On 2023-01-19 4:08, Tomoaki AOKI wrote:
On Thu, 19 Jan 2023 03:13:48 -0800
Mel Pilgrim <list_free...@bluerosetech.com> wrote:
Given /usr/share/certs exists for all supported releases, is there any
reason to keep the ca_root_nss port?
If everyone in the world uses LATEST main only, yes.
But the assumption is clearly nonsense.
Basically, commits to main are settled a while before MFC to stable
branches, and MFS to releng branches needs additional settling days.
If any certs happened to be non-reliable, this delay can cause, at
worst, catastorphic scenario.
If updates to certs are always promised to be "MFC after: now" and
committed to ALL SUPPORTED BRANCHES AT ONCE, I have no objection.
If not, keeping ca_root_nss port and updated ASAP with upstream should
be mandatory.
If ca_root_nss delivered the certs in the same format, sure, but that
monolithic file makes installing private CAs a hassle.
I wonder if the script secteam uses to update the trust store in the src
tree could be turned into a periodic script that automatically updates
the trust store? Side-step the release engineering delay entirely by
turning trust store updates into a user task.