package ca-certs

  1. Overview
  2. Docs
Detect root CA certificates from the operating system

Install

Dune Dependency

Authors

Maintainers

Sources

ca-certs-1.0.0.tbz
sha256=8690f2312346724799f2d8a1b684ec16b627b027d4164803a0e2b7e2462c0a72
sha512=c710059766c0062f767d481f7fd97a693b34d3c83e6a53081dee2074b6b40dccbf9d13fcedf253f16ff2381f36da91f84f40749c68537c47abf619322d95d509

CHANGES.md.html

v1.0.0 (2024-08-06)

  • Use X509.Certificate.fold_decode_pem, available in x509 1.0.0 (#34 #35 @art-w @hannesm)

  • Remove usage of cstruct, update to x509 1.0.0 and mirage-crypto 1.0.0 API (#32 @dinosaure @hannesm)

  • Remove astring dependency (#26 @hannesm)

v0.2.3 (2022-09-02)

  • Respect the environment variable SSL_CERT_FILE as well (suggested in #22 by @Konubinix, fixed in #23 by @hannesm, ok'ed by @sternenseemann)

  • Update tests for recent alpine releases (#24 @hannesm, likely fixes #21)

v0.2.2 (2021-10-27)

  • Filter trailing certificate (if the data does not contain "-----BEGIN CERTIFICATE-----", it won't be a certificate) (#19 @hannesm)

  • Avoid deprecated functions from fmt (#19 @hannesm)

  • Remove rresult dependency (#19 @hannesm)

  • Update GitHub actions (#19 @hannesm)

v0.2.1 (2021-04-22)

  • Update to X.509 0.13.0 API (#18, @hannesm)

  • Respect NIX_SSL_CERT_FILE environment variable to support NixOS builds (reported by @sternenseemann in #16, fix in #17 by @hannesm)

v0.2.0 (2021-03-05)

  • Add Windows support (#14, @emillon)

v0.1.3 (2020-11-17)

  • Allow some certificates to fail decoding (#11, reported by @mattpallissard in mirleft/ocaml-x509#137)

v0.1.2 (2020-10-12)

  • Revise API, avoid temporary file creation on macos

v0.1.1 (2020-10-11)

  • Revise test suite to not connect to the network (to please opam's sandbox), instead use hardcoded certificate chains.

v0.1.0 (2020-10-09)

  • Tested on macos, Debian GNU/Linux, Ubuntu, Gentoo, Alpine, CentOS/RHEL 7, OpenSUSE, FreeBSD, OpenBSD

  • Initial release

OCaml

Innovation. Community. Security.