<feed xmlns='http://www.w3.org/2005/Atom'>
<title>pkgsrc/security/mozilla-rootcerts-openssl, branch pkgsrc-2021Q2</title>
<subtitle>[no description]</subtitle>
<id>https://git.osdyson.ru/mirror/pkgsrc/atom?h=pkgsrc-2021Q2</id>
<link rel='self' href='https://git.osdyson.ru/mirror/pkgsrc/atom?h=pkgsrc-2021Q2'/>
<link rel='alternate' type='text/html' href='https://git.osdyson.ru/mirror/pkgsrc/'/>
<updated>2021-01-11T22:50:37Z</updated>
<entry>
<title>mozilla-rootcerts: update to 20201204 data</title>
<updated>2021-01-11T22:50:37Z</updated>
<author>
<name>wiz</name>
<email>wiz@pkgsrc.org</email>
</author>
<published>2021-01-11T22:50:37Z</published>
<link rel='alternate' type='text/html' href='https://git.osdyson.ru/mirror/pkgsrc/commit/?id=2dc727b5cfa987e1c754f02f97d7d90bd0bb9960'/>
<id>urn:sha1:2dc727b5cfa987e1c754f02f97d7d90bd0bb9960</id>
<content type='text'>
</content>
</entry>
<entry>
<title>mozilla-rootcerts-openssl: update to 2.5.</title>
<updated>2020-11-29T18:36:15Z</updated>
<author>
<name>wiz</name>
<email>wiz@pkgsrc.org</email>
</author>
<published>2020-11-29T18:36:15Z</published>
<link rel='alternate' type='text/html' href='https://git.osdyson.ru/mirror/pkgsrc/commit/?id=eead57befa548465aebc27b3a3fb1d245b3657d2'/>
<id>urn:sha1:eead57befa548465aebc27b3a3fb1d245b3657d2</id>
<content type='text'>
Sync with mozilla-rootcerts.</content>
</entry>
<entry>
<title>mozilla-rootcerts*: remove Kamu SM from the list of certificates.</title>
<updated>2020-06-12T10:35:11Z</updated>
<author>
<name>maya</name>
<email>maya@pkgsrc.org</email>
</author>
<published>2020-06-12T10:35:11Z</published>
<link rel='alternate' type='text/html' href='https://git.osdyson.ru/mirror/pkgsrc/commit/?id=f3a18c95be1eb8587c2c116651ab8114fb150938'/>
<id>urn:sha1:f3a18c95be1eb8587c2c116651ab8114fb150938</id>
<content type='text'>
Mozilla only trusts this for Turkish domains, see:
https://wiki.mozilla.org/CA/Additional_Trust_Changes

And users of mozilla-rootcerts likely don't implement the same fine-grained
trust.

Proposed on tech-pkg</content>
</entry>
<entry>
<title>mozilla-rootcerts-openssl: sync w/ mozilla-rootcerts</title>
<updated>2020-05-30T12:56:54Z</updated>
<author>
<name>tnn</name>
<email>tnn@pkgsrc.org</email>
</author>
<published>2020-05-30T12:56:54Z</published>
<link rel='alternate' type='text/html' href='https://git.osdyson.ru/mirror/pkgsrc/commit/?id=34cd4b217abc3e441feafa41712841c35c5d4cc4'/>
<id>urn:sha1:34cd4b217abc3e441feafa41712841c35c5d4cc4</id>
<content type='text'>
</content>
</entry>
<entry>
<title>mozilla-rootcerts-openssl: Minor DESCR fixups</title>
<updated>2020-03-27T17:00:01Z</updated>
<author>
<name>gdt</name>
<email>gdt@pkgsrc.org</email>
</author>
<published>2020-03-27T17:00:01Z</published>
<link rel='alternate' type='text/html' href='https://git.osdyson.ru/mirror/pkgsrc/commit/?id=c9099ed8d99b9520054c793b48e6a1cef8da349a'/>
<id>urn:sha1:c9099ed8d99b9520054c793b48e6a1cef8da349a</id>
<content type='text'>
Mention the manual script approach, almost parenthetically, in the See
also part about mozilla-rootcerts.</content>
</entry>
<entry>
<title>mozilla-rootcerts-openssl: Revise and extend DESCR</title>
<updated>2020-03-27T13:42:53Z</updated>
<author>
<name>gdt</name>
<email>gdt@pkgsrc.org</email>
</author>
<published>2020-03-27T13:42:53Z</published>
<link rel='alternate' type='text/html' href='https://git.osdyson.ru/mirror/pkgsrc/commit/?id=8795a2a7bf95547de7daa0aec1ee2bbeb1d7742e'/>
<id>urn:sha1:8795a2a7bf95547de7daa0aec1ee2bbeb1d7742e</id>
<content type='text'>
Explain the purpose, and then explain the mechanism and why it is
somewhat and very irregular in the pkgsrc and native cases.

Point to mozilla-rootcerts as providing certificates without
configuring them as trust anchors.</content>
</entry>
<entry>
<title>security/mozilla-rootcerts-openssl: Allow in-pkgsrc unprivileged install</title>
<updated>2020-03-12T13:43:35Z</updated>
<author>
<name>gdt</name>
<email>gdt@pkgsrc.org</email>
</author>
<published>2020-03-12T13:43:35Z</published>
<link rel='alternate' type='text/html' href='https://git.osdyson.ru/mirror/pkgsrc/commit/?id=740dbc80451c1d5ed26b867ddf942518610f6825'/>
<id>urn:sha1:740dbc80451c1d5ed26b867ddf942518610f6825</id>
<content type='text'>
This was marked NOT_FOR_UNPRIVILEGED, but that is only appropriate
when the package (abusively, as a pre-existing well-discussed
compromise) writes outside of the pkgsrc prefix.

Patch by Jason Bacon, with general approval on tech-pkg.

ok dholland@</content>
</entry>
<entry>
<title>Update to the latest certdata.txt version available in Mozilla repo.</title>
<updated>2019-12-07T18:29:31Z</updated>
<author>
<name>sevan</name>
<email>sevan@pkgsrc.org</email>
</author>
<published>2019-12-07T18:29:31Z</published>
<link rel='alternate' type='text/html' href='https://git.osdyson.ru/mirror/pkgsrc/commit/?id=65a2b265e60bc3902deec7f264acf63330d088cb'/>
<id>urn:sha1:65a2b265e60bc3902deec7f264acf63330d088cb</id>
<content type='text'>
</content>
</entry>
<entry>
<title>mozilla-rootcerts-openssl: PLIST fix</title>
<updated>2019-05-20T09:51:24Z</updated>
<author>
<name>adam</name>
<email>adam@pkgsrc.org</email>
</author>
<published>2019-05-20T09:51:24Z</published>
<link rel='alternate' type='text/html' href='https://git.osdyson.ru/mirror/pkgsrc/commit/?id=c63820575bef3d5784daec6cee4d6bd484ecafa4'/>
<id>urn:sha1:c63820575bef3d5784daec6cee4d6bd484ecafa4</id>
<content type='text'>
</content>
</entry>
<entry>
<title>mozilla-rootcerts-openssl: bump version for previous</title>
<updated>2019-05-12T19:20:43Z</updated>
<author>
<name>maya</name>
<email>maya@pkgsrc.org</email>
</author>
<published>2019-05-12T19:20:43Z</published>
<link rel='alternate' type='text/html' href='https://git.osdyson.ru/mirror/pkgsrc/commit/?id=6d00d503871205413b369457256cba10ff28e11d'/>
<id>urn:sha1:6d00d503871205413b369457256cba10ff28e11d</id>
<content type='text'>
</content>
</entry>
</feed>
