> N*[pV'km*uܕl[l{d=u$̳ ,mo>AK3>b>*Y6b9s%P`HSP %BabR)KF1?=%)S3zQpHp&NCp:ƛtQȾpʗvw53.ҹSSdx3%6BƸ@O[|[L $ϖh7^^w^\+{ i<75lZ ?fz r )Iʂ9} ́^#8doD͹$1ن UN+! b^X' Y.t x~~StNW堫vj )I3hnR5“#u=o%~'ɒP,3&YMo|WMVKB=!hr(UMjs!X\qE#xQu֦D&xq:ef6CܻZ߮d͵EP..đ<[&$jd һC<9WiR 4N|zE7Þp7#$CR/]45V s'E<…^ꆿ)ZI0r\N- 1٪{!'Fb%&h%m@-,n:n"gFFjő-nT\0=sK4\bBw֚X-)]Pb ,frb [lJOQ.TPk~+ӳDK[@w2m%I8Wo]ru̹$aËtv1-xͺ;8_RIDDҝ':"lݨKF|3YpDU)"x([)[! YoF\C-AV&.BCJʊ q@X 1Y6M8gk@!P&m7lbrwZKk/^\kȻU2n)Xes>e$>+rj7{QzH}'F=Ì69~ei!3iO >z1|nQ;#m.` o `p!8^$/u>otՓ(2}/(1XVO!M$e}_uR,܊PYչ)9$M?@`X 1%_+#d[^'A"84'#Wz`Pht e9ڀvV *,-O,ۭ}h"Ůxn'`ѻP=N3B&_+>$'ɍ jٟ*С*SUno&ů}s̄Ig T\c/HV=/__;Mp}lϗusQx䎡QӉ o~Lm$So}k|ڝ; j?L z!0s?}-5½mp&qw;=E^?* ٯ! /l\ e#Xt.H{fVDjn$7*G))sZ)1Kq!`\I!kzٔrR{"v*)E4i~58XT"zBsZ1' X)79DC$j|_3ϨSj C'mGg*7{3Ċ:9JFDҧJ;s*Ls+noj;ZK_UcE|lMr+v1ÞV1|_~7U?t=װߢ 5괶 $us/vQ|,mXlHza5f45Għ1)dtEJvﮃ>@RDh/{B;&5+TlflZEĹT%-kcn6ivC3OҢ\^$E*15l]mT2אU>l!FlBc5w콠4VIAQs-0ڿ:\xA648e@݃t&3 !d=O'_W^|̌\R)rT땅jt{gaRqԺ[gxHPTAe $ĴOɻs(wP2f@Zi&L^עܾ~`%܊3f-v8f)gltDSh:aGNt ̠_qٵBy+V_4 G ~idNi6XGH:XSe hrJ|m9g3 _:H/z0[R!aj4QQ|IX-oM䒸ģp{FSslw&cNeoѽ))i*̞djNJQQ^91N F6!&(?j`]褤jW0,~)k= v0V`H֦5Ajݕ8/0wsG#̇CUP3 p$7a6*Ojܟ< HE%YoywF,q؏{. !$XWh TTA 2cgGR-OD&OS90ܙ Gz1_B\UQ6u=FfcOP>V}ഭ:dO?LQq;λqmdaH &ݢ~5-@YTv-(r.==EWq֗~R?)wh|J=-rPPowPEmנG@(𦰉[K/UF"ļe{bճpQdX2^L&@ڪ_f͙]͘lj ֳQޟ &0N"G.ކ SOd}r'iu1;|v@Cټxt6S(5xH.%-D*^g+n6H4[n=@򊴦o׬}bTʋ׌k~CDSm\|F'+!b&"WNj1J8:an\ CP>LMEaB3vJw b UX8 2Uc[FxRyJ`l-<A$CDb|PuD\$ "׀&Urs_(98_V(r2L^tE142`">_vh$IɇEJk l-)/ruxwr;d^(rD|Gk"xd_e)(PxF9|cX`3H#Yzw'W֣.7ŀyG}9rF⇡7zHJ#ЬrPϼw۔'!9')̒|d {7oI"fK}C }-]f]5X51C:= Ћ8=Y5%ӣ<>VcecVcV'~q4' }K-C26^trocs()Drh;;v~'hٯҚqKTU^Ah%;<%ۙ]>1tg;X8638Y'_ܧrie9.2[,aa%P2ΐ mx%D?;S/{+SRL7)mVmC+6Zr8{fgd{1Y,'ܐt ~›6i f+DTC^P\do5{ ؒmHGTmmtlEl 9:n{"ס!5X*!Jk+CmpSCǣLnZf/9It:/ciap|3O2 7@Te -&3xB4Wk~׬V׎ʩ0U"oD钛h>4iOJg >%%w/&\0o@׸Z=4}Գ6BA?.nSd||tBdy&Wa>';=&+kEAPō/ZNghv%zO9Yk0]e#Md'4xzkwFVdz22n/Q\Sk?<<؏,7T@|V ՟<rw/ZaAw96@e.]->>d7mjKPS秔ʁW eHZmI+TZTh1{o 7*~R*s*҃Q%HCF+kgWULAo$TӿRSqmR^`\rgL\N_qD "n|"@ercKRRǁ.g-|/#?5Yy~72.W}*|+Ɵ*kc{`v,UxZ}U>TmF|ʚ%Q"^㟪3?U^Wq">X'>nη}FD6A[ۅA%'8 |D.b]^|kq'U=c,e00>4 zivIcZ# ĕ vN+V;ܯUpvbB9"t-7Y8=lk+^f֚~d#Q#Z= ۱NM t%ΈҖP)K)C$uJU/ n[ȅÝTńG沘$-NL`_gNWvW^X+ˢ @8#;Fѫ-I4y8j(xE XBI"CWS\'*qz{͡tz?_S}2UO^fōbN}vaUҩtɪ$kj^͐&}p^i4;y<ؒr'{5D5x0dbJb''"vȕaFM\NYdRWkcn*i`g?p|]RsN&_Af[4mCk@XSz-Q0XгW^&[S՜o4q^T#Lc'v-iBCZ鶬;JPO11 xJ 卢/m)*p}wkH% ^M*-,UJ[avA89̠g=6ჿ hv {zD3s$* 1.is(=&P+#~p 8n00˶n 'De˧NĪJs>a=jwa<ĘE*)]!/ rc&Qf84Ao,Mv B%kb=48Oi$~ eЎ3^:׊V}-qFZb`zDƵ.=>ΎI׸ƌq`~SyQkd$Q+6yZ^u !/8ߎ#-=A2{TdGn\1Kyb}( vX1@~"~+"mZ; ̮YBPS48舿l8&7L'mPGK{G/kQ}#wϸ?p?I@(vsθi\){i=J3㌩e: |T83FšXѳ.()1PL15)TT.*.%0c` 5ۗ7\vWGcfZ\;䤪Wtsw/Ԓ]"xCӕb%GڳeBB7\$+Sh4/~fak n]C̎A8Ԡ 'Gk.-$JVCjIb‹3LT&pSt@t rF.k^B"d _.=W-@=DLQ_Xz|i]COH/\S7e>bd+N[}" xb ̻?]ubs^/"lqQ։JE ˜ eMc C܆[IS"J-sڏEV (P")ʗ틄l34aŀ9DZBYC$}HpϙurT=WnT\[LxaYʣ~0q<䗓>4x dH8l_cl֓T|j >îʝB]þh D !Rnk?hL-w` $ :žzx{JenFN 3bL.8'mǪτ=<9=X/2K\}}ݰ׋j??xOiDMu@sGwZ.(Nq 2MD8-trjM10smҍlLy_J:ʿ\wRb? Z]l",bgP;=ߧIyŠΗ@wN&p`$g+0G@N (zf:u\Gqr`ǜF6s#6&;r,,#Ĉ.Cdanak ~Y\|qA  txyO+jZҺcuj<-4R3'wq6C7 v8 % jʬp Hx_k .·&zQm|":zwz߀fRk=u dNNUUw-K<6eҙ_"W!.n$9Tܨ ۠RThm"m%2I#Uvc;l^0Վ-eD"),D[&2y~2Ww+8Ы|QX酒CETPi:p1˹W L坌V/Mҽ%g(Ɛ4JWg4zt=W+vQ,EC!p$ ˃vgnkt遼W]e,eʖ:Wk|giyl{XnD#||_s⸮z<є!Ba9a]us~%Bi X~*P>(_I"%+W/m%i }V DF+S\A] EO ;Wa%Ny*A`( \_ l)L#)ʕkǀ bfN'N~; j&Y8Nt-hvN~ě`7DJ*/ثD%_6(w-UE`v@4=e=KJY)x Ѳ~N,&غ(Bs~@h/ZJjRyvͬp2sVW9 2QugDXn2W驏MK H])3䱸Im8yf}eYLYI8[jܢ! [ eAo3ƺ85W5m0:z3#YͰNw!ZE}u|-U,(m.3$I6#G}6 oJIS<𜴷|oЛB9Ճ!}) ܳ'tn5} ^DƵr*a/ -QB&$-qQ{,=0N|l^s]t$yP2'Ed51*l*Ψ]$R@ d,*-WUo3λDԼZs}rYR? ߯QU!jk YZ