rsconnect/0000755000175000017500000000000014145651202012402 5ustar nileshnileshrsconnect/MD50000644000175000017500000002147714145651202012725 0ustar nileshnilesh5d0e1be93c8a7421977a1c1e7166bc27 *DESCRIPTION ca3785219f7a8878a6fb9c33fac5aff5 *NAMESPACE 5488e30f4890ef625aac07aa669eb08e *NEWS.md dcfc8f4749363a6f18d6859b4fb0ee75 *R/accounts.R 5870092d524b70329914142d2edb54a2 *R/applications.R ba4f175782910d3f7d241e260937075d *R/auth.R 59a6cefd6afd569a6333e92f35dc27f0 *R/bundle.R 8564d685931adf9c1ea44e0311fc4592 *R/certificates.R 8543573f8d3cc329a2e2be7798b4b31e *R/client.R 7f218112d6b73b419be81dda053e3811 *R/config.R b8c6076f0937587c966439ba0de5e288 *R/configureApp.R 97727a1444e3952f4d26fcd8ea863ff2 *R/connect.R 45f2e20c88db2d2211205a302b9e6730 *R/cookies.R bfab6aa7a8efc674a1be6ed72dfae5f9 *R/dependencies.R 43afdc959e70146198852324f5f2ea50 *R/deployAPI.R 5b92db06094fe10441f17f54c3db338a *R/deployApp.R 03b7531e76659ab2660862c06736fd5c *R/deployDoc.R 08494a6db9d34672109e1270b88346e5 *R/deploySite.R 59cdd135c68b376c742b82d8077bbf22 *R/deployTFModel.R d51ae677a876609ef0752f81914fdf04 *R/deployments.R 1c9e366b50730ed618f5c66bc7320cb1 *R/http-curl.R 7cf24da52b2cb465b1a1b0011b7bbcf7 *R/http-internal.R d5f4557ffcdeebf9161601df5a89952e *R/http-libcurl.R 68c72edf804a4ffb6d6b42a82d11fbb1 *R/http-rcurl.R 23f91ea15c0e328de928484483085301 *R/http.R 65ec80ffda290b6b627fa9e0c1bc47a8 *R/ide.R 44c708583704365d32867cb3303f724c *R/imports.R 9d5cff4065ea9758a72bdc44a3086e02 *R/json.R 48ce1ea2befeefa16499e7fddc7d8c90 *R/lint-framework.R 39590c52b2bd58ba4ae497d48975a6cb *R/lint-utils.R a42bcdc557a81f172776ff55b85df4e8 *R/linters.R 2887d129be2b23082bb3adb769a1ed1f *R/locale.R b84ddd1cbd27d030499a4e3eff2593aa *R/lucid.R 01504b2cf4516140b080716ac3671cd4 *R/onLoad.R 00f73d2bd324602f548a8a3484546e72 *R/packages.R 8be331735dd7795a606c736e2e196486 *R/proxies.R 5ae05915882432734d6b51f322c342ae *R/purgeApp.R d60551b0f9f150a9bd5ffe92d559af07 *R/restartApp.R 3ef28618420920b5b0143c983c8d0ef2 *R/rmdindex.R d444de98e26503c830bc5a19b25a55c8 *R/rpubs.R 06a63567193b8a3b18ec5008a2bd32f1 *R/rsa.R 489adb27fbd00cd1bc45398a6a8502cc *R/rsconnect-package.R 97311960d7762b9410d7ef90a06fd9e5 *R/servers.R d41d8cd98f00b204e9800998ecf8427e *R/static-analysis.R 2ce6b0ab78fd7d528c6705dd16813aa8 *R/tasks.R 39854208eb2b99d42e88e93383b7bd84 *R/terminateApp.R 4be6231b1edbcb0ac7fca3b687c932fd *R/title.R c6f5f22cfd28d50a88e9d057fdee94e2 *R/usage.R f35bc7210811a457053798c2588130b2 *R/utils.R ff63ebc14fb7fc07c54b6374aa52c9b0 *README.md 2aeba46562a9b9117a9217520f67adc0 *inst/cert/cacert.pem 2378364f2f7b529c5c5997413cd69d39 *inst/cert/shinyapps.io.pem 0e676d39107e483449f030931e762249 *inst/examples/diamonds/server.R ff0dcf5b346392cd5fd6cccede09ee46 *inst/examples/diamonds/ui.R 07f348f5f8043e8826edb7716519edd0 *inst/examples/sessioninfo/server.R 9802743e31c9f275a609b2346d5f9444 *inst/examples/sessioninfo/ui.R c90b28ab8304e1fc3e9ed0ea587af1fd *inst/resources/environment.py 43654b260b6233500211458dc001dbcd *man/accountUsage.Rd b6a61d839fb1abdfbb523e2b24067d44 *man/accounts.Rd 995b13be72b4f78d7ccb51820cf7b362 *man/addAuthorizedUser.Rd 24c8eb1ace29f61f2fd4b5acf8e9c58a *man/addLinter.Rd 1fe5d768b6416e3bce5e466e72203b3f *man/appDependencies.Rd ed009d0fb02fb72ee22f51e196dad77b *man/applicationConfigDir.Rd c52fa35f8209752d18ff66db94517478 *man/applications.Rd dd4a3cdf6f8a526697bbd9334d890fcf *man/authorizedUsers.Rd 5826b22fe172fa65dba878ff93d6ae73 *man/configureApp.Rd 0ffbd31474833a1f935b63e36b79c199 *man/connectApiUser.Rd 85df163cdc592e0053ea9fd4d3732141 *man/connectUser.Rd b8ec40215d5748eaf03c342ef09f375e *man/deployAPI.Rd b90c8da807db01390fa1a75de38ea021 *man/deployApp.Rd ca0ea6c5157f17459dbeedbd6db36a06 *man/deployDoc.Rd 4d9f0a4e551d9c687ee568ddb48b2e19 *man/deploySite.Rd 7150df85bf9456a13ed7126f6937e952 *man/deployTFModel.Rd 9821db6f021febc6c58d8a99f78cfd8f *man/deployments.Rd 580a85dfb1a97e844b3f84c68b347822 *man/figures/logo.png 9978780470ec7957a7ca567f85319614 *man/figures/logo.svg e3bd29df33942aa2223517ef0ac935f6 *man/forgetDeployment.Rd a4a7402f0343d48d83a27b165ff2ea3a *man/generateAppName.Rd 2d5bb4dfcba6909d1d516042cb67aa7c *man/lint.Rd 73c3fcf9bed2e25139d1dbd178eecc05 *man/linter.Rd dd0624503d69b5fa91d57b4ecb5f66b3 *man/listBundleFiles.Rd 145f6299d0d23a5bfe5c4d0065356802 *man/makeLinterMessage.Rd 4e29910470b199f954c52d02c3f9878f *man/oldApplicationConfigDir.Rd 8157da189215485ba47dbe57ec7ebac2 *man/options.Rd 67f34d78895e2796db406151c67d5837 *man/purgeApp.Rd dc693d378cda4d190e766d042dd85a14 *man/removeAuthorizedUser.Rd 53ecaecb030968be567a5338330e3fe2 *man/restartApp.Rd c7e27d78d1cd7c0b92a200404ebb492f *man/rpubsUpload.Rd 48eba523bae631e65d07fe60d02e8e9d *man/rsconnect-package.Rd a3c3e1fce92b233f28b76ff7bef48ce4 *man/rsconnectConfigDir.Rd 065a3d8b6a041e95276644498e96d88b *man/rsconnectPackages.Rd 3ea9a02254693a9e97e4aef7b822e844 *man/servers.Rd 57091120dd7c2a2f3648a47d08e518b6 *man/setAccountInfo.Rd 9196b7f82cfe3010bfd1bcbc678d84f0 *man/setProperty.Rd cca6bf3ee8899383533d69c9ec119b00 *man/showInvited.Rd e9ea91e6e5b54df287f2a55b1ec283a3 *man/showLogs.Rd 39c10d31eaeaa0df3997cb3ece827030 *man/showMetrics.Rd 2ddda28c94661f8e46d05580aa66e3b9 *man/showProperties.Rd a5f0a6db78b776805563be037258347d *man/showUsage.Rd faeb46821f2cdc3ed920e1482afb7b0b *man/showUsers.Rd b68f343a1c8f5d3567a6d94ff5a30299 *man/syncAppMetadata.Rd 52b475f76d81c283ab95fd4453067bb9 *man/taskLog.Rd f77706988781373f5a2fa20c3837cee1 *man/tasks.Rd 0bc676496f2adf39370991ca5f270e6f *man/terminateApp.Rd 74c1dfc776559f8903e2955b8e539231 *man/unsetProperty.Rd 5ddb3019419ff1382895df0ec6ee7d73 *man/writeManifest.Rd 96bfee782704223445461cc6709c81cb *tests/testthat.R 28358d7a7da5b98ef72f87ef9f7e3c71 *tests/testthat/certs/invalid.crt 2119c1e4e48a07544a2620810c8d9fe0 *tests/testthat/certs/localhost.crt d35b5136333b0177b962a61506653041 *tests/testthat/certs/sample.crt a38a451d1d8f8c2f4a438c9624a5a432 *tests/testthat/certs/store.crt 35989bf34a047efe49e71cabe2f3b055 *tests/testthat/certs/two-cas.crt 514fca7a6658bd9a05d4ddb9aa529426 *tests/testthat/helper.R facf106f5d8245d54470f461b6730b7f *tests/testthat/multibyte-characters/app.R 7cec49988744201b8587102340e23b16 *tests/testthat/project-MASS/MASS.R d41d8cd98f00b204e9800998ecf8427e *tests/testthat/shiny-app-in-subdir/my-app/server.R d41d8cd98f00b204e9800998ecf8427e *tests/testthat/shiny-app-in-subdir/my-app/ui.r 0ac9325362678856ae8cee30cfbcff6d *tests/testthat/shiny-rmds/non-shiny-rmd.Rmd 9985f91dc258e78419eca67dbe710c6a *tests/testthat/shiny-rmds/shiny-rmd-dashes.Rmd 15e53373a9b8d9de81cc74eaef9816b3 *tests/testthat/shiny-rmds/shiny-rmd-dots.Rmd 5abf3e3f4a270eb0703eaadda9d422cf *tests/testthat/shinyapp-appR/app.R 0ef204e32d59f05adf1c2285c343193b *tests/testthat/shinyapp-simple/server.R 6c56aafc35413ea21878610ff30f170d *tests/testthat/shinyapp-simple/ui.R 5abf3e3f4a270eb0703eaadda9d422cf *tests/testthat/shinyapp-singleR/single.R d41d8cd98f00b204e9800998ecf8427e *tests/testthat/shinyapp-with-absolute-paths/College.txt 0ffc6a3d50599e2c44f3c395fd11659d *tests/testthat/shinyapp-with-absolute-paths/ShinyDocument.Rmd b76cecaa26a1fb5b2415bf59aa4f39f5 *tests/testthat/shinyapp-with-absolute-paths/ShinyPresentation.Rmd 017c0042e5680c479933ea8c1e8af5b2 *tests/testthat/shinyapp-with-absolute-paths/server.R d41d8cd98f00b204e9800998ecf8427e *tests/testthat/shinyapp-with-absolute-paths/subdir/Genetics.txt e98f61892e82da15198be70b682f7ffb *tests/testthat/shinyapp-with-absolute-paths/ui.R cafae18750ea211b29befe09d1036ab2 *tests/testthat/shinyapp-with-browser/server.R 6c56aafc35413ea21878610ff30f170d *tests/testthat/shinyapp-with-browser/ui.R 2a7835fc2fc74e22464183e4aba26f99 *tests/testthat/test-bundle.R a6ba12bfd21fb6896069582e68c7fa61 *tests/testthat/test-cert.R 43eee5b9b6aa307581dd8ef8d95ed455 *tests/testthat/test-connect.R 8d52e3fcf42889e115bb9a23b07b7ce1 *tests/testthat/test-cookies.R 782760cf0ffe7063710a0807f9d23b69 *tests/testthat/test-detection.R 2a47dd9e1aaee8137ed499d40b7f5cad *tests/testthat/test-hashes.R 29f7db832d083f38c14eb7b7316dee8b *tests/testthat/test-http.R e8c41d3d9b4af187161b7cd5d7f8fa45 *tests/testthat/test-lint.R caf1244263fc0eef0787d0e604c8a3c0 *tests/testthat/test-plumber/plumber.R ba99abf56aae6fec4d2a988d75070c4e *tests/testthat/test-reticulate-rmds/implicit.Rmd c78f15224343592ea6ec67f83da59f85 *tests/testthat/test-reticulate-rmds/index.Rmd 07f51c85e4fe5d23e3b6b691c9b4239b *tests/testthat/test-rmd-bad-case/RStudio.svg 9090206f58b121d6d041e8db8cf72eca *tests/testthat/test-rmd-bad-case/index.Rmd 579d8c200f96501ba5ceaa9296c1fd96 *tests/testthat/test-rmds/index.Rmd f4fffcb3c1baaf6841f553e9aa7b1024 *tests/testthat/test-rmds/parameterized.Rmd 27ed9400e0161011c22d821bcef6e96f *tests/testthat/test-rmds/simple.Rmd 3d03aed29a634daf1098730366428231 *tests/testthat/test-shinyApp/test-shinyApp.tar.gz d79200088d99c3ef70b989b960cdd7e7 *tests/testthat/test-title.R 3de0a33f060150ebf3f0af162be2ef4c *tests/testthat/test-utils.R 36466c6f3d3910114071d2d1192d8484 *tests/testthat/tf-human-readable-saved-model/1/saved_model.pbtxt 36466c6f3d3910114071d2d1192d8484 *tests/testthat/tf-saved-model-rootdir/saved_model.pb 36466c6f3d3910114071d2d1192d8484 *tests/testthat/tf-saved-model/1/saved_model.pb rsconnect/NEWS.md0000644000175000017500000001201014144740532013476 0ustar nileshnilesh# NEWS ## 0.8.25 Released to CRAN on 2021-11-16 * Use the `curl` option `-T` when uploading files to avoid out of memory errors with large files. (#544) * The `rsconnect.max.bundle.size` and `rsconnect.max.bundle.files` options are enforced when processing an enumerated set of files. Previously, these limits were enforced only when bundling an entire content directory. (#542) * Preserve file time stamps when copying files into the bundle staging directory, which then propagates into the created tar file. (#540) * Configuration directories align with CRAN policy and use the location named by `tools::R_user_dir`. Configuration created by earlier versions of this package is automatically migrated to the new location. (#550) ## 0.8.24 Released to CRAN on 2021-08-04 * Added support for publishing Quarto documents and websites * Added support for `.rcsignore` file to exclude files or directories from publishing (#368) * Fixed issue causing missing value errors when publishing content containing filenames with extended characters (#514) * Fixed issue preventing error tracebacks from displaying (#518) ## 0.8.18 Released to CRAN on 2021-05-24 * Fixed issue causing configuration directory to be left behind after `R CMD CHECK` * Fixed incorrect subdirectory nesting when storing configuration in `R_USER_CONFIG_DIR` * Added linter for different-case Markdown links (#388) * Use new Packrat release on CRAN, 0.6.0 (#501) * Fix incorrect linter messages referring to `shiny.R` instead of `server.R` (#509) * Warn, rather than err, when the repository URL for a package dependency cannot be validated. This allows deployment when using archived CRAN packages, or when using packages installed from source that are available on the server. (#508) * Err when the app-mode cannot be inferred; seen with empty directories/file-sets (#512) * Add `verbose` option to `writeManifest` utility (#468) ## 0.8.17 Released to CRAN on 2021-04-09 * Fixed issue where setting `options(rsconnect.http.trace.json = TRUE)` could cause deployment errors with some HTTP transports (#490) * Improve how large bundles (file size and count) are detected (#464) * The `RSCONNECT_TAR` environment variable can be used to select the tar implementation used to create bundles (#446) * Warn when files are owned by users or groups with long names, as this can cause the internal R tar implementation to produce invalid archives (#446) * Add support for syncing the deployment metadata with the server (#396) * Insist on ShinyApps accounts in `showUsers()` (#398) * Improve the regex used for the browser and browseURL lints to include a word boundary (#400) * Fixed bug where `connectApiUser()` did not set a user id (#407) * New arguments to `deployApp` to force the generation of a Python environment file or a `requirements.txt` file (#409) * Fail when no repository URL is available for a dependent package (#410) * Fix error when an old version of a package is installed and a current version isn't available (#431, #436) * Fix error where packages couldn't be found with nonstandard contrib URLs. (#451, #457) * Improve detection of Shiny R Markdown files when `server.R` is present (#461) * Fix failure to write manifest when package requires a newer R version than the active version (#467) * Increase default HTTP timeout on non-Windows platforms (#476) * Require `packrat` 0.5 or later (#434) * Fix error when handling empty application / content lists (#417, #395) * Calls to `writeManifest()` no longer reference `packrat` files in the generated `manifest.json`. The `packrat` entries were transient and only existed while computing dependencies. (#472) * Fix `applications` when ShinyApps does not return `size` details (#496) * GitLab is seen as a valid SCM source (#491) ## 0.8.16 Released to CRAN on 2019-12-13 * Prevent attempts to deploy Connect applications without uploading (#145) * Flag usage of `browser()` debugging calls when deploying (#196) * Prevent accidental deployment of Plumber APIs to shinyapps.io (#204) * Allow `appId` and other global deployment parameters to `deploySite` (#231) * Fix error when running `deployments()` without any registered accounts (#261) * Omit `renv` files from deployment bundle (#367) * Fix failure to deploy in Packrat projects (#370) * Fix issue deploying when a package exists in multiple repos (#372) * Honor `RETICULATE_PYTHON` when writing manifests (#374) * Add `on.failure` user hook to run a function when `deployApp()` fails (#375) * Fix error when showing non-streaming logs (#377) * Use internally computed MD5 sums when MD5 is disabled in FIPS mode (#378, #382) * Make it clearer which log entries are emitted by RStudio Connect (#385) * Add support for `requirements.txt` for Python, if it exists (#386) * Restore compatibility with R < 3.5 (#394) * Add support for authenticating with Connect via an API key rather than a token (#393) ## 0.8.15 Released to CRAN on 2019-07-22 * Switch from **RCurl** to **curl** as the default HTTP backend (#325) * Add `purgeApp()` function to purge previously deployed shinyapps.io applications (#352) rsconnect/DESCRIPTION0000644000175000017500000000244314145651202014113 0ustar nileshnileshPackage: rsconnect Type: Package Title: Deployment Interface for R Markdown Documents and Shiny Applications Version: 0.8.25 Authors@R: c( person("Aron", "Atkins", role = c("aut", "cre"), email = "aron@rstudio.com"), person("Jonathan", "McPherson", role = "aut", email = "jonathan@rstudio.com"), person("JJ", "Allaire", role = "aut"), person("RStudio", role = c("cph", "fnd")) ) Description: Programmatic deployment interface for 'RPubs', 'shinyapps.io', and 'RStudio Connect'. Supported content types include R Markdown documents, Shiny applications, Plumber APIs, plots, and static web content. Depends: R (>= 3.0.0) Imports: curl, digest, jsonlite, openssl, packrat (>= 0.6), rstudioapi (>= 0.5), tools, yaml (>= 2.1.5) Suggests: RCurl, callr, httpuv, knitr, plumber (>= 0.3.2), reticulate, rmarkdown (>= 1.1), shiny, sourcetools, testthat, xtable License: GPL-2 Encoding: UTF-8 RoxygenNote: 7.1.2 URL: https://github.com/rstudio/rsconnect BugReports: https://github.com/rstudio/rsconnect/issues NeedsCompilation: no Packaged: 2021-11-16 14:35:24 UTC; aron Author: Aron Atkins [aut, cre], Jonathan McPherson [aut], JJ Allaire [aut], RStudio [cph, fnd] Maintainer: Aron Atkins Repository: CRAN Date/Publication: 2021-11-19 07:30:10 UTC rsconnect/README.md0000644000175000017500000000274514033370557013700 0ustar nileshnilesh # rsconnect [![CRAN status](https://www.r-pkg.org/badges/version/rsconnect)](https://cran.r-project.org/package=rsconnect) [![Build Status](https://travis-ci.org/rstudio/rsconnect.svg?branch=master)](https://travis-ci.org/rstudio/rsconnect) [![lifecycle](https://img.shields.io/badge/lifecycle-stable-brightgreen.svg)](https://lifecycle.r-lib.org/articles/stages.html#stable) An R package used for deploying applications to the [ShinyApps](https://www.shinyapps.io/) hosted service, or to [RStudio Connect](https://www.rstudio.com/products/connect/). ## Installation You can install the released version of rsconnect from [CRAN](https://CRAN.R-project.org) with: ``` r install.packages("rsconnect") ``` And the development version from [GitHub](https://github.com/) with: ``` r # install.packages("devtools") devtools::install_github("rstudio/rsconnect") ``` ## Example To get started using ShinyApps check out the [Getting Started Guide](https://shiny.rstudio.com/articles/shinyapps.html). For more information using RStudio Connect, see the [RStudio Connect User Guide](https://docs.rstudio.com/connect/user/index.html). ## Legal Stuff TensorFlow, the TensorFlow logo and any related marks are trademarks of Google Inc., and are not affiliated with RStudio, Inc. rsconnect/man/0000755000175000017500000000000014143534106013156 5ustar nileshnileshrsconnect/man/unsetProperty.Rd0000644000175000017500000000165114031151455016351 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/configureApp.R \name{unsetProperty} \alias{unsetProperty} \title{Unset Application property} \usage{ unsetProperty( propertyName, appPath = getwd(), appName = NULL, account = NULL, force = FALSE ) } \arguments{ \item{propertyName}{Name of property to unset} \item{appPath}{Directory or file that was deployed. Defaults to current working directory.} \item{appName}{Name of application} \item{account}{Account name. If a single account is registered on the system then this parameter can be omitted.} \item{force}{Forcibly unset the property} } \description{ Unset a property on currently deployed ShinyApps application (restoring to its default value) } \note{ This function only works for ShinyApps servers. } \examples{ \dontrun{ # unset application package cache property to revert to default unsetProperty("application.package.cache") } } rsconnect/man/listBundleFiles.Rd0000644000175000017500000000277514076573400016555 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/bundle.R \name{listBundleFiles} \alias{listBundleFiles} \title{List Files to be Bundled} \usage{ listBundleFiles(appDir) } \arguments{ \item{appDir}{Directory containing the application.} } \value{ Returns a list containing the following elements: \tabular{ll}{ \code{contents} \tab A list of the files to be bundled \cr \code{totalSize} \tab The total size of the files \cr } } \description{ Given a directory containing an application, returns the names of the files to be bundled in the application. } \details{ This function computes results similar to a recursive directory listing from \code{\link[=list.files]{list.files()}}, with the following constraints: \enumerate{ \item{If the total size of the files exceeds the maximum bundle size, no more files are listed. The maximum bundle size is controlled by the \code{rsconnect.max.bundle.size} option.} \item{If the total size number of files exceeds the maximum number to be bundled, no more files are listed. The maximum number of files in the bundle is controlled by the \code{rsconnect.max.bundle.files} option.} \item{Certain files and folders that don't need to be bundled, such as those containing internal version control and RStudio state, are excluded.} \item{In order to stop specific files in the working directory from being listed in the bundle, the files must be listed in the .rscignore file. This file must have one file or directory per line with no support for wildcards.} } } rsconnect/man/showLogs.Rd0000644000175000017500000000230214031151455015245 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/applications.R \name{showLogs} \alias{showLogs} \title{Show Application Logs} \usage{ showLogs( appPath = getwd(), appFile = NULL, appName = NULL, account = NULL, entries = 50, streaming = FALSE ) } \arguments{ \item{appPath}{The path to the directory or file that was deployed.} \item{appFile}{The path to the R source file that contains the application (for single file applications).} \item{appName}{The name of the application to show logs for. May be omitted if only one application deployment was made from \code{appPath}.} \item{account}{The account under which the application was deployed. May be omitted if only one account is registered on the system.} \item{entries}{The number of log entries to show. Defaults to 50 entries.} \item{streaming}{Whether to stream the logs. If \code{TRUE}, then the function does not return; instead, log entries are written to the console as they are made, until R is interrupted. Defaults to \code{FALSE}.} } \description{ Show the logs for a deployed ShinyApps application. } \note{ This function only uses the \code{libcurl} transport, and works only for ShinyApps servers. } rsconnect/man/setAccountInfo.Rd0000644000175000017500000000133514031151455016371 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/accounts.R \name{setAccountInfo} \alias{setAccountInfo} \title{Set ShinyApps Account Info} \usage{ setAccountInfo(name, token, secret) } \arguments{ \item{name}{Name of account to save or remove} \item{token}{User token for the account} \item{secret}{User secret for the account} } \description{ Configure a ShinyApps account for publishing from this system. } \examples{ \dontrun{ # register an account setAccountInfo("user", "token", "secret") # remove the same account removeAccount("user") } } \seealso{ Other Account functions: \code{\link{accounts}()}, \code{\link{connectApiUser}()}, \code{\link{connectUser}()} } \concept{Account functions} rsconnect/man/removeAuthorizedUser.Rd0000644000175000017500000000166114031151455017642 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/auth.R \name{removeAuthorizedUser} \alias{removeAuthorizedUser} \title{Remove authorized user from an application} \usage{ removeAuthorizedUser( user, appDir = getwd(), appName = NULL, account = NULL, server = NULL ) } \arguments{ \item{user}{The user to remove. Can be id or email address.} \item{appDir}{Directory containing application. Defaults to current working directory.} \item{appName}{Name of application.} \item{account}{Account name. If a single account is registered on the system then this parameter can be omitted.} \item{server}{Server name. Required only if you use the same account name on multiple servers.} } \description{ Remove authorized user from an application } \note{ This function works only for ShinyApps servers. } \seealso{ \code{\link[=addAuthorizedUser]{addAuthorizedUser()}} and \code{\link[=showUsers]{showUsers()}} } rsconnect/man/writeManifest.Rd0000644000175000017500000000326514051531527016276 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/bundle.R \name{writeManifest} \alias{writeManifest} \title{Create a manifest.json describing deployment requirements.} \usage{ writeManifest( appDir = getwd(), appFiles = NULL, appPrimaryDoc = NULL, contentCategory = NULL, python = NULL, forceGeneratePythonEnvironment = FALSE, verbose = FALSE ) } \arguments{ \item{appDir}{Directory containing the content (Shiny application, R Markdown document, etc).} \item{appFiles}{Optional. The full set of files and directories to be included in future deployments of this content. Used when computing dependency requirements. When \code{NULL}, all files in \code{appDir} are considered.} \item{appPrimaryDoc}{Optional. Specifies the primary document in a content directory containing more than one. If \code{NULL}, the primary document is inferred from the file list.} \item{contentCategory}{Optional. Specifies the kind of content being deployed (e.g. \code{"plot"} or \code{"site"}).} \item{python}{Full path to a python binary for use by \code{reticulate}. The specified python binary will be invoked to determine its version and to list the python packages installed in the environment. If python = NULL, and RETICULATE_PYTHON is set in the environment, its value will be used.} \item{forceGeneratePythonEnvironment}{Optional. If an existing \code{requirements.txt} file is found, it will be overwritten when this argument is \code{TRUE}.} \item{verbose}{If TRUE, prints progress messages to the console} } \description{ Given a directory content targeted for deployment, write a manifest.json into that directory describing the deployment requirements for that content. } rsconnect/man/deployments.Rd0000644000175000017500000000376314031151455016017 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/deployments.R \name{deployments} \alias{deployments} \title{List Application Deployments} \usage{ deployments( appPath, nameFilter = NULL, accountFilter = NULL, serverFilter = NULL, excludeOrphaned = TRUE ) } \arguments{ \item{appPath}{The path to the content that was deployed, either a directory or an individual document.} \item{nameFilter}{Return only deployments matching the given name (optional)} \item{accountFilter}{Return only deployments matching the given account (optional)} \item{serverFilter}{Return only deployments matching the given server (optional)} \item{excludeOrphaned}{If \code{TRUE} (the default), return only deployments made by a currently registered account. Deployments made from accounts that are no longer registered (via e.g.\code{\link[=removeAccount]{removeAccount()}}) will not be returned.} } \value{ Returns a data frame with at least following columns: \tabular{ll}{ \code{name} \tab Name of deployed application\cr \code{account} \tab Account owning deployed application\cr \code{bundleId} \tab Identifier of deployed application's bundle\cr \code{url} \tab URL of deployed application\cr \code{when} \tab When the application was deployed (in seconds since the epoch)\cr \code{lastSyncTime} \tab When the application was last synced (in seconds since the epoch)\cr \code{deploymentFile} \tab Name of configuration file\cr } If additional metadata has been saved with the deployment record using the \code{metadata} argument to \code{\link[=deployApp]{deployApp()}}, the frame will include additional columns. } \description{ List deployment records for a given application. } \examples{ \dontrun{ # Return all deployments of the ~/r/myapp directory made with the 'abc' # account deployments("~/r/myapp", accountFilter="abc") } } \seealso{ \code{\link[=applications]{applications()}} to get a list of deployments from the server, and \code{\link[=deployApp]{deployApp()}} to create a new deployment. } rsconnect/man/showUsers.Rd0000644000175000017500000000150014031151455015441 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/auth.R \name{showUsers} \alias{showUsers} \title{List authorized users for an application} \usage{ showUsers(appDir = getwd(), appName = NULL, account = NULL, server = NULL) } \arguments{ \item{appDir}{Directory containing application. Defaults to current working directory.} \item{appName}{Name of application.} \item{account}{Account name. If a single account is registered on the system then this parameter can be omitted.} \item{server}{Server name. Required only if you use the same account name on multiple servers.} } \description{ List authorized users for an application } \note{ This function works only for ShinyApps servers. } \seealso{ \code{\link[=addAuthorizedUser]{addAuthorizedUser()}} and \code{\link[=showInvited]{showInvited()}} } rsconnect/man/linter.Rd0000644000175000017500000000253314031151455014743 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/lint-framework.R \name{linter} \alias{linter} \title{Create a Linter} \usage{ linter(apply, takes, message, suggestion) } \arguments{ \item{apply}{Function that, given the content of a file, returns the indices at which problems were found.} \item{takes}{Function that, given a set of paths, returns the subset of paths that this linter uses.} \item{message}{Function that, given content and lines, returns an informative message for the user. Typically generated with \code{\link[=makeLinterMessage]{makeLinterMessage()}}.} \item{suggestion}{String giving a prescribed fix for the linted problem.} } \description{ Generate a linter, which can identify errors or problematic regions in a project. } \examples{ addLinter("no.capitals", linter( ## Identify lines containing capital letters -- either by name or by index apply = function(content, ...) { grep("[A-Z]", content) }, ## Only use this linter on R files (paths ending with .r or .R) takes = function(paths) { grep("[rR]$", paths) }, # Use the default message constructor message = function(content, lines, ...) { makeLinterMessage("Capital letters found on the following lines", content, lines) }, # Give a suggested prescription suggest = "Do not use capital letters in these documents." )) } rsconnect/man/terminateApp.Rd0000644000175000017500000000176514031151455016105 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/terminateApp.R \name{terminateApp} \alias{terminateApp} \title{Terminate an Application} \usage{ terminateApp(appName, account = NULL, server = NULL, quiet = FALSE) } \arguments{ \item{appName}{Name of application to terminate} \item{account}{Account name. If a single account is registered on the system then this parameter can be omitted.} \item{server}{Server name. Required only if you use the same account name on multiple servers (see \code{\link[=servers]{servers()}})} \item{quiet}{Request that no status information be printed to the console during the termination.} } \description{ Terminate and archive a currently deployed ShinyApps application. } \note{ This function only works for ShinyApps servers. } \examples{ \dontrun{ # terminate an application terminateApp("myapp") } } \seealso{ \code{\link[=applications]{applications()}}, \code{\link[=deployApp]{deployApp()}}, and \code{\link[=restartApp]{restartApp()}} } rsconnect/man/deployAPI.Rd0000644000175000017500000000202114031151455015264 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/deployAPI.R \name{deployAPI} \alias{deployAPI} \title{Deploy a Plumber API} \usage{ deployAPI(api, ...) } \arguments{ \item{api}{Path to the API project directory. Must contain either \code{entrypoint.R} or \code{plumber.R}} \item{...}{Additional arguments to \code{\link[=deployApp]{deployApp()}}.} } \description{ Deploys an application consisting of plumber API routes. The given directory must contain a script returning a \code{plumb} object or a plumber API definition. } \details{ Deploy a plumber API definition by either supplying a directory containing \code{plumber.R} (an API definition) or \code{entrypoint.R} that returns a \code{plumb} object created by \code{plumber::plumb()}. See the plumber documentation for more information. } \seealso{ Other Deployment functions: \code{\link{applications}()}, \code{\link{deployApp}()}, \code{\link{deployDoc}()}, \code{\link{deploySite}()}, \code{\link{deployTFModel}()} } \concept{Deployment functions} rsconnect/man/purgeApp.Rd0000644000175000017500000000170514031151455015231 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/purgeApp.R \name{purgeApp} \alias{purgeApp} \title{Purge an Application} \usage{ purgeApp(appName, account = NULL, server = NULL, quiet = FALSE) } \arguments{ \item{appName}{Name of application to purge} \item{account}{Account name. If a single account is registered on the system then this parameter can be omitted.} \item{server}{Server name. Required only if you use the same account name on multiple servers (see \code{\link[=servers]{servers()}})} \item{quiet}{Request that no status information be printed to the console during the termination.} } \description{ Purge a currently archived ShinyApps application. } \note{ This function only works for ShinyApps servers. } \examples{ \dontrun{ # purge an application purgeApp("myapp") } } \seealso{ \code{\link[=applications]{applications()}}, \code{\link[=deployApp]{deployApp()}}, and \code{\link[=restartApp]{restartApp()}} } rsconnect/man/showInvited.Rd0000644000175000017500000000147414031151455015754 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/auth.R \name{showInvited} \alias{showInvited} \title{List invited users for an application} \usage{ showInvited(appDir = getwd(), appName = NULL, account = NULL, server = NULL) } \arguments{ \item{appDir}{Directory containing application. Defaults to current working directory.} \item{appName}{Name of application.} \item{account}{Account name. If a single account is registered on the system then this parameter can be omitted.} \item{server}{Server name. Required only if you use the same account name on multiple servers.} } \description{ List invited users for an application } \note{ This function works only for ShinyApps servers. } \seealso{ \code{\link[=addAuthorizedUser]{addAuthorizedUser()}} and \code{\link[=showUsers]{showUsers()}} } rsconnect/man/authorizedUsers.Rd0000644000175000017500000000063214031151455016644 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/auth.R \name{authorizedUsers} \alias{authorizedUsers} \title{(Deprecated) List authorized users for an application} \usage{ authorizedUsers(appDir = getwd()) } \arguments{ \item{appDir}{Directory containing application. Defaults to current working directory.} } \description{ (Deprecated) List authorized users for an application } rsconnect/man/options.Rd0000644000175000017500000001171414031151574015144 0ustar nileshnilesh\name{rsconnectOptions} \alias{rsconnectOptions} \title{Package Options} \description{ The \pkg{rsconnect} package supports several options that control the method used for http communications, the printing of diagnostic information for http requests, and the launching of an external browser after deployment. } \details{ Supported global options include: \describe{ \item{\code{rsconnect.ca.bundle}}{Path to a custom bundle of Certificate Authority root certificates to use when connecting to servers via SSL. This option can also be specied in the environment variable \code{RSCONNECT_CA_BUNDLE}. Leave undefined to use your system's default certificate store.} \item{\code{rsconnect.check.certificate}}{Whether to check the SSL certificate when connecting to a remote host; defaults to \code{TRUE}. Setting to \code{FALSE} is insecure, but will allow you to connect to hosts using invalid certificates as a last resort.} \item{\code{rsconnect.http}}{Http implementation used for connections to the back-end service: \tabular{ll}{ \code{libcurl} \tab Secure https using the \code{curl} R package\cr \code{rcurl} \tab Secure https using the \code{Rcurl} R package (deprecated)\cr \code{curl} \tab Secure https using the curl system utility \cr \code{internal} \tab Insecure http using raw sockets\cr } If no option is specified then \code{libcurl} is used by default. } \item{\code{rsconnect.http.trace}}{When \code{TRUE}, trace http calls (prints the method, path, and total milliseconds for each http request)} \item{\code{rsconnect.http.trace.json}}{When \code{TRUE}, trace JSON content (shows JSON payloads sent to and received from the server))} \item{\code{rsconnect.http.verbose}}{When \code{TRUE}, print verbose output for http connections (useful only for debugging SSL certificate or http connection problems)} \item{\code{rsconnect.rcurl.options}}{A named list of additional cURL options to use when using the RCurl HTTP implementation in R. Run \code{RCurl::curlOptions()} to see available options.} \item{\code{rsconnect.libcurl.options}}{A named list of additional cURL options to use when using the curl HTTP implementation in R. Run \code{curl::curl_options()} to see available options.} \item{\code{rsconnect.error.trace}}{{When \code{TRUE}, print detailed stack traces for errors occurring during deployment.}} \item{\code{rsconnect.launch.browser}}{When \code{TRUE}, automatically launch a browser to view applications after they are deployed} \item{\code{rsconnect.locale.cache}}{When \code{FALSE}, disable the detected locale cache (Windows only). } \item{\code{rsconnect.locale}}{Override the detected locale. } \item{\code{rsconnect.max.bundle.size}}{The maximum size, in bytes, for deployed content. If not set, defaults to 3 GB.} \item{\code{rsconnect.max.bundle.files}}{The maximum number of files to deploy. If not set, defaults to 10,000.} \item{\code{rsconnect.force.update.apps}}{When \code{TRUE}, bypasses the prompt to confirm whether you wish to update previously-deployed content} \item{\code{rsconnect.pre.deploy}}{A function to run prior to deploying content; it receives as an argument the path to the content that's about to be deployed.} \item{\code{rsconnect.post.deploy}}{A function to run after successfully deploying content; it receives as an argument the path to the content that was just deployed.} \item{\code{rsconnect.python.enabled}}{When \code{TRUE}, use the python executable specified by the \code{RETICULATE_PYTHON} environment variable and add a \code{python} section to the deployment manifest. By default, python is enabled when deploying to RStudio Connect and disabled when deploying to shinyapps.io.} } When deploying content from the RStudio IDE, the rsconnect package's deployment methods are executed in a vanilla R session that doesn't execute startup scripts. This can make it challenging to ensure options are set properly prior to push-button deployment, so the rsconnect package has a parallel set of ``startup'' scripts it runs prior to deploying. The follow are run in order, if they exist, prior to deployment: \describe{ \item{\code{$R_HOME/etc/rsconnect.site}}{Like \code{Rprofile.site}; for site-wide pre-flight and options.} \item{\code{~/.rsconnect_profile}}{Like \code{.Rprofile}; for user-specific content.} \item{\code{$PROJECT/.rsconnect_profile}}{Like \code{.Rprofile} for projects; \code{$PROJECT} here refers to the root directory of the content being deployed.} } Note that, unlike \code{.Rprofile}, these files don't replace each other; \emph{all three} will be run if they exist. } \examples{ \dontrun{ # use curl for http connections options(rsconnect.http = "curl") # trace http requests options(rsconnect.http.trace = TRUE) # print verbose output for http requests options(rsconnect.http.verbose = TRUE) # print JSON content options(rsconnect.http.trace.json = TRUE) # don't automatically launch a browser after deployment options(rsconnect.launch.browser = FALSE) } } rsconnect/man/lint.Rd0000644000175000017500000000123214031151455014407 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/lint-framework.R \name{lint} \alias{lint} \title{Lint a Project} \usage{ lint(project, files = NULL, appPrimaryDoc = NULL) } \arguments{ \item{project}{Path to a project directory.} \item{files}{Specific files to lint. Can be NULL, in which case all the files in the directory will be linted.} \item{appPrimaryDoc}{The primary file in the project directory. Can be NULL, in which case it's inferred (if possible) from the directory contents.} } \description{ Takes the set of active linters (see \code{\link[=addLinter]{addLinter()}}), and applies them to all files within a project. } rsconnect/man/addLinter.Rd0000644000175000017500000000173014031151455015352 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/lint-framework.R \name{addLinter} \alias{addLinter} \title{Add a Linter} \usage{ addLinter(name, linter) } \arguments{ \item{name}{The name of the linter, as a string.} \item{linter}{A \code{\link[=linter]{linter()}}.} } \description{ Add a linter, to be used in subsequent calls to \code{\link[=lint]{lint()}}. } \examples{ addLinter("no.capitals", linter( ## Identify lines containing capital letters -- either by name or by index apply = function(content, ...) { grep("[A-Z]", content) }, ## Only use this linter on R files (paths ending with .r or .R) takes = function(paths) { grep("[rR]$", paths) }, # Use the default message constructor message = function(content, lines, ...) { makeLinterMessage("Capital letters found on the following lines", content, lines) }, # Give a suggested prescription suggest = "Do not use capital letters in these documents." )) } rsconnect/man/rsconnectPackages.Rd0000644000175000017500000000426214031357651017112 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/packages.R \name{rsconnectPackages} \alias{rsconnectPackages} \title{Using Packages with rsconnect} \description{ Deployed applications can depend on any package available on CRAN as well as any package hosted in a public \href{https://github.com/}{GitHub} repository. When an application is deployed it's source code is scanned for dependencies using the \code{\link[=appDependencies]{appDependencies()}} function. The list of dependencies is sent to the server along with the application source code and these dependencies are then installed alongside the application. Note that the \code{Suggests} dependencies of packages are not automatically included in the list of dependent packages. See the \emph{Note} section of the documentation of the \code{\link[=appDependencies]{appDependencies()}} function for details on how to force packages to be included in the dependency list. } \section{CRAN Packages}{ When sastisfying CRAN package dependencies, the server will build the exact versions of packages that were installed on the system from which the application is deployed. If a locally installed package was not obtained from CRAN (e.g. was installed from R-Forge) and as a result doesn't have a version that matches a version previously published to CRAN then an error will occur. It's therefore important that you run against packages installed directly from CRAN in your local configuration. } \section{GitHub Packages}{ It's also possible to depend on packages hosted in public GitHub repositories, so long as they are installed via the \code{\link[devtools:remote-reexports]{devtools::install_github()}} function from the \pkg{devtools} package. This works because \code{install_github} records the exact Github commit that was installed locally, making it possible to download and install the same source code on the deployment server. Note that in order for this to work correctly you need to install the very latest version of \code{devtools} from Github. You can do this as follows: \preformatted{ library(devtools) install_github("r-lib/devtools") } } \seealso{ \code{\link[=appDependencies]{appDependencies()}} } rsconnect/man/applications.Rd0000644000175000017500000000337014031151455016134 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/applications.R \name{applications} \alias{applications} \title{List Deployed Applications} \usage{ applications(account = NULL, server = NULL) } \arguments{ \item{account}{Account name. If a single account is registered on the system then this parameter can be omitted.} \item{server}{Server name. Required only if you use the same account name on multiple servers.} } \value{ Returns a data frame with the following columns: \tabular{ll}{ \code{id} \tab Application unique id \cr \code{name} \tab Name of application \cr \code{url} \tab URL where application can be accessed \cr \code{status} \tab Current status of application. Valid values are \code{pending}, \code{deploying}, \code{running}, \code{terminating}, and \code{terminated} \cr \code{size} \tab Instance size (small, medium, large, etc.) (on ShinyApps.io) \cr \code{instances} \tab Number of instances (on ShinyApps.io) \cr \code{config_url} \tab URL where application can be configured \cr } } \description{ List all applications currently deployed for a given account. } \note{ To register an account you call the \code{\link[=setAccountInfo]{setAccountInfo()}} function. } \examples{ \dontrun{ # list all applications for the default account applications() # list all applications for a specific account applications("myaccount") # view the list of applications in the data viewer View(applications()) } } \seealso{ \code{\link[=deployApp]{deployApp()}}, \code{\link[=terminateApp]{terminateApp()}} Other Deployment functions: \code{\link{deployAPI}()}, \code{\link{deployApp}()}, \code{\link{deployDoc}()}, \code{\link{deploySite}()}, \code{\link{deployTFModel}()} } \concept{Deployment functions} rsconnect/man/addAuthorizedUser.Rd0000644000175000017500000000231514031151455017072 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/auth.R \name{addAuthorizedUser} \alias{addAuthorizedUser} \title{Add authorized user to application} \usage{ addAuthorizedUser( email, appDir = getwd(), appName = NULL, account = NULL, server = NULL, sendEmail = NULL, emailMessage = NULL ) } \arguments{ \item{email}{Email address of user to add.} \item{appDir}{Directory containing application. Defaults to current working directory.} \item{appName}{Name of application.} \item{account}{Account name. If a single account is registered on the system then this parameter can be omitted.} \item{server}{Server name. Required only if you use the same account name on multiple servers.} \item{sendEmail}{Send an email letting the user know the application has been shared with them.} \item{emailMessage}{Optional character vector of length 1 containing a custom message to send in email invitation. Defaults to NULL, which will use default invitation message.} } \description{ Add authorized user to application } \note{ This function works only for ShinyApps servers. } \seealso{ \code{\link[=removeAuthorizedUser]{removeAuthorizedUser()}} and \code{\link[=showUsers]{showUsers()}} } rsconnect/man/rsconnectConfigDir.Rd0000644000175000017500000000100214143534106017221 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/config.R \name{rsconnectConfigDir} \alias{rsconnectConfigDir} \title{rsconnect Configuration Directory} \usage{ rsconnectConfigDir(subDir = NULL) } \arguments{ \item{subDir}{An optional subdirectory to be included as the last element of the path.} } \value{ The path to the configuration directory. } \description{ Forms the path to a location on disk where user-level configuration data for the package is stored. } \keyword{internal} rsconnect/man/makeLinterMessage.Rd0000644000175000017500000000107514031151455017046 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/lint-utils.R \name{makeLinterMessage} \alias{makeLinterMessage} \title{Construct a Linter Message} \usage{ makeLinterMessage(header, content, lines) } \arguments{ \item{header}{A header message describing the linter.} \item{content}{The content of the file that was linted.} \item{lines}{The line numbers from \code{content} that contain lint.} } \description{ Pretty-prints a linter message. Primarily used as a helper for constructing linter messages with \code{\link[=linter]{linter()}}. } rsconnect/man/deploySite.Rd0000644000175000017500000000577314031151455015600 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/deploySite.R \name{deploySite} \alias{deploySite} \title{Deploy a Website} \usage{ deploySite( siteDir = getwd(), siteName = NULL, account = NULL, server = NULL, render = c("none", "local", "server"), launch.browser = getOption("rsconnect.launch.browser", interactive()), logLevel = c("normal", "quiet", "verbose"), lint = FALSE, metadata = list(), python = NULL, ... ) } \arguments{ \item{siteDir}{Directory containing website. Defaults to current working directory.} \item{siteName}{Name for the site (names must be unique within an account). Defaults to the base name of the specified siteDir, (or to a name provided by a custom site generation function).} \item{account}{Account to deploy application to. This parameter is only required for the initial deployment of an application when there are multiple accounts configured on the system (see \link{accounts}).} \item{server}{Server name. Required only if you use the same account name on multiple servers.} \item{render}{Rendering behavior for site: "none" to upload a static version of the current contents of the site directory; "local" to render the site locally then upload it; "server" to render the site on the server. Note that for "none" and "local" R scripts (.R) and markdown documents (.Rmd and .md) will not be uploaded to the server.} \item{launch.browser}{If true, the system's default web browser will be launched automatically after the app is started. Defaults to \code{TRUE} in interactive sessions only. If a function is passed, it will be called after the app is started, with the app URL as a paramter.} \item{logLevel}{One of \code{"quiet"}, \code{"normal"} or \code{"verbose"}; indicates how much logging to the console is to be performed. At \code{"quiet"} reports no information; at \code{"verbose"}, a full diagnostic log is captured.} \item{lint}{Lint the project before initiating deployment, to identify potentially problematic code?} \item{metadata}{Additional metadata fields to save with the deployment record. These fields will be returned on subsequent calls to \code{\link[=deployments]{deployments()}}.} \item{python}{Full path to a python binary for use by \code{reticulate}. Required if \code{reticulate} is a dependency of the app being deployed. If python = NULL, and RETICULATE_PYTHON is set in the environment, its value will be used. The specified python binary will be invoked to determine its version and to list the python packages installed in the environment.} \item{...}{Additional arguments to \code{\link[=deployApp]{deployApp()}}. Do not supply \code{appDir}, \code{appFiles}, or \code{appSourceDoc}; these three parameters are automatically generated by \code{deploySite}.} } \description{ Deploy an R Markdown website to a server. } \seealso{ Other Deployment functions: \code{\link{applications}()}, \code{\link{deployAPI}()}, \code{\link{deployApp}()}, \code{\link{deployDoc}()}, \code{\link{deployTFModel}()} } \concept{Deployment functions} rsconnect/man/applicationConfigDir.Rd0000644000175000017500000000074414143534106017542 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/config.R \name{applicationConfigDir} \alias{applicationConfigDir} \title{Application Configuration Directory} \usage{ applicationConfigDir() } \value{ A string containing the path of the configuration folder. } \description{ Returns the root path used to store per user configuration data. Does not check old locations or create the path; use \code{rsconnectConfigDir} for most cases. } \keyword{internal} rsconnect/man/deployApp.Rd0000644000175000017500000001365414105013651015406 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/deployApp.R \name{deployApp} \alias{deployApp} \title{Deploy an Application} \usage{ deployApp( appDir = getwd(), appFiles = NULL, appFileManifest = NULL, appPrimaryDoc = NULL, appSourceDoc = NULL, appName = NULL, appTitle = NULL, appId = NULL, contentCategory = NULL, account = NULL, server = NULL, upload = TRUE, recordDir = NULL, launch.browser = getOption("rsconnect.launch.browser", interactive()), logLevel = c("normal", "quiet", "verbose"), lint = TRUE, metadata = list(), forceUpdate = getOption("rsconnect.force.update.apps", FALSE), python = NULL, on.failure = NULL, forceGeneratePythonEnvironment = FALSE ) } \arguments{ \item{appDir}{Directory containing application. Defaults to current working directory.} \item{appFiles}{The files and directories to bundle and deploy (only if \code{upload = TRUE}). Can be \code{NULL}, in which case all the files in the directory containing the application are bundled, with the exception of any listed in an \code{.rcsignore} file. Takes precedence over \code{appFileManifest} if both are supplied.} \item{appFileManifest}{An alternate way to specify the files to be deployed; a file containing the names of the files, one per line, relative to the \code{appDir}.} \item{appPrimaryDoc}{If the application contains more than one document, this parameter indicates the primary one, as a path relative to \code{appDir}. Can be \code{NULL}, in which case the primary document is inferred from the contents being deployed.} \item{appSourceDoc}{If the application is composed of static files (e.g HTML), this parameter indicates the source document, if any, as a fully qualified path. Deployment information returned by \code{\link[=deployments]{deployments()}} is associated with the source document.} \item{appName}{Name of application (names must be unique within an account). Defaults to the base name of the specified \code{appDir}.} \item{appTitle}{Free-form descriptive title of application. Optional; if supplied, will often be displayed in favor of the name. When deploying a new application, you may supply only the \code{appTitle} to receive an auto-generated \code{appName}.} \item{appId}{If updating an application, the ID of the application being updated. Optional unless updating an app owned by another user.} \item{contentCategory}{Optional; the kind of content being deployed (e.g. \code{"plot"} or \code{"site"}).} \item{account}{Account to deploy application to. This parameter is only required for the initial deployment of an application when there are multiple accounts configured on the system (see \link{accounts}).} \item{server}{Server name. Required only if you use the same account name on multiple servers.} \item{upload}{If \code{TRUE} (the default) then the application is uploaded from the local system prior to deployment. If \code{FALSE} then it is re-deployed using the last version that was uploaded. \code{FALSE} is only supported on shinyapps.io; \code{TRUE} is required on RStudio Connect.} \item{recordDir}{Directory where publish record is written. Can be \code{NULL} in which case record will be written to the location specified with \code{appDir}.} \item{launch.browser}{If true, the system's default web browser will be launched automatically after the app is started. Defaults to \code{TRUE} in interactive sessions only. If a function is passed, it will be called after the app is started, with the app URL as a paramter.} \item{logLevel}{One of \code{"quiet"}, \code{"normal"} or \code{"verbose"}; indicates how much logging to the console is to be performed. At \code{"quiet"} reports no information; at \code{"verbose"}, a full diagnostic log is captured.} \item{lint}{Lint the project before initiating deployment, to identify potentially problematic code?} \item{metadata}{Additional metadata fields to save with the deployment record. These fields will be returned on subsequent calls to \code{\link[=deployments]{deployments()}}.} \item{forceUpdate}{If \code{TRUE}, update any previously-deployed app without asking. If \code{FALSE}, ask to update. If unset, defaults to the value of \code{getOption("rsconnect.force.update.apps", FALSE)}.} \item{python}{Full path to a python binary for use by \code{reticulate}. Required if \code{reticulate} is a dependency of the app being deployed. If python = NULL, and RETICULATE_PYTHON is set in the environment, its value will be used. The specified python binary will be invoked to determine its version and to list the python packages installed in the environment.} \item{on.failure}{Function to be called if the deployment fails. If a deployment log URL is available, it's passed as a parameter.} \item{forceGeneratePythonEnvironment}{Optional. If an existing \code{requirements.txt} file is found, it will be overwritten when this argument is \code{TRUE}.} } \description{ Deploy a \link[shiny:shiny-package]{shiny} application, an \link[rmarkdown:rmarkdown-package]{RMarkdown} document, a plumber API, or HTML content to a server. } \examples{ \dontrun{ # deploy the application in the current working dir deployApp() # deploy an application in another directory deployApp("~/projects/shiny/app1") # deploy using an alternative application name and title deployApp("~/projects/shiny/app1", appName = "myapp", appTitle = "My Application") # deploy specifying an explicit account name, then # redeploy with no arguments (will automatically use # the previously specified account) deployApp(account = "jsmith") deployApp() # deploy but don't launch a browser when completed deployApp(launch.browser = FALSE) } } \seealso{ \code{\link[=applications]{applications()}}, \code{\link[=terminateApp]{terminateApp()}}, and \code{\link[=restartApp]{restartApp()}} Other Deployment functions: \code{\link{applications}()}, \code{\link{deployAPI}()}, \code{\link{deployDoc}()}, \code{\link{deploySite}()}, \code{\link{deployTFModel}()} } \concept{Deployment functions} rsconnect/man/oldApplicationConfigDir.Rd0000644000175000017500000000130714143534106020175 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/config.R \name{oldApplicationConfigDir} \alias{oldApplicationConfigDir} \title{Old Application Config Directory} \usage{ oldApplicationConfigDir(appName) } \arguments{ \item{appName}{The application's name (connect or rsconnect)} } \value{ The old application configuration directory. } \description{ Returns the old application configuration directory used by rsconnect 0.8.24 and prior. These versions wrote configuration data to XDG compliant locations, but CRAN policy has since further restricted the disk locations that are permitted. See: } \details{ https://cran.r-project.org/web/packages/policies.html } \keyword{internal} rsconnect/man/tasks.Rd0000644000175000017500000000153514031151455014574 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/tasks.R \name{tasks} \alias{tasks} \title{List Tasks} \usage{ tasks(account = NULL, server = NULL) } \arguments{ \item{account}{Account name. If a single account is registered on the system then this parameter can be omitted.} \item{server}{Server name. Required only if you use the same account name on multiple servers (see \code{\link[=servers]{servers()}})} } \value{ Returns a data frame with the following columns: \tabular{ll}{ \code{id} \tab Task id \cr \code{action} \tab Task action\cr \code{status} \tab Current task status\cr \code{created_time} \tab Task creation time\cr \code{finished_time} \tab Task finished time\cr } } \description{ List Tasks } \examples{ \dontrun{ # list tasks for the default account tasks() } } \seealso{ \code{\link[=taskLog]{taskLog()}} } rsconnect/man/connectApiUser.Rd0000644000175000017500000000215714031151455016372 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/accounts.R \name{connectApiUser} \alias{connectApiUser} \title{Connect Api User Account} \usage{ connectApiUser(account = NULL, server = NULL, apiKey = NULL, quiet = FALSE) } \arguments{ \item{account}{A name for the account to connect. Optional.} \item{server}{The server to connect to. Optional if there is only one server registered.} \item{apiKey}{The API key used to authenticate the user} \item{quiet}{Whether or not to show messages and prompts while connecting the account.} } \description{ Connect a user account to the package using an API key for authentication so that it can be used to deploy and manage applications on behalf of the account. } \details{ This function configures the user to connect using an apiKey in the http auth headers instead of a token. This is less secure but may be necessary when the client is behind a proxy or otherwise unable to authenticate using a token. } \seealso{ Other Account functions: \code{\link{accounts}()}, \code{\link{connectUser}()}, \code{\link{setAccountInfo}()} } \concept{Account functions} rsconnect/man/accountUsage.Rd0000644000175000017500000000201114031151455016056 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/usage.R \name{accountUsage} \alias{accountUsage} \title{Show Account Usage} \usage{ accountUsage( account = NULL, server = NULL, usageType = "hours", from = NULL, until = NULL, interval = NULL ) } \arguments{ \item{account}{Account name. If a single account is registered on the system then this parameter can be omitted.} \item{server}{Server name. Required only if you use the same account name on multiple servers.} \item{usageType}{Use metric to retreive (for example: "hours")} \item{from}{Date range starting timestamp (Unix timestamp or relative time delta such as "2d" or "3w").} \item{until}{Date range ending timestamp (Unix timestamp or relative time delta such as "2d" or "3w").} \item{interval}{Summarization interval. Data points at intervals less then this will be grouped. (Number of seconds or relative time delta e.g. "1h").} } \description{ Show account usage } \note{ This function only works for ShinyApps servers. } rsconnect/man/showProperties.Rd0000644000175000017500000000117414031151455016503 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/configureApp.R \name{showProperties} \alias{showProperties} \title{Show Application property} \usage{ showProperties(appPath = getwd(), appName = NULL, account = NULL) } \arguments{ \item{appPath}{Directory or file that was deployed. Defaults to current working directory.} \item{appName}{Name of application} \item{account}{Account name. If a single account is registered on the system then this parameter can be omitted.} } \description{ Show propreties of an application deployed to ShinyApps. } \note{ This function works only for ShinyApps servers. } rsconnect/man/syncAppMetadata.Rd0000644000175000017500000000070214031151455016520 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/applications.R \name{syncAppMetadata} \alias{syncAppMetadata} \title{Sync Application Metadata} \usage{ syncAppMetadata(appPath) } \arguments{ \item{appPath}{The path to the directory or file that was deployed.} } \description{ Update the metadata for requested application across all deployments } \note{ This function does not update metadata for Shiny and rpubs apps } rsconnect/man/showUsage.Rd0000644000175000017500000000231614031151455015412 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/usage.R \name{showUsage} \alias{showUsage} \title{Show Application Usage} \usage{ showUsage( appDir = getwd(), appName = NULL, account = NULL, server = NULL, usageType = "hours", from = NULL, until = NULL, interval = NULL ) } \arguments{ \item{appDir}{Directory containing application. Defaults to current working directory.} \item{appName}{Name of application} \item{account}{Account name. If a single account is registered on the system then this parameter can be omitted.} \item{server}{Server name. Required only if you use the same account name on multiple servers.} \item{usageType}{Use metric to retreive (for example: "hours")} \item{from}{Date range starting timestamp (Unix timestamp or relative time delta such as "2d" or "3w").} \item{until}{Date range ending timestamp (Unix timestamp or relative time delta such as "2d" or "3w").} \item{interval}{Summarization interval. Data points at intervals less then this will be grouped. (Relative time delta e.g. "120s" or "1h" or "30d").} } \description{ Show application usage of a currently deployed application } \note{ This function only works for ShinyApps servers. } rsconnect/man/configureApp.Rd0000644000175000017500000000273414031151455016073 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/configureApp.R \name{configureApp} \alias{configureApp} \title{Configure an Application} \usage{ configureApp( appName, appDir = getwd(), account = NULL, server = NULL, redeploy = TRUE, size = NULL, instances = NULL, logLevel = c("normal", "quiet", "verbose") ) } \arguments{ \item{appName}{Name of application to configure} \item{appDir}{Directory containing application. Defaults to current working directory.} \item{account}{Account name. If a single account is registered on the system then this parameter can be omitted.} \item{server}{Server name. Required only if you use the same account name on multiple servers (see \code{\link[=servers]{servers()}})} \item{redeploy}{Re-deploy application after its been configured.} \item{size}{Configure application instance size} \item{instances}{Configure number of application instances} \item{logLevel}{One of \code{"quiet"}, \code{"normal"} or \code{"verbose"}; indicates how much logging to the console is to be performed. At \code{"quiet"} reports no information; at \code{"verbose"}, a full diagnostic log is captured.} } \description{ Configure an application running on a remote server. } \note{ This function works only for ShinyApps servers. } \examples{ \dontrun{ # set instance size for an application configureApp("myapp", size="xlarge") } } \seealso{ \code{\link[=applications]{applications()}}, \code{\link[=deployApp]{deployApp()}} } rsconnect/man/setProperty.Rd0000644000175000017500000000177314031151455016013 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/configureApp.R \name{setProperty} \alias{setProperty} \title{Set Application property} \usage{ setProperty( propertyName, propertyValue, appPath = getwd(), appName = NULL, account = NULL, force = FALSE ) } \arguments{ \item{propertyName}{Name of property to set} \item{propertyValue}{Nalue to set property to} \item{appPath}{Directory or file that was deployed. Defaults to current working directory.} \item{appName}{Name of application} \item{account}{Account name. If a single account is registered on the system then this parameter can be omitted.} \item{force}{Forcibly set the property} } \description{ Set a property on currently deployed ShinyApps application. } \note{ This function only works for ShinyApps servers. } \examples{ \dontrun{ # set instance size for an application setProperty("application.instances.count", 1) # disable application package cache setProperty("application.package.cache", FALSE) } } rsconnect/man/deployTFModel.Rd0000644000175000017500000000320014031357651016153 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/deployTFModel.R \name{deployTFModel} \alias{deployTFModel} \title{Deploy a TensorFlow saved model} \usage{ deployTFModel(modelDir, ...) } \arguments{ \item{modelDir}{Path to the saved model directory. MUST contain \emph{saved_model.pb} or \emph{saved_model.pbtxt}} \item{...}{Additional arguments to \code{\link[=deployApp]{deployApp()}}.} } \description{ Deploys a directory containing a Tensorflow saved model file. } \details{ Deploy a single Tensorflow saved model as a bundle. Should be passed a directory that contains the \emph{saved_model.pb} or \emph{saved_model.pbtxt} file, as well as any variables and assets necessary to load the model. A saved model directory might look like this:\preformatted{./1/ ./1/saved_model.pb or ./1/saved_model.pbtxt ./1/variables/ ./1/variables/variables.data-00000-of-00001 ./1/variables/variables.index } For information on creating saved models, see the Keras method \code{\link[keras:export_savedmodel.keras.engine.training.Model]{keras::export_savedmodel.keras.engine.training.Model()}} or the TensorFlow method \code{\link[tensorflow:export_savedmodel]{tensorflow::export_savedmodel()}}. If using the TensorFlow package for R, the official \href{https://www.tensorflow.org/guide/saved_model}{TensorFlow guide for saving and restoring models} may be useful. } \references{ \url{https://www.tensorflow.org/guide/saved_model} } \seealso{ Other Deployment functions: \code{\link{applications}()}, \code{\link{deployAPI}()}, \code{\link{deployApp}()}, \code{\link{deployDoc}()}, \code{\link{deploySite}()} } \concept{Deployment functions} rsconnect/man/accounts.Rd0000644000175000017500000000254014031151455015263 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/accounts.R \name{accounts} \alias{accounts} \alias{accountInfo} \alias{removeAccount} \title{Account Management Functions} \usage{ accounts(server = NULL) accountInfo(name, server = NULL) removeAccount(name, server = NULL) } \arguments{ \item{server}{Name of the server on which the account is registered (optional; see \code{\link[=servers]{servers()}})} \item{name}{Name of account} } \value{ \code{accounts} returns a data frame with the names of all accounts registered on the system and the servers on which they reside. \code{accountInfo} returns a list with account details. } \description{ Functions to enumerate and remove accounts on the local system. Prior to deploying applications you need to register your account on the local system. } \details{ You register an account using the \code{\link[=setAccountInfo]{setAccountInfo()}} function (for ShinyApps) or \code{\link[=connectUser]{connectUser()}} function (for other servers). You can subsequently remove the account using the \code{removeAccount} function. The \code{accounts} and \code{accountInfo} functions are provided for viewing previously registered accounts. } \seealso{ Other Account functions: \code{\link{connectApiUser}()}, \code{\link{connectUser}()}, \code{\link{setAccountInfo}()} } \concept{Account functions} rsconnect/man/deployDoc.Rd0000644000175000017500000000271714031151455015374 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/deployDoc.R \name{deployDoc} \alias{deployDoc} \title{Deploy a Document} \usage{ deployDoc(doc, ...) } \arguments{ \item{doc}{Path to the document to deploy.} \item{...}{Additional arguments to \code{\link[=deployApp]{deployApp()}}. Do not supply \code{appDir}, \code{appFiles}, or \code{appPrimaryDoc}; these three parameters are automatically generated by \code{deployDoc} from the document.} } \description{ Deploys an application consisting of a single R Markdown document or other single file (such as an HTML or PDF document). } \details{ When deploying an R Markdown document, any files which are required to render and display the file must be deployed. This method discovers these additional files using \code{\link[rmarkdown:find_external_resources]{rmarkdown::find_external_resources()}} from \pkg{rmarkdown}. If you find that the document is missing dependencies, either specify the dependencies explicitly in the document (the documentation for \code{\link[rmarkdown:find_external_resources]{rmarkdown::find_external_resources()}} explains how to do this), or call \code{\link[=deployApp]{deployApp()}} directly and specify your own file list in the \code{appFiles} parameter. } \seealso{ Other Deployment functions: \code{\link{applications}()}, \code{\link{deployAPI}()}, \code{\link{deployApp}()}, \code{\link{deploySite}()}, \code{\link{deployTFModel}()} } \concept{Deployment functions} rsconnect/man/servers.Rd0000644000175000017500000000417214031151455015140 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/servers.R \name{servers} \alias{servers} \alias{discoverServers} \alias{addConnectServer} \alias{addServer} \alias{removeServer} \alias{serverInfo} \alias{addServerCertificate} \title{Server Management Functions} \usage{ servers(local = FALSE) discoverServers(quiet = FALSE) addConnectServer(url, name = NULL, certificate = NULL, quiet = FALSE) addServer(url, name = NULL, certificate = NULL, quiet = FALSE) removeServer(name) serverInfo(name) addServerCertificate(name, certificate, quiet = FALSE) } \arguments{ \item{local}{Return only local servers (i.e. not \code{shinyapps.io})} \item{quiet}{Suppress output and prompts where possible.} \item{url}{Server's URL. Should look like \verb{http://servername/} or \verb{http://servername:port/}.} \item{name}{Optional nickname for the server. If none is given, the nickname is inferred from the server's hostname.} \item{certificate}{Optional; a path a certificate file to be used when making SSL connections to the server. The file's contents are copied and stored by the \pkg{rsconnect} package. Can also be a character vector containing the certificate's contents.} } \value{ \code{servers} returns a data frame with registered server names and URLs. \code{serverInfo} returns a list with details for a particular server. } \description{ Functions to manage the list of known servers to which \pkg{rsconnect} can deploy and manage applications. } \details{ Register a server with \code{addServer} or \code{discoverServers} (the latter is useful only if your administrator has configured server autodiscovery). Once a server is registered, you can connect to an account on the server using \code{\link[=connectUser]{connectUser()}}. The \code{servers} and \code{serverInfo} functions are provided for viewing previously registered servers. There is always at least one server registered (the \code{shinyapps.io} server) } \examples{ \dontrun{ # register a local server addServer("http://myrsconnect/", "myserver") # list servers servers(local = TRUE) # connect to an account on the server connectUser(server = "myserver") } } rsconnect/man/rsconnect-package.Rd0000644000175000017500000000323314031151455017033 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/rsconnect-package.R \docType{package} \name{rsconnect-package} \alias{rsconnect-package} \alias{rsconnect} \title{Deployment Interface for R Markdown Documents and Shiny Applications} \description{ The `rsconnect`` package provides a programmatic deployment interface for RPubs, shinyapps.io, and RStudio Connect. Supported contents types include R Markdown documents, Shiny applications, plots, and static web content. } \section{Managing Applications}{ Deploy and manage applications with the following functions: \itemize{ \item \code{\link[=deployApp]{deployApp()}}: Deploy a Shiny application to a server. \item \code{\link[=configureApp]{configureApp()}}: Configure an application currently running on a server. \item \code{\link[=restartApp]{restartApp()}}: Restart an application currently running on a server. \item \code{\link[=terminateApp]{terminateApp()}}: Terminate an application currently running on a server. \item \code{\link[=deployments]{deployments()}}: List deployment records for a given application directory. } More information on application management is available in the \code{\link[=applications]{applications()}} help page. } \section{Managing Accounts and Users}{ Manage accounts on the local system. \itemize{ \item \code{\link[=setAccountInfo]{setAccountInfo()}}: Register an account. \item \code{\link[=removeAccount]{removeAccount()}}: Remove an account. \item \code{\link[=accountInfo]{accountInfo()}}: View information for a given account. } More information on account management is available in the \code{\link[=accounts]{accounts()}} help page. } \keyword{package} rsconnect/man/taskLog.Rd0000644000175000017500000000145214031151455015051 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/tasks.R \name{taskLog} \alias{taskLog} \title{Show task log} \usage{ taskLog(taskId, account = NULL, server = NULL, output = NULL) } \arguments{ \item{taskId}{Task Id} \item{account}{Account name. If a single account is registered on the system then this parameter can be omitted.} \item{server}{Server name. Required only if you use the same account name on multiple servers (see \code{\link[=servers]{servers()}})} \item{output}{Where to write output. Valid values are \code{NULL} or \code{stderr}} } \description{ Writes the task log for the given task } \examples{ \dontrun{ # write task log to stdout taskLog(12345) # write task log to stderr taskLog(12345, output="stderr") } } \seealso{ \code{\link[=tasks]{tasks()}} } rsconnect/man/forgetDeployment.Rd0000644000175000017500000000255014031151455016774 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/deployments.R \name{forgetDeployment} \alias{forgetDeployment} \title{Forget Application Deployment} \usage{ forgetDeployment( appPath = getwd(), name = NULL, account = NULL, server = NULL, dryRun = FALSE, force = !interactive() ) } \arguments{ \item{appPath}{The path to the content that was deployed, either a directory or an individual document.} \item{name}{The name of the content that was deployed (optional)} \item{account}{The name of the account to which the content was deployed (optional)} \item{server}{The name of the server to which the content was deployed (optional)} \item{dryRun}{Set to TRUE to preview the files/directories to be removed instead of actually removing them. Defaults to FALSE.} \item{force}{Set to TRUE to remove files and directories without prompting. Defaults to FALSE in interactive sessions.} } \value{ NULL, invisibly. } \description{ Forgets about an application deployment. This is useful if the application has been deleted on the server, or the local deployment information needs to be reset. } \details{ This method removes from disk the file containing deployment metadata. If "name", "account", and "server" are all NULL, then all of the deployments for the application are forgotten; otherwise, only the specified deployment is forgotten. } rsconnect/man/connectUser.Rd0000644000175000017500000000220414031151455015731 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/accounts.R \name{connectUser} \alias{connectUser} \title{Connect User Account} \usage{ connectUser(account = NULL, server = NULL, quiet = FALSE) } \arguments{ \item{account}{A name for the account to connect. Optional.} \item{server}{The server to connect to. Optional if there is only one server registered.} \item{quiet}{Whether or not to show messages and prompts while connecting the account.} } \description{ Connect a user account to the package so that it can be used to deploy and manage applications on behalf of the account. } \details{ When this function is invoked, a web browser will be opened to a page on the target server where you will be prompted to enter your credentials. Upon successful authentication, your local installation of \pkg{rsconnect} and your server account will be paired, and you'll be able to deploy and manage applications using the package without further prompts for credentials. } \seealso{ Other Account functions: \code{\link{accounts}()}, \code{\link{connectApiUser}()}, \code{\link{setAccountInfo}()} } \concept{Account functions} rsconnect/man/showMetrics.Rd0000644000175000017500000000304014031357651015755 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/usage.R \name{showMetrics} \alias{showMetrics} \title{Show Application Metrics} \usage{ showMetrics( metricSeries, metricNames, appDir = getwd(), appName = NULL, account = NULL, server = NULL, from = NULL, until = NULL, interval = NULL ) } \arguments{ \item{metricSeries}{Metric series to query. Refer to the \href{https://docs.rstudio.com/shinyapps.io/metrics.html#ApplicationMetrics}{shinyapps.io documentation} for available series.} \item{metricNames}{Metric names in the series to query. Refer to the \href{https://docs.rstudio.com/shinyapps.io/metrics.html#ApplicationMetrics}{shinyapps.io documentation} for available metrics.} \item{appDir}{Directory containing application. Defaults to current working directory.} \item{appName}{Name of application} \item{account}{Account name. If a single account is registered on the system then this parameter can be omitted.} \item{server}{Server name. Required only if you use the same account name on multiple servers.} \item{from}{Date range starting timestamp (Unix timestamp or relative time delta such as "2d" or "3w").} \item{until}{Date range ending timestamp (Unix timestamp or relative time delta such as "2d" or "3w").} \item{interval}{Summarization interval. Data points at intervals less then this will be grouped. (Relative time delta e.g. "120s" or "1h" or "30d").} } \description{ Show application metrics of a currently deployed application } \note{ This function only works for ShinyApps servers. } rsconnect/man/rpubsUpload.Rd0000644000175000017500000000375014031151455015750 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/rpubs.R \name{rpubsUpload} \alias{rpubsUpload} \title{Upload a file to RPubs} \usage{ rpubsUpload(title, contentFile, originalDoc, id = NULL, properties = list()) } \arguments{ \item{title}{The title of the document.} \item{contentFile}{The path to the content file to upload.} \item{originalDoc}{The document that was rendered to produce the \code{contentFile}. May be \code{NULL} if the document is not known.} \item{id}{If this upload is an update of an existing document then the id parameter should specify the document id to update. Note that the id is provided as an element of the list returned by successful calls to \code{rpubsUpload}.} \item{properties}{A named list containing additional document properties (RPubs doesn't currently expect any additional properties, this parameter is reserved for future use).} } \value{ A named list. If the upload was successful then the list contains a \code{id} element that can be used to subsequently update the document as well as a \code{continueUrl} element that provides a URL that a browser should be opened to in order to complete publishing of the document. If the upload fails then the list contains an \code{error} element which contains an explanation of the error that occurred. } \description{ This function publishes a file to rpubs.com. If the upload succeeds a list that includes an \code{id} and \code{continueUrl} is returned. A browser should be opened to the \code{continueUrl} to complete publishing of the document. If an error occurs then a diagnostic message is returned in the \code{error} element of the list. } \examples{ \dontrun{ # upload a document result <- rpubsUpload("My document title", "Document.html") if (!is.null(result$continueUrl)) browseURL(result$continueUrl) else stop(result$error) # update the same document with a new title updateResult <- rpubsUpload("My updated title", "Document.html", id = result$id) } } rsconnect/man/appDependencies.Rd0000644000175000017500000000453114105013651016532 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/dependencies.R \name{appDependencies} \alias{appDependencies} \title{Detect Application Dependencies} \usage{ appDependencies(appDir = getwd(), appFiles = NULL) } \arguments{ \item{appDir}{Directory containing application. Defaults to current working directory.} \item{appFiles}{The files and directories to bundle and deploy (only if \code{upload = TRUE}). Can be \code{NULL}, in which case all the files in the directory containing the application are bundled, with the exception of any listed in an \code{.rcsignore} file. Takes precedence over \code{appFileManifest} if both are supplied.} } \value{ Returns a data frame listing the package dependencies detected for the application: \tabular{ll}{ \code{package} \tab Name of package \cr \code{version} \tab Version of package\cr } } \description{ Recursively detect all package dependencies for an application. This function parses all .R files in the application directory to determine what packages the application depends on; and for each of those packages what other packages they depend on. } \details{ Dependencies are determined by parsing application source code and looking for calls to \code{library}, \code{require}, \code{::}, and \code{:::}. Recursive dependencies are detected by examining the \code{Depends}, \code{Imports}, and \code{LinkingTo} fields of the packages immediately dependend on by the application. } \note{ Since the \code{Suggests} field is not included when determining recursive dependencies of packages, it's possible that not every package required to run your application will be detected. In this case, you can force a package to be included dependency by inserting call(s) to \code{require} within your source directory. This code need not actually execute, for example you could create a standalone file named \code{dependencies.R} with the following code: \cr \cr \code{require(xts)} \cr \code{require(colorspace)} \cr This will force the \code{xts} and \code{colorspace} packages to be installed along with the rest of your application when it is deployed. } \examples{ \dontrun{ # dependencies for the app in the current working dir appDependencies() # dependencies for an app in another directory appDependencies("~/projects/shiny/app1") } } \seealso{ \link{rsconnectPackages}(Using Packages with rsconnect) } rsconnect/man/figures/0000755000175000017500000000000014031151574014622 5ustar nileshnileshrsconnect/man/figures/logo.png0000644000175000017500000007414314031151574016301 0ustar nileshnilesh‰PNG  IHDRþrLqGsBIT|dˆ pHYsÄÄ•+tEXtSoftwarewww.inkscape.org›î< IDATxœìÝy|TÕý?þ×9÷Î’d²’ö} û""bDÅ~ªU—Öbmk]Új[?þÄúÕ~´­ŸOµhÕVp©¨UÑ*ˆŠ² a•]BØCȾOfæÞóûc&“È„™Ì$¼žN“Ì̹÷ þñ:«uJ ,ÐnY»P(q»>O4ôŸûä“òp×EDDDDDDíK„» ¾y³§ÿRAýPˆò?)„KBüÏkËW<ÆÒˆˆˆˆˆˆ¨1øw"sgÌ'uã-}Îü.Q,„øÑâå+>h·Âˆˆˆˆˆˆ(lü;ù³g'×(ç;.  Ù«Õ¸öŸï}q$TuQø1øwlò¶«§-4¥ø  ´6´7õº3*ñÎeË–¹‚^…ƒuëÌi·˜ÀB!w¾×R5â·K–¯|6µQä`ðï`nž6m¤fSobp°¯­ òM)oxãÕ_ûÚDDDDDD þÄíS§&x– …i¡þ»©µpÉÿZ²råéÐÞ‡ˆˆˆˆˆˆBM†»:·[®¾âiÃR €é…~ÌÞ}!D f1Vœ¼eæôçÁ#DDDDDDGü#Øí³¦]m¼…ä@Û¦¤¦ã¾GCfÏ^(*ÈǧŸÄÁ}{/B¡J)üjé>{1ðÆDDDDDDn þhþUWõ­Ñ<ïhÛè˜üèg÷aü”æ'ûíÚš¿?ó4ÊËJÛRÖqM¨ë-_µ±-‰ˆˆˆˆˆ(<ü#ÈÔ©Sí1Ö—¥ÀÍ * )öR“˜rÅ•¸ýg÷Bʳ7ýøÝáÝ×Ããv·¥Ì¯´J÷œE«W·©÷€ˆˆˆˆˆˆÚƒ„¸eö¿J<ÀhÛÁÃFàž‡ÃÑú“ý\N'^xæ)lݸJ©€î§BýséòUwZ+µ/ÿ0»éêéÓt©^hÛ¤äüìÁßcÀà¡m¾~Þ <÷ÇÇq4÷PàJ`jw-ùøÓem.€ˆˆˆˆˆˆBŠÁ?LnºéòT½BþK—úG°Úl˜ûã»pÙU³‚VϦ¯¿Â+Ïÿª«ªÚÒü©™³_ÿàó=A+ˆˆˆˆˆˆˆ‚‚Á¿-X°@?¸eíB©ä¯ã—§|óïÿõ9×ñ·Õ»K_ÃGï¼Ã0j§>­J¸aÙ²e•!)ŽˆˆˆˆˆˆÆàߎn9ýGJª¿BÁhÛ½ûàGŸ@R—.¡(­§Ó‰Ÿy [6¬ ¼±.¥Ì?.ýhÕ‚ FDDDDDDcðosgÌ'uã-}mŸ€Ÿ?ô0ød¿óvøÐAüýÏÄÉcÇÚÐZ !~´xùŠ‚^µƒÍŸ=;¹F9ßpi mu]ǵ?œ‹koœ‚ʳ拕XúâBÔT×´¥ù·KÌ~kåʶôÑybð 9oæ†÷Ðj)ÆLœ„»ý;X­ÖÐTצiâ­W^ÆÊåïÃ4Û´þÿýÚ¨„—-[æ Q‰DDDDDDÔÿ »uæ´[L`¡ˆ ¤ž™‰{^€ôî™!ªîü•—–báSO`ïî€ ¬­j¤-þxås¡©Žˆˆˆˆˆˆšbð’›§M©ÙÔ€h[‡#?þå¯0æ¢I¡(-$؇…Oÿùy·UPù¦”7¼ñáʯCP5Ààž®¿þz‡­¦t±æ ÀÏS×u\1óZÜ|ç]!ª.ô>}ÿ=,[ü*ÜîÚ€Û vKì÷_zï½À{ˆˆˆˆˆˆ¨UüÏüYÓB=¤,´4, ÷?òìÑÑ¡*¯Ý˜¦‰EÏÿ_­üJ6ÿ_†©Ä›ýÆMºcÁ‚ž•HDDDDDtÁbðoƒÛgM»Úx ɶMIMÇ}<†Ìž½BPYxäcáÓOâ྽7V¨R ¿ZúŸÏ^ ~eDDDDDD.ÿ̿ꪾ5šç]#mkŠÂ-wþ S¦_‚Ê"Ë®­Ùøûÿ>òÒÒ¶4?®kâ¯~°ò›`×EDDDDDt!bðo…©S§Ú3b¬/K›” ¤­Ô$¦\q%nÿÙ½2 ¦ÞÇïþ ï¾¾·»-Í¿Ò*Ýs­^ݦÞ""""""òbð?‡[f_ñk¡Äãì¶Ž‚ü¼6´ÅÐ<·/ùà‹åA/Œˆˆˆˆˆ¨¸ ƒÿüÙ³“«•s±P˜Øg ë:®½q.®ýáÜP•×®¾øâ ÄÇÇŸó}¡ þuÖ|±Kþþ<œ5Õmi¾Ãí³ßZ¹òX°ë""""""êÈ.¸à?oÖôÇõ[Í´Ÿ3qîþõï`µZCS\¬[·º®·¸¾¿ŽR ¥¥¥!þ€wO·^y+—ÿ¦iÔV)(¼_•pã²eË\!*‘ˆˆˆˆˆ¨C¹`‚ÿ­3§Ý¢ˆ ¤ž™‰{^€ô).ŒrssqìØ±³Ùçt:áp80bĈv««¼´ Ÿz{wïT`mP#•xhñÇ+Ÿ MuDDDDDDG§þ7O›6R³©718жG,î¸ç~Œ›49¥EÓ4±jÕ*ÄÆÆ¶8“Á0 ”••á’K.Ýno÷ú؇…Oÿ±MëÿT¾)å o|¸òë”FDDDDDÔ!tÚà?̘èêô¤¥˜ƒOMÓ0mÖÜ|ç]!ª.2(¥°k×.ÔÔÔ ªª š¦Án·CÓ4˜¦ §Ó‰ÚÚZŒ=IIIa­õÓ÷ßòůÂí® ¸­Øh·Ä~ÿ¥÷ÞkËîDDDDDDZ§ þófMB=K@ 0xèÜÿÈc°Ÿåx»ÎÀívcË–-ˆÇ Aƒ`š&Ž9‚'NÀétÂjµ"55}úô‰˜= LÓÄ¢çÿНV~ ¥œÿa(aþséòUwló"""""¢¬SÿÛgM»ÚPX”@Û¦¤¦ã¾GCfÏ^!¨,²TWW#;;}úôAFFF¸Ë XA~>^øó“8¸ooઠÔýK>Zõrð+#"""""Š<"øÏ¿êª¾5šç]ï>g³Û1wþݘ:íªTyŠ‹‹±sçNdee…}úþùÚ¹5/=ó4ÊËJÛÒüð8¯[üéšÁ®‹ˆˆˆˆˆ(’tèà?uêT{FŒõe!ÕÍP´•šÄ”+®Äí?»RÔ´Ã:vì:„±cÇžuÿŽæãwÿ…÷–.†ÛãnKó¯´J÷œE«W·©÷€ˆˆˆˆˆ(ÒuØàËì+~-•x\o5ßoÐ`üòáG‘бG¼qàÀ”””`ôèѰXÛú #p9xá™§°uãú6¬ÿ‡G õÊÒå«:÷nŽDDDDDtAêpÁK‹¼8=.>¿|øQ <4ø…E(Ã0°mÛ6X­V >Bt¸?y@òóNà¹?>Ž£¹‡o,P"”9ñGŸ¿üʈˆˆˆˆˆÂ£Ã¤ÀyÓ§w…U½­€K-Úf³áÆý—_}MHj‹TN§ÙÙÙHOOGß¾}Ã]N»Ú¸æK¼ºðYÔTUµ¥ù!MØg.Z¾|_°ë""""""joü,X ܲv¡PòN@´_‰Ñ/ÂÏ|º®‡ªÄˆT^^ŽmÛ¶aРAHMM w9aóîÒ×°|Ù[0M#À–J)ˆOk£nX¶lYeHŠ#"""""jüo›uå&Ìg8j(€½úàGŸ@R—.¡).‚:u û÷ïÇèÑ£îr®²²/üé)|»us[š»Ô“K?ZõX°ë""""""jüo›yÙSèoèhÛ¸øüü7¿Çà#ƒ^Wq¹GókPYíA•Ó@e¸1v ±Ñ:z¥G!6:¼3 rssqòäIŒ;6›-¬µDšÃà¹ÿyùymh-Š¡yn_òÁ˃^QETðŸ?{vrµr. 3 «M×u\{ã\\ûùA©¥¼Êƒµ;KðÙ7§°iO å¹Ð%ÞŠô.v$8tÄÇZ¥¡²Æ@Y¥¥•nœ.q¡¤Â‰Þi6Lž„iÒ0qh¢lZPj:¥víÚ—Ë…‘#GBÓBÏŽjÍ+±äïÏÃYSÝ–æ;Ü.1û­•+»."""""¢Pˆ˜à?oÖôÇ•R¿ ™ Œžx1îþõï`µZÏ«†*§÷¿:…Eƺo+Úņ+'¤`d¿8dõ‹ELÔ¹ÃtÓÄ®CØ~°+¿)D^‘—ŽÇ³{᪉]aµ´MA«¸ÝnlÙ²ñññ4hP§ß¹?LÓÄ¢çÿН>[ešµU ï×F%ܸlÙ2WˆJ$""""" а'Ĺ³¯¼Yƒñ¼R">v@zf&îýݤgfžW ' øÓÒƒx퓨q)\œ•„k&wÅøÁ ç‘Ó•¶(LJkòñÕöbÄFIÜ}]&îýa_$ÆZΫæ:ÕÕÕÈÎÎFŸ>}‘𠇼òÒR,|ê ìݽPµ@µ‚|pÉG+†¦:"""""¢ó¶àÿÃë.`uË·Œ´mŒÃÝóÆMš|^5–ºðß/îÁëŸåÃíQÈèjÇ/¯ï…‘ýãÎëº-É9Qg—ÆÞÕˆ± ütN&~û@ÄØÛ>%¿¸¸;wîDVV’’’‚Xí…g÷Îíxùÿ„â‚€Û*¨|iѰøßŸ® AiDDDDDDç¥Ýƒÿü1c¢«Ó“– `N ÷×4 ÓfÍÁÍwÞu^5(,ùä(~³p?ʪ hR`î•ÝpÝ¥iеÀ>À(±R ¯/À+ƒÇPHIÐðä]ƒ0ïªÀg,;v ‡Âرcp{jÙ'ᅢw¿·»6à¶B`£ÛaÎyóÍÏóCPQ›´kðŸ7kúãê!(6Ï]ƒ‡ŽÀý<{tôyÕp²Ð‰Ù‚M{+v«ÄoæöAV¿àòŸÉöåøË›‡àty×–_sqþñûш‹iÝö@II F ‹%8K¨žýÿÊO¡éÙC óŸK—¯º@`›…@»ÿ[®¹r†0ÌÅH ´mJj:îûïG‘Ù+à“ýšYñMn{|;J+ €Õ"ñàÜ>Ø£ýGÌsNTã©¥‡PSë­%3Å‚·Ÿ‡QÎÜa¶mÛ«ÕŠáÇs¿+ÈÏÇ ~÷í ¼±B„ºÉG«^~eDDDDDD­Òä8oöìÞPΣ ëømv;æÎ¿S§]”Z}|?ÿË Æ`<;“†%œµ]À¾Øq°{÷°ÿv«Àë Fbæ¤Ôfïu:ÈÎÎFzz:úöíº¢¨™[³ñÒ3O£¼¬´-Í óºÅŸ®Ù캈ˆˆˆˆˆZ#$ÁêÔ©öŒëËBª›¡оø6{F_| ®¿åv$''¥ž?¼²O.ÎmôÜÈþqøÉ5çw@Kí(x㳓Xÿm‰ÿgMÏÿj0n›ÙÓÿ\yy9¶mÛ†Aƒ!5µy§—ÇãAyy9ÊÊÊPQQÊÊJ8Nä9„5+þƒêªÊ¶\ö+­Ò=gÑêÕmê= """""j« ÿy×Lû•0ñÿ`´m¿Aƒñˇ ±wï^!0dÈÄŵ}ýýã¯îǯ5ýR <4·’¬m¾n°TT{ðäâ¸ÜõS„þþë!¸mfœ>}{öìÁ¨Q£Љ‡Ô N§eeeþ_UU¥âãã ‡ÃÄÄDX­Þ+.§/<ó¶n\øú¥Üþ¶äãUÿ7!"""""jYЂÿÜY3.—0ø0ù¸øÜûð£è?xh£ç ±wï^DGGcðàÁˆpc¿|x¿x¦ùúìa}bqóônB;•¿µÞÿú6ï-kôœ® Ùý’Ë1vìXØl¶0U×9˜¦‰ªª*È/++CMM ¢¢¢ïú±±±òÜ“TòóNà¹?>Ž£¹‡/F¡Dsþâ>§ ¿ Q@Î;øÏ›>½+¬êm\èÅl6n¸}>¦Íš}Ö÷åååáÀHLLÄÀ[‚?Ï.ÄìßdÃl!Øÿà²4 é`µ^ïò~n‡NÖàõ'š=eÖþý" íÑþ@¸ÝnTTTø~yy9 ÀÃáhòíHjÉú¯¾ÄâçÿŠêêê6´V{5õýEË—ï;ïBˆˆˆˆˆˆÎà|‚¿¼eö/%ïT@ëø…=q~þàÃÐõÖa§”±cÇ““ƒ´´4ôïßÿŒmO—¸0úö¯PXf´øúÝ×õhõÑyÁp®¾—ÇÄ_ß>Üâûúv³bó+—"Ú®…¦¸L)…ÊÊJTVVúƒ~ee%t]Gll¬?äÇÇÇCÓBûù½»ô5,_öL³åsg¦”‚ø´6*á†eË–µió"""""¢³iSð¿mÖ•w˜0Ÿàôn=zõÁý<Ž.)ŸìÀ{¤ÝáÇqôèQôèѽ{÷n45[)àŠ{ÖaÝ®Š–KÀ/¯ïÕ¦{7ºÉ™´ñˆ½—>8æ?Ú¯©[¦§â¿Õ¦ëvuî5 ùN§Ó¿¿.è;ްsXYYŽþôvm͆BÀ3C\ êÉ¥­z,µÑ…+ „tÛÌËÆ˜B@Ÿ@o‡»îÿ FŽ›hÓ¹Ýnäææ"//½{÷Fff&„Xôñ1üôO»ÏØÎ¢ üxö™wóW¦j1´ !üŸ–¨ þ ?=ßSJå}A)Õꎀ7VžDEµ§Åׄ>ùË8LÝ¥U×êèÝp/Ò>xÏýÏ(ÈÏkCkQ,•yëk¯ú8è…Ñ©U©ôúë/J²Õ8– …u躎kn¸snº¥mžƒËåBNN е[\vÿ”T˜gmsëUÝ!e ¿†RÖ'•5nä9átz 4ï/l±hˆ±K8¢uÄFkpØ58¢uÔÔ8UâĉÓNÔº dýǤ¼ÊÄYÇ€ßüìd£ý›êÛÍŠí‹/ƒEÏhv(4Ýp¯¢¢ÕÕÕ°ÛímÚp/Ò¬YµK^\§³¦-Íw¸]bö[+W v]DDDDDta9gŠœ7kúãJ©ß €Å  5÷üîØíŸì°ššüô›ñ¯¯Ï½ÉÚUSkiü¤RPJá¡y}1¸—wã?a¢¦Ö€Í¢Áj9wðt{LìÛœ‡%+ŽBI ºw´_ (ßCAÞZv"{_ÙY¯ ]5|ûòVuB„K$m¸IÊKK±ð©'°w÷޳OýhªäƒK>Z±04ÕQgÖ,øßü_ÓúkµX`D ‹q8ð£{À¸I“ƒR\ ~ÿÂ<󯣭zo|ŒŽ‹³B H) „‚€‰Ø( k‚Ž”x É VÌ™ÒñïZòåks‘WX…¢2'j\¸Ü&€x‡z$âÒQÝÑ%¾~vÃ[òðü‡¹Â)5@I((¥`ÊÛ`*|³»Ee­ÐýÛýƒpçµ½úlBåLîEGG7 ùáÜp/ÒìÞ¹/ÿïŸP\Xp[•/-úÿûÓµ!(ˆˆˆˆˆ:)›?fLtuzÒRÌA€›þiš†i³æàæ;ï z­Që6ÑcÎ*”Uµ~*õÈñHN°Bʺð˜Ê„P˜¦ ¦á†2]øÛ£w7ï €;ÿù%NHM‡Ò·áŸð/°è?ž93'õòßç¯îÀ–ƒ•šRX|#ÿ€ixGÇË+ÜØ¼· ¦ažóØ?aÅ봧 ì ‚Öl¸—›ÍÖîµuDŸ¼ÿÞ]².Wà3ø…ÀF·Ãœó曟Ÿ{}]ðt˜7ëò@`©Mƒ‡ŽÀ½?ŠhG`'ûÓÖŸ(ôKM çdb:4MBð.¨BB ”D³ÝýM˜B4+¤¦Búƒ? PkøÛûûš±ƒºfLLÇÆ}» •€Ð¥wÔ_yGý CỼjhº„ôÎ0ÏžþwagN²úÆú1µÊ¹6Ü‹Err2:ä†{‘âª9?ÀåW_ƒWžû?løêsï ­¤&êÚ‰[f_ñÏ¥ËWÝ °Íˆˆˆˆˆè‚¢Ï›5­@—@OOëÞ÷üödö ÿfs‹>:Üê÷J]@Ó$\pèT zu‹†4 ïÈ? ÒwtŸ”¨·¦”04R·ºм»ú+(@† À…}uÄüGöK†Ëã†:¤Ç{mezGû:áô(H‹¤‚&L0³ÿ5^]~ÿ{_À+1š9׆{ÉÉÉèÝ»w§Ûp/RX­VüôW⺛çâÙ'þ€ãGrXþ¯4¡Äüy³¦Ý˜`è™Ï}òIyK%""""¢LÐáð6»sï¼ S¯œ¢’Së6±zû¹7ƃ€wt_Ð4©K”Õ8QT‹ôd¤’¾¬/ ¤æÝ€­É‚ShPš€¡YÍ©iP¾µëÊTPÒ%$öŸ¬?¾Íj‘ˆ‰’(¯5 a»½¿ÄéJ*=º„7ô H¡˜g ÿ­+ÀÿÞ×úϨ5îõèÑã‚Ûp/R¤¦wÇ{;·fã¥gžFyYi Í㪣j0øQ‹Z}DŸ”ß›9·ÜywDMñÞ¸«µîsŒ“6 ýº„Ô4]@jÞð¯J\èšh…&¤wö¾„Ô  Ó{Ÿ Rh05 %%„ïu¥)À´BiÕ¦R¾NC)¸ Rš&PTéFiÑh¤_ ÞùgÿÇ <8š_ƒ©QÍ^k͆{éééÜp/e‹¿-}o/~ŸüûO¸K"""""¢N Á_ ß AøåÃ"!!)ôhÕ¦Sç|O£Ðï›êßpä¿Æ£pªÜ¤X ¬VßÈ¿¼çüÕ_Ç` À#Ý»8¢n)€R0… SH¤%ÅøC­Û@qe- GÁm*”׸átšîÝ÷‡~ßH?„7ôŸ+ü™]€^Þõ¬î%''£_¿~Üp¯ƒ¹áÖaÎ 7ã…gžÂÖëZµé#Ñ™œ5øÇÅ'à¾ÿ~ ý n¯zöÍîâ³¾.uÑ8ôëÒøýá_“0!P\m Úb¢$êÃf.Ãú!¼B6è0½ï5pyV²¿ÍŽCŨU€Ë­à2 ˜Ð Y„o_À&¡²Ñˆ¿:Køÿð˽èŸxœîuRV»÷þþQ;|ùÃ#(.üø?""""""àÁÿÒ+¯ŠèÐO:ÏøšÔ|£ûšð_ú5ÝþLû—š€@¹Ë„® X›dh%êvö‡oоw!€RÞ”21,# ·\ÒÍßæ_krQã”& u JùúêBƒ°Hxwÿ«û*¼×o²Ûqu&Mš¤O‘"Uf¯>˜yÝ XòÒÂp—BDDDDDT«×øG¢Z·‰SE-¯ƒRÔ~Ðoúýß?ò_×àÍÝ.…FÓ¬=Œº°¡”oÄ_ÁaøÁèTÜrQ*¬º·Ç`Ãþ¬ØyÒj4 u(!¡Œºà_?½_ Iø‡é;öOB)F“àŸs²6Ø'uB:øŸ(pâLÇÞׇøú@ïíoú›ü{Þü²Ñÿ+GuCi*†øt]C÷Dú§DaD¦º¬óžc¥xhI64‹B³º”’0¥ð¯ïêC¿BýHÃЯ”€2›«®= IDATE£)ÿeLSAJnÐGDDDDDDgÖ¡ƒEuË£ýRu#þ ¼¬[߯5ýþÀ_÷ºôí±†ßÿüÊç¬Ém˜X¶ñþöé~Ô€Åft+ ­PР”€0|g4ØÈ¯Qè‡ð@™ÂüNùW ¨¬1Ó¡ÿ„DDDDDDb:5VVÍžõ¡_²á¨ÿFþõÏiÒüÐÊ#ïL¥ðÊWñaö1œ*sBHz”BzC?„J ˜ßÿG÷)˜ à üÊôö› ~6Où¯¬ñ0øÑYuèÔèt™ÍžR@4 úM§ü7ùþЯéõïRA ñî~¾ñ *]š!$¬ºÄÿü`$⣭B ÖíAAU t›B·AH›wš¿ÐašÊ—ïa¨úéý¾ üÐpZ¿ò†|ÿH¿) 4ïè¿÷:Þð_SÛü÷'""""""j¨CŸýmoR¾¨Ÿæ/|Ù¬ ià—ÍûÓ…ï! ø.ªÂw…•È)ªAN‰û «ñŸï÷¿>ÿ{1 {"t›»–è(è64‹Ý¢AZ4ÿµël¾Aýl…{H߆… ÖôÇØµPÄDDDDDDÔÁuèàïˆjݬ0MRvè¾›°3 ¥¥¥¨¬¨@Me1ÜîZ(SÁbµÂ€Ø¸x$$$Àb±„»T"""""¢6éÐÁdFãp~™ÄßÿÞ‡-Œš7 ÿ ;üá€&Çùi šÐ-Þ‡Ðu@)(]@H/mÏð´XÄÛ-è‘…[F¥âÕmPB‡Ò¤ÿ¸>xë¨Ûµßð„ôv\˜u3š>žh`íÚµPJ!>>ÞÿHHH`gÀ9†¼“'qüð>8kª å#V@,Jaµ²À©8¥e`'š% Ý{@÷Œ°Z­aþ ˆˆˆˆˆˆZ¯Ãÿ‰Ã“°rKY³ÿú Ü ÀßÐøõæ£ÿÞà/„l¸Äßû|ëÿ-R“R@RÚá¬1ñmÇñ«‹z~Õ ›—cw¡BjÞù}#úuÇókt¿iG†×\6S¦tƒÛíFEEÊÊÊpôèQìÚµ‹g`š&rsöãèáïÐUÀ`¹kñ9Z} XÓ“‡†b}Nº¦õ@ÿAÃ9 €ˆˆˆˆˆ:„ü§OÃã¯nŒå–FÍϼvÞ;úï þ@£Íý„hÂÛ1 éÒ"!„€Ò„@ر© ë•`Rf"„˜Ò ?ÿ`?œ¦Béþéü¦P:Z üM‡Ë.°X,HJJBRR’¿ÎÖtÄÇÇCÓ.œÍ‹‹‹ðí¶èª¾Å$Ë&è¨ ¨}”¬D_ù zc3ŽåúS'0`ÈHtëž¢Š‰ˆˆˆˆˆ‚£ÃÿÑã-PãñÍÊM¾Ö×´c …‡€Ê»å¡T£{IáëÐ}Á_÷ÞCABšº÷ý¦‰ì<…¡)ÄÛ-H‹µã¶Q©øû¦SP4o-þ ¯šÏVh0kÁû{Ô×!Ð7Ý‚.ñgmn©3Àãñ ¼¼ÜßP^^~Át:¸ÇíÄHýC8´’óº–„‰žúN¤©ïðížb ưãûHDDDDDI:|ðפÀŒq‰xci³ì-o1L7~Núÿ”^¤ÅêÞ˜ˆopdÞ•ýSP­t«ÒjÁi—ÂŽr7¤¦JB ”2á4xã6_`n0E¿Á÷ ƒsó€íû `F¿XŒH‹nñ>swoôó–âjì¬pB %5hPV LÓŽo ªê§ü¸qd·úvÇÊñù¾"ïî}Í‚}ýž‚õµõó®ì”Ï­³wìß»ÎüMeù¨ÙìàP ­FNU ¶n–3þŽüQÄéÁÿÒQI蚨¡¸JÕýº$áKÕ:DÝ÷uÁ0€€¨L@¹!„„Ô4˜BBS:tÄi³á;ê§ü7j¦”Ç ïÇß`Ô¿agüyß÷½÷Ŭž6ôJ‹j}jMg@YYLÓ„Ãáðw$%%EÔfw'ŽEÉñíkùOˆB½¾ú7ØSáÀþ=q4tdHïEDDDDD¨Nü¥øÙµ™øom¼ŸÔ¼Á›ë‚>Ь“@àŸÙùˆµ*@y àñn¦'LïÆ~º7àk šUG”Ф÷ø?H@»IŸÔ5hV+ª]n<üe„ ÛÓPP&PV£ ”Ù¸wB¨klÚ‰qßõ ÖÇÖjgê ¨ªªBEE ‘““§Ó‰ØØXg@bbbX޾«®®Æw{¶b‚åozÿÙ ÖWcÓÉt¦vGrrJ»Ü“ˆˆˆˆˆ¨5:Eð€Ÿ^ÛÏ}p Uîµ0+;§Äå üð@ B*h¾Íü4‹„fÑ [5è6»–h+„Ô!a˜¾c¥¯ƒÀjC~µǪ]p׸`¸   !-P€j)á·¬GІ™¥𠆎®ëþ€Ÿ‘‘À;“¡²²eeeaí Ø½c3j«`ÎÞ§!Cµ°cg<&OÁõþDDDDD1:Mð¶køé¬ üåß'üÏ©fßœù{ß©ywî—š÷Ø> ¾À/ éšUBÓ%t«Íjº÷ì?Sø.)¼×’¤n´(è6¥,ÒxLC¦„i6 þæ™ëôùíõ½!#x ¹±±±ˆ ¨3 !!6›-(5è<‚®–Ü \/YŠ.ž=8vt zöêÛî÷'"""""jI§ þpßõ}ñöWù8YazŸPÞÿSPðýÏû´jô²ÿgé=ZOסi€´x§÷×öKè ©KH]@hJh¦„aÊTÞ‡ šfi‘ÐLJФ ¸M(÷ÞB((¥Z ýþúdõ°âºÉÝÐÑ´wg@Îþíè'¿ö¯Ñj½µo°9g0zôìÃþˆˆˆˆˆ("tªào³H<ýÓA¸åé=õá¾á°¿ò…lÔ‡mßÞ°®@zûkÒ{Äž&|A_BjB“šwW@¥”áÒ­LÃLSy×ò×]WH@*Mƒ0„iB¦÷9£~­¿R ÚøÊ­ëÐüeþt–ªÎ€ÚÚZTW” Ñš×^¿J36QX䡨¨ÉÉÉa«ƒˆˆˆˆˆ¨N§ þpù¨dÌž€ÿl-¯Ò ¾ªï P¦òy@ (ÓûJzŸ7½ÓhÞ÷zGì½Áß4L‚i˜0 Ó„ÿzõºµß &ѨÂûþºY ÞÚîš‘‚Á=aø4ÛOk;jkk&а3 ïä ¤‹]áü5éj+òŽ cð'""""¢ˆÐé‚?üßÝC±ë·ßàD™jîQ®ÍU7Ú®`*iÖw˜ fý¦‚2„wñ€ª;~¯>´›FƒÐïÿê{(ß UßQÐèѰBÕ×6"ÓŠ_ÿW¿0¢áHg@TTj« ‘¥µÿÚþ¦ºè'q ¨0Üeè¤Á?Ú¦áŸdáÚ?ì€Û¢U‹ÓT¦w„_€)„é†/¤‚&„LP¦wô_zwá¢ÁŒSÕ‡~OƒÐo*(ß׺GÓÐ߸#À[oBðò/³ ÉN2Ç?ÎÖ°iýˆµ…?pkpC¢ºÞ)ÿ#""""¢¤Óž968ÓÞ7šh)X7~Ô­Ë7~ß`ÔÞ0¼Sø ·éx꾺ÌFÏ{ †§é¨¿ ex;Ý·ÁÌSÕÏ@°ëÀ¢_Erœ%ÜeÄB ::º4!Z:! ² •••á.ƒˆˆˆˆˆ¨ó¸dhžºµwо‰ú]· _ÝF|uaÜ÷½?¬{|ÞcÂð=<-…· Ãåûêiøð¶5=¾Î£q'ƒ¿ó¡ÉÏ¡ðÒ]0´“¯ë&—Ë›¬ w~U—Ëî2ˆˆˆˆˆˆ:çTÿ†þëâ4ÔT•áÉJýaß»Ž_xƒ¾ôqÿ´~)áýuSü•€2%”ï)S*ïŽÿ Ð`c¾&3Œ&›ý5]÷ß`–A]çƒ]3ñ·;ûc€„ð~pŒaÐà w~ºoª?Q¸uê8uêzÇâùŸô…Mªëð›Lñ÷=W?Âßp¤_y¿Öè7áw5žP7Õßt+˜îÆ#ÿþMÿ¯†8‹ÂÒ_ ÁD†þ€I)aDÐ?gSX¡iZ¸Ë """""êÜ#þ………Ø¿?&Nœ›Í†?ƒ»_Ú‹ã ÂðŽî Q?Ú!}[ø×oæçÉ÷nègjÒ¾Ýü}_}êŽá3ýË .0ýkþf#ÿ&LSapW ÏÞ1 ]¹¦¿M, ܦˆ¬íF47ö#""""¢ˆ9C¤AVZZŠ]»vaüøñþsÞû¤EáƒßÄÌáŽÆ#ÿMÖã×ýÜhßS¿žßs† þ(¥°eˤ¥¥!333¨×ÎH´âúñ©¸~|ªÿ9—G¡Úmâó¯Öaä˜ñ°[$bí¢,-¼AÚétbÿŽm(:yñ9»»–Š2Xj«¡¤„Ûƒê.é88h4v¤õ@¿!CÑ£wŸ°u4¾_SSƒ.]º %%C† iSxÎÈì5 ZmF´( AÕgæQäš“0qÀ°v½/ÑÙtøà¿sçN$$$ OŸ>ír?«.`Õ5$Ù ôM‰œ©û'ŽÅþmÙHÝøæ| áÝrÐO¬Uå°V•#áè~xlQÈwŽ ±S.Ettt»Ôèôý@I)1xø8ìÙYŒ1Ú[íºyâwÆdöÈÝü‰ˆˆˆˆ(¢tèà¿{÷nhš†„»”°Ú·s; ¾Ý†þŸ,…ær¶ª^[ƒîk—£2g'6º]=y ƒ^[ÃéûÅÅŰÛíHIIA¿~ýZµc[tíÚùɃ[túhBr¦N{z£Ü:Cû j—ûµV‡ þû÷ï‡ËåÂÈ‘#Ã]JX9”ƒ¢í›Ñç?‹!L3àö޼#èõÁ?°ÀEWL?ïQwÓ4Q\\Œ‚‚Âãñ K—.HMMŰaà ¥<¯ë·ÖЬ1ظ®vW ºi¡Ýå¿ÌèŠb&Œ¿$âöM """""êÁÿðáÃ(--Ÿqã´LÓl·{6eeeÈÝ–¾Ÿ¾Þ¦Ð_Ç^^Œn«–a‹ÍŽ‹§Mø3=ÓôýÞ½{‡mÚ»”ã&NÅÆµ”!Ñ]Û’û”ݰ˜±Må"""""ŠH.øŸ8q'NœÀĉþ À¦ia¹wC»³7¡û—ïAó¸ÏûZqy¹(ËÙã!³gϳ¾·¶¶Ö?ª_TT„¨¨¨Oßo ‹Å‚‰“/Çæ:ª\)语@Û;Hš:æŽ#b Æ_<µÝöH """"" T‡ þùùù8tè&NœÖà Á¿¨¨êÄÄœ>´k¦m\ƒ=4 þ†a ¤¤Äô•RHNNF·nÝÚuú~[X,\4ùrìÛ„ '{`˜þ)âdÁy]³ÚŒÅ^ãJȸ¾¸xÌ$ÝGDDDDD­Ã$–’’ìß¿&L€Åb k-‘üOææ qǺ ^ÓRS [Q>JJJ ¥ôO߯®®F||pñ¥W¢  9{£º¢Éòº ­Q¢hp b­ŠB•™„"ÕEj`C¯C1¼[7ñ#""""¢#âƒUU¶nÝŠÑ£GGÌ:êpø›¦ ávAamSQŧ…q'ýÚ‘"%%))߃ËåBaa! OCny)œµn(åÝ@‹EGl|,S2ѳk×ó>ñ€ˆˆˆˆˆ(":ø;Ndgg#++ qqqá.Ç/ÜÁßétÂR[’k[j*át:CríHcµZÑ­[7tëÖ-Ü¥…LÄîÊær¹°iÓ& 2IIIá.§Ã0º¡R 0\[šNw'"""""¢Ž-"ƒ¿aÈÎÎF¿~ý’’îrš ÷ˆ¿ÍfƒÇ’k»£ca·ñ…X»¥6­ÿÑ5;ÑSl‡ÀñÑoôÅä©3 ëíÖÿ‘ü…éeø6ÆÜ”îè¶úß°—·¦!JzÁ©‹®BÖE#¥k×F/'$$`Ò¤I8qâÖ­[‡^½z¡W¯^fVyµKâÎÍÙØš-¨¯ö?7D~]¸pâèô0¤=ÊšH þ€7ügÓ=zborlÇ"aO6bO†0ŒFïuG9PÞs І_„øî™˜4j ¢¢¢ÎxÝŒŒ ¤¦¦âÀX·n† †„„„öøµˆˆˆˆˆˆ(Ú%øŸ>yôìfÏ÷Ô¶b[ÞHÿ éššŠ”+¯BAAò†Å‰¢BÃÝå„’:<+ Ã@Ïþ0¶Wo8ŽV]×b±`èС(++î]»8ýŸˆˆˆˆˆ¨i—ào˜&4xš=¯ L£ãí©ÁðŽÒwíÚ]}S÷•R¨­­…¦i°X,غu+R32[úŠçô"""""¢¦]vÔKJNE¾Ñ¿ÙóùF_$vIn‚*’ƒSBØívX,Þð^VVv^×ËÈÈh´ûIII°Ê%"""""¢ k—àßoàp—à”1 JyCŽy) Ù%UG þMoð¯S7ýøðáØ»w/¶oß—Ë„ ‰ˆˆˆˆˆ(˜Úeª¿ÅbÁÄÉW`ï· ø®´ÊTˆŠŽUØ;ÜŽþ`šf‡:~°¡øøxìÝ»7¨×›4iŽ?Žõë×£gÏžœþODDDDDAÚ-uÛl6Œ{q£çöïßo¿ý#FŒh¯2.x‹'è wÿ_»v-† †ÄÄÄ ]ŸˆˆˆˆˆˆÚ&¬ÃÖ„a8|øp8˸àÄÆÆ¢²²2è×­›þŸ••åŸþ_[[ôûtTµµµX½z5}ôQ¬X±"ÜåÑ"ìóì³²²°aÃ8$'w¼þ:¢ºuþqqq!»~Ýôÿ 6\ÐÓÿ=Н¿þkÖ¬ÁêÕ«ý.ýúõ seDDDDDt¡{ð×ucÇŽÅ7ß|ƒñãÇ#:::Ü%•RªÃØøøxœ>}™™™!½OÓéÿC‡ERRRHïI¾÷½ïaÿþýá.ƒˆˆˆˆˆ.p±C]TT²²² ÇîrΪ#ïè_'X;û·FÝôÿ#F`ß¾}ÔôÿC‡…»"""""¢Èþ””„=z`ûöíPJ…»œ3ê Áßf³¡¶¶¶]?縸8Lš4 ÉÉÉØ°arss#úïLDDDDDÔYDLð€^½zÁf³áÀá.åŒ:CðB·Áß¹dddà’K.ÛíÆš5kPXXØî5]H"*øÀ°aÃP\\Œ“'O***púôiÔÔÔ„ä~(..FEEÅ9ßHðw:(((@uuõù–Ùfn·………p»ÝžåtǃÂÂB¸\®_×4  ÀèÑ£‘““ƒÍ›7ô÷UJ¡°°°U¯`¨¨¨@~~>ÊÊÊš}ŽDDDDDD‘®M›û½ñÆg<‚oРAøþ÷¿¨©©Á’%KðÉ'Ÿ 77†a ++ ¯¿þz‹m].¾üòK¬X±7nÄÉ“'­¨¨($%%aàÀ=z4F…)S¦´úë=-Zäï€ijĈ˜9s¦ÿç/¿üo¾ù&²³³QPPÓ4iii¸ì²ËpçwbРA®áp80aÂäççã›o¾A·nÝЯ_¿fOǃO>ù«V­ÂÚµkQPPÃ0x7‡ÌÈÈÀäÉ“1mÚ4\~ùåçµùâñãÇñÙgŸaýúõÈÎÎFqqq£}'¤”HKKÃðáÃ1mÚ4|ÿû߇Íf<ÿüó(--õ¿·î3hɧŸ~ŠcÇŽ5z.==wÜqG›k'"""""j‰˜7kÚZϾá&\?¯y¹ñƱfÍšÛÌœ9/½ô:„yóæ5ë èÒ¥ vîÜÙè9¥Þ|óM<óÌ3ÈËË èØ"y¨ñ IDAT»wï9¥3 ï¼ó.\ˆœœœV_;66ûöíkô\qq1Ž?ެ¬,ÞÑà—^z ¯¾ú*JJJZ}íøøxüøÇ?Æ]wÝÕª€)S¦œ±öŸüä'X°`N:…_üâذaÃY¯¥ë:zè!Œ5 ]tÑß7sæLlß¾½Å×nºé&üùÏFQQî½÷^|ùå—g½§¦ixàpß}÷µøºaÈÉÉA^^† ‚””À|€§žz GŽ9ëõë >=ö&L˜Ðª÷×ÉÉÉÁ³Ï>‹÷ß?  &Ÿ|òIÜvÛm€I“&µºÎ–Œ9üq³ç?[þ–¼´ðŒí¬V£×?ßû¢í7&""""¢N-$Çù•••áæ›on6¢Ù—Ë…{ïýÿÛ»ÓÀ¨Ê³ÿã¿3™Lf²/,²„]$`e‰(`+ˆ²(‹´}DEi©U\úX+R«U -UÿêS[m‘ªÕ*‹ÅâV•€,¢€aK @HÈ6“ÉÌù¿ð!˜Ì$'™ÉßÏ+2ç\÷}eÈ›ëœû¾î´páÂp¤¢'Nè¾ûîÓ矒ñ|>_åé;vè®»îªS±WXX¨çŸ^‹-Òk¯½¦®]»Ö+¯ãÇkìØ±:räH÷VTTèÉ'ŸÔwÜ¡Ôù yaa¡ÆW«îõ>ŸOÏ=÷œœN§î¹çž*×Ï,ÿo×®¶oß®ììlÍŸ?_ï¼óŽ¥œ¾úê+?^Ï=÷œÆ_«˜ùóçë·¿ýísÚ€ KXöø¿ôÒKµ*ú%é‰'ž[Ñ¿ÿ~92dE¿ô{ü׬Y£1cÆÔë ¯$íÝ»W£FÒŽ;ê•Ó/~ñ‹Zýg›?~ó÷ûýzà,Y÷ÜsÏ3&&FýúõÓ³Ï>k¹è?£¢¢BS¦LÑÒ¥Kk¼wúôéz衇(úœ·B^øçççë7Þ¨Õ½›7oÖܹsk¼/22R‡ÃR………úéOjyë@M|>Ÿ>¬É“'‡¬X,**ÒwÜQç÷ ,ÐÚµk-Ç•––Öêû¯Î‡~¨eË–YŽs»Ý5Îù»ßýN_~ùeÀë†a(.)FÎ言÷˜¦©)S¦(777à=¯¾úª^}õÕš“€f,äKýkÚ_~¶·Þz+൨¨(=òÈ#;v¬Z¶l©uëÖ)55UGÕÚµkµhÑ¢ ÇþM:µVûùSSSÕ»wo%%%©¼¼\ÔæÍ›õg–ÉŸ>}:è¸mÛ¶ÕW\¡¸¸8>}Z_|ñEÐ"ôðáÚ6mšfÎ ¼—;³vïÞ]—_~¹ü~¿6lØPãw°téR=þøãõš³sçκòÊ+e³Ù”™™Y¥/Âw-\¸P=öXÀ|fÏž0¶÷UÝuý„«”ÔêÛ¾ßìÏÓ®Öþ¬ª« 4kÖ,ýþ÷¿¯rmóæÍš1cFÐ<¥oÿÓÓÓ•šš*‡Ã¡üü|mÞ¼¹Ú¦‡qqqJHH¨ü9Ø© .—«Ê옘˜ó«Â²ÇÿŒ¤¤$9R;v”ÇãѾ}ûÎi—••0öá‡ÖäÉ“+NOO×_|¡þýûkÀ€zðÁõÉ'ŸT»`ëÖ­ú裂æÖ·o_M›6Mýû÷¯r­¨¨HóçÏ×믿^åÚÊ•+µwïÞ€ã:N=ýôӺ馛ÎÙ;ï÷û5oÞ<=ñÄ„[¸p¡î¿ÿþ*Ýïk#""BO>ù¤n¿ýöÊyý~¿þüç?ëùçŸwàÀ¹Ýn9NËs†¡'žxBwÝuWeßÓ4õÊ+¯èøCÀ¸Ã‡ëäÉ“JII9çsÓ4ƒæzåÐÞúá=ƒÏù^Ûvn©Ÿ?>N™:O'ŽT‰ù׿þ¥©S§*..îœÏŸ}öÙÊ“ª¥)S¦èg?ûYµù† ô—¿üåœÏ¾»µ S§Nÿ¯§M›¦‰'œB%l…ÿu×]§_|ñœ7 ’Îy“ž——0þ»gÀ»\.]vÙeÚ´i“ $»Ý^y„Ýw½ð •GØUgÔ¨Qš9s¦"##«½§»îºK7ÝtS•kÁV)HÒßÿþw 6¬Êç6›M'NTDD„~ýë_Wë÷ûõæ›oêé§Ÿ:Guzè¡*…¤ÍfÓC=¤Ï?ÿ\_|ñEÀ9÷íÛWåØÂÚ¸çž{t÷ÝwŸó™aºûvíZ-_¾<`ìž={ªœ(°fÍmß¾½Úû5æç߯¶a¤Ã®ïê«þQõd’’}ñÅçü­dffêÓO? ˜[LLŒÞ~ûmõíÛ7à=ýû÷×¼yóÎ9¾š¢°4÷»ä’KôÊ+¯T)ú%Užy.IÑÑÑÇxñÅõöÛoŸSÀ'''«sçÎÊÌÌ XØ»Ýn­Zµ*à¸:uÒ /¼°è?[bbâ9?]Æ>räÈj‹þ³Ýzë­êÖ­[ÀëÁ Ò@ªàg«©»ý±cÇ,Ïér¹ôË_þ²ÎsV· ~ÅŠï8h "ŸSuNkðÚwzdddÍí©§ž ZôŸí»#ÐÔ„¥ðøá‡Ï)ðéÞ½{Àkeeeš2eІ ¢Y³fUžšš*—Ëpÿ† ‚6Ý»ï¾ûär¹jÌ­:k×® º<üæ›o®q Ã0tà 7¼~àÀ ½ª3`À€ Kõƒ=h¾= Ъ¾}û*>>¾ÎsWù,Øé ½z¥Éæü°&>)ðþøýû÷Ÿós°‡+:uÒ~ô£€× ¹ ùRÿèèè€Kð¿k̘1Z¼xqÐ{²³³õÇ?þQüã5pà@Mš4I#FŒÐ¦M›täȵkwî›Þ­[·Ë0ŒßÈóõ×_½žžž^«q.½ôÒ ×=ª‹.º¨ÖyµiÓ&èõšÆ:»Q_mµmÛ¶^9}wï»išA›5¾4óï’aÊ”¿ÚëAvvœ³ßï÷ÜN }»EåL¿8„¼ðïÑ£‡ìöÚ {à 7hàÀµ> `ݺuZ·nÚ¶m«G}TG111ç,·ÎÏÏŸ˜˜¨V­ZÕj®êÛétViVH‹-‚^?yò¤¥¼jÚ¶PÝ–‹³•––Zš¯6sÆÇÇË0Œ ½ÎVTT¤ŠŠŠ€×ë’ãgo+(((ºjãâ‹/®ó<Ð…üÕfrrrí'·ÙôüC—_~¹¥9¾ùæÝÿýZ²d‰6oÞ,·Û]y-XqþÝÎîV;ž-X¿‚ïªiÄw†ÛÙß_c9uêTØÆöûÿo•@°¿IA·/@sò¿6{ûÏ–˜˜¨wß}W?þ¸å·ñóæÍÓ—_~©ÌÌÌÊâ.Øæ’’KãWlllÀkeeeµ§¦<’’’j=V(DFFí‹Ðj»J¤¾Î~Púþ@SÓ0ÕV ìv»î½÷^ýüç?׻ᆱyóæiË–-µZ&þúë¯køðáÚ¶m›úôétÅÁ©S§TPPPçNìÁ ò²²2Ö¸¬^’Ž9ôº•U¡àr¹TPP Ö­[7è¼g«éaÇõ×_/—Ë¥ââbµjÕJ^¯WG~¿_6›MQQQ·œÝã ¦mßmÍ]“(üÏp8ºõÖ[uë­·êСCzÿý÷µ`ÁåääŒ)..®l†·ÿþ ìü~¿V®\©þð‡uÊ/555èõ-[¶hðàÁ5ެ¡ÓéT§N¬¦V/111*,,lÔÂ?::ZÑÑÑ÷ò5JÉÉÉ8p GçILL”Ãá¸bÅŠúío[çñ ©i²íËSSSõË_þR«V­ÒôéÓðÞ¨wïÞ:räHÐ#%饗^ ÚD.˜Ê0Œ€×ß{ï½Çðz½úðÃ^ïß¿¿åíõ­Ó§O7èœÕéׯ_Àkï¿ÿ¾úõëW¯¢_ú¶¯Ä•W^ðzVV––-[V¯9jãĉaŸ¤F.ükS€GDDè®»îÒÈ‘#Þã÷û¡ôôt™¦´»þÎ;õ»ßý®Æ½ÞRÕóí[¶lô­ÿû￯7sÖ¬YUÆ=ÛСCkÌ+ÔœNgŽô µAƒ¼öÙgŸY>í k®¹&èõ©S§ÖjÉ¿ßïZÀ;΀ׂ­ú€PjÔÂìØ±š;wn]ìMÓ ÚýÌ™ò.—K}úô©±x~óÍ7õ“ŸüD»víªöúÁƒ5cÆ 1¢Êµ` |>Ÿ&Nœ¨E‹U¹VQQ¡_|QÏ=÷\Àø¤¤$M˜0!hîá`†"##ü4ï7n\À&G&LÐÎ;k§´´T³gÏÖÔ©S«½>~üø '<œ8qB£FÒœ9säõz«\÷z½Z´h‘n¸á-Y²$à8Áú=|òÉ'UޱÌËË x?ÔU£îñ?zô¨~ó›ßè©§žÒرcõƒü@}ûöU«V­d·ÛuúôimݺU¯¿þz•"é ›Í¦ôôôÊŸ“““uÏ=÷héÒ¥A—¯¯\¹R+W®T—.]Ô£G%''+??_»wïÖ¾}û$UüßUW]¥¥K—êàÁƒÕŽ{úôiÝsÏ=š>}ºúöí«¤¤$8qB_~ù¥ ‚~÷Þ{oГÂ)!!A………jÙ²e£Ì/I;vÔ7Þ¨wß}·ÚëÔõ×_¯¡C‡jèСêÖ­›bbbäóùtêÔ)íÝ»W™™™Z±b…JKK>JJJÒäÉ“õ§?ý)`.………zä‘G4cÆ õëׯ²ÿÁ7ß|£-[¶Tö"¸õÖ[ŽÑ½{w>|¸Úk~¿_·Ür‹ú÷ï¯víÚ)''G~¿?胨‹&Ñܯ°°PsæÌÑœ9s*?³ÙlµZŽ?tèPuìØñœÏzô衇~XÓ¦M“Ïç Ÿ““´yàwEDDèoû›~üã}Cž››«>ú¨Öãúè#õîÝ;轑‘‘º÷Þ{5cÆ ;Öò[ä®]»žóó™ÓÎ2dˆ–-[¦I“&Yþ]ÒÒÒôòË/ëå—_VLLŒ¥Øp°ÙlŠˆˆ¨¶™]C1MS›6mÒÅ_¬aÆiéÒ¥ºí¶Ûiy¬=zè–[n©ñ¾äädÍ›7OO?ýte“ÈÚr:5ÆÜqÇzôÑGu5€ ›1qô03ÐÅ1ãoÕMVåó… êСCÕÆtíÚ5hçû³y<}þùçZ»v­¶nݪèØ±cçìËŠŠR·nÝÔ£G]}õÕ:t¨’““k5þ¹¹¹ÊÉÉQëÖ­µlÙ2}úé§Ú¹s§N:uΑ‚-Z´PçÎÕ¯_?]wÝu8pà9[Ün·¶lÙ¢T™#//OZ·n233•——WÙÎn·+))I:uÒÀuõÕWkÀ€–¶!Ì›7/`sÀ>}ú誫® [^^®W_}5àõ‘#Gªk×®Úºu«Ú·o_yâ;ï¼£cÇŽU“––Vãé 3gÎ xmèСJKK;ç³mÛ¶Éétª{÷îç|ž››«?üPëׯז-[tâÄ y<žÊë‡C;vT—.]”žž®ÁƒëÒK/ š[u¼^¯222ôé§Ÿjýúõ:zô¨JJJªÌsÉ%—èûßÿ¾n¸á† GGž-''Gÿüç?õÙgŸ);;»r+‹ËåR‹-ô½ï}O7ß|³®»îº*±ËýGs^ ü]:¾N¯½·¢ún“.xu*üí¨¨H~¿_.—K‡#$cîÝ»W%%%U¨YÞ_ã%%%Ú±c‡®¸âŠZÍéñxäñxj5vSpàÀùý~uéÒ¥ÁçÞ¿¿Nž<©Ë/¿¼V÷—––Êëõ*666¬oÓ=ÜnwHÿ¥oÿÆ###kµR„Â@}4É=þqqqJHHi¡uñÅËï÷kÿþýç|_ëÂÜçóY*2£¢¢šMÑ/ýß‘~ -//O‡Vß¾}k­„„„°/¡ŠŠ ùߢôíßx]¶º€UM²ð—Þ½{ëÈ‘#:~üxâ­þÍMc4ø+..ÖŽ;tùå—Ÿ×ß-4– ªðˆˆPzzºvîÜyÎÞíÚ:ß ÿ3¿ÛÙ}©¢¢B›7oVïÞ½år¹dN¸Ð\P…¿ôm3µÞ½{kÓ¦M–;ØŸï…¿ôí[ÿ¢¢¢°Ïcš¦233Õ±cÇz‰ì‚+ü%)))I]ºtQff¦L3`oÃ*.„¿¡öùïܹSqqqêСCØç€ ÙYøKRûöí£]»vÕ:†Â?4:¤ââbõèÑ#¬ó.àÂ_’zõꥢ¢"9r$è}¦iÊív«¼¼œÂ¿žòóóµÿ~¥§§Ë0Œ°Íø–½±hL†a¨oß¾Z»v­bbb”˜˜(Iòz½ÊÍÍÕ¾ì½*.*–ÏW!¯·\’¡ÈH‡veíTj‡êСc³:®¯6ìv»ü~¿ü~¿l¶Ð>*++Ó¶mÛÔ¿ÙíôŸ4˜ ¾úŠŒŒTzzº6nܨþýûëÀÊÉÎVÎîÊÉÚ©‚“yUúD9]j×¹«Òz÷S«6mtyÿ+×H¿Aè9Öï̃P¨¨¨ÐÆu饗*&&&dã‚»à IŠUçε,#Cûv~¥›¾PEŽÿw™r²¶+'k»Z·KÕ©ü|¥õꥴ´ž ˜uøÄÇÇ«°°0¤…ÿ¶mÛÔ¡CµhÑ"dcjFá/éøñãÚº9S+¾£S'ò,Å;rH‹æýS§FŒVÁ© 8°Ùï]OHHPnnnÈÆÛµk—ìv»:vì²1µÓ¨…AA:$wY™Ú¶o¯6mÚ4xÑ|úôi­_»VKæÏQYIqÆðUThõ’ä)+•#*Jééé!βa%$$h÷îÝ!ëèÑ£ÊÏÏ×€B2ÀšF+ü·µMY;vhë—kå-/W—=Õ­GO ¹fhƒuί¨¨ÐgkÖhùÔ¹è?Û+—)!¹…Z¶h¡Íøí¶Ãá×ë•išõzSXX¨={öhàÀ!o¨F)üOž<©_}¥%ógW6Îûæà~:‘§¤¤dõk 7æ;wìÐöëU`qy ¦ijÕ’÷•œ¢víÛ7ë£ÿâââTTTTçS <6oÞ¬ôôt9Žg¨­Fy »?'G™Ÿ¯®Ò-?kóF}óÍ‘ÉÁãñhÎ>íܼ1´ã–•iÏW[B¶T¾±$$$¨°°°N±~¿_7nTZZÚyuÚ4GòÆ¿´´DwY•Ïý~¿¼å^mܸQQQQŠŠŠ’ËåRTT”œNgåg¡pèÐ×Úµ5S~Ÿ/$ãmǦ/uÉe}Õ³góíòŸ ãÇ+55ÕrìÖ­[uÑE©uëÖaÈ `E£þmÚ¶S»N]uòø±s>OLVLLŒzöì)·Û-Ç#·Û­âââÊ———ËçóÉn·W> p:çüûÌ‚`ûÓ÷çäèë}{ÃòûyË=**,PQQQ³|ãmš¦ü~¿òòò´{÷n¹Ýn99N¹\.¥¤¤(22²ÚØììl†¡®]»6pÖ€ê4JáߥK]š~…N8®C9Ù’¤Ø„D]{ãÕÿÊ+­èèè cø|¾Ê‡G¥¥¥***ªüùÌ‚3ëÙÇ·÷œ Ûï¸w–òóЬ ÿ‚‚åä䨠 @qqqjÑ¢…¤o÷ûû|>•––ª  @YYYr:JMMU»ví*°?~\¹¹¹8p`cþ€³4Já¡¡×^«èh— å÷ùätºtùW())©ÖcÔæ×ë=gõ€ÇãQAAÊJJBñ«T\X Â‚©t÷/--ÕÎ;UVV¦¶mÛªC‡AWKtèÐAeeeÊÍÍÕ¾}ûÔ³gO¹\.íܹS hÖM à|ÓhÇùEEEiðkdšfåÒýpˆŒŒTddä9oÞ µuÓ†°ÌwFYi‰Š‹ŠÂ:G(?~\Û·oWjjª:wî\ë8—Ë¥Î;«¬¬¬r;@zzºœNg³XÕ臫†¶¢?ˆˆÙíÕïQÙv»ìöÁ7999Úµk—zöì©äää:ár¹Ô£G%$$hïÞ½òûý!ÎP^ø7§Ó©(—+¬s¸¢cÖ9êãèÑ£:räˆÒÒÒ6ê«-Ã0Ô¥K9NmÛ¶-DBá‚,üív»"Q²ÙÂ÷ë·¼¨­âÂ6~}œ>}Z»wïV÷îÝCú´k×NG999!P?dá/I‰‰‰jѦmØÆOíÚ­²+~SóÕW_©sçÎaÙbÑ¥KŸOÑÑÑ!¿¼¼\‡RŸ>}e5HDD„\.—ÔªU+8vX­*6Èa¸ë=v©/Nå1ßSrJ‹zuôÈ!=óøoôɇ‹äõz­›:å“yû¼%Ëÿ{Ëž='ê €óZe—´¯ödïß¶'çϽ{t-–_W˨ýþÇ­O—eè«ÍÕûŠ+åt†¿k|¸?~\¦iVy“|>IIIQVV–âââ²qMÓ¬|hέV|sx¿R*¶ÊaÔ5|¡ÙJfÒåJNN©óån·þö쓚óòßTxꔵ`ÓôJzqÎ’åC¿Ú›“Uç$\Pª¼’³pÙŸºö¿*Î4ÌWdȆcSÙ»²ô«ŸNÐëû³å½ÊMEnnn­›Ò5WQQQêÛ·¯²³³åñÔ­Óýw™¦©ììlµmÛ¶I=4qºbå6cB2–[Irºê>Ö»sßÔÝ·þH›Ö}.Ózï¾Õ‰þÈs–,ŸRç\ª=mÕªUþm{r÷¾¤×è¸RRûÚhš¦ìËÖGï¿£ø„xuêÖ|ŽÄ3MSYYYçí2ÿ³éŠ¿sçNÅÄÄÈápÔy¬ŠŠ íÙ³G)))MîÄò ©ðä!¥ØÖ{¬lß`uº¸·åïj[æFýaêÚ–¹A¦õb9F…{ÈœW>óevvhžÒ¸ Ôªº½}숑†ß?[’å3üZ¶n£_=>M©ºXN®¡""BÃFÓ„;ï¶:mH™¦©C‡hßC*+-‘)Éf³ÉWQ¡«¯ÐdÓ54¯×«C‡)77WGÑÑÑŠŒŒ”ÃáÏçSyy¹Ün·***tÑE©}ûöŠ‹‹kì´käv»µ~ÍRõ·Ï“Ó(±Ÿïo¯Ý¶éªÁÃkÜòÑïèÝ9o¨¼¼ÜÒ¦$›¡õÞXÿ¸ýë“c–“€ê¼øy‡]áÑI½­ÆÆÄÆêŽû¥þƒ®®ëôuVZZªÏ×oÐ7e‘:à‰W‰ÿÛýÚ6ù•l+Ñ%Ñ…ê’ÚF—öìqÞïóÆëõª¤¤DGGv»]N§S.—«I¿Ý$ïøqíÞºJéö·-íWäOÑfßéÊ«® züáŽm[ô꟟Sþ‰<˹™2Ù"íÿ5ûý?³ 5¨we{Û˜"ä{É4«·IMÕNW›ÔÔú¦Q+n·[+>ý\[KZ蔯úâÕfH=yº´]¼úõù^ƒä…†qô›#Ú½ý ]f_¤Ûñî6ôïí3‡¨ßƒ®9]P ™Ï<©¬í[-çcH¥¦lÏY¼t¦å`¨¥½Òž8zø Ó41 Ù-%`H—öí¯û}"è¾òPXýÙ:­Ës*ßWÓ‘l¦úÇÕàË{©UKËý Ñ„>}ZÛ·¬—ÃóµRm›”qX¶³¶Ò{M‡ò*:ê *&±z^Ö_QQU[Zøý~½ñÒ Z½l©åNý¦)S†>ð¸oY°`µ=`QHײßtÓÀ䨲ع†©‘2¬m·Û5vü»õöP¦T©  @Ë×oӗŵkÜm”ëªä| »¦á·# üòòòtôP¶NžEȧ EÊf³©Uë¶jס[À·ük–ghÎË3åv—Õeê­ÞrcÌüŒŒCõú –²‰ý§£®I÷öK²|†_L\¼î~ð×êÓÿÊæ´m{––e—èXEí÷}?îˆF Tí_œ_***d·_¬r {þúÿžTÞ±£u˜ÁÈ·™þŸ¼¹dù’ºeuÖîu?=âg~ù_”dí ?CêЩ‹|b†RB´Ô~ͺ ZyÔ©bí‹ø¾1y9 §’’’B’š§ââÓšõÜ3Úž¹Q¦¬ϧrSæSs/ÿ}8r€š4DÛzÛíc®›e˜¶;%Óf%Ð0 õ0H¿xø±߯ÖäÓu_jå7.•˜ ÿØqE%''×kn4_ïÎ}S‹Ì—ßï³iš¦Œ=®Äñ ,(KrP v^ÝÄáÃ[Éaþ[Ò`«±QQQ?i²†Sçù·~µC˲Ý:î«ý¹óWÅÑH–ú_Ö®^©Ù/½ ÒÒÒ:D›Y†ëGo,Z´+䉀E ~Pým£G^k“ï Ií­ÆÆ'$êǦéâ´^–çÍÏÏ×'_îІâÖµºßixõý¤>Ôòs 4cÇŽÑ_Ÿž¡¯÷çX6uÊ'óη–,/ô™@Ý4xáÆÄ±Ã2üú£)Y<ÃÏP·=ôËǦ)1ÑÚüOV­Ñùñ*ð»j˜Aê«Á}»«M›Ú€æ­ÜíÖ¬çŸQæúµ2M‹ûøMÓ+éos–,Ÿ–ä ­ð—¤!C†8ÛÇ8^5l晲´ÿßf³éêa#4é¾d³Õ.´¤¤D«>[¯MÅ-UlzÞ`êg¾zµŽÒ€þý¬¤„fjÉ»oë½¹³å­ðÖ%|uD±wÜ«V„:/…F-üϘ8fLg™î÷%õ¶åtê¶É÷jȰëkuQQ‘>_¿A‡ÜÑúºúà½3ûMy½˱†¡õÞXÿ¸ýë“caH ªÉþgÜüÃk»;¼¶«ûÿcbcuÇýSÔÐ÷ÚƒÛ¶èÕ??§üy–cM™Çl‘öÿšýþÇŸ…!5hM¾ð?ã¶1#&DÈ÷’i Vâ ImRSõÀ£ÓÕ&55LÙ¡©9]P ™Ï<©¬[%‹«ú ©Ô”íá9‹—Î OvÐpšMáÆÄÑÃg˜¦ùˆaÈn%Î0¤~®Ò½S•ÃáWzhd~¿_o¼ô‚V/[*Óom+¾iÊ”¡<®Ä[,XP¦ A5»Â_’&Ó¢ÔtÏ6L”aíw°Ûíºñ–ÛtãÍ·…+=4’5+24çï/É]VZ—ð­ÞrcÌüŒŒC¡Î S³,üÏøé¨kÒý†ýß’j>Ãï;âõ‹_ÿVi½û„!34¤Ù{ô×ÿ÷¤òŽ­C´‘¯ˆŠIsþ³bQÈ€& YþgütôˆŸùåQR¬¥@CêЩ‹¦L{RÉ))áIaS\|Z³ž{F_en¨Kx¹)󩹋—ÿ>Ôy@Sr^þÿËvû˜ëf¦íNÉ´Y 4 ›ú ¨_<ü˜ìvK­ÐHÞû¦-˜/¿ßg1Ò4M{\‰ã,XP–ä  9Ÿ IÒÄáÃ[ÉaþÛ”[ý墢¢tËwéÚƆ%7Ôßú5+õÆß^PiiöñçDÎQo,Z´+Ôy@SuÞþgÜ6zäµ6ùÞÔÞjl|B¢xlš.NëúÄP'ÇŽÑ_Ÿž¡¯÷çX6tÊ0ý“g/þäÐgMÛy[øŸqû˜ë¦ÚLc†)9­Æv둦_>6M‰‰ÉáH µPîvkÖóÏ(sýZ™¦i-ØW~óos–,Ÿžì é;ï I2dˆ³}ŒãUÃfN)Kûÿm6]}ÝMºïÙl–BQOKÞ}[ïÍ-o…·.á«#нãÞXµª Ôy@srAþgL3¦³L÷û’z[r:uÛä{5dØõaÈ gÛ–¹Q¯<ÿ¬NÖ©fÏ1*Ü?œýñšm¡Î š£ ªð?cÒèa7øL½!C-­Æ¶lÝF¿zâ÷JíØ) ™]ØòŽÓ¬ÿyJÙ»²¬›*‘a>8gñòWCŸ4_dáÆÄÑÃgÈ0#S‘– )­Wo=øÄï匎Sv¿ß¯7^zA«3>¶¾_†Ï4ü¯Í]´ü^IþpäÍÙ]øKÒäôôèÒ6És iœ,~6zœ&Üyw˜²;ÿ}üÁ{Z0ûŸòz=–c Cë‘q?zå½÷ކ!58/\ð…ÿ† ëe¾%iVcccãô³ûTÿAßGj祜=»4óÙ§•wÌzÍnÊ<æ·ÙÆ¿µ0ãÓ0¤ç ÿï¸m̈ 6Ó?KR¼•8CR›ÔT=ðètµIM OrçÓšùÌ“ÊÚ±U²¸ªß”Êl¦ñ›ÙK2þžìàüCáÀÄÑÃgHæ#’ì– CééÞ©Êáp„'¹f¨rÿ²¥2ýֶ⛦LúÀãJ¼eÁ‚åaJÎKþAL3¦E©éžm˜)ÃÚwe·Ûuã-·éÆ›o WzÍÆššó÷—ä.+­KøVo¹1f~FÆ¡Pç ÿZ¸mäÈþ6»o¾¤.Vcãõ‹_ÿVi½û„!³¦í@öýõÿ=Y§}ü’‘¯ˆŠIsþ³bQÈ€ …¿?5üÓ0_k)Ð:tê¢)ÓžTrJJx’kBŠ‹OkÖsÏè«Ì u /7e>=wñòé!N .HþMŸ>Ýž½é³™6Óv§)Óf%Öf³iÀÕCuçSd·[kÐ\¼;÷M-~g¾|>ŸÅHÓ4e|ìq%Ž_°`AqX’€ …M>¼•æ¿Mi°Õ/Ñ¥[ï¸K×Þ06,¹5†õkVêŸ3_TYII]Âsüþ1óþóÉÎPç: ÿzºõ†áÃì6óuIí­Æ&·h©ûþ­º§õ Cf ãØÑ#úëÓ3ôõþëÁ†N¦òìÅŸ¼úÌ…ÈÜ>溩†iÌä´Û­Gš~ùØ4%&&‡!³ð(w»5ëùg”¹~­LÓ´kJ>æks-¿;Léþ… 2ÄÙ>ÆñªÍÐËûÿ#lºúºštß²Ù,…6¸%ï¾­÷æÎ–·Â[—ðÕÅÞqo¬ZUê¼UQø‡Áäë¯ïZQñ®¤ÞVc.—n¿ó>]=|D2«Ÿí™õ÷??«ÓuªÙÛ#Œÿúç2¾u^€À(üÃhÒèa7ø ½)S-¬Æ¶lÝF¿zâ÷JíØ) ™Ys2ï˜f>û”²weY6U"Ã|pÎâ密>3@M(üÀÄÑÃgÈ0#S‘Vâ êqéezð‰ßË®ôòûýz㥴:ãcËûø Éçÿvÿ½’üáÉP ÿ29==º´Mò\C'‹ß»Ýn×u£nÔ„;®ÞǼ§³ÿ)¯×c9Ö0´Þ÷£WÞ{ïhRX@áßÀ& Ö'"Ê|K2Ò¬ÆÆÆÆéç¿|Hé…#5IRΞ]šùìÓÊ;f½f7eóÛlãßZ˜ñiRÔ…#ùɨa·›†fJŠ·gHj“šª›®6íRC–Ïé‚Í|æIeíØ*Y[Õ/S*³™Æof/ÉøkÈ„…ã²MuÝÿÈ0î—d·iJ0H÷N}T‡£Î øý~ÍýUe,ú@~¿ÏR¬iÊ”¡<®Ä[,XP^ç$aCáßL3¦E™é~GÒ`«±v»]7Þ|›n¼å6Ëó®Y‘¡¹/ÏTYi™åXI[½åƘù‡ê hþMÈm#Gö·Ù}ó%u±Ÿ¨_üæ1¥}¯w÷ÈÉÖßÿçi}s¨.5»‘oƳ-ýO‚ ŒÂ¿ úɨáw˜6󙊵ۡsM™ö¤’SRª\+.>­YÏ=£¯27XOÊ0ÊMÓÿôÜÅ˧[4 ÿ&júôéöìMŸÍ´™¶;M™6+±6›M®ªÉN•Íömè»sßÔâwæËç«Ó>þ=®Äñ ,(¶ htþMÜ-ǧF:Ì÷%¥[r:5døõZóI†JKJ,ÏmÆÝ÷£·ßÿdå`@“@áßLÜ>vÄHÃô¿)S­Â>™©S†áŸ<{ñ'ï„}.@XQø73·¹nªa3$9C=¶)ùd˜¯Í]´üîP hþÍÐ!Cœíc¯Ú M°ºÿ?ˆÕÅÞqo¬ZU¢ñM…3vó¯íYn{ß0Գ΃æ>¯¡›æ/\¾9„©š ÿóÀ¤ÑÃnðzS¦ZÔ:ÈT‰i꡹.{9Œ©…ÿydâèá3 Ãüi*2Ð=†äó›Æ¿ºõô³éÓ§W4d~€†Gឹ馛b£Ê fÒ8UýÿÝêrÄ]ÿÊ{ïmŒÜ Âÿ<5aذ>Qæ[’‘fÊ<æ·ÙÆ¿µ0ãÓÆÎ „Ðm7^[÷ÆàB÷ÿzK¡|è/IEND®B`‚rsconnect/man/figures/logo.svg0000644000175000017500000040251614031151574016313 0ustar nileshnilesh image/svg+xml rsconnect rsconnect/man/restartApp.Rd0000644000175000017500000000174214031151455015574 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/restartApp.R \name{restartApp} \alias{restartApp} \title{Restart an Application} \usage{ restartApp(appName, account = NULL, server = NULL, quiet = FALSE) } \arguments{ \item{appName}{Name of application to restart} \item{account}{Account name. If a single account is registered on the system then this parameter can be omitted.} \item{server}{Server name. Required only if you use the same account name on multiple servers (see \code{\link[=servers]{servers()}})} \item{quiet}{Request that no status information be printed to the console during the operation.} } \description{ Restart an application currently running on a remote server. } \note{ This function works only for ShinyApps servers. } \examples{ \dontrun{ # restart an application restartApp("myapp") } } \seealso{ \code{\link[=applications]{applications()}}, \code{\link[=deployApp]{deployApp()}}, and \code{\link[=terminateApp]{terminateApp()}} } rsconnect/man/generateAppName.Rd0000644000175000017500000000257514051210517016505 0ustar nileshnilesh% Generated by roxygen2: do not edit by hand % Please edit documentation in R/title.R \name{generateAppName} \alias{generateAppName} \title{Generate Application Name} \usage{ generateAppName(appTitle, appPath = NULL, account = NULL, unique = TRUE) } \arguments{ \item{appTitle}{A descriptive title for the application.} \item{appPath}{The path to the application's content, either a directory or an individual document. Optional.} \item{account}{The account where the application will be deployed. Optional.} \item{unique}{Whether to try to generate a unique name.} } \value{ Returns a valid short name for the application. } \description{ Generate a short name (identifier) for an application given an application title. } \details{ This function modifies the title until it forms a suitable application name. Suitable application names are 3 - 64 characters long and contain only alphanumeric characters. The function is intended to be used to find a name for a new application. If \code{appPath} and \code{account} are both specified, then the returned name will also be unique among locally known deployments of the directory (note that it is not guaranteed to be unique on the server). This behavior can be disabled by setting \code{unique = FALSE}. } \examples{ \dontrun{ # Generate a short name for a sample application generateAppName("My Father's Country", "~/fathers-country", "myacct") } } rsconnect/tests/0000755000175000017500000000000014051210517013540 5ustar nileshnileshrsconnect/tests/testthat/0000755000175000017500000000000014145651202015404 5ustar nileshnileshrsconnect/tests/testthat/tf-saved-model-rootdir/0000755000175000017500000000000013236716400021675 5ustar nileshnileshrsconnect/tests/testthat/tf-saved-model-rootdir/saved_model.pb0000644000175000017500000000000613236716400024476 0ustar nileshnileshbogus rsconnect/tests/testthat/test-rmd-bad-case/0000755000175000017500000000000014144740654020611 5ustar nileshnileshrsconnect/tests/testthat/test-rmd-bad-case/index.Rmd0000644000175000017500000000153414051210517022352 0ustar nileshnilesh--- title: "rmarkdown with bad link case" --- One of the embedded images uses `rstudio.svg` even though the on-disk filename is `RStudio.svg`. This will render fine on a Mac, for example, but will err when rendered on Linux. The Mac filesystem is case-preserving, but case-insensitive. The Linux filesystem is case-sensitive. The IDE and `rsconnect::deployDoc` attempt to deploy the as-linked filenames. With both `rstudio.svg` and `RStudio.svg` links, the bundle has two copies of the SVG! You can use `rsconnect::deployApp` directly to see the lint error in the R console: ```r rsconnect::deployApp( appDir = getwd(), appFiles = c("index.Rmd", "RStudio.svg")) ``` And now, the links! This one (line 29) is all lower-case and should trigger the error. ![](rstudio.svg) This one is mixed-case and matches the on-disk filename. ![](RStudio.svg) rsconnect/tests/testthat/test-rmd-bad-case/RStudio.svg0000644000175000017500000000012714051210517022706 0ustar nileshnilesh rsconnect/tests/testthat/shiny-rmds/0000755000175000017500000000000012562127530017504 5ustar nileshnileshrsconnect/tests/testthat/shiny-rmds/shiny-rmd-dashes.Rmd0000644000175000017500000000012312562127530023323 0ustar nileshnilesh--- title: Shiny R Markdown with Dashes output: html_document runtime: shiny --- rsconnect/tests/testthat/shiny-rmds/non-shiny-rmd.Rmd0000644000175000017500000000011012562127530022642 0ustar nileshnilesh--- title: Not a Shiny R Markdown Document output: html_document --- rsconnect/tests/testthat/shiny-rmds/shiny-rmd-dots.Rmd0000644000175000017500000000014012562127530023024 0ustar nileshnilesh--- title: Shiny R Markdown with Dots output: html_document runtime: shiny ... Hello, world! rsconnect/tests/testthat/test-rmds/0000755000175000017500000000000014143551307017331 5ustar nileshnileshrsconnect/tests/testthat/test-rmds/parameterized.Rmd0000644000175000017500000000015013334624220022621 0ustar nileshnilesh--- title: Parameterized R Markdown document params: color: red --- Parameters are `r params$color`. rsconnect/tests/testthat/test-rmds/simple.Rmd0000644000175000017500000000010413334624220021255 0ustar nileshnilesh--- title: Simple R Markdown document --- R Markdown is so simple. rsconnect/tests/testthat/test-rmds/index.Rmd0000644000175000017500000000014113334624220021074 0ustar nileshnilesh--- title: The index R Markdown document --- For those times that you do not specify a primary. rsconnect/tests/testthat/test-detection.R0000644000175000017500000000661514105013653020470 0ustar nileshnileshcontext("type detection") test_that("Shiny R Markdown files are detected correctly", { expect_true(isShinyRmd("./shiny-rmds/shiny-rmd-dashes.Rmd")) expect_true(isShinyRmd("./shiny-rmds/shiny-rmd-dots.Rmd")) expect_false(isShinyRmd("./shiny-rmds/non-shiny-rmd.Rmd")) }) # fileContent is a named list with file content. When content is NA, the # name of the file is used as its content. # # Each file is written with its content to a temporary directory. # Returns the result of inferAppMode when run against that directory. # The temporary directory is removed on exit. inferAppModeFromFiles <- function(fileContent) { targetDir <- tempfile() dir.create(targetDir) on.exit(unlink(targetDir, recursive = TRUE)) for (file in names(fileContent)) { content <- fileContent[[file]] # Write the filename as its content when we are not given content. if (all(is.na(content))) { content <- c(file) } targetFile <- file.path(targetDir, file) writeLines(content, con = targetFile, sep = "\n") } files <- list.files(targetDir, recursive = FALSE, all.files = FALSE, include.dirs = FALSE, no.. = TRUE, full.names = FALSE) appMode <- inferAppMode(targetDir, NULL, files, quarto = NULL) return(appMode) } test_that("inferAppMode", { # Plumber API identification expect_identical("api", inferAppModeFromFiles(list( "plumber.R" = NA ))) expect_identical("api", inferAppModeFromFiles(list( "entrypoint.R" = NA ))) expect_identical("api", inferAppModeFromFiles(list( "plumber.R" = NA, "helper.R" = NA ))) # Shiny application identification expect_identical("shiny", inferAppModeFromFiles(list( "app.R" = NA ))) expect_identical("shiny", inferAppModeFromFiles(list( "server.R" = NA ))) expect_identical("shiny", inferAppModeFromFiles(list( "server.R" = NA, "ui.R" = NA ))) expect_identical("shiny", inferAppModeFromFiles(list( "server.R" = NA, "ui.R" = NA, "global.R" = NA ))) # Static R Markdown identification (rendered documents) expect_identical("rmd-static", inferAppModeFromFiles(list( "index.Rmd" = NA ))) expect_identical("rmd-static", inferAppModeFromFiles(list( "index.Rmd" = NA, "alpha.Rmd" = NA, "bravo.Rmd" = NA ))) expect_identical("rmd-static", inferAppModeFromFiles(list( "alpha.Rmd" = NA, "bravo.Rmd" = NA ))) rmdRuntimeShiny <- c( "---", "runtime: shiny", "---" ) rmdRuntimeShinyRmd <- c( "---", "runtime: shinyrmd", "---" ) rmdRuntimeShinyPrerendered <- c( "---", "runtime: shiny_prerendered", "---" ) # Shiny R Markdown identification expect_identical("rmd-shiny", inferAppModeFromFiles(list( "index.Rmd" = rmdRuntimeShiny ))) expect_identical("rmd-shiny", inferAppModeFromFiles(list( "index.Rmd" = rmdRuntimeShinyRmd ))) expect_identical("rmd-shiny", inferAppModeFromFiles(list( "index.Rmd" = rmdRuntimeShinyPrerendered ))) # Shiny Rmd with other Rmd expect_identical("rmd-shiny", inferAppModeFromFiles(list( "shiny.Rmd" = rmdRuntimeShinyPrerendered, "other.Rmd" = NA ))) # Shiny Rmd with other R script expect_identical("rmd-shiny", inferAppModeFromFiles(list( "shiny.Rmd" = rmdRuntimeShinyPrerendered, "helper.R" = NA ))) # Shiny Rmd with server.R script expect_identical("rmd-shiny", inferAppModeFromFiles(list( "shiny.Rmd" = rmdRuntimeShinyPrerendered, "server.R" = NA ))) }) rsconnect/tests/testthat/test-reticulate-rmds/0000755000175000017500000000000013765742023021476 5ustar nileshnileshrsconnect/tests/testthat/test-reticulate-rmds/implicit.Rmd0000644000175000017500000000027113424127505023746 0ustar nileshnilesh--- title: An example R Markdown document that uses reticulate to run python content --- ```{python} from pprint import pprint xs = range(10) pprint([(x, x**2, x**3) for x in xs]) ``` rsconnect/tests/testthat/test-reticulate-rmds/index.Rmd0000644000175000017500000000033113424127505023240 0ustar nileshnilesh--- title: An example R Markdown document that uses reticulate to run python content --- ```{r} library(reticulate) ``` ```{python} from pprint import pprint xs = range(10) pprint([(x, x**2, x**3) for x in xs]) ``` rsconnect/tests/testthat/certs/0000755000175000017500000000000013250256314016525 5ustar nileshnileshrsconnect/tests/testthat/certs/localhost.crt0000644000175000017500000000010013250256314021216 0ustar nileshnilesh-----BEGIN CERTIFICATE----- localhost -----END CERTIFICATE----- rsconnect/tests/testthat/certs/invalid.crt0000644000175000017500000000071713250256314020672 0ustar nileshnileshDo you remember still the falling stars that like swift horses through the heavens raced and suddenly leaped across the hurdles of our wishes--do you recall? And we did make so many! For there were countless numbers of stars: each time we looked above we were astounded by the swiftness of their daring play, while in our hearts we felt safe and secure watching these brilliant bodies disintegrate, knowing somehow we had survived their fall. Rainer Maria Rilke rsconnect/tests/testthat/certs/two-cas.crt0000644000175000017500000000610413250256314020615 0ustar nileshnileshAmazon Root CA 1 ================ -----BEGIN CERTIFICATE----- MIIDQTCCAimgAwIBAgITBmyfz5m/jAo54vB4ikPmljZbyjANBgkqhkiG9w0BAQsF ADA5MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6 b24gUm9vdCBDQSAxMB4XDTE1MDUyNjAwMDAwMFoXDTM4MDExNzAwMDAwMFowOTEL MAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJv b3QgQ0EgMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALJ4gHHKeNXj ca9HgFB0fW7Y14h29Jlo91ghYPl0hAEvrAIthtOgQ3pOsqTQNroBvo3bSMgHFzZM 9O6II8c+6zf1tRn4SWiw3te5djgdYZ6k/oI2peVKVuRF4fn9tBb6dNqcmzU5L/qw IFAGbHrQgLKm+a/sRxmPUDgH3KKHOVj4utWp+UhnMJbulHheb4mjUcAwhmahRWa6 VOujw5H5SNz/0egwLX0tdHA114gk957EWW67c4cX8jJGKLhD+rcdqsq08p8kDi1L 93FcXmn/6pUCyziKrlA4b9v7LWIbxcceVOF34GfID5yHI9Y/QCB/IIDEgEw+OyQm jgSubJrIqg0CAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC AYYwHQYDVR0OBBYEFIQYzIU07LwMlJQuCFmcx7IQTgoIMA0GCSqGSIb3DQEBCwUA A4IBAQCY8jdaQZChGsV2USggNiMOruYou6r4lK5IpDB/G/wkjUu0yKGX9rbxenDI U5PMCCjjmCXPI6T53iHTfIUJrU6adTrCC2qJeHZERxhlbI1Bjjt/msv0tadQ1wUs N+gDS63pYaACbvXy8MWy7Vu33PqUXHeeE6V/Uq2V8viTO96LXFvKWlJbYK8U90vv o/ufQJVtMVT8QtPHRh8jrdkPSHCa2XV4cdFyQzR1bldZwgJcJmApzyMZFo6IQ6XU 5MsI+yMRQ+hDKXJioaldXgjUkK642M4UwtBV8ob2xJNDd2ZhwLnoQdeXeGADbkpy rqXRfboQnoZsG4q5WTP468SQvvG5 -----END CERTIFICATE----- Amazon Root CA 2 ================ -----BEGIN CERTIFICATE----- MIIFQTCCAymgAwIBAgITBmyf0pY1hp8KD+WGePhbJruKNzANBgkqhkiG9w0BAQwF ADA5MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6 b24gUm9vdCBDQSAyMB4XDTE1MDUyNjAwMDAwMFoXDTQwMDUyNjAwMDAwMFowOTEL MAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJv b3QgQ0EgMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAK2Wny2cSkxK gXlRmeyKy2tgURO8TW0G/LAIjd0ZEGrHJgw12MBvIITplLGbhQPDW9tK6Mj4kHbZ W0/jTOgGNk3Mmqw9DJArktQGGWCsN0R5hYGCrVo34A3MnaZMUnbqQ523BNFQ9lXg 1dKmSYXpN+nKfq5clU1Imj+uIFptiJXZNLhSGkOQsL9sBbm2eLfq0OQ6PBJTYv9K 8nu+NQWpEjTj82R0Yiw9AElaKP4yRLuH3WUnAnE72kr3H9rN9yFVkE8P7K6C4Z9r 2UXTu/Bfh+08LDmG2j/e7HJV63mjrdvdfLC6HM783k81ds8P+HgfajZRRidhW+me z/CiVX18JYpvL7TFz4QuK/0NURBs+18bvBt+xa47mAExkv8LV/SasrlX6avvDXbR 8O70zoan4G7ptGmh32n2M8ZpLpcTnqWHsFcQgTfJU7O7f/aS0ZzQGPSSbtqDT6Zj mUyl+17vIWR6IF9sZIUVyzfpYgwLKhbcAS4y2j5L9Z469hdAlO+ekQiG+r5jqFoz 7Mt0Q5X5bGlSNscpb/xVA1wf+5+9R+vnSUeVC06JIglJ4PVhHvG/LopyboBZ/1c6 +XUyo05f7O0oYtlNc/LMgRdg7c3r3NunysV+Ar3yVAhU/bQtCSwXVEqY0VThUWcI 0u1ufm8/0i2BWSlmy5A5lREedCf+3euvAgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMB Af8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBSwDPBMMPQFWAJI/TPlUq9LhONm UjANBgkqhkiG9w0BAQwFAAOCAgEAqqiAjw54o+Ci1M3m9Zh6O+oAA7CXDpO8Wqj2 LIxyh6mx/H9z/WNxeKWHWc8w4Q0QshNabYL1auaAn6AFC2jkR2vHat+2/XcycuUY +gn0oJMsXdKMdYV2ZZAMA3m3MSNjrXiDCYZohMr/+c8mmpJ5581LxedhpxfL86kS k5Nrp+gvU5LEYFiwzAJRGFuFjWJZY7attN6a+yb3ACfAXVU3dJnJUH/jWS5E4ywl 7uxMMne0nxrpS10gxdr9HIcWxkPo1LsmmkVwXqkLN1PiRnsn/eBG8om3zEK2yygm btmlyTrIQRNg91CMFa6ybRoVGld45pIq2WWQgj9sAq+uEjonljYE1x2igGOpm/Hl urR8FLBOybEfdF849lHqm/osohHUqS0nGkWxr7JOcQ3AWEbWaQbLU8uz/mtBzUF+ fUwPfHJ5elnNXkoOrJupmHN5fLT0zLm4BwyydFy4x2+IoZCn9Kr5v2c69BoVYh63 n749sSmvZ6ES8lgQGVMDMBu4Gon2nL2XA46jCfMdiyHxtN/kHNGfZQIG6lzWE7OE 76KlXIx3KadowGuuQNKotOrN8I1LOJwZmhsoVLiJkO/KdYE+HvJkJMcYr07/R54H 9jVlpNMKVv/1F2Rs76giJUmTtt8AF9pYfl3uxRuw0dFfIRDH+fO6AgonB8Xx1sfT 4PsJYGw= -----END CERTIFICATE----- rsconnect/tests/testthat/certs/store.crt0000644000175000017500000000003113250256314020365 0ustar nileshnilesh== system cert store == rsconnect/tests/testthat/certs/sample.crt0000644000175000017500000000247613250256314020531 0ustar nileshnilesh-----BEGIN CERTIFICATE----- MIIDszCCApugAwIBAgIJAJhKUgOoHiBhMA0GCSqGSIb3DQEBCwUAMIGAMQswCQYD VQQGEwJVUzELMAkGA1UECAwCV0ExEDAOBgNVBAcMB1JlZG1vbmQxEDAOBgNVBAoM B1JTdHVkaW8xGzAZBgNVBAMMEnJzdHVkaW8tbWVnYS5sb2NhbDEjMCEGCSqGSIb3 DQEJARYUam9uYXRoYW5AcnN0dWRpby5jb20wHhcNMTcwOTAxMjIxNTI5WhcNMjAw NTI3MjIxNTI5WjBVMQswCQYDVQQGEwJVUzENMAsGA1UECAwETm9uZTELMAkGA1UE BwwCTkIxDTALBgNVBAoMBE5vbmUxGzAZBgNVBAMMEnJzdHVkaW8tbWVnYS5sb2Nh bDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANq8Hgk1vyt7N8mL0qpc 8wVrVavFNo23G887/SDJ/OIQljd3PLY1zJ+KAIZjZ1DNWG3DCfZv3ghser3gi5x/ TTLVI2AMrxYafV9KLOic35ngH6Aj6fgXZC0U0uaqlx5cdd+2SFIgs2l2IZMWXM8o YLcdes+L5yOfJPlKkASz2Yh9aBCZR6Xf1Bg2M1brwAeMtBB+dXcnXgNAHD0u+dOS 3PMlUugjRPH4b0gmMVnSjLANGGVbJAJiIq2k0ZblgixjiAGpampTTe+ml9KQL38C HWiJkSTuC6ipZDyjk9BhJTz2fH3wR0yJsk/J3o8hm5u0WBlfttv/VMtsWlhBAc6A 4HkCAwEAAaNaMFgwHwYDVR0jBBgwFoAU21Bn94udZnSVWlZHji9jfc33Cb0wCQYD VR0TBAIwADALBgNVHQ8EBAMCBPAwHQYDVR0RBBYwFIIScnN0dWRpby1tZWdhLmxv Y2FsMA0GCSqGSIb3DQEBCwUAA4IBAQCIbnzfsTL80Ls8LmiSuZ6WEG2+9fgWxXYq VmOq+y0LJboe7Bf86FsbI8KNDJ3SEU0XFDDNio/txRoNomrSX2HKOUwoc9z8jGNV SWusvlOaaMbH0+Vrid1OMqy8Nk3yyZdhc3cAtN6juG//T/9c8XWA68qFq+W6TIUp qFpNsfcyN0NjP9pu4ANQzt5vTpVaqkmxHr1d53gAw89hHsBrgMLDpSeQRAnQNt6G 0mcCAwBfEqTK9lDzGiS8vnnD2ovFsQllRyJbzWSttQ7NvTa/nvCs1GfTTOK02K9G qXn256VmSEjzZgWrKB87Md1/ySOUxi5M8VGoVBRJ7mfuad2/h4S1 -----END CERTIFICATE----- rsconnect/tests/testthat/shinyapp-appR/0000755000175000017500000000000012662674016020151 5ustar nileshnileshrsconnect/tests/testthat/shinyapp-appR/app.R0000644000175000017500000000056612662674016021063 0ustar nileshnileshserver <- function(input, output) { output$distPlot <- renderPlot({ hist(rnorm(input$obs), col = 'darkgray', border = 'white') }) } ui <- fluidPage( sidebarLayout( sidebarPanel( sliderInput("obs", "Number of observations:", min = 10, max = 500, value = 100)), mainPanel(plotOutput("distPlot")))) shinyApp(ui = ui, server = server) rsconnect/tests/testthat/test-title.R0000644000175000017500000000161713044136367017641 0ustar nileshnileshcontext("title") test_that("generated application names do not exceed maximum length", { title <- "Good heavens, this title is simply enormous! I can't imagine why anyone would use such a cumbersome moniker." name <- generateAppName(title) expect_lt(nchar(name), 65) }) test_that("empty titles are rejected", { title <- "" expect_error(generateAppName(title)) }) test_that("path is used to generate valid title if title isn't specified", { title <- NULL path <- "shiny-app-in-subdir" name <- generateAppName(title, path) expect_gt(nchar(name), 5) }) test_that("invalid characters are removed from titles", { title <- "Free!* (* = With $5 Donation)" name <- generateAppName(title) expect_false(grepl("[!*=$]", name)) }) test_that("valid characters are not removed from titles", { title <- "inexpensive_kittens-5" name <- generateAppName(title) expect_identical(title, name) }) rsconnect/tests/testthat/test-http.R0000644000175000017500000001406613632232206017471 0ustar nileshnileshcontext("http") # The list of HTTP transports to check transports <- c("libcurl", "rcurl", "curl", "internal") # Temporary file to cache the output (request) to HTTP methods output <- tempfile(fileext = ".rds") # Temporary file to cache the input (response) to HTTP methods input <- tempfile(fileext = ".rds") # Temporary file to send test posting file to server datafile <- tempfile("rsconnect-tmp") # Configure the test service we'll be connecting to port <- 4072L service <- list( protocol = "http", host = "localhost", port = port, path = "/") # Holds the process object referring to the background HTTP server server <- NULL setup({ # Ensure temp directory exists if (!dir.exists(dirname(input))) dir.create(dirname(input), recursive = TRUE) # Seed input with sample data saveRDS(file = input, object = list( status = 200L, headers = list( "Content-Type" = "text/plain" ), body = "Request successful" )) # Create a new server and run it in a background R process server <<- callr::r_bg(func = function(output, input, port) { httpuv::runServer(host = "127.0.0.1", port = port, app = list( call = function(req) { # Eagerly fetch the body body <- paste(req[["rook.input"]]$read_lines(), collapse = "\n") req[["body"]] <- body # Save the request to a file for examination saveRDS(object = req, file = output) # Parse and return the input file readRDS(file = input) })) }, args = list(output = output, input = input, port = port)) # Sleep a couple of seconds to give the server time to start Sys.sleep(2) }) teardown({ # Clean up temp files unlink(output) unlink(input) unlink(datafile) # Kill the R process hosting the background http server server$kill() }) test_that("simple http GET works", { # Test HTTP server doesn't work on Solaris skip_on_os("solaris") for(transport in transports) { # Set the transport for this instance of the test options("rsconnect.http" = transport) # Save the response the server will return saveRDS(file = input, object = list( status = 200L, headers = list( "Content-Type" = "text/plain" ), body = "GET successful" )) # Perform the request GET(service = service, authInfo = NULL, query = NULL, path = "test") # Validate that we performed a GET on the requested path request <- readRDS(output) expect_equal(request$REQUEST_METHOD, "GET") expect_equal(request$PATH_INFO, "/test") } }) test_that("posting JSON works", { # Test HTTP server doesn't work on Solaris skip_on_os("solaris") for(transport in transports) { options("rsconnect.http" = transport) saveRDS(file = input, object = list( status = 200L, headers = list( "Content-Type" = "text/plain" ), body = "POST successful" )) # Perform the request body <- list(a = 1, b = 2, c = 3) POST_JSON(service = service, authInfo = NULL, json = body, query = NULL, path = "test") # Validate HTTP method request <- readRDS(output) expect_equal(request$REQUEST_METHOD, "POST") # Validate body contents expect(request$body == toJSON(body, pretty = TRUE), failure_message = paste0("Unexpected request body '", request$body, "', with transport ", transport)) } }) test_that("posting with no data works", { # Test HTTP server doesn't work on Solaris skip_on_os("solaris") for(transport in transports) { options("rsconnect.http" = transport) # Save the response the server will return saveRDS(file = input, object = list( status = 200L, headers = list( "Content-Type" = "text/plain" ), body = "POST successful" )) # Perform the request POST(service = service, authInfo = NULL, path = "test", file = NULL, content = NULL) # Validate HTTP method request <- readRDS(output) expect_equal(request$REQUEST_METHOD, "POST") # Validate body contents expect(request$body == "", failure_message = paste0("Unexpected request body '", request$body, "', with transport ", transport)) } }) test_that("posting file works", { # Test HTTP server doesn't work on Solaris skip_on_os("solaris") for(transport in transports) { options("rsconnect.http" = transport) # Save the response the server will return saveRDS(file = input, object = list( status = 200L, headers = list( "Content-Type" = "text/plain" ), body = "POST successful" )) # Perform the request write(c("1","2","3"), datafile) POST(service = service, authInfo = NULL, path = "test", contentType = "text/plain", file = datafile, content = NULL) # Validate HTTP method request <- readRDS(output) expect_equal(request$REQUEST_METHOD, "POST") # Validate body contents expect(request$body == "1\n2\n3", failure_message = paste0("Unexpected request body '", request$body, "', with transport ", transport)) } }) test_that("api key authinfo sets headers", { # Test HTTP server doesn't work on Solaris skip_on_os("solaris") for(transport in transports) { options("rsconnect.http" = transport) # Save the response the server will return saveRDS(file = input, object = list( status = 200L, headers = list( "Content-Type" = "text/plain" ), body = "GET successful" )) apiKey = "abc123" # Perform the request GET(service = service, authInfo = list(apiKey = apiKey), query = NULL, path = "test") # Validate that we performed a GET on the requested path request <- readRDS(output) # Validate header contents expect(request$HEADERS["authorization"] == paste("Key", apiKey), failure_message = paste0("Correct api key request header missing in '", request$HEADERS, "', with transport ", transport)) } }) rsconnect/tests/testthat/test-plumber/0000755000175000017500000000000013116017463020031 5ustar nileshnileshrsconnect/tests/testthat/test-plumber/plumber.R0000644000175000017500000000007313116017463021622 0ustar nileshnilesh #* @get /foo fooRoute <- function() { "hello world" } rsconnect/tests/testthat/test-hashes.R0000644000175000017500000000430513632232206017760 0ustar nileshnileshcontext("hashes") emptyFile <- tempfile(fileext = ".empty.txt") contentsFile <- tempfile(fileext = ".contents.txt") # computed by openssl::md5("") expectedEmptyMD5 <- "d41d8cd98f00b204e9800998ecf8427e" # computed by openssl::md5("go bananas!\n") expectedContentsMD5 <- "52d2daa95d288f3c01e4d4d87f85727e" # computed by openssl::md5("") expectedMissingMD5 <- "d41d8cd98f00b204e9800998ecf8427e" setup({ # Create an empty file. if (!dir.exists(dirname(emptyFile))) { dir.create(dirname(emptyFile), recursive = TRUE) } file.create(emptyFile) # Create a file with well-known contents. if (!dir.exists(dirname(contentsFile))) { dir.create(dirname(contentsFile), recursive = TRUE) } # Open in binary mode so the contents are identical on all platforms # (otherwise the file contains a \n on Unix and \r\n on Windows, which # hash differently) con <- file(contentsFile, open = "wb") writeLines("go bananas!", con) close(con) }) teardown({ unlink(emptyFile) unlink(contentsFile) }) expect_hash_type <- function(object) { expect_type(object, "raw") } test_that("we can hash an empty file", { rawEmptyMD5 <- fileMD5(emptyFile) expect_hash_type(rawEmptyMD5) emptyMD5 <- md5.as.string(rawEmptyMD5) expect_equal(emptyMD5, expectedEmptyMD5) expect_type(emptyMD5, "character") emptyMD5 <- fileMD5.as.string(emptyFile) expect_equal(emptyMD5, expectedEmptyMD5) expect_type(emptyMD5, "character") }) test_that("we can hash a file with well known contents", { rawContentsMD5 <- fileMD5(contentsFile) expect_hash_type(rawContentsMD5) contentsMD5 <- md5.as.string(rawContentsMD5) expect_equal(contentsMD5, expectedContentsMD5) expect_type(contentsMD5, "character") contentsMD5 <- fileMD5.as.string(contentsFile) expect_equal(contentsMD5, expectedContentsMD5) expect_type(contentsMD5, "character") }) test_that("we can hash when not supplied a filename", { rawMissingMD5 <- fileMD5(NULL) expect_hash_type(rawMissingMD5) missingMD5 <- md5.as.string(rawMissingMD5) expect_equal(missingMD5, expectedMissingMD5) expect_type(missingMD5, "character") missingMD5 <- fileMD5.as.string(NULL) expect_equal(missingMD5, expectedMissingMD5) expect_type(missingMD5, "character") }) rsconnect/tests/testthat/tf-human-readable-saved-model/0000755000175000017500000000000013236716400023060 5ustar nileshnileshrsconnect/tests/testthat/tf-human-readable-saved-model/1/0000755000175000017500000000000013236716400023220 5ustar nileshnileshrsconnect/tests/testthat/tf-human-readable-saved-model/1/saved_model.pbtxt0000644000175000017500000000000613236716400026561 0ustar nileshnileshbogus rsconnect/tests/testthat/helper.R0000644000175000017500000000113413250256314017006 0ustar nileshnilesh # last HTTP request made httpLastRequest <- list() # HTTP function which just saves the result for analysis httpTestRecorder <- function(protocol, host, port, method, path, headers, contentType = NULL, file = NULL, certificate = NULL, writer = NULL, timeout = NULL) { httpLastRequest <<- list( protocol = protocol, host = host, port = port, method = method, path = path, headers = headers, contentType = contentType, file = file, certificate = certificate, writer = writer, timeout = timeout ) } rsconnect/tests/testthat/shinyapp-with-browser/0000755000175000017500000000000013632232206021670 5ustar nileshnileshrsconnect/tests/testthat/shinyapp-with-browser/server.R0000644000175000017500000000050713632232206023323 0ustar nileshnileshlibrary(shiny) shinyServer(function(input, output) { output$distPlot <- renderPlot({ # open Google. no reason, just do it browseURL("https://www.google.com/") dist <- rnorm(input$obs) hist(dist) # stop to examine state browser() }) output$obs <- renderText({paste(input$obs, "\n", input$obs)}) }) rsconnect/tests/testthat/shinyapp-with-browser/ui.R0000644000175000017500000000041213632232206022425 0ustar nileshnileshlibrary(shiny) shinyUI(pageWithSidebar( headerPanel("Hello, Shiny!"), sidebarPanel( sliderInput("obs", "Number of observations:", min = 1, max = 1000, value = 500)), mainPanel( plotOutput("distPlot"))) ) rsconnect/tests/testthat/test-cert.R0000644000175000017500000001040313744617735017460 0ustar nileshnileshcontext("certificates") cert_test_that <- function(test, expr) { config_dir <- tempfile() dir.create(config_dir) # preserve old values home <- Sys.getenv("HOME") http <- getOption("rsconnect.http") on.exit({ # clean up temp folder unlink(config_dir, recursive = TRUE) # restore HOME Sys.setenv(HOME = home, add = TRUE) # clean up options options(rsconnect.http = http) }, add = TRUE) # temporarily change home to a temp folder so we don't litter the actual # config folder with test output Sys.setenv(HOME = config_dir) # record HTTP calls rather than actually performing them options(rsconnect.http = httpTestRecorder) test_that(test, expr) } cert_test_that("certificates can be saved", { # add a server with a sample certificate addServer(url = "https://localhost:4567/", name = "cert_test_a", cert = "certs/sample.crt", quiet = FALSE) # read it back info <- serverInfo("cert_test_a") # compare with the contents of the cert we read certLines <- paste(readLines("certs/sample.crt"), collapse = "\n") expect_equal(certLines, info$certificate) }) cert_test_that("certificates can be added", { # add a server without a certificate addServer(url = "https://localhost:4567/", name = "cert_test_b", quiet = FALSE) # add the certificate addServerCertificate(name = "cert_test_b", certificate = "certs/sample.crt") # read the server info info <- serverInfo("cert_test_b") # see if the cert we added is there certLines <- paste(readLines("certs/sample.crt"), collapse = "\n") expect_equal(certLines, info$certificate) }) cert_test_that("certificates can't be attached to plain http servers", { expect_error(addServer(url = "http://localhost:4567", name = "cert_test_c", certificate = "certs/sample.crt")) addServer(url = "http://localhost:4567", name = "cert_test_d") expect_error(addServerCertificate(name = "cert_test_d", certificate = "certs/sample.crt")) }) cert_test_that("system and server cert stores are concatenated", { # use a dummy CA bundle oldCaOpt <- getOption("rsconnect.ca.bundle") options(rsconnect.ca.bundle = file.path(getwd(), "certs", "store.crt")) on.exit(expr = { options(rsconnect.ca.bundle = oldCaOpt) }, add = TRUE) # create and then read the temporary certificate file concatenated <- createCertificateFile(readLines("certs/localhost.crt")) on.exit(expr = { unlink(concatenated) }, add = TRUE) store <- paste(readLines(concatenated), collapse = "\n") # make sure that the localhost and system stores both exist in the # concatenated store expect_true(grepl("localhost", store, fixed = TRUE)) expect_true(grepl("system", store, fixed = TRUE)) }) cert_test_that("invalid certificates cannot be added", { expect_error( addServer(url = "https://localhost:4567/", name = "cert_test_e", cert = "certs/invalid.crt", quiet = FALSE)) }) cert_test_that("multiple certificates can exist in the same file", { addServer(url = "https://localhost:4567/", name = "cert_test_f", cert = "certs/two-cas.crt", quiet = FALSE) # read it back info <- serverInfo("cert_test_f") # compare with the contents of the cert we read certLines <- paste(readLines("certs/two-cas.crt"), collapse = "\n") expect_equal(certLines, info$certificate) }) cert_test_that("certificates not used when making plain http connections", { GET(list( protocol = "http", host = "localhost:4567", port = "80", path = "apps" ), authInfo = list( certificate = "certs/localhost.crt" ), "apps") expect_equal(httpLastRequest$certificate, NULL) }) cert_test_that("certificates used when making https connections", { GET(list( protocol = "https", host = "localhost:4567", port = "443", path = "apps" ), authInfo = list( certificate = "certs/localhost.crt" ), "apps") # we expect to get a cert file expect_true(file.exists(httpLastRequest$certificate)) # clean up unlink(httpLastRequest$certificate) }) rsconnect/tests/testthat/test-lint.R0000644000175000017500000000640214051210517017450 0ustar nileshnileshcontext("lint") test_that("linter warns about absolute paths and relative paths", { ## Create a local file that 'server.R' tries to use testDir <- "~/.rsconnect-tests" exists <- file.exists(testDir) dir.create("~/.rsconnect-tests", showWarnings = FALSE) file.create("~/.rsconnect-tests/local-file.txt") serverPath <- list.files("shinyapp-with-absolute-paths", pattern = "server\\.R$") result <- lint("shinyapp-with-absolute-paths") absPathLintedIndices <- result[[serverPath]]$absolute.paths$indices expect_identical(as.numeric(absPathLintedIndices), 15) relPathLintedIndices <- result[[serverPath]]$invalid.relative.paths$indices expect_identical(as.numeric(relPathLintedIndices), 16) if (!exists) unlink(testDir, recursive = TRUE) }) test_that("badRelativePaths identifies bad paths correctly", { path <- "R/test.R" ok <- "file.path('../inst/include')" expect_false(badRelativePaths(ok, path = path)) bad <- "file.path('../../elsewhere')" expect_true(badRelativePaths(bad, path = path)) ok <- "'../foo', '../bar', '../baz'" expect_false(badRelativePaths(ok, path = path)) }) test_that("The linter identifies invalid application structures", { expect_error(lint("shiny-app-in-subdir")) lint("shiny-app-in-subdir/my-app") }) test_that("The linter identifies files not matching in case sensitivity", { result <- lint("shinyapp-with-absolute-paths") server.R <- result[["server.R"]] filepath.capitalization <- server.R[["filepath.capitalization"]] expect_equal(as.integer(filepath.capitalization$indices), 31) }) test_that("The linter identifies files with Markdown links not matching in case sensitivity", { result <- lint("test-rmd-bad-case") index.Rmd <- result[["index.Rmd"]] filepath.capitalization <- index.Rmd[["filepath.capitalization"]] expect_equal(as.integer(filepath.capitalization$indices), 29) }) test_that("The linter believes that the Shiny example apps are okay", { examples <- list.files(system.file("examples", package = "shiny"), full.names = TRUE) if (length(examples)) { results <- lapply(examples, lint) lints <- suppressMessages(lapply(results, printLinterResults)) lapply(lints, function(project) { lapply(project, function(file) { lapply(file, function(linter) { expect_true(length(linter$indices) == 0) }) }) }) } }) test_that("The linter identifies browser() statements correctly", { result <- lint("shinyapp-with-browser") server.R <- result[["server.R"]] browseLines <- server.R[["browser"]] expect_true(browseLines$indices == 9) }) test_that("The linter identifies browseURL() statements correctly", { result <- lint("shinyapp-with-browser") server.R <- result[["server.R"]] browseLines <- server.R[["browseURL"]] expect_true(browseLines$indices == 5) }) test_that("The linter accepts a plumber API", { result <- lint("test-plumber") expect_false(is.null(result$plumber.R)) }) test_that("The linter accepts a TensorFlow Saved Model", { lint("tf-saved-model") lint("tf-human-readable-saved-model") lint("tf-saved-model-rootdir") expect_true(TRUE) # didn't stop() }) test_that("Linters can run on files with multibyte characters", { lint("multibyte-characters") expect_true(TRUE) # didn't stop }) rsconnect/tests/testthat/shinyapp-simple/0000755000175000017500000000000014144740654020537 5ustar nileshnileshrsconnect/tests/testthat/shinyapp-simple/server.R0000644000175000017500000000031312662674016022166 0ustar nileshnileshlibrary(shiny) shinyServer(function(input, output) { output$distPlot <- renderPlot({ dist <- rnorm(input$obs) hist(dist) }) output$obs <- renderText({paste(input$obs, "\n", input$obs)}) }) rsconnect/tests/testthat/shinyapp-simple/ui.R0000644000175000017500000000041212662674016021275 0ustar nileshnileshlibrary(shiny) shinyUI(pageWithSidebar( headerPanel("Hello, Shiny!"), sidebarPanel( sliderInput("obs", "Number of observations:", min = 1, max = 1000, value = 500)), mainPanel( plotOutput("distPlot"))) ) rsconnect/tests/testthat/shinyapp-singleR/0000755000175000017500000000000012662674016020652 5ustar nileshnileshrsconnect/tests/testthat/shinyapp-singleR/single.R0000644000175000017500000000056612662674016022265 0ustar nileshnileshserver <- function(input, output) { output$distPlot <- renderPlot({ hist(rnorm(input$obs), col = 'darkgray', border = 'white') }) } ui <- fluidPage( sidebarLayout( sidebarPanel( sliderInput("obs", "Number of observations:", min = 10, max = 500, value = 100)), mainPanel(plotOutput("distPlot")))) shinyApp(ui = ui, server = server) rsconnect/tests/testthat/shinyapp-with-absolute-paths/0000755000175000017500000000000012562127530023144 5ustar nileshnileshrsconnect/tests/testthat/shinyapp-with-absolute-paths/ShinyPresentation.Rmd0000644000175000017500000000231212464431736027303 0ustar nileshnilesh--- title: "Shiny Presentation" author: "Miles Edgeworth" date: "July 16, 2014" output: ioslides_presentation runtime: shiny --- ## Shiny Presentation This R Markdown presentation is made interactive using Shiny. The viewers of the presentation can change the assumptions underlying what's presented and see the results immediately. To learn more, see [Interative Documents](http://rmarkdown.rstudio.com/authoring_shiny.html). Here's some internal help: [Helpful Link](/Users/MrBurns/) And another: [Favourite Goats](../../goats.txt) ## Slide with Interactive Plot ```{r, echo=FALSE} inputPanel( selectInput("n_breaks", label = "Number of bins:", choices = c(10, 20, 35, 50), selected = 20), sliderInput("bw_adjust", label = "Bandwidth adjustment:", min = 0.2, max = 2, value = 1, step = 0.2) ) renderPlot({ hist(faithful$eruptions, probability = TRUE, breaks = as.numeric(input$n_breaks), xlab = "Duration (minutes)", main = "Geyser eruption duration") dens <- density(faithful$eruptions, adjust = input$bw_adjust) lines(dens, col = "blue") }) ``` ## Slide with Bullets - Bullet 1 - Bullet 2 - Bullet 3 ## Slide with R Code and Output ```{r} summary(cars) ``` rsconnect/tests/testthat/shinyapp-with-absolute-paths/server.R0000644000175000017500000000204712562127530024600 0ustar nileshnilesh # This is the server logic for a Shiny web application. # You can find out more about building applications with Shiny here: # # http://shiny.rstudio.com # library(shiny) shinyServer(function(input, output) { output$distPlot <- renderPlot({ # read a file on disk otherFile <- read.table("~/.rsconnect-tests/local-file.txt") anotherFile <- readLines('../../foo.bar') serverFile <- "\\\\server\\path\\to\\file" validWeblink <- "//www.google.com/" # generate bins based on input$bins from ui.R x <- faithful[, 2] bins <- seq(min(x), max(x), length.out = input$bins + 1) # don't warn on this line text <- paste0("x:", round(new_row$x, 2), " y:", round(new_row$y, 2)) # draw the histogram with the specified number of bins hist(x, breaks = bins, col = 'darkgray', border = 'white') ## read a csv file file <- read.csv("college.txt") ## bad file <- read.csv("College.txt") ## okay ## don't warn about absolute paths that could be URL query paths file <- paste("/applcations") }) }) rsconnect/tests/testthat/shinyapp-with-absolute-paths/ui.R0000644000175000017500000000123112464431736023710 0ustar nileshnilesh # This is the user-interface definition of a Shiny web application. # You can find out more about building applications with Shiny here: # # http://shiny.rstudio.com # library(shiny) shinyUI(fluidPage( # Application title titlePanel("Old Faithful Geyser Data"), # Some image img(src="/images/icon.png"), # Sidebar with a slider input for number of bins sidebarLayout( sidebarPanel( sliderInput("bins", "Number of bins:", min = 1, max = 50, value = 30) ), # Show a plot of the generated distribution mainPanel( plotOutput("distPlot") ) ) )) rsconnect/tests/testthat/shinyapp-with-absolute-paths/ShinyDocument.Rmd0000644000175000017500000000407312464431736026414 0ustar nileshnilesh--- title: "Shiny Document" author: "Phoenix Wright" date: "July 16, 2014" output: html_document runtime: shiny --- This R Markdown document is made interactive using Shiny. Unlike the more traditional workflow of creating static reports, you can now create documents that allow your readers to change the assumptions underlying your analysis and see the results immediately. To learn more, see [Interative Documents](http://rmarkdown.rstudio.com/authoring_shiny.html). ## Inputs and Outputs You can embed Shiny inputs and outputs in your document. Outputs are automatically updated whenever inputs change. This demonstrates how a standard R plot can be made interactive by wrapping it in the Shiny `renderPlot` function. The `selectInput` and `sliderInput` functions create the input widgets used to drive the plot. ```{r, echo=FALSE} inputPanel( selectInput("n_breaks", label = "Number of bins:", choices = c(10, 20, 35, 50), selected = 20), sliderInput("bw_adjust", label = "Bandwidth adjustment:", min = 0.2, max = 2, value = 1, step = 0.2) ) renderPlot({ hist(faithful$eruptions, probability = TRUE, breaks = as.numeric(input$n_breaks), xlab = "Duration (minutes)", main = "Geyser eruption duration") dens <- density(faithful$eruptions, adjust = input$bw_adjust) lines(dens, col = "blue") }) ``` ## Embedded Application It's also possible to embed an entire Shiny application within an R Markdown document using the `shinyAppDir` function. This example embeds a Shiny application located in another directory: ```{r, echo=FALSE} shinyAppDir( file.path("~/home/file.txt"), options=list( width="100%", height=550 ) ) ``` Note the use of the `height` parameter to determine how much vertical space the embedded application should occupy. You can also use the `shinyApp` function to define an application inline rather then in an external directory. In all of R code chunks above the `echo = FALSE` attribute is used. This is to prevent the R code within the chunk from rendering in the document alongside the Shiny components. rsconnect/tests/testthat/shinyapp-with-absolute-paths/subdir/0000755000175000017500000000000012464431736024443 5ustar nileshnileshrsconnect/tests/testthat/shinyapp-with-absolute-paths/subdir/Genetics.txt0000644000175000017500000000000012464431736026733 0ustar nileshnileshrsconnect/tests/testthat/shinyapp-with-absolute-paths/College.txt0000644000175000017500000000000012464431736025254 0ustar nileshnileshrsconnect/tests/testthat/test-shinyApp/0000755000175000017500000000000012464431736020166 5ustar nileshnileshrsconnect/tests/testthat/test-shinyApp/test-shinyApp.tar.gz0000644000175000017500000001566012464431736024075 0ustar nileshnilesh‹í\msÛF’Î×ðWL1©2U!A$H‘I¶lËNb¯í¨D;»[ç«ì’ˆ@€‹IÌ^î·ßÓ=”HYŠcïÖ­Y‰E3==3ýòtOVß:[Fy‘f›Ï>ÔÇÆg4òßñÈã¿¶«ãã8¶÷™ãƶç¸îØþÌv\{ì~&ìÆQãSæ…ÌÀʹºˆ’[Ú¡Ù|þ1ú¸Ÿµ Î3YL§˜_Qæ£V}%J¢¿CuQ¤iœÓ4ŠãŸQ±,ýN;Ë‹2ŒÒ¾éѾٷþí—I«Î<Š•øV´ûor•å}^ó>Èõƒ4ITPôu»¼_¨¼èåË(Ù¿ûcõ«­´~Á^~1n·ÿƒì~Ãþ»dÿÇ#ç“ýÿŸ¶>o_@Åa±Úb*œ.~¯cYÌÓlEÚ˱œ6_†1— •Óetû\ÛÜê×çíPåA­ CŠ/~Þ>Õ½˜–îÐÕ7^oÖújÕ¢º±¾ñ勦Eý.“+u™fç܉³ªÃO[öÛ¶åØš]ºóDš’k;Þ=ê9ƒêÖ£²X¦ß<›±ëŠgI`U÷_Ê()ð¿ÒmþBþ,œ,e²ß\ꟴ‚tõ§zÐÝehÏhÒb%ÏU.¢BDIÁmøñF(™oD‘ ¿Œâ7 •É ˆ.”¸TþÛDà#·ÓÏÅ%|8³xOW¸ˆ·íLé.oÛÂ’0w¾*.•J@p]¹I¨i¥eQ]êªPINC­3Õ# árf•8]§y>UÍ¢&ã+YѼŒ»"Sù:e2]¦ºN/U†;{Ø^¬d,Ô{WÔËü" À‡Þ¤ïO_ôÛU\«$Ìõ‰ÎŸ¾®å -ç¨+V [‡[¦å³¹YÝ’ÁAW€?ú³,0á îìX®e£o _ë&gÏg?¾zöcW\sì¾ÅÚA¶ 굊™w´ÑqxT5+ÔHÊBæX°®8‘Q–šq¼ž‡q¿K rç@B™¹7:Â8+™‡éeRÑ|sö‚É·Ó~ÿòòÒjˆ•ýªñãrq¦¶ó¥>9:iÄí+P¦ûEy^ªz©NÒ8®TâöÈ:{ øiZäE&×½Xn #|q%õÍEœú2Îù;¯*¾½M¶}øF ƒ¥âo„JàêÞh±äoË4=7}i}{@'šh½Úü "²PÕ8âÁ/ÿ(U¶)#Ýq…À&—˓ӌÖùç:‹Ò,*6èXê+¬ š@¥+½ê ÞÞÇEó«Lzeów XFÝu; c–Ì÷KLr d®¤—¤Bÿˆ£°"@–®ÑJéoå¤z¬¥¸P푱†aÃn{®'œÉt0žzñæõÉ× ªÓ+¥B ÓÕ:Šemx’´ºM"“Gãñ“³G¯š&²Zú•ºî;ödj»Ó»@˜ £•ì¾_‹ºý˜Ú{îÔh6Ë$ºjSÇßðÏoD¢]iï=ÜÆ5…oÚûÚ;q³ù|ÇÇ.ì3,]7}Íwðw0O/õPlÍNb™ç[åiz q’fJ¼VruÀ_4ZˆoÎz~<Ìzë,ýQŽ•f‹ƒîB3ïª9È…•¹c–Í’ö"õ‰ZÞ%»¼ŽË\¤ÅRe°è)oµ"_` ¢Ì…^f_‘£hã=W™Jµ•sA/Ôót™ˆ—¹¼•%×¶Äßÿ>Kçi³’âQ"ãMåÓ·Éictí°<øZÌ ˜É̽úÛ^Û*³B¤sa„êi»:ý<öÈÃ@‘eMpè–½Ã#ìÁtx<xÅæ>B¨;ünÜJ; ^:C^ûezÜ9løáõëS^iij48W…Ю\˜ʾ½w¬eˆðß㆓t½É¢Å²¸Ùäkñ<ݰ^é_¯Qre¾?[@g›+˜†Œ ‚cA§QøþÙw]ñx4DÜþã‰xôæ¤+T±5º»†Üï³ãž³³ÇŽ?”=¯Ëü×M’ŸG°Œ2KóX^Z—VQ]}˜Ë(ر“×,ë2+‹M™ˆ?/Ë"ÛÀÚ|s¾üyI7n$Bàkvö¦ ¹ ¥h*ŽAY×kº“…xùh6ƒ‰#CvÈ‚Ã_£9Ü ¼ ¢À™(¸‰(7—dL«íÐÖƒ> ƒ+ªL|9º±U[B”’aÿø‰ÍÑ– ö’ àÓW?=£„¼1Ût™Ë¼ŒÉ3Ü„Õä~‘Bë§i^lép Í#•ui6 È%…쇊ÿ‚‡´LÂ^:Ÿ •e°‰ó –2/W[* ÇÊUNŽ´)O³R{ ëFºC¾Z‘–çZ>´)ÀÀÐà¡=õ¼÷7ØéÐ=h LÂì>¦ ê²WKÝžm¹7­Á àEÆÑ¯jß’K&J]ñ\^È*~ä{âUº‰Üp–ðÅá„*À¡¬|6PLNPÜä¾i ’Æ$ ”Ü£H™†Ô$ ;"1CŠ1u$´eÀ£Ú;ìûäná| ¿i>5ÙþÓ¨°þúˆÕÇ̤˜ˆ[5Í*¶§xdHͪ 3)x8€ç£5[þˆEÄr1JÉÙf"D‡?ÕYhˆEª–æRÒX©ÈÁƒ 3™ë˜ÎonUÅ7ÆÂrUÙfʳaù‰ö0JQ²˜±c?a øØè¨4#¨µe¾ÚÅ’² itA-€ö@hBŒ””Æ9^F½DXDÝs½.µ±"Ú4äÙÈMŒ²1+€Qjøak¬‰m 5ª»Î“‰ºfa5âꊈ€$ƒƈ§“¼_õFCÚNê݆ºó W° ”4‚ýR;M4‹ †4'þ &ˆ1z@˜‹¤ZÅ#³Œ”úÉ˸Ðz‘G‹†4LV^ÕëN”ôórT±^J¨_¥¶J4Ø$Mö©ßÏÀE€ûê[¿Fk^nú‘[ !—oâ›·Š5Рe-”:Ø}›tÌæ†•§e(ЂÄ"<:Úk¾Ïžü<øî‚øj/–m:Úk൞@^°â¯í¥x!·Hï¸ÙP|òµ‘{‹’BÓšYgˆn~’”UÆ6ý© ñ§}†-#Ò?PtE¹dx`t[Yg·{©‰p‚«®­m<ŒL¬6wõQ#™Ë?Ìs™Á”rÅÃ÷ñ\þ#îM¦¶sÐséžû8.Óc¯ß7Ψši‚¾íôíã›M‚)²%y!_«¿ hÀ¯_¾Ø'hq¶xl‰'rCtðïCÂXV!W¥¥Âò=Ò¤1Ε õßP§<ˆ.V2Šo ñORMÒ>¯æ,±hX?p\¥—ÊÊzZw$¼Ôuìppé&Gw²í­þYï;b¡ªس‘{Ÿ©‹¨ÞÜáð––´Ù¯£•šaÖ av(ëaö\ˆá„qÈH¸Ît€Àq|‹ÆjºÞÔA€Vi,¯ñÏ|öèÓ.à’ÚT±ëµÑç¡÷QÓcï±üÈÞP›/éÛTpp溴.ÞK#°H¶-:/Ó¤+pý‰ ¸Ù‘ørŸÆDÙ¹x†*öKU Z£Âða¨üH²ú“>‰¨3¯ à ýx4 /Ê@æ„0wbÁ®øA%Yt.#²/òœØ™E+x¥7™/uNg//e¥Tœ*~/Ôer/Ë,“1+Òso@M& 4ôe©–±ŠHKIË@Ã8 ´‡“]ªBx÷DoÚŸ“ÌÊ6ë"åYDjK™/…Þ®\g Ô9Œ£•i_Ã:!(k,%è6£ÚÇ£&Çù4Ñ]Yfˆm))Û‘_£Þ«ÐëŠ|){N—(Ñ7×i<—XiAiúå*?€~«¨`(Ä©”jÐlà<nœ 5’ǹГeFÕËë%£AS,f€çÙ­ u)v¬Nhî=ÔˆKÏq©ŽåÚÈl%d–ÒìžXâûˆ*Xº·™õi ‘#,[˜sg–&Z)©Ã2Ÿ2ºTŸ‰I¢°’4t]fð@æ¤WçWtD"©¥©ÝéКÒé;H¤VáÑ6Ÿ,ò!Ù?ÂÿÎf/0Ë´ŒCžy¿Í?S­Í¡|ˆ{ „°O@([û¤%›Ð×*oQ¹Ç!§§À@ØC*9°mkà‡Î±vP úÓ)õÐãé`2uV;Ü+³êÞvjY×½Üï$¬êt¿ì*KQnîúfwo®öÞŒé]*æ~ÇIÓ.¯b¡Õ8yÖåkï¬;XóÑ»ød'‹Zem+·ªfOÚUMsÝ ´îtgìŽ)cWÞáÌà}Ëx0ê±@Üç9 €z :ÔíGSÊiNšŒô=„w7‡½Tٽќýqo›ÎoHà T´ˆJf¾R°†OÊâ|ƒ°'¤¿ •­e\®¬rrÔ$虄ζ `Íõäg@ï% °SpZäMa‚Ò©¶U²ÓÝRÙåà€>\£)¾Y™o:¸[Ébi©bù«,÷ ¸ÇQ@©È›ôÖÁú¡:›OŠä›~´Xšð *ãè¼Y~(ïý‰6»C¶Î;žzc-+Õ´>¨µÖ#Zpìéà½Rµµö¦îáXˆ$ï“ùna6sÛr…Hšò¸œ›üê+>Û_d;)ìkåÌÎ6K~£œÙíQAB¨“ê)DI‚”â’çÏÅ£8–Q¦ºâÏ›Äz(„¡â“´\ÄÀ )©ëz¹¬ª{ïØd_lÁ'Ã7"‹F–v§ÓÒŽ5>šË€Î³$0¥e<«ãŽzÉ+ÀvfÒð ˆ8fOÿzzÄ Š›J£Qª˜K$õ©“XFÐ¥,Xn,A«ÈöD“aP® @¡cÔ«Û<SÉE,©ë«T˲Žt²\É`iH`\QY)ó!CÒe*5dUW’€jW$%•|•: “) E„˜…®”à¦È‘UÕ´äÓé+Ý÷'ï0yjšÒÓæÌû–©kAM÷¨LU½3½eíéaÿ²4,¹ÁÛ¶¸ˆ ‰U3ì\¤)YaК_#Œ×Gè]mòÉö€‡cÚQÎþÓzÓa@:K+ÎÉyÊÛrò]3Iå½&€ÒHYàhfËh±¤´y¬®¸T¾áKø´ƒ /MÖœ=†©½4sä–tÞÚ˜`-Ÿ¤2ÎÓ†:Ð%¸Ÿ’ÏK­ÖÏC4µÔT>»¥é6v¢Q@ŠE`\ɳ³ðf€K *¨z¬/‚2Ëèt!W\96Gt\f[I¨ìLDŸ,ó®Ñ™…ZóQo¬ô¢Bi2Ó³ð©P”¤?Ù\;¥áƒ3Ò`1ÓÍù‘ ^ ¨"³Á‡¿n„º€ßßâF¬¸Ó‡|ÕÞ¾Õ~Tn{A>eøLÜÑc3«•¤øtƒ1®4‡¤›W%𖙦D‡ | CëCµ'`–h[+§éZ§škÍóÞ]ée( M!¹‘º¬ôÕ¬ó®|:¡¥òJJÀ+ÉdU¡¥ÙÖÇ[Ø{Z[ZBЉ›–•ö‚2¥ZK´zÈê)®F®À¸É˘À:Óu6l¥¢ä"=gÛ»"øåŒô¤®ÙBÆ¡¦r'½³õ£/æ‹D·ªƒ¤åùu'BU­à=õ«Öu&®×d5õÉÔJû(»ž r.ÎûðiÜeZråæy¥ÎQS±:>5;ô’DØéjX BíU%(ˆ‰mä(ô‰‘G|Å„ô­ª79 #º4[R&ª¦ûÌ¢ÌâˆAž6€fÂ]NƒÂosµÎ©ÐËÏæ.®¸9¨=:}ö€©žÛ(Â’åȵßÒDðeDæóIJåÂ0ª30¯b™C[>×[²á÷éÁ$œâ®ÞÖn¾ÚIºz¢9Ñëéœb¹˜ ò ’–Y>’ÉÍÄ>µÔ»’ÆTɲ…¡x¯ L ù0Ù¢_ÊMn´8Êwѹ:%ëDÏ£íÒïÔBóijÍÓE$Íd°´6;ÈHËZǨ°ÞqÊf³#Ó¡J×ùiz~£75të’ú£¯)1ªhß"ÍJG[—·m“†5Æû–tÏÀ²T];Ý šÏÞ@H»Fú»"óU,)’îj¿Èe°ª5Ž0zh ãFû…"oôØïÎ1q[Ê‘tß&{ Y  wý&:¿=äy÷ãV;D¯=n„L%S/"}ŒÒ69B¡PpáëÖ-§+ ¶2‡Àå¬,ƒEú6¡YõXlÆ™ï=k»%í0â§Át€ íØr‡CÇ|Œ¤šúX8.v ï¦Ð„ƒÞpj÷…i-ŽÔÚ\KVeíúÕÛØkòÒ<Û:Ÿ¡ë†þÈzÎ< ‡{èü#]{.ÛuX= v€8Á\ †rä:vp¬†Ê÷œÀºs?+oØ T¿ `û,~¿~ѽ `ÿNè…sÛ›xÉò”;`|Ѳ× ãíôlÚ"¾òFÎܸÎñhîÇàr2g>‡áX1+ÉþS¯¤ŒãÖoŸžñÿÿù±ª·wô?ÜüÜ¿çzÿ }®=ÿïŒqIxŽ¥íç?üùÿíþ›¿=FñÇŽñŽ÷ÿ¸0š×öèÒþÛ,û?ÿáûªwŸ:-¦Â±†-sÉä!§Tëx8jÕWø‰°C‚© (ð­g mýô:¡¶åÇGé W­ü(E B¹4ã:¡êQ>p(ßÝö“Ir·n”Í룵©ÎÝR@ hÈ…“X E&ïFƒ›¶Z…M…>ôh͸TQ¯U«^F>÷hý óåT¾;ކòÎyä#ߎ=çx2“Ó iž°8HÔšjàÙþ|8ðÝñx åúÞÀ‚pîªÌ‡aË<&“×|nÑgeÆàržj¡?·Õxâ;žx®çØÐ;Tà“£ÜÍúøò Y·&{|ÎðØc÷ØõFCûXJÑÄ›„NƒwÃjsz~çàú`ŸÌ c€a>¶'5 F#}w†Ò·þœÉxÞ„àxcc,ë1tDк¡3zœ‰+ÇÇn ÆîØ…@o#? Sž ÆÇòøx>æ@saë{&CеB_£f%r…¡ŒzÕmçS±âª]se¶”Î=†ÜΉ§xhgè¢Úñ¹ë;ÒSC/t†#×µ ñújx¬FvSTÍ·‚0dçC©Àó œC^'þñDÚáxàas8 ¼YÆË‡Yņ¦„l†X×A8{ Ô(x@çóù\\¿äÆ{@ª‰ÜxiHƒ#sáÐ<ǽAÅÑÜql×øÎОæcg2 ì@B̽ÁHºó³­~Ú|¸1Þõþ?ܽöþ?g4òÿãÓú¢~*„ËÎ̃Ò邞çJ3!…~ѵg`-ôû[Z *ZœGº:CW(IŸ¾ÖOåÞ|¦·T™š¶¾ãWõVe"¸¹ûλ£V‹ÿΘÇN•íðTº¦>äqo«z×Ñ—!ÂÿÓ8-Ä7=‘Q:£_n"ÄUV[Ñ£h$/Sü’¯qBœBjîqEÿ€Ö\b&ó2þ¯®pÿ›ïpcÜÉÕ?:«(é\Ñ“°òŠÿÆT<º´h]¾mÒþJ8G'a&/y8cAÏøèÕâM©ëü’’Ž`)gJ¸+µï\u…Ÿ)yžcºCIÞß„2;±Íz´8£|(.^.£B=à¡ÿ¿}zßîÇj¼òCq¿øŸßÿêŽÆŸâÿñiî##ù‡ŽqÿýéýŸöÿÃì3#ýÞc¼ÿa»¯ïÿhìzŸðßÇøè˜²ÚîêMÇS±•…–~'ð³p*DµÊ,žV¨­ñãZެêíƒDð_=¿OŸÛ?VŸÀí‡ã]ñŸã¹×ã?…Ÿôÿc|®Åtê׫K&ô;£ª†òß0|ó¬3Ë(<• Õ¡€æ‹7T{‹«ü÷T&*î´ŒCñ‰ßÄ÷jCïD¢—¶ºšÀ, •/3Í¡ú-ž:nãøF–ë/øõ©ŽÊÌ%=dK—‰kBψN§M]ÛÝ–¸ñi¿Ú!?ÝÛ&9gï-y…[ž½ïÆÑû÷ößÕ3æ9/ÓKzIÅʦެŠCAQtõÜdK%;S£~?rÈÝiW1wیѢÿ>ŘŸ>Ÿ>Ÿ>Ÿ>ÿ^ŸÿA&~¤hrsconnect/tests/testthat/shiny-app-in-subdir/0000755000175000017500000000000012464431736021220 5ustar nileshnileshrsconnect/tests/testthat/shiny-app-in-subdir/my-app/0000755000175000017500000000000012464431736022423 5ustar nileshnileshrsconnect/tests/testthat/shiny-app-in-subdir/my-app/server.R0000644000175000017500000000000012464431736024042 0ustar nileshnileshrsconnect/tests/testthat/shiny-app-in-subdir/my-app/ui.r0000644000175000017500000000000012464431736023211 0ustar nileshnileshrsconnect/tests/testthat/project-MASS/0000755000175000017500000000000012662674016017625 5ustar nileshnileshrsconnect/tests/testthat/project-MASS/MASS.R0000644000175000017500000000001612662674016020510 0ustar nileshnileshlibrary(MASS) rsconnect/tests/testthat/test-bundle.R0000644000175000017500000003341414010235533017756 0ustar nileshnileshcontext("bundle") makeShinyBundleTempDir <- function(appName, appDir, appPrimaryDoc, python = NULL) { tarfile <- bundleApp(appName, appDir, bundleFiles(appDir), appPrimaryDoc, "application", NULL, python = python) bundleTempDir <- tempfile() utils::untar(tarfile, exdir = bundleTempDir) unlink(tarfile) bundleTempDir } makeManifest <- function(appDir, appPrimaryDoc, python = NULL) { writeManifest(appDir, NULL, appPrimaryDoc, NULL, python) manifestFile <-file.path(appDir, "manifest.json") data <- readLines(manifestFile, warn = FALSE, encoding = "UTF-8") manifestJson <- jsonlite::fromJSON(data) unlink(manifestFile) manifestJson } # avoid 'trying to use CRAN without setting a mirror' errors repos <- getOption("repos") options(repos = c(CRAN = "https://cran.rstudio.com")) on.exit(options(repos = repos), add = TRUE) test_that("simple Shiny app bundle includes correct files", { skip_on_cran() bundleTempDir <- makeShinyBundleTempDir("simple_shiny", "shinyapp-simple", NULL) on.exit(unlink(bundleTempDir, recursive = TRUE)) # listBundleFiles only includes "user" files and ignores # generated files like the packrat and manifest data. files <- listBundleFiles(bundleTempDir) expect_identical(files$contents, c("server.R", "ui.R")) expect_identical(list.files(bundleTempDir), c("manifest.json", "packrat", "server.R", "ui.R")) }) test_that("bundle directories are recursively enumerated", { targetDir <- tempfile() dir.create(targetDir) on.exit(unlink(targetDir, recursive = TRUE)) # tree that resembles the case from https://github.com/rstudio/rsconnect/issues/464 files <- c( "app.R", "index.htm", "models/abcd/a_b_pt1/a/b/c1/1.RDS", "models/abcd/a_b_pt1/a/b/c1/2.RDS", "models/abcd/a_b_pt1/a/b/c1/3.RDS", "models/abcd/a_b_pt1/a/b/c1/4.RDS", "models/abcd/a_b_pt1/a/b/c1/5.RDS" ) # Create and write each file. sapply(files, function(file) { content <- c("this is the file named", file) targetFile <- file.path(targetDir, file) dir.create(dirname(targetFile), recursive = TRUE, showWarnings = FALSE) writeLines(content, con = targetFile, sep = "\n") }) infos <- file.info(file.path(targetDir, files)) totalSize <- sum(infos$size) totalFiles <- length(files) result <- listBundleFiles(targetDir) # Files are included in the list, count, and sizes, not directories. # Paths are enumerated relative to the target directory, not absolute paths. expect_identical(result$contents, files) expect_equal(result$totalSize, totalSize) expect_equal(result$totalFiles, totalFiles) }) test_that("simple Shiny app bundle is runnable", { skip_on_cran() bundleTempDir <- makeShinyBundleTempDir("simple_shiny", "shinyapp-simple", NULL) on.exit(unlink(bundleTempDir, recursive = TRUE)) expect_true(inherits(shiny::shinyAppDir(bundleTempDir), "shiny.appobj")) }) test_that("app.R Shiny app bundle is runnable", { skip_on_cran() bundleTempDir <- makeShinyBundleTempDir("app_r_shiny", "shinyapp-appR", NULL) on.exit(unlink(bundleTempDir, recursive = TRUE)) expect_true(inherits(shiny::shinyAppDir(bundleTempDir), "shiny.appobj")) }) test_that("single-file Shiny app bundle is runnable", { skip_on_cran() bundleTempDir <- makeShinyBundleTempDir("app_r_shiny", "shinyapp-singleR", "single.R") on.exit(unlink(bundleTempDir, recursive = TRUE)) expect_true(inherits(shiny::shinyAppDir(bundleTempDir), "shiny.appobj")) }) test_that("recommended packages are snapshotted", { skip_on_cran() bundleTempDir <- makeShinyBundleTempDir("MASS", "project-MASS", "MASS.R") on.exit(unlink(bundleTempDir, recursive = TRUE)) lockfile <- file.path(bundleTempDir, "packrat/packrat.lock") deps <- packrat:::readLockFilePackages(lockfile) expect_true("MASS" %in% names(deps)) }) test_that("simple Rmd as primary not identified as parameterized when parameterized Rmd in bundle", { skip_on_cran() bundleTempDir <- makeShinyBundleTempDir("rmd primary", "test-rmds", "simple.Rmd") on.exit(unlink(bundleTempDir, recursive = TRUE)) manifest <- jsonlite::fromJSON(file.path(bundleTempDir, "manifest.json")) expect_equal(manifest$metadata$appmode, "rmd-static") expect_equal(manifest$metadata$primary_rmd, "simple.Rmd") expect_equal(manifest$metadata$has_parameters, FALSE) }) test_that("parameterized Rmd identified as parameterized when other Rmd in bundle", { skip_on_cran() bundleTempDir <- makeShinyBundleTempDir("rmd primary", "test-rmds", "parameterized.Rmd") on.exit(unlink(bundleTempDir, recursive = TRUE)) manifest <- jsonlite::fromJSON(file.path(bundleTempDir, "manifest.json")) expect_equal(manifest$metadata$appmode, "rmd-static") expect_equal(manifest$metadata$primary_rmd, "parameterized.Rmd") expect_equal(manifest$metadata$has_parameters, TRUE) }) test_that("primary doc can be inferred (and non-parameterized dispite an included parameterized", { skip_on_cran() bundleTempDir <- makeShinyBundleTempDir("rmd primary", "test-rmds", NULL) on.exit(unlink(bundleTempDir, recursive = TRUE)) manifest <- jsonlite::fromJSON(file.path(bundleTempDir, "manifest.json")) expect_equal(manifest$metadata$appmode, "rmd-static") expect_equal(manifest$metadata$primary_rmd, "index.Rmd") expect_equal(manifest$metadata$has_parameters, FALSE) }) test_that("multiple shiny Rmd without index file have a generated one", { skip_on_cran() bundleTempDir <- makeShinyBundleTempDir("rmd primary", "shiny-rmds", NULL) on.exit(unlink(bundleTempDir, recursive = TRUE)) manifest <- jsonlite::fromJSON(file.path(bundleTempDir, "manifest.json")) expect_equal(manifest$metadata$appmode, "rmd-shiny") expect_true(file.exists(file.path(bundleTempDir, "index.htm"))) }) test_that("Rmd with reticulate as a dependency includes python in the manifest", { skip_on_cran() skip_if_not_installed("reticulate") python <- Sys.which("python") skip_if(python == "", "python is not installed") pipMissing <- system2(python, "-m pip help", stdout = NULL, stderr = NULL) skip_if(pipMissing != 0, "pip module is not installed") bundleTempDir <- makeShinyBundleTempDir("reticulated rmd", "test-reticulate-rmds", NULL, python = python) on.exit(unlink(bundleTempDir, recursive = TRUE)) lockfile <- file.path(bundleTempDir, "packrat/packrat.lock") deps <- packrat:::readLockFilePackages(lockfile) expect_true("reticulate" %in% names(deps)) manifest <- jsonlite::fromJSON(file.path(bundleTempDir, "manifest.json")) expect_equal(manifest$metadata$appmode, "rmd-static") expect_equal(manifest$metadata$primary_rmd, "index.Rmd") expect_true(file.exists(file.path(bundleTempDir, manifest$python$package_manager$package_file))) }) test_that("Rmd with reticulate as an inferred dependency includes reticulate and python in the manifest", { skip_on_cran() skip_if_not_installed("reticulate") python <- Sys.which("python") skip_if(python == "", "python is not installed") pipMissing <- system2(python, "-m pip help", stdout = NULL, stderr = NULL) skip_if(pipMissing != 0, "pip module is not installed") bundleTempDir <- makeShinyBundleTempDir("reticulated rmd", "test-reticulate-rmds", "implicit.Rmd", python = python) on.exit(unlink(bundleTempDir, recursive = TRUE)) lockfile <- file.path(bundleTempDir, "packrat/packrat.lock") deps <- packrat:::readLockFilePackages(lockfile) expect_true("reticulate" %in% names(deps)) manifest <- jsonlite::fromJSON(file.path(bundleTempDir, "manifest.json")) expect_equal(manifest$metadata$appmode, "rmd-static") expect_equal(manifest$metadata$primary_rmd, "implicit.Rmd") expect_true(file.exists(file.path(bundleTempDir, manifest$python$package_manager$package_file))) }) test_that("Rmd without a python block doesn't include reticulate or python in the manifest", { skip_on_cran() bundleTempDir <- makeShinyBundleTempDir("plain rmd", "test-rmds", "simple.Rmd", python = NULL) on.exit(unlink(bundleTempDir, recursive = TRUE)) lockfile <- file.path(bundleTempDir, "packrat/packrat.lock") deps <- packrat:::readLockFilePackages(lockfile) expect_false("reticulate" %in% names(deps)) manifest <- jsonlite::fromJSON(file.path(bundleTempDir, "manifest.json")) expect_equal(manifest$metadata$appmode, "rmd-static") expect_equal(manifest$metadata$primary_rmd, "simple.Rmd") expect_equal(manifest$python, NULL) }) test_that("Rmd without a python block doesn't include reticulate or python in the manifest even if python specified", { skip_on_cran() python <- Sys.which("python") skip_if(python == "", "python is not installed") bundleTempDir <- makeShinyBundleTempDir("plain rmd", "test-rmds", "simple.Rmd", python = python) on.exit(unlink(bundleTempDir, recursive = TRUE)) lockfile <- file.path(bundleTempDir, "packrat/packrat.lock") deps <- packrat:::readLockFilePackages(lockfile) expect_false("reticulate" %in% names(deps)) manifest <- jsonlite::fromJSON(file.path(bundleTempDir, "manifest.json")) expect_equal(manifest$metadata$appmode, "rmd-static") expect_equal(manifest$metadata$primary_rmd, "simple.Rmd") expect_equal(manifest$python, NULL) }) test_that("writeManifest: Rmd with reticulate as a dependency includes python in the manifest", { skip_on_cran() skip_if_not_installed("reticulate") python <- Sys.which("python") skip_if(python == "", "python is not installed") pipMissing <- system2(python, "-m pip help", stdout = NULL, stderr = NULL) skip_if(pipMissing != 0, "pip module is not installed") appDir <- "test-reticulate-rmds" manifest <- makeManifest(appDir, NULL, python = python) requirements_file <- file.path(appDir, manifest$python$package_manager$package_file) expect_equal(requirements_file, "test-reticulate-rmds/requirements.txt") on.exit(unlink(requirements_file)) expect_equal(manifest$metadata$appmode, "rmd-static") expect_equal(manifest$metadata$primary_rmd, "index.Rmd") expect_true(file.exists(requirements_file)) }) test_that("writeManifest: Rmd with reticulate as an inferred dependency includes reticulate and python in the manifest", { skip_on_cran() skip_if_not_installed("reticulate") python <- Sys.which("python") skip_if(python == "", "python is not installed") pipMissing <- system2(python, "-m pip help", stdout = NULL, stderr = NULL) skip_if(pipMissing != 0, "pip module is not installed") appDir <- "test-reticulate-rmds" manifest <- makeManifest(appDir, "implicit.Rmd", python = python) requirements_file <- file.path(appDir, manifest$python$package_manager$package_file) expect_equal(requirements_file, "test-reticulate-rmds/requirements.txt") on.exit(unlink(requirements_file)) expect_equal(manifest$metadata$appmode, "rmd-static") expect_equal(manifest$metadata$primary_rmd, "implicit.Rmd") expect_true(file.exists(requirements_file)) }) test_that("writeManifest: Rmd without a python block doesn't include reticulate or python in the manifest", { skip_on_cran() manifest <- makeManifest("test-rmds", "simple.Rmd", python = NULL) expect_equal(manifest$metadata$appmode, "rmd-static") expect_equal(manifest$metadata$primary_rmd, "simple.Rmd") expect_null(manifest$python) }) test_that("writeManifest: Rmd without a python block doesn't include reticulate or python in the manifest even if python specified", { skip_on_cran() python <- Sys.which("python") skip_if(python == "", "python is not installed") manifest <- makeManifest("test-rmds", "simple.Rmd", python = python) expect_equal(manifest$metadata$appmode, "rmd-static") expect_equal(manifest$metadata$primary_rmd, "simple.Rmd") expect_equal(manifest$python, NULL) # Confirm that we have removed packrat entries from our file listing but # retain entries for other files. filenames <- names(manifest$files) expect_false(any(grepl("^packrat/", filenames, perl = TRUE)), filenames) expect_true(any(grepl("simple.Rmd", filenames, fixed = TRUE)), filenames) }) test_that("getPython handles null python by checking RETICULATE_PYTHON", { skip_on_cran() Sys.setenv(RETICULATE_PYTHON="/usr/local/bin/python") expect_equal(getPython(NULL), "/usr/local/bin/python") Sys.unsetenv("RETICULATE_PYTHON") }) test_that("getPython handles null python and empty RETICULATE_PYTHON", { skip_on_cran() Sys.unsetenv("RETICULATE_PYTHON") expect_equal(getPython(NULL), NULL) }) test_that("getPython expands paths", { skip_on_cran() result <- getPython("~/bin/python") expect_true(result != "~/bin/python") expect_match(result, "*/bin/python") }) test_that("getPythonForTarget honors rsconnect.python.enabled = FALSE", { skip_on_cran() options(rsconnect.python.enabled = FALSE) result <- getPythonForTarget("/usr/bin/python", list(server="shinyapps.io")) expect_equal(result, NULL) options(rsconnect.python.enabled = NULL) }) test_that("getPythonForTarget honors rsconnect.python.enabled = TRUE", { skip_on_cran() options(rsconnect.python.enabled = TRUE) result <- getPythonForTarget("/usr/bin/python", list(server="shinyapps.io")) expect_equal(result, "/usr/bin/python") options(rsconnect.python.enabled = NULL) }) test_that("getPythonForTarget defaults to enabled for Connect", { skip_on_cran() result <- getPythonForTarget("/usr/bin/python", list(server="connect.example.com")) expect_equal(result, "/usr/bin/python") }) test_that("getPythonForTarget defaults to disabled for shinyapps.io", { skip_on_cran() result <- getPythonForTarget("/usr/bin/python", list(server="shinyapps.io")) expect_equal(result, NULL) }) rsconnect/tests/testthat/multibyte-characters/0000755000175000017500000000000013632232206021536 5ustar nileshnileshrsconnect/tests/testthat/multibyte-characters/app.R0000644000175000017500000000123613632232206022443 0ustar nileshnilesh # å®šä¹‰ç”¨æˆ·ç•Œé¢ fluidPage( # 标题 titlePanel("麻麻å†ä¹Ÿä¸ç”¨æ‹…心我的Shiny应用ä¸èƒ½æ˜¾ç¤ºä¸­æ–‡äº†"), # ä¾§è¾¹æ å¸ƒå±€ sidebarLayout( sidebarPanel( selectInput("dataset", "请选一个数æ®ï¼š", choices = c("岩石", "pressure", "cars")), uiOutput("rockvars"), numericInput("obs", "查看多少行数æ®ï¼Ÿ", 5), checkboxInput("summary", "显示概è¦", TRUE) ), # 展示一个HTML表格 mainPanel( conditionalPanel("input.dataset === '岩石'", plotOutput("rockplot")), verbatimTextOutput("summary这里也å¯ä»¥ç”¨ä¸­æ–‡"), tableOutput("view") ) ) ) rsconnect/tests/testthat/tf-saved-model/0000755000175000017500000000000014145651202020213 5ustar nileshnileshrsconnect/tests/testthat/tf-saved-model/1/0000755000175000017500000000000013236716400020355 5ustar nileshnileshrsconnect/tests/testthat/tf-saved-model/1/saved_model.pb0000644000175000017500000000000613236716400023156 0ustar nileshnileshbogus rsconnect/tests/testthat/test-connect.R0000644000175000017500000000746414144460315020152 0ustar nileshnileshcontext("connect") # NOTE: These tests expect that you're already running connect; the tests # will speak to that running connect process (if it can find it) findConnect <- function() { connect <- Sys.which("connect") if (connect == "") { possibleLocs <- c( "~/git/connect/bin" ) for (loc in possibleLocs) { if (file.exists(file.path(loc, "connect"))) { return(normalizePath(file.path(loc, "connect"))) } } stop("Couldn't find an appropriate 'connect' binary") } } isConnectRunning <- function() { any(grepl("./bin/connect", system2("ps", "-a", stdout = TRUE), fixed = TRUE)) } test_that("Users API", { skip_on_cran() skip_on_os("windows") skip_if(!isConnectRunning()) ## rm db/*.db server <- getDefaultServer(local = TRUE) connect <- connectClient(server$url, list()) id <- paste(as.hexmode(sample(256, bytes)-1), collapse="") # add a user record <- userRecord( email = paste0("user", id ,"@gmail.com"), username = paste0("user", id), first_name = "User", last_name = "Resu", password = paste0("password", id) ) response <- connect$addUser(record) # check a couple main fields expect_equal( response[c("email", "first_name", "last_name", "username")], list( email = record$email, first_name = record$first_name, last_name = record$last_name, username = record$username ) ) # make sure we returned an empty password field (or no password field?) expect_true(response$password %in% "" || is.null(response$password)) # generate a token accountId <- response$id token <- generateToken() tokenResponse <- connect$addToken(list(token = token$token, public_key = token$public_key, user_id = accountId)) Sys.sleep(1) # open the URL in the browser utils::browseURL(tokenResponse$token_claim_url) # Sleep for a second so we can be sure that automatic auth happened Sys.sleep(2) # finally, create a fully authenticated client using the new token, and # keep trying to authenticate until we're successful connect <- connectClient(service = server$url, authInfo = list(token = token$token, private_key = token$private_key)) repeat { tryCatch({ user <- connect$currentUser() break }, error = function(e, ...) { # we expect this to return unauthorized until the token becomes active, # but bubble other errors if (length(grep("401 - Unauthorized", e$message)) == 0) { stop(e) } Sys.sleep(1) }) } # Create and remove an example application ## Create it splineReticulator <- connect$createApplication("SplineReticulator") # Update the account id (since we have moved from unauthed user # to authed user) accountId <- splineReticulator$user_id ## Confirm it exists apps <- connect$listApplications(accountId) app <- apps[[which(sapply(apps, `[[`, "id") == splineReticulator$id)]] expect_true(app$name == "SplineReticulator") ## Upload a bundle pwd_splat <- strsplit(getwd(), "/")[[1]] if (pwd_splat[length(pwd_splat)] == "rsconnect") { path <- "tests/testthat/test-shinyApp/test-shinyApp.tar.gz" } else { path <- "test-shinyApp/test-shinyApp.tar.gz" } response <- connect$uploadApplication( splineReticulator$id, normalizePath(path = path) ) ## Deploy an application appId <- response$app_id response <- connect$deployApplication(appId) id <- response$id ## Query the app for success / failure response <- connect$waitForTask(id) ## Terminate the application (does not remove it from store) connect$terminateApplication(appId) apps <- connect$listApplications(accountId) expect_false(response$id %in% sapply(apps, "[[", "id")) }) rsconnect/tests/testthat/test-utils.R0000644000175000017500000000152713245020642017647 0ustar nileshnileshcontext("utils") test_that("file_path_sans_ext removes extensions", { # extensions are removed. expect_equal( file_path_sans_ext(c("noext", "extension.ext", "doubledot..ext")), c("noext", "extension", "doubledot.")) # compression extensions are removed first (when explicitly requested). expect_equal( file_path_sans_ext(c("noext", "extension.ext", "doubledot..ext", "compressed.gz", "compressext.ext.bz2", "compressdoubledot..ext.xz"), compression = TRUE), c("noext", "extension", "doubledot.", "compressed", "compressext", "compressdoubledot.")) }) rsconnect/tests/testthat/test-cookies.R0000644000175000017500000002515713455420275020161 0ustar nileshnileshcontext("cookies") test_that("URL parsing works", { p <- parseHttpUrl("http://yahoo.com") expect_equal(p$protocol, "http") expect_equal(p$host, "yahoo.com") expect_equal(p$port, "") expect_equal(p$path, "") #TODO: bug? Should default to /? p <- parseHttpUrl("https://rstudio.com/about") expect_equal(p$protocol, "https") expect_equal(p$host, "rstudio.com") expect_equal(p$port, "") expect_equal(p$path, "/about") p <- parseHttpUrl("http://127.0.0.1:3939/stuff/here/?who-knows") expect_equal(p$protocol, "http") expect_equal(p$host, "127.0.0.1") expect_equal(p$port, "3939") expect_equal(p$path, "/stuff/here/?who-knows") #TODO: bug? }) test_that("Parsing cookies works", { parsedUrl <- parseHttpUrl("http://rstudio.com/test/stuff") # Note that the Expires field is ignored cookie <- parseCookie(parsedUrl, "mycookie=myvalue; Path=/; Expires=Sat, 24 Jun 2017 16:16:05 GMT; Max-Age=3600; HttpOnly") expect_equal(cookie$name, "mycookie") expect_equal(cookie$value, "myvalue") expect_true(cookie$expires > Sys.time() + 3595) expect_true(cookie$expires < Sys.time() + 3605) expect_equal(cookie$path, "/") expect_false(cookie$secure) # Max-Age with no semicolon, non-root path cookie <- parseCookie(parsedUrl, "mycookie2=myvalue2; Secure; Path=/test; max-AGE=3600") expect_equal(cookie$name, "mycookie2") expect_equal(cookie$value, "myvalue2") expect_true(cookie$expires > Sys.time() + 3595) expect_true(cookie$expires < Sys.time() + 3605) expect_equal(cookie$path, "/test") expect_true(cookie$secure) # Path with no semicolon, no max age cookie <- parseCookie(parsedUrl, "mycookie2=myvalue2; PATH=/test") expect_equal(cookie$name, "mycookie2") expect_equal(cookie$value, "myvalue2") expect_true(cookie$expires > (Sys.time() + 10^9)) expect_equal(cookie$path, "/test") expect_false(cookie$secure) # No path, value with no semicolon cookie <- parseCookie(parsedUrl, "mycookie2=myvalue2") expect_equal(cookie$name, "mycookie2") expect_equal(cookie$value, "myvalue2") expect_true(cookie$expires > (Sys.time() + 10^9)) expect_equal(cookie$path, "/") expect_false(cookie$secure) # Trailing secure cookie <- parseCookie(parsedUrl, "mycookie2=myvalue2; Secure") expect_equal(cookie$name, "mycookie2") expect_equal(cookie$value, "myvalue2") expect_true(cookie$expires > (Sys.time() + 10^9)) expect_equal(cookie$path, "/") expect_true(cookie$secure) # Full cookie with spaces around =s cookie <- parseCookie(parsedUrl, "mycookie = myvalue; SEcure; Path = /; Expires = Sat, 24 Jun 2017 16:16:05 GMT; Max-Age = 3600; HttpOnly") expect_equal(cookie$name, "mycookie") expect_equal(cookie$value, "myvalue") expect_true(cookie$secure) expect_true(cookie$expires > Sys.time() + 3595) expect_true(cookie$expires < Sys.time() + 3605) expect_equal(cookie$path, "/") # Value-less cookie cookie <- parseCookie(parsedUrl, "mycookie=; Path = /") expect_equal(cookie$name, "mycookie") expect_equal(cookie$value, "") expect_equal(cookie$path, "/") # prove #229 is fixed cookie <- parseCookie(parsedUrl, "my_cookie-which/uses%20strange?characters=foo_-%20+?1234bar; Path = /") expect_equal(cookie$name, "my_cookie-which/uses%20strange?characters") expect_equal(cookie$value, "foo_-%20+?1234bar") expect_equal(cookie$path, "/") }) test_that("Invalid cookies fail parsing", { # Invalid path, doesn't match request's path parsedUrl <- parseHttpUrl("http://rstudio.com/test/stuff") expect_warning({cookie <- parseCookie(parsedUrl, "mycookie=myvalue; Path=/something/else")}, "Invalid path set for cookie") expect_null(cookie) # Invalid key/val format expect_warning({cookie <- parseCookie(parsedUrl, "mycookie;")}, "Unable to parse set-cookie ") expect_null(cookie) }) clearCookieStore <- function(){ if (exists("fakedomain:123", .cookieStore)){ rm("fakedomain:123", envir=.cookieStore) } } test_that("cookies can be stored", { clearCookieStore() parsedUrl <- parseHttpUrl("http://fakedomain:123/test/stuff") expect_warning({ storeCookies(parsedUrl, c( "mycookie=myvalue; Path=/; Max-Age=3600; HttpOnly", "anotherCookie=what; Path=/test; Max-Age=100", "wrongpath=huh; Path=/uhoh; Max-Age=100", "secureCookie=123; Secure", "third=cookie; Path=/; Max-Age=500") ) }, "Invalid path set for cookie") cookies <- get("fakedomain:123", envir=.cookieStore) expect_equal(nrow(cookies), 4) # Check the first cookie co <- cookies[cookies$name=="mycookie",] expect_equal(co$name, "mycookie") expect_equal(co$value, "myvalue") expect_true(co$expires > Sys.time() + 3595) expect_true(co$expires < Sys.time() + 3605) expect_equal(co$path, "/") expect_false(co$secure) # And the other co <- cookies[cookies$name=="anotherCookie",] expect_equal(co$name, "anotherCookie") expect_equal(co$value, "what") expect_true(co$expires > Sys.time() + 95) expect_true(co$expires < Sys.time() + 105) expect_equal(co$path, "/test") expect_false(co$secure) # Third co <- cookies[cookies$name=="third",] expect_equal(co$name, "third") expect_equal(co$value, "cookie") expect_true(co$expires > Sys.time() + 495) expect_true(co$expires < Sys.time() + 505) expect_equal(co$path, "/") expect_false(co$secure) # Fourth co <- cookies[cookies$name=="secureCookie",] expect_equal(co$name, "secureCookie") expect_equal(co$value, "123") expect_true(co$secure) }) test_that("duplicate cookies overwrite one another", { clearCookieStore() parsedUrl <- parseHttpUrl("http://fakedomain:123/test/stuff") storeCookies(parsedUrl, "mycookie=myvalue; Path=/; Max-Age=3600") cookies <- get("fakedomain:123", envir=.cookieStore) expect_equal(nrow(cookies), 1) # Add another valid cookie, same domain, same name, different path storeCookies(parsedUrl, "mycookie=myvalue; Path=/test; Max-Age=3600") cookies <- get("fakedomain:123", envir=.cookieStore) expect_equal(nrow(cookies), 2) # Duplicate cookie should overwrite storeCookies(parsedUrl, "mycookie=myvalue; Path=/test; Max-Age=99") cookies <- get("fakedomain:123", envir=.cookieStore) expect_equal(nrow(cookies), 2) # Confirm that the stored cookie is the more recent one. co <- cookies[cookies$path=="/test",] expect_true(co$expires > Sys.time() + 94) expect_true(co$expires < Sys.time() + 104) }) test_that("appending cookie headers works", { clearCookieStore() parsedUrl <- parseHttpUrl("http://fakedomain:123/test/stuff") # Nothing to append, no-op headers <- appendCookieHeaders(parsedUrl, c(header1=123, header2="abc")) expect_length(headers, 2) expect_equivalent(headers["header1"], "123") expect_equivalent(headers["header2"], "abc") # Store a cookie storeCookies(parsedUrl, "cookie1=value1; Path=/; Max-Age=3600") headers <- appendCookieHeaders(parsedUrl, c(header1=123, header2="abc")) expect_length(headers, 3) expect_equivalent(headers["header1"], "123") expect_equivalent(headers["header2"], "abc") expect_equivalent(headers["cookie"], "cookie1=value1") # Store a couple more cookies storeCookies(parsedUrl, "cookie2=value2; Path=/test; Max-Age=3600") # This one has the wrong path, will be filtered out storeCookies(parseHttpUrl("http://fakedomain:123/another"), "cookie3=value3; Path=/another; Max-Age=3600") headers <- appendCookieHeaders(parsedUrl, c(header1=123, header2="abc")) expect_length(headers, 3) expect_equivalent(headers["header1"], "123") expect_equivalent(headers["header2"], "abc") expect_equivalent(headers["cookie"], "cookie2=value2; cookie1=value1") # If you already have a cookie header, you end up with two headers <- appendCookieHeaders(parsedUrl, c(cookie="existing=value")) expect_length(headers, 2) expect_equal(headers[1], c(cookie="existing=value")) expect_equal(headers[2], c(cookie="cookie2=value2; cookie1=value1")) # Add a secure cookie storeCookies(parsedUrl, "securecookie=secureval; Path=/; Max-Age=3600; Secure") headers <- appendCookieHeaders(parsedUrl, c()) expect_equivalent(headers["cookie"], "cookie2=value2; cookie1=value1") # But over a secure channel, you'd include the secure cookie headers <- appendCookieHeaders(parseHttpUrl("https://fakedomain:123/test/stuff"), c()) expect_equivalent(headers["cookie"], "securecookie=secureval; cookie2=value2; cookie1=value1") }) test_that("Expired cookies are removed", { clearCookieStore() parsedUrl <- parseHttpUrl("http://fakedomain:123/test/stuff") # Expired cookies are removed from the store and not included in the request storeCookies(parsedUrl, "expired=something; Max-Age=-1") cookies <- get("fakedomain:123", envir=.cookieStore) expect_equal(nrow(cookies), 1) # Now it will recognize that it's expired and remove it headers <- appendCookieHeaders(parsedUrl, NULL) expect_null(headers) cookies <- get("fakedomain:123", envir=.cookieStore) expect_equal(nrow(cookies), 0) # And with multiple cookies, it still removes only the expired one storeCookies(parsedUrl, "expired=something; Max-Age=-1") storeCookies(parsedUrl, "notexpired=something") cookies <- get("fakedomain:123", envir=.cookieStore) expect_equal(nrow(cookies), 2) # Now it will recognize that it's expired and remove it headers <- appendCookieHeaders(parsedUrl, c()) expect_length(headers, 1) cookies <- get("fakedomain:123", envir=.cookieStore) expect_equal(nrow(cookies), 1) }) test_that("getCookieHost works", { expect_equal(getCookieHost(parseHttpUrl("http://rstudio.com")), "rstudio.com") expect_equal(getCookieHost(parseHttpUrl("http://rstudio.com:3939")), "rstudio.com:3939") expect_equal(getCookieHost(parseHttpUrl("http://127.0.0.1")), "127.0.0.1") expect_equal(getCookieHost(parseHttpUrl("http://127.0.0.1:3939")), "127.0.0.1:3939") }) test_that("getting and clearing cookies works", { clearCookieStore() all <- getCookies() expect_null(all) # Add a few cookies domain1 <- parseHttpUrl("http://domain1/test/stuff") storeCookies(domain1, "c1=v1") storeCookies(domain1, "c2=v2") domain2 <- parseHttpUrl("http://domain2:3939/test/stuff") storeCookies(domain2, "c3=v3") d1c <- getCookies("domain1") expect_equal(nrow(d1c), 2) expect_equal(d1c$host[1], "domain1") d2c <- getCookies("domain2") expect_null(d2c) d2c <- getCookies("domain2", 3939) expect_equal(nrow(d2c), 1) expect_equal(d2c$host[1], "domain2:3939") all <- getCookies() expect_equal(nrow(all), 3) # Delete cookies from one domain clearCookies("domain2", 3939) d2c <- getCookies("domain2", 3939) expect_null(d2c) all <- getCookies() expect_equal(nrow(all), 2) # Clear all cookies clearCookies() d1c <- getCookies("domain1") expect_null(d1c) all <- getCookies() expect_null(all) }) rsconnect/tests/testthat.R0000644000175000017500000000063514051210517015527 0ustar nileshnileshlibrary(testthat) library(rsconnect) run_tests <- function() { # set temp config dir so the tests don't pollute it temp_config_dir <- file.path(tempdir(), "rsconnect-test-config") Sys.setenv(R_USER_CONFIG_DIR = temp_config_dir) # clean up temp dir after tests are run on.exit({ unlink(temp_config_dir, recursive = TRUE) }, add = TRUE) # perform tests test_check("rsconnect") } run_tests() rsconnect/R/0000755000175000017500000000000014144740654012614 5ustar nileshnileshrsconnect/R/config.R0000644000175000017500000001054314143556635014212 0ustar nileshnilesh#' rsconnect Configuration Directory #' #' Forms the path to a location on disk where user-level configuration data for #' the package is stored. #' #' @param subDir An optional subdirectory to be included as the last element of #' the path. #' #' @return The path to the configuration directory. #' #' @keywords internal rsconnectConfigDir <- function(subDir = NULL) { # Compute the name of the configuration directory using the standard R method configDir <- applicationConfigDir() # If the configuration directory doesn't exist, see if there's an old one to # migrate if (!file_test("-d", configDir)) { # For historical reasons too painful to enumerate here, there are not one # but *two* old locations for configuration files to check. If we find # one, we need to move its contents to the new folder. oldConfigDir <- oldApplicationConfigDir("rsconnect") if (!file_test("-d", oldConfigDir)) { oldConfigDir <- oldApplicationConfigDir("connect") } # We have no configuration directory but we do have an old one; migrate it. if (file_test("-d", oldConfigDir)) { # Create the parent folder if necessary dir.create(dirname(configDir), recursive = TRUE, showWarnings = FALSE) # Migrate the old directory to the new one file.rename(oldConfigDir, configDir) } } # Form the target and append the optional subdirectory if given target <- configDir if (!is.null(subDir)) { target <- file.path(target, subDir) } # Create the path if it doesn't exist dir.create(target, recursive = TRUE, showWarnings = FALSE) # Return completed path target } #' Old Application Config Directory #' #' Returns the old application configuration directory used by rsconnect #' 0.8.24 and prior. These versions wrote configuration data to XDG compliant #' locations, but CRAN policy has since further restricted the disk locations #' that are permitted. See: #' #' https://cran.r-project.org/web/packages/policies.html #' #' @param appName The application's name (connect or rsconnect) #' #' @return The old application configuration directory. #' #' @keywords internal oldApplicationConfigDir <- function(appName) { # get the home directory from the operating system (in case # the user has redefined the meaning of ~) but fault back # to ~ if there is no HOME variable defined homeDir <- Sys.getenv("HOME", unset="~") # check for R specific config dir configDir <- Sys.getenv("R_USER_CONFIG_DIR") if (nzchar(configDir)) { # R specific config dir, append app name only configDir <- file.path(configDir, appName) } else { # no R specific config dir; determine application config dir (platform specific) sysName <- Sys.info()[['sysname']] if (identical(sysName, "Windows")) configDir <- Sys.getenv("APPDATA") else if (identical(sysName, "Darwin")) configDir <- file.path(homeDir, "Library/Application Support") else configDir <- Sys.getenv("XDG_CONFIG_HOME", file.path(homeDir, ".config")) # append the application name configDir <- file.path(configDir, "R", appName) } # normalize path normalizePath(configDir, mustWork = FALSE) } #' Application Configuration Directory #' #' Returns the root path used to store per user configuration data. Does not #' check old locations or create the path; use \code{rsconnectConfigDir} for #' most cases. #' #' @return A string containing the path of the configuration folder. #' #' @keywords internal applicationConfigDir <- function() { if (exists("R_user_dir", envir = asNamespace("tools"))) { # In newer versions of R (>=4.0), we can ask R itself where configuration should be stored. # Load from the namespace to avoid check warnings with old R. f <- get("R_user_dir", envir = asNamespace("tools")) f("rsconnect", "config") } else { # In older versions of R, use an implementation derived from R_user_dir home <- Sys.getenv("HOME", unset = normalizePath("~")) path <- if(nzchar(p <- Sys.getenv("R_USER_CONFIG_DIR"))) p else if(nzchar(p <- Sys.getenv("XDG_CONFIG_HOME"))) p else if(.Platform$OS.type == "windows") file.path(Sys.getenv("APPDATA"), "R", "config") else if(Sys.info()["sysname"] == "Darwin") file.path(home, "Library", "Preferences", "org.R-project.R") else file.path(home, ".config") file.path(path, "R", "rsconnect") } } rsconnect/R/proxies.R0000644000175000017500000000460113455420275014427 0ustar nileshnilesh#' HTTP Proxy Configuration #' #' @description: #' #' If your system is behind an HTTP proxy then additional configuration may be #' required to connect to the ShinyApp service. The required configuration #' varies depending on what type of HTTP connection you are making to the #' server. #' #' The default HTTP connection type is `libcurl` however addition connection types #' `curl` and `internal` are also supported. The HTTP connection type is #' configured using the [rsconnectOptions](rsconnect.http()] global option. #' #' @section HTTP Proxy Environment Variable: #' #' The most straightforward way to specify a proxy for `libcurl` and `curl` #' connections is to set the \env{http_proxy} environment variable. For example, #' you could add the following code to your `.rsconnect_profile`: #' #' \preformatted{ #' Sys.setenv(http_proxy = "http://proxy.example.com") #' } #' #' Proxy settings can include a host-name, port, and username/password if necessary. The following #' are all valid values for the `http_proxy` environment variable: #' #' \preformatted{ #' http://proxy.example.com/ #' http://proxy.example.com:1080/ #' http://username:password@proxy.example.com:1080/ #' } #' #' @section Setting Curl Proxy Options: #' #' The default HTTP connection type is `libcurl`. If you need more configurability #' than afforded by the `http_proxy` environment variable you can specify #' proxy options explicity using `rsconnect.libcurl.options`. For example, you #' could add the following code to your `.rsconnect_profile`: #' #' preformatted{ #' options(rsconnect.libcurl.options = list(proxy = "http://proxy.example.com") #' } #' #' You can set any underlying curl option using this mechanism. Run #' `curl::curl_options()` to see a list of options. #' #' @section Using Internet Explorer Proxy Settings: #' #' If you are running on Windows and have difficulty configuring proxy settings #' for `libcurl` or `curl` connections, it's possible to re-use your Internet #' Explorer proxy settings for connections to the server. To do this you set the #' http connection type to `internal` as follows: #' #' \preformatted{ #' options(rsconnect.http = "internal") #' } #' #' The `internal` connection type uses an insecure (non-encrypted) http #' connection to the server. If you require an encrypted https connection it's #' recommended that you use an `libcurl` or `curl` connection. #' #' #' @name rsconnectProxies #' NULL rsconnect/R/tasks.R0000644000175000017500000000460413274070160014057 0ustar nileshnilesh#' List Tasks #' #' @param account Account name. If a single account is registered on the system #' then this parameter can be omitted. #' @param server Server name. Required only if you use the same account name on #' multiple servers (see [servers()]) #' @return #' Returns a data frame with the following columns: #' \tabular{ll}{ #' `id` \tab Task id \cr #' `action` \tab Task action\cr #' `status` \tab Current task status\cr #' `created_time` \tab Task creation time\cr #' `finished_time` \tab Task finished time\cr #' } #' @examples #' \dontrun{ #' #' # list tasks for the default account #' tasks() #' #' } #' @seealso [taskLog()] #' @export tasks <- function(account = NULL, server = NULL) { # resolve account and create connect client accountDetails <- accountInfo(resolveAccount(account, server), server) client <- clientForAccount(accountDetails) # list tasks tasks <- client$listTasks(accountDetails$accountId) # extract the subset of fields we're interested in res <- lapply(tasks, `[`, c('id', 'action', 'status', 'created_time')) # convert to data frame res <- do.call(rbind, res) as.data.frame(res, stringsAsFactors = FALSE) } #' Show task log #' #' Writes the task log for the given task #' @param taskId Task Id #' @param account Account name. If a single account is registered on the system #' then this parameter can be omitted. #' @param server Server name. Required only if you use the same account name on #' multiple servers (see [servers()]) #' @param output Where to write output. Valid values are `NULL` or `stderr` #' @examples #' \dontrun{ #' #' # write task log to stdout #' taskLog(12345) #' #' # write task log to stderr #' taskLog(12345, output="stderr") #' #' } #' @seealso [tasks()] #' @export taskLog <- function(taskId, account = NULL, server = NULL, output = NULL) { # resolve account and create connect client accountDetails <- accountInfo(resolveAccount(account, server), server) client <- clientForAccount(accountDetails) if (identical(output, "stderr")) { conn <- stderr() } else{ conn <- "" } # show task log cat(client$getTaskLogs(taskId), file=conn) # get child tasks tasks <- client$listTasks(accountDetails$accountId, filters=filterQuery("parent_id", taskId)) # get child task logs for (task in tasks) { taskLog(task['id'], account = account, server = server, output = output) } } rsconnect/R/linters.R0000644000175000017500000001247114051210517014407 0ustar nileshnileshaddLinter("absolute.paths", linter( apply = function(content, ...) { content <- stripComments(content) which(hasAbsolutePaths(content)) }, takes = isRCodeFile, message = function(content, lines) { makeLinterMessage("The following lines contain absolute paths", content, lines) }, suggestion = "Paths should be to files within the project directory." )) addLinter("invalid.relative.paths", linter( apply = function(content, ...) { content <- stripComments(content) badRelativePaths(content, ...) }, takes = isRCodeFile, message = function(content, lines) { makeLinterMessage("The following lines contain invalid relative paths (resolved outside of project directory)", content, lines) }, suggestion = "Paths should be to files within the project directory." )) addLinter("filepath.capitalization", linter( apply = function(content, project, path, files) { content <- stripComments(content) # Extract references between bounding (unescaped) quotes. extractQuoted <- function(regex) { matches <- gregexpr(regex, content, perl = TRUE) results <- vector("list", length(content)) for (i in seq_along(matches)) { x <- matches[[i]] if (x[[1]] == -1L || length(x) %% 2 != 0) next starts <- x[seq(1, length(x), by = 2)] ends <- x[seq(2, length(x), by = 2)] results[[i]] <- character(length(starts)) for (j in seq_along(starts)) { results[[i]][[j]] <- substring(content[i], starts[j] + 1, ends[j] - 1) } } results } # Extract targets from Markdown links. extractLinked <- function() { regex <- "\\]\\(.*?\\)" matches <- gregexpr(regex, content, perl = TRUE) results <- vector("list", length(content)) for (i in seq_along(matches)) { x <- matches[[i]] if (x[[1]] == -1L) next results[[i]] <- character(length(x)) attr <- attributes(x) for (j in seq_along(x)) { raw <- x[[j]] raw.length <- attr$match.length[[j]] # skip past "](" and discard ")" start <- as.integer(raw) + 2 end <- as.integer(raw) + raw.length - 2 results[[i]][[j]] <- substring(content[i], start, end) } } results } # Inferred files within source documents; between matching quotes or in # something that looks like a Markdown link. inferredFiles <- list( "single.quotes" = extractQuoted("(?!\\\\)\'"), "double.quotes" = extractQuoted("(?!\\\\)\""), "markdown.links" = extractLinked() ) ## Replace '\' with '/' in filepaths for consistency in comparisons inferredFiles <- lapply(inferredFiles, function(x) { lapply(x, function(xx) { gsub("\\\\", "/", xx, perl = TRUE) }) }) # Compare in case sensitive, case insensitive fashion projectFiles <- files projectFilesLower <- tolower(files) badLines <- lapply(inferredFiles, function(regex) { lapply(regex, function(x) { which( (tolower(x) %in% projectFilesLower) & (!(x %in% projectFiles)) ) }) }) indices <- Reduce(union, lapply(badLines, function(x) { which(sapply(x, length) > 0) })) if (!length(indices)) return(integer()) from <- lapply(inferredFiles, function(x) x[indices]) to <- lapply(from, function(x) { lapply(x, function(xx) { projectFiles[tolower(xx) == projectFilesLower] }) }) messages <- lapply(seq_along(from), function(regex) { lapply(seq_along(regex), function(i) { if (length(from[[regex]][[i]])) paste(collapse = ", ", paste("[", shQuote(from[[regex]][[i]]), " -> ", shQuote(to[[regex]][[i]]), "]", sep = "") ) else "" }) }) transposed <- transposeList(messages) lint <- sapply(transposed, function(x) { paste(x[x != ""], collapse = ", ") }) indices <- as.numeric(indices) attr(indices, "lint") <- lint indices }, takes = isRCodeFile, message = function(content, lines) { makeLinterMessage( "The following lines contain paths to files not matching in case sensitivity", content, lines ) }, suggestion = "Filepaths are case-sensitive on deployment server." )) addLinter("browser", linter( apply = function(content, ...) { content <- stripComments(content) which(hasBrowserCalls(content)) }, takes = isRCodeFile, message = function(content, lines) { makeLinterMessage("The following lines contain the browser() debugging function", content, lines) }, suggestion = "The browser() debugging function should be removed." )) addLinter("browseURL", linter( apply = function(content, ...) { content <- stripComments(content) which(hasBrowseURLCalls(content)) }, takes = isRCodeFile, message = function(content, lines) { makeLinterMessage("The following lines contain calls to the browseURL function", content, lines) }, suggestion = "Remove browseURL calls; browseURL does not work in deployed applications." )) rsconnect/R/rmdindex.R0000644000175000017500000000577414105013651014551 0ustar nileshnilesh # Write an index.htm file for an Rmd deployment if necessary (returns the # files written so they can be removed after deployment) writeRmdIndex <- function(appName, appDir) { # files written files <- NULL # no index required for Shiny, or for directories with an index.Rmd if (!file.exists(file.path(appDir, "ui.R")) && !file.exists(file.path(appDir, "server.R")) && !file.exists(file.path(appDir, "index.htm")) && !file.exists(file.path(appDir, "index.Rmd")) && !file.exists(file.path(appDir, "index.qmd"))) { # otherwise enumerate the Rmd files as the basis for the index appFiles <- list.files(path = appDir, pattern = "\\.([rq]md|html)$", recursive = FALSE, ignore.case = TRUE) if (length(appFiles) == 1) indexPage <- redirectWebPage(appFiles[1]) else indexPage <- listingWebPage(appName, appFiles) indexFile <- file.path(appDir, "index.htm") files <- c(files, indexFile) writeLines(indexPage, indexFile, useBytes = TRUE) } files } redirectWebPage <- function(appFile) { meta <- paste('', sep = "") webPage(meta, NULL) } listingWebPage <- function(appDir, appFiles) { head <- c("") appDir <- htmlEscape(appDir) appFiles <- htmlEscape(appFiles) body <- paste("

", basename(appDir), "

", sep = "") body <- c(body, paste("", sep = "")) webPage(head, body) } webPage <- function(head, body) { if (is.null(head)) head <- c() if (is.null(body)) body <- c() enc2utf8(c( '', '', '', '', head, '', '', body, '', '') ) } htmlEscape <- local({ .htmlSpecials <- list( `&` = '&', `<` = '<', `>` = '>' ) .htmlSpecialsPattern <- paste(names(.htmlSpecials), collapse='|') .htmlSpecialsAttrib <- c( .htmlSpecials, `'` = ''', `"` = '"', `\r` = ' ', `\n` = ' ' ) .htmlSpecialsPatternAttrib <- paste(names(.htmlSpecialsAttrib), collapse='|') function(text, attribute=FALSE) { pattern <- if(attribute) .htmlSpecialsPatternAttrib else .htmlSpecialsPattern # Short circuit in the common case that there's nothing to escape if (!any(grepl(pattern, text))) return(text) specials <- if(attribute) .htmlSpecialsAttrib else .htmlSpecials for (chr in names(specials)) { text <- gsub(chr, specials[[chr]], text, fixed=TRUE) } return(text) } }) rsconnect/R/lint-utils.R0000644000175000017500000001006113632232206015027 0ustar nileshnilesh stripComments <- function(content) { gsub("#.*", "", content, perl = TRUE) } hasBrowserCalls <- function(content) { # look for calls to browser(); they will cause a debug halt, which is almost # never wanted in a production application grepl("\\bbrowser\\([^)]*\\)", content, perl = TRUE) } hasBrowseURLCalls <- function(content) { # look for calls to browseURL(); browsers can't be opened on the server in # deployed applications grepl("\\bbrowseURL\\([^)]*\\)", content, perl = TRUE) } hasAbsolutePaths <- function(content) { regex <- c( "\\[(.*?)\\]\\(\\s*[a-zA-Z]:/[^\"\']", ## windows-style markdown references [Some image](C:/...) "\\[(.*?)\\]\\(\\s*/[^/]", ## unix-style markdown references [Some image](/Users/...) NULL ## so we don't worry about commas above ) regexResults <- as.logical(Reduce(`+`, lapply(regex, function(rex) { grepl(rex, content, perl = TRUE) }))) # Strip out all strings in the document, and check to see if any of them # resolve to absolute paths on the system. sQuoteRegex <- "['](?:(?:\\\\.)|(?:[^'\\\\]))*?[']" dQuoteRegex <- '["](?:(?:\\\\.)|(?:[^"\\\\]))*?["]' extractedStrings <- lapply(c(sQuoteRegex, dQuoteRegex), function(regex) { matches <- gregexpr(regex, content, perl = TRUE) lapply(seq_along(matches), function(i) { match <- matches[[i]] if (c(match[[1]]) == -1L) return(character()) starts <- as.integer(match) + 1 ends <- starts + attr(match, "match.length") - 3 substring(content[[i]], starts, ends) }) }) strings <- vector("list", length(extractedStrings[[1]])) for (i in seq_along(extractedStrings[[1]])) { strings[[i]] <- unique(c(extractedStrings[[1]][[i]], extractedStrings[[2]][[i]])) strings[[i]] <- strings[[i]][nchar(strings[[i]]) >= 5] } lineHasAbsolutePath <- unlist(lapply(strings, function(x) { any( grepl("^/|^[a-zA-Z]:/|^~", x, perl = TRUE) & file.exists(x) & file.info(x)$isdir %in% FALSE & vapply(gregexpr("[~/]", x, perl = TRUE), USE.NAMES = FALSE, FUN.VALUE = numeric(1), length) >= 3 ) })) as.logical(lineHasAbsolutePath + regexResults) } noMatch <- function(x) { identical(attr(x, "match.length"), -1L) } badRelativePaths <- function(content, project, path, ...) { ## Figure out how deeply the path of the file is nested ## (it is relative to the project root) slashMatches <- gregexpr("/", path) nestLevel <- if (noMatch(slashMatches)) 0 else length(slashMatches[[1]]) ## Identify occurrences of "../" regexResults <- gregexpr("../", content, fixed = TRUE) ## Figure out sequential runs of `../` runs <- lapply(regexResults, function(x) { if (noMatch(x)) return(NULL) rle <- rle(as.integer(x) - seq(0, by = 3, length.out = length(x))) rle$lengths }) badPaths <- vapply(runs, function(x) { any(x > nestLevel) }, logical(1)) badPaths } enumerate <- function(X, FUN, ...) { FUN <- match.fun(FUN) result <- vector("list", length(X)) for (i in seq_along(X)) { result[[i]] <- FUN(X[[i]], i, ...) } names(result) <- names(X) result } #' Construct a Linter Message #' #' Pretty-prints a linter message. Primarily used as a helper #' for constructing linter messages with [linter()]. #' #' @param header A header message describing the linter. #' @param content The content of the file that was linted. #' @param lines The line numbers from `content` that contain lint. makeLinterMessage <- function(header, content, lines) { lint <- attr(lines, "lint") c( paste0(header, ":"), paste(lines, ": ", content[lines], if (!is.null(lint)) paste(" ", lint, sep = ""), sep = ""), "\n" ) } hasLint <- function(x) { any(unlist(lapply(x, function(x) { lapply(x, function(x) { length(x$indices) > 0 }) }))) } isRCodeFile <- function(path) { grepl("\\.[rR]$|\\.[rR]md$|\\.[rR]nw$", path) } transposeList <- function(list) { unname(as.list( as.data.frame( t( as.matrix( as.data.frame(list, stringsAsFactors = FALSE) ) ), stringsAsFactors = FALSE) )) } rsconnect/R/certificates.R0000644000175000017500000001207113250256314015375 0ustar nileshnilesh # sanity check to make sure we're looking at an ASCII armored cert validateCertificate <- function(certificate) { return(any(grepl("-----BEGIN CERTIFICATE-----", certificate, fixed = TRUE))) } createCertificateFile <- function(certificate) { certificateFile <- NULL # check the R option first, then fall back on the environment variable systemStore <- getOption("rsconnect.ca.bundle") if (is.null(systemStore) || !nzchar(systemStore)) { systemStore <- Sys.getenv("RSCONNECT_CA_BUNDLE") } # start by checking for a cert file specified in an environment variable if (!is.null(systemStore) && nzchar(systemStore)) { if (file.exists(systemStore)) { certificateFile <- systemStore } else { warning("The certificate store '", systemStore, "' specified in the ", if (identical(systemStore, getOption("rsconnect.ca.bundle"))) "rsconnect.ca.bundle option " else "RSCONNECT_CA_BUNDLE environment variable ", "does not exist. The system certificate store will be used instead.") } } # if no certificate contents specified, we're done if (is.null(certificate)) return(certificateFile) # if we don't have a certificate file yet, try to find the system store if (is.null(certificateFile)) { if (.Platform$OS.type == "unix") { # search known locations on Unix-like stores <- c("/etc/ssl/certs/ca-certificates.crt", "/etc/pki/tls/certs/ca-bundle.crt", "/usr/share/ssl/certs/ca-bundle.crt", "/usr/local/share/certs/ca-root.crt", "/etc/ssl/cert.pem", "/var/lib/ca-certificates/ca-bundle.pem") } else { # mirror behavior of curl on Windows, which looks in system folders, # the working directory, and %PATH%. stores <- c(file.path(getwd(), "curl-ca-bundle.crt"), "C:/Windows/System32/curl-ca-bundle.crt", "C:/Windows/curl-ca-bundle.crt", file.path(strsplit(Sys.getenv("PATH"), ";", fixed = TRUE), "curl-ca-bundle.crt")) } # use our own baked-in bundle as a last resort stores <- c(stores, system.file(package="rsconnect", "cert", "cacert.pem")) for (store in stores) { if (file.exists(store)) { # if the bundle exists, stop here certificateFile <- store break } } # if we didn't find the system store, it's okay; the fact that we're here # means that we have a server-specific certificate so it's probably going # to be all right to use only that cert. } # create a temporary file to house the certificates certificateStore <- tempfile(pattern = "cacerts", fileext = ".pem") if (!dirExists(dirname(certificateStore))) dir.create(dirname(certificateStore)) file.create(certificateStore) # open temporary cert store con <- file(certificateStore, open = "at") on.exit(close(con), add = TRUE) # copy the contents of the certificate file into the store, if we found one # (we don't do a straight file copy since we don't want to inherit or # correct permissions) if (!is.null(certificateFile)) { certLines <- readLines(certificateFile, warn = FALSE) writeLines(text = certLines, con = con) } # append the server-specific certificate (with a couple of blank lines) writeLines(text = c("", "", certificate), con = con) return(certificateStore) } inferCertificateContents <- function(certificate) { # certificate can be specified as either a character vector or a filename; # infer which we're dealing with # tolerate NULL, which is a valid case representing no certificate if (is.null(certificate) || identical(certificate, "")) return(NULL) # collapse to a single string if we got a vector of lines if (length(certificate) > 1) certificate <- paste(certificate, collapse = "\n") # looks like ASCII armored certificate data, return as-is if (validateCertificate(substr(certificate, 1, 27))) return(certificate) # looks like a file; return its contents if (file.exists(certificate)) { if (file.size(certificate) > 1048576) { stop("The file '", certificate, "' is too large. Certificate files must ", "be less than 1MB.") } contents <- paste(readLines(con = certificate, warn = FALSE), collapse = "\n") if (validateCertificate(contents)) return(contents) else stop("The file '", certificate, "' does not appear to be a certificate. ", "Certificate files should be in ASCII armored PEM format, with a ", "first line reading -----BEGIN CERTIFICATE-----.") } # doesn't look like something we can deal with; guess error based on length if (nchar(certificate) < 200) { stop("The certificate file '", certificate, "' does not exist.") } else { stop("The certificate '", substr(certificate, 1, 10), "...' is not ", "correctly formed. Specify the certificate as either an ASCII armored string, ", "beginning with -----BEGIN CERTIFICATE----, or a valid path to a file ", "containing the certificate.") } } rsconnect/R/imports.R0000644000175000017500000000027014031357651014427 0ustar nileshnilesh #' @importFrom stats na.omit setNames #' @importFrom utils available.packages installed.packages contrib.url file_test formatUL getFromNamespace glob2rx packageVersion read.csv NULL rsconnect/R/configureApp.R0000644000175000017500000001553413362372172015366 0ustar nileshnilesh#' Configure an Application #' #' Configure an application running on a remote server. #' #' @inheritParams deployApp #' #' @param appName Name of application to configure #' @param appDir Directory containing application. Defaults to #' current working directory. #' @param account Account name. If a single account is registered on the #' system then this parameter can be omitted. #' @param server Server name. Required only if you use the same account name on #' multiple servers (see [servers()]) #' @param redeploy Re-deploy application after its been configured. #' @param size Configure application instance size #' @param instances Configure number of application instances #' @examples #' \dontrun{ #' #' # set instance size for an application #' configureApp("myapp", size="xlarge") #' } #' @seealso [applications()], [deployApp()] #' @note This function works only for ShinyApps servers. #' @export configureApp <- function(appName, appDir=getwd(), account = NULL, server = NULL, redeploy = TRUE, size = NULL, instances = NULL, logLevel = c("normal", "quiet", "verbose")) { # resolve target account and application accountDetails <- accountInfo(resolveAccount(account, server), server) application <- resolveApplication(accountDetails, appName) displayStatus <- displayStatus(identical(logLevel, "quiet")) # some properties may required a rebuild to take effect rebuildRequired = FALSE # get a list of properties to set properties <- list() if (! is.null(size) ) { properties[[ "application.instances.template" ]] = size } if (! is.null(instances) ) { properties[[ "application.instances.count" ]] = instances } # set application properties serverDetails <- serverInfo(accountDetails$server) client <- clientForAccount(accountDetails) for (i in names(properties)) { propertyName <- i propertyValue <- properties[[i]] # dispatch to the appropriate client implementation if (is.function(client$configureApplication)) client$configureApplication(application$id, propertyName, propertyValue) else if (is.function(client$setApplicationProperty)) client$setApplicationProperty(application$id, propertyName, propertyValue) else stop("Server ", accountDetails$server, " has no appropriate configuration method.") } # redeploy application if requested if (redeploy) { if (length(properties) > 0) { deployApp(appDir=appDir, appName=appName, account=account, logLevel=logLevel, upload=rebuildRequired) } else { displayStatus("No configuration changes to deploy") } } } #' Set Application property #' #' Set a property on currently deployed ShinyApps application. #' #' @param propertyName Name of property to set #' @param propertyValue Nalue to set property to #' @param appName Name of application #' @param appPath Directory or file that was deployed. Defaults to current #' working directory. #' @param account Account name. If a single account is registered on the system #' then this parameter can be omitted. #' @param force Forcibly set the property #' #' @note This function only works for ShinyApps servers. #' #' @examples #' \dontrun{ #' #' # set instance size for an application #' setProperty("application.instances.count", 1) #' #' # disable application package cache #' setProperty("application.package.cache", FALSE) #' #' } #' @export setProperty <- function(propertyName, propertyValue, appPath = getwd(), appName = NULL, account = NULL, force = FALSE) { # resolve the application target and target account info target <- deploymentTarget(appPath, appName, NULL, NULL, account) accountDetails <- accountInfo(target$account) serverDetails <- serverInfo(accountDetails$server) lucid <- lucidClient(serverDetails$url, accountDetails) application <- getAppByName(lucid, accountDetails, target$appName) if (is.null(application)) stop("No application found. Specify the application's directory, name, ", "and/or associated account.") invisible(lucid$setApplicationProperty(application$id, propertyName, propertyValue, force)) } #' Unset Application property #' #' Unset a property on currently deployed ShinyApps application (restoring to #' its default value) #' #' @param propertyName Name of property to unset #' @param appName Name of application #' @param appPath Directory or file that was deployed. Defaults to current #' working directory. #' @param account Account name. If a single account is registered on the system #' then this parameter can be omitted. #' @param force Forcibly unset the property #' #' @note This function only works for ShinyApps servers. #' #' @examples #' \dontrun{ #' #' # unset application package cache property to revert to default #' unsetProperty("application.package.cache") #' #' } #' @export unsetProperty <- function(propertyName, appPath = getwd(), appName=NULL, account = NULL, force=FALSE) { # resolve the application target and target account info target <- deploymentTarget(appPath, appName, NULL, NULL, account) accountDetails <- accountInfo(target$account) serverDetails <- serverInfo(accountDetails$server) lucid <- lucidClient(serverDetails$url, accountDetails) application <- getAppByName(lucid, accountInfo, target$appName) if (is.null(application)) stop("No application found. Specify the application's directory, name, ", "and/or associated account.") invisible(lucid$unsetApplicationProperty(application$id, propertyName, force)) } #' Show Application property #' #' Show propreties of an application deployed to ShinyApps. #' #' @param appName Name of application #' @param appPath Directory or file that was deployed. Defaults to current #' working directory. #' @param account Account name. If a single account is registered on the #' system then this parameter can be omitted. #' #' @note This function works only for ShinyApps servers. #' #' @export showProperties <- function(appPath = getwd(), appName = NULL, account = NULL) { # determine the log target and target account info target <- deploymentTarget(appPath, appName, NULL, NULL, account) accountDetails <- accountInfo(target$account) serverDetails <- serverInfo(accountDetails$server) lucid <- lucidClient(serverDetails$url, accountDetails) application <- getAppByName(lucid, accountDetails, target$appName) if (is.null(application)) stop("No application found. Specify the application's directory, name, ", "and/or associated account.") # convert to data frame res <- do.call(rbind, application$deployment$properties) df <- as.data.frame(res, stringsAsFactors = FALSE) names(df) <- c("value") return(df) } rsconnect/R/http-libcurl.R0000644000175000017500000001407514030352554015347 0ustar nileshnileshcreateCurlHandle <- function(timeout, certificate) { # create a new curl handle handle <- curl::new_handle() # set rsconnect user agent curl::handle_setopt(handle, useragent = userAgent()) # overlay user-supplied options userOptions <- getOption("rsconnect.libcurl.options") if (is.list(userOptions)) { curl::handle_setopt(handle, .list = userOptions) } if (isTRUE(getOption("rsconnect.check.certificate", TRUE))) { curl::handle_setopt(handle, ssl_verifypeer = TRUE) # apply certificate information if present if (!is.null(certificate)) curl::handle_setopt(handle, cainfo = certificate) } else { # don't verify peer (less secure but tolerant to self-signed cert issues) curl::handle_setopt(handle, ssl_verifypeer = FALSE) } # use timeout if supplied if (!is.null(timeout)) { curl::handle_setopt(handle, timeout = timeout) } # verbose if requested if (httpVerbose()) curl::handle_setopt(handle, verbose = TRUE) # turn off CURLOPT_FOLLOWLOCATION. the curl package makes this the default for new handles, but it # causes a hang when attempting to follow some responses from shinyapps.io. curl::handle_setopt(handle, followlocation = FALSE) # return the newly created handle handle } httpLibCurl <- function(protocol, host, port, method, path, headers, contentType = NULL, contentFile = NULL, certificate = NULL, timeout = NULL) { if (!is.null(contentFile) && is.null(contentType)) stop("You must specify a contentType for the specified file") # add prefix to port if necessary if (!is.null(port) && nzchar(port)) port <- paste(":", port, sep="") # build url url <- paste0(protocol, "://", host, port, path) # create curl handle handle <- createCurlHandle(timeout, certificate) # add cookie headers headers <- appendCookieHeaders( list(protocol = protocol, host = host, port = port, path = path), headers) if (!is.null(contentFile)) { # compute file metadata fileLength <- file.info(contentFile)$size headers$`Content-Type` <- contentType headers$`Content-Length` <- as.character(fileLength) # open a connection to read the file, and ensure it's closed when we're done con <- file(contentFile, "rb") on.exit(if (!is.null(con)) close(con), add = TRUE) if (identical(method, "POST")) { # for POST operations, send all the file's content up at once. this is necessary because some # POST endpoints return 3xx status codes, which require a seekfunction in order to replay the # payload (the curl package does not currently allow specifying seekfunctions from R) curl::handle_setopt(handle, post = TRUE, postfields = readBin(con, what = "raw", n = fileLength), postfieldsize_large = fileLength) } else if (identical(method, "PUT")) { # for PUT operations, which are often used for larger content (bundle uploads), stream the # file from disk instead of reading it from memory curl::handle_setopt(handle, upload = TRUE, infilesize_large = fileLength) curl::handle_setopt(handle, readfunction = function(nbytes, ...) { if (is.null(con)) { return(raw()) } bin <- readBin(con, "raw", nbytes) if (length(bin) < nbytes) { close(con) con <<- NULL } bin }) } else { # why was a file specified for this endpoint? warning("Content file specified, but not used because the '", method, "' request ", "type does not accept a body.") } } # ensure we're using the requested method curl::handle_setopt(handle, customrequest = method) # apply all our accumulated headers curl::handle_setheaders(handle, .list = headers) # make the request response <- NULL time <- system.time(gcFirst = FALSE, tryCatch({ # fetch the response into a raw buffer in memory response <- curl::curl_fetch_memory(url, handle = handle) }, error = function(e, ...) { # ignore errors resulting from timeout or user abort if (identical(e$message, "Callback aborted") || identical(e$message, "transfer closed with outstanding read data remaining")) return(NULL) # bubble remaining errors through else stop(e) })) httpTrace(method, path, time) # get list of HTTP response headers headers <- curl::parse_headers_list(rawToChar(response$headers)) # read normalized location header if ("location" %in% names(headers)) location <- headers[["location"]] else location <- NULL # presume a plain text response unless specified otherwise contentType <- if ("content-type" %in% names(headers)) { headers[["content-type"]] } else { "text/plain" } # emit JSON trace if requested jsonTracingEnabled <- httpTraceJson() && !is.null(contentFile) && identical(contentType, "application/json") if (jsonTracingEnabled) cat(paste0("<< ", paste(readLines(contentFile), collapse="\n"), "\n")) # Parse cookies from header; bear in mind that there may be multiple headers cookieHeaders <- headers[names(headers) == "set-cookie"] storeCookies(list(protocol=protocol, host=host, port=port, path=path), cookieHeaders) contentValue <- rawToChar(response$content) # emit JSON trace if requested if (httpTraceJson() && identical(contentType, "application/json")) cat(paste0(">> ", contentValue, "\n")) list(req = list(protocol = protocol, host = host, port = port, method = method, path = path), status = response$status_code, location = location, contentType = contentType, content = contentValue) } rsconnect/R/terminateApp.R0000644000175000017500000000224713274070160015364 0ustar nileshnilesh#' Terminate an Application #' #' Terminate and archive a currently deployed ShinyApps application. #' #' @param appName Name of application to terminate #' @param account Account name. If a single account is registered on the system #' then this parameter can be omitted. #' @param server Server name. Required only if you use the same account name on #' multiple servers (see [servers()]) #' @param quiet Request that no status information be printed to the console #' during the termination. #' #' @note This function only works for ShinyApps servers. #' #' @examples #' \dontrun{ #' #' # terminate an application #' terminateApp("myapp") #' } #' @seealso [applications()], [deployApp()], and #' [restartApp()] #' @export terminateApp <- function(appName, account = NULL, server = NULL, quiet = FALSE) { # define terminate task taskDef <- list() taskDef$beginStatus <- "Terminating application" taskDef$endStatus <- "Application successfully terminated" taskDef$action <- function(client, application) { client$terminateApplication(application$id) } # perform it applicationTask(taskDef, appName, account, server = server, quiet) } rsconnect/R/connect.R0000644000175000017500000001474514051233371014371 0ustar nileshnileshuserRecord <- function(email, username, first_name, last_name, password) { list( email = email, username = username, first_name = first_name, last_name = last_name, password = password ) } prettyPasteFields <- function(message, fields) { header <- paste(message, ":\n- ", sep = "") body <- paste(strwrap(paste(shQuote(fields), collapse = ", ")), collapse = "\n") paste(header, body, sep = "") } validateUserRecord <- function(record) { requiredFields <- c("email", "username", "first_name", "last_name", "password") missingFields <- setdiff(requiredFields, names(record)) extraFields <- setdiff(names(record), requiredFields) ## Construct error message if necessary msg <- NULL if (length(missingFields)) { msg <- prettyPasteFields("The following required fields are missing", missingFields) } if (length(extraFields)) { msg <- paste(msg, prettyPasteFields("The following extraneous fields were found", extraFields)) } if (!is.null(msg)) { stop(msg) } record } # return a list of functions that can be used to interact with connect connectClient <- function(service, authInfo) { service <- parseHttpUrl(service) list( ## Server settings API serverSettings = function() { handleResponse(GET(service, authInfo, file.path("/server_settings"))) }, ## User API addUser = function(userRecord) { userRecord <- validateUserRecord(userRecord) handleResponse(POST_JSON(service, authInfo, "/users", userRecord)) }, getUser = function(userId) { handleResponse(GET(service, authInfo, file.path("/users", userId))) }, currentUser = function() { handleResponse(GET(service, authInfo, "/users/current")) }, ## Tokens API addToken = function(token) { handleResponse(POST_JSON(service, authInfo, "/tokens", token)) }, ## Applications API listApplications = function(accountId, filters = NULL) { if (is.null(filters)) { filters <- vector() } path <- "/applications" query <- paste(filterQuery( c("account_id", names(filters)), c(accountId, unname(filters)) ), collapse = "&") listRequest(service, authInfo, path, query, "applications") }, createApplication = function(name, title, template, accountId) { # add name; inject title if specified details <- list(name = name) if (!is.null(title) && nzchar(title)) details$title <- title # RSC doesn't currently use the template or account ID # parameters; they exist for compatibility with lucid. handleResponse(POST_JSON(service, authInfo, "/applications", details)) }, terminateApplication = function(applicationId) { path <- paste("/applications/", applicationId, "/terminate", sep="") handleResponse(POST_JSON(service, authInfo, path, list())) }, uploadApplication = function(appId, bundlePath) { path <- file.path("/applications", appId, "upload") handleResponse(POST(service, authInfo, path, contentType="application/x-gzip", file=bundlePath)) }, deployApplication = function(applicationId, bundleId=NULL) { path <- paste("/applications/", applicationId, "/deploy", sep="") json <- list() json$bundle <- as.numeric(bundleId) handleResponse(POST_JSON(service, authInfo, path, json)) }, configureApplication = function(applicationId) { handleResponse(GET(service, authInfo, paste( "/applications/", applicationId, "/config", sep=""))) }, getApplication = function(applicationId) { handleResponse(GET(service, authInfo, paste0("/applications/", applicationId))) }, ## Tasks API listTasks = function() { path <- "/tasks" handleResponse(GET(service, authInfo, path)) }, getTask = function(taskId) { path <- file.path("/tasks", taskId) handleResponse(GET(service, authInfo, path)) }, killTask = function(taskId) { path <- file.path("/tasks", taskId, "kill") handleResponse(POST_JSON(service, authInfo, path, list())) }, waitForTask = function(taskId, quiet) { start <- 0 while (TRUE) { path <- paste0(file.path("/tasks", taskId), "?first_status=", start) response <- handleResponse(GET(service, authInfo, path)) labeledMessage = function(msg) { message(paste('[Connect]', msg)) } if (length(response$status) > 0) { lapply(response$status, labeledMessage) start <- response$last_status } if (length(response$finished) > 0 && response$finished) { return(response) } Sys.sleep(1) } } ) } listRequest = function(service, authInfo, path, query, listName, page = 100, max=NULL) { # accumulate multiple pages of results offset <- 0 results <- list() while(TRUE) { # add query params pathWithQuery <- paste(path, "?", query, "&count=", page, "&offset=", offset, sep="") # make request and append the results response <- handleResponse(GET(service, authInfo, pathWithQuery)) results <- append(results, response[[listName]]) # update the offset offset <- offset + response$count # get all results if no max was specified if (is.null(max)) { max = response$total } # exit if we've got them all if (length(results) >= response$total || length(results) >= max) break } return(results) } filterQuery <- function(param, value, operator = NULL) { if (is.null(operator)) { op <- ":" } else { op <- paste(":", operator, ":", sep="") } q <- paste("filter=", param, op, value, sep="") return(q) } isContentType <- function(response, contentType) { grepl(contentType, response$contentType, fixed = TRUE) } rsconnect/R/purgeApp.R0000644000175000017500000000215713455420275014525 0ustar nileshnilesh#' Purge an Application #' #' Purge a currently archived ShinyApps application. #' #' @param appName Name of application to purge #' @param account Account name. If a single account is registered on the system #' then this parameter can be omitted. #' @param server Server name. Required only if you use the same account name on #' multiple servers (see [servers()]) #' @param quiet Request that no status information be printed to the console #' during the termination. #' #' @note This function only works for ShinyApps servers. #' #' @examples #' \dontrun{ #' #' # purge an application #' purgeApp("myapp") #' } #' @seealso [applications()], [deployApp()], and #' [restartApp()] #' @export purgeApp <- function(appName, account = NULL, server = NULL, quiet = FALSE) { # define purge task taskDef <- list() taskDef$beginStatus <- "Purging application" taskDef$endStatus <- "Application successfully purged" taskDef$action <- function(client, application) { client$purgeApplication(application$id) } # perform it applicationTask(taskDef, appName, account, server = server, quiet) } rsconnect/R/http-rcurl.R0000644000175000017500000001325513471523533015046 0ustar nileshnilesh# HTTP transport using the RCurl package. DEPRECATED; exists only for backwards compatibility (it # was the default transport for many years). In a future release of rsconnect, the RCurl transport # will be removed entirely, and the "rcurl" option will be interpreted as "libcurl". httpRCurl <- function(protocol, host, port, method, path, headers, contentType = NULL, contentFile = NULL, certificate = NULL, timeout = NULL) { if (!is.null(contentFile) && is.null(contentType)) stop("You must specify a contentType for the specified file") # add prefix to port if necessary if (!is.null(port) && nzchar(port)) port <- paste(":", port, sep="") # build url url <- paste(protocol, "://", host, port, path, sep="") # read file in binary mode if (!is.null(contentFile)) { fileLength <- file.info(contentFile)$size fileContents <- readBin(contentFile, what="raw", n=fileLength) headers$`Content-Type` <- contentType } # establish options options <- RCurl::curlOptions(url) options$useragent <- userAgent() # overlay user-supplied options userOptions <- getOption("rsconnect.rcurl.options") if (is.list(userOptions)) { for (option in names(userOptions)) { options[option] = userOptions[option] } } if (isTRUE(getOption("rsconnect.check.certificate", TRUE))) { options$ssl.verifypeer <- TRUE # apply certificate information if present if (!is.null(certificate)) options$cainfo <- certificate } else { # don't verify peer (less secure but tolerant to self-signed cert issues) options$ssl.verifypeer <- FALSE } headerGatherer <- RCurl::basicHeaderGatherer() options$headerfunction <- headerGatherer$update # the text processing done by .mapUnicode has the unfortunate side effect # of turning escaped backslashes into ordinary backslashes but leaving # ordinary backslashes alone, which can create malformed JSON. textGatherer <- RCurl::basicTextGatherer(.mapUnicode = FALSE) # use timeout if supplied if (!is.null(timeout)) { options$timeout <- timeout } # verbose if requested if (httpVerbose()) options$verbose <- TRUE # add extra headers headers <- appendCookieHeaders( list(protocol=protocol, host=host, port=port, path=path), headers) extraHeaders <- as.character(headers) names(extraHeaders) <- names(headers) options$httpheader <- extraHeaders # make the request time <- system.time(gcFirst = FALSE, tryCatch({ if (!is.null(contentFile)) { RCurl::curlPerform(url = url, .opts = options, customrequest = method, readfunction = fileContents, infilesize = fileLength, writefunction = textGatherer$update, upload = TRUE) } else if (method == "DELETE") { RCurl::curlPerform(url = url, .opts = options, customrequest = method) } else { if (identical(method, "GET")) { RCurl::getURL(url, .opts = options, write = textGatherer) } else { RCurl::curlPerform(url = url, .opts = options, customrequest = method, writefunction = textGatherer$update) } }}, error = function(e, ...) { # ignore errors resulting from timeout or user abort if (identical(e$message, "Callback aborted") || identical(e$message, "transfer closed with outstanding read data remaining")) return(NULL) # bubble remaining errors through else stop(e) })) httpTrace(method, path, time) # get list of HTTP response headers headers <- headerGatherer$value() # deduce status. we do this *before* lowercase conversion, as it is possible # for both "Status" and "status" headers to exist status <- 200 statuses <- headers[names(headers) == "status"] # find status header statuses <- statuses[grepl("^\\d+$", statuses)] # ensure fully numeric if (length(statuses) > 0) { # we found a numeric status header status <- as.integer(statuses[[1]]) } # lowercase all header names for normalization; HTTP/2 uses lowercase headers # by default but they're typically capitalized in HTTP/1 names(headers) <- tolower(names(headers)) if ("location" %in% names(headers)) location <- headers[["location"]] else location <- NULL # presume a plain text response unless specified otherwise contentType <- if ("content-type" %in% names(headers)) { headers[["content-type"]] } else { "text/plain" } # emit JSON trace if requested if (!is.null(contentFile) && httpTraceJson() && identical(contentType, "application/json")) cat(paste0("<< ", rawToChar(fileContents), "\n")) # Parse cookies from header; bear in mind that there may be multiple headers cookieHeaders <- headers[names(headers) == "set-cookie"] storeCookies(list(protocol=protocol, host=host, port=port, path=path), cookieHeaders) contentValue <- textGatherer$value() # emit JSON trace if requested if (httpTraceJson() && identical(contentType, "application/json")) cat(paste0(">> ", contentValue, "\n")) list(req = list(protocol = protocol, host = host, port = port, method = method, path = path), status = status, location = location, contentType = contentType, content = contentValue) } rsconnect/R/http-internal.R0000644000175000017500000000615413471523533015533 0ustar nileshnilesh# Internal sockets HTTP transport. Not recommended since it does not support HTTPS, but useful as a # last resort if other methods don't work since it can piggyback on IE proxy settings via R's own # internet configuration. httpInternal <- function(protocol, host, port, method, path, headers, contentType = NULL, contentFile = NULL, certificate = NULL, timeout = NULL) { if (!is.null(contentFile) && is.null(contentType)) stop("You must specify a contentType for the specified file") # default port to 80 if necessary if (!nzchar(port)) port <- "80" # read file in binary mode if (!is.null(contentFile)) { fileLength <- file.info(contentFile)$size fileContents <- readBin(contentFile, what="raw", n=fileLength) } # build http request request <- NULL request <- c(request, paste(method, " ", path, " HTTP/1.1\r\n", sep="")) request <- c(request, "User-Agent: ", userAgent(), "\r\n") request <- c(request, "Host: ", host, "\r\n", sep="") request <- c(request, "Accept: */*\r\n") if (!is.null(contentFile)) { request <- c(request, paste("Content-Type: ", contentType, "\r\n", sep="")) request <- c(request, paste("Content-Length: ", fileLength, "\r\n", sep="")) } headers <- appendCookieHeaders( list(protocol=protocol, host=host, port=port, path=path), headers) for (name in names(headers)) { request <- c(request, paste(name, ": ", headers[[name]], "\r\n", sep="")) } request <- c(request, "\r\n") # output request if in verbose mode if (httpVerbose()) cat(request) # use timeout if supplied, default timeout if not (matches parameter behavior # for socketConnection) timeout <- if (is.null(timeout)) getOption("timeout") else timeout # open socket connection time <- system.time(gcFirst=FALSE, { conn <- socketConnection(host = host, port = as.integer(port), open = "w+b", blocking = TRUE, timeout = timeout) on.exit(close(conn)) # write the request header and file payload writeBin(charToRaw(paste(request,collapse="")), conn, size=1) if (!is.null(contentFile)) { writeBin(fileContents, conn, size=1) } # read the response response <- readHttpResponse(list( protocol = protocol, host = host, port = port, method = method, path = path), conn) }) httpTrace(method, path, time) # print if in verbose mode if (httpVerbose()) print(response) # output JSON if requested if (httpTraceJson() && identical(contentType, "application/json")) cat(paste0("<< ", rawToChar(fileContents), "\n")) # return it response } rsconnect/R/http.R0000644000175000017500000002706114051233424013711 0ustar nileshnileshuserAgent <- function() { paste("rsconnect", packageVersion("rsconnect"), sep="/") } parseHttpUrl <- function(urlText) { matches <- regexec("(http|https)://([^:/#?]+)(?::(\\d+))?(.*)", urlText) components <- regmatches(urlText, matches)[[1]] if (length(components) == 0) stop("Invalid url: ", urlText) url <- list() url$protocol <- components[[2]] url$host <- components[[3]] url$port <- components[[4]] url$path <- components[[5]] url } parseHttpHeader <- function(header) { split <- strsplit(header, ": ")[[1]] if (length(split) == 2) return (list(name = split[1], value = split[2])) else return (NULL) } parseHttpStatusCode <- function(statusLine) { # extract status code; needs to deal with HTTP/1.0, HTTP/1.1, and HTTP/2 statusCode <- regexExtract("HTTP/[0-9]+\\.?[0-9]* ([0-9]+).*", statusLine) if (is.null(statusCode)) return (-1) else return (as.integer(statusCode)) } # @param request A list containing protocol, host, port, method, and path fields # @param conn The connection to read the response from. readHttpResponse <- function(request, conn) { # read status code resp <- readLines(conn, 1) statusCode <- parseHttpStatusCode(resp[1]) # read response headers contentLength <- NULL contentType <- NULL location <- NULL setCookies <- NULL repeat { resp <- readLines(conn, 1) if (nzchar(resp) == 0) break() header <- parseHttpHeader(resp) if (!is.null(header)) { name <- tolower(header$name) if (name == "content-type") contentType <- header$value if (name == "content-length") contentLength <- as.integer(header$value) if (name == "location") location <- header$value if (name == "set-cookie") setCookies <- c(setCookies, header$value) } } # Store the cookies that were found in the request storeCookies(request, setCookies) # read the response content if (is.null(contentLength)) { # content length is unknown, so stream remaining text content <- paste(readLines(con = conn), collapse = "\n") } else { # we know the content length, so read exactly that many bytes content <- rawToChar(readBin(con = conn, what = "raw", n = contentLength)) } # emit JSON trace if requested if (httpTraceJson() && identical(contentType, "application/json")) cat(paste0(">> ", content, "\n")) # return list list(req = request, status = statusCode, location = location, contentType = contentType, content = content) } httpVerbose <- function() { getOption("rsconnect.http.verbose", FALSE) } httpTraceJson <- function() { getOption("rsconnect.http.trace.json", FALSE) } httpTrace <- function(method, path, time) { if (getOption("rsconnect.http.trace", FALSE)) { cat(method, " ", path, " ", as.integer(time[['elapsed']]*1000), "ms\n", sep="") } } httpFunction <- function() { httpType <- getOption("rsconnect.http", "libcurl") if (identical("libcurl", httpType)) httpLibCurl else if (identical("rcurl", httpType)) httpRCurl else if (identical("curl", httpType)) httpCurl else if (identical("internal", httpType)) httpInternal else if (is.function(httpType)) httpType else stop(paste("Invalid http option specified:",httpType, ". Valid values are libcurl, rcurl, curl, and internal")) } POST_JSON <- function(service, authInfo, path, json, query = NULL, headers = list()) { POST(service, authInfo, path, query, "application/json", content = toJSON(json, pretty = TRUE, digits = 30), headers = headers) } PUT_JSON <- function(service, authInfo, path, json, query = NULL, headers = list()) { PUT(service, authInfo, path, query, "application/json", content = toJSON(json, pretty = TRUE, digits = 30), headers = headers) } POST <- function(service, authInfo, path, query = NULL, contentType = NULL, file = NULL, content = NULL, headers = list()) { # check if the request needs a body if ((is.null(file) && is.null(content))) { # no file or content, don't include a body with the request httpRequest(service, authInfo, "POST", path, query, headers) } else { # include the request's data in the body httpRequestWithBody(service, authInfo, "POST", path, query, contentType, file, content, headers) } } PUT <- function(service, authInfo, path, query = NULL, contentType = NULL, file = NULL, content = NULL, headers = list()) { httpRequestWithBody(service, authInfo, "PUT", path, query, contentType, file, content, headers) } GET <- function(service, authInfo, path, query = NULL, headers = list(), timeout = NULL) { httpRequest(service, authInfo, "GET", path, query, headers, timeout) } DELETE <- function(service, authInfo, path, query = NULL, headers = list()) { httpRequest(service, authInfo, "DELETE", path, query, headers) } httpRequestWithBody <- function(service, authInfo, method, path, query = NULL, contentType = NULL, file = NULL, content = NULL, headers = list()) { if ((is.null(file) && is.null(content))) stop("You must specify either the file or content parameter.") if ((!is.null(file) && !is.null(content))) stop("You must specify either the file or content parameter but not both.") # prepend the service path url <- paste(service$path, path, sep="") # append the query if (!is.null(query)) { # URL encode query args query <- utils::URLencode(query) url <- paste(url, "?", query, sep="") } # if we have content then write it to a temp file before posting if (!is.null(content)) { file <- tempfile() writeChar(content, file, eos = NULL, useBytes=TRUE) } # if this request is to be authenticated, sign it if (!is.null(authInfo$secret) || !is.null(authInfo$private_key)) { sigHeaders <- signatureHeaders(authInfo, method, url, file) headers <- append(headers, sigHeaders) } else if (!is.null(authInfo$apiKey)) { headers <- append(headers, apiKeyAuthHeaders(authInfo$apiKey)) } else { headers <- append(headers, bogusSignatureHeaders()) } # set up certificate tempfile if using https certificate <- NULL if (identical(service$protocol, "https")) certificate <- createCertificateFile(authInfo$certificate) # perform request http <- httpFunction() http(service$protocol, service$host, service$port, method, url, headers, contentType, file, certificate = certificate) } httpRequest <- function(...) { httpInvokeRequest(..., http = httpFunction()) } httpInvokeRequest <- function(service, authInfo, method, path, query, headers = list(), timeout = NULL, http) { # prepend the service path url <- paste(service$path, path, sep="") # append the query if (!is.null(query)) { # URL encode query args query <- utils::URLencode(query) url <- paste(url, "?", query, sep="") } # the request should be authenticated if there's any auth specified # other than the server certificate if (length(authInfo) > 0 && !identical(names(authInfo), "certificate")) { if (!is.null(authInfo$secret) || !is.null(authInfo$private_key)) { sigHeaders <- signatureHeaders(authInfo, method, url, NULL) headers <- append(headers, sigHeaders) } else if (!is.null(authInfo$apiKey)) { headers <- append(headers, apiKeyAuthHeaders(authInfo$apiKey)) } else { headers <- append(headers, bogusSignatureHeaders()) } } else { headers <- append(headers, bogusSignatureHeaders()) } # set up certificate tempfile if using https certificate <- NULL if (identical(service$protocol, "https")) certificate <- createCertificateFile(authInfo$certificate) # perform method http(service$protocol, service$host, service$port, method, url, headers, timeout = timeout, certificate = certificate) } rfc2616Date <- function(time = Sys.time()) { # capure current locale loc <- Sys.getlocale('LC_TIME') # set locale to POSIX/C to ensure ASCII date Sys.setlocale("LC_TIME", "C") # generate date date <- strftime(Sys.time(), "%a, %d %b %Y %H:%M:%S GMT", tz = "GMT") # restore locale Sys.setlocale("LC_TIME", loc) return(date) } urlDecode <- function(x) { curl::curl_unescape(x) } urlEncode <- function(x) { if (inherits(x, "AsIs")) return(x) RCurl::curlEscape(x) } queryString <- function (elements) { stopifnot(is.list(elements)) elements <- elements[!sapply(elements, is.null)] names <- curl::curl_escape(names(elements)) values <- vapply(elements, urlEncode, character(1)) if (length(elements) > 0) { result <- paste0(names, "=", values, collapse = "&") } else { result <- "" } return(result) } apiKeyAuthHeaders <- function(apiKey) { list(`Authorization` = paste("Key", apiKey)) } bogusSignatureHeaders <- function() { list(`X-Auth-Token` = 'anonymous-access') # The value doesn't actually matter here, but the header needs to be set. } signatureHeaders <- function(authInfo, method, path, file) { # headers to return headers <- list() # remove query string from path if necessary path <- strsplit(path, "?", fixed = TRUE)[[1]][[1]] # generate date date <- rfc2616Date() # generate contents hash as hex values. md5 <- fileMD5(file) if (!is.null(authInfo$secret)) { # the content hash is a string of hex characters when using secret. md5 <- md5.as.string(md5) # build canonical request canonicalRequest <- paste(method, path, date, md5, sep="\n") # sign request using shared secret decodedSecret <- openssl::base64_decode(authInfo$secret) hmac <- openssl::sha256(canonicalRequest, key = decodedSecret) signature <- paste(openssl::base64_encode(hmac), "; version=1", sep="") } else if (!is.null(authInfo$private_key)) { # the raw content hash is base64 encoded hex values when using private key. md5 <- openssl::base64_encode(md5) # build canonical request canonicalRequest <- paste(method, path, date, md5, sep="\n") # sign request using local private key private_key <- openssl::read_key( openssl::base64_decode(authInfo$private_key), der = TRUE) # OpenSSL defaults to sha1 hash function (which is what we need) rawsig <- openssl::signature_create(charToRaw(canonicalRequest), key = private_key) signature <- openssl::base64_encode(rawsig) } else { stop("can't sign request: no shared secret or private key") } # return headers headers$Date <- date headers$`X-Auth-Token` <- authInfo$token headers$`X-Auth-Signature` <- signature headers$`X-Content-Checksum` <- md5 headers } rsconnect/R/rsconnect-package.R0000644000175000017500000000255513274070160016324 0ustar nileshnilesh#' Deployment Interface for R Markdown Documents and Shiny Applications #' #' The `rsconnect`` package provides a programmatic deployment #' interface for RPubs, shinyapps.io, and RStudio Connect. Supported contents #' types include R Markdown documents, Shiny applications, plots, and static #' web content. #' #' @section Managing Applications: #' #' Deploy and manage applications with the following functions: #' #' * [deployApp()]: #' Deploy a Shiny application to a server. #' #' * [configureApp()]: #' Configure an application currently running on a server. #' #' * [restartApp()]: #' Restart an application currently running on a server. #' #' * [terminateApp()]: #' Terminate an application currently running on a server. #' #' * [deployments()]: #' List deployment records for a given application directory. #' #' #' More information on application management is available in the #' [applications()] help page. #' #' @section Managing Accounts and Users: #' #' Manage accounts on the local system. ## #' * [setAccountInfo()]: #' Register an account. #' #' * [removeAccount()]: #' Remove an account. #' #' * [accountInfo()]: #' View information for a given account. #' #' More information on account management is available in the #' [accounts()] help page. #' #' @name rsconnect-package #' @aliases rsconnect-package rsconnect #' @docType package #' @keywords package NULL rsconnect/R/rsa.R0000644000175000017500000000321313540165263013517 0ustar nileshnilesh# createUniqueId creates a random hex string of length bytes. # Uses its own random state. # # createUniqueId is used to create the token (name) for a public/private # key-pair. We have used three approaches for token generation: # # 1. Random hex string using the incoming random state. Produced duplicate # tokens when users forced a constant initial seed (set.seed(0)). # https://github.com/rstudio/rsconnect/issues/221 # 2. MD5 of the public key. Produced empty tokens when the MD5 algorithm # is disabled (due to FIPS mode). # https://github.com/rstudio/rsconnect/issues/378 # 3. Random hex string with isolated random state. createUniqueId <- function(bytes) { # Seed handling inspired by: # http://www.cookbook-r.com/Numbers/Saving_the_state_of_the_random_number_generator/ if (exists(".Random.seed", .GlobalEnv)) { oldseed <- .GlobalEnv$.Random.seed } else { oldseed <- NULL } on.exit( if (!is.null(oldseed)) { .GlobalEnv$.Random.seed <- oldseed } else { rm(".Random.seed", envir = .GlobalEnv) }, add = TRUE ) set.seed(NULL) paste0(as.hexmode(sample(256, bytes)-1), collapse="") } # generateToken generates a token for signing requests sent to the RStudio # Connect service. The token's ID and public key are sent to the server, and # the private key is saved locally. generateToken <- function() { key <- openssl::rsa_keygen(2048L) priv.der <- openssl::write_der(key) pub.der <- openssl::write_der(key$pubkey) tokenId <- createUniqueId(16) list( token = paste0("T", tokenId), public_key = openssl::base64_encode(pub.der), private_key = openssl::base64_encode(priv.der) ) } rsconnect/R/ide.R0000644000175000017500000001074213356733102013476 0ustar nileshnilesh # These functions are intended to be called primarily by the RStudio IDE. # attempts to validate a server URL by hitting a known configuration endpoint # (which does not require authentication). returns a list containing (valid = # TRUE) and server settings, or a list containing (valid = FALSE) and an error # message. # # the URL may be specified with or without the protocol and port; this function # will try both http and https and follow any redirects given by the server. validateServerUrl <- function(url, certificate = NULL) { tryAllProtocols <- TRUE if (!grepl("://", url, fixed = TRUE)) { if (grepl(":3939", url, fixed = TRUE)) { # assume http for default (local) connect installations url <- paste0("http://", url) } else { # assume https elsewhere url <- paste0("https://", url) } } # if the URL ends with a port number, don't try http/https on the same port if (grepl(":\\d+/?$", url)) { tryAllProtocols <- FALSE } settingsEndpoint <- "/server_settings" url <- ensureConnectServerUrl(url) # populate certificate if supplied certificate <- inferCertificateContents(certificate) # begin trying URLs to discover the correct one response <- NULL errMessage <- "" retry <- TRUE while (retry) { tryCatch({ httpResponse <- GET(parseHttpUrl(url), list(certificate = certificate), settingsEndpoint, timeout = getOption("rsconnect.http.timeout", 10)) # check for redirect if (httpResponse$status == 307 && !is.null(httpResponse$location)) { # we were served a redirect; try again with the new URL url <- httpResponse$location if (substring(url, (nchar(url) - nchar(settingsEndpoint)) + 1) == settingsEndpoint) { # chop /server_settings from the redirect path to get the raw API path url <- substring(url, 1, nchar(url) - nchar(settingsEndpoint)) } next } response <- handleResponse(httpResponse) # got a real response; stop trying now retry <- FALSE }, error = function(e) { if (inherits(e, "OPERATION_TIMEDOUT") && tryAllProtocols) { # if the operation timed out on one protocol, try the other one (note # that we don't do this if a port is specified) if (substring(url, 1, 7) == "http://") { url <<- paste0("https://", substring(url, 8)) } else if (substring(url, 1, 8) == "https://") { url <<- paste0("http://", substring(url, 9)) } tryAllProtocols <<- FALSE return() } errMessage <<- e$message retry <<- FALSE }) } if (is.null(response)) { list( valid = FALSE, message = errMessage) } else { c(list(valid = TRUE, url = url, name = findLocalServer(url)), response) } } # given a server URL, returns that server's short name. if the server is not # currently registered, the server is registered and the short name of the newly # registered server is returned. findLocalServer <- function(url) { # make sure the url has the current API suffix url <- ensureConnectServerUrl(url) # helper to find a server given its URL findServerByUrl <- function(name) { allServers <- as.data.frame(rsconnect::servers(local = TRUE)) match <- allServers[allServers$url == url, , drop = FALSE] if (nrow(match) == 0) NULL else as.character(match[1,"name"]) } # if there are no local servers with the given URL, add one and return its # name name <- findServerByUrl(url) if (is.null(name)) { addConnectServer(url = url, name = NULL, certificate = NULL, quiet = TRUE) findServerByUrl(url) } else { name } } # generate the markers showRstudioSourceMarkers <- function(basePath, lint) { markers <- list() applied <- lapply(lint, function(file) { lapply(file, function(linter) { lapply(linter$indices, function(index) { marker <- list() marker$type <- "warning" marker$file <- file.path(basePath, linter$file) marker$line <- index marker$column <- 1 marker$message <- linter$suggestion markers <<- c(markers, list(marker)) marker }) }) }) rstudioapi::callFun("sourceMarkers", name = "Publish Content Issues", markers = markers, basePath = basePath, autoSelect = "first") } rsconnect/R/json.R0000644000175000017500000000021413356733102013677 0ustar nileshnilesh toJSON <- function(x, ...) { jsonlite::toJSON(x, dataframe="columns", null="null", na="null", auto_unbox=TRUE, ...) } rsconnect/R/applications.R0000644000175000017500000002437014030425253015420 0ustar nileshnilesh #' List Deployed Applications #' #' List all applications currently deployed for a given account. #' @param account Account name. If a single account is registered on the system #' then this parameter can be omitted. #' @param server Server name. Required only if you use the same account name on #' multiple servers. #' @return #' Returns a data frame with the following columns: #' \tabular{ll}{ #' `id` \tab Application unique id \cr #' `name` \tab Name of application \cr #' `url` \tab URL where application can be accessed \cr #' #' `status` \tab Current status of application. Valid values are `pending`, #' `deploying`, `running`, `terminating`, and `terminated` \cr #' `size` \tab Instance size (small, medium, large, etc.) (on #' ShinyApps.io) \cr #' `instances` \tab Number of instances (on ShinyApps.io) \cr #' `config_url` \tab URL where application can be configured \cr #' } #' @note To register an account you call the [setAccountInfo()] function. #' @examples #' \dontrun{ #' #' # list all applications for the default account #' applications() #' #' # list all applications for a specific account #' applications("myaccount") #' #' # view the list of applications in the data viewer #' View(applications()) #' } #' @seealso [deployApp()], [terminateApp()] #' @family Deployment functions #' @export applications <- function(account = NULL, server = NULL) { # resolve account and create connect client accountDetails <- accountInfo(resolveAccount(account, server), server) serverDetails <- serverInfo(accountDetails$server) client <- clientForAccount(accountDetails) isConnect <- isConnectInfo(accountInfo = accountDetails) # retrieve applications apps <- client$listApplications(accountDetails$accountId) keep <- if (isConnect) { c( 'id', 'name', 'url', 'build_status', 'created_time', 'last_deployed_time', 'guid' ) } else { c( 'id', 'name', 'url', 'status', 'created_time', 'updated_time', 'deployment' ) } # extract the subset of fields we're interested in res <- lapply(apps, `[`, keep) res <- if (isConnect) { lapply(res, function(x){ # set size and instance to NA since Connect doesn't return this info x$size <- NA x$instances <- NA x }) } else { lapply(res, function(x) { # promote the size and instance data to first-level fields x$size <- x$deployment$properties$application.instances.template if (is.null(x$size)) x$size <- NA x$instances <- x$deployment$properties$application.instances.count if (is.null(x$instances)) x$instances <- NA x$deployment <- NULL x$guid <- NA x }) } # The config URL may be provided by the server at some point, but for now # infer it from the account type res <- lapply(res, function(row) { if (isConnect) { prefix <- sub("/__api__", "", serverDetails$url) row$config_url <- paste(prefix, "connect/#/apps", row$id, sep = "/") } else { row$config_url <- paste("https://www.shinyapps.io/admin/#/application", row$id, sep = "/") } row }) # convert to data frame rbindWithoutFactors <- function(...){ rbind.data.frame(..., stringsAsFactors = FALSE) } res <- do.call(rbindWithoutFactors, res) # Ensure the Connect and ShinyApps.io data frames have same column names idx <- match("last_deployed_time", names(res)) if(!is.na(idx)) names(res)[idx] <- "updated_time" idx <- match("build_status", names(res)) if (!is.na(idx)) names(res)[idx] <- "status" return(res) } resolveApplication <- function(accountDetails, appName) { client <- clientForAccount(accountDetails) apps <- client$listApplications(accountDetails$accountId) for (app in apps) { if (identical(app$name, appName)) return (app) } stopWithApplicationNotFound(appName) } stopWithApplicationNotFound <- function(appName) { stop(paste("No application named '", appName, "' is currently deployed", sep=""), call. = FALSE) } applicationTask <- function(taskDef, appName, account, server, quiet) { # get status function and display initial status displayStatus <- displayStatus(quiet) displayStatus(paste(taskDef$beginStatus, "...\n", sep="")) # resolve target account and application accountDetails <- accountInfo(resolveAccount(account, server), server) application <- resolveApplication(accountDetails, appName) # perform the action client <- clientForAccount(accountDetails) task <- taskDef$action(client, application) client$waitForTask(task$task_id, quiet) displayStatus(paste(taskDef$endStatus, "\n", sep = "")) invisible(NULL) } # streams application logs from ShinyApps streamApplicationLogs <- function(authInfo, applicationId, entries, skip) { # build the URL url <- paste0(shinyappsServerInfo()$url, "/applications/", applicationId, "/logs?", "count=", entries, "&tail=1") parsed <- parseHttpUrl(url) # create the curl handle and perform the minimum necessary to create an # authenticated request. we ignore the rsconnect.http option here because only # curl supports the kind of streaming connection that we need. handle <- createCurlHandle(NULL, NULL) curl::handle_setopt(handle, customrequest = "GET") curl::handle_setheaders(handle, .list = signatureHeaders(authInfo, "GET", parsed$path, NULL)) # begin the stream curl::curl_fetch_stream(url = url, fun = function(data) { if (skip > 0) skip <<- skip - 1 else cat(rawToChar(data)) }, handle = handle) } #' Show Application Logs #' #' Show the logs for a deployed ShinyApps application. #' #' @param appPath The path to the directory or file that was deployed. #' @param appFile The path to the R source file that contains the application #' (for single file applications). #' @param appName The name of the application to show logs for. May be omitted #' if only one application deployment was made from `appPath`. #' @param account The account under which the application was deployed. May be #' omitted if only one account is registered on the system. #' @param entries The number of log entries to show. Defaults to 50 entries. #' @param streaming Whether to stream the logs. If `TRUE`, then the #' function does not return; instead, log entries are written to the console #' as they are made, until R is interrupted. Defaults to `FALSE`. #' #' @note This function only uses the \code{libcurl} transport, and works only for #' ShinyApps servers. #' #' @export showLogs <- function(appPath = getwd(), appFile = NULL, appName = NULL, account = NULL, entries = 50, streaming = FALSE) { # determine the log target and target account info target <- deploymentTarget(appPath, appName, NULL, NULL, account) accountDetails <- accountInfo(target$account) client <- lucidClient(shinyappsServerInfo()$url, accountDetails) application <- getAppByName(client, accountDetails, target$appName) if (is.null(application)) stop("No application found. Specify the application's directory, name, ", "and/or associated account.") if (streaming) { # streaming; poll for the entries directly skip <- 0 repeat { tryCatch({ streamApplicationLogs(accountDetails, application$id, entries, skip) # after the first fetch, we've seen all recent entries, so show # only new entries. unfortunately /logs/ doesn't support getting 0 # entries, so get one and don't log it. entries <- 1 skip <- 1 }, error = function(e) { # if the server times out, ignore the error; otherwise, let it # bubble through if (!identical(e$message, "transfer closed with outstanding read data remaining")) { stop(e) } }) } } else { # if not streaming, poll for the entries directly logs <- client$getLogs(application$id, entries) cat(logs) } } #' Sync Application Metadata #' #' Update the metadata for requested application across all deployments #' #' @param appPath The path to the directory or file that was deployed. #' #' @note This function does not update metadata for Shiny and rpubs apps #' #' @export syncAppMetadata <- function(appPath) { if (is.null(appPath) || !file.exists(appPath)) { stop("appPath is null or does not exist") } # get all of the currently known deployments deploys <- deployments(appPath) syncWindow = getOption("rsconnect.metadata.sync.hours", 24) * 3600 now = as.numeric(Sys.time()) for (i in 1:nrow(deploys)) { lastSyncTime <- deploys[i, "lastSyncTime"] # for legacy dcf files that don't have sync time saved yet if (is.null(lastSyncTime) || is.na(lastSyncTime)) lastSyncTime <- deploys[i, "when"] # don't sync if within the configured time window if (as.numeric(lastSyncTime) + syncWindow > now) { next } # don't sync non-connect apps if (!isConnectInfo(server = deploys[i, "hostUrl"])) { next } account <- rsconnect::accountInfo(deploys[i, "account"], server = deploys[i, "server"]) connect <- clientForAccount(account) application <- NULL # if the app does not exist, delete the file tryCatch({ application <- connect$getApplication(deploys[i, "appId"]) }, error = function(c) { message(paste("appId", deploys[i, "appId"], "no longer exists, deleting config file")) file.remove(deploys[i, "deploymentFile"]) stop("Removed config file ", deploys[i, "deploymentFile"]) }) record <- deploymentRecord( name = deploys[i, "name"], title = application$title, username = deploys[i, "username"], account = deploys[i, "account"], server = deploys[i, "server"], hostUrl = deploys[i, "hostUrl"], appId = deploys[i, "appId"], bundleId = deploys[i, "bundleId"], url = application$url, when = deploys[i, "when"], lastSyncTime = now, metadata = list( asMultiple = deploys[i, "asMultiple"], asStatic = deploys[i, "asStatic"], vanity_url = application$vanity_url ) ) # update the record and save out a new config file writeDeploymentRecord(record, deploys[i, "deploymentFile"]) } } rsconnect/R/deployDoc.R0000644000175000017500000000454114105013651014650 0ustar nileshnilesh#' Deploy a Document #' #' Deploys an application consisting of a single R Markdown document or other #' single file (such as an HTML or PDF document). #' #' @param doc Path to the document to deploy. #' @param ... Additional arguments to [deployApp()]. Do not supply `appDir`, #' `appFiles`, or `appPrimaryDoc`; these three parameters are automatically #' generated by `deployDoc` from the document. #' #' @details When deploying an R Markdown document, any files which are required #' to render and display the file must be deployed. #' #' This method discovers these additional files using #' [rmarkdown::find_external_resources()] from \pkg{rmarkdown}. #' #' If you find that the document is missing dependencies, either specify the #' dependencies explicitly in the document (the documentation for #' [rmarkdown::find_external_resources()] explains how to do this), or call #' [deployApp()] directly and specify your own file list in the `appFiles` #' parameter. #' #' @family Deployment functions #' @export deployDoc <- function(doc, ...) { # validate inputs if (!file.exists(doc)) { stop("The document '", doc, "' does not exist.") } if (!requireNamespace("rmarkdown") || packageVersion("rmarkdown") < "0.5.2") { stop("Version 0.5.2 or later of the rmarkdown package is required to ", "deploy individual R Markdown documents.") } # get qualified doc qualified_doc <- normalizePath(doc, winslash = "/") # see if this doc has runtime: shiny_prerendered, if it does then # appFiles will be NULL (bundle the entire directory) if (isShinyRmd(doc)) { app_files <- NULL } else { # default to deploying just the single file specified app_files <- basename(qualified_doc) # if this document's type supports automated resource discovery, do that now, # and add the discovered files to the deployment list ext <- tolower(tools::file_ext(doc)) if (ext %in% c("rmd", "qmd", "html", "htm")) { message("Discovering document dependencies... ", appendLF = FALSE) res <- rmarkdown::find_external_resources(qualified_doc) message("OK") app_files <- c(app_files, res$path) } } # deploy the document with the discovered dependencies deployApp(appDir = dirname(qualified_doc), appFiles = app_files, appPrimaryDoc = basename(qualified_doc), ...) } rsconnect/R/rpubs.R0000644000175000017500000001341513742375125014076 0ustar nileshnilesh#' Upload a file to RPubs #' #' This function publishes a file to rpubs.com. If the upload succeeds a #' list that includes an `id` and `continueUrl` is returned. A browser #' should be opened to the `continueUrl` to complete publishing of the #' document. If an error occurs then a diagnostic message is returned in the #' `error` element of the list. #' #' @param title The title of the document. #' @param contentFile The path to the content file to upload. #' @param originalDoc The document that was rendered to produce the #' `contentFile`. May be `NULL` if the document is not known. #' @param id If this upload is an update of an existing document then the id #' parameter should specify the document id to update. Note that the id is #' provided as an element of the list returned by successful calls to #' `rpubsUpload`. #' @param properties A named list containing additional document properties #' (RPubs doesn't currently expect any additional properties, this parameter #' is reserved for future use). #' #' @return A named list. If the upload was successful then the list contains a #' `id` element that can be used to subsequently update the document as #' well as a `continueUrl` element that provides a URL that a browser #' should be opened to in order to complete publishing of the document. If the #' upload fails then the list contains an `error` element which contains #' an explanation of the error that occurred. #' #' @examples #' \dontrun{ #' # upload a document #' result <- rpubsUpload("My document title", "Document.html") #' if (!is.null(result$continueUrl)) #' browseURL(result$continueUrl) #' else #' stop(result$error) #' #' # update the same document with a new title #' updateResult <- rpubsUpload("My updated title", "Document.html", #' id = result$id) #' } #' @export rpubsUpload <- function(title, contentFile, originalDoc, id = NULL, properties = list()) { # validate inputs if (!is.character(title)) stop("title must be specified") if (nzchar(title) == FALSE) stop("title pmust be a non-empty string") if (!is.character(contentFile)) stop("contentFile parameter must be specified") if (!file.exists(contentFile)) stop("specified contentFile does not exist") if (!is.list(properties)) stop("properties paramater must be a named list") pathFromId <- function(id) { split <- strsplit(id, "^https?://[^/]+")[[1]] if (length(split) == 2) return(split[2]) else return(NULL) } buildPackage <- function(title, contentFile, properties = list()) { # build package.json properties$title = title packageJson <- toJSON(properties) # create a tempdir to build the package in and copy the files to it fileSep <- .Platform$file.sep packageDir <- tempfile() dir.create(packageDir) packageFile <- function(fileName) { paste(packageDir, fileName, sep = fileSep) } writeLines(packageJson, packageFile("package.json")) file.copy(contentFile, packageFile("index.html")) # create the tarball tarfile <- tempfile("package", fileext = ".tar.gz") writeBundle(packageDir, tarfile) # return the full path to the tarball return(tarfile) } # build the package packageFile <- buildPackage(title, contentFile, properties) # determine whether this is a new doc or an update isUpdate <- FALSE method <- "POST" path <- "/api/v1/document" headers <- list() headers$Connection <- "close" if (!is.null(id)) { isUpdate <- TRUE path <- pathFromId(id) method <- "PUT" } # use https if using a curl R package, and vanilla HTTP otherwise http <- httpFunction() if (identical(http, httpRCurl) || identical(http, httpLibCurl)) { protocol <- "https" port <- 443 } else { protocol <- "http" port <- 80 } # send the request result <- http(protocol = protocol, host = "api.rpubs.com", port = port, method = method, path = path, headers = headers, contentType = "application/x-compressed", contentFile = packageFile) # check for success succeeded <- FALSE if (isUpdate && (result$status == 200)) succeeded <- TRUE else if (result$status == 201) succeeded <- TRUE # mark content as UTF-8 content <- result$content Encoding(content) <- "UTF-8" # return either id & continueUrl or error if (succeeded) { parsedContent <- jsonlite::fromJSON(content) id <- ifelse(isUpdate, id, result$location) url <- as.character(parsedContent["continueUrl"]) # we use the source doc as the key for the deployment record as long as # it's a recognized document path; otherwise we use the content file recordSource <- ifelse(!is.null(originalDoc) && isDocumentPath(originalDoc), originalDoc, contentFile) # use the title if given, and the filename name of the document if not recordName <- ifelse(is.null(title) || nchar(title) == 0, basename(recordSource), title) rpubsRec <- deploymentRecord(recordName, "", "", "rpubs", "rpubs.com", "rpubs.com", id, id, url, as.numeric(Sys.time())) rpubsRecFile <- deploymentFile(recordSource, recordName, "rpubs", "rpubs.com") write.dcf(rpubsRec, rpubsRecFile, width = 4096) # record in global history if (!is.null(originalDoc) && nzchar(originalDoc)) addToDeploymentHistory(originalDoc, rpubsRec) # return the publish information return(list(id = id, continueUrl = url)) } else { return(list(error = content)) } } rsconnect/R/deployments.R0000644000175000017500000003137113710063430015273 0ustar nileshnilesh saveDeployment <- function(appPath, name, title, username, account, server, hostUrl, appId, bundleId, url, metadata) { # if there's no new title specified, load the existing deployment record, if # any, to preserve the old title if (is.null(title) || is.na(title) || length(title) == 0 || nchar(title) == 0) { tryCatch({ path <- deploymentFile(appPath, name, account, server) if (file.exists(path)) { deployment <- as.data.frame(read.dcf(path)) title <- as.character(deployment$title[[1]]) # use empty string rather than character(0) if title isn't specified # in the record if (length(title) == 0) title <- "" } }, error = function(e) { # no action needed here (we just won't write a title) title <<- "" }) } # create the record to write to disk deployment <- deploymentRecord(name, title, username, account, server, hostUrl, appId, bundleId, url, when = as.numeric(Sys.time()), lastSyncTime = as.numeric(Sys.time()), metadata) writeDeploymentRecord(deployment, deploymentFile(appPath, name, account, server)) # also save to global history addToDeploymentHistory(appPath, deployment) invisible(NULL) } writeDeploymentRecord <- function(record, filePath) { # use a long width so URLs don't line-wrap write.dcf(record, filePath, width = 4096) } #' List Application Deployments #' #' List deployment records for a given application. #' @param appPath The path to the content that was deployed, either a directory #' or an individual document. #' @param nameFilter Return only deployments matching the given name (optional) #' @param accountFilter Return only deployments matching the given account #' (optional) #' @param serverFilter Return only deployments matching the given server #' (optional) #' @param excludeOrphaned If `TRUE` (the default), return only deployments #' made by a currently registered account. Deployments made from accounts that #' are no longer registered (via e.g.[removeAccount()]) will not be #' returned. #' @return #' Returns a data frame with at least following columns: #' \tabular{ll}{ #' `name` \tab Name of deployed application\cr #' `account` \tab Account owning deployed application\cr #' `bundleId` \tab Identifier of deployed application's bundle\cr #' `url` \tab URL of deployed application\cr #' `when` \tab When the application was deployed (in seconds since the #' epoch)\cr #' `lastSyncTime` \tab When the application was last synced (in seconds since the #' epoch)\cr #' `deploymentFile` \tab Name of configuration file\cr #' } #' #' If additional metadata has been saved with the deployment record using the #' `metadata` argument to [deployApp()], the frame will include #' additional columns. #' #' @examples #' \dontrun{ #' #' # Return all deployments of the ~/r/myapp directory made with the 'abc' #' # account #' deployments("~/r/myapp", accountFilter="abc") #' } #' @seealso [applications()] to get a list of deployments from the #' server, and [deployApp()] to create a new deployment. #' @export deployments <- function(appPath, nameFilter = NULL, accountFilter = NULL, serverFilter = NULL, excludeOrphaned = TRUE) { # calculate rsconnect dir rsconnectDir <- rsconnectRootPath(appPath) # calculate migration dir--all shinyapps deployment records go into the root # folder since it wasn't possible to deploy individual docs using the # shinyapps package migrateRoot <- if (isDocumentPath(appPath)) dirname(appPath) else appPath # migrate shinyapps package created records if necessary shinyappsDir <- file.path(migrateRoot, "shinyapps") if (file.exists(shinyappsDir)) { migrateDir <- file.path(migrateRoot, "rsconnect") for (shinyappsFile in list.files(shinyappsDir, glob2rx("*.dcf"), recursive = TRUE)) { # read deployment record shinyappsDCF <- file.path(shinyappsDir, shinyappsFile) deployment <- as.data.frame(readDcf(shinyappsDCF), stringsAsFactors = FALSE) deployment$server <- "shinyapps.io" # write the new record rsconnectDCF <- file.path(migrateDir, "shinyapps.io", shinyappsFile) dir.create(dirname(rsconnectDCF), showWarnings = FALSE, recursive = TRUE) write.dcf(deployment, rsconnectDCF) # remove old DCF file.remove(shinyappsDCF) } # remove shinyapps dir if it's completely empty remainingFiles <- list.files(shinyappsDir, recursive = TRUE, all.files = TRUE) if (length(remainingFiles) == 0) unlink(shinyappsDir, recursive = TRUE) } # build list of deployment records deploymentRecs <- deploymentRecord(name = character(), title = character(), username = character(), account = character(), server = character(), hostUrl = character(), appId = character(), bundleId = character(), url = character(), when = numeric(), lastSyncTime = numeric()) # get list of active accounts activeAccounts <- accounts() for (deploymentFile in list.files(rsconnectDir, glob2rx("*.dcf"), recursive = TRUE)) { # derive account and server name from deployment record location account <- basename(dirname(deploymentFile)) server <- basename(dirname(dirname(deploymentFile))) # apply optional server filter if (!is.null(serverFilter) && !identical(serverFilter, server)) next # apply optional account filter if (!is.null(accountFilter) && !identical(accountFilter, account)) next # apply optional name filter name <- file_path_sans_ext(basename(deploymentFile)) if (!is.null(nameFilter) && !identical(nameFilter, name)) next # exclude orphaned if requested (note that the virtual server "rpubs.com" # is always considered to be registered) if (excludeOrphaned && server != "rpubs.com") { # orphaned by definition if we have no accounts registered if (is.null(activeAccounts) || identical(nrow(activeAccounts), 0)) next # filter by account name and then by server matchingAccounts <- activeAccounts[activeAccounts[["name"]] == account,] matchingAccounts <- matchingAccounts[matchingAccounts[["server"]] == server,] # if there's no account with the given name and server, consider this # record to be an orphan if (nrow(matchingAccounts) == 0) next } # parse file deployment <- as.data.frame(readDcf(file.path(rsconnectDir, deploymentFile)), stringsAsFactors = FALSE) # fill in any columns missing in this record missingCols <- setdiff(colnames(deploymentRecs), colnames(deployment)) if (length(missingCols) > 0) { deployment[,missingCols] <- NA } # if this record contains any columns that aren't present everywhere, add # them extraCols <- setdiff(colnames(deployment), colnames(deploymentRecs)) if (length(extraCols) > 0 && nrow(deploymentRecs) > 0) { deploymentRecs[,extraCols] <- NA } # record the deployment file for metadata management deployment$deploymentFile = file.path(rsconnectDir, deploymentFile) # append to record set to return deploymentRecs <- rbind(deploymentRecs, deployment) } deploymentRecs } deploymentFile <- function(appPath, name, account, server) { accountDir <- file.path(rsconnectRootPath(appPath), server, account) if (!file.exists(accountDir)) dir.create(accountDir, recursive = TRUE) file.path(accountDir, paste0(name, ".dcf")) } deploymentRecord <- function(name, title, username, account, server, hostUrl, appId, bundleId, url, when, lastSyncTime = as.numeric(Sys.time()), metadata = list()) { # find the username if not already supplied (may differ from account nickname) if (is.null(username) && length(account) > 0) { # default to empty username <- "" userinfo <- NULL try({ userInfo <- accountInfo(account, server) }, silent = TRUE) if (!is.null(userinfo$username)) username <- userinfo$username } # find host information if (is.null(hostUrl) && length(server) > 0) { hostUrl <- "" serverinfo <- NULL try({ serverinfo <- serverInfo(server) }, silent = TRUE) if (!is.null(serverinfo$url)) hostUrl <- serverinfo$url } # compose the standard set of fields and append any requested as.data.frame(c( list(name = name, title = if (is.null(title)) "" else title, username = username, account = account, server = server, hostUrl = hostUrl, appId = appId, bundleId = if (is.null(bundleId)) "" else bundleId, url = url, when = when, lastSyncTime = lastSyncTime), metadata), stringsAsFactors = FALSE) } deploymentHistoryDir <- function() { rsconnectConfigDir("deployments") } addToDeploymentHistory <- function(appPath, deploymentRecord) { # path to deployments files history <- file.path(deploymentHistoryDir(), "history.dcf") newHistory <- file.path(deploymentHistoryDir(), "history.new.dcf") # add the appPath to the deploymentRecord deploymentRecord$appPath <- appPath # write new history file write.dcf(deploymentRecord, newHistory, width = 4096) cat("\n", file = newHistory, append = TRUE) # append existing history to new history if (file.exists(history)) file.append(newHistory, history) # overwrite with new history file.rename(newHistory, history) } #' Forget Application Deployment #' #' Forgets about an application deployment. This is useful if the application #' has been deleted on the server, or the local deployment information needs to #' be reset. #' #' @param appPath The path to the content that was deployed, either a directory #' or an individual document. #' @param name The name of the content that was deployed (optional) #' @param account The name of the account to which the content was deployed #' (optional) #' @param server The name of the server to which the content was deployed #' (optional) #' @param dryRun Set to TRUE to preview the files/directories to be removed #' instead of actually removing them. Defaults to FALSE. #' @param force Set to TRUE to remove files and directories without prompting. #' Defaults to FALSE in interactive sessions. #' @return NULL, invisibly. #' #' @details This method removes from disk the file containing deployment #' metadata. If "name", "account", and "server" are all NULL, then all of the #' deployments for the application are forgotten; otherwise, only the #' specified deployment is forgotten. #' #' @export forgetDeployment <- function(appPath = getwd(), name = NULL, account = NULL, server = NULL, dryRun = FALSE, force = !interactive()) { if (is.null(name) && is.null(account) && is.null(server)) { dcfDir <- rsconnectRootPath(appPath) if (dryRun) message("Would remove the directory ", dcfDir) else if (file.exists(dcfDir)) { if (!force) { prompt <- paste("Forget all deployment records for ", appPath, "? [Y/n] ", sep="") input <- readline(prompt) if (nzchar(input) && !identical(input, "y") && !identical(input, "Y")) stop("No deployment records removed.", call. = FALSE) } unlink(dcfDir, recursive = TRUE) } else { message("No deployments found for the application at ", appPath) } } else { if (is.null(name) || is.null(account) || is.null(server)) { stop("Invalid argument. ", "Supply the name, account, and server of the deployment record to delete. ", "Supply NULL for all three to delete all deployment records.") } dcf <- deploymentFile(appPath, name, account, server) if (dryRun) message("Would remove the file ", dcf) else if (file.exists(dcf)) { if (!force) { prompt <- paste("Forget deployment of ", appPath, " to '", name, "' on ", server, "? [Y/n] ", sep="") input <- readline(prompt) if (nzchar(input) && !identical(input, "y") && !identical(input, "Y")) stop("Cancelled. No deployment records removed.", call. = FALSE) } unlink(dcf) } else { message("No deployment of ", appPath, " to '", name, "' on ", server, " found.") } } invisible(NULL) } rsconnect/R/bundle.R0000644000175000017500000012131314143544436014210 0ustar nileshnileshbundleAppDir <- function(appDir, appFiles, appPrimaryDoc = NULL, verbose = FALSE) { if (verbose) timestampedLog("Creating tempfile for appdir") # create a directory to stage the application bundle in bundleDir <- tempfile() dir.create(bundleDir, recursive = TRUE) on.exit(unlink(bundleDir), add = TRUE) if (verbose) timestampedLog("Copying files") # copy the files into the bundle dir for (file in appFiles) { if (verbose) timestampedLog("Copying", file) from <- file.path(appDir, file) to <- file.path(bundleDir, file) # if deploying a single-file Shiny application, name it "app.R" so it can # be run as an ordinary Shiny application if (is.character(appPrimaryDoc) && tolower(tools::file_ext(appPrimaryDoc)) == "r" && file == appPrimaryDoc) { to <- file.path(bundleDir, "app.R") } if (!file.exists(dirname(to))) dir.create(dirname(to), recursive = TRUE) file.copy(from, to, copy.date = TRUE) # ensure .Rprofile doesn't call packrat/init.R or renv/activate.R if (basename(to) == ".Rprofile") { origRprofile <- readLines(to) msg <- paste0("# Modified by rsconnect package ", packageVersion("rsconnect"), " on ", Sys.time(), ":") packratReplacement <- paste(msg, "# Packrat initialization disabled in published application", '# source(\"packrat/init.R\")', sep="\n") renvReplacement <- paste(msg, "# renv initialization disabled in published application", '# source(\"renv/activate.R\")', sep="\n") newRprofile <- origRprofile newRprofile <- gsub('source(\"packrat/init.R\")', packratReplacement, newRprofile, fixed = TRUE) newRprofile <- gsub('source(\"renv/activate.R\")', renvReplacement, newRprofile, fixed = TRUE) cat(newRprofile, file=to, sep="\n") } } bundleDir } isKnitrCacheDir <- function(subdir, contents) { if (grepl("^.+_cache$", subdir)) { stem <- substr(subdir, 1, nchar(subdir) - nchar("_cache")) rmd <- paste0(stem, ".Rmd") tolower(rmd) %in% tolower(contents) } else { FALSE } } # dir is the path for this step on our recursive walk. # depth is tracks the number of directories we have descended. depth==0 at the root. # totalSize is a running total of our encountered file sizes. # totalFiles is a running count of our encountered files. maxDirectoryList <- function(dir, depth, totalFiles, totalSize) { # generate a list of files at this level contents <- list.files(dir, recursive = FALSE, all.files = TRUE, include.dirs = TRUE, no.. = TRUE, full.names = FALSE) # At the root, some well-known files and directories are not included in the bundle. if (depth==0) { contents <- contents[!grepl(glob2rx("*.Rproj"), contents)] contents <- setdiff(contents, c( ".DS_Store", ".gitignore", ".Rhistory", "manifest.json", "rsconnect", "packrat", "app_cache", ".svn", ".git", ".quarto", ".Rproj.user" )) } # exclude renv files contents <- setdiff(contents, c("renv", "renv.lock")) # checks for .rscignore file and excludes the files and directories listed if (".rscignore" %in% contents) { ignoreContents <- readLines(".rscignore") contents <- setdiff( x = contents, y = ignoreContents ) } # subdirContents contains all files encountered beneath this directory. # Returned paths are relative to this directory. subdirContents <- NULL # Info for each file lets us know to recurse (directories) or aggregate (files). infos <- file.info(file.path(dir, contents), extra_cols = FALSE) row.names(infos) <- contents for (name in contents) { info <- infos[name,] if (isTRUE(info$isdir)) { # Directories do not include their self-size in our counts. # ignore knitr _cache directories if (isKnitrCacheDir(name, contents)) { next } # Recursively enumerate this directory. dirList <- maxDirectoryList(file.path(dir, name), depth+1, totalFiles, totalSize) # Inherit the running totals from our child. totalSize <- dirList$totalSize totalFiles <- dirList$totalFiles # Directories are not included, only their files. subdirContents <- append(subdirContents, file.path(name, dirList$contents)) } else { # This is a file. It counts and is included in our listing. if (is.na(info$isdir)) { cat(sprintf("File information for %s is not available; listing as a normal file.\n", file.path(dir, name))) } ourSize <- if (is.na(info$size)) { 0 } else { info$size } totalSize <- totalSize + ourSize totalFiles <- totalFiles + 1 subdirContents <- append(subdirContents, name) } # abort if we've reached the maximum size if (totalSize > getOption("rsconnect.max.bundle.size")) break # abort if we've reached the maximum number of files if (totalFiles > getOption("rsconnect.max.bundle.files")) break } # totalSize - incoming size summed with all file sizes beneath this directory. # totalFiles - incoming count summed with file count beneath this directory. # contents - all files beneath this directory; paths relative to this directory. list( totalSize = totalSize, totalFiles = totalFiles, contents = subdirContents ) } #' List Files to be Bundled #' #' Given a directory containing an application, returns the names of the files #' to be bundled in the application. #' #' @param appDir Directory containing the application. #' #' @details This function computes results similar to a recursive directory #' listing from [list.files()], with the following constraints: #' #' \enumerate{ #' \item{If the total size of the files exceeds the maximum bundle size, no #' more files are listed. The maximum bundle size is controlled by the #' `rsconnect.max.bundle.size` option.} #' \item{If the total size number of files exceeds the maximum number to be #' bundled, no more files are listed. The maximum number of files in the #' bundle is controlled by the `rsconnect.max.bundle.files` option.} #' \item{Certain files and folders that don't need to be bundled, such as #' those containing internal version control and RStudio state, are #' excluded.} #' \item{In order to stop specific files in the working directory from being #' listed in the bundle, the files must be listed in the .rscignore file. #' This file must have one file or directory per line with no support for #' wildcards.} #' } #' #' @return Returns a list containing the following elements: #' #' \tabular{ll}{ #' `contents` \tab A list of the files to be bundled \cr #' `totalSize` \tab The total size of the files \cr #' } #' #' @export listBundleFiles <- function(appDir) { maxDirectoryList(appDir, 0, 0, 0) } bundleFiles <- function(appDir) { files <- listBundleFiles(appDir) enforceBundleLimits(appDir, files$totalSize, length(files$contents)) files$contents } enforceBundleLimits <- function(appDir, totalSize, totalFiles) { if (totalSize > getOption("rsconnect.max.bundle.size")) { stop("The directory ", appDir, " cannot be deployed because it is too ", "large (the maximum size is ", getOption("rsconnect.max.bundle.size"), " bytes). Remove some files or adjust the rsconnect.max.bundle.size ", "option.", call. = FALSE) } else if (totalFiles > getOption("rsconnect.max.bundle.files")) { stop("The directory ", appDir, " cannot be deployed because it contains ", "too many files (the maximum number of files is ", getOption("rsconnect.max.bundle.files"), "). Remove some files or ", "adjust the rsconnect.max.bundle.files option.", call. = TRUE) } } bundleApp <- function(appName, appDir, appFiles, appPrimaryDoc, assetTypeName, contentCategory, verbose = FALSE, python = NULL, condaMode = FALSE, forceGenerate = FALSE, quarto = NULL, serverRender = FALSE, isShinyApps = FALSE) { logger <- verboseLogger(verbose) logger("Inferring App mode and parameters") appMode <- inferAppMode( appDir = appDir, appPrimaryDoc = appPrimaryDoc, files = appFiles, quarto = quarto) appPrimaryDoc <- inferAppPrimaryDoc( appPrimaryDoc = appPrimaryDoc, appFiles = appFiles, appMode = appMode) hasParameters <- appHasParameters( appDir = appDir, appPrimaryDoc = appPrimaryDoc, appMode = appMode, contentCategory = contentCategory) hasPythonRmd <- appHasPythonRmd( appDir = appDir, files = appFiles) # get application users (for non-document deployments) users <- NULL if (is.null(appPrimaryDoc)) { users <- suppressWarnings(authorizedUsers(appDir)) } # copy files to bundle dir to stage logger("Bundling app dir") bundleDir <- bundleAppDir( appDir = appDir, appFiles = appFiles, appPrimaryDoc = appPrimaryDoc) on.exit(unlink(bundleDir, recursive = TRUE), add = TRUE) # if this is quarto then disable server rendering if requested if (!is.null(quarto) && !serverRender && getOption("rsconnect.server.noprerender", TRUE)) { logger("Disabling server render for Quarto interactive document") disablePrerender <- c( '### QUARTO: Disable Server Render', 'Sys.setenv(RMARKDOWN_RUN_PRERENDER = "0")', '###' ) rProfile <- file.path(bundleDir, ".Rprofile") if (file.exists(rProfile)) { write(disablePrerender, file = rProfile, sep = "\n", append = TRUE) } else { writeLines(disablePrerender, rProfile, useBytes = TRUE) } } # if this is quarto-shiny and there is no "runtime" yaml then inject it # (provides compatibility w/ server: shiny) if (appMode == "quarto-shiny" && getOption("rsconnect.server.qmd.compatibility", TRUE)) { # rename appPrimaryDoc to use .Rmd extension if (tolower(tools::file_ext(appPrimaryDoc)) == "qmd") { renamedAppPrimaryDoc <- paste0(file_path_sans_ext(appPrimaryDoc), ".Rmd") file.rename( file.path(bundleDir, appPrimaryDoc), file.path(bundleDir, renamedAppPrimaryDoc) ) appPrimaryDoc <- renamedAppPrimaryDoc } } # provide runtime: shinyrmd if necessary if (appMode == "quarto-shiny" && getOption("rsconnect.server.yaml.compatibility", TRUE)) { srcPath <- file.path(bundleDir, appPrimaryDoc) yaml <- rmarkdown::yaml_front_matter(srcPath) if (is.null(yaml$runtime)) { opts = options(encoding = "native.enc") on.exit(options(opts), add = TRUE) src <- readLines(srcPath, encoding = "UTF-8", warn = FALSE) src <- c("---", "runtime: shinyrmd", src[-1]) writeLines(enc2utf8(src), srcPath, useBytes = TRUE) } } # generate the manifest and write it into the bundle dir logger("Generate manifest.json") manifest <- createAppManifest( appDir = bundleDir, appMode = appMode, contentCategory = contentCategory, hasParameters = hasParameters, appPrimaryDoc = appPrimaryDoc, assetTypeName = assetTypeName, users = users, condaMode = condaMode, forceGenerate = forceGenerate, python = python, hasPythonRmd = hasPythonRmd, retainPackratDirectory = TRUE, quarto, isShinyApps = isShinyApps, verbose = verbose) manifestJson <- enc2utf8(toJSON(manifest, pretty = TRUE)) manifestPath <- file.path(bundleDir, "manifest.json") writeLines(manifestJson, manifestPath, useBytes = TRUE) # if necessary write an index.htm for shinydoc deployments logger("Writing Rmd index if necessary") indexFiles <- writeRmdIndex(appName, bundleDir) # create the bundle and return its path logger("Compressing the bundle") bundlePath <- tempfile("rsconnect-bundle", fileext = ".tar.gz") writeBundle(bundleDir, bundlePath) bundlePath } # Writes a tar.gz file located at bundlePath containing all files in bundleDir. writeBundle <- function(bundleDir, bundlePath, verbose = FALSE) { logger <- verboseLogger(verbose) prevDir <- setwd(bundleDir) on.exit(setwd(prevDir), add = TRUE) tarImplementation <- Sys.getenv("RSCONNECT_TAR", "internal") logger(sprintf("Using tar: %s", tarImplementation)) if (tarImplementation == "internal") { detectLongNames(bundleDir) } utils::tar(bundlePath, files = NULL, compression = "gzip", tar = tarImplementation) } # uname/grname is not always available. # https://github.com/wch/r-source/blob/8cf68878a1361d00ff2125db2e1ac7dc8f6c8009/src/library/utils/R/tar.R#L539-L549 longerThan <- function(s, lim) { if (!is.null(s) && !is.na(s)) { return(nchar(s) > lim) } return(FALSE) } # Scan the bundle directory looking for long user/group names. # # Warn that the internal tar implementation may produce invalid archives. # https://github.com/rstudio/rsconnect/issues/446 # https://bugs.r-project.org/bugzilla/show_bug.cgi?id=17871 detectLongNames <- function(bundleDir, lengthLimit = 32) { files <- list.files(bundleDir, recursive = TRUE, all.files = TRUE, include.dirs = TRUE, no.. = TRUE, full.names = FALSE) for (f in files) { info <- file.info(file.path(bundleDir,f)) if (longerThan(info$uname, lengthLimit) || longerThan(info$grname, lengthLimit)) { warning("The bundle contains files with user/group names having more than ", lengthLimit, " characters: ", f, " is owned by ", info$uname, ":", info$grname, ". ", "Long user and group names cause the internal R tar implementation to produce invalid archives. ", "Set the RSCONNECT_TAR environment variable to use an external tar command.") return(invisible(TRUE)) } } return(invisible(FALSE)) } #' Create a manifest.json describing deployment requirements. #' #' Given a directory content targeted for deployment, write a manifest.json #' into that directory describing the deployment requirements for that #' content. #' #' @param appDir Directory containing the content (Shiny application, R #' Markdown document, etc). #' #' @param appFiles Optional. The full set of files and directories to be #' included in future deployments of this content. Used when computing #' dependency requirements. When `NULL`, all files in `appDir` are #' considered. #' #' @param appPrimaryDoc Optional. Specifies the primary document in a content #' directory containing more than one. If `NULL`, the primary document is #' inferred from the file list. #' #' @param contentCategory Optional. Specifies the kind of content being #' deployed (e.g. `"plot"` or `"site"`). #' #' @param python Full path to a python binary for use by `reticulate`. #' The specified python binary will be invoked to determine its version #' and to list the python packages installed in the environment. #' If python = NULL, and RETICULATE_PYTHON is set in the environment, #' its value will be used. #' #' @param forceGeneratePythonEnvironment Optional. If an existing #' `requirements.txt` file is found, it will be overwritten when #' this argument is `TRUE`. #' #' @param verbose If TRUE, prints progress messages to the console #' #' #' @export writeManifest <- function(appDir = getwd(), appFiles = NULL, appPrimaryDoc = NULL, contentCategory = NULL, python = NULL, forceGeneratePythonEnvironment = FALSE, verbose = FALSE) { condaMode <- FALSE if (is.null(appFiles)) { appFiles <- bundleFiles(appDir) } else { appFiles <- explodeFiles(appDir, appFiles) } appMode <- inferAppMode( appDir = appDir, appPrimaryDoc = appPrimaryDoc, files = appFiles, quarto = NULL) appPrimaryDoc <- inferAppPrimaryDoc( appPrimaryDoc = appPrimaryDoc, appFiles = appFiles, appMode = appMode) hasParameters <- appHasParameters( appDir = appDir, appPrimaryDoc = appPrimaryDoc, appMode = appMode, contentCategory = contentCategory) hasPythonRmd <- appHasPythonRmd( appDir = appDir, files = appFiles) # copy files to bundle dir to stage bundleDir <- bundleAppDir( appDir = appDir, appFiles = appFiles, appPrimaryDoc = appPrimaryDoc) on.exit(unlink(bundleDir, recursive = TRUE), add = TRUE) python <- getPython(python) # generate the manifest and write it into the bundle dir manifest <- createAppManifest( appDir = bundleDir, appMode = appMode, contentCategory = contentCategory, hasParameters = hasParameters, appPrimaryDoc = appPrimaryDoc, assetTypeName = "content", users = NULL, condaMode = condaMode, forceGenerate = forceGeneratePythonEnvironment, python = python, hasPythonRmd = hasPythonRmd, retainPackratDirectory = FALSE, quarto = NULL, isShinyApps = FALSE, verbose = verbose) manifestJson <- enc2utf8(toJSON(manifest, pretty = TRUE)) manifestPath <- file.path(appDir, "manifest.json") writeLines(manifestJson, manifestPath, useBytes = TRUE) requirementsFilename <- manifest$python$package_manager$package_file if (is.null(requirementsFilename)) { requirementsFilename <- "requirements.txt" } srcRequirementsFile <- file.path(bundleDir, requirementsFilename) dstRequirementsFile <- file.path(appDir, requirementsFilename) if(file.exists(srcRequirementsFile) && !file.exists(dstRequirementsFile)) { file.copy(srcRequirementsFile, dstRequirementsFile) } invisible() } yamlFromRmd <- function(filename) { lines <- readLines(filename, warn = FALSE, encoding = "UTF-8") delim <- grep("^(---|\\.\\.\\.)\\s*$", lines) if (length(delim) >= 2) { # If at least two --- or ... lines were found... if (delim[[1]] == 1 || all(grepl("^\\s*$", lines[1:delim[[1]]]))) { # and the first is a --- if(grepl("^---\\s*$", lines[delim[[1]]])) { # ...and the first --- line is not preceded by non-whitespace... if (diff(delim[1:2]) > 1) { # ...and there is actually something between the two --- lines... yamlData <- paste(lines[(delim[[1]] + 1):(delim[[2]] - 1)], collapse = "\n") return(yaml::yaml.load(yamlData)) } } } } return(NULL) } rmdHasPythonBlock <- function(filename) { lines <- readLines(filename, warn = FALSE, encoding = "UTF-8") matches <- grep("`{python", lines, fixed = TRUE) return (length(matches) > 0) } appHasPythonRmd <- function(appDir, files) { rmdFiles <- grep("^[^/\\\\]+\\.[rq]md$", files, ignore.case = TRUE, perl = TRUE, value = TRUE) if (length(rmdFiles) > 0) { for (rmdFile in rmdFiles) { if (rmdHasPythonBlock(file.path(appDir, rmdFile))) { return(TRUE) } } } return(FALSE) } appHasParameters <- function(appDir, appPrimaryDoc, appMode, contentCategory) { # Only Rmd deployments are marked as having parameters. Shiny applications # may distribute an Rmd alongside app.R, but that does not cause the # deployment to be considered parameterized. # # https://github.com/rstudio/rsconnect/issues/246 parameterAppModes <- c( "rmd-static", "rmd-shiny", "quarto-static", "quarto-shiny" ) if (!(appMode %in% parameterAppModes)) { return(FALSE) } # Sites don't ever have parameters if (identical(contentCategory, "site")) { return(FALSE) } # Only Rmd files have parameters. if (tolower(tools::file_ext(appPrimaryDoc)) == "rmd") { filename <- file.path(appDir, appPrimaryDoc) yaml <- yamlFromRmd(filename) if (!is.null(yaml)) { params <- yaml[["params"]] # We don't care about deep parameter processing, only that they exist. return(!is.null(params) && length(params) > 0) } } FALSE } isShinyRmd <- function(filename) { yaml <- yamlFromRmd(filename) if (!is.null(yaml)) { runtime <- yaml[["runtime"]] server <- yaml[["server"]] if (!is.null(runtime) && grepl('^shiny', runtime)) { # ...and "runtime: shiny", then it's a dynamic Rmd. return(TRUE) } else if (!is.null(server)) { if (identical(server, "shiny")) { return(TRUE) } else if (is.list(server) && identical(server[["type"]], "shiny")) { return(TRUE) } } } return(FALSE) } # infer the mode of the application from its layout # unless we're an API, in which case, we're API mode. inferAppMode <- function(appDir, appPrimaryDoc, files, quarto) { # plumber API plumberFiles <- grep("^(plumber|entrypoint).r$", files, ignore.case = TRUE, perl = TRUE) if (length(plumberFiles) > 0) { return("api") } # single-file Shiny application if (!is.null(appPrimaryDoc) && tolower(tools::file_ext(appPrimaryDoc)) == "r") { return("shiny") } # Shiny application using single-file app.R style. appR <- grep("^app.r$", files, ignore.case = TRUE, perl = TRUE) if (length(appR) > 0) { return("shiny") } # Determine if we have Rmd and if they are (optionally) need the Shiny runtime. rmdFiles <- grep("^[^/\\\\]+\\.[rq]md$", files, ignore.case = TRUE, perl = TRUE, value = TRUE) shinyRmdFiles <- sapply(file.path(appDir, rmdFiles), isShinyRmd) # An Rmd file with a Shiny runtime uses rmarkdown::run. if (any(shinyRmdFiles)) { if (is.null(quarto)) { return("rmd-shiny") } else { return("quarto-shiny") } } # Shiny application using server.R; checked later than Rmd with shiny runtime # because server.R may contain the server code paired with a ShinyRmd and needs # to be run by rmarkdown::run (rmd-shiny). serverR <- grep("^server.r$", files, ignore.case = TRUE, perl = TRUE) if (length(serverR) > 0) { return("shiny") } # Any non-Shiny R Markdown documents are rendered content (rmd-static). if (length(rmdFiles) > 0) { if (is.null(quarto)) { return("rmd-static") } else { return("quarto-static") } } # We don't have an RMarkdown, Shiny app, or Plumber API, but we have a saved model if(length(grep("(saved_model.pb|saved_model.pbtxt)$", files, ignore.case = TRUE, perl = TRUE)) > 0) { return("tensorflow-saved-model") } # no renderable content here; if there's at least one file, we can just serve # it as static content if (length(files) > 0) { return("static") } # there doesn't appear to be any content here we can use stop("No content to deploy; cannot detect content type.") } inferAppPrimaryDoc <- function(appPrimaryDoc, appFiles, appMode) { # if deploying an R Markdown app or static content, infer a primary document # if not already specified docAppModes <- c( "static", "rmd-shiny", "rmd-static", "quarto-shiny", "quarto-static" ) if ((appMode %in% docAppModes) && is.null(appPrimaryDoc)) { # determine expected primary document extension ext <- ifelse(appMode == "static", "html?", "[Rq]md") # use index file if it exists primary <- which(grepl(paste0("^index\\.", ext, "$"), appFiles, fixed = FALSE, ignore.case = TRUE)) if (length(primary) == 0) { # no index file found, so pick the first one we find primary <- which(grepl(paste0("^.*\\.", ext, "$"), appFiles, fixed = FALSE, ignore.case = TRUE)) if (length(primary) == 0) { stop("Application mode ", appMode, " requires at least one document.") } } # if we have multiple matches, pick the first if (length(primary) > 1) primary <- primary[[1]] appPrimaryDoc <- appFiles[[primary]] } appPrimaryDoc } ## check for extra dependencies congruent to application mode inferDependencies <- function(appMode, hasParameters, python, hasPythonRmd, quarto) { deps <- c() if (appMode == "rmd-static") { if (hasParameters) { # An Rmd with parameters needs shiny to run the customization app. deps <- c(deps, "shiny") } deps <- c(deps, "rmarkdown") } if (appMode == "quarto-static") { # Quarto documents need R when the knitr execution engine is used, not always. if (!is.null(quarto) && "knitr" %in% quarto[["engines"]]) { deps <- c(deps, "rmarkdown") } } if (appMode == "quarto-shiny") { # Quarto Shiny documents are executed with rmarkdown::run deps <- c(deps, "rmarkdown", "shiny") } if (appMode == "rmd-shiny") { deps <- c(deps, "rmarkdown", "shiny") } if (appMode == "shiny") { deps <- c(deps, "shiny") } if (appMode == "api") { deps <- c(deps, "plumber") } if (hasPythonRmd) { deps <- c(deps, "reticulate") } unique(deps) } isWindows <- function() { Sys.info()[["sysname"]] == "Windows" } getCondaEnvPrefix <- function(python) { prefix <- dirname(dirname(python)) if (!file.exists(file.path(prefix, "conda-meta"))) { stop(paste("Python from", python, "does not look like a conda environment: cannot find `conda-meta`")) } prefix } getCondaExeForPrefix <- function(prefix) { miniconda <- dirname(dirname(prefix)) conda <- file.path(miniconda, 'bin', 'conda') if (isWindows()) { conda <- paste(conda, ".exe", sep = "") } if (!file.exists(conda)) { stop(paste("Conda env prefix", prefix, "does not have the `conda` command line interface.")) } conda } inferPythonEnv <- function(workdir, python, condaMode, forceGenerate) { # run the python introspection script env_py <- system.file("resources/environment.py", package = "rsconnect") args <- c(shQuote(env_py)) if (condaMode || forceGenerate) { flags <- paste('-', ifelse(condaMode, 'c', ''), ifelse(forceGenerate, 'f', ''), sep = '') args <- c(args, flags) } args <- c(args, shQuote(workdir)) tryCatch({ # First check for reticulate. Then see if python is loaded in reticulate space, verify anaconda presence, # and verify that the user hasn't specified that they don't want their conda environment captured. if('reticulate' %in% rownames(installed.packages()) && reticulate::py_available(initialize = FALSE) && reticulate::py_config()$anaconda && !condaMode) { prefix <- getCondaEnvPrefix(python) conda <- getCondaExeForPrefix(prefix) args <- c("run", "-p", prefix, python, args) # conda run -p python inst/resources/environment.py output <- system2(command = conda, args = args, stdout = TRUE, stderr = NULL, wait = TRUE) } else { output <- system2(command = python, args = args, stdout = TRUE, stderr = NULL, wait = TRUE) } environment <- jsonlite::fromJSON(output) if (is.null(environment$error)) { list( version = environment$python, package_manager = list( name = environment$package_manager, version = environment[[environment$package_manager]], package_file = environment$filename, contents = environment$contents)) } else { # return the error environment } }, error = function(e) { list(error = e$message) }) } createAppManifest <- function(appDir, appMode, contentCategory, hasParameters, appPrimaryDoc, assetTypeName, users, condaMode, forceGenerate, python = NULL, hasPythonRmd = FALSE, retainPackratDirectory = TRUE, quarto = NULL, isShinyApps = FALSE, verbose = FALSE) { # provide package entries for all dependencies packages <- list() # potential problems with the bundled content. errorMessages <- NULL packageMessages <- NULL pyInfo <- NULL # get package dependencies for non-static content deployment if (!identical(appMode, "static") && !identical(appMode, "tensorflow-saved-model")) { # detect dependencies including inferred dependencies inferredDependencies <- inferDependencies(appMode, hasParameters, python, hasPythonRmd, quarto) deps = snapshotDependencies(appDir, inferredDependencies, verbose = verbose) # construct package list from dependencies logger <- verboseLogger(verbose) for (i in seq_len(nrow(deps))) { name <- deps[i, "Package"] if (name == "reticulate" && !is.null(python)) { pyInfo <- inferPythonEnv(appDir, python, condaMode, forceGenerate) if (is.null(pyInfo$error)) { # write the package list into requirements.txt/environment.yml file in the bundle dir packageFile <- file.path(appDir, pyInfo$package_manager$package_file) cat(pyInfo$package_manager$contents, file=packageFile, sep="\n") pyInfo$package_manager$contents <- NULL } else { errorMessages <- c(errorMessages, paste("Error detecting python for reticulate:", pyInfo$error)) } } # get package info info <- as.list(deps[i, c('Source', 'Repository')]) # include github package info info <- c(info, as.list(deps[i, grep('Github', colnames(deps), perl = TRUE, value = TRUE)])) # get package description; note that we need to remove the # packageDescription S3 class from the object or jsonlite will refuse to # serialize it when building the manifest JSON # TODO: should we get description from packrat/desc folder? info$description = suppressWarnings(unclass(utils::packageDescription(name))) # if description is NA, application dependency may not be installed if (is.na(info$description[1])) { errorMessages <- c(errorMessages, paste0(capitalize(assetTypeName), " depends on package \"", name, "\" but it is not installed. Please resolve ", "before continuing.")) next } # validate package source (returns a message if there is a problem) packageMessages <- c(packageMessages, validatePackageSource(deps[i, ])) # good to go packages[[name]] <- info } } if (length(packageMessages)) { # Advice to help resolve installed packages that are not available using the current set of # configured repositories. Each package with a missing repository has already been printed (see # snapshotDependencies). # # This situation used to trigger an error (halting deployment), but was softened because: # * CRAN-archived packages are not visible to our available.packages scanning. # * Source-installed packages may be available after a manual server-side installation. # # That said, an incorrectly configured "repos" option is almost always the cause. packageMessages <- c(packageMessages, "Unable to determine the source location for some packages. Packages should be installed from a package repository like CRAN or a version control system. Check that options('repos') refers to a package repository containing the needed package versions.") warning(paste(formatUL(packageMessages, '\n*'), collapse = '\n'), call. = FALSE, immediate. = TRUE) } if (length(errorMessages)) { stop(paste(formatUL(errorMessages, '\n*'), collapse = '\n'), call. = FALSE) } if (!retainPackratDirectory) { # Optionally remove the packrat directory when it will not be included in # deployments, such as manifest-only deployments. unlink(file.path(appDir, "packrat"), recursive = TRUE) } # build the list of files to checksum files <- list.files(appDir, recursive = TRUE, all.files = TRUE, full.names = FALSE) # provide checksums for all files filelist <- list() for (file in files) { filepath <- file.path(appDir, file) checksum <- list(checksum = fileMD5.as.string(filepath)) filelist[[file]] <- I(checksum) } # create userlist userlist <- list() if (!is.null(users) && length(users) > 0) { for (i in 1:nrow(users)) { user <- users[i, "user"] hash <- users[i, "hash"] userinfo <- list() userinfo$hash <- hash userlist[[user]] <- userinfo } } # create the manifest manifest <- list() manifest$version <- 1 manifest$locale <- getOption('rsconnect.locale', detectLocale()) manifest$platform <- paste(R.Version()$major, R.Version()$minor, sep = ".") metadata <- list(appmode = appMode) # emit appropriate primary document information primaryDoc <- ifelse(is.null(appPrimaryDoc) || tolower(tools::file_ext(appPrimaryDoc)) == "r", NA, appPrimaryDoc) metadata$primary_rmd <- ifelse(appMode %in% c("rmd-shiny","rmd-static","quarto-shiny","quarto-static"), primaryDoc, NA) metadata$primary_html <- ifelse(appMode == "static", primaryDoc, NA) # emit content category (plots, etc) metadata$content_category <- ifelse(!is.null(contentCategory), contentCategory, NA) metadata$has_parameters <- hasParameters # add metadata manifest$metadata <- metadata # indicate whether this is a quarto app/doc if (!is.null(quarto) && !isShinyApps) { manifest$quarto <- quarto } # if there is python info for reticulate, attach it if (!is.null(pyInfo)) { manifest$python <- pyInfo } # if there are no packages set manifest$packages to NA (json null) if (length(packages) > 0) { manifest$packages <- I(packages) } else { manifest$packages <- NA } # if there are no files, set manifest$files to NA (json null) if (length(files) > 0) { manifest$files <- I(filelist) } else { manifest$files <- NA } # if there are no users set manifest$users to NA (json null) if (length(users) > 0) { manifest$users <- I(userlist) } else { manifest$users <- NA } manifest } validatePackageSource <- function(pkg) { if (isSCMSource(pkg$Source)) { return() } if (is.null(pkg$Repository) || is.na(pkg$Repository)) { return(sprintf("May be unable to deploy package dependency '%s'; could not determine a repository URL for the source '%s'.", pkg$Package, pkg$Source)) } return() } hasRequiredDevtools <- function() { "devtools" %in% .packages(all.available = TRUE) && packageVersion("devtools") > "1.3" } snapshotLockFile <- function(appDir) { file.path(appDir, "packrat", "packrat.lock") } addPackratSnapshot <- function(bundleDir, implicit_dependencies = c(), verbose = FALSE) { logger <- verboseLogger(verbose) # if we discovered any extra dependencies, write them to a file for packrat to # discover when it creates the snapshot tempDependencyFile <- file.path(bundleDir, "__rsconnect_deps.R") if (length(implicit_dependencies) > 0) { extraPkgDeps <- paste0(lapply(implicit_dependencies, function(dep) { paste0("library(", dep, ")\n") }), collapse="") # emit dependencies to file writeLines(extraPkgDeps, tempDependencyFile) # ensure temp file is cleaned up even if there's an error on.exit({ if (file.exists(tempDependencyFile)) unlink(tempDependencyFile) }, add = TRUE) } # ensure we have an up-to-date packrat lockfile packratVersion <- packageVersion("packrat") requiredVersion <- "0.4.6" if (packratVersion < requiredVersion) { stop("rsconnect requires version '", requiredVersion, "' of Packrat; ", "you have version '", packratVersion, "' installed.\n", "Please install the latest version of Packrat from CRAN with:\n- ", "install.packages('packrat', type = 'source')") } # generate the packrat snapshot if (verbose) logger("Starting to perform packrat snapshot") tryCatch({ performPackratSnapshot(bundleDir, verbose = verbose) }, error = function(e) { # if an error occurs while generating the snapshot, add a header to the # message for improved attribution e$msg <- paste0("----- Error snapshotting dependencies (Packrat) -----\n", e$msg) # print a traceback if enabled if (isTRUE(getOption("rsconnect.error.trace"))) { traceback(x = sys.calls(), max.lines = 3) } # rethrow error so we still halt deployment stop(e) }) if (verbose) logger("Completed performing packrat snapshot") # if we emitted a temporary dependency file for packrat's benefit, remove it # now so it isn't included in the bundle sent to the server if (file.exists(tempDependencyFile)) { unlink(tempDependencyFile) } preservePackageDescriptions(bundleDir) invisible() } preservePackageDescriptions <- function(bundleDir) { # Copy all the DESCRIPTION files we're relying on into packrat/desc. # That directory will contain one file for each package, e.g. # packrat/desc/shiny will be the shiny package's DESCRIPTION. # # The server will use this to calculate package hashes. We don't want # to rely on hashes calculated by our version of packrat, because the # server may be running a different version. lockFilePath <- snapshotLockFile(bundleDir) descDir <- file.path(bundleDir, "packrat", "desc") tryCatch({ dir.create(descDir) records <- utils::tail(read.dcf(lockFilePath), -1) lapply(seq_len(nrow(records)), function(i) { pkgName <- records[i, "Package"] descFile <- system.file("DESCRIPTION", package = pkgName) if (!file.exists(descFile)) { stop("Couldn't find DESCRIPTION file for ", pkgName) } file.copy(descFile, file.path(descDir, pkgName)) }) }, error = function(e) { warning("Unable to package DESCRIPTION files: ", conditionMessage(e), call. = FALSE) if (dirExists(descDir)) { unlink(descDir, recursive = TRUE) } }) invisible() } # given a list of mixed files and directories, explodes the directories # recursively into their constituent files, and returns just a list of files explodeFiles <- function(dir, files) { exploded <- c() totalSize <- 0 totalFiles <- 0 for (f in files) { target <- file.path(dir, f) info <- file.info(target) if (is.na(info$isdir)) { # don't return this file; it doesn't appear to exist next } else if (isTRUE(info$isdir)) { # a directory; explode it contents <- list.files(target, full.names = FALSE, recursive = TRUE, include.dirs = FALSE) contentPaths <- file.path(f, contents) contentInfos <- file.info(contentPaths) totalSize <- totalSize + sum(contentInfos$size, na.rm = TRUE) totalFiles <- totalFiles + length(contentPaths) exploded <- c(exploded, contentPaths) } else { # not a directory; an ordinary file ourSize <- if (is.na(info$size)) { 0 } else { info$size } totalSize <- totalSize + ourSize totalFiles <- totalFiles + 1 exploded <- c(exploded, f) } # Limits are being enforced after processing each entry on the # input. This means that an input directory needs to be fully # enumerated before issuing an error. This is different from the # approach by bundleFiles, which enforces limits while walking # directories. enforceBundleLimits(dir, totalSize, totalFiles) } exploded } performPackratSnapshot <- function(bundleDir, verbose = FALSE) { # move to the bundle directory owd <- getwd() on.exit(setwd(owd), add = TRUE) setwd(bundleDir) # ensure we snapshot recommended packages srp <- packrat::opts$snapshot.recommended.packages() packrat::opts$snapshot.recommended.packages(TRUE, persist = FALSE) on.exit(packrat::opts$snapshot.recommended.packages(srp, persist = FALSE), add = TRUE) # Force renv dependency scanning within packrat unless the option has been # explicitly configured. This is a no-op for older versions of packrat. renvDiscovery = getOption("packrat.dependency.discovery.renv") if (is.null(renvDiscovery)) { oldDiscovery <- options("packrat.dependency.discovery.renv" = TRUE) on.exit(options(oldDiscovery), add = TRUE) } # attempt to eagerly load the BiocInstaller or BiocManaager package if installed, to work around # an issue where attempts to load the package could fail within a 'suppressMessages()' context packages <- c("BiocManager", "BiocInstaller") for (package in packages) { if (length(find.package(package, quiet = TRUE))) { requireNamespace(package, quietly = TRUE) break } } # generate a snapshot suppressMessages( packrat::.snapshotImpl(project = bundleDir, snapshot.sources = FALSE, fallback.ok = TRUE, verbose = verbose, implicit.packrat.dependency = FALSE, infer.dependencies = TRUE ) ) # TRUE just to indicate success TRUE } rsconnect/R/client.R0000644000175000017500000000300513356733102014205 0ustar nileshnileshhandleResponse <- function(response, jsonFilter = NULL) { # function to report errors reportError <- function(msg) { stop("HTTP ", response$status, "\n", response$req$method, " ", response$req$protocol, "://", response$req$host, response$req$port, response$req$path, "\n", msg, call. = FALSE) } # json responses if (isContentType(response, "application/json")) { if (nzchar(response$content)) { json <- jsonlite::fromJSON(response$content, simplifyVector = FALSE) } else { json <- list() } if (response$status %in% 200:399) if (!is.null(jsonFilter)) jsonFilter(json) else json else if (!is.null(json$error)) reportError(json$error) else reportError(paste("Unexpected json response:", response$content)) } # for html responses we can attempt to extract the body else if (isContentType(response, "text/html")) { body <- regexExtract(".*?(.*?).*", response$content) if (response$status >= 200 && response$status < 400){ # Good response, return the body if we have one, or the content if not if (!is.null(body)){ body } else{ response$content } } else { # Error response if (!is.null(body)) reportError(body) else reportError(response$content) } } # otherwise just dump the whole thing else { if (response$status %in% 200:399) response$content else reportError(response$content) } } rsconnect/R/lucid.R0000644000175000017500000002553514030353332014034 0ustar nileshnilesh # return a list of functions that can be used to interact with lucid lucidClient <- function(service, authInfo) { service <- parseHttpUrl(service) list( status = function() { handleResponse(GET(service, authInfo, "/internal/status")) }, currentUser = function() { handleResponse(GET(service, authInfo, "/users/current/")) }, accountsForUser = function(userId) { path <- "/accounts/" query <- "" listRequest(service, authInfo, path, query, "accounts") }, getAccountUsage = function(accountId, usageType='hours', applicationId=NULL, from=NULL, until=NULL, interval=NULL) { path <- paste("/accounts/", accountId, "/usage/", usageType, "/", sep="") query <- list() if (!is.null(applicationId)) query$application=applicationId if (!is.null(from)) query$from = from if (!is.null(until)) query$until = until if (!is.null(interval)) query$interval = interval handleResponse(GET(service, authInfo, path, queryString(query))) }, getBundle = function(bundleId){ path <- paste("/bundles/", bundleId, sep="") handleResponse(GET(service, authInfo, path)) }, updateBundleStatus = function(bundleId, status) { path <- paste("/bundles/", bundleId, "/status", sep="") json <- list() json$status = status handleResponse(POST_JSON(service, authInfo, path, json)) }, createBundle = function(application, content_type, content_length, checksum) { json <- list() json$application = application json$content_type = content_type json$content_length = content_length json$checksum = checksum handleResponse(POST_JSON(service, authInfo, "/bundles", json)) }, listApplications = function(accountId, filters = list()) { path <- "/applications/" query <- paste(filterQuery( c("account_id", names(filters)), c(accountId, unname(filters)) ), collapse = "&") listRequest(service, authInfo, path, query, "applications") }, getApplication = function(applicationId) { path <- paste("/applications/", applicationId, sep="") handleResponse(GET(service, authInfo, path)) }, getApplicationMetrics = function(applicationId, series, metrics, from=NULL, until=NULL, interval=NULL) { path <- paste("/applications/", applicationId, "/metrics/", series, "/", sep="") query <- list() m <- paste(lapply(metrics, function(x){paste("metric", urlEncode(x), sep="=")}), collapse = "&") if (!is.null(from)) query$from = from if (!is.null(until)) query$until = until if (!is.null(interval)) query$interval = interval handleResponse(GET(service, authInfo, path, paste(m, queryString(query), sep="&"))) }, getLogs = function(applicationId, entries = 50) { path <- paste0("/applications/", applicationId, "/logs") query <- paste0("count=", entries, "&tail=0") handleResponse(GET(service, authInfo, path, query)) }, createApplication = function(name, title, template, accountId) { json <- list() json$name <- name # the title field is only used on connect json$template <- template json$account <- as.numeric(accountId) handleResponse(POST_JSON(service, authInfo, "/applications/", json)) }, listApplicationProperties = function(applicationId) { path <- paste("/applications/", applicationId, "/properties/", sep="") handleResponse(GET(service, authInfo, path)) }, setApplicationProperty = function(applicationId, propertyName, propertyValue, force=FALSE) { path <- paste("/applications/", applicationId, "/properties/", propertyName, sep="") v <- list() v$value <- propertyValue query <- paste("force=", if (force) "1" else "0", sep="") handleResponse(PUT_JSON(service, authInfo, path, v, query)) }, unsetApplicationProperty = function(applicationId, propertyName, force=FALSE) { path <- paste("/applications/", applicationId, "/properties/", propertyName, sep="") query <- paste("force=", if (force) "1" else "0", sep="") handleResponse(DELETE(service, authInfo, path, query)) }, uploadApplication = function(applicationId, bundlePath) { path <- paste("/applications/", applicationId, "/upload", sep="") handleResponse(POST(service, authInfo, path, contentType="application/x-gzip", file=bundlePath)) }, deployApplication = function(applicationId, bundleId=NULL) { path <- paste("/applications/", applicationId, "/deploy", sep="") json <- list() if (length(bundleId) > 0 && nzchar(bundleId)) json$bundle <- as.numeric(bundleId) else json$rebuild = FALSE handleResponse(POST_JSON(service, authInfo, path, json)) }, terminateApplication = function(applicationId) { path <- paste("/applications/", applicationId, "/terminate", sep="") handleResponse(POST(service, authInfo, path)) }, purgeApplication = function(applicationId) { path <- paste("/applications/", applicationId, "/purge", sep="") handleResponse(POST(service, authInfo, path)) }, inviteApplicationUser = function(applicationId, email, invite_email=NULL, invite_email_message=NULL) { path <- paste("/applications/", applicationId, "/authorization/users", sep="") json <- list() json$email <- email if (!is.null(invite_email)) json$invite_email=invite_email if (!is.null(invite_email_message)) json$invite_email_message=invite_email_message handleResponse(POST_JSON(service, authInfo, path, json)) }, addApplicationUser = function(applicationId, userId) { path <- paste("/applications/", applicationId, "/authorization/users/", userId, sep="") handleResponse(PUT(service, authInfo, path, NULL)) }, removeApplicationUser = function(applicationId, userId) { path <- paste("/applications/", applicationId, "/authorization/users/", userId, sep="") handleResponse(DELETE(service, authInfo, path, NULL)) }, listApplicationAuthorization = function(applicationId) { path <- paste("/applications/", applicationId, "/authorization", sep="") listRequest(service, authInfo, path, NULL, "authorization") }, listApplicationUsers = function(applicationId) { path <- paste("/applications/", applicationId, "/authorization/users", sep="") listRequest(service, authInfo, path, NULL, "users") }, listApplicationGroups = function(applicationId) { path <- paste("/applications/", applicationId, "/authorization/groups", sep="") listRequest(service, authInfo, path, NULL, "groups") }, listApplicationInvitations = function(applicationId) { path <- "/invitations/" query <- paste(filterQuery("app_id", applicationId), collapse="&") listRequest(service, authInfo, path, query, "invitations") }, listTasks = function(accountId, filters = NULL) { if (is.null(filters)) { filters <- vector() } path <- "/tasks/" filters <- c(filterQuery("account_id", accountId), filters) query <- paste(filters, collapse="&") listRequest(service, authInfo, path, query, "tasks", max=100) }, getTaskInfo = function(taskId) { path <- paste("/tasks/", taskId, sep="") handleResponse(GET(service, authInfo, path)) }, getTaskLogs = function(taskId) { path <- paste("/tasks/", taskId, "/logs/", sep="") handleResponse(GET(service, authInfo, path)) }, waitForTask = function(taskId, quiet = FALSE) { if (!quiet) { cat("Waiting for task: ", taskId, "\n", sep="") } path <- paste("/tasks/", taskId, sep="") lastStatus <- NULL while(TRUE) { # check status status <- handleResponse(GET(service, authInfo, path)) # display status to the user if it changed if (!identical(lastStatus, status$description)) { if (!quiet) cat(" ", status$status, ": ", status$description, "\n", sep="") lastStatus <- status$description } # are we finished? (note: this codepath is the only way to exit this function) if (status$finished) { if (identical(status$status, "success")) { return (NULL) } else { # always show task log on error hr("Begin Task Log") taskLog(taskId, authInfo$name, authInfo$server, output="stderr") hr("End Task Log") stop(status$error, call. = FALSE) } } # wait for 1 second before polling again Sys.sleep(1) } } ) } listRequest = function(service, authInfo, path, query, listName, page = 100, max=NULL) { # accumulate multiple pages of results offset <- 0 results <- list() while(TRUE) { # add query params queryWithList <- paste(query, "&count=", page, "&offset=", offset, sep="") # make request and append the results response <- handleResponse(GET(service, authInfo, path, queryWithList)) results <- append(results, response[[listName]]) # update the offset offset <- offset + response$count # get all results if no max was specified if (is.null(max)) { max = response$total } # exit if we've got them all if (length(results) >= response$total || length(results) >= max) break } return(results) } filterQuery <- function(param, value, operator = NULL) { if (is.null(operator)) { op <- ":" } else { op <- paste(":", operator, ":", sep="") } q <- paste("filter=", param, op, value, sep="") return(q) } isContentType <- function(response, contentType) { grepl(contentType, response$contentType, fixed = TRUE) } uploadBundle <- function(bundle, bundleSize, bundlePath){ presigned_service <- parseHttpUrl(bundle$presigned_url) headers <- list() headers$`Content-Type` <- 'application/x-tar' headers$`Content-Length` <- bundleSize # AWS requires a base64 encoded hash headers$`Content-MD5` <- bundle$presigned_checksum # AWS seems very sensitive to additional headers (likely becauseit was not included and signed # for when the presigned link was created). So the lower level library is used here. http <- httpFunction() response <- http( presigned_service$protocol, presigned_service$host, presigned_service$port, "PUT", presigned_service$path, headers, headers$`Content-Type`, bundlePath ) response$status == 200 } rsconnect/R/title.R0000644000175000017500000000622014051210517014043 0ustar nileshnilesh#' Generate Application Name #' #' Generate a short name (identifier) for an application given an application #' title. #' #' @param appTitle A descriptive title for the application. #' @param appPath The path to the application's content, either a directory #' or an individual document. Optional. #' @param account The account where the application will be deployed. Optional. #' @param unique Whether to try to generate a unique name. #' @return #' Returns a valid short name for the application. #' #' @details #' This function modifies the title until it forms a suitable application name. #' Suitable application names are 3 - 64 characters long and contain only #' alphanumeric characters. #' #' The function is intended to be used to find a name for a new application. #' If `appPath` and `account` are both specified, then the returned #' name will also be unique among locally known deployments of the directory #' (note that it is not guaranteed to be unique on the server). This behavior #' can be disabled by setting `unique = FALSE`. #' #' @examples #' \dontrun{ #' # Generate a short name for a sample application #' generateAppName("My Father's Country", "~/fathers-country", "myacct") #' } #' @export generateAppName <- function(appTitle, appPath = NULL, account = NULL, unique = TRUE) { munge <- function (title) { # safe default if no title specified if (is.null(title)) { return("") } # start by removing most non-Latin characters and converting to lowercase name <- tolower(gsub("[^A-Za-z0-9_ -]+", "", title)) # replace spaces with underscores name <- gsub(" ", "_", name, fixed = TRUE) # trim to 64 characters if (nchar(name) > 64) { name <- substr(name, 1, 64) } name } name <- munge(appTitle) # if we wound up with too few characters, try generating from the directory # name instead if (nchar(name) < 3 && !is.null(appPath) && file.exists(appPath)) { # strip extension if present base <- basename(appPath) if (nzchar(tools::file_ext(base))) { base <- file_path_sans_ext(base) # if we stripped an extension and the name is now "index", use the parent # folder's name if (identical(base, "index")) { base <- basename(dirname(appPath)) } } name <- munge(base) } # validate that we wound up with a valid name if (nchar(name) < 3) { stop("The generated app name '", name, "' is invalid. Include at least 3 ", "alphanumeric characters in the title.") } # if we have an account and a directory, make the new app name unique to the # best of our local knowledge if (unique && !is.null(appPath) && nzchar(appPath) && !is.null(account)) { apps <- deployments(appPath, accountFilter = account) if (name %in% apps$name) { # trim a few characters if necessary so we can add unique numbers to the end base <- substr(name, 1, 62) suffix <- 2 candidate <- paste0(base, suffix) # keep incrementing the suffix until we find a unique name while (candidate %in% apps$name) { suffix <- suffix + 1 candidate <- paste0(base, suffix) } name <- candidate } } name } rsconnect/R/servers.R0000644000175000017500000002065413274070160014426 0ustar nileshnilesh#' Server Management Functions #' #' Functions to manage the list of known servers to which #' \pkg{rsconnect} can deploy and manage applications. #' #' Register a server with `addServer` or `discoverServers` (the latter #' is useful only if your administrator has configured server autodiscovery). #' Once a server is registered, you can connect to an account on the server #' using [connectUser()]. #' #' The `servers` and `serverInfo` functions are provided for viewing #' previously registered servers. #' #' There is always at least one server registered (the `shinyapps.io` #' server) #' #' @param name Optional nickname for the server. If none is given, the nickname #' is inferred from the server's hostname. #' @param url Server's URL. Should look like `http://servername/` or #' `http://servername:port/`. #' @param local Return only local servers (i.e. not `shinyapps.io`) #' @param certificate Optional; a path a certificate file to be used when making #' SSL connections to the server. The file's contents are copied and stored by #' the \pkg{rsconnect} package. Can also be a character vector containing the #' certificate's contents. #' @param quiet Suppress output and prompts where possible. #' @return #' `servers` returns a data frame with registered server names and URLs. #' `serverInfo` returns a list with details for a particular server. #' @rdname servers #' @examples #' \dontrun{ #' #' # register a local server #' addServer("http://myrsconnect/", "myserver") #' #' # list servers #' servers(local = TRUE) #' #' # connect to an account on the server #' connectUser(server = "myserver") #' } #' @export servers <- function(local = FALSE) { configFiles <- list.files(serverConfigDir(), pattern=glob2rx("*.dcf"), full.names = TRUE) parsed <- lapply(configFiles, function(file) { info <- read.dcf(file) # empty if no contents if(identical(nrow(info), 0L)) return(NULL) # provide empty certificate if not specified in DCF (only if we also have a URL) if(!("certificate" %in% colnames(info))) { info <- cbind(info, certificate = "") } # return parsed server info info }) locals <- do.call(rbind, parsed) if (local) { locals } else { rbind(locals, as.data.frame(shinyappsServerInfo(), stringsAsFactors = FALSE)) } } serverConfigDir <- function() { rsconnectConfigDir("servers") } serverConfigFile <- function(name) { normalizePath(file.path(serverConfigDir(), paste(name, ".dcf", sep="")), mustWork = FALSE) } shinyappsServerInfo <- function() { info <- list(name = "shinyapps.io", certificate = inferCertificateContents( system.file("cert/shinyapps.io.pem", package = "rsconnect")), url = getOption("rsconnect.shinyapps_url", "https://api.shinyapps.io/v1")) } #' @rdname servers #' @export discoverServers <- function(quiet = FALSE) { # TODO: Better discovery mechanism? discovered <- getOption("rsconnect.local_servers", "http://localhost:3939/__api__") # get the URLs of the known servers, and silently add any that aren't yet # present existing <- servers()[,"url"] introduced <- setdiff(discovered, existing) lapply(introduced, function(url) { addServer(url, quiet = TRUE) }) if (!quiet && length(introduced) > 0) { message("Discovered ", length(introduced), (if (length(introduced) == 1) "server" else "servers"), ":") lapply(introduced, message) } else if (!quiet) { message("No new servers found.") } invisible(introduced) } getDefaultServer <- function(local = FALSE, prompt = TRUE) { existing <- servers(local) # if there are no existing servers, silently try to discover one to work with if (length(existing) == 0 || nrow(existing) == 0) { discoverServers(quiet = TRUE) existing <- servers(local) } # if exactly one server exists, return it if (nrow(existing) == 1) { return(list(name = as.character(existing[,"name"]), url = as.character(existing[,"url"]))) } # no default server, prompt if there are multiple choices if (nrow(existing) > 1 && prompt && interactive()) { name <- as.character(existing[1,"name"]) message("Registered servers: ", paste(existing[,"name"], collapse = ", ")) input <- readline(paste0( "Which server (default '", name ,"')? ")) if (nchar(input) > 0) { name <- input } return(serverInfo(name)) } } #' @rdname servers #' @export addConnectServer <- function(url, name = NULL, certificate = NULL, quiet = FALSE) { addServer(ensureConnectServerUrl(url), name, certificate, quiet) } #' @rdname servers #' @export addServer <- function(url, name = NULL, certificate = NULL, quiet = FALSE) { if (!isStringParam(url)) stop(stringParamErrorMessage("url")) serverUrl <- parseHttpUrl(url) # TODO: test server by hitting URL and getting config? # if no name is supplied for the server, make one up based on the host portion # of its URL if (is.null(name)) { name <- serverUrl$host if (!quiet && interactive()) { input <- readline(paste0( "Enter a nickname for this server (default '", name, "'): ")) if (nchar(input) > 0) { name <- input } } } if (!identical(serverUrl$protocol, "https") && !is.null(certificate) && nzchar(certificate)) { stop("Certificates may only be attached to servers that use the ", "HTTPS protocol. Sepecify an HTTPS URL for the server, or ", "omit the certificate.") } # resolve certificate argument certificate <- inferCertificateContents(certificate) # write the server info configFile <- serverConfigFile(name) if (is.null(certificate)) { # no certificate, just write name and URL for brevity write.dcf(list(name = name, url = url), configFile) } else { # write all fields write.dcf(list(name = name, url = url, certificate = certificate), configFile, keep.white = "certificate") } if (!quiet) { message("Server '", name, "' added successfully: ", url) } } #' @rdname servers #' @export removeServer <- function(name) { if (!isStringParam(name)) stop(stringParamErrorMessage("name")) configFile <- serverConfigFile(name) if (file.exists(configFile)) unlink(configFile) else warning("The server '", name,"' is not currently registered.") } #' @rdname servers #' @export serverInfo <- function(name) { if (!isStringParam(name)) stop(stringParamErrorMessage("name")) # there's no config file for shinyapps.io if (identical(name, "shinyapps.io")) { return(shinyappsServerInfo()) } configFile <- serverConfigFile(name) if (!file.exists(configFile)) stop(missingServerErrorMessage(name)) serverDcf <- readDcf(serverConfigFile(name), all=TRUE) info <- as.list(serverDcf) info } #' @rdname servers #' @export addServerCertificate <- function(name, certificate, quiet = FALSE) { # read the existing server information (throws an error on failure) info <- serverInfo(name) if (!identical(substr(info$url, 1, 5), "https")) { stop("Certificates may only be attached to servers that use the ", "HTTPS protocol. Sepecify an HTTPS URL for the server, or ", "omit the certificate.") } # append the certificate and re-write the server information info$certificate <- inferCertificateContents(certificate) write.dcf(info, serverConfigFile(name), keep.white = "certificate") if (!quiet) message("Certificate added to server '", name, "'") invisible(NULL) } missingServerErrorMessage <- function(name) { paste0("server named '", name, "' does not exist") } clientForAccount <- function(account) { authInfo <- account # determine appropriate server information for account if (account$server == shinyappsServerInfo()$name) { serverInfo <- shinyappsServerInfo() constructor <- lucidClient } else { serverInfo <- serverInfo(account$server) constructor <- connectClient } # promote certificate into auth info authInfo$certificate <- serverInfo$certificate # invoke client constructor constructor(serverInfo$url, authInfo) } ensureConnectServerUrl <- function(url) { # ensure 'url' ends with '/__api__' if (!grepl("/__api__$", url)) url <- paste(url, "/__api__", sep = "") # if we have duplicated leading slashes, remove them url <- gsub("(/+__api__)$", "/__api__", url) url } rsconnect/R/deployApp.R0000644000175000017500000007250714133544020014672 0ustar nileshnilesh#' Deploy an Application #' #' Deploy a [shiny][shiny::shiny-package] application, an #' [RMarkdown][rmarkdown::rmarkdown-package] document, a plumber API, or HTML #' content to a server. #' #' @param appDir Directory containing application. Defaults to current working #' directory. #' @param appFiles The files and directories to bundle and deploy (only if #' `upload = TRUE`). Can be `NULL`, in which case all the files in the #' directory containing the application are bundled, with the exception of #' any listed in an `.rcsignore` file. Takes precedence over #' `appFileManifest` if both are supplied. #' @param appFileManifest An alternate way to specify the files to be deployed; #' a file containing the names of the files, one per line, relative to the #' `appDir`. #' @param appPrimaryDoc If the application contains more than one document, this #' parameter indicates the primary one, as a path relative to `appDir`. Can be #' `NULL`, in which case the primary document is inferred from the contents #' being deployed. #' @param appSourceDoc If the application is composed of static files (e.g #' HTML), this parameter indicates the source document, if any, as a fully #' qualified path. Deployment information returned by [deployments()] is #' associated with the source document. #' @param appName Name of application (names must be unique within an account). #' Defaults to the base name of the specified `appDir`. #' @param appTitle Free-form descriptive title of application. Optional; if #' supplied, will often be displayed in favor of the name. When deploying a #' new application, you may supply only the `appTitle` to receive an #' auto-generated `appName`. #' @param appId If updating an application, the ID of the application being #' updated. Optional unless updating an app owned by another user. #' @param contentCategory Optional; the kind of content being deployed (e.g. #' `"plot"` or `"site"`). #' @param account Account to deploy application to. This parameter is only #' required for the initial deployment of an application when there are #' multiple accounts configured on the system (see [accounts]). #' @param server Server name. Required only if you use the same account name on #' multiple servers. #' @param upload If `TRUE` (the default) then the application is uploaded from #' the local system prior to deployment. If `FALSE` then it is re-deployed #' using the last version that was uploaded. `FALSE` is only supported on #' shinyapps.io; `TRUE` is required on RStudio Connect. #' @param recordDir Directory where publish record is written. Can be `NULL` #' in which case record will be written to the location specified with `appDir`. #' @param launch.browser If true, the system's default web browser will be #' launched automatically after the app is started. Defaults to `TRUE` in #' interactive sessions only. If a function is passed, it will be called #' after the app is started, with the app URL as a paramter. #' @param on.failure Function to be called if the deployment fails. If a #' deployment log URL is available, it's passed as a parameter. #' @param logLevel One of `"quiet"`, `"normal"` or `"verbose"`; indicates how #' much logging to the console is to be performed. At `"quiet"` reports no #' information; at `"verbose"`, a full diagnostic log is captured. #' @param lint Lint the project before initiating deployment, to identify #' potentially problematic code? #' @param metadata Additional metadata fields to save with the deployment #' record. These fields will be returned on subsequent calls to #' [deployments()]. #' @param forceUpdate If `TRUE`, update any previously-deployed app without #' asking. If `FALSE`, ask to update. If unset, defaults to the value of #' `getOption("rsconnect.force.update.apps", FALSE)`. #' @param python Full path to a python binary for use by `reticulate`. #' Required if `reticulate` is a dependency of the app being deployed. #' If python = NULL, and RETICULATE_PYTHON is set in the environment, its #' value will be used. The specified python binary will be invoked to determine #' its version and to list the python packages installed in the environment. #' @param forceGeneratePythonEnvironment Optional. If an existing #' `requirements.txt` file is found, it will be overwritten when this argument #' is `TRUE`. #' @examples #' \dontrun{ #' #' # deploy the application in the current working dir #' deployApp() #' #' # deploy an application in another directory #' deployApp("~/projects/shiny/app1") #' #' # deploy using an alternative application name and title #' deployApp("~/projects/shiny/app1", appName = "myapp", #' appTitle = "My Application") #' #' # deploy specifying an explicit account name, then #' # redeploy with no arguments (will automatically use #' # the previously specified account) #' deployApp(account = "jsmith") #' deployApp() #' #' # deploy but don't launch a browser when completed #' deployApp(launch.browser = FALSE) #' } #' @seealso [applications()], [terminateApp()], and [restartApp()] #' @family Deployment functions #' @export deployApp <- function(appDir = getwd(), appFiles = NULL, appFileManifest = NULL, appPrimaryDoc = NULL, appSourceDoc = NULL, appName = NULL, appTitle = NULL, appId = NULL, contentCategory = NULL, account = NULL, server = NULL, upload = TRUE, recordDir = NULL, launch.browser = getOption("rsconnect.launch.browser", interactive()), logLevel = c("normal", "quiet", "verbose"), lint = TRUE, metadata = list(), forceUpdate = getOption("rsconnect.force.update.apps", FALSE), python = NULL, on.failure = NULL, forceGeneratePythonEnvironment = FALSE) { condaMode <- FALSE if (!isStringParam(appDir)) stop(stringParamErrorMessage("appDir")) # respect log level logLevel <- match.arg(logLevel) quiet <- identical(logLevel, "quiet") verbose <- identical(logLevel, "verbose") # run startup scripts to pick up any user options and establish pre/post deploy hooks runStartupScripts(appDir, logLevel) # at verbose log level, turn on all tracing options implicitly for the # duration of the call if (verbose) { options <- c("rsconnect.http.trace", "rsconnect.http.trace.json", "rsconnect.error.trace") restorelist <- list() newlist <- list() # record options at non-default position for (option in options) { if (!isTRUE(getOption(option))) { restorelist[[option]] <- FALSE newlist[[option]] <- TRUE } } # apply new option values options(newlist) # restore all old option values on exit on.exit(options(restorelist), add = TRUE) } # install error handler if requested if (isTRUE(getOption("rsconnect.error.trace"))) { errOption <- getOption("error") options(error = function(e) { cat("----- Deployment error -----\n") cat(geterrmessage(), "\n") cat("----- Error stack trace -----\n") traceback(x = sys.calls(), max.lines = 3) }) on.exit(options(error = errOption), add = TRUE) } # normalize appDir path and ensure it exists appDir <- normalizePath(appDir, mustWork = FALSE) if (!file.exists(appDir)) { stop(appDir, " does not exist") } # create the full path that we'll deploy (append document if requested) appPath <- appDir if (!is.null(appSourceDoc) && nchar(appSourceDoc) > 0) { appPath <- appSourceDoc } else if (!is.null(appPrimaryDoc) && nchar(appPrimaryDoc) > 0) { appPath <- file.path(appPath, appPrimaryDoc) if (!file.exists(appPath)) { stop(appPath, " does not exist") } } # if a specific file is named, make sure it's an Rmd or HTML, and just deploy # a single document in this case (this will call back to deployApp with a list # of supporting documents) rmdFile <- "" if (!file.info(appDir)$isdir) { if (grepl("\\.[Rq]md$", appDir, ignore.case = TRUE) || grepl("\\.html?$", appDir, ignore.case = TRUE)) { return(deployDoc(appDir, appName = appName, appTitle = appTitle, account = account, server = server, upload = upload, recordDir = recordDir, launch.browser = launch.browser, logLevel = logLevel, lint = lint)) } else { stop(appDir, " must be a directory, an R Markdown document, or an HTML ", "document.") } } # directory for recording deployment if (is.null(recordDir)) { recordDir <- appPath } else { if (!file.exists(recordDir)) { stop(recordDir, " does not exist") } if (!file.info(recordDir)$isdir) { stop(recordDir, " must be a directory") } } # at verbose log level, generate header if (verbose) { cat("----- Deployment log started at ", as.character(Sys.time()), " -----\n") cat("Deploy command:", "\n", deparse(sys.call(1)), "\n\n") cat("Session information: \n") print(utils::sessionInfo()) } # invoke pre-deploy hook if we have one preDeploy <- getOption("rsconnect.pre.deploy") if (is.function(preDeploy)) { if (verbose) { cat("Invoking pre-deploy hook rsconnect.pre.deploy\n") } preDeploy(appPath) } # figure out what kind of thing we're deploying if (!is.null(contentCategory)) { assetTypeName <- contentCategory } else if (!is.null(appPrimaryDoc)) { assetTypeName <- "document" } else { assetTypeName <- "application" } # build the list of files to deploy -- implicitly (directory contents), # explicitly via list, or explicitly via manifest if (is.null(appFiles)) { if (is.null(appFileManifest)) { # no files supplied at all, just bundle the whole directory appFiles <- bundleFiles(appDir) } else { # manifest file provided, read it and apply if (!isStringParam(appFileManifest)) stop(stringParamErrorMessage("appFileManifest")) if (!file.exists(appFileManifest)) stop(appFileManifest, " was specified as a file manifest, but does ", "not exist.") # read the filenames from the file manifestLines <- readLines(appFileManifest, warn = FALSE) # remove empty/comment lines and explode remaining manifestLines <- manifestLines[nzchar(manifestLines)] manifestLines <- manifestLines[!grepl("^#", manifestLines)] appFiles <- explodeFiles(appDir, manifestLines) } } else { # file list provided directly appFiles <- explodeFiles(appDir, appFiles) } if (isTRUE(lint)) { lintResults <- lint(appDir, appFiles, appPrimaryDoc) if (hasLint(lintResults)) { if (interactive()) { # if enabled, show warnings in friendly marker tab in addition to # printing to console if (getOption("rsconnect.rstudio_source_markers", TRUE) && rstudioapi::hasFun("sourceMarkers")) { showRstudioSourceMarkers(appDir, lintResults) } message("The following potential problems were identified in the project files:\n") printLinterResults(lintResults) response <- readline("Do you want to proceed with deployment? [Y/n]: ") if (tolower(substring(response, 1, 1)) != "y") { message("Cancelling deployment.") return(invisible(lintResults)) } } else { message("The linter has identified potential problems in the project:\n") printLinterResults(lintResults) # message( # "\nIf you believe these errors are spurious, run:\n\n", # "\tdeployApp(lint = FALSE)\n\n", # "to disable linting." # ) message("If your ", assetTypeName, " fails to run post-deployment, ", "please double-check these messages.") } } } if (!is.null(appName) && !isStringParam(appName)) stop(stringParamErrorMessage("appName")) # try to detect encoding from the RStudio project file .globals$encoding <- rstudioEncoding(appDir) on.exit(.globals$encoding <- NULL, add = TRUE) # functions to show status (respects quiet param) displayStatus <- displayStatus(quiet) withStatus <- withStatus(quiet) # initialize connect client # determine the deployment target and target account info target <- deploymentTarget(appPath, appName, appTitle, appId, account, server) accountDetails <- accountInfo(target$account, target$server) # test for compatibility between account type and publish intent if (isShinyapps(accountDetails$server)) { # ensure we aren't trying to publish an API to shinyapps.io; this will not # currently end well if (identical(contentCategory, "api")) { stop("Plumber APIs are not currently supported on shinyapps.io; they ", "can only be published to RStudio Connect.") } } else { if (identical(upload, FALSE)) { # it is not possible to deploy to Connect without uploading stop("RStudio Connect does not support deploying without uploading. ", "Specify upload=TRUE to upload and re-deploy your application.") } } client <- clientForAccount(accountDetails) if(verbose){ urlstr <- serverInfo(accountDetails$server)$url url <- parseHttpUrl(urlstr) cat("Cookies:", "\n") host <- getCookieHost(url) if (exists(host, .cookieStore)){ print(get(host, envir=.cookieStore)) } else { print("None") } } # get the application to deploy (creates a new app on demand) withStatus(paste0("Preparing to deploy ", assetTypeName), { application <- applicationForTarget(client, accountDetails, target, forceUpdate) }) if (upload) { # create, and upload the bundle if (verbose) cat("----- Bundle upload started at ", as.character(Sys.time()), " -----\n") withStatus(paste0("Uploading bundle for ", assetTypeName, ": ", application$id), { # python is enabled on Connect but not on Shinyapps python <- getPythonForTarget(python, accountDetails) quarto <- getQuartoManifestDetails(metadata) bundlePath <- bundleApp(target$appName, appDir, appFiles, appPrimaryDoc, assetTypeName, contentCategory, verbose, python, condaMode, forceGeneratePythonEnvironment, quarto, isTRUE(metadata$serverRender), isShinyapps(accountDetails$server)) if (isShinyapps(accountDetails$server)) { # Step 1. Create presigned URL and register pending bundle. bundleSize <- file.info(bundlePath)$size # Generate a hex-encoded md5 hash. checksum <- fileMD5.as.string(bundlePath) bundle <- client$createBundle(application$id, "application/x-tar", bundleSize, checksum) if (verbose) timestampedLog("Starting upload now") # Step 2. Upload Bundle to presigned URL if (!uploadBundle(bundle, bundleSize, bundlePath)) { stop("Could not upload file.") } if (verbose) timestampedLog("Upload complete") # Step 3. Upload revise bundle status. response <- client$updateBundleStatus(bundle$id, status="ready") # Step 4. Retrieve updated bundle post status change - which is required in subsequent # areas of the code below. bundle <- client$getBundle(bundle$id) } else { bundle <- client$uploadApplication(application$id, bundlePath) } }) } else { # redeploy current bundle bundle <- application$deployment$bundle } # write a deployment record only if this is the account that owns the content if (is.null(application$owner_username) || accountDetails$username == application$owner_username) { # save the deployment info for subsequent updates--we do this before # attempting the deployment itself to make retry easy on failure. if (verbose) timestampedLog("Saving deployment record for", target$appName, "-", target$username) saveDeployment(recordDir, target$appName, target$appTitle, target$username, target$account, accountDetails$server, serverInfo(target$server)$hostUrl, application$id, bundle$id, application$url, metadata) } else if (verbose) { timestampedLog("Updating", target$appName, ", owned by", application$owner_username, ", from account", accountDetails$username) } if (length(bundle$id) > 0 && nzchar(bundle$id)) { displayStatus(paste0("Deploying bundle: ", bundle$id, " for ", assetTypeName, ": ", application$id, " ...\n", sep="")) } if (verbose) { cat("----- Server deployment started at ", as.character(Sys.time()), " -----\n") } # wait for the deployment to complete (will raise an error if it can't) task <- client$deployApplication(application$id, bundle$id) taskId <- if (is.null(task$task_id)) task$id else task$task_id response <- client$waitForTask(taskId, quiet) # wait 1/10th of a second for any queued output get picked by RStudio # before emitting the final status, to ensure it's the last line the user sees Sys.sleep(0.10) deploymentSucceeded <- if (is.null(response$code) || response$code == 0) { displayStatus(paste0(capitalize(assetTypeName), " successfully deployed ", "to ", application$url, "\n")) TRUE } else { displayStatus(paste0(capitalize(assetTypeName), " deployment failed ", "with error: ", response$error, "\n")) FALSE } if (!quiet) openURL(client, application, launch.browser, on.failure, deploymentSucceeded) # invoke post-deploy hook if we have one if (deploymentSucceeded) { postDeploy <- getOption("rsconnect.post.deploy") if (is.function(postDeploy)) { if (verbose) { cat("Invoking post-deploy hook rsconnect.post.deploy\n") } postDeploy(appPath) } } if (verbose) { cat("----- Deployment log finished at ", as.character(Sys.time()), " -----\n") } invisible(deploymentSucceeded) } getPython <- function(path) { if (is.null(path)) { path <- Sys.getenv("RETICULATE_PYTHON") if (path == "") { return(NULL) } } path.expand(path) } getPythonForTarget <- function(path, accountDetails) { # python is enabled on Connect but not on Shinyapps targetIsShinyapps <- isShinyapps(accountDetails$server) pythonEnabled = getOption("rsconnect.python.enabled", default=!targetIsShinyapps) if (pythonEnabled) { getPython(path) } else { NULL } } getQuartoManifestDetails <- function(metadata = list()) { if (!is.null(metadata[["quarto_version"]])) { return(list( "version" = metadata[["quarto_version"]], "engines" = metadata[["quarto_engines"]] )) } return(NULL) } # calculate the deployment target based on the passed parameters and # any saved deployments that we have deploymentTarget <- function(appPath, appName, appTitle, appId, account, server = NULL) { # read existing accounts accounts <- accounts(server)[,"name"] if (length(accounts) == 0) stopWithNoAccount() # validate account if provided if (!is.null(account)) { if (!account %in% accounts) stop(paste("Unknown account name '", account, "' (you can use the ", "setAccountInfo function to add a new account)", sep = ""), call. = FALSE) } # read existing deployments appDeployments <- deployments(appPath = appPath) # function to compute the target username from a deployment usernameFromDeployment <- function(deployment) { # determine which username on the serve owns the application if (!is.null(appDeployments$username)) { # read from the deployment record if supplied username <- appDeployments$username } else { # lookup account info if not username <- accountInfo(appDeployments$account)$username } username } # function to create a deployment target list (checks whether the target # is an update and adds that field) createDeploymentTarget <- function(appName, appTitle, appId, username, account, server) { # look up the server URL serverDetails <- serverInfo(server) # look for an application ID if we weren't supplied one if (is.null(appId)) { existingDeployments <- deployments(appPath, nameFilter = appName) for (i in seq_len(nrow(existingDeployments))) { if (identical(existingDeployments[[i, "account"]], account) && identical(existingDeployments[[i, "server"]], server)) { # account and server matches a locally configured account appId <- existingDeployments[[i, "appId"]] break } else if (identical(existingDeployments[[i, "username"]], username) && identical(existingDeployments[[i, "host"]], serverDetails$url)) { # username and host match the user and host we're deploying to appId <- existingDeployments[[i, "appId"]] break } } } list(appName = appName, appTitle = appTitle, appId = appId, username = username, account = account, server = server) } # if appTitle specified but not appName, generate name from title if (is.null(appName) && !is.null(appTitle) && nzchar(appTitle)) { appName <- generateAppName(appTitle, appPath, account, unique = FALSE) } # both appName and account explicitly specified if (!is.null(appName) && !is.null(account)) { accountDetails <- accountInfo(account, server) createDeploymentTarget(appName, appTitle, appId, accountDetails$username, account, accountDetails$server) } # just appName specified else if (!is.null(appName)) { # find any existing deployments of this application appDeployments <- deployments(appPath, nameFilter = appName) # if there are none then we can create it if there is a single account # registered that we can default to if (nrow(appDeployments) == 0) { if (length(accounts) == 1) { # read the server associated with the account accountDetails <- accountInfo(accounts, server) createDeploymentTarget(appName, appTitle, appId, accountDetails$username, accounts, accountDetails$server) } else { stopWithSpecifyAccount() } } # single existing deployment else if (nrow(appDeployments) == 1) { createDeploymentTarget(appName, appTitle, appId, usernameFromDeployment(appDeployments), appDeployments$account, appDeployments$server) } # multiple existing deployments else if (nrow(appDeployments) > 1) { stop(paste("Please specify the account you want to deploy '", appName, "' to (you have previously deployed this application to ", "more than one account).", sep = ""), call. = FALSE) } } # just account/server specified, that's fine we just default the app name # based on the basename of the application directory else if (!is.null(account) || !is.null(server)) { if (is.null(account)) { account <- accounts(server)[,"name"] if (length(account) > 1) { stopWithSpecifyAccount() } } accountDetails <- accountInfo(account, server) createDeploymentTarget( generateAppName(appTitle, appPath, account, unique = FALSE), appTitle, appId, accountDetails$username, account, accountDetails$server) } # neither specified but a single existing deployment else if (nrow(appDeployments) == 1) { createDeploymentTarget(appDeployments$name, appDeployments$title, appDeployments$appId, usernameFromDeployment(appDeployments), appDeployments$account, appDeployments$server) } # neither specified and no existing deployments else if (nrow(appDeployments) == 0) { # single account we can default to if (length(accounts) == 1) { accountDetails <- accountInfo(accounts) createDeploymentTarget( generateAppName(appTitle, appPath, account, unique = FALSE), appTitle, appId, accountDetails$username, accounts, accountDetails$server) } else stop("Please specify the account and server to which you want to deploy ", "the application (there is more than one account registered ", "on this system).", call. = FALSE) } # neither specified and multiple existing deployments else { stop("Unable to deploy using default arguments (multiple existing ", "deployments from this application directory already exist). ", "Please specify appName and/or account name explicitly.", call. = FALSE) } } # get the record for the application of the given name in the given account, or # NULL if no application exists by that name getAppByName <- function(client, accountInfo, name) { # NOTE: returns a list with 0 or 1 elements app <- client$listApplications(accountInfo$accountId, filters = list(name = name)) if (length(app)) app[[1]] else NULL } # get the record for the application with the given ID in the given account; # this isn't used inside the package itself but is invoked from the RStudio IDE # to look up app details getAppById <- function(id, account = NULL, server = NULL, hostUrl = NULL) { accountDetails <- NULL tryCatch({ # attempt to look up the account locally accountDetails <- accountInfo(resolveAccount(account, server), server) }, error = function(e) { # we'll retry below }) if (is.null(accountDetails)) { if (is.null(hostUrl)) { # rethrow if no host url to go on stop("No account '", account, "' found and no host URL specified.", call. = FALSE) } # no account details yet, look up from the host URL if we have one accountDetails <- accountInfoFromHostUrl(hostUrl) } # create the appropriate client and fetch the application client <- clientForAccount(accountDetails) client$getApplication(id) } applicationForTarget <- function(client, accountInfo, target, forceUpdate) { if (is.null(target$appId)) { # list the existing applications for this account and see if we # need to create a new application app <- getAppByName(client, accountInfo, target$appName) } else { # we already know the app's id, so just retrieve the rest of the metadata app <- client$getApplication(target$appId) } # if there is no record of deploying this application locally however there # is an application of that name already deployed then confirm if (!is.null(target$appId) && !is.null(app) && interactive() && !forceUpdate) { prompt <- paste("Update application currently deployed at\n", app$url, "? [Y/n] ", sep="") input <- readline(prompt) if (nzchar(input) && !identical(input, "y") && !identical(input, "Y")) stop("Application deployment cancelled", call. = FALSE) } # create the application if we need to if (is.null(app)) { app <- client$createApplication(target$appName, target$appTitle, "shiny", accountInfo$accountId) } # return the application app } validURL <- function(url) { !(is.null(url) || url == '') } openURL <- function(client, application, launch.browser, on.failure, deploymentSucceeded) { # function to browse to a URL using user-supplied browser (config or final) showURL <- function(url) { if (isTRUE(launch.browser)) utils::browseURL(url) else if (is.function(launch.browser)) launch.browser(url) } # Check to see if we should open config url or app url if (!is.null(client$configureApplication)) { config <- client$configureApplication(application$id) url <- config$config_url if (!deploymentSucceeded && validURL(config$logs_url)) { # With 1.5.5+, Connect application configuration includes # a logs URL to be shown on unsuccessful deployment. url <- config$logs_url } if (validURL(url)) { # Connect should always end up here, even on deployment failures if (deploymentSucceeded) { showURL(url) } else if (is.function(on.failure)) { on.failure(url) } } } else if (deploymentSucceeded) { # shinyapps.io should land here if things succeeded showURL(application$url) } else if (is.function(on.failure)) { on.failure(NULL) } # or open no url if things failed } runStartupScripts <- function(appDir, logLevel) { scripts <- c( # the site-wide startup script file.path(R.home("etc"), "rsconnect.site"), # the user startup script path.expand("~/.rsconnect_profile"), # a startup script specific to this application file.path(appDir, ".rsconnect_profile")) # iterate over the startup scripts for (script in scripts) { if (file.exists(script)) { if (logLevel == "verbose") { cat("----- Sourcing startup script", script, "-----\n") } source(file = script, verbose = (logLevel == "verbose")) } } } rsconnect/R/packages.R0000644000175000017500000000375014031357651014516 0ustar nileshnilesh#' Using Packages with rsconnect #' #' @description #' Deployed applications can depend on any package available on CRAN as well as any package hosted in a public \href{https://github.com/}{GitHub} repository. #' #' When an application is deployed it's source code is scanned for dependencies using the [appDependencies()] function. The list of dependencies is sent to the server along with the application source code and these dependencies are then installed alongside the application. #' #' Note that the `Suggests` dependencies of packages are not automatically included in the list of dependent packages. See the *Note* section of the documentation of the [appDependencies()] function for details on how to force packages to be included in the dependency list. #' #' @section CRAN Packages: #' #' When sastisfying CRAN package dependencies, the server will build the exact versions of packages that were installed on the system from which the application is deployed. #' #' If a locally installed package was not obtained from CRAN (e.g. was installed from R-Forge) and as a result doesn't have a version that matches a version previously published to CRAN then an error will occur. It's therefore important that you run against packages installed directly from CRAN in your local configuration. #' #' @section GitHub Packages: #' #' It's also possible to depend on packages hosted in public GitHub repositories, so long as they are installed via the [devtools::install_github()] function from the \pkg{devtools} package. #' #' This works because `install_github` records the exact Github commit that was installed locally, making it possible to download and install the same source code on the deployment server. #' #' Note that in order for this to work correctly you need to install the very latest version of `devtools` from Github. You can do this as follows: #' #' \preformatted{ #' library(devtools) #' install_github("r-lib/devtools") #' } #' #' @seealso [appDependencies()] #' @name rsconnectPackages NULL rsconnect/R/accounts.R0000644000175000017500000004051013710063430014542 0ustar nileshnilesh#' Account Management Functions #' #' Functions to enumerate and remove accounts on the local system. Prior to #' deploying applications you need to register your account on the local system. #' #' You register an account using the [setAccountInfo()] function (for #' ShinyApps) or [connectUser()] function (for other servers). You can #' subsequently remove the account using the `removeAccount` function. #' #' The `accounts` and `accountInfo` functions are provided for viewing #' previously registered accounts. #' #' @param name Name of account #' @param server Name of the server on which the account is registered #' (optional; see [servers()]) #' #' @return `accounts` returns a data frame with the names of all accounts #' registered on the system and the servers on which they reside. #' `accountInfo` returns a list with account details. #' #' @rdname accounts #' @export accounts <- function(server = NULL) { path <- accountsConfigDir() if (!is.null(server)) path <- file.path(path, server) # get a raw list of accounts accountnames <- file_path_sans_ext(list.files(path, pattern=glob2rx("*.dcf"), recursive = TRUE, full.names = TRUE)) if (length(accountnames) == 0) { return(NULL) } # convert to a data frame servers <- dirname(accountnames) servers[servers == "."] <- "shinyapps.io" servers <- fileLeaf(servers) names <- fileLeaf(accountnames) data.frame(name = names, server = servers, stringsAsFactors = FALSE) } #' Connect Api User Account #' #' Connect a user account to the package using an API key for authentication #' so that it can be used to deploy and manage #' applications on behalf of the account. #' #' @param account A name for the account to connect. Optional. #' @param server The server to connect to. Optional if there is only one server #' registered. #' @param apiKey The API key used to authenticate the user #' @param quiet Whether or not to show messages and prompts while connecting the #' account. #' #' @details This function configures the user to connect using an apiKey in #' the http auth headers instead of a token. This is less secure but may #' be necessary when the client is behind a proxy or otherwise unable to #' authenticate using a token. #' #' @family Account functions #' @export connectApiUser <- function(account = NULL, server = NULL, apiKey = NULL, quiet = FALSE) { # if server isn't specified, look up the default if (is.null(server)) { target <- getDefaultServer(local = TRUE) } else { target <- serverInfo(server) } if (is.null(target)) { stop("You must specify a server to connect to.") } # if account is specified and we already know about the account, get the User # ID so we can prefill authentication fields userId <- 0 userAccounts <- accounts(target$name) if (!is.null(account) && !is.null(userAccounts)) { if (account %in% userAccounts[,"name"]) { accountDetails <- accountInfo(account, target$name) userId <- accountDetails$accountId if (!quiet) { message("The account '", account, "' is already registered; ", "attempting to reconnect it.") } } } user <- getAuthedUser(serverUrl = target$url, apiKey = apiKey) if (is.null(user)) { stop("Unable to fetch user data for provided API key") } # write the user info registerUserApiKey(serverName = target$name, accountName = account, userId = user$id, apiKey = apiKey) if (!quiet) { message("\nAccount registered successfully: ", account) } } #' Connect User Account #' #' Connect a user account to the package so that it can be used to deploy and #' manage applications on behalf of the account. #' #' @param account A name for the account to connect. Optional. #' @param server The server to connect to. Optional if there is only one server #' registered. #' @param quiet Whether or not to show messages and prompts while connecting the #' account. #' #' @details When this function is invoked, a web browser will be opened to a #' page on the target server where you will be prompted to enter your #' credentials. Upon successful authentication, your local installation of #' \pkg{rsconnect} and your server account will be paired, and you'll #' be able to deploy and manage applications using the package without further #' prompts for credentials. #' #' @family Account functions #' @export connectUser <- function(account = NULL, server = NULL, quiet = FALSE) { # if server isn't specified, look up the default if (is.null(server)) { target <- getDefaultServer(local = TRUE) } else { target <- serverInfo(server) } if (is.null(target)) { stop("You must specify a server to connect to.") } # if account is specified and we already know about the account, get the User # ID so we can prefill authentication fields userId <- 0 userAccounts <- accounts(target$name) if (!is.null(account) && !is.null(userAccounts)) { if (account %in% userAccounts[,"name"]) { accountDetails <- accountInfo(account, target$name) userId <- accountDetails$accountId if (!quiet) { message("The account '", account, "' is already registered; ", "attempting to reconnect it.") } } } # generate a token and send it to the server token <- getAuthToken(target$name) if (!quiet) { message("A browser window should open; if it doesn't, you may authenticate ", "manually by visiting ", token$claim_url, ".") message("Waiting for authentication...") } utils::browseURL(token$claim_url) # keep trying to authenticate until we're successful repeat { Sys.sleep(1) user <- getAuthedUser(serverUrl = target$url, token = token$token, privateKey = token$private_key, serverCertificate = target$certificate) if (!is.null(user)) break } # populate the username if there wasn't one set on the server if (nchar(user$username) == 0) { if (!is.null(account)) user$username <- account else user$username <- tolower(paste0(substr(user$first_name, 1, 1), user$last_name)) # in interactive mode, prompt for a username before accepting defaults if (!quiet && interactive() && is.null(account)) { input <- readline(paste0("Choose a nickname for this account (default '", user$username, "'): ")) if (nchar(input) > 0) user$username <- input } } # write the user info registerUserToken(serverName = target$name, accountName = user$username, userId = user$id, token = token$token, privateKey = token$private_key) if (!quiet) { message("Account registered successfully: ", user$first_name, " ", user$last_name, " (", user$username, ")") } } #' Set ShinyApps Account Info #' #' Configure a ShinyApps account for publishing from this system. #' #' @param name Name of account to save or remove #' @param token User token for the account #' @param secret User secret for the account #' #' @examples #' \dontrun{ #' #' # register an account #' setAccountInfo("user", "token", "secret") #' #' # remove the same account #' removeAccount("user") #' } #' #' @family Account functions #' @export setAccountInfo <- function(name, token, secret) { if (!isStringParam(name)) stop(stringParamErrorMessage("name")) if (!isStringParam(token)) stop(stringParamErrorMessage("token")) if (!isStringParam(secret)) stop(stringParamErrorMessage("secret")) # create connect client serverInfo <- shinyappsServerInfo() authInfo <- list(token = token, secret = secret, certificate = serverInfo$certificate) lucid <- lucidClient(serverInfo$url, authInfo) # get user Id userId <- lucid$currentUser()$id # get account id accountId <- NULL accounts <- lucid$accountsForUser(userId) for (account in accounts) { if (identical(account$name, name)) { accountId <- account$id break } } if (is.null(accountId)) stop("Unable to determine account id for account named '", name, "'") # get the path to the config file configFile <- accountConfigFile(name, serverInfo$name) dir.create(dirname(configFile), recursive = TRUE, showWarnings = FALSE) # write the user info write.dcf(list(name = name, userId = userId, accountId = accountId, token = token, secret = secret, server = serverInfo$name), configFile, width = 100) # set restrictive permissions on it if possible if (identical(.Platform$OS.type, "unix")) Sys.chmod(configFile, mode="0600") } #' @rdname accounts #' @family Account functions #' @export accountInfo <- function(name, server = NULL) { if (!isStringParam(name)) stop(stringParamErrorMessage("name")) configFile <- accountConfigFile(name, server) if (length(configFile) > 1) stopWithMultipleAccounts(name) if (length(configFile) == 0 || !file.exists(configFile)) stop(missingAccountErrorMessage(name)) accountDcf <- readDcf(configFile, all = TRUE) info <- as.list(accountDcf) # remove all whitespace from private key if (!is.null(info$private_key)) { info$private_key <- gsub("[[:space:]]","",info$private_key) } info } #' @rdname accounts #' @export removeAccount <- function(name, server = NULL) { if (!isStringParam(name)) stop(stringParamErrorMessage("name")) configFile <- accountConfigFile(name, server) if (length(configFile) > 1) stopWithMultipleAccounts(name) if (length(configFile) == 0 || !file.exists(configFile)) stop(missingAccountErrorMessage(name)) file.remove(configFile) invisible(NULL) } # given the name of a registered server, does the following: # 1) generates a public/private key pair and token ID # 2) pushes the public side of the key pair to the server, and obtains # from the server a URL at which the token can be claimed # 3) returns the token ID, private key, and claim URL getAuthToken <- function(server, userId = 0) { if (missing(server) || is.null(server)) { stop("You must specify a server to connect to.") } target <- serverInfo(server) # generate a token and push it to the server token <- generateToken() connect <- connectClient(service = target$url, authInfo = list(certificate = target$certificate)) response <- connect$addToken(list(token = token$token, public_key = token$public_key, user_id = as.integer(userId))) # return the generated token and the information needed to claim it list( token = token$token, private_key = token$private_key, claim_url = response$token_claim_url) } # given a server URL and auth parameters, return the user # who owns the auth if it's valid/claimed, and NULL if invalid/unclaimed. # raises an error on any other HTTP error. # # this function is used by the RStudio IDE as part of the workflow which # attaches a new Connect account. getAuthedUser <- function(serverUrl, token = NULL, privateKey = NULL, serverCertificate = NULL, apiKey = NULL) { authInfo <- NULL if (!is.null(apiKey)) { authInfo <- list(apiKey = apiKey) } else { authInfo <- list(token = token, private_key = as.character(privateKey), certificate = serverCertificate) } # form a temporary client from the authInfo connect <- connectClient(service = ensureConnectServerUrl(serverUrl), authInfo) # attempt to fetch the user user <- NULL tryCatch({ user <- connect$currentUser() }, error = function(e) { if (length(grep("HTTP 500", e$message)) == 0) { stop(e) } }) # return the user we found user } # passthrough function for compatibility with old IDE versions getUserFromRawToken <- function(serverUrl, token, privateKey, serverCertificate = NULL) { getAuthedUser(serverUrl = serverUrl, token = token, privateKey = privateKey, serverCertificate = serverCertificate) } registerUserApiKey <- function(serverName, accountName, userId, apiKey) { # write the user info configFile <- accountConfigFile(accountName, serverName) dir.create(dirname(configFile), recursive = TRUE, showWarnings = FALSE) write.dcf(list(username = accountName, accountId = userId, apiKey = apiKey, server = serverName), configFile) # set restrictive permissions on it if possible if (identical(.Platform$OS.type, "unix")) Sys.chmod(configFile, mode="0600") } registerUserToken <- function(serverName, accountName, userId, token, privateKey) { # write the user info configFile <- accountConfigFile(accountName, serverName) dir.create(dirname(configFile), recursive = TRUE, showWarnings = FALSE) write.dcf(list(username = accountName, accountId = userId, token = token, server = serverName, private_key = as.character(privateKey)), configFile) # set restrictive permissions on it if possible if (identical(.Platform$OS.type, "unix")) Sys.chmod(configFile, mode="0600") } accountConfigFile <- function(name, server = NULL) { # if no server is specified, try to find an account with the given name # associated with any server if (is.null(server)) { return(list.files(accountsConfigDir(), pattern = paste0(name, ".dcf"), recursive = TRUE, full.names = TRUE)) } normalizePath(file.path(accountsConfigDir(), server, paste(name, ".dcf", sep="")), mustWork = FALSE) } accountsConfigDir <- function() { rsconnectConfigDir("accounts") } missingAccountErrorMessage <- function(name) { paste("account named '", name, "' does not exist", sep="") } resolveAccount <- function(account, server = NULL) { # get existing accounts accounts <- accounts(server)[,"name"] if (length(accounts) == 0) stopWithNoAccount() # if no account was specified see if we can resolve the account to a default if (is.null(account)) { if (length(accounts) == 1) accounts[[1]] else stopWithSpecifyAccount() } # account explicitly specified, confirm it exists else { count <- sum(accounts == account) if (count == 0) stopWithMissingAccount(account) else if (count == 1) account else stopWithMultipleAccounts(account) } } isShinyapps <- function(server) { identical(server, "shinyapps.io") } isRPubs <- function(server) { identical(server, "rpubs.com") } isConnectInfo <- function(accountInfo = NULL, server = NULL) { host <- if (is.null(accountInfo)) server else accountInfo$server !isShinyapps(host) && !isRPubs(host) } stopWithNoAccount <- function() { stop("You must register an account using setAccountInfo prior to ", "proceeding.", call. = FALSE) } stopWithSpecifyAccount <- function() { stop("Please specify the account name (there is more than one ", "account registered on this system)", call. = FALSE) } stopWithMissingAccount <- function(account) { stop(missingAccountErrorMessage(account), call. = FALSE) } stopWithMultipleAccounts <- function(account) { stop("Multiple accounts with the name '", account, "' exist. Please specify ", "the server of the account you wish to use.", call. = FALSE) } accountInfoFromHostUrl <- function(hostUrl) { # get the list of all registered servers servers <- servers() # filter to just those matching the given host url server <- servers[as.character(servers$url) == hostUrl,] if (nrow(server) < 1) { stop("No server with the URL ", hostUrl, " is registered.", call. = FALSE) } # extract server name server <- as.character(server[1,"name"]) # now find accounts with the given server account <- accounts(server = server) if (is.null(account) || nrow(account) < 1) { stop("No accounts registered with server ", server, call. = FALSE) } # return account info from the first one return(accountInfo(name = as.character(account[1,"name"]), server = server)) } rsconnect/R/deployAPI.R0000644000175000017500000000233613632232206014557 0ustar nileshnilesh#' Deploy a Plumber API #' #' Deploys an application consisting of plumber API routes. The given directory #' must contain a script returning a `plumb` object or a plumber API definition. #' #' @param api Path to the API project directory. Must contain either #' `entrypoint.R` or `plumber.R` #' @param ... Additional arguments to [deployApp()]. #' #' @details Deploy a plumber API definition by either supplying a directory #' containing `plumber.R` (an API definition) or `entrypoint.R` that returns a #' `plumb` object created by `plumber::plumb()`. See the plumber documentation #' for more information. #' #' @family Deployment functions #' @export deployAPI <- function(api, ...) { if (!requireNamespace("plumber") || packageVersion("plumber") < "0.3.2") { stop("Version 0.3.2 or later of the plumber package is required to ", "deploy plumber APIs.") } if (!file.exists(api)) { stop("The api at '", api, "' does not exist.") } if (!utils::file_test("-d", api)) { stop("The api at '", api, "' is not a directory.") } # Checking for entrypoint.R or plumber.R is done in `lint-framework.R` deployApp(appDir = api, contentCategory = "api", ...) } rsconnect/R/deploySite.R0000644000175000017500000000743313632232206015055 0ustar nileshnilesh#' Deploy a Website #' #' Deploy an R Markdown website to a server. #' #' @inheritParams deployApp #' #' @param siteDir Directory containing website. Defaults to current #' working directory. #' @param siteName Name for the site (names must be unique within #' an account). Defaults to the base name of the specified siteDir, #' (or to a name provided by a custom site generation function). #' @param render Rendering behavior for site: "none" to upload a #' static version of the current contents of the site directory; #' "local" to render the site locally then upload it; "server" to #' render the site on the server. Note that for "none" and "local" #' R scripts (.R) and markdown documents (.Rmd and .md) will not be #' uploaded to the server. #' @param ... Additional arguments to [deployApp()]. Do not supply `appDir`, #' `appFiles`, or `appSourceDoc`; these three parameters are automatically #' generated by `deploySite`. #' #' @family Deployment functions #' @export deploySite <- function(siteDir = getwd(), siteName = NULL, account = NULL, server = NULL, render = c("none", "local", "server"), launch.browser = getOption("rsconnect.launch.browser", interactive()), logLevel = c("normal", "quiet", "verbose"), lint = FALSE, metadata = list(), python = NULL, ...) { # switch to siteDir for duration of this function oldwd <- setwd(siteDir) on.exit(setwd(oldwd), add = TRUE) # validate we have the version of rmarkdown required to discover # whether this directory has a website in it, what it's name # and content directory are, etc. rmarkdownVersion <- "0.9.5.3" if (!requireNamespace("rmarkdown") || packageVersion("rmarkdown") < rmarkdownVersion) { stop("Version ", rmarkdownVersion, " or later of the rmarkdown package ", "is required to deploy websites.") } # validate and normalize siteDir if (!isStringParam(siteDir)) stop(stringParamErrorMessage("siteDir")) siteDir <- normalizePath(siteDir, mustWork = FALSE) if (!file.exists(siteDir)) { stop(siteDir, " does not exist") } # discover the site generator siteGenerator <- rmarkdown::site_generator(siteDir) if (is.null(siteGenerator)) stop("index file with site entry not found in ", siteDir) # render locally if requested render <- match.arg(render) if (render == "local") { siteGenerator$render(input_file = NULL, output_format = NULL, envir = new.env(), quiet = identical(match.arg(logLevel), "quiet"), encoding = getOption("encoding")) } # if there is no explicit siteName get it from the generator appName <- siteName if (is.null(appName)) appName <- siteGenerator$name # determine appDir based on whether we are rendering on the server if (render == "server") { appDir <- '.' appFiles <- NULL } else { appDir <- siteGenerator$output_dir appFiles <- bundleFiles(siteGenerator$output_dir) appFiles <- appFiles[!grepl("^.*\\.([Rr]|[Rr]md|md)$", appFiles)] } # determine appSourceDoc if (file.exists("index.Rmd")) appSourceDoc <- "index.Rmd" else appSourceDoc <- "index.md" # deploy the site deployApp(appName = appName, appDir = appDir, appFiles = appFiles, appSourceDoc = appSourceDoc, contentCategory = "site", account = account, server = server, launch.browser = launch.browser, logLevel = logLevel, lint = lint, metadata = metadata, python = python, ...) } rsconnect/R/locale.R0000644000175000017500000000377712542062522014203 0ustar nileshnileshoverrideWindowsLocale <- function(locale) { map <- list() map[['el_EL']] <- "el_GR" if (locale %in% names(map)) { locale <- map[[locale]] } return(locale) } detectLocale <- function () { sysName <- Sys.info()[['sysname']] if (identical(sysName, "Windows")) { locale <- detectLocale.Windows() } else { locale <- detectLocale.Unix() } return(locale) } detectLocale.Unix <- function () { unlist(strsplit(Sys.getlocale("LC_CTYPE"), ".", fixed=TRUE))[1] } detectLocale.Windows <- function (useCache = getOption('rsconnect.locale.cache', TRUE)) { # default locale locale <- 'en_US' cacheFile <- localeCacheFile() if (file.exists(cacheFile) && useCache) { # get chached cache <- as.list(readDcf(cacheFile, all=TRUE)) locale <- unlist(cache$locale) } else { tryCatch({ # get system locale locale <- systemLocale() # write the user info write.dcf(list(locale = locale), cacheFile, width = 100) }, error=function(e) { warning(paste0("Error detecting locale: ", e, " (Using default: ", locale, ")"), call.=FALSE) }) } return(overrideWindowsLocale(locale)) } localeCacheFile <- function() { normalizePath(file.path(rsconnectConfigDir(), "locale.dcf"), mustWork = FALSE) } systemLocale <- function() { message("Detecting system locale ... ", appendLF = FALSE) # get system locale info <- systemInfo() raw <- as.character(info[[20]]) parts <- strsplit(unlist(strsplit(raw, ";", fixed=TRUE)), "-", fixed=TRUE) if (length(parts[[1]]) >= 2) { # normalize locale to something like en_US locale <- paste(tolower(parts[[1]][1]), toupper(parts[[1]][2]), sep="_") } else { locale <- paste(tolower(parts[[1]][1]), toupper(parts[[1]][1]), sep="_") } message(locale) return(locale) } systemInfo <- function () { raw <- system("systeminfo /FO csv", intern=TRUE, wait=TRUE) info <- read.csv(textConnection(raw)) return(info) } rsconnect/R/deployTFModel.R0000644000175000017500000000307514031357651015447 0ustar nileshnilesh#' Deploy a TensorFlow saved model #' #' Deploys a directory containing a Tensorflow saved model file. #' #' Deploy a single Tensorflow saved model as a bundle. Should be passed a #' directory that contains the *saved_model.pb* or *saved_model.pbtxt* file, #' as well as any variables and assets necessary to load the model. #' #' A saved model directory might look like this: #' #' ``` #' ./1/ #' ./1/saved_model.pb or ./1/saved_model.pbtxt #' ./1/variables/ #' ./1/variables/variables.data-00000-of-00001 #' ./1/variables/variables.index #' ``` #' #' For information on creating saved models, see the Keras method #' [keras::export_savedmodel.keras.engine.training.Model()] or the TensorFlow #' method [tensorflow::export_savedmodel()]. If using the TensorFlow package for #' R, the official [TensorFlow guide for saving and restoring models]( #' ) #' may be useful. #' #' @param modelDir Path to the saved model directory. MUST contain #' *saved_model.pb* or *saved_model.pbtxt* #' @param ... Additional arguments to [deployApp()]. #' #' @references #' #' #' @details #' #' @family Deployment functions #' @export deployTFModel <- function(modelDir, ...) { if (!file.exists(modelDir)) { stop("The model directory at '", modelDir, "' does not exist.") } if (!utils::file_test("-d", modelDir)) { stop("The modelDir at '", modelDir, "' is not a directory.") } # Checking for saved_model.pb is done in `lint-framework.R` deployApp(appDir = modelDir, ...) } rsconnect/R/http-curl.R0000644000175000017500000000633414136250232014654 0ustar nileshnilesh# HTTP transport using the curl command-line utility. Useful on systems that have a working curl but # not necessarily a working curl library, such as Windows 10. httpCurl <- function(protocol, host, port, method, path, headers, contentType = NULL, contentFile = NULL, certificate = NULL, timeout = NULL) { if (!is.null(contentFile) && is.null(contentType)) stop("You must specify a contentType for the specified file") if (!is.null(contentFile)) fileLength <- file.info(contentFile)$size headers <- appendCookieHeaders( list(protocol=protocol, host=host, port=port, path=path), headers) extraHeaders <- character() for (header in names(headers)) { if(!identical(header, "Content-Type") && !identical(header, "Content-Length")){ extraHeaders <- paste(extraHeaders, "--header") extraHeaders <- paste(extraHeaders, paste('"', header,": ",headers[[header]], '"', sep="")) } } outputFile <- tempfile() command <- paste("curl", "-i", "-X", method); if (httpVerbose()) command <- paste(command, "-v") if (!is.null(timeout)) command <- paste(command, "--connect-timeout", timeout) if (!is.null(contentFile)) { command <- paste(command, "-T", shQuote(contentFile), "--header", paste('"' ,"Content-Type: ",contentType, '"', sep=""), "--header", paste('"', "Content-Length: ", fileLength, '"', sep="")) } # add prefix to port if necessary if (nzchar(port)) port <- paste(":", port, sep="") if (!isTRUE(getOption("rsconnect.check.certificate", TRUE))) { # suppressed certificate check command <- paste(command, "--insecure") } else if (!is.null(certificate)) { # cert check not suppressed and we have a supplied cert command <- paste(command, "--cacert", shQuote(certificate)) } command <- paste(command, extraHeaders, "--header", "Expect:", "--user-agent", userAgent(), "--silent", "--show-error", "-o", shQuote(outputFile), paste('"', protocol, "://", host, port, path, '"', sep="")) result <- NULL time <- system.time(gcFirst = FALSE, { result <- system(command) }) httpTrace(method, path, time) # emit JSON trace if requested if (!is.null(contentFile) && httpTraceJson() && identical(contentType, "application/json")) { fileLength <- file.info(contentFile)$size fileContents <- readBin(contentFile, what="raw", n=fileLength) cat(paste0("<< ", rawToChar(fileContents), "\n")) } if (result == 0) { fileConn <- file(outputFile, "rb") on.exit(close(fileConn)) readHttpResponse(list( protocol = protocol, host = host, port = port, method = method, path = path), fileConn) } else { stop(paste("Curl request failed (curl error", result, "occurred)")) } } rsconnect/R/utils.R0000644000175000017500000001453213632232206014072 0ustar nileshnilesh.globals <- new.env(parent = emptyenv()) logTimestamper <- function() { paste("[", as.character(Sys.time()), "]", sep = "") } timestampedLog <- function(...) { cat(paste(logTimestamper(), ..., "\n")) } # Returns a logging function when enabled, a noop function otherwise. verboseLogger <- function(verbose) { if (verbose) { timestampedLog } else { function(...) {} } } isStringParam <- function(param) { is.character(param) && (length(param) == 1) } stringParamErrorMessage <- function(param) { paste(param, "must be a single element character vector") } regexExtract <- function(re, input) { match <- regexec(re, input) matchLoc <- match[1][[1]] if (length(matchLoc) > 1) { matchLen <-attributes(matchLoc)$match.length return (substr(input, matchLoc[2], matchLoc[2] + matchLen[2]-1)) } else { return (NULL) } } displayStatus <- function(quiet) { quiet <- quiet || httpDiagnosticsEnabled() function (status) { if (!quiet) cat(status) } } withStatus <- function(quiet) { quiet <- quiet || httpDiagnosticsEnabled() function(status, code) { if (!quiet) cat(status, "...", sep="") force(code) if (!quiet) cat("DONE\n") } } httpDiagnosticsEnabled <- function() { return (getOption("rsconnect.http.trace", FALSE) || getOption("rsconnect.http.verbose", FALSE)) } readPassword <- function(prompt) { if (rstudioapi::hasFun("askForPassword")) { password <- rstudioapi::askForPassword(prompt) } else { os <- Sys.info()[['sysname']] echoOff <- function() { if (identical(os, "Darwin") || identical(os, "Linux")) { #system("stty cbreak -echo <&2") } else { # TODO: disable echo on Windows } } echoOn <- function() { if (identical(os, "Darwin") || identical(os, "Linux")) { #system("stty echo") } else { # TODO: enable echo on Windows } } echoOff() password <- readline(prompt) echoOn() } return (password) } # wrapper around read.dcf to workaround LC_CTYPE bug readDcf <- function(...) { loc <- Sys.getlocale('LC_CTYPE') on.exit(Sys.setlocale('LC_CTYPE', loc)) read.dcf(...) } # Replacement for tools::file_path_sans_ext to work around an issue where # filenames like "foo..ext" are not returned as "foo.". file_path_sans_ext <- function(x, compression = FALSE) { if (compression) { x <- sub("[.](gz|bz2|xz)$", "", x) } sub("(.+)\\.[[:alnum:]]+$", "\\1", x) } #' Generate a line with embedded message #' #' Generates a message, surrounded with `#`, that extends #' up to length `n`. #' @param message A string (single-line message). #' @param n The total number length of the generated string -- #' the message is padded with `#` up to length `n`. #' @noRd hr <- function(message = "", n = 80) { if (nzchar(message)) { r <- as.integer((n - nchar(message) - 2) / 2) hr <- paste(rep.int("#", r), collapse = '') cat(hr, message, hr, sep=" ", '\n') } else { hr <- paste(rep.int("#", n), collapse = '') cat(hr, sep="", '\n') } } # this function was defined in the shiny package; in the unlikely event that # shiny:::checkEncoding() is not available, use a simplified version here checkEncoding2 <- function(file) { tryCatch( getFromNamespace('checkEncoding', 'shiny')(file), error = function(e) { if (.Platform$OS.type != 'windows') return('UTF-8') x <- readLines(file, encoding = 'UTF-8', warn = FALSE) isUTF8 <- !any(is.na(iconv(x, 'UTF-8'))) if (isUTF8) 'UTF-8' else getOption('encoding') } ) } # if shiny:::checkEncoding() gives UTF-8, use it, otherwise first consider # the RStudio project encoding, and eventually getOption('encoding') checkEncoding <- function(file) { enc1 <- .globals$encoding enc2 <- checkEncoding2(file) if (enc2 == 'UTF-8') return(enc2) if (length(enc1)) enc1 else enc2 } # read the Encoding field from the *.Rproj file rstudioEncoding <- function(dir) { proj <- list.files(dir, '[.]Rproj$', full.names = TRUE) if (length(proj) != 1L) return() # there should be one and only one .Rproj enc <- drop(readDcf(proj, 'Encoding')) enc[!is.na(enc)] } # return the leaf from a path (e.g. /foo/abc/def -> def) fileLeaf <- function(path) { components <- strsplit(path, "/") unlist(lapply(components, function(component) { component[length(component)] })) } # whether the given path points to an individual piece of content isDocumentPath <- function(path) { ext <- tolower(tools::file_ext(path)) !is.null(ext) && ext != "" } # given a path, return the directory under which rsconnect package state is # stored rsconnectRootPath <- function(appPath) { if (isDocumentPath(appPath)) file.path(dirname(appPath), "rsconnect", "documents", basename(appPath)) else file.path(appPath, "rsconnect") } dirExists <- function(x) { utils::file_test('-d', x) } capitalize <- function(x) { if (nchar(x) == 0) x else paste0(toupper(substr(x, 1, 1)), substring(x, 2)) } activeEncoding <- function(project = getwd()) { defaultEncoding <- getOption("encoding") if (identical(defaultEncoding, "native.enc")) defaultEncoding <- "unknown" # attempt to locate .Rproj file files <- list.files(project, full.names = TRUE) rprojFile <- grep("\\.Rproj$", files, value = TRUE) if (length(rprojFile) != 1) return(defaultEncoding) # read the file contents <- readLines(rprojFile, warn = FALSE, encoding = "UTF-8") encodingLine <- grep("^Encoding:", contents, value = TRUE) if (length(encodingLine) != 1) return(defaultEncoding) # remove 'Encoding:' prefix sub("^Encoding:\\s*", "", encodingLine) } # Returns the MD5 for path as a raw sequence of 16 hexadecimal pairs. fileMD5 <- function(path) { # Use digest::digest to compute file MD5. FIPS mode disables openssl::md5. Workaround until we can # migrate away from MD5 for file content checks. # # See: https://github.com/rstudio/rsconnect/issues/363 if (is.null(path)) { return(digest::digest("", algo = "md5", serialize = FALSE, raw = TRUE)) } digest::digest(path, algo = "md5", file = TRUE, raw = TRUE) } # Returns the MD5 for path as a 32-character concatenated string of hexadecimal characters. fileMD5.as.string <- function(path) { md5.as.string(fileMD5(path)) } # Returns the input md5 as a 32-character concatenated string of hexadecimal characters. md5.as.string <- function(md5) { paste(md5, collapse = "") } rsconnect/R/lint-framework.R0000644000175000017500000002306314105013651015667 0ustar nileshnilesh.__LINTERS__. <- new.env(parent = emptyenv()) ##' Add a Linter ##' ##' Add a linter, to be used in subsequent calls to [lint()]. ##' ##' @param name The name of the linter, as a string. ##' @param linter A [linter()]. ##' @export ##' @example examples/example-linter.R addLinter <- function(name, linter) { assign(name, linter, envir = .__LINTERS__.) } ##' Create a Linter ##' ##' Generate a linter, which can identify errors or problematic regions in a ##' project. ##' ##' @param apply Function that, given the content of a file, returns the indices ##' at which problems were found. ##' @param takes Function that, given a set of paths, returns the subset of ##' paths that this linter uses. ##' @param message Function that, given content and lines, returns an ##' informative message for the user. Typically generated with ##' [makeLinterMessage()]. ##' @param suggestion String giving a prescribed fix for the linted problem. ##' @export ##' @example examples/example-linter.R linter <- function(apply, takes, message, suggestion) { result <- list( apply = apply, takes = takes, message = message, suggestion = suggestion ) class(result) <- "linter" result } getLinterApplicableFiles <- function(linter, files) { result <- linter$takes(files) if (is.numeric(result) || is.logical(result)) { files[result] } else { result } } applyLinter <- function(linter, ...) { result <- linter$apply(...) if (is.logical(result)) { output <- which(result) } else { output <- as.numeric(result) } attributes(output) <- attributes(result) output } ##' Lint a Project ##' ##' Takes the set of active linters (see [addLinter()]), and applies ##' them to all files within a project. ##' ##' @param project Path to a project directory. ##' @param files Specific files to lint. Can be NULL, in which case all ##' the files in the directory will be linted. ##' @param appPrimaryDoc The primary file in the project directory. Can be NULL, ##' in which case it's inferred (if possible) from the directory contents. ##' @export lint <- function(project, files = NULL, appPrimaryDoc = NULL) { if (!file.exists(project)) stop("No directory at path '", project, "'") if (file.exists(project) && !isTRUE(file.info(project)$isdir)) stop("Path '", project, "' is not a directory") project <- normalizePath(project, mustWork = TRUE, winslash = "/") # Perform actions within the project directory (so relative paths are easily used) owd <- getwd() on.exit(setwd(owd)) setwd(project) # If the set of files wasn't specified, generate it if (is.null(files)) { files <- bundleFiles(project) } # List the files that will be bundled projectFiles <- file.path(project, files) %relativeTo% project projectFiles <- gsub("^\\./", "", projectFiles) names(projectFiles) <- projectFiles # collect files appFilesBase <- tolower(list.files()) wwwFiles <- tolower(list.files("www/")) # check for single-file app collision if (!is.null(appPrimaryDoc) && tolower(tools::file_ext(appPrimaryDoc)) == "r" && "app.r" %in% appFilesBase) { stop("The project contains both a single-file Shiny application and a ", "file named app.R; it must contain only one of these.") } # Do some checks for a valid application structure satisfiedLayouts <- c( shinyAndUi = all(c("server.r", "ui.r") %in% appFilesBase), shinyAndIndex = "server.r" %in% appFilesBase && "index.html" %in% wwwFiles, app = any("app.r" %in% appFilesBase, !is.null(appPrimaryDoc) && tolower(tools::file_ext(appPrimaryDoc)) == "r"), Rmd = any(grepl(glob2rx("*.rmd"), appFilesBase)), Qmd = any(grepl(glob2rx("*.qmd"), appFilesBase)), static = any(grepl("(?:html?|pdf)$", appFilesBase)), plumber = any(c("entrypoint.r", "plumber.r") %in% appFilesBase), tensorflow = length(c( Sys.glob(file.path(getwd(),"*","saved_model.pb*")), Sys.glob(file.path(getwd(),"saved_model.pb*")) )) > 0 ) if (!any(satisfiedLayouts)) { msg <- "Cancelling deployment: invalid project layout. The project should have one of the following layouts: 1. 'server.R' and 'ui.R' in the application base directory, 2. 'server.R' and 'www/index.html' in the application base directory, 3. 'app.R' or a single-file Shiny .R file, 4. An R Markdown (.Rmd) or Quarto (.qmd) document, 5. A static HTML (.html) or PDF (.pdf) document. 6. 'plumber.R' API description .R file 7. 'entrypoint.R' plumber startup script 8. A tensorflow saved model" # strip leading whitespace from the above msg <- paste(collapse = "\n", gsub("^ *", "", unlist(strsplit(msg, "\n", fixed = TRUE)))) stop(msg) } linters <- mget(objects(.__LINTERS__.), envir = .__LINTERS__.) # Identify all files that will be read in by one or more linters projectFilesToLint <- Reduce(union, lapply(linters, function(linter) { getLinterApplicableFiles(linter, projectFiles) })) # Read in the files encoding <- activeEncoding(project) projectContent <- lapply(projectFilesToLint, function(file) { # force native encoding (disable any potential internal conversion) enc <- getOption("encoding") options(encoding = "native.enc") on.exit(options(encoding = enc), add = TRUE) # read content with requested encoding # TODO: may consider converting from native encoding to UTF-8 if appropriate readLines(file, encoding = encoding, warn = FALSE) }) names(projectContent) <- projectFilesToLint lintResults <- vector("list", length(linters)) names(lintResults) <- names(linters) ## Apply each linter for (i in seq_along(linters)) { linter <- linters[[i]] applicableFiles <- getLinterApplicableFiles(linter, projectFilesToLint) lintIndices <- vector("list", length(applicableFiles)) names(lintIndices) <- applicableFiles ## Apply linter to each file for (j in seq_along(applicableFiles)) { file <- applicableFiles[[j]] tryCatch( expr = { lintIndices[[j]] <- applyLinter(linter, projectContent[[file]], project = project, path = file, files = projectFiles) }, error = function(e) { message("Failed to lint file '", file, "'") message("The linter failed with message:\n") message(e$message) lintIndices[[j]] <- numeric(0) } ) } ## Get the messages associated with each lint lintMessages <- enumerate(lintIndices, function(x, i) { if (length(x)) { message <- linter$message if (is.function(message)) { linter$message(projectContent[[names(lintIndices)[i]]], x) } else { makeLinterMessage(message, projectContent[[names(lintIndices)[i]]], x) } } else { character() } }) ## Assign the result lintResults[[i]] <- list( files = applicableFiles, indices = lintIndices, message = lintMessages, suggestion = linter$suggestion ) } ## Get all of the linted files, and transform the results into a by-file format lintedFiles <- Reduce(union, lapply(lintResults, function(x) { names(x$indices) })) lintFields <- c("indices", "message") fileResults <- lapply(lintedFiles, function(file) { result <- lapply(lintResults, function(result) { subResult <- lapply(lintFields, function(field) { result[[field]][[file]] }) names(subResult) <- lintFields subResult$suggestion <- result$suggestion subResult$file <- file class(subResult) <- "lint" subResult }) class(result) <- "lintList" result }) names(fileResults) <- lintedFiles class(fileResults) <- "linterResults" invisible(fileResults) } printLintHeader <- function(x) { if (!length(x$message)) return(invisible(NULL)) dashSep <- paste(rep("-", nchar(x$file)), collapse = "") header <- paste(dashSep, "\n", x$file, "\n", dashSep, "\n", sep = "") message(paste(header, collapse = "\n"), appendLF = FALSE) invisible(x) } printLintBody <- function(x, ...) { message(paste(x$message, collapse = "\n"), appendLF = FALSE) invisible(x) } printLintFooter <- function(x, ...) { message(paste(collectSuggestions(x), collapse = "\n")) invisible(x) } printLinterResults <- function(x, ...) { lapply(x, printLintList, ...) printLintFooter(x) invisible(x) } printLintList <- function(x, ...) { printLintHeader(x[[1]]) lapply(x, printLintBody, ...) invisible(x) } printLint <- function(x, ...) { printLintHeader(x) printLintBody(x, ...) invisible(x) } collectSuggestions <- function(fileResults) { suggestions <- lapply(fileResults, function(fileResult) { unlist(lapply(fileResult, function(lintInfo) { if (length(lintInfo$indices) > 0) { paste(as.character(lintInfo$suggestion), collapse = "\n") } })) }) Reduce(union, suggestions) } `%relativeTo%` <- function(paths, directory) { nd <- nchar(directory) unlist(lapply(paths, function(path) { np <- nchar(path) if (nd > np) { warning("'", path, "' is not a subdirectory of '", directory, "'") return(path) } if (substring(path, 1, nd) != directory) { warning("'", path, "' is not a subdirectory of '", directory, "'") return(path) } offset <- if (substring(directory, nd, nd) == "/") 1 else 2 substring(path, nd + offset, np) })) } rsconnect/R/static-analysis.R0000644000175000017500000000000012464431736016036 0ustar nileshnileshrsconnect/R/usage.R0000644000175000017500000001354314031357651014045 0ustar nileshnilesh#' Show Application Usage #' #' Show application usage of a currently deployed application #' @param appName Name of application #' @param appDir Directory containing application. Defaults to #' current working directory. #' @param account Account name. If a single account is registered on the #' system then this parameter can be omitted. #' @param server Server name. Required only if you use the same account name on #' multiple servers. #' @param usageType Use metric to retreive (for example: "hours") #' @param from Date range starting timestamp (Unix timestamp or relative time #' delta such as "2d" or "3w"). #' @param until Date range ending timestamp (Unix timestamp or relative time #' delta such as "2d" or "3w"). #' @param interval Summarization interval. Data points at intervals less then this #' will be grouped. (Relative time delta e.g. "120s" or "1h" or "30d"). #' @note This function only works for ShinyApps servers. #' @export showUsage <- function(appDir=getwd(), appName=NULL, account = NULL, server=NULL, usageType="hours", from=NULL, until=NULL, interval=NULL) { # resolve account accountDetails <- accountInfo(resolveAccount(account, server), server) # intialize client api <- clientForAccount(accountDetails) # resolve application if (is.null(appName)) appName = basename(appDir) application <- resolveApplication(accountDetails, appName) # get application usage data <- api$getAccountUsage(accountDetails$accountId, usageType, application$id, from, until, interval) if (length(data$points) < 1) { stop("No data.", call.=FALSE) } # get data points points <- data$points[[1]] points <- lapply(points, function(X) { X[[1]] <- X[[1]]/1000 # convert from milliseconds to seconds X }) # convert to data frame df <- data.frame(matrix(unlist(points), nrow=length(points), byrow=T), stringsAsFactors=FALSE) colnames(df) <- c("timestamp", usageType) return(df) } #' Show Application Metrics #' #' Show application metrics of a currently deployed application #' @param metricSeries Metric series to query. Refer to the #' [shinyapps.io documentation]() #' for available series. #' @param metricNames Metric names in the series to query. Refer to the #' [shinyapps.io documentation]() #' for available metrics. #' @param appName Name of application #' @param appDir Directory containing application. Defaults to #' current working directory. #' @param account Account name. If a single account is registered on the #' system then this parameter can be omitted. #' @param server Server name. Required only if you use the same account name on #' multiple servers. #' @param from Date range starting timestamp (Unix timestamp or relative time #' delta such as "2d" or "3w"). #' @param until Date range ending timestamp (Unix timestamp or relative time #' delta such as "2d" or "3w"). #' @param interval Summarization interval. Data points at intervals less then this #' will be grouped. (Relative time delta e.g. "120s" or "1h" or "30d"). #' @note This function only works for ShinyApps servers. #' @export showMetrics <- function(metricSeries, metricNames, appDir=getwd(), appName=NULL, account = NULL, server=NULL, from=NULL, until=NULL, interval=NULL) { # resolve account accountDetails <- accountInfo(resolveAccount(account, server), server) # intialize client api <- clientForAccount(accountDetails) # resolve application if (is.null(appName)) appName = basename(appDir) application <- resolveApplication(accountDetails, appName) # get application usage data <- api$getApplicationMetrics(application$id, metricSeries, metricNames, from, until, interval) if (length(data$points) < 1) { stop("No data.", call.=FALSE) } # get data points points <- data$points points <- lapply(points, function(X) { X$time <- X$time/1000 # convert from milliseconds to seconds X }) # convert to data frame df <- data.frame(matrix(unlist(points), nrow=length(points), byrow=T), stringsAsFactors=FALSE) colnames(df) <- c(metricNames, "timestamp") return(df) } #' Show Account Usage #' #' Show account usage #' @param account Account name. If a single account is registered on the #' system then this parameter can be omitted. #' @param server Server name. Required only if you use the same account name on #' multiple servers. #' @param usageType Use metric to retreive (for example: "hours") #' @param from Date range starting timestamp (Unix timestamp or relative time #' delta such as "2d" or "3w"). #' @param until Date range ending timestamp (Unix timestamp or relative time #' delta such as "2d" or "3w"). #' @param interval Summarization interval. Data points at intervals less then this #' will be grouped. (Number of seconds or relative time delta e.g. "1h"). #' @note This function only works for ShinyApps servers. #' @export accountUsage <- function(account=NULL, server=NULL, usageType="hours", from=NULL, until=NULL, interval=NULL) { # resolve account accountDetails <- accountInfo(resolveAccount(account, server), server) # intialize client api <- clientForAccount(accountDetails) # get application usage data <- api$getAccountUsage(accountDetails$accountId, usageType, NULL, from, until, interval) } rsconnect/R/onLoad.R0000644000175000017500000000127214004273454014147 0ustar nileshnilesh.onLoad <- function(libname, pkgname) { if (is.null(getOption("rsconnect.max.bundle.size"))) { options(rsconnect.max.bundle.size = 3145728000) } if (is.null(getOption("rsconnect.max.bundle.files"))) { options(rsconnect.max.bundle.files = 10000) } # HTTP requests can take longer on Windows, so set a larger timeout # by default (primarily used by the IDE when validating server URLs) if (is.null(getOption("rsconnect.http.timeout"))) { windows <- identical(.Platform$OS.type, "windows") options(rsconnect.http.timeout = ifelse(windows, 20, 10)) } if (is.null(getOption("rsconnect.metadata.sync.hours"))) { options(rsconnect.metadata.sync.hours = 24) } } rsconnect/R/dependencies.R0000644000175000017500000001662414105013653015363 0ustar nileshnilesh#' Detect Application Dependencies #' #' Recursively detect all package dependencies for an application. This function #' parses all .R files in the application directory to determine what packages #' the application depends on; and for each of those packages what other #' packages they depend on. #' @inheritParams deployApp #' @param appDir Directory containing application. Defaults to current working #' directory. #' @return Returns a data frame listing the package #' dependencies detected for the application: \tabular{ll}{ `package` #' \tab Name of package \cr `version` \tab Version of package\cr } #' @details Dependencies are determined by parsing application source code and #' looking for calls to `library`, `require`, `::`, and #' `:::`. #' #' Recursive dependencies are detected by examining the `Depends`, #' `Imports`, and `LinkingTo` fields of the packages immediately #' dependend on by the application. #' #' @note Since the `Suggests` field is not included when determining #' recursive dependencies of packages, it's possible that not every package #' required to run your application will be detected. #' #' In this case, you can force a package to be included dependency by #' inserting call(s) to `require` within your source directory. This code #' need not actually execute, for example you could create a standalone file #' named `dependencies.R` with the following code: \cr \cr #' `require(xts)` \cr `require(colorspace)` \cr #' #' This will force the `xts` and `colorspace` packages to be #' installed along with the rest of your application when it is deployed. #' @examples #' \dontrun{ #' #' # dependencies for the app in the current working dir #' appDependencies() #' #' # dependencies for an app in another directory #' appDependencies("~/projects/shiny/app1") #' } #' @seealso [rsconnectPackages](Using Packages with rsconnect) #' @export appDependencies <- function(appDir = getwd(), appFiles=NULL) { # if the list of files wasn't specified, generate it if (is.null(appFiles)) { appFiles <- bundleFiles(appDir) } bundleDir <- bundleAppDir(appDir, appFiles) on.exit(unlink(bundleDir, recursive = TRUE), add = TRUE) deps <- snapshotDependencies(bundleDir) data.frame(package = deps[,"Package"], version = deps[,"Version"], source = deps[,"Source"], row.names = c(1:length(deps[,"Package"])), stringsAsFactors=FALSE) } snapshotDependencies <- function(appDir, implicit_dependencies=c(), verbose = FALSE) { # create a packrat "snapshot" addPackratSnapshot(appDir, implicit_dependencies, verbose = verbose) # TODO: should we care about lockfile version or packrat version? lockFilePath <- snapshotLockFile(appDir) df <- as.data.frame(read.dcf(lockFilePath), stringsAsFactors = FALSE) # get repos defined in the lockfile repos <- gsub("[\r\n]", " ", df[1, 'Repos']) repos <- strsplit(unlist(strsplit(repos, "\\s*,\\s*", perl = TRUE)), "=", fixed = TRUE) repos <- setNames( sapply(repos, "[[", 2), sapply(repos, "[[", 1) ) # read available.packages filters (allow user to override if necessary; # this is primarily to allow debugging) # # note that we explicitly exclude the 'R_version' filter as we want to ensure # that packages which require newer versions of R than the one currently # in use can still be marked as available on CRAN -- for example, currently # the package 'foreign' requires 'R (>= 4.0.0)' but older versions of R # can still successfully install older versions from the CRAN archive filters <- getOption( "available_packages_filters", default = c("duplicates") ) # get Bioconductor repos if any biocRepos <- repos[grep('BioC', names(repos), perl = TRUE, value = TRUE)] biocPackages <- if (length(biocRepos) > 0) { available.packages( contriburl = contrib.url(biocRepos, type = "source"), type = "source", filters = filters ) } # read available packages repo.packages <- available.packages( contriburl = contrib.url(repos, type = "source"), type = "source", filters = filters ) named.repos <- name.all.repos(repos) repo.lookup <- data.frame( name = names(named.repos), url = as.character(named.repos), contrib.url = contrib.url(named.repos, type = "source"), stringsAsFactors = FALSE) # get packages records defined in the lockfile records <- utils::tail(df, -1) # if the package is in a named CRAN-like repository capture it tmp <- lapply(seq_len(nrow(records)), function(i) { pkg <- records[i, "Package"] source <- records[i, "Source"] repository <- NA # capture Bioconcutor repository if (identical(source, "Bioconductor")) { if (pkg %in% biocPackages) { repository <- biocPackages[pkg, 'Repository'] } } else if (isSCMSource(source)) { # leave source+SCM packages alone. } else if (pkg %in% rownames(repo.packages)) { # capture CRAN-like repository # Find this package in the set of available packages then use its # contrib.url to map back to the configured repositories. package.contrib <- repo.packages[pkg, 'Repository'] package.repo.index <- vapply(repo.lookup$contrib.url, function(url) grepl(url, package.contrib, fixed = TRUE), logical(1)) package.repo <- repo.lookup[package.repo.index, ][1, ] # If the incoming package comes from CRAN, keep the CRAN name in place # even if that means using a different name than the repos list. # # The "cran" source is a well-known location for shinyapps.io. # # shinyapps.io isn't going to use the manifest-provided CRAN URL, # but other consumers (Connect) will. if (tolower(source) != "cran") { source <- package.repo$name } repository <- package.repo$url } # validatePackageSource will emit a warning for packages with NA repository. data.frame(Source = source, Repository = repository) }) records[, c("Source","Repository")] <- do.call("rbind", tmp) return(records) } # Return TRUE when the source indicates that a package was installed from # source or comes from a source control system. This indicates that we will # not have a repostory URL; location is recorded elsewhere. isSCMSource <- function(source) { tolower(source) %in% c("github", "gitlab", "bitbucket", "source") } # generate a random name prefixed with "repo_". random.repo.name <- function() { paste("repo_", paste(sample(LETTERS, 8, replace = TRUE), collapse = ""), sep = "") } # Given a list of optionally named repository URLs, return a list of # repository URLs where each element is named. Incoming names are preserved. # Un-named repositories are given random names. name.all.repos <- function(repos) { repo.names <- names(repos) if (is.null(repo.names)) { # names(X) return NULL when nothing is named. Build a same-sized vector of # empty-string names, which is the "no name here" placeholder value # produced when its input has a mix of named and un-named items. repo.names <- rep("", length(repos)) } names(repos) <- sapply(repo.names, function(name) { if (name == "") { # Assumption: Random names are not repeated across a repo list. random.repo.name() } else { name } }, USE.NAMES = FALSE) repos } # get source packages from CRAN availableCRANSourcePackages <- function() { available.packages("https://cran.rstudio.com/src/contrib", type = "source") } rsconnect/R/cookies.R0000644000175000017500000001476713455420275014410 0ustar nileshnilesh # Environment in which cookies will be stored. Cookies are expected to survive # the duration of the R session, but are not persisted outside of the R # session. .cookieStore <- new.env(parent=emptyenv()) # Returns the cookies associated with a particular host/port # If no hostname is specified, returns all cookies getCookies <- function(hostname, port=NULL){ if (missing(hostname)){ hosts <- ls(envir=.cookieStore) cookies <- lapply(hosts, function(h){ getCookiesHostname(h) }) do.call("rbind", cookies) } else { host <- getCookieHost(list(host=hostname, port=port)) getCookiesHostname(host) } } # Get cookies for a particular hostname(:port) getCookiesHostname <- function(host){ if (!exists(host, .cookieStore)){ NULL } else { cookies <- get(host, envir=.cookieStore) cookies$host <- host cookies } } # Clears the cookies associated with a particular hostname/port combination. # If hostname and port are omitted, clears all the cookies clearCookies <- function(hostname, port=NULL){ if (missing(hostname)){ rm(list=ls(envir=.cookieStore), envir=.cookieStore) } else { host <- getCookieHost(list(host=hostname, port=port)) rm(list=host, envir=.cookieStore) } } # Parse out the raw headers provided and insert them into the cookieStore # NOTE: Domain attribute is currently ignored # @param requestURL the parsed URL as returned from `parseHttpUrl` # @param cookieHeaders a list of characters strings representing the raw # Set-Cookie header value with the "Set-Cookie: " prefix omitted storeCookies <- function(requestURL, cookieHeaders){ cookies <- lapply(cookieHeaders, function(co){ parseCookie(requestURL, co) }) # Filter out invalid cookies (which would return as NULL) cookies <- Filter(Negate(is.null), cookies) host <- getCookieHost(requestURL) hostCookies <- NULL if (!exists(host, .cookieStore)){ # Create a new data frame for this host hostCookies <- data.frame( path=character(0), name=character(0), value=character(0), secure=logical(0), expires=character(0), stringsAsFactors = FALSE ) } else { hostCookies <- get(host, envir=.cookieStore) } lapply(cookies, function(co){ # Remove any duplicates # RFC says duplicate cookies are ones that have the same domain, name, and path hostCookies <<- hostCookies[!(co$name == hostCookies$name & co$path == hostCookies$path),] # append this new cookie on hostCookies <<- rbind(as.data.frame(co, stringsAsFactors=FALSE), hostCookies) }) # Save this host's cookies into the cookies store. assign(host, hostCookies, envir=.cookieStore) } # Parse out an individual cookie # @param requestURL the parsed URL as returned from `parseHttpUrl` # @param cookieHeader the raw text contents of the Set-Cookie header with the # header name omitted. parseCookie <- function(requestURL, cookieHeader){ keyval <- regmatches(cookieHeader, regexec( # https://curl.haxx.se/rfc/cookie_spec.html # "characters excluding semi-colon, comma and white space" # white space is not excluded from values so we can capture `expires` "^([^;=, ]+)\\s*=\\s*([^;,]*)(;|$)", cookieHeader, ignore.case=TRUE))[[1]] if (length(keyval) == 0){ # Invalid cookie format. warning("Unable to parse set-cookie header: ", cookieHeader) return(NULL) } key <- keyval[2] val <- keyval[3] # Path path <- regmatches(cookieHeader, regexec( "^.*\\sPath\\s*=\\s*([^;]+)(;|$).*$", cookieHeader, ignore.case=TRUE))[[1]] if (length(path) == 0){ path <- "/" } else { path <- path[2] } if (!substring(requestURL$path, 1, nchar(path)) == path){ # Per the RFC, the cookie's path must be a prefix of the request URL warning("Invalid path set for cookie on request for '", requestURL$path, "': ", cookieHeader) return(NULL) } # MaxAge maxage <- regmatches(cookieHeader, regexec( "^.*\\sMax-Age\\s*=\\s*(-?\\d+)(;|$).*$", cookieHeader, ignore.case=TRUE))[[1]] # If no maxage specified, then this is a session cookie, which means that # (since our cookies only survive for a single session anyways...) we should # keep this cookie around as long as we're alive. expires <- Sys.time() + 10^10 if (length(maxage) > 0){ # Compute time maxage seconds from now expires <- Sys.time() + as.numeric(maxage[2]) } # Secure secure <- grepl(";\\s+Secure(;|$)", cookieHeader, ignore.case=TRUE) list(name=key, value=val, expires=expires, path=path, secure=secure) } # Appends a cookie header from the .cookieStore to the existing set of headers # @param requestURL the parsed URL as returned from `parseHttpUrl` # @param headers a named character vector containing the set of headers to be extended appendCookieHeaders <- function(requestURL, headers){ host <- getCookieHost(requestURL) if (!exists(host, .cookieStore)){ # Nothing to do return(headers) } cookies <- get(host, envir=.cookieStore) # If any cookies are expired, remove them from the cookie store if (any(cookies$expires < as.integer(Sys.time()))){ cookies <- cookies[cookies$expires >= as.integer(Sys.time()),] # Update the store, removing the expired cookies assign(host, cookies, envir=.cookieStore) } if (nrow(cookies) == 0){ # Short-circuit, return unmodified headers. return(headers) } # Filter to only include cookies that match the path prefix cookies <- cookies[substring(requestURL$path, 1, nchar(cookies$path)) == cookies$path,] # If insecure channel, filter out secure cookies if(tolower(requestURL$protocol) != "https"){ cookies <- cookies[!cookies$secure,] } # TODO: Technically per the RFC we're supposed to order these cookies by which # paths most specifically match the request. cookieHeader <- paste(apply(cookies, 1, function(x){ paste0(x["name"], "=", x["value"]) }), collapse="; ") if (nrow(cookies) > 0){ return(c(headers, cookie=cookieHeader)) } else { # Return unmodified headers return(headers) } } getCookieHost <- function(requestURL){ host <- requestURL$host port <- requestURL$port if (!is.null(port) && nchar(port) > 0){ port <- sub("^:", "", port) # By my reading of the RFC, we technically only need to include the port # # in the index if the host is an IP address. But here we're including the # port number as a part of the host whether using a domain name or IP. # Erring on the side of not sending the cookies to the wrong services host <- paste(host, port, sep=":") } host } rsconnect/R/restartApp.R0000644000175000017500000000215013362372172015057 0ustar nileshnilesh#' Restart an Application #' #' Restart an application currently running on a remote server. #' #' @param appName Name of application to restart #' @param account Account name. If a single account is registered on the system #' then this parameter can be omitted. #' @param server Server name. Required only if you use the same account name on #' multiple servers (see [servers()]) #' @param quiet Request that no status information be printed to the console #' during the operation. #' @examples #' \dontrun{ #' #' # restart an application #' restartApp("myapp") #' } #' @seealso [applications()], [deployApp()], and #' [terminateApp()] #' @note This function works only for ShinyApps servers. #' @export restartApp <- function(appName, account = NULL, server = NULL, quiet = FALSE) { # define deploy task taskDef <- list() taskDef$beginStatus <- "Restarting application" taskDef$endStatus <- "Application successfully restarted" taskDef$action <- function(client, application) { client$deployApplication(application$id) } # perform it applicationTask(taskDef, appName, account, server, quiet) } rsconnect/R/auth.R0000644000175000017500000002131713742375125013704 0ustar nileshnileshcleanupPasswordFile <- function(appDir) { # normalize appDir path and ensure it exists appDir <- normalizePath(appDir, mustWork = FALSE) if (!file.exists(appDir) || !file.info(appDir)$isdir) stop(appDir, " is not a valid directory", call. = FALSE) # get data dir from appDir dataDir <- file.path(appDir, "shinyapps") # get password file passwordFile <- file.path(dataDir, paste("passwords", ".txt", sep="")) # check if password file exists if (file.exists(passwordFile)) { message("WARNING: Password file found! This application is configured to use scrypt ", "authentication, which is no longer supported.\nIf you choose to proceed, ", "all existing users of this application will be removed, ", "and will NOT be recoverable.\nFor for more information please visit: ", "http://shiny.rstudio.com/articles/migration.html") response <- readline("Do you want to proceed? [Y/n]: ") if (tolower(substring(response, 1, 1)) != "y") { stop("Cancelled", call. = FALSE) } else { # remove old password file file.remove(passwordFile) } } invisible(TRUE) } #' Add authorized user to application #' #' @param email Email address of user to add. #' @param appDir Directory containing application. Defaults to #' current working directory. #' @param appName Name of application. #' @param account Account name. If a single account is registered on the #' system then this parameter can be omitted. #' @param server Server name. Required only if you use the same account name on #' multiple servers. #' @param sendEmail Send an email letting the user know the application #' has been shared with them. #' @param emailMessage Optional character vector of length 1 containing a #' custom message to send in email invitation. Defaults to NULL, which #' will use default invitation message. #' @seealso [removeAuthorizedUser()] and [showUsers()] #' @note This function works only for ShinyApps servers. #' @export addAuthorizedUser <- function(email, appDir=getwd(), appName=NULL, account = NULL, server=NULL, sendEmail=NULL, emailMessage = NULL) { # resolve account accountDetails <- accountInfo(resolveAccount(account, server), server) # resolve application if (is.null(appName)) appName = basename(appDir) application <- resolveApplication(accountDetails, appName) # check for and remove password file cleanupPasswordFile(appDir) # fetch authoriztion list api <- clientForAccount(accountDetails) api$inviteApplicationUser(application$id, validateEmail(email), sendEmail, emailMessage) message(paste("Added:", email, "to application", sep=" ")) invisible(TRUE) } #' Remove authorized user from an application #' #' @param user The user to remove. Can be id or email address. #' @param appDir Directory containing application. Defaults to #' current working directory. #' @param appName Name of application. #' @param account Account name. If a single account is registered on the #' system then this parameter can be omitted. #' @param server Server name. Required only if you use the same account name on #' multiple servers. #' @seealso [addAuthorizedUser()] and [showUsers()] #' @note This function works only for ShinyApps servers. #' @export removeAuthorizedUser <- function(user, appDir=getwd(), appName=NULL, account = NULL, server=NULL) { # resolve account accountDetails <- accountInfo(resolveAccount(account, server), server) # resolve application if (is.null(appName)) appName = basename(appDir) application <- resolveApplication(accountDetails, appName) # check and remove password file cleanupPasswordFile(appDir) # get users users <- showUsers(appDir, appName, account, server) if (is.numeric(user)) { # lookup by id if (user %in% users$id) { user = users[users$id==user, ] } else { stop("User ", user, " not found", call. = FALSE) } } else { # lookup by email if (user %in% users$email) { user = users[users$email==user, ] } else { stop("User \"", user, "\" not found", call. = FALSE) } } # remove user api <- clientForAccount(accountDetails) api$removeApplicationUser(application$id, user$id) message(paste("Removed:", user$email, "from application", sep=" ")) invisible(TRUE) } #' List authorized users for an application #' #' @param appDir Directory containing application. Defaults to #' current working directory. #' @param appName Name of application. #' @param account Account name. If a single account is registered on the #' system then this parameter can be omitted. #' @param server Server name. Required only if you use the same account name on #' multiple servers. #' @seealso [addAuthorizedUser()] and [showInvited()] #' @note This function works only for ShinyApps servers. #' @export showUsers <- function(appDir=getwd(), appName=NULL, account = NULL, server=NULL) { # resolve account accountDetails <- accountInfo(resolveAccount(account, server), server) if (!isShinyapps(accountDetails$server)) { stop("This method only works for ShinyApps servers.") } # resolve application if (is.null(appName)) appName = basename(appDir) application <- resolveApplication(accountDetails, appName) # fetch authoriztion list api <- clientForAccount(accountDetails) res <- api$listApplicationAuthorization(application$id) # get interesting fields users <- lapply(res, function(x) { a = list() a$id = x$user$id a$email = x$user$email if (!is.null(x$account)) { a$account <- x$account } else { a$account <- NA } return(a) }) # convert to data frame users <- do.call(rbind, users) df <- as.data.frame(users, stringsAsFactors = FALSE) return(df) } #' List invited users for an application #' #' @param appDir Directory containing application. Defaults to #' current working directory. #' @param appName Name of application. #' @param account Account name. If a single account is registered on the #' system then this parameter can be omitted. #' @param server Server name. Required only if you use the same account name on #' multiple servers. #' @seealso [addAuthorizedUser()] and [showUsers()] #' @note This function works only for ShinyApps servers. #' @export showInvited <- function(appDir=getwd(), appName=NULL, account = NULL, server=NULL) { # resolve account accountDetails <- accountInfo(resolveAccount(account, server), server) # resolve application if (is.null(appName)) appName = basename(appDir) application <- resolveApplication(accountDetails, appName) # fetch invitation list api <- clientForAccount(accountDetails) res <- api$listApplicationInvitations(application$id) # get intersting fields users <- lapply(res, function(x) { a = list() a$id = x$id a$email = x$email a$link = x$link return(a) }) # convert to data frame users <- do.call(rbind, users) df <- as.data.frame(users, stringsAsFactors = FALSE) return(df) } #' (Deprecated) List authorized users for an application #' #' @param appDir Directory containing application. Defaults to current working #' directory. #' @export authorizedUsers <- function(appDir = getwd()) { .Deprecated("showUsers") # read password file path <- getPasswordFile(appDir) if (file.exists(path)) { passwords <- readPasswordFile(path) } else { passwords <- NULL } return(passwords) } validateEmail <- function(email) { if (is.null(email) || !grepl(".+\\@.+\\..+", email)) { stop("Invalid email address.", call. = FALSE) } invisible(email) } getPasswordFile <- function(appDir) { if (!isStringParam(appDir)) stop(stringParamErrorMessage("appDir")) # normalize appDir path and ensure it exists appDir <- normalizePath(appDir, mustWork = FALSE) if (!file.exists(appDir) || !file.info(appDir)$isdir) stop(appDir, " is not a valid directory", call. = FALSE) file.path(appDir, "shinyapps", "passwords.txt") } readPasswordFile <- function(path) { # open and read file lines <- readLines(path) # extract fields fields <- do.call(rbind, strsplit(lines, ":")) users <- fields[,1] hashes <- fields[,2] # convert to data frame df <- data.frame(user=users, hash=hashes, stringsAsFactors=FALSE) # return data frame return(df) } writePasswordFile <- function(path, passwords) { # open and file f = file(path, open="w") on.exit(close(f), add = TRUE) # write passwords apply(passwords, 1, function(r) { l <- paste(r[1], ":", r[2], "\n", sep="") cat(l, file=f, sep="") }) message("Password file updated. You must deploy your application for these changes to take effect.") } rsconnect/inst/0000755000175000017500000000000013424127505013362 5ustar nileshnileshrsconnect/inst/cert/0000755000175000017500000000000013236716400014316 5ustar nileshnileshrsconnect/inst/cert/cacert.pem0000644000175000017500000071503513236716400016275 0ustar nileshnilesh## ## Bundle of CA Root Certificates ## ## Certificate data from Mozilla as of: Wed Sep 20 03:12:05 2017 GMT ## ## This is a bundle of X.509 certificates of public Certificate Authorities ## (CA). These were automatically extracted from Mozilla's root certificates ## file (certdata.txt). This file can be found in the mozilla source tree: ## https://hg.mozilla.org/releases/mozilla-release/raw-file/default/security/nss/lib/ckfw/builtins/certdata.txt ## ## It contains the certificates in PEM format and therefore ## can be directly used with curl / libcurl / php_curl, or with ## an Apache+mod_ssl webserver for SSL client authentication. ## Just configure this file as the SSLCACertificateFile. ## ## Conversion done with mk-ca-bundle.pl version 1.27. ## SHA256: 2b2dbe5244e0047e088c597998883a913f6c5fffd1cb5c0fe5a368c8466cb2ec ## GlobalSign Root CA ================== -----BEGIN CERTIFICATE----- MIIDdTCCAl2gAwIBAgILBAAAAAABFUtaw5QwDQYJKoZIhvcNAQEFBQAwVzELMAkGA1UEBhMCQkUx GTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExEDAOBgNVBAsTB1Jvb3QgQ0ExGzAZBgNVBAMTEkds b2JhbFNpZ24gUm9vdCBDQTAeFw05ODA5MDExMjAwMDBaFw0yODAxMjgxMjAwMDBaMFcxCzAJBgNV BAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYD VQQDExJHbG9iYWxTaWduIFJvb3QgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDa DuaZjc6j40+Kfvvxi4Mla+pIH/EqsLmVEQS98GPR4mdmzxzdzxtIK+6NiY6arymAZavpxy0Sy6sc THAHoT0KMM0VjU/43dSMUBUc71DuxC73/OlS8pF94G3VNTCOXkNz8kHp1Wrjsok6Vjk4bwY8iGlb Kk3Fp1S4bInMm/k8yuX9ifUSPJJ4ltbcdG6TRGHRjcdGsnUOhugZitVtbNV4FpWi6cgKOOvyJBNP c1STE4U6G7weNLWLBYy5d4ux2x8gkasJU26Qzns3dLlwR5EiUWMWea6xrkEmCMgZK9FGqkjWZCrX gzT/LCrBbBlDSgeF59N89iFo7+ryUp9/k5DPAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNV HRMBAf8EBTADAQH/MB0GA1UdDgQWBBRge2YaRQ2XyolQL30EzTSo//z9SzANBgkqhkiG9w0BAQUF AAOCAQEA1nPnfE920I2/7LqivjTFKDK1fPxsnCwrvQmeU79rXqoRSLblCKOzyj1hTdNGCbM+w6Dj Y1Ub8rrvrTnhQ7k4o+YviiY776BQVvnGCv04zcQLcFGUl5gE38NflNUVyRRBnMRddWQVDf9VMOyG j/8N7yy5Y0b2qvzfvGn9LhJIZJrglfCm7ymPAbEVtQwdpf5pLGkkeB6zpxxxYu7KyJesF12KwvhH hm4qxFYxldBniYUr+WymXUadDKqC5JlR3XC321Y9YeRq4VzW9v493kHMB65jUr9TU/Qr6cf9tveC X4XSQRjbgbMEHMUfpIBvFSDJ3gyICh3WZlXi/EjJKSZp4A== -----END CERTIFICATE----- GlobalSign Root CA - R2 ======================= -----BEGIN CERTIFICATE----- MIIDujCCAqKgAwIBAgILBAAAAAABD4Ym5g0wDQYJKoZIhvcNAQEFBQAwTDEgMB4GA1UECxMXR2xv YmFsU2lnbiBSb290IENBIC0gUjIxEzARBgNVBAoTCkdsb2JhbFNpZ24xEzARBgNVBAMTCkdsb2Jh bFNpZ24wHhcNMDYxMjE1MDgwMDAwWhcNMjExMjE1MDgwMDAwWjBMMSAwHgYDVQQLExdHbG9iYWxT aWduIFJvb3QgQ0EgLSBSMjETMBEGA1UEChMKR2xvYmFsU2lnbjETMBEGA1UEAxMKR2xvYmFsU2ln bjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKbPJA6+Lm8omUVCxKs+IVSbC9N/hHD6 ErPLv4dfxn+G07IwXNb9rfF73OX4YJYJkhD10FPe+3t+c4isUoh7SqbKSaZeqKeMWhG8eoLrvozp s6yWJQeXSpkqBy+0Hne/ig+1AnwblrjFuTosvNYSuetZfeLQBoZfXklqtTleiDTsvHgMCJiEbKjN S7SgfQx5TfC4LcshytVsW33hoCmEofnTlEnLJGKRILzdC9XZzPnqJworc5HGnRusyMvo4KD0L5CL TfuwNhv2GXqF4G3yYROIXJ/gkwpRl4pazq+r1feqCapgvdzZX99yqWATXgAByUr6P6TqBwMhAo6C ygPCm48CAwEAAaOBnDCBmTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4E FgQUm+IHV2ccHsBqBt5ZtJot39wZhi4wNgYDVR0fBC8wLTAroCmgJ4YlaHR0cDovL2NybC5nbG9i YWxzaWduLm5ldC9yb290LXIyLmNybDAfBgNVHSMEGDAWgBSb4gdXZxwewGoG3lm0mi3f3BmGLjAN BgkqhkiG9w0BAQUFAAOCAQEAmYFThxxol4aR7OBKuEQLq4GsJ0/WwbgcQ3izDJr86iw8bmEbTUsp 9Z8FHSbBuOmDAGJFtqkIk7mpM0sYmsL4h4hO291xNBrBVNpGP+DTKqttVCL1OmLNIG+6KYnX3ZHu 01yiPqFbQfXf5WRDLenVOavSot+3i9DAgBkcRcAtjOj4LaR0VknFBbVPFd5uRHg5h6h+u/N5GJG7 9G+dwfCMNYxdAfvDbbnvRG15RjF+Cv6pgsH/76tuIMRQyV+dTZsXjAzlAcmgQWpzU/qlULRuJQ/7 TBj0/VLZjmmx6BEP3ojY+x1J96relc8geMJgEtslQIxq/H5COEBkEveegeGTLg== -----END CERTIFICATE----- Verisign Class 3 Public Primary Certification Authority - G3 ============================================================ -----BEGIN CERTIFICATE----- MIIEGjCCAwICEQCbfgZJoz5iudXukEhxKe9XMA0GCSqGSIb3DQEBBQUAMIHKMQswCQYDVQQGEwJV UzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdv cmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNl IG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNh dGlvbiBBdXRob3JpdHkgLSBHMzAeFw05OTEwMDEwMDAwMDBaFw0zNjA3MTYyMzU5NTlaMIHKMQsw CQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRy dXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhv cml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkg Q2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMzCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC ggEBAMu6nFL8eB8aHm8bN3O9+MlrlBIwT/A2R/XQkQr1F8ilYcEWQE37imGQ5XYgwREGfassbqb1 EUGO+i2tKmFZpGcmTNDovFJbcCAEWNF6yaRpvIMXZK0Fi7zQWM6NjPXr8EJJC52XJ2cybuGukxUc cLwgTS8Y3pKI6GyFVxEa6X7jJhFUokWWVYPKMIno3Nij7SqAP395ZVc+FSBmCC+Vk7+qRy+oRpfw EuL+wgorUeZ25rdGt+INpsyow0xZVYnm6FNcHOqd8GIWC6fJXwzw3sJ2zq/3avL6QaaiMxTJ5Xpj 055iN9WFZZ4O5lMkdBteHRJTW8cs54NJOxWuimi5V5cCAwEAATANBgkqhkiG9w0BAQUFAAOCAQEA ERSWwauSCPc/L8my/uRan2Te2yFPhpk0djZX3dAVL8WtfxUfN2JzPtTnX84XA9s1+ivbrmAJXx5f j267Cz3qWhMeDGBvtcC1IyIuBwvLqXTLR7sdwdela8wv0kL9Sd2nic9TutoAWii/gt/4uhMdUIaC /Y4wjylGsB49Ndo4YhYYSq3mtlFs3q9i6wHQHiT+eo8SGhJouPtmmRQURVyu565pF4ErWjfJXir0 xuKhXFSbplQAz/DxwceYMBo7Nhbbo27q/a2ywtrvAkcTisDxszGtTxzhT5yvDwyd93gN2PQ1VoDa t20Xj50egWTh/sVFuq1ruQp6Tk9LhO5L8X3dEQ== -----END CERTIFICATE----- Entrust.net Premium 2048 Secure Server CA ========================================= -----BEGIN CERTIFICATE----- MIIEKjCCAxKgAwIBAgIEOGPe+DANBgkqhkiG9w0BAQUFADCBtDEUMBIGA1UEChMLRW50cnVzdC5u ZXQxQDA+BgNVBAsUN3d3dy5lbnRydXN0Lm5ldC9DUFNfMjA0OCBpbmNvcnAuIGJ5IHJlZi4gKGxp bWl0cyBsaWFiLikxJTAjBgNVBAsTHChjKSAxOTk5IEVudHJ1c3QubmV0IExpbWl0ZWQxMzAxBgNV BAMTKkVudHJ1c3QubmV0IENlcnRpZmljYXRpb24gQXV0aG9yaXR5ICgyMDQ4KTAeFw05OTEyMjQx NzUwNTFaFw0yOTA3MjQxNDE1MTJaMIG0MRQwEgYDVQQKEwtFbnRydXN0Lm5ldDFAMD4GA1UECxQ3 d3d3LmVudHJ1c3QubmV0L0NQU18yMDQ4IGluY29ycC4gYnkgcmVmLiAobGltaXRzIGxpYWIuKTEl MCMGA1UECxMcKGMpIDE5OTkgRW50cnVzdC5uZXQgTGltaXRlZDEzMDEGA1UEAxMqRW50cnVzdC5u ZXQgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgKDIwNDgpMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A MIIBCgKCAQEArU1LqRKGsuqjIAcVFmQqK0vRvwtKTY7tgHalZ7d4QMBzQshowNtTK91euHaYNZOL Gp18EzoOH1u3Hs/lJBQesYGpjX24zGtLA/ECDNyrpUAkAH90lKGdCCmziAv1h3edVc3kw37XamSr hRSGlVuXMlBvPci6Zgzj/L24ScF2iUkZ/cCovYmjZy/Gn7xxGWC4LeksyZB2ZnuU4q941mVTXTzW nLLPKQP5L6RQstRIzgUyVYr9smRMDuSYB3Xbf9+5CFVghTAp+XtIpGmG4zU/HoZdenoVve8AjhUi VBcAkCaTvA5JaJG/+EfTnZVCwQ5N328mz8MYIWJmQ3DW1cAH4QIDAQABo0IwQDAOBgNVHQ8BAf8E BAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUVeSB0RGAvtiJuQijMfmhJAkWuXAwDQYJ KoZIhvcNAQEFBQADggEBADubj1abMOdTmXx6eadNl9cZlZD7Bh/KM3xGY4+WZiT6QBshJ8rmcnPy T/4xmf3IDExoU8aAghOY+rat2l098c5u9hURlIIM7j+VrxGrD9cv3h8Dj1csHsm7mhpElesYT6Yf zX1XEC+bBAlahLVu2B064dae0Wx5XnkcFMXj0EyTO2U87d89vqbllRrDtRnDvV5bu/8j72gZyxKT J1wDLW8w0B62GqzeWvfRqqgnpv55gcR5mTNXuhKwqeBCbJPKVt7+bYQLCIt+jerXmCHG8+c8eS9e nNFMFY3h7CI3zJpDC5fcgJCNs2ebb0gIFVbPv/ErfF6adulZkMV8gzURZVE= -----END CERTIFICATE----- Baltimore CyberTrust Root ========================= -----BEGIN CERTIFICATE----- MIIDdzCCAl+gAwIBAgIEAgAAuTANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJJRTESMBAGA1UE ChMJQmFsdGltb3JlMRMwEQYDVQQLEwpDeWJlclRydXN0MSIwIAYDVQQDExlCYWx0aW1vcmUgQ3li ZXJUcnVzdCBSb290MB4XDTAwMDUxMjE4NDYwMFoXDTI1MDUxMjIzNTkwMFowWjELMAkGA1UEBhMC SUUxEjAQBgNVBAoTCUJhbHRpbW9yZTETMBEGA1UECxMKQ3liZXJUcnVzdDEiMCAGA1UEAxMZQmFs dGltb3JlIEN5YmVyVHJ1c3QgUm9vdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKME uyKrmD1X6CZymrV51Cni4eiVgLGw41uOKymaZN+hXe2wCQVt2yguzmKiYv60iNoS6zjrIZ3AQSsB UnuId9Mcj8e6uYi1agnnc+gRQKfRzMpijS3ljwumUNKoUMMo6vWrJYeKmpYcqWe4PwzV9/lSEy/C G9VwcPCPwBLKBsua4dnKM3p31vjsufFoREJIE9LAwqSuXmD+tqYF/LTdB1kC1FkYmGP1pWPgkAx9 XbIGevOF6uvUA65ehD5f/xXtabz5OTZydc93Uk3zyZAsuT3lySNTPx8kmCFcB5kpvcY67Oduhjpr l3RjM71oGDHweI12v/yejl0qhqdNkNwnGjkCAwEAAaNFMEMwHQYDVR0OBBYEFOWdWTCCR1jMrPoI VDaGezq1BE3wMBIGA1UdEwEB/wQIMAYBAf8CAQMwDgYDVR0PAQH/BAQDAgEGMA0GCSqGSIb3DQEB BQUAA4IBAQCFDF2O5G9RaEIFoN27TyclhAO992T9Ldcw46QQF+vaKSm2eT929hkTI7gQCvlYpNRh cL0EYWoSihfVCr3FvDB81ukMJY2GQE/szKN+OMY3EU/t3WgxjkzSswF07r51XgdIGn9w/xZchMB5 hbgF/X++ZRGjD8ACtPhSNzkE1akxehi/oCr0Epn3o0WC4zxe9Z2etciefC7IpJ5OCBRLbf1wbWsa Y71k5h+3zvDyny67G7fyUIhzksLi4xaNmjICq44Y3ekQEe5+NauQrz4wlHrQMz2nZQ/1/I6eYs9H RCwBXbsdtTLSR9I4LtD+gdwyah617jzV/OeBHRnDJELqYzmp -----END CERTIFICATE----- AddTrust External Root ====================== -----BEGIN CERTIFICATE----- MIIENjCCAx6gAwIBAgIBATANBgkqhkiG9w0BAQUFADBvMQswCQYDVQQGEwJTRTEUMBIGA1UEChML QWRkVHJ1c3QgQUIxJjAkBgNVBAsTHUFkZFRydXN0IEV4dGVybmFsIFRUUCBOZXR3b3JrMSIwIAYD VQQDExlBZGRUcnVzdCBFeHRlcm5hbCBDQSBSb290MB4XDTAwMDUzMDEwNDgzOFoXDTIwMDUzMDEw NDgzOFowbzELMAkGA1UEBhMCU0UxFDASBgNVBAoTC0FkZFRydXN0IEFCMSYwJAYDVQQLEx1BZGRU cnVzdCBFeHRlcm5hbCBUVFAgTmV0d29yazEiMCAGA1UEAxMZQWRkVHJ1c3QgRXh0ZXJuYWwgQ0Eg Um9vdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALf3GjPm8gAELTngTlvtH7xsD821 +iO2zt6bETOXpClMfZOfvUq8k+0DGuOPz+VtUFrWlymUWoCwSXrbLpX9uMq/NzgtHj6RQa1wVsfw Tz/oMp50ysiQVOnGXw94nZpAPA6sYapeFI+eh6FqUNzXmk6vBbOmcZSccbNQYArHE504B4YCqOmo aSYYkKtMsE8jqzpPhNjfzp/haW+710LXa0Tkx63ubUFfclpxCDezeWWkWaCUN/cALw3CknLa0Dhy 2xSoRcRdKn23tNbE7qzNE0S3ySvdQwAl+mG5aWpYIxG3pzOPVnVZ9c0p10a3CitlttNCbxWyuHv7 7+ldU9U0WicCAwEAAaOB3DCB2TAdBgNVHQ4EFgQUrb2YejS0Jvf6xCZU7wO94CTLVBowCwYDVR0P BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wgZkGA1UdIwSBkTCBjoAUrb2YejS0Jvf6xCZU7wO94CTL VBqhc6RxMG8xCzAJBgNVBAYTAlNFMRQwEgYDVQQKEwtBZGRUcnVzdCBBQjEmMCQGA1UECxMdQWRk VHJ1c3QgRXh0ZXJuYWwgVFRQIE5ldHdvcmsxIjAgBgNVBAMTGUFkZFRydXN0IEV4dGVybmFsIENB IFJvb3SCAQEwDQYJKoZIhvcNAQEFBQADggEBALCb4IUlwtYj4g+WBpKdQZic2YR5gdkeWxQHIzZl j7DYd7usQWxHYINRsPkyPef89iYTx4AWpb9a/IfPeHmJIZriTAcKhjW88t5RxNKWt9x+Tu5w/Rw5 6wwCURQtjr0W4MHfRnXnJK3s9EK0hZNwEGe6nQY1ShjTK3rMUUKhemPR5ruhxSvCNr4TDea9Y355 e6cJDUCrat2PisP29owaQgVR1EX1n6diIWgVIEM8med8vSTYqZEXc4g/VhsxOBi0cQ+azcgOno4u G+GMmIPLHzHxREzGBHNJdmAPx/i9F4BrLunMTA5amnkPIAou1Z5jJh5VkpTYghdae9C8x49OhgQ= -----END CERTIFICATE----- Entrust Root Certification Authority ==================================== -----BEGIN CERTIFICATE----- MIIEkTCCA3mgAwIBAgIERWtQVDANBgkqhkiG9w0BAQUFADCBsDELMAkGA1UEBhMCVVMxFjAUBgNV BAoTDUVudHJ1c3QsIEluYy4xOTA3BgNVBAsTMHd3dy5lbnRydXN0Lm5ldC9DUFMgaXMgaW5jb3Jw b3JhdGVkIGJ5IHJlZmVyZW5jZTEfMB0GA1UECxMWKGMpIDIwMDYgRW50cnVzdCwgSW5jLjEtMCsG A1UEAxMkRW50cnVzdCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MB4XDTA2MTEyNzIwMjM0 MloXDTI2MTEyNzIwNTM0MlowgbAxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMu MTkwNwYDVQQLEzB3d3cuZW50cnVzdC5uZXQvQ1BTIGlzIGluY29ycG9yYXRlZCBieSByZWZlcmVu Y2UxHzAdBgNVBAsTFihjKSAyMDA2IEVudHJ1c3QsIEluYy4xLTArBgNVBAMTJEVudHJ1c3QgUm9v dCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB ALaVtkNC+sZtKm9I35RMOVcF7sN5EUFoNu3s/poBj6E4KPz3EEZmLk0eGrEaTsbRwJWIsMn/MYsz A9u3g3s+IIRe7bJWKKf44LlAcTfFy0cOlypowCKVYhXbR9n10Cv/gkvJrT7eTNuQgFA/CYqEAOww Cj0Yzfv9KlmaI5UXLEWeH25DeW0MXJj+SKfFI0dcXv1u5x609mhF0YaDW6KKjbHjKYD+JXGIrb68 j6xSlkuqUY3kEzEZ6E5Nn9uss2rVvDlUccp6en+Q3X0dgNmBu1kmwhH+5pPi94DkZfs0Nw4pgHBN rziGLp5/V6+eF67rHMsoIV+2HNjnogQi+dPa2MsCAwEAAaOBsDCBrTAOBgNVHQ8BAf8EBAMCAQYw DwYDVR0TAQH/BAUwAwEB/zArBgNVHRAEJDAigA8yMDA2MTEyNzIwMjM0MlqBDzIwMjYxMTI3MjA1 MzQyWjAfBgNVHSMEGDAWgBRokORnpKZTgMeGZqTx90tD+4S9bTAdBgNVHQ4EFgQUaJDkZ6SmU4DH hmak8fdLQ/uEvW0wHQYJKoZIhvZ9B0EABBAwDhsIVjcuMTo0LjADAgSQMA0GCSqGSIb3DQEBBQUA A4IBAQCT1DCw1wMgKtD5Y+iRDAUgqV8ZyntyTtSx29CW+1RaGSwMCPeyvIWonX9tO1KzKtvn1ISM Y/YPyyYBkVBs9F8U4pN0wBOeMDpQ47RgxRzwIkSNcUesyBrJ6ZuaAGAT/3B+XxFNSRuzFVJ7yVTa v52Vr2ua2J7p8eRDjeIRRDq/r72DQnNSi6q7pynP9WQcCk3RvKqsnyrQ/39/2n3qse0wJcGE2jTS W3iDVuycNsMm4hH2Z0kdkquM++v/eu6FSqdQgPCnXEqULl8FmTxSQeDNtGPPAUO6nIPcj2A781q0 tHuu2guQOHXvgR1m0vdXcDazv/wor3ElhVsT/h5/WrQ8 -----END CERTIFICATE----- GeoTrust Global CA ================== -----BEGIN CERTIFICATE----- MIIDVDCCAjygAwIBAgIDAjRWMA0GCSqGSIb3DQEBBQUAMEIxCzAJBgNVBAYTAlVTMRYwFAYDVQQK Ew1HZW9UcnVzdCBJbmMuMRswGQYDVQQDExJHZW9UcnVzdCBHbG9iYWwgQ0EwHhcNMDIwNTIxMDQw MDAwWhcNMjIwNTIxMDQwMDAwWjBCMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNR2VvVHJ1c3QgSW5j LjEbMBkGA1UEAxMSR2VvVHJ1c3QgR2xvYmFsIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB CgKCAQEA2swYYzD99BcjGlZ+W988bDjkcbd4kdS8odhM+KhDtgPpTSEHCIjaWC9mOSm9BXiLnTjo BbdqfnGk5sRgprDvgOSJKA+eJdbtg/OtppHHmMlCGDUUna2YRpIuT8rxh0PBFpVXLVDviS2Aelet 8u5fa9IAjbkU+BQVNdnARqN7csiRv8lVK83Qlz6cJmTM386DGXHKTubU1XupGc1V3sjs0l44U+Vc T4wt/lAjNvxm5suOpDkZALeVAjmRCw7+OC7RHQWa9k0+bw8HHa8sHo9gOeL6NlMTOdReJivbPagU vTLrGAMoUgRx5aszPeE4uwc2hGKceeoWMPRfwCvocWvk+QIDAQABo1MwUTAPBgNVHRMBAf8EBTAD AQH/MB0GA1UdDgQWBBTAephojYn7qwVkDBF9qn1luMrMTjAfBgNVHSMEGDAWgBTAephojYn7qwVk DBF9qn1luMrMTjANBgkqhkiG9w0BAQUFAAOCAQEANeMpauUvXVSOKVCUn5kaFOSPeCpilKInZ57Q zxpeR+nBsqTP3UEaBU6bS+5Kb1VSsyShNwrrZHYqLizz/Tt1kL/6cdjHPTfStQWVYrmm3ok9Nns4 d0iXrKYgjy6myQzCsplFAMfOEVEiIuCl6rYVSAlk6l5PdPcFPseKUgzbFbS9bZvlxrFUaKnjaZC2 mqUPuLk/IH2uSrW4nOQdtqvmlKXBx4Ot2/Unhw4EbNX/3aBd7YdStysVAq45pmp06drE57xNNB6p XE0zX5IJL4hmXXeXxx12E6nV5fEWCRE11azbJHFwLJhWC9kXtNHjUStedejV0NxPNO3CBWaAocvm Mw== -----END CERTIFICATE----- GeoTrust Universal CA ===================== -----BEGIN CERTIFICATE----- MIIFaDCCA1CgAwIBAgIBATANBgkqhkiG9w0BAQUFADBFMQswCQYDVQQGEwJVUzEWMBQGA1UEChMN R2VvVHJ1c3QgSW5jLjEeMBwGA1UEAxMVR2VvVHJ1c3QgVW5pdmVyc2FsIENBMB4XDTA0MDMwNDA1 MDAwMFoXDTI5MDMwNDA1MDAwMFowRTELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUdlb1RydXN0IElu Yy4xHjAcBgNVBAMTFUdlb1RydXN0IFVuaXZlcnNhbCBDQTCCAiIwDQYJKoZIhvcNAQEBBQADggIP ADCCAgoCggIBAKYVVaCjxuAfjJ0hUNfBvitbtaSeodlyWL0AG0y/YckUHUWCq8YdgNY96xCcOq9t JPi8cQGeBvV8Xx7BDlXKg5pZMK4ZyzBIle0iN430SppyZj6tlcDgFgDgEB8rMQ7XlFTTQjOgNB0e RXbdT8oYN+yFFXoZCPzVx5zw8qkuEKmS5j1YPakWaDwvdSEYfyh3peFhF7em6fgemdtzbvQKoiFs 7tqqhZJmr/Z6a4LauiIINQ/PQvE1+mrufislzDoR5G2vc7J2Ha3QsnhnGqQ5HFELZ1aD/ThdDc7d 8Lsrlh/eezJS/R27tQahsiFepdaVaH/wmZ7cRQg+59IJDTWU3YBOU5fXtQlEIGQWFwMCTFMNaN7V qnJNk22CDtucvc+081xdVHppCZbW2xHBjXWotM85yM48vCR85mLK4b19p71XZQvk/iXttmkQ3Cga Rr0BHdCXteGYO8A3ZNY9lO4L4fUorgtWv3GLIylBjobFS1J72HGrH4oVpjuDWtdYAVHGTEHZf9hB Z3KiKN9gg6meyHv8U3NyWfWTehd2Ds735VzZC1U0oqpbtWpU5xPKV+yXbfReBi9Fi1jUIxaS5BZu KGNZMN9QAZxjiRqf2xeUgnA3wySemkfWWspOqGmJch+RbNt+nhutxx9z3SxPGWX9f5NAEC7S8O08 ni4oPmkmM8V7AgMBAAGjYzBhMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFNq7LqqwDLiIJlF0 XG0D08DYj3rWMB8GA1UdIwQYMBaAFNq7LqqwDLiIJlF0XG0D08DYj3rWMA4GA1UdDwEB/wQEAwIB hjANBgkqhkiG9w0BAQUFAAOCAgEAMXjmx7XfuJRAyXHEqDXsRh3ChfMoWIawC/yOsjmPRFWrZIRc aanQmjg8+uUfNeVE44B5lGiku8SfPeE0zTBGi1QrlaXv9z+ZhP015s8xxtxqv6fXIwjhmF7DWgh2 qaavdy+3YL1ERmrvl/9zlcGO6JP7/TG37FcREUWbMPEaiDnBTzynANXH/KttgCJwpQzgXQQpAvvL oJHRfNbDflDVnVi+QTjruXU8FdmbyUqDWcDaU/0zuzYYm4UPFd3uLax2k7nZAY1IEKj79TiG8dsK xr2EoyNB3tZ3b4XUhRxQ4K5RirqNPnbiucon8l+f725ZDQbYKxek0nxru18UGkiPGkzns0ccjkxF KyDuSN/n3QmOGKjaQI2SJhFTYXNd673nxE0pN2HrrDktZy4W1vUAg4WhzH92xH3kt0tm7wNFYGm2 DFKWkoRepqO1pD4r2czYG0eq8kTaT/kD6PAUyz/zg97QwVTjt+gKN02LIFkDMBmhLMi9ER/frslK xfMnZmaGrGiR/9nmUxwPi1xpZQomyB40w11Re9epnAahNt3ViZS82eQtDF4JbAiXfKM9fJP/P6EU p8+1Xevb2xzEdt+Iub1FBZUbrvxGakyvSOPOrg/SfuvmbJxPgWp6ZKy7PtXny3YuxadIwVyQD8vI P/rmMuGNG2+k5o7Y+SlIis5z/iw= -----END CERTIFICATE----- GeoTrust Universal CA 2 ======================= -----BEGIN CERTIFICATE----- MIIFbDCCA1SgAwIBAgIBATANBgkqhkiG9w0BAQUFADBHMQswCQYDVQQGEwJVUzEWMBQGA1UEChMN R2VvVHJ1c3QgSW5jLjEgMB4GA1UEAxMXR2VvVHJ1c3QgVW5pdmVyc2FsIENBIDIwHhcNMDQwMzA0 MDUwMDAwWhcNMjkwMzA0MDUwMDAwWjBHMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNR2VvVHJ1c3Qg SW5jLjEgMB4GA1UEAxMXR2VvVHJ1c3QgVW5pdmVyc2FsIENBIDIwggIiMA0GCSqGSIb3DQEBAQUA A4ICDwAwggIKAoICAQCzVFLByT7y2dyxUxpZKeexw0Uo5dfR7cXFS6GqdHtXr0om/Nj1XqduGdt0 DE81WzILAePb63p3NeqqWuDW6KFXlPCQo3RWlEQwAx5cTiuFJnSCegx2oG9NzkEtoBUGFF+3Qs17 j1hhNNwqCPkuwwGmIkQcTAeC5lvO0Ep8BNMZcyfwqph/Lq9O64ceJHdqXbboW0W63MOhBW9Wjo8Q JqVJwy7XQYci4E+GymC16qFjwAGXEHm9ADwSbSsVsaxLse4YuU6W3Nx2/zu+z18DwPw76L5GG//a QMJS9/7jOvdqdzXQ2o3rXhhqMcceujwbKNZrVMaqW9eiLBsZzKIC9ptZvTdrhrVtgrrY6slWvKk2 WP0+GfPtDCapkzj4T8FdIgbQl+rhrcZV4IErKIM6+vR7IVEAvlI4zs1meaj0gVbi0IMJR1FbUGrP 20gaXT73y/Zl92zxlfgCOzJWgjl6W70viRu/obTo/3+NjN8D8WBOWBFM66M/ECuDmgFz2ZRthAAn ZqzwcEAJQpKtT5MNYQlRJNiS1QuUYbKHsu3/mjX/hVTK7URDrBs8FmtISgocQIgfksILAAX/8sgC SqSqqcyZlpwvWOB94b67B9xfBHJcMTTD7F8t4D1kkCLm0ey4Lt1ZrtmhN79UNdxzMk+MBB4zsslG 8dhcyFVQyWi9qLo2CQIDAQABo2MwYTAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBR281Xh+qQ2 +/CfXGJx7Tz0RzgQKzAfBgNVHSMEGDAWgBR281Xh+qQ2+/CfXGJx7Tz0RzgQKzAOBgNVHQ8BAf8E BAMCAYYwDQYJKoZIhvcNAQEFBQADggIBAGbBxiPz2eAubl/oz66wsCVNK/g7WJtAJDday6sWSf+z dXkzoS9tcBc0kf5nfo/sm+VegqlVHy/c1FEHEv6sFj4sNcZj/NwQ6w2jqtB8zNHQL1EuxBRa3ugZ 4T7GzKQp5y6EqgYweHZUcyiYWTjgAA1i00J9IZ+uPTqM1fp3DRgrFg5fNuH8KrUwJM/gYwx7WBr+ mbpCErGR9Hxo4sjoryzqyX6uuyo9DRXcNJW2GHSoag/HtPQTxORb7QrSpJdMKu0vbBKJPfEncKpq A1Ihn0CoZ1Dy81of398j9tx4TuaYT1U6U+Pv8vSfx3zYWK8pIpe44L2RLrB27FcRz+8pRPPphXpg Y+RdM4kX2TGq2tbzGDVyz4crL2MjhF2EjD9XoIj8mZEoJmmZ1I+XRL6O1UixpCgp8RW04eWe3fiP pm8m1wk8OhwRDqZsN/etRIcsKMfYdIKz0G9KV7s1KSegi+ghp4dkNl3M2Basx7InQJJVOCiNUW7d FGdTbHFcJoRNdVq2fmBWqU2t+5sel/MN2dKXVHfaPRK34B7vCAas+YWH6aLcr34YEoP9VhdBLtUp gn2Z9DH2canPLAEnpQW5qrJITirvn5NSUZU8UnOOVkwXQMAJKOSLakhT2+zNVVXxxvjpoixMptEm X36vWkzaH6byHCx+rgIW0lbQL1dTR+iS -----END CERTIFICATE----- Visa eCommerce Root =================== -----BEGIN CERTIFICATE----- MIIDojCCAoqgAwIBAgIQE4Y1TR0/BvLB+WUF1ZAcYjANBgkqhkiG9w0BAQUFADBrMQswCQYDVQQG EwJVUzENMAsGA1UEChMEVklTQTEvMC0GA1UECxMmVmlzYSBJbnRlcm5hdGlvbmFsIFNlcnZpY2Ug QXNzb2NpYXRpb24xHDAaBgNVBAMTE1Zpc2EgZUNvbW1lcmNlIFJvb3QwHhcNMDIwNjI2MDIxODM2 WhcNMjIwNjI0MDAxNjEyWjBrMQswCQYDVQQGEwJVUzENMAsGA1UEChMEVklTQTEvMC0GA1UECxMm VmlzYSBJbnRlcm5hdGlvbmFsIFNlcnZpY2UgQXNzb2NpYXRpb24xHDAaBgNVBAMTE1Zpc2EgZUNv bW1lcmNlIFJvb3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCvV95WHm6h2mCxlCfL F9sHP4CFT8icttD0b0/Pmdjh28JIXDqsOTPHH2qLJj0rNfVIsZHBAk4ElpF7sDPwsRROEW+1QK8b RaVK7362rPKgH1g/EkZgPI2h4H3PVz4zHvtH8aoVlwdVZqW1LS7YgFmypw23RuwhY/81q6UCzyr0 TP579ZRdhE2o8mCP2w4lPJ9zcc+U30rq299yOIzzlr3xF7zSujtFWsan9sYXiwGd/BmoKoMWuDpI /k4+oKsGGelT84ATB+0tvz8KPFUgOSwsAGl0lUq8ILKpeeUYiZGo3BxN77t+Nwtd/jmliFKMAGzs GHxBvfaLdXe6YJ2E5/4tAgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEG MB0GA1UdDgQWBBQVOIMPPyw/cDMezUb+B4wg4NfDtzANBgkqhkiG9w0BAQUFAAOCAQEAX/FBfXxc CLkr4NWSR/pnXKUTwwMhmytMiUbPWU3J/qVAtmPN3XEolWcRzCSs00Rsca4BIGsDoo8Ytyk6feUW YFN4PMCvFYP3j1IzJL1kk5fui/fbGKhtcbP3LBfQdCVp9/5rPJS+TUtBjE7ic9DjkCJzQ83z7+pz zkWKsKZJ/0x9nXGIxHYdkFsd7v3M9+79YKWxehZx0RbQfBI8bGmX265fOZpwLwU8GUYEmSA20GBu YQa7FkKMcPcw++DbZqMAAb3mLNqRX6BGi01qnD093QVG/na/oAo85ADmJ7f/hC3euiInlhBx6yLt 398znM/jra6O1I7mT1GvFpLgXPYHDw== -----END CERTIFICATE----- Certum Root CA ============== -----BEGIN CERTIFICATE----- MIIDDDCCAfSgAwIBAgIDAQAgMA0GCSqGSIb3DQEBBQUAMD4xCzAJBgNVBAYTAlBMMRswGQYDVQQK ExJVbml6ZXRvIFNwLiB6IG8uby4xEjAQBgNVBAMTCUNlcnR1bSBDQTAeFw0wMjA2MTExMDQ2Mzla Fw0yNzA2MTExMDQ2MzlaMD4xCzAJBgNVBAYTAlBMMRswGQYDVQQKExJVbml6ZXRvIFNwLiB6IG8u by4xEjAQBgNVBAMTCUNlcnR1bSBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAM6x wS7TT3zNJc4YPk/EjG+AanPIW1H4m9LcuwBcsaD8dQPugfCI7iNS6eYVM42sLQnFdvkrOYCJ5JdL kKWoePhzQ3ukYbDYWMzhbGZ+nPMJXlVjhNWo7/OxLjBos8Q82KxujZlakE403Daaj4GIULdtlkIJ 89eVgw1BS7Bqa/j8D35in2fE7SZfECYPCE/wpFcozo+47UX2bu4lXapuOb7kky/ZR6By6/qmW6/K Uz/iDsaWVhFu9+lmqSbYf5VT7QqFiLpPKaVCjF62/IUgAKpoC6EahQGcxEZjgoi2IrHu/qpGWX7P NSzVttpd90gzFFS269lvzs2I1qsb2pY7HVkCAwEAAaMTMBEwDwYDVR0TAQH/BAUwAwEB/zANBgkq hkiG9w0BAQUFAAOCAQEAuI3O7+cUus/usESSbLQ5PqKEbq24IXfS1HeCh+YgQYHu4vgRt2PRFze+ GXYkHAQaTOs9qmdvLdTN/mUxcMUbpgIKumB7bVjCmkn+YzILa+M6wKyrO7Do0wlRjBCDxjTgxSvg GrZgFCdsMneMvLJymM/NzD+5yCRCFNZX/OYmQ6kd5YCQzgNUKD73P9P4Te1qCjqTE5s7FCMTY5w/ 0YcneeVMUeMBrYVdGjux1XMQpNPyvG5k9VpWkKjHDkx0Dy5xO/fIR/RpbxXyEV6DHpx8Uq79AtoS qFlnGNu8cN2bsWntgM6JQEhqDjXKKWYVIZQs6GAqm4VKQPNriiTsBhYscw== -----END CERTIFICATE----- Comodo AAA Services root ======================== -----BEGIN CERTIFICATE----- MIIEMjCCAxqgAwIBAgIBATANBgkqhkiG9w0BAQUFADB7MQswCQYDVQQGEwJHQjEbMBkGA1UECAwS R3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHDAdTYWxmb3JkMRowGAYDVQQKDBFDb21vZG8gQ0Eg TGltaXRlZDEhMB8GA1UEAwwYQUFBIENlcnRpZmljYXRlIFNlcnZpY2VzMB4XDTA0MDEwMTAwMDAw MFoXDTI4MTIzMTIzNTk1OVowezELMAkGA1UEBhMCR0IxGzAZBgNVBAgMEkdyZWF0ZXIgTWFuY2hl c3RlcjEQMA4GA1UEBwwHU2FsZm9yZDEaMBgGA1UECgwRQ29tb2RvIENBIExpbWl0ZWQxITAfBgNV BAMMGEFBQSBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC ggEBAL5AnfRu4ep2hxxNRUSOvkbIgwadwSr+GB+O5AL686tdUIoWMQuaBtDFcCLNSS1UY8y2bmhG C1Pqy0wkwLxyTurxFa70VJoSCsN6sjNg4tqJVfMiWPPe3M/vg4aijJRPn2jymJBGhCfHdr/jzDUs i14HZGWCwEiwqJH5YZ92IFCokcdmtet4YgNW8IoaE+oxox6gmf049vYnMlhvB/VruPsUK6+3qszW Y19zjNoFmag4qMsXeDZRrOme9Hg6jc8P2ULimAyrL58OAd7vn5lJ8S3frHRNG5i1R8XlKdH5kBjH Ypy+g8cmez6KJcfA3Z3mNWgQIJ2P2N7Sw4ScDV7oL8kCAwEAAaOBwDCBvTAdBgNVHQ4EFgQUoBEK Iz6W8Qfs4q8p74Klf9AwpLQwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wewYDVR0f BHQwcjA4oDagNIYyaHR0cDovL2NybC5jb21vZG9jYS5jb20vQUFBQ2VydGlmaWNhdGVTZXJ2aWNl cy5jcmwwNqA0oDKGMGh0dHA6Ly9jcmwuY29tb2RvLm5ldC9BQUFDZXJ0aWZpY2F0ZVNlcnZpY2Vz LmNybDANBgkqhkiG9w0BAQUFAAOCAQEACFb8AvCb6P+k+tZ7xkSAzk/ExfYAWMymtrwUSWgEdujm 7l3sAg9g1o1QGE8mTgHj5rCl7r+8dFRBv/38ErjHT1r0iWAFf2C3BUrz9vHCv8S5dIa2LX1rzNLz Rt0vxuBqw8M0Ayx9lt1awg6nCpnBBYurDC/zXDrPbDdVCYfeU0BsWO/8tqtlbgT2G9w84FoVxp7Z 8VlIMCFlA2zs6SFz7JsDoeA3raAVGI/6ugLOpyypEBMs1OUIJqsil2D4kF501KKaU73yqWjgom7C 12yxow+ev+to51byrvLjKzg6CYG1a4XXvi3tPxq3smPi9WIsgtRqAEFQ8TmDn5XpNpaYbg== -----END CERTIFICATE----- QuoVadis Root CA ================ -----BEGIN CERTIFICATE----- MIIF0DCCBLigAwIBAgIEOrZQizANBgkqhkiG9w0BAQUFADB/MQswCQYDVQQGEwJCTTEZMBcGA1UE ChMQUXVvVmFkaXMgTGltaXRlZDElMCMGA1UECxMcUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0 eTEuMCwGA1UEAxMlUXVvVmFkaXMgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0wMTAz MTkxODMzMzNaFw0yMTAzMTcxODMzMzNaMH8xCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRp cyBMaW1pdGVkMSUwIwYDVQQLExxSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MS4wLAYDVQQD EyVRdW9WYWRpcyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MIIBIjANBgkqhkiG9w0BAQEF AAOCAQ8AMIIBCgKCAQEAv2G1lVO6V/z68mcLOhrfEYBklbTRvM16z/Ypli4kVEAkOPcahdxYTMuk J0KX0J+DisPkBgNbAKVRHnAEdOLB1Dqr1607BxgFjv2DrOpm2RgbaIr1VxqYuvXtdj182d6UajtL F8HVj71lODqV0D1VNk7feVcxKh7YWWVJWCCYfqtffp/p1k3sg3Spx2zY7ilKhSoGFPlU5tPaZQeL YzcS19Dsw3sgQUSj7cugF+FxZc4dZjH3dgEZyH0DWLaVSR2mEiboxgx24ONmy+pdpibu5cxfvWen AScOospUxbF6lR1xHkopigPcakXBpBlebzbNw6Kwt/5cOOJSvPhEQ+aQuwIDAQABo4ICUjCCAk4w PQYIKwYBBQUHAQEEMTAvMC0GCCsGAQUFBzABhiFodHRwczovL29jc3AucXVvdmFkaXNvZmZzaG9y ZS5jb20wDwYDVR0TAQH/BAUwAwEB/zCCARoGA1UdIASCAREwggENMIIBCQYJKwYBBAG+WAABMIH7 MIHUBggrBgEFBQcCAjCBxxqBxFJlbGlhbmNlIG9uIHRoZSBRdW9WYWRpcyBSb290IENlcnRpZmlj YXRlIGJ5IGFueSBwYXJ0eSBhc3N1bWVzIGFjY2VwdGFuY2Ugb2YgdGhlIHRoZW4gYXBwbGljYWJs ZSBzdGFuZGFyZCB0ZXJtcyBhbmQgY29uZGl0aW9ucyBvZiB1c2UsIGNlcnRpZmljYXRpb24gcHJh Y3RpY2VzLCBhbmQgdGhlIFF1b1ZhZGlzIENlcnRpZmljYXRlIFBvbGljeS4wIgYIKwYBBQUHAgEW Fmh0dHA6Ly93d3cucXVvdmFkaXMuYm0wHQYDVR0OBBYEFItLbe3TKbkGGew5Oanwl4Rqy+/fMIGu BgNVHSMEgaYwgaOAFItLbe3TKbkGGew5Oanwl4Rqy+/foYGEpIGBMH8xCzAJBgNVBAYTAkJNMRkw FwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMSUwIwYDVQQLExxSb290IENlcnRpZmljYXRpb24gQXV0 aG9yaXR5MS4wLAYDVQQDEyVRdW9WYWRpcyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5ggQ6 tlCLMA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQUFAAOCAQEAitQUtf70mpKnGdSkfnIYj9lo fFIk3WdvOXrEql494liwTXCYhGHoG+NpGA7O+0dQoE7/8CQfvbLO9Sf87C9TqnN7Az10buYWnuul LsS/VidQK2K6vkscPFVcQR0kvoIgR13VRH56FmjffU1RcHhXHTMe/QKZnAzNCgVPx7uOpHX6Sm2x gI4JVrmcGmD+XcHXetwReNDWXcG31a0ymQM6isxUJTkxgXsTIlG6Rmyhu576BGxJJnSP0nPrzDCi 5upZIof4l/UO/erMkqQWxFIY6iHOsfHmhIHluqmGKPJDWl0Snawe2ajlCmqnf6CHKc/yiU3U7MXi 5nrQNiOKSnQ2+Q== -----END CERTIFICATE----- QuoVadis Root CA 2 ================== -----BEGIN CERTIFICATE----- MIIFtzCCA5+gAwIBAgICBQkwDQYJKoZIhvcNAQEFBQAwRTELMAkGA1UEBhMCQk0xGTAXBgNVBAoT EFF1b1ZhZGlzIExpbWl0ZWQxGzAZBgNVBAMTElF1b1ZhZGlzIFJvb3QgQ0EgMjAeFw0wNjExMjQx ODI3MDBaFw0zMTExMjQxODIzMzNaMEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBM aW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDIwggIiMA0GCSqGSIb3DQEBAQUAA4IC DwAwggIKAoICAQCaGMpLlA0ALa8DKYrwD4HIrkwZhR0In6spRIXzL4GtMh6QRr+jhiYaHv5+HBg6 XJxgFyo6dIMzMH1hVBHL7avg5tKifvVrbxi3Cgst/ek+7wrGsxDp3MJGF/hd/aTa/55JWpzmM+Yk lvc/ulsrHHo1wtZn/qtmUIttKGAr79dgw8eTvI02kfN/+NsRE8Scd3bBrrcCaoF6qUWD4gXmuVbB lDePSHFjIuwXZQeVikvfj8ZaCuWw419eaxGrDPmF60Tp+ARz8un+XJiM9XOva7R+zdRcAitMOeGy lZUtQofX1bOQQ7dsE/He3fbE+Ik/0XX1ksOR1YqI0JDs3G3eicJlcZaLDQP9nL9bFqyS2+r+eXyt 66/3FsvbzSUr5R/7mp/iUcw6UwxI5g69ybR2BlLmEROFcmMDBOAENisgGQLodKcftslWZvB1Jdxn wQ5hYIizPtGo/KPaHbDRsSNU30R2be1B2MGyIrZTHN81Hdyhdyox5C315eXbyOD/5YDXC2Og/zOh D7osFRXql7PSorW+8oyWHhqPHWykYTe5hnMz15eWniN9gqRMgeKh0bpnX5UHoycR7hYQe7xFSkyy BNKr79X9DFHOUGoIMfmR2gyPZFwDwzqLID9ujWc9Otb+fVuIyV77zGHcizN300QyNQliBJIWENie J0f7OyHj+OsdWwIDAQABo4GwMIGtMA8GA1UdEwEB/wQFMAMBAf8wCwYDVR0PBAQDAgEGMB0GA1Ud DgQWBBQahGK8SEwzJQTU7tD2A8QZRtGUazBuBgNVHSMEZzBlgBQahGK8SEwzJQTU7tD2A8QZRtGU a6FJpEcwRTELMAkGA1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxGzAZBgNVBAMT ElF1b1ZhZGlzIFJvb3QgQ0EgMoICBQkwDQYJKoZIhvcNAQEFBQADggIBAD4KFk2fBluornFdLwUv Z+YTRYPENvbzwCYMDbVHZF34tHLJRqUDGCdViXh9duqWNIAXINzng/iN/Ae42l9NLmeyhP3ZRPx3 UIHmfLTJDQtyU/h2BwdBR5YM++CCJpNVjP4iH2BlfF/nJrP3MpCYUNQ3cVX2kiF495V5+vgtJodm VjB3pjd4M1IQWK4/YY7yarHvGH5KWWPKjaJW1acvvFYfzznB4vsKqBUsfU16Y8Zsl0Q80m/DShcK +JDSV6IZUaUtl0HaB0+pUNqQjZRG4T7wlP0QADj1O+hA4bRuVhogzG9Yje0uRY/W6ZM/57Es3zrW IozchLsib9D45MY56QSIPMO661V6bYCZJPVsAfv4l7CUW+v90m/xd2gNNWQjrLhVoQPRTUIZ3Ph1 WVaj+ahJefivDrkRoHy3au000LYmYjgahwz46P0u05B/B5EqHdZ+XIWDmbA4CD/pXvk1B+TJYm5X f6dQlfe6yJvmjqIBxdZmv3lh8zwc4bmCXF2gw+nYSL0ZohEUGW6yhhtoPkg3Goi3XZZenMfvJ2II 4pEZXNLxId26F0KCl3GBUzGpn/Z9Yr9y4aOTHcyKJloJONDO1w2AFrR4pTqHTI2KpdVGl/IsELm8 VCLAAVBpQ570su9t+Oza8eOx79+Rj1QqCyXBJhnEUhAFZdWCEOrCMc0u -----END CERTIFICATE----- QuoVadis Root CA 3 ================== -----BEGIN CERTIFICATE----- MIIGnTCCBIWgAwIBAgICBcYwDQYJKoZIhvcNAQEFBQAwRTELMAkGA1UEBhMCQk0xGTAXBgNVBAoT EFF1b1ZhZGlzIExpbWl0ZWQxGzAZBgNVBAMTElF1b1ZhZGlzIFJvb3QgQ0EgMzAeFw0wNjExMjQx OTExMjNaFw0zMTExMjQxOTA2NDRaMEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBM aW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDMwggIiMA0GCSqGSIb3DQEBAQUAA4IC DwAwggIKAoICAQDMV0IWVJzmmNPTTe7+7cefQzlKZbPoFog02w1ZkXTPkrgEQK0CSzGrvI2RaNgg DhoB4hp7Thdd4oq3P5kazethq8Jlph+3t723j/z9cI8LoGe+AaJZz3HmDyl2/7FWeUUrH556VOij KTVopAFPD6QuN+8bv+OPEKhyq1hX51SGyMnzW9os2l2ObjyjPtr7guXd8lyyBTNvijbO0BNO/79K DDRMpsMhvVAEVeuxu537RR5kFd5VAYwCdrXLoT9CabwvvWhDFlaJKjdhkf2mrk7AyxRllDdLkgbv BNDInIjbC3uBr7E9KsRlOni27tyAsdLTmZw67mtaa7ONt9XOnMK+pUsvFrGeaDsGb659n/je7Mwp p5ijJUMv7/FfJuGITfhebtfZFG4ZM2mnO4SJk8RTVROhUXhA+LjJou57ulJCg54U7QVSWllWp5f8 nT8KKdjcT5EOE7zelaTfi5m+rJsziO+1ga8bxiJTyPbH7pcUsMV8eFLI8M5ud2CEpukqdiDtWAEX MJPpGovgc2PZapKUSU60rUqFxKMiMPwJ7Wgic6aIDFUhWMXhOp8q3crhkODZc6tsgLjoC2SToJyM Gf+z0gzskSaHirOi4XCPLArlzW1oUevaPwV/izLmE1xr/l9A4iLItLRkT9a6fUg+qGkM17uGcclz uD87nSVL2v9A6wIDAQABo4IBlTCCAZEwDwYDVR0TAQH/BAUwAwEB/zCB4QYDVR0gBIHZMIHWMIHT BgkrBgEEAb5YAAMwgcUwgZMGCCsGAQUFBwICMIGGGoGDQW55IHVzZSBvZiB0aGlzIENlcnRpZmlj YXRlIGNvbnN0aXR1dGVzIGFjY2VwdGFuY2Ugb2YgdGhlIFF1b1ZhZGlzIFJvb3QgQ0EgMyBDZXJ0 aWZpY2F0ZSBQb2xpY3kgLyBDZXJ0aWZpY2F0aW9uIFByYWN0aWNlIFN0YXRlbWVudC4wLQYIKwYB BQUHAgEWIWh0dHA6Ly93d3cucXVvdmFkaXNnbG9iYWwuY29tL2NwczALBgNVHQ8EBAMCAQYwHQYD VR0OBBYEFPLAE+CCQz777i9nMpY1XNu4ywLQMG4GA1UdIwRnMGWAFPLAE+CCQz777i9nMpY1XNu4 ywLQoUmkRzBFMQswCQYDVQQGEwJCTTEZMBcGA1UEChMQUXVvVmFkaXMgTGltaXRlZDEbMBkGA1UE AxMSUXVvVmFkaXMgUm9vdCBDQSAzggIFxjANBgkqhkiG9w0BAQUFAAOCAgEAT62gLEz6wPJv92ZV qyM07ucp2sNbtrCD2dDQ4iH782CnO11gUyeim/YIIirnv6By5ZwkajGxkHon24QRiSemd1o417+s hvzuXYO8BsbRd2sPbSQvS3pspweWyuOEn62Iix2rFo1bZhfZFvSLgNLd+LJ2w/w4E6oM3kJpK27z POuAJ9v1pkQNn1pVWQvVDVJIxa6f8i+AxeoyUDUSly7B4f/xI4hROJ/yZlZ25w9Rl6VSDE1JUZU2 Pb+iSwwQHYaZTKrzchGT5Or2m9qoXadNt54CrnMAyNojA+j56hl0YgCUyyIgvpSnWbWCar6ZeXqp 8kokUvd0/bpO5qgdAm6xDYBEwa7TIzdfu4V8K5Iu6H6li92Z4b8nby1dqnuH/grdS/yO9SbkbnBC bjPsMZ57k8HkyWkaPcBrTiJt7qtYTcbQQcEr6k8Sh17rRdhs9ZgC06DYVYoGmRmioHfRMJ6szHXu g/WwYjnPbFfiTNKRCw51KBuav/0aQ/HKd/s7j2G4aSgWQgRecCocIdiP4b0jWy10QJLZYxkNc91p vGJHvOB0K7Lrfb5BG7XARsWhIstfTsEokt4YutUqKLsRixeTmJlglFwjz1onl14LBQaTNx47aTbr qZ5hHY8y2o4M1nQ+ewkk2gF3R8Q7zTSMmfXK4SVhM7JZG+Ju1zdXtg2pEto= -----END CERTIFICATE----- Security Communication Root CA ============================== -----BEGIN CERTIFICATE----- MIIDWjCCAkKgAwIBAgIBADANBgkqhkiG9w0BAQUFADBQMQswCQYDVQQGEwJKUDEYMBYGA1UEChMP U0VDT00gVHJ1c3QubmV0MScwJQYDVQQLEx5TZWN1cml0eSBDb21tdW5pY2F0aW9uIFJvb3RDQTEw HhcNMDMwOTMwMDQyMDQ5WhcNMjMwOTMwMDQyMDQ5WjBQMQswCQYDVQQGEwJKUDEYMBYGA1UEChMP U0VDT00gVHJ1c3QubmV0MScwJQYDVQQLEx5TZWN1cml0eSBDb21tdW5pY2F0aW9uIFJvb3RDQTEw ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCzs/5/022x7xZ8V6UMbXaKL0u/ZPtM7orw 8yl89f/uKuDp6bpbZCKamm8sOiZpUQWZJtzVHGpxxpp9Hp3dfGzGjGdnSj74cbAZJ6kJDKaVv0uM DPpVmDvY6CKhS3E4eayXkmmziX7qIWgGmBSWh9JhNrxtJ1aeV+7AwFb9Ms+k2Y7CI9eNqPPYJayX 5HA49LY6tJ07lyZDo6G8SVlyTCMwhwFY9k6+HGhWZq/NQV3Is00qVUarH9oe4kA92819uZKAnDfd DJZkndwi92SL32HeFZRSFaB9UslLqCHJxrHty8OVYNEP8Ktw+N/LTX7s1vqr2b1/VPKl6Xn62dZ2 JChzAgMBAAGjPzA9MB0GA1UdDgQWBBSgc0mZaNyFW2XjmygvV5+9M7wHSDALBgNVHQ8EBAMCAQYw DwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQUFAAOCAQEAaECpqLvkT115swW1F7NgE+vGkl3g 0dNq/vu+m22/xwVtWSDEHPC32oRYAmP6SBbvT6UL90qY8j+eG61Ha2POCEfrUj94nK9NrvjVT8+a mCoQQTlSxN3Zmw7vkwGusi7KaEIkQmywszo+zenaSMQVy+n5Bw+SUEmK3TGXX8npN6o7WWWXlDLJ s58+OmJYxUmtYg5xpTKqL8aJdkNAExNnPaJUJRDL8Try2frbSVa7pv6nQTXD4IhhyYjH3zYQIphZ 6rBK+1YWc26sTfcioU+tHXotRSflMMFe8toTyyVCUZVHA4xsIcx0Qu1T/zOLjw9XARYvz6buyXAi FL39vmwLAw== -----END CERTIFICATE----- Sonera Class 2 Root CA ====================== -----BEGIN CERTIFICATE----- MIIDIDCCAgigAwIBAgIBHTANBgkqhkiG9w0BAQUFADA5MQswCQYDVQQGEwJGSTEPMA0GA1UEChMG U29uZXJhMRkwFwYDVQQDExBTb25lcmEgQ2xhc3MyIENBMB4XDTAxMDQwNjA3Mjk0MFoXDTIxMDQw NjA3Mjk0MFowOTELMAkGA1UEBhMCRkkxDzANBgNVBAoTBlNvbmVyYTEZMBcGA1UEAxMQU29uZXJh IENsYXNzMiBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAJAXSjWdyvANlsdE+hY3 /Ei9vX+ALTU74W+oZ6m/AxxNjG8yR9VBaKQTBME1DJqEQ/xcHf+Js+gXGM2RX/uJ4+q/Tl18GybT dXnt5oTjV+WtKcT0OijnpXuENmmz/V52vaMtmdOQTiMofRhj8VQ7Jp12W5dCsv+u8E7s3TmVToMG f+dJQMjFAbJUWmYdPfz56TwKnoG4cPABi+QjVHzIrviQHgCWctRUz2EjvOr7nQKV0ba5cTppCD8P tOFCx4j1P5iop7oc4HFx71hXgVB6XGt0Rg6DA5jDjqhu8nYybieDwnPz3BjotJPqdURrBGAgcVeH nfO+oJAjPYok4doh28MCAwEAAaMzMDEwDwYDVR0TAQH/BAUwAwEB/zARBgNVHQ4ECgQISqCqWITT XjwwCwYDVR0PBAQDAgEGMA0GCSqGSIb3DQEBBQUAA4IBAQBazof5FnIVV0sd2ZvnoiYw7JNn39Yt 0jSv9zilzqsWuasvfDXLrNAPtEwr/IDva4yRXzZ299uzGxnq9LIR/WFxRL8oszodv7ND6J+/3DEI cbCdjdY0RzKQxmUk96BKfARzjzlvF4xytb1LyHr4e4PDKE6cCepnP7JnBBvDFNr450kkkdAdavph Oe9r5yF1BgfYErQhIHBCcYHaPJo2vqZbDWpsmh+Re/n570K6Tk6ezAyNlNzZRZxe7EJQY670XcSx EtzKO6gunRRaBXW37Ndj4ro1tgQIkejanZz2ZrUYrAqmVCY0M9IbwdR/GjqOC6oybtv8TyWf2TLH llpwrN9M -----END CERTIFICATE----- Camerfirma Chambers of Commerce Root ==================================== -----BEGIN CERTIFICATE----- MIIEvTCCA6WgAwIBAgIBADANBgkqhkiG9w0BAQUFADB/MQswCQYDVQQGEwJFVTEnMCUGA1UEChMe QUMgQ2FtZXJmaXJtYSBTQSBDSUYgQTgyNzQzMjg3MSMwIQYDVQQLExpodHRwOi8vd3d3LmNoYW1i ZXJzaWduLm9yZzEiMCAGA1UEAxMZQ2hhbWJlcnMgb2YgQ29tbWVyY2UgUm9vdDAeFw0wMzA5MzAx NjEzNDNaFw0zNzA5MzAxNjEzNDRaMH8xCzAJBgNVBAYTAkVVMScwJQYDVQQKEx5BQyBDYW1lcmZp cm1hIFNBIENJRiBBODI3NDMyODcxIzAhBgNVBAsTGmh0dHA6Ly93d3cuY2hhbWJlcnNpZ24ub3Jn MSIwIAYDVQQDExlDaGFtYmVycyBvZiBDb21tZXJjZSBSb290MIIBIDANBgkqhkiG9w0BAQEFAAOC AQ0AMIIBCAKCAQEAtzZV5aVdGDDg2olUkfzIx1L4L1DZ77F1c2VHfRtbunXF/KGIJPov7coISjlU xFF6tdpg6jg8gbLL8bvZkSM/SAFwdakFKq0fcfPJVD0dBmpAPrMMhe5cG3nCYsS4No41XQEMIwRH NaqbYE6gZj3LJgqcQKH0XZi/caulAGgq7YN6D6IUtdQis4CwPAxaUWktWBiP7Zme8a7ileb2R6jW DA+wWFjbw2Y3npuRVDM30pQcakjJyfKl2qUMI/cjDpwyVV5xnIQFUZot/eZOKjRa3spAN2cMVCFV d9oKDMyXroDclDZK9D7ONhMeU+SsTjoF7Nuucpw4i9A5O4kKPnf+dQIBA6OCAUQwggFAMBIGA1Ud EwEB/wQIMAYBAf8CAQwwPAYDVR0fBDUwMzAxoC+gLYYraHR0cDovL2NybC5jaGFtYmVyc2lnbi5v cmcvY2hhbWJlcnNyb290LmNybDAdBgNVHQ4EFgQU45T1sU3p26EpW1eLTXYGduHRooowDgYDVR0P AQH/BAQDAgEGMBEGCWCGSAGG+EIBAQQEAwIABzAnBgNVHREEIDAegRxjaGFtYmVyc3Jvb3RAY2hh bWJlcnNpZ24ub3JnMCcGA1UdEgQgMB6BHGNoYW1iZXJzcm9vdEBjaGFtYmVyc2lnbi5vcmcwWAYD VR0gBFEwTzBNBgsrBgEEAYGHLgoDATA+MDwGCCsGAQUFBwIBFjBodHRwOi8vY3BzLmNoYW1iZXJz aWduLm9yZy9jcHMvY2hhbWJlcnNyb290Lmh0bWwwDQYJKoZIhvcNAQEFBQADggEBAAxBl8IahsAi fJ/7kPMa0QOx7xP5IV8EnNrJpY0nbJaHkb5BkAFyk+cefV/2icZdp0AJPaxJRUXcLo0waLIJuvvD L8y6C98/d3tGfToSJI6WjzwFCm/SlCgdbQzALogi1djPHRPH8EjX1wWnz8dHnjs8NMiAT9QUu/wN UPf6s+xCX6ndbcj0dc97wXImsQEcXCz9ek60AcUFV7nnPKoF2YjpB0ZBzu9Bga5Y34OirsrXdx/n ADydb47kMgkdTXg0eDQ8lJsm7U9xxhl6vSAiSFr+S30Dt+dYvsYyTnQeaN2oaFuzPu5ifdmA6Ap1 erfutGWaIZDgqtCYvDi1czyL+Nw= -----END CERTIFICATE----- Camerfirma Global Chambersign Root ================================== -----BEGIN CERTIFICATE----- MIIExTCCA62gAwIBAgIBADANBgkqhkiG9w0BAQUFADB9MQswCQYDVQQGEwJFVTEnMCUGA1UEChMe QUMgQ2FtZXJmaXJtYSBTQSBDSUYgQTgyNzQzMjg3MSMwIQYDVQQLExpodHRwOi8vd3d3LmNoYW1i ZXJzaWduLm9yZzEgMB4GA1UEAxMXR2xvYmFsIENoYW1iZXJzaWduIFJvb3QwHhcNMDMwOTMwMTYx NDE4WhcNMzcwOTMwMTYxNDE4WjB9MQswCQYDVQQGEwJFVTEnMCUGA1UEChMeQUMgQ2FtZXJmaXJt YSBTQSBDSUYgQTgyNzQzMjg3MSMwIQYDVQQLExpodHRwOi8vd3d3LmNoYW1iZXJzaWduLm9yZzEg MB4GA1UEAxMXR2xvYmFsIENoYW1iZXJzaWduIFJvb3QwggEgMA0GCSqGSIb3DQEBAQUAA4IBDQAw ggEIAoIBAQCicKLQn0KuWxfH2H3PFIP8T8mhtxOviteePgQKkotgVvq0Mi+ITaFgCPS3CU6gSS9J 1tPfnZdan5QEcOw/Wdm3zGaLmFIoCQLfxS+EjXqXd7/sQJ0lcqu1PzKY+7e3/HKE5TWH+VX6ox8O by4o3Wmg2UIQxvi1RMLQQ3/bvOSiPGpVeAp3qdjqGTK3L/5cPxvusZjsyq16aUXjlg9V9ubtdepl 6DJWk0aJqCWKZQbua795B9Dxt6/tLE2Su8CoX6dnfQTyFQhwrJLWfQTSM/tMtgsL+xrJxI0DqX5c 8lCrEqWhz0hQpe/SyBoT+rB/sYIcd2oPX9wLlY/vQ37mRQklAgEDo4IBUDCCAUwwEgYDVR0TAQH/ BAgwBgEB/wIBDDA/BgNVHR8EODA2MDSgMqAwhi5odHRwOi8vY3JsLmNoYW1iZXJzaWduLm9yZy9j aGFtYmVyc2lnbnJvb3QuY3JsMB0GA1UdDgQWBBRDnDafsJ4wTcbOX60Qq+UDpfqpFDAOBgNVHQ8B Af8EBAMCAQYwEQYJYIZIAYb4QgEBBAQDAgAHMCoGA1UdEQQjMCGBH2NoYW1iZXJzaWducm9vdEBj aGFtYmVyc2lnbi5vcmcwKgYDVR0SBCMwIYEfY2hhbWJlcnNpZ25yb290QGNoYW1iZXJzaWduLm9y ZzBbBgNVHSAEVDBSMFAGCysGAQQBgYcuCgEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly9jcHMuY2hh bWJlcnNpZ24ub3JnL2Nwcy9jaGFtYmVyc2lnbnJvb3QuaHRtbDANBgkqhkiG9w0BAQUFAAOCAQEA PDtwkfkEVCeR4e3t/mh/YV3lQWVPMvEYBZRqHN4fcNs+ezICNLUMbKGKfKX0j//U2K0X1S0E0T9Y gOKBWYi+wONGkyT+kL0mojAt6JcmVzWJdJYY9hXiryQZVgICsroPFOrGimbBhkVVi76SvpykBMdJ PJ7oKXqJ1/6v/2j1pReQvayZzKWGVwlnRtvWFsJG8eSpUPWP0ZIV018+xgBJOm5YstHRJw0lyDL4 IBHNfTIzSJRUTN3cecQwn+uOuFW114hcxWokPbLTBQNRxgfvzBRydD1ucs4YKIxKoHflCStFREes t2d/AYoFWpO+ocH/+OcOZ6RHSXZddZAa9SaP8A== -----END CERTIFICATE----- XRamp Global CA Root ==================== -----BEGIN CERTIFICATE----- MIIEMDCCAxigAwIBAgIQUJRs7Bjq1ZxN1ZfvdY+grTANBgkqhkiG9w0BAQUFADCBgjELMAkGA1UE BhMCVVMxHjAcBgNVBAsTFXd3dy54cmFtcHNlY3VyaXR5LmNvbTEkMCIGA1UEChMbWFJhbXAgU2Vj dXJpdHkgU2VydmljZXMgSW5jMS0wKwYDVQQDEyRYUmFtcCBHbG9iYWwgQ2VydGlmaWNhdGlvbiBB dXRob3JpdHkwHhcNMDQxMTAxMTcxNDA0WhcNMzUwMTAxMDUzNzE5WjCBgjELMAkGA1UEBhMCVVMx HjAcBgNVBAsTFXd3dy54cmFtcHNlY3VyaXR5LmNvbTEkMCIGA1UEChMbWFJhbXAgU2VjdXJpdHkg U2VydmljZXMgSW5jMS0wKwYDVQQDEyRYUmFtcCBHbG9iYWwgQ2VydGlmaWNhdGlvbiBBdXRob3Jp dHkwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCYJB69FbS638eMpSe2OAtp87ZOqCwu IR1cRN8hXX4jdP5efrRKt6atH67gBhbim1vZZ3RrXYCPKZ2GG9mcDZhtdhAoWORlsH9KmHmf4MMx foArtYzAQDsRhtDLooY2YKTVMIJt2W7QDxIEM5dfT2Fa8OT5kavnHTu86M/0ay00fOJIYRyO82FE zG+gSqmUsE3a56k0enI4qEHMPJQRfevIpoy3hsvKMzvZPTeL+3o+hiznc9cKV6xkmxnr9A8ECIqs AxcZZPRaJSKNNCyy9mgdEm3Tih4U2sSPpuIjhdV6Db1q4Ons7Be7QhtnqiXtRYMh/MHJfNViPvry xS3T/dRlAgMBAAGjgZ8wgZwwEwYJKwYBBAGCNxQCBAYeBABDAEEwCwYDVR0PBAQDAgGGMA8GA1Ud EwEB/wQFMAMBAf8wHQYDVR0OBBYEFMZPoj0GY4QJnM5i5ASsjVy16bYbMDYGA1UdHwQvMC0wK6Ap oCeGJWh0dHA6Ly9jcmwueHJhbXBzZWN1cml0eS5jb20vWEdDQS5jcmwwEAYJKwYBBAGCNxUBBAMC AQEwDQYJKoZIhvcNAQEFBQADggEBAJEVOQMBG2f7Shz5CmBbodpNl2L5JFMn14JkTpAuw0kbK5rc /Kh4ZzXxHfARvbdI4xD2Dd8/0sm2qlWkSLoC295ZLhVbO50WfUfXN+pfTXYSNrsf16GBBEYgoyxt qZ4Bfj8pzgCT3/3JknOJiWSe5yvkHJEs0rnOfc5vMZnT5r7SHpDwCRR5XCOrTdLaIR9NmXmd4c8n nxCbHIgNsIpkQTG4DmyQJKSbXHGPurt+HBvbaoAPIbzp26a3QPSyi6mx5O+aGtA9aZnuqCij4Tyz 8LIRnM98QObd50N9otg6tamN8jSZxNQQ4Qb9CYQQO+7ETPTsJ3xCwnR8gooJybQDJbw= -----END CERTIFICATE----- Go Daddy Class 2 CA =================== -----BEGIN CERTIFICATE----- MIIEADCCAuigAwIBAgIBADANBgkqhkiG9w0BAQUFADBjMQswCQYDVQQGEwJVUzEhMB8GA1UEChMY VGhlIEdvIERhZGR5IEdyb3VwLCBJbmMuMTEwLwYDVQQLEyhHbyBEYWRkeSBDbGFzcyAyIENlcnRp ZmljYXRpb24gQXV0aG9yaXR5MB4XDTA0MDYyOTE3MDYyMFoXDTM0MDYyOTE3MDYyMFowYzELMAkG A1UEBhMCVVMxITAfBgNVBAoTGFRoZSBHbyBEYWRkeSBHcm91cCwgSW5jLjExMC8GA1UECxMoR28g RGFkZHkgQ2xhc3MgMiBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTCCASAwDQYJKoZIhvcNAQEBBQAD ggENADCCAQgCggEBAN6d1+pXGEmhW+vXX0iG6r7d/+TvZxz0ZWizV3GgXne77ZtJ6XCAPVYYYwhv 2vLM0D9/AlQiVBDYsoHUwHU9S3/Hd8M+eKsaA7Ugay9qK7HFiH7Eux6wwdhFJ2+qN1j3hybX2C32 qRe3H3I2TqYXP2WYktsqbl2i/ojgC95/5Y0V4evLOtXiEqITLdiOr18SPaAIBQi2XKVlOARFmR6j YGB0xUGlcmIbYsUfb18aQr4CUWWoriMYavx4A6lNf4DD+qta/KFApMoZFv6yyO9ecw3ud72a9nmY vLEHZ6IVDd2gWMZEewo+YihfukEHU1jPEX44dMX4/7VpkI+EdOqXG68CAQOjgcAwgb0wHQYDVR0O BBYEFNLEsNKR1EwRcbNhyz2h/t2oatTjMIGNBgNVHSMEgYUwgYKAFNLEsNKR1EwRcbNhyz2h/t2o atTjoWekZTBjMQswCQYDVQQGEwJVUzEhMB8GA1UEChMYVGhlIEdvIERhZGR5IEdyb3VwLCBJbmMu MTEwLwYDVQQLEyhHbyBEYWRkeSBDbGFzcyAyIENlcnRpZmljYXRpb24gQXV0aG9yaXR5ggEAMAwG A1UdEwQFMAMBAf8wDQYJKoZIhvcNAQEFBQADggEBADJL87LKPpH8EsahB4yOd6AzBhRckB4Y9wim PQoZ+YeAEW5p5JYXMP80kWNyOO7MHAGjHZQopDH2esRU1/blMVgDoszOYtuURXO1v0XJJLXVggKt I3lpjbi2Tc7PTMozI+gciKqdi0FuFskg5YmezTvacPd+mSYgFFQlq25zheabIZ0KbIIOqPjCDPoQ HmyW74cNxA9hi63ugyuV+I6ShHI56yDqg+2DzZduCLzrTia2cyvk0/ZM/iZx4mERdEr/VxqHD3VI Ls9RaRegAhJhldXRQLIQTO7ErBBDpqWeCtWVYpoNz4iCxTIM5CufReYNnyicsbkqWletNw+vHX/b vZ8= -----END CERTIFICATE----- Starfield Class 2 CA ==================== -----BEGIN CERTIFICATE----- MIIEDzCCAvegAwIBAgIBADANBgkqhkiG9w0BAQUFADBoMQswCQYDVQQGEwJVUzElMCMGA1UEChMc U3RhcmZpZWxkIFRlY2hub2xvZ2llcywgSW5jLjEyMDAGA1UECxMpU3RhcmZpZWxkIENsYXNzIDIg Q2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMDQwNjI5MTczOTE2WhcNMzQwNjI5MTczOTE2WjBo MQswCQYDVQQGEwJVUzElMCMGA1UEChMcU3RhcmZpZWxkIFRlY2hub2xvZ2llcywgSW5jLjEyMDAG A1UECxMpU3RhcmZpZWxkIENsYXNzIDIgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwggEgMA0GCSqG SIb3DQEBAQUAA4IBDQAwggEIAoIBAQC3Msj+6XGmBIWtDBFk385N78gDGIc/oav7PKaf8MOh2tTY bitTkPskpD6E8J7oX+zlJ0T1KKY/e97gKvDIr1MvnsoFAZMej2YcOadN+lq2cwQlZut3f+dZxkqZ JRRU6ybH838Z1TBwj6+wRir/resp7defqgSHo9T5iaU0X9tDkYI22WY8sbi5gv2cOj4QyDvvBmVm epsZGD3/cVE8MC5fvj13c7JdBmzDI1aaK4UmkhynArPkPw2vCHmCuDY96pzTNbO8acr1zJ3o/WSN F4Azbl5KXZnJHoe0nRrA1W4TNSNe35tfPe/W93bC6j67eA0cQmdrBNj41tpvi/JEoAGrAgEDo4HF MIHCMB0GA1UdDgQWBBS/X7fRzt0fhvRbVazc1xDCDqmI5zCBkgYDVR0jBIGKMIGHgBS/X7fRzt0f hvRbVazc1xDCDqmI56FspGowaDELMAkGA1UEBhMCVVMxJTAjBgNVBAoTHFN0YXJmaWVsZCBUZWNo bm9sb2dpZXMsIEluYy4xMjAwBgNVBAsTKVN0YXJmaWVsZCBDbGFzcyAyIENlcnRpZmljYXRpb24g QXV0aG9yaXR5ggEAMAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQEFBQADggEBAAWdP4id0ckaVaGs afPzWdqbAYcaT1epoXkJKtv3L7IezMdeatiDh6GX70k1PncGQVhiv45YuApnP+yz3SFmH8lU+nLM PUxA2IGvd56Deruix/U0F47ZEUD0/CwqTRV/p2JdLiXTAAsgGh1o+Re49L2L7ShZ3U0WixeDyLJl xy16paq8U4Zt3VekyvggQQto8PT7dL5WXXp59fkdheMtlb71cZBDzI0fmgAKhynpVSJYACPq4xJD KVtHCN2MQWplBqjlIapBtJUhlbl90TSrE9atvNziPTnNvT51cKEYWQPJIrSPnNVeKtelttQKbfi3 QBFGmh95DmK/D5fs4C8fF5Q= -----END CERTIFICATE----- StartCom Certification Authority ================================ -----BEGIN CERTIFICATE----- MIIHyTCCBbGgAwIBAgIBATANBgkqhkiG9w0BAQUFADB9MQswCQYDVQQGEwJJTDEWMBQGA1UEChMN U3RhcnRDb20gTHRkLjErMCkGA1UECxMiU2VjdXJlIERpZ2l0YWwgQ2VydGlmaWNhdGUgU2lnbmlu ZzEpMCcGA1UEAxMgU3RhcnRDb20gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMDYwOTE3MTk0 NjM2WhcNMzYwOTE3MTk0NjM2WjB9MQswCQYDVQQGEwJJTDEWMBQGA1UEChMNU3RhcnRDb20gTHRk LjErMCkGA1UECxMiU2VjdXJlIERpZ2l0YWwgQ2VydGlmaWNhdGUgU2lnbmluZzEpMCcGA1UEAxMg U3RhcnRDb20gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAw ggIKAoICAQDBiNsJvGxGfHiflXu1M5DycmLWwTYgIiRezul38kMKogZkpMyONvg45iPwbm2xPN1y o4UcodM9tDMr0y+v/uqwQVlntsQGfQqedIXWeUyAN3rfOQVSWff0G0ZDpNKFhdLDcfN1YjS6LIp/ Ho/u7TTQEceWzVI9ujPW3U3eCztKS5/CJi/6tRYccjV3yjxd5srhJosaNnZcAdt0FCX+7bWgiA/d eMotHweXMAEtcnn6RtYTKqi5pquDSR3l8u/d5AGOGAqPY1MWhWKpDhk6zLVmpsJrdAfkK+F2PrRt 2PZE4XNiHzvEvqBTViVsUQn3qqvKv3b9bZvzndu/PWa8DFaqr5hIlTpL36dYUNk4dalb6kMMAv+Z 6+hsTXBbKWWc3apdzK8BMewM69KN6Oqce+Zu9ydmDBpI125C4z/eIT574Q1w+2OqqGwaVLRcJXrJ osmLFqa7LH4XXgVNWG4SHQHuEhANxjJ/GP/89PrNbpHoNkm+Gkhpi8KWTRoSsmkXwQqQ1vp5Iki/ untp+HDH+no32NgN0nZPV/+Qt+OR0t3vwmC3Zzrd/qqc8NSLf3Iizsafl7b4r4qgEKjZ+xjGtrVc UjyJthkqcwEKDwOzEmDyei+B26Nu/yYwl/WL3YlXtq09s68rxbd2AvCl1iuahhQqcvbjM4xdCUsT 37uMdBNSSwIDAQABo4ICUjCCAk4wDAYDVR0TBAUwAwEB/zALBgNVHQ8EBAMCAa4wHQYDVR0OBBYE FE4L7xqkQFulF2mHMMo0aEPQQa7yMGQGA1UdHwRdMFswLKAqoCiGJmh0dHA6Ly9jZXJ0LnN0YXJ0 Y29tLm9yZy9zZnNjYS1jcmwuY3JsMCugKaAnhiVodHRwOi8vY3JsLnN0YXJ0Y29tLm9yZy9zZnNj YS1jcmwuY3JsMIIBXQYDVR0gBIIBVDCCAVAwggFMBgsrBgEEAYG1NwEBATCCATswLwYIKwYBBQUH AgEWI2h0dHA6Ly9jZXJ0LnN0YXJ0Y29tLm9yZy9wb2xpY3kucGRmMDUGCCsGAQUFBwIBFilodHRw Oi8vY2VydC5zdGFydGNvbS5vcmcvaW50ZXJtZWRpYXRlLnBkZjCB0AYIKwYBBQUHAgIwgcMwJxYg U3RhcnQgQ29tbWVyY2lhbCAoU3RhcnRDb20pIEx0ZC4wAwIBARqBl0xpbWl0ZWQgTGlhYmlsaXR5 LCByZWFkIHRoZSBzZWN0aW9uICpMZWdhbCBMaW1pdGF0aW9ucyogb2YgdGhlIFN0YXJ0Q29tIENl cnRpZmljYXRpb24gQXV0aG9yaXR5IFBvbGljeSBhdmFpbGFibGUgYXQgaHR0cDovL2NlcnQuc3Rh cnRjb20ub3JnL3BvbGljeS5wZGYwEQYJYIZIAYb4QgEBBAQDAgAHMDgGCWCGSAGG+EIBDQQrFilT dGFydENvbSBGcmVlIFNTTCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTANBgkqhkiG9w0BAQUFAAOC AgEAFmyZ9GYMNPXQhV59CuzaEE44HF7fpiUFS5Eyweg78T3dRAlbB0mKKctmArexmvclmAk8jhvh 3TaHK0u7aNM5Zj2gJsfyOZEdUauCe37Vzlrk4gNXcGmXCPleWKYK34wGmkUWFjgKXlf2Ysd6AgXm vB618p70qSmD+LIU424oh0TDkBreOKk8rENNZEXO3SipXPJzewT4F+irsfMuXGRuczE6Eri8sxHk fY+BUZo7jYn0TZNmezwD7dOaHZrzZVD1oNB1ny+v8OqCQ5j4aZyJecRDjkZy42Q2Eq/3JR44iZB3 fsNrarnDy0RLrHiQi+fHLB5LEUTINFInzQpdn4XBidUaePKVEFMy3YCEZnXZtWgo+2EuvoSoOMCZ EoalHmdkrQYuL6lwhceWD3yJZfWOQ1QOq92lgDmUYMA0yZZwLKMS9R9Ie70cfmu3nZD0Ijuu+Pwq yvqCUqDvr0tVk+vBtfAii6w0TiYiBKGHLHVKt+V9E9e4DGTANtLJL4YSjCMJwRuCO3NJo2pXh5Tl 1njFmUNj403gdy3hZZlyaQQaRwnmDwFWJPsfvw55qVguucQJAX6Vum0ABj6y6koQOdjQK/W/7HW/ lwLFCRsI3FU34oH7N4RDYiDK51ZLZer+bMEkkyShNOsF/5oirpt9P/FlUQqmMGqz9IgcgA38coro g14= -----END CERTIFICATE----- Taiwan GRCA =========== -----BEGIN CERTIFICATE----- MIIFcjCCA1qgAwIBAgIQH51ZWtcvwgZEpYAIaeNe9jANBgkqhkiG9w0BAQUFADA/MQswCQYDVQQG EwJUVzEwMC4GA1UECgwnR292ZXJubWVudCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MB4X DTAyMTIwNTEzMjMzM1oXDTMyMTIwNTEzMjMzM1owPzELMAkGA1UEBhMCVFcxMDAuBgNVBAoMJ0dv dmVybm1lbnQgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTCCAiIwDQYJKoZIhvcNAQEBBQAD ggIPADCCAgoCggIBAJoluOzMonWoe/fOW1mKydGGEghU7Jzy50b2iPN86aXfTEc2pBsBHH8eV4qN w8XRIePaJD9IK/ufLqGU5ywck9G/GwGHU5nOp/UKIXZ3/6m3xnOUT0b3EEk3+qhZSV1qgQdW8or5 BtD3cCJNtLdBuTK4sfCxw5w/cP1T3YGq2GN49thTbqGsaoQkclSGxtKyyhwOeYHWtXBiCAEuTk8O 1RGvqa/lmr/czIdtJuTJV6L7lvnM4T9TjGxMfptTCAtsF/tnyMKtsc2AtJfcdgEWFelq16TheEfO htX7MfP6Mb40qij7cEwdScevLJ1tZqa2jWR+tSBqnTuBto9AAGdLiYa4zGX+FVPpBMHWXx1E1wov J5pGfaENda1UhhXcSTvxls4Pm6Dso3pdvtUqdULle96ltqqvKKyskKw4t9VoNSZ63Pc78/1Fm9G7 Q3hub/FCVGqY8A2tl+lSXunVanLeavcbYBT0peS2cWeqH+riTcFCQP5nRhc4L0c/cZyu5SHKYS1t B6iEfC3uUSXxY5Ce/eFXiGvviiNtsea9P63RPZYLhY3Naye7twWb7LuRqQoHEgKXTiCQ8P8NHuJB O9NAOueNXdpm5AKwB1KYXA6OM5zCppX7VRluTI6uSw+9wThNXo+EHWbNxWCWtFJaBYmOlXqYwZE8 lSOyDvR5tMl8wUohAgMBAAGjajBoMB0GA1UdDgQWBBTMzO/MKWCkO7GStjz6MmKPrCUVOzAMBgNV HRMEBTADAQH/MDkGBGcqBwAEMTAvMC0CAQAwCQYFKw4DAhoFADAHBgVnKgMAAAQUA5vwIhP/lSg2 09yewDL7MTqKUWUwDQYJKoZIhvcNAQEFBQADggIBAECASvomyc5eMN1PhnR2WPWus4MzeKR6dBcZ TulStbngCnRiqmjKeKBMmo4sIy7VahIkv9Ro04rQ2JyftB8M3jh+Vzj8jeJPXgyfqzvS/3WXy6Tj Zwj/5cAWtUgBfen5Cv8b5Wppv3ghqMKnI6mGq3ZW6A4M9hPdKmaKZEk9GhiHkASfQlK3T8v+R0F2 Ne//AHY2RTKbxkaFXeIksB7jSJaYV0eUVXoPQbFEJPPB/hprv4j9wabak2BegUqZIJxIZhm1AHlU D7gsL0u8qV1bYH+Mh6XgUmMqvtg7hUAV/h62ZT/FS9p+tXo1KaMuephgIqP0fSdOLeq0dDzpD6Qz DxARvBMB1uUO07+1EqLhRSPAzAhuYbeJq4PjJB7mXQfnHyA+z2fI56wwbSdLaG5LKlwCCDTb+Hbk Z6MmnD+iMsJKxYEYMRBWqoTvLQr/uB930r+lWKBi5NdLkXWNiYCYfm3LU05er/ayl4WXudpVBrkk 7tfGOB5jGxI7leFYrPLfhNVfmS8NVVvmONsuP3LpSIXLuykTjx44VbnzssQwmSNOXfJIoRIM3BKQ CZBUkQM8R+XVyWXgt0t97EfTsws+rZ7QdAAO671RrcDeLMDDav7v3Aun+kbfYNucpllQdSNpc5Oy +fwC00fmcc4QAu4njIT/rEUNE1yDMuAlpYYsfPQS -----END CERTIFICATE----- DigiCert Assured ID Root CA =========================== -----BEGIN CERTIFICATE----- MIIDtzCCAp+gAwIBAgIQDOfg5RfYRv6P5WD8G/AwOTANBgkqhkiG9w0BAQUFADBlMQswCQYDVQQG EwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSQw IgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgQ0EwHhcNMDYxMTEwMDAwMDAwWhcNMzEx MTEwMDAwMDAwWjBlMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQL ExB3d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgQ0Ew ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCtDhXO5EOAXLGH87dg+XESpa7cJpSIqvTO 9SA5KFhgDPiA2qkVlTJhPLWxKISKityfCgyDF3qPkKyK53lTXDGEKvYPmDI2dsze3Tyoou9q+yHy UmHfnyDXH+Kx2f4YZNISW1/5WBg1vEfNoTb5a3/UsDg+wRvDjDPZ2C8Y/igPs6eD1sNuRMBhNZYW /lmci3Zt1/GiSw0r/wty2p5g0I6QNcZ4VYcgoc/lbQrISXwxmDNsIumH0DJaoroTghHtORedmTpy oeb6pNnVFzF1roV9Iq4/AUaG9ih5yLHa5FcXxH4cDrC0kqZWs72yl+2qp/C3xag/lRbQ/6GW6whf GHdPAgMBAAGjYzBhMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBRF 66Kv9JLLgjEtUYunpyGd823IDzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823IDzANBgkq hkiG9w0BAQUFAAOCAQEAog683+Lt8ONyc3pklL/3cmbYMuRCdWKuh+vy1dneVrOfzM4UKLkNl2Bc EkxY5NM9g0lFWJc1aRqoR+pWxnmrEthngYTffwk8lOa4JiwgvT2zKIn3X/8i4peEH+ll74fg38Fn SbNd67IJKusm7Xi+fT8r87cmNW1fiQG2SVufAQWbqz0lwcy2f8Lxb4bG+mRo64EtlOtCt/qMHt1i 8b5QZ7dsvfPxH2sMNgcWfzd8qVttevESRmCD1ycEvkvOl77DZypoEd+A5wwzZr8TDRRu838fYxAe +o0bJW1sj6W3YQGx0qMmoRBxna3iw/nDmVG3KwcIzi7mULKn+gpFL6Lw8g== -----END CERTIFICATE----- DigiCert Global Root CA ======================= -----BEGIN CERTIFICATE----- MIIDrzCCApegAwIBAgIQCDvgVpBCRrGhdWrJWZHHSjANBgkqhkiG9w0BAQUFADBhMQswCQYDVQQG EwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSAw HgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBDQTAeFw0wNjExMTAwMDAwMDBaFw0zMTExMTAw MDAwMDBaMGExCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3 dy5kaWdpY2VydC5jb20xIDAeBgNVBAMTF0RpZ2lDZXJ0IEdsb2JhbCBSb290IENBMIIBIjANBgkq hkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA4jvhEXLeqKTTo1eqUKKPC3eQyaKl7hLOllsBCSDMAZOn TjC3U/dDxGkAV53ijSLdhwZAAIEJzs4bg7/fzTtxRuLWZscFs3YnFo97nh6Vfe63SKMI2tavegw5 BmV/Sl0fvBf4q77uKNd0f3p4mVmFaG5cIzJLv07A6Fpt43C/dxC//AH2hdmoRBBYMql1GNXRor5H 4idq9Joz+EkIYIvUX7Q6hL+hqkpMfT7PT19sdl6gSzeRntwi5m3OFBqOasv+zbMUZBfHWymeMr/y 7vrTC0LUq7dBMtoM1O/4gdW7jVg/tRvoSSiicNoxBN33shbyTApOB6jtSj1etX+jkMOvJwIDAQAB o2MwYTAOBgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUA95QNVbRTLtm 8KPiGxvDl7I90VUwHwYDVR0jBBgwFoAUA95QNVbRTLtm8KPiGxvDl7I90VUwDQYJKoZIhvcNAQEF BQADggEBAMucN6pIExIK+t1EnE9SsPTfrgT1eXkIoyQY/EsrhMAtudXH/vTBH1jLuG2cenTnmCmr EbXjcKChzUyImZOMkXDiqw8cvpOp/2PV5Adg06O/nVsJ8dWO41P0jmP6P6fbtGbfYmbW0W5BjfIt tep3Sp+dWOIrWcBAI+0tKIJFPnlUkiaY4IBIqDfv8NZ5YBberOgOzW6sRBc4L0na4UU+Krk2U886 UAb3LujEV0lsYSEY1QSteDwsOoBrp+uvFRTp2InBuThs4pFsiv9kuXclVzDAGySj4dzp30d8tbQk CAUw7C29C79Fv1C5qfPrmAESrciIxpg0X40KPMbp1ZWVbd4= -----END CERTIFICATE----- DigiCert High Assurance EV Root CA ================================== -----BEGIN CERTIFICATE----- MIIDxTCCAq2gAwIBAgIQAqxcJmoLQJuPC3nyrkYldzANBgkqhkiG9w0BAQUFADBsMQswCQYDVQQG EwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSsw KQYDVQQDEyJEaWdpQ2VydCBIaWdoIEFzc3VyYW5jZSBFViBSb290IENBMB4XDTA2MTExMDAwMDAw MFoXDTMxMTExMDAwMDAwMFowbDELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZ MBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTErMCkGA1UEAxMiRGlnaUNlcnQgSGlnaCBBc3N1cmFu Y2UgRVYgUm9vdCBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMbM5XPm+9S75S0t Mqbf5YE/yc0lSbZxKsPVlDRnogocsF9ppkCxxLeyj9CYpKlBWTrT3JTWPNt0OKRKzE0lgvdKpVMS OO7zSW1xkX5jtqumX8OkhPhPYlG++MXs2ziS4wblCJEMxChBVfvLWokVfnHoNb9Ncgk9vjo4UFt3 MRuNs8ckRZqnrG0AFFoEt7oT61EKmEFBIk5lYYeBQVCmeVyJ3hlKV9Uu5l0cUyx+mM0aBhakaHPQ NAQTXKFx01p8VdteZOE3hzBWBOURtCmAEvF5OYiiAhF8J2a3iLd48soKqDirCmTCv2ZdlYTBoSUe h10aUAsgEsxBu24LUTi4S8sCAwEAAaNjMGEwDgYDVR0PAQH/BAQDAgGGMA8GA1UdEwEB/wQFMAMB Af8wHQYDVR0OBBYEFLE+w2kD+L9HAdSYJhoIAu9jZCvDMB8GA1UdIwQYMBaAFLE+w2kD+L9HAdSY JhoIAu9jZCvDMA0GCSqGSIb3DQEBBQUAA4IBAQAcGgaX3NecnzyIZgYIVyHbIUf4KmeqvxgydkAQ V8GK83rZEWWONfqe/EW1ntlMMUu4kehDLI6zeM7b41N5cdblIZQB2lWHmiRk9opmzN6cN82oNLFp myPInngiK3BD41VHMWEZ71jFhS9OMPagMRYjyOfiZRYzy78aG6A9+MpeizGLYAiJLQwGXFK3xPkK mNEVX58Svnw2Yzi9RKR/5CYrCsSXaQ3pjOLAEFe4yHYSkVXySGnYvCoCWw9E1CAx2/S6cCZdkGCe vEsXCS+0yx5DaMkHJ8HSXPfqIbloEpw8nL+e/IBcm2PN7EeqJSdnoDfzAIJ9VNep+OkuE6N36B9K -----END CERTIFICATE----- Certplus Class 2 Primary CA =========================== -----BEGIN CERTIFICATE----- MIIDkjCCAnqgAwIBAgIRAIW9S/PY2uNp9pTXX8OlRCMwDQYJKoZIhvcNAQEFBQAwPTELMAkGA1UE BhMCRlIxETAPBgNVBAoTCENlcnRwbHVzMRswGQYDVQQDExJDbGFzcyAyIFByaW1hcnkgQ0EwHhcN OTkwNzA3MTcwNTAwWhcNMTkwNzA2MjM1OTU5WjA9MQswCQYDVQQGEwJGUjERMA8GA1UEChMIQ2Vy dHBsdXMxGzAZBgNVBAMTEkNsYXNzIDIgUHJpbWFyeSBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEP ADCCAQoCggEBANxQltAS+DXSCHh6tlJw/W/uz7kRy1134ezpfgSN1sxvc0NXYKwzCkTsA18cgCSR 5aiRVhKC9+Ar9NuuYS6JEI1rbLqzAr3VNsVINyPi8Fo3UjMXEuLRYE2+L0ER4/YXJQyLkcAbmXuZ Vg2v7tK8R1fjeUl7NIknJITesezpWE7+Tt9avkGtrAjFGA7v0lPubNCdEgETjdyAYveVqUSISnFO YFWe2yMZeVYHDD9jC1yw4r5+FfyUM1hBOHTE4Y+L3yasH7WLO7dDWWuwJKZtkIvEcupdM5i3y95e e++U8Rs+yskhwcWYAqqi9lt3m/V+llU0HGdpwPFC40es/CgcZlUCAwEAAaOBjDCBiTAPBgNVHRME CDAGAQH/AgEKMAsGA1UdDwQEAwIBBjAdBgNVHQ4EFgQU43Mt38sOKAze3bOkynm4jrvoMIkwEQYJ YIZIAYb4QgEBBAQDAgEGMDcGA1UdHwQwMC4wLKAqoCiGJmh0dHA6Ly93d3cuY2VydHBsdXMuY29t L0NSTC9jbGFzczIuY3JsMA0GCSqGSIb3DQEBBQUAA4IBAQCnVM+IRBnL39R/AN9WM2K191EBkOvD P9GIROkkXe/nFL0gt5o8AP5tn9uQ3Nf0YtaLcF3n5QRIqWh8yfFC82x/xXp8HVGIutIKPidd3i1R TtMTZGnkLuPT55sJmabglZvOGtd/vjzOUrMRFcEPF80Du5wlFbqidon8BvEY0JNLDnyCt6X09l/+ 7UCmnYR0ObncHoUW2ikbhiMAybuJfm6AiB4vFLQDJKgybwOaRywwvlbGp0ICcBvqQNi6BQNwB6SW //1IMwrh3KWBkJtN3X3n57LNXMhqlfil9o3EXXgIvnsG1knPGTZQIy4I5p4FTUcY1Rbpsda2ENW7 l7+ijrRU -----END CERTIFICATE----- DST Root CA X3 ============== -----BEGIN CERTIFICATE----- MIIDSjCCAjKgAwIBAgIQRK+wgNajJ7qJMDmGLvhAazANBgkqhkiG9w0BAQUFADA/MSQwIgYDVQQK ExtEaWdpdGFsIFNpZ25hdHVyZSBUcnVzdCBDby4xFzAVBgNVBAMTDkRTVCBSb290IENBIFgzMB4X DTAwMDkzMDIxMTIxOVoXDTIxMDkzMDE0MDExNVowPzEkMCIGA1UEChMbRGlnaXRhbCBTaWduYXR1 cmUgVHJ1c3QgQ28uMRcwFQYDVQQDEw5EU1QgUm9vdCBDQSBYMzCCASIwDQYJKoZIhvcNAQEBBQAD ggEPADCCAQoCggEBAN+v6ZdQCINXtMxiZfaQguzH0yxrMMpb7NnDfcdAwRgUi+DoM3ZJKuM/IUmT rE4Orz5Iy2Xu/NMhD2XSKtkyj4zl93ewEnu1lcCJo6m67XMuegwGMoOifooUMM0RoOEqOLl5CjH9 UL2AZd+3UWODyOKIYepLYYHsUmu5ouJLGiifSKOeDNoJjj4XLh7dIN9bxiqKqy69cK3FCxolkHRy xXtqqzTWMIn/5WgTe1QLyNau7Fqckh49ZLOMxt+/yUFw7BZy1SbsOFU5Q9D8/RhcQPGX69Wam40d utolucbY38EVAjqr2m7xPi71XAicPNaDaeQQmxkqtilX4+U9m5/wAl0CAwEAAaNCMEAwDwYDVR0T AQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFMSnsaR7LHH62+FLkHX/xBVghYkQ MA0GCSqGSIb3DQEBBQUAA4IBAQCjGiybFwBcqR7uKGY3Or+Dxz9LwwmglSBd49lZRNI+DT69ikug dB/OEIKcdBodfpga3csTS7MgROSR6cz8faXbauX+5v3gTt23ADq1cEmv8uXrAvHRAosZy5Q6XkjE GB5YGV8eAlrwDPGxrancWYaLbumR9YbK+rlmM6pZW87ipxZzR8srzJmwN0jP41ZL9c8PDHIyh8bw RLtTcm1D9SZImlJnt1ir/md2cXjbDaJWFBM5JDGFoqgCWjBH4d1QB7wCCZAA62RjYJsWvIjJEubS fZGL+T0yjWW06XyxV3bqxbYoOb8VZRzI9neWagqNdwvYkQsEjgfbKbYK7p2CNTUQ -----END CERTIFICATE----- DST ACES CA X6 ============== -----BEGIN CERTIFICATE----- MIIECTCCAvGgAwIBAgIQDV6ZCtadt3js2AdWO4YV2TANBgkqhkiG9w0BAQUFADBbMQswCQYDVQQG EwJVUzEgMB4GA1UEChMXRGlnaXRhbCBTaWduYXR1cmUgVHJ1c3QxETAPBgNVBAsTCERTVCBBQ0VT MRcwFQYDVQQDEw5EU1QgQUNFUyBDQSBYNjAeFw0wMzExMjAyMTE5NThaFw0xNzExMjAyMTE5NTha MFsxCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdEaWdpdGFsIFNpZ25hdHVyZSBUcnVzdDERMA8GA1UE CxMIRFNUIEFDRVMxFzAVBgNVBAMTDkRTVCBBQ0VTIENBIFg2MIIBIjANBgkqhkiG9w0BAQEFAAOC AQ8AMIIBCgKCAQEAuT31LMmU3HWKlV1j6IR3dma5WZFcRt2SPp/5DgO0PWGSvSMmtWPuktKe1jzI DZBfZIGxqAgNTNj50wUoUrQBJcWVHAx+PhCEdc/BGZFjz+iokYi5Q1K7gLFViYsx+tC3dr5BPTCa pCIlF3PoHuLTrCq9Wzgh1SpL11V94zpVvddtawJXa+ZHfAjIgrrep4c9oW24MFbCswKBXy314pow GCi4ZtPLAZZv6opFVdbgnf9nKxcCpk4aahELfrd755jWjHZvwTvbUJN+5dCOHze4vbrGn2zpfDPy MjwmR/onJALJfh1biEITajV8fTXpLmaRcpPVMibEdPVTo7NdmvYJywIDAQABo4HIMIHFMA8GA1Ud EwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgHGMB8GA1UdEQQYMBaBFHBraS1vcHNAdHJ1c3Rkc3Qu Y29tMGIGA1UdIARbMFkwVwYKYIZIAWUDAgEBATBJMEcGCCsGAQUFBwIBFjtodHRwOi8vd3d3LnRy dXN0ZHN0LmNvbS9jZXJ0aWZpY2F0ZXMvcG9saWN5L0FDRVMtaW5kZXguaHRtbDAdBgNVHQ4EFgQU CXIGThhDD+XWzMNqizF7eI+og7gwDQYJKoZIhvcNAQEFBQADggEBAKPYjtay284F5zLNAdMEA+V2 5FYrnJmQ6AgwbN99Pe7lv7UkQIRJ4dEorsTCOlMwiPH1d25Ryvr/ma8kXxug/fKshMrfqfBfBC6t Fr8hlxCBPeP/h40y3JTlR4peahPJlJU90u7INJXQgNStMgiAVDzgvVJT11J8smk/f3rPanTK+gQq nExaBqXpIK1FZg9p8d2/6eMyi/rgwYZNcjwu2JN4Cir42NInPRmJX1p7ijvMDNpRrscL9yuwNwXs vFcj4jjSm2jzVhKIT0J8uDHEtdvkyCE06UgRNe76x5JXxZ805Mf29w4LTJxoeHtxMcfrHuBnQfO3 oKfN5XozNmr6mis= -----END CERTIFICATE----- SwissSign Gold CA - G2 ====================== -----BEGIN CERTIFICATE----- MIIFujCCA6KgAwIBAgIJALtAHEP1Xk+wMA0GCSqGSIb3DQEBBQUAMEUxCzAJBgNVBAYTAkNIMRUw EwYDVQQKEwxTd2lzc1NpZ24gQUcxHzAdBgNVBAMTFlN3aXNzU2lnbiBHb2xkIENBIC0gRzIwHhcN MDYxMDI1MDgzMDM1WhcNMzYxMDI1MDgzMDM1WjBFMQswCQYDVQQGEwJDSDEVMBMGA1UEChMMU3dp c3NTaWduIEFHMR8wHQYDVQQDExZTd2lzc1NpZ24gR29sZCBDQSAtIEcyMIICIjANBgkqhkiG9w0B AQEFAAOCAg8AMIICCgKCAgEAr+TufoskDhJuqVAtFkQ7kpJcyrhdhJJCEyq8ZVeCQD5XJM1QiyUq t2/876LQwB8CJEoTlo8jE+YoWACjR8cGp4QjK7u9lit/VcyLwVcfDmJlD909Vopz2q5+bbqBHH5C jCA12UNNhPqE21Is8w4ndwtrvxEvcnifLtg+5hg3Wipy+dpikJKVyh+c6bM8K8vzARO/Ws/BtQpg vd21mWRTuKCWs2/iJneRjOBiEAKfNA+k1ZIzUd6+jbqEemA8atufK+ze3gE/bk3lUIbLtK/tREDF ylqM2tIrfKjuvqblCqoOpd8FUrdVxyJdMmqXl2MT28nbeTZ7hTpKxVKJ+STnnXepgv9VHKVxaSvR AiTysybUa9oEVeXBCsdtMDeQKuSeFDNeFhdVxVu1yzSJkvGdJo+hB9TGsnhQ2wwMC3wLjEHXuend jIj3o02yMszYF9rNt85mndT9Xv+9lz4pded+p2JYryU0pUHHPbwNUMoDAw8IWh+Vc3hiv69yFGkO peUDDniOJihC8AcLYiAQZzlG+qkDzAQ4embvIIO1jEpWjpEA/I5cgt6IoMPiaG59je883WX0XaxR 7ySArqpWl2/5rX3aYT+YdzylkbYcjCbaZaIJbcHiVOO5ykxMgI93e2CaHt+28kgeDrpOVG2Y4OGi GqJ3UM/EY5LsRxmd6+ZrzsECAwEAAaOBrDCBqTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUw AwEB/zAdBgNVHQ4EFgQUWyV7lqRlUX64OfPAeGZe6Drn8O4wHwYDVR0jBBgwFoAUWyV7lqRlUX64 OfPAeGZe6Drn8O4wRgYDVR0gBD8wPTA7BglghXQBWQECAQEwLjAsBggrBgEFBQcCARYgaHR0cDov L3JlcG9zaXRvcnkuc3dpc3NzaWduLmNvbS8wDQYJKoZIhvcNAQEFBQADggIBACe645R88a7A3hfm 5djV9VSwg/S7zV4Fe0+fdWavPOhWfvxyeDgD2StiGwC5+OlgzczOUYrHUDFu4Up+GC9pWbY9ZIEr 44OE5iKHjn3g7gKZYbge9LgriBIWhMIxkziWMaa5O1M/wySTVltpkuzFwbs4AOPsF6m43Md8AYOf Mke6UiI0HTJ6CVanfCU2qT1L2sCCbwq7EsiHSycR+R4tx5M/nttfJmtS2S6K8RTGRI0Vqbe/vd6m Gu6uLftIdxf+u+yvGPUqUfA5hJeVbG4bwyvEdGB5JbAKJ9/fXtI5z0V9QkvfsywexcZdylU6oJxp mo/a77KwPJ+HbBIrZXAVUjEaJM9vMSNQH4xPjyPDdEFjHFWoFN0+4FFQz/EbMFYOkrCChdiDyyJk vC24JdVUorgG6q2SpCSgwYa1ShNqR88uC1aVVMvOmttqtKay20EIhid392qgQmwLOM7XdVAyksLf KzAiSNDVQTglXaTpXZ/GlHXQRf0wl0OPkKsKx4ZzYEppLd6leNcG2mqeSz53OiATIgHQv2ieY2Br NU0LbbqhPcCT4H8js1WtciVORvnSFu+wZMEBnunKoGqYDs/YYPIvSbjkQuE4NRb0yG5P94FW6Lqj viOvrv1vA+ACOzB2+httQc8Bsem4yWb02ybzOqR08kkkW8mw0FfB+j564ZfJ -----END CERTIFICATE----- SwissSign Silver CA - G2 ======================== -----BEGIN CERTIFICATE----- MIIFvTCCA6WgAwIBAgIITxvUL1S7L0swDQYJKoZIhvcNAQEFBQAwRzELMAkGA1UEBhMCQ0gxFTAT BgNVBAoTDFN3aXNzU2lnbiBBRzEhMB8GA1UEAxMYU3dpc3NTaWduIFNpbHZlciBDQSAtIEcyMB4X DTA2MTAyNTA4MzI0NloXDTM2MTAyNTA4MzI0NlowRzELMAkGA1UEBhMCQ0gxFTATBgNVBAoTDFN3 aXNzU2lnbiBBRzEhMB8GA1UEAxMYU3dpc3NTaWduIFNpbHZlciBDQSAtIEcyMIICIjANBgkqhkiG 9w0BAQEFAAOCAg8AMIICCgKCAgEAxPGHf9N4Mfc4yfjDmUO8x/e8N+dOcbpLj6VzHVxumK4DV644 N0MvFz0fyM5oEMF4rhkDKxD6LHmD9ui5aLlV8gREpzn5/ASLHvGiTSf5YXu6t+WiE7brYT7QbNHm +/pe7R20nqA1W6GSy/BJkv6FCgU+5tkL4k+73JU3/JHpMjUi0R86TieFnbAVlDLaYQ1HTWBCrpJH 6INaUFjpiou5XaHc3ZlKHzZnu0jkg7Y360g6rw9njxcH6ATK72oxh9TAtvmUcXtnZLi2kUpCe2Uu MGoM9ZDulebyzYLs2aFK7PayS+VFheZteJMELpyCbTapxDFkH4aDCyr0NQp4yVXPQbBH6TCfmb5h qAaEuSh6XzjZG6k4sIN/c8HDO0gqgg8hm7jMqDXDhBuDsz6+pJVpATqJAHgE2cn0mRmrVn5bi4Y5 FZGkECwJMoBgs5PAKrYYC51+jUnyEEp/+dVGLxmSo5mnJqy7jDzmDrxHB9xzUfFwZC8I+bRHHTBs ROopN4WSaGa8gzj+ezku01DwH/teYLappvonQfGbGHLy9YR0SslnxFSuSGTfjNFusB3hB48IHpmc celM2KX3RxIfdNFRnobzwqIjQAtz20um53MGjMGg6cFZrEb65i/4z3GcRm25xBWNOHkDRUjvxF3X CO6HOSKGsg0PWEP3calILv3q1h8CAwEAAaOBrDCBqTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/ BAUwAwEB/zAdBgNVHQ4EFgQUF6DNweRBtjpbO8tFnb0cwpj6hlgwHwYDVR0jBBgwFoAUF6DNweRB tjpbO8tFnb0cwpj6hlgwRgYDVR0gBD8wPTA7BglghXQBWQEDAQEwLjAsBggrBgEFBQcCARYgaHR0 cDovL3JlcG9zaXRvcnkuc3dpc3NzaWduLmNvbS8wDQYJKoZIhvcNAQEFBQADggIBAHPGgeAn0i0P 4JUw4ppBf1AsX19iYamGamkYDHRJ1l2E6kFSGG9YrVBWIGrGvShpWJHckRE1qTodvBqlYJ7YH39F kWnZfrt4csEGDyrOj4VwYaygzQu4OSlWhDJOhrs9xCrZ1x9y7v5RoSJBsXECYxqCsGKrXlcSH9/L 3XWgwF15kIwb4FDm3jH+mHtwX6WQ2K34ArZv02DdQEsixT2tOnqfGhpHkXkzuoLcMmkDlm4fS/Bx /uNncqCxv1yL5PqZIseEuRuNI5c/7SXgz2W79WEE790eslpBIlqhn10s6FvJbakMDHiqYMZWjwFa DGi8aRl5xB9+lwW/xekkUV7U1UtT7dkjWjYDZaPBA61BMPNGG4WQr2W11bHkFlt4dR2Xem1ZqSqP e97Dh4kQmUlzeMg9vVE1dCrV8X5pGyq7O70luJpaPXJhkGaH7gzWTdQRdAtq/gsD/KNVV4n+Ssuu WxcFyPKNIzFTONItaj+CuY0IavdeQXRuwxF+B6wpYJE/OMpXEA29MC/HpeZBoNquBYeaoKRlbEwJ DIm6uNO5wJOKMPqN5ZprFQFOZ6raYlY+hAhm0sQ2fac+EPyI4NSA5QC9qvNOBqN6avlicuMJT+ub DgEj8Z+7fNzcbBGXJbLytGMU0gYqZ4yD9c7qB9iaah7s5Aq7KkzrCWA5zspi2C5u -----END CERTIFICATE----- GeoTrust Primary Certification Authority ======================================== -----BEGIN CERTIFICATE----- MIIDfDCCAmSgAwIBAgIQGKy1av1pthU6Y2yv2vrEoTANBgkqhkiG9w0BAQUFADBYMQswCQYDVQQG EwJVUzEWMBQGA1UEChMNR2VvVHJ1c3QgSW5jLjExMC8GA1UEAxMoR2VvVHJ1c3QgUHJpbWFyeSBD ZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0wNjExMjcwMDAwMDBaFw0zNjA3MTYyMzU5NTlaMFgx CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMTEwLwYDVQQDEyhHZW9UcnVzdCBQ cmltYXJ5IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB CgKCAQEAvrgVe//UfH1nrYNke8hCUy3f9oQIIGHWAVlqnEQRr+92/ZV+zmEwu3qDXwK9AWbK7hWN b6EwnL2hhZ6UOvNWiAAxz9juapYC2e0DjPt1befquFUWBRaa9OBesYjAZIVcFU2Ix7e64HXprQU9 nceJSOC7KMgD4TCTZF5SwFlwIjVXiIrxlQqD17wxcwE07e9GceBrAqg1cmuXm2bgyxx5X9gaBGge RwLmnWDiNpcB3841kt++Z8dtd1k7j53WkBWUvEI0EME5+bEnPn7WinXFsq+W06Lem+SYvn3h6YGt tm/81w7a4DSwDRp35+MImO9Y+pyEtzavwt+s0vQQBnBxNQIDAQABo0IwQDAPBgNVHRMBAf8EBTAD AQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQULNVQQZcVi/CPNmFbSvtr2ZnJM5IwDQYJKoZI hvcNAQEFBQADggEBAFpwfyzdtzRP9YZRqSa+S7iq8XEN3GHHoOo0Hnp3DwQ16CePbJC/kRYkRj5K Ts4rFtULUh38H2eiAkUxT87z+gOneZ1TatnaYzr4gNfTmeGl4b7UVXGYNTq+k+qurUKykG/g/CFN NWMziUnWm07Kx+dOCQD32sfvmWKZd7aVIl6KoKv0uHiYyjgZmclynnjNS6yvGaBzEi38wkG6gZHa Floxt/m0cYASSJlyc1pZU8FjUjPtp8nSOQJw+uCxQmYpqptR7TBUIhRf2asdweSU8Pj1K/fqynhG 1riR/aYNKxoUAT6A8EKglQdebc3MS6RFjasS6LPeWuWgfOgPIh1a6Vk= -----END CERTIFICATE----- thawte Primary Root CA ====================== -----BEGIN CERTIFICATE----- MIIEIDCCAwigAwIBAgIQNE7VVyDV7exJ9C/ON9srbTANBgkqhkiG9w0BAQUFADCBqTELMAkGA1UE BhMCVVMxFTATBgNVBAoTDHRoYXd0ZSwgSW5jLjEoMCYGA1UECxMfQ2VydGlmaWNhdGlvbiBTZXJ2 aWNlcyBEaXZpc2lvbjE4MDYGA1UECxMvKGMpIDIwMDYgdGhhd3RlLCBJbmMuIC0gRm9yIGF1dGhv cml6ZWQgdXNlIG9ubHkxHzAdBgNVBAMTFnRoYXd0ZSBQcmltYXJ5IFJvb3QgQ0EwHhcNMDYxMTE3 MDAwMDAwWhcNMzYwNzE2MjM1OTU5WjCBqTELMAkGA1UEBhMCVVMxFTATBgNVBAoTDHRoYXd0ZSwg SW5jLjEoMCYGA1UECxMfQ2VydGlmaWNhdGlvbiBTZXJ2aWNlcyBEaXZpc2lvbjE4MDYGA1UECxMv KGMpIDIwMDYgdGhhd3RlLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxHzAdBgNVBAMT FnRoYXd0ZSBQcmltYXJ5IFJvb3QgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCs oPD7gFnUnMekz52hWXMJEEUMDSxuaPFsW0hoSVk3/AszGcJ3f8wQLZU0HObrTQmnHNK4yZc2AreJ 1CRfBsDMRJSUjQJib+ta3RGNKJpchJAQeg29dGYvajig4tVUROsdB58Hum/u6f1OCyn1PoSgAfGc q/gcfomk6KHYcWUNo1F77rzSImANuVud37r8UVsLr5iy6S7pBOhih94ryNdOwUxkHt3Ph1i6Sk/K aAcdHJ1KxtUvkcx8cXIcxcBn6zL9yZJclNqFwJu/U30rCfSMnZEfl2pSy94JNqR32HuHUETVPm4p afs5SSYeCaWAe0At6+gnhcn+Yf1+5nyXHdWdAgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYD VR0PAQH/BAQDAgEGMB0GA1UdDgQWBBR7W0XPr87Lev0xkhpqtvNG61dIUDANBgkqhkiG9w0BAQUF AAOCAQEAeRHAS7ORtvzw6WfUDW5FvlXok9LOAz/t2iWwHVfLHjp2oEzsUHboZHIMpKnxuIvW1oeE uzLlQRHAd9mzYJ3rG9XRbkREqaYB7FViHXe4XI5ISXycO1cRrK1zN44veFyQaEfZYGDm/Ac9IiAX xPcW6cTYcvnIc3zfFi8VqT79aie2oetaupgf1eNNZAqdE8hhuvU5HIe6uL17In/2/qxAeeWsEG89 jxt5dovEN7MhGITlNgDrYyCZuen+MwS7QcjBAvlEYyCegc5C09Y/LHbTY5xZ3Y+m4Q6gLkH3LpVH z7z9M/P2C2F+fpErgUfCJzDupxBdN49cOSvkBPB7jVaMaA== -----END CERTIFICATE----- VeriSign Class 3 Public Primary Certification Authority - G5 ============================================================ -----BEGIN CERTIFICATE----- MIIE0zCCA7ugAwIBAgIQGNrRniZ96LtKIVjNzGs7SjANBgkqhkiG9w0BAQUFADCByjELMAkGA1UE BhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQLExZWZXJpU2lnbiBUcnVzdCBO ZXR3b3JrMTowOAYDVQQLEzEoYykgMjAwNiBWZXJpU2lnbiwgSW5jLiAtIEZvciBhdXRob3JpemVk IHVzZSBvbmx5MUUwQwYDVQQDEzxWZXJpU2lnbiBDbGFzcyAzIFB1YmxpYyBQcmltYXJ5IENlcnRp ZmljYXRpb24gQXV0aG9yaXR5IC0gRzUwHhcNMDYxMTA4MDAwMDAwWhcNMzYwNzE2MjM1OTU5WjCB yjELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQLExZWZXJpU2ln biBUcnVzdCBOZXR3b3JrMTowOAYDVQQLEzEoYykgMjAwNiBWZXJpU2lnbiwgSW5jLiAtIEZvciBh dXRob3JpemVkIHVzZSBvbmx5MUUwQwYDVQQDEzxWZXJpU2lnbiBDbGFzcyAzIFB1YmxpYyBQcmlt YXJ5IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0gRzUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw ggEKAoIBAQCvJAgIKXo1nmAMqudLO07cfLw8RRy7K+D+KQL5VwijZIUVJ/XxrcgxiV0i6CqqpkKz j/i5Vbext0uz/o9+B1fs70PbZmIVYc9gDaTY3vjgw2IIPVQT60nKWVSFJuUrjxuf6/WhkcIzSdhD Y2pSS9KP6HBRTdGJaXvHcPaz3BJ023tdS1bTlr8Vd6Gw9KIl8q8ckmcY5fQGBO+QueQA5N06tRn/ Arr0PO7gi+s3i+z016zy9vA9r911kTMZHRxAy3QkGSGT2RT+rCpSx4/VBEnkjWNHiDxpg8v+R70r fk/Fla4OndTRQ8Bnc+MUCH7lP59zuDMKz10/NIeWiu5T6CUVAgMBAAGjgbIwga8wDwYDVR0TAQH/ BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwbQYIKwYBBQUHAQwEYTBfoV2gWzBZMFcwVRYJaW1hZ2Uv Z2lmMCEwHzAHBgUrDgMCGgQUj+XTGoasjY5rw8+AatRIGCx7GS4wJRYjaHR0cDovL2xvZ28udmVy aXNpZ24uY29tL3ZzbG9nby5naWYwHQYDVR0OBBYEFH/TZafC3ey78DAJ80M5+gKvMzEzMA0GCSqG SIb3DQEBBQUAA4IBAQCTJEowX2LP2BqYLz3q3JktvXf2pXkiOOzEp6B4Eq1iDkVwZMXnl2YtmAl+ X6/WzChl8gGqCBpH3vn5fJJaCGkgDdk+bW48DW7Y5gaRQBi5+MHt39tBquCWIMnNZBU4gcmU7qKE KQsTb47bDN0lAtukixlE0kF6BWlKWE9gyn6CagsCqiUXObXbf+eEZSqVir2G3l6BFoMtEMze/aiC Km0oHw0LxOXnGiYZ4fQRbxC1lfznQgUy286dUV4otp6F01vvpX1FQHKOtw5rDgb7MzVIcbidJ4vE ZV8NhnacRHr2lVz2XTIIM6RUthg/aFzyQkqFOFSDX9HoLPKsEdao7WNq -----END CERTIFICATE----- SecureTrust CA ============== -----BEGIN CERTIFICATE----- MIIDuDCCAqCgAwIBAgIQDPCOXAgWpa1Cf/DrJxhZ0DANBgkqhkiG9w0BAQUFADBIMQswCQYDVQQG EwJVUzEgMB4GA1UEChMXU2VjdXJlVHJ1c3QgQ29ycG9yYXRpb24xFzAVBgNVBAMTDlNlY3VyZVRy dXN0IENBMB4XDTA2MTEwNzE5MzExOFoXDTI5MTIzMTE5NDA1NVowSDELMAkGA1UEBhMCVVMxIDAe BgNVBAoTF1NlY3VyZVRydXN0IENvcnBvcmF0aW9uMRcwFQYDVQQDEw5TZWN1cmVUcnVzdCBDQTCC ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKukgeWVzfX2FI7CT8rU4niVWJxB4Q2ZQCQX OZEzZum+4YOvYlyJ0fwkW2Gz4BERQRwdbvC4u/jep4G6pkjGnx29vo6pQT64lO0pGtSO0gMdA+9t DWccV9cGrcrI9f4Or2YlSASWC12juhbDCE/RRvgUXPLIXgGZbf2IzIaowW8xQmxSPmjL8xk037uH GFaAJsTQ3MBv396gwpEWoGQRS0S8Hvbn+mPeZqx2pHGj7DaUaHp3pLHnDi+BeuK1cobvomuL8A/b 01k/unK8RCSc43Oz969XL0Imnal0ugBS8kvNU3xHCzaFDmapCJcWNFfBZveA4+1wVMeT4C4oFVmH ursCAwEAAaOBnTCBmjATBgkrBgEEAYI3FAIEBh4EAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/ BAUwAwEB/zAdBgNVHQ4EFgQUQjK2FvoE/f5dS3rD/fdMQB1aQ68wNAYDVR0fBC0wKzApoCegJYYj aHR0cDovL2NybC5zZWN1cmV0cnVzdC5jb20vU1RDQS5jcmwwEAYJKwYBBAGCNxUBBAMCAQAwDQYJ KoZIhvcNAQEFBQADggEBADDtT0rhWDpSclu1pqNlGKa7UTt36Z3q059c4EVlew3KW+JwULKUBRSu SceNQQcSc5R+DCMh/bwQf2AQWnL1mA6s7Ll/3XpvXdMc9P+IBWlCqQVxyLesJugutIxq/3HcuLHf mbx8IVQr5Fiiu1cprp6poxkmD5kuCLDv/WnPmRoJjeOnnyvJNjR7JLN4TJUXpAYmHrZkUjZfYGfZ nMUFdAvnZyPSCPyI6a6Lf+Ew9Dd+/cYy2i2eRDAwbO4H3tI0/NL/QPZL9GZGBlSm8jIKYyYwa5vR 3ItHuuG51WLQoqD0ZwV4KWMabwTW+MZMo5qxN7SN5ShLHZ4swrhovO0C7jE= -----END CERTIFICATE----- Secure Global CA ================ -----BEGIN CERTIFICATE----- MIIDvDCCAqSgAwIBAgIQB1YipOjUiolN9BPI8PjqpTANBgkqhkiG9w0BAQUFADBKMQswCQYDVQQG EwJVUzEgMB4GA1UEChMXU2VjdXJlVHJ1c3QgQ29ycG9yYXRpb24xGTAXBgNVBAMTEFNlY3VyZSBH bG9iYWwgQ0EwHhcNMDYxMTA3MTk0MjI4WhcNMjkxMjMxMTk1MjA2WjBKMQswCQYDVQQGEwJVUzEg MB4GA1UEChMXU2VjdXJlVHJ1c3QgQ29ycG9yYXRpb24xGTAXBgNVBAMTEFNlY3VyZSBHbG9iYWwg Q0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCvNS7YrGxVaQZx5RNoJLNP2MwhR/jx YDiJiQPpvepeRlMJ3Fz1Wuj3RSoC6zFh1ykzTM7HfAo3fg+6MpjhHZevj8fcyTiW89sa/FHtaMbQ bqR8JNGuQsiWUGMu4P51/pinX0kuleM5M2SOHqRfkNJnPLLZ/kG5VacJjnIFHovdRIWCQtBJwB1g 8NEXLJXr9qXBkqPFwqcIYA1gBBCWeZ4WNOaptvolRTnIHmX5k/Wq8VLcmZg9pYYaDDUz+kulBAYV HDGA76oYa8J719rO+TMg1fW9ajMtgQT7sFzUnKPiXB3jqUJ1XnvUd+85VLrJChgbEplJL4hL/VBi 0XPnj3pDAgMBAAGjgZ0wgZowEwYJKwYBBAGCNxQCBAYeBABDAEEwCwYDVR0PBAQDAgGGMA8GA1Ud EwEB/wQFMAMBAf8wHQYDVR0OBBYEFK9EBMJBfkiD2045AuzshHrmzsmkMDQGA1UdHwQtMCswKaAn oCWGI2h0dHA6Ly9jcmwuc2VjdXJldHJ1c3QuY29tL1NHQ0EuY3JsMBAGCSsGAQQBgjcVAQQDAgEA MA0GCSqGSIb3DQEBBQUAA4IBAQBjGghAfaReUw132HquHw0LURYD7xh8yOOvaliTFGCRsoTciE6+ OYo68+aCiV0BN7OrJKQVDpI1WkpEXk5X+nXOH0jOZvQ8QCaSmGwb7iRGDBezUqXbpZGRzzfTb+cn CDpOGR86p1hcF895P4vkp9MmI50mD1hp/Ed+stCNi5O/KU9DaXR2Z0vPB4zmAve14bRDtUstFJ/5 3CYNv6ZHdAbYiNE6KTCEztI5gGIbqMdXSbxqVVFnFUq+NQfk1XWYN3kwFNspnWzFacxHVaIw98xc f8LDmBxrThaA63p4ZUWiABqvDA1VZDRIuJK58bRQKfJPIx/abKwfROHdI3hRW8cW -----END CERTIFICATE----- COMODO Certification Authority ============================== -----BEGIN CERTIFICATE----- MIIEHTCCAwWgAwIBAgIQToEtioJl4AsC7j41AkblPTANBgkqhkiG9w0BAQUFADCBgTELMAkGA1UE BhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgG A1UEChMRQ09NT0RPIENBIExpbWl0ZWQxJzAlBgNVBAMTHkNPTU9ETyBDZXJ0aWZpY2F0aW9uIEF1 dGhvcml0eTAeFw0wNjEyMDEwMDAwMDBaFw0yOTEyMzEyMzU5NTlaMIGBMQswCQYDVQQGEwJHQjEb MBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFD T01PRE8gQ0EgTGltaXRlZDEnMCUGA1UEAxMeQ09NT0RPIENlcnRpZmljYXRpb24gQXV0aG9yaXR5 MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0ECLi3LjkRv3UcEbVASY06m/weaKXTuH +7uIzg3jLz8GlvCiKVCZrts7oVewdFFxze1CkU1B/qnI2GqGd0S7WWaXUF601CxwRM/aN5VCaTww xHGzUvAhTaHYujl8HJ6jJJ3ygxaYqhZ8Q5sVW7euNJH+1GImGEaaP+vB+fGQV+useg2L23IwambV 4EajcNxo2f8ESIl33rXp+2dtQem8Ob0y2WIC8bGoPW43nOIv4tOiJovGuFVDiOEjPqXSJDlqR6sA 1KGzqSX+DT+nHbrTUcELpNqsOO9VUCQFZUaTNE8tja3G1CEZ0o7KBWFxB3NH5YoZEr0ETc5OnKVI rLsm9wIDAQABo4GOMIGLMB0GA1UdDgQWBBQLWOWLxkwVN6RAqTCpIb5HNlpW/zAOBgNVHQ8BAf8E BAMCAQYwDwYDVR0TAQH/BAUwAwEB/zBJBgNVHR8EQjBAMD6gPKA6hjhodHRwOi8vY3JsLmNvbW9k b2NhLmNvbS9DT01PRE9DZXJ0aWZpY2F0aW9uQXV0aG9yaXR5LmNybDANBgkqhkiG9w0BAQUFAAOC AQEAPpiem/Yb6dc5t3iuHXIYSdOH5EOC6z/JqvWote9VfCFSZfnVDeFs9D6Mk3ORLgLETgdxb8CP OGEIqB6BCsAvIC9Bi5HcSEW88cbeunZrM8gALTFGTO3nnc+IlP8zwFboJIYmuNg4ON8qa90SzMc/ RxdMosIGlgnW2/4/PEZB31jiVg88O8EckzXZOFKs7sjsLjBOlDW0JB9LeGna8gI4zJVSk/BwJVmc IGfE7vmLV2H0knZ9P4SNVbfo5azV8fUZVqZa+5Acr5Pr5RzUZ5ddBA6+C4OmF4O5MBKgxTMVBbkN +8cFduPYSo38NBejxiEovjBFMR7HeL5YYTisO+IBZQ== -----END CERTIFICATE----- Network Solutions Certificate Authority ======================================= -----BEGIN CERTIFICATE----- MIID5jCCAs6gAwIBAgIQV8szb8JcFuZHFhfjkDFo4DANBgkqhkiG9w0BAQUFADBiMQswCQYDVQQG EwJVUzEhMB8GA1UEChMYTmV0d29yayBTb2x1dGlvbnMgTC5MLkMuMTAwLgYDVQQDEydOZXR3b3Jr IFNvbHV0aW9ucyBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHhcNMDYxMjAxMDAwMDAwWhcNMjkxMjMx MjM1OTU5WjBiMQswCQYDVQQGEwJVUzEhMB8GA1UEChMYTmV0d29yayBTb2x1dGlvbnMgTC5MLkMu MTAwLgYDVQQDEydOZXR3b3JrIFNvbHV0aW9ucyBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwggEiMA0G CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDkvH6SMG3G2I4rC7xGzuAnlt7e+foS0zwzc7MEL7xx jOWftiJgPl9dzgn/ggwbmlFQGiaJ3dVhXRncEg8tCqJDXRfQNJIg6nPPOCwGJgl6cvf6UDL4wpPT aaIjzkGxzOTVHzbRijr4jGPiFFlp7Q3Tf2vouAPlT2rlmGNpSAW+Lv8ztumXWWn4Zxmuk2GWRBXT crA/vGp97Eh/jcOrqnErU2lBUzS1sLnFBgrEsEX1QV1uiUV7PTsmjHTC5dLRfbIR1PtYMiKagMnc /Qzpf14Dl847ABSHJ3A4qY5usyd2mFHgBeMhqxrVhSI8KbWaFsWAqPS7azCPL0YCorEMIuDTAgMB AAGjgZcwgZQwHQYDVR0OBBYEFCEwyfsA106Y2oeqKtCnLrFAMadMMA4GA1UdDwEB/wQEAwIBBjAP BgNVHRMBAf8EBTADAQH/MFIGA1UdHwRLMEkwR6BFoEOGQWh0dHA6Ly9jcmwubmV0c29sc3NsLmNv bS9OZXR3b3JrU29sdXRpb25zQ2VydGlmaWNhdGVBdXRob3JpdHkuY3JsMA0GCSqGSIb3DQEBBQUA A4IBAQC7rkvnt1frf6ott3NHhWrB5KUd5Oc86fRZZXe1eltajSU24HqXLjjAV2CDmAaDn7l2em5Q 4LqILPxFzBiwmZVRDuwduIj/h1AcgsLj4DKAv6ALR8jDMe+ZZzKATxcheQxpXN5eNK4CtSbqUN9/ GGUsyfJj4akH/nxxH2szJGoeBfcFaMBqEssuXmHLrijTfsK0ZpEmXzwuJF/LWA/rKOyvEZbz3Htv wKeI8lN3s2Berq4o2jUsbzRF0ybh3uxbTydrFny9RAQYgrOJeRcQcT16ohZO9QHNpGxlaKFJdlxD ydi8NmdspZS11My5vWo1ViHe2MPr+8ukYEywVaCge1ey -----END CERTIFICATE----- COMODO ECC Certification Authority ================================== -----BEGIN CERTIFICATE----- MIICiTCCAg+gAwIBAgIQH0evqmIAcFBUTAGem2OZKjAKBggqhkjOPQQDAzCBhTELMAkGA1UEBhMC R0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgGA1UE ChMRQ09NT0RPIENBIExpbWl0ZWQxKzApBgNVBAMTIkNPTU9ETyBFQ0MgQ2VydGlmaWNhdGlvbiBB dXRob3JpdHkwHhcNMDgwMzA2MDAwMDAwWhcNMzgwMTE4MjM1OTU5WjCBhTELMAkGA1UEBhMCR0Ix GzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgGA1UEChMR Q09NT0RPIENBIExpbWl0ZWQxKzApBgNVBAMTIkNPTU9ETyBFQ0MgQ2VydGlmaWNhdGlvbiBBdXRo b3JpdHkwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQDR3svdcmCFYX7deSRFtSrYpn1PlILBs5BAH+X 4QokPB0BBO490o0JlwzgdeT6+3eKKvUDYEs2ixYjFq0JcfRK9ChQtP6IHG4/bC8vCVlbpVsLM5ni wz2J+Wos77LTBumjQjBAMB0GA1UdDgQWBBR1cacZSBm8nZ3qQUfflMRId5nTeTAOBgNVHQ8BAf8E BAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAKBggqhkjOPQQDAwNoADBlAjEA7wNbeqy3eApyt4jf/7VG FAkK+qDmfQjGGoe9GKhzvSbKYAydzpmfz1wPMOG+FDHqAjAU9JM8SaczepBGR7NjfRObTrdvGDeA U/7dIOA1mjbRxwG55tzd8/8dLDoWV9mSOdY= -----END CERTIFICATE----- Security Communication EV RootCA1 ================================= -----BEGIN CERTIFICATE----- MIIDfTCCAmWgAwIBAgIBADANBgkqhkiG9w0BAQUFADBgMQswCQYDVQQGEwJKUDElMCMGA1UEChMc U0VDT00gVHJ1c3QgU3lzdGVtcyBDTy4sTFRELjEqMCgGA1UECxMhU2VjdXJpdHkgQ29tbXVuaWNh dGlvbiBFViBSb290Q0ExMB4XDTA3MDYwNjAyMTIzMloXDTM3MDYwNjAyMTIzMlowYDELMAkGA1UE BhMCSlAxJTAjBgNVBAoTHFNFQ09NIFRydXN0IFN5c3RlbXMgQ08uLExURC4xKjAoBgNVBAsTIVNl Y3VyaXR5IENvbW11bmljYXRpb24gRVYgUm9vdENBMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCC AQoCggEBALx/7FebJOD+nLpCeamIivqA4PUHKUPqjgo0No0c+qe1OXj/l3X3L+SqawSERMqm4miO /VVQYg+kcQ7OBzgtQoVQrTyWb4vVog7P3kmJPdZkLjjlHmy1V4qe70gOzXppFodEtZDkBp2uoQSX WHnvIEqCa4wiv+wfD+mEce3xDuS4GBPMVjZd0ZoeUWs5bmB2iDQL87PRsJ3KYeJkHcFGB7hj3R4z ZbOOCVVSPbW9/wfrrWFVGCypaZhKqkDFMxRldAD5kd6vA0jFQFTcD4SQaCDFkpbcLuUCRarAX1T4 bepJz11sS6/vmsJWXMY1VkJqMF/Cq/biPT+zyRGPMUzXn0kCAwEAAaNCMEAwHQYDVR0OBBYEFDVK 9U2vP9eCOKyrcWUXdYydVZPmMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MA0GCSqG SIb3DQEBBQUAA4IBAQCoh+ns+EBnXcPBZsdAS5f8hxOQWsTvoMpfi7ent/HWtWS3irO4G8za+6xm iEHO6Pzk2x6Ipu0nUBsCMCRGef4Eh3CXQHPRwMFXGZpppSeZq51ihPZRwSzJIxXYKLerJRO1RuGG Av8mjMSIkh1W/hln8lXkgKNrnKt34VFxDSDbEJrbvXZ5B3eZKK2aXtqxT0QsNY6llsf9g/BYxnnW mHyojf6GPgcWkuF75x3sM3Z+Qi5KhfmRiWiEA4Glm5q+4zfFVKtWOxgtQaQM+ELbmaDgcm+7XeEW T1MKZPlO9L9OVL14bIjqv5wTJMJwaaJ/D8g8rQjJsJhAoyrniIPtd490 -----END CERTIFICATE----- OISTE WISeKey Global Root GA CA =============================== -----BEGIN CERTIFICATE----- MIID8TCCAtmgAwIBAgIQQT1yx/RrH4FDffHSKFTfmjANBgkqhkiG9w0BAQUFADCBijELMAkGA1UE BhMCQ0gxEDAOBgNVBAoTB1dJU2VLZXkxGzAZBgNVBAsTEkNvcHlyaWdodCAoYykgMjAwNTEiMCAG A1UECxMZT0lTVEUgRm91bmRhdGlvbiBFbmRvcnNlZDEoMCYGA1UEAxMfT0lTVEUgV0lTZUtleSBH bG9iYWwgUm9vdCBHQSBDQTAeFw0wNTEyMTExNjAzNDRaFw0zNzEyMTExNjA5NTFaMIGKMQswCQYD VQQGEwJDSDEQMA4GA1UEChMHV0lTZUtleTEbMBkGA1UECxMSQ29weXJpZ2h0IChjKSAyMDA1MSIw IAYDVQQLExlPSVNURSBGb3VuZGF0aW9uIEVuZG9yc2VkMSgwJgYDVQQDEx9PSVNURSBXSVNlS2V5 IEdsb2JhbCBSb290IEdBIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAy0+zAJs9 Nt350UlqaxBJH+zYK7LG+DKBKUOVTJoZIyEVRd7jyBxRVVuuk+g3/ytr6dTqvirdqFEr12bDYVxg Asj1znJ7O7jyTmUIms2kahnBAbtzptf2w93NvKSLtZlhuAGio9RN1AU9ka34tAhxZK9w8RxrfvbD d50kc3vkDIzh2TbhmYsFmQvtRTEJysIA2/dyoJaqlYfQjse2YXMNdmaM3Bu0Y6Kff5MTMPGhJ9vZ /yxViJGg4E8HsChWjBgbl0SOid3gF27nKu+POQoxhILYQBRJLnpB5Kf+42TMwVlxSywhp1t94B3R LoGbw9ho972WG6xwsRYUC9tguSYBBQIDAQABo1EwTzALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUw AwEB/zAdBgNVHQ4EFgQUswN+rja8sHnR3JQmthG+IbJphpQwEAYJKwYBBAGCNxUBBAMCAQAwDQYJ KoZIhvcNAQEFBQADggEBAEuh/wuHbrP5wUOxSPMowB0uyQlB+pQAHKSkq0lPjz0e701vvbyk9vIm MMkQyh2I+3QZH4VFvbBsUfk2ftv1TDI6QU9bR8/oCy22xBmddMVHxjtqD6wU2zz0c5ypBd8A3HR4 +vg1YFkCExh8vPtNsCBtQ7tgMHpnM1zFmdH4LTlSc/uMqpclXHLZCB6rTjzjgTGfA6b7wP4piFXa hNVQA7bihKOmNqoROgHhGEvWRGizPflTdISzRpFGlgC3gCy24eMQ4tui5yiPAZZiFj4A4xylNoEY okxSdsARo27mHbrjWr42U8U+dY+GaSlYU7Wcu2+fXMUY7N0v4ZjJ/L7fCg0= -----END CERTIFICATE----- Certigna ======== -----BEGIN CERTIFICATE----- MIIDqDCCApCgAwIBAgIJAP7c4wEPyUj/MA0GCSqGSIb3DQEBBQUAMDQxCzAJBgNVBAYTAkZSMRIw EAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25hMB4XDTA3MDYyOTE1MTMwNVoXDTI3 MDYyOTE1MTMwNVowNDELMAkGA1UEBhMCRlIxEjAQBgNVBAoMCURoaW15b3RpczERMA8GA1UEAwwI Q2VydGlnbmEwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDIaPHJ1tazNHUmgh7stL7q XOEm7RFHYeGifBZ4QCHkYJ5ayGPhxLGWkv8YbWkj4Sti993iNi+RB7lIzw7sebYs5zRLcAglozyH GxnygQcPOJAZ0xH+hrTy0V4eHpbNgGzOOzGTtvKg0KmVEn2lmsxryIRWijOp5yIVUxbwzBfsV1/p ogqYCd7jX5xv3EjjhQsVWqa6n6xI4wmy9/Qy3l40vhx4XUJbzg4ij02Q130yGLMLLGq/jj8UEYkg DncUtT2UCIf3JR7VsmAA7G8qKCVuKj4YYxclPz5EIBb2JsglrgVKtOdjLPOMFlN+XPsRGgjBRmKf Irjxwo1p3Po6WAbfAgMBAAGjgbwwgbkwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUGu3+QTmQ tCRZvgHyUtVF9lo53BEwZAYDVR0jBF0wW4AUGu3+QTmQtCRZvgHyUtVF9lo53BGhOKQ2MDQxCzAJ BgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25hggkA/tzjAQ/J SP8wDgYDVR0PAQH/BAQDAgEGMBEGCWCGSAGG+EIBAQQEAwIABzANBgkqhkiG9w0BAQUFAAOCAQEA hQMeknH2Qq/ho2Ge6/PAD/Kl1NqV5ta+aDY9fm4fTIrv0Q8hbV6lUmPOEvjvKtpv6zf+EwLHyzs+ ImvaYS5/1HI93TDhHkxAGYwP15zRgzB7mFncfca5DClMoTOi62c6ZYTTluLtdkVwj7Ur3vkj1klu PBS1xp81HlDQwY9qcEQCYsuuHWhBp6pX6FOqB9IG9tUUBguRA3UsbHK1YZWaDYu5Def131TN3ubY 1gkIl2PlwS6wt0QmwCbAr1UwnjvVNioZBPRcHv/PLLf/0P2HQBHVESO7SMAhqaQoLf0V+LBOK/Qw WyH8EZE0vkHve52Xdf+XlcCWWC/qu0bXu+TZLg== -----END CERTIFICATE----- Deutsche Telekom Root CA 2 ========================== -----BEGIN CERTIFICATE----- MIIDnzCCAoegAwIBAgIBJjANBgkqhkiG9w0BAQUFADBxMQswCQYDVQQGEwJERTEcMBoGA1UEChMT RGV1dHNjaGUgVGVsZWtvbSBBRzEfMB0GA1UECxMWVC1UZWxlU2VjIFRydXN0IENlbnRlcjEjMCEG A1UEAxMaRGV1dHNjaGUgVGVsZWtvbSBSb290IENBIDIwHhcNOTkwNzA5MTIxMTAwWhcNMTkwNzA5 MjM1OTAwWjBxMQswCQYDVQQGEwJERTEcMBoGA1UEChMTRGV1dHNjaGUgVGVsZWtvbSBBRzEfMB0G A1UECxMWVC1UZWxlU2VjIFRydXN0IENlbnRlcjEjMCEGA1UEAxMaRGV1dHNjaGUgVGVsZWtvbSBS b290IENBIDIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCrC6M14IspFLEUha88EOQ5 bzVdSq7d6mGNlUn0b2SjGmBmpKlAIoTZ1KXleJMOaAGtuU1cOs7TuKhCQN/Po7qCWWqSG6wcmtoI KyUn+WkjR/Hg6yx6m/UTAtB+NHzCnjwAWav12gz1MjwrrFDa1sPeg5TKqAyZMg4ISFZbavva4VhY AUlfckE8FQYBjl2tqriTtM2e66foai1SNNs671x1Udrb8zH57nGYMsRUFUQM+ZtV7a3fGAigo4aK Se5TBY8ZTNXeWHmb0mocQqvF1afPaA+W5OFhmHZhyJF81j4A4pFQh+GdCuatl9Idxjp9y7zaAzTV jlsB9WoHtxa2bkp/AgMBAAGjQjBAMB0GA1UdDgQWBBQxw3kbuvVT1xfgiXotF2wKsyudMzAPBgNV HRMECDAGAQH/AgEFMA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQUFAAOCAQEAlGRZrTlk5ynr E/5aw4sTV8gEJPB0d8Bg42f76Ymmg7+Wgnxu1MM9756AbrsptJh6sTtU6zkXR34ajgv8HzFZMQSy zhfzLMdiNlXiItiJVbSYSKpk+tYcNthEeFpaIzpXl/V6ME+un2pMSyuOoAPjPuCp1NJ70rOo4nI8 rZ7/gFnkm0W09juwzTkZmDLl6iFhkOQxIY40sfcvNUqFENrnijchvllj4PKFiDFT1FQUhXB59C4G dyd1Lx+4ivn+xbrYNuSD7Odlt79jWvNGr4GUN9RBjNYj1h7P9WgbRGOiWrqnNVmh5XAFmw4jV5mU Cm26OWMohpLzGITY+9HPBVZkVw== -----END CERTIFICATE----- Cybertrust Global Root ====================== -----BEGIN CERTIFICATE----- MIIDoTCCAomgAwIBAgILBAAAAAABD4WqLUgwDQYJKoZIhvcNAQEFBQAwOzEYMBYGA1UEChMPQ3li ZXJ0cnVzdCwgSW5jMR8wHQYDVQQDExZDeWJlcnRydXN0IEdsb2JhbCBSb290MB4XDTA2MTIxNTA4 MDAwMFoXDTIxMTIxNTA4MDAwMFowOzEYMBYGA1UEChMPQ3liZXJ0cnVzdCwgSW5jMR8wHQYDVQQD ExZDeWJlcnRydXN0IEdsb2JhbCBSb290MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA +Mi8vRRQZhP/8NN57CPytxrHjoXxEnOmGaoQ25yiZXRadz5RfVb23CO21O1fWLE3TdVJDm71aofW 0ozSJ8bi/zafmGWgE07GKmSb1ZASzxQG9Dvj1Ci+6A74q05IlG2OlTEQXO2iLb3VOm2yHLtgwEZL AfVJrn5GitB0jaEMAs7u/OePuGtm839EAL9mJRQr3RAwHQeWP032a7iPt3sMpTjr3kfb1V05/Iin 89cqdPHoWqI7n1C6poxFNcJQZZXcY4Lv3b93TZxiyWNzFtApD0mpSPCzqrdsxacwOUBdrsTiXSZT 8M4cIwhhqJQZugRiQOwfOHB3EgZxpzAYXSUnpQIDAQABo4GlMIGiMA4GA1UdDwEB/wQEAwIBBjAP BgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBS2CHsNesysIEyGVjJez6tuhS1wVzA/BgNVHR8EODA2 MDSgMqAwhi5odHRwOi8vd3d3Mi5wdWJsaWMtdHJ1c3QuY29tL2NybC9jdC9jdHJvb3QuY3JsMB8G A1UdIwQYMBaAFLYIew16zKwgTIZWMl7Pq26FLXBXMA0GCSqGSIb3DQEBBQUAA4IBAQBW7wojoFRO lZfJ+InaRcHUowAl9B8Tq7ejhVhpwjCt2BWKLePJzYFa+HMjWqd8BfP9IjsO0QbE2zZMcwSO5bAi 5MXzLqXZI+O4Tkogp24CJJ8iYGd7ix1yCcUxXOl5n4BHPa2hCwcUPUf/A2kaDAtE52Mlp3+yybh2 hO0j9n0Hq0V+09+zv+mKts2oomcrUtW3ZfA5TGOgkXmTUg9U3YO7n9GPp1Nzw8v/MOx8BLjYRB+T X3EJIrduPuocA06dGiBh+4E37F78CkWr1+cXVdCg6mCbpvbjjFspwgZgFJ0tl0ypkxWdYcQBX0jW WL1WMRJOEcgh4LMRkWXbtKaIOM5V -----END CERTIFICATE----- ePKI Root Certification Authority ================================= -----BEGIN CERTIFICATE----- MIIFsDCCA5igAwIBAgIQFci9ZUdcr7iXAF7kBtK8nTANBgkqhkiG9w0BAQUFADBeMQswCQYDVQQG EwJUVzEjMCEGA1UECgwaQ2h1bmdod2EgVGVsZWNvbSBDby4sIEx0ZC4xKjAoBgNVBAsMIWVQS0kg Um9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0wNDEyMjAwMjMxMjdaFw0zNDEyMjAwMjMx MjdaMF4xCzAJBgNVBAYTAlRXMSMwIQYDVQQKDBpDaHVuZ2h3YSBUZWxlY29tIENvLiwgTHRkLjEq MCgGA1UECwwhZVBLSSBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MIICIjANBgkqhkiG9w0B AQEFAAOCAg8AMIICCgKCAgEA4SUP7o3biDN1Z82tH306Tm2d0y8U82N0ywEhajfqhFAHSyZbCUNs IZ5qyNUD9WBpj8zwIuQf5/dqIjG3LBXy4P4AakP/h2XGtRrBp0xtInAhijHyl3SJCRImHJ7K2RKi lTza6We/CKBk49ZCt0Xvl/T29de1ShUCWH2YWEtgvM3XDZoTM1PRYfl61dd4s5oz9wCGzh1NlDiv qOx4UXCKXBCDUSH3ET00hl7lSM2XgYI1TBnsZfZrxQWh7kcT1rMhJ5QQCtkkO7q+RBNGMD+XPNjX 12ruOzjjK9SXDrkb5wdJfzcq+Xd4z1TtW0ado4AOkUPB1ltfFLqfpo0kR0BZv3I4sjZsN/+Z0V0O WQqraffAsgRFelQArr5T9rXn4fg8ozHSqf4hUmTFpmfwdQcGlBSBVcYn5AGPF8Fqcde+S/uUWH1+ ETOxQvdibBjWzwloPn9s9h6PYq2lY9sJpx8iQkEeb5mKPtf5P0B6ebClAZLSnT0IFaUQAS2zMnao lQ2zepr7BxB4EW/hj8e6DyUadCrlHJhBmd8hh+iVBmoKs2pHdmX2Os+PYhcZewoozRrSgx4hxyy/ vv9haLdnG7t4TY3OZ+XkwY63I2binZB1NJipNiuKmpS5nezMirH4JYlcWrYvjB9teSSnUmjDhDXi Zo1jDiVN1Rmy5nk3pyKdVDECAwEAAaNqMGgwHQYDVR0OBBYEFB4M97Zn8uGSJglFwFU5Lnc/Qkqi MAwGA1UdEwQFMAMBAf8wOQYEZyoHAAQxMC8wLQIBADAJBgUrDgMCGgUAMAcGBWcqAwAABBRFsMLH ClZ87lt4DJX5GFPBphzYEDANBgkqhkiG9w0BAQUFAAOCAgEACbODU1kBPpVJufGBuvl2ICO1J2B0 1GqZNF5sAFPZn/KmsSQHRGoqxqWOeBLoR9lYGxMqXnmbnwoqZ6YlPwZpVnPDimZI+ymBV3QGypzq KOg4ZyYr8dW1P2WT+DZdjo2NQCCHGervJ8A9tDkPJXtoUHRVnAxZfVo9QZQlUgjgRywVMRnVvwdV xrsStZf0X4OFunHB2WyBEXYKCrC/gpf36j36+uwtqSiUO1bd0lEursC9CBWMd1I0ltabrNMdjmEP NXubrjlpC2JgQCA2j6/7Nu4tCEoduL+bXPjqpRugc6bY+G7gMwRfaKonh+3ZwZCc7b3jajWvY9+r GNm65ulK6lCKD2GTHuItGeIwlDWSXQ62B68ZgI9HkFFLLk3dheLSClIKF5r8GrBQAuUBo2M3IUxE xJtRmREOc5wGj1QupyheRDmHVi03vYVElOEMSyycw5KFNGHLD7ibSkNS/jQ6fbjpKdx2qcgw+BRx gMYeNkh0IkFch4LoGHGLQYlE535YW6i4jRPpp2zDR+2zGp1iro2C6pSe3VkQw63d4k3jMdXH7Ojy sP6SHhYKGvzZ8/gntsm+HbRsZJB/9OTEW9c3rkIO3aQab3yIVMUWbuF6aC74Or8NpDyJO3inTmOD BCEIZ43ygknQW/2xzQ+DhNQ+IIX3Sj0rnP0qCglN6oH4EZw= -----END CERTIFICATE----- T\xc3\x9c\x42\xC4\xB0TAK UEKAE K\xC3\xB6k Sertifika Hizmet Sa\xC4\x9Flay\xc4\xb1\x63\xc4\xb1s\xc4\xb1 - S\xC3\xBCr\xC3\xBCm 3 ============================================================================================================================= -----BEGIN CERTIFICATE----- MIIFFzCCA/+gAwIBAgIBETANBgkqhkiG9w0BAQUFADCCASsxCzAJBgNVBAYTAlRSMRgwFgYDVQQH DA9HZWJ6ZSAtIEtvY2FlbGkxRzBFBgNVBAoMPlTDvHJraXllIEJpbGltc2VsIHZlIFRla25vbG9q aWsgQXJhxZ90xLFybWEgS3VydW11IC0gVMOcQsSwVEFLMUgwRgYDVQQLDD9VbHVzYWwgRWxla3Ry b25payB2ZSBLcmlwdG9sb2ppIEFyYcWfdMSxcm1hIEVuc3RpdMO8c8O8IC0gVUVLQUUxIzAhBgNV BAsMGkthbXUgU2VydGlmaWthc3lvbiBNZXJrZXppMUowSAYDVQQDDEFUw5xCxLBUQUsgVUVLQUUg S8O2ayBTZXJ0aWZpa2EgSGl6bWV0IFNhxJ9sYXnEsWPEsXPEsSAtIFPDvHLDvG0gMzAeFw0wNzA4 MjQxMTM3MDdaFw0xNzA4MjExMTM3MDdaMIIBKzELMAkGA1UEBhMCVFIxGDAWBgNVBAcMD0dlYnpl IC0gS29jYWVsaTFHMEUGA1UECgw+VMO8cmtpeWUgQmlsaW1zZWwgdmUgVGVrbm9sb2ppayBBcmHF n3TEsXJtYSBLdXJ1bXUgLSBUw5xCxLBUQUsxSDBGBgNVBAsMP1VsdXNhbCBFbGVrdHJvbmlrIHZl IEtyaXB0b2xvamkgQXJhxZ90xLFybWEgRW5zdGl0w7xzw7wgLSBVRUtBRTEjMCEGA1UECwwaS2Ft dSBTZXJ0aWZpa2FzeW9uIE1lcmtlemkxSjBIBgNVBAMMQVTDnELEsFRBSyBVRUtBRSBLw7ZrIFNl cnRpZmlrYSBIaXptZXQgU2HEn2xhecSxY8Sxc8SxIC0gU8O8csO8bSAzMIIBIjANBgkqhkiG9w0B AQEFAAOCAQ8AMIIBCgKCAQEAim1L/xCIOsP2fpTo6iBkcK4hgb46ezzb8R1Sf1n68yJMlaCQvEhO Eav7t7WNeoMojCZG2E6VQIdhn8WebYGHV2yKO7Rm6sxA/OOqbLLLAdsyv9Lrhc+hDVXDWzhXcLh1 xnnRFDDtG1hba+818qEhTsXOfJlfbLm4IpNQp81McGq+agV/E5wrHur+R84EpW+sky58K5+eeROR 6Oqeyjh1jmKwlZMq5d/pXpduIF9fhHpEORlAHLpVK/swsoHvhOPc7Jg4OQOFCKlUAwUp8MmPi+oL hmUZEdPpCSPeaJMDyTYcIW7OjGbxmTDY17PDHfiBLqi9ggtm/oLL4eAagsNAgQIDAQABo0IwQDAd BgNVHQ4EFgQUvYiHyY/2pAoLquvF/pEjnatKijIwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQF MAMBAf8wDQYJKoZIhvcNAQEFBQADggEBAB18+kmPNOm3JpIWmgV050vQbTlswyb2zrgxvMTfvCr4 N5EY3ATIZJkrGG2AA1nJrvhY0D7twyOfaTyGOBye79oneNGEN3GKPEs5z35FBtYt2IpNeBLWrcLT y9LQQfMmNkqblWwM7uXRQydmwYj3erMgbOqwaSvHIOgMA8RBBZniP+Rr+KCGgceExh/VS4ESshYh LBOhgLJeDEoTniDYYkCrkOpkSi+sDQESeUWoL4cZaMjihccwsnX5OD+ywJO0a+IDRM5noN+J1q2M dqMTw5RhK2vZbMEHCiIHhWyFJEapvj+LeISCfiQMnf2BN+MlqO02TpUsyZyQ2uypQjyttgI= -----END CERTIFICATE----- certSIGN ROOT CA ================ -----BEGIN CERTIFICATE----- MIIDODCCAiCgAwIBAgIGIAYFFnACMA0GCSqGSIb3DQEBBQUAMDsxCzAJBgNVBAYTAlJPMREwDwYD VQQKEwhjZXJ0U0lHTjEZMBcGA1UECxMQY2VydFNJR04gUk9PVCBDQTAeFw0wNjA3MDQxNzIwMDRa Fw0zMTA3MDQxNzIwMDRaMDsxCzAJBgNVBAYTAlJPMREwDwYDVQQKEwhjZXJ0U0lHTjEZMBcGA1UE CxMQY2VydFNJR04gUk9PVCBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALczuX7I JUqOtdu0KBuqV5Do0SLTZLrTk+jUrIZhQGpgV2hUhE28alQCBf/fm5oqrl0Hj0rDKH/v+yv6efHH rfAQUySQi2bJqIirr1qjAOm+ukbuW3N7LBeCgV5iLKECZbO9xSsAfsT8AzNXDe3i+s5dRdY4zTW2 ssHQnIFKquSyAVwdj1+ZxLGt24gh65AIgoDzMKND5pCCrlUoSe1b16kQOA7+j0xbm0bqQfWwCHTD 0IgztnzXdN/chNFDDnU5oSVAKOp4yw4sLjmdjItuFhwvJoIQ4uNllAoEwF73XVv4EOLQunpL+943 AAAaWyjj0pxzPjKHmKHJUS/X3qwzs08CAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8B Af8EBAMCAcYwHQYDVR0OBBYEFOCMm9slSbPxfIbWskKHC9BroNnkMA0GCSqGSIb3DQEBBQUAA4IB AQA+0hyJLjX8+HXd5n9liPRyTMks1zJO890ZeUe9jjtbkw9QSSQTaxQGcu8J06Gh40CEyecYMnQ8 SG4Pn0vU9x7Tk4ZkVJdjclDVVc/6IJMCopvDI5NOFlV2oHB5bc0hH88vLbwZ44gx+FkagQnIl6Z0 x2DEW8xXjrJ1/RsCCdtZb3KTafcxQdaIOL+Hsr0Wefmq5L6IJd1hJyMctTEHBDa0GpC9oHRxUIlt vBTjD4au8as+x6AJzKNI0eDbZOeStc+vckNwi/nDhDwTqn6Sm1dTk/pwwpEOMfmbZ13pljheX7Nz TogVZ96edhBiIL5VaZVDADlN9u6wWk5JRFRYX0KD -----END CERTIFICATE----- GeoTrust Primary Certification Authority - G3 ============================================= -----BEGIN CERTIFICATE----- MIID/jCCAuagAwIBAgIQFaxulBmyeUtB9iepwxgPHzANBgkqhkiG9w0BAQsFADCBmDELMAkGA1UE BhMCVVMxFjAUBgNVBAoTDUdlb1RydXN0IEluYy4xOTA3BgNVBAsTMChjKSAyMDA4IEdlb1RydXN0 IEluYy4gLSBGb3IgYXV0aG9yaXplZCB1c2Ugb25seTE2MDQGA1UEAxMtR2VvVHJ1c3QgUHJpbWFy eSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIEczMB4XDTA4MDQwMjAwMDAwMFoXDTM3MTIwMTIz NTk1OVowgZgxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMTkwNwYDVQQLEzAo YykgMjAwOCBHZW9UcnVzdCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxNjA0BgNVBAMT LUdlb1RydXN0IFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMzCCASIwDQYJKoZI hvcNAQEBBQADggEPADCCAQoCggEBANziXmJYHTNXOTIz+uvLh4yn1ErdBojqZI4xmKU4kB6Yzy5j K/BGvESyiaHAKAxJcCGVn2TAppMSAmUmhsalifD614SgcK9PGpc/BkTVyetyEH3kMSj7HGHmKAdE c5IiaacDiGydY8hS2pgn5whMcD60yRLBxWeDXTPzAxHsatBT4tG6NmCUgLthY2xbF37fQJQeqw3C IShwiP/WJmxsYAQlTlV+fe+/lEjetx3dcI0FX4ilm/LC7urRQEFtYjgdVgbFA0dRIBn8exALDmKu dlW/X3e+PkkBUz2YJQN2JFodtNuJ6nnltrM7P7pMKEF/BqxqjsHQ9gUdfeZChuOl1UcCAwEAAaNC MEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFMR5yo6hTgMdHNxr 2zFblD4/MH8tMA0GCSqGSIb3DQEBCwUAA4IBAQAtxRPPVoB7eni9n64smefv2t+UXglpp+duaIy9 cr5HqQ6XErhK8WTTOd8lNNTBzU6B8A8ExCSzNJbGpqow32hhc9f5joWJ7w5elShKKiePEI4ufIbE Ap7aDHdlDkQNkv39sxY2+hENHYwOB4lqKVb3cvTdFZx3NWZXqxNT2I7BQMXXExZacse3aQHEerGD AWh9jUGhlBjBJVz88P6DAod8DQ3PLghcSkANPuyBYeYk28rgDi0Hsj5W3I31QYUHSJsMC8tJP33s t/3LjWeJGqvtux6jAAgIFyqCXDFdRootD4abdNlF+9RAsXqqaC2Gspki4cErx5z481+oghLrGREt -----END CERTIFICATE----- thawte Primary Root CA - G2 =========================== -----BEGIN CERTIFICATE----- MIICiDCCAg2gAwIBAgIQNfwmXNmET8k9Jj1Xm67XVjAKBggqhkjOPQQDAzCBhDELMAkGA1UEBhMC VVMxFTATBgNVBAoTDHRoYXd0ZSwgSW5jLjE4MDYGA1UECxMvKGMpIDIwMDcgdGhhd3RlLCBJbmMu IC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxJDAiBgNVBAMTG3RoYXd0ZSBQcmltYXJ5IFJvb3Qg Q0EgLSBHMjAeFw0wNzExMDUwMDAwMDBaFw0zODAxMTgyMzU5NTlaMIGEMQswCQYDVQQGEwJVUzEV MBMGA1UEChMMdGhhd3RlLCBJbmMuMTgwNgYDVQQLEy8oYykgMjAwNyB0aGF3dGUsIEluYy4gLSBG b3IgYXV0aG9yaXplZCB1c2Ugb25seTEkMCIGA1UEAxMbdGhhd3RlIFByaW1hcnkgUm9vdCBDQSAt IEcyMHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEotWcgnuVnfFSeIf+iha/BebfowJPDQfGAFG6DAJS LSKkQjnE/o/qycG+1E3/n3qe4rF8mq2nhglzh9HnmuN6papu+7qzcMBniKI11KOasf2twu8x+qi5 8/sIxpHR+ymVo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQU mtgAMADna3+FGO6Lts6KDPgR4bswCgYIKoZIzj0EAwMDaQAwZgIxAN344FdHW6fmCsO99YCKlzUN G4k8VIZ3KMqh9HneteY4sPBlcIx/AlTCv//YoT7ZzwIxAMSNlPzcU9LcnXgWHxUzI1NS41oxXZ3K rr0TKUQNJ1uo52icEvdYPy5yAlejj6EULg== -----END CERTIFICATE----- thawte Primary Root CA - G3 =========================== -----BEGIN CERTIFICATE----- MIIEKjCCAxKgAwIBAgIQYAGXt0an6rS0mtZLL/eQ+zANBgkqhkiG9w0BAQsFADCBrjELMAkGA1UE BhMCVVMxFTATBgNVBAoTDHRoYXd0ZSwgSW5jLjEoMCYGA1UECxMfQ2VydGlmaWNhdGlvbiBTZXJ2 aWNlcyBEaXZpc2lvbjE4MDYGA1UECxMvKGMpIDIwMDggdGhhd3RlLCBJbmMuIC0gRm9yIGF1dGhv cml6ZWQgdXNlIG9ubHkxJDAiBgNVBAMTG3RoYXd0ZSBQcmltYXJ5IFJvb3QgQ0EgLSBHMzAeFw0w ODA0MDIwMDAwMDBaFw0zNzEyMDEyMzU5NTlaMIGuMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMdGhh d3RlLCBJbmMuMSgwJgYDVQQLEx9DZXJ0aWZpY2F0aW9uIFNlcnZpY2VzIERpdmlzaW9uMTgwNgYD VQQLEy8oYykgMjAwOCB0aGF3dGUsIEluYy4gLSBGb3IgYXV0aG9yaXplZCB1c2Ugb25seTEkMCIG A1UEAxMbdGhhd3RlIFByaW1hcnkgUm9vdCBDQSAtIEczMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A MIIBCgKCAQEAsr8nLPvb2FvdeHsbnndmgcs+vHyu86YnmjSjaDFxODNi5PNxZnmxqWWjpYvVj2At P0LMqmsywCPLLEHd5N/8YZzic7IilRFDGF/Eth9XbAoFWCLINkw6fKXRz4aviKdEAhN0cXMKQlkC +BsUa0Lfb1+6a4KinVvnSr0eAXLbS3ToO39/fR8EtCab4LRarEc9VbjXsCZSKAExQGbY2SS99irY 7CFJXJv2eul/VTV+lmuNk5Mny5K76qxAwJ/C+IDPXfRa3M50hqY+bAtTyr2SzhkGcuYMXDhpxwTW vGzOW/b3aJzcJRVIiKHpqfiYnODz1TEoYRFsZ5aNOZnLwkUkOQIDAQABo0IwQDAPBgNVHRMBAf8E BTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUrWyqlGCc7eT/+j4KdCtjA/e2Wb8wDQYJ KoZIhvcNAQELBQADggEBABpA2JVlrAmSicY59BDlqQ5mU1143vokkbvnRFHfxhY0Cu9qRFHqKweK A3rD6z8KLFIWoCtDuSWQP3CpMyVtRRooOyfPqsMpQhvfO0zAMzRbQYi/aytlryjvsvXDqmbOe1bu t8jLZ8HJnBoYuMTDSQPxYA5QzUbF83d597YV4Djbxy8ooAw/dyZ02SUS2jHaGh7cKUGRIjxpp7sC 8rZcJwOJ9Abqm+RyguOhCcHpABnTPtRwa7pxpqpYrvS76Wy274fMm7v/OeZWYdMKp8RcTGB7BXcm er/YB1IsYvdwY9k5vG8cwnncdimvzsUsZAReiDZuMdRAGmI0Nj81Aa6sY6A= -----END CERTIFICATE----- GeoTrust Primary Certification Authority - G2 ============================================= -----BEGIN CERTIFICATE----- MIICrjCCAjWgAwIBAgIQPLL0SAoA4v7rJDteYD7DazAKBggqhkjOPQQDAzCBmDELMAkGA1UEBhMC VVMxFjAUBgNVBAoTDUdlb1RydXN0IEluYy4xOTA3BgNVBAsTMChjKSAyMDA3IEdlb1RydXN0IElu Yy4gLSBGb3IgYXV0aG9yaXplZCB1c2Ugb25seTE2MDQGA1UEAxMtR2VvVHJ1c3QgUHJpbWFyeSBD ZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIEcyMB4XDTA3MTEwNTAwMDAwMFoXDTM4MDExODIzNTk1 OVowgZgxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMTkwNwYDVQQLEzAoYykg MjAwNyBHZW9UcnVzdCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxNjA0BgNVBAMTLUdl b1RydXN0IFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjB2MBAGByqGSM49AgEG BSuBBAAiA2IABBWx6P0DFUPlrOuHNxFi79KDNlJ9RVcLSo17VDs6bl8VAsBQps8lL33KSLjHUGMc KiEIfJo22Av+0SbFWDEwKCXzXV2juLaltJLtbCyf691DiaI8S0iRHVDsJt/WYC69IaNCMEAwDwYD VR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFBVfNVdRVfslsq0DafwBo/q+ EVXVMAoGCCqGSM49BAMDA2cAMGQCMGSWWaboCd6LuvpaiIjwH5HTRqjySkwCY/tsXzjbLkGTqQ7m ndwxHLKgpxgceeHHNgIwOlavmnRs9vuD4DPTCF+hnMJbn0bWtsuRBmOiBuczrD6ogRLQy7rQkgu2 npaqBA+K -----END CERTIFICATE----- VeriSign Universal Root Certification Authority =============================================== -----BEGIN CERTIFICATE----- MIIEuTCCA6GgAwIBAgIQQBrEZCGzEyEDDrvkEhrFHTANBgkqhkiG9w0BAQsFADCBvTELMAkGA1UE BhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQLExZWZXJpU2lnbiBUcnVzdCBO ZXR3b3JrMTowOAYDVQQLEzEoYykgMjAwOCBWZXJpU2lnbiwgSW5jLiAtIEZvciBhdXRob3JpemVk IHVzZSBvbmx5MTgwNgYDVQQDEy9WZXJpU2lnbiBVbml2ZXJzYWwgUm9vdCBDZXJ0aWZpY2F0aW9u IEF1dGhvcml0eTAeFw0wODA0MDIwMDAwMDBaFw0zNzEyMDEyMzU5NTlaMIG9MQswCQYDVQQGEwJV UzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdv cmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNl IG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNhbCBSb290IENlcnRpZmljYXRpb24gQXV0 aG9yaXR5MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAx2E3XrEBNNti1xWb/1hajCMj 1mCOkdeQmIN65lgZOIzF9uVkhbSicfvtvbnazU0AtMgtc6XHaXGVHzk8skQHnOgO+k1KxCHfKWGP MiJhgsWHH26MfF8WIFFE0XBPV+rjHOPMee5Y2A7Cs0WTwCznmhcrewA3ekEzeOEz4vMQGn+HLL72 9fdC4uW/h2KJXwBL38Xd5HVEMkE6HnFuacsLdUYI0crSK5XQz/u5QGtkjFdN/BMReYTtXlT2NJ8I AfMQJQYXStrxHXpma5hgZqTZ79IugvHw7wnqRMkVauIDbjPTrJ9VAMf2CGqUuV/c4DPxhGD5WycR tPwW8rtWaoAljQIDAQABo4GyMIGvMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMG0G CCsGAQUFBwEMBGEwX6FdoFswWTBXMFUWCWltYWdlL2dpZjAhMB8wBwYFKw4DAhoEFI/l0xqGrI2O a8PPgGrUSBgsexkuMCUWI2h0dHA6Ly9sb2dvLnZlcmlzaWduLmNvbS92c2xvZ28uZ2lmMB0GA1Ud DgQWBBS2d/ppSEefUxLVwuoHMnYH0ZcHGTANBgkqhkiG9w0BAQsFAAOCAQEASvj4sAPmLGd75JR3 Y8xuTPl9Dg3cyLk1uXBPY/ok+myDjEedO2Pzmvl2MpWRsXe8rJq+seQxIcaBlVZaDrHC1LGmWazx Y8u4TB1ZkErvkBYoH1quEPuBUDgMbMzxPcP1Y+Oz4yHJJDnp/RVmRvQbEdBNc6N9Rvk97ahfYtTx P/jgdFcrGJ2BtMQo2pSXpXDrrB2+BxHw1dvd5Yzw1TKwg+ZX4o+/vqGqvz0dtdQ46tewXDpPaj+P wGZsY6rp2aQW9IHRlRQOfc2VNNnSj3BzgXucfr2YYdhFh5iQxeuGMMY1v/D/w1WIg0vvBZIGcfK4 mJO37M2CYfE45k+XmCpajQ== -----END CERTIFICATE----- VeriSign Class 3 Public Primary Certification Authority - G4 ============================================================ -----BEGIN CERTIFICATE----- MIIDhDCCAwqgAwIBAgIQL4D+I4wOIg9IZxIokYesszAKBggqhkjOPQQDAzCByjELMAkGA1UEBhMC VVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQLExZWZXJpU2lnbiBUcnVzdCBOZXR3 b3JrMTowOAYDVQQLEzEoYykgMjAwNyBWZXJpU2lnbiwgSW5jLiAtIEZvciBhdXRob3JpemVkIHVz ZSBvbmx5MUUwQwYDVQQDEzxWZXJpU2lnbiBDbGFzcyAzIFB1YmxpYyBQcmltYXJ5IENlcnRpZmlj YXRpb24gQXV0aG9yaXR5IC0gRzQwHhcNMDcxMTA1MDAwMDAwWhcNMzgwMTE4MjM1OTU5WjCByjEL MAkGA1UEBhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQLExZWZXJpU2lnbiBU cnVzdCBOZXR3b3JrMTowOAYDVQQLEzEoYykgMjAwNyBWZXJpU2lnbiwgSW5jLiAtIEZvciBhdXRo b3JpemVkIHVzZSBvbmx5MUUwQwYDVQQDEzxWZXJpU2lnbiBDbGFzcyAzIFB1YmxpYyBQcmltYXJ5 IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0gRzQwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAASnVnp8 Utpkmw4tXNherJI9/gHmGUo9FANL+mAnINmDiWn6VMaaGF5VKmTeBvaNSjutEDxlPZCIBIngMGGz rl0Bp3vefLK+ymVhAIau2o970ImtTR1ZmkGxvEeA3J5iw/mjgbIwga8wDwYDVR0TAQH/BAUwAwEB /zAOBgNVHQ8BAf8EBAMCAQYwbQYIKwYBBQUHAQwEYTBfoV2gWzBZMFcwVRYJaW1hZ2UvZ2lmMCEw HzAHBgUrDgMCGgQUj+XTGoasjY5rw8+AatRIGCx7GS4wJRYjaHR0cDovL2xvZ28udmVyaXNpZ24u Y29tL3ZzbG9nby5naWYwHQYDVR0OBBYEFLMWkf3upm7ktS5Jj4d4gYDs5bG1MAoGCCqGSM49BAMD A2gAMGUCMGYhDBgmYFo4e1ZC4Kf8NoRRkSAsdk1DPcQdhCPQrNZ8NQbOzWm9kA3bbEhCHQ6qQgIx AJw9SDkjOVgaFRJZap7v1VmyHVIsmXHNxynfGyphe3HR3vPA5Q06Sqotp9iGKt0uEA== -----END CERTIFICATE----- NetLock Arany (Class Gold) Főtanúsítvány ======================================== -----BEGIN CERTIFICATE----- MIIEFTCCAv2gAwIBAgIGSUEs5AAQMA0GCSqGSIb3DQEBCwUAMIGnMQswCQYDVQQGEwJIVTERMA8G A1UEBwwIQnVkYXBlc3QxFTATBgNVBAoMDE5ldExvY2sgS2Z0LjE3MDUGA1UECwwuVGFuw7pzw610 dsOhbnlraWFkw7NrIChDZXJ0aWZpY2F0aW9uIFNlcnZpY2VzKTE1MDMGA1UEAwwsTmV0TG9jayBB cmFueSAoQ2xhc3MgR29sZCkgRsWRdGFuw7pzw610dsOhbnkwHhcNMDgxMjExMTUwODIxWhcNMjgx MjA2MTUwODIxWjCBpzELMAkGA1UEBhMCSFUxETAPBgNVBAcMCEJ1ZGFwZXN0MRUwEwYDVQQKDAxO ZXRMb2NrIEtmdC4xNzA1BgNVBAsMLlRhbsO6c8OtdHbDoW55a2lhZMOzayAoQ2VydGlmaWNhdGlv biBTZXJ2aWNlcykxNTAzBgNVBAMMLE5ldExvY2sgQXJhbnkgKENsYXNzIEdvbGQpIEbFkXRhbsO6 c8OtdHbDoW55MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAxCRec75LbRTDofTjl5Bu 0jBFHjzuZ9lk4BqKf8owyoPjIMHj9DrTlF8afFttvzBPhCf2nx9JvMaZCpDyD/V/Q4Q3Y1GLeqVw /HpYzY6b7cNGbIRwXdrzAZAj/E4wqX7hJ2Pn7WQ8oLjJM2P+FpD/sLj916jAwJRDC7bVWaaeVtAk H3B5r9s5VA1lddkVQZQBr17s9o3x/61k/iCa11zr/qYfCGSji3ZVrR47KGAuhyXoqq8fxmRGILdw fzzeSNuWU7c5d+Qa4scWhHaXWy+7GRWF+GmF9ZmnqfI0p6m2pgP8b4Y9VHx2BJtr+UBdADTHLpl1 neWIA6pN+APSQnbAGwIDAKiLo0UwQzASBgNVHRMBAf8ECDAGAQH/AgEEMA4GA1UdDwEB/wQEAwIB BjAdBgNVHQ4EFgQUzPpnk/C2uNClwB7zU/2MU9+D15YwDQYJKoZIhvcNAQELBQADggEBAKt/7hwW qZw8UQCgwBEIBaeZ5m8BiFRhbvG5GK1Krf6BQCOUL/t1fC8oS2IkgYIL9WHxHG64YTjrgfpioTta YtOUZcTh5m2C+C8lcLIhJsFyUR+MLMOEkMNaj7rP9KdlpeuY0fsFskZ1FSNqb4VjMIDw1Z4fKRzC bLBQWV2QWzuoDTDPv31/zvGdg73JRm4gpvlhUbohL3u+pRVjodSVh/GeufOJ8z2FuLjbvrW5Kfna NwUASZQDhETnv0Mxz3WLJdH0pmT1kvarBes96aULNmLazAZfNou2XjG4Kvte9nHfRCaexOYNkbQu dZWAUWpLMKawYqGT8ZvYzsRjdT9ZR7E= -----END CERTIFICATE----- Staat der Nederlanden Root CA - G2 ================================== -----BEGIN CERTIFICATE----- MIIFyjCCA7KgAwIBAgIEAJiWjDANBgkqhkiG9w0BAQsFADBaMQswCQYDVQQGEwJOTDEeMBwGA1UE CgwVU3RhYXQgZGVyIE5lZGVybGFuZGVuMSswKQYDVQQDDCJTdGFhdCBkZXIgTmVkZXJsYW5kZW4g Um9vdCBDQSAtIEcyMB4XDTA4MDMyNjExMTgxN1oXDTIwMDMyNTExMDMxMFowWjELMAkGA1UEBhMC TkwxHjAcBgNVBAoMFVN0YWF0IGRlciBOZWRlcmxhbmRlbjErMCkGA1UEAwwiU3RhYXQgZGVyIE5l ZGVybGFuZGVuIFJvb3QgQ0EgLSBHMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMVZ 5291qj5LnLW4rJ4L5PnZyqtdj7U5EILXr1HgO+EASGrP2uEGQxGZqhQlEq0i6ABtQ8SpuOUfiUtn vWFI7/3S4GCI5bkYYCjDdyutsDeqN95kWSpGV+RLufg3fNU254DBtvPUZ5uW6M7XxgpT0GtJlvOj CwV3SPcl5XCsMBQgJeN/dVrlSPhOewMHBPqCYYdu8DvEpMfQ9XQ+pV0aCPKbJdL2rAQmPlU6Yiil e7Iwr/g3wtG61jj99O9JMDeZJiFIhQGp5Rbn3JBV3w/oOM2ZNyFPXfUib2rFEhZgF1XyZWampzCR OME4HYYEhLoaJXhena/MUGDWE4dS7WMfbWV9whUYdMrhfmQpjHLYFhN9C0lK8SgbIHRrxT3dsKpI CT0ugpTNGmXZK4iambwYfp/ufWZ8Pr2UuIHOzZgweMFvZ9C+X+Bo7d7iscksWXiSqt8rYGPy5V65 48r6f1CGPqI0GAwJaCgRHOThuVw+R7oyPxjMW4T182t0xHJ04eOLoEq9jWYv6q012iDTiIJh8BIi trzQ1aTsr1SIJSQ8p22xcik/Plemf1WvbibG/ufMQFxRRIEKeN5KzlW/HdXZt1bv8Hb/C3m1r737 qWmRRpdogBQ2HbN/uymYNqUg+oJgYjOk7Na6B6duxc8UpufWkjTYgfX8HV2qXB72o007uPc5AgMB AAGjgZcwgZQwDwYDVR0TAQH/BAUwAwEB/zBSBgNVHSAESzBJMEcGBFUdIAAwPzA9BggrBgEFBQcC ARYxaHR0cDovL3d3dy5wa2lvdmVyaGVpZC5ubC9wb2xpY2llcy9yb290LXBvbGljeS1HMjAOBgNV HQ8BAf8EBAMCAQYwHQYDVR0OBBYEFJFoMocVHYnitfGsNig0jQt8YojrMA0GCSqGSIb3DQEBCwUA A4ICAQCoQUpnKpKBglBu4dfYszk78wIVCVBR7y29JHuIhjv5tLySCZa59sCrI2AGeYwRTlHSeYAz +51IvuxBQ4EffkdAHOV6CMqqi3WtFMTC6GY8ggen5ieCWxjmD27ZUD6KQhgpxrRW/FYQoAUXvQwj f/ST7ZwaUb7dRUG/kSS0H4zpX897IZmflZ85OkYcbPnNe5yQzSipx6lVu6xiNGI1E0sUOlWDuYaN kqbG9AclVMwWVxJKgnjIFNkXgiYtXSAfea7+1HAWFpWD2DU5/1JddRwWxRNVz0fMdWVSSt7wsKfk CpYL+63C4iWEst3kvX5ZbJvw8NjnyvLplzh+ib7M+zkXYT9y2zqR2GUBGR2tUKRXCnxLvJxxcypF URmFzI79R6d0lR2o0a9OF7FpJsKqeFdbxU2n5Z4FF5TKsl+gSRiNNOkmbEgeqmiSBeGCc1qb3Adb CG19ndeNIdn8FCCqwkXfP+cAslHkwvgFuXkajDTznlvkN1trSt8sV4pAWja63XVECDdCcAz+3F4h oKOKwJCcaNpQ5kUQR3i2TtJlycM33+FCY7BXN0Ute4qcvwXqZVUz9zkQxSgqIXobisQk+T8VyJoV IPVVYpbtbZNQvOSqeK3Zywplh6ZmwcSBo3c6WB4L7oOLnR7SUqTMHW+wmG2UMbX4cQrcufx9MmDm 66+KAQ== -----END CERTIFICATE----- Hongkong Post Root CA 1 ======================= -----BEGIN CERTIFICATE----- MIIDMDCCAhigAwIBAgICA+gwDQYJKoZIhvcNAQEFBQAwRzELMAkGA1UEBhMCSEsxFjAUBgNVBAoT DUhvbmdrb25nIFBvc3QxIDAeBgNVBAMTF0hvbmdrb25nIFBvc3QgUm9vdCBDQSAxMB4XDTAzMDUx NTA1MTMxNFoXDTIzMDUxNTA0NTIyOVowRzELMAkGA1UEBhMCSEsxFjAUBgNVBAoTDUhvbmdrb25n IFBvc3QxIDAeBgNVBAMTF0hvbmdrb25nIFBvc3QgUm9vdCBDQSAxMIIBIjANBgkqhkiG9w0BAQEF AAOCAQ8AMIIBCgKCAQEArP84tulmAknjorThkPlAj3n54r15/gK97iSSHSL22oVyaf7XPwnU3ZG1 ApzQjVrhVcNQhrkpJsLj2aDxaQMoIIBFIi1WpztUlVYiWR8o3x8gPW2iNr4joLFutbEnPzlTCeqr auh0ssJlXI6/fMN4hM2eFvz1Lk8gKgifd/PFHsSaUmYeSF7jEAaPIpjhZY4bXSNmO7ilMlHIhqqh qZ5/dpTCpmy3QfDVyAY45tQM4vM7TG1QjMSDJ8EThFk9nnV0ttgCXjqQesBCNnLsak3c78QA3xMY V18meMjWCnl3v/evt3a5pQuEF10Q6m/hq5URX208o1xNg1vysxmKgIsLhwIDAQABoyYwJDASBgNV HRMBAf8ECDAGAQH/AgEDMA4GA1UdDwEB/wQEAwIBxjANBgkqhkiG9w0BAQUFAAOCAQEADkbVPK7i h9legYsCmEEIjEy82tvuJxuC52pF7BaLT4Wg87JwvVqWuspube5Gi27nKi6Wsxkz67SfqLI37pio l7Yutmcn1KZJ/RyTZXaeQi/cImyaT/JaFTmxcdcrUehtHJjA2Sr0oYJ71clBoiMBdDhViw+5Lmei IAQ32pwL0xch4I+XeTRvhEgCIDMb5jREn5Fw9IBehEPCKdJsEhTkYY2sEJCehFC78JZvRZ+K88ps T/oROhUVRsPNH4NbLUES7VBnQRM9IauUiqpOfMGx+6fWtScvl6tu4B3i0RwsH0Ti/L6RoZz71ilT c4afU9hDDl3WY4JxHYB0yvbiAmvZWg== -----END CERTIFICATE----- SecureSign RootCA11 =================== -----BEGIN CERTIFICATE----- MIIDbTCCAlWgAwIBAgIBATANBgkqhkiG9w0BAQUFADBYMQswCQYDVQQGEwJKUDErMCkGA1UEChMi SmFwYW4gQ2VydGlmaWNhdGlvbiBTZXJ2aWNlcywgSW5jLjEcMBoGA1UEAxMTU2VjdXJlU2lnbiBS b290Q0ExMTAeFw0wOTA0MDgwNDU2NDdaFw0yOTA0MDgwNDU2NDdaMFgxCzAJBgNVBAYTAkpQMSsw KQYDVQQKEyJKYXBhbiBDZXJ0aWZpY2F0aW9uIFNlcnZpY2VzLCBJbmMuMRwwGgYDVQQDExNTZWN1 cmVTaWduIFJvb3RDQTExMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA/XeqpRyQBTvL TJszi1oURaTnkBbR31fSIRCkF/3frNYfp+TbfPfs37gD2pRY/V1yfIw/XwFndBWW4wI8h9uuywGO wvNmxoVF9ALGOrVisq/6nL+k5tSAMJjzDbaTj6nU2DbysPyKyiyhFTOVMdrAG/LuYpmGYz+/3ZMq g6h2uRMft85OQoWPIucuGvKVCbIFtUROd6EgvanyTgp9UK31BQ1FT0Zx/Sg+U/sE2C3XZR1KG/rP O7AxmjVuyIsG0wCR8pQIZUyxNAYAeoni8McDWc/V1uinMrPmmECGxc0nEovMe863ETxiYAcjPitA bpSACW22s293bzUIUPsCh8U+iQIDAQABo0IwQDAdBgNVHQ4EFgQUW/hNT7KlhtQ60vFjmqC+CfZX t94wDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEFBQADggEBAKCh OBZmLqdWHyGcBvod7bkixTgm2E5P7KN/ed5GIaGHd48HCJqypMWvDzKYC3xmKbabfSVSSUOrTC4r bnpwrxYO4wJs+0LmGJ1F2FXI6Dvd5+H0LgscNFxsWEr7jIhQX5Ucv+2rIrVls4W6ng+4reV6G4pQ Oh29Dbx7VFALuUKvVaAYga1lme++5Jy/xIWrQbJUb9wlze144o4MjQlJ3WN7WmmWAiGovVJZ6X01 y8hSyn+B/tlr0/cR7SXf+Of5pPpyl4RTDaXQMhhRdlkUbA/r7F+AjHVDg8OFmP9Mni0N5HeDk061 lgeLKBObjBmNQSdJQO7e5iNEOdyhIta6A/I= -----END CERTIFICATE----- ACEDICOM Root ============= -----BEGIN CERTIFICATE----- MIIFtTCCA52gAwIBAgIIYY3HhjsBggUwDQYJKoZIhvcNAQEFBQAwRDEWMBQGA1UEAwwNQUNFRElD T00gUm9vdDEMMAoGA1UECwwDUEtJMQ8wDQYDVQQKDAZFRElDT00xCzAJBgNVBAYTAkVTMB4XDTA4 MDQxODE2MjQyMloXDTI4MDQxMzE2MjQyMlowRDEWMBQGA1UEAwwNQUNFRElDT00gUm9vdDEMMAoG A1UECwwDUEtJMQ8wDQYDVQQKDAZFRElDT00xCzAJBgNVBAYTAkVTMIICIjANBgkqhkiG9w0BAQEF AAOCAg8AMIICCgKCAgEA/5KV4WgGdrQsyFhIyv2AVClVYyT/kGWbEHV7w2rbYgIB8hiGtXxaOLHk WLn709gtn70yN78sFW2+tfQh0hOR2QetAQXW8713zl9CgQr5auODAKgrLlUTY4HKRxx7XBZXehuD YAQ6PmXDzQHe3qTWDLqO3tkE7hdWIpuPY/1NFgu3e3eM+SW10W2ZEi5PGrjm6gSSrj0RuVFCPYew MYWveVqc/udOXpJPQ/yrOq2lEiZmueIM15jO1FillUAKt0SdE3QrwqXrIhWYENiLxQSfHY9g5QYb m8+5eaA9oiM/Qj9r+hwDezCNzmzAv+YbX79nuIQZ1RXve8uQNjFiybwCq0Zfm/4aaJQ0PZCOrfbk HQl/Sog4P75n/TSW9R28MHTLOO7VbKvU/PQAtwBbhTIWdjPp2KOZnQUAqhbm84F9b32qhm2tFXTT xKJxqvQUfecyuB+81fFOvW8XAjnXDpVCOscAPukmYxHqC9FK/xidstd7LzrZlvvoHpKuE1XI2Sf2 3EgbsCTBheN3nZqk8wwRHQ3ItBTutYJXCb8gWH8vIiPYcMt5bMlL8qkqyPyHK9caUPgn6C9D4zq9 2Fdx/c6mUlv53U3t5fZvie27k5x2IXXwkkwp9y+cAS7+UEaeZAwUswdbxcJzbPEHXEUkFDWug/Fq TYl6+rPYLWbwNof1K1MCAwEAAaOBqjCBpzAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFKaz 4SsrSbbXc6GqlPUB53NlTKxQMA4GA1UdDwEB/wQEAwIBhjAdBgNVHQ4EFgQUprPhKytJttdzoaqU 9QHnc2VMrFAwRAYDVR0gBD0wOzA5BgRVHSAAMDEwLwYIKwYBBQUHAgEWI2h0dHA6Ly9hY2VkaWNv bS5lZGljb21ncm91cC5jb20vZG9jMA0GCSqGSIb3DQEBBQUAA4ICAQDOLAtSUWImfQwng4/F9tqg aHtPkl7qpHMyEVNEskTLnewPeUKzEKbHDZ3Ltvo/Onzqv4hTGzz3gvoFNTPhNahXwOf9jU8/kzJP eGYDdwdY6ZXIfj7QeQCM8htRM5u8lOk6e25SLTKeI6RF+7YuE7CLGLHdztUdp0J/Vb77W7tH1Pwk zQSulgUV1qzOMPPKC8W64iLgpq0i5ALudBF/TP94HTXa5gI06xgSYXcGCRZj6hitoocf8seACQl1 ThCojz2GuHURwCRiipZ7SkXp7FnFvmuD5uHorLUwHv4FB4D54SMNUI8FmP8sX+g7tq3PgbUhh8oI KiMnMCArz+2UW6yyetLHKKGKC5tNSixthT8Jcjxn4tncB7rrZXtaAWPWkFtPF2Y9fwsZo5NjEFIq nxQWWOLcpfShFosOkYuByptZ+thrkQdlVV9SH686+5DdaaVbnG0OLLb6zqylfDJKZ0DcMDQj3dcE I2bw/FWAp/tmGYI1Z2JwOV5vx+qQQEQIHriy1tvuWacNGHk0vFQYXlPKNFHtRQrmjseCNj6nOGOp MCwXEGCSn1WHElkQwg9naRHMTh5+Spqtr0CodaxWkHS4oJyleW/c6RrIaQXpuvoDs3zk4E7Czp3o tkYNbn5XOmeUwssfnHdKZ05phkOTOPu220+DkdRgfks+KzgHVZhepA== -----END CERTIFICATE----- Microsec e-Szigno Root CA 2009 ============================== -----BEGIN CERTIFICATE----- MIIECjCCAvKgAwIBAgIJAMJ+QwRORz8ZMA0GCSqGSIb3DQEBCwUAMIGCMQswCQYDVQQGEwJIVTER MA8GA1UEBwwIQnVkYXBlc3QxFjAUBgNVBAoMDU1pY3Jvc2VjIEx0ZC4xJzAlBgNVBAMMHk1pY3Jv c2VjIGUtU3ppZ25vIFJvb3QgQ0EgMjAwOTEfMB0GCSqGSIb3DQEJARYQaW5mb0BlLXN6aWduby5o dTAeFw0wOTA2MTYxMTMwMThaFw0yOTEyMzAxMTMwMThaMIGCMQswCQYDVQQGEwJIVTERMA8GA1UE BwwIQnVkYXBlc3QxFjAUBgNVBAoMDU1pY3Jvc2VjIEx0ZC4xJzAlBgNVBAMMHk1pY3Jvc2VjIGUt U3ppZ25vIFJvb3QgQ0EgMjAwOTEfMB0GCSqGSIb3DQEJARYQaW5mb0BlLXN6aWduby5odTCCASIw DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAOn4j/NjrdqG2KfgQvvPkd6mJviZpWNwrZuuyjNA fW2WbqEORO7hE52UQlKavXWFdCyoDh2Tthi3jCyoz/tccbna7P7ofo/kLx2yqHWH2Leh5TvPmUpG 0IMZfcChEhyVbUr02MelTTMuhTlAdX4UfIASmFDHQWe4oIBhVKZsTh/gnQ4H6cm6M+f+wFUoLAKA pxn1ntxVUwOXewdI/5n7N4okxFnMUBBjjqqpGrCEGob5X7uxUG6k0QrM1XF+H6cbfPVTbiJfyyvm 1HxdrtbCxkzlBQHZ7Vf8wSN5/PrIJIOV87VqUQHQd9bpEqH5GoP7ghu5sJf0dgYzQ0mg/wu1+rUC AwEAAaOBgDB+MA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBTLD8bf QkPMPcu1SCOhGnqmKrs0aDAfBgNVHSMEGDAWgBTLD8bfQkPMPcu1SCOhGnqmKrs0aDAbBgNVHREE FDASgRBpbmZvQGUtc3ppZ25vLmh1MA0GCSqGSIb3DQEBCwUAA4IBAQDJ0Q5eLtXMs3w+y/w9/w0o lZMEyL/azXm4Q5DwpL7v8u8hmLzU1F0G9u5C7DBsoKqpyvGvivo/C3NqPuouQH4frlRheesuCDfX I/OMn74dseGkddug4lQUsbocKaQY9hK6ohQU4zE1yED/t+AFdlfBHFny+L/k7SViXITwfn4fs775 tyERzAMBVnCnEJIeGzSBHq2cGsMEPO0CYdYeBvNfOofyK/FFh+U9rNHHV4S9a67c2Pm2G2JwCz02 yULyMtd6YebS2z3PyKnJm9zbWETXbzivf3jTo60adbocwTZ8jx5tHMN1Rq41Bab2XD0h7lbwyYIi LXpUq3DDfSJlgnCW -----END CERTIFICATE----- GlobalSign Root CA - R3 ======================= -----BEGIN CERTIFICATE----- MIIDXzCCAkegAwIBAgILBAAAAAABIVhTCKIwDQYJKoZIhvcNAQELBQAwTDEgMB4GA1UECxMXR2xv YmFsU2lnbiBSb290IENBIC0gUjMxEzARBgNVBAoTCkdsb2JhbFNpZ24xEzARBgNVBAMTCkdsb2Jh bFNpZ24wHhcNMDkwMzE4MTAwMDAwWhcNMjkwMzE4MTAwMDAwWjBMMSAwHgYDVQQLExdHbG9iYWxT aWduIFJvb3QgQ0EgLSBSMzETMBEGA1UEChMKR2xvYmFsU2lnbjETMBEGA1UEAxMKR2xvYmFsU2ln bjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMwldpB5BngiFvXAg7aEyiie/QV2EcWt iHL8RgJDx7KKnQRfJMsuS+FggkbhUqsMgUdwbN1k0ev1LKMPgj0MK66X17YUhhB5uzsTgHeMCOFJ 0mpiLx9e+pZo34knlTifBtc+ycsmWQ1z3rDI6SYOgxXG71uL0gRgykmmKPZpO/bLyCiR5Z2KYVc3 rHQU3HTgOu5yLy6c+9C7v/U9AOEGM+iCK65TpjoWc4zdQQ4gOsC0p6Hpsk+QLjJg6VfLuQSSaGjl OCZgdbKfd/+RFO+uIEn8rUAVSNECMWEZXriX7613t2Saer9fwRPvm2L7DWzgVGkWqQPabumDk3F2 xmmFghcCAwEAAaNCMEAwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYE FI/wS3+oLkUkrk1Q+mOai97i3Ru8MA0GCSqGSIb3DQEBCwUAA4IBAQBLQNvAUKr+yAzv95ZURUm7 lgAJQayzE4aGKAczymvmdLm6AC2upArT9fHxD4q/c2dKg8dEe3jgr25sbwMpjjM5RcOO5LlXbKr8 EpbsU8Yt5CRsuZRj+9xTaGdWPoO4zzUhw8lo/s7awlOqzJCK6fBdRoyV3XpYKBovHd7NADdBj+1E bddTKJd+82cEHhXXipa0095MJ6RMG3NzdvQXmcIfeg7jLQitChws/zyrVQ4PkX4268NXSb7hLi18 YIvDQVETI53O9zJrlAGomecsMx86OyXShkDOOyyGeMlhLxS67ttVb9+E7gUJTb0o2HLO02JQZR7r kpeDMdmztcpHWD9f -----END CERTIFICATE----- Autoridad de Certificacion Firmaprofesional CIF A62634068 ========================================================= -----BEGIN CERTIFICATE----- MIIGFDCCA/ygAwIBAgIIU+w77vuySF8wDQYJKoZIhvcNAQEFBQAwUTELMAkGA1UEBhMCRVMxQjBA BgNVBAMMOUF1dG9yaWRhZCBkZSBDZXJ0aWZpY2FjaW9uIEZpcm1hcHJvZmVzaW9uYWwgQ0lGIEE2 MjYzNDA2ODAeFw0wOTA1MjAwODM4MTVaFw0zMDEyMzEwODM4MTVaMFExCzAJBgNVBAYTAkVTMUIw QAYDVQQDDDlBdXRvcmlkYWQgZGUgQ2VydGlmaWNhY2lvbiBGaXJtYXByb2Zlc2lvbmFsIENJRiBB NjI2MzQwNjgwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDKlmuO6vj78aI14H9M2uDD Utd9thDIAl6zQyrET2qyyhxdKJp4ERppWVevtSBC5IsP5t9bpgOSL/UR5GLXMnE42QQMcas9UX4P B99jBVzpv5RvwSmCwLTaUbDBPLutN0pcyvFLNg4kq7/DhHf9qFD0sefGL9ItWY16Ck6WaVICqjaY 7Pz6FIMMNx/Jkjd/14Et5cS54D40/mf0PmbR0/RAz15iNA9wBj4gGFrO93IbJWyTdBSTo3OxDqqH ECNZXyAFGUftaI6SEspd/NYrspI8IM/hX68gvqB2f3bl7BqGYTM+53u0P6APjqK5am+5hyZvQWyI plD9amML9ZMWGxmPsu2bm8mQ9QEM3xk9Dz44I8kvjwzRAv4bVdZO0I08r0+k8/6vKtMFnXkIoctX MbScyJCyZ/QYFpM6/EfY0XiWMR+6KwxfXZmtY4laJCB22N/9q06mIqqdXuYnin1oKaPnirjaEbsX LZmdEyRG98Xi2J+Of8ePdG1asuhy9azuJBCtLxTa/y2aRnFHvkLfuwHb9H/TKI8xWVvTyQKmtFLK bpf7Q8UIJm+K9Lv9nyiqDdVF8xM6HdjAeI9BZzwelGSuewvF6NkBiDkal4ZkQdU7hwxu+g/GvUgU vzlN1J5Bto+WHWOWk9mVBngxaJ43BjuAiUVhOSPHG0SjFeUc+JIwuwIDAQABo4HvMIHsMBIGA1Ud EwEB/wQIMAYBAf8CAQEwDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBRlzeurNR4APn7VdMActHNH DhpkLzCBpgYDVR0gBIGeMIGbMIGYBgRVHSAAMIGPMC8GCCsGAQUFBwIBFiNodHRwOi8vd3d3LmZp cm1hcHJvZmVzaW9uYWwuY29tL2NwczBcBggrBgEFBQcCAjBQHk4AUABhAHMAZQBvACAAZABlACAA bABhACAAQgBvAG4AYQBuAG8AdgBhACAANAA3ACAAQgBhAHIAYwBlAGwAbwBuAGEAIAAwADgAMAAx ADcwDQYJKoZIhvcNAQEFBQADggIBABd9oPm03cXF661LJLWhAqvdpYhKsg9VSytXjDvlMd3+xDLx 51tkljYyGOylMnfX40S2wBEqgLk9am58m9Ot/MPWo+ZkKXzR4Tgegiv/J2Wv+xYVxC5xhOW1//qk R71kMrv2JYSiJ0L1ILDCExARzRAVukKQKtJE4ZYm6zFIEv0q2skGz3QeqUvVhyj5eTSSPi5E6PaP T481PyWzOdxjKpBrIF/EUhJOlywqrJ2X3kjyo2bbwtKDlaZmp54lD+kLM5FlClrD2VQS3a/DTg4f Jl4N3LON7NWBcN7STyQF82xO9UxJZo3R/9ILJUFI/lGExkKvgATP0H5kSeTy36LssUzAKh3ntLFl osS88Zj0qnAHY7S42jtM+kAiMFsRpvAFDsYCA0irhpuF3dvd6qJ2gHN99ZwExEWN57kci57q13XR crHedUTnQn3iV2t93Jm8PYMo6oCTjcVMZcFwgbg4/EMxsvYDNEeyrPsiBsse3RdHHF9mudMaotoR saS8I8nkvof/uZS2+F0gStRf571oe2XyFR7SOqkt6dhrJKyXWERHrVkY8SFlcN7ONGCoQPHzPKTD KCOM/iczQ0CgFzzr6juwcqajuUpLXhZI9LK8yIySxZ2frHI2vDSANGupi5LAuBft7HZT9SQBjLMi 6Et8Vcad+qMUu2WFbm5PEn4KPJ2V -----END CERTIFICATE----- Izenpe.com ========== -----BEGIN CERTIFICATE----- MIIF8TCCA9mgAwIBAgIQALC3WhZIX7/hy/WL1xnmfTANBgkqhkiG9w0BAQsFADA4MQswCQYDVQQG EwJFUzEUMBIGA1UECgwLSVpFTlBFIFMuQS4xEzARBgNVBAMMCkl6ZW5wZS5jb20wHhcNMDcxMjEz MTMwODI4WhcNMzcxMjEzMDgyNzI1WjA4MQswCQYDVQQGEwJFUzEUMBIGA1UECgwLSVpFTlBFIFMu QS4xEzARBgNVBAMMCkl6ZW5wZS5jb20wggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDJ 03rKDx6sp4boFmVqscIbRTJxldn+EFvMr+eleQGPicPK8lVx93e+d5TzcqQsRNiekpsUOqHnJJAK ClaOxdgmlOHZSOEtPtoKct2jmRXagaKH9HtuJneJWK3W6wyyQXpzbm3benhB6QiIEn6HLmYRY2xU +zydcsC8Lv/Ct90NduM61/e0aL6i9eOBbsFGb12N4E3GVFWJGjMxCrFXuaOKmMPsOzTFlUFpfnXC PCDFYbpRR6AgkJOhkEvzTnyFRVSa0QUmQbC1TR0zvsQDyCV8wXDbO/QJLVQnSKwv4cSsPsjLkkxT OTcj7NMB+eAJRE1NZMDhDVqHIrytG6P+JrUV86f8hBnp7KGItERphIPzidF0BqnMC9bC3ieFUCbK F7jJeodWLBoBHmy+E60QrLUk9TiRodZL2vG70t5HtfG8gfZZa88ZU+mNFctKy6lvROUbQc/hhqfK 0GqfvEyNBjNaooXlkDWgYlwWTvDjovoDGrQscbNYLN57C9saD+veIR8GdwYDsMnvmfzAuU8Lhij+ 0rnq49qlw0dpEuDb8PYZi+17cNcC1u2HGCgsBCRMd+RIihrGO5rUD8r6ddIBQFqNeb+Lz0vPqhbB leStTIo+F5HUsWLlguWABKQDfo2/2n+iD5dPDNMN+9fR5XJ+HMh3/1uaD7euBUbl8agW7EekFwID AQABo4H2MIHzMIGwBgNVHREEgagwgaWBD2luZm9AaXplbnBlLmNvbaSBkTCBjjFHMEUGA1UECgw+ SVpFTlBFIFMuQS4gLSBDSUYgQTAxMzM3MjYwLVJNZXJjLlZpdG9yaWEtR2FzdGVpeiBUMTA1NSBG NjIgUzgxQzBBBgNVBAkMOkF2ZGEgZGVsIE1lZGl0ZXJyYW5lbyBFdG9yYmlkZWEgMTQgLSAwMTAx MCBWaXRvcmlhLUdhc3RlaXowDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0O BBYEFB0cZQ6o8iV7tJHP5LGx5r1VdGwFMA0GCSqGSIb3DQEBCwUAA4ICAQB4pgwWSp9MiDrAyw6l Fn2fuUhfGI8NYjb2zRlrrKvV9pF9rnHzP7MOeIWblaQnIUdCSnxIOvVFfLMMjlF4rJUT3sb9fbga kEyrkgPH7UIBzg/YsfqikuFgba56awmqxinuaElnMIAkejEWOVt+8Rwu3WwJrfIxwYJOubv5vr8q hT/AQKM6WfxZSzwoJNu0FXWuDYi6LnPAvViH5ULy617uHjAimcs30cQhbIHsvm0m5hzkQiCeR7Cs g1lwLDXWrzY0tM07+DKo7+N4ifuNRSzanLh+QBxh5z6ikixL8s36mLYp//Pye6kfLqCTVyvehQP5 aTfLnnhqBbTFMXiJ7HqnheG5ezzevh55hM6fcA5ZwjUukCox2eRFekGkLhObNA5me0mrZJfQRsN5 nXJQY6aYWwa9SG3YOYNw6DXwBdGqvOPbyALqfP2C2sJbUjWumDqtujWTI6cfSN01RpiyEGjkpTHC ClguGYEQyVB1/OpaFs4R1+7vUIgtYf8/QnMFlEPVjjxOAToZpR9GTnfQXeWBIiGH/pR9hNiTrdZo Q0iy2+tzJOeRf1SktoA+naM8THLCV8Sg1Mw4J87VBp6iSNnpn86CcDaTmjvfliHjWbcM2pE38P1Z WrOZyGlsQyYBNWNgVYkDOnXYukrZVP/u3oDYLdE41V4tC5h9Pmzb/CaIxw== -----END CERTIFICATE----- Chambers of Commerce Root - 2008 ================================ -----BEGIN CERTIFICATE----- MIIHTzCCBTegAwIBAgIJAKPaQn6ksa7aMA0GCSqGSIb3DQEBBQUAMIGuMQswCQYDVQQGEwJFVTFD MEEGA1UEBxM6TWFkcmlkIChzZWUgY3VycmVudCBhZGRyZXNzIGF0IHd3dy5jYW1lcmZpcm1hLmNv bS9hZGRyZXNzKTESMBAGA1UEBRMJQTgyNzQzMjg3MRswGQYDVQQKExJBQyBDYW1lcmZpcm1hIFMu QS4xKTAnBgNVBAMTIENoYW1iZXJzIG9mIENvbW1lcmNlIFJvb3QgLSAyMDA4MB4XDTA4MDgwMTEy Mjk1MFoXDTM4MDczMTEyMjk1MFowga4xCzAJBgNVBAYTAkVVMUMwQQYDVQQHEzpNYWRyaWQgKHNl ZSBjdXJyZW50IGFkZHJlc3MgYXQgd3d3LmNhbWVyZmlybWEuY29tL2FkZHJlc3MpMRIwEAYDVQQF EwlBODI3NDMyODcxGzAZBgNVBAoTEkFDIENhbWVyZmlybWEgUy5BLjEpMCcGA1UEAxMgQ2hhbWJl cnMgb2YgQ29tbWVyY2UgUm9vdCAtIDIwMDgwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC AQCvAMtwNyuAWko6bHiUfaN/Gh/2NdW928sNRHI+JrKQUrpjOyhYb6WzbZSm891kDFX29ufyIiKA XuFixrYp4YFs8r/lfTJqVKAyGVn+H4vXPWCGhSRv4xGzdz4gljUha7MI2XAuZPeEklPWDrCQiorj h40G072QDuKZoRuGDtqaCrsLYVAGUvGef3bsyw/QHg3PmTA9HMRFEFis1tPo1+XqxQEHd9ZR5gN/ ikilTWh1uem8nk4ZcfUyS5xtYBkL+8ydddy/Js2Pk3g5eXNeJQ7KXOt3EgfLZEFHcpOrUMPrCXZk NNI5t3YRCQ12RcSprj1qr7V9ZS+UWBDsXHyvfuK2GNnQm05aSd+pZgvMPMZ4fKecHePOjlO+Bd5g D2vlGts/4+EhySnB8esHnFIbAURRPHsl18TlUlRdJQfKFiC4reRB7noI/plvg6aRArBsNlVq5331 lubKgdaX8ZSD6e2wsWsSaR6s+12pxZjptFtYer49okQ6Y1nUCyXeG0+95QGezdIp1Z8XGQpvvwyQ 0wlf2eOKNcx5Wk0ZN5K3xMGtr/R5JJqyAQuxr1yW84Ay+1w9mPGgP0revq+ULtlVmhduYJ1jbLhj ya6BXBg14JC7vjxPNyK5fuvPnnchpj04gftI2jE9K+OJ9dC1vX7gUMQSibMjmhAxhduub+84Mxh2 EQIDAQABo4IBbDCCAWgwEgYDVR0TAQH/BAgwBgEB/wIBDDAdBgNVHQ4EFgQU+SSsD7K1+HnA+mCI G8TZTQKeFxkwgeMGA1UdIwSB2zCB2IAU+SSsD7K1+HnA+mCIG8TZTQKeFxmhgbSkgbEwga4xCzAJ BgNVBAYTAkVVMUMwQQYDVQQHEzpNYWRyaWQgKHNlZSBjdXJyZW50IGFkZHJlc3MgYXQgd3d3LmNh bWVyZmlybWEuY29tL2FkZHJlc3MpMRIwEAYDVQQFEwlBODI3NDMyODcxGzAZBgNVBAoTEkFDIENh bWVyZmlybWEgUy5BLjEpMCcGA1UEAxMgQ2hhbWJlcnMgb2YgQ29tbWVyY2UgUm9vdCAtIDIwMDiC CQCj2kJ+pLGu2jAOBgNVHQ8BAf8EBAMCAQYwPQYDVR0gBDYwNDAyBgRVHSAAMCowKAYIKwYBBQUH AgEWHGh0dHA6Ly9wb2xpY3kuY2FtZXJmaXJtYS5jb20wDQYJKoZIhvcNAQEFBQADggIBAJASryI1 wqM58C7e6bXpeHxIvj99RZJe6dqxGfwWPJ+0W2aeaufDuV2I6A+tzyMP3iU6XsxPpcG1Lawk0lgH 3qLPaYRgM+gQDROpI9CF5Y57pp49chNyM/WqfcZjHwj0/gF/JM8rLFQJ3uIrbZLGOU8W6jx+ekbU RWpGqOt1glanq6B8aBMz9p0w8G8nOSQjKpD9kCk18pPfNKXG9/jvjA9iSnyu0/VU+I22mlaHFoI6 M6taIgj3grrqLuBHmrS1RaMFO9ncLkVAO+rcf+g769HsJtg1pDDFOqxXnrN2pSB7+R5KBWIBpih1 YJeSDW4+TTdDDZIVnBgizVGZoCkaPF+KMjNbMMeJL0eYD6MDxvbxrN8y8NmBGuScvfaAFPDRLLmF 9dijscilIeUcE5fuDr3fKanvNFNb0+RqE4QGtjICxFKuItLcsiFCGtpA8CnJ7AoMXOLQusxI0zcK zBIKinmwPQN/aUv0NCB9szTqjktk9T79syNnFQ0EuPAtwQlRPLJsFfClI9eDdOTlLsn+mCdCxqvG nrDQWzilm1DefhiYtUU79nm06PcaewaD+9CL2rvHvRirCG88gGtAPxkZumWK5r7VXNM21+9AUiRg OGcEMeyP84LG3rlV8zsxkVrctQgVrXYlCg17LofiDKYGvCYQbTed7N14jHyAxfDZd0jQ -----END CERTIFICATE----- Global Chambersign Root - 2008 ============================== -----BEGIN CERTIFICATE----- MIIHSTCCBTGgAwIBAgIJAMnN0+nVfSPOMA0GCSqGSIb3DQEBBQUAMIGsMQswCQYDVQQGEwJFVTFD MEEGA1UEBxM6TWFkcmlkIChzZWUgY3VycmVudCBhZGRyZXNzIGF0IHd3dy5jYW1lcmZpcm1hLmNv bS9hZGRyZXNzKTESMBAGA1UEBRMJQTgyNzQzMjg3MRswGQYDVQQKExJBQyBDYW1lcmZpcm1hIFMu QS4xJzAlBgNVBAMTHkdsb2JhbCBDaGFtYmVyc2lnbiBSb290IC0gMjAwODAeFw0wODA4MDExMjMx NDBaFw0zODA3MzExMjMxNDBaMIGsMQswCQYDVQQGEwJFVTFDMEEGA1UEBxM6TWFkcmlkIChzZWUg Y3VycmVudCBhZGRyZXNzIGF0IHd3dy5jYW1lcmZpcm1hLmNvbS9hZGRyZXNzKTESMBAGA1UEBRMJ QTgyNzQzMjg3MRswGQYDVQQKExJBQyBDYW1lcmZpcm1hIFMuQS4xJzAlBgNVBAMTHkdsb2JhbCBD aGFtYmVyc2lnbiBSb290IC0gMjAwODCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMDf VtPkOpt2RbQT2//BthmLN0EYlVJH6xedKYiONWwGMi5HYvNJBL99RDaxccy9Wglz1dmFRP+RVyXf XjaOcNFccUMd2drvXNL7G706tcuto8xEpw2uIRU/uXpbknXYpBI4iRmKt4DS4jJvVpyR1ogQC7N0 ZJJ0YPP2zxhPYLIj0Mc7zmFLmY/CDNBAspjcDahOo7kKrmCgrUVSY7pmvWjg+b4aqIG7HkF4ddPB /gBVsIdU6CeQNR1MM62X/JcumIS/LMmjv9GYERTtY/jKmIhYF5ntRQOXfjyGHoiMvvKRhI9lNNgA TH23MRdaKXoKGCQwoze1eqkBfSbW+Q6OWfH9GzO1KTsXO0G2Id3UwD2ln58fQ1DJu7xsepeY7s2M H/ucUa6LcL0nn3HAa6x9kGbo1106DbDVwo3VyJ2dwW3Q0L9R5OP4wzg2rtandeavhENdk5IMagfe Ox2YItaswTXbo6Al/3K1dh3ebeksZixShNBFks4c5eUzHdwHU1SjqoI7mjcv3N2gZOnm3b2u/GSF HTynyQbehP9r6GsaPMWis0L7iwk+XwhSx2LE1AVxv8Rk5Pihg+g+EpuoHtQ2TS9x9o0o9oOpE9Jh wZG7SMA0j0GMS0zbaRL/UJScIINZc+18ofLx/d33SdNDWKBWY8o9PeU1VlnpDsogzCtLkykPAgMB AAGjggFqMIIBZjASBgNVHRMBAf8ECDAGAQH/AgEMMB0GA1UdDgQWBBS5CcqcHtvTbDprru1U8VuT BjUuXjCB4QYDVR0jBIHZMIHWgBS5CcqcHtvTbDprru1U8VuTBjUuXqGBsqSBrzCBrDELMAkGA1UE BhMCRVUxQzBBBgNVBAcTOk1hZHJpZCAoc2VlIGN1cnJlbnQgYWRkcmVzcyBhdCB3d3cuY2FtZXJm aXJtYS5jb20vYWRkcmVzcykxEjAQBgNVBAUTCUE4Mjc0MzI4NzEbMBkGA1UEChMSQUMgQ2FtZXJm aXJtYSBTLkEuMScwJQYDVQQDEx5HbG9iYWwgQ2hhbWJlcnNpZ24gUm9vdCAtIDIwMDiCCQDJzdPp 1X0jzjAOBgNVHQ8BAf8EBAMCAQYwPQYDVR0gBDYwNDAyBgRVHSAAMCowKAYIKwYBBQUHAgEWHGh0 dHA6Ly9wb2xpY3kuY2FtZXJmaXJtYS5jb20wDQYJKoZIhvcNAQEFBQADggIBAICIf3DekijZBZRG /5BXqfEv3xoNa/p8DhxJJHkn2EaqbylZUohwEurdPfWbU1Rv4WCiqAm57OtZfMY18dwY6fFn5a+6 ReAJ3spED8IXDneRRXozX1+WLGiLwUePmJs9wOzL9dWCkoQ10b42OFZyMVtHLaoXpGNR6woBrX/s dZ7LoR/xfxKxueRkf2fWIyr0uDldmOghp+G9PUIadJpwr2hsUF1Jz//7Dl3mLEfXgTpZALVza2Mg 9jFFCDkO9HB+QHBaP9BrQql0PSgvAm11cpUJjUhjxsYjV5KTXjXBjfkK9yydYhz2rXzdpjEetrHH foUm+qRqtdpjMNHvkzeyZi99Bffnt0uYlDXA2TopwZ2yUDMdSqlapskD7+3056huirRXhOukP9Du qqqHW2Pok+JrqNS4cnhrG+055F3Lm6qH1U9OAP7Zap88MQ8oAgF9mOinsKJknnn4SPIVqczmyETr P3iZ8ntxPjzxmKfFGBI/5rsoM0LpRQp8bfKGeS/Fghl9CYl8slR2iK7ewfPM4W7bMdaTrpmg7yVq c5iJWzouE4gev8CSlDQb4ye3ix5vQv/n6TebUB0tovkC7stYWDpxvGjjqsGvHCgfotwjZT+B6q6Z 09gwzxMNTxXJhLynSC34MCN32EZLeW32jO06f2ARePTpm67VVMB0gNELQp/B -----END CERTIFICATE----- Go Daddy Root Certificate Authority - G2 ======================================== -----BEGIN CERTIFICATE----- MIIDxTCCAq2gAwIBAgIBADANBgkqhkiG9w0BAQsFADCBgzELMAkGA1UEBhMCVVMxEDAOBgNVBAgT B0FyaXpvbmExEzARBgNVBAcTClNjb3R0c2RhbGUxGjAYBgNVBAoTEUdvRGFkZHkuY29tLCBJbmMu MTEwLwYDVQQDEyhHbyBEYWRkeSBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAtIEcyMB4XDTA5 MDkwMTAwMDAwMFoXDTM3MTIzMTIzNTk1OVowgYMxCzAJBgNVBAYTAlVTMRAwDgYDVQQIEwdBcml6 b25hMRMwEQYDVQQHEwpTY290dHNkYWxlMRowGAYDVQQKExFHb0RhZGR5LmNvbSwgSW5jLjExMC8G A1UEAxMoR28gRGFkZHkgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgLSBHMjCCASIwDQYJKoZI hvcNAQEBBQADggEPADCCAQoCggEBAL9xYgjx+lk09xvJGKP3gElY6SKDE6bFIEMBO4Tx5oVJnyfq 9oQbTqC023CYxzIBsQU+B07u9PpPL1kwIuerGVZr4oAH/PMWdYA5UXvl+TW2dE6pjYIT5LY/qQOD +qK+ihVqf94Lw7YZFAXK6sOoBJQ7RnwyDfMAZiLIjWltNowRGLfTshxgtDj6AozO091GB94KPutd fMh8+7ArU6SSYmlRJQVhGkSBjCypQ5Yj36w6gZoOKcUcqeldHraenjAKOc7xiID7S13MMuyFYkMl NAJWJwGRtDtwKj9useiciAF9n9T521NtYJ2/LOdYq7hfRvzOxBsDPAnrSTFcaUaz4EcCAwEAAaNC MEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFDqahQcQZyi27/a9 BUFuIMGU2g/eMA0GCSqGSIb3DQEBCwUAA4IBAQCZ21151fmXWWcDYfF+OwYxdS2hII5PZYe096ac vNjpL9DbWu7PdIxztDhC2gV7+AJ1uP2lsdeu9tfeE8tTEH6KRtGX+rcuKxGrkLAngPnon1rpN5+r 5N9ss4UXnT3ZJE95kTXWXwTrgIOrmgIttRD02JDHBHNA7XIloKmf7J6raBKZV8aPEjoJpL1E/QYV N8Gb5DKj7Tjo2GTzLH4U/ALqn83/B2gX2yKQOC16jdFU8WnjXzPKej17CuPKf1855eJ1usV2GDPO LPAvTK33sefOT6jEm0pUBsV/fdUID+Ic/n4XuKxe9tQWskMJDE32p2u0mYRlynqI4uJEvlz36hz1 -----END CERTIFICATE----- Starfield Root Certificate Authority - G2 ========================================= -----BEGIN CERTIFICATE----- MIID3TCCAsWgAwIBAgIBADANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCVVMxEDAOBgNVBAgT B0FyaXpvbmExEzARBgNVBAcTClNjb3R0c2RhbGUxJTAjBgNVBAoTHFN0YXJmaWVsZCBUZWNobm9s b2dpZXMsIEluYy4xMjAwBgNVBAMTKVN0YXJmaWVsZCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0 eSAtIEcyMB4XDTA5MDkwMTAwMDAwMFoXDTM3MTIzMTIzNTk1OVowgY8xCzAJBgNVBAYTAlVTMRAw DgYDVQQIEwdBcml6b25hMRMwEQYDVQQHEwpTY290dHNkYWxlMSUwIwYDVQQKExxTdGFyZmllbGQg VGVjaG5vbG9naWVzLCBJbmMuMTIwMAYDVQQDEylTdGFyZmllbGQgUm9vdCBDZXJ0aWZpY2F0ZSBB dXRob3JpdHkgLSBHMjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL3twQP89o/8ArFv W59I2Z154qK3A2FWGMNHttfKPTUuiUP3oWmb3ooa/RMgnLRJdzIpVv257IzdIvpy3Cdhl+72WoTs bhm5iSzchFvVdPtrX8WJpRBSiUZV9Lh1HOZ/5FSuS/hVclcCGfgXcVnrHigHdMWdSL5stPSksPNk N3mSwOxGXn/hbVNMYq/NHwtjuzqd+/x5AJhhdM8mgkBj87JyahkNmcrUDnXMN/uLicFZ8WJ/X7Nf ZTD4p7dNdloedl40wOiWVpmKs/B/pM293DIxfJHP4F8R+GuqSVzRmZTRouNjWwl2tVZi4Ut0HZbU JtQIBFnQmA4O5t78w+wfkPECAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC AQYwHQYDVR0OBBYEFHwMMh+n2TB/xH1oo2Kooc6rB1snMA0GCSqGSIb3DQEBCwUAA4IBAQARWfol TwNvlJk7mh+ChTnUdgWUXuEok21iXQnCoKjUsHU48TRqneSfioYmUeYs0cYtbpUgSpIB7LiKZ3sx 4mcujJUDJi5DnUox9g61DLu34jd/IroAow57UvtruzvE03lRTs2Q9GcHGcg8RnoNAX3FWOdt5oUw F5okxBDgBPfg8n/Uqgr/Qh037ZTlZFkSIHc40zI+OIF1lnP6aI+xy84fxez6nH7PfrHxBy22/L/K pL/QlwVKvOoYKAKQvVR4CSFx09F9HdkWsKlhPdAKACL8x3vLCWRFCztAgfd9fDL1mMpYjn0q7pBZ c2T5NnReJaH1ZgUufzkVqSr7UIuOhWn0 -----END CERTIFICATE----- Starfield Services Root Certificate Authority - G2 ================================================== -----BEGIN CERTIFICATE----- MIID7zCCAtegAwIBAgIBADANBgkqhkiG9w0BAQsFADCBmDELMAkGA1UEBhMCVVMxEDAOBgNVBAgT B0FyaXpvbmExEzARBgNVBAcTClNjb3R0c2RhbGUxJTAjBgNVBAoTHFN0YXJmaWVsZCBUZWNobm9s b2dpZXMsIEluYy4xOzA5BgNVBAMTMlN0YXJmaWVsZCBTZXJ2aWNlcyBSb290IENlcnRpZmljYXRl IEF1dGhvcml0eSAtIEcyMB4XDTA5MDkwMTAwMDAwMFoXDTM3MTIzMTIzNTk1OVowgZgxCzAJBgNV BAYTAlVTMRAwDgYDVQQIEwdBcml6b25hMRMwEQYDVQQHEwpTY290dHNkYWxlMSUwIwYDVQQKExxT dGFyZmllbGQgVGVjaG5vbG9naWVzLCBJbmMuMTswOQYDVQQDEzJTdGFyZmllbGQgU2VydmljZXMg Um9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgLSBHMjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCC AQoCggEBANUMOsQq+U7i9b4Zl1+OiFOxHz/Lz58gE20pOsgPfTz3a3Y4Y9k2YKibXlwAgLIvWX/2 h/klQ4bnaRtSmpDhcePYLQ1Ob/bISdm28xpWriu2dBTrz/sm4xq6HZYuajtYlIlHVv8loJNwU4Pa hHQUw2eeBGg6345AWh1KTs9DkTvnVtYAcMtS7nt9rjrnvDH5RfbCYM8TWQIrgMw0R9+53pBlbQLP LJGmpufehRhJfGZOozptqbXuNC66DQO4M99H67FrjSXZm86B0UVGMpZwh94CDklDhbZsc7tk6mFB rMnUVN+HL8cisibMn1lUaJ/8viovxFUcdUBgF4UCVTmLfwUCAwEAAaNCMEAwDwYDVR0TAQH/BAUw AwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFJxfAN+qAdcwKziIorhtSpzyEZGDMA0GCSqG SIb3DQEBCwUAA4IBAQBLNqaEd2ndOxmfZyMIbw5hyf2E3F/YNoHN2BtBLZ9g3ccaaNnRbobhiCPP E95Dz+I0swSdHynVv/heyNXBve6SbzJ08pGCL72CQnqtKrcgfU28elUSwhXqvfdqlS5sdJ/PHLTy xQGjhdByPq1zqwubdQxtRbeOlKyWN7Wg0I8VRw7j6IPdj/3vQQF3zCepYoUz8jcI73HPdwbeyBkd iEDPfUYd/x7H4c7/I9vG+o1VTqkC50cRRj70/b17KSa7qWFiNyi2LSr2EIZkyXCn0q23KXB56jza YyWf/Wi3MOxw+3WKt21gZ7IeyLnp2KhvAotnDU0mV3HaIPzBSlCNsSi6 -----END CERTIFICATE----- AffirmTrust Commercial ====================== -----BEGIN CERTIFICATE----- MIIDTDCCAjSgAwIBAgIId3cGJyapsXwwDQYJKoZIhvcNAQELBQAwRDELMAkGA1UEBhMCVVMxFDAS BgNVBAoMC0FmZmlybVRydXN0MR8wHQYDVQQDDBZBZmZpcm1UcnVzdCBDb21tZXJjaWFsMB4XDTEw MDEyOTE0MDYwNloXDTMwMTIzMTE0MDYwNlowRDELMAkGA1UEBhMCVVMxFDASBgNVBAoMC0FmZmly bVRydXN0MR8wHQYDVQQDDBZBZmZpcm1UcnVzdCBDb21tZXJjaWFsMIIBIjANBgkqhkiG9w0BAQEF AAOCAQ8AMIIBCgKCAQEA9htPZwcroRX1BiLLHwGy43NFBkRJLLtJJRTWzsO3qyxPxkEylFf6Eqdb DuKPHx6GGaeqtS25Xw2Kwq+FNXkyLbscYjfysVtKPcrNcV/pQr6U6Mje+SJIZMblq8Yrba0F8PrV C8+a5fBQpIs7R6UjW3p6+DM/uO+Zl+MgwdYoic+U+7lF7eNAFxHUdPALMeIrJmqbTFeurCA+ukV6 BfO9m2kVrn1OIGPENXY6BwLJN/3HR+7o8XYdcxXyl6S1yHp52UKqK39c/s4mT6NmgTWvRLpUHhww MmWd5jyTXlBOeuM61G7MGvv50jeuJCqrVwMiKA1JdX+3KNp1v47j3A55MQIDAQABo0IwQDAdBgNV HQ4EFgQUnZPGU4teyq8/nx4P5ZmVvCT2lI8wDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC AQYwDQYJKoZIhvcNAQELBQADggEBAFis9AQOzcAN/wr91LoWXym9e2iZWEnStB03TX8nfUYGXUPG hi4+c7ImfU+TqbbEKpqrIZcUsd6M06uJFdhrJNTxFq7YpFzUf1GO7RgBsZNjvbz4YYCanrHOQnDi qX0GJX0nof5v7LMeJNrjS1UaADs1tDvZ110w/YETifLCBivtZ8SOyUOyXGsViQK8YvxO8rUzqrJv 0wqiUOP2O+guRMLbZjipM1ZI8W0bM40NjD9gN53Tym1+NH4Nn3J2ixufcv1SNUFFApYvHLKac0kh sUlHRUe072o0EclNmsxZt9YCnlpOZbWUrhvfKbAW8b8Angc6F2S1BLUjIZkKlTuXfO8= -----END CERTIFICATE----- AffirmTrust Networking ====================== -----BEGIN CERTIFICATE----- MIIDTDCCAjSgAwIBAgIIfE8EORzUmS0wDQYJKoZIhvcNAQEFBQAwRDELMAkGA1UEBhMCVVMxFDAS BgNVBAoMC0FmZmlybVRydXN0MR8wHQYDVQQDDBZBZmZpcm1UcnVzdCBOZXR3b3JraW5nMB4XDTEw MDEyOTE0MDgyNFoXDTMwMTIzMTE0MDgyNFowRDELMAkGA1UEBhMCVVMxFDASBgNVBAoMC0FmZmly bVRydXN0MR8wHQYDVQQDDBZBZmZpcm1UcnVzdCBOZXR3b3JraW5nMIIBIjANBgkqhkiG9w0BAQEF AAOCAQ8AMIIBCgKCAQEAtITMMxcua5Rsa2FSoOujz3mUTOWUgJnLVWREZY9nZOIG41w3SfYvm4SE Hi3yYJ0wTsyEheIszx6e/jarM3c1RNg1lho9Nuh6DtjVR6FqaYvZ/Ls6rnla1fTWcbuakCNrmreI dIcMHl+5ni36q1Mr3Lt2PpNMCAiMHqIjHNRqrSK6mQEubWXLviRmVSRLQESxG9fhwoXA3hA/Pe24 /PHxI1Pcv2WXb9n5QHGNfb2V1M6+oF4nI979ptAmDgAp6zxG8D1gvz9Q0twmQVGeFDdCBKNwV6gb h+0t+nvujArjqWaJGctB+d1ENmHP4ndGyH329JKBNv3bNPFyfvMMFr20FQIDAQABo0IwQDAdBgNV HQ4EFgQUBx/S55zawm6iQLSwelAQUHTEyL0wDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC AQYwDQYJKoZIhvcNAQEFBQADggEBAIlXshZ6qML91tmbmzTCnLQyFE2npN/svqe++EPbkTfOtDIu UFUaNU52Q3Eg75N3ThVwLofDwR1t3Mu1J9QsVtFSUzpE0nPIxBsFZVpikpzuQY0x2+c06lkh1QF6 12S4ZDnNye2v7UsDSKegmQGA3GWjNq5lWUhPgkvIZfFXHeVZLgo/bNjR9eUJtGxUAArgFU2HdW23 WJZa3W3SAKD0m0i+wzekujbgfIeFlxoVot4uolu9rxj5kFDNcFn4J2dHy8egBzp90SxdbBk6ZrV9 /ZFvgrG+CJPbFEfxojfHRZ48x3evZKiT3/Zpg4Jg8klCNO1aAFSFHBY2kgxc+qatv9s= -----END CERTIFICATE----- AffirmTrust Premium =================== -----BEGIN CERTIFICATE----- MIIFRjCCAy6gAwIBAgIIbYwURrGmCu4wDQYJKoZIhvcNAQEMBQAwQTELMAkGA1UEBhMCVVMxFDAS BgNVBAoMC0FmZmlybVRydXN0MRwwGgYDVQQDDBNBZmZpcm1UcnVzdCBQcmVtaXVtMB4XDTEwMDEy OTE0MTAzNloXDTQwMTIzMTE0MTAzNlowQTELMAkGA1UEBhMCVVMxFDASBgNVBAoMC0FmZmlybVRy dXN0MRwwGgYDVQQDDBNBZmZpcm1UcnVzdCBQcmVtaXVtMIICIjANBgkqhkiG9w0BAQEFAAOCAg8A MIICCgKCAgEAxBLfqV/+Qd3d9Z+K4/as4Tx4mrzY8H96oDMq3I0gW64tb+eT2TZwamjPjlGjhVtn BKAQJG9dKILBl1fYSCkTtuG+kU3fhQxTGJoeJKJPj/CihQvL9Cl/0qRY7iZNyaqoe5rZ+jjeRFcV 5fiMyNlI4g0WJx0eyIOFJbe6qlVBzAMiSy2RjYvmia9mx+n/K+k8rNrSs8PhaJyJ+HoAVt70VZVs +7pk3WKL3wt3MutizCaam7uqYoNMtAZ6MMgpv+0GTZe5HMQxK9VfvFMSF5yZVylmd2EhMQcuJUmd GPLu8ytxjLW6OQdJd/zvLpKQBY0tL3d770O/Nbua2Plzpyzy0FfuKE4mX4+QaAkvuPjcBukumj5R p9EixAqnOEhss/n/fauGV+O61oV4d7pD6kh/9ti+I20ev9E2bFhc8e6kGVQa9QPSdubhjL08s9NI S+LI+H+SqHZGnEJlPqQewQcDWkYtuJfzt9WyVSHvutxMAJf7FJUnM7/oQ0dG0giZFmA7mn7S5u04 6uwBHjxIVkkJx0w3AJ6IDsBz4W9m6XJHMD4Q5QsDyZpCAGzFlH5hxIrff4IaC1nEWTJ3s7xgaVY5 /bQGeyzWZDbZvUjthB9+pSKPKrhC9IK31FOQeE4tGv2Bb0TXOwF0lkLgAOIua+rF7nKsu7/+6qqo +Nz2snmKtmcCAwEAAaNCMEAwHQYDVR0OBBYEFJ3AZ6YMItkm9UWrpmVSESfYRaxjMA8GA1UdEwEB /wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMA0GCSqGSIb3DQEBDAUAA4ICAQCzV00QYk465KzquByv MiPIs0laUZx2KI15qldGF9X1Uva3ROgIRL8YhNILgM3FEv0AVQVhh0HctSSePMTYyPtwni94loMg Nt58D2kTiKV1NpgIpsbfrM7jWNa3Pt668+s0QNiigfV4Py/VpfzZotReBA4Xrf5B8OWycvpEgjNC 6C1Y91aMYj+6QrCcDFx+LmUmXFNPALJ4fqENmS2NuB2OosSw/WDQMKSOyARiqcTtNd56l+0OOF6S L5Nwpamcb6d9Ex1+xghIsV5n61EIJenmJWtSKZGc0jlzCFfemQa0W50QBuHCAKi4HEoCChTQwUHK +4w1IX2COPKpVJEZNZOUbWo6xbLQu4mGk+ibyQ86p3q4ofB4Rvr8Ny/lioTz3/4E2aFooC8k4gmV BtWVyuEklut89pMFu+1z6S3RdTnX5yTb2E5fQ4+e0BQ5v1VwSJlXMbSc7kqYA5YwH2AG7hsj/oFg IxpHYoWlzBk0gG+zrBrjn/B7SK3VAdlntqlyk+otZrWyuOQ9PLLvTIzq6we/qzWaVYa8GKa1qF60 g2xraUDTn9zxw2lrueFtCfTxqlB2Cnp9ehehVZZCmTEJ3WARjQUwfuaORtGdFNrHF+QFlozEJLUb zxQHskD4o55BhrwE0GuWyCqANP2/7waj3VjFhT0+j/6eKeC2uAloGRwYQw== -----END CERTIFICATE----- AffirmTrust Premium ECC ======================= -----BEGIN CERTIFICATE----- MIIB/jCCAYWgAwIBAgIIdJclisc/elQwCgYIKoZIzj0EAwMwRTELMAkGA1UEBhMCVVMxFDASBgNV BAoMC0FmZmlybVRydXN0MSAwHgYDVQQDDBdBZmZpcm1UcnVzdCBQcmVtaXVtIEVDQzAeFw0xMDAx MjkxNDIwMjRaFw00MDEyMzExNDIwMjRaMEUxCzAJBgNVBAYTAlVTMRQwEgYDVQQKDAtBZmZpcm1U cnVzdDEgMB4GA1UEAwwXQWZmaXJtVHJ1c3QgUHJlbWl1bSBFQ0MwdjAQBgcqhkjOPQIBBgUrgQQA IgNiAAQNMF4bFZ0D0KF5Nbc6PJJ6yhUczWLznCZcBz3lVPqj1swS6vQUX+iOGasvLkjmrBhDeKzQ N8O9ss0s5kfiGuZjuD0uL3jET9v0D6RoTFVya5UdThhClXjMNzyR4ptlKymjQjBAMB0GA1UdDgQW BBSaryl6wBE1NSZRMADDav5A1a7WPDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAK BggqhkjOPQQDAwNnADBkAjAXCfOHiFBar8jAQr9HX/VsaobgxCd05DhT1wV/GzTjxi+zygk8N53X 57hG8f2h4nECMEJZh0PUUd+60wkyWs6Iflc9nF9Ca/UHLbXwgpP5WW+uZPpY5Yse42O+tYHNbwKM eQ== -----END CERTIFICATE----- Certum Trusted Network CA ========================= -----BEGIN CERTIFICATE----- MIIDuzCCAqOgAwIBAgIDBETAMA0GCSqGSIb3DQEBBQUAMH4xCzAJBgNVBAYTAlBMMSIwIAYDVQQK ExlVbml6ZXRvIFRlY2hub2xvZ2llcyBTLkEuMScwJQYDVQQLEx5DZXJ0dW0gQ2VydGlmaWNhdGlv biBBdXRob3JpdHkxIjAgBgNVBAMTGUNlcnR1bSBUcnVzdGVkIE5ldHdvcmsgQ0EwHhcNMDgxMDIy MTIwNzM3WhcNMjkxMjMxMTIwNzM3WjB+MQswCQYDVQQGEwJQTDEiMCAGA1UEChMZVW5pemV0byBU ZWNobm9sb2dpZXMgUy5BLjEnMCUGA1UECxMeQ2VydHVtIENlcnRpZmljYXRpb24gQXV0aG9yaXR5 MSIwIAYDVQQDExlDZXJ0dW0gVHJ1c3RlZCBOZXR3b3JrIENBMIIBIjANBgkqhkiG9w0BAQEFAAOC AQ8AMIIBCgKCAQEA4/t9o3K6wvDJFIf1awFO4W5AB7ptJ11/91sts1rHUV+rpDKmYYe2bg+G0jAC l/jXaVehGDldamR5xgFZrDwxSjh80gTSSyjoIF87B6LMTXPb865Px1bVWqeWifrzq2jUI4ZZJ88J J7ysbnKDHDBy3+Ci6dLhdHUZvSqeexVUBBvXQzmtVSjF4hq79MDkrjhJM8x2hZ85RdKknvISjFH4 fOQtf/WsX+sWn7Et0brMkUJ3TCXJkDhv2/DM+44el1k+1WBO5gUo7Ul5E0u6SNsv+XLTOcr+H9g0 cvW0QM8xAcPs3hEtF10fuFDRXhmnad4HMyjKUJX5p1TLVIZQRan5SQIDAQABo0IwQDAPBgNVHRMB Af8EBTADAQH/MB0GA1UdDgQWBBQIds3LB/8k9sXN7buQvOKEN0Z19zAOBgNVHQ8BAf8EBAMCAQYw DQYJKoZIhvcNAQEFBQADggEBAKaorSLOAT2mo/9i0Eidi15ysHhE49wcrwn9I0j6vSrEuVUEtRCj jSfeC4Jj0O7eDDd5QVsisrCaQVymcODU0HfLI9MA4GxWL+FpDQ3Zqr8hgVDZBqWo/5U30Kr+4rP1 mS1FhIrlQgnXdAIv94nYmem8J9RHjboNRhx3zxSkHLmkMcScKHQDNP8zGSal6Q10tz6XxnboJ5aj Zt3hrvJBW8qYVoNzcOSGGtIxQbovvi0TWnZvTuhOgQ4/WwMioBK+ZlgRSssDxLQqKi2WF+A5VLxI 03YnnZotBqbJ7DnSq9ufmgsnAjUpsUCV5/nonFWIGUbWtzT1fs45mtk48VH3Tyw= -----END CERTIFICATE----- Certinomis - Autorité Racine ============================ -----BEGIN CERTIFICATE----- MIIFnDCCA4SgAwIBAgIBATANBgkqhkiG9w0BAQUFADBjMQswCQYDVQQGEwJGUjETMBEGA1UEChMK Q2VydGlub21pczEXMBUGA1UECxMOMDAwMiA0MzM5OTg5MDMxJjAkBgNVBAMMHUNlcnRpbm9taXMg LSBBdXRvcml0w6kgUmFjaW5lMB4XDTA4MDkxNzA4Mjg1OVoXDTI4MDkxNzA4Mjg1OVowYzELMAkG A1UEBhMCRlIxEzARBgNVBAoTCkNlcnRpbm9taXMxFzAVBgNVBAsTDjAwMDIgNDMzOTk4OTAzMSYw JAYDVQQDDB1DZXJ0aW5vbWlzIC0gQXV0b3JpdMOpIFJhY2luZTCCAiIwDQYJKoZIhvcNAQEBBQAD ggIPADCCAgoCggIBAJ2Fn4bT46/HsmtuM+Cet0I0VZ35gb5j2CN2DpdUzZlMGvE5x4jYF1AMnmHa wE5V3udauHpOd4cN5bjr+p5eex7Ezyh0x5P1FMYiKAT5kcOrJ3NqDi5N8y4oH3DfVS9O7cdxbwly Lu3VMpfQ8Vh30WC8Tl7bmoT2R2FFK/ZQpn9qcSdIhDWerP5pqZ56XjUl+rSnSTV3lqc2W+HN3yNw 2F1MpQiD8aYkOBOo7C+ooWfHpi2GR+6K/OybDnT0K0kCe5B1jPyZOQE51kqJ5Z52qz6WKDgmi92N jMD2AR5vpTESOH2VwnHu7XSu5DaiQ3XV8QCb4uTXzEIDS3h65X27uK4uIJPT5GHfceF2Z5c/tt9q c1pkIuVC28+BA5PY9OMQ4HL2AHCs8MF6DwV/zzRpRbWT5BnbUhYjBYkOjUjkJW+zeL9i9Qf6lSTC lrLooyPCXQP8w9PlfMl1I9f09bze5N/NgL+RiH2nE7Q5uiy6vdFrzPOlKO1Enn1So2+WLhl+HPNb xxaOu2B9d2ZHVIIAEWBsMsGoOBvrbpgT1u449fCfDu/+MYHB0iSVL1N6aaLwD4ZFjliCK0wi1F6g 530mJ0jfJUaNSih8hp75mxpZuWW/Bd22Ql095gBIgl4g9xGC3srYn+Y3RyYe63j3YcNBZFgCQfna 4NH4+ej9Uji29YnfAgMBAAGjWzBZMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0G A1UdDgQWBBQNjLZh2kS40RR9w759XkjwzspqsDAXBgNVHSAEEDAOMAwGCiqBegFWAgIAAQEwDQYJ KoZIhvcNAQEFBQADggIBACQ+YAZ+He86PtvqrxyaLAEL9MW12Ukx9F1BjYkMTv9sov3/4gbIOZ/x WqndIlgVqIrTseYyCYIDbNc/CMf4uboAbbnW/FIyXaR/pDGUu7ZMOH8oMDX/nyNTt7buFHAAQCva R6s0fl6nVjBhK4tDrP22iCj1a7Y+YEq6QpA0Z43q619FVDsXrIvkxmUP7tCMXWY5zjKn2BCXwH40 nJ+U8/aGH88bc62UeYdocMMzpXDn2NU4lG9jeeu/Cg4I58UvD0KgKxRA/yHgBcUn4YQRE7rWhh1B CxMjidPJC+iKunqjo3M3NYB9Ergzd0A4wPpeMNLytqOx1qKVl4GbUu1pTP+A5FPbVFsDbVRfsbjv JL1vnxHDx2TCDyhihWZeGnuyt++uNckZM6i4J9szVb9o4XVIRFb7zdNIu0eJOqxp9YDG5ERQL1TE qkPFMTFYvZbF6nVsmnWxTfj3l/+WFvKXTej28xH5On2KOG4Ey+HTRRWqpdEdnV1j6CTmNhTih60b WfVEm/vXd3wfAXBioSAaosUaKPQhA+4u2cGA6rnZgtZbdsLLO7XSAPCjDuGtbkD326C00EauFddE wk01+dIL8hf2rGbVJLJP0RyZwG71fet0BLj5TXcJ17TPBzAJ8bgAVtkXFhYKK4bfjwEZGuW7gmP/ vgt2Fl43N+bYdJeimUV5 -----END CERTIFICATE----- TWCA Root Certification Authority ================================= -----BEGIN CERTIFICATE----- MIIDezCCAmOgAwIBAgIBATANBgkqhkiG9w0BAQUFADBfMQswCQYDVQQGEwJUVzESMBAGA1UECgwJ VEFJV0FOLUNBMRAwDgYDVQQLDAdSb290IENBMSowKAYDVQQDDCFUV0NBIFJvb3QgQ2VydGlmaWNh dGlvbiBBdXRob3JpdHkwHhcNMDgwODI4MDcyNDMzWhcNMzAxMjMxMTU1OTU5WjBfMQswCQYDVQQG EwJUVzESMBAGA1UECgwJVEFJV0FOLUNBMRAwDgYDVQQLDAdSb290IENBMSowKAYDVQQDDCFUV0NB IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK AoIBAQCwfnK4pAOU5qfeCTiRShFAh6d8WWQUe7UREN3+v9XAu1bihSX0NXIP+FPQQeFEAcK0HMMx QhZHhTMidrIKbw/lJVBPhYa+v5guEGcevhEFhgWQxFnQfHgQsIBct+HHK3XLfJ+utdGdIzdjp9xC oi2SBBtQwXu4PhvJVgSLL1KbralW6cH/ralYhzC2gfeXRfwZVzsrb+RH9JlF/h3x+JejiB03HFyP 4HYlmlD4oFT/RJB2I9IyxsOrBr/8+7/zrX2SYgJbKdM1o5OaQ2RgXbL6Mv87BK9NQGr5x+PvI/1r y+UPizgN7gr8/g+YnzAx3WxSZfmLgb4i4RxYA7qRG4kHAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIB BjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBRqOFsmjd6LWvJPelSDGRjjCDWmujANBgkqhkiG 9w0BAQUFAAOCAQEAPNV3PdrfibqHDAhUaiBQkr6wQT25JmSDCi/oQMCXKCeCMErJk/9q56YAf4lC mtYR5VPOL8zy2gXE/uJQxDqGfczafhAJO5I1KlOy/usrBdlsXebQ79NqZp4VKIV66IIArB6nCWlW QtNoURi+VJq/REG6Sb4gumlc7rh3zc5sH62Dlhh9DrUUOYTxKOkto557HnpyWoOzeW/vtPzQCqVY T0bf+215WfKEIlKuD8z7fDvnaspHYcN6+NOSBB+4IIThNlQWx0DeO4pz3N/GCUzf7Nr/1FNCocny Yh0igzyXxfkZYiesZSLX0zzG5Y6yU8xJzrww/nsOM5D77dIUkR8Hrw== -----END CERTIFICATE----- Security Communication RootCA2 ============================== -----BEGIN CERTIFICATE----- MIIDdzCCAl+gAwIBAgIBADANBgkqhkiG9w0BAQsFADBdMQswCQYDVQQGEwJKUDElMCMGA1UEChMc U0VDT00gVHJ1c3QgU3lzdGVtcyBDTy4sTFRELjEnMCUGA1UECxMeU2VjdXJpdHkgQ29tbXVuaWNh dGlvbiBSb290Q0EyMB4XDTA5MDUyOTA1MDAzOVoXDTI5MDUyOTA1MDAzOVowXTELMAkGA1UEBhMC SlAxJTAjBgNVBAoTHFNFQ09NIFRydXN0IFN5c3RlbXMgQ08uLExURC4xJzAlBgNVBAsTHlNlY3Vy aXR5IENvbW11bmljYXRpb24gUm9vdENBMjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB ANAVOVKxUrO6xVmCxF1SrjpDZYBLx/KWvNs2l9amZIyoXvDjChz335c9S672XewhtUGrzbl+dp++ +T42NKA7wfYxEUV0kz1XgMX5iZnK5atq1LXaQZAQwdbWQonCv/Q4EpVMVAX3NuRFg3sUZdbcDE3R 3n4MqzvEFb46VqZab3ZpUql6ucjrappdUtAtCms1FgkQhNBqyjoGADdH5H5XTz+L62e4iKrFvlNV spHEfbmwhRkGeC7bYRr6hfVKkaHnFtWOojnflLhwHyg/i/xAXmODPIMqGplrz95Zajv8bxbXH/1K EOtOghY6rCcMU/Gt1SSwawNQwS08Ft1ENCcadfsCAwEAAaNCMEAwHQYDVR0OBBYEFAqFqXdlBZh8 QIH4D5csOPEK7DzPMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEB CwUAA4IBAQBMOqNErLlFsceTfsgLCkLfZOoc7llsCLqJX2rKSpWeeo8HxdpFcoJxDjrSzG+ntKEj u/Ykn8sX/oymzsLS28yN/HH8AynBbF0zX2S2ZTuJbxh2ePXcokgfGT+Ok+vx+hfuzU7jBBJV1uXk 3fs+BXziHV7Gp7yXT2g69ekuCkO2r1dcYmh8t/2jioSgrGK+KwmHNPBqAbubKVY8/gA3zyNs8U6q tnRGEmyR7jTV7JqR50S+kDFy1UkC9gLl9B/rfNmWVan/7Ir5mUf/NVoCqgTLiluHcSmRvaS0eg29 mvVXIwAHIRc/SjnRBUkLp7Y3gaVdjKozXoEofKd9J+sAro03 -----END CERTIFICATE----- EC-ACC ====== -----BEGIN CERTIFICATE----- MIIFVjCCBD6gAwIBAgIQ7is969Qh3hSoYqwE893EATANBgkqhkiG9w0BAQUFADCB8zELMAkGA1UE BhMCRVMxOzA5BgNVBAoTMkFnZW5jaWEgQ2F0YWxhbmEgZGUgQ2VydGlmaWNhY2lvIChOSUYgUS0w ODAxMTc2LUkpMSgwJgYDVQQLEx9TZXJ2ZWlzIFB1YmxpY3MgZGUgQ2VydGlmaWNhY2lvMTUwMwYD VQQLEyxWZWdldSBodHRwczovL3d3dy5jYXRjZXJ0Lm5ldC92ZXJhcnJlbCAoYykwMzE1MDMGA1UE CxMsSmVyYXJxdWlhIEVudGl0YXRzIGRlIENlcnRpZmljYWNpbyBDYXRhbGFuZXMxDzANBgNVBAMT BkVDLUFDQzAeFw0wMzAxMDcyMzAwMDBaFw0zMTAxMDcyMjU5NTlaMIHzMQswCQYDVQQGEwJFUzE7 MDkGA1UEChMyQWdlbmNpYSBDYXRhbGFuYSBkZSBDZXJ0aWZpY2FjaW8gKE5JRiBRLTA4MDExNzYt SSkxKDAmBgNVBAsTH1NlcnZlaXMgUHVibGljcyBkZSBDZXJ0aWZpY2FjaW8xNTAzBgNVBAsTLFZl Z2V1IGh0dHBzOi8vd3d3LmNhdGNlcnQubmV0L3ZlcmFycmVsIChjKTAzMTUwMwYDVQQLEyxKZXJh cnF1aWEgRW50aXRhdHMgZGUgQ2VydGlmaWNhY2lvIENhdGFsYW5lczEPMA0GA1UEAxMGRUMtQUND MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAsyLHT+KXQpWIR4NA9h0X84NzJB5R85iK w5K4/0CQBXCHYMkAqbWUZRkiFRfCQ2xmRJoNBD45b6VLeqpjt4pEndljkYRm4CgPukLjbo73FCeT ae6RDqNfDrHrZqJyTxIThmV6PttPB/SnCWDaOkKZx7J/sxaVHMf5NLWUhdWZXqBIoH7nF2W4onW4 HvPlQn2v7fOKSGRdghST2MDk/7NQcvJ29rNdQlB50JQ+awwAvthrDk4q7D7SzIKiGGUzE3eeml0a E9jD2z3Il3rucO2n5nzbcc8tlGLfbdb1OL4/pYUKGbio2Al1QnDE6u/LDsg0qBIimAy4E5S2S+zw 0JDnJwIDAQABo4HjMIHgMB0GA1UdEQQWMBSBEmVjX2FjY0BjYXRjZXJ0Lm5ldDAPBgNVHRMBAf8E BTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUoMOLRKo3pUW/l4Ba0fF4opvpXY0wfwYD VR0gBHgwdjB0BgsrBgEEAfV4AQMBCjBlMCwGCCsGAQUFBwIBFiBodHRwczovL3d3dy5jYXRjZXJ0 Lm5ldC92ZXJhcnJlbDA1BggrBgEFBQcCAjApGidWZWdldSBodHRwczovL3d3dy5jYXRjZXJ0Lm5l dC92ZXJhcnJlbCAwDQYJKoZIhvcNAQEFBQADggEBAKBIW4IB9k1IuDlVNZyAelOZ1Vr/sXE7zDkJ lF7W2u++AVtd0x7Y/X1PzaBB4DSTv8vihpw3kpBWHNzrKQXlxJ7HNd+KDM3FIUPpqojlNcAZQmNa Al6kSBg6hW/cnbw/nZzBh7h6YQjpdwt/cKt63dmXLGQehb+8dJahw3oS7AwaboMMPOhyRp/7SNVe l+axofjk70YllJyJ22k4vuxcDlbHZVHlUIiIv0LVKz3l+bqeLrPK9HOSAgu+TGbrIP65y7WZf+a2 E/rKS03Z7lNGBjvGTq2TWoF+bCpLagVFjPIhpDGQh2xlnJ2lYJU6Un/10asIbvPuW/mIPX64b24D 5EI= -----END CERTIFICATE----- Hellenic Academic and Research Institutions RootCA 2011 ======================================================= -----BEGIN CERTIFICATE----- MIIEMTCCAxmgAwIBAgIBADANBgkqhkiG9w0BAQUFADCBlTELMAkGA1UEBhMCR1IxRDBCBgNVBAoT O0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgQ2VydC4gQXV0aG9y aXR5MUAwPgYDVQQDEzdIZWxsZW5pYyBBY2FkZW1pYyBhbmQgUmVzZWFyY2ggSW5zdGl0dXRpb25z IFJvb3RDQSAyMDExMB4XDTExMTIwNjEzNDk1MloXDTMxMTIwMTEzNDk1MlowgZUxCzAJBgNVBAYT AkdSMUQwQgYDVQQKEztIZWxsZW5pYyBBY2FkZW1pYyBhbmQgUmVzZWFyY2ggSW5zdGl0dXRpb25z IENlcnQuIEF1dGhvcml0eTFAMD4GA1UEAxM3SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNo IEluc3RpdHV0aW9ucyBSb290Q0EgMjAxMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB AKlTAOMupvaO+mDYLZU++CwqVE7NuYRhlFhPjz2L5EPzdYmNUeTDN9KKiE15HrcS3UN4SoqS5tdI 1Q+kOilENbgH9mgdVc04UfCMJDGFr4PJfel3r+0ae50X+bOdOFAPplp5kYCvN66m0zH7tSYJnTxa 71HFK9+WXesyHgLacEnsbgzImjeN9/E2YEsmLIKe0HjzDQ9jpFEw4fkrJxIH2Oq9GGKYsFk3fb7u 8yBRQlqD75O6aRXxYp2fmTmCobd0LovUxQt7L/DICto9eQqakxylKHJzkUOap9FNhYS5qXSPFEDH 3N6sQWRstBmbAmNtJGSPRLIl6s5ddAxjMlyNh+UCAwEAAaOBiTCBhjAPBgNVHRMBAf8EBTADAQH/ MAsGA1UdDwQEAwIBBjAdBgNVHQ4EFgQUppFC/RNhSiOeCKQp5dgTBCPuQSUwRwYDVR0eBEAwPqA8 MAWCAy5ncjAFggMuZXUwBoIELmVkdTAGggQub3JnMAWBAy5ncjAFgQMuZXUwBoEELmVkdTAGgQQu b3JnMA0GCSqGSIb3DQEBBQUAA4IBAQAf73lB4XtuP7KMhjdCSk4cNx6NZrokgclPEg8hwAOXhiVt XdMiKahsog2p6z0GW5k6x8zDmjR/qw7IThzh+uTczQ2+vyT+bOdrwg3IBp5OjWEopmr95fZi6hg8 TqBTnbI6nOulnJEWtk2C4AwFSKls9cz4y51JtPACpf1wA+2KIaWuE4ZJwzNzvoc7dIsXRSZMFpGD /md9zU1jZ/rzAxKWeAaNsWftjj++n08C9bMJL/NMh98qy5V8AcysNnq/onN694/BtZqhFLKPM58N 7yLcZnuEvUUXBj08yrl3NI/K6s8/MT7jiOOASSXIl7WdmplNsDz4SgCbZN2fOUvRJ9e4 -----END CERTIFICATE----- Actalis Authentication Root CA ============================== -----BEGIN CERTIFICATE----- MIIFuzCCA6OgAwIBAgIIVwoRl0LE48wwDQYJKoZIhvcNAQELBQAwazELMAkGA1UEBhMCSVQxDjAM BgNVBAcMBU1pbGFuMSMwIQYDVQQKDBpBY3RhbGlzIFMucC5BLi8wMzM1ODUyMDk2NzEnMCUGA1UE AwweQWN0YWxpcyBBdXRoZW50aWNhdGlvbiBSb290IENBMB4XDTExMDkyMjExMjIwMloXDTMwMDky MjExMjIwMlowazELMAkGA1UEBhMCSVQxDjAMBgNVBAcMBU1pbGFuMSMwIQYDVQQKDBpBY3RhbGlz IFMucC5BLi8wMzM1ODUyMDk2NzEnMCUGA1UEAwweQWN0YWxpcyBBdXRoZW50aWNhdGlvbiBSb290 IENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAp8bEpSmkLO/lGMWwUKNvUTufClrJ wkg4CsIcoBh/kbWHuUA/3R1oHwiD1S0eiKD4j1aPbZkCkpAW1V8IbInX4ay8IMKx4INRimlNAJZa by/ARH6jDuSRzVju3PvHHkVH3Se5CAGfpiEd9UEtL0z9KK3giq0itFZljoZUj5NDKd45RnijMCO6 zfB9E1fAXdKDa0hMxKufgFpbOr3JpyI/gCczWw63igxdBzcIy2zSekciRDXFzMwujt0q7bd9Zg1f YVEiVRvjRuPjPdA1YprbrxTIW6HMiRvhMCb8oJsfgadHHwTrozmSBp+Z07/T6k9QnBn+locePGX2 oxgkg4YQ51Q+qDp2JE+BIcXjDwL4k5RHILv+1A7TaLndxHqEguNTVHnd25zS8gebLra8Pu2Fbe8l EfKXGkJh90qX6IuxEAf6ZYGyojnP9zz/GPvG8VqLWeICrHuS0E4UT1lF9gxeKF+w6D9Fz8+vm2/7 hNN3WpVvrJSEnu68wEqPSpP4RCHiMUVhUE4Q2OM1fEwZtN4Fv6MGn8i1zeQf1xcGDXqVdFUNaBr8 EBtiZJ1t4JWgw5QHVw0U5r0F+7if5t+L4sbnfpb2U8WANFAoWPASUHEXMLrmeGO89LKtmyuy/uE5 jF66CyCU3nuDuP/jVo23Eek7jPKxwV2dpAtMK9myGPW1n0sCAwEAAaNjMGEwHQYDVR0OBBYEFFLY iDrIn3hm7YnzezhwlMkCAjbQMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAUUtiIOsifeGbt ifN7OHCUyQICNtAwDgYDVR0PAQH/BAQDAgEGMA0GCSqGSIb3DQEBCwUAA4ICAQALe3KHwGCmSUyI WOYdiPcUZEim2FgKDk8TNd81HdTtBjHIgT5q1d07GjLukD0R0i70jsNjLiNmsGe+b7bAEzlgqqI0 JZN1Ut6nna0Oh4lScWoWPBkdg/iaKWW+9D+a2fDzWochcYBNy+A4mz+7+uAwTc+G02UQGRjRlwKx K3JCaKygvU5a2hi/a5iB0P2avl4VSM0RFbnAKVy06Ij3Pjaut2L9HmLecHgQHEhb2rykOLpn7VU+ Xlff1ANATIGk0k9jpwlCCRT8AKnCgHNPLsBA2RF7SOp6AsDT6ygBJlh0wcBzIm2Tlf05fbsq4/aC 4yyXX04fkZT6/iyj2HYauE2yOE+b+h1IYHkm4vP9qdCa6HCPSXrW5b0KDtst842/6+OkfcvHlXHo 2qN8xcL4dJIEG4aspCJTQLas/kx2z/uUMsA1n3Y/buWQbqCmJqK4LL7RK4X9p2jIugErsWx0Hbhz lefut8cl8ABMALJ+tguLHPPAUJ4lueAI3jZm/zel0btUZCzJJ7VLkn5l/9Mt4blOvH+kQSGQQXem OR/qnuOf0GZvBeyqdn6/axag67XH/JJULysRJyU3eExRarDzzFhdFPFqSBX/wge2sY0PjlxQRrM9 vwGYT7JZVEc+NHt4bVaTLnPqZih4zR0Uv6CPLy64Lo7yFIrM6bV8+2ydDKXhlg== -----END CERTIFICATE----- Trustis FPS Root CA =================== -----BEGIN CERTIFICATE----- MIIDZzCCAk+gAwIBAgIQGx+ttiD5JNM2a/fH8YygWTANBgkqhkiG9w0BAQUFADBFMQswCQYDVQQG EwJHQjEYMBYGA1UEChMPVHJ1c3RpcyBMaW1pdGVkMRwwGgYDVQQLExNUcnVzdGlzIEZQUyBSb290 IENBMB4XDTAzMTIyMzEyMTQwNloXDTI0MDEyMTExMzY1NFowRTELMAkGA1UEBhMCR0IxGDAWBgNV BAoTD1RydXN0aXMgTGltaXRlZDEcMBoGA1UECxMTVHJ1c3RpcyBGUFMgUm9vdCBDQTCCASIwDQYJ KoZIhvcNAQEBBQADggEPADCCAQoCggEBAMVQe547NdDfxIzNjpvto8A2mfRC6qc+gIMPpqdZh8mQ RUN+AOqGeSoDvT03mYlmt+WKVoaTnGhLaASMk5MCPjDSNzoiYYkchU59j9WvezX2fihHiTHcDnlk H5nSW7r+f2C/revnPDgpai/lkQtV/+xvWNUtyd5MZnGPDNcE2gfmHhjjvSkCqPoc4Vu5g6hBSLwa cY3nYuUtsuvffM/bq1rKMfFMIvMFE/eC+XN5DL7XSxzA0RU8k0Fk0ea+IxciAIleH2ulrG6nS4zt o3Lmr2NNL4XSFDWaLk6M6jKYKIahkQlBOrTh4/L68MkKokHdqeMDx4gVOxzUGpTXn2RZEm0CAwEA AaNTMFEwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBS6+nEleYtXQSUhhgtx67JkDoshZzAd BgNVHQ4EFgQUuvpxJXmLV0ElIYYLceuyZA6LIWcwDQYJKoZIhvcNAQEFBQADggEBAH5Y//01GX2c GE+esCu8jowU/yyg2kdbw++BLa8F6nRIW/M+TgfHbcWzk88iNVy2P3UnXwmWzaD+vkAMXBJV+JOC yinpXj9WV4s4NvdFGkwozZ5BuO1WTISkQMi4sKUraXAEasP41BIy+Q7DsdwyhEQsb8tGD+pmQQ9P 8Vilpg0ND2HepZ5dfWWhPBfnqFVO76DH7cZEf1T1o+CP8HxVIo8ptoGj4W1OLBuAZ+ytIJ8MYmHV l/9D7S3B2l0pKoU/rGXuhg8FjZBf3+6f9L/uHfuY5H+QK4R4EA5sSVPvFVtlRkpdr7r7OnIdzfYl iB6XzCGcKQENZetX2fNXlrtIzYE= -----END CERTIFICATE----- StartCom Certification Authority ================================ -----BEGIN CERTIFICATE----- MIIHhzCCBW+gAwIBAgIBLTANBgkqhkiG9w0BAQsFADB9MQswCQYDVQQGEwJJTDEWMBQGA1UEChMN U3RhcnRDb20gTHRkLjErMCkGA1UECxMiU2VjdXJlIERpZ2l0YWwgQ2VydGlmaWNhdGUgU2lnbmlu ZzEpMCcGA1UEAxMgU3RhcnRDb20gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMDYwOTE3MTk0 NjM3WhcNMzYwOTE3MTk0NjM2WjB9MQswCQYDVQQGEwJJTDEWMBQGA1UEChMNU3RhcnRDb20gTHRk LjErMCkGA1UECxMiU2VjdXJlIERpZ2l0YWwgQ2VydGlmaWNhdGUgU2lnbmluZzEpMCcGA1UEAxMg U3RhcnRDb20gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAw ggIKAoICAQDBiNsJvGxGfHiflXu1M5DycmLWwTYgIiRezul38kMKogZkpMyONvg45iPwbm2xPN1y o4UcodM9tDMr0y+v/uqwQVlntsQGfQqedIXWeUyAN3rfOQVSWff0G0ZDpNKFhdLDcfN1YjS6LIp/ Ho/u7TTQEceWzVI9ujPW3U3eCztKS5/CJi/6tRYccjV3yjxd5srhJosaNnZcAdt0FCX+7bWgiA/d eMotHweXMAEtcnn6RtYTKqi5pquDSR3l8u/d5AGOGAqPY1MWhWKpDhk6zLVmpsJrdAfkK+F2PrRt 2PZE4XNiHzvEvqBTViVsUQn3qqvKv3b9bZvzndu/PWa8DFaqr5hIlTpL36dYUNk4dalb6kMMAv+Z 6+hsTXBbKWWc3apdzK8BMewM69KN6Oqce+Zu9ydmDBpI125C4z/eIT574Q1w+2OqqGwaVLRcJXrJ osmLFqa7LH4XXgVNWG4SHQHuEhANxjJ/GP/89PrNbpHoNkm+Gkhpi8KWTRoSsmkXwQqQ1vp5Iki/ untp+HDH+no32NgN0nZPV/+Qt+OR0t3vwmC3Zzrd/qqc8NSLf3Iizsafl7b4r4qgEKjZ+xjGtrVc UjyJthkqcwEKDwOzEmDyei+B26Nu/yYwl/WL3YlXtq09s68rxbd2AvCl1iuahhQqcvbjM4xdCUsT 37uMdBNSSwIDAQABo4ICEDCCAgwwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYD VR0OBBYEFE4L7xqkQFulF2mHMMo0aEPQQa7yMB8GA1UdIwQYMBaAFE4L7xqkQFulF2mHMMo0aEPQ Qa7yMIIBWgYDVR0gBIIBUTCCAU0wggFJBgsrBgEEAYG1NwEBATCCATgwLgYIKwYBBQUHAgEWImh0 dHA6Ly93d3cuc3RhcnRzc2wuY29tL3BvbGljeS5wZGYwNAYIKwYBBQUHAgEWKGh0dHA6Ly93d3cu c3RhcnRzc2wuY29tL2ludGVybWVkaWF0ZS5wZGYwgc8GCCsGAQUFBwICMIHCMCcWIFN0YXJ0IENv bW1lcmNpYWwgKFN0YXJ0Q29tKSBMdGQuMAMCAQEagZZMaW1pdGVkIExpYWJpbGl0eSwgcmVhZCB0 aGUgc2VjdGlvbiAqTGVnYWwgTGltaXRhdGlvbnMqIG9mIHRoZSBTdGFydENvbSBDZXJ0aWZpY2F0 aW9uIEF1dGhvcml0eSBQb2xpY3kgYXZhaWxhYmxlIGF0IGh0dHA6Ly93d3cuc3RhcnRzc2wuY29t L3BvbGljeS5wZGYwEQYJYIZIAYb4QgEBBAQDAgAHMDgGCWCGSAGG+EIBDQQrFilTdGFydENvbSBG cmVlIFNTTCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTANBgkqhkiG9w0BAQsFAAOCAgEAjo/n3JR5 fPGFf59Jb2vKXfuM/gTFwWLRfUKKvFO3lANmMD+x5wqnUCBVJX92ehQN6wQOQOY+2IirByeDqXWm N3PH/UvSTa0XQMhGvjt/UfzDtgUx3M2FIk5xt/JxXrAaxrqTi3iSSoX4eA+D/i+tLPfkpLst0OcN Org+zvZ49q5HJMqjNTbOx8aHmNrs++myziebiMMEofYLWWivydsQD032ZGNcpRJvkrKTlMeIFw6T tn5ii5B/q06f/ON1FE8qMt9bDeD1e5MNq6HPh+GlBEXoPBKlCcWw0bdT82AUuoVpaiF8H3VhFyAX e2w7QSlc4axa0c2Mm+tgHRns9+Ww2vl5GKVFP0lDV9LdJNUso/2RjSe15esUBppMeyG7Oq0wBhjA 2MFrLH9ZXF2RsXAiV+uKa0hK1Q8p7MZAwC+ITGgBF3f0JBlPvfrhsiAhS90a2Cl9qrjeVOwhVYBs HvUwyKMQ5bLmKhQxw4UtjJixhlpPiVktucf3HMiKf8CdBUrmQk9io20ppB+Fq9vlgcitKj1MXVuE JnHEhV5xJMqlG2zYYdMa4FTbzrqpMrUi9nNBCV24F10OD5mQ1kfabwo6YigUZ4LZ8dCAWZvLMdib D4x3TrVoivJs9iQOLWxwxXPR3hTQcY+203sC9uO41Alua551hDnmfyWl8kgAwKQB2j8= -----END CERTIFICATE----- StartCom Certification Authority G2 =================================== -----BEGIN CERTIFICATE----- MIIFYzCCA0ugAwIBAgIBOzANBgkqhkiG9w0BAQsFADBTMQswCQYDVQQGEwJJTDEWMBQGA1UEChMN U3RhcnRDb20gTHRkLjEsMCoGA1UEAxMjU3RhcnRDb20gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkg RzIwHhcNMTAwMTAxMDEwMDAxWhcNMzkxMjMxMjM1OTAxWjBTMQswCQYDVQQGEwJJTDEWMBQGA1UE ChMNU3RhcnRDb20gTHRkLjEsMCoGA1UEAxMjU3RhcnRDb20gQ2VydGlmaWNhdGlvbiBBdXRob3Jp dHkgRzIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC2iTZbB7cgNr2Cu+EWIAOVeq8O o1XJJZlKxdBWQYeQTSFgpBSHO839sj60ZwNq7eEPS8CRhXBF4EKe3ikj1AENoBB5uNsDvfOpL9HG 4A/LnooUCri99lZi8cVytjIl2bLzvWXFDSxu1ZJvGIsAQRSCb0AgJnooD/Uefyf3lLE3PbfHkffi Aez9lInhzG7TNtYKGXmu1zSCZf98Qru23QumNK9LYP5/Q0kGi4xDuFby2X8hQxfqp0iVAXV16iul Q5XqFYSdCI0mblWbq9zSOdIxHWDirMxWRST1HFSr7obdljKF+ExP6JV2tgXdNiNnvP8V4so75qbs O+wmETRIjfaAKxojAuuKHDp2KntWFhxyKrOq42ClAJ8Em+JvHhRYW6Vsi1g8w7pOOlz34ZYrPu8H vKTlXcxNnw3h3Kq74W4a7I/htkxNeXJdFzULHdfBR9qWJODQcqhaX2YtENwvKhOuJv4KHBnM0D4L nMgJLvlblnpHnOl68wVQdJVznjAJ85eCXuaPOQgeWeU1FEIT/wCc976qUM/iUUjXuG+v+E5+M5iS FGI6dWPPe/regjupuznixL0sAA7IF6wT700ljtizkC+p2il9Ha90OrInwMEePnWjFqmveiJdnxMa z6eg6+OGCtP95paV1yPIN93EfKo2rJgaErHgTuixO/XWb/Ew1wIDAQABo0IwQDAPBgNVHRMBAf8E BTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUS8W0QGutHLOlHGVuRjaJhwUMDrYwDQYJ KoZIhvcNAQELBQADggIBAHNXPyzVlTJ+N9uWkusZXn5T50HsEbZH77Xe7XRcxfGOSeD8bpkTzZ+K 2s06Ctg6Wgk/XzTQLwPSZh0avZyQN8gMjgdalEVGKua+etqhqaRpEpKwfTbURIfXUfEpY9Z1zRbk J4kd+MIySP3bmdCPX1R0zKxnNBFi2QwKN4fRoxdIjtIXHfbX/dtl6/2o1PXWT6RbdejF0mCy2wl+ JYt7ulKSnj7oxXehPOBKc2thz4bcQ///If4jXSRK9dNtD2IEBVeC2m6kMyV5Sy5UGYvMLD0w6dEG /+gyRr61M3Z3qAFdlsHB1b6uJcDJHgoJIIihDsnzb02CVAAgp9KP5DlUFy6NHrgbuxu9mk47EDTc nIhT76IxW1hPkWLIwpqazRVdOKnWvvgTtZ8SafJQYqz7Fzf07rh1Z2AQ+4NQ+US1dZxAF7L+/Xld blhYXzD8AK6vM8EOTmy6p6ahfzLbOOCxchcKK5HsamMm7YnUeMx0HgX4a/6ManY5Ka5lIxKVCCIc l85bBu4M4ru8H0ST9tg4RQUh7eStqxK2A6RCLi3ECToDZ2mEmuFZkIoohdVddLHRDiBYmxOlsGOm 7XtH/UVVMKTumtTm4ofvmMkyghEpIrwACjFeLQ/Ajulrso8uBtjRkcfGEvRM/TAXw8HaOFvjqerm obp573PYtlNXLfbQ4ddI -----END CERTIFICATE----- Buypass Class 2 Root CA ======================= -----BEGIN CERTIFICATE----- MIIFWTCCA0GgAwIBAgIBAjANBgkqhkiG9w0BAQsFADBOMQswCQYDVQQGEwJOTzEdMBsGA1UECgwU QnV5cGFzcyBBUy05ODMxNjMzMjcxIDAeBgNVBAMMF0J1eXBhc3MgQ2xhc3MgMiBSb290IENBMB4X DTEwMTAyNjA4MzgwM1oXDTQwMTAyNjA4MzgwM1owTjELMAkGA1UEBhMCTk8xHTAbBgNVBAoMFEJ1 eXBhc3MgQVMtOTgzMTYzMzI3MSAwHgYDVQQDDBdCdXlwYXNzIENsYXNzIDIgUm9vdCBDQTCCAiIw DQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANfHXvfBB9R3+0Mh9PT1aeTuMgHbo4Yf5FkNuud1 g1Lr6hxhFUi7HQfKjK6w3Jad6sNgkoaCKHOcVgb/S2TwDCo3SbXlzwx87vFKu3MwZfPVL4O2fuPn 9Z6rYPnT8Z2SdIrkHJasW4DptfQxh6NR/Md+oW+OU3fUl8FVM5I+GC911K2GScuVr1QGbNgGE41b /+EmGVnAJLqBcXmQRFBoJJRfuLMR8SlBYaNByyM21cHxMlAQTn/0hpPshNOOvEu/XAFOBz3cFIqU CqTqc/sLUegTBxj6DvEr0VQVfTzh97QZQmdiXnfgolXsttlpF9U6r0TtSsWe5HonfOV116rLJeff awrbD02TTqigzXsu8lkBarcNuAeBfos4GzjmCleZPe4h6KP1DBbdi+w0jpwqHAAVF41og9JwnxgI zRFo1clrUs3ERo/ctfPYV3Me6ZQ5BL/T3jjetFPsaRyifsSP5BtwrfKi+fv3FmRmaZ9JUaLiFRhn Bkp/1Wy1TbMz4GHrXb7pmA8y1x1LPC5aAVKRCfLf6o3YBkBjqhHk/sM3nhRSP/TizPJhk9H9Z2vX Uq6/aKtAQ6BXNVN48FP4YUIHZMbXb5tMOA1jrGKvNouicwoN9SG9dKpN6nIDSdvHXx1iY8f93ZHs M+71bbRuMGjeyNYmsHVee7QHIJihdjK4TWxPAgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wHQYD VR0OBBYEFMmAd+BikoL1RpzzuvdMw964o605MA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQsF AAOCAgEAU18h9bqwOlI5LJKwbADJ784g7wbylp7ppHR/ehb8t/W2+xUbP6umwHJdELFx7rxP462s A20ucS6vxOOto70MEae0/0qyexAQH6dXQbLArvQsWdZHEIjzIVEpMMpghq9Gqx3tOluwlN5E40EI osHsHdb9T7bWR9AUC8rmyrV7d35BH16Dx7aMOZawP5aBQW9gkOLo+fsicdl9sz1Gv7SEr5AcD48S aq/v7h56rgJKihcrdv6sVIkkLE8/trKnToyokZf7KcZ7XC25y2a2t6hbElGFtQl+Ynhw/qlqYLYd DnkM/crqJIByw5c/8nerQyIKx+u2DISCLIBrQYoIwOula9+ZEsuK1V6ADJHgJgg2SMX6OBE1/yWD LfJ6v9r9jv6ly0UsH8SIU653DtmadsWOLB2jutXsMq7Aqqz30XpN69QH4kj3Io6wpJ9qzo6ysmD0 oyLQI+uUWnpp3Q+/QFesa1lQ2aOZ4W7+jQF5JyMV3pKdewlNWudLSDBaGOYKbeaP4NK75t98biGC wWg5TbSYWGZizEqQXsP6JwSxeRV0mcy+rSDeJmAc61ZRpqPq5KM/p/9h3PFaTWwyI0PurKju7koS CTxdccK+efrCh2gdC/1cacwG0Jp9VJkqyTkaGa9LKkPzY11aWOIv4x3kqdbQCtCev9eBCfHJxyYN rJgWVqA= -----END CERTIFICATE----- Buypass Class 3 Root CA ======================= -----BEGIN CERTIFICATE----- MIIFWTCCA0GgAwIBAgIBAjANBgkqhkiG9w0BAQsFADBOMQswCQYDVQQGEwJOTzEdMBsGA1UECgwU QnV5cGFzcyBBUy05ODMxNjMzMjcxIDAeBgNVBAMMF0J1eXBhc3MgQ2xhc3MgMyBSb290IENBMB4X DTEwMTAyNjA4Mjg1OFoXDTQwMTAyNjA4Mjg1OFowTjELMAkGA1UEBhMCTk8xHTAbBgNVBAoMFEJ1 eXBhc3MgQVMtOTgzMTYzMzI3MSAwHgYDVQQDDBdCdXlwYXNzIENsYXNzIDMgUm9vdCBDQTCCAiIw DQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKXaCpUWUOOV8l6ddjEGMnqb8RB2uACatVI2zSRH sJ8YZLya9vrVediQYkwiL944PdbgqOkcLNt4EemOaFEVcsfzM4fkoF0LXOBXByow9c3EN3coTRiR 5r/VUv1xLXA+58bEiuPwKAv0dpihi4dVsjoT/Lc+JzeOIuOoTyrvYLs9tznDDgFHmV0ST9tD+leh 7fmdvhFHJlsTmKtdFoqwNxxXnUX/iJY2v7vKB3tvh2PX0DJq1l1sDPGzbjniazEuOQAnFN44wOwZ ZoYS6J1yFhNkUsepNxz9gjDthBgd9K5c/3ATAOux9TN6S9ZV+AWNS2mw9bMoNlwUxFFzTWsL8TQH 2xc519woe2v1n/MuwU8XKhDzzMro6/1rqy6any2CbgTUUgGTLT2G/H783+9CHaZr77kgxve9oKeV /afmiSTYzIw0bOIjL9kSGiG5VZFvC5F5GQytQIgLcOJ60g7YaEi7ghM5EFjp2CoHxhLbWNvSO1UQ RwUVZ2J+GGOmRj8JDlQyXr8NYnon74Do29lLBlo3WiXQCBJ31G8JUJc9yB3D34xFMFbG02SrZvPA Xpacw8Tvw3xrizp5f7NJzz3iiZ+gMEuFuZyUJHmPfWupRWgPK9Dx2hzLabjKSWJtyNBjYt1gD1iq j6G8BaVmos8bdrKEZLFMOVLAMLrwjEsCsLa3AgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wHQYD VR0OBBYEFEe4zf/lb+74suwvTg75JbCOPGvDMA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQsF AAOCAgEAACAjQTUEkMJAYmDv4jVM1z+s4jSQuKFvdvoWFqRINyzpkMLyPPgKn9iB5btb2iUspKdV cSQy9sgL8rxq+JOssgfCX5/bzMiKqr5qb+FJEMwx14C7u8jYog5kV+qi9cKpMRXSIGrs/CIBKM+G uIAeqcwRpTzyFrNHnfzSgCHEy9BHcEGhyoMZCCxt8l13nIoUE9Q2HJLw5QY33KbmkJs4j1xrG0aG Q0JfPgEHU1RdZX33inOhmlRaHylDFCfChQ+1iHsaO5S3HWCntZznKWlXWpuTekMwGwPXYshApqr8 ZORK15FTAaggiG6cX0S5y2CBNOxv033aSF/rtJC8LakcC6wc1aJoIIAE1vyxjy+7SjENSoYc6+I2 KSb12tjE8nVhz36udmNKekBlk4f4HoCMhuWG1o8O/FMsYOgWYRqiPkN7zTlgVGr18okmAWiDSKIz 6MkEkbIRNBE+6tBDGR8Dk5AM/1E9V/RBbuHLoL7ryWPNbczk+DaqaJ3tvV2XcEQNtg413OEMXbug UZTLfhbrES+jkkXITHHZvMmZUldGL1DPvTVp9D0VzgalLA8+9oG6lLvDu79leNKGef9JOxqDDPDe eOzI8k1MGt6CKfjBWtrt7uYnXuhF0J0cUahoq0Tj0Itq4/g7u9xN12TyUb7mqqta6THuBrxzvxNi Cp/HuZc= -----END CERTIFICATE----- T-TeleSec GlobalRoot Class 3 ============================ -----BEGIN CERTIFICATE----- MIIDwzCCAqugAwIBAgIBATANBgkqhkiG9w0BAQsFADCBgjELMAkGA1UEBhMCREUxKzApBgNVBAoM IlQtU3lzdGVtcyBFbnRlcnByaXNlIFNlcnZpY2VzIEdtYkgxHzAdBgNVBAsMFlQtU3lzdGVtcyBU cnVzdCBDZW50ZXIxJTAjBgNVBAMMHFQtVGVsZVNlYyBHbG9iYWxSb290IENsYXNzIDMwHhcNMDgx MDAxMTAyOTU2WhcNMzMxMDAxMjM1OTU5WjCBgjELMAkGA1UEBhMCREUxKzApBgNVBAoMIlQtU3lz dGVtcyBFbnRlcnByaXNlIFNlcnZpY2VzIEdtYkgxHzAdBgNVBAsMFlQtU3lzdGVtcyBUcnVzdCBD ZW50ZXIxJTAjBgNVBAMMHFQtVGVsZVNlYyBHbG9iYWxSb290IENsYXNzIDMwggEiMA0GCSqGSIb3 DQEBAQUAA4IBDwAwggEKAoIBAQC9dZPwYiJvJK7genasfb3ZJNW4t/zN8ELg63iIVl6bmlQdTQyK 9tPPcPRStdiTBONGhnFBSivwKixVA9ZIw+A5OO3yXDw/RLyTPWGrTs0NvvAgJ1gORH8EGoel15YU NpDQSXuhdfsaa3Ox+M6pCSzyU9XDFES4hqX2iys52qMzVNn6chr3IhUciJFrf2blw2qAsCTz34ZF iP0Zf3WHHx+xGwpzJFu5ZeAsVMhg02YXP+HMVDNzkQI6pn97djmiH5a2OK61yJN0HZ65tOVgnS9W 0eDrXltMEnAMbEQgqxHY9Bn20pxSN+f6tsIxO0rUFJmtxxr1XV/6B7h8DR/Wgx6zAgMBAAGjQjBA MA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBS1A/d2O2GCahKqGFPr AyGUv/7OyjANBgkqhkiG9w0BAQsFAAOCAQEAVj3vlNW92nOyWL6ukK2YJ5f+AbGwUgC4TeQbIXQb fsDuXmkqJa9c1h3a0nnJ85cp4IaH3gRZD/FZ1GSFS5mvJQQeyUapl96Cshtwn5z2r3Ex3XsFpSzT ucpH9sry9uetuUg/vBa3wW306gmv7PO15wWeph6KU1HWk4HMdJP2udqmJQV0eVp+QD6CSyYRMG7h P0HHRwA11fXT91Q+gT3aSWqas+8QPebrb9HIIkfLzM8BMZLZGOMivgkeGj5asuRrDFR6fUNOuIml e9eiPZaGzPImNC1qkp2aGtAw4l1OBLBfiyB+d8E9lYLRRpo7PHi4b6HQDWSieB4pTpPDpFQUWw== -----END CERTIFICATE----- EE Certification Centre Root CA =============================== -----BEGIN CERTIFICATE----- MIIEAzCCAuugAwIBAgIQVID5oHPtPwBMyonY43HmSjANBgkqhkiG9w0BAQUFADB1MQswCQYDVQQG EwJFRTEiMCAGA1UECgwZQVMgU2VydGlmaXRzZWVyaW1pc2tlc2t1czEoMCYGA1UEAwwfRUUgQ2Vy dGlmaWNhdGlvbiBDZW50cmUgUm9vdCBDQTEYMBYGCSqGSIb3DQEJARYJcGtpQHNrLmVlMCIYDzIw MTAxMDMwMTAxMDMwWhgPMjAzMDEyMTcyMzU5NTlaMHUxCzAJBgNVBAYTAkVFMSIwIAYDVQQKDBlB UyBTZXJ0aWZpdHNlZXJpbWlza2Vza3VzMSgwJgYDVQQDDB9FRSBDZXJ0aWZpY2F0aW9uIENlbnRy ZSBSb290IENBMRgwFgYJKoZIhvcNAQkBFglwa2lAc2suZWUwggEiMA0GCSqGSIb3DQEBAQUAA4IB DwAwggEKAoIBAQDIIMDs4MVLqwd4lfNE7vsLDP90jmG7sWLqI9iroWUyeuuOF0+W2Ap7kaJjbMeM TC55v6kF/GlclY1i+blw7cNRfdCT5mzrMEvhvH2/UpvObntl8jixwKIy72KyaOBhU8E2lf/slLo2 rpwcpzIP5Xy0xm90/XsY6KxX7QYgSzIwWFv9zajmofxwvI6Sc9uXp3whrj3B9UiHbCe9nyV0gVWw 93X2PaRka9ZP585ArQ/dMtO8ihJTmMmJ+xAdTX7Nfh9WDSFwhfYggx/2uh8Ej+p3iDXE/+pOoYtN P2MbRMNE1CV2yreN1x5KZmTNXMWcg+HCCIia7E6j8T4cLNlsHaFLAgMBAAGjgYowgYcwDwYDVR0T AQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFBLyWj7qVhy/zQas8fElyalL1BSZ MEUGA1UdJQQ+MDwGCCsGAQUFBwMCBggrBgEFBQcDAQYIKwYBBQUHAwMGCCsGAQUFBwMEBggrBgEF BQcDCAYIKwYBBQUHAwkwDQYJKoZIhvcNAQEFBQADggEBAHv25MANqhlHt01Xo/6tu7Fq1Q+e2+Rj xY6hUFaTlrg4wCQiZrxTFGGVv9DHKpY5P30osxBAIWrEr7BSdxjhlthWXePdNl4dp1BUoMUq5KqM lIpPnTX/dqQGE5Gion0ARD9V04I8GtVbvFZMIi5GQ4okQC3zErg7cBqklrkar4dBGmoYDQZPxz5u uSlNDUmJEYcyW+ZLBMjkXOZ0c5RdFpgTlf7727FE5TpwrDdr5rMzcijJs1eg9gIWiAYLtqZLICjU 3j2LrTcFU3T+bsy8QxdxXvnFzBqpYe73dgzzcvRyrc9yAjYHR8/vGVCJYMzpJJUPwssd8m92kMfM dcGWxZ0= -----END CERTIFICATE----- TURKTRUST Certificate Services Provider Root 2007 ================================================= -----BEGIN CERTIFICATE----- MIIEPTCCAyWgAwIBAgIBATANBgkqhkiG9w0BAQUFADCBvzE/MD0GA1UEAww2VMOcUktUUlVTVCBF bGVrdHJvbmlrIFNlcnRpZmlrYSBIaXptZXQgU2HEn2xhecSxY8Sxc8SxMQswCQYDVQQGEwJUUjEP MA0GA1UEBwwGQW5rYXJhMV4wXAYDVQQKDFVUw5xSS1RSVVNUIEJpbGdpIMSwbGV0acWfaW0gdmUg QmlsacWfaW0gR8O8dmVubGnEn2kgSGl6bWV0bGVyaSBBLsWeLiAoYykgQXJhbMSxayAyMDA3MB4X DTA3MTIyNTE4MzcxOVoXDTE3MTIyMjE4MzcxOVowgb8xPzA9BgNVBAMMNlTDnFJLVFJVU1QgRWxl a3Ryb25payBTZXJ0aWZpa2EgSGl6bWV0IFNhxJ9sYXnEsWPEsXPEsTELMAkGA1UEBhMCVFIxDzAN BgNVBAcMBkFua2FyYTFeMFwGA1UECgxVVMOcUktUUlVTVCBCaWxnaSDEsGxldGnFn2ltIHZlIEJp bGnFn2ltIEfDvHZlbmxpxJ9pIEhpem1ldGxlcmkgQS7Fni4gKGMpIEFyYWzEsWsgMjAwNzCCASIw DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKu3PgqMyKVYFeaK7yc9SrToJdPNM8Ig3BnuiD9N YvDdE3ePYakqtdTyuTFYKTsvP2qcb3N2Je40IIDu6rfwxArNK4aUyeNgsURSsloptJGXg9i3phQv KUmi8wUG+7RP2qFsmmaf8EMJyupyj+sA1zU511YXRxcw9L6/P8JorzZAwan0qafoEGsIiveGHtya KhUG9qPw9ODHFNRRf8+0222vR5YXm3dx2KdxnSQM9pQ/hTEST7ruToK4uT6PIzdezKKqdfcYbwnT rqdUKDT74eA7YH2gvnmJhsifLfkKS8RQouf9eRbHegsYz85M733WB2+Y8a+xwXrXgTW4qhe04MsC AwEAAaNCMEAwHQYDVR0OBBYEFCnFkKslrxHkYb+j/4hhkeYO/pyBMA4GA1UdDwEB/wQEAwIBBjAP BgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBBQUAA4IBAQAQDdr4Ouwo0RSVgrESLFF6QSU2TJ/s Px+EnWVUXKgWAkD6bho3hO9ynYYKVZ1WKKxmLNA6VpM0ByWtCLCPyA8JWcqdmBzlVPi5RX9ql2+I aE1KBiY3iAIOtsbWcpnOa3faYjGkVh+uX4132l32iPwa2Z61gfAyuOOI0JzzaqC5mxRZNTZPz/OO Xl0XrRWV2N2y1RVuAE6zS89mlOTgzbUF2mNXi+WzqtvALhyQRNsaXRik7r4EW5nVcV9VZWRi1aKb BFmGyGJ353yCRWo9F7/snXUMrqNvWtMvmDb08PUZqxFdyKbjKlhqQgnDvZImZjINXQhVdP+MmNAK poRq0Tl9 -----END CERTIFICATE----- D-TRUST Root Class 3 CA 2 2009 ============================== -----BEGIN CERTIFICATE----- MIIEMzCCAxugAwIBAgIDCYPzMA0GCSqGSIb3DQEBCwUAME0xCzAJBgNVBAYTAkRFMRUwEwYDVQQK DAxELVRydXN0IEdtYkgxJzAlBgNVBAMMHkQtVFJVU1QgUm9vdCBDbGFzcyAzIENBIDIgMjAwOTAe Fw0wOTExMDUwODM1NThaFw0yOTExMDUwODM1NThaME0xCzAJBgNVBAYTAkRFMRUwEwYDVQQKDAxE LVRydXN0IEdtYkgxJzAlBgNVBAMMHkQtVFJVU1QgUm9vdCBDbGFzcyAzIENBIDIgMjAwOTCCASIw DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANOySs96R+91myP6Oi/WUEWJNTrGa9v+2wBoqOAD ER03UAifTUpolDWzU9GUY6cgVq/eUXjsKj3zSEhQPgrfRlWLJ23DEE0NkVJD2IfgXU42tSHKXzlA BF9bfsyjxiupQB7ZNoTWSPOSHjRGICTBpFGOShrvUD9pXRl/RcPHAY9RySPocq60vFYJfxLLHLGv KZAKyVXMD9O0Gu1HNVpK7ZxzBCHQqr0ME7UAyiZsxGsMlFqVlNpQmvH/pStmMaTJOKDfHR+4CS7z p+hnUquVH+BGPtikw8paxTGA6Eian5Rp/hnd2HN8gcqW3o7tszIFZYQ05ub9VxC1X3a/L7AQDcUC AwEAAaOCARowggEWMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFP3aFMSfMN4hvR5COfyrYyNJ 4PGEMA4GA1UdDwEB/wQEAwIBBjCB0wYDVR0fBIHLMIHIMIGAoH6gfIZ6bGRhcDovL2RpcmVjdG9y eS5kLXRydXN0Lm5ldC9DTj1ELVRSVVNUJTIwUm9vdCUyMENsYXNzJTIwMyUyMENBJTIwMiUyMDIw MDksTz1ELVRydXN0JTIwR21iSCxDPURFP2NlcnRpZmljYXRlcmV2b2NhdGlvbmxpc3QwQ6BBoD+G PWh0dHA6Ly93d3cuZC10cnVzdC5uZXQvY3JsL2QtdHJ1c3Rfcm9vdF9jbGFzc18zX2NhXzJfMjAw OS5jcmwwDQYJKoZIhvcNAQELBQADggEBAH+X2zDI36ScfSF6gHDOFBJpiBSVYEQBrLLpME+bUMJm 2H6NMLVwMeniacfzcNsgFYbQDfC+rAF1hM5+n02/t2A7nPPKHeJeaNijnZflQGDSNiH+0LS4F9p0 o3/U37CYAqxva2ssJSRyoWXuJVrl5jLn8t+rSfrzkGkj2wTZ51xY/GXUl77M/C4KzCUqNQT4YJEV dT1B/yMfGchs64JTBKbkTCJNjYy6zltz7GRUUG3RnFX7acM2w4y8PIWmawomDeCTmGCufsYkl4ph X5GOZpIJhzbNi5stPvZR1FDUWSi9g/LMKHtThm3YJohw1+qRzT65ysCQblrGXnRl11z+o+I= -----END CERTIFICATE----- D-TRUST Root Class 3 CA 2 EV 2009 ================================= -----BEGIN CERTIFICATE----- MIIEQzCCAyugAwIBAgIDCYP0MA0GCSqGSIb3DQEBCwUAMFAxCzAJBgNVBAYTAkRFMRUwEwYDVQQK DAxELVRydXN0IEdtYkgxKjAoBgNVBAMMIUQtVFJVU1QgUm9vdCBDbGFzcyAzIENBIDIgRVYgMjAw OTAeFw0wOTExMDUwODUwNDZaFw0yOTExMDUwODUwNDZaMFAxCzAJBgNVBAYTAkRFMRUwEwYDVQQK DAxELVRydXN0IEdtYkgxKjAoBgNVBAMMIUQtVFJVU1QgUm9vdCBDbGFzcyAzIENBIDIgRVYgMjAw OTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAJnxhDRwui+3MKCOvXwEz75ivJn9gpfS egpnljgJ9hBOlSJzmY3aFS3nBfwZcyK3jpgAvDw9rKFs+9Z5JUut8Mxk2og+KbgPCdM03TP1YtHh zRnp7hhPTFiu4h7WDFsVWtg6uMQYZB7jM7K1iXdODL/ZlGsTl28So/6ZqQTMFexgaDbtCHu39b+T 7WYxg4zGcTSHThfqr4uRjRxWQa4iN1438h3Z0S0NL2lRp75mpoo6Kr3HGrHhFPC+Oh25z1uxav60 sUYgovseO3Dvk5h9jHOW8sXvhXCtKSb8HgQ+HKDYD8tSg2J87otTlZCpV6LqYQXY+U3EJ/pure35 11H3a6UCAwEAAaOCASQwggEgMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFNOUikxiEyoZLsyv cop9NteaHNxnMA4GA1UdDwEB/wQEAwIBBjCB3QYDVR0fBIHVMIHSMIGHoIGEoIGBhn9sZGFwOi8v ZGlyZWN0b3J5LmQtdHJ1c3QubmV0L0NOPUQtVFJVU1QlMjBSb290JTIwQ2xhc3MlMjAzJTIwQ0El MjAyJTIwRVYlMjAyMDA5LE89RC1UcnVzdCUyMEdtYkgsQz1ERT9jZXJ0aWZpY2F0ZXJldm9jYXRp b25saXN0MEagRKBChkBodHRwOi8vd3d3LmQtdHJ1c3QubmV0L2NybC9kLXRydXN0X3Jvb3RfY2xh c3NfM19jYV8yX2V2XzIwMDkuY3JsMA0GCSqGSIb3DQEBCwUAA4IBAQA07XtaPKSUiO8aEXUHL7P+ PPoeUSbrh/Yp3uDx1MYkCenBz1UbtDDZzhr+BlGmFaQt77JLvyAoJUnRpjZ3NOhk31KxEcdzes05 nsKtjHEh8lprr988TlWvsoRlFIm5d8sqMb7Po23Pb0iUMkZv53GMoKaEGTcH8gNFCSuGdXzfX2lX ANtu2KZyIktQ1HWYVt+3GP9DQ1CuekR78HlR10M9p9OB0/DJT7naxpeG0ILD5EJt/rDiZE4OJudA NCa1CInXCGNjOCd1HjPqbqjdn5lPdE2BiYBL3ZqXKVwvvoFBuYz/6n1gBp7N1z3TLqMVvKjmJuVv w9y4AyHqnxbxLFS1 -----END CERTIFICATE----- PSCProcert ========== -----BEGIN CERTIFICATE----- MIIJhjCCB26gAwIBAgIBCzANBgkqhkiG9w0BAQsFADCCAR4xPjA8BgNVBAMTNUF1dG9yaWRhZCBk ZSBDZXJ0aWZpY2FjaW9uIFJhaXogZGVsIEVzdGFkbyBWZW5lem9sYW5vMQswCQYDVQQGEwJWRTEQ MA4GA1UEBxMHQ2FyYWNhczEZMBcGA1UECBMQRGlzdHJpdG8gQ2FwaXRhbDE2MDQGA1UEChMtU2lz dGVtYSBOYWNpb25hbCBkZSBDZXJ0aWZpY2FjaW9uIEVsZWN0cm9uaWNhMUMwQQYDVQQLEzpTdXBl cmludGVuZGVuY2lhIGRlIFNlcnZpY2lvcyBkZSBDZXJ0aWZpY2FjaW9uIEVsZWN0cm9uaWNhMSUw IwYJKoZIhvcNAQkBFhZhY3JhaXpAc3VzY2VydGUuZ29iLnZlMB4XDTEwMTIyODE2NTEwMFoXDTIw MTIyNTIzNTk1OVowgdExJjAkBgkqhkiG9w0BCQEWF2NvbnRhY3RvQHByb2NlcnQubmV0LnZlMQ8w DQYDVQQHEwZDaGFjYW8xEDAOBgNVBAgTB01pcmFuZGExKjAoBgNVBAsTIVByb3ZlZWRvciBkZSBD ZXJ0aWZpY2Fkb3MgUFJPQ0VSVDE2MDQGA1UEChMtU2lzdGVtYSBOYWNpb25hbCBkZSBDZXJ0aWZp Y2FjaW9uIEVsZWN0cm9uaWNhMQswCQYDVQQGEwJWRTETMBEGA1UEAxMKUFNDUHJvY2VydDCCAiIw DQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANW39KOUM6FGqVVhSQ2oh3NekS1wwQYalNo97BVC wfWMrmoX8Yqt/ICV6oNEolt6Vc5Pp6XVurgfoCfAUFM+jbnADrgV3NZs+J74BCXfgI8Qhd19L3uA 3VcAZCP4bsm+lU/hdezgfl6VzbHvvnpC2Mks0+saGiKLt38GieU89RLAu9MLmV+QfI4tL3czkkoh RqipCKzx9hEC2ZUWno0vluYC3XXCFCpa1sl9JcLB/KpnheLsvtF8PPqv1W7/U0HU9TI4seJfxPmO EO8GqQKJ/+MMbpfg353bIdD0PghpbNjU5Db4g7ayNo+c7zo3Fn2/omnXO1ty0K+qP1xmk6wKImG2 0qCZyFSTXai20b1dCl53lKItwIKOvMoDKjSuc/HUtQy9vmebVOvh+qBa7Dh+PsHMosdEMXXqP+UH 0quhJZb25uSgXTcYOWEAM11G1ADEtMo88aKjPvM6/2kwLkDd9p+cJsmWN63nOaK/6mnbVSKVUyqU td+tFjiBdWbjxywbk5yqjKPK2Ww8F22c3HxT4CAnQzb5EuE8XL1mv6JpIzi4mWCZDlZTOpx+FIyw Bm/xhnaQr/2v/pDGj59/i5IjnOcVdo/Vi5QTcmn7K2FjiO/mpF7moxdqWEfLcU8UC17IAggmosvp r2uKGcfLFFb14dq12fy/czja+eevbqQ34gcnAgMBAAGjggMXMIIDEzASBgNVHRMBAf8ECDAGAQH/ AgEBMDcGA1UdEgQwMC6CD3N1c2NlcnRlLmdvYi52ZaAbBgVghl4CAqASDBBSSUYtRy0yMDAwNDAz Ni0wMB0GA1UdDgQWBBRBDxk4qpl/Qguk1yeYVKIXTC1RVDCCAVAGA1UdIwSCAUcwggFDgBStuyId xuDSAaj9dlBSk+2YwU2u06GCASakggEiMIIBHjE+MDwGA1UEAxM1QXV0b3JpZGFkIGRlIENlcnRp ZmljYWNpb24gUmFpeiBkZWwgRXN0YWRvIFZlbmV6b2xhbm8xCzAJBgNVBAYTAlZFMRAwDgYDVQQH EwdDYXJhY2FzMRkwFwYDVQQIExBEaXN0cml0byBDYXBpdGFsMTYwNAYDVQQKEy1TaXN0ZW1hIE5h Y2lvbmFsIGRlIENlcnRpZmljYWNpb24gRWxlY3Ryb25pY2ExQzBBBgNVBAsTOlN1cGVyaW50ZW5k ZW5jaWEgZGUgU2VydmljaW9zIGRlIENlcnRpZmljYWNpb24gRWxlY3Ryb25pY2ExJTAjBgkqhkiG 9w0BCQEWFmFjcmFpekBzdXNjZXJ0ZS5nb2IudmWCAQowDgYDVR0PAQH/BAQDAgEGME0GA1UdEQRG MESCDnByb2NlcnQubmV0LnZloBUGBWCGXgIBoAwMClBTQy0wMDAwMDKgGwYFYIZeAgKgEgwQUklG LUotMzE2MzUzNzMtNzB2BgNVHR8EbzBtMEagRKBChkBodHRwOi8vd3d3LnN1c2NlcnRlLmdvYi52 ZS9sY3IvQ0VSVElGSUNBRE8tUkFJWi1TSEEzODRDUkxERVIuY3JsMCOgIaAfhh1sZGFwOi8vYWNy YWl6LnN1c2NlcnRlLmdvYi52ZTA3BggrBgEFBQcBAQQrMCkwJwYIKwYBBQUHMAGGG2h0dHA6Ly9v Y3NwLnN1c2NlcnRlLmdvYi52ZTBBBgNVHSAEOjA4MDYGBmCGXgMBAjAsMCoGCCsGAQUFBwIBFh5o dHRwOi8vd3d3LnN1c2NlcnRlLmdvYi52ZS9kcGMwDQYJKoZIhvcNAQELBQADggIBACtZ6yKZu4Sq T96QxtGGcSOeSwORR3C7wJJg7ODU523G0+1ng3dS1fLld6c2suNUvtm7CpsR72H0xpkzmfWvADmN g7+mvTV+LFwxNG9s2/NkAZiqlCxB3RWGymspThbASfzXg0gTB1GEMVKIu4YXx2sviiCtxQuPcD4q uxtxj7mkoP3YldmvWb8lK5jpY5MvYB7Eqvh39YtsL+1+LrVPQA3uvFd359m21D+VJzog1eWuq2w1 n8GhHVnchIHuTQfiSLaeS5UtQbHh6N5+LwUeaO6/u5BlOsju6rEYNxxik6SgMexxbJHmpHmJWhSn FFAFTKQAVzAswbVhltw+HoSvOULP5dAssSS830DD7X9jSr3hTxJkhpXzsOfIt+FTvZLm8wyWuevo 5pLtp4EJFAv8lXrPj9Y0TzYS3F7RNHXGRoAvlQSMx4bEqCaJqD8Zm4G7UaRKhqsLEQ+xrmNTbSjq 3TNWOByyrYDT13K9mmyZY+gAu0F2BbdbmRiKw7gSXFbPVgx96OLP7bx0R/vu0xdOIk9W/1DzLuY5 poLWccret9W6aAjtmcz9opLLabid+Qqkpj5PkygqYWwHJgD/ll9ohri4zspV4KuxPX+Y1zMOWj3Y eMLEYC/HYvBhkdI4sPaeVdtAgAUSM84dkpvRabP/v/GSCmE1P93+hvS84Bpxs2Km -----END CERTIFICATE----- CA Disig Root R1 ================ -----BEGIN CERTIFICATE----- MIIFaTCCA1GgAwIBAgIJAMMDmu5QkG4oMA0GCSqGSIb3DQEBBQUAMFIxCzAJBgNVBAYTAlNLMRMw EQYDVQQHEwpCcmF0aXNsYXZhMRMwEQYDVQQKEwpEaXNpZyBhLnMuMRkwFwYDVQQDExBDQSBEaXNp ZyBSb290IFIxMB4XDTEyMDcxOTA5MDY1NloXDTQyMDcxOTA5MDY1NlowUjELMAkGA1UEBhMCU0sx EzARBgNVBAcTCkJyYXRpc2xhdmExEzARBgNVBAoTCkRpc2lnIGEucy4xGTAXBgNVBAMTEENBIERp c2lnIFJvb3QgUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCqw3j33Jijp1pedxiy 3QRkD2P9m5YJgNXoqqXinCaUOuiZc4yd39ffg/N4T0Dhf9Kn0uXKE5Pn7cZ3Xza1lK/oOI7bm+V8 u8yN63Vz4STN5qctGS7Y1oprFOsIYgrY3LMATcMjfF9DCCMyEtztDK3AfQ+lekLZWnDZv6fXARz2 m6uOt0qGeKAeVjGu74IKgEH3G8muqzIm1Cxr7X1r5OJeIgpFy4QxTaz+29FHuvlglzmxZcfe+5nk CiKxLU3lSCZpq+Kq8/v8kiky6bM+TR8noc2OuRf7JT7JbvN32g0S9l3HuzYQ1VTW8+DiR0jm3hTa YVKvJrT1cU/J19IG32PK/yHoWQbgCNWEFVP3Q+V8xaCJmGtzxmjOZd69fwX3se72V6FglcXM6pM6 vpmumwKjrckWtc7dXpl4fho5frLABaTAgqWjR56M6ly2vGfb5ipN0gTco65F97yLnByn1tUD3AjL LhbKXEAz6GfDLuemROoRRRw1ZS0eRWEkG4IupZ0zXWX4Qfkuy5Q/H6MMMSRE7cderVC6xkGbrPAX ZcD4XW9boAo0PO7X6oifmPmvTiT6l7Jkdtqr9O3jw2Dv1fkCyC2fg69naQanMVXVz0tv/wQFx1is XxYb5dKj6zHbHzMVTdDypVP1y+E9Tmgt2BLdqvLmTZtJ5cUoobqwWsagtQIDAQABo0IwQDAPBgNV HRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUiQq0OJMa5qvum5EY+fU8PjXQ 04IwDQYJKoZIhvcNAQEFBQADggIBADKL9p1Kyb4U5YysOMo6CdQbzoaz3evUuii+Eq5FLAR0rBNR xVgYZk2C2tXck8An4b58n1KeElb21Zyp9HWc+jcSjxyT7Ff+Bw+r1RL3D65hXlaASfX8MPWbTx9B LxyE04nH4toCdu0Jz2zBuByDHBb6lM19oMgY0sidbvW9adRtPTXoHqJPYNcHKfyyo6SdbhWSVhlM CrDpfNIZTUJG7L399ldb3Zh+pE3McgODWF3vkzpBemOqfDqo9ayk0d2iLbYq/J8BjuIQscTK5Gfb VSUZP/3oNn6z4eGBrxEWi1CXYBmCAMBrTXO40RMHPuq2MU/wQppt4hF05ZSsjYSVPCGvxdpHyN85 YmLLW1AL14FABZyb7bq2ix4Eb5YgOe2kfSnbSM6C3NQCjR0EMVrHS/BsYVLXtFHCgWzN4funodKS ds+xDzdYpPJScWc/DIh4gInByLUfkmO+p3qKViwaqKactV2zY9ATIKHrkWzQjX2v3wvkF7mGnjix lAxYjOBVqjtjbZqJYLhkKpLGN/R+Q0O3c+gB53+XD9fyexn9GtePyfqFa3qdnom2piiZk4hA9z7N UaPK6u95RyG1/jLix8NRb76AdPCkwzryT+lf3xkK8jsTQ6wxpLPn6/wY1gGp8yqPNg7rtLG8t0zJ a7+h89n07eLw4+1knj0vllJPgFOL -----END CERTIFICATE----- CA Disig Root R2 ================ -----BEGIN CERTIFICATE----- MIIFaTCCA1GgAwIBAgIJAJK4iNuwisFjMA0GCSqGSIb3DQEBCwUAMFIxCzAJBgNVBAYTAlNLMRMw EQYDVQQHEwpCcmF0aXNsYXZhMRMwEQYDVQQKEwpEaXNpZyBhLnMuMRkwFwYDVQQDExBDQSBEaXNp ZyBSb290IFIyMB4XDTEyMDcxOTA5MTUzMFoXDTQyMDcxOTA5MTUzMFowUjELMAkGA1UEBhMCU0sx EzARBgNVBAcTCkJyYXRpc2xhdmExEzARBgNVBAoTCkRpc2lnIGEucy4xGTAXBgNVBAMTEENBIERp c2lnIFJvb3QgUjIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCio8QACdaFXS1tFPbC w3OeNcJxVX6B+6tGUODBfEl45qt5WDza/3wcn9iXAng+a0EE6UG9vgMsRfYvZNSrXaNHPWSb6Wia xswbP7q+sos0Ai6YVRn8jG+qX9pMzk0DIaPY0jSTVpbLTAwAFjxfGs3Ix2ymrdMxp7zo5eFm1tL7 A7RBZckQrg4FY8aAamkw/dLukO8NJ9+flXP04SXabBbeQTg06ov80egEFGEtQX6sx3dOy1FU+16S GBsEWmjGycT6txOgmLcRK7fWV8x8nhfRyyX+hk4kLlYMeE2eARKmK6cBZW58Yh2EhN/qwGu1pSqV g8NTEQxzHQuyRpDRQjrOQG6Vrf/GlK1ul4SOfW+eioANSW1z4nuSHsPzwfPrLgVv2RvPN3YEyLRa 5Beny912H9AZdugsBbPWnDTYltxhh5EF5EQIM8HauQhl1K6yNg3ruji6DOWbnuuNZt2Zz9aJQfYE koopKW1rOhzndX0CcQ7zwOe9yxndnWCywmZgtrEE7snmhrmaZkCo5xHtgUUDi/ZnWejBBhG93c+A Ak9lQHhcR1DIm+YfgXvkRKhbhZri3lrVx/k6RGZL5DJUfORsnLMOPReisjQS1n6yqEm70XooQL6i Fh/f5DcfEXP7kAplQ6INfPgGAVUzfbANuPT1rqVCV3w2EYx7XsQDnYx5nQIDAQABo0IwQDAPBgNV HRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUtZn4r7CU9eMg1gqtzk5WpC5u Qu0wDQYJKoZIhvcNAQELBQADggIBACYGXnDnZTPIgm7ZnBc6G3pmsgH2eDtpXi/q/075KMOYKmFM tCQSin1tERT3nLXK5ryeJ45MGcipvXrA1zYObYVybqjGom32+nNjf7xueQgcnYqfGopTpti72TVV sRHFqQOzVju5hJMiXn7B9hJSi+osZ7z+Nkz1uM/Rs0mSO9MpDpkblvdhuDvEK7Z4bLQjb/D907Je dR+Zlais9trhxTF7+9FGs9K8Z7RiVLoJ92Owk6Ka+elSLotgEqv89WBW7xBci8QaQtyDW2QOy7W8 1k/BfDxujRNt+3vrMNDcTa/F1balTFtxyegxvug4BkihGuLq0t4SOVga/4AOgnXmt8kHbA7v/zjx mHHEt38OFdAlab0inSvtBfZGR6ztwPDUO+Ls7pZbkBNOHlY667DvlruWIxG68kOGdGSVyCh13x01 utI3gzhTODY7z2zp+WsO0PsE6E9312UBeIYMej4hYvF/Y3EMyZ9E26gnonW+boE+18DrG5gPcFw0 sorMwIUY6256s/daoQe/qUKS82Ail+QUoQebTnbAjn39pCXHR+3/H3OszMOl6W8KjptlwlCFtaOg UxLMVYdh84GuEEZhvUQhuMI9dM9+JDX6HAcOmz0iyu8xL4ysEr3vQCj8KWefshNPZiTEUxnpHikV 7+ZtsH8tZ/3zbBt1RqPlShfppNcL -----END CERTIFICATE----- ACCVRAIZ1 ========= -----BEGIN CERTIFICATE----- MIIH0zCCBbugAwIBAgIIXsO3pkN/pOAwDQYJKoZIhvcNAQEFBQAwQjESMBAGA1UEAwwJQUNDVlJB SVoxMRAwDgYDVQQLDAdQS0lBQ0NWMQ0wCwYDVQQKDARBQ0NWMQswCQYDVQQGEwJFUzAeFw0xMTA1 MDUwOTM3MzdaFw0zMDEyMzEwOTM3MzdaMEIxEjAQBgNVBAMMCUFDQ1ZSQUlaMTEQMA4GA1UECwwH UEtJQUNDVjENMAsGA1UECgwEQUNDVjELMAkGA1UEBhMCRVMwggIiMA0GCSqGSIb3DQEBAQUAA4IC DwAwggIKAoICAQCbqau/YUqXry+XZpp0X9DZlv3P4uRm7x8fRzPCRKPfmt4ftVTdFXxpNRFvu8gM jmoYHtiP2Ra8EEg2XPBjs5BaXCQ316PWywlxufEBcoSwfdtNgM3802/J+Nq2DoLSRYWoG2ioPej0 RGy9ocLLA76MPhMAhN9KSMDjIgro6TenGEyxCQ0jVn8ETdkXhBilyNpAlHPrzg5XPAOBOp0KoVdD aaxXbXmQeOW1tDvYvEyNKKGno6e6Ak4l0Squ7a4DIrhrIA8wKFSVf+DuzgpmndFALW4ir50awQUZ 0m/A8p/4e7MCQvtQqR0tkw8jq8bBD5L/0KIV9VMJcRz/RROE5iZe+OCIHAr8Fraocwa48GOEAqDG WuzndN9wrqODJerWx5eHk6fGioozl2A3ED6XPm4pFdahD9GILBKfb6qkxkLrQaLjlUPTAYVtjrs7 8yM2x/474KElB0iryYl0/wiPgL/AlmXz7uxLaL2diMMxs0Dx6M/2OLuc5NF/1OVYm3z61PMOm3WR 5LpSLhl+0fXNWhn8ugb2+1KoS5kE3fj5tItQo05iifCHJPqDQsGH+tUtKSpacXpkatcnYGMN285J 9Y0fkIkyF/hzQ7jSWpOGYdbhdQrqeWZ2iE9x6wQl1gpaepPluUsXQA+xtrn13k/c4LOsOxFwYIRK Q26ZIMApcQrAZQIDAQABo4ICyzCCAscwfQYIKwYBBQUHAQEEcTBvMEwGCCsGAQUFBzAChkBodHRw Oi8vd3d3LmFjY3YuZXMvZmlsZWFkbWluL0FyY2hpdm9zL2NlcnRpZmljYWRvcy9yYWl6YWNjdjEu Y3J0MB8GCCsGAQUFBzABhhNodHRwOi8vb2NzcC5hY2N2LmVzMB0GA1UdDgQWBBTSh7Tj3zcnk1X2 VuqB5TbMjB4/vTAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNKHtOPfNyeTVfZW6oHlNsyM Hj+9MIIBcwYDVR0gBIIBajCCAWYwggFiBgRVHSAAMIIBWDCCASIGCCsGAQUFBwICMIIBFB6CARAA QQB1AHQAbwByAGkAZABhAGQAIABkAGUAIABDAGUAcgB0AGkAZgBpAGMAYQBjAGkA8wBuACAAUgBh AO0AegAgAGQAZQAgAGwAYQAgAEEAQwBDAFYAIAAoAEEAZwBlAG4AYwBpAGEAIABkAGUAIABUAGUA YwBuAG8AbABvAGcA7QBhACAAeQAgAEMAZQByAHQAaQBmAGkAYwBhAGMAaQDzAG4AIABFAGwAZQBj AHQAcgDzAG4AaQBjAGEALAAgAEMASQBGACAAUQA0ADYAMAAxADEANQA2AEUAKQAuACAAQwBQAFMA IABlAG4AIABoAHQAdABwADoALwAvAHcAdwB3AC4AYQBjAGMAdgAuAGUAczAwBggrBgEFBQcCARYk aHR0cDovL3d3dy5hY2N2LmVzL2xlZ2lzbGFjaW9uX2MuaHRtMFUGA1UdHwROMEwwSqBIoEaGRGh0 dHA6Ly93d3cuYWNjdi5lcy9maWxlYWRtaW4vQXJjaGl2b3MvY2VydGlmaWNhZG9zL3JhaXphY2N2 MV9kZXIuY3JsMA4GA1UdDwEB/wQEAwIBBjAXBgNVHREEEDAOgQxhY2N2QGFjY3YuZXMwDQYJKoZI hvcNAQEFBQADggIBAJcxAp/n/UNnSEQU5CmH7UwoZtCPNdpNYbdKl02125DgBS4OxnnQ8pdpD70E R9m+27Up2pvZrqmZ1dM8MJP1jaGo/AaNRPTKFpV8M9xii6g3+CfYCS0b78gUJyCpZET/LtZ1qmxN YEAZSUNUY9rizLpm5U9EelvZaoErQNV/+QEnWCzI7UiRfD+mAM/EKXMRNt6GGT6d7hmKG9Ww7Y49 nCrADdg9ZuM8Db3VlFzi4qc1GwQA9j9ajepDvV+JHanBsMyZ4k0ACtrJJ1vnE5Bc5PUzolVt3OAJ TS+xJlsndQAJxGJ3KQhfnlmstn6tn1QwIgPBHnFk/vk4CpYY3QIUrCPLBhwepH2NDd4nQeit2hW3 sCPdK6jT2iWH7ehVRE2I9DZ+hJp4rPcOVkkO1jMl1oRQQmwgEh0q1b688nCBpHBgvgW1m54ERL5h I6zppSSMEYCUWqKiuUnSwdzRp+0xESyeGabu4VXhwOrPDYTkF7eifKXeVSUG7szAh1xA2syVP1Xg Nce4hL60Xc16gwFy7ofmXx2utYXGJt/mwZrpHgJHnyqobalbz+xFd3+YJ5oyXSrjhO7FmGYvliAd 3djDJ9ew+f7Zfc3Qn48LFFhRny+Lwzgt3uiP1o2HpPVWQxaZLPSkVrQ0uGE3ycJYgBugl6H8WY3p EfbRD0tVNEYqi4Y7 -----END CERTIFICATE----- TWCA Global Root CA =================== -----BEGIN CERTIFICATE----- MIIFQTCCAymgAwIBAgICDL4wDQYJKoZIhvcNAQELBQAwUTELMAkGA1UEBhMCVFcxEjAQBgNVBAoT CVRBSVdBTi1DQTEQMA4GA1UECxMHUm9vdCBDQTEcMBoGA1UEAxMTVFdDQSBHbG9iYWwgUm9vdCBD QTAeFw0xMjA2MjcwNjI4MzNaFw0zMDEyMzExNTU5NTlaMFExCzAJBgNVBAYTAlRXMRIwEAYDVQQK EwlUQUlXQU4tQ0ExEDAOBgNVBAsTB1Jvb3QgQ0ExHDAaBgNVBAMTE1RXQ0EgR2xvYmFsIFJvb3Qg Q0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCwBdvI64zEbooh745NnHEKH1Jw7W2C nJfF10xORUnLQEK1EjRsGcJ0pDFfhQKX7EMzClPSnIyOt7h52yvVavKOZsTuKwEHktSz0ALfUPZV r2YOy+BHYC8rMjk1Ujoog/h7FsYYuGLWRyWRzvAZEk2tY/XTP3VfKfChMBwqoJimFb3u/Rk28OKR Q4/6ytYQJ0lM793B8YVwm8rqqFpD/G2Gb3PpN0Wp8DbHzIh1HrtsBv+baz4X7GGqcXzGHaL3SekV tTzWoWH1EfcFbx39Eb7QMAfCKbAJTibc46KokWofwpFFiFzlmLhxpRUZyXx1EcxwdE8tmx2RRP1W KKD+u4ZqyPpcC1jcxkt2yKsi2XMPpfRaAok/T54igu6idFMqPVMnaR1sjjIsZAAmY2E2TqNGtz99 sy2sbZCilaLOz9qC5wc0GZbpuCGqKX6mOL6OKUohZnkfs8O1CWfe1tQHRvMq2uYiN2DLgbYPoA/p yJV/v1WRBXrPPRXAb94JlAGD1zQbzECl8LibZ9WYkTunhHiVJqRaCPgrdLQABDzfuBSO6N+pjWxn kjMdwLfS7JLIvgm/LCkFbwJrnu+8vyq8W8BQj0FwcYeyTbcEqYSjMq+u7msXi7Kx/mzhkIyIqJdI zshNy/MGz19qCkKxHh53L46g5pIOBvwFItIm4TFRfTLcDwIDAQABoyMwITAOBgNVHQ8BAf8EBAMC AQYwDwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQsFAAOCAgEAXzSBdu+WHdXltdkCY4QWwa6g cFGn90xHNcgL1yg9iXHZqjNB6hQbbCEAwGxCGX6faVsgQt+i0trEfJdLjbDorMjupWkEmQqSpqsn LhpNgb+E1HAerUf+/UqdM+DyucRFCCEK2mlpc3INvjT+lIutwx4116KD7+U4x6WFH6vPNOw/KP4M 8VeGTslV9xzU2KV9Bnpv1d8Q34FOIWWxtuEXeZVFBs5fzNxGiWNoRI2T9GRwoD2dKAXDOXC4Ynsg /eTb6QihuJ49CcdP+yz4k3ZB3lLg4VfSnQO8d57+nile98FRYB/e2guyLXW3Q0iT5/Z5xoRdgFlg lPx4mI88k1HtQJAH32RjJMtOcQWh15QaiDLxInQirqWm2BJpTGCjAu4r7NRjkgtevi92a6O2JryP A9gK8kxkRr05YuWW6zRjESjMlfGt7+/cgFhI6Uu46mWs6fyAtbXIRfmswZ/ZuepiiI7E8UuDEq3m i4TWnsLrgxifarsbJGAzcMzs9zLzXNl5fe+epP7JI8Mk7hWSsT2RTyaGvWZzJBPqpK5jwa19hAM8 EHiGG3njxPPyBJUgriOCxLM6AGK/5jYk4Ve6xx6QddVfP5VhK8E7zeWzaGHQRiapIVJpLesux+t3 zqY6tQMzT3bR51xUAV3LePTJDL/PEo4XLSNolOer/qmyKwbQBM0= -----END CERTIFICATE----- TeliaSonera Root CA v1 ====================== -----BEGIN CERTIFICATE----- MIIFODCCAyCgAwIBAgIRAJW+FqD3LkbxezmCcvqLzZYwDQYJKoZIhvcNAQEFBQAwNzEUMBIGA1UE CgwLVGVsaWFTb25lcmExHzAdBgNVBAMMFlRlbGlhU29uZXJhIFJvb3QgQ0EgdjEwHhcNMDcxMDE4 MTIwMDUwWhcNMzIxMDE4MTIwMDUwWjA3MRQwEgYDVQQKDAtUZWxpYVNvbmVyYTEfMB0GA1UEAwwW VGVsaWFTb25lcmEgUm9vdCBDQSB2MTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMK+ 6yfwIaPzaSZVfp3FVRaRXP3vIb9TgHot0pGMYzHw7CTww6XScnwQbfQ3t+XmfHnqjLWCi65ItqwA 3GV17CpNX8GH9SBlK4GoRz6JI5UwFpB/6FcHSOcZrr9FZ7E3GwYq/t75rH2D+1665I+XZ75Ljo1k B1c4VWk0Nj0TSO9P4tNmHqTPGrdeNjPUtAa9GAH9d4RQAEX1jF3oI7x+/jXh7VB7qTCNGdMJjmhn Xb88lxhTuylixcpecsHHltTbLaC0H2kD7OriUPEMPPCs81Mt8Bz17Ww5OXOAFshSsCPN4D7c3TxH oLs1iuKYaIu+5b9y7tL6pe0S7fyYGKkmdtwoSxAgHNN/Fnct7W+A90m7UwW7XWjH1Mh1Fj+JWov3 F0fUTPHSiXk+TT2YqGHeOh7S+F4D4MHJHIzTjU3TlTazN19jY5szFPAtJmtTfImMMsJu7D0hADnJ oWjiUIMusDor8zagrC/kb2HCUQk5PotTubtn2txTuXZZNp1D5SDgPTJghSJRt8czu90VL6R4pgd7 gUY2BIbdeTXHlSw7sKMXNeVzH7RcWe/a6hBle3rQf5+ztCo3O3CLm1u5K7fsslESl1MpWtTwEhDc TwK7EpIvYtQ/aUN8Ddb8WHUBiJ1YFkveupD/RwGJBmr2X7KQarMCpgKIv7NHfirZ1fpoeDVNAgMB AAGjPzA9MA8GA1UdEwEB/wQFMAMBAf8wCwYDVR0PBAQDAgEGMB0GA1UdDgQWBBTwj1k4ALP1j5qW DNXr+nuqF+gTEjANBgkqhkiG9w0BAQUFAAOCAgEAvuRcYk4k9AwI//DTDGjkk0kiP0Qnb7tt3oNm zqjMDfz1mgbldxSR651Be5kqhOX//CHBXfDkH1e3damhXwIm/9fH907eT/j3HEbAek9ALCI18Bmx 0GtnLLCo4MBANzX2hFxc469CeP6nyQ1Q6g2EdvZR74NTxnr/DlZJLo961gzmJ1TjTQpgcmLNkQfW pb/ImWvtxBnmq0wROMVvMeJuScg/doAmAyYp4Db29iBT4xdwNBedY2gea+zDTYa4EzAvXUYNR0PV G6pZDrlcjQZIrXSHX8f8MVRBE+LHIQ6e4B4N4cB7Q4WQxYpYxmUKeFfyxiMPAdkgS94P+5KFdSpc c41teyWRyu5FrgZLAMzTsVlQ2jqIOylDRl6XK1TOU2+NSueW+r9xDkKLfP0ooNBIytrEgUy7onOT JsjrDNYmiLbAJM+7vVvrdX3pCI6GMyx5dwlppYn8s3CQh3aP0yK7Qs69cwsgJirQmz1wHiRszYd2 qReWt88NkvuOGKmYSdGe/mBEciG5Ge3C9THxOUiIkCR1VBatzvT4aRRkOfujuLpwQMcnHL/EVlP6 Y2XQ8xwOFvVrhlhNGNTkDY6lnVuR3HYkUD/GKvvZt5y11ubQ2egZixVxSK236thZiNSQvxaz2ems WWFUyBy6ysHK4bkgTI86k4mloMy/0/Z1pHWWbVY= -----END CERTIFICATE----- E-Tugra Certification Authority =============================== -----BEGIN CERTIFICATE----- MIIGSzCCBDOgAwIBAgIIamg+nFGby1MwDQYJKoZIhvcNAQELBQAwgbIxCzAJBgNVBAYTAlRSMQ8w DQYDVQQHDAZBbmthcmExQDA+BgNVBAoMN0UtVHXEn3JhIEVCRyBCaWxpxZ9pbSBUZWtub2xvamls ZXJpIHZlIEhpem1ldGxlcmkgQS7Fni4xJjAkBgNVBAsMHUUtVHVncmEgU2VydGlmaWthc3lvbiBN ZXJrZXppMSgwJgYDVQQDDB9FLVR1Z3JhIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MB4XDTEzMDMw NTEyMDk0OFoXDTIzMDMwMzEyMDk0OFowgbIxCzAJBgNVBAYTAlRSMQ8wDQYDVQQHDAZBbmthcmEx QDA+BgNVBAoMN0UtVHXEn3JhIEVCRyBCaWxpxZ9pbSBUZWtub2xvamlsZXJpIHZlIEhpem1ldGxl cmkgQS7Fni4xJjAkBgNVBAsMHUUtVHVncmEgU2VydGlmaWthc3lvbiBNZXJrZXppMSgwJgYDVQQD DB9FLVR1Z3JhIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MIICIjANBgkqhkiG9w0BAQEFAAOCAg8A MIICCgKCAgEA4vU/kwVRHoViVF56C/UYB4Oufq9899SKa6VjQzm5S/fDxmSJPZQuVIBSOTkHS0vd hQd2h8y/L5VMzH2nPbxHD5hw+IyFHnSOkm0bQNGZDbt1bsipa5rAhDGvykPL6ys06I+XawGb1Q5K CKpbknSFQ9OArqGIW66z6l7LFpp3RMih9lRozt6Plyu6W0ACDGQXwLWTzeHxE2bODHnv0ZEoq1+g ElIwcxmOj+GMB6LDu0rw6h8VqO4lzKRG+Bsi77MOQ7osJLjFLFzUHPhdZL3Dk14opz8n8Y4e0ypQ BaNV2cvnOVPAmJ6MVGKLJrD3fY185MaeZkJVgkfnsliNZvcHfC425lAcP9tDJMW/hkd5s3kc91r0 E+xs+D/iWR+V7kI+ua2oMoVJl0b+SzGPWsutdEcf6ZG33ygEIqDUD13ieU/qbIWGvaimzuT6w+Gz rt48Ue7LE3wBf4QOXVGUnhMMti6lTPk5cDZvlsouDERVxcr6XQKj39ZkjFqzAQqptQpHF//vkUAq jqFGOjGY5RH8zLtJVor8udBhmm9lbObDyz51Sf6Pp+KJxWfXnUYTTjF2OySznhFlhqt/7x3U+Lzn rFpct1pHXFXOVbQicVtbC/DP3KBhZOqp12gKY6fgDT+gr9Oq0n7vUaDmUStVkhUXU8u3Zg5mTPj5 dUyQ5xJwx0UCAwEAAaNjMGEwHQYDVR0OBBYEFC7j27JJ0JxUeVz6Jyr+zE7S6E5UMA8GA1UdEwEB /wQFMAMBAf8wHwYDVR0jBBgwFoAULuPbsknQnFR5XPonKv7MTtLoTlQwDgYDVR0PAQH/BAQDAgEG MA0GCSqGSIb3DQEBCwUAA4ICAQAFNzr0TbdF4kV1JI+2d1LoHNgQk2Xz8lkGpD4eKexd0dCrfOAK kEh47U6YA5n+KGCRHTAduGN8qOY1tfrTYXbm1gdLymmasoR6d5NFFxWfJNCYExL/u6Au/U5Mh/jO XKqYGwXgAEZKgoClM4so3O0409/lPun++1ndYYRP0lSWE2ETPo+Aab6TR7U1Q9Jauz1c77NCR807 VRMGsAnb/WP2OogKmW9+4c4bU2pEZiNRCHu8W1Ki/QY3OEBhj0qWuJA3+GbHeJAAFS6LrVE1Uweo a2iu+U48BybNCAVwzDk/dr2l02cmAYamU9JgO3xDf1WKvJUawSg5TB9D0pH0clmKuVb8P7Sd2nCc dlqMQ1DujjByTd//SffGqWfZbawCEeI6FiWnWAjLb1NBnEg4R2gz0dfHj9R0IdTDBZB6/86WiLEV KV0jq9BgoRJP3vQXzTLlyb/IQ639Lo7xr+L0mPoSHyDYwKcMhcWQ9DstliaxLL5Mq+ux0orJ23gT Dx4JnW2PAJ8C2sH6H3p6CcRK5ogql5+Ji/03X186zjhZhkuvcQu02PJwT58yE+Owp1fl2tpDy4Q0 8ijE6m30Ku/Ba3ba+367hTzSU8JNvnHhRdH9I2cNE3X7z2VnIp2usAnRCf8dNL/+I5c30jn6PQ0G C7TbO6Orb1wdtn7os4I07QZcJA== -----END CERTIFICATE----- T-TeleSec GlobalRoot Class 2 ============================ -----BEGIN CERTIFICATE----- MIIDwzCCAqugAwIBAgIBATANBgkqhkiG9w0BAQsFADCBgjELMAkGA1UEBhMCREUxKzApBgNVBAoM IlQtU3lzdGVtcyBFbnRlcnByaXNlIFNlcnZpY2VzIEdtYkgxHzAdBgNVBAsMFlQtU3lzdGVtcyBU cnVzdCBDZW50ZXIxJTAjBgNVBAMMHFQtVGVsZVNlYyBHbG9iYWxSb290IENsYXNzIDIwHhcNMDgx MDAxMTA0MDE0WhcNMzMxMDAxMjM1OTU5WjCBgjELMAkGA1UEBhMCREUxKzApBgNVBAoMIlQtU3lz dGVtcyBFbnRlcnByaXNlIFNlcnZpY2VzIEdtYkgxHzAdBgNVBAsMFlQtU3lzdGVtcyBUcnVzdCBD ZW50ZXIxJTAjBgNVBAMMHFQtVGVsZVNlYyBHbG9iYWxSb290IENsYXNzIDIwggEiMA0GCSqGSIb3 DQEBAQUAA4IBDwAwggEKAoIBAQCqX9obX+hzkeXaXPSi5kfl82hVYAUdAqSzm1nzHoqvNK38DcLZ SBnuaY/JIPwhqgcZ7bBcrGXHX+0CfHt8LRvWurmAwhiCFoT6ZrAIxlQjgeTNuUk/9k9uN0goOA/F vudocP05l03Sx5iRUKrERLMjfTlH6VJi1hKTXrcxlkIF+3anHqP1wvzpesVsqXFP6st4vGCvx970 2cu+fjOlbpSD8DT6IavqjnKgP6TeMFvvhk1qlVtDRKgQFRzlAVfFmPHmBiiRqiDFt1MmUUOyCxGV WOHAD3bZwI18gfNycJ5v/hqO2V81xrJvNHy+SE/iWjnX2J14np+GPgNeGYtEotXHAgMBAAGjQjBA MA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBS/WSA2AHmgoCJrjNXy YdK4LMuCSjANBgkqhkiG9w0BAQsFAAOCAQEAMQOiYQsfdOhyNsZt+U2e+iKo4YFWz827n+qrkRk4 r6p8FU3ztqONpfSO9kSpp+ghla0+AGIWiPACuvxhI+YzmzB6azZie60EI4RYZeLbK4rnJVM3YlNf vNoBYimipidx5joifsFvHZVwIEoHNN/q/xWA5brXethbdXwFeilHfkCoMRN3zUA7tFFHei4R40cR 3p1m0IvVVGb6g1XqfMIpiRvpb7PO4gWEyS8+eIVibslfwXhjdFjASBgMmTnrpMwatXlajRWc2BQN 9noHV8cigwUtPJslJj0Ys6lDfMjIq2SPDqO/nBudMNva0Bkuqjzx+zOAduTNrRlPBSeOE6Fuwg== -----END CERTIFICATE----- Atos TrustedRoot 2011 ===================== -----BEGIN CERTIFICATE----- MIIDdzCCAl+gAwIBAgIIXDPLYixfszIwDQYJKoZIhvcNAQELBQAwPDEeMBwGA1UEAwwVQXRvcyBU cnVzdGVkUm9vdCAyMDExMQ0wCwYDVQQKDARBdG9zMQswCQYDVQQGEwJERTAeFw0xMTA3MDcxNDU4 MzBaFw0zMDEyMzEyMzU5NTlaMDwxHjAcBgNVBAMMFUF0b3MgVHJ1c3RlZFJvb3QgMjAxMTENMAsG A1UECgwEQXRvczELMAkGA1UEBhMCREUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCV hTuXbyo7LjvPpvMpNb7PGKw+qtn4TaA+Gke5vJrf8v7MPkfoepbCJI419KkM/IL9bcFyYie96mvr 54rMVD6QUM+A1JX76LWC1BTFtqlVJVfbsVD2sGBkWXppzwO3bw2+yj5vdHLqqjAqc2K+SZFhyBH+ DgMq92og3AIVDV4VavzjgsG1xZ1kCWyjWZgHJ8cblithdHFsQ/H3NYkQ4J7sVaE3IqKHBAUsR320 HLliKWYoyrfhk/WklAOZuXCFteZI6o1Q/NnezG8HDt0Lcp2AMBYHlT8oDv3FdU9T1nSatCQujgKR z3bFmx5VdJx4IbHwLfELn8LVlhgf8FQieowHAgMBAAGjfTB7MB0GA1UdDgQWBBSnpQaxLKYJYO7R l+lwrrw7GWzbITAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFKelBrEspglg7tGX6XCuvDsZ bNshMBgGA1UdIAQRMA8wDQYLKwYBBAGwLQMEAQEwDgYDVR0PAQH/BAQDAgGGMA0GCSqGSIb3DQEB CwUAA4IBAQAmdzTblEiGKkGdLD4GkGDEjKwLVLgfuXvTBznk+j57sj1O7Z8jvZfza1zv7v1Apt+h k6EKhqzvINB5Ab149xnYJDE0BAGmuhWawyfc2E8PzBhj/5kPDpFrdRbhIfzYJsdHt6bPWHJxfrrh TZVHO8mvbaG0weyJ9rQPOLXiZNwlz6bb65pcmaHFCN795trV1lpFDMS3wrUU77QR/w4VtfX128a9 61qn8FYiqTxlVMYVqL2Gns2Dlmh6cYGJ4Qvh6hEbaAjMaZ7snkGeRDImeuKHCnE96+RapNLbxc3G 3mB/ufNPRJLvKrcYPqcZ2Qt9sTdBQrC6YB3y/gkRsPCHe6ed -----END CERTIFICATE----- QuoVadis Root CA 1 G3 ===================== -----BEGIN CERTIFICATE----- MIIFYDCCA0igAwIBAgIUeFhfLq0sGUvjNwc1NBMotZbUZZMwDQYJKoZIhvcNAQELBQAwSDELMAkG A1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxHjAcBgNVBAMTFVF1b1ZhZGlzIFJv b3QgQ0EgMSBHMzAeFw0xMjAxMTIxNzI3NDRaFw00MjAxMTIxNzI3NDRaMEgxCzAJBgNVBAYTAkJN MRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMR4wHAYDVQQDExVRdW9WYWRpcyBSb290IENBIDEg RzMwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCgvlAQjunybEC0BJyFuTHK3C3kEakE PBtVwedYMB0ktMPvhd6MLOHBPd+C5k+tR4ds7FtJwUrVu4/sh6x/gpqG7D0DmVIB0jWerNrwU8lm PNSsAgHaJNM7qAJGr6Qc4/hzWHa39g6QDbXwz8z6+cZM5cOGMAqNF34168Xfuw6cwI2H44g4hWf6 Pser4BOcBRiYz5P1sZK0/CPTz9XEJ0ngnjybCKOLXSoh4Pw5qlPafX7PGglTvF0FBM+hSo+LdoIN ofjSxxR3W5A2B4GbPgb6Ul5jxaYA/qXpUhtStZI5cgMJYr2wYBZupt0lwgNm3fME0UDiTouG9G/l g6AnhF4EwfWQvTA9xO+oabw4m6SkltFi2mnAAZauy8RRNOoMqv8hjlmPSlzkYZqn0ukqeI1RPToV 7qJZjqlc3sX5kCLliEVx3ZGZbHqfPT2YfF72vhZooF6uCyP8Wg+qInYtyaEQHeTTRCOQiJ/GKubX 9ZqzWB4vMIkIG1SitZgj7Ah3HJVdYdHLiZxfokqRmu8hqkkWCKi9YSgxyXSthfbZxbGL0eUQMk1f iyA6PEkfM4VZDdvLCXVDaXP7a3F98N/ETH3Goy7IlXnLc6KOTk0k+17kBL5yG6YnLUlamXrXXAkg t3+UuU/xDRxeiEIbEbfnkduebPRq34wGmAOtzCjvpUfzUwIDAQABo0IwQDAPBgNVHRMBAf8EBTAD AQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUo5fW816iEOGrRZ88F2Q87gFwnMwwDQYJKoZI hvcNAQELBQADggIBABj6W3X8PnrHX3fHyt/PX8MSxEBd1DKquGrX1RUVRpgjpeaQWxiZTOOtQqOC MTaIzen7xASWSIsBx40Bz1szBpZGZnQdT+3Btrm0DWHMY37XLneMlhwqI2hrhVd2cDMT/uFPpiN3 GPoajOi9ZcnPP/TJF9zrx7zABC4tRi9pZsMbj/7sPtPKlL92CiUNqXsCHKnQO18LwIE6PWThv6ct Tr1NxNgpxiIY0MWscgKCP6o6ojoilzHdCGPDdRS5YCgtW2jgFqlmgiNR9etT2DGbe+m3nUvriBbP +V04ikkwj+3x6xn0dxoxGE1nVGwvb2X52z3sIexe9PSLymBlVNFxZPT5pqOBMzYzcfCkeF9OrYMh 3jRJjehZrJ3ydlo28hP0r+AJx2EqbPfgna67hkooby7utHnNkDPDs3b69fBsnQGQ+p6Q9pxyz0fa wx/kNSBT8lTR32GDpgLiJTjehTItXnOQUl1CxM49S+H5GYQd1aJQzEH7QRTDvdbJWqNjZgKAvQU6 O0ec7AAmTPWIUb+oI38YB7AL7YsmoWTTYUrrXJ/es69nA7Mf3W1daWhpq1467HxpvMc7hU6eFbm0 FU/DlXpY18ls6Wy58yljXrQs8C097Vpl4KlbQMJImYFtnh8GKjwStIsPm6Ik8KaN1nrgS7ZklmOV hMJKzRwuJIczYOXD -----END CERTIFICATE----- QuoVadis Root CA 2 G3 ===================== -----BEGIN CERTIFICATE----- MIIFYDCCA0igAwIBAgIURFc0JFuBiZs18s64KztbpybwdSgwDQYJKoZIhvcNAQELBQAwSDELMAkG A1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxHjAcBgNVBAMTFVF1b1ZhZGlzIFJv b3QgQ0EgMiBHMzAeFw0xMjAxMTIxODU5MzJaFw00MjAxMTIxODU5MzJaMEgxCzAJBgNVBAYTAkJN MRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMR4wHAYDVQQDExVRdW9WYWRpcyBSb290IENBIDIg RzMwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQChriWyARjcV4g/Ruv5r+LrI3HimtFh ZiFfqq8nUeVuGxbULX1QsFN3vXg6YOJkApt8hpvWGo6t/x8Vf9WVHhLL5hSEBMHfNrMWn4rjyduY NM7YMxcoRvynyfDStNVNCXJJ+fKH46nafaF9a7I6JaltUkSs+L5u+9ymc5GQYaYDFCDy54ejiK2t oIz/pgslUiXnFgHVy7g1gQyjO/Dh4fxaXc6AcW34Sas+O7q414AB+6XrW7PFXmAqMaCvN+ggOp+o MiwMzAkd056OXbxMmO7FGmh77FOm6RQ1o9/NgJ8MSPsc9PG/Srj61YxxSscfrf5BmrODXfKEVu+l V0POKa2Mq1W/xPtbAd0jIaFYAI7D0GoT7RPjEiuA3GfmlbLNHiJuKvhB1PLKFAeNilUSxmn1uIZo L1NesNKqIcGY5jDjZ1XHm26sGahVpkUG0CM62+tlXSoREfA7T8pt9DTEceT/AFr2XK4jYIVz8eQQ sSWu1ZK7E8EM4DnatDlXtas1qnIhO4M15zHfeiFuuDIIfR0ykRVKYnLP43ehvNURG3YBZwjgQQvD 6xVu+KQZ2aKrr+InUlYrAoosFCT5v0ICvybIxo/gbjh9Uy3l7ZizlWNof/k19N+IxWA1ksB8aRxh lRbQ694Lrz4EEEVlWFA4r0jyWbYW8jwNkALGcC4BrTwV1wIDAQABo0IwQDAPBgNVHRMBAf8EBTAD AQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQU7edvdlq/YOxJW8ald7tyFnGbxD0wDQYJKoZI hvcNAQELBQADggIBAJHfgD9DCX5xwvfrs4iP4VGyvD11+ShdyLyZm3tdquXK4Qr36LLTn91nMX66 AarHakE7kNQIXLJgapDwyM4DYvmL7ftuKtwGTTwpD4kWilhMSA/ohGHqPHKmd+RCroijQ1h5fq7K pVMNqT1wvSAZYaRsOPxDMuHBR//47PERIjKWnML2W2mWeyAMQ0GaW/ZZGYjeVYg3UQt4XAoeo0L9 x52ID8DyeAIkVJOviYeIyUqAHerQbj5hLja7NQ4nlv1mNDthcnPxFlxHBlRJAHpYErAK74X9sbgz dWqTHBLmYF5vHX/JHyPLhGGfHoJE+V+tYlUkmlKY7VHnoX6XOuYvHxHaU4AshZ6rNRDbIl9qxV6X U/IyAgkwo1jwDQHVcsaxfGl7w/U2Rcxhbl5MlMVerugOXou/983g7aEOGzPuVBj+D77vfoRrQ+Nw mNtddbINWQeFFSM51vHfqSYP1kjHs6Yi9TM3WpVHn3u6GBVv/9YUZINJ0gpnIdsPNWNgKCLjsZWD zYWm3S8P52dSbrsvhXz1SnPnxT7AvSESBT/8twNJAlvIJebiVDj1eYeMHVOyToV7BjjHLPj4sHKN JeV3UvQDHEimUF+IIDBu8oJDqz2XhOdT+yHBTw8imoa4WSr2Rz0ZiC3oheGe7IUIarFsNMkd7Egr O3jtZsSOeWmD3n+M -----END CERTIFICATE----- QuoVadis Root CA 3 G3 ===================== -----BEGIN CERTIFICATE----- MIIFYDCCA0igAwIBAgIULvWbAiin23r/1aOp7r0DoM8Sah0wDQYJKoZIhvcNAQELBQAwSDELMAkG A1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxHjAcBgNVBAMTFVF1b1ZhZGlzIFJv b3QgQ0EgMyBHMzAeFw0xMjAxMTIyMDI2MzJaFw00MjAxMTIyMDI2MzJaMEgxCzAJBgNVBAYTAkJN MRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMR4wHAYDVQQDExVRdW9WYWRpcyBSb290IENBIDMg RzMwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCzyw4QZ47qFJenMioKVjZ/aEzHs286 IxSR/xl/pcqs7rN2nXrpixurazHb+gtTTK/FpRp5PIpM/6zfJd5O2YIyC0TeytuMrKNuFoM7pmRL Mon7FhY4futD4tN0SsJiCnMK3UmzV9KwCoWdcTzeo8vAMvMBOSBDGzXRU7Ox7sWTaYI+FrUoRqHe 6okJ7UO4BUaKhvVZR74bbwEhELn9qdIoyhA5CcoTNs+cra1AdHkrAj80//ogaX3T7mH1urPnMNA3 I4ZyYUUpSFlob3emLoG+B01vr87ERRORFHAGjx+f+IdpsQ7vw4kZ6+ocYfx6bIrc1gMLnia6Et3U VDmrJqMz6nWB2i3ND0/kA9HvFZcba5DFApCTZgIhsUfei5pKgLlVj7WiL8DWM2fafsSntARE60f7 5li59wzweyuxwHApw0BiLTtIadwjPEjrewl5qW3aqDCYz4ByA4imW0aucnl8CAMhZa634RylsSqi Md5mBPfAdOhx3v89WcyWJhKLhZVXGqtrdQtEPREoPHtht+KPZ0/l7DxMYIBpVzgeAVuNVejH38DM dyM0SXV89pgR6y3e7UEuFAUCf+D+IOs15xGsIs5XPd7JMG0QA4XN8f+MFrXBsj6IbGB/kE+V9/Yt rQE5BwT6dYB9v0lQ7e/JxHwc64B+27bQ3RP+ydOc17KXqQIDAQABo0IwQDAPBgNVHRMBAf8EBTAD AQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUxhfQvKjqAkPyGwaZXSuQILnXnOQwDQYJKoZI hvcNAQELBQADggIBADRh2Va1EodVTd2jNTFGu6QHcrxfYWLopfsLN7E8trP6KZ1/AvWkyaiTt3px KGmPc+FSkNrVvjrlt3ZqVoAh313m6Tqe5T72omnHKgqwGEfcIHB9UqM+WXzBusnIFUBhynLWcKzS t/Ac5IYp8M7vaGPQtSCKFWGafoaYtMnCdvvMujAWzKNhxnQT5WvvoxXqA/4Ti2Tk08HS6IT7SdEQ TXlm66r99I0xHnAUrdzeZxNMgRVhvLfZkXdxGYFgu/BYpbWcC/ePIlUnwEsBbTuZDdQdm2NnL9Du DcpmvJRPpq3t/O5jrFc/ZSXPsoaP0Aj/uHYUbt7lJ+yreLVTubY/6CD50qi+YUbKh4yE8/nxoGib Ih6BJpsQBJFxwAYf3KDTuVan45gtf4Od34wrnDKOMpTwATwiKp9Dwi7DmDkHOHv8XgBCH/MyJnmD hPbl8MFREsALHgQjDFSlTC9JxUrRtm5gDWv8a4uFJGS3iQ6rJUdbPM9+Sb3H6QrG2vd+DhcI00iX 0HGS8A85PjRqHH3Y8iKuu2n0M7SmSFXRDw4m6Oy2Cy2nhTXN/VnIn9HNPlopNLk9hM6xZdRZkZFW dSHBd575euFgndOtBBj0fOtek49TSiIp+EgrPk2GrFt/ywaZWWDYWGWVjUTR939+J399roD1B0y2 PpxxVJkES/1Y+Zj0 -----END CERTIFICATE----- DigiCert Assured ID Root G2 =========================== -----BEGIN CERTIFICATE----- MIIDljCCAn6gAwIBAgIQC5McOtY5Z+pnI7/Dr5r0SzANBgkqhkiG9w0BAQsFADBlMQswCQYDVQQG EwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSQw IgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgRzIwHhcNMTMwODAxMTIwMDAwWhcNMzgw MTE1MTIwMDAwWjBlMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQL ExB3d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgRzIw ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDZ5ygvUj82ckmIkzTz+GoeMVSAn61UQbVH 35ao1K+ALbkKz3X9iaV9JPrjIgwrvJUXCzO/GU1BBpAAvQxNEP4HteccbiJVMWWXvdMX0h5i89vq bFCMP4QMls+3ywPgym2hFEwbid3tALBSfK+RbLE4E9HpEgjAALAcKxHad3A2m67OeYfcgnDmCXRw VWmvo2ifv922ebPynXApVfSr/5Vh88lAbx3RvpO704gqu52/clpWcTs/1PPRCv4o76Pu2ZmvA9OP YLfykqGxvYmJHzDNw6YuYjOuFgJ3RFrngQo8p0Quebg/BLxcoIfhG69Rjs3sLPr4/m3wOnyqi+Rn lTGNAgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBTO w0q5mVXyuNtgv6l+vVa1lzan1jANBgkqhkiG9w0BAQsFAAOCAQEAyqVVjOPIQW5pJ6d1Ee88hjZv 0p3GeDgdaZaikmkuOGybfQTUiaWxMTeKySHMq2zNixya1r9I0jJmwYrA8y8678Dj1JGG0VDjA9tz d29KOVPt3ibHtX2vK0LRdWLjSisCx1BL4GnilmwORGYQRI+tBev4eaymG+g3NJ1TyWGqolKvSnAW hsI6yLETcDbYz+70CjTVW0z9B5yiutkBclzzTcHdDrEcDcRjvq30FPuJ7KJBDkzMyFdA0G4Dqs0M jomZmWzwPDCvON9vvKO+KSAnq3T/EyJ43pdSVR6DtVQgA+6uwE9W3jfMw3+qBCe703e4YtsXfJwo IhNzbM8m9Yop5w== -----END CERTIFICATE----- DigiCert Assured ID Root G3 =========================== -----BEGIN CERTIFICATE----- MIICRjCCAc2gAwIBAgIQC6Fa+h3foLVJRK/NJKBs7DAKBggqhkjOPQQDAzBlMQswCQYDVQQGEwJV UzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSQwIgYD VQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgRzMwHhcNMTMwODAxMTIwMDAwWhcNMzgwMTE1 MTIwMDAwWjBlMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgRzMwdjAQ BgcqhkjOPQIBBgUrgQQAIgNiAAQZ57ysRGXtzbg/WPuNsVepRC0FFfLvC/8QdJ+1YlJfZn4f5dwb RXkLzMZTCp2NXQLZqVneAlr2lSoOjThKiknGvMYDOAdfVdp+CW7if17QRSAPWXYQ1qAk8C3eNvJs KTmjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBTL0L2p4ZgF UaFNN6KDec6NHSrkhDAKBggqhkjOPQQDAwNnADBkAjAlpIFFAmsSS3V0T8gj43DydXLefInwz5Fy YZ5eEJJZVrmDxxDnOOlYJjZ91eQ0hjkCMHw2U/Aw5WJjOpnitqM7mzT6HtoQknFekROn3aRukswy 1vUhZscv6pZjamVFkpUBtA== -----END CERTIFICATE----- DigiCert Global Root G2 ======================= -----BEGIN CERTIFICATE----- MIIDjjCCAnagAwIBAgIQAzrx5qcRqaC7KGSxHQn65TANBgkqhkiG9w0BAQsFADBhMQswCQYDVQQG EwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSAw HgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBHMjAeFw0xMzA4MDExMjAwMDBaFw0zODAxMTUx MjAwMDBaMGExCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3 dy5kaWdpY2VydC5jb20xIDAeBgNVBAMTF0RpZ2lDZXJ0IEdsb2JhbCBSb290IEcyMIIBIjANBgkq hkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuzfNNNx7a8myaJCtSnX/RrohCgiN9RlUyfuI2/Ou8jqJ kTx65qsGGmvPrC3oXgkkRLpimn7Wo6h+4FR1IAWsULecYxpsMNzaHxmx1x7e/dfgy5SDN67sH0NO 3Xss0r0upS/kqbitOtSZpLYl6ZtrAGCSYP9PIUkY92eQq2EGnI/yuum06ZIya7XzV+hdG82MHauV BJVJ8zUtluNJbd134/tJS7SsVQepj5WztCO7TG1F8PapspUwtP1MVYwnSlcUfIKdzXOS0xZKBgyM UNGPHgm+F6HmIcr9g+UQvIOlCsRnKPZzFBQ9RnbDhxSJITRNrw9FDKZJobq7nMWxM4MphQIDAQAB o0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBhjAdBgNVHQ4EFgQUTiJUIBiV5uNu 5g/6+rkS7QYXjzkwDQYJKoZIhvcNAQELBQADggEBAGBnKJRvDkhj6zHd6mcY1Yl9PMWLSn/pvtsr F9+wX3N3KjITOYFnQoQj8kVnNeyIv/iPsGEMNKSuIEyExtv4NeF22d+mQrvHRAiGfzZ0JFrabA0U WTW98kndth/Jsw1HKj2ZL7tcu7XUIOGZX1NGFdtom/DzMNU+MeKNhJ7jitralj41E6Vf8PlwUHBH QRFXGU7Aj64GxJUTFy8bJZ918rGOmaFvE7FBcf6IKshPECBV1/MUReXgRPTqh5Uykw7+U0b6LJ3/ iyK5S9kJRaTepLiaWN0bfVKfjllDiIGknibVb63dDcY3fe0Dkhvld1927jyNxF1WW6LZZm6zNTfl MrY= -----END CERTIFICATE----- DigiCert Global Root G3 ======================= -----BEGIN CERTIFICATE----- MIICPzCCAcWgAwIBAgIQBVVWvPJepDU1w6QP1atFcjAKBggqhkjOPQQDAzBhMQswCQYDVQQGEwJV UzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSAwHgYD VQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBHMzAeFw0xMzA4MDExMjAwMDBaFw0zODAxMTUxMjAw MDBaMGExCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5k aWdpY2VydC5jb20xIDAeBgNVBAMTF0RpZ2lDZXJ0IEdsb2JhbCBSb290IEczMHYwEAYHKoZIzj0C AQYFK4EEACIDYgAE3afZu4q4C/sLfyHS8L6+c/MzXRq8NOrexpu80JX28MzQC7phW1FGfp4tn+6O YwwX7Adw9c+ELkCDnOg/QW07rdOkFFk2eJ0DQ+4QE2xy3q6Ip6FrtUPOZ9wj/wMco+I+o0IwQDAP BgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBhjAdBgNVHQ4EFgQUs9tIpPmhxdiuNkHMEWNp Yim8S8YwCgYIKoZIzj0EAwMDaAAwZQIxAK288mw/EkrRLTnDCgmXc/SINoyIJ7vmiI1Qhadj+Z4y 3maTD/HMsQmP3Wyr+mt/oAIwOWZbwmSNuJ5Q3KjVSaLtx9zRSX8XAbjIho9OjIgrqJqpisXRAL34 VOKa5Vt8sycX -----END CERTIFICATE----- DigiCert Trusted Root G4 ======================== -----BEGIN CERTIFICATE----- MIIFkDCCA3igAwIBAgIQBZsbV56OITLiOQe9p3d1XDANBgkqhkiG9w0BAQwFADBiMQswCQYDVQQG EwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEw HwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMTMwODAxMTIwMDAwWhcNMzgwMTE1 MTIwMDAwWjBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwggIiMA0G CSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC/5pBzaN675F1KPDAiMGkz7MKnJS7JIT3yithZwuEp pz1Yq3aaza57G4QNxDAf8xukOBbrVsaXbR2rsnnyyhHS5F/WBTxSD1Ifxp4VpX6+n6lXFllVcq9o k3DCsrp1mWpzMpTREEQQLt+C8weE5nQ7bXHiLQwb7iDVySAdYyktzuxeTsiT+CFhmzTrBcZe7Fsa vOvJz82sNEBfsXpm7nfISKhmV1efVFiODCu3T6cw2Vbuyntd463JT17lNecxy9qTXtyOj4DatpGY QJB5w3jHtrHEtWoYOAMQjdjUN6QuBX2I9YI+EJFwq1WCQTLX2wRzKm6RAXwhTNS8rhsDdV14Ztk6 MUSaM0C/CNdaSaTC5qmgZ92kJ7yhTzm1EVgX9yRcRo9k98FpiHaYdj1ZXUJ2h4mXaXpI8OCiEhtm mnTK3kse5w5jrubU75KSOp493ADkRSWJtppEGSt+wJS00mFt6zPZxd9LBADMfRyVw4/3IbKyEbe7 f/LVjHAsQWCqsWMYRJUadmJ+9oCw++hkpjPRiQfhvbfmQ6QYuKZ3AeEPlAwhHbJUKSWJbOUOUlFH dL4mrLZBdd56rF+NP8m800ERElvlEFDrMcXKchYiCd98THU/Y+whX8QgUWtvsauGi0/C1kVfnSD8 oR7FwI+isX4KJpn15GkvmB0t9dmpsh3lGwIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1Ud DwEB/wQEAwIBhjAdBgNVHQ4EFgQU7NfjgtJxXWRM3y5nP+e6mK4cD08wDQYJKoZIhvcNAQEMBQAD ggIBALth2X2pbL4XxJEbw6GiAI3jZGgPVs93rnD5/ZpKmbnJeFwMDF/k5hQpVgs2SV1EY+CtnJYY ZhsjDT156W1r1lT40jzBQ0CuHVD1UvyQO7uYmWlrx8GnqGikJ9yd+SeuMIW59mdNOj6PWTkiU0Tr yF0Dyu1Qen1iIQqAyHNm0aAFYF/opbSnr6j3bTWcfFqK1qI4mfN4i/RN0iAL3gTujJtHgXINwBQy 7zBZLq7gcfJW5GqXb5JQbZaNaHqasjYUegbyJLkJEVDXCLG4iXqEI2FCKeWjzaIgQdfRnGTZ6iah ixTXTBmyUEFxPT9NcCOGDErcgdLMMpSEDQgJlxxPwO5rIHQw0uA5NBCFIRUBCOhVMt5xSdkoF1BN 5r5N0XWs0Mr7QbhDparTwwVETyw2m+L64kW4I1NsBm9nVX9GtUw/bihaeSbSpKhil9Ie4u1Ki7wb /UdKDd9nZn6yW0HQO+T0O/QEY+nvwlQAUaCKKsnOeMzV6ocEGLPOr0mIr/OSmbaz5mEP0oUA51Aa 5BuVnRmhuZyxm7EAHu/QD09CbMkKvO5D+jpxpchNJqU1/YldvIViHTLSoCtU7ZpXwdv6EM8Zt4tK G48BtieVU+i2iW1bvGjUI+iLUaJW+fCmgKDWHrO8Dw9TdSmq6hN35N6MgSGtBxBHEa2HPQfRdbzP 82Z+ -----END CERTIFICATE----- WoSign ====== -----BEGIN CERTIFICATE----- MIIFdjCCA16gAwIBAgIQXmjWEXGUY1BWAGjzPsnFkTANBgkqhkiG9w0BAQUFADBVMQswCQYDVQQG EwJDTjEaMBgGA1UEChMRV29TaWduIENBIExpbWl0ZWQxKjAoBgNVBAMTIUNlcnRpZmljYXRpb24g QXV0aG9yaXR5IG9mIFdvU2lnbjAeFw0wOTA4MDgwMTAwMDFaFw0zOTA4MDgwMTAwMDFaMFUxCzAJ BgNVBAYTAkNOMRowGAYDVQQKExFXb1NpZ24gQ0EgTGltaXRlZDEqMCgGA1UEAxMhQ2VydGlmaWNh dGlvbiBBdXRob3JpdHkgb2YgV29TaWduMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA vcqNrLiRFVaXe2tcesLea9mhsMMQI/qnobLMMfo+2aYpbxY94Gv4uEBf2zmoAHqLoE1UfcIiePyO CbiohdfMlZdLdNiefvAA5A6JrkkoRBoQmTIPJYhTpA2zDxIIFgsDcSccf+Hb0v1naMQFXQoOXXDX 2JegvFNBmpGN9J42Znp+VsGQX+axaCA2pIwkLCxHC1l2ZjC1vt7tj/id07sBMOby8w7gLJKA84X5 KIq0VC6a7fd2/BVoFutKbOsuEo/Uz/4Mx1wdC34FMr5esAkqQtXJTpCzWQ27en7N1QhatH/YHGkR +ScPewavVIMYe+HdVHpRaG53/Ma/UkpmRqGyZxq7o093oL5d//xWC0Nyd5DKnvnyOfUNqfTq1+ez EC8wQjchzDBwyYaYD8xYTYO7feUapTeNtqwylwA6Y3EkHp43xP901DfA4v6IRmAR3Qg/UDaruHqk lWJqbrDKaiFaafPz+x1wOZXzp26mgYmhiMU7ccqjUu6Du/2gd/Tkb+dC221KmYo0SLwX3OSACCK2 8jHAPwQ+658geda4BmRkAjHXqc1S+4RFaQkAKtxVi8QGRkvASh0JWzko/amrzgD5LkhLJuYwTKVY yrREgk/nkR4zw7CT/xH8gdLKH3Ep3XZPkiWvHYG3Dy+MwwbMLyejSuQOmbp8HkUff6oZRZb9/D0C AwEAAaNCMEAwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFOFmzw7R 8bNLtwYgFP6HEtX2/vs+MA0GCSqGSIb3DQEBBQUAA4ICAQCoy3JAsnbBfnv8rWTjMnvMPLZdRtP1 LOJwXcgu2AZ9mNELIaCJWSQBnfmvCX0KI4I01fx8cpm5o9dU9OpScA7F9dY74ToJMuYhOZO9sxXq T2r09Ys/L3yNWC7F4TmgPsc9SnOeQHrAK2GpZ8nzJLmzbVUsWh2eJXLOC62qx1ViC777Y7NhRCOj y+EaDveaBk3e1CNOIZZbOVtXHS9dCF4Jef98l7VNg64N1uajeeAz0JmWAjCnPv/So0M/BVoG6kQC 2nz4SNAzqfkHx5Xh9T71XXG68pWpdIhhWeO/yloTunK0jF02h+mmxTwTv97QRCbut+wucPrXnbes 5cVAWubXbHssw1abR80LzvobtCHXt2a49CUwi1wNuepnsvRtrtWhnk/Yn+knArAdBtaP4/tIEp9/ EaEQPkxROpaw0RPxx9gmrjrKkcRpnd8BKWRRb2jaFOwIQZeQjdCygPLPwj2/kWjFgGcexGATVdVh mVd8upUPYUk6ynW8yQqTP2cOEvIo4jEbwFcW3wh8GcF+Dx+FHgo2fFt+J7x6v+Db9NpSvd4MVHAx kUOVyLzwPt0JfjBkUO1/AaQzZ01oT74V77D2AhGiGxMlOtzCWfHjXEa7ZywCRuoeSKbmW9m1vFGi kpbbqsY3Iqb+zCB0oy2pLmvLwIIRIbWTee5Ehr7XHuQe+w== -----END CERTIFICATE----- WoSign China ============ -----BEGIN CERTIFICATE----- MIIFWDCCA0CgAwIBAgIQUHBrzdgT/BtOOzNy0hFIjTANBgkqhkiG9w0BAQsFADBGMQswCQYDVQQG EwJDTjEaMBgGA1UEChMRV29TaWduIENBIExpbWl0ZWQxGzAZBgNVBAMMEkNBIOayg+mAmuagueiv geS5pjAeFw0wOTA4MDgwMTAwMDFaFw0zOTA4MDgwMTAwMDFaMEYxCzAJBgNVBAYTAkNOMRowGAYD VQQKExFXb1NpZ24gQ0EgTGltaXRlZDEbMBkGA1UEAwwSQ0Eg5rKD6YCa5qC56K+B5LmmMIICIjAN BgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA0EkhHiX8h8EqwqzbdoYGTufQdDTc7WU1/FDWiD+k 8H/rD195L4mx/bxjWDeTmzj4t1up+thxx7S8gJeNbEvxUNUqKaqoGXqW5pWOdO2XCld19AXbbQs5 uQF/qvbW2mzmBeCkTVL829B0txGMe41P/4eDrv8FAxNXUDf+jJZSEExfv5RxadmWPgxDT74wwJ85 dE8GRV2j1lY5aAfMh09Qd5Nx2UQIsYo06Yms25tO4dnkUkWMLhQfkWsZHWgpLFbE4h4TV2TwYeO5 Ed+w4VegG63XX9Gv2ystP9Bojg/qnw+LNVgbExz03jWhCl3W6t8Sb8D7aQdGctyB9gQjF+BNdeFy b7Ao65vh4YOhn0pdr8yb+gIgthhid5E7o9Vlrdx8kHccREGkSovrlXLp9glk3Kgtn3R46MGiCWOc 76DbT52VqyBPt7D3h1ymoOQ3OMdc4zUPLK2jgKLsLl3Az+2LBcLmc272idX10kaO6m1jGx6KyX2m +Jzr5dVjhU1zZmkR/sgO9MHHZklTfuQZa/HpelmjbX7FF+Ynxu8b22/8DU0GAbQOXDBGVWCvOGU6 yke6rCzMRh+yRpY/8+0mBe53oWprfi1tWFxK1I5nuPHa1UaKJ/kR8slC/k7e3x9cxKSGhxYzoacX GKUN5AXlK8IrC6KVkLn9YDxOiT7nnO4fuwECAwEAAaNCMEAwDgYDVR0PAQH/BAQDAgEGMA8GA1Ud EwEB/wQFMAMBAf8wHQYDVR0OBBYEFOBNv9ybQV0T6GTwp+kVpOGBwboxMA0GCSqGSIb3DQEBCwUA A4ICAQBqinA4WbbaixjIvirTthnVZil6Xc1bL3McJk6jfW+rtylNpumlEYOnOXOvEESS5iVdT2H6 yAa+Tkvv/vMx/sZ8cApBWNromUuWyXi8mHwCKe0JgOYKOoICKuLJL8hWGSbueBwj/feTZU7n85iY r83d2Z5AiDEoOqsuC7CsDCT6eiaY8xJhEPRdF/d+4niXVOKM6Cm6jBAyvd0zaziGfjk9DgNyp115 j0WKWa5bIW4xRtVZjc8VX90xJc/bYNaBRHIpAlf2ltTW/+op2znFuCyKGo3Oy+dCMYYFaA6eFN0A kLppRQjbbpCBhqcqBT/mhDn4t/lXX0ykeVoQDF7Va/81XwVRHmyjdanPUIPTfPRm94KNPQx96N97 qA4bLJyuQHCH2u2nFoJavjVsIE4iYdm8UXrNemHcSxH5/mc0zy4EZmFcV5cjjPOGG0jfKq+nwf/Y jj4Du9gqsPoUJbJRa4ZDhS4HIxaAjUz7tGM7zMN07RujHv41D198HRaG9Q7DlfEvr10lO1Hm13ZB ONFLAzkopR6RctR9q5czxNM+4Gm2KHmgCY0c0f9BckgG/Jou5yD5m6Leie2uPAmvylezkolwQOQv T8Jwg0DXJCxr5wkf09XHwQj02w47HAcLQxGEIYbpgNR12KvxAmLBsX5VYc8T1yaw15zLKYs4SgsO kI26oQ== -----END CERTIFICATE----- COMODO RSA Certification Authority ================================== -----BEGIN CERTIFICATE----- MIIF2DCCA8CgAwIBAgIQTKr5yttjb+Af907YWwOGnTANBgkqhkiG9w0BAQwFADCBhTELMAkGA1UE BhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgG A1UEChMRQ09NT0RPIENBIExpbWl0ZWQxKzApBgNVBAMTIkNPTU9ETyBSU0EgQ2VydGlmaWNhdGlv biBBdXRob3JpdHkwHhcNMTAwMTE5MDAwMDAwWhcNMzgwMTE4MjM1OTU5WjCBhTELMAkGA1UEBhMC R0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgGA1UE ChMRQ09NT0RPIENBIExpbWl0ZWQxKzApBgNVBAMTIkNPTU9ETyBSU0EgQ2VydGlmaWNhdGlvbiBB dXRob3JpdHkwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCR6FSS0gpWsawNJN3Fz0Rn dJkrN6N9I3AAcbxT38T6KhKPS38QVr2fcHK3YX/JSw8Xpz3jsARh7v8Rl8f0hj4K+j5c+ZPmNHrZ FGvnnLOFoIJ6dq9xkNfs/Q36nGz637CC9BR++b7Epi9Pf5l/tfxnQ3K9DADWietrLNPtj5gcFKt+ 5eNu/Nio5JIk2kNrYrhV/erBvGy2i/MOjZrkm2xpmfh4SDBF1a3hDTxFYPwyllEnvGfDyi62a+pG x8cgoLEfZd5ICLqkTqnyg0Y3hOvozIFIQ2dOciqbXL1MGyiKXCJ7tKuY2e7gUYPDCUZObT6Z+pUX 2nwzV0E8jVHtC7ZcryxjGt9XyD+86V3Em69FmeKjWiS0uqlWPc9vqv9JWL7wqP/0uK3pN/u6uPQL OvnoQ0IeidiEyxPx2bvhiWC4jChWrBQdnArncevPDt09qZahSL0896+1DSJMwBGB7FY79tOi4lu3 sgQiUpWAk2nojkxl8ZEDLXB0AuqLZxUpaVICu9ffUGpVRr+goyhhf3DQw6KqLCGqR84onAZFdr+C GCe01a60y1Dma/RMhnEw6abfFobg2P9A3fvQQoh/ozM6LlweQRGBY84YcWsr7KaKtzFcOmpH4MN5 WdYgGq/yapiqcrxXStJLnbsQ/LBMQeXtHT1eKJ2czL+zUdqnR+WEUwIDAQABo0IwQDAdBgNVHQ4E FgQUu69+Aj36pvE8hI6t7jiY7NkyMtQwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8w DQYJKoZIhvcNAQEMBQADggIBAArx1UaEt65Ru2yyTUEUAJNMnMvlwFTPoCWOAvn9sKIN9SCYPBMt rFaisNZ+EZLpLrqeLppysb0ZRGxhNaKatBYSaVqM4dc+pBroLwP0rmEdEBsqpIt6xf4FpuHA1sj+ nq6PK7o9mfjYcwlYRm6mnPTXJ9OV2jeDchzTc+CiR5kDOF3VSXkAKRzH7JsgHAckaVd4sjn8OoSg tZx8jb8uk2IntznaFxiuvTwJaP+EmzzV1gsD41eeFPfR60/IvYcjt7ZJQ3mFXLrrkguhxuhoqEwW sRqZCuhTLJK7oQkYdQxlqHvLI7cawiiFwxv/0Cti76R7CZGYZ4wUAc1oBmpjIXUDgIiKboHGhfKp pC3n9KUkEEeDys30jXlYsQab5xoq2Z0B15R97QNKyvDb6KkBPvVWmckejkk9u+UJueBPSZI9FoJA zMxZxuY67RIuaTxslbH9qh17f4a+Hg4yRvv7E491f0yLS0Zj/gA0QHDBw7mh3aZw4gSzQbzpgJHq ZJx64SIDqZxubw5lT2yHh17zbqD5daWbQOhTsiedSrnAdyGN/4fy3ryM7xfft0kL0fJuMAsaDk52 7RH89elWsn2/x20Kk4yl0MC2Hb46TpSi125sC8KKfPog88Tk5c0NqMuRkrF8hey1FGlmDoLnzc7I LaZRfyHBNVOFBkpdn627G190 -----END CERTIFICATE----- USERTrust RSA Certification Authority ===================================== -----BEGIN CERTIFICATE----- MIIF3jCCA8agAwIBAgIQAf1tMPyjylGoG7xkDjUDLTANBgkqhkiG9w0BAQwFADCBiDELMAkGA1UE BhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNVBAcTC0plcnNleSBDaXR5MR4wHAYDVQQK ExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNh dGlvbiBBdXRob3JpdHkwHhcNMTAwMjAxMDAwMDAwWhcNMzgwMTE4MjM1OTU5WjCBiDELMAkGA1UE BhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNVBAcTC0plcnNleSBDaXR5MR4wHAYDVQQK ExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNh dGlvbiBBdXRob3JpdHkwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCAEmUXNg7D2wiz 0KxXDXbtzSfTTK1Qg2HiqiBNCS1kCdzOiZ/MPans9s/B3PHTsdZ7NygRK0faOca8Ohm0X6a9fZ2j Y0K2dvKpOyuR+OJv0OwWIJAJPuLodMkYtJHUYmTbf6MG8YgYapAiPLz+E/CHFHv25B+O1ORRxhFn RghRy4YUVD+8M/5+bJz/Fp0YvVGONaanZshyZ9shZrHUm3gDwFA66Mzw3LyeTP6vBZY1H1dat//O +T23LLb2VN3I5xI6Ta5MirdcmrS3ID3KfyI0rn47aGYBROcBTkZTmzNg95S+UzeQc0PzMsNT79uq /nROacdrjGCT3sTHDN/hMq7MkztReJVni+49Vv4M0GkPGw/zJSZrM233bkf6c0Plfg6lZrEpfDKE Y1WJxA3Bk1QwGROs0303p+tdOmw1XNtB1xLaqUkL39iAigmTYo61Zs8liM2EuLE/pDkP2QKe6xJM lXzzawWpXhaDzLhn4ugTncxbgtNMs+1b/97lc6wjOy0AvzVVdAlJ2ElYGn+SNuZRkg7zJn0cTRe8 yexDJtC/QV9AqURE9JnnV4eeUB9XVKg+/XRjL7FQZQnmWEIuQxpMtPAlR1n6BB6T1CZGSlCBst6+ eLf8ZxXhyVeEHg9j1uliutZfVS7qXMYoCAQlObgOK6nyTJccBz8NUvXt7y+CDwIDAQABo0IwQDAd BgNVHQ4EFgQUU3m/WqorSs9UgOHYm8Cd8rIDZsswDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQF MAMBAf8wDQYJKoZIhvcNAQEMBQADggIBAFzUfA3P9wF9QZllDHPFUp/L+M+ZBn8b2kMVn54CVVeW FPFSPCeHlCjtHzoBN6J2/FNQwISbxmtOuowhT6KOVWKR82kV2LyI48SqC/3vqOlLVSoGIG1VeCkZ 7l8wXEskEVX/JJpuXior7gtNn3/3ATiUFJVDBwn7YKnuHKsSjKCaXqeYalltiz8I+8jRRa8YFWSQ Eg9zKC7F4iRO/Fjs8PRF/iKz6y+O0tlFYQXBl2+odnKPi4w2r78NBc5xjeambx9spnFixdjQg3IM 8WcRiQycE0xyNN+81XHfqnHd4blsjDwSXWXavVcStkNr/+XeTWYRUc+ZruwXtuhxkYzeSf7dNXGi FSeUHM9h4ya7b6NnJSFd5t0dCy5oGzuCr+yDZ4XUmFF0sbmZgIn/f3gZXHlKYC6SQK5MNyosycdi yA5d9zZbyuAlJQG03RoHnHcAP9Dc1ew91Pq7P8yF1m9/qS3fuQL39ZeatTXaw2ewh0qpKJ4jjv9c J2vhsE/zB+4ALtRZh8tSQZXq9EfX7mRBVXyNWQKV3WKdwrnuWih0hKWbt5DHDAff9Yk2dDLWKMGw sAvgnEzDHNb842m1R0aBL6KCq9NjRHDEjf8tM7qtj3u1cIiuPhnPQCjY/MiQu12ZIvVS5ljFH4gx Q+6IHdfGjjxDah2nGN59PRbxYvnKkKj9 -----END CERTIFICATE----- USERTrust ECC Certification Authority ===================================== -----BEGIN CERTIFICATE----- MIICjzCCAhWgAwIBAgIQXIuZxVqUxdJxVt7NiYDMJjAKBggqhkjOPQQDAzCBiDELMAkGA1UEBhMC VVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNVBAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVU aGUgVVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMTJVVTRVJUcnVzdCBFQ0MgQ2VydGlmaWNhdGlv biBBdXRob3JpdHkwHhcNMTAwMjAxMDAwMDAwWhcNMzgwMTE4MjM1OTU5WjCBiDELMAkGA1UEBhMC VVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNVBAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVU aGUgVVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMTJVVTRVJUcnVzdCBFQ0MgQ2VydGlmaWNhdGlv biBBdXRob3JpdHkwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQarFRaqfloI+d61SRvU8Za2EurxtW2 0eZzca7dnNYMYf3boIkDuAUU7FfO7l0/4iGzzvfUinngo4N+LZfQYcTxmdwlkWOrfzCjtHDix6Ez nPO/LlxTsV+zfTJ/ijTjeXmjQjBAMB0GA1UdDgQWBBQ64QmG1M8ZwpZ2dEl23OA1xmNjmjAOBgNV HQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAKBggqhkjOPQQDAwNoADBlAjA2Z6EWCNzklwBB HU6+4WMBzzuqQhFkoJ2UOQIReVx7Hfpkue4WQrO/isIJxOzksU0CMQDpKmFHjFJKS04YcPbWRNZu 9YO6bVi9JNlWSOrvxKJGgYhqOkbRqZtNyWHa0V1Xahg= -----END CERTIFICATE----- GlobalSign ECC Root CA - R4 =========================== -----BEGIN CERTIFICATE----- MIIB4TCCAYegAwIBAgIRKjikHJYKBN5CsiilC+g0mAIwCgYIKoZIzj0EAwIwUDEkMCIGA1UECxMb R2xvYmFsU2lnbiBFQ0MgUm9vdCBDQSAtIFI0MRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQD EwpHbG9iYWxTaWduMB4XDTEyMTExMzAwMDAwMFoXDTM4MDExOTAzMTQwN1owUDEkMCIGA1UECxMb R2xvYmFsU2lnbiBFQ0MgUm9vdCBDQSAtIFI0MRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQD EwpHbG9iYWxTaWduMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEuMZ5049sJQ6fLjkZHAOkrprl OQcJFspjsbmG+IpXwVfOQvpzofdlQv8ewQCybnMO/8ch5RikqtlxP6jUuc6MHaNCMEAwDgYDVR0P AQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFFSwe61FuOJAf/sKbvu+M8k8o4TV MAoGCCqGSM49BAMCA0gAMEUCIQDckqGgE6bPA7DmxCGXkPoUVy0D7O48027KqGx2vKLeuwIgJ6iF JzWbVsaj8kfSt24bAgAXqmemFZHe+pTsewv4n4Q= -----END CERTIFICATE----- GlobalSign ECC Root CA - R5 =========================== -----BEGIN CERTIFICATE----- MIICHjCCAaSgAwIBAgIRYFlJ4CYuu1X5CneKcflK2GwwCgYIKoZIzj0EAwMwUDEkMCIGA1UECxMb R2xvYmFsU2lnbiBFQ0MgUm9vdCBDQSAtIFI1MRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQD EwpHbG9iYWxTaWduMB4XDTEyMTExMzAwMDAwMFoXDTM4MDExOTAzMTQwN1owUDEkMCIGA1UECxMb R2xvYmFsU2lnbiBFQ0MgUm9vdCBDQSAtIFI1MRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQD EwpHbG9iYWxTaWduMHYwEAYHKoZIzj0CAQYFK4EEACIDYgAER0UOlvt9Xb/pOdEh+J8LttV7HpI6 SFkc8GIxLcB6KP4ap1yztsyX50XUWPrRd21DosCHZTQKH3rd6zwzocWdTaRvQZU4f8kehOvRnkmS h5SHDDqFSmafnVmTTZdhBoZKo0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAd BgNVHQ4EFgQUPeYpSJvqB8ohREom3m7e0oPQn1kwCgYIKoZIzj0EAwMDaAAwZQIxAOVpEslu28Yx uglB4Zf4+/2a4n0Sye18ZNPLBSWLVtmg515dTguDnFt2KaAJJiFqYgIwcdK1j1zqO+F4CYWodZI7 yFz9SO8NdCKoCOJuxUnOxwy8p2Fp8fc74SrL+SvzZpA3 -----END CERTIFICATE----- Staat der Nederlanden Root CA - G3 ================================== -----BEGIN CERTIFICATE----- MIIFdDCCA1ygAwIBAgIEAJiiOTANBgkqhkiG9w0BAQsFADBaMQswCQYDVQQGEwJOTDEeMBwGA1UE CgwVU3RhYXQgZGVyIE5lZGVybGFuZGVuMSswKQYDVQQDDCJTdGFhdCBkZXIgTmVkZXJsYW5kZW4g Um9vdCBDQSAtIEczMB4XDTEzMTExNDExMjg0MloXDTI4MTExMzIzMDAwMFowWjELMAkGA1UEBhMC TkwxHjAcBgNVBAoMFVN0YWF0IGRlciBOZWRlcmxhbmRlbjErMCkGA1UEAwwiU3RhYXQgZGVyIE5l ZGVybGFuZGVuIFJvb3QgQ0EgLSBHMzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAL4y olQPcPssXFnrbMSkUeiFKrPMSjTysF/zDsccPVMeiAho2G89rcKezIJnByeHaHE6n3WWIkYFsO2t x1ueKt6c/DrGlaf1F2cY5y9JCAxcz+bMNO14+1Cx3Gsy8KL+tjzk7FqXxz8ecAgwoNzFs21v0IJy EavSgWhZghe3eJJg+szeP4TrjTgzkApyI/o1zCZxMdFyKJLZWyNtZrVtB0LrpjPOktvA9mxjeM3K Tj215VKb8b475lRgsGYeCasH/lSJEULR9yS6YHgamPfJEf0WwTUaVHXvQ9Plrk7O53vDxk5hUUur mkVLoR9BvUhTFXFkC4az5S6+zqQbwSmEorXLCCN2QyIkHxcE1G6cxvx/K2Ya7Irl1s9N9WMJtxU5 1nus6+N86U78dULI7ViVDAZCopz35HCz33JvWjdAidiFpNfxC95DGdRKWCyMijmev4SH8RY7Ngzp 07TKbBlBUgmhHbBqv4LvcFEhMtwFdozL92TkA1CvjJFnq8Xy7ljY3r735zHPbMk7ccHViLVlvMDo FxcHErVc0qsgk7TmgoNwNsXNo42ti+yjwUOH5kPiNL6VizXtBznaqB16nzaeErAMZRKQFWDZJkBE 41ZgpRDUajz9QdwOWke275dhdU/Z/seyHdTtXUmzqWrLZoQT1Vyg3N9udwbRcXXIV2+vD3dbAgMB AAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBRUrfrHkleu yjWcLhL75LpdINyUVzANBgkqhkiG9w0BAQsFAAOCAgEAMJmdBTLIXg47mAE6iqTnB/d6+Oea31BD U5cqPco8R5gu4RV78ZLzYdqQJRZlwJ9UXQ4DO1t3ApyEtg2YXzTdO2PCwyiBwpwpLiniyMMB8jPq KqrMCQj3ZWfGzd/TtiunvczRDnBfuCPRy5FOCvTIeuXZYzbB1N/8Ipf3YF3qKS9Ysr1YvY2WTxB1 v0h7PVGHoTx0IsL8B3+A3MSs/mrBcDCw6Y5p4ixpgZQJut3+TcCDjJRYwEYgr5wfAvg1VUkvRtTA 8KCWAg8zxXHzniN9lLf9OtMJgwYh/WA9rjLA0u6NpvDntIJ8CsxwyXmA+P5M9zWEGYox+wrZ13+b 8KKaa8MFSu1BYBQw0aoRQm7TIwIEC8Zl3d1Sd9qBa7Ko+gE4uZbqKmxnl4mUnrzhVNXkanjvSr0r mj1AfsbAddJu+2gw7OyLnflJNZoaLNmzlTnVHpL3prllL+U9bTpITAjc5CgSKL59NVzq4BZ+Extq 1z7XnvwtdbLBFNUjA9tbbws+eC8N3jONFrdI54OagQ97wUNNVQQXOEpR1VmiiXTTn74eS9fGbbeI JG9gkaSChVtWQbzQRKtqE77RLFi3EjNYsjdj3BP1lB0/QFH1T/U67cjF68IeHRaVesd+QnGTbksV tzDfqu1XhUisHWrdOWnk4Xl4vs4Fv6EM94B7IWcnMFk= -----END CERTIFICATE----- Staat der Nederlanden EV Root CA ================================ -----BEGIN CERTIFICATE----- MIIFcDCCA1igAwIBAgIEAJiWjTANBgkqhkiG9w0BAQsFADBYMQswCQYDVQQGEwJOTDEeMBwGA1UE CgwVU3RhYXQgZGVyIE5lZGVybGFuZGVuMSkwJwYDVQQDDCBTdGFhdCBkZXIgTmVkZXJsYW5kZW4g RVYgUm9vdCBDQTAeFw0xMDEyMDgxMTE5MjlaFw0yMjEyMDgxMTEwMjhaMFgxCzAJBgNVBAYTAk5M MR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xKTAnBgNVBAMMIFN0YWF0IGRlciBOZWRl cmxhbmRlbiBFViBSb290IENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA48d+ifkk SzrSM4M1LGns3Amk41GoJSt5uAg94JG6hIXGhaTK5skuU6TJJB79VWZxXSzFYGgEt9nCUiY4iKTW O0Cmws0/zZiTs1QUWJZV1VD+hq2kY39ch/aO5ieSZxeSAgMs3NZmdO3dZ//BYY1jTw+bbRcwJu+r 0h8QoPnFfxZpgQNH7R5ojXKhTbImxrpsX23Wr9GxE46prfNeaXUmGD5BKyF/7otdBwadQ8QpCiv8 Kj6GyzyDOvnJDdrFmeK8eEEzduG/L13lpJhQDBXd4Pqcfzho0LKmeqfRMb1+ilgnQ7O6M5HTp5gV XJrm0w912fxBmJc+qiXbj5IusHsMX/FjqTf5m3VpTCgmJdrV8hJwRVXj33NeN/UhbJCONVrJ0yPr 08C+eKxCKFhmpUZtcALXEPlLVPxdhkqHz3/KRawRWrUgUY0viEeXOcDPusBCAUCZSCELa6fS/ZbV 0b5GnUngC6agIk440ME8MLxwjyx1zNDFjFE7PZQIZCZhfbnDZY8UnCHQqv0XcgOPvZuM5l5Tnrmd 74K74bzickFbIZTTRTeU0d8JOV3nI6qaHcptqAqGhYqCvkIH1vI4gnPah1vlPNOePqc7nvQDs/nx fRN0Av+7oeX6AHkcpmZBiFxgV6YuCcS6/ZrPpx9Aw7vMWgpVSzs4dlG4Y4uElBbmVvMCAwEAAaNC MEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFP6rAJCYniT8qcwa ivsnuL8wbqg7MA0GCSqGSIb3DQEBCwUAA4ICAQDPdyxuVr5Os7aEAJSrR8kN0nbHhp8dB9O2tLsI eK9p0gtJ3jPFrK3CiAJ9Brc1AsFgyb/E6JTe1NOpEyVa/m6irn0F3H3zbPB+po3u2dfOWBfoqSmu c0iH55vKbimhZF8ZE/euBhD/UcabTVUlT5OZEAFTdfETzsemQUHSv4ilf0X8rLiltTMMgsT7B/Zq 5SWEXwbKwYY5EdtYzXc7LMJMD16a4/CrPmEbUCTCwPTxGfARKbalGAKb12NMcIxHowNDXLldRqAN b/9Zjr7dn3LDWyvfjFvO5QxGbJKyCqNMVEIYFRIYvdr8unRu/8G2oGTYqV9Vrp9canaW2HNnh/tN f1zuacpzEPuKqf2evTY4SUmH9A4U8OmHuD+nT3pajnnUk+S7aFKErGzp85hwVXIy+TSrK0m1zSBi 5Dp6Z2Orltxtrpfs/J92VoguZs9btsmksNcFuuEnL5O7Jiqik7Ab846+HUCjuTaPPoIaGl6I6lD4 WeKDRikL40Rc4ZW2aZCaFG+XroHPaO+Zmr615+F/+PoTRxZMzG0IQOeLeG9QgkRQP2YGiqtDhFZK DyAthg710tvSeopLzaXoTvFeJiUBWSOgftL2fiFX1ye8FVdMpEbB4IMeDExNH08GGeL5qPQ6gqGy eUN51q1veieQA6TqJIc/2b3Z6fJfUEkc7uzXLg== -----END CERTIFICATE----- IdenTrust Commercial Root CA 1 ============================== -----BEGIN CERTIFICATE----- MIIFYDCCA0igAwIBAgIQCgFCgAAAAUUjyES1AAAAAjANBgkqhkiG9w0BAQsFADBKMQswCQYDVQQG EwJVUzESMBAGA1UEChMJSWRlblRydXN0MScwJQYDVQQDEx5JZGVuVHJ1c3QgQ29tbWVyY2lhbCBS b290IENBIDEwHhcNMTQwMTE2MTgxMjIzWhcNMzQwMTE2MTgxMjIzWjBKMQswCQYDVQQGEwJVUzES MBAGA1UEChMJSWRlblRydXN0MScwJQYDVQQDEx5JZGVuVHJ1c3QgQ29tbWVyY2lhbCBSb290IENB IDEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCnUBneP5k91DNG8W9RYYKyqU+PZ4ld hNlT3Qwo2dfw/66VQ3KZ+bVdfIrBQuExUHTRgQ18zZshq0PirK1ehm7zCYofWjK9ouuU+ehcCuz/ mNKvcbO0U59Oh++SvL3sTzIwiEsXXlfEU8L2ApeN2WIrvyQfYo3fw7gpS0l4PJNgiCL8mdo2yMKi 1CxUAGc1bnO/AljwpN3lsKImesrgNqUZFvX9t++uP0D1bVoE/c40yiTcdCMbXTMTEl3EASX2MN0C XZ/g1Ue9tOsbobtJSdifWwLziuQkkORiT0/Br4sOdBeo0XKIanoBScy0RnnGF7HamB4HWfp1IYVl 3ZBWzvurpWCdxJ35UrCLvYf5jysjCiN2O/cz4ckA82n5S6LgTrx+kzmEB/dEcH7+B1rlsazRGMzy NeVJSQjKVsk9+w8YfYs7wRPCTY/JTw436R+hDmrfYi7LNQZReSzIJTj0+kuniVyc0uMNOYZKdHzV WYfCP04MXFL0PfdSgvHqo6z9STQaKPNBiDoT7uje/5kdX7rL6B7yuVBgwDHTc+XvvqDtMwt0viAg xGds8AgDelWAf0ZOlqf0Hj7h9tgJ4TNkK2PXMl6f+cB7D3hvl7yTmvmcEpB4eoCHFddydJxVdHix uuFucAS6T6C6aMN7/zHwcz09lCqxC0EOoP5NiGVreTO01wIDAQABo0IwQDAOBgNVHQ8BAf8EBAMC AQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU7UQZwNPwBovupHu+QucmVMiONnYwDQYJKoZI hvcNAQELBQADggIBAA2ukDL2pkt8RHYZYR4nKM1eVO8lvOMIkPkp165oCOGUAFjvLi5+U1KMtlwH 6oi6mYtQlNeCgN9hCQCTrQ0U5s7B8jeUeLBfnLOic7iPBZM4zY0+sLj7wM+x8uwtLRvM7Kqas6pg ghstO8OEPVeKlh6cdbjTMM1gCIOQ045U8U1mwF10A0Cj7oV+wh93nAbowacYXVKV7cndJZ5t+qnt ozo00Fl72u1Q8zW/7esUTTHHYPTa8Yec4kjixsU3+wYQ+nVZZjFHKdp2mhzpgq7vmrlR94gjmmmV YjzlVYA211QC//G5Xc7UI2/YRYRKW2XviQzdFKcgyxilJbQN+QHwotL0AMh0jqEqSI5l2xPE4iUX feu+h1sXIFRRk0pTAwvsXcoz7WL9RccvW9xYoIA55vrX/hMUpu09lEpCdNTDd1lzzY9GvlU47/ro kTLql1gEIt44w8y8bckzOmoKaT+gyOpyj4xjhiO9bTyWnpXgSUyqorkqG5w2gXjtw+hG4iZZRHUe 2XWJUc0QhJ1hYMtd+ZciTY6Y5uN/9lu7rs3KSoFrXgvzUeF0K+l+J6fZmUlO+KWA2yUPHGNiiskz Z2s8EIPGrd6ozRaOjfAHN3Gf8qv8QfXBi+wAN10J5U6A7/qxXDgGpRtK4dw4LTzcqx+QGtVKnO7R cGzM7vRX+Bi6hG6H -----END CERTIFICATE----- IdenTrust Public Sector Root CA 1 ================================= -----BEGIN CERTIFICATE----- MIIFZjCCA06gAwIBAgIQCgFCgAAAAUUjz0Z8AAAAAjANBgkqhkiG9w0BAQsFADBNMQswCQYDVQQG EwJVUzESMBAGA1UEChMJSWRlblRydXN0MSowKAYDVQQDEyFJZGVuVHJ1c3QgUHVibGljIFNlY3Rv ciBSb290IENBIDEwHhcNMTQwMTE2MTc1MzMyWhcNMzQwMTE2MTc1MzMyWjBNMQswCQYDVQQGEwJV UzESMBAGA1UEChMJSWRlblRydXN0MSowKAYDVQQDEyFJZGVuVHJ1c3QgUHVibGljIFNlY3RvciBS b290IENBIDEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC2IpT8pEiv6EdrCvsnduTy P4o7ekosMSqMjbCpwzFrqHd2hCa2rIFCDQjrVVi7evi8ZX3yoG2LqEfpYnYeEe4IFNGyRBb06tD6 Hi9e28tzQa68ALBKK0CyrOE7S8ItneShm+waOh7wCLPQ5CQ1B5+ctMlSbdsHyo+1W/CD80/HLaXI rcuVIKQxKFdYWuSNG5qrng0M8gozOSI5Cpcu81N3uURF/YTLNiCBWS2ab21ISGHKTN9T0a9SvESf qy9rg3LvdYDaBjMbXcjaY8ZNzaxmMc3R3j6HEDbhuaR672BQssvKplbgN6+rNBM5Jeg5ZuSYeqoS mJxZZoY+rfGwyj4GD3vwEUs3oERte8uojHH01bWRNszwFcYr3lEXsZdMUD2xlVl8BX0tIdUAvwFn ol57plzy9yLxkA2T26pEUWbMfXYD62qoKjgZl3YNa4ph+bz27nb9cCvdKTz4Ch5bQhyLVi9VGxyh LrXHFub4qjySjmm2AcG1hp2JDws4lFTo6tyePSW8Uybt1as5qsVATFSrsrTZ2fjXctscvG29ZV/v iDUqZi/u9rNl8DONfJhBaUYPQxxp+pu10GFqzcpL2UyQRqsVWaFHVCkugyhfHMKiq3IXAAaOReyL 4jM9f9oZRORicsPfIsbyVtTdX5Vy7W1f90gDW/3FKqD2cyOEEBsB5wIDAQABo0IwQDAOBgNVHQ8B Af8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU43HgntinQtnbcZFrlJPrw6PRFKMw DQYJKoZIhvcNAQELBQADggIBAEf63QqwEZE4rU1d9+UOl1QZgkiHVIyqZJnYWv6IAcVYpZmxI1Qj t2odIFflAWJBF9MJ23XLblSQdf4an4EKwt3X9wnQW3IV5B4Jaj0z8yGa5hV+rVHVDRDtfULAj+7A mgjVQdZcDiFpboBhDhXAuM/FSRJSzL46zNQuOAXeNf0fb7iAaJg9TaDKQGXSc3z1i9kKlT/YPyNt GtEqJBnZhbMX73huqVjRI9PHE+1yJX9dsXNw0H8GlwmEKYBhHfpe/3OsoOOJuBxxFcbeMX8S3OFt m6/n6J91eEyrRjuazr8FGF1NFTwWmhlQBJqymm9li1JfPFgEKCXAZmExfrngdbkaqIHWchezxQMx NRF4eKLg6TCMf4DfWN88uieW4oA0beOY02QnrEh+KHdcxiVhJfiFDGX6xDIvpZgF5PgLZxYWxoK4 Mhn5+bl53B/N66+rDt0b20XkeucC4pVd/GnwU2lhlXV5C15V5jgclKlZM57IcXR5f1GJtshquDDI ajjDbp7hNxbqBWJMWxJH7ae0s1hWx0nzfxJoCTFx8G34Tkf71oXuxVhAGaQdp/lLQzfcaFpPz+vC ZHTetBXZ9FRUGi8c15dxVJCO2SCdUyt/q4/i6jC8UDfv8Ue1fXwsBOxonbRJRBD0ckscZOf85muQ 3Wl9af0AVqW3rLatt8o+Ae+c -----END CERTIFICATE----- Entrust Root Certification Authority - G2 ========================================= -----BEGIN CERTIFICATE----- MIIEPjCCAyagAwIBAgIESlOMKDANBgkqhkiG9w0BAQsFADCBvjELMAkGA1UEBhMCVVMxFjAUBgNV BAoTDUVudHJ1c3QsIEluYy4xKDAmBgNVBAsTH1NlZSB3d3cuZW50cnVzdC5uZXQvbGVnYWwtdGVy bXMxOTA3BgNVBAsTMChjKSAyMDA5IEVudHJ1c3QsIEluYy4gLSBmb3IgYXV0aG9yaXplZCB1c2Ug b25seTEyMDAGA1UEAxMpRW50cnVzdCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0gRzIw HhcNMDkwNzA3MTcyNTU0WhcNMzAxMjA3MTc1NTU0WjCBvjELMAkGA1UEBhMCVVMxFjAUBgNVBAoT DUVudHJ1c3QsIEluYy4xKDAmBgNVBAsTH1NlZSB3d3cuZW50cnVzdC5uZXQvbGVnYWwtdGVybXMx OTA3BgNVBAsTMChjKSAyMDA5IEVudHJ1c3QsIEluYy4gLSBmb3IgYXV0aG9yaXplZCB1c2Ugb25s eTEyMDAGA1UEAxMpRW50cnVzdCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0gRzIwggEi MA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC6hLZy254Ma+KZ6TABp3bqMriVQRrJ2mFOWHLP /vaCeb9zYQYKpSfYs1/TRU4cctZOMvJyig/3gxnQaoCAAEUesMfnmr8SVycco2gvCoe9amsOXmXz HHfV1IWNcCG0szLni6LVhjkCsbjSR87kyUnEO6fe+1R9V77w6G7CebI6C1XiUJgWMhNcL3hWwcKU s/Ja5CeanyTXxuzQmyWC48zCxEXFjJd6BmsqEZ+pCm5IO2/b1BEZQvePB7/1U1+cPvQXLOZprE4y TGJ36rfo5bs0vBmLrpxR57d+tVOxMyLlbc9wPBr64ptntoP0jaWvYkxN4FisZDQSA/i2jZRjJKRx AgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBRqciZ6 0B7vfec7aVHUbI2fkBJmqzANBgkqhkiG9w0BAQsFAAOCAQEAeZ8dlsa2eT8ijYfThwMEYGprmi5Z iXMRrEPR9RP/jTkrwPK9T3CMqS/qF8QLVJ7UG5aYMzyorWKiAHarWWluBh1+xLlEjZivEtRh2woZ Rkfz6/djwUAFQKXSt/S1mja/qYh2iARVBCuch38aNzx+LaUa2NSJXsq9rD1s2G2v1fN2D807iDgi nWyTmsQ9v4IbZT+mD12q/OWyFcq1rca8PdCE6OoGcrBNOTJ4vz4RnAuknZoh8/CbCzB428Hch0P+ vGOaysXCHMnHjf87ElgI5rY97HosTvuDls4MPGmHVHOkc8KT/1EQrBVUAdj8BbGJoX90g5pJ19xO e4pIb4tF9g== -----END CERTIFICATE----- Entrust Root Certification Authority - EC1 ========================================== -----BEGIN CERTIFICATE----- MIIC+TCCAoCgAwIBAgINAKaLeSkAAAAAUNCR+TAKBggqhkjOPQQDAzCBvzELMAkGA1UEBhMCVVMx FjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNVBAsTH1NlZSB3d3cuZW50cnVzdC5uZXQvbGVn YWwtdGVybXMxOTA3BgNVBAsTMChjKSAyMDEyIEVudHJ1c3QsIEluYy4gLSBmb3IgYXV0aG9yaXpl ZCB1c2Ugb25seTEzMDEGA1UEAxMqRW50cnVzdCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5 IC0gRUMxMB4XDTEyMTIxODE1MjUzNloXDTM3MTIxODE1NTUzNlowgb8xCzAJBgNVBAYTAlVTMRYw FAYDVQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQLEx9TZWUgd3d3LmVudHJ1c3QubmV0L2xlZ2Fs LXRlcm1zMTkwNwYDVQQLEzAoYykgMjAxMiBFbnRydXN0LCBJbmMuIC0gZm9yIGF1dGhvcml6ZWQg dXNlIG9ubHkxMzAxBgNVBAMTKkVudHJ1c3QgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAt IEVDMTB2MBAGByqGSM49AgEGBSuBBAAiA2IABIQTydC6bUF74mzQ61VfZgIaJPRbiWlH47jCffHy AsWfoPZb1YsGGYZPUxBtByQnoaD41UcZYUx9ypMn6nQM72+WCf5j7HBdNq1nd67JnXxVRDqiY1Ef 9eNi1KlHBz7MIKNCMEAwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYE FLdj5xrdjekIplWDpOBqUEFlEUJJMAoGCCqGSM49BAMDA2cAMGQCMGF52OVCR98crlOZF7ZvHH3h vxGU0QOIdeSNiaSKd0bebWHvAvX7td/M/k7//qnmpwIwW5nXhTcGtXsI/esni0qU+eH6p44mCOh8 kmhtc9hvJqwhAriZtyZBWyVgrtBIGu4G -----END CERTIFICATE----- CFCA EV ROOT ============ -----BEGIN CERTIFICATE----- MIIFjTCCA3WgAwIBAgIEGErM1jANBgkqhkiG9w0BAQsFADBWMQswCQYDVQQGEwJDTjEwMC4GA1UE CgwnQ2hpbmEgRmluYW5jaWFsIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MRUwEwYDVQQDDAxDRkNB IEVWIFJPT1QwHhcNMTIwODA4MDMwNzAxWhcNMjkxMjMxMDMwNzAxWjBWMQswCQYDVQQGEwJDTjEw MC4GA1UECgwnQ2hpbmEgRmluYW5jaWFsIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MRUwEwYDVQQD DAxDRkNBIEVWIFJPT1QwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDXXWvNED8fBVnV BU03sQ7smCuOFR36k0sXgiFxEFLXUWRwFsJVaU2OFW2fvwwbwuCjZ9YMrM8irq93VCpLTIpTUnrD 7i7es3ElweldPe6hL6P3KjzJIx1qqx2hp/Hz7KDVRM8Vz3IvHWOX6Jn5/ZOkVIBMUtRSqy5J35DN uF++P96hyk0g1CXohClTt7GIH//62pCfCqktQT+x8Rgp7hZZLDRJGqgG16iI0gNyejLi6mhNbiyW ZXvKWfry4t3uMCz7zEasxGPrb382KzRzEpR/38wmnvFyXVBlWY9ps4deMm/DGIq1lY+wejfeWkU7 xzbh72fROdOXW3NiGUgthxwG+3SYIElz8AXSG7Ggo7cbcNOIabla1jj0Ytwli3i/+Oh+uFzJlU9f py25IGvPa931DfSCt/SyZi4QKPaXWnuWFo8BGS1sbn85WAZkgwGDg8NNkt0yxoekN+kWzqotaK8K gWU6cMGbrU1tVMoqLUuFG7OA5nBFDWteNfB/O7ic5ARwiRIlk9oKmSJgamNgTnYGmE69g60dWIol hdLHZR4tjsbftsbhf4oEIRUpdPA+nJCdDC7xij5aqgwJHsfVPKPtl8MeNPo4+QgO48BdK4PRVmrJ tqhUUy54Mmc9gn900PvhtgVguXDbjgv5E1hvcWAQUhC5wUEJ73IfZzF4/5YFjQIDAQABo2MwYTAf BgNVHSMEGDAWgBTj/i39KNALtbq2osS/BqoFjJP7LzAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB /wQEAwIBBjAdBgNVHQ4EFgQU4/4t/SjQC7W6tqLEvwaqBYyT+y8wDQYJKoZIhvcNAQELBQADggIB ACXGumvrh8vegjmWPfBEp2uEcwPenStPuiB/vHiyz5ewG5zz13ku9Ui20vsXiObTej/tUxPQ4i9q ecsAIyjmHjdXNYmEwnZPNDatZ8POQQaIxffu2Bq41gt/UP+TqhdLjOztUmCypAbqTuv0axn96/Ua 4CUqmtzHQTb3yHQFhDmVOdYLO6Qn+gjYXB74BGBSESgoA//vU2YApUo0FmZ8/Qmkrp5nGm9BC2sG E5uPhnEFtC+NiWYzKXZUmhH4J/qyP5Hgzg0b8zAarb8iXRvTvyUFTeGSGn+ZnzxEk8rUQElsgIfX BDrDMlI1Dlb4pd19xIsNER9Tyx6yF7Zod1rg1MvIB671Oi6ON7fQAUtDKXeMOZePglr4UeWJoBjn aH9dCi77o0cOPaYjesYBx4/IXr9tgFa+iiS6M+qf4TIRnvHST4D2G0CvOJ4RUHlzEhLN5mydLIhy PDCBBpEi6lmt2hkuIsKNuYyH4Ga8cyNfIWRjgEj1oDwYPZTISEEdQLpe/v5WOaHIz16eGWRGENoX kbcFgKyLmZJ956LYBws2J+dIeWCKw9cTXPhyQN9Ky8+ZAAoACxGV2lZFA4gKn2fQ1XmxqI1AbQ3C ekD6819kR5LLU7m7Wc5P/dAVUwHY3+vZ5nbv0CO7O6l5s9UCKc2Jo5YPSjXnTkLAdc0Hz+Ys63su -----END CERTIFICATE----- TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H5 ==================================================== -----BEGIN CERTIFICATE----- MIIEJzCCAw+gAwIBAgIHAI4X/iQggTANBgkqhkiG9w0BAQsFADCBsTELMAkGA1UEBhMCVFIxDzAN BgNVBAcMBkFua2FyYTFNMEsGA1UECgxEVMOcUktUUlVTVCBCaWxnaSDEsGxldGnFn2ltIHZlIEJp bGnFn2ltIEfDvHZlbmxpxJ9pIEhpem1ldGxlcmkgQS7Fni4xQjBABgNVBAMMOVTDnFJLVFJVU1Qg RWxla3Ryb25payBTZXJ0aWZpa2EgSGl6bWV0IFNhxJ9sYXnEsWPEsXPEsSBINTAeFw0xMzA0MzAw ODA3MDFaFw0yMzA0MjgwODA3MDFaMIGxMQswCQYDVQQGEwJUUjEPMA0GA1UEBwwGQW5rYXJhMU0w SwYDVQQKDERUw5xSS1RSVVNUIEJpbGdpIMSwbGV0acWfaW0gdmUgQmlsacWfaW0gR8O8dmVubGnE n2kgSGl6bWV0bGVyaSBBLsWeLjFCMEAGA1UEAww5VMOcUktUUlVTVCBFbGVrdHJvbmlrIFNlcnRp ZmlrYSBIaXptZXQgU2HEn2xhecSxY8Sxc8SxIEg1MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB CgKCAQEApCUZ4WWe60ghUEoI5RHwWrom/4NZzkQqL/7hzmAD/I0Dpe3/a6i6zDQGn1k19uwsu537 jVJp45wnEFPzpALFp/kRGml1bsMdi9GYjZOHp3GXDSHHmflS0yxjXVW86B8BSLlg/kJK9siArs1m ep5Fimh34khon6La8eHBEJ/rPCmBp+EyCNSgBbGM+42WAA4+Jd9ThiI7/PS98wl+d+yG6w8z5UNP 9FR1bSmZLmZaQ9/LXMrI5Tjxfjs1nQ/0xVqhzPMggCTTV+wVunUlm+hkS7M0hO8EuPbJbKoCPrZV 4jI3X/xml1/N1p7HIL9Nxqw/dV8c7TKcfGkAaZHjIxhT6QIDAQABo0IwQDAdBgNVHQ4EFgQUVpkH HtOsDGlktAxQR95DLL4gwPswDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZI hvcNAQELBQADggEBAJ5FdnsXSDLyOIspve6WSk6BGLFRRyDN0GSxDsnZAdkJzsiZ3GglE9Rc8qPo BP5yCccLqh0lVX6Wmle3usURehnmp349hQ71+S4pL+f5bFgWV1Al9j4uPqrtd3GqqpmWRgqujuwq URawXs3qZwQcWDD1YIq9pr1N5Za0/EKJAWv2cMhQOQwt1WbZyNKzMrcbGW3LM/nfpeYVhDfwwvJl lpKQd/Ct9JDpEXjXk4nAPQu6KfTomZ1yju2dL+6SfaHx/126M2CFYv4HAqGEVka+lgqaE9chTLd8 B59OTj+RdPsnnRHM3eaxynFNExc5JsUpISuTKWqW+qtB4Uu2NQvAmxU= -----END CERTIFICATE----- Certinomis - Root CA ==================== -----BEGIN CERTIFICATE----- MIIFkjCCA3qgAwIBAgIBATANBgkqhkiG9w0BAQsFADBaMQswCQYDVQQGEwJGUjETMBEGA1UEChMK Q2VydGlub21pczEXMBUGA1UECxMOMDAwMiA0MzM5OTg5MDMxHTAbBgNVBAMTFENlcnRpbm9taXMg LSBSb290IENBMB4XDTEzMTAyMTA5MTcxOFoXDTMzMTAyMTA5MTcxOFowWjELMAkGA1UEBhMCRlIx EzARBgNVBAoTCkNlcnRpbm9taXMxFzAVBgNVBAsTDjAwMDIgNDMzOTk4OTAzMR0wGwYDVQQDExRD ZXJ0aW5vbWlzIC0gUm9vdCBDQTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANTMCQos P5L2fxSeC5yaah1AMGT9qt8OHgZbn1CF6s2Nq0Nn3rD6foCWnoR4kkjW4znuzuRZWJflLieY6pOo d5tK8O90gC3rMB+12ceAnGInkYjwSond3IjmFPnVAy//ldu9n+ws+hQVWZUKxkd8aRi5pwP5ynap z8dvtF4F/u7BUrJ1Mofs7SlmO/NKFoL21prbcpjp3vDFTKWrteoB4owuZH9kb/2jJZOLyKIOSY00 8B/sWEUuNKqEUL3nskoTuLAPrjhdsKkb5nPJWqHZZkCqqU2mNAKthH6yI8H7KsZn9DS2sJVqM09x RLWtwHkziOC/7aOgFLScCbAK42C++PhmiM1b8XcF4LVzbsF9Ri6OSyemzTUK/eVNfaoqoynHWmgE 6OXWk6RiwsXm9E/G+Z8ajYJJGYrKWUM66A0ywfRMEwNvbqY/kXPLynNvEiCL7sCCeN5LLsJJwx3t FvYk9CcbXFcx3FXuqB5vbKziRcxXV4p1VxngtViZSTYxPDMBbRZKzbgqg4SGm/lg0h9tkQPTYKbV PZrdd5A9NaSfD171UkRpucC63M9933zZxKyGIjK8e2uR73r4F2iw4lNVYC2vPsKD2NkJK/DAZNuH i5HMkesE/Xa0lZrmFAYb1TQdvtj/dBxThZngWVJKYe2InmtJiUZ+IFrZ50rlau7SZRFDAgMBAAGj YzBhMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTvkUz1pcMw6C8I 6tNxIqSSaHh02TAfBgNVHSMEGDAWgBTvkUz1pcMw6C8I6tNxIqSSaHh02TANBgkqhkiG9w0BAQsF AAOCAgEAfj1U2iJdGlg+O1QnurrMyOMaauo++RLrVl89UM7g6kgmJs95Vn6RHJk/0KGRHCwPT5iV WVO90CLYiF2cN/z7ZMF4jIuaYAnq1fohX9B0ZedQxb8uuQsLrbWwF6YSjNRieOpWauwK0kDDPAUw Pk2Ut59KA9N9J0u2/kTO+hkzGm2kQtHdzMjI1xZSg081lLMSVX3l4kLr5JyTCcBMWwerx20RoFAX lCOotQqSD7J6wWAsOMwaplv/8gzjqh8c3LigkyfeY+N/IZ865Z764BNqdeuWXGKRlI5nU7aJ+BIJ y29SWwNyhlCVCNSNh4YVH5Uk2KRvms6knZtt0rJ2BobGVgjF6wnaNsIbW0G+YSrjcOa4pvi2WsS9 Iff/ql+hbHY5ZtbqTFXhADObE5hjyW/QASAJN1LnDE8+zbz1X5YnpyACleAu6AdBBR8Vbtaw5Bng DwKTACdyxYvRVB9dSsNAl35VpnzBMwQUAR1JIGkLGZOdblgi90AMRgwjY/M50n92Uaf0yKHxDHYi I0ZSKS3io0EHVmmY0gUJvGnHWmHNj4FgFU2A3ZDifcRQ8ow7bkrHxuaAKzyBvBGAFhAn1/DNP3nM cyrDflOR1m749fPH0FFNjkulW+YZFzvWgQncItzujrnEj1PhZ7szuIgVRs/taTX/dQ1G885x4cVr hkIGuUE= -----END CERTIFICATE----- OISTE WISeKey Global Root GB CA =============================== -----BEGIN CERTIFICATE----- MIIDtTCCAp2gAwIBAgIQdrEgUnTwhYdGs/gjGvbCwDANBgkqhkiG9w0BAQsFADBtMQswCQYDVQQG EwJDSDEQMA4GA1UEChMHV0lTZUtleTEiMCAGA1UECxMZT0lTVEUgRm91bmRhdGlvbiBFbmRvcnNl ZDEoMCYGA1UEAxMfT0lTVEUgV0lTZUtleSBHbG9iYWwgUm9vdCBHQiBDQTAeFw0xNDEyMDExNTAw MzJaFw0zOTEyMDExNTEwMzFaMG0xCzAJBgNVBAYTAkNIMRAwDgYDVQQKEwdXSVNlS2V5MSIwIAYD VQQLExlPSVNURSBGb3VuZGF0aW9uIEVuZG9yc2VkMSgwJgYDVQQDEx9PSVNURSBXSVNlS2V5IEds b2JhbCBSb290IEdCIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA2Be3HEokKtaX scriHvt9OO+Y9bI5mE4nuBFde9IllIiCFSZqGzG7qFshISvYD06fWvGxWuR51jIjK+FTzJlFXHtP rby/h0oLS5daqPZI7H17Dc0hBt+eFf1Biki3IPShehtX1F1Q/7pn2COZH8g/497/b1t3sWtuuMlk 9+HKQUYOKXHQuSP8yYFfTvdv37+ErXNku7dCjmn21HYdfp2nuFeKUWdy19SouJVUQHMD9ur06/4o Qnc/nSMbsrY9gBQHTC5P99UKFg29ZkM3fiNDecNAhvVMKdqOmq0NpQSHiB6F4+lT1ZvIiwNjeOvg GUpuuy9rM2RYk61pv48b74JIxwIDAQABo1EwTzALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB /zAdBgNVHQ4EFgQUNQ/INmNe4qPs+TtmFc5RUuORmj0wEAYJKwYBBAGCNxUBBAMCAQAwDQYJKoZI hvcNAQELBQADggEBAEBM+4eymYGQfp3FsLAmzYh7KzKNbrghcViXfa43FK8+5/ea4n32cZiZBKpD dHij40lhPnOMTZTg+XHEthYOU3gf1qKHLwI5gSk8rxWYITD+KJAAjNHhy/peyP34EEY7onhCkRd0 VQreUGdNZtGn//3ZwLWoo4rOZvUPQ82nK1d7Y0Zqqi5S2PTt4W2tKZB4SLrhI6qjiey1q5bAtEui HZeeevJuQHHfaPFlTc58Bd9TZaml8LGXBHAVRgOY1NK/VLSgWH1Sb9pWJmLU2NuJMW8c8CLC02Ic Nc1MaRVUGpCY3useX8p3x8uOPUNpnJpY0CQ73xtAln41rYHHTnG6iBM= -----END CERTIFICATE----- Certification Authority of WoSign G2 ==================================== -----BEGIN CERTIFICATE----- MIIDfDCCAmSgAwIBAgIQayXaioidfLwPBbOxemFFRDANBgkqhkiG9w0BAQsFADBYMQswCQYDVQQG EwJDTjEaMBgGA1UEChMRV29TaWduIENBIExpbWl0ZWQxLTArBgNVBAMTJENlcnRpZmljYXRpb24g QXV0aG9yaXR5IG9mIFdvU2lnbiBHMjAeFw0xNDExMDgwMDU4NThaFw00NDExMDgwMDU4NThaMFgx CzAJBgNVBAYTAkNOMRowGAYDVQQKExFXb1NpZ24gQ0EgTGltaXRlZDEtMCsGA1UEAxMkQ2VydGlm aWNhdGlvbiBBdXRob3JpdHkgb2YgV29TaWduIEcyMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB CgKCAQEAvsXEoCKASU+/2YcRxlPhuw+9YH+v9oIOH9ywjj2X4FA8jzrvZjtFB5sg+OPXJYY1kBai XW8wGQiHC38Gsp1ij96vkqVg1CuAmlI/9ZqD6TRay9nVYlzmDuDfBpgOgHzKtB0TiGsOqCR3A9Du W/PKaZE1OVbFbeP3PU9ekzgkyhjpJMuSA93MHD0JcOQg5PGurLtzaaNjOg9FD6FKmsLRY6zLEPg9 5k4ot+vElbGs/V6r+kHLXZ1L3PR8du9nfwB6jdKgGlxNIuG12t12s9R23164i5jIFFTMaxeSt+BK v0mUYQs4kI9dJGwlezt52eJ+na2fmKEG/HgUYFf47oB3sQIDAQABo0IwQDAOBgNVHQ8BAf8EBAMC AQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU+mCp62XF3RYUCE4MD42b4Pdkr2cwDQYJKoZI hvcNAQELBQADggEBAFfDejaCnI2Y4qtAqkePx6db7XznPWZaOzG73/MWM5H8fHulwqZm46qwtyeY P0nXYGdnPzZPSsvxFPpahygc7Y9BMsaV+X3avXtbwrAh449G3CE4Q3RM+zD4F3LBMvzIkRfEzFg3 TgvMWvchNSiDbGAtROtSjFA9tWwS1/oJu2yySrHFieT801LYYRf+epSEj3m2M1m6D8QL4nCgS3gu +sif/a+RZQp4OBXllxcU3fngLDT4ONCEIgDAFFEYKwLcMFrw6AF8NTojrwjkr6qOKEJJLvD1mTS+ 7Q9LGOHSJDy7XUe3IfKN0QqZjuNuPq1w4I+5ysxugTH2e5x6eeRncRg= -----END CERTIFICATE----- CA WoSign ECC Root ================== -----BEGIN CERTIFICATE----- MIICCTCCAY+gAwIBAgIQaEpYcIBr8I8C+vbe6LCQkDAKBggqhkjOPQQDAzBGMQswCQYDVQQGEwJD TjEaMBgGA1UEChMRV29TaWduIENBIExpbWl0ZWQxGzAZBgNVBAMTEkNBIFdvU2lnbiBFQ0MgUm9v dDAeFw0xNDExMDgwMDU4NThaFw00NDExMDgwMDU4NThaMEYxCzAJBgNVBAYTAkNOMRowGAYDVQQK ExFXb1NpZ24gQ0EgTGltaXRlZDEbMBkGA1UEAxMSQ0EgV29TaWduIEVDQyBSb290MHYwEAYHKoZI zj0CAQYFK4EEACIDYgAE4f2OuEMkq5Z7hcK6C62N4DrjJLnSsb6IOsq/Srj57ywvr1FQPEd1bPiU t5v8KB7FVMxjnRZLU8HnIKvNrCXSf4/CwVqCXjCLelTOA7WRf6qU0NGKSMyCBSah1VES1ns2o0Iw QDAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUqv3VWqP2h4syhf3R MluARZPzA7gwCgYIKoZIzj0EAwMDaAAwZQIxAOSkhLCB1T2wdKyUpOgOPQB0TKGXa/kNUTyh2Tv0 Daupn75OcsqF1NnstTJFGG+rrQIwfcf3aWMvoeGY7xMQ0Xk/0f7qO3/eVvSQsRUR2LIiFdAvwyYu a/GRspBl9JrmkO5K -----END CERTIFICATE----- SZAFIR ROOT CA2 =============== -----BEGIN CERTIFICATE----- MIIDcjCCAlqgAwIBAgIUPopdB+xV0jLVt+O2XwHrLdzk1uQwDQYJKoZIhvcNAQELBQAwUTELMAkG A1UEBhMCUEwxKDAmBgNVBAoMH0tyYWpvd2EgSXpiYSBSb3psaWN6ZW5pb3dhIFMuQS4xGDAWBgNV BAMMD1NaQUZJUiBST09UIENBMjAeFw0xNTEwMTkwNzQzMzBaFw0zNTEwMTkwNzQzMzBaMFExCzAJ BgNVBAYTAlBMMSgwJgYDVQQKDB9LcmFqb3dhIEl6YmEgUm96bGljemVuaW93YSBTLkEuMRgwFgYD VQQDDA9TWkFGSVIgUk9PVCBDQTIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC3vD5Q qEvNQLXOYeeWyrSh2gwisPq1e3YAd4wLz32ohswmUeQgPYUM1ljj5/QqGJ3a0a4m7utT3PSQ1hNK DJA8w/Ta0o4NkjrcsbH/ON7Dui1fgLkCvUqdGw+0w8LBZwPd3BucPbOw3gAeqDRHu5rr/gsUvTaE 2g0gv/pby6kWIK05YO4vdbbnl5z5Pv1+TW9NL++IDWr63fE9biCloBK0TXC5ztdyO4mTp4CEHCdJ ckm1/zuVnsHMyAHs6A6KCpbns6aH5db5BSsNl0BwPLqsdVqc1U2dAgrSS5tmS0YHF2Wtn2yIANwi ieDhZNRnvDF5YTy7ykHNXGoAyDw4jlivAgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0P AQH/BAQDAgEGMB0GA1UdDgQWBBQuFqlKGLXLzPVvUPMjX/hd56zwyDANBgkqhkiG9w0BAQsFAAOC AQEAtXP4A9xZWx126aMqe5Aosk3AM0+qmrHUuOQn/6mWmc5G4G18TKI4pAZw8PRBEew/R40/cof5 O/2kbytTAOD/OblqBw7rHRz2onKQy4I9EYKL0rufKq8h5mOGnXkZ7/e7DDWQw4rtTw/1zBLZpD67 oPwglV9PJi8RI4NOdQcPv5vRtB3pEAT+ymCPoky4rc/hkA/NrgrHXXu3UNLUYfrVFdvXn4dRVOul 4+vJhaAlIDf7js4MNIThPIGyd05DpYhfhmehPea0XGG2Ptv+tyjFogeutcrKjSoS75ftwjCkySp6 +/NNIxuZMzSgLvWpCz/UXeHPhJ/iGcJfitYgHuNztw== -----END CERTIFICATE----- Certum Trusted Network CA 2 =========================== -----BEGIN CERTIFICATE----- MIIF0jCCA7qgAwIBAgIQIdbQSk8lD8kyN/yqXhKN6TANBgkqhkiG9w0BAQ0FADCBgDELMAkGA1UE BhMCUEwxIjAgBgNVBAoTGVVuaXpldG8gVGVjaG5vbG9naWVzIFMuQS4xJzAlBgNVBAsTHkNlcnR1 bSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTEkMCIGA1UEAxMbQ2VydHVtIFRydXN0ZWQgTmV0d29y ayBDQSAyMCIYDzIwMTExMDA2MDgzOTU2WhgPMjA0NjEwMDYwODM5NTZaMIGAMQswCQYDVQQGEwJQ TDEiMCAGA1UEChMZVW5pemV0byBUZWNobm9sb2dpZXMgUy5BLjEnMCUGA1UECxMeQ2VydHVtIENl cnRpZmljYXRpb24gQXV0aG9yaXR5MSQwIgYDVQQDExtDZXJ0dW0gVHJ1c3RlZCBOZXR3b3JrIENB IDIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC9+Xj45tWADGSdhhuWZGc/IjoedQF9 7/tcZ4zJzFxrqZHmuULlIEub2pt7uZld2ZuAS9eEQCsn0+i6MLs+CRqnSZXvK0AkwpfHp+6bJe+o CgCXhVqqndwpyeI1B+twTUrWwbNWuKFBOJvR+zF/j+Bf4bE/D44WSWDXBo0Y+aomEKsq09DRZ40b Rr5HMNUuctHFY9rnY3lEfktjJImGLjQ/KUxSiyqnwOKRKIm5wFv5HdnnJ63/mgKXwcZQkpsCLL2p uTRZCr+ESv/f/rOf69me4Jgj7KZrdxYq28ytOxykh9xGc14ZYmhFV+SQgkK7QtbwYeDBoz1mo130 GO6IyY0XRSmZMnUCMe4pJshrAua1YkV/NxVaI2iJ1D7eTiew8EAMvE0Xy02isx7QBlrd9pPPV3WZ 9fqGGmd4s7+W/jTcvedSVuWz5XV710GRBdxdaeOVDUO5/IOWOZV7bIBaTxNyxtd9KXpEulKkKtVB Rgkg/iKgtlswjbyJDNXXcPiHUv3a76xRLgezTv7QCdpw75j6VuZt27VXS9zlLCUVyJ4ueE742pye hizKV/Ma5ciSixqClnrDvFASadgOWkaLOusm+iPJtrCBvkIApPjW/jAux9JG9uWOdf3yzLnQh1vM BhBgu4M1t15n3kfsmUjxpKEV/q2MYo45VU85FrmxY53/twIDAQABo0IwQDAPBgNVHRMBAf8EBTAD AQH/MB0GA1UdDgQWBBS2oVQ5AsOgP46KvPrU+Bym0ToO/TAOBgNVHQ8BAf8EBAMCAQYwDQYJKoZI hvcNAQENBQADggIBAHGlDs7k6b8/ONWJWsQCYftMxRQXLYtPU2sQF/xlhMcQSZDe28cmk4gmb3DW Al45oPePq5a1pRNcgRRtDoGCERuKTsZPpd1iHkTfCVn0W3cLN+mLIMb4Ck4uWBzrM9DPhmDJ2vuA L55MYIR4PSFk1vtBHxgP58l1cb29XN40hz5BsA72udY/CROWFC/emh1auVbONTqwX3BNXuMp8SMo clm2q8KMZiYcdywmdjWLKKdpoPk79SPdhRB0yZADVpHnr7pH1BKXESLjokmUbOe3lEu6LaTaM4tM pkT/WjzGHWTYtTHkpjx6qFcL2+1hGsvxznN3Y6SHb0xRONbkX8eftoEq5IVIeVheO/jbAoJnwTnb w3RLPTYe+SmTiGhbqEQZIfCn6IENLOiTNrQ3ssqwGyZ6miUfmpqAnksqP/ujmv5zMnHCnsZy4Ypo J/HkD7TETKVhk/iXEAcqMCWpuchxuO9ozC1+9eB+D4Kob7a6bINDd82Kkhehnlt4Fj1F4jNy3eFm ypnTycUm/Q1oBEauttmbjL4ZvrHG8hnjXALKLNhvSgfZyTXaQHXyxKcZb55CEJh15pWLYLztxRLX is7VmFxWlgPF7ncGNf/P5O4/E2Hu29othfDNrp2yGAlFw5Khchf8R7agCyzxxN5DaAhqXzvwdmP7 zAYspsbiDrW5viSP -----END CERTIFICATE----- Hellenic Academic and Research Institutions RootCA 2015 ======================================================= -----BEGIN CERTIFICATE----- MIIGCzCCA/OgAwIBAgIBADANBgkqhkiG9w0BAQsFADCBpjELMAkGA1UEBhMCR1IxDzANBgNVBAcT BkF0aGVuczFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0 aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNl YXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTUwHhcNMTUwNzA3MTAxMTIxWhcNNDAwNjMwMTAx MTIxWjCBpjELMAkGA1UEBhMCR1IxDzANBgNVBAcTBkF0aGVuczFEMEIGA1UEChM7SGVsbGVuaWMg QWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNV BAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIw MTUwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDC+Kk/G4n8PDwEXT2QNrCROnk8Zlrv bTkBSRq0t89/TSNTt5AA4xMqKKYx8ZEA4yjsriFBzh/a/X0SWwGDD7mwX5nh8hKDgE0GPt+sr+eh iGsxr/CL0BgzuNtFajT0AoAkKAoCFZVedioNmToUW/bLy1O8E00BiDeUJRtCvCLYjqOWXjrZMts+ 6PAQZe104S+nfK8nNLspfZu2zwnI5dMK/IhlZXQK3HMcXM1AsRzUtoSMTFDPaI6oWa7CJ06CojXd FPQf/7J31Ycvqm59JCfnxssm5uX+Zwdj2EUN3TpZZTlYepKZcj2chF6IIbjV9Cz82XBST3i4vTwr i5WY9bPRaM8gFH5MXF/ni+X1NYEZN9cRCLdmvtNKzoNXADrDgfgXy5I2XdGj2HUb4Ysn6npIQf1F GQatJ5lOwXBH3bWfgVMS5bGMSF0xQxfjjMZ6Y5ZLKTBOhE5iGV48zpeQpX8B653g+IuJ3SWYPZK2 fu/Z8VFRfS0myGlZYeCsargqNhEEelC9MoS+L9xy1dcdFkfkR2YgP/SWxa+OAXqlD3pk9Q0Yh9mu iNX6hME6wGkoLfINaFGq46V3xqSQDqE3izEjR8EJCOtu93ib14L8hCCZSRm2Ekax+0VVFqmjZayc Bw/qa9wfLgZy7IaIEuQt218FL+TwA9MmM+eAws1CoRc0CwIDAQABo0IwQDAPBgNVHRMBAf8EBTAD AQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUcRVnyMjJvXVdctA4GGqd83EkVAswDQYJKoZI hvcNAQELBQADggIBAHW7bVRLqhBYRjTyYtcWNl0IXtVsyIe9tC5G8jH4fOpCtZMWVdyhDBKg2mF+ D1hYc2Ryx+hFjtyp8iY/xnmMsVMIM4GwVhO+5lFc2JsKT0ucVlMC6U/2DWDqTUJV6HwbISHTGzrM d/K4kPFox/la/vot9L/J9UUbzjgQKjeKeaO04wlshYaT/4mWJ3iBj2fjRnRUjtkNaeJK9E10A/+y d+2VZ5fkscWrv2oj6NSU4kQoYsRL4vDY4ilrGnB+JGGTe08DMiUNRSQrlrRGar9KC/eaj8GsGsVn 82800vpzY4zvFrCopEYq+OsS7HK07/grfoxSwIuEVPkvPuNVqNxmsdnhX9izjFk0WaSrT2y7Hxjb davYy5LNlDhhDgcGH0tGEPEVvo2FXDtKK4F5D7Rpn0lQl033DlZdwJVqwjbDG2jJ9SrcR5q+ss7F Jej6A7na+RZukYT1HCjI/CbM1xyQVqdfbzoEvM14iQuODy+jqk+iGxI9FghAD/FGTNeqewjBCvVt J94Cj8rDtSvK6evIIVM4pcw72Hc3MKJP2W/R8kCtQXoXxdZKNYm3QdV8hn9VTYNKpXMgwDqvkPGa JI7ZjnHKe7iG2rKPmT4dEw0SEe7Uq/DpFXYC5ODfqiAeW2GFZECpkJcNrVPSWh2HagCXZWK0vm9q p/UsQu0yrbYhnr68 -----END CERTIFICATE----- Hellenic Academic and Research Institutions ECC RootCA 2015 =========================================================== -----BEGIN CERTIFICATE----- MIICwzCCAkqgAwIBAgIBADAKBggqhkjOPQQDAjCBqjELMAkGA1UEBhMCR1IxDzANBgNVBAcTBkF0 aGVuczFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9u cyBDZXJ0LiBBdXRob3JpdHkxRDBCBgNVBAMTO0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJj aCBJbnN0aXR1dGlvbnMgRUNDIFJvb3RDQSAyMDE1MB4XDTE1MDcwNzEwMzcxMloXDTQwMDYzMDEw MzcxMlowgaoxCzAJBgNVBAYTAkdSMQ8wDQYDVQQHEwZBdGhlbnMxRDBCBgNVBAoTO0hlbGxlbmlj IEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgQ2VydC4gQXV0aG9yaXR5MUQwQgYD VQQDEztIZWxsZW5pYyBBY2FkZW1pYyBhbmQgUmVzZWFyY2ggSW5zdGl0dXRpb25zIEVDQyBSb290 Q0EgMjAxNTB2MBAGByqGSM49AgEGBSuBBAAiA2IABJKgQehLgoRc4vgxEZmGZE4JJS+dQS8KrjVP dJWyUWRrjWvmP3CV8AVER6ZyOFB2lQJajq4onvktTpnvLEhvTCUp6NFxW98dwXU3tNf6e3pCnGoK Vlp8aQuqgAkkbH7BRqNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0O BBYEFLQiC4KZJAEOnLvkDv2/+5cgk5kqMAoGCCqGSM49BAMCA2cAMGQCMGfOFmI4oqxiRaeplSTA GiecMjvAwNW6qef4BENThe5SId6d9SWDPp5YSy/XZxMOIQIwBeF1Ad5o7SofTUwJCA3sS61kFyjn dc5FZXIhF8siQQ6ME5g4mlRtm8rifOoCWCKR -----END CERTIFICATE----- Certplus Root CA G1 =================== -----BEGIN CERTIFICATE----- MIIFazCCA1OgAwIBAgISESBVg+QtPlRWhS2DN7cs3EYRMA0GCSqGSIb3DQEBDQUAMD4xCzAJBgNV BAYTAkZSMREwDwYDVQQKDAhDZXJ0cGx1czEcMBoGA1UEAwwTQ2VydHBsdXMgUm9vdCBDQSBHMTAe Fw0xNDA1MjYwMDAwMDBaFw0zODAxMTUwMDAwMDBaMD4xCzAJBgNVBAYTAkZSMREwDwYDVQQKDAhD ZXJ0cGx1czEcMBoGA1UEAwwTQ2VydHBsdXMgUm9vdCBDQSBHMTCCAiIwDQYJKoZIhvcNAQEBBQAD ggIPADCCAgoCggIBANpQh7bauKk+nWT6VjOaVj0W5QOVsjQcmm1iBdTYj+eJZJ+622SLZOZ5KmHN r49aiZFluVj8tANfkT8tEBXgfs+8/H9DZ6itXjYj2JizTfNDnjl8KvzsiNWI7nC9hRYt6kuJPKNx Qv4c/dMcLRC4hlTqQ7jbxofaqK6AJc96Jh2qkbBIb6613p7Y1/oA/caP0FG7Yn2ksYyy/yARujVj BYZHYEMzkPZHogNPlk2dT8Hq6pyi/jQu3rfKG3akt62f6ajUeD94/vI4CTYd0hYCyOwqaK/1jpTv LRN6HkJKHRUxrgwEV/xhc/MxVoYxgKDEEW4wduOU8F8ExKyHcomYxZ3MVwia9Az8fXoFOvpHgDm2 z4QTd28n6v+WZxcIbekN1iNQMLAVdBM+5S//Ds3EC0pd8NgAM0lm66EYfFkuPSi5YXHLtaW6uOrc 4nBvCGrch2c0798wct3zyT8j/zXhviEpIDCB5BmlIOklynMxdCm+4kLV87ImZsdo/Rmz5yCTmehd 4F6H50boJZwKKSTUzViGUkAksnsPmBIgJPaQbEfIDbsYIC7Z/fyL8inqh3SV4EJQeIQEQWGw9CEj jy3LKCHyamz0GqbFFLQ3ZU+V/YDI+HLlJWvEYLF7bY5KinPOWftwenMGE9nTdDckQQoRb5fc5+R+ ob0V8rqHDz1oihYHAgMBAAGjYzBhMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MB0G A1UdDgQWBBSowcCbkahDFXxdBie0KlHYlwuBsTAfBgNVHSMEGDAWgBSowcCbkahDFXxdBie0KlHY lwuBsTANBgkqhkiG9w0BAQ0FAAOCAgEAnFZvAX7RvUz1isbwJh/k4DgYzDLDKTudQSk0YcbX8ACh 66Ryj5QXvBMsdbRX7gp8CXrc1cqh0DQT+Hern+X+2B50ioUHj3/MeXrKls3N/U/7/SMNkPX0XtPG YX2eEeAC7gkE2Qfdpoq3DIMku4NQkv5gdRE+2J2winq14J2by5BSS7CTKtQ+FjPlnsZlFT5kOwQ/ 2wyPX1wdaR+v8+khjPPvl/aatxm2hHSco1S1cE5j2FddUyGbQJJD+tZ3VTNPZNX70Cxqjm0lpu+F 6ALEUz65noe8zDUa3qHpimOHZR4RKttjd5cUvpoUmRGywO6wT/gUITJDT5+rosuoD6o7BlXGEilX CNQ314cnrUlZp5GrRHpejXDbl85IULFzk/bwg2D5zfHhMf1bfHEhYxQUqq/F3pN+aLHsIqKqkHWe tUNy6mSjhEv9DKgma3GX7lZjZuhCVPnHHd/Qj1vfyDBviP4NxDMcU6ij/UgQ8uQKTuEVV/xuZDDC VRHc6qnNSlSsKWNEz0pAoNZoWRsz+e86i9sgktxChL8Bq4fA1SCC28a5g4VCXA9DO2pJNdWY9BW/ +mGBDAkgGNLQFwzLSABQ6XaCjGTXOqAHVcweMcDvOrRl++O/QmueD6i9a5jc2NvLi6Td11n0bt3+ qsOR0C5CB8AMTVPNJLFMWx5R9N/pkvo= -----END CERTIFICATE----- Certplus Root CA G2 =================== -----BEGIN CERTIFICATE----- MIICHDCCAaKgAwIBAgISESDZkc6uo+jF5//pAq/Pc7xVMAoGCCqGSM49BAMDMD4xCzAJBgNVBAYT AkZSMREwDwYDVQQKDAhDZXJ0cGx1czEcMBoGA1UEAwwTQ2VydHBsdXMgUm9vdCBDQSBHMjAeFw0x NDA1MjYwMDAwMDBaFw0zODAxMTUwMDAwMDBaMD4xCzAJBgNVBAYTAkZSMREwDwYDVQQKDAhDZXJ0 cGx1czEcMBoGA1UEAwwTQ2VydHBsdXMgUm9vdCBDQSBHMjB2MBAGByqGSM49AgEGBSuBBAAiA2IA BM0PW1aC3/BFGtat93nwHcmsltaeTpwftEIRyoa/bfuFo8XlGVzX7qY/aWfYeOKmycTbLXku54uN Am8xIk0G42ByRZ0OQneezs/lf4WbGOT8zC5y0xaTTsqZY1yhBSpsBqNjMGEwDgYDVR0PAQH/BAQD AgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFNqDYwJ5jtpMxjwjFNiPwyCrKGBZMB8GA1Ud IwQYMBaAFNqDYwJ5jtpMxjwjFNiPwyCrKGBZMAoGCCqGSM49BAMDA2gAMGUCMHD+sAvZ94OX7PNV HdTcswYO/jOYnYs5kGuUIe22113WTNchp+e/IQ8rzfcq3IUHnQIxAIYUFuXcsGXCwI4Un78kFmjl vPl5adytRSv3tjFzzAalU5ORGpOucGpnutee5WEaXw== -----END CERTIFICATE----- OpenTrust Root CA G1 ==================== -----BEGIN CERTIFICATE----- MIIFbzCCA1egAwIBAgISESCzkFU5fX82bWTCp59rY45nMA0GCSqGSIb3DQEBCwUAMEAxCzAJBgNV BAYTAkZSMRIwEAYDVQQKDAlPcGVuVHJ1c3QxHTAbBgNVBAMMFE9wZW5UcnVzdCBSb290IENBIEcx MB4XDTE0MDUyNjA4NDU1MFoXDTM4MDExNTAwMDAwMFowQDELMAkGA1UEBhMCRlIxEjAQBgNVBAoM CU9wZW5UcnVzdDEdMBsGA1UEAwwUT3BlblRydXN0IFJvb3QgQ0EgRzEwggIiMA0GCSqGSIb3DQEB AQUAA4ICDwAwggIKAoICAQD4eUbalsUwXopxAy1wpLuwxQjczeY1wICkES3d5oeuXT2R0odsN7fa Yp6bwiTXj/HbpqbfRm9RpnHLPhsxZ2L3EVs0J9V5ToybWL0iEA1cJwzdMOWo010hOHQX/uMftk87 ay3bfWAfjH1MBcLrARYVmBSO0ZB3Ij/swjm4eTrwSSTilZHcYTSSjFR077F9jAHiOH3BX2pfJLKO YheteSCtqx234LSWSE9mQxAGFiQD4eCcjsZGT44ameGPuY4zbGneWK2gDqdkVBFpRGZPTBKnjix9 xNRbxQA0MMHZmf4yzgeEtE7NCv82TWLxp2NX5Ntqp66/K7nJ5rInieV+mhxNaMbBGN4zK1FGSxyO 9z0M+Yo0FMT7MzUj8czxKselu7Cizv5Ta01BG2Yospb6p64KTrk5M0ScdMGTHPjgniQlQ/GbI4Kq 3ywgsNw2TgOzfALU5nsaqocTvz6hdLubDuHAk5/XpGbKuxs74zD0M1mKB3IDVedzagMxbm+WG+Oi n6+Sx+31QrclTDsTBM8clq8cIqPQqwWyTBIjUtz9GVsnnB47ev1CI9sjgBPwvFEVVJSmdz7QdFG9 URQIOTfLHzSpMJ1ShC5VkLG631UAC9hWLbFJSXKAqWLXwPYYEQRVzXR7z2FwefR7LFxckvzluFqr TJOVoSfupb7PcSNCupt2LQIDAQABo2MwYTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB /zAdBgNVHQ4EFgQUl0YhVyE12jZVx/PxN3DlCPaTKbYwHwYDVR0jBBgwFoAUl0YhVyE12jZVx/Px N3DlCPaTKbYwDQYJKoZIhvcNAQELBQADggIBAB3dAmB84DWn5ph76kTOZ0BP8pNuZtQ5iSas000E PLuHIT839HEl2ku6q5aCgZG27dmxpGWX4m9kWaSW7mDKHyP7Rbr/jyTwyqkxf3kfgLMtMrpkZ2Cv uVnN35pJ06iCsfmYlIrM4LvgBBuZYLFGZdwIorJGnkSI6pN+VxbSFXJfLkur1J1juONI5f6ELlgK n0Md/rcYkoZDSw6cMoYsYPXpSOqV7XAp8dUv/TW0V8/bhUiZucJvbI/NeJWsZCj9VrDDb8O+WVLh X4SPgPL0DTatdrOjteFkdjpY3H1PXlZs5VVZV6Xf8YpmMIzUUmI4d7S+KNfKNsSbBfD4Fdvb8e80 nR14SohWZ25g/4/Ii+GOvUKpMwpZQhISKvqxnUOOBZuZ2mKtVzazHbYNeS2WuOvyDEsMpZTGMKcm GS3tTAZQMPH9WD25SxdfGbRqhFS0OE85og2WaMMolP3tLR9Ka0OWLpABEPs4poEL0L9109S5zvE/ bw4cHjdx5RiHdRk/ULlepEU0rbDK5uUTdg8xFKmOLZTW1YVNcxVPS/KyPu1svf0OnWZzsD2097+o 4BGkxK51CUpjAEggpsadCwmKtODmzj7HPiY46SvepghJAwSQiumPv+i2tCqjI40cHLI5kqiPAlxA OXXUc0ECd97N4EOH1uS6SsNsEn/+KuYj1oxx -----END CERTIFICATE----- OpenTrust Root CA G2 ==================== -----BEGIN CERTIFICATE----- MIIFbzCCA1egAwIBAgISESChaRu/vbm9UpaPI+hIvyYRMA0GCSqGSIb3DQEBDQUAMEAxCzAJBgNV BAYTAkZSMRIwEAYDVQQKDAlPcGVuVHJ1c3QxHTAbBgNVBAMMFE9wZW5UcnVzdCBSb290IENBIEcy MB4XDTE0MDUyNjAwMDAwMFoXDTM4MDExNTAwMDAwMFowQDELMAkGA1UEBhMCRlIxEjAQBgNVBAoM CU9wZW5UcnVzdDEdMBsGA1UEAwwUT3BlblRydXN0IFJvb3QgQ0EgRzIwggIiMA0GCSqGSIb3DQEB AQUAA4ICDwAwggIKAoICAQDMtlelM5QQgTJT32F+D3Y5z1zCU3UdSXqWON2ic2rxb95eolq5cSG+ Ntmh/LzubKh8NBpxGuga2F8ORAbtp+Dz0mEL4DKiltE48MLaARf85KxP6O6JHnSrT78eCbY2albz 4e6WiWYkBuTNQjpK3eCasMSCRbP+yatcfD7J6xcvDH1urqWPyKwlCm/61UWY0jUJ9gNDlP7ZvyCV eYCYitmJNbtRG6Q3ffyZO6v/v6wNj0OxmXsWEH4db0fEFY8ElggGQgT4hNYdvJGmQr5J1WqIP7wt UdGejeBSzFfdNTVY27SPJIjki9/ca1TSgSuyzpJLHB9G+h3Ykst2Z7UJmQnlrBcUVXDGPKBWCgOz 3GIZ38i1MH/1PCZ1Eb3XG7OHngevZXHloM8apwkQHZOJZlvoPGIytbU6bumFAYueQ4xncyhZW+vj 3CzMpSZyYhK05pyDRPZRpOLAeiRXyg6lPzq1O4vldu5w5pLeFlwoW5cZJ5L+epJUzpM5ChaHvGOz 9bGTXOBut9Dq+WIyiET7vycotjCVXRIouZW+j1MY5aIYFuJWpLIsEPUdN6b4t/bQWVyJ98LVtZR0 0dX+G7bw5tYee9I8y6jj9RjzIR9u701oBnstXW5DiabA+aC/gh7PU3+06yzbXfZqfUAkBXKJOAGT y3HCOV0GEfZvePg3DTmEJwIDAQABo2MwYTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB /zAdBgNVHQ4EFgQUajn6QiL35okATV59M4PLuG53hq8wHwYDVR0jBBgwFoAUajn6QiL35okATV59 M4PLuG53hq8wDQYJKoZIhvcNAQENBQADggIBAJjLq0A85TMCl38th6aP1F5Kr7ge57tx+4BkJamz Gj5oXScmp7oq4fBXgwpkTx4idBvpkF/wrM//T2h6OKQQbA2xx6R3gBi2oihEdqc0nXGEL8pZ0keI mUEiyTCYYW49qKgFbdEfwFFEVn8nNQLdXpgKQuswv42hm1GqO+qTRmTFAHneIWv2V6CG1wZy7HBG S4tz3aAhdT7cHcCP009zHIXZ/n9iyJVvttN7jLpTwm+bREx50B1ws9efAvSyB7DH5fitIw6mVskp EndI2S9G/Tvw/HRwkqWOOAgfZDC2t0v7NqwQjqBSM2OdAzVWxWm9xiNaJ5T2pBL4LTM8oValX9YZ 6e18CL13zSdkzJTaTkZQh+D5wVOAHrut+0dSixv9ovneDiK3PTNZbNTe9ZUGMg1RGUFcPk8G97kr gCf2o6p6fAbhQ8MTOWIaNr3gKC6UAuQpLmBVrkA9sHSSXvAgZJY/X0VdiLWK2gKgW0VU3jg9CcCo SmVGFvyqv1ROTVu+OEO3KMqLM6oaJbolXCkvW0pujOotnCr2BXbgd5eAiN1nE28daCSLT7d0geX0 YJ96Vdc+N9oWaz53rK4YcJUIeSkDiv7BO7M/Gg+kO14fWKGVyasvc0rQLW6aWQ9VGHgtPFGml4vm u7JwqkwR3v98KzfUetF3NI/n+UL3PIEMS1IK -----END CERTIFICATE----- OpenTrust Root CA G3 ==================== -----BEGIN CERTIFICATE----- MIICITCCAaagAwIBAgISESDm+Ez8JLC+BUCs2oMbNGA/MAoGCCqGSM49BAMDMEAxCzAJBgNVBAYT AkZSMRIwEAYDVQQKDAlPcGVuVHJ1c3QxHTAbBgNVBAMMFE9wZW5UcnVzdCBSb290IENBIEczMB4X DTE0MDUyNjAwMDAwMFoXDTM4MDExNTAwMDAwMFowQDELMAkGA1UEBhMCRlIxEjAQBgNVBAoMCU9w ZW5UcnVzdDEdMBsGA1UEAwwUT3BlblRydXN0IFJvb3QgQ0EgRzMwdjAQBgcqhkjOPQIBBgUrgQQA IgNiAARK7liuTcpm3gY6oxH84Bjwbhy6LTAMidnW7ptzg6kjFYwvWYpa3RTqnVkrQ7cG7DK2uu5B ta1doYXM6h0UZqNnfkbilPPntlahFVmhTzeXuSIevRHr9LIfXsMUmuXZl5mjYzBhMA4GA1UdDwEB /wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBRHd8MUi2I5DMlv4VBN0BBY3JWIbTAf BgNVHSMEGDAWgBRHd8MUi2I5DMlv4VBN0BBY3JWIbTAKBggqhkjOPQQDAwNpADBmAjEAj6jcnboM BBf6Fek9LykBl7+BFjNAk2z8+e2AcG+qj9uEwov1NcoG3GRvaBbhj5G5AjEA2Euly8LQCGzpGPta 3U1fJAuwACEl74+nBCZx4nxp5V2a+EEfOzmTk51V6s2N8fvB -----END CERTIFICATE----- ISRG Root X1 ============ -----BEGIN CERTIFICATE----- MIIFazCCA1OgAwIBAgIRAIIQz7DSQONZRGPgu2OCiwAwDQYJKoZIhvcNAQELBQAwTzELMAkGA1UE BhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2VhcmNoIEdyb3VwMRUwEwYDVQQD EwxJU1JHIFJvb3QgWDEwHhcNMTUwNjA0MTEwNDM4WhcNMzUwNjA0MTEwNDM4WjBPMQswCQYDVQQG EwJVUzEpMCcGA1UEChMgSW50ZXJuZXQgU2VjdXJpdHkgUmVzZWFyY2ggR3JvdXAxFTATBgNVBAMT DElTUkcgUm9vdCBYMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAK3oJHP0FDfzm54r Vygch77ct984kIxuPOZXoHj3dcKi/vVqbvYATyjb3miGbESTtrFj/RQSa78f0uoxmyF+0TM8ukj1 3Xnfs7j/EvEhmkvBioZxaUpmZmyPfjxwv60pIgbz5MDmgK7iS4+3mX6UA5/TR5d8mUgjU+g4rk8K b4Mu0UlXjIB0ttov0DiNewNwIRt18jA8+o+u3dpjq+sWT8KOEUt+zwvo/7V3LvSye0rgTBIlDHCN Aymg4VMk7BPZ7hm/ELNKjD+Jo2FR3qyHB5T0Y3HsLuJvW5iB4YlcNHlsdu87kGJ55tukmi8mxdAQ 4Q7e2RCOFvu396j3x+UCB5iPNgiV5+I3lg02dZ77DnKxHZu8A/lJBdiB3QW0KtZB6awBdpUKD9jf 1b0SHzUvKBds0pjBqAlkd25HN7rOrFleaJ1/ctaJxQZBKT5ZPt0m9STJEadao0xAH0ahmbWnOlFu hjuefXKnEgV4We0+UXgVCwOPjdAvBbI+e0ocS3MFEvzG6uBQE3xDk3SzynTnjh8BCNAw1FtxNrQH usEwMFxIt4I7mKZ9YIqioymCzLq9gwQbooMDQaHWBfEbwrbwqHyGO0aoSCqI3Haadr8faqU9GY/r OPNk3sgrDQoo//fb4hVC1CLQJ13hef4Y53CIrU7m2Ys6xt0nUW7/vGT1M0NPAgMBAAGjQjBAMA4G A1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBR5tFnme7bl5AFzgAiIyBpY 9umbbjANBgkqhkiG9w0BAQsFAAOCAgEAVR9YqbyyqFDQDLHYGmkgJykIrGF1XIpu+ILlaS/V9lZL ubhzEFnTIZd+50xx+7LSYK05qAvqFyFWhfFQDlnrzuBZ6brJFe+GnY+EgPbk6ZGQ3BebYhtF8GaV 0nxvwuo77x/Py9auJ/GpsMiu/X1+mvoiBOv/2X/qkSsisRcOj/KKNFtY2PwByVS5uCbMiogziUwt hDyC3+6WVwW6LLv3xLfHTjuCvjHIInNzktHCgKQ5ORAzI4JMPJ+GslWYHb4phowim57iaztXOoJw TdwJx4nLCgdNbOhdjsnvzqvHu7UrTkXWStAmzOVyyghqpZXjFaH3pO3JLF+l+/+sKAIuvtd7u+Nx e5AW0wdeRlN8NwdCjNPElpzVmbUq4JUagEiuTDkHzsxHpFKVK7q4+63SM1N95R1NbdWhscdCb+ZA JzVcoyi3B43njTOQ5yOf+1CceWxG1bQVs5ZufpsMljq4Ui0/1lvh+wjChP4kqKOJ2qxq4RgqsahD YVvTH9w7jXbyLeiNdd8XM2w9U/t7y0Ff/9yi0GE44Za4rF2LN9d11TPAmRGunUHBcnWEvgJBQl9n JEiU0Zsnvgc/ubhPgXRR4Xq37Z0j4r7g1SgEEzwxA57demyPxgcYxn/eR44/KJ4EBs+lVDR3veyJ m+kXQ99b21/+jh5Xos1AnX5iItreGCc= -----END CERTIFICATE----- AC RAIZ FNMT-RCM ================ -----BEGIN CERTIFICATE----- MIIFgzCCA2ugAwIBAgIPXZONMGc2yAYdGsdUhGkHMA0GCSqGSIb3DQEBCwUAMDsxCzAJBgNVBAYT AkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJWiBGTk1ULVJDTTAeFw0wODEw MjkxNTU5NTZaFw0zMDAxMDEwMDAwMDBaMDsxCzAJBgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJD TTEZMBcGA1UECwwQQUMgUkFJWiBGTk1ULVJDTTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC ggIBALpxgHpMhm5/yBNtwMZ9HACXjywMI7sQmkCpGreHiPibVmr75nuOi5KOpyVdWRHbNi63URcf qQgfBBckWKo3Shjf5TnUV/3XwSyRAZHiItQDwFj8d0fsjz50Q7qsNI1NOHZnjrDIbzAzWHFctPVr btQBULgTfmxKo0nRIBnuvMApGGWn3v7v3QqQIecaZ5JCEJhfTzC8PhxFtBDXaEAUwED653cXeuYL j2VbPNmaUtu1vZ5Gzz3rkQUCwJaydkxNEJY7kvqcfw+Z374jNUUeAlz+taibmSXaXvMiwzn15Cou 08YfxGyqxRxqAQVKL9LFwag0Jl1mpdICIfkYtwb1TplvqKtMUejPUBjFd8g5CSxJkjKZqLsXF3mw WsXmo8RZZUc1g16p6DULmbvkzSDGm0oGObVo/CK67lWMK07q87Hj/LaZmtVC+nFNCM+HHmpxffnT tOmlcYF7wk5HlqX2doWjKI/pgG6BU6VtX7hI+cL5NqYuSf+4lsKMB7ObiFj86xsc3i1w4peSMKGJ 47xVqCfWS+2QrYv6YyVZLag13cqXM7zlzced0ezvXg5KkAYmY6252TUtB7p2ZSysV4999AeU14EC ll2jB0nVetBX+RvnU0Z1qrB5QstocQjpYL05ac70r8NWQMetUqIJ5G+GR4of6ygnXYMgrwTJbFaa i0b1AgMBAAGjgYMwgYAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYE FPd9xf3E6Jobd2Sn9R2gzL+HYJptMD4GA1UdIAQ3MDUwMwYEVR0gADArMCkGCCsGAQUFBwIBFh1o dHRwOi8vd3d3LmNlcnQuZm5tdC5lcy9kcGNzLzANBgkqhkiG9w0BAQsFAAOCAgEAB5BK3/MjTvDD nFFlm5wioooMhfNzKWtN/gHiqQxjAb8EZ6WdmF/9ARP67Jpi6Yb+tmLSbkyU+8B1RXxlDPiyN8+s D8+Nb/kZ94/sHvJwnvDKuO+3/3Y3dlv2bojzr2IyIpMNOmqOFGYMLVN0V2Ue1bLdI4E7pWYjJ2cJ j+F3qkPNZVEI7VFY/uY5+ctHhKQV8Xa7pO6kO8Rf77IzlhEYt8llvhjho6Tc+hj507wTmzl6NLrT Qfv6MooqtyuGC2mDOL7Nii4LcK2NJpLuHvUBKwrZ1pebbuCoGRw6IYsMHkCtA+fdZn71uSANA+iW +YJF1DngoABd15jmfZ5nc8OaKveri6E6FO80vFIOiZiaBECEHX5FaZNXzuvO+FB8TxxuBEOb+dY7 Ixjp6o7RTUaN8Tvkasq6+yO3m/qZASlaWFot4/nUbQ4mrcFuNLwy+AwF+mWj2zs3gyLp1txyM/1d 8iC9djwj2ij3+RvrWWTV3F9yfiD8zYm1kGdNYno/Tq0dwzn+evQoFt9B9kiABdcPUXmsEKvU7ANm 5mqwujGSQkBqvjrTcuFqN1W8rB2Vt2lh8kORdOag0wokRqEIr9baRRmW1FMdW4R58MD3R++Lj8UG rp1MYp3/RgT408m2ECVAdf4WqslKYIYvuu8wd+RU4riEmViAqhOLUTpPSPaLtrM= -----END CERTIFICATE----- Amazon Root CA 1 ================ -----BEGIN CERTIFICATE----- MIIDQTCCAimgAwIBAgITBmyfz5m/jAo54vB4ikPmljZbyjANBgkqhkiG9w0BAQsFADA5MQswCQYD VQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6b24gUm9vdCBDQSAxMB4XDTE1 MDUyNjAwMDAwMFoXDTM4MDExNzAwMDAwMFowOTELMAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpv bjEZMBcGA1UEAxMQQW1hem9uIFJvb3QgQ0EgMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC ggEBALJ4gHHKeNXjca9HgFB0fW7Y14h29Jlo91ghYPl0hAEvrAIthtOgQ3pOsqTQNroBvo3bSMgH FzZM9O6II8c+6zf1tRn4SWiw3te5djgdYZ6k/oI2peVKVuRF4fn9tBb6dNqcmzU5L/qwIFAGbHrQ gLKm+a/sRxmPUDgH3KKHOVj4utWp+UhnMJbulHheb4mjUcAwhmahRWa6VOujw5H5SNz/0egwLX0t dHA114gk957EWW67c4cX8jJGKLhD+rcdqsq08p8kDi1L93FcXmn/6pUCyziKrlA4b9v7LWIbxcce VOF34GfID5yHI9Y/QCB/IIDEgEw+OyQmjgSubJrIqg0CAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB /zAOBgNVHQ8BAf8EBAMCAYYwHQYDVR0OBBYEFIQYzIU07LwMlJQuCFmcx7IQTgoIMA0GCSqGSIb3 DQEBCwUAA4IBAQCY8jdaQZChGsV2USggNiMOruYou6r4lK5IpDB/G/wkjUu0yKGX9rbxenDIU5PM CCjjmCXPI6T53iHTfIUJrU6adTrCC2qJeHZERxhlbI1Bjjt/msv0tadQ1wUsN+gDS63pYaACbvXy 8MWy7Vu33PqUXHeeE6V/Uq2V8viTO96LXFvKWlJbYK8U90vvo/ufQJVtMVT8QtPHRh8jrdkPSHCa 2XV4cdFyQzR1bldZwgJcJmApzyMZFo6IQ6XU5MsI+yMRQ+hDKXJioaldXgjUkK642M4UwtBV8ob2 xJNDd2ZhwLnoQdeXeGADbkpyrqXRfboQnoZsG4q5WTP468SQvvG5 -----END CERTIFICATE----- Amazon Root CA 2 ================ -----BEGIN CERTIFICATE----- MIIFQTCCAymgAwIBAgITBmyf0pY1hp8KD+WGePhbJruKNzANBgkqhkiG9w0BAQwFADA5MQswCQYD VQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6b24gUm9vdCBDQSAyMB4XDTE1 MDUyNjAwMDAwMFoXDTQwMDUyNjAwMDAwMFowOTELMAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpv bjEZMBcGA1UEAxMQQW1hem9uIFJvb3QgQ0EgMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC ggIBAK2Wny2cSkxKgXlRmeyKy2tgURO8TW0G/LAIjd0ZEGrHJgw12MBvIITplLGbhQPDW9tK6Mj4 kHbZW0/jTOgGNk3Mmqw9DJArktQGGWCsN0R5hYGCrVo34A3MnaZMUnbqQ523BNFQ9lXg1dKmSYXp N+nKfq5clU1Imj+uIFptiJXZNLhSGkOQsL9sBbm2eLfq0OQ6PBJTYv9K8nu+NQWpEjTj82R0Yiw9 AElaKP4yRLuH3WUnAnE72kr3H9rN9yFVkE8P7K6C4Z9r2UXTu/Bfh+08LDmG2j/e7HJV63mjrdvd fLC6HM783k81ds8P+HgfajZRRidhW+mez/CiVX18JYpvL7TFz4QuK/0NURBs+18bvBt+xa47mAEx kv8LV/SasrlX6avvDXbR8O70zoan4G7ptGmh32n2M8ZpLpcTnqWHsFcQgTfJU7O7f/aS0ZzQGPSS btqDT6ZjmUyl+17vIWR6IF9sZIUVyzfpYgwLKhbcAS4y2j5L9Z469hdAlO+ekQiG+r5jqFoz7Mt0 Q5X5bGlSNscpb/xVA1wf+5+9R+vnSUeVC06JIglJ4PVhHvG/LopyboBZ/1c6+XUyo05f7O0oYtlN c/LMgRdg7c3r3NunysV+Ar3yVAhU/bQtCSwXVEqY0VThUWcI0u1ufm8/0i2BWSlmy5A5lREedCf+ 3euvAgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBSw DPBMMPQFWAJI/TPlUq9LhONmUjANBgkqhkiG9w0BAQwFAAOCAgEAqqiAjw54o+Ci1M3m9Zh6O+oA A7CXDpO8Wqj2LIxyh6mx/H9z/WNxeKWHWc8w4Q0QshNabYL1auaAn6AFC2jkR2vHat+2/XcycuUY +gn0oJMsXdKMdYV2ZZAMA3m3MSNjrXiDCYZohMr/+c8mmpJ5581LxedhpxfL86kSk5Nrp+gvU5LE YFiwzAJRGFuFjWJZY7attN6a+yb3ACfAXVU3dJnJUH/jWS5E4ywl7uxMMne0nxrpS10gxdr9HIcW xkPo1LsmmkVwXqkLN1PiRnsn/eBG8om3zEK2yygmbtmlyTrIQRNg91CMFa6ybRoVGld45pIq2WWQ gj9sAq+uEjonljYE1x2igGOpm/HlurR8FLBOybEfdF849lHqm/osohHUqS0nGkWxr7JOcQ3AWEbW aQbLU8uz/mtBzUF+fUwPfHJ5elnNXkoOrJupmHN5fLT0zLm4BwyydFy4x2+IoZCn9Kr5v2c69BoV Yh63n749sSmvZ6ES8lgQGVMDMBu4Gon2nL2XA46jCfMdiyHxtN/kHNGfZQIG6lzWE7OE76KlXIx3 KadowGuuQNKotOrN8I1LOJwZmhsoVLiJkO/KdYE+HvJkJMcYr07/R54H9jVlpNMKVv/1F2Rs76gi JUmTtt8AF9pYfl3uxRuw0dFfIRDH+fO6AgonB8Xx1sfT4PsJYGw= -----END CERTIFICATE----- Amazon Root CA 3 ================ -----BEGIN CERTIFICATE----- MIIBtjCCAVugAwIBAgITBmyf1XSXNmY/Owua2eiedgPySjAKBggqhkjOPQQDAjA5MQswCQYDVQQG EwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6b24gUm9vdCBDQSAzMB4XDTE1MDUy NjAwMDAwMFoXDTQwMDUyNjAwMDAwMFowOTELMAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZ MBcGA1UEAxMQQW1hem9uIFJvb3QgQ0EgMzBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABCmXp8ZB f8ANm+gBG1bG8lKlui2yEujSLtf6ycXYqm0fc4E7O5hrOXwzpcVOho6AF2hiRVd9RFgdszflZwjr Zt6jQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBSrttvXBp43 rDCGB5Fwx5zEGbF4wDAKBggqhkjOPQQDAgNJADBGAiEA4IWSoxe3jfkrBqWTrBqYaGFy+uGh0Psc eGCmQ5nFuMQCIQCcAu/xlJyzlvnrxir4tiz+OpAUFteMYyRIHN8wfdVoOw== -----END CERTIFICATE----- Amazon Root CA 4 ================ -----BEGIN CERTIFICATE----- MIIB8jCCAXigAwIBAgITBmyf18G7EEwpQ+Vxe3ssyBrBDjAKBggqhkjOPQQDAzA5MQswCQYDVQQG EwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6b24gUm9vdCBDQSA0MB4XDTE1MDUy NjAwMDAwMFoXDTQwMDUyNjAwMDAwMFowOTELMAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZ MBcGA1UEAxMQQW1hem9uIFJvb3QgQ0EgNDB2MBAGByqGSM49AgEGBSuBBAAiA2IABNKrijdPo1MN /sGKe0uoe0ZLY7Bi9i0b2whxIdIA6GO9mif78DluXeo9pcmBqqNbIJhFXRbb/egQbeOc4OO9X4Ri 83BkM6DLJC9wuoihKqB1+IGuYgbEgds5bimwHvouXKNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNV HQ8BAf8EBAMCAYYwHQYDVR0OBBYEFNPsxzplbszh2naaVvuc84ZtV+WBMAoGCCqGSM49BAMDA2gA MGUCMDqLIfG9fhGt0O9Yli/W651+kI0rz2ZVwyzjKKlwCkcO8DdZEv8tmZQoTipPNU0zWgIxAOp1 AE47xDqUEpHJWEadIRNyp4iciuRMStuW1KyLa2tJElMzrdfkviT8tQp21KW8EA== -----END CERTIFICATE----- LuxTrust Global Root 2 ====================== -----BEGIN CERTIFICATE----- MIIFwzCCA6ugAwIBAgIUCn6m30tEntpqJIWe5rgV0xZ/u7EwDQYJKoZIhvcNAQELBQAwRjELMAkG A1UEBhMCTFUxFjAUBgNVBAoMDUx1eFRydXN0IFMuQS4xHzAdBgNVBAMMFkx1eFRydXN0IEdsb2Jh bCBSb290IDIwHhcNMTUwMzA1MTMyMTU3WhcNMzUwMzA1MTMyMTU3WjBGMQswCQYDVQQGEwJMVTEW MBQGA1UECgwNTHV4VHJ1c3QgUy5BLjEfMB0GA1UEAwwWTHV4VHJ1c3QgR2xvYmFsIFJvb3QgMjCC AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANeFl78RmOnwYoNMPIf5U2o3C/IPPIfOb9wm Kb3FibrJgz337spbxm1Jc7TJRqMbNBM/wYlFV/TZsfs2ZUv7COJIcRHIbjuend+JZTemhfY7RBi2 xjcwYkSSl2l9QjAk5A0MiWtj3sXh306pFGxT4GHO9hcvHTy95iJMHZP1EMShduxq3sVs35a0VkBC wGKSMKEtFZSg0iAGCW5qbeXrt77U8PEVfIvmTroTzEsnXpk8F12PgX8zPU/TPxvsXD/wPEx1bvKm 1Z3aLQdjAsZy6ZS8TEmVT4hSyNvoaYL4zDRbIvCGp4m9SAptZoFtyMhk+wHh9OHe2Z7d21vUKpkm FRseTJIpgp7VkoGSQXAZ96Tlk0u8d2cx3Rz9MXANF5kM+Qw5GSoXtTBxVdUPrljhPS80m8+f9niF wpN6cj5mj5wWEWCPnolvZ77gR1o7DJpni89Gxq44o/KnvObWhWszJHAiS8sIm7vI+AIpHb4gDEa/ a4ebsypmQjVGbKq6rfmYe+lQVRQxv7HaLe2ArWgk+2mr2HETMOZns4dA/Yl+8kPREd8vZS9kzl8U ubG/Mb2HeFpZZYiq/FkySIbWTLkpS5XTdvN3JW1CHDiDTf2jX5t/Lax5Gw5CMZdjpPuKadUiDTSQ MC6otOBttpSsvItO13D8xTiOZCXhTTmQzsmHhFhxAgMBAAGjgagwgaUwDwYDVR0TAQH/BAUwAwEB /zBCBgNVHSAEOzA5MDcGByuBKwEBAQowLDAqBggrBgEFBQcCARYeaHR0cHM6Ly9yZXBvc2l0b3J5 Lmx1eHRydXN0Lmx1MA4GA1UdDwEB/wQEAwIBBjAfBgNVHSMEGDAWgBT/GCh2+UgFLKGu8SsbK7JT +Et8szAdBgNVHQ4EFgQU/xgodvlIBSyhrvErGyuyU/hLfLMwDQYJKoZIhvcNAQELBQADggIBAGoZ FO1uecEsh9QNcH7X9njJCwROxLHOk3D+sFTAMs2ZMGQXvw/l4jP9BzZAcg4atmpZ1gDlaCDdLnIN H2pkMSCEfUmmWjfrRcmF9dTHF5kH5ptV5AzoqbTOjFu1EVzPig4N1qx3gf4ynCSecs5U89BvolbW 7MM3LGVYvlcAGvI1+ut7MV3CwRI9loGIlonBWVx65n9wNOeD4rHh4bhY79SV5GCc8JaXcozrhAIu ZY+kt9J/Z93I055cqqmkoCUUBpvsT34tC38ddfEz2O3OuHVtPlu5mB0xDVbYQw8wkbIEa91WvpWA VWe+2M2D2RjuLg+GLZKecBPs3lHJQ3gCpU3I+V/EkVhGFndadKpAvAefMLmx9xIX3eP/JEAdemrR TxgKqpAd60Ae36EeRJIQmvKN4dFLRp7oRUKX6kWZ8+xm1QL68qZKJKrezrnK+T+Tb/mjuuqlPpmt /f97mfVl7vBZKGfXkJWkE4SphMHozs51k2MavDzq1WQfLSoSOcbDWjLtR5EWDrw4wVDej8oqkDQc 7kGUnF4ZLvhFSZl0kbAEb+MEWrGrKqv+x9CWttrhSmQGbmBNvUJO/3jaJMobtNeWOWyu8Q6qp31I iyBMz2TWuJdGsE7RKlY6oJO9r4Ak4Ap+58rVyuiFVdw2KuGUaJPHZnJED4AhMmwlxyOAgwrr -----END CERTIFICATE----- TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1 ============================================= -----BEGIN CERTIFICATE----- MIIEYzCCA0ugAwIBAgIBATANBgkqhkiG9w0BAQsFADCB0jELMAkGA1UEBhMCVFIxGDAWBgNVBAcT D0dlYnplIC0gS29jYWVsaTFCMEAGA1UEChM5VHVya2l5ZSBCaWxpbXNlbCB2ZSBUZWtub2xvamlr IEFyYXN0aXJtYSBLdXJ1bXUgLSBUVUJJVEFLMS0wKwYDVQQLEyRLYW11IFNlcnRpZmlrYXN5b24g TWVya2V6aSAtIEthbXUgU00xNjA0BgNVBAMTLVRVQklUQUsgS2FtdSBTTSBTU0wgS29rIFNlcnRp ZmlrYXNpIC0gU3VydW0gMTAeFw0xMzExMjUwODI1NTVaFw00MzEwMjUwODI1NTVaMIHSMQswCQYD VQQGEwJUUjEYMBYGA1UEBxMPR2ViemUgLSBLb2NhZWxpMUIwQAYDVQQKEzlUdXJraXllIEJpbGlt c2VsIHZlIFRla25vbG9qaWsgQXJhc3Rpcm1hIEt1cnVtdSAtIFRVQklUQUsxLTArBgNVBAsTJEth bXUgU2VydGlmaWthc3lvbiBNZXJrZXppIC0gS2FtdSBTTTE2MDQGA1UEAxMtVFVCSVRBSyBLYW11 IFNNIFNTTCBLb2sgU2VydGlmaWthc2kgLSBTdXJ1bSAxMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A MIIBCgKCAQEAr3UwM6q7a9OZLBI3hNmNe5eA027n/5tQlT6QlVZC1xl8JoSNkvoBHToP4mQ4t4y8 6Ij5iySrLqP1N+RAjhgleYN1Hzv/bKjFxlb4tO2KRKOrbEz8HdDc72i9z+SqzvBV96I01INrN3wc wv61A+xXzry0tcXtAA9TNypN9E8Mg/uGz8v+jE69h/mniyFXnHrfA2eJLJ2XYacQuFWQfw4tJzh0 3+f92k4S400VIgLI4OD8D62K18lUUMw7D8oWgITQUVbDjlZ/iSIzL+aFCr2lqBs23tPcLG07xxO9 WSMs5uWk99gL7eqQQESolbuT1dCANLZGeA4fAJNG4e7p+exPFwIDAQABo0IwQDAdBgNVHQ4EFgQU ZT/HiobGPN08VFw1+DrtUgxHV8gwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wDQYJ KoZIhvcNAQELBQADggEBACo/4fEyjq7hmFxLXs9rHmoJ0iKpEsdeV31zVmSAhHqT5Am5EM2fKifh AHe+SMg1qIGf5LgsyX8OsNJLN13qudULXjS99HMpw+0mFZx+CFOKWI3QSyjfwbPfIPP54+M638yc lNhOT8NrF7f3cuitZjO1JVOr4PhMqZ398g26rrnZqsZr+ZO7rqu4lzwDGrpDxpa5RXI4s6ehlj2R e37AIVNMh+3yC1SVUZPVIqUNivGTDj5UDrDYyU7c8jEyVupk+eq1nRZmQnLzf9OxMUP8pI4X8W0j q5Rm+K37DwhuJi1/FwcJsoz7UMCflo3Ptv0AnVoUmr8CRPXBwp8iXqIPoeM= -----END CERTIFICATE----- rsconnect/inst/cert/shinyapps.io.pem0000644000175000017500000002754513236716400017462 0ustar nileshnileshAmazon Root CA 1 ================ -----BEGIN CERTIFICATE----- MIIDQTCCAimgAwIBAgITBmyfz5m/jAo54vB4ikPmljZbyjANBgkqhkiG9w0BAQsF ADA5MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6 b24gUm9vdCBDQSAxMB4XDTE1MDUyNjAwMDAwMFoXDTM4MDExNzAwMDAwMFowOTEL MAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJv b3QgQ0EgMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALJ4gHHKeNXj ca9HgFB0fW7Y14h29Jlo91ghYPl0hAEvrAIthtOgQ3pOsqTQNroBvo3bSMgHFzZM 9O6II8c+6zf1tRn4SWiw3te5djgdYZ6k/oI2peVKVuRF4fn9tBb6dNqcmzU5L/qw IFAGbHrQgLKm+a/sRxmPUDgH3KKHOVj4utWp+UhnMJbulHheb4mjUcAwhmahRWa6 VOujw5H5SNz/0egwLX0tdHA114gk957EWW67c4cX8jJGKLhD+rcdqsq08p8kDi1L 93FcXmn/6pUCyziKrlA4b9v7LWIbxcceVOF34GfID5yHI9Y/QCB/IIDEgEw+OyQm jgSubJrIqg0CAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC AYYwHQYDVR0OBBYEFIQYzIU07LwMlJQuCFmcx7IQTgoIMA0GCSqGSIb3DQEBCwUA A4IBAQCY8jdaQZChGsV2USggNiMOruYou6r4lK5IpDB/G/wkjUu0yKGX9rbxenDI U5PMCCjjmCXPI6T53iHTfIUJrU6adTrCC2qJeHZERxhlbI1Bjjt/msv0tadQ1wUs N+gDS63pYaACbvXy8MWy7Vu33PqUXHeeE6V/Uq2V8viTO96LXFvKWlJbYK8U90vv o/ufQJVtMVT8QtPHRh8jrdkPSHCa2XV4cdFyQzR1bldZwgJcJmApzyMZFo6IQ6XU 5MsI+yMRQ+hDKXJioaldXgjUkK642M4UwtBV8ob2xJNDd2ZhwLnoQdeXeGADbkpy rqXRfboQnoZsG4q5WTP468SQvvG5 -----END CERTIFICATE----- Amazon Root CA 2 ================ -----BEGIN CERTIFICATE----- MIIFQTCCAymgAwIBAgITBmyf0pY1hp8KD+WGePhbJruKNzANBgkqhkiG9w0BAQwF ADA5MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6 b24gUm9vdCBDQSAyMB4XDTE1MDUyNjAwMDAwMFoXDTQwMDUyNjAwMDAwMFowOTEL MAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJv b3QgQ0EgMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAK2Wny2cSkxK gXlRmeyKy2tgURO8TW0G/LAIjd0ZEGrHJgw12MBvIITplLGbhQPDW9tK6Mj4kHbZ W0/jTOgGNk3Mmqw9DJArktQGGWCsN0R5hYGCrVo34A3MnaZMUnbqQ523BNFQ9lXg 1dKmSYXpN+nKfq5clU1Imj+uIFptiJXZNLhSGkOQsL9sBbm2eLfq0OQ6PBJTYv9K 8nu+NQWpEjTj82R0Yiw9AElaKP4yRLuH3WUnAnE72kr3H9rN9yFVkE8P7K6C4Z9r 2UXTu/Bfh+08LDmG2j/e7HJV63mjrdvdfLC6HM783k81ds8P+HgfajZRRidhW+me z/CiVX18JYpvL7TFz4QuK/0NURBs+18bvBt+xa47mAExkv8LV/SasrlX6avvDXbR 8O70zoan4G7ptGmh32n2M8ZpLpcTnqWHsFcQgTfJU7O7f/aS0ZzQGPSSbtqDT6Zj mUyl+17vIWR6IF9sZIUVyzfpYgwLKhbcAS4y2j5L9Z469hdAlO+ekQiG+r5jqFoz 7Mt0Q5X5bGlSNscpb/xVA1wf+5+9R+vnSUeVC06JIglJ4PVhHvG/LopyboBZ/1c6 +XUyo05f7O0oYtlNc/LMgRdg7c3r3NunysV+Ar3yVAhU/bQtCSwXVEqY0VThUWcI 0u1ufm8/0i2BWSlmy5A5lREedCf+3euvAgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMB Af8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBSwDPBMMPQFWAJI/TPlUq9LhONm UjANBgkqhkiG9w0BAQwFAAOCAgEAqqiAjw54o+Ci1M3m9Zh6O+oAA7CXDpO8Wqj2 LIxyh6mx/H9z/WNxeKWHWc8w4Q0QshNabYL1auaAn6AFC2jkR2vHat+2/XcycuUY +gn0oJMsXdKMdYV2ZZAMA3m3MSNjrXiDCYZohMr/+c8mmpJ5581LxedhpxfL86kS k5Nrp+gvU5LEYFiwzAJRGFuFjWJZY7attN6a+yb3ACfAXVU3dJnJUH/jWS5E4ywl 7uxMMne0nxrpS10gxdr9HIcWxkPo1LsmmkVwXqkLN1PiRnsn/eBG8om3zEK2yygm btmlyTrIQRNg91CMFa6ybRoVGld45pIq2WWQgj9sAq+uEjonljYE1x2igGOpm/Hl urR8FLBOybEfdF849lHqm/osohHUqS0nGkWxr7JOcQ3AWEbWaQbLU8uz/mtBzUF+ fUwPfHJ5elnNXkoOrJupmHN5fLT0zLm4BwyydFy4x2+IoZCn9Kr5v2c69BoVYh63 n749sSmvZ6ES8lgQGVMDMBu4Gon2nL2XA46jCfMdiyHxtN/kHNGfZQIG6lzWE7OE 76KlXIx3KadowGuuQNKotOrN8I1LOJwZmhsoVLiJkO/KdYE+HvJkJMcYr07/R54H 9jVlpNMKVv/1F2Rs76giJUmTtt8AF9pYfl3uxRuw0dFfIRDH+fO6AgonB8Xx1sfT 4PsJYGw= -----END CERTIFICATE----- Amazon Root CA 3 ================ -----BEGIN CERTIFICATE----- MIIBtjCCAVugAwIBAgITBmyf1XSXNmY/Owua2eiedgPySjAKBggqhkjOPQQDAjA5 MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6b24g Um9vdCBDQSAzMB4XDTE1MDUyNjAwMDAwMFoXDTQwMDUyNjAwMDAwMFowOTELMAkG A1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJvb3Qg Q0EgMzBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABCmXp8ZBf8ANm+gBG1bG8lKl ui2yEujSLtf6ycXYqm0fc4E7O5hrOXwzpcVOho6AF2hiRVd9RFgdszflZwjrZt6j QjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBSr ttvXBp43rDCGB5Fwx5zEGbF4wDAKBggqhkjOPQQDAgNJADBGAiEA4IWSoxe3jfkr BqWTrBqYaGFy+uGh0PsceGCmQ5nFuMQCIQCcAu/xlJyzlvnrxir4tiz+OpAUFteM YyRIHN8wfdVoOw== -----END CERTIFICATE----- Amazon Root CA 4 ================ -----BEGIN CERTIFICATE----- MIIB8jCCAXigAwIBAgITBmyf18G7EEwpQ+Vxe3ssyBrBDjAKBggqhkjOPQQDAzA5 MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6b24g Um9vdCBDQSA0MB4XDTE1MDUyNjAwMDAwMFoXDTQwMDUyNjAwMDAwMFowOTELMAkG A1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJvb3Qg Q0EgNDB2MBAGByqGSM49AgEGBSuBBAAiA2IABNKrijdPo1MN/sGKe0uoe0ZLY7Bi 9i0b2whxIdIA6GO9mif78DluXeo9pcmBqqNbIJhFXRbb/egQbeOc4OO9X4Ri83Bk M6DLJC9wuoihKqB1+IGuYgbEgds5bimwHvouXKNCMEAwDwYDVR0TAQH/BAUwAwEB /zAOBgNVHQ8BAf8EBAMCAYYwHQYDVR0OBBYEFNPsxzplbszh2naaVvuc84ZtV+WB MAoGCCqGSM49BAMDA2gAMGUCMDqLIfG9fhGt0O9Yli/W651+kI0rz2ZVwyzjKKlw CkcO8DdZEv8tmZQoTipPNU0zWgIxAOp1AE47xDqUEpHJWEadIRNyp4iciuRMStuW 1KyLa2tJElMzrdfkviT8tQp21KW8EA== -----END CERTIFICATE----- Starfield Services Root CA ========================== -----BEGIN CERTIFICATE----- MIID7zCCAtegAwIBAgIBADANBgkqhkiG9w0BAQsFADCBmDELMAkGA1UEBhMCVVMx EDAOBgNVBAgTB0FyaXpvbmExEzARBgNVBAcTClNjb3R0c2RhbGUxJTAjBgNVBAoT HFN0YXJmaWVsZCBUZWNobm9sb2dpZXMsIEluYy4xOzA5BgNVBAMTMlN0YXJmaWVs ZCBTZXJ2aWNlcyBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAtIEcyMB4XDTA5 MDkwMTAwMDAwMFoXDTM3MTIzMTIzNTk1OVowgZgxCzAJBgNVBAYTAlVTMRAwDgYD VQQIEwdBcml6b25hMRMwEQYDVQQHEwpTY290dHNkYWxlMSUwIwYDVQQKExxTdGFy ZmllbGQgVGVjaG5vbG9naWVzLCBJbmMuMTswOQYDVQQDEzJTdGFyZmllbGQgU2Vy dmljZXMgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgLSBHMjCCASIwDQYJKoZI hvcNAQEBBQADggEPADCCAQoCggEBANUMOsQq+U7i9b4Zl1+OiFOxHz/Lz58gE20p OsgPfTz3a3Y4Y9k2YKibXlwAgLIvWX/2h/klQ4bnaRtSmpDhcePYLQ1Ob/bISdm2 8xpWriu2dBTrz/sm4xq6HZYuajtYlIlHVv8loJNwU4PahHQUw2eeBGg6345AWh1K Ts9DkTvnVtYAcMtS7nt9rjrnvDH5RfbCYM8TWQIrgMw0R9+53pBlbQLPLJGmpufe hRhJfGZOozptqbXuNC66DQO4M99H67FrjSXZm86B0UVGMpZwh94CDklDhbZsc7tk 6mFBrMnUVN+HL8cisibMn1lUaJ/8viovxFUcdUBgF4UCVTmLfwUCAwEAAaNCMEAw DwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFJxfAN+q AdcwKziIorhtSpzyEZGDMA0GCSqGSIb3DQEBCwUAA4IBAQBLNqaEd2ndOxmfZyMI bw5hyf2E3F/YNoHN2BtBLZ9g3ccaaNnRbobhiCPPE95Dz+I0swSdHynVv/heyNXB ve6SbzJ08pGCL72CQnqtKrcgfU28elUSwhXqvfdqlS5sdJ/PHLTyxQGjhdByPq1z qwubdQxtRbeOlKyWN7Wg0I8VRw7j6IPdj/3vQQF3zCepYoUz8jcI73HPdwbeyBkd iEDPfUYd/x7H4c7/I9vG+o1VTqkC50cRRj70/b17KSa7qWFiNyi2LSr2EIZkyXCn 0q23KXB56jzaYyWf/Wi3MOxw+3WKt21gZ7IeyLnp2KhvAotnDU0mV3HaIPzBSlCN sSi6 -----END CERTIFICATE----- DigiCert Assured ID Root G2 =========================== -----BEGIN CERTIFICATE----- MIIDljCCAn6gAwIBAgIQC5McOtY5Z+pnI7/Dr5r0SzANBgkqhkiG9w0BAQsFADBl MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJv b3QgRzIwHhcNMTMwODAxMTIwMDAwWhcNMzgwMTE1MTIwMDAwWjBlMQswCQYDVQQG EwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNl cnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgRzIwggEi MA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDZ5ygvUj82ckmIkzTz+GoeMVSA n61UQbVH35ao1K+ALbkKz3X9iaV9JPrjIgwrvJUXCzO/GU1BBpAAvQxNEP4Htecc biJVMWWXvdMX0h5i89vqbFCMP4QMls+3ywPgym2hFEwbid3tALBSfK+RbLE4E9Hp EgjAALAcKxHad3A2m67OeYfcgnDmCXRwVWmvo2ifv922ebPynXApVfSr/5Vh88lA bx3RvpO704gqu52/clpWcTs/1PPRCv4o76Pu2ZmvA9OPYLfykqGxvYmJHzDNw6Yu YjOuFgJ3RFrngQo8p0Quebg/BLxcoIfhG69Rjs3sLPr4/m3wOnyqi+RnlTGNAgMB AAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQW BBTOw0q5mVXyuNtgv6l+vVa1lzan1jANBgkqhkiG9w0BAQsFAAOCAQEAyqVVjOPI QW5pJ6d1Ee88hjZv0p3GeDgdaZaikmkuOGybfQTUiaWxMTeKySHMq2zNixya1r9I 0jJmwYrA8y8678Dj1JGG0VDjA9tzd29KOVPt3ibHtX2vK0LRdWLjSisCx1BL4Gni lmwORGYQRI+tBev4eaymG+g3NJ1TyWGqolKvSnAWhsI6yLETcDbYz+70CjTVW0z9 B5yiutkBclzzTcHdDrEcDcRjvq30FPuJ7KJBDkzMyFdA0G4Dqs0MjomZmWzwPDCv ON9vvKO+KSAnq3T/EyJ43pdSVR6DtVQgA+6uwE9W3jfMw3+qBCe703e4YtsXfJwo IhNzbM8m9Yop5w== -----END CERTIFICATE----- DigiCert Global Root G2 ======================= -----BEGIN CERTIFICATE----- MIIDjjCCAnagAwIBAgIQAzrx5qcRqaC7KGSxHQn65TANBgkqhkiG9w0BAQsFADBh MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 d3cuZGlnaWNlcnQuY29tMSAwHgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBH MjAeFw0xMzA4MDExMjAwMDBaFw0zODAxMTUxMjAwMDBaMGExCzAJBgNVBAYTAlVT MRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5j b20xIDAeBgNVBAMTF0RpZ2lDZXJ0IEdsb2JhbCBSb290IEcyMIIBIjANBgkqhkiG 9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuzfNNNx7a8myaJCtSnX/RrohCgiN9RlUyfuI 2/Ou8jqJkTx65qsGGmvPrC3oXgkkRLpimn7Wo6h+4FR1IAWsULecYxpsMNzaHxmx 1x7e/dfgy5SDN67sH0NO3Xss0r0upS/kqbitOtSZpLYl6ZtrAGCSYP9PIUkY92eQ q2EGnI/yuum06ZIya7XzV+hdG82MHauVBJVJ8zUtluNJbd134/tJS7SsVQepj5Wz tCO7TG1F8PapspUwtP1MVYwnSlcUfIKdzXOS0xZKBgyMUNGPHgm+F6HmIcr9g+UQ vIOlCsRnKPZzFBQ9RnbDhxSJITRNrw9FDKZJobq7nMWxM4MphQIDAQABo0IwQDAP BgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBhjAdBgNVHQ4EFgQUTiJUIBiV 5uNu5g/6+rkS7QYXjzkwDQYJKoZIhvcNAQELBQADggEBAGBnKJRvDkhj6zHd6mcY 1Yl9PMWLSn/pvtsrF9+wX3N3KjITOYFnQoQj8kVnNeyIv/iPsGEMNKSuIEyExtv4 NeF22d+mQrvHRAiGfzZ0JFrabA0UWTW98kndth/Jsw1HKj2ZL7tcu7XUIOGZX1NG Fdtom/DzMNU+MeKNhJ7jitralj41E6Vf8PlwUHBHQRFXGU7Aj64GxJUTFy8bJZ91 8rGOmaFvE7FBcf6IKshPECBV1/MUReXgRPTqh5Uykw7+U0b6LJ3/iyK5S9kJRaTe pLiaWN0bfVKfjllDiIGknibVb63dDcY3fe0Dkhvld1927jyNxF1WW6LZZm6zNTfl MrY= -----END CERTIFICATE----- DigiCert Assured ID CA G2 ========================= -----BEGIN CERTIFICATE----- MIIEmjCCA4KgAwIBAgIQD1/M/Ksg89+ObaPYR2fCkzANBgkqhkiG9w0BAQsFADBl MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJv b3QgRzIwHhcNMTMwODAxMTIwMDAwWhcNMjgwODAxMTIwMDAwWjBIMQswCQYDVQQG EwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMSIwIAYDVQQDExlEaWdpQ2VydCBB c3N1cmVkIElEIENBIEcyMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA tFLF3hmmiyDchhlz2ZMtsf4L23l6z+g5odzcrNDI8QcZTBUm9xV9w5YZ6bRXU7jw ZlKaaVtxrqugWHNdlNfKL27RzC4kn1aKvwdt5Gj9j+UMzc/BMx3ksvGiHwQMBMGF zPAVG9aUpVXCXdUt0vSOLZxzI3x2Oqz2jL9pxc2l/bmgf9uhE4v2noPxViUQ4DF2 h/cDRzV5qyZUq8FPw9y1JUi8Pl6HHAzFei/4OvhAQogerd8lvl8chlkT5h9UNeS0 zdv5uDrNs5C/hJqXidKZU7nZTqh08B/RD8vsu9f66HavmbyrKXa2CveC0uqZvfQZ 0SBCj4ykeElnxyveHfOvUQIDAQABo4IBYTCCAV0wEgYDVR0TAQH/BAgwBgEB/wIB ADAOBgNVHQ8BAf8EBAMCAYYwNAYIKwYBBQUHAQEEKDAmMCQGCCsGAQUFBzABhhho dHRwOi8vb2NzcC5kaWdpY2VydC5jb20wgYEGA1UdHwR6MHgwOqA4oDaGNGh0dHA6 Ly9jcmw0LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RHMi5jcmww OqA4oDaGNGh0dHA6Ly9jcmwzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEFzc3VyZWRJ RFJvb3RHMi5jcmwwPQYDVR0gBDYwNDAyBgRVHSAAMCowKAYIKwYBBQUHAgEWHGh0 dHBzOi8vd3d3LmRpZ2ljZXJ0LmNvbS9DUFMwHQYDVR0OBBYEFLHP9qHl5oHFZkeN eIR3e/mBy0qmMB8GA1UdIwQYMBaAFM7DSrmZVfK422C/qX69VrWXNqfWMA0GCSqG SIb3DQEBCwUAA4IBAQA/C7UkzAlgi5mvLq7ukp0JS9Vg+rMNyx3XVkBF84vz9exk 74Y0vPnniZoy/pAgOaFFGbsVBI7SNf/iGI5x5UG5PKWo+K0AP0fwkZFnfEAN0wJy Dezr2oLi95s2XCoqThxhtJe6t1A8Lh6klGQGkgREdyF7Y6obGQq+7hDz4VRR4MCM m5QHcPcYJzh0pQueTxadgp6AbksehUf/g9eGzwzHqdkkAIQ9mzpRRxjoqkaPTtSd kpPl/ZZcDqPzDzWXhzKfJs90lSuYy1z1fQEgFZP/X1DGT8SGzAlfv83e+FC3ja7w JZJ4ZTqw8UTUUpI52U2HVCMXKNtEFEyMYLeRJe+j -----END CERTIFICATE----- DigiCert Baltimore CA-2 G2 ========================== -----BEGIN CERTIFICATE----- MIIEYzCCA0ugAwIBAgIQAYL4CY6i5ia5GjsnhB+5rzANBgkqhkiG9w0BAQsFADBa MQswCQYDVQQGEwJJRTESMBAGA1UEChMJQmFsdGltb3JlMRMwEQYDVQQLEwpDeWJl clRydXN0MSIwIAYDVQQDExlCYWx0aW1vcmUgQ3liZXJUcnVzdCBSb290MB4XDTE1 MTIwODEyMDUwN1oXDTI1MDUxMDEyMDAwMFowZDELMAkGA1UEBhMCVVMxFTATBgNV BAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEjMCEG A1UEAxMaRGlnaUNlcnQgQmFsdGltb3JlIENBLTIgRzIwggEiMA0GCSqGSIb3DQEB AQUAA4IBDwAwggEKAoIBAQC75wD+AAFz75uI8FwIdfBccHMf/7V6H40II/3HwRM/ sSEGvU3M2y24hxkx3tprDcFd0lHVsF5y1PBm1ITykRhBtQkmsgOWBGmVU/oHTz6+ hjpDK7JZtavRuvRZQHJaZ7bN5lX8CSukmLK/zKkf1L+Hj4Il/UWAqeydjPl0kM8c +GVQr834RavIL42ONh3e6onNslLZ5QnNNnEr2sbQm8b2pFtbObYfAB8ZpPvTvgzm +4/dDoDmpOdaxMAvcu6R84Nnyc3KzkqwIIH95HKvCRjnT0LsTSdCTQeg3dUNdfc2 YMwmVJihiDfwg/etKVkgz7sl4dWe5vOuwQHrtQaJ4gqPAgMBAAGjggEZMIIBFTAd BgNVHQ4EFgQUwBKyKHRoRmfpcCV0GgBFWwZ9XEQwHwYDVR0jBBgwFoAU5Z1ZMIJH WMys+ghUNoZ7OrUETfAwEgYDVR0TAQH/BAgwBgEB/wIBADAOBgNVHQ8BAf8EBAMC AYYwNAYIKwYBBQUHAQEEKDAmMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdp Y2VydC5jb20wOgYDVR0fBDMwMTAvoC2gK4YpaHR0cDovL2NybDMuZGlnaWNlcnQu Y29tL09tbmlyb290MjAyNS5jcmwwPQYDVR0gBDYwNDAyBgRVHSAAMCowKAYIKwYB BQUHAgEWHGh0dHBzOi8vd3d3LmRpZ2ljZXJ0LmNvbS9DUFMwDQYJKoZIhvcNAQEL BQADggEBAC/iN2bDGs+RVe4pFPpQEL6ZjeIo8XQWB2k7RDA99blJ9Wg2/rcwjang B0lCY0ZStWnGm0nyGg9Xxva3vqt1jQ2iqzPkYoVDVKtjlAyjU6DqHeSmpqyVDmV4 7DOMvpQ+2HCr6sfheM4zlbv7LFjgikCmbUHY2Nmz+S8CxRtwa+I6hXsdGLDRS5rB bxcQKegOw+FUllSlkZUIII1pLJ4vP1C0LuVXH6+kc9KhJLsNkP5FEx2noSnYZgvD 0WyzT7QrhExHkOyL4kGJE7YHRndC/bseF/r/JUuOUFfrjsxOFT+xJd1BDKCcYm1v upcHi9nzBhDFKdT3uhaQqNBU4UtJx5g= -----END CERTIFICATE----- rsconnect/inst/resources/0000755000175000017500000000000014004273454015374 5ustar nileshnileshrsconnect/inst/resources/environment.py0000644000175000017500000002166314004273454020322 0ustar nileshnilesh#!/usr/bin/env python """ Environment data class abstraction that is usable as an executable module ```bash python -m rsconnect.environment ``` """ import collections import datetime import json import locale import os import re import subprocess import sys try: import typing from typing import Optional except ImportError: typing = None version_re = re.compile(r"\d+\.\d+(\.\d+)?") conda_version_re = re.compile(r"^(?:\s*-\s*)?python=(\d+\.\d+(?:\.\d+)?)", re.MULTILINE) exec_dir = os.path.dirname(sys.executable) Environment = collections.namedtuple( "Environment", ("conda", "contents", "error", "filename", "locale", "package_manager", "pip", "python", "source",), ) def MakeEnvironment( conda=None, # type: Optional[str] contents="", # type: Optional[str] error=None, # type: Optional[str] filename="", # type: Optional[str] locale="", # type: Optional[str] package_manager="", # type: Optional[str] pip=None, # type: Optional[str] python=None, # type: Optional[str] source=None, # type: Optional[str] ): return Environment(conda, contents, error, filename, locale, package_manager, pip, python, source) class EnvironmentException(Exception): pass def detect_environment(dirname, force_generate=False, conda_mode=False, conda=None): # type: (str, bool, bool, typing.Optional[str]) -> Environment """Determine the python dependencies in the environment. `pip freeze` will be used to introspect the environment unless `conda_mode` is set to `True`. In that case, an attempt will be made to use Conda to introspect the environment. :param: dirname Directory name :param: force_generate Force the generation of an environment :param: conda_mode inspect the environment assuming Conda :return: a dictionary containing the package spec filename and contents if successful, or a dictionary containing `error` on failure. """ conda = get_conda(conda) if conda_mode and conda: if force_generate: result = conda_env_export(conda) else: result = output_file(dirname, "environment.yml", "conda") or conda_env_export(conda) else: if force_generate: result = pip_freeze() else: result = output_file(dirname, "requirements.txt", "pip") or pip_freeze() if result is not None: if conda_mode and result["package_manager"] != "conda": return MakeEnvironment( error=( 'Conda was requested but no activated Conda environment was found. See "conda activate ' '--help" for more information.' ) ) result["python"] = get_python_version(MakeEnvironment(**result)) result["pip"] = get_version("pip") if conda: result["conda"] = get_conda_version(conda) result["locale"] = get_default_locale() return MakeEnvironment(**result) def get_conda(conda=None): """get_conda tries to find the conda executable if we're in a conda environment. If not, or if we cannot find the executable, return None. :returns: conda string path to conda or None. """ if os.environ.get("CONDA_PREFIX", None) is None and conda is None: return None else: return conda or os.environ.get("CONDA_EXE", None) def get_python_version(environment): # type: (Environment) -> str if environment.package_manager == "conda": versions = conda_version_re.findall(environment.contents) if len(versions) > 0: version = versions[0] if version.count(".") == 1: version = version + ".0" return version v = sys.version_info return "%d.%d.%d" % (v[0], v[1], v[2]) def get_conda_version(conda): try: args = [conda, "-V"] proc = subprocess.Popen(args, stdout=subprocess.PIPE, stderr=subprocess.PIPE, universal_newlines=True,) stdout, stderr = proc.communicate() match = version_re.search(stdout or stderr) if match: return match.group() msg = "Failed to get version of conda from the output of: %s - standard output: %s; standard error: %s" % ( " ".join(args), stdout, stderr, ) raise EnvironmentException(msg) except Exception as exception: raise EnvironmentException("Error getting conda version: %s" % str(exception)) def get_default_locale(locale_source=locale.getdefaultlocale): result = ".".join([item or "" for item in locale_source()]) return "" if result == "." else result def get_version(module): try: args = [sys.executable, "-m", module, "--version"] proc = subprocess.Popen(args, stdout=subprocess.PIPE, stderr=subprocess.PIPE, universal_newlines=True,) stdout, stderr = proc.communicate() match = version_re.search(stdout) if match: return match.group() msg = "Failed to get version of '%s' from the output of: %s" % (module, " ".join(args),) raise EnvironmentException(msg) except Exception as exception: raise EnvironmentException("Error getting '%s' version: %s" % (module, str(exception))) def output_file(dirname, filename, package_manager): """Read an existing package spec file. Returns a dictionary containing the filename and contents if successful, None if the file does not exist, or a dictionary containing 'error' on failure. """ try: path = os.path.join(dirname, filename) if not os.path.exists(path): return None with open(path, "r") as f: data = f.read() data = "\n".join([line for line in data.split("\n") if "rsconnect" not in line]) return { "filename": filename, "contents": data, "source": "file", "package_manager": package_manager, } except Exception as exception: raise EnvironmentException("Error reading %s: %s" % (filename, str(exception))) def pip_freeze(): """Inspect the environment using `pip freeze`. Returns a dictionary containing the filename (always 'requirements.txt') and contents if successful, or a dictionary containing 'error' on failure. """ try: proc = subprocess.Popen( [sys.executable, "-m", "pip", "list", "--format=freeze"], stdout=subprocess.PIPE, stderr=subprocess.PIPE, universal_newlines=True, ) pip_stdout, pip_stderr = proc.communicate() pip_status = proc.returncode except Exception as exception: raise EnvironmentException("Error during pip freeze: %s" % str(exception)) if pip_status != 0: msg = pip_stderr or ("exited with code %d" % pip_status) raise EnvironmentException("Error during pip freeze: %s" % msg) pip_stdout = "\n".join([line for line in pip_stdout.split("\n") if "rsconnect" not in line]) pip_stdout = ( "# requirements.txt generated by rsconnect-python on " + str(datetime.datetime.utcnow()) + "\n" + pip_stdout ) return { "filename": "requirements.txt", "contents": pip_stdout, "source": "pip_freeze", "package_manager": "pip", } def conda_env_export(conda): """Inspect the environment using `conda env export` :param: conda path to the `conda` tool :return: dictionary containing the key "environment.yml" and the data inside """ try: proc = subprocess.Popen( [conda, "env", "export"], stdout=subprocess.PIPE, stderr=subprocess.PIPE, universal_newlines=True, ) conda_stdout, conda_stderr = proc.communicate() conda_status = proc.returncode except Exception as exception: raise EnvironmentException("Error during conda env export: %s" % str(exception)) if conda_status != 0: msg = conda_stderr or ("exited with code %d" % conda_status) raise EnvironmentException("Error during conda env export: %s" % msg) return { "filename": "environment.yml", "contents": conda_stdout, "source": "conda_env_export", "package_manager": "conda", } def main(): """ Run `detect_environment` and dump the result as JSON. """ try: if len(sys.argv) < 2: raise EnvironmentException("Usage: %s [-fc] DIRECTORY" % sys.argv[0]) # directory is always the last argument directory = sys.argv[len(sys.argv) - 1] flags = "" force_generate = False conda_mode = False if len(sys.argv) > 2: flags = sys.argv[1] if "f" in flags: force_generate = True if "c" in flags: conda_mode = True json.dump( detect_environment(directory, force_generate, conda_mode)._asdict(), sys.stdout, indent=4, ) except EnvironmentException as exception: json.dump(dict(error=str(exception)), sys.stdout, indent=4) if __name__ == "__main__": main() rsconnect/inst/examples/0000755000175000017500000000000012464431736015207 5ustar nileshnileshrsconnect/inst/examples/diamonds/0000755000175000017500000000000012464431736017005 5ustar nileshnileshrsconnect/inst/examples/diamonds/server.R0000644000175000017500000000116212464431736020436 0ustar nileshnileshlibrary(shiny) library(ggplot2) shinyServer(function(input, output) { dataset <- reactive(function() { diamonds[sample(nrow(diamonds), input$sampleSize),] }) output$plot <- reactivePlot(function() { p <- ggplot(dataset(), aes_string(x=input$x, y=input$y)) + geom_point() if (input$color != 'None') p <- p + aes_string(color=input$color) facets <- paste(input$facet_row, '~', input$facet_col) if (facets != '. ~ .') p <- p + facet_grid(facets) if (input$jitter) p <- p + geom_jitter() if (input$smooth) p <- p + geom_smooth() print(p) }, height=700) }) rsconnect/inst/examples/diamonds/ui.R0000644000175000017500000000131612464431736017546 0ustar nileshnileshlibrary(shiny) library(ggplot2) dataset <- diamonds shinyUI(pageWithSidebar( headerPanel("Diamonds Explorer"), sidebarPanel( sliderInput('sampleSize', 'Sample Size', min=1, max=nrow(dataset), value=min(1000, nrow(dataset)), step=500, round=0), selectInput('x', 'X', names(dataset)), selectInput('y', 'Y', names(dataset), names(dataset)[[2]]), selectInput('color', 'Color', c('None', names(dataset))), checkboxInput('jitter', 'Jitter'), checkboxInput('smooth', 'Smooth'), selectInput('facet_row', 'Facet Row', c(None='.', names(dataset))), selectInput('facet_col', 'Facet Column', c(None='.', names(dataset))) ), mainPanel( plotOutput('plot') ) )) rsconnect/inst/examples/sessioninfo/0000755000175000017500000000000012522664401017536 5ustar nileshnileshrsconnect/inst/examples/sessioninfo/server.R0000644000175000017500000000123412522664401021167 0ustar nileshnileshlibrary(shiny) shinyServer(function(input, output, session) { # output sessionInfo output$sessionInfo <- renderPrint({ sessionInfo() }) # output urlInfo output$urlInfo <- renderText({ paste(sep = "", "protocol: ", session$clientData$url_protocol, "\n", "hostname: ", session$clientData$url_hostname, "\n", "pathname: ", session$clientData$url_pathname, "\n", "port: ", session$clientData$url_port, "\n", "search: ", session$clientData$url_search, "\n" ) }) # output userInfo output$userInfo <- renderText({ paste(sep="", "user: ", session$user, "\n") }) }) rsconnect/inst/examples/sessioninfo/ui.R0000644000175000017500000000027712522664401020304 0ustar nileshnileshlibrary(shiny) shinyUI(fluidPage( h3("URL"), verbatimTextOutput("urlInfo"), h3("Session"), verbatimTextOutput("sessionInfo"), h3("User"), verbatimTextOutput("userInfo") )) rsconnect/NAMESPACE0000644000175000017500000000252714143547760013642 0ustar nileshnilesh# Generated by roxygen2: do not edit by hand export(accountInfo) export(accountUsage) export(accounts) export(addAuthorizedUser) export(addConnectServer) export(addLinter) export(addServer) export(addServerCertificate) export(appDependencies) export(applications) export(authorizedUsers) export(configureApp) export(connectApiUser) export(connectUser) export(deployAPI) export(deployApp) export(deployDoc) export(deploySite) export(deployTFModel) export(deployments) export(discoverServers) export(forgetDeployment) export(generateAppName) export(lint) export(linter) export(listBundleFiles) export(purgeApp) export(removeAccount) export(removeAuthorizedUser) export(removeServer) export(restartApp) export(rpubsUpload) export(serverInfo) export(servers) export(setAccountInfo) export(setProperty) export(showInvited) export(showLogs) export(showMetrics) export(showProperties) export(showUsage) export(showUsers) export(syncAppMetadata) export(taskLog) export(tasks) export(terminateApp) export(unsetProperty) export(writeManifest) importFrom(stats,na.omit) importFrom(stats,setNames) importFrom(utils,available.packages) importFrom(utils,contrib.url) importFrom(utils,file_test) importFrom(utils,formatUL) importFrom(utils,getFromNamespace) importFrom(utils,glob2rx) importFrom(utils,installed.packages) importFrom(utils,packageVersion) importFrom(utils,read.csv)