{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":21633655,"defaultBranch":"master","name":"cfssl_trust","ownerLogin":"cloudflare","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2014-07-09T00:21:35.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/314135?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1716693687.0","currentOid":""},"activityList":{"items":[{"before":null,"after":"2627e61585bc44f539f06e2787d392477161bcf6","ref":"refs/heads/release/2024.5.4","pushedAt":"2024-05-26T03:21:27.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"github-actions[bot]","name":null,"path":"/apps/github-actions","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/15368?s=80&v=4"},"commit":{"message":"Trust store release 2024.5.4\n\nRolling trust store release at 2024-05-26T03:21:19+0000.\n$ cfssl-trust -d ./cert.db -b int release 504h\nskipping expired certificate (SKI=af3e1e67132beda3561f6caef0e29b98a20f6945, serial=1462505468747148218216492715267117, subject='/GlobalSign PersonalSign 3 CA - SHA256 - G3/C=BE/O=GlobalSign nv-sa')\nskipping expired certificate (SKI=697282623167954485779180c40436499d7b0b61, serial=1462505468235399478280266926003443, subject='/GlobalSign PersonalSign 2 CA - SHA256 - G3/C=BE/O=GlobalSign nv-sa')\nskipping expired certificate (SKI=9627c2c2a5f71cf8027a7a64af636f32d298c2b1, serial=1462505467699540635281271848257549, subject='/GlobalSign PersonalSign 1 CA - SHA256 - G3/C=BE/O=GlobalSign nv-sa')\n1465 certificates rolled\n3 certificates skipped\nSuccessfully rolled new int release 2024.5.4\n$ cfssl-trust -d ./cert.db -b ca release 504h\n354 certificates rolled\n0 certificates skipped\nSuccessfully rolled new ca release 2024.5.4\n$ cfssl-trust -d ./cert.db -r 2024.5.4 -b int bundle int-bundle.crt\nselected release 2024.5.4\nSelected 1465 certificates for this release.\n$ cfssl-trust -d ./cert.db -r 2024.5.4 -b ca bundle ca-bundle.crt\nselected release 2024.5.4\nSelected 354 certificates for this release.\n$ certdump ca-bundle.crt > certdata/ca-bundle.txt\n$ certdump int-bundle.crt > certdata/int-bundle.txt\n$ git status --porcelain -uno\nM cert.db\nM certdata/int-bundle.txt\nM int-bundle.crt","shortMessageHtmlLink":"Trust store release 2024.5.4"}},{"before":"9d903d1250b6521099ab3c034665d5f25829d817","after":"d9292bb147f78ed68f1dd8a034c0b4c868aa83ab","ref":"refs/heads/master","pushedAt":"2024-05-20T22:10:53.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"BowonY","name":"bowon","path":"/BowonY","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10628970?s=80&v=4"},"commit":{"message":"Merge pull request #278 from cloudflare/release/2024.5.3\n\nTrust store release 2024.5.3","shortMessageHtmlLink":"Merge pull request #278 from cloudflare/release/2024.5.3"}},{"before":null,"after":"e10113a9a1e4359a60efb828cd47e00e00a4bb1a","ref":"refs/heads/release/2024.5.3","pushedAt":"2024-05-20T22:03:51.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"BowonY","name":"bowon","path":"/BowonY","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10628970?s=80&v=4"},"commit":{"message":"Trust store release 2024.5.3\n\nRolling trust store release at 2024-05-20T15:03:43-0700.\n$ cfssl-trust -d ./cert.db -b int release 504h\nskipping expired certificate (SKI=49eca7c8a9f7c5bb2caa24e7f443b3b13ce854f8, serial=125461920344817614170587321111204124502, subject='/GeoTrust DV SSL SHA256 CA/C=US/O=GeoTrust Inc./OU=Domain Validated SSL')\nskipping expired certificate (SKI=4cf4bfe83bbec224f31b473bb56e488e16abaf12, serial=96917227797452748385619024155305546951, subject='/RapidSSL SHA256 CA - G2/C=US/O=GeoTrust Inc.')\nskipping expired certificate (SKI=9fb8c1a96cf2f5c0222a94ed5c99acd4ecd7c607, serial=59035790283496901465862296573075037777, subject='/thawte DV SSL CA - G2/C=US/O=thawte, Inc./OU=Domain Validated SSL')\nskipping expired certificate (SKI=7d29312fc11e6eae31056ab3eb1ccda9ddae809a, serial=82594928017948708048133982543356432554, subject='/thawte DV SSL SHA256 CA/C=US/O=thawte, Inc./OU=Domain Validated SSL')\n1464 certificates rolled\n4 certificates skipped\nSuccessfully rolled new int release 2024.5.3\n$ cfssl-trust -d ./cert.db -b ca release 504h\n354 certificates rolled\n0 certificates skipped\nSuccessfully rolled new ca release 2024.5.3\nAdding new intermediates:\n--/Users/bowon/new-ints/cross-signed-r4.pem ---\nCERTIFICATE\nSubject: /GTS Root R4/C=US/O=Google Trust Services LLC\nIssuer: /GlobalSign Root CA/C=BE/O=GlobalSign nv-sa/OU=Root CA\n\tSignature algorithm: RSA / SHA256\nDetails:\n\tPublic key: ECDSA-secp384r1\n\tSerial number: 170001980149335831901244157168837298715\n\tAKI: 60:7B:66:1A:45:0D:97:CA:89:50:2F:7D:04:CD:34:A8:FF:FC:FD:4B\n\tSKI: 80:4C:D6:EB:74:FF:49:36:A3:D5:D8:FC:B5:3E:C5:6A:F0:94:1D:8C\n\tValid from: 2023-11-15T03:43:21+0000\n\t until: 2028-01-28T00:00:42+0000\n\tKey usages: cert sign, crl sign, digital signature\n\tExtended usages: client auth, server auth\n\tBasic constraints: valid, is a CA certificate\n\tSANs (0):\n\t1 AIA:\n\t\thttp://i.pki.goog/gsr1.crt\n--/Users/bowon/new-ints/2p2.pem ---\nCERTIFICATE\nSubject: /GTS CA 2P2/C=US/O=Google Trust Services LLC\nIssuer: /GTS Root R4/C=US/O=Google Trust Services LLC\n\tSignature algorithm: ECDSA / SHA384\nDetails:\n\tPublic key: ECDSA-prime256v1\n\tSerial number: 165390902415987118112848868672\n\tAKI: 80:4C:D6:EB:74:FF:49:36:A3:D5:D8:FC:B5:3E:C5:6A:F0:94:1D:8C\n\tSKI: 87:23:A9:50:48:0E:07:89:54:0A:71:30:F6:33:D2:0A:47:F6:9D:AC\n\tValid from: 2022-10-05T00:00:42+0000\n\t until: 2027-09-30T00:00:42+0000\n\tKey usages: cert sign, crl sign, digital signature\n\tExtended usages: client auth, server auth\n\tBasic constraints: valid, is a CA certificate, max path length 0\n\tSANs (0):\n\t1 AIA:\n\t\thttp://pki.goog/repo/certs/gtsr4.der\n\tOCSP server:\n\t\t- http://ocsp.pki.goog/gtsr4\n--/Users/bowon/new-ints/we1.pem ---\nCERTIFICATE\nSubject: /WE1/C=US/O=Google Trust Services\nIssuer: /GTS Root R4/C=US/O=Google Trust Services LLC\n\tSignature algorithm: ECDSA / SHA384\nDetails:\n\tPublic key: ECDSA-prime256v1\n\tSerial number: 170074200136485300614847617070429275619\n\tAKI: 80:4C:D6:EB:74:FF:49:36:A3:D5:D8:FC:B5:3E:C5:6A:F0:94:1D:8C\n\tSKI: 90:77:92:35:67:C4:FF:A8:CC:A9:E6:7B:D9:80:79:7B:CC:93:F9:38\n\tValid from: 2023-12-13T09:00:00+0000\n\t until: 2029-02-20T14:00:00+0000\n\tKey usages: cert sign, crl sign, digital signature\n\tExtended usages: client auth, server auth\n\tBasic constraints: valid, is a CA certificate, max path length 0\n\tSANs (0):\n\t1 AIA:\n\t\thttp://i.pki.goog/r4.crt\n--/Users/bowon/new-ints/wr1.pem ---\nCERTIFICATE\nSubject: /WR1/C=US/O=Google Trust Services\nIssuer: /GTS Root R1/C=US/O=Google Trust Services LLC\n\tSignature algorithm: RSA / SHA256\nDetails:\n\tPublic key: RSA-2048\n\tSerial number: 169943283142817666033504407772870502567\n\tAKI: E4:AF:2B:26:71:1A:2B:48:27:85:2F:52:66:2C:EF:F0:89:13:71:3E\n\tSKI: 66:69:49:D4:DE:2A:9C:91:03:CF:89:0E:24:B8:0E:30:03:6E:88:2E\n\tValid from: 2023-12-13T09:00:00+0000\n\t until: 2029-02-20T14:00:00+0000\n\tKey usages: cert sign, crl sign, digital signature\n\tExtended usages: client auth, server auth\n\tBasic constraints: valid, is a CA certificate, max path length 0\n\tSANs (0):\n\t1 AIA:\n\t\thttp://i.pki.goog/r1.crt\nselected release 2024.5.3\n- importing serial 170001980149335831901244157168837298715 SKI 804cd6eb74ff4936a3d5d8fcb53ec56af0941d8c\n- importing serial 165390902415987118112848868672 SKI 8723a950480e0789540a7130f633d20a47f69dac\n- importing serial 170074200136485300614847617070429275619 SKI 9077923567c4ffa8cca9e67bd980797bcc93f938\n- importing serial 169943283142817666033504407772870502567 SKI 666949d4de2a9c9103cf890e24b80e30036e882e\n$ cfssl-trust -d ./cert.db -r 2024.5.3 -b int bundle int-bundle.crt\nselected release 2024.5.3\nSelected 1468 certificates for this release.\n$ cfssl-trust -d ./cert.db -r 2024.5.3 -b ca bundle ca-bundle.crt\nselected release 2024.5.3\nSelected 354 certificates for this release.\n$ certdump ca-bundle.crt > certdata/ca-bundle.txt\n$ certdump int-bundle.crt > certdata/int-bundle.txt\n$ git status --porcelain -uno\nM cert.db\nM certdata/int-bundle.txt\nM int-bundle.crt","shortMessageHtmlLink":"Trust store release 2024.5.3"}},{"before":"4ba6c9243b84c91ca169deac35d893442784dfaf","after":"9d903d1250b6521099ab3c034665d5f25829d817","ref":"refs/heads/master","pushedAt":"2024-05-20T15:42:05.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"mitalirawat","name":"Mitali","path":"/mitalirawat","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/31329501?s=80&v=4"},"commit":{"message":"Merge pull request #277 from cloudflare/release/2024.5.2\n\nTrust store release 2024.5.2","shortMessageHtmlLink":"Merge pull request #277 from cloudflare/release/2024.5.2"}},{"before":"4ba6c9243b84c91ca169deac35d893442784dfaf","after":"69768461c22ff1c50bb61ef382ee1fe0106d8749","ref":"refs/heads/release/2024.5.2","pushedAt":"2024-05-19T03:21:47.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"github-actions[bot]","name":null,"path":"/apps/github-actions","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/15368?s=80&v=4"},"commit":{"message":"Trust store release 2024.5.2\n\nRolling trust store release at 2024-05-19T03:21:39+0000.\n$ cfssl-trust -d ./cert.db -b int release 504h\nskipping expired certificate (SKI=8874466dc77cb5fa727119debf275e0d68e0f727, serial=17839523128582866008, subject='/SwissSign EV Gold CA 2009 - G2/C=CH/O=SwissSign AG')\nskipping expired certificate (SKI=75aee40f2ea9beb233d9159ac994c1f730b435aa, serial=15859694353208028684339222923980680763, subject='/DigiCert Provisional Direct Med CA/C=US/O=DigiCert Inc/OU=www.digicert.com')\n1468 certificates rolled\n2 certificates skipped\nSuccessfully rolled new int release 2024.5.2\n$ cfssl-trust -d ./cert.db -b ca release 504h\n354 certificates rolled\n0 certificates skipped\nSuccessfully rolled new ca release 2024.5.2\n$ cfssl-trust -d ./cert.db -r 2024.5.2 -b int bundle int-bundle.crt\nselected release 2024.5.2\nSelected 1468 certificates for this release.\n$ cfssl-trust -d ./cert.db -r 2024.5.2 -b ca bundle ca-bundle.crt\nselected release 2024.5.2\nSelected 354 certificates for this release.\n$ certdump ca-bundle.crt > certdata/ca-bundle.txt\n$ certdump int-bundle.crt > certdata/int-bundle.txt\n$ git status --porcelain -uno\nM cert.db\nM certdata/int-bundle.txt\nM int-bundle.crt","shortMessageHtmlLink":"Trust store release 2024.5.2"}},{"before":"88dcfd73ff1b69cfb12b44eb22dd01ec9c98ba6d","after":null,"ref":"refs/tags/trust-store-2024.5.2","pushedAt":"2024-05-18T00:04:28.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"BowonY","name":"bowon","path":"/BowonY","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10628970?s=80&v=4"}},{"before":"88dcfd73ff1b69cfb12b44eb22dd01ec9c98ba6d","after":"4ba6c9243b84c91ca169deac35d893442784dfaf","ref":"refs/heads/release/2024.5.2","pushedAt":"2024-05-17T23:45:27.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"BowonY","name":"bowon","path":"/BowonY","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10628970?s=80&v=4"},"commit":{"message":"Merge pull request #275 from cloudflare/release/2024.5.1\n\nTrust store release 2024.5.1","shortMessageHtmlLink":"Merge pull request #275 from cloudflare/release/2024.5.1"}},{"before":null,"after":"88dcfd73ff1b69cfb12b44eb22dd01ec9c98ba6d","ref":"refs/heads/release/2024.5.2","pushedAt":"2024-05-17T23:40:11.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"BowonY","name":"bowon","path":"/BowonY","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10628970?s=80&v=4"},"commit":{"message":"Trust store release 2024.5.2\n\nRolling trust store release at 2024-05-17T16:40:03-0700.\n$ cfssl-trust -d ./cert.db -b int release 0h\n1470 certificates rolled\n0 certificates skipped\nSuccessfully rolled new int release 2024.5.2\n$ cfssl-trust -d ./cert.db -b ca release 0h\n354 certificates rolled\n0 certificates skipped\nSuccessfully rolled new ca release 2024.5.2\nAdding new intermediates:\n--/Users/bowon/tips/wellknown/google/we1.pem ---\nCERTIFICATE\nSubject: /WE1/C=US/O=Google Trust Services\nIssuer: /GTS Root R4/C=US/O=Google Trust Services LLC\n\tSignature algorithm: ECDSA / SHA384\nDetails:\n\tPublic key: ECDSA-prime256v1\n\tSerial number: 170074200136485300614847617070429275619\n\tAKI: 80:4C:D6:EB:74:FF:49:36:A3:D5:D8:FC:B5:3E:C5:6A:F0:94:1D:8C\n\tSKI: 90:77:92:35:67:C4:FF:A8:CC:A9:E6:7B:D9:80:79:7B:CC:93:F9:38\n\tValid from: 2023-12-13T09:00:00+0000\n\t until: 2029-02-20T14:00:00+0000\n\tKey usages: cert sign, crl sign, digital signature\n\tExtended usages: client auth, server auth\n\tBasic constraints: valid, is a CA certificate, max path length 0\n\tSANs (0):\n\t1 AIA:\n\t\thttp://i.pki.goog/r4.crt\n--/Users/bowon/tips/wellknown/google/cross-signed-r4.pem ---\nCERTIFICATE\nSubject: /GTS Root R4/C=US/O=Google Trust Services LLC\nIssuer: /GlobalSign Root CA/C=BE/O=GlobalSign nv-sa/OU=Root CA\n\tSignature algorithm: RSA / SHA256\nDetails:\n\tPublic key: ECDSA-secp384r1\n\tSerial number: 170001980149335831901244157168837298715\n\tAKI: 60:7B:66:1A:45:0D:97:CA:89:50:2F:7D:04:CD:34:A8:FF:FC:FD:4B\n\tSKI: 80:4C:D6:EB:74:FF:49:36:A3:D5:D8:FC:B5:3E:C5:6A:F0:94:1D:8C\n\tValid from: 2023-11-15T03:43:21+0000\n\t until: 2028-01-28T00:00:42+0000\n\tKey usages: cert sign, crl sign, digital signature\n\tExtended usages: client auth, server auth\n\tBasic constraints: valid, is a CA certificate\n\tSANs (0):\n\t1 AIA:\n\t\thttp://i.pki.goog/gsr1.crt\nselected release 2024.5.2\n- importing serial 170074200136485300614847617070429275619 SKI 9077923567c4ffa8cca9e67bd980797bcc93f938\n- importing serial 170001980149335831901244157168837298715 SKI 804cd6eb74ff4936a3d5d8fcb53ec56af0941d8c\n$ cfssl-trust -d ./cert.db -r 2024.5.2 -b int bundle int-bundle.crt\nselected release 2024.5.2\nSelected 1472 certificates for this release.\n$ cfssl-trust -d ./cert.db -r 2024.5.2 -b ca bundle ca-bundle.crt\nselected release 2024.5.2\nSelected 354 certificates for this release.","shortMessageHtmlLink":"Trust store release 2024.5.2"}},{"before":"bdacb27121c9c81e84dcadf65445fa184579f16a","after":"4ba6c9243b84c91ca169deac35d893442784dfaf","ref":"refs/heads/master","pushedAt":"2024-05-13T17:42:58.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"BowonY","name":"bowon","path":"/BowonY","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10628970?s=80&v=4"},"commit":{"message":"Merge pull request #275 from cloudflare/release/2024.5.1\n\nTrust store release 2024.5.1","shortMessageHtmlLink":"Merge pull request #275 from cloudflare/release/2024.5.1"}},{"before":null,"after":"02bebe48213d619044f888cd730e94c6c2bf1f78","ref":"refs/heads/release/2024.5.1","pushedAt":"2024-05-12T03:21:26.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"github-actions[bot]","name":null,"path":"/apps/github-actions","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/15368?s=80&v=4"},"commit":{"message":"Trust store release 2024.5.1\n\nRolling trust store release at 2024-05-12T03:21:18+0000.\n$ cfssl-trust -d ./cert.db -b int release 504h\nskipping expired certificate (SKI=d98bb74856249d3304b60a90dd62810281449325, serial=10905861135842523791628165016635761949, subject='/Henkel Secure E-mail CA/C=DE/O=Henkel AG & Co. KGaA/OU=Class 2 DigiCert PKI Platform Individual Subscriber CA')\n1470 certificates rolled\n1 certificates skipped\nSuccessfully rolled new int release 2024.5.1\n$ cfssl-trust -d ./cert.db -b ca release 504h\n354 certificates rolled\n0 certificates skipped\nSuccessfully rolled new ca release 2024.5.1\n$ cfssl-trust -d ./cert.db -r 2024.5.1 -b int bundle int-bundle.crt\nselected release 2024.5.1\nSelected 1470 certificates for this release.\n$ cfssl-trust -d ./cert.db -r 2024.5.1 -b ca bundle ca-bundle.crt\nselected release 2024.5.1\nSelected 354 certificates for this release.\n$ certdump ca-bundle.crt > certdata/ca-bundle.txt\n$ certdump int-bundle.crt > certdata/int-bundle.txt\n$ git status --porcelain -uno\nM cert.db\nM certdata/int-bundle.txt\nM int-bundle.crt","shortMessageHtmlLink":"Trust store release 2024.5.1"}},{"before":"47d4e5099c7132f617f4fda7597df1c56e52992a","after":"bdacb27121c9c81e84dcadf65445fa184579f16a","ref":"refs/heads/master","pushedAt":"2024-05-06T13:38:57.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"vasilzhigilei","name":"Vasil Zhigilei","path":"/vasilzhigilei","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/43997082?s=80&v=4"},"commit":{"message":"Merge pull request #274 from cloudflare/release/2024.5.0\n\nTrust store release 2024.5.0","shortMessageHtmlLink":"Merge pull request #274 from cloudflare/release/2024.5.0"}},{"before":null,"after":"a8cb14dd349a5b25bb7dadc542883273ae64aba2","ref":"refs/heads/release/2024.5.0","pushedAt":"2024-05-05T03:21:00.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"github-actions[bot]","name":null,"path":"/apps/github-actions","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/15368?s=80&v=4"},"commit":{"message":"Trust store release 2024.5.0\n\nRolling trust store release at 2024-05-05T03:20:52+0000.\n$ cfssl-trust -d ./cert.db -b int release 504h\nskipping expired certificate (SKI=58889fd6dc9c4822b7143eff8488e8e685fffa7d, serial=11591687389060913796532298097930387285, subject='/Microsoft IT TLS CA 1/C=US/O=Microsoft Corporation/OU=Microsoft IT/L=Redmond/ST=Washington')\nskipping expired certificate (SKI=919e3b446c3d579c42772a34d74fd1cc4a972cda, serial=20167221470134893166970605289928033641, subject='/Microsoft IT TLS CA 2/C=US/O=Microsoft Corporation/OU=Microsoft IT/L=Redmond/ST=Washington')\nskipping expired certificate (SKI=7a7b8cc1cfe7a0ca1cd46bfafbe133c30f1aa29d, serial=15175535935517275601075715039141166771, subject='/Microsoft IT TLS CA 4/C=US/O=Microsoft Corporation/OU=Microsoft IT/L=Redmond/ST=Washington')\nskipping expired certificate (SKI=08fe259f74ea8704c2bcbb8ea8385f33c6d16c65, serial=11344140759149608646467569638499596626, subject='/Microsoft IT TLS CA 5/C=US/O=Microsoft Corporation/OU=Microsoft IT/L=Redmond/ST=Washington')\n1471 certificates rolled\n4 certificates skipped\nSuccessfully rolled new int release 2024.5.0\n$ cfssl-trust -d ./cert.db -b ca release 504h\n354 certificates rolled\n0 certificates skipped\nSuccessfully rolled new ca release 2024.5.0\n$ cfssl-trust -d ./cert.db -r 2024.5.0 -b int bundle int-bundle.crt\nselected release 2024.5.0\nSelected 1471 certificates for this release.\n$ cfssl-trust -d ./cert.db -r 2024.5.0 -b ca bundle ca-bundle.crt\nselected release 2024.5.0\nSelected 354 certificates for this release.\n$ certdump ca-bundle.crt > certdata/ca-bundle.txt\n$ certdump int-bundle.crt > certdata/int-bundle.txt\n$ git status --porcelain -uno\nM cert.db\nM certdata/int-bundle.txt\nM int-bundle.crt","shortMessageHtmlLink":"Trust store release 2024.5.0"}},{"before":"fc477ffcb1a79f59dd8759604fc400631e00a9cf","after":"47d4e5099c7132f617f4fda7597df1c56e52992a","ref":"refs/heads/master","pushedAt":"2024-04-30T18:07:41.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"BowonY","name":"bowon","path":"/BowonY","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10628970?s=80&v=4"},"commit":{"message":"Merge pull request #273 from cloudflare/release/2024.4.1\n\nTrust store release 2024.4.1","shortMessageHtmlLink":"Merge pull request #273 from cloudflare/release/2024.4.1"}},{"before":null,"after":"eb25f2c1caad36d9903057f2920faa83499d9aff","ref":"refs/heads/release/2024.4.1","pushedAt":"2024-04-28T03:21:04.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"github-actions[bot]","name":null,"path":"/apps/github-actions","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/15368?s=80&v=4"},"commit":{"message":"Trust store release 2024.4.1\n\nRolling trust store release at 2024-04-28T03:20:57+0000.\n$ cfssl-trust -d ./cert.db -b int release 504h\nskipping expired certificate (SKI=4c3811b898005b5a2b703eaa78e4d5676767a77e, serial=120040506, subject='/Verizon Global Root CA/C=US/O=Verizon Business/OU=OmniRoot')\n1475 certificates rolled\n1 certificates skipped\nSuccessfully rolled new int release 2024.4.1\n$ cfssl-trust -d ./cert.db -b ca release 504h\n354 certificates rolled\n0 certificates skipped\nSuccessfully rolled new ca release 2024.4.1\n$ cfssl-trust -d ./cert.db -r 2024.4.1 -b int bundle int-bundle.crt\nselected release 2024.4.1\nSelected 1475 certificates for this release.\n$ cfssl-trust -d ./cert.db -r 2024.4.1 -b ca bundle ca-bundle.crt\nselected release 2024.4.1\nSelected 354 certificates for this release.\n$ certdump ca-bundle.crt > certdata/ca-bundle.txt\n$ certdump int-bundle.crt > certdata/int-bundle.txt\n$ git status --porcelain -uno\nM cert.db\nM certdata/int-bundle.txt\nM int-bundle.crt","shortMessageHtmlLink":"Trust store release 2024.4.1"}},{"before":"82ca61965541cd1a7db01f4d2612828dd43bca78","after":null,"ref":"refs/heads/dependabot/go_modules/golang.org/x/net-0.23.0","pushedAt":"2024-04-22T18:07:02.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"dependabot[bot]","name":null,"path":"/apps/dependabot","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/29110?s=80&v=4"}},{"before":"d287e02e8465a725cf14a4d99f428e5b29bfcc4a","after":"fc477ffcb1a79f59dd8759604fc400631e00a9cf","ref":"refs/heads/master","pushedAt":"2024-04-22T18:06:54.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"nickysemenza","name":"Nicky Semenza","path":"/nickysemenza","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/707582?s=80&v=4"},"commit":{"message":"Merge pull request #272 from cloudflare/dependabot/go_modules/golang.org/x/net-0.23.0\n\nBump golang.org/x/net from 0.17.0 to 0.23.0","shortMessageHtmlLink":"Merge pull request #272 from cloudflare/dependabot/go_modules/golang.…"}},{"before":null,"after":"82ca61965541cd1a7db01f4d2612828dd43bca78","ref":"refs/heads/dependabot/go_modules/golang.org/x/net-0.23.0","pushedAt":"2024-04-19T12:23:17.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"dependabot[bot]","name":null,"path":"/apps/dependabot","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/29110?s=80&v=4"},"commit":{"message":"Bump golang.org/x/net from 0.17.0 to 0.23.0\n\nBumps [golang.org/x/net](https://github.com/golang/net) from 0.17.0 to 0.23.0.\n- [Commits](https://github.com/golang/net/compare/v0.17.0...v0.23.0)\n\n---\nupdated-dependencies:\n- dependency-name: golang.org/x/net\n dependency-type: indirect\n...\n\nSigned-off-by: dependabot[bot] ","shortMessageHtmlLink":"Bump golang.org/x/net from 0.17.0 to 0.23.0"}},{"before":"d1f3d5fed1f3672987ce20538244e54be6bc33c9","after":"d287e02e8465a725cf14a4d99f428e5b29bfcc4a","ref":"refs/heads/master","pushedAt":"2024-04-08T20:20:45.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"lgarofalo","name":"Leland Garofalo","path":"/lgarofalo","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7418073?s=80&v=4"},"commit":{"message":"Trust store release 2024.4.0 (#269)\n\nRolling trust store release at 2024-04-07T03:20:08+0000.\r\n$ cfssl-trust -d ./cert.db -b int release 504h\r\nskipping expired certificate (SKI=be66cd9a79849f1b023edb3d1ad08f32164996e0, serial=6252724313679620825149470155455970013, subject='/Rush Health CA/C=US/O=Rush Health/OU=Orion Health Direct Secure Messaging')\r\nskipping expired certificate (SKI=b6087b0d7accac204c8656325ecfab6e852d7057, serial=120039509, subject='/Cybertrust Global Root/O=Cybertrust, Inc')\r\n1476 certificates rolled\r\n2 certificates skipped\r\nSuccessfully rolled new int release 2024.4.0\r\n$ cfssl-trust -d ./cert.db -b ca release 504h\r\n354 certificates rolled\r\n0 certificates skipped\r\nSuccessfully rolled new ca release 2024.4.0\r\n$ cfssl-trust -d ./cert.db -r 2024.4.0 -b int bundle int-bundle.crt\r\nselected release 2024.4.0\r\nSelected 1476 certificates for this release.\r\n$ cfssl-trust -d ./cert.db -r 2024.4.0 -b ca bundle ca-bundle.crt\r\nselected release 2024.4.0\r\nSelected 354 certificates for this release.\r\n$ certdump ca-bundle.crt > certdata/ca-bundle.txt\r\n$ certdump int-bundle.crt > certdata/int-bundle.txt\r\n$ git status --porcelain -uno\r\nM cert.db\r\nM certdata/int-bundle.txt\r\nM int-bundle.crt\r\n\r\nCo-authored-by: Leland Garofalo ","shortMessageHtmlLink":"Trust store release 2024.4.0 (#269)"}},{"before":null,"after":"449654a6b6ddf3c6c4596749c3e3a3f9d2250077","ref":"refs/heads/release/2024.4.0","pushedAt":"2024-04-07T03:20:16.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"github-actions[bot]","name":null,"path":"/apps/github-actions","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/15368?s=80&v=4"},"commit":{"message":"Trust store release 2024.4.0\n\nRolling trust store release at 2024-04-07T03:20:08+0000.\n$ cfssl-trust -d ./cert.db -b int release 504h\nskipping expired certificate (SKI=be66cd9a79849f1b023edb3d1ad08f32164996e0, serial=6252724313679620825149470155455970013, subject='/Rush Health CA/C=US/O=Rush Health/OU=Orion Health Direct Secure Messaging')\nskipping expired certificate (SKI=b6087b0d7accac204c8656325ecfab6e852d7057, serial=120039509, subject='/Cybertrust Global Root/O=Cybertrust, Inc')\n1476 certificates rolled\n2 certificates skipped\nSuccessfully rolled new int release 2024.4.0\n$ cfssl-trust -d ./cert.db -b ca release 504h\n354 certificates rolled\n0 certificates skipped\nSuccessfully rolled new ca release 2024.4.0\n$ cfssl-trust -d ./cert.db -r 2024.4.0 -b int bundle int-bundle.crt\nselected release 2024.4.0\nSelected 1476 certificates for this release.\n$ cfssl-trust -d ./cert.db -r 2024.4.0 -b ca bundle ca-bundle.crt\nselected release 2024.4.0\nSelected 354 certificates for this release.\n$ certdump ca-bundle.crt > certdata/ca-bundle.txt\n$ certdump int-bundle.crt > certdata/int-bundle.txt\n$ git status --porcelain -uno\nM cert.db\nM certdata/int-bundle.txt\nM int-bundle.crt","shortMessageHtmlLink":"Trust store release 2024.4.0"}},{"before":"93293bbd0b1f7e30359805c8888abc60fee6fcd9","after":"d1f3d5fed1f3672987ce20538244e54be6bc33c9","ref":"refs/heads/master","pushedAt":"2024-03-28T19:13:49.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"lgarofalo","name":"Leland Garofalo","path":"/lgarofalo","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7418073?s=80&v=4"},"commit":{"message":"Trust store release 2024.3.4 (#265)\n\nRolling trust store release at 2024-03-28T09:52:27-0700.\r\n$ cfssl-trust -d ./cert.db -b int release 0h\r\n1477 certificates rolled\r\n0 certificates skipped\r\nSuccessfully rolled new int release 2024.3.4\r\n$ cfssl-trust -d ./cert.db -b ca release 0h\r\n354 certificates rolled\r\n0 certificates skipped\r\nSuccessfully rolled new ca release 2024.3.4\r\nAdding new intermediates:\r\n--new_int ---\r\nCERTIFICATE\r\nSubject: /Cybertrust Japan SureServer EV CA G3/C=JP/O=Cybertrust Japan Co.,\r\n Ltd.\r\nIssuer: /C=JP/O=SECOM Trust Systems CO.,LTD./OU=Security Communication RootCA2\r\n\tSignature algorithm: RSA / SHA256\r\nDetails:\r\n\tPublic key: RSA-2048\r\n\tSerial number: 46157929531853354100488418937468587687\r\n\tAKI: 0A:85:A9:77:65:05:98:7C:40:81:F8:0F:97:2C:38:F1:0A:EC:3C:CF\r\n\tSKI: 82:6C:75:5D:53:F5:45:69:BC:25:2D:A4:4C:89:E6:B2:B7:41:87:A3\r\n\tValid from: 2023-12-13T06:28:45+0000\r\n\t until: 2029-05-29T05:00:39+0000\r\n\tKey usages: cert sign, crl sign\r\n\tExtended usages: client auth, server auth\r\n\tBasic constraints: valid, is a CA certificate, max path length 0\r\n\tSANs (0):\r\n\t1 AIA:\r\n\t\thttp://repository.secomtrust.net/SC-Root2/SCRoot2ca.cer\r\n\tOCSP server:\r\n\t\t- http://scrootca2.ocsp.secomtrust.net\r\nselected release 2024.3.4\r\n- importing serial 46157929531853354100488418937468587687 SKI 826c755d53f54569bc252da44c89e6b2b74187a3\r\n$ cfssl-trust -d ./cert.db -r 2024.3.4 -b int bundle int-bundle.crt\r\nselected release 2024.3.4\r\nSelected 1478 certificates for this release.\r\n$ cfssl-trust -d ./cert.db -r 2024.3.4 -b ca bundle ca-bundle.crt\r\nselected release 2024.3.4\r\nSelected 354 certificates for this release.\r\n\r\nCo-authored-by: Leland Garofalo ","shortMessageHtmlLink":"Trust store release 2024.3.4 (#265)"}},{"before":"0b4e78504e646c0ecc2d57e77c41fd8e3a8af459","after":"3e225da544cf969d1b0fea570093604df9bbcdde","ref":"refs/heads/release/2024.3.4","pushedAt":"2024-03-28T16:53:48.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"lgarofalo","name":"Leland Garofalo","path":"/lgarofalo","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7418073?s=80&v=4"},"commit":{"message":"Trust store release 2024.3.4\n\nRolling trust store release at 2024-03-28T09:52:27-0700.\n$ cfssl-trust -d ./cert.db -b int release 0h\n1477 certificates rolled\n0 certificates skipped\nSuccessfully rolled new int release 2024.3.4\n$ cfssl-trust -d ./cert.db -b ca release 0h\n354 certificates rolled\n0 certificates skipped\nSuccessfully rolled new ca release 2024.3.4\nAdding new intermediates:\n--new_int ---\nCERTIFICATE\nSubject: /Cybertrust Japan SureServer EV CA G3/C=JP/O=Cybertrust Japan Co.,\n Ltd.\nIssuer: /C=JP/O=SECOM Trust Systems CO.,LTD./OU=Security Communication RootCA2\n\tSignature algorithm: RSA / SHA256\nDetails:\n\tPublic key: RSA-2048\n\tSerial number: 46157929531853354100488418937468587687\n\tAKI: 0A:85:A9:77:65:05:98:7C:40:81:F8:0F:97:2C:38:F1:0A:EC:3C:CF\n\tSKI: 82:6C:75:5D:53:F5:45:69:BC:25:2D:A4:4C:89:E6:B2:B7:41:87:A3\n\tValid from: 2023-12-13T06:28:45+0000\n\t until: 2029-05-29T05:00:39+0000\n\tKey usages: cert sign, crl sign\n\tExtended usages: client auth, server auth\n\tBasic constraints: valid, is a CA certificate, max path length 0\n\tSANs (0):\n\t1 AIA:\n\t\thttp://repository.secomtrust.net/SC-Root2/SCRoot2ca.cer\n\tOCSP server:\n\t\t- http://scrootca2.ocsp.secomtrust.net\nselected release 2024.3.4\n- importing serial 46157929531853354100488418937468587687 SKI 826c755d53f54569bc252da44c89e6b2b74187a3\n$ cfssl-trust -d ./cert.db -r 2024.3.4 -b int bundle int-bundle.crt\nselected release 2024.3.4\nSelected 1478 certificates for this release.\n$ cfssl-trust -d ./cert.db -r 2024.3.4 -b ca bundle ca-bundle.crt\nselected release 2024.3.4\nSelected 354 certificates for this release.","shortMessageHtmlLink":"Trust store release 2024.3.4"}},{"before":null,"after":"0b4e78504e646c0ecc2d57e77c41fd8e3a8af459","ref":"refs/heads/release/2024.3.4","pushedAt":"2024-03-28T16:52:34.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"lgarofalo","name":"Leland Garofalo","path":"/lgarofalo","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7418073?s=80&v=4"},"commit":{"message":"Trust store release 2024.3.4\n\nRolling trust store release at 2024-03-28T09:52:27-0700.\n$ cfssl-trust -d ./cert.db -b int release 0h\n1477 certificates rolled\n0 certificates skipped\nSuccessfully rolled new int release 2024.3.4\n$ cfssl-trust -d ./cert.db -b ca release 0h\n354 certificates rolled\n0 certificates skipped\nSuccessfully rolled new ca release 2024.3.4\nAdding new intermediates:\n--new_int ---\nCERTIFICATE\nSubject: /Cybertrust Japan SureServer EV CA G3/C=JP/O=Cybertrust Japan Co.,\n Ltd.\nIssuer: /C=JP/O=SECOM Trust Systems CO.,LTD./OU=Security Communication RootCA2\n\tSignature algorithm: RSA / SHA256\nDetails:\n\tPublic key: RSA-2048\n\tSerial number: 46157929531853354100488418937468587687\n\tAKI: 0A:85:A9:77:65:05:98:7C:40:81:F8:0F:97:2C:38:F1:0A:EC:3C:CF\n\tSKI: 82:6C:75:5D:53:F5:45:69:BC:25:2D:A4:4C:89:E6:B2:B7:41:87:A3\n\tValid from: 2023-12-13T06:28:45+0000\n\t until: 2029-05-29T05:00:39+0000\n\tKey usages: cert sign, crl sign\n\tExtended usages: client auth, server auth\n\tBasic constraints: valid, is a CA certificate, max path length 0\n\tSANs (0):\n\t1 AIA:\n\t\thttp://repository.secomtrust.net/SC-Root2/SCRoot2ca.cer\n\tOCSP server:\n\t\t- http://scrootca2.ocsp.secomtrust.net\nselected release 2024.3.4\n- importing serial 46157929531853354100488418937468587687 SKI 826c755d53f54569bc252da44c89e6b2b74187a3\n$ cfssl-trust -d ./cert.db -r 2024.3.4 -b int bundle int-bundle.crt\nselected release 2024.3.4\nSelected 1478 certificates for this release.\n$ cfssl-trust -d ./cert.db -r 2024.3.4 -b ca bundle ca-bundle.crt\nselected release 2024.3.4\nSelected 354 certificates for this release.","shortMessageHtmlLink":"Trust store release 2024.3.4"}},{"before":"b11c6565c17acd011364f375cbaee650a588294c","after":"93293bbd0b1f7e30359805c8888abc60fee6fcd9","ref":"refs/heads/master","pushedAt":"2024-03-28T16:35:47.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"lgarofalo","name":"Leland Garofalo","path":"/lgarofalo","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7418073?s=80&v=4"},"commit":{"message":"Trust store release 2024.3.3 (#264)\n\nRolling trust store release at 2024-03-24T03:19:47+0000.\r\n$ cfssl-trust -d ./cert.db -b int release 504h\r\nskipping expired certificate (SKI=4c3811b898005b5a2b703eaa78e4d5676767a77e, serial=120039007, subject='/Verizon Global Root CA/C=US/O=Verizon Business/OU=OmniRoot')\r\n1477 certificates rolled\r\n1 certificates skipped\r\nSuccessfully rolled new int release 2024.3.3\r\n$ cfssl-trust -d ./cert.db -b ca release 504h\r\n354 certificates rolled\r\n0 certificates skipped\r\nSuccessfully rolled new ca release 2024.3.3\r\n$ cfssl-trust -d ./cert.db -r 2024.3.3 -b int bundle int-bundle.crt\r\nselected release 2024.3.3\r\nSelected 1477 certificates for this release.\r\n$ cfssl-trust -d ./cert.db -r 2024.3.3 -b ca bundle ca-bundle.crt\r\nselected release 2024.3.3\r\nSelected 354 certificates for this release.\r\n$ certdump ca-bundle.crt > certdata/ca-bundle.txt\r\n$ certdump int-bundle.crt > certdata/int-bundle.txt\r\n$ git status --porcelain -uno\r\nM cert.db\r\nM certdata/int-bundle.txt\r\nM int-bundle.crt\r\n\r\nCo-authored-by: Nicky Semenza ","shortMessageHtmlLink":"Trust store release 2024.3.3 (#264)"}},{"before":null,"after":"100f7d4a3fbaf9d1d6c55cc8423f24b6dba8885a","ref":"refs/heads/release/2024.3.3","pushedAt":"2024-03-24T03:19:54.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"github-actions[bot]","name":null,"path":"/apps/github-actions","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/15368?s=80&v=4"},"commit":{"message":"Trust store release 2024.3.3\n\nRolling trust store release at 2024-03-24T03:19:47+0000.\n$ cfssl-trust -d ./cert.db -b int release 504h\nskipping expired certificate (SKI=4c3811b898005b5a2b703eaa78e4d5676767a77e, serial=120039007, subject='/Verizon Global Root CA/C=US/O=Verizon Business/OU=OmniRoot')\n1477 certificates rolled\n1 certificates skipped\nSuccessfully rolled new int release 2024.3.3\n$ cfssl-trust -d ./cert.db -b ca release 504h\n354 certificates rolled\n0 certificates skipped\nSuccessfully rolled new ca release 2024.3.3\n$ cfssl-trust -d ./cert.db -r 2024.3.3 -b int bundle int-bundle.crt\nselected release 2024.3.3\nSelected 1477 certificates for this release.\n$ cfssl-trust -d ./cert.db -r 2024.3.3 -b ca bundle ca-bundle.crt\nselected release 2024.3.3\nSelected 354 certificates for this release.\n$ certdump ca-bundle.crt > certdata/ca-bundle.txt\n$ certdump int-bundle.crt > certdata/int-bundle.txt\n$ git status --porcelain -uno\nM cert.db\nM certdata/int-bundle.txt\nM int-bundle.crt","shortMessageHtmlLink":"Trust store release 2024.3.3"}},{"before":"0c508add338c4b40b96f3fd875bd664c0ec56e53","after":null,"ref":"refs/heads/dependabot/go_modules/google.golang.org/protobuf-1.33.0","pushedAt":"2024-03-19T18:44:23.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"dependabot[bot]","name":null,"path":"/apps/dependabot","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/29110?s=80&v=4"}},{"before":"59f6c68f3df56e4e7de895d60fbf7fc20b73bd49","after":"b11c6565c17acd011364f375cbaee650a588294c","ref":"refs/heads/master","pushedAt":"2024-03-19T18:44:17.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"nickysemenza","name":"Nicky Semenza","path":"/nickysemenza","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/707582?s=80&v=4"},"commit":{"message":"Merge pull request #262 from cloudflare/dependabot/go_modules/google.golang.org/protobuf-1.33.0\n\nBump google.golang.org/protobuf from 1.28.1 to 1.33.0","shortMessageHtmlLink":"Merge pull request #262 from cloudflare/dependabot/go_modules/google.…"}},{"before":"86557aa94b93e0904e581c1dedcac7b6b88422e6","after":"59f6c68f3df56e4e7de895d60fbf7fc20b73bd49","ref":"refs/heads/master","pushedAt":"2024-03-18T20:32:02.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"BowonY","name":"bowon","path":"/BowonY","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10628970?s=80&v=4"},"commit":{"message":"Merge pull request #263 from cloudflare/release/2024.3.2\n\nTrust store release 2024.3.2","shortMessageHtmlLink":"Merge pull request #263 from cloudflare/release/2024.3.2"}},{"before":null,"after":"bbb2aebd46ed13c3eb86ef6c3f4e4e1557a3d71a","ref":"refs/heads/release/2024.3.2","pushedAt":"2024-03-17T03:20:03.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"github-actions[bot]","name":null,"path":"/apps/github-actions","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/15368?s=80&v=4"},"commit":{"message":"Trust store release 2024.3.2\n\nRolling trust store release at 2024-03-17T03:19:56+0000.\n$ cfssl-trust -d ./cert.db -b int release 504h\nskipping expired certificate (SKI=58e321f302914d72c610be5e29f5f8724d7921f0, serial=13452045612868201362524995868654712163, subject='/RelayHealth Direct CA/C=US/O=RelayHealth')\nskipping expired certificate (SKI=1b73db517eb2cde145e054e06d2b9872f066c02a, serial=12232513083103808025653467429174157681, subject='/Indian Health Service-RPMS DIRECT Messaging CA/C=US/O=Indian Health Service/OU=directihs.net')\n1478 certificates rolled\n2 certificates skipped\nSuccessfully rolled new int release 2024.3.2\n$ cfssl-trust -d ./cert.db -b ca release 504h\n354 certificates rolled\n0 certificates skipped\nSuccessfully rolled new ca release 2024.3.2\n$ cfssl-trust -d ./cert.db -r 2024.3.2 -b int bundle int-bundle.crt\nselected release 2024.3.2\nSelected 1478 certificates for this release.\n$ cfssl-trust -d ./cert.db -r 2024.3.2 -b ca bundle ca-bundle.crt\nselected release 2024.3.2\nSelected 354 certificates for this release.\n$ certdump ca-bundle.crt > certdata/ca-bundle.txt\n$ certdump int-bundle.crt > certdata/int-bundle.txt\n$ git status --porcelain -uno\nM cert.db\nM certdata/int-bundle.txt\nM int-bundle.crt","shortMessageHtmlLink":"Trust store release 2024.3.2"}},{"before":null,"after":"0c508add338c4b40b96f3fd875bd664c0ec56e53","ref":"refs/heads/dependabot/go_modules/google.golang.org/protobuf-1.33.0","pushedAt":"2024-03-13T22:09:33.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"dependabot[bot]","name":null,"path":"/apps/dependabot","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/29110?s=80&v=4"},"commit":{"message":"Bump google.golang.org/protobuf from 1.28.1 to 1.33.0\n\nBumps google.golang.org/protobuf from 1.28.1 to 1.33.0.\n\n---\nupdated-dependencies:\n- dependency-name: google.golang.org/protobuf\n dependency-type: indirect\n...\n\nSigned-off-by: dependabot[bot] ","shortMessageHtmlLink":"Bump google.golang.org/protobuf from 1.28.1 to 1.33.0"}},{"before":"9b29987a9a8432381bcf5eb0eb972cf2c406c9a2","after":"86557aa94b93e0904e581c1dedcac7b6b88422e6","ref":"refs/heads/master","pushedAt":"2024-03-11T17:35:35.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"nickysemenza","name":"Nicky Semenza","path":"/nickysemenza","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/707582?s=80&v=4"},"commit":{"message":"Merge pull request #261 from cloudflare/release/2024.3.1\n\nTrust store release 2024.3.1","shortMessageHtmlLink":"Merge pull request #261 from cloudflare/release/2024.3.1"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAEU_ieTgA","startCursor":null,"endCursor":null}},"title":"Activity · cloudflare/cfssl_trust"}