Mock Version: 2.15 ENTER ['do_with_status'](['bash', '--login', '-c', '/usr/bin/rpmbuild -bs --target ppc64le --nodeps /builddir/build/SPECS/ca-certificates.spec'], chrootPath='/var/lib/mock/rocky-9-ppc64le/root'env={'TERM': 'vt100', 'SHELL': '/bin/bash', 'HOME': '/builddir', 'HOSTNAME': 'mock', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'PROMPT_COMMAND': 'printf "\\033]0;\\007"', 'PS1': ' \\s-\\v\\$ ', 'LANG': 'C.UTF-8'}shell=Falselogger=timeout=0uid=11011gid=135user='mockbuild'nspawn_args=[]unshare_net=TrueprintOutput=False) Executing command: ['bash', '--login', '-c', '/usr/bin/rpmbuild -bs --target ppc64le --nodeps /builddir/build/SPECS/ca-certificates.spec'] with env {'TERM': 'vt100', 'SHELL': '/bin/bash', 'HOME': '/builddir', 'HOSTNAME': 'mock', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'PROMPT_COMMAND': 'printf "\\033]0;\\007"', 'PS1': ' \\s-\\v\\$ ', 'LANG': 'C.UTF-8'} and shell False Building target platforms: ppc64le Building for target ppc64le setting SOURCE_DATE_EPOCH=1628467200 Wrote: /builddir/build/SRPMS/ca-certificates-2020.2.50-93.el9.src.rpm Child return code was: 0 ENTER ['do_with_status'](['bash', '--login', '-c', "/usr/bin/rpmbuild -bb --target ppc64le --nodeps --define '__spec_check_template exit 0; ' /builddir/build/SPECS/ca-certificates.spec"], chrootPath='/var/lib/mock/rocky-9-ppc64le/root'env={'TERM': 'vt100', 'SHELL': '/bin/bash', 'HOME': '/builddir', 'HOSTNAME': 'mock', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'PROMPT_COMMAND': 'printf "\\033]0;\\007"', 'PS1': ' \\s-\\v\\$ ', 'LANG': 'C.UTF-8'}shell=Falselogger=timeout=0uid=11011gid=135user='mockbuild'nspawn_args=[]unshare_net=TrueprintOutput=False) Executing command: ['bash', '--login', '-c', "/usr/bin/rpmbuild -bb --target ppc64le --nodeps --define '__spec_check_template exit 0; ' /builddir/build/SPECS/ca-certificates.spec"] with env {'TERM': 'vt100', 'SHELL': '/bin/bash', 'HOME': '/builddir', 'HOSTNAME': 'mock', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'PROMPT_COMMAND': 'printf "\\033]0;\\007"', 'PS1': ' \\s-\\v\\$ ', 'LANG': 'C.UTF-8'} and shell False Building target platforms: ppc64le Building for target ppc64le setting SOURCE_DATE_EPOCH=1628467200 Executing(%prep): /bin/sh -e /var/tmp/rpm-tmp.z1Vg4y + umask 022 + cd /builddir/build/BUILD + rm -rf ca-certificates + mkdir ca-certificates + mkdir ca-certificates/certs + mkdir ca-certificates/certs/legacy-default + mkdir ca-certificates/certs/legacy-disable + mkdir ca-certificates/java + RPM_EC=0 ++ jobs -p + exit 0 Executing(%build): /bin/sh -e /var/tmp/rpm-tmp.SMWbFI + umask 022 + cd /builddir/build/BUILD + pushd ca-certificates/certs ~/build/BUILD/ca-certificates/certs ~/build/BUILD /builddir/build/BUILD/ca-certificates/certs + pwd + cp /builddir/build/SOURCES/certdata.txt . + python3 /builddir/build/SOURCES/certdata2pem.py + popd + pushd ca-certificates ~/build/BUILD ~/build/BUILD/ca-certificates ~/build/BUILD + cat + cat /builddir/build/SOURCES/nssckbi.h + grep -w NSS_BUILTINS_LIBRARY_VERSION + awk '{print "# " $2 " " $3}' + echo '#' + touch ca-bundle.legacy.default.crt ++ find certs/legacy-default -type f ++ wc -l + NUM_LEGACY_DEFAULT=0 + '[' 0 -ne 0 ']' + touch ca-bundle.legacy.disable.crt ++ find certs/legacy-disable -type f ++ wc -l + NUM_LEGACY_DISABLE=0 + '[' 0 -ne 0 ']' ++ find certs -name '*.tmp-p11-kit' ++ wc -l + P11FILES=149 + '[' 149 -ne 0 ']' + for p in certs/*.tmp-p11-kit + cat certs/ACCVRAIZ1:2.8.94.195.183.166.67.127.164.224.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/AC_RAIZ_FNMT-RCM:2.15.93.147.141.48.103.54.200.6.29.26.199.84.132.105.7.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/AC_RAIZ_FNMT-RCM_SERVIDORES_SEGUROS:2.16.98.246.50.108.229.196.227.104.92.27.98.221.156.46.157.149.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/ANF_Secure_Server_Root_CA:2.8.13.211.227.188.108.249.107.177.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Actalis_Authentication_Root_CA:2.8.87.10.17.151.66.196.227.204.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/AffirmTrust_Commercial:2.8.119.119.6.39.38.169.177.124.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/AffirmTrust_Networking:2.8.124.79.4.57.28.212.153.45.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/AffirmTrust_Premium:2.8.109.140.20.70.177.166.10.238.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/AffirmTrust_Premium_ECC:2.8.116.151.37.138.199.63.122.84.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Amazon_Root_CA_1:2.19.6.108.159.207.153.191.140.10.57.226.240.120.138.67.230.150.54.91.202.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Amazon_Root_CA_2:2.19.6.108.159.210.150.53.134.159.10.15.229.134.120.248.91.38.187.138.55.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Amazon_Root_CA_3:2.19.6.108.159.213.116.151.54.102.63.59.11.154.217.232.158.118.3.242.74.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Amazon_Root_CA_4:2.19.6.108.159.215.193.187.16.76.41.67.229.113.123.123.44.200.26.193.14.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Atos_TrustedRoot_2011:2.8.92.51.203.98.44.95.179.50.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Autoridad_de_Certificacion_Firmaprofesional_CIF_A62634068:2.8.83.236.59.238.251.178.72.95.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Baltimore_CyberTrust_Root:2.4.2.0.0.185.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Buypass_Class_2_Root_CA:2.1.2.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Buypass_Class_3_Root_CA:2.1.2.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/CA_Disig_Root_R2:2.9.0.146.184.136.219.176.138.193.99.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/CFCA_EV_ROOT:2.4.24.74.204.214.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/COMODO_Certification_Authority:2.16.78.129.45.138.130.101.224.11.2.238.62.53.2.70.229.61.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/COMODO_ECC_Certification_Authority:2.16.31.71.175.170.98.0.112.80.84.76.1.158.155.99.153.42.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/COMODO_RSA_Certification_Authority:2.16.76.170.249.202.219.99.111.224.31.247.78.216.91.3.134.157.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Camerfirma_Chambers_of_Commerce_Root:2.1.0.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Camerfirma_Global_Chambersign_Root:2.1.0.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Certigna:2.9.0.254.220.227.1.15.201.72.255.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Certigna_Root_CA:2.17.0.202.233.27.137.241.85.3.13.163.230.65.109.196.227.166.225.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Certum_EC-384_CA:2.16.120.143.39.92.129.18.82.32.165.4.208.45.221.186.115.244.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Certum_Root_CA:2.3.1.0.32.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Certum_Trusted_Network_CA:2.3.4.68.192.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Certum_Trusted_Network_CA_2:2.16.33.214.208.74.79.37.15.201.50.55.252.170.94.18.141.233.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Certum_Trusted_Root_CA:2.16.30.191.89.80.184.201.128.55.76.6.247.235.85.79.181.237.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Chambers_of_Commerce_Root_-_2008:2.9.0.163.218.66.126.164.177.174.218.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Comodo_AAA_Services_root:2.1.1.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Cybertrust_Global_Root:2.11.4.0.0.0.0.1.15.133.170.45.72.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/D-TRUST_Root_CA_3_2013:2.3.15.221.172.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/D-TRUST_Root_Class_3_CA_2_2009:2.3.9.131.243.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/D-TRUST_Root_Class_3_CA_2_EV_2009:2.3.9.131.244.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/DST_Root_CA_X3:2.16.68.175.176.128.214.163.39.186.137.48.57.134.46.248.64.107.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/DigiCert_Assured_ID_Root_CA:2.16.12.231.224.229.23.216.70.254.143.229.96.252.27.240.48.57.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/DigiCert_Assured_ID_Root_G2:2.16.11.147.28.58.214.57.103.234.103.35.191.195.175.154.244.75.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/DigiCert_Assured_ID_Root_G3:2.16.11.161.90.250.29.223.160.181.73.68.175.205.36.160.108.236.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/DigiCert_Global_Root_CA:2.16.8.59.224.86.144.66.70.177.161.117.106.201.89.145.199.74.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/DigiCert_Global_Root_G2:2.16.3.58.241.230.167.17.169.160.187.40.100.177.29.9.250.229.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/DigiCert_Global_Root_G3:2.16.5.85.86.188.242.94.164.53.53.195.164.15.213.171.69.114.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/DigiCert_High_Assurance_EV_Root_CA:2.16.2.172.92.38.106.11.64.155.143.11.121.242.174.70.37.119.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/DigiCert_Trusted_Root_G4:2.16.5.155.27.87.158.142.33.50.226.57.7.189.167.119.117.92.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/E-Tugra_Certification_Authority:2.8.106.104.62.156.81.155.203.83.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/EC-ACC:2.16.238.43.61.235.212.33.222.20.168.98.172.4.243.221.196.1.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Entrust.net_Premium_2048_Secure_Server_CA:2.4.56.99.222.248.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Entrust_Root_Certification_Authority:2.4.69.107.80.84.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Entrust_Root_Certification_Authority_-_EC1:2.13.0.166.139.121.41.0.0.0.0.80.208.145.249.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Entrust_Root_Certification_Authority_-_G2:2.4.74.83.140.40.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Entrust_Root_Certification_Authority_-_G4:2.17.0.217.181.67.127.175.169.57.15.0.0.0.0.85.101.173.88.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Explicitly_Distrust_DigiNotar_Root_CA:2.16.15.255.255.255.255.255.255.255.255.255.255.255.255.255.255.255.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Explicitly_Distrusted_DigiNotar_PKIoverheid_G2:2.4.15.255.255.255.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/GDCA_TrustAUTH_R5_ROOT:2.8.125.9.151.254.240.71.234.122.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/GLOBALTRUST_2020:2.11.90.75.189.90.251.79.138.91.250.101.229.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/GTS_Root_R1:2.16.110.71.169.197.75.71.12.13.236.51.208.137.185.28.244.225.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/GTS_Root_R2:2.16.110.71.169.198.90.179.231.32.197.48.154.63.104.82.242.111.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/GTS_Root_R3:2.16.110.71.169.199.108.169.115.36.64.137.15.3.85.221.141.29.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/GTS_Root_R4:2.16.110.71.169.200.139.148.182.232.187.59.42.216.162.178.193.153.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/GlobalSign_ECC_Root_CA_-_R4:2.17.42.56.164.28.150.10.4.222.66.178.40.165.11.232.52.152.2.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/GlobalSign_ECC_Root_CA_-_R5:2.17.96.89.73.224.38.46.187.85.249.10.119.138.113.249.74.216.108.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/GlobalSign_Root_CA:2.11.4.0.0.0.0.1.21.75.90.195.148.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/GlobalSign_Root_CA_-_R2:2.11.4.0.0.0.0.1.15.134.38.230.13.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/GlobalSign_Root_CA_-_R3:2.11.4.0.0.0.0.1.33.88.83.8.162.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/GlobalSign_Root_CA_-_R6:2.14.69.230.187.3.131.51.195.133.101.72.230.255.69.81.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/GlobalSign_Root_E46:2.18.17.210.187.186.51.110.212.188.230.36.104.197.13.132.29.152.232.67.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/GlobalSign_Root_R46:2.18.17.210.187.185.215.35.24.158.64.95.10.157.45.208.223.37.103.209.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/GlobalSign_Secure_Mail_Root_E45:2.16.118.83.254.170.39.29.149.70.93.214.241.158.229.184.144.10.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/GlobalSign_Secure_Mail_Root_R45:2.16.118.83.254.168.76.80.171.159.141.50.181.29.3.143.87.220.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Global_Chambersign_Root_-_2008:2.9.0.201.205.211.233.213.125.35.206.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Go_Daddy_Class_2_CA:2.1.0.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Go_Daddy_Root_Certificate_Authority_-_G2:2.1.0.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Hellenic_Academic_and_Research_Institutions_ECC_RootCA_2015:2.1.0.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Hellenic_Academic_and_Research_Institutions_RootCA_2011:2.1.0.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Hellenic_Academic_and_Research_Institutions_RootCA_2015:2.1.0.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Hongkong_Post_Root_CA_1:2.2.3.232.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Hongkong_Post_Root_CA_3:2.20.8.22.95.138.76.165.236.0.201.147.64.223.196.198.174.35.184.28.90.164.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/ISRG_Root_X1:2.17.0.130.16.207.176.210.64.227.89.68.99.224.187.99.130.139.0.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/IdenTrust_Commercial_Root_CA_1:2.16.10.1.66.128.0.0.1.69.35.200.68.181.0.0.0.2.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/IdenTrust_Public_Sector_Root_CA_1:2.16.10.1.66.128.0.0.1.69.35.207.70.124.0.0.0.2.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Izenpe.com:2.16.0.176.183.90.22.72.95.191.225.203.245.139.215.25.230.125.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/MITM_subCA_1_issued_by_Trustwave:2.4.107.73.210.5.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/MITM_subCA_2_issued_by_Trustwave:2.4.107.73.210.6.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Microsec_e-Szigno_Root_CA_2009:2.9.0.194.126.67.4.78.71.63.25.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Microsoft_ECC_Root_Certificate_Authority_2017:2.16.102.242.61.175.135.222.139.177.74.234.12.87.49.1.194.236.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Microsoft_RSA_Root_Certificate_Authority_2017:2.16.30.211.151.9.95.216.180.179.71.112.30.170.190.127.69.179.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/NAVER_Global_Root_Certification_Authority:2.20.1.148.48.30.162.11.221.245.197.51.42.177.67.68.113.248.214.80.77.13.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat $'certs/NetLock_Arany_=Class_Gold=_F\305\221tan\303\272s\303\255tv\303\241ny:2.6.73.65.44.228.0.16.tmp-p11-kit' + for p in certs/*.tmp-p11-kit + cat certs/Network_Solutions_Certificate_Authority:2.16.87.203.51.111.194.92.22.230.71.22.23.227.144.49.104.224.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/OISTE_WISeKey_Global_Root_GA_CA:2.16.65.61.114.199.244.107.31.129.67.125.241.210.40.84.223.154.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/OISTE_WISeKey_Global_Root_GB_CA:2.16.118.177.32.82.116.240.133.135.70.179.248.35.26.246.194.192.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/OISTE_WISeKey_Global_Root_GC_CA:2.16.33.42.86.12.174.218.12.171.64.69.191.43.162.45.58.234.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/QuoVadis_Root_CA_1_G3:2.20.120.88.95.46.173.44.25.75.227.55.7.53.52.19.40.181.150.212.101.147.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/QuoVadis_Root_CA_2:2.2.5.9.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/QuoVadis_Root_CA_2_G3:2.20.68.87.52.36.91.129.137.155.53.242.206.184.43.59.91.167.38.240.117.40.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/QuoVadis_Root_CA_3:2.2.5.198.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/QuoVadis_Root_CA_3_G3:2.20.46.245.155.2.40.167.219.122.255.213.163.169.238.189.3.160.207.18.106.29.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/SSL.com_EV_Root_Certification_Authority_ECC:2.8.44.41.156.91.22.237.5.149.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/SSL.com_EV_Root_Certification_Authority_RSA_R2:2.8.86.182.41.205.52.188.120.246.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/SSL.com_Root_Certification_Authority_ECC:2.8.117.230.223.203.193.104.91.168.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/SSL.com_Root_Certification_Authority_RSA:2.8.123.44.155.211.22.128.50.153.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/SZAFIR_ROOT_CA2:2.20.62.138.93.7.236.85.210.50.213.183.227.182.95.1.235.45.220.228.214.228.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/SecureSign_RootCA11:2.1.1.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/SecureTrust_CA:2.16.12.240.142.92.8.22.165.173.66.127.240.235.39.24.89.208.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Secure_Global_CA:2.16.7.86.34.164.232.212.138.137.77.244.19.200.240.248.234.165.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Security_Communication_RootCA2:2.1.0.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Security_Communication_Root_CA:2.1.0.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Staat_der_Nederlanden_EV_Root_CA:2.4.0.152.150.141.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Staat_der_Nederlanden_Root_CA_-_G3:2.4.0.152.162.57.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Starfield_Class_2_CA:2.1.0.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Starfield_Root_Certificate_Authority_-_G2:2.1.0.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Starfield_Services_Root_Certificate_Authority_-_G2:2.1.0.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/SwissSign_Gold_CA_-_G2:2.9.0.187.64.28.67.245.94.79.176.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/SwissSign_Platinum_CA_-_G2:2.8.78.178.0.103.12.3.93.79.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/SwissSign_Silver_CA_-_G2:2.8.79.27.212.47.84.187.47.75.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Symantec_Class_1_Public_Primary_Certification_Authority_-_G6:2.16.36.50.117.242.29.47.210.9.51.247.180.106.202.208.243.152.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Symantec_Class_2_Public_Primary_Certification_Authority_-_G6:2.16.100.130.158.252.55.30.116.93.252.151.255.151.200.177.255.65.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/T-TeleSec_GlobalRoot_Class_2:2.1.1.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/T-TeleSec_GlobalRoot_Class_3:2.1.1.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/TUBITAK_Kamu_SM_SSL_Kok_Sertifikasi_-_Surum_1:2.1.1.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/TURKTRUST_Mis-issued_Intermediate_CA_1:2.2.8.39.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/TURKTRUST_Mis-issued_Intermediate_CA_2:2.2.8.100.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/TWCA_Global_Root_CA:2.2.12.190.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/TWCA_Root_Certification_Authority:2.1.1.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/TeliaSonera_Root_CA_v1:2.17.0.149.190.22.160.247.46.70.241.123.57.130.114.250.139.205.150.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/TrustCor_ECA-1:2.9.0.132.130.44.95.28.98.208.64.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/TrustCor_RootCert_CA-1:2.9.0.218.155.236.113.243.3.176.25.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/TrustCor_RootCert_CA-2:2.8.37.161.223.202.51.203.89.2.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Trustwave_Global_Certification_Authority:2.12.5.247.14.134.218.73.243.70.53.46.186.178.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Trustwave_Global_ECC_P256_Certification_Authority:2.12.13.106.95.8.63.40.92.62.81.149.223.93.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Trustwave_Global_ECC_P384_Certification_Authority:2.12.8.189.133.151.108.153.39.164.128.104.71.59.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/UCA_Extended_Validation_Root:2.16.79.210.43.143.245.100.200.51.158.79.52.88.102.35.112.96.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/UCA_Global_G2_Root:2.16.93.223.177.218.90.163.237.93.190.90.101.32.101.3.144.239.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/USERTrust_ECC_Certification_Authority:2.16.92.139.153.197.90.148.197.210.113.86.222.205.137.128.204.38.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/USERTrust_RSA_Certification_Authority:2.16.1.253.109.48.252.163.202.81.168.27.188.100.14.53.3.45.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Verisign_Class_1_Public_Primary_Certification_Authority_-_G3:2.17.0.139.91.117.86.132.84.133.11.0.207.175.56.72.206.177.164.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/Verisign_Class_2_Public_Primary_Certification_Authority_-_G3:2.16.97.112.203.73.140.95.152.69.41.231.176.166.217.80.91.122.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/XRamp_Global_CA_Root:2.16.80.148.108.236.24.234.213.156.77.213.151.239.117.143.160.173.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/certSIGN_ROOT_CA:2.6.32.6.5.22.112.2.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/certSIGN_Root_CA_G2:2.9.17.0.52.182.78.198.54.45.54.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/e-Szigno_Root_CA_2017:2.12.1.84.72.239.33.253.151.89.13.245.4.10.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/ePKI_Root_Certification_Authority:2.16.21.200.189.101.71.92.175.184.151.0.94.228.6.210.188.157.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/emSign_ECC_Root_CA_-_C3:2.10.123.113.182.130.86.184.18.124.156.168.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/emSign_ECC_Root_CA_-_G3:2.10.60.246.7.169.104.112.14.218.139.132.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/emSign_Root_CA_-_C1:2.11.0.174.207.0.186.196.207.50.248.67.178.tmp-p11-kit + for p in certs/*.tmp-p11-kit + cat certs/emSign_Root_CA_-_G1:2.10.49.245.228.98.12.108.88.237.214.216.tmp-p11-kit + cat /builddir/build/SOURCES/trust-fixes + popd ~/build/BUILD + cp /builddir/build/SOURCES/update-ca-trust.8.txt ca-certificates/update-ca-trust.8.txt + asciidoc.py -v -d manpage -b docbook ca-certificates/update-ca-trust.8.txt asciidoc: reading: /etc/asciidoc/asciidoc.conf asciidoc: reading: /builddir/build/BUILD/ca-certificates/update-ca-trust.8.txt asciidoc: reading: /etc/asciidoc/docbook45.conf asciidoc: reading: /etc/asciidoc/filters/code/code-filter.conf asciidoc: reading: /etc/asciidoc/filters/graphviz/graphviz-filter.conf asciidoc: reading: /etc/asciidoc/filters/source/source-highlight-filter.conf asciidoc: reading: /etc/asciidoc/lang-en.conf asciidoc: writing: /builddir/build/BUILD/ca-certificates/update-ca-trust.8.xml + xsltproc --nonet -o ca-certificates/update-ca-trust.8 /usr/share/asciidoc/docbook-xsl/manpage.xsl ca-certificates/update-ca-trust.8.xml Note: Writing update-ca-trust.8 + cp /builddir/build/SOURCES/ca-legacy.8.txt ca-certificates/ca-legacy.8.txt + asciidoc.py -v -d manpage -b docbook ca-certificates/ca-legacy.8.txt asciidoc: reading: /etc/asciidoc/asciidoc.conf asciidoc: reading: /builddir/build/BUILD/ca-certificates/ca-legacy.8.txt asciidoc: reading: /etc/asciidoc/docbook45.conf asciidoc: reading: /etc/asciidoc/filters/code/code-filter.conf asciidoc: reading: /etc/asciidoc/filters/graphviz/graphviz-filter.conf asciidoc: reading: /etc/asciidoc/filters/source/source-highlight-filter.conf asciidoc: reading: /etc/asciidoc/lang-en.conf asciidoc: writing: /builddir/build/BUILD/ca-certificates/ca-legacy.8.xml + xsltproc --nonet -o ca-certificates/ca-legacy.8 /usr/share/asciidoc/docbook-xsl/manpage.xsl ca-certificates/ca-legacy.8.xml Note: Writing ca-legacy.8 + RPM_EC=0 ++ jobs -p + exit 0 Executing(%install): /bin/sh -e /var/tmp/rpm-tmp.4tYcP5 + umask 022 + cd /builddir/build/BUILD + '[' /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le '!=' / ']' + rm -rf /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le ++ dirname /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le + mkdir -p /builddir/build/BUILDROOT + mkdir /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le + rm -rf /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le + mkdir -p -m 755 /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/etc/pki/tls/certs + mkdir -p -m 755 /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/etc/pki/java + mkdir -p -m 755 /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/etc/ssl + mkdir -p -m 755 /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/etc/pki/ca-trust/source + mkdir -p -m 755 /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/etc/pki/ca-trust/source/anchors + mkdir -p -m 755 /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/etc/pki/ca-trust/source/blocklist + mkdir -p -m 755 /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/etc/pki/ca-trust/source/blacklist + mkdir -p -m 755 /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/etc/pki/ca-trust/extracted + mkdir -p -m 755 /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/etc/pki/ca-trust/extracted/pem + mkdir -p -m 755 /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/etc/pki/ca-trust/extracted/openssl + mkdir -p -m 755 /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/etc/pki/ca-trust/extracted/java + mkdir -p -m 755 /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/etc/pki/ca-trust/extracted/edk2 + mkdir -p -m 755 /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/usr/share/pki/ca-trust-source + mkdir -p -m 755 /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/usr/share/pki/ca-trust-source/anchors + mkdir -p -m 755 /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/usr/share/pki/ca-trust-source/blocklist + mkdir -p -m 755 /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/usr/share/pki/ca-trust-source/blacklist + mkdir -p -m 755 /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/usr/share/pki/ca-trust-legacy + mkdir -p -m 755 /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/usr/bin + mkdir -p -m 755 /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/usr/share/man/man8 + install -p -m 644 ca-certificates/update-ca-trust.8 /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/usr/share/man/man8 + install -p -m 644 ca-certificates/ca-legacy.8 /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/usr/share/man/man8 + install -p -m 644 /builddir/build/SOURCES/README.usr /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/usr/share/pki/ca-trust-source/README + install -p -m 644 /builddir/build/SOURCES/README.etc /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/etc/pki/ca-trust/README + install -p -m 644 /builddir/build/SOURCES/README.extr /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/etc/pki/ca-trust/extracted/README + install -p -m 644 /builddir/build/SOURCES/README.java /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/etc/pki/ca-trust/extracted/java/README + install -p -m 644 /builddir/build/SOURCES/README.openssl /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/etc/pki/ca-trust/extracted/openssl/README + install -p -m 644 /builddir/build/SOURCES/README.pem /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/etc/pki/ca-trust/extracted/pem/README + install -p -m 644 /builddir/build/SOURCES/README.edk2 /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/etc/pki/ca-trust/extracted/edk2/README + install -p -m 644 /builddir/build/SOURCES/README.src /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/etc/pki/ca-trust/source/README + install -p -m 644 ca-certificates/ca-bundle.trust.p11-kit /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/usr/share/pki/ca-trust-source/ca-bundle.trust.p11-kit + install -p -m 644 ca-certificates/ca-bundle.legacy.default.crt /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/usr/share/pki/ca-trust-legacy/ca-bundle.legacy.default.crt + install -p -m 644 ca-certificates/ca-bundle.legacy.disable.crt /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/usr/share/pki/ca-trust-legacy/ca-bundle.legacy.disable.crt + install -p -m 644 /builddir/build/SOURCES/ca-legacy.conf /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/etc/pki/ca-trust/ca-legacy.conf + touch -r /builddir/build/SOURCES/certdata.txt /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/usr/share/pki/ca-trust-source/ca-bundle.trust.p11-kit + touch -r /builddir/build/SOURCES/certdata.txt /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/usr/share/pki/ca-trust-legacy/ca-bundle.legacy.default.crt + touch -r /builddir/build/SOURCES/certdata.txt /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/usr/share/pki/ca-trust-legacy/ca-bundle.legacy.disable.crt + install -p -m 755 /builddir/build/SOURCES/update-ca-trust /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/usr/bin/update-ca-trust + install -p -m 755 /builddir/build/SOURCES/ca-legacy /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/usr/bin/ca-legacy + touch /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem + chmod 444 /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem + touch /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/etc/pki/ca-trust/extracted/pem/email-ca-bundle.pem + chmod 444 /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/etc/pki/ca-trust/extracted/pem/email-ca-bundle.pem + touch /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/etc/pki/ca-trust/extracted/pem/objsign-ca-bundle.pem + chmod 444 /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/etc/pki/ca-trust/extracted/pem/objsign-ca-bundle.pem + touch /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/etc/pki/ca-trust/extracted/openssl/ca-bundle.trust.crt + chmod 444 /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/etc/pki/ca-trust/extracted/openssl/ca-bundle.trust.crt + touch /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/etc/pki/ca-trust/extracted/java/cacerts + chmod 444 /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/etc/pki/ca-trust/extracted/java/cacerts + touch /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/etc/pki/ca-trust/extracted/edk2/cacerts.bin + chmod 444 /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/etc/pki/ca-trust/extracted/edk2/cacerts.bin + ln -s /etc/pki/tls/certs /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/etc/ssl/certs + ln -s /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/etc/ssl/cert.pem + ln -s /etc/pki/tls/openssl.cnf /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/etc/ssl/openssl.cnf + ln -s /etc/pki/tls/ct_log_list.cnf /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/etc/ssl/ct_log_list.cnf + ln -s /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/etc/pki/tls/cert.pem + ln -s /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/etc/pki/tls/certs/ca-bundle.crt + ln -s /etc/pki/ca-trust/extracted/openssl/ca-bundle.trust.crt /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/etc/pki/tls/certs/ca-bundle.trust.crt + ln -s /etc/pki/ca-trust/extracted/java/cacerts /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le/etc/pki/java/cacerts + /usr/lib/rpm/check-buildroot + /usr/lib/rpm/redhat/brp-ldconfig + /usr/lib/rpm/brp-compress + /usr/lib/rpm/brp-strip /usr/bin/strip + /usr/lib/rpm/brp-strip-comment-note /usr/bin/strip /usr/bin/objdump + /usr/lib/rpm/redhat/brp-strip-lto /usr/bin/strip + /usr/lib/rpm/brp-strip-static-archive /usr/bin/strip + /usr/lib/rpm/redhat/brp-python-bytecompile '' 1 0 + /usr/lib/rpm/brp-python-hardlink + /usr/lib/rpm/redhat/brp-mangle-shebangs mangling shebang in /usr/bin/update-ca-trust from /bin/sh to #!/usr/bin/sh mangling shebang in /usr/bin/ca-legacy from /bin/sh to #!/usr/bin/sh Processing files: ca-certificates-2020.2.50-93.el9.noarch warning: absolute symlink: /etc/pki/java/cacerts -> /etc/pki/ca-trust/extracted/java/cacerts warning: absolute symlink: /etc/pki/tls/cert.pem -> /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem warning: absolute symlink: /etc/pki/tls/certs/ca-bundle.crt -> /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem warning: absolute symlink: /etc/pki/tls/certs/ca-bundle.trust.crt -> /etc/pki/ca-trust/extracted/openssl/ca-bundle.trust.crt warning: absolute symlink: /etc/ssl/cert.pem -> /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem warning: absolute symlink: /etc/ssl/certs -> /etc/pki/tls/certs warning: absolute symlink: /etc/ssl/ct_log_list.cnf -> /etc/pki/tls/ct_log_list.cnf warning: absolute symlink: /etc/ssl/openssl.cnf -> /etc/pki/tls/openssl.cnf Provides: ca-certificates = 2020.2.50-93.el9 config(ca-certificates) = 2020.2.50-93.el9 Requires(interp): /bin/sh /bin/sh /bin/sh Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Requires(pre): /bin/sh Requires(post): /bin/sh bash coreutils grep p11-kit >= 0.23.19 p11-kit-trust >= 0.23.19 sed Requires(posttrans): /bin/sh Requires: /usr/bin/sh Checking for unpackaged file(s): /usr/lib/rpm/check-files /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le Wrote: /builddir/build/RPMS/ca-certificates-2020.2.50-93.el9.noarch.rpm Executing(%clean): /bin/sh -e /var/tmp/rpm-tmp.FfXhts + umask 022 + cd /builddir/build/BUILD + /usr/bin/rm -rf /builddir/build/BUILDROOT/ca-certificates-2020.2.50-93.el9.ppc64le + RPM_EC=0 ++ jobs -p + exit 0 Child return code was: 0