{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":21633655,"defaultBranch":"master","name":"cfssl_trust","ownerLogin":"cloudflare","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2014-07-09T00:21:35.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/314135?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1717191958.0","currentOid":""},"activityList":{"items":[{"before":"538b6505279df6947418086cc9da59bb62dc2ad7","after":"f5a55d82c020d95b48223765ccffd12eec9f24ab","ref":"refs/heads/master","pushedAt":"2024-06-01T00:05:56.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"BowonY","name":"bowon","path":"/BowonY","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10628970?s=80&v=4"},"commit":{"message":"Merge pull request #281 from cloudflare/release/2024.5.6\n\nTrust store release 2024.5.6","shortMessageHtmlLink":"Merge pull request #281 from cloudflare/release/2024.5.6"}},{"before":null,"after":"1188f29458be78be4bb3593d486adac323c6048d","ref":"refs/heads/release/2024.5.6","pushedAt":"2024-05-31T21:45:56.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"BowonY","name":"bowon","path":"/BowonY","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10628970?s=80&v=4"},"commit":{"message":"Trust store release 2024.5.6\n\nRolling trust store release at 2024-05-31T14:45:49-0700.\n$ cfssl-trust -d ./cert.db -b int release 580h\nskipping expired certificate (SKI=341b2cc7b23e4a72533d127f4066baaeb6a4e447, serial=80544274841619, subject='/NetLock Üzleti Eat. (Class B Legal) Tanúsítványkiadó/C=HU/O=NetLock Kft./OU=Tanúsítványkiadók (Certification Services)/L=Budapest')\nskipping expired certificate (SKI=f127c4de5a3d3429b8f3ea0f8dfe76d23908cfc1, serial=80544274841620, subject='/NetLock Üzleti (Class B) Tanúsítványkiadó/C=HU/O=NetLock Kft./OU=Tanúsítványkiadók (Certification Services)/L=Budapest')\n1467 certificates rolled\n2 certificates skipped\nSuccessfully rolled new int release 2024.5.6\n$ cfssl-trust -d ./cert.db -b ca release 580h\n356 certificates rolled\n0 certificates skipped\nSuccessfully rolled new ca release 2024.5.6\nAdding new intermediates:\n--/Users/bowon/tips/wellknown/e5-cross.pem ---\nCERTIFICATE\nSubject: /E5/C=US/O=Let's Encrypt\nIssuer: /ISRG Root X1/C=US/O=Internet Security Research Group\n\tSignature algorithm: RSA / SHA256\nDetails:\n\tPublic key: ECDSA-secp384r1\n\tSerial number: 174873564306387906651619802726858882526\n\tAKI: 79:B4:59:E6:7B:B6:E5:E4:01:73:80:08:88:C8:1A:58:F6:E9:9B:6E\n\tSKI: 9F:2B:5F:CF:3C:21:4F:9D:04:B7:ED:2B:2C:C4:C6:70:8B:D2:D7:0D\n\tValid from: 2024-03-13T00:00:00+0000\n\t until: 2027-03-12T23:59:59+0000\n\tKey usages: cert sign, crl sign, digital signature\n\tExtended usages: client auth, server auth\n\tBasic constraints: valid, is a CA certificate, max path length 0\n\tSANs (0):\n\t1 AIA:\n\t\thttp://x1.i.lencr.org/\n--/Users/bowon/tips/wellknown/e6-cross.pem ---\nCERTIFICATE\nSubject: /E6/C=US/O=Let's Encrypt\nIssuer: /ISRG Root X1/C=US/O=Internet Security Research Group\n\tSignature algorithm: RSA / SHA256\nDetails:\n\tPublic key: ECDSA-secp384r1\n\tSerial number: 234397126118090224789023519560838753080\n\tAKI: 79:B4:59:E6:7B:B6:E5:E4:01:73:80:08:88:C8:1A:58:F6:E9:9B:6E\n\tSKI: 93:27:46:98:03:A9:51:68:8E:98:D6:C4:42:48:DB:23:BF:58:94:D2\n\tValid from: 2024-03-13T00:00:00+0000\n\t until: 2027-03-12T23:59:59+0000\n\tKey usages: cert sign, crl sign, digital signature\n\tExtended usages: client auth, server auth\n\tBasic constraints: valid, is a CA certificate, max path length 0\n\tSANs (0):\n\t1 AIA:\n\t\thttp://x1.i.lencr.org/\n--/Users/bowon/tips/wellknown/e7-cross.pem ---\nCERTIFICATE\nSubject: /E7/C=US/O=Let's Encrypt\nIssuer: /ISRG Root X1/C=US/O=Internet Security Research Group\n\tSignature algorithm: RSA / SHA256\nDetails:\n\tPublic key: ECDSA-secp384r1\n\tSerial number: 226581164312556911225609404641709439649\n\tAKI: 79:B4:59:E6:7B:B6:E5:E4:01:73:80:08:88:C8:1A:58:F6:E9:9B:6E\n\tSKI: AE:48:9E:DC:87:1D:44:A0:6F:DA:A2:E5:60:74:04:78:C2:9C:00:80\n\tValid from: 2024-03-13T00:00:00+0000\n\t until: 2027-03-12T23:59:59+0000\n\tKey usages: cert sign, crl sign, digital signature\n\tExtended usages: client auth, server auth\n\tBasic constraints: valid, is a CA certificate, max path length 0\n\tSANs (0):\n\t1 AIA:\n\t\thttp://x1.i.lencr.org/\n--/Users/bowon/tips/wellknown/e8-cross.pem ---\nCERTIFICATE\nSubject: /E8/C=US/O=Let's Encrypt\nIssuer: /ISRG Root X1/C=US/O=Internet Security Research Group\n\tSignature algorithm: RSA / SHA256\nDetails:\n\tPublic key: ECDSA-secp384r1\n\tSerial number: 132370213232563105872410966929454918998\n\tAKI: 79:B4:59:E6:7B:B6:E5:E4:01:73:80:08:88:C8:1A:58:F6:E9:9B:6E\n\tSKI: 8F:0D:13:A2:F6:2E:7E:D1:50:6C:33:18:38:5D:59:8E:23:72:91:CA\n\tValid from: 2024-03-13T00:00:00+0000\n\t until: 2027-03-12T23:59:59+0000\n\tKey usages: cert sign, crl sign, digital signature\n\tExtended usages: client auth, server auth\n\tBasic constraints: valid, is a CA certificate, max path length 0\n\tSANs (0):\n\t1 AIA:\n\t\thttp://x1.i.lencr.org/\n--/Users/bowon/tips/wellknown/e9-cross.pem ---\nCERTIFICATE\nSubject: /E9/C=US/O=Let's Encrypt\nIssuer: /ISRG Root X1/C=US/O=Internet Security Research Group\n\tSignature algorithm: RSA / SHA256\nDetails:\n\tPublic key: ECDSA-secp384r1\n\tSerial number: 83840359685249281117050969311267445779\n\tAKI: 79:B4:59:E6:7B:B6:E5:E4:01:73:80:08:88:C8:1A:58:F6:E9:9B:6E\n\tSKI: 5D:77:D1:4D:AC:4D:22:78:59:B2:86:59:8E:43:1C:B7:64:59:13:41\n\tValid from: 2024-03-13T00:00:00+0000\n\t until: 2027-03-12T23:59:59+0000\n\tKey usages: cert sign, crl sign, digital signature\n\tExtended usages: client auth, server auth\n\tBasic constraints: valid, is a CA certificate, max path length 0\n\tSANs (0):\n\t1 AIA:\n\t\thttp://x1.i.lencr.org/\n--/Users/bowon/tips/wellknown/r10.pem ---\nCERTIFICATE\nSubject: /R10/C=US/O=Let's Encrypt\nIssuer: /ISRG Root X1/C=US/O=Internet Security Research Group\n\tSignature algorithm: RSA / SHA256\nDetails:\n\tPublic key: RSA-2048\n\tSerial number: 100566080436859127493189557861323994576\n\tAKI: 79:B4:59:E6:7B:B6:E5:E4:01:73:80:08:88:C8:1A:58:F6:E9:9B:6E\n\tSKI: BB:BC:C3:47:A5:E4:BC:A9:C6:C3:A4:72:0C:10:8D:A2:35:E1:C8:E8\n\tValid from: 2024-03-13T00:00:00+0000\n\t until: 2027-03-12T23:59:59+0000\n\tKey usages: cert sign, crl sign, digital signature\n\tExtended usages: client auth, server auth\n\tBasic constraints: valid, is a CA certificate, max path length 0\n\tSANs (0):\n\t1 AIA:\n\t\thttp://x1.i.lencr.org/\n--/Users/bowon/tips/wellknown/r11.pem ---\nCERTIFICATE\nSubject: /R11/C=US/O=Let's Encrypt\nIssuer: /ISRG Root X1/C=US/O=Internet Security Research Group\n\tSignature algorithm: RSA / SHA256\nDetails:\n\tPublic key: RSA-2048\n\tSerial number: 184083759606652600789093070426744763640\n\tAKI: 79:B4:59:E6:7B:B6:E5:E4:01:73:80:08:88:C8:1A:58:F6:E9:9B:6E\n\tSKI: C5:CF:46:A4:EA:F4:C3:C0:7A:6C:95:C4:2D:B0:5E:92:2F:26:E3:B9\n\tValid from: 2024-03-13T00:00:00+0000\n\t until: 2027-03-12T23:59:59+0000\n\tKey usages: cert sign, crl sign, digital signature\n\tExtended usages: client auth, server auth\n\tBasic constraints: valid, is a CA certificate, max path length 0\n\tSANs (0):\n\t1 AIA:\n\t\thttp://x1.i.lencr.org/\n--/Users/bowon/tips/wellknown/r12.pem ---\nCERTIFICATE\nSubject: /R12/C=US/O=Let's Encrypt\nIssuer: /ISRG Root X1/C=US/O=Internet Security Research Group\n\tSignature algorithm: RSA / SHA256\nDetails:\n\tPublic key: RSA-2048\n\tSerial number: 257964712623187159666453466812961334844\n\tAKI: 79:B4:59:E6:7B:B6:E5:E4:01:73:80:08:88:C8:1A:58:F6:E9:9B:6E\n\tSKI: 00:B5:29:F2:2D:8E:6F:31:E8:9B:4C:AD:78:3E:FA:DC:E9:0C:D1:D2\n\tValid from: 2024-03-13T00:00:00+0000\n\t until: 2027-03-12T23:59:59+0000\n\tKey usages: cert sign, crl sign, digital signature\n\tExtended usages: client auth, server auth\n\tBasic constraints: valid, is a CA certificate, max path length 0\n\tSANs (0):\n\t1 AIA:\n\t\thttp://x1.i.lencr.org/\n--/Users/bowon/tips/wellknown/r13.pem ---\nCERTIFICATE\nSubject: /R13/C=US/O=Let's Encrypt\nIssuer: /ISRG Root X1/C=US/O=Internet Security Research Group\n\tSignature algorithm: RSA / SHA256\nDetails:\n\tPublic key: RSA-2048\n\tSerial number: 119635429456979344322213464088047616773\n\tAKI: 79:B4:59:E6:7B:B6:E5:E4:01:73:80:08:88:C8:1A:58:F6:E9:9B:6E\n\tSKI: E7:AB:9F:0F:2C:33:A0:53:D3:5E:4F:78:C8:B2:84:0E:3B:D6:92:33\n\tValid from: 2024-03-13T00:00:00+0000\n\t until: 2027-03-12T23:59:59+0000\n\tKey usages: cert sign, crl sign, digital signature\n\tExtended usages: client auth, server auth\n\tBasic constraints: valid, is a CA certificate, max path length 0\n\tSANs (0):\n\t1 AIA:\n\t\thttp://x1.i.lencr.org/\n--/Users/bowon/tips/wellknown/r14.pem ---\nCERTIFICATE\nSubject: /R14/C=US/O=Let's Encrypt\nIssuer: /ISRG Root X1/C=US/O=Internet Security Research Group\n\tSignature algorithm: RSA / SHA256\nDetails:\n\tPublic key: RSA-2048\n\tSerial number: 253817389372370983228917526291991037611\n\tAKI: 79:B4:59:E6:7B:B6:E5:E4:01:73:80:08:88:C8:1A:58:F6:E9:9B:6E\n\tSKI: E5:10:95:D8:B6:0C:51:D7:A7:72:35:63:0A:54:68:6E:06:53:F8:FB\n\tValid from: 2024-03-13T00:00:00+0000\n\t until: 2027-03-12T23:59:59+0000\n\tKey usages: cert sign, crl sign, digital signature\n\tExtended usages: client auth, server auth\n\tBasic constraints: valid, is a CA certificate, max path length 0\n\tSANs (0):\n\t1 AIA:\n\t\thttp://x1.i.lencr.org/\n--/Users/bowon/tips/wellknown/google/wr1.pem ---\nCERTIFICATE\nSubject: /WR1/C=US/O=Google Trust Services\nIssuer: /GTS Root R1/C=US/O=Google Trust Services LLC\n\tSignature algorithm: RSA / SHA256\nDetails:\n\tPublic key: RSA-2048\n\tSerial number: 169943283142817666033504407772870502567\n\tAKI: E4:AF:2B:26:71:1A:2B:48:27:85:2F:52:66:2C:EF:F0:89:13:71:3E\n\tSKI: 66:69:49:D4:DE:2A:9C:91:03:CF:89:0E:24:B8:0E:30:03:6E:88:2E\n\tValid from: 2023-12-13T09:00:00+0000\n\t until: 2029-02-20T14:00:00+0000\n\tKey usages: cert sign, crl sign, digital signature\n\tExtended usages: client auth, server auth\n\tBasic constraints: valid, is a CA certificate, max path length 0\n\tSANs (0):\n\t1 AIA:\n\t\thttp://i.pki.goog/r1.crt\nselected release 2024.5.6\n- importing serial 174873564306387906651619802726858882526 SKI 9f2b5fcf3c214f9d04b7ed2b2cc4c6708bd2d70d\n- importing serial 234397126118090224789023519560838753080 SKI 9327469803a951688e98d6c44248db23bf5894d2\n- importing serial 226581164312556911225609404641709439649 SKI ae489edc871d44a06fdaa2e560740478c29c0080\n- importing serial 132370213232563105872410966929454918998 SKI 8f0d13a2f62e7ed1506c3318385d598e237291ca\n- importing serial 83840359685249281117050969311267445779 SKI 5d77d14dac4d227859b286598e431cb764591341\n- importing serial 100566080436859127493189557861323994576 SKI bbbcc347a5e4bca9c6c3a4720c108da235e1c8e8\n- importing serial 184083759606652600789093070426744763640 SKI c5cf46a4eaf4c3c07a6c95c42db05e922f26e3b9\n- importing serial 257964712623187159666453466812961334844 SKI 00b529f22d8e6f31e89b4cad783efadce90cd1d2\n- importing serial 119635429456979344322213464088047616773 SKI e7ab9f0f2c33a053d35e4f78c8b2840e3bd69233\n- importing serial 253817389372370983228917526291991037611 SKI e51095d8b60c51d7a77235630a54686e0653f8fb\n- importing serial 169943283142817666033504407772870502567 SKI 666949d4de2a9c9103cf890e24b80e30036e882e\n$ cfssl-trust -d ./cert.db -r 2024.5.6 -b int bundle int-bundle.crt\nselected release 2024.5.6\nSelected 1477 certificates for this release.\n$ cfssl-trust -d ./cert.db -r 2024.5.6 -b ca bundle ca-bundle.crt\nselected release 2024.5.6\nSelected 356 certificates for this release.\n$ certdump ca-bundle.crt > certdata/ca-bundle.txt\n$ certdump int-bundle.crt > certdata/int-bundle.txt\n$ git status --porcelain -uno\nM cert.db\nM certdata/int-bundle.txt\nM int-bundle.crt","shortMessageHtmlLink":"Trust store release 2024.5.6"}},{"before":"689caa52d7ab23cf99de442308fffeaa753c839b","after":"538b6505279df6947418086cc9da59bb62dc2ad7","ref":"refs/heads/master","pushedAt":"2024-05-30T20:49:26.000Z","pushType":"pr_merge","commitsCount":4,"pusher":{"login":"vasilzhigilei","name":"Vasil Zhigilei","path":"/vasilzhigilei","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/43997082?s=80&v=4"},"commit":{"message":"Merge pull request #280 from cloudflare/release/2024.5.5\n\nRelease/2024.5.5","shortMessageHtmlLink":"Merge pull request #280 from cloudflare/release/2024.5.5"}},{"before":"5704bbbc13a207d065f1f4d8dc81712c683d9b0c","after":"82a10837ac799bc798300ca53c8ba565d111c238","ref":"refs/heads/release/2024.5.5","pushedAt":"2024-05-30T19:51:05.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"vasilzhigilei","name":"Vasil Zhigilei","path":"/vasilzhigilei","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/43997082?s=80&v=4"},"commit":{"message":"add missing certdump human-readable trust store lists","shortMessageHtmlLink":"add missing certdump human-readable trust store lists"}},{"before":"106b0896dbb54f3c00533f2cea6457940bcf4dfa","after":"5704bbbc13a207d065f1f4d8dc81712c683d9b0c","ref":"refs/heads/release/2024.5.5","pushedAt":"2024-05-30T19:35:54.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"vasilzhigilei","name":"Vasil Zhigilei","path":"/vasilzhigilei","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/43997082?s=80&v=4"},"commit":{"message":"add SSL.com intermediates and roots","shortMessageHtmlLink":"add SSL.com intermediates and roots"}},{"before":null,"after":"106b0896dbb54f3c00533f2cea6457940bcf4dfa","ref":"refs/heads/release/2024.5.5","pushedAt":"2024-05-30T19:34:14.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"vasilzhigilei","name":"Vasil Zhigilei","path":"/vasilzhigilei","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/43997082?s=80&v=4"},"commit":{"message":"Trust store release 2024.5.5\n\nRolling trust store release at 2024-05-30T15:34:07-0400.\n$ cfssl-trust -d ./cert.db -b int release 0h\n1465 certificates rolled\n0 certificates skipped\nSuccessfully rolled new int release 2024.5.5\n$ cfssl-trust -d ./cert.db -b ca release 0h\n354 certificates rolled\n0 certificates skipped\nSuccessfully rolled new ca release 2024.5.5\nAdding new roots:\n--SSLcom-TLS-Root-2022-RSA.pem ---\nCERTIFICATE\nSubject: /SSL.com TLS RSA Root CA 2022/C=US/O=SSL Corporation\nIssuer: /SSL.com TLS RSA Root CA 2022/C=US/O=SSL Corporation\n\tSignature algorithm: RSA / SHA256\nDetails:\n\tPublic key: RSA-4096\n\tSerial number: 148535279242832292258835760425842727825\n\tAKI: FB:2E:37:EE:E3:84:7A:27:2E:CD:19:35:B1:33:7C:FF:D4:44:42:B9\n\tSKI: FB:2E:37:EE:E3:84:7A:27:2E:CD:19:35:B1:33:7C:FF:D4:44:42:B9\n\tValid from: 2022-08-25T16:34:22+0000\n\t until: 2046-08-19T16:34:21+0000\n\tKey usages: cert sign, crl sign, digital signature\n\tBasic constraints: valid, is a CA certificate\n\tSANs (0):\n--SSLcom-TLS-Root-2022-ECC.pem ---\nCERTIFICATE\nSubject: /SSL.com TLS ECC Root CA 2022/C=US/O=SSL Corporation\nIssuer: /SSL.com TLS ECC Root CA 2022/C=US/O=SSL Corporation\n\tSignature algorithm: ECDSA / SHA384\nDetails:\n\tPublic key: ECDSA-secp384r1\n\tSerial number: 26605119622390491762507526719404364228\n\tAKI: 89:8F:2F:A3:E8:2B:A0:14:54:7B:F3:56:B8:26:5F:67:38:0B:9C:D0\n\tSKI: 89:8F:2F:A3:E8:2B:A0:14:54:7B:F3:56:B8:26:5F:67:38:0B:9C:D0\n\tValid from: 2022-08-25T16:33:48+0000\n\t until: 2046-08-19T16:33:47+0000\n\tKey usages: cert sign, crl sign, digital signature\n\tBasic constraints: valid, is a CA certificate\n\tSANs (0):\nselected release 2024.5.5\n- importing serial 148535279242832292258835760425842727825 SKI fb2e37eee3847a272ecd1935b1337cffd44442b9\n- importing serial 26605119622390491762507526719404364228 SKI 898f2fa3e82ba014547bf356b8265f67380b9cd0\nAdding new intermediates:\n--SSL.com-TLS-T-RSA-R2.pem ---\nCERTIFICATE\nSubject: /SSL.com TLS Transit RSA CA R2/C=US/O=SSL Corporation\nIssuer: /SSL.com TLS RSA Root CA 2022/C=US/O=SSL Corporation\n\tSignature algorithm: RSA / SHA256\nDetails:\n\tPublic key: RSA-4096\n\tSerial number: 42743592687978439250883924143704817030\n\tAKI: FB:2E:37:EE:E3:84:7A:27:2E:CD:19:35:B1:33:7C:FF:D4:44:42:B9\n\tSKI: 21:41:34:63:8E:1D:91:0C:C3:DD:B6:24:B0:A8:87:7B:8D:65:60:08\n\tValid from: 2022-10-21T17:02:36+0000\n\t until: 2037-10-17T17:02:35+0000\n\tKey usages: cert sign, crl sign, digital signature\n\tExtended usages: client auth, server auth\n\tBasic constraints: valid, is a CA certificate, max path length 1\n\tSANs (0):\n\t1 AIA:\n\t\thttp://cert.ssl.com/SSLcom-TLS-Root-2022-RSA.cer\n--SSL.com-TLS-T-ECC-R2.pem ---\nCERTIFICATE\nSubject: /SSL.com TLS Transit ECC CA R2/C=US/O=SSL Corporation\nIssuer: /SSL.com TLS ECC Root CA 2022/C=US/O=SSL Corporation\n\tSignature algorithm: ECDSA / SHA384\nDetails:\n\tPublic key: ECDSA-secp384r1\n\tSerial number: 128008513138955688728541566246916480814\n\tAKI: 89:8F:2F:A3:E8:2B:A0:14:54:7B:F3:56:B8:26:5F:67:38:0B:9C:D0\n\tSKI: 32:A2:C7:D8:58:8B:FF:7F:C0:3C:F2:55:69:33:EC:CE:CC:1F:BC:97\n\tValid from: 2022-10-21T17:02:23+0000\n\t until: 2037-10-17T17:02:22+0000\n\tKey usages: cert sign, crl sign, digital signature\n\tExtended usages: client auth, server auth\n\tBasic constraints: valid, is a CA certificate, max path length 1\n\tSANs (0):\n\t1 AIA:\n\t\thttp://cert.ssl.com/SSLcom-TLS-Root-2022-ECC.cer\n--Cloudflare-TLS-I-R1.pem ---\nCERTIFICATE\nSubject: /Cloudflare TLS Issuing RSA CA 1/C=US/O=CLOUDFLARE, INC.\nIssuer: /SSL.com TLS Transit RSA CA R2/C=US/O=SSL Corporation\n\tSignature algorithm: RSA / SHA256\nDetails:\n\tPublic key: RSA-2048\n\tSerial number: 114145198451648563393331670668470694764\n\tAKI: 21:41:34:63:8E:1D:91:0C:C3:DD:B6:24:B0:A8:87:7B:8D:65:60:08\n\tSKI: 05:6D:B4:D9:C9:58:17:E1:D0:01:A7:F5:2F:20:6A:48:3D:9A:F4:17\n\tValid from: 2023-10-31T17:18:56+0000\n\t until: 2033-10-28T17:18:55+0000\n\tKey usages: cert sign, crl sign, digital signature\n\tExtended usages: client auth, server auth\n\tBasic constraints: valid, is a CA certificate, max path length 0\n\tSANs (0):\n\t1 AIA:\n\t\thttp://cert.ssl.com/SSL.com-TLS-T-RSA-R2.cer\n--Cloudflare-TLS-I-E1.pem ---\nCERTIFICATE\nSubject: /Cloudflare TLS Issuing ECC CA 1/C=US/O=CLOUDFLARE, INC.\nIssuer: /SSL.com TLS Transit ECC CA R2/C=US/O=SSL Corporation\n\tSignature algorithm: ECDSA / SHA384\nDetails:\n\tPublic key: ECDSA-prime256v1\n\tSerial number: 58816440600561316972292430218889829709\n\tAKI: 32:A2:C7:D8:58:8B:FF:7F:C0:3C:F2:55:69:33:EC:CE:CC:1F:BC:97\n\tSKI: 9C:C4:09:72:47:18:17:7B:A7:1A:89:B3:92:35:D5:E1:03:8C:FE:92\n\tValid from: 2023-10-31T17:17:49+0000\n\t until: 2033-10-28T17:17:48+0000\n\tKey usages: cert sign, crl sign, digital signature\n\tExtended usages: client auth, server auth\n\tBasic constraints: valid, is a CA certificate, max path length 0\n\tSANs (0):\n\t1 AIA:\n\t\thttp://cert.ssl.com/SSL.com-TLS-T-ECC-R2.cer\nselected release 2024.5.5\n- importing serial 42743592687978439250883924143704817030 SKI 214134638e1d910cc3ddb624b0a8877b8d656008\n- importing serial 128008513138955688728541566246916480814 SKI 32a2c7d8588bff7fc03cf2556933eccecc1fbc97\n- importing serial 114145198451648563393331670668470694764 SKI 056db4d9c95817e1d001a7f52f206a483d9af417\n- importing serial 58816440600561316972292430218889829709 SKI 9cc409724718177ba71a89b39235d5e1038cfe92\n$ cfssl-trust -d ./cert.db -r 2024.5.5 -b int bundle int-bundle.crt\nselected release 2024.5.5\nSelected 1469 certificates for this release.\n$ cfssl-trust -d ./cert.db -r 2024.5.5 -b ca bundle ca-bundle.crt\nselected release 2024.5.5\nSelected 356 certificates for this release.","shortMessageHtmlLink":"Trust store release 2024.5.5"}},{"before":"d9292bb147f78ed68f1dd8a034c0b4c868aa83ab","after":"689caa52d7ab23cf99de442308fffeaa753c839b","ref":"refs/heads/master","pushedAt":"2024-05-29T22:00:29.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"BowonY","name":"bowon","path":"/BowonY","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10628970?s=80&v=4"},"commit":{"message":"Merge pull request #279 from cloudflare/release/2024.5.4\n\nTrust store release 2024.5.4","shortMessageHtmlLink":"Merge pull request #279 from cloudflare/release/2024.5.4"}},{"before":null,"after":"2627e61585bc44f539f06e2787d392477161bcf6","ref":"refs/heads/release/2024.5.4","pushedAt":"2024-05-26T03:21:27.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"github-actions[bot]","name":null,"path":"/apps/github-actions","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/15368?s=80&v=4"},"commit":{"message":"Trust store release 2024.5.4\n\nRolling trust store release at 2024-05-26T03:21:19+0000.\n$ cfssl-trust -d ./cert.db -b int release 504h\nskipping expired certificate (SKI=af3e1e67132beda3561f6caef0e29b98a20f6945, serial=1462505468747148218216492715267117, subject='/GlobalSign PersonalSign 3 CA - SHA256 - G3/C=BE/O=GlobalSign nv-sa')\nskipping expired certificate (SKI=697282623167954485779180c40436499d7b0b61, serial=1462505468235399478280266926003443, subject='/GlobalSign PersonalSign 2 CA - SHA256 - G3/C=BE/O=GlobalSign nv-sa')\nskipping expired certificate (SKI=9627c2c2a5f71cf8027a7a64af636f32d298c2b1, serial=1462505467699540635281271848257549, subject='/GlobalSign PersonalSign 1 CA - SHA256 - G3/C=BE/O=GlobalSign nv-sa')\n1465 certificates rolled\n3 certificates skipped\nSuccessfully rolled new int release 2024.5.4\n$ cfssl-trust -d ./cert.db -b ca release 504h\n354 certificates rolled\n0 certificates skipped\nSuccessfully rolled new ca release 2024.5.4\n$ cfssl-trust -d ./cert.db -r 2024.5.4 -b int bundle int-bundle.crt\nselected release 2024.5.4\nSelected 1465 certificates for this release.\n$ cfssl-trust -d ./cert.db -r 2024.5.4 -b ca bundle ca-bundle.crt\nselected release 2024.5.4\nSelected 354 certificates for this release.\n$ certdump ca-bundle.crt > certdata/ca-bundle.txt\n$ certdump int-bundle.crt > certdata/int-bundle.txt\n$ git status --porcelain -uno\nM cert.db\nM certdata/int-bundle.txt\nM int-bundle.crt","shortMessageHtmlLink":"Trust store release 2024.5.4"}},{"before":"9d903d1250b6521099ab3c034665d5f25829d817","after":"d9292bb147f78ed68f1dd8a034c0b4c868aa83ab","ref":"refs/heads/master","pushedAt":"2024-05-20T22:10:53.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"BowonY","name":"bowon","path":"/BowonY","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10628970?s=80&v=4"},"commit":{"message":"Merge pull request #278 from cloudflare/release/2024.5.3\n\nTrust store release 2024.5.3","shortMessageHtmlLink":"Merge pull request #278 from cloudflare/release/2024.5.3"}},{"before":null,"after":"e10113a9a1e4359a60efb828cd47e00e00a4bb1a","ref":"refs/heads/release/2024.5.3","pushedAt":"2024-05-20T22:03:51.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"BowonY","name":"bowon","path":"/BowonY","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10628970?s=80&v=4"},"commit":{"message":"Trust store release 2024.5.3\n\nRolling trust store release at 2024-05-20T15:03:43-0700.\n$ cfssl-trust -d ./cert.db -b int release 504h\nskipping expired certificate (SKI=49eca7c8a9f7c5bb2caa24e7f443b3b13ce854f8, serial=125461920344817614170587321111204124502, subject='/GeoTrust DV SSL SHA256 CA/C=US/O=GeoTrust Inc./OU=Domain Validated SSL')\nskipping expired certificate (SKI=4cf4bfe83bbec224f31b473bb56e488e16abaf12, serial=96917227797452748385619024155305546951, subject='/RapidSSL SHA256 CA - G2/C=US/O=GeoTrust Inc.')\nskipping expired certificate (SKI=9fb8c1a96cf2f5c0222a94ed5c99acd4ecd7c607, serial=59035790283496901465862296573075037777, subject='/thawte DV SSL CA - G2/C=US/O=thawte, Inc./OU=Domain Validated SSL')\nskipping expired certificate (SKI=7d29312fc11e6eae31056ab3eb1ccda9ddae809a, serial=82594928017948708048133982543356432554, subject='/thawte DV SSL SHA256 CA/C=US/O=thawte, Inc./OU=Domain Validated SSL')\n1464 certificates rolled\n4 certificates skipped\nSuccessfully rolled new int release 2024.5.3\n$ cfssl-trust -d ./cert.db -b ca release 504h\n354 certificates rolled\n0 certificates skipped\nSuccessfully rolled new ca release 2024.5.3\nAdding new intermediates:\n--/Users/bowon/new-ints/cross-signed-r4.pem ---\nCERTIFICATE\nSubject: /GTS Root R4/C=US/O=Google Trust Services LLC\nIssuer: /GlobalSign Root CA/C=BE/O=GlobalSign nv-sa/OU=Root CA\n\tSignature algorithm: RSA / SHA256\nDetails:\n\tPublic key: ECDSA-secp384r1\n\tSerial number: 170001980149335831901244157168837298715\n\tAKI: 60:7B:66:1A:45:0D:97:CA:89:50:2F:7D:04:CD:34:A8:FF:FC:FD:4B\n\tSKI: 80:4C:D6:EB:74:FF:49:36:A3:D5:D8:FC:B5:3E:C5:6A:F0:94:1D:8C\n\tValid from: 2023-11-15T03:43:21+0000\n\t until: 2028-01-28T00:00:42+0000\n\tKey usages: cert sign, crl sign, digital signature\n\tExtended usages: client auth, server auth\n\tBasic constraints: valid, is a CA certificate\n\tSANs (0):\n\t1 AIA:\n\t\thttp://i.pki.goog/gsr1.crt\n--/Users/bowon/new-ints/2p2.pem ---\nCERTIFICATE\nSubject: /GTS CA 2P2/C=US/O=Google Trust Services LLC\nIssuer: /GTS Root R4/C=US/O=Google Trust Services LLC\n\tSignature algorithm: ECDSA / SHA384\nDetails:\n\tPublic key: ECDSA-prime256v1\n\tSerial number: 165390902415987118112848868672\n\tAKI: 80:4C:D6:EB:74:FF:49:36:A3:D5:D8:FC:B5:3E:C5:6A:F0:94:1D:8C\n\tSKI: 87:23:A9:50:48:0E:07:89:54:0A:71:30:F6:33:D2:0A:47:F6:9D:AC\n\tValid from: 2022-10-05T00:00:42+0000\n\t until: 2027-09-30T00:00:42+0000\n\tKey usages: cert sign, crl sign, digital signature\n\tExtended usages: client auth, server auth\n\tBasic constraints: valid, is a CA certificate, max path length 0\n\tSANs (0):\n\t1 AIA:\n\t\thttp://pki.goog/repo/certs/gtsr4.der\n\tOCSP server:\n\t\t- http://ocsp.pki.goog/gtsr4\n--/Users/bowon/new-ints/we1.pem ---\nCERTIFICATE\nSubject: /WE1/C=US/O=Google Trust Services\nIssuer: /GTS Root R4/C=US/O=Google Trust Services LLC\n\tSignature algorithm: ECDSA / SHA384\nDetails:\n\tPublic key: ECDSA-prime256v1\n\tSerial number: 170074200136485300614847617070429275619\n\tAKI: 80:4C:D6:EB:74:FF:49:36:A3:D5:D8:FC:B5:3E:C5:6A:F0:94:1D:8C\n\tSKI: 90:77:92:35:67:C4:FF:A8:CC:A9:E6:7B:D9:80:79:7B:CC:93:F9:38\n\tValid from: 2023-12-13T09:00:00+0000\n\t until: 2029-02-20T14:00:00+0000\n\tKey usages: cert sign, crl sign, digital signature\n\tExtended usages: client auth, server auth\n\tBasic constraints: valid, is a CA certificate, max path length 0\n\tSANs (0):\n\t1 AIA:\n\t\thttp://i.pki.goog/r4.crt\n--/Users/bowon/new-ints/wr1.pem ---\nCERTIFICATE\nSubject: /WR1/C=US/O=Google Trust Services\nIssuer: /GTS Root R1/C=US/O=Google Trust Services LLC\n\tSignature algorithm: RSA / SHA256\nDetails:\n\tPublic key: RSA-2048\n\tSerial number: 169943283142817666033504407772870502567\n\tAKI: E4:AF:2B:26:71:1A:2B:48:27:85:2F:52:66:2C:EF:F0:89:13:71:3E\n\tSKI: 66:69:49:D4:DE:2A:9C:91:03:CF:89:0E:24:B8:0E:30:03:6E:88:2E\n\tValid from: 2023-12-13T09:00:00+0000\n\t until: 2029-02-20T14:00:00+0000\n\tKey usages: cert sign, crl sign, digital signature\n\tExtended usages: client auth, server auth\n\tBasic constraints: valid, is a CA certificate, max path length 0\n\tSANs (0):\n\t1 AIA:\n\t\thttp://i.pki.goog/r1.crt\nselected release 2024.5.3\n- importing serial 170001980149335831901244157168837298715 SKI 804cd6eb74ff4936a3d5d8fcb53ec56af0941d8c\n- importing serial 165390902415987118112848868672 SKI 8723a950480e0789540a7130f633d20a47f69dac\n- importing serial 170074200136485300614847617070429275619 SKI 9077923567c4ffa8cca9e67bd980797bcc93f938\n- importing serial 169943283142817666033504407772870502567 SKI 666949d4de2a9c9103cf890e24b80e30036e882e\n$ cfssl-trust -d ./cert.db -r 2024.5.3 -b int bundle int-bundle.crt\nselected release 2024.5.3\nSelected 1468 certificates for this release.\n$ cfssl-trust -d ./cert.db -r 2024.5.3 -b ca bundle ca-bundle.crt\nselected release 2024.5.3\nSelected 354 certificates for this release.\n$ certdump ca-bundle.crt > certdata/ca-bundle.txt\n$ certdump int-bundle.crt > certdata/int-bundle.txt\n$ git status --porcelain -uno\nM cert.db\nM certdata/int-bundle.txt\nM int-bundle.crt","shortMessageHtmlLink":"Trust store release 2024.5.3"}},{"before":"4ba6c9243b84c91ca169deac35d893442784dfaf","after":"9d903d1250b6521099ab3c034665d5f25829d817","ref":"refs/heads/master","pushedAt":"2024-05-20T15:42:05.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"mitalirawat","name":"Mitali","path":"/mitalirawat","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/31329501?s=80&v=4"},"commit":{"message":"Merge pull request #277 from cloudflare/release/2024.5.2\n\nTrust store release 2024.5.2","shortMessageHtmlLink":"Merge pull request #277 from cloudflare/release/2024.5.2"}},{"before":"4ba6c9243b84c91ca169deac35d893442784dfaf","after":"69768461c22ff1c50bb61ef382ee1fe0106d8749","ref":"refs/heads/release/2024.5.2","pushedAt":"2024-05-19T03:21:47.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"github-actions[bot]","name":null,"path":"/apps/github-actions","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/15368?s=80&v=4"},"commit":{"message":"Trust store release 2024.5.2\n\nRolling trust store release at 2024-05-19T03:21:39+0000.\n$ cfssl-trust -d ./cert.db -b int release 504h\nskipping expired certificate (SKI=8874466dc77cb5fa727119debf275e0d68e0f727, serial=17839523128582866008, subject='/SwissSign EV Gold CA 2009 - G2/C=CH/O=SwissSign AG')\nskipping expired certificate (SKI=75aee40f2ea9beb233d9159ac994c1f730b435aa, serial=15859694353208028684339222923980680763, subject='/DigiCert Provisional Direct Med CA/C=US/O=DigiCert Inc/OU=www.digicert.com')\n1468 certificates rolled\n2 certificates skipped\nSuccessfully rolled new int release 2024.5.2\n$ cfssl-trust -d ./cert.db -b ca release 504h\n354 certificates rolled\n0 certificates skipped\nSuccessfully rolled new ca release 2024.5.2\n$ cfssl-trust -d ./cert.db -r 2024.5.2 -b int bundle int-bundle.crt\nselected release 2024.5.2\nSelected 1468 certificates for this release.\n$ cfssl-trust -d ./cert.db -r 2024.5.2 -b ca bundle ca-bundle.crt\nselected release 2024.5.2\nSelected 354 certificates for this release.\n$ certdump ca-bundle.crt > certdata/ca-bundle.txt\n$ certdump int-bundle.crt > certdata/int-bundle.txt\n$ git status --porcelain -uno\nM cert.db\nM certdata/int-bundle.txt\nM int-bundle.crt","shortMessageHtmlLink":"Trust store release 2024.5.2"}},{"before":"88dcfd73ff1b69cfb12b44eb22dd01ec9c98ba6d","after":null,"ref":"refs/tags/trust-store-2024.5.2","pushedAt":"2024-05-18T00:04:28.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"BowonY","name":"bowon","path":"/BowonY","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10628970?s=80&v=4"}},{"before":"88dcfd73ff1b69cfb12b44eb22dd01ec9c98ba6d","after":"4ba6c9243b84c91ca169deac35d893442784dfaf","ref":"refs/heads/release/2024.5.2","pushedAt":"2024-05-17T23:45:27.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"BowonY","name":"bowon","path":"/BowonY","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10628970?s=80&v=4"},"commit":{"message":"Merge pull request #275 from cloudflare/release/2024.5.1\n\nTrust store release 2024.5.1","shortMessageHtmlLink":"Merge pull request #275 from cloudflare/release/2024.5.1"}},{"before":null,"after":"88dcfd73ff1b69cfb12b44eb22dd01ec9c98ba6d","ref":"refs/heads/release/2024.5.2","pushedAt":"2024-05-17T23:40:11.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"BowonY","name":"bowon","path":"/BowonY","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10628970?s=80&v=4"},"commit":{"message":"Trust store release 2024.5.2\n\nRolling trust store release at 2024-05-17T16:40:03-0700.\n$ cfssl-trust -d ./cert.db -b int release 0h\n1470 certificates rolled\n0 certificates skipped\nSuccessfully rolled new int release 2024.5.2\n$ cfssl-trust -d ./cert.db -b ca release 0h\n354 certificates rolled\n0 certificates skipped\nSuccessfully rolled new ca release 2024.5.2\nAdding new intermediates:\n--/Users/bowon/tips/wellknown/google/we1.pem ---\nCERTIFICATE\nSubject: /WE1/C=US/O=Google Trust Services\nIssuer: /GTS Root R4/C=US/O=Google Trust Services LLC\n\tSignature algorithm: ECDSA / SHA384\nDetails:\n\tPublic key: ECDSA-prime256v1\n\tSerial number: 170074200136485300614847617070429275619\n\tAKI: 80:4C:D6:EB:74:FF:49:36:A3:D5:D8:FC:B5:3E:C5:6A:F0:94:1D:8C\n\tSKI: 90:77:92:35:67:C4:FF:A8:CC:A9:E6:7B:D9:80:79:7B:CC:93:F9:38\n\tValid from: 2023-12-13T09:00:00+0000\n\t until: 2029-02-20T14:00:00+0000\n\tKey usages: cert sign, crl sign, digital signature\n\tExtended usages: client auth, server auth\n\tBasic constraints: valid, is a CA certificate, max path length 0\n\tSANs (0):\n\t1 AIA:\n\t\thttp://i.pki.goog/r4.crt\n--/Users/bowon/tips/wellknown/google/cross-signed-r4.pem ---\nCERTIFICATE\nSubject: /GTS Root R4/C=US/O=Google Trust Services LLC\nIssuer: /GlobalSign Root CA/C=BE/O=GlobalSign nv-sa/OU=Root CA\n\tSignature algorithm: RSA / SHA256\nDetails:\n\tPublic key: ECDSA-secp384r1\n\tSerial number: 170001980149335831901244157168837298715\n\tAKI: 60:7B:66:1A:45:0D:97:CA:89:50:2F:7D:04:CD:34:A8:FF:FC:FD:4B\n\tSKI: 80:4C:D6:EB:74:FF:49:36:A3:D5:D8:FC:B5:3E:C5:6A:F0:94:1D:8C\n\tValid from: 2023-11-15T03:43:21+0000\n\t until: 2028-01-28T00:00:42+0000\n\tKey usages: cert sign, crl sign, digital signature\n\tExtended usages: client auth, server auth\n\tBasic constraints: valid, is a CA certificate\n\tSANs (0):\n\t1 AIA:\n\t\thttp://i.pki.goog/gsr1.crt\nselected release 2024.5.2\n- importing serial 170074200136485300614847617070429275619 SKI 9077923567c4ffa8cca9e67bd980797bcc93f938\n- importing serial 170001980149335831901244157168837298715 SKI 804cd6eb74ff4936a3d5d8fcb53ec56af0941d8c\n$ cfssl-trust -d ./cert.db -r 2024.5.2 -b int bundle int-bundle.crt\nselected release 2024.5.2\nSelected 1472 certificates for this release.\n$ cfssl-trust -d ./cert.db -r 2024.5.2 -b ca bundle ca-bundle.crt\nselected release 2024.5.2\nSelected 354 certificates for this release.","shortMessageHtmlLink":"Trust store release 2024.5.2"}},{"before":"bdacb27121c9c81e84dcadf65445fa184579f16a","after":"4ba6c9243b84c91ca169deac35d893442784dfaf","ref":"refs/heads/master","pushedAt":"2024-05-13T17:42:58.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"BowonY","name":"bowon","path":"/BowonY","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10628970?s=80&v=4"},"commit":{"message":"Merge pull request #275 from cloudflare/release/2024.5.1\n\nTrust store release 2024.5.1","shortMessageHtmlLink":"Merge pull request #275 from cloudflare/release/2024.5.1"}},{"before":null,"after":"02bebe48213d619044f888cd730e94c6c2bf1f78","ref":"refs/heads/release/2024.5.1","pushedAt":"2024-05-12T03:21:26.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"github-actions[bot]","name":null,"path":"/apps/github-actions","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/15368?s=80&v=4"},"commit":{"message":"Trust store release 2024.5.1\n\nRolling trust store release at 2024-05-12T03:21:18+0000.\n$ cfssl-trust -d ./cert.db -b int release 504h\nskipping expired certificate (SKI=d98bb74856249d3304b60a90dd62810281449325, serial=10905861135842523791628165016635761949, subject='/Henkel Secure E-mail CA/C=DE/O=Henkel AG & Co. KGaA/OU=Class 2 DigiCert PKI Platform Individual Subscriber CA')\n1470 certificates rolled\n1 certificates skipped\nSuccessfully rolled new int release 2024.5.1\n$ cfssl-trust -d ./cert.db -b ca release 504h\n354 certificates rolled\n0 certificates skipped\nSuccessfully rolled new ca release 2024.5.1\n$ cfssl-trust -d ./cert.db -r 2024.5.1 -b int bundle int-bundle.crt\nselected release 2024.5.1\nSelected 1470 certificates for this release.\n$ cfssl-trust -d ./cert.db -r 2024.5.1 -b ca bundle ca-bundle.crt\nselected release 2024.5.1\nSelected 354 certificates for this release.\n$ certdump ca-bundle.crt > certdata/ca-bundle.txt\n$ certdump int-bundle.crt > certdata/int-bundle.txt\n$ git status --porcelain -uno\nM cert.db\nM certdata/int-bundle.txt\nM int-bundle.crt","shortMessageHtmlLink":"Trust store release 2024.5.1"}},{"before":"47d4e5099c7132f617f4fda7597df1c56e52992a","after":"bdacb27121c9c81e84dcadf65445fa184579f16a","ref":"refs/heads/master","pushedAt":"2024-05-06T13:38:57.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"vasilzhigilei","name":"Vasil Zhigilei","path":"/vasilzhigilei","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/43997082?s=80&v=4"},"commit":{"message":"Merge pull request #274 from cloudflare/release/2024.5.0\n\nTrust store release 2024.5.0","shortMessageHtmlLink":"Merge pull request #274 from cloudflare/release/2024.5.0"}},{"before":null,"after":"a8cb14dd349a5b25bb7dadc542883273ae64aba2","ref":"refs/heads/release/2024.5.0","pushedAt":"2024-05-05T03:21:00.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"github-actions[bot]","name":null,"path":"/apps/github-actions","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/15368?s=80&v=4"},"commit":{"message":"Trust store release 2024.5.0\n\nRolling trust store release at 2024-05-05T03:20:52+0000.\n$ cfssl-trust -d ./cert.db -b int release 504h\nskipping expired certificate (SKI=58889fd6dc9c4822b7143eff8488e8e685fffa7d, serial=11591687389060913796532298097930387285, subject='/Microsoft IT TLS CA 1/C=US/O=Microsoft Corporation/OU=Microsoft IT/L=Redmond/ST=Washington')\nskipping expired certificate (SKI=919e3b446c3d579c42772a34d74fd1cc4a972cda, serial=20167221470134893166970605289928033641, subject='/Microsoft IT TLS CA 2/C=US/O=Microsoft Corporation/OU=Microsoft IT/L=Redmond/ST=Washington')\nskipping expired certificate (SKI=7a7b8cc1cfe7a0ca1cd46bfafbe133c30f1aa29d, serial=15175535935517275601075715039141166771, subject='/Microsoft IT TLS CA 4/C=US/O=Microsoft Corporation/OU=Microsoft IT/L=Redmond/ST=Washington')\nskipping expired certificate (SKI=08fe259f74ea8704c2bcbb8ea8385f33c6d16c65, serial=11344140759149608646467569638499596626, subject='/Microsoft IT TLS CA 5/C=US/O=Microsoft Corporation/OU=Microsoft IT/L=Redmond/ST=Washington')\n1471 certificates rolled\n4 certificates skipped\nSuccessfully rolled new int release 2024.5.0\n$ cfssl-trust -d ./cert.db -b ca release 504h\n354 certificates rolled\n0 certificates skipped\nSuccessfully rolled new ca release 2024.5.0\n$ cfssl-trust -d ./cert.db -r 2024.5.0 -b int bundle int-bundle.crt\nselected release 2024.5.0\nSelected 1471 certificates for this release.\n$ cfssl-trust -d ./cert.db -r 2024.5.0 -b ca bundle ca-bundle.crt\nselected release 2024.5.0\nSelected 354 certificates for this release.\n$ certdump ca-bundle.crt > certdata/ca-bundle.txt\n$ certdump int-bundle.crt > certdata/int-bundle.txt\n$ git status --porcelain -uno\nM cert.db\nM certdata/int-bundle.txt\nM int-bundle.crt","shortMessageHtmlLink":"Trust store release 2024.5.0"}},{"before":"fc477ffcb1a79f59dd8759604fc400631e00a9cf","after":"47d4e5099c7132f617f4fda7597df1c56e52992a","ref":"refs/heads/master","pushedAt":"2024-04-30T18:07:41.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"BowonY","name":"bowon","path":"/BowonY","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10628970?s=80&v=4"},"commit":{"message":"Merge pull request #273 from cloudflare/release/2024.4.1\n\nTrust store release 2024.4.1","shortMessageHtmlLink":"Merge pull request #273 from cloudflare/release/2024.4.1"}},{"before":null,"after":"eb25f2c1caad36d9903057f2920faa83499d9aff","ref":"refs/heads/release/2024.4.1","pushedAt":"2024-04-28T03:21:04.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"github-actions[bot]","name":null,"path":"/apps/github-actions","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/15368?s=80&v=4"},"commit":{"message":"Trust store release 2024.4.1\n\nRolling trust store release at 2024-04-28T03:20:57+0000.\n$ cfssl-trust -d ./cert.db -b int release 504h\nskipping expired certificate (SKI=4c3811b898005b5a2b703eaa78e4d5676767a77e, serial=120040506, subject='/Verizon Global Root CA/C=US/O=Verizon Business/OU=OmniRoot')\n1475 certificates rolled\n1 certificates skipped\nSuccessfully rolled new int release 2024.4.1\n$ cfssl-trust -d ./cert.db -b ca release 504h\n354 certificates rolled\n0 certificates skipped\nSuccessfully rolled new ca release 2024.4.1\n$ cfssl-trust -d ./cert.db -r 2024.4.1 -b int bundle int-bundle.crt\nselected release 2024.4.1\nSelected 1475 certificates for this release.\n$ cfssl-trust -d ./cert.db -r 2024.4.1 -b ca bundle ca-bundle.crt\nselected release 2024.4.1\nSelected 354 certificates for this release.\n$ certdump ca-bundle.crt > certdata/ca-bundle.txt\n$ certdump int-bundle.crt > certdata/int-bundle.txt\n$ git status --porcelain -uno\nM cert.db\nM certdata/int-bundle.txt\nM int-bundle.crt","shortMessageHtmlLink":"Trust store release 2024.4.1"}},{"before":"82ca61965541cd1a7db01f4d2612828dd43bca78","after":null,"ref":"refs/heads/dependabot/go_modules/golang.org/x/net-0.23.0","pushedAt":"2024-04-22T18:07:02.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"dependabot[bot]","name":null,"path":"/apps/dependabot","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/29110?s=80&v=4"}},{"before":"d287e02e8465a725cf14a4d99f428e5b29bfcc4a","after":"fc477ffcb1a79f59dd8759604fc400631e00a9cf","ref":"refs/heads/master","pushedAt":"2024-04-22T18:06:54.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"nickysemenza","name":"Nicky Semenza","path":"/nickysemenza","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/707582?s=80&v=4"},"commit":{"message":"Merge pull request #272 from cloudflare/dependabot/go_modules/golang.org/x/net-0.23.0\n\nBump golang.org/x/net from 0.17.0 to 0.23.0","shortMessageHtmlLink":"Merge pull request #272 from cloudflare/dependabot/go_modules/golang.…"}},{"before":null,"after":"82ca61965541cd1a7db01f4d2612828dd43bca78","ref":"refs/heads/dependabot/go_modules/golang.org/x/net-0.23.0","pushedAt":"2024-04-19T12:23:17.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"dependabot[bot]","name":null,"path":"/apps/dependabot","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/29110?s=80&v=4"},"commit":{"message":"Bump golang.org/x/net from 0.17.0 to 0.23.0\n\nBumps [golang.org/x/net](https://github.com/golang/net) from 0.17.0 to 0.23.0.\n- [Commits](https://github.com/golang/net/compare/v0.17.0...v0.23.0)\n\n---\nupdated-dependencies:\n- dependency-name: golang.org/x/net\n dependency-type: indirect\n...\n\nSigned-off-by: dependabot[bot] ","shortMessageHtmlLink":"Bump golang.org/x/net from 0.17.0 to 0.23.0"}},{"before":"d1f3d5fed1f3672987ce20538244e54be6bc33c9","after":"d287e02e8465a725cf14a4d99f428e5b29bfcc4a","ref":"refs/heads/master","pushedAt":"2024-04-08T20:20:45.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"lgarofalo","name":"Leland Garofalo","path":"/lgarofalo","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7418073?s=80&v=4"},"commit":{"message":"Trust store release 2024.4.0 (#269)\n\nRolling trust store release at 2024-04-07T03:20:08+0000.\r\n$ cfssl-trust -d ./cert.db -b int release 504h\r\nskipping expired certificate (SKI=be66cd9a79849f1b023edb3d1ad08f32164996e0, serial=6252724313679620825149470155455970013, subject='/Rush Health CA/C=US/O=Rush Health/OU=Orion Health Direct Secure Messaging')\r\nskipping expired certificate (SKI=b6087b0d7accac204c8656325ecfab6e852d7057, serial=120039509, subject='/Cybertrust Global Root/O=Cybertrust, Inc')\r\n1476 certificates rolled\r\n2 certificates skipped\r\nSuccessfully rolled new int release 2024.4.0\r\n$ cfssl-trust -d ./cert.db -b ca release 504h\r\n354 certificates rolled\r\n0 certificates skipped\r\nSuccessfully rolled new ca release 2024.4.0\r\n$ cfssl-trust -d ./cert.db -r 2024.4.0 -b int bundle int-bundle.crt\r\nselected release 2024.4.0\r\nSelected 1476 certificates for this release.\r\n$ cfssl-trust -d ./cert.db -r 2024.4.0 -b ca bundle ca-bundle.crt\r\nselected release 2024.4.0\r\nSelected 354 certificates for this release.\r\n$ certdump ca-bundle.crt > certdata/ca-bundle.txt\r\n$ certdump int-bundle.crt > certdata/int-bundle.txt\r\n$ git status --porcelain -uno\r\nM cert.db\r\nM certdata/int-bundle.txt\r\nM int-bundle.crt\r\n\r\nCo-authored-by: Leland Garofalo ","shortMessageHtmlLink":"Trust store release 2024.4.0 (#269)"}},{"before":null,"after":"449654a6b6ddf3c6c4596749c3e3a3f9d2250077","ref":"refs/heads/release/2024.4.0","pushedAt":"2024-04-07T03:20:16.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"github-actions[bot]","name":null,"path":"/apps/github-actions","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/15368?s=80&v=4"},"commit":{"message":"Trust store release 2024.4.0\n\nRolling trust store release at 2024-04-07T03:20:08+0000.\n$ cfssl-trust -d ./cert.db -b int release 504h\nskipping expired certificate (SKI=be66cd9a79849f1b023edb3d1ad08f32164996e0, serial=6252724313679620825149470155455970013, subject='/Rush Health CA/C=US/O=Rush Health/OU=Orion Health Direct Secure Messaging')\nskipping expired certificate (SKI=b6087b0d7accac204c8656325ecfab6e852d7057, serial=120039509, subject='/Cybertrust Global Root/O=Cybertrust, Inc')\n1476 certificates rolled\n2 certificates skipped\nSuccessfully rolled new int release 2024.4.0\n$ cfssl-trust -d ./cert.db -b ca release 504h\n354 certificates rolled\n0 certificates skipped\nSuccessfully rolled new ca release 2024.4.0\n$ cfssl-trust -d ./cert.db -r 2024.4.0 -b int bundle int-bundle.crt\nselected release 2024.4.0\nSelected 1476 certificates for this release.\n$ cfssl-trust -d ./cert.db -r 2024.4.0 -b ca bundle ca-bundle.crt\nselected release 2024.4.0\nSelected 354 certificates for this release.\n$ certdump ca-bundle.crt > certdata/ca-bundle.txt\n$ certdump int-bundle.crt > certdata/int-bundle.txt\n$ git status --porcelain -uno\nM cert.db\nM certdata/int-bundle.txt\nM int-bundle.crt","shortMessageHtmlLink":"Trust store release 2024.4.0"}},{"before":"93293bbd0b1f7e30359805c8888abc60fee6fcd9","after":"d1f3d5fed1f3672987ce20538244e54be6bc33c9","ref":"refs/heads/master","pushedAt":"2024-03-28T19:13:49.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"lgarofalo","name":"Leland Garofalo","path":"/lgarofalo","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7418073?s=80&v=4"},"commit":{"message":"Trust store release 2024.3.4 (#265)\n\nRolling trust store release at 2024-03-28T09:52:27-0700.\r\n$ cfssl-trust -d ./cert.db -b int release 0h\r\n1477 certificates rolled\r\n0 certificates skipped\r\nSuccessfully rolled new int release 2024.3.4\r\n$ cfssl-trust -d ./cert.db -b ca release 0h\r\n354 certificates rolled\r\n0 certificates skipped\r\nSuccessfully rolled new ca release 2024.3.4\r\nAdding new intermediates:\r\n--new_int ---\r\nCERTIFICATE\r\nSubject: /Cybertrust Japan SureServer EV CA G3/C=JP/O=Cybertrust Japan Co.,\r\n Ltd.\r\nIssuer: /C=JP/O=SECOM Trust Systems CO.,LTD./OU=Security Communication RootCA2\r\n\tSignature algorithm: RSA / SHA256\r\nDetails:\r\n\tPublic key: RSA-2048\r\n\tSerial number: 46157929531853354100488418937468587687\r\n\tAKI: 0A:85:A9:77:65:05:98:7C:40:81:F8:0F:97:2C:38:F1:0A:EC:3C:CF\r\n\tSKI: 82:6C:75:5D:53:F5:45:69:BC:25:2D:A4:4C:89:E6:B2:B7:41:87:A3\r\n\tValid from: 2023-12-13T06:28:45+0000\r\n\t until: 2029-05-29T05:00:39+0000\r\n\tKey usages: cert sign, crl sign\r\n\tExtended usages: client auth, server auth\r\n\tBasic constraints: valid, is a CA certificate, max path length 0\r\n\tSANs (0):\r\n\t1 AIA:\r\n\t\thttp://repository.secomtrust.net/SC-Root2/SCRoot2ca.cer\r\n\tOCSP server:\r\n\t\t- http://scrootca2.ocsp.secomtrust.net\r\nselected release 2024.3.4\r\n- importing serial 46157929531853354100488418937468587687 SKI 826c755d53f54569bc252da44c89e6b2b74187a3\r\n$ cfssl-trust -d ./cert.db -r 2024.3.4 -b int bundle int-bundle.crt\r\nselected release 2024.3.4\r\nSelected 1478 certificates for this release.\r\n$ cfssl-trust -d ./cert.db -r 2024.3.4 -b ca bundle ca-bundle.crt\r\nselected release 2024.3.4\r\nSelected 354 certificates for this release.\r\n\r\nCo-authored-by: Leland Garofalo ","shortMessageHtmlLink":"Trust store release 2024.3.4 (#265)"}},{"before":"0b4e78504e646c0ecc2d57e77c41fd8e3a8af459","after":"3e225da544cf969d1b0fea570093604df9bbcdde","ref":"refs/heads/release/2024.3.4","pushedAt":"2024-03-28T16:53:48.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"lgarofalo","name":"Leland Garofalo","path":"/lgarofalo","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7418073?s=80&v=4"},"commit":{"message":"Trust store release 2024.3.4\n\nRolling trust store release at 2024-03-28T09:52:27-0700.\n$ cfssl-trust -d ./cert.db -b int release 0h\n1477 certificates rolled\n0 certificates skipped\nSuccessfully rolled new int release 2024.3.4\n$ cfssl-trust -d ./cert.db -b ca release 0h\n354 certificates rolled\n0 certificates skipped\nSuccessfully rolled new ca release 2024.3.4\nAdding new intermediates:\n--new_int ---\nCERTIFICATE\nSubject: /Cybertrust Japan SureServer EV CA G3/C=JP/O=Cybertrust Japan Co.,\n Ltd.\nIssuer: /C=JP/O=SECOM Trust Systems CO.,LTD./OU=Security Communication RootCA2\n\tSignature algorithm: RSA / SHA256\nDetails:\n\tPublic key: RSA-2048\n\tSerial number: 46157929531853354100488418937468587687\n\tAKI: 0A:85:A9:77:65:05:98:7C:40:81:F8:0F:97:2C:38:F1:0A:EC:3C:CF\n\tSKI: 82:6C:75:5D:53:F5:45:69:BC:25:2D:A4:4C:89:E6:B2:B7:41:87:A3\n\tValid from: 2023-12-13T06:28:45+0000\n\t until: 2029-05-29T05:00:39+0000\n\tKey usages: cert sign, crl sign\n\tExtended usages: client auth, server auth\n\tBasic constraints: valid, is a CA certificate, max path length 0\n\tSANs (0):\n\t1 AIA:\n\t\thttp://repository.secomtrust.net/SC-Root2/SCRoot2ca.cer\n\tOCSP server:\n\t\t- http://scrootca2.ocsp.secomtrust.net\nselected release 2024.3.4\n- importing serial 46157929531853354100488418937468587687 SKI 826c755d53f54569bc252da44c89e6b2b74187a3\n$ cfssl-trust -d ./cert.db -r 2024.3.4 -b int bundle int-bundle.crt\nselected release 2024.3.4\nSelected 1478 certificates for this release.\n$ cfssl-trust -d ./cert.db -r 2024.3.4 -b ca bundle ca-bundle.crt\nselected release 2024.3.4\nSelected 354 certificates for this release.","shortMessageHtmlLink":"Trust store release 2024.3.4"}},{"before":null,"after":"0b4e78504e646c0ecc2d57e77c41fd8e3a8af459","ref":"refs/heads/release/2024.3.4","pushedAt":"2024-03-28T16:52:34.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"lgarofalo","name":"Leland Garofalo","path":"/lgarofalo","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7418073?s=80&v=4"},"commit":{"message":"Trust store release 2024.3.4\n\nRolling trust store release at 2024-03-28T09:52:27-0700.\n$ cfssl-trust -d ./cert.db -b int release 0h\n1477 certificates rolled\n0 certificates skipped\nSuccessfully rolled new int release 2024.3.4\n$ cfssl-trust -d ./cert.db -b ca release 0h\n354 certificates rolled\n0 certificates skipped\nSuccessfully rolled new ca release 2024.3.4\nAdding new intermediates:\n--new_int ---\nCERTIFICATE\nSubject: /Cybertrust Japan SureServer EV CA G3/C=JP/O=Cybertrust Japan Co.,\n Ltd.\nIssuer: /C=JP/O=SECOM Trust Systems CO.,LTD./OU=Security Communication RootCA2\n\tSignature algorithm: RSA / SHA256\nDetails:\n\tPublic key: RSA-2048\n\tSerial number: 46157929531853354100488418937468587687\n\tAKI: 0A:85:A9:77:65:05:98:7C:40:81:F8:0F:97:2C:38:F1:0A:EC:3C:CF\n\tSKI: 82:6C:75:5D:53:F5:45:69:BC:25:2D:A4:4C:89:E6:B2:B7:41:87:A3\n\tValid from: 2023-12-13T06:28:45+0000\n\t until: 2029-05-29T05:00:39+0000\n\tKey usages: cert sign, crl sign\n\tExtended usages: client auth, server auth\n\tBasic constraints: valid, is a CA certificate, max path length 0\n\tSANs (0):\n\t1 AIA:\n\t\thttp://repository.secomtrust.net/SC-Root2/SCRoot2ca.cer\n\tOCSP server:\n\t\t- http://scrootca2.ocsp.secomtrust.net\nselected release 2024.3.4\n- importing serial 46157929531853354100488418937468587687 SKI 826c755d53f54569bc252da44c89e6b2b74187a3\n$ cfssl-trust -d ./cert.db -r 2024.3.4 -b int bundle int-bundle.crt\nselected release 2024.3.4\nSelected 1478 certificates for this release.\n$ cfssl-trust -d ./cert.db -r 2024.3.4 -b ca bundle ca-bundle.crt\nselected release 2024.3.4\nSelected 354 certificates for this release.","shortMessageHtmlLink":"Trust store release 2024.3.4"}},{"before":"b11c6565c17acd011364f375cbaee650a588294c","after":"93293bbd0b1f7e30359805c8888abc60fee6fcd9","ref":"refs/heads/master","pushedAt":"2024-03-28T16:35:47.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"lgarofalo","name":"Leland Garofalo","path":"/lgarofalo","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7418073?s=80&v=4"},"commit":{"message":"Trust store release 2024.3.3 (#264)\n\nRolling trust store release at 2024-03-24T03:19:47+0000.\r\n$ cfssl-trust -d ./cert.db -b int release 504h\r\nskipping expired certificate (SKI=4c3811b898005b5a2b703eaa78e4d5676767a77e, serial=120039007, subject='/Verizon Global Root CA/C=US/O=Verizon Business/OU=OmniRoot')\r\n1477 certificates rolled\r\n1 certificates skipped\r\nSuccessfully rolled new int release 2024.3.3\r\n$ cfssl-trust -d ./cert.db -b ca release 504h\r\n354 certificates rolled\r\n0 certificates skipped\r\nSuccessfully rolled new ca release 2024.3.3\r\n$ cfssl-trust -d ./cert.db -r 2024.3.3 -b int bundle int-bundle.crt\r\nselected release 2024.3.3\r\nSelected 1477 certificates for this release.\r\n$ cfssl-trust -d ./cert.db -r 2024.3.3 -b ca bundle ca-bundle.crt\r\nselected release 2024.3.3\r\nSelected 354 certificates for this release.\r\n$ certdump ca-bundle.crt > certdata/ca-bundle.txt\r\n$ certdump int-bundle.crt > certdata/int-bundle.txt\r\n$ git status --porcelain -uno\r\nM cert.db\r\nM certdata/int-bundle.txt\r\nM int-bundle.crt\r\n\r\nCo-authored-by: Nicky Semenza ","shortMessageHtmlLink":"Trust store release 2024.3.3 (#264)"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAEWXnIWwA","startCursor":null,"endCursor":null}},"title":"Activity · cloudflare/cfssl_trust"}