ca-certificates-2+git20210309.21162a6-2.1 >  A `o>p9|#G& dmBYy}vq%;l^4A'킈 hU煱2eMU}Q4r˦vz VqmtaOŭKTQ =7bӼ$EZ u]V3Ωzŵe+5^qKy{fk&3ES83GԿb(mFs'?}| ҹv10fbb23698f421b377e0f76d1460de96d0327bd5bff7f37f532b2dfcbc8e407b80c077c1e9bba3f26f27d554df8daca4b55699f84Zȉ`o>p9|l3uڜB dM0~5!O jӉ#<#MekUs.dqAcF=g/>Ca*w+RnݴowKn\%b-z!-=\׿U HHx3]OH^6xn#.Ї3}٤ Q "9KK)<j{I,]˜2h|pӐ-}mb)pX,y*}>pL-4?-$d( , b$(Abs  !X! ! ! `! ! l!!!:l!\B(q8x 9 :s =#>#?#@#B#F$G$!H$!I% !X%DY%LZ%[%\%!]&!^'b)4c)d*>e*Cf*Fl*Hu*\!v*w+!x, !y,z,,,,,,,- Cca-certificates2+git20210309.21162a62.1Utilities for system wide CA certificate installationUpdate-ca-certificates is intended to keep the certificate stores of SSL libraries like OpenSSL or GnuTLS in sync with the system's CA certificate store that is managed by p11-kit.`o>sheep16jSUSE Linux Enterprise 15SUSE LLC GPL-2.0-or-laterhttps://www.suse.com/Productivity/Networking/Securityhttps://github.com/openSUSE/ca-certificateslinuxnoarch# migrate /etc/ssl/certs to a symlink if [ "$1" -ne 0 -a -d /etc/ssl/certs -a ! -L /etc/ssl/certs ]; then # copy custom pem files to new location (bnc#875647) mkdir -p /etc/pki/trust/anchors for cert in /etc/ssl/certs/*.pem; do test -f "$cert" -a ! -L "$cert" || continue read firstline < "$cert" # skip package provided certificates (bnc#875647) if test "${firstline#\# generated by }" != "${firstline}" || rpm -qf "$cert" > /dev/null; then continue fi # create a p11-kit header that set the label of # the certificate to the file name. That ensures # that the certificate gets the same name in # /etc/ssl/certs as before bn="${cert##*/}" ( cat <<-EOF # created by update-ca-certificates from # $cert [p11-kit-object-v1] class: certificate label: "${bn%.pem}" trusted: true EOF cat $cert ) > "/etc/pki/trust/$bn" done mv -T --backup=numbered /etc/ssl/certs /etc/ssl/certs.rpmsave && ln -s /var/lib/ca-certificates/pem /etc/ssl/certs fi if [ -x /usr/bin/systemctl ]; then test -n "$FIRST_ARG" || FIRST_ARG="$1" [ -d /var/lib/systemd/migrated ] || mkdir -p /var/lib/systemd/migrated || : for service in ca-certificates.path ca-certificates.service ; do sysv_service=${service%.*} if [ ! -e /usr/lib/systemd/system/$service ] && [ ! -e /etc/init.d/$sysv_service ]; then mkdir -p /run/systemd/rpm/needs-preset touch /run/systemd/rpm/needs-preset/$service elif [ -e /etc/init.d/$sysv_service ] && [ ! -e /var/lib/systemd/migrated/$sysv_service ]; then /usr/sbin/systemd-sysv-convert --save $sysv_service || : mkdir -p /run/systemd/rpm/needs-sysv-convert touch /run/systemd/rpm/needs-sysv-convert/$service fi done fiif [ -s /etc/ca-certificates.conf ]; then while read line; do [ ${line#\!} != "$line" ] || continue cert="${line#\!*/}" ln -s /usr/share/ca-certificates/anchors/"$cert" /etc/pki/trust/blacklist done < /etc/ca-certificates.conf echo "/etc/ca-certificates.conf converted and saved as /etc/ca-certificates.conf.rpmsave" mv /etc/ca-certificates.conf /etc/ca-certificates.conf.rpmsave fi # force rebuilding all certificate stores. # This also makes sure we update the hash links in /etc/ssl/certs # as openssl changed the hash format between 0.9.8 and 1.0 update-ca-certificates -f || true if [ -x /usr/bin/systemctl ]; then test -n "$FIRST_ARG" || FIRST_ARG="$1" [ -d /var/lib/systemd/migrated ] || mkdir -p /var/lib/systemd/migrated || : if [ "$YAST_IS_RUNNING" != "instsys" ]; then /usr/bin/systemctl daemon-reload || : fi for service in ca-certificates.path ca-certificates.service ; do sysv_service=${service%.*} if [ -e /run/systemd/rpm/needs-preset/$service ]; then /usr/bin/systemctl preset $service || : rm "/run/systemd/rpm/needs-preset/$service" || : elif [ -e /run/systemd/rpm/needs-sysv-convert/$service ]; then /usr/sbin/systemd-sysv-convert --apply $sysv_service || : rm "/run/systemd/rpm/needs-sysv-convert/$service" || : touch /var/lib/systemd/migrated/$sysv_service || : fi done fi test -n "$FIRST_ARG" || FIRST_ARG="$1" if [ "$FIRST_ARG" -eq 0 -a -x /usr/bin/systemctl ]; then # Package removal, not upgrade /usr/bin/systemctl --no-reload disable ca-certificates.path ca-certificates.service || : ( test "$YAST_IS_RUNNING" = instsys && exit 0 test -f /etc/sysconfig/services -a \ -z "$DISABLE_STOP_ON_REMOVAL" && . /etc/sysconfig/services test "$DISABLE_STOP_ON_REMOVAL" = yes -o \ "$DISABLE_STOP_ON_REMOVAL" = 1 && exit 0 /usr/bin/systemctl stop ca-certificates.path ca-certificates.service ) || : fiif [ "$1" -eq 0 ]; then rm -rf /var/lib/ca-certificates/pem /var/lib/ca-certificates/openssl fi test -n "$FIRST_ARG" || FIRST_ARG="$1" if [ $1 -eq 0 ]; then # Package removal for service in ca-certificates.path ca-certificates.service ; do sysv_service="${service%.*}" rm "/var/lib/systemd/migrated/$sysv_service" || : done fi if [ -x /usr/bin/systemctl ]; then /usr/bin/systemctl daemon-reload || : fi if [ "$FIRST_ARG" -ge 1 ]; then # Package upgrade, not uninstall if [ -x /usr/bin/systemctl ]; then ( test "$YAST_IS_RUNNING" = instsys && exit 0 test -f /etc/sysconfig/services -a \ -z "$DISABLE_RESTART_ON_UPDATE" && . /etc/sysconfig/services test "$DISABLE_RESTART_ON_UPDATE" = yes -o \ "$DISABLE_RESTART_ON_UPDATE" = 1 && exit 0 /usr/bin/systemctl try-restart ca-certificates.path ca-certificates.service ) || : fi fi&:5FWAAAAAAAAA큤A큤A큤AAAAA큤AmAm`o>`o>`o>`o>`o>`o>`o>`o>`o>`o>`o>`o>`o>`o>`o>`o>`o>`o>`o>`o>`GSx`o>`GSx`o>`o>`o>`o>`o>`o>`o>`o>`o>`o>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-certificates/ca-bundle.pem/var/lib/ca-certificates/pemservice@@rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootca-certificates-2+git20210309.21162a6-2.1.src.rpmca-certificatesjava-ca-certificates@      /bin/bash/bin/sh/bin/sh/bin/sh/bin/shcoreutilscoreutilsfindutilsfindutilsopenssl(cli)p11-kitp11-kit-toolsp11-kit-toolsrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)0.23.13.0.4-14.6.0-14.0-15.2-14.14.1`S@`Gc@[:@ZZ2gZ*~Z@YV@YGVC-U@UQT^lnussel@suse.delnussel@suse.dejsikes@suse.dekukuk@suse.dekukuk@suse.dekukuk@suse.comkukuk@suse.delnussel@suse.dekukuk@suse.delnussel@suse.delnussel@suse.delnussel@suse.deledest@gmail.com- openssl is no longer required but coreutils and findutils are (boo#1183680). Keep openssl(cli) at runtime for now nevertheless as this package might be the only one pulling it in.- backport bash rewrite from Factory to make sure to trigger in transactional mode (boo#1179884)- Changed "openssl" requirement to "openssl(cli)" * (bsc#1101470)- Use %license instead of %doc [bsc#1082318]- Revert last change since we fixed systemd-preset-branding and this requires is no longer needed.- Re-add systemd requires, else package will be installed to early and services never enabled [bsc#1071776].- Don't require systemd, since we could be used in environments like container images, where we don't have systemd. If systemd is installed the systemd units will be used, else they are not needed.- Update to version 2+git20170807.10b2785: * Check TRANSACTIONAL_UPDATE is set (boo#1045942) * Add systemd units- Run update-ca-certificate by systemd unit when the content of one of the paths changes. Needed for read-only root and/or transactional updates.- Update to version 2+git20151110.c15593c: + set proper umask (boo#948724)- require p11-kit-tools >= 0.23.1- Update to version 2+git20150324.e3ee392: + p11-kit 0.23.1 supports pem-directory-hash now - use service file to generate tarball- fix bashism in postun script/bin/sh/bin/sh/bin/sh/bin/shjava-ca-certificatesopenssl-certssheep16 1617903105  !2+git20210309.21162a6-2.12+git20210309.21162a6-2.11 ca-certificatesupdate.dpkitrustanchorsblacklistsslca-bundle.pemcertsca-certificatesupdate.d50java.run70openssl.run80etc_ssl.run99certbundle.runca-certificates.pathca-certificates.servicercca-certificatesupdate-ca-certificatesca-certificatesREADMEca-certificatesCOPYINGupdate-ca-certificates.8.gzpkitrustanchorsblacklistca-certificatesca-bundle.pemjava-cacertsopensslpem/etc//etc/ca-certificates//etc/pki//etc/pki/trust//etc/ssl//usr/lib//usr/lib/ca-certificates//usr/lib/ca-certificates/update.d//usr/lib/systemd/system//usr/sbin//usr/share/doc/packages//usr/share/doc/packages/ca-certificates//usr/share/licenses//usr/share/licenses/ca-certificates//usr/share/man/man8//usr/share//usr/share/pki//usr/share/pki/trust//var/lib//var/lib/ca-certificates/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:SLE-15-SP3:GA/standard/bf633a7efc7feb907b46fd8dee96581d-ca-certificatescpioxz5noarch-suse-linuxdirectoryBourne-Again shell script, ASCII text executableASCII texttroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)emptyRRRRRL>_㒃Ś.hCca-certificates-mozillautf-8bbaa74ed8314458277e39dc6e7f25ad73c6dfa4e74aa608d983bd21878baa78d?@7zXZ !t/}(l] crt:bLL zJ s@`.\lM]R^W3NѵRAu=ZʓN.*!}rSrpB(Dڪ Q•_/Ï,(L&!YE!m*aKLK9Bۮ';QQo6$Ziw2`#,KC?\Rw}4 "YnCҧbaĵ@ R 225؉%V<-6NkNV`P C*L%7URi&&BAƀjQd!8<-% U OLxHIe2Umư+_&E2#U9bf#`- / fό#Z.oVls Ja h Z-k'$`U-/]=8"tW3] KS<=j[U8I~D>4V4tG9VI ٿ{&ϲ8 KDͣ?ܔ}t9 $/OYѰkIXi萹T'*Cج! '~&Ki%0Ǟ L/ӁPFVf|6T([j0 1diC}{ R1C0Y-Lo3-NpN'7/,iϫ"Gnaz "E%:/ LkGz7)A6ŋ^\Ui"^ddVW `g1ѿi:\z3җyشq1ȔnW7/Intޗy[!j&\ M^lP=`c%$'g*K}55VqjB ivvSw=uL8l`O{.M3$K,r-Pۚfx;HT|ēe::E{gKJ]!SGqpOڱv#E2Cj$ԙ2fw@B3vgǹVV xTȢC$^!LY %mȎdSq84lLJBT(5m>[ W|o2U#4" Ey'B;ٸ]];flH?a8:bD㏿^%rXR^l3F!cYx"Z~u%€y ãӺMyP*EHLP?]ʹζX8NߧPHAG RFdweS+%{s#oo2cUn5KEO%g-O 5߉;+TjeaaǤ7 =PoNm&eUu頞?$j݊yG R^9K};PWX6T~6~MZA9t퀳7^P i2IۿMjƬ߹AlܩY4+J씶j?Ks%x}($\mC50^Vx$iUkIgp;͵pZ#J]?i=mTA>~YʍJnʳgWq<E4|דgff>m[ni-6U":^nZjIOcF^_ fd{e-C2-%E &XV[,8 GP8FPiAn3)_nK NVPM -1(e ߉KCv;ëo%h:EiIpσsYno\=9+kzo-;l?jOhmh[ /'WImZ]O|Y'RM:°ьOuT+ڈ "`*=]5_Y֮,C A+4u1 ]J}5 '4na4nog^4MA,ϥP :muQl6UU 8:Ծf?+?uDkxVu\߳P*CERc(P9g7ŖMDkzϽ+<B+1n-~u #}Q:53`8W@sk 2|S)7t גOjLNب4p].V ۴" :)س5ibYmGib[^:r(Or[TNsx*C5!@H#哙vt2*Ο8DuYJq6>$h4KO] `BMnYbm"+r]|"q"Nl;<[lu^k- 8\HZahiEdQ&,<-1 }#:NCg`}"E#&;vLX[d;apC+ P"Q1Io#D`˻ISVgiM}e6Fo+C'2r7G)hs触rBۚ@|]8i2`1K]ܖOڬAO</7tW$v RqX $퐾ޕ(.RޱA0=rfhmIGIQnNHĈզlZ2" EaC!qKkdOi&i~ݛ&T"^G -M7з&xpncCiN6T)R 玟2m"5WAbtCW= U>֐ƍQ `&#ʜJJD &u)^ySYTaG9$aFͪ;W+p%0ҧ[ʣZg{ݞNu4r6axk9 k'?=oaSq\AMw֎PcA"gfn uHm߬!)= c?Bl(7,RuPk[KdCW!Qixu,^'M"cֿNBS%)9*㢇&3mҰc4^FrO93b!JZ ZNz fu ;PӒ~j4Xyn!P-4Ju}G2#p䬎xe~C#(Ϡy=S8쌀T1ݙH"_/[hg7'ͦ&Dk8[w ʯL fF Hh lyFk@PPO&]-?S_4/ tЭdd~فSi񹗖׳tdttW!`61KdI#Zۛj#֕X'2BEteaÖi zfփ543n$c$Xʋ3K3PHI/D;jȂm|`6 VF฾0):%~LO^`LGu61IiMnaKbs]r6=ya&*7, ]>>XSkvQS$(XnS<8yqT/rxG+- (|A"ZM#ch,Pq(KTt(=qǎ-L'a tA\JwKZ6~$*r.IFvwG=?@z>?|Ɔ%R}~D1hƟj'KM[̽ 2Dy:'Ӡǘwljyx6ɺaW jrQјDK#xĶ}\o/B5RM֏u^C8~OKAѧ"KSd-mMɒFu%jAXN W.Q) >-7lWވ^!*WWbni#!T+5wa/ п* c)1/ aףР`e_?e ;4 27Th [c&`24ZZkqT~@x6dasT`RLF|8:($YG@ [8Z?*>(Tѝ$%?|ɳo\->}TdGK^ Q]9 /`H4/ꪦ4Zr 3orp7o3ƥQl\~xVޤLݞq?k.3Q46YyrĔg e0){xnXI;{>"ဃ9  1&0ni^S^1"6=h|SJx&G.ʌ-&әhѦx E"8wԑbEvarH :%ꪮdq1G/)5&-FCKQ?[ %1:d`^:^嬺NYyQp&c?}IUyzxCbR %PFԹj[u?lu^F!-Ls5uU?ɩ\.UaL-,/ܤԌR MƝн<wn% _eF.A}0%M;s|%ZǞMȕ Ek)GҾ~$H}G(njqDfг&һSpׄ?&RPn70o2ǂ(pքnawΨrJq</x?p|Zvo. ո}mTg=/,]['QQgHZt4a05ZCjcM cug[Nps2X)y (,J؟3bZEN< =4L;C|ܭfmƺCӆv8M!(I* |p™$_{  Nc1P z@@߂,B$( BGwكQ MFVP?ux藙Y5r_ë':_0k2åU l0TL];LJ7}CvMY2S%m7AT ) [} XAf*{ ?$bAyI jH9n >;CcOqT .W՗> E w^$4Dh'meUN.wAqr|h?pa Zf!yNЋy+?5(pGIT^#'`/ʡgc#[,.ۺiyyC+37?>65#Xwjw"(F]1L"Ken9ܣ9P$F8Շ3y}`H1Fsⱦ[rN;tf$7Zbw#֗~~:~$>e 6sr9Sƒ &,j};]wDHH84}Ep$Sv _(>N_`Aa!n@JJ'ofifo P9eL^Ci܃giWĕs\-0d+uL 8ACY7Fg]InO񧷏( #IϵU}UE(/WNͥNiY)hO)TF&])3G):.l5OAqC{p dZb~ ЫCT &~/lO6ё&{5'9]\\Sް?ef&gXlBeP< T=_܁RY3@9MhFٴqr"kmKla3?dt>x>C#Mk]Wy{BT E]CxE83-W886Pg3V}NİC`J~W%T# 0Aw I2_26|2#[P^z)ϵ5:]nL6)y.c^8ؑ-3a%&heK3a*!@^Rm9Gܭ2rٍ#AC6~WqyAHXVۑc65s h-7JyC o+HSP k2q/P1b}}9t}Tsp;FyqD5WJ+V.CiԫS ynӡȸآlb!8^VfDĽch+`^ /\0K`Wnr9%edE*|SDՅϞyI7gc$ vGα /{gU^D\̛5Uϳh ^ӊ!Z˶=hS걂-am# {"oalX8Qh1۬ژ0}Ǯ><-ia_!󙂧&ԟ aBL?:'AYMgz(Q䉶 YZ