معرفی شرکت ها


ca-certificates-2021.2.50-80.0.el8_4.noarch.rpm


Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر

توضیحات

The Mozilla CA root certificate bundle
ویژگی مقدار
سیستم عامل Linux
توزیع AlmaLinux 8
مخزن AlmaLinux BaseOS noarch
نام بسته ca-certificates
نام فایل بسته ca-certificates-2021.2.50-80.0.el8_4.noarch.rpm
نسخه بسته 2021.2.50
انتشار بسته 80.0.el8_4
معماری بسته noarch
نگهدارنده -
تاریخ ساخت Tue 21 Sep 2021 05
هاست سازنده buildfarm02
نوع بسته .rpm
آدرس صفحه اصلی https://fedoraproject.org/wiki/CA-Certificates
مجوز Public Domain
حجم دانلود 389K
حجم نصب 908.445K
This package contains the set of CA certificates chosen by the Mozilla Foundation for use with the Internet PKI.


جایگزین ها

بسته نسخه معماری مخزن
ca-certificates-2022.2.54-80.2.el8_6.noarch.rpm 2022.2.54 noarch AlmaLinux BaseOS


نیازمندی

مقدار نام
- /bin/sh
- /bin/sh
- /bin/sh
- /bin/sh
- bash
- bash
= 2021.2.50-80.0.el8_4 config(ca-certificates)
- coreutils
- grep
- grep
>= 0.23.12 p11-kit
>= 0.23.12 p11-kit
>= 0.23.12 p11-kit-trust
>= 0.23.12 p11-kit-trust
- sed
- sed


ارائه دهنده

مقدار نام
= 2021.2.50-80.0.el8_4 ca-certificates
= 2021.2.50-80.0.el8_4 config(ca-certificates)


نحوه نصب


نصب پکیج rpm ca-certificates:

    dnf install ca-certificates-2021.2.50-80.0.el8_4.noarch.rpm


فایل ها

مسیرها
/etc/pki/ca-trust
/etc/pki/ca-trust/README
/etc/pki/ca-trust/ca-legacy.conf
/etc/pki/ca-trust/extracted
/etc/pki/ca-trust/extracted/README
/etc/pki/ca-trust/extracted/edk2/README
/etc/pki/ca-trust/extracted/edk2/cacerts.bin
/etc/pki/ca-trust/extracted/java
/etc/pki/ca-trust/extracted/java/README
/etc/pki/ca-trust/extracted/java/cacerts
/etc/pki/ca-trust/extracted/openssl
/etc/pki/ca-trust/extracted/openssl/README
/etc/pki/ca-trust/extracted/openssl/ca-bundle.trust.crt
/etc/pki/ca-trust/extracted/pem
/etc/pki/ca-trust/extracted/pem/README
/etc/pki/ca-trust/extracted/pem/email-ca-bundle.pem
/etc/pki/ca-trust/extracted/pem/objsign-ca-bundle.pem
/etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem
/etc/pki/ca-trust/source
/etc/pki/ca-trust/source/README
/etc/pki/ca-trust/source/anchors
/etc/pki/ca-trust/source/blacklist
/etc/pki/ca-trust/source/ca-bundle.legacy.crt
/etc/pki/java
/etc/pki/java/cacerts
/etc/pki/tls
/etc/pki/tls/cert.pem
/etc/pki/tls/certs
/etc/pki/tls/certs/ca-bundle.crt
/etc/pki/tls/certs/ca-bundle.trust.crt
/etc/ssl
/etc/ssl/certs
/usr/bin/ca-legacy
/usr/bin/update-ca-trust
/usr/share/man/man8/ca-legacy.8.gz
/usr/share/man/man8/update-ca-trust.8.gz
/usr/share/pki
/usr/share/pki/ca-trust-legacy
/usr/share/pki/ca-trust-legacy/ca-bundle.legacy.default.crt
/usr/share/pki/ca-trust-legacy/ca-bundle.legacy.disable.crt
/usr/share/pki/ca-trust-source
/usr/share/pki/ca-trust-source/README
/usr/share/pki/ca-trust-source/anchors
/usr/share/pki/ca-trust-source/blacklist
/usr/share/pki/ca-trust-source/ca-bundle.trust.p11-kit


گزارش تغییرات

تاریخ آخرین تغییر جزئیات
2021-06-16

Update to CKBI 2.50 from NSS 3.67
version number update only

2021-06-11

Update to CKBI 2.48 from NSS 3.66
Removing:
# Certificate "Verisign Class 3 Public Primary Certification Authority - G3"
# Certificate "GeoTrust Global CA"
# Certificate "GeoTrust Universal CA"
# Certificate "GeoTrust Universal CA 2"
# Certificate "QuoVadis Root CA"
# Certificate "Sonera Class 2 Root CA"
# Certificate "Taiwan GRCA"
# Certificate "GeoTrust Primary Certification Authority"
# Certificate "thawte Primary Root CA"
# Certificate "VeriSign Class 3 Public Primary Certification Authority - G5"
# Certificate "GeoTrust Primary Certification Authority - G3"
# Certificate "thawte Primary Root CA - G2"
# Certificate "thawte Primary Root CA - G3"
# Certificate "GeoTrust Primary Certification Authority - G2"
# Certificate "VeriSign Universal Root Certification Authority"
# Certificate "VeriSign Class 3 Public Primary Certification Authority - G4"
# Certificate "Trustis FPS Root CA"
# Certificate "EE Certification Centre Root CA"
# Certificate "LuxTrust Global Root 2"
# Certificate "Symantec Class 1 Public Primary Certification Authority - G4"
# Certificate "Symantec Class 2 Public Primary Certification Authority - G4"
Adding:
# Certificate "Microsoft ECC Root Certificate Authority 2017"
# Certificate "Microsoft RSA Root Certificate Authority 2017"
# Certificate "e-Szigno Root CA 2017"
# Certificate "certSIGN Root CA G2"
# Certificate "Trustwave Global Certification Authority"
# Certificate "Trustwave Global ECC P256 Certification Authority"
# Certificate "Trustwave Global ECC P384 Certification Authority"
# Certificate "NAVER Global Root Certification Authority"
# Certificate "AC RAIZ FNMT-RCM SERVIDORES SEGUROS"
# Certificate "GlobalSign Secure Mail Root R45"
# Certificate "GlobalSign Secure Mail Root E45"
# Certificate "GlobalSign Root R46"
# Certificate "GlobalSign Root E46"
# Certificate "GLOBALTRUST 2020"
# Certificate "ANF Secure Server Root CA"
# Certificate "Certum EC-384 CA"
# Certificate "Certum Trusted Root CA"

2020-06-17

fix post issues

2020-06-10

Update to CKBI 2.41 from NSS 3.53.0
Removing:
# Certificate "AddTrust Low-Value Services Root"
# Certificate "AddTrust External Root"
# Certificate "UTN USERFirst Email Root CA"
# Certificate "Certplus Class 2 Primary CA"
# Certificate "Deutsche Telekom Root CA 2"
# Certificate "Staat der Nederlanden Root CA - G2"
# Certificate "Swisscom Root CA 2"
# Certificate "Certinomis - Root CA"
Adding:
# Certificate "Entrust Root Certification Authority - G4"

2019-06-21

Update to CKBI 2.32 from NSS 3.44
Removing:
# Certificate "Visa eCommerce Root"
# Certificate "AC Raiz Certicamara S.A."
# Certificate "ComSign CA"
# Certificate "Certplus Root CA G1"
# Certificate "Certplus Root CA G2"
# Certificate "OpenTrust Root CA G1"
# Certificate "OpenTrust Root CA G2"
# Certificate "OpenTrust Root CA G3"
Adding:
# Certificate "GlobalSign Root CA - R6"
# Certificate "OISTE WISeKey Global Root GC CA"
# Certificate "GTS Root R1"
# Certificate "GTS Root R2"
# Certificate "GTS Root R3"
# Certificate "GTS Root R4"
# Certificate "UCA Global G2 Root"
# Certificate "UCA Extended Validation Root"
# Certificate "Certigna Root CA"
# Certificate "emSign Root CA - G1"
# Certificate "emSign ECC Root CA - G3"
# Certificate "emSign Root CA - C1"
# Certificate "emSign ECC Root CA - C3"
# Certificate "Hongkong Post Root CA 3"

2019-05-10

Test gating

2018-08-13

Use __python3 macro when invoking Python

2018-06-28

Ported scripts to python3

2018-06-11

Extract certificate bundle in EDK2 format, suggested by Laszlo Ersek

2018-06-04

Adjust ghost file permissions, rhbz#1564432

2018-05-18

Update to CKBI 2.24 from NSS 3.37

2018-03-14

Update Python 2 dependency declarations to new packaging standards

2018-02-23

Add post dep on coreutils for ln(1)

2018-02-06

Update to CKBI 2.22 from NSS 3.35

2018-01-22

Depend on bash, grep, sed. Required for ca-legacy script execution.
p11-kit is already required at %post execution time. (rhbz#1537127)

2018-01-19

Use the force, script! (Which sln did by default).