rsconnect/0000755000176200001440000000000014536742742012266 5ustar liggesusersrsconnect/NAMESPACE0000644000176200001440000000321214513230050013456 0ustar liggesusers# Generated by roxygen2: do not edit by hand S3method(as.data.frame,rsconnect_secret) S3method(format,rsconnect_secret) S3method(print,linterResults) S3method(print,rsconnect_secret) S3method(str,rsconnect_secret) export(accountInfo) export(accountUsage) export(accounts) export(addAuthorizedUser) export(addConnectServer) export(addLinter) export(addServer) export(addServerCertificate) export(appDependencies) export(applications) export(authorizedUsers) export(configureApp) export(connectApiUser) export(connectUser) export(deployAPI) export(deployApp) export(deployDoc) export(deploySite) export(deployTFModel) export(deployments) export(discoverServers) export(forgetDeployment) export(generateAppName) export(lint) export(linter) export(listAccountEnvVars) export(listBundleFiles) export(listDeploymentFiles) export(purgeApp) export(removeAccount) export(removeAuthorizedUser) export(removeServer) export(resendInvitation) export(restartApp) export(rpubsUpload) export(serverInfo) export(servers) export(setAccountInfo) export(setProperty) export(showInvited) export(showLogs) export(showMetrics) export(showProperties) export(showUsage) export(showUsers) export(syncAppMetadata) export(taskLog) export(tasks) export(terminateApp) export(unsetProperty) export(updateAccountEnvVars) export(writeManifest) import(rlang) importFrom(lifecycle,deprecated) importFrom(stats,na.omit) importFrom(stats,setNames) importFrom(utils,available.packages) importFrom(utils,contrib.url) importFrom(utils,getFromNamespace) importFrom(utils,glob2rx) importFrom(utils,installed.packages) importFrom(utils,packageDescription) importFrom(utils,packageVersion) importFrom(utils,read.csv) rsconnect/README.md0000644000176200001440000000542114536655076013552 0ustar liggesusers # rsconnect [![CRAN status](https://www.r-pkg.org/badges/version/rsconnect)](https://cran.r-project.org/package=rsconnect) [![lifecycle](https://img.shields.io/badge/lifecycle-stable-brightgreen.svg)](https://lifecycle.r-lib.org/articles/stages.html#stable) [![R-CMD-check](https://github.com/rstudio/rsconnect/workflows/R-CMD-check/badge.svg)](https://github.com/rstudio/rsconnect/actions) rsconnect makes it easy to publish your Shiny apps, RMarkdown and Quarto documents, and Plumber APIs to [Posit Connect](https://posit.co/products/enterprise/connect/), [ShinyApps.io](https://www.shinyapps.io/), and [Posit Cloud](https://posit.cloud/) from R. (If you’re looking for the Python equivalent, try [rsconnect-python](https://pypi.org/project/rsconnect-python/).) ## Installation You can install the released version of rsconnect from [CRAN](https://CRAN.R-project.org) with: ``` r install.packages("rsconnect") ``` And the development version from [GitHub](https://github.com/) with: ``` r # install.packages("devtools") devtools::install_github("rstudio/rsconnect") ``` ## Setup To use rsconnect, you first need to teach it about the server you want to publish to. If you use the RStudio IDE, the easiest way to get set up is to use the publishing dialog, which you can find by clicking the “Tools” menu, then selecting “Global options”, then clicking “Publishing”. Click “Connect” to add new servers. You can also connect from any R session by running a little code: - For shinyapps.io, go to your [tokens page](https://www.shinyapps.io/admin/#/tokens) and click “Add Token”, then follow the instructions to copy and paste the appropriate call to `setAccountInfo()`. Learn more in the [Getting Started Guide](https://shiny.rstudio.com/articles/shinyapps.html). - For Posit Connect, first use `addServer()` to register your server with rsconnect, then call either `connectUser()` or `connectApiUser()`. `connectUser()` is a bit simpler if you’re in an interactive session; `connectApiUser()` works anywhere but requires a you to copy and paste an API key from your user profile. - For Posit Cloud, login, then click your name in the top-right corner, click “Account”, then click “Tokens” in the navbar at the top of the page. Click “New Token”, then “Copy” next to the token you just created, and then follow the instructions to copy and paste the appropriate call to `setAccountInfo()`. Now that you’re setup you can use `deployApp()`, `deployDoc()`, and friends to publish your apps, documentations, APIs and more. rsconnect/man/0000755000176200001440000000000014536333553013035 5ustar liggesusersrsconnect/man/rsconnect-package.Rd0000644000176200001440000000200614513230050016670 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/rsconnect-package.R \docType{package} \name{rsconnect-package} \alias{rsconnect} \alias{rsconnect-package} \title{rsconnect: Deploy Docs, Apps, and APIs to 'Posit Connect', 'shinyapps.io', and 'RPubs'} \description{ \if{html}{\figure{logo.png}{options: style='float: right' alt='logo' width='120'}} Programmatic deployment interface for 'RPubs', 'shinyapps.io', and 'Posit Connect'. Supported content types include R Markdown documents, Shiny applications, Plumber APIs, plots, and static web content. } \seealso{ Useful links: \itemize{ \item \url{https://github.com/rstudio/rsconnect} \item Report bugs at \url{https://github.com/rstudio/rsconnect/issues} } } \author{ \strong{Maintainer}: Aron Atkins \email{aron@posit.co} Authors: \itemize{ \item Toph Allen \item Hadley Wickham \item Jonathan McPherson \item JJ Allaire } Other contributors: \itemize{ \item Posit Software, PBC [copyright holder, funder] } } \keyword{internal} rsconnect/man/rsconnectPackages.Rd0000644000176200001440000000042514513230050016741 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/rsconnect-package.R \name{rsconnectPackages} \alias{rsconnectPackages} \title{Using Packages with rsconnect} \description{ See ?\code{\link[=appDependencies]{appDependencies()}} } \keyword{internal} rsconnect/man/applicationConfigDir.Rd0000644000176200001440000000074414435652570017422 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/config.R \name{applicationConfigDir} \alias{applicationConfigDir} \title{Application Configuration Directory} \usage{ applicationConfigDir() } \value{ A string containing the path of the configuration folder. } \description{ Returns the root path used to store per user configuration data. Does not check old locations or create the path; use \code{rsconnectConfigDir} for most cases. } \keyword{internal} rsconnect/man/addConnectServer.Rd0000644000176200001440000000167714513230050016547 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/servers-deprec.R \name{addConnectServer} \alias{addConnectServer} \title{Add a server} \usage{ addConnectServer(url, name = NULL, certificate = NULL, quiet = FALSE) } \arguments{ \item{url}{URL for the server. Can be a bare hostname like \code{connect.mycompany.com} or a url like \verb{http://posit.mycompany.com/connect}.} \item{name}{Server name. If omitted, the server hostname is used.} \item{certificate}{Optional. Either a path to certificate file or a character vector containing the certificate's contents.} \item{quiet}{Suppress output and prompts where possible.} } \description{ \ifelse{html}{\href{https://lifecycle.r-lib.org/articles/stages.html#deprecated}{\figure{lifecycle-deprecated.svg}{options: alt='[Deprecated]'}}}{\strong{[Deprecated]}} This function does the same thing as \code{\link[=addServer]{addServer()}} so has been removed. } \keyword{internal} rsconnect/man/purgeApp.Rd0000644000176200001440000000170514435652570015113 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/purgeApp.R \name{purgeApp} \alias{purgeApp} \title{Purge an Application} \usage{ purgeApp(appName, account = NULL, server = NULL, quiet = FALSE) } \arguments{ \item{appName}{Name of application to purge} \item{account}{Account name. If a single account is registered on the system then this parameter can be omitted.} \item{server}{Server name. Required only if you use the same account name on multiple servers (see \code{\link[=servers]{servers()}})} \item{quiet}{Request that no status information be printed to the console during the termination.} } \description{ Purge a currently archived ShinyApps application. } \note{ This function only works for ShinyApps servers. } \examples{ \dontrun{ # purge an application purgeApp("myapp") } } \seealso{ \code{\link[=applications]{applications()}}, \code{\link[=deployApp]{deployApp()}}, and \code{\link[=restartApp]{restartApp()}} } rsconnect/man/addAuthorizedUser.Rd0000644000176200001440000000245014513230050016732 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/auth.R \name{addAuthorizedUser} \alias{addAuthorizedUser} \title{Add authorized user to application} \usage{ addAuthorizedUser( email, appDir = getwd(), appName = NULL, account = NULL, server = NULL, sendEmail = NULL, emailMessage = NULL ) } \arguments{ \item{email}{Email address of user to add.} \item{appDir}{Directory containing application. Defaults to current working directory.} \item{appName}{Name of application.} \item{account, server}{Uniquely identify a remote server with either your user \code{account}, the \code{server} name, or both. If neither are supplied, and there are multiple options, you'll be prompted to pick one. Use \code{\link[=accounts]{accounts()}} to see the full list of available options.} \item{sendEmail}{Send an email letting the user know the application has been shared with them.} \item{emailMessage}{Optional character vector of length 1 containing a custom message to send in email invitation. Defaults to NULL, which will use default invitation message.} } \description{ Add authorized user to application } \note{ This function works only for ShinyApps servers. } \seealso{ \code{\link[=removeAuthorizedUser]{removeAuthorizedUser()}} and \code{\link[=showUsers]{showUsers()}} } rsconnect/man/configureApp.Rd0000644000176200001440000000302014513230050015720 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/configureApp.R \name{configureApp} \alias{configureApp} \title{Configure an Application} \usage{ configureApp( appName, appDir = getwd(), account = NULL, server = NULL, redeploy = TRUE, size = NULL, instances = NULL, logLevel = c("normal", "quiet", "verbose") ) } \arguments{ \item{appName}{Name of application to configure} \item{appDir}{Directory containing application. Defaults to current working directory.} \item{account, server}{Uniquely identify a remote server with either your user \code{account}, the \code{server} name, or both. If neither are supplied, and there are multiple options, you'll be prompted to pick one. Use \code{\link[=accounts]{accounts()}} to see the full list of available options.} \item{redeploy}{Re-deploy application after its been configured.} \item{size}{Configure application instance size} \item{instances}{Configure number of application instances} \item{logLevel}{One of \code{"quiet"}, \code{"normal"} or \code{"verbose"}; indicates how much logging to the console is to be performed. At \code{"quiet"} reports no information; at \code{"verbose"}, a full diagnostic log is captured.} } \description{ Configure an application running on a remote server. } \note{ This function works only for ShinyApps servers. } \examples{ \dontrun{ # set instance size for an application configureApp("myapp", size="xlarge") } } \seealso{ \code{\link[=applications]{applications()}}, \code{\link[=deployApp]{deployApp()}} } rsconnect/man/syncAppMetadata.Rd0000644000176200001440000000100714513230050016357 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/applications.R \name{syncAppMetadata} \alias{syncAppMetadata} \title{Update deployment records} \usage{ syncAppMetadata(appPath = ".") } \arguments{ \item{appPath}{The path to the directory or file that was deployed.} } \description{ Update the deployment records for applications published to Posit Connect. This updates application title and URL, and deletes records for deployments where the application has been deleted on the server. } rsconnect/man/deployTFModel.Rd0000644000176200001440000000153414513230050016015 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/deployTFModel.R \name{deployTFModel} \alias{deployTFModel} \title{Deploy a TensorFlow saved model} \usage{ deployTFModel(modelDir, ...) } \arguments{ \item{modelDir}{Path to the saved model directory. Unused.} \item{...}{Unused.} } \description{ This function is defunct. Posit Connect no longer supports hosting of TensorFlow Model APIs. A TensorFlow model can be deployed as a \href{https://tensorflow.rstudio.com/guides/deploy/plumber.html}{Plumber API}, \href{https://tensorflow.rstudio.com/guides/deploy/shiny}{Shiny application}, or other supported content type. } \seealso{ Other Deployment functions: \code{\link{applications}()}, \code{\link{deployAPI}()}, \code{\link{deployApp}()}, \code{\link{deployDoc}()}, \code{\link{deploySite}()} } \concept{Deployment functions} rsconnect/man/generateAppName.Rd0000644000176200001440000000262014513230050016337 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/title.R \name{generateAppName} \alias{generateAppName} \title{Generate Application Name} \usage{ generateAppName(appTitle, appPath = NULL, account = NULL, unique = TRUE) } \arguments{ \item{appTitle}{A descriptive title for the application.} \item{appPath}{The path to the application's content, either a directory or an individual document. Optional.} \item{account}{The account where the application will be deployed. Optional.} \item{unique}{Whether to try to generate a unique name.} } \value{ Returns a valid short name for the application. } \description{ Generate a short name (identifier) for an application given an application title. } \details{ This function modifies the title until it forms a suitable application name. Suitable application names are 3 - 64 characters long and contain only alphanumeric characters. The function is intended to be used to find a name for a new application. If \code{appPath} and \code{account} are both specified, then the returned name will also be unique among locally known deployments of the directory (note that it is not guaranteed to be unique on the server). This behavior can be disabled by setting \code{unique = FALSE}. } \examples{ \dontrun{ # Generate a short name for a sample application generateAppName("My Father's Country", "~/fathers-country", "myacct") } } \keyword{internal} rsconnect/man/servers.Rd0000644000176200001440000000160314513230050014774 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/servers.R \name{servers} \alias{servers} \alias{serverInfo} \title{Server metadata} \usage{ servers(local = FALSE) serverInfo(name = NULL) } \arguments{ \item{local}{Return only local servers? (i.e. not automatically registered cloud servers)} \item{name}{Server name. If omitted, you'll be prompted to pick a server.} } \value{ \code{servers()} returns a data frame with registered server names and URLs. \code{serverInfo()} returns a list with details for a particular server. } \description{ \code{servers()} lists all known servers; \code{serverInfo()} gets metadata about a specific server. Cloud servers \code{shinyapps.io} and \code{posit.cloud} are always automatically registered and available. } \examples{ # List all registered servers servers() # Get information about a server serverInfo("posit.cloud") } rsconnect/man/addServer.Rd0000644000176200001440000000267414513230050015233 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/servers.R \name{addServer} \alias{addServer} \alias{removeServer} \alias{addServerCertificate} \title{Server management} \usage{ addServer(url, name = NULL, certificate = NULL, validate = TRUE, quiet = FALSE) removeServer(name = NULL) addServerCertificate(name, certificate, quiet = FALSE) } \arguments{ \item{url}{URL for the server. Can be a bare hostname like \code{connect.mycompany.com} or a url like \verb{http://posit.mycompany.com/connect}.} \item{name}{Server name. If omitted, the server hostname is used.} \item{certificate}{Optional. Either a path to certificate file or a character vector containing the certificate's contents.} \item{validate}{Validate that \code{url} actually points to a Posit Connect server?} \item{quiet}{Suppress output and prompts where possible.} } \description{ These functions manage the list of known servers: \itemize{ \item \code{addServer()} registers a Posit connect server. Once it has been registered, you can connect to an account on the server using \code{\link[=connectUser]{connectUser()}}. \item \code{removeServer()} removes a server from the registry. \item \code{addServerCertificate()} adds a certificate to a server. } } \examples{ \dontrun{ # register a local server addServer("http://myrsconnect/", "myserver") # list servers servers(local = TRUE) # connect to an account on the server connectUser(server = "myserver") } } rsconnect/man/showInvited.Rd0000644000176200001440000000162714513230050015614 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/auth.R \name{showInvited} \alias{showInvited} \title{List invited users for an application} \usage{ showInvited(appDir = getwd(), appName = NULL, account = NULL, server = NULL) } \arguments{ \item{appDir}{Directory containing application. Defaults to current working directory.} \item{appName}{Name of application.} \item{account, server}{Uniquely identify a remote server with either your user \code{account}, the \code{server} name, or both. If neither are supplied, and there are multiple options, you'll be prompted to pick one. Use \code{\link[=accounts]{accounts()}} to see the full list of available options.} } \description{ List invited users for an application } \note{ This function works only for ShinyApps servers. } \seealso{ \code{\link[=addAuthorizedUser]{addAuthorizedUser()}} and \code{\link[=showUsers]{showUsers()}} } rsconnect/man/removeAuthorizedUser.Rd0000644000176200001440000000201414513230050017473 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/auth.R \name{removeAuthorizedUser} \alias{removeAuthorizedUser} \title{Remove authorized user from an application} \usage{ removeAuthorizedUser( user, appDir = getwd(), appName = NULL, account = NULL, server = NULL ) } \arguments{ \item{user}{The user to remove. Can be id or email address.} \item{appDir}{Directory containing application. Defaults to current working directory.} \item{appName}{Name of application.} \item{account, server}{Uniquely identify a remote server with either your user \code{account}, the \code{server} name, or both. If neither are supplied, and there are multiple options, you'll be prompted to pick one. Use \code{\link[=accounts]{accounts()}} to see the full list of available options.} } \description{ Remove authorized user from an application } \note{ This function works only for ShinyApps servers. } \seealso{ \code{\link[=addAuthorizedUser]{addAuthorizedUser()}} and \code{\link[=showUsers]{showUsers()}} } rsconnect/man/unsetProperty.Rd0000644000176200001440000000215514513230050016211 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/configureApp.R \name{unsetProperty} \alias{unsetProperty} \title{Unset Application property} \usage{ unsetProperty( propertyName, appPath = getwd(), appName = NULL, account = NULL, server = NULL, force = FALSE ) } \arguments{ \item{propertyName}{Name of property} \item{appPath}{Directory or file that was deployed. Defaults to current working directory.} \item{appName}{Name of application} \item{account, server}{Uniquely identify a remote server with either your user \code{account}, the \code{server} name, or both. If neither are supplied, and there are multiple options, you'll be prompted to pick one. Use \code{\link[=accounts]{accounts()}} to see the full list of available options.} \item{force}{Forcibly unset the property} } \description{ Unset a property on currently deployed ShinyApps application (restoring to its default value) } \note{ This function only works for ShinyApps servers. } \examples{ \dontrun{ # unset application package cache property to revert to default unsetProperty("application.package.cache") } } rsconnect/man/discoverServers.Rd0000644000176200001440000000075114513230050016476 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/servers-deprec.R \name{discoverServers} \alias{discoverServers} \title{Discover servers automatically} \usage{ discoverServers(quiet = FALSE) } \description{ \ifelse{html}{\href{https://lifecycle.r-lib.org/articles/stages.html#deprecated}{\figure{lifecycle-deprecated.svg}{options: alt='[Deprecated]'}}}{\strong{[Deprecated]}} This function has never worked usefully, so has been removed. } \keyword{internal} rsconnect/man/deployAPI.Rd0000644000176200001440000000202114435652570015146 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/deployAPI.R \name{deployAPI} \alias{deployAPI} \title{Deploy a Plumber API} \usage{ deployAPI(api, ...) } \arguments{ \item{api}{Path to the API project directory. Must contain either \code{entrypoint.R} or \code{plumber.R}} \item{...}{Additional arguments to \code{\link[=deployApp]{deployApp()}}.} } \description{ Deploys an application consisting of plumber API routes. The given directory must contain a script returning a \code{plumb} object or a plumber API definition. } \details{ Deploy a plumber API definition by either supplying a directory containing \code{plumber.R} (an API definition) or \code{entrypoint.R} that returns a \code{plumb} object created by \code{plumber::plumb()}. See the plumber documentation for more information. } \seealso{ Other Deployment functions: \code{\link{applications}()}, \code{\link{deployApp}()}, \code{\link{deployDoc}()}, \code{\link{deploySite}()}, \code{\link{deployTFModel}()} } \concept{Deployment functions} rsconnect/man/rsconnectConfigDir.Rd0000644000176200001440000000100214435652570017101 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/config.R \name{rsconnectConfigDir} \alias{rsconnectConfigDir} \title{rsconnect Configuration Directory} \usage{ rsconnectConfigDir(subDir = NULL) } \arguments{ \item{subDir}{An optional subdirectory to be included as the last element of the path.} } \value{ The path to the configuration directory. } \description{ Forms the path to a location on disk where user-level configuration data for the package is stored. } \keyword{internal} rsconnect/man/setProperty.Rd0000644000176200001440000000226714513230050015652 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/configureApp.R \name{setProperty} \alias{setProperty} \title{Set Application property} \usage{ setProperty( propertyName, propertyValue, appPath = getwd(), appName = NULL, account = NULL, server = NULL, force = FALSE ) } \arguments{ \item{propertyName}{Name of property} \item{propertyValue}{Property value} \item{appPath}{Directory or file that was deployed. Defaults to current working directory.} \item{appName}{Name of application} \item{account, server}{Uniquely identify a remote server with either your user \code{account}, the \code{server} name, or both. If neither are supplied, and there are multiple options, you'll be prompted to pick one. Use \code{\link[=accounts]{accounts()}} to see the full list of available options.} \item{force}{Forcibly set the property} } \description{ Set a property on currently deployed ShinyApps application. } \note{ This function only works for ShinyApps servers. } \examples{ \dontrun{ # set instance size for an application setProperty("application.instances.count", 1) # disable application package cache setProperty("application.package.cache", FALSE) } } rsconnect/man/listAccountEnvVars.Rd0000644000176200001440000000300314513230050017074 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/envvars.R \name{listAccountEnvVars} \alias{listAccountEnvVars} \alias{updateAccountEnvVars} \title{Maintain environment variables across multiple applications} \usage{ listAccountEnvVars(server = NULL, account = NULL) updateAccountEnvVars(envVars, server = NULL, account = NULL) } \arguments{ \item{account, server}{Uniquely identify a remote server with either your user \code{account}, the \code{server} name, or both. If neither are supplied, and there are multiple options, you'll be prompted to pick one. Use \code{\link[=accounts]{accounts()}} to see the full list of available options.} \item{envVars}{Names of environment variables to update. Their values will be automatically retrieved from the current process. If you specify multiple environment variables, any application that uses any of them will be updated with all of them.} } \value{ \code{listAccountEnvVars()} returns a data frame with one row for each data frame. It has variables \code{id}, \code{guid}, \code{name}, and \code{envVars}. \code{envVars} is a list-column. } \description{ \itemize{ \item \code{listAccountEnvVars()} lists the environment variables used by every application published to the specified account. \item \code{updateAccountEnvVars()} updates the specified environment variables with their current values for every app that uses them. } Secure environment variable are currently only supported by Posit Connect so other server types will generate an error. } rsconnect/man/applications.Rd0000644000176200001440000000360114513230050015771 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/applications.R \name{applications} \alias{applications} \title{List Deployed Applications} \usage{ applications(account = NULL, server = NULL) } \arguments{ \item{account, server}{Uniquely identify a remote server with either your user \code{account}, the \code{server} name, or both. If neither are supplied, and there are multiple options, you'll be prompted to pick one. Use \code{\link[=accounts]{accounts()}} to see the full list of available options.} } \value{ Returns a data frame with the following columns: \tabular{ll}{ \code{id} \tab Application unique id \cr \code{name} \tab Name of application \cr \code{title} \tab Application title \cr \code{url} \tab URL where application can be accessed \cr \code{status} \tab Current status of application. Valid values are \code{pending}, \code{deploying}, \code{running}, \code{terminating}, and \code{terminated} \cr \code{size} \tab Instance size (small, medium, large, etc.) (on ShinyApps.io) \cr \code{instances} \tab Number of instances (on ShinyApps.io) \cr \code{config_url} \tab URL where application can be configured \cr } } \description{ List all applications currently deployed for a given account. } \note{ To register an account you call the \code{\link[=setAccountInfo]{setAccountInfo()}} function. } \examples{ \dontrun{ # list all applications for the default account applications() # list all applications for a specific account applications("myaccount") # view the list of applications in the data viewer View(applications()) } } \seealso{ \code{\link[=deployApp]{deployApp()}}, \code{\link[=terminateApp]{terminateApp()}} Other Deployment functions: \code{\link{deployAPI}()}, \code{\link{deployApp}()}, \code{\link{deployDoc}()}, \code{\link{deploySite}()}, \code{\link{deployTFModel}()} } \concept{Deployment functions} rsconnect/man/addLinter.Rd0000644000176200001440000000321614513230050015213 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/lint-framework.R, R/linters.R \name{addLinter} \alias{addLinter} \title{Add a Linter} \usage{ addLinter(name, linter) addLinter(name, linter) } \arguments{ \item{name}{The name of the linter, as a string.} \item{linter}{A \code{\link[=linter]{linter()}}.} } \description{ Add a linter, to be used in subsequent calls to \code{\link[=lint]{lint()}}. Add a linter, to be used in subsequent calls to \code{\link[=lint]{lint()}}. } \examples{ addLinter("no.capitals", linter( ## Identify lines containing capital letters -- either by name or by index apply = function(content, ...) { grep("[A-Z]", content) }, ## Only use this linter on R files (paths ending with .r or .R) takes = function(paths) { grep("[rR]$", paths) }, # Use the default message constructor message = function(content, lines, ...) { makeLinterMessage("Capital letters found on the following lines", content, lines) }, # Give a suggested prescription suggest = "Do not use capital letters in these documents." )) addLinter("no.capitals", linter( ## Identify lines containing capital letters -- either by name or by index apply = function(content, ...) { grep("[A-Z]", content) }, ## Only use this linter on R files (paths ending with .r or .R) takes = function(paths) { grep("[rR]$", paths) }, # Use the default message constructor message = function(content, lines, ...) { makeLinterMessage("Capital letters found on the following lines", content, lines) }, # Give a suggested prescription suggest = "Do not use capital letters in these documents." )) } rsconnect/man/lint.Rd0000644000176200001440000000122014513230050014244 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/lint.R \name{lint} \alias{lint} \title{Lint a Project} \usage{ lint(project, files = NULL, appPrimaryDoc = NULL) } \arguments{ \item{project}{Path to a project directory.} \item{files}{Specific files to lint. Can be NULL, in which case all the files in the directory will be linted.} \item{appPrimaryDoc}{The primary file in the project directory. Can be NULL, in which case it's inferred (if possible) from the directory contents.} } \description{ Takes the set of active linters (see \code{\link[=addLinter]{addLinter()}}), and applies them to all files within a project. } rsconnect/man/showUsage.Rd0000644000176200001440000000245114513230050015252 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/usage.R \name{showUsage} \alias{showUsage} \title{Show Application Usage} \usage{ showUsage( appDir = getwd(), appName = NULL, account = NULL, server = NULL, usageType = "hours", from = NULL, until = NULL, interval = NULL ) } \arguments{ \item{appDir}{Directory containing application. Defaults to current working directory.} \item{appName}{Name of application} \item{account, server}{Uniquely identify a remote server with either your user \code{account}, the \code{server} name, or both. If neither are supplied, and there are multiple options, you'll be prompted to pick one. Use \code{\link[=accounts]{accounts()}} to see the full list of available options.} \item{usageType}{Use metric to retreive (for example: "hours")} \item{from}{Date range starting timestamp (Unix timestamp or relative time delta such as "2d" or "3w").} \item{until}{Date range ending timestamp (Unix timestamp or relative time delta such as "2d" or "3w").} \item{interval}{Summarization interval. Data points at intervals less then this will be grouped. (Relative time delta e.g. "120s" or "1h" or "30d").} } \description{ Show application usage of a currently deployed application } \note{ This function only works for ShinyApps servers. } rsconnect/man/connectApiUser.Rd0000644000176200001440000000277014513230050016233 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/accounts.R \name{connectApiUser} \alias{connectApiUser} \alias{connectUser} \title{Register account on Posit Connect} \usage{ connectApiUser(account = NULL, server = NULL, apiKey, quiet = FALSE) connectUser( account = NULL, server = NULL, quiet = FALSE, launch.browser = getOption("rsconnect.launch.browser", interactive()) ) } \arguments{ \item{account}{A name for the account to connect.} \item{server}{The server to connect to.} \item{apiKey}{The API key used to authenticate the user} \item{quiet}{Whether or not to show messages and prompts while connecting the account.} \item{launch.browser}{If true, the system's default web browser will be launched automatically after the app is started. Defaults to \code{TRUE} in interactive sessions only. If a function is passed, it will be called after the app is started, with the app URL as a parameter.} } \description{ \code{connectUser()} and \code{connectApiUser()} connect your Posit Connect account to the rsconnect package so that it can deploy and manage applications on your behalf. \code{connectUser()} is the easiest place to start because it allows you to authenticate in-browser to your Posit Connect server. \code{connectApiUser()} is appropriate for non-interactive settings; you'll need to copy-and-paste the API key from your account settings. } \seealso{ Other Account functions: \code{\link{accounts}()}, \code{\link{setAccountInfo}()} } \concept{Account functions} rsconnect/man/deployDoc.Rd0000644000176200001440000000335014513230050015226 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/deployDoc.R \name{deployDoc} \alias{deployDoc} \title{Deploy a single document} \usage{ deployDoc(doc, ..., logLevel = c("normal", "quiet", "verbose")) } \arguments{ \item{doc}{Path to the document to deploy.} \item{...}{Additional arguments to \code{\link[=deployApp]{deployApp()}}. Do not supply \code{appDir}, \code{appFiles}, or \code{appPrimaryDoc}; these three parameters are automatically generated by \code{deployDoc} from the document.} \item{logLevel}{One of \code{"quiet"}, \code{"normal"} or \code{"verbose"}; indicates how much logging to the console is to be performed. At \code{"quiet"} reports no information; at \code{"verbose"}, a full diagnostic log is captured.} } \description{ Deploys a single R Markdown, Quarto document, or other file (e.g. \code{.html} or \code{.pdf}). When deploying an \code{.Rmd}, \code{.Qmd}, or \code{.html}, \code{deployDoc()} will attempt to automatically discover dependencies using \code{\link[rmarkdown:find_external_resources]{rmarkdown::find_external_resources()}}, and include an \code{.Rprofile} if present. If you find that the document is missing dependencies, either specify the dependencies explicitly in the document (see \code{\link[rmarkdown:find_external_resources]{rmarkdown::find_external_resources()}} for details), or call \code{\link[=deployApp]{deployApp()}} directly and specify your own file list in \code{appFiles}. } \examples{ \dontrun{ deployDoc("my-report.Rmd") deployDoc("static-file.html") } } \seealso{ Other Deployment functions: \code{\link{applications}()}, \code{\link{deployAPI}()}, \code{\link{deployApp}()}, \code{\link{deploySite}()}, \code{\link{deployTFModel}()} } \concept{Deployment functions} rsconnect/man/tasks.Rd0000644000176200001440000000162114513230050014430 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/tasks.R \name{tasks} \alias{tasks} \title{List Tasks} \usage{ tasks(account = NULL, server = NULL) } \arguments{ \item{account, server}{Uniquely identify a remote server with either your user \code{account}, the \code{server} name, or both. If neither are supplied, and there are multiple options, you'll be prompted to pick one. Use \code{\link[=accounts]{accounts()}} to see the full list of available options.} } \value{ Returns a data frame with the following columns: \tabular{ll}{ \code{id} \tab Task id \cr \code{action} \tab Task action\cr \code{status} \tab Current task status\cr \code{created_time} \tab Task creation time\cr \code{finished_time} \tab Task finished time\cr } } \description{ List Tasks } \examples{ \dontrun{ # list tasks for the default account tasks() } } \seealso{ \code{\link[=taskLog]{taskLog()}} } rsconnect/man/writeManifest.Rd0000644000176200001440000001172114513230050016126 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/writeManifest.R \name{writeManifest} \alias{writeManifest} \title{Create a \code{manifest.json}} \usage{ writeManifest( appDir = getwd(), appFiles = NULL, appFileManifest = NULL, appPrimaryDoc = NULL, appMode = NULL, contentCategory = NULL, python = NULL, forceGeneratePythonEnvironment = FALSE, quarto = NA, image = NULL, envManagement = NULL, envManagementR = NULL, envManagementPy = NULL, verbose = FALSE, quiet = FALSE ) } \arguments{ \item{appDir}{A directory containing an application (e.g. a Shiny app or plumber API). Defaults to the current directory.} \item{appFiles, appFileManifest}{Use \code{appFiles} to specify a character vector of files to bundle in the app or \code{appManifestFiles} to provide a path to a file containing a list of such files. If neither are supplied, will bundle all files in \code{appDir}, apart from standard exclusions and files listed in a \code{.rscignore} file. See \code{\link[=listDeploymentFiles]{listDeploymentFiles()}} for more details.} \item{appPrimaryDoc}{If the application contains more than one document, this parameter indicates the primary one, as a path relative to \code{appDir}. Can be \code{NULL}, in which case the primary document is inferred from the contents being deployed.} \item{appMode}{Optional; the type of content being deployed. Provide this option when the inferred type of content is incorrect. This can happen, for example, when static HTML content includes a downloadable Shiny application \code{app.R}. Accepted values include \code{"shiny"}, \code{"api"}, \code{"rmd-static"}, \code{"rmd-shiny"}, \code{"quarto-static"}, \code{"quarto-shiny"}, and \code{"static"}. The Posit Connect API Reference contains a full set of available values. Not all servers support all types of content.} \item{contentCategory}{Set this to \code{"site"} if you'd deploy with \code{\link[=deploySite]{deploySite()}}; otherwise leave as is.} \item{python}{Full path to a python binary for use by \code{reticulate}. Required if \code{reticulate} is a dependency of the app being deployed. If python = NULL, and RETICULATE_PYTHON or RETICULATE_PYTHON_FALLBACK is set in the environment, its value will be used. The specified python binary will be invoked to determine its version and to list the python packages installed in the environment.} \item{forceGeneratePythonEnvironment}{Optional. If an existing \code{requirements.txt} file is found, it will be overwritten when this argument is \code{TRUE}.} \item{quarto}{Should the deployed content be built by quarto? (\code{TRUE}, \code{FALSE}, or \code{NA}). The default, \code{NA}, will use quarto if there are \code{.qmd} files in the bundle, or if there is a \verb{_quarto.yml} and \code{.Rmd} files. (This option is ignored and quarto will always be used if the \code{metadata} contains \code{quarto_version} and \code{quarto_engines} fields.)} \item{image}{Optional. The name of the image to use when building and executing this content. If none is provided, Posit Connect will attempt to choose an image based on the content requirements.} \item{envManagement}{Optional. Should Posit Connect install R and Python packages for this content? (\code{TRUE}, \code{FALSE}, or \code{NULL}). The default, \code{NULL}, will not write any values to the bundle manifest, and Connect will fall back to the application default environment management strategy, or the server default if no application default is defined. (This option is a shorthand flag which overwrites the values of both \code{envManagementR} and \code{envManagementPy}.)} \item{envManagementR}{Optional. Should Posit Connect install R packages for this content? (\code{TRUE}, \code{FALSE}, or \code{NULL}). The default, \code{NULL}, will not write any values to the bundle manifest, and Connect will fall back to the application default R environment management strategy, or the server default if no application default is defined. (This option is ignored when \code{envManagement} is non-\code{NULL}.)} \item{envManagementPy}{Optional. Should Posit Connect install Python packages for this content? (\code{TRUE}, \code{FALSE}, or \code{NULL}). The default, \code{NULL}, will not write any values to the bundle manifest, and Connect will fall back to the application default Python environment management strategy, or the server default if no application default is defined. (This option is ignored when \code{envManagement} is non-\code{NULL}.)} \item{verbose}{If \code{TRUE}, prints detailed progress messages.} \item{quiet}{If \code{FALSE}, prints progress messages.} } \description{ Use \code{writeManifest()} to generate a \code{manifest.json}. Among other things, you can commit this file to git to activate \href{https://docs.posit.co/connect/user/git-backed/}{Git-Backed content} for Posit Connect. \code{manifest.json} contains a list of all files in the app along with their dependencies, so you will need to re-run \code{writeManifest()} when either of these change. } rsconnect/man/taskLog.Rd0000644000176200001440000000153614513230050014714 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/tasks.R \name{taskLog} \alias{taskLog} \title{Show task log} \usage{ taskLog(taskId, account = NULL, server = NULL, output = NULL) } \arguments{ \item{taskId}{Task Id} \item{account, server}{Uniquely identify a remote server with either your user \code{account}, the \code{server} name, or both. If neither are supplied, and there are multiple options, you'll be prompted to pick one. Use \code{\link[=accounts]{accounts()}} to see the full list of available options.} \item{output}{Where to write output. Valid values are \code{NULL} or \code{stderr}} } \description{ Writes the task log for the given task } \examples{ \dontrun{ # write task log to stdout taskLog(12345) # write task log to stderr taskLog(12345, output="stderr") } } \seealso{ \code{\link[=tasks]{tasks()}} } rsconnect/man/linter.Rd0000644000176200001440000000405014513230050014577 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/lint-framework.R, R/linters.R \name{linter} \alias{linter} \title{Create a Linter} \usage{ linter(apply, takes, message, suggestion) linter(apply, takes, message, suggestion) } \arguments{ \item{apply}{Function that, given the content of a file, returns the indices at which problems were found.} \item{takes}{Function that, given a set of paths, returns the subset of paths that this linter uses.} \item{message}{Function that, given content and lines, returns an informative message for the user. Typically generated with \code{\link[=makeLinterMessage]{makeLinterMessage()}}.} \item{suggestion}{String giving a prescribed fix for the linted problem.} } \description{ Generate a linter, which can identify errors or problematic regions in a project. Generate a linter, which can identify errors or problematic regions in a project. } \examples{ addLinter("no.capitals", linter( ## Identify lines containing capital letters -- either by name or by index apply = function(content, ...) { grep("[A-Z]", content) }, ## Only use this linter on R files (paths ending with .r or .R) takes = function(paths) { grep("[rR]$", paths) }, # Use the default message constructor message = function(content, lines, ...) { makeLinterMessage("Capital letters found on the following lines", content, lines) }, # Give a suggested prescription suggest = "Do not use capital letters in these documents." )) addLinter("no.capitals", linter( ## Identify lines containing capital letters -- either by name or by index apply = function(content, ...) { grep("[A-Z]", content) }, ## Only use this linter on R files (paths ending with .r or .R) takes = function(paths) { grep("[rR]$", paths) }, # Use the default message constructor message = function(content, lines, ...) { makeLinterMessage("Capital letters found on the following lines", content, lines) }, # Give a suggested prescription suggest = "Do not use capital letters in these documents." )) } rsconnect/man/figures/0000755000176200001440000000000014513230050014460 5ustar liggesusersrsconnect/man/figures/lifecycle-defunct.svg0000644000176200001440000000242414513230050020570 0ustar liggesusers lifecycle: defunct lifecycle defunct rsconnect/man/figures/lifecycle-maturing.svg0000644000176200001440000000243014513230050020763 0ustar liggesusers lifecycle: maturing lifecycle maturing rsconnect/man/figures/logo.png0000644000176200001440000005746314435652570016167 0ustar liggesusersPNG  IHDR!gAMA a cHRMz&u0`:pQ<bKGD pHYs+tIME)  ]IDATxwxTU;-d+ %$!( ])X( ˮUW/O]{(.VtB 4!ԙL/ɼg;ܙ=}իWs%,qw|βf U`u"&K B5y߁7ZdfY7"c# GTU`/!|hOni>L+Y7X{?~1L}%Lv{U46R+,?ۺ밻AL6M:_!CZեeXSfØ?t7_ᛍjm)^Y={}|ļ%kH=6e< |%JR7^AრZyA͇7̞1=6$,=RFekp fW^3 M~HS s?~sŖ VX_90O.`/d(s`AƔXSm ǯ7yeAl޼yWGOB7n7A`ĪrT*+8~TxyÏV;>,L"zyz%n ޿^Ւ%]ONF{!8xRxRwW~ہ ﯅Ui᧴`ӎ |XO΁Y>o@8$22SX,vw=M|[ 4~^- gt>!;[@t\}~5c] 4c+/")gP@P̺m;z5|Bv '1nRa1c/c}vI,^8@_GEzrnĒ{7@uBU[},!8,ooOv|5g(ȚG/R??wWnAg);~:ܓ@ɗC3ZzuV|BG > Je2,!L=p:g޿_Ec}-_XOq&|BW > \m/k쒮'd^jj5.\JBBBB0l0}~{풄 +NO]^xa ] hhhc H @j1bYƧk߂gt(>!Bggrp\hRAP__I&! jӖIlKR] >!{!\g/t/^Dyy9̬gjH$7Ρ܈w_{Y.ى~-dy)cƺv~b0sL0}iM[߶ry,R+,kub6po[ouoP(ϙB6X;P)[m9_%ϟϢ 8J).d];`ձ.o|ǼY(Zo m%%%fT*0f범lGz5v\.ﱧ<pB*:&n|vIB^9n_kt[,bE^m/J)Μ9R, T e!T*j5ֲ쒽p^BB eĘ>c/4VǡP( Ap%BRA,#22 9{)>ްu׃|{}J+Ϻ ۗ]immEVV @u;Ux_%AHJR,] ͺp ѣ],|`Di/r]GB6 CZ!wǏwSWv:hu.B^`S %k !)xU .\:A$n. @G ě^'`셁 <* 8qb1Fet6U]kgG@LgP"6/ڋJBVV1x`wǥkdtg[ww=,l +텄0H˘?=ľHcc#N8dDFF8n cMVmvI%@x B{(//G^^ ]c]PЗ69#b׬[iG` ܹ%/]0g JI.ã]8WUxmC>>J !XxM&XJ ز{OB.cMqx;f--ݍ=vIR0OqZwmBIb-?V~n{au{6VG1 BG'`P.(m[[ )܊aKlI|P[]eq\/U~ 셔CC !X:'7MZwI "b*|c t C ???֤'>r ~f 9̎ܮ|{96tzcbHX/hT*!ɠP(•%.IQGcv ^{-+VbfWVV . 88Æ GkV5% BBuQhz^Ubn&a _Kl ZMMMF666yt COܻy{\nv]!3|6{!AZFUBJ)JJJPPP( :䱕u؋ꆞkoR#M7WLjq쓩#pB)Ess3mnnqF* Ǟ.i>[@S\\˗/#>>B3>gz.Y`ju%ƥ,K^ahU*qkn@@ۖ v3Y{i 偸`lD\4V"!11qqq m%x൳&q,0=[M@1^-brǫ%_Z,/v\ES~~= (O^$C;>߶kUGYŋ'Hl.e ݾ)MѠUUU?&5w\ b 9ZըR@X}E"R~~,,8(&˝W;\wep']w@N@555RԦ (Oc߮XZTJ[.{t<\gR/W>p}F8(,DTXZztEe*_e l{x?/?tjhhV4u'*I!{j4x7&18 w D)v+A 8}kL (EۃTuF x'M@yζKv?ʪns_] G/C0Pˀ  aAb,E~,uʪ[PӠRF+PU>~;^w!"0 PR< Z8r5 ~<ޘ&:֝Pƫ B[Qk/څ˻.c)$ T:4xHѷwu*0,0m`-q y ǧp<!x}ؤű`QpJ1r6Lw5d*((b!?5Y4d`O} mG_VO+1\m<2`0Ha@AkaV  Po!~πc2շZ?fȧM@!11M@y b<4nZo\Td𙲄Ϻ-8V-NJR,~L3[dE з0%5$`(Ӧ]° . ,ϊVeA~T0Ȼھ 11hT` @?}3n6p @"&`@ ,FL@ (O!2:/vV:%%a0},AR>S_5GGs V/fZAD,ae Qx0` e@bR@:`DS -/ai֢^wj a@@"@?0-*.W()%PѾ (dtxߺOw_,>! IN w-=Dֵ2+uZEZf{V @GN1t)@ATQj-f5ɠ(Z4[_Zb{*:#TXX ⛀2nn,eI]Efc;$n&9r G:c6e cdekȷmᚄ -3F'D8UX 54Z C VDɺLݹ|7GKxU().xU旫 y=ZUe5mk}YbA,&l%h8qMPbF[XT?MdXvmA(Kp,B" ^i4Km!33ݗ߇Ky7݂O[kL .`p;(`cl^G 7O1-&EB=*`EÁ7;MEږP*"䂫֧kwj!V`jٵ]շƝEܽe?=fyNj HŠN2b"ho;R*N]@{6wxMVvka|vQי9'N.?k͇/_D_sfĠ`A);Llu1H*;v)q7H>W݈OE0LVDuxeB&F7E⓽ؒUÁAAD@^-YQ`ZНבKUF11q?D~ _ԯX[8 R Ń3$,81AL.~B7 N-CCÁx 2wf,D2 ~2! $ k^ cYF 3cz cB֏Y"hǫ&5"; n!,11no "Dbb??bxH{R0,\f(X]y̓5w(;CٚGīfKʡBkn(Ctvk6SX`,8 ÀRGpk19!,CC `臶T?m[Ah,C_kn+E C0(F A|!v<es-Z5@!!

=Qp0M0JKAH0(>cFዷQv*Jق rZ 9!"9AEP9]4X ; #z3F`n-rzY/d%`6~1`X!<HR <9)18vg qnkq I]oL!Xx0L)9˗qM  p""0 ӀP Z8 F#"*CGyT+B5! k>/CU3=d",LX%z#,a)V`I2AĔ<F"/:ݨ.MSH$BHHBB-%AO#StU1A"b$"iXĺ.S9^i!#P )mkX*% CDε kK/(#%Hwm,V_0iD^!-BtkГ;{e466qǕ \  rE/ZT`t'iz! `|ۏؚ(1m(9gt&):,VJ`"Tj(N5jz!"P*@ɩR<>1`DZZ ʛtB#:rw>PvC]au8_lg#C,v5HEqf*b)nx](i!r9ܢNmEN !  XAHUK{mc=KlnBmck/~Y>'!׭;/7Hحw(=(hQ"qu['<55,j[hp /vP2!zh:1E[SZ€aYK9pA"Gڻ؝Twh;|`o/(ABو%nhh  ɟ+Qw$Ƌ~r Dno2C1r)cDOqVb Pt%"'8`k /Wis3L XV.@V J}6NwB{,cכcp}aSniiASSQPP` nwڊ1Qם6G GF:2aaml}B%hZqP:^Ё!<CMn"Fo$DR1D~b}\€ mKPѪBIZ' H؞g1oR/5 0` nS01Q2 !1rf\,?Wj|vr{aL,ܶ~,`sbXB8ZЖW`X0P*atB 0BLg'sz"6ֈۑ[ւoQ#Tw%a``~v2@@A CA2i+A,W3& g[V2MBZ!Gjjjf -O fa .N5B[,t{L跮 mim۷G AG!\Ԃ5xSѿЋЗHw&yRqN]v䌻h>!3Ai VE0l:N~]B[Z-I[ "60%h;=:Th{ĉk-ɠnhc㮄rWqڥ''aq?NAk!́P "軽þLuhc/v:Xm]EYɀ ֗ֈ9q= 'Xh@ Ns%&%.?$øV*̼V0>t5B ^׵U@y;}n@{R O???pK `;^>+dvD^cK,]4I)ĔA\m7O&HIZ_]LJXAv3;47.'aD;F 9oh#4>Ov;QP4Տ^^Xn4Ӿ_11)mmǴ:3D xޡKU<oCl-2#ѿ7vvR=wl_C۱tn ]kAK!h;(jA?g]j,-ruu5򐑑DǃJܡ&(ַ .-5iZ㺮aH0v;v㘙经"%[wDoLl"ZA_tsDЇ[z9s&L03ᇿżQ[.YߝZY]xXgbKgz\xwf(ã|"H<'V>OMMM8y$ƏO*bð8e- ۷oi1t ~RCpHE %X}P vWimm!J*4,*Re焬T*TMOKj4iۻ҆ .}Z0najCH%miWL)QXg.]NC}}=PSSJ)$@Դb[ȇ!0PSBh48vFB{Yۣp-]ZckLYFi!̲-?6噑;:렔ըJBHH1tPpz\ȺppDO6pQ$%%u2[#-3 eF\i+9ZE-W3 mQ\Đs0!i5 a! @b4> ajZ[[mllD`` 1f̘nC& CJZRf B]TByGe׹aM: ]CNI#.iQLѢm "PL``1iH0\5 *QQ\RNB$ Pg~5552q Cbb"-*o(8 ).ԡT.)8~8X?o,OV"vV4Vk (8e]T*Exx8 bф-DDD",E50=J.Q1$%r^^4 ƎK9y ~Z"VPv ?|lfζUBuu5t:BCC#G,)݈p@=:İΝn#pD_^k(..F}}=ݳUlgЀYFDl@X]q\"Yˉnf.vz4σ bsN:>g?i xKKKQZZ yilQΚ=XV2,q}Z6555dN.ۂH$B53p0M8@` +%QD`i.c0W p|&g['x>S"1oXkp5נ@}}B\B)E"T@Q!Kq%L8#a)е60*}DnnZ?9nڶ1#P__gÇKL)у@rW.B?Lk$!B0au8XZKD]pO'MFxDDR8p HHH^S% **ȃ\yø=3#^NVIBb>II>eA^^ w8pjFM"6LB0`DFF… 8pF wWG\"ʫ0@6' ""#>zTUUlxT:p(A'y  fwH$ˆ#Ѐ3gK B{ײDQO2oE#""UBVeYD"dgg#r@"Bu=0E ~0C} ƓBR1B@C 펳uuuf%B2l.kQ'R HJk`5$+dQ'OBѸztIf"t.ׂ 2?fɢi =_ff&\bp$ Ǝ鹼<>}k"":7ȑ#섄>zƭʰa<}r?=zhcw[VZƞ={j*l߾ݡv{v8t}_ވaIۇ˗/Ǿ}g tȐ! 8?G <&)(^T(t]1bǥmr&ӧOG^^K>#fld2F,t:ODyڀf-3f Ο?߯ۅ.,2 >>'Oh ]_D"Zvu Dff&p!Ux !!.\pwQL 8o«7 kZCuu/E #GDmm-^ hjjBee%Jqtƽ{z}5BVT-W܅VEuu5ٽt6 b:-- 8vU/}_ hhhv=& KFɸJׯ?"<ѣGcƍ=h{nl߾իW;]8L 6 iiiHMMŔ)S,^{qAu1#11[2۷oǡCpauqJ$DEEa„ k0w\}ڄ 0sL;i&|1?W^y.]躎5 1qD ((([oު ח^z wy' 33rرcm۶nqb1姆,Y'4 }QlٲEAuu5z!8 ;9{,>غu+>c3VVVb…(--:/"nddd܂544`ѢE<^{ R<@ X9sشiktir-xp-XțMsylSE"^xi".**ܹs&b}o>,X;0\xٳg*ӟ'DܑM6\~A裏ZkLW_Zt:x V^'|ҫE 8Aȵ,z'aÆ^'6744;ﴺ<ʕ+Xrþ&}6n޼VOOعsǩT^?pQB R<(//7?~M4޵m|֑/k>,.\p:tqqq(++uVTO=EḸ83h4tN8aRnicc`„ hllđ#G\UVaڵvIII?~<Acz۷o7>311ј@1;;ۼBWlقdy֭[g1pϋ\-–O({o.w{ĉXfMH$7n Q[['N8 (;%mnU@&ukm˩!;w.ZN'tO?4V\i{ܸq8rӑk-S?-[jj*VZn555aӦMO{n\xyR)^~e,^Slܸ/%-[6k ,_IJeˌ+70y\qq1T*R7n#^}g7>?]r555v-cpS;]טpESQ]V/O=ry_}UwOH$<뮻zرcs] &UVaV_sS8M3g[om-]UU㻮A8?Lpg\rʛoi6jh޼yXv1kFWr9>,^kz{a֬Yݞg˗/˲_㱂 ?/l~'0O>ȑ#&?>x#k.^pی}p̙\ĜHy3---8rHJvv6~weW_}TIOOƍ=&S& >5H[ꫯ: 2$$6)TJ={t:Zà cX[0wnTjv%P0iކ = q:bK,xoB&UīwכU :ԒSzXcg}Əog\z?0mۆ'N@R_3'3bn9 ;\sL1湷rgeMq6%co7[ˍ7ѣ6~YZf.&Nopu:H&WeS5gd _>{| 6nhqO>gFNNƎkGPWWzg LTn,^C)]G&.܎v!܌hZjc6PDbqaM׉1o#l@,oߎ|wؼyxfPQQىA{ntM6W'OԩS{= 9T_YB󃟟ɱyI&ٵTPPbo{mV}JR˲m#33kz6]wןz)؂ }s2[p.\ 6:KK)5;hXӔd;vlbqwҺt֬Y9st{ y,_[nN[o^{Xdy!Dn߻iѢE&'j5,YszV[O=Tr-fW01o<_XiV[n1s%keWs!˽1rYYyKXp!Z"""ǡN'|braN!!!x}vݻwc4hZC=}ٓ'OMzj`HMMEpp0q^r|A;u^`7Kpc>}: <:\xj+W_7Y}:dmh:Zx1֯_owƼye֟I``GY@,?v^`q:aaa&(8 3D"+?H$ƒ>5k`…V& wڴiعs'VXau]RRR߷+3`,˺5o3ǏСC1k,l߾K.rڕdvm/$$7n/ܫ+Rcnuzæt[l1\ofgv;VqvXL<lnsb8u `\MzSRRz]0hHII\NNRiXrO8|0N+!Ʌ1cVu!VqהRdggc._E}ޠAf dWϝ;\xwWO/ uWJJJlS"~=o #F@SSS;(PTh4>!Imm-0n8g<4.!HMM;ej(//GAE475uj5D"1C\|<z%pA)tRDNN]ﯦH$¸q㐕t0?ygQ{5U 2& > aʑ(t:deeaȑB1s;Ǐ@gfF[R0 s 26uH1))]`4:R999w2)}N-_ں, %غS͙zdP(Vo[cσ8Z;nr}}=@T"fDGG\8| mZeKMu:=Vf r2h48&3s{,N=FA1$y8]7e3:î6,ٽ0!ދ[X V J]7ֆ޸7!ضiq""UW!88i.jΝ=3YQoewR!0r9lW8qƍpÁ6YTX{ի6:j5 pD'x^NtX]س,ҧf=ȭ-P$- H H H J98*B/l6:Ç{,B@eeekĩS֝+nrtL,bscPTFSwss<σ8Rion|WTXR?Fz455yeD) B^^T*b1R)d2BCCM![$-B4hFJAq>qq scdhhhJe?aŖ6e-VԺjC3P_xukk+Ν;RǛCTX 0|pd2;w^=筸mI"`@)5vH$H$2644cNRoTVV̙3Cbbd2$&&BTƍsh=BYYbժ8p6qu%8<n2 P(xE p hRmRʽ 3b\7}:0`ݳ W/z_@ҧ@ܠ9 jkPSeErd!b8sNS 4DҙI?126H|Bnq0,9EIA>J H ?B#0dH5zM]wѕ-NCKK bG) PVxo!#=v""wE!P+FDN^vĬϞƍ.PgkLEkk+V c44CRAĉ ChXbcc=v,l T VvVbBrrWIK.0&v fˑ|c'NG>h<oOVY>V}]-^ӈO_XP])g .d+ZDEEY^HnVJ`RQQR NTjQ7]RAXeš#*F+8 VN8@ExȜ1>--8J̲ T ѣ.BB@ttystL# ud,:dY?sʵ>zmjRPM3A40۷XY8b .S>|8N<#F830`MYM*+pR E7m #[+ٜ JJO@<#QV MpoA@^^RRR~H$;F;-5e!ɠP(+ohBHԲgO[5a`P6n.Tq <X>~VU}>1&B*kԫz%44 o"NALz<!!6CRW_FCY\)xk]O_,O햹~OSB?vx%{mr'iDTCm&+R#&&ƣnRYT1*C*\l~3:+`o [m=<={ ?6b=!,6RJQ\@$ %J)rssl#Ys߮N . 444:%ϕOE1V_,G} T&Z-3:V9GF㱿B\ /˗IAKK P(cmMM JKKifSh48w&s{!ޅ)o *ZP؆;?VUmOj]\RFϯ9saaa}kAPXXK.!<<ft:ף Æ (cDWrNApf0T"8iz}F'j'@xJ7l `{qZC6`dz,Yaɽr-%WJQP\ek (xS&gxDj())Ayy9j5  <4 T*t:0`w|#)~Za1y^\?5Y4UA0¢/*6w6aPV`~ SlximmŁpU)B:-~@@ӂa~ Ó8Z---PPMd2GDީ=}eRT1qLugsNZڦ~ok.]0g JU@t\jDRp% u|?FåU\R.j)hn+Le/&C SM{!@+nkrϟR,b?G῾p{¡*)jޖ(0uDHcc#Μ< 2a0R1tq {&nL4 ^- mMоœB$ʀ b.u8Ωvz:͖Md &bup>UUU(+GMM5xࡃ "2CL {VClڱ1qm8ex ל偸`lD)L.v淠BgD5R̙ |XN568^DU-AI-C;>߶k3ٜ;ϹK֜nwvI,X.T*n>&͍x54 ?3iYfقk]P8B?=N2XP9mrԇ͆ϱu&o呔R_Բ[6olVgG@LKH$v%O>*T{Nbk/^͟mjB\Pt `E@E}~X省ůGXeR5՘=/}y .ٰ5^xv}r-aYOkNCd]=p6 կSSݿ5+ >Ro/|۔35tiڴi CZ02kV<ǛLM?(Ik1"R4w^.b7_ Yi׳m.lϞzw#b/X6{JR,] ͺޢ755c(QF5] DC6fTdg7^EcC-uqw=W%A@AQ1/_F@)XBR`x`rS%䟷 EA[w}ztģl`O0Mv_;V䣢Z~;셮c}.sϡZڈa/t+d4#IeO =wWÇpUx x]҇1 ϞQ {iSWK7<^*NrVZg]ۖ[>̾v`{@%9BWB6`]2P?9j{`u+VwZK>Eھ{`>f.>!6K2H˘-BWї .IVN"රÌ>Lpxn|BD:ϕBWl]vI.{!Au?, ,[0)5%!)6%}8ZԭBW idLi]҇c BW/lvIӗ셮_ n)>.70sc/E 8{B6|5 P:F1U ]E2K_}jP*էB6d֬~k 㮇%y}e*)h0|er.»$g {P2> Xg!Kv ]Of%C -`ܹ o.i>{ 7nJ%{~ܵ&|BիWse(s/.0 2Lǽ>gl?~ <mX"}.yxn|-([Zl9P`l'0{O`]2$,=.z>!;e f>E(Y~b^H~a._H ف ^d =duT&ò{”s]n{~~c?awף/Y1 <XOKTU`>{' .I@; M1o2J%_X%}B'd,7_ a.)6}!vl]|B'd`aJTk87޺7f]ro;P*m)^AAm|y}麸0e\-ErpюOfM&vIv P*O#+imz8>!{8͞'XTiǾ_w{!!䬚o_/:0O^²s*|E!>{7a]7|B'd/|B/'d/֛f$4w`'!@KxӖ]']r&$E xrO;ww}؏O}g!>C% |9$=իW]f'>ŋ$u&쒧db>{a'>JG^ÇO?0 K%tEXtdate:create2021-10-13T16:26:39+00:002%tEXtdate:modify2021-03-31T19:54:36+00:004#MtEXtSoftwarewww.inkscape.org<IENDB`rsconnect/man/figures/lifecycle-archived.svg0000644000176200001440000000243014513230050020722 0ustar liggesusers lifecycle: archived lifecycle archived rsconnect/man/figures/lifecycle-soft-deprecated.svg0000644000176200001440000000246614513230050022217 0ustar liggesusers lifecycle: soft-deprecated lifecycle soft-deprecated rsconnect/man/figures/logo.svg0000644000176200001440000040251614435652570016173 0ustar liggesusers image/svg+xml rsconnect rsconnect/man/figures/lifecycle-questioning.svg0000644000176200001440000000244414513230050021507 0ustar liggesusers lifecycle: questioning lifecycle questioning rsconnect/man/figures/lifecycle-superseded.svg0000644000176200001440000000244014513230050021301 0ustar liggesusers lifecycle: superseded lifecycle superseded rsconnect/man/figures/lifecycle-stable.svg0000644000176200001440000000247214513230050020415 0ustar liggesusers lifecycle: stable lifecycle stable rsconnect/man/figures/lifecycle-experimental.svg0000644000176200001440000000245014513230050021634 0ustar liggesusers lifecycle: experimental lifecycle experimental rsconnect/man/figures/lifecycle-deprecated.svg0000644000176200001440000000244014513230050021236 0ustar liggesusers lifecycle: deprecated lifecycle deprecated rsconnect/man/deployApp.Rd0000644000176200001440000003103714536333553015265 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/deployApp.R \name{deployApp} \alias{deployApp} \title{Deploy an Application} \usage{ deployApp( appDir = getwd(), appFiles = NULL, appFileManifest = NULL, appPrimaryDoc = NULL, appSourceDoc = NULL, appName = NULL, appTitle = NULL, envVars = NULL, appId = NULL, appMode = NULL, contentCategory = NULL, account = NULL, server = NULL, upload = TRUE, recordDir = NULL, launch.browser = getOption("rsconnect.launch.browser", is_interactive()), on.failure = NULL, logLevel = c("normal", "quiet", "verbose"), lint = TRUE, metadata = list(), forceUpdate = NULL, python = NULL, forceGeneratePythonEnvironment = FALSE, quarto = NA, appVisibility = NULL, image = NULL, envManagement = NULL, envManagementR = NULL, envManagementPy = NULL, space = NULL ) } \arguments{ \item{appDir}{A directory containing an application (e.g. a Shiny app or plumber API). Defaults to the current directory.} \item{appFiles, appFileManifest}{Use \code{appFiles} to specify a character vector of files to bundle in the app or \code{appManifestFiles} to provide a path to a file containing a list of such files. If neither are supplied, will bundle all files in \code{appDir}, apart from standard exclusions and files listed in a \code{.rscignore} file. See \code{\link[=listDeploymentFiles]{listDeploymentFiles()}} for more details.} \item{appPrimaryDoc}{If the application contains more than one document, this parameter indicates the primary one, as a path relative to \code{appDir}. Can be \code{NULL}, in which case the primary document is inferred from the contents being deployed.} \item{appSourceDoc}{\ifelse{html}{\href{https://lifecycle.r-lib.org/articles/stages.html#deprecated}{\figure{lifecycle-deprecated.svg}{options: alt='[Deprecated]'}}}{\strong{[Deprecated]}} Please use \code{recordDir} instead.} \item{appName}{Application name, a string consisting of letters, numbers, \verb{_} and \code{-}. The application name is used to identify applications on a server, so must be unique. If not specified, the first deployment will be automatically it from the \code{appDir} for directory and website, and from the \code{appPrimaryDoc} for document. On subsequent deploys, it will use the previously stored value.} \item{appTitle}{Free-form descriptive title of application. Optional; if supplied, will often be displayed in favor of the name. If ommitted, on second and subsequent deploys, the title will be unchanged.} \item{envVars}{A character vector giving the names of environment variables whose values should be synchronised with the server (currently supported by Connect only). The values of the environment variables are sent over an encrypted connection and are not stored in the bundle, making this a safe way to send private data to Connect. The names (not values) are stored in the deployment record so that future deployments will automatically update their values. Other environment variables on the server will not be affected. This means that removing an environment variable from \code{envVars} will leave it unchanged on the server. To remove it, either delete it using the Connect UI, or temporarily unset it (with \code{Sys.unsetenv()} or similar) then re-deploy. Environment variables are set prior to deployment so that your code can use them and the first deployment can still succeed. Note that means that if the deployment fails, the values will still be updated.} \item{appId}{Use this to deploy to an exact known application, ignoring all existing deployment records and \code{appName}. You can use this to update an existing application that is missing a deployment record. If you're re-deploying an application that you created it's generally easier to use \code{appName}; \code{appId} is best reserved for re-deploying apps created by someone else. You can find the \code{appId} in the following places: \itemize{ \item On shinyapps.io, it's the \code{id} listed on the applications page. \item For Posit Connect, it's \code{guid} from the info tab on the content page. }} \item{appMode}{Optional; the type of content being deployed. Provide this option when the inferred type of content is incorrect. This can happen, for example, when static HTML content includes a downloadable Shiny application \code{app.R}. Accepted values include \code{"shiny"}, \code{"api"}, \code{"rmd-static"}, \code{"rmd-shiny"}, \code{"quarto-static"}, \code{"quarto-shiny"}, and \code{"static"}. The Posit Connect API Reference contains a full set of available values. Not all servers support all types of content.} \item{contentCategory}{Optional; classifies the kind of content being deployed (e.g. \code{"plot"} or \code{"site"}).} \item{account, server}{Uniquely identify a remote server with either your user \code{account}, the \code{server} name, or both. If neither are supplied, and there are multiple options, you'll be prompted to pick one. Use \code{\link[=accounts]{accounts()}} to see the full list of available options.} \item{upload}{If \code{TRUE} (the default) then the application is uploaded from the local system prior to deployment. If \code{FALSE} then it is re-deployed using the last version that was uploaded. \code{FALSE} is only supported on shinyapps.io; \code{TRUE} is required on Posit Connect.} \item{recordDir}{Directory where deployment record is written. The default, \code{NULL}, uses \code{appDir}, since this is usually where you want the deployment data to be stored. This argument is typically only needed when deploying a directory of static files since you want to store the record with the code that generated those files, not the files themselves.} \item{launch.browser}{If true, the system's default web browser will be launched automatically after the app is started. Defaults to \code{TRUE} in interactive sessions only. If a function is passed, it will be called after the app is started, with the app URL as a paramter.} \item{on.failure}{Function to be called if the deployment fails. If a deployment log URL is available, it's passed as a parameter.} \item{logLevel}{One of \code{"quiet"}, \code{"normal"} or \code{"verbose"}; indicates how much logging to the console is to be performed. At \code{"quiet"} reports no information; at \code{"verbose"}, a full diagnostic log is captured.} \item{lint}{Lint the project before initiating deployment, to identify potentially problematic code?} \item{metadata}{Additional metadata fields to save with the deployment record. These fields will be returned on subsequent calls to \code{\link[=deployments]{deployments()}}. Multi-value fields are recorded as comma-separated values and returned in that form. Custom value serialization is the responsibility of the caller.} \item{forceUpdate}{What should happen if there's no deployment record for the app, but there's an app with the same name on the server? If \code{TRUE}, will always update the previously-deployed app. If \code{FALSE}, will ask the user what to do, or fail if not in an interactive context. Defaults to \code{TRUE} when called automatically by the IDE, and \code{FALSE} otherwise. You can override the default by setting option \code{rsconnect.force.update.apps}.} \item{python}{Full path to a python binary for use by \code{reticulate}. Required if \code{reticulate} is a dependency of the app being deployed. If python = NULL, and RETICULATE_PYTHON or RETICULATE_PYTHON_FALLBACK is set in the environment, its value will be used. The specified python binary will be invoked to determine its version and to list the python packages installed in the environment.} \item{forceGeneratePythonEnvironment}{Optional. If an existing \code{requirements.txt} file is found, it will be overwritten when this argument is \code{TRUE}.} \item{quarto}{Should the deployed content be built by quarto? (\code{TRUE}, \code{FALSE}, or \code{NA}). The default, \code{NA}, will use quarto if there are \code{.qmd} files in the bundle, or if there is a \verb{_quarto.yml} and \code{.Rmd} files. (This option is ignored and quarto will always be used if the \code{metadata} contains \code{quarto_version} and \code{quarto_engines} fields.)} \item{appVisibility}{One of \code{NULL}, \code{"private"}, or \code{"public"}; the visibility of the deployment. When \code{NULL}, no change to visibility is made. Currently has an effect only on deployments to shinyapps.io.} \item{image}{Optional. The name of the image to use when building and executing this content. If none is provided, Posit Connect will attempt to choose an image based on the content requirements.} \item{envManagement}{Optional. Should Posit Connect install R and Python packages for this content? (\code{TRUE}, \code{FALSE}, or \code{NULL}). The default, \code{NULL}, will not write any values to the bundle manifest, and Connect will fall back to the application default environment management strategy, or the server default if no application default is defined. (This option is a shorthand flag which overwrites the values of both \code{envManagementR} and \code{envManagementPy}.)} \item{envManagementR}{Optional. Should Posit Connect install R packages for this content? (\code{TRUE}, \code{FALSE}, or \code{NULL}). The default, \code{NULL}, will not write any values to the bundle manifest, and Connect will fall back to the application default R environment management strategy, or the server default if no application default is defined. (This option is ignored when \code{envManagement} is non-\code{NULL}.)} \item{envManagementPy}{Optional. Should Posit Connect install Python packages for this content? (\code{TRUE}, \code{FALSE}, or \code{NULL}). The default, \code{NULL}, will not write any values to the bundle manifest, and Connect will fall back to the application default Python environment management strategy, or the server default if no application default is defined. (This option is ignored when \code{envManagement} is non-\code{NULL}.)} \item{space}{Optional. For Posit Cloud, the id of the space where the content should be deployed. If none is provided, content will be deployed to the deploying user's workspace or deployed to the same space in case of redeploy.} } \description{ Deploy a \link[shiny:shiny-package]{shiny} application, an \link[rmarkdown:rmarkdown-package]{RMarkdown} document, a plumber API, or HTML content to a server. } \details{ \subsection{Deployment records}{ When deploying an app, \code{deployApp()} will save a deployment record that makes it easy to update the app on server from your local source code. This generally means that you need to only need to supply important arguments (e.g. \code{appName}, \code{appTitle}, \code{server}/\code{account}) on the first deploy, and rsconnect will reuse the same settings on subsequent deploys. The metadata needs to make this work is stored in \verb{\{appDir\}/rsconnect/}. You should generally check these files into version control to ensure that future you and other collaborators will publish to the same location. If you have lost this directory, all is not lost, as \code{deployApp()} will attempt to rediscover existing deployments. This is easiest if you are updating an app that you created, as you can just supply the \code{appName} (and \code{server}/\code{account} if you have multiple accounts) and \code{deployApp()} will find the existing application account. If you need to update an app that was created by someone else (that you have write permission) for, you'll instead need to supply the \code{appId}. } } \examples{ \dontrun{ # deploy the application in the current working dir deployApp() # deploy an application in another directory deployApp("~/projects/shiny/app1") # deploy using an alternative application name and title deployApp("~/projects/shiny/app1", appName = "myapp", appTitle = "My Application") # deploy specifying an explicit account name, then # redeploy with no arguments (will automatically use # the previously specified account) deployApp(account = "jsmith") deployApp() # deploy but don't launch a browser when completed deployApp(launch.browser = FALSE) # deploy a Quarto website, using the quarto package to # find the Quarto binary deployApp("~/projects/quarto/site1") # deploy application with environment variables # (e.g., `SECRET_PASSWORD=XYZ` is set via an ~/.Renviron file) rsconnect::deployApp(envVars = c("SECRET_PASSWORD")) } } \seealso{ \code{\link[=applications]{applications()}}, \code{\link[=terminateApp]{terminateApp()}}, and \code{\link[=restartApp]{restartApp()}} Other Deployment functions: \code{\link{applications}()}, \code{\link{deployAPI}()}, \code{\link{deployDoc}()}, \code{\link{deploySite}()}, \code{\link{deployTFModel}()} } \concept{Deployment functions} rsconnect/man/showProperties.Rd0000644000176200001440000000152114514472171016354 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/configureApp.R \name{showProperties} \alias{showProperties} \title{Show Application property} \usage{ showProperties( appPath = getwd(), appName = NULL, account = NULL, server = NULL ) } \arguments{ \item{appPath}{Directory or file that was deployed. Defaults to current working directory.} \item{appName}{Name of application} \item{account, server}{Uniquely identify a remote server with either your user \code{account}, the \code{server} name, or both. If neither are supplied, and there are multiple options, you'll be prompted to pick one. Use \code{\link[=accounts]{accounts()}} to see the full list of available options.} } \description{ Show properties of an application deployed to ShinyApps. } \note{ This function works only for ShinyApps servers. } rsconnect/man/listDeploymentFiles.Rd0000644000176200001440000000432214513230050017303 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/bundleFiles.R \name{listDeploymentFiles} \alias{listDeploymentFiles} \title{Gather files to be bundled with an app} \usage{ listDeploymentFiles( appDir, appFiles = NULL, appFileManifest = NULL, error_call = caller_env() ) } \arguments{ \item{appDir}{A directory containing an application (e.g. a Shiny app or plumber API). Defaults to the current directory.} \item{appFiles, appFileManifest}{Use \code{appFiles} to specify a character vector of files to bundle in the app or \code{appManifestFiles} to provide a path to a file containing a list of such files. If neither are supplied, will bundle all files in \code{appDir}, apart from standard exclusions and files listed in a \code{.rscignore} file. See \code{\link[=listDeploymentFiles]{listDeploymentFiles()}} for more details.} \item{error_call}{The call or environment for error reporting; expert use only.} } \value{ Character of paths to bundle, relative to \code{appDir}. } \description{ Given an app directory, and optional \code{appFiles} and \code{appFileManifest} arguments, returns vector of paths to bundle in the app. (Note that documents follow a different strategy; see \code{\link[=deployDoc]{deployDoc()}} for details.) When neither \code{appFiles} nor \code{appFileManifest} is supplied, \code{listDeploymentFiles()} will include all files under \code{appDir}, apart from the following: \itemize{ \item Certain files and folders that don't need to be bundled, such as version control directories, internal config files, and RStudio state, are automatically excluded. \item You can exclude additional files by listing them in in a \code{.rscignore} file. This file must have one file or directory per line (with path relative to the current directory). It doesn't support wildcards, or ignoring files in subdirectories. } \code{listDeploymentFiles()} will throw an error if the total file size exceeds the maximum bundle size (as controlled by option \code{rsconnect.max.bundle.size}), or the number of files exceeds the maximum file limit (as controlled by option \code{rsconnect.max.bundle.files}). This prevents you from accidentally bundling a very large direcfory (i.e. you home directory). } rsconnect/man/resendInvitation.Rd0000644000176200001440000000213614513230050016632 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/auth.R \name{resendInvitation} \alias{resendInvitation} \title{Resend invitation for invited users of an application} \usage{ resendInvitation( invite, regenerate = FALSE, appDir = getwd(), appName = NULL, account = NULL, server = NULL ) } \arguments{ \item{invite}{The invitation to resend. Can be id or email address.} \item{regenerate}{Regenerate the invite code. Can be helpful is the invitation has expired.} \item{appDir}{Directory containing application. Defaults to current working directory.} \item{appName}{Name of application.} \item{account, server}{Uniquely identify a remote server with either your user \code{account}, the \code{server} name, or both. If neither are supplied, and there are multiple options, you'll be prompted to pick one. Use \code{\link[=accounts]{accounts()}} to see the full list of available options.} } \description{ Resend invitation for invited users of an application } \note{ This function works only for ShinyApps servers. } \seealso{ \code{\link[=showInvited]{showInvited()}} } rsconnect/man/terminateApp.Rd0000644000176200001440000000176514435652570015767 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/terminateApp.R \name{terminateApp} \alias{terminateApp} \title{Terminate an Application} \usage{ terminateApp(appName, account = NULL, server = NULL, quiet = FALSE) } \arguments{ \item{appName}{Name of application to terminate} \item{account}{Account name. If a single account is registered on the system then this parameter can be omitted.} \item{server}{Server name. Required only if you use the same account name on multiple servers (see \code{\link[=servers]{servers()}})} \item{quiet}{Request that no status information be printed to the console during the termination.} } \description{ Terminate and archive a currently deployed ShinyApps application. } \note{ This function only works for ShinyApps servers. } \examples{ \dontrun{ # terminate an application terminateApp("myapp") } } \seealso{ \code{\link[=applications]{applications()}}, \code{\link[=deployApp]{deployApp()}}, and \code{\link[=restartApp]{restartApp()}} } rsconnect/man/appDependencies.Rd0000644000176200001440000001360314513230050016375 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/appDependencies.R \name{appDependencies} \alias{appDependencies} \title{Detect application dependencies} \usage{ appDependencies( appDir = getwd(), appFiles = NULL, appFileManifest = NULL, appMode = NULL ) } \arguments{ \item{appDir}{A directory containing an application (e.g. a Shiny app or plumber API). Defaults to the current directory.} \item{appFiles, appFileManifest}{Use \code{appFiles} to specify a character vector of files to bundle in the app or \code{appManifestFiles} to provide a path to a file containing a list of such files. If neither are supplied, will bundle all files in \code{appDir}, apart from standard exclusions and files listed in a \code{.rscignore} file. See \code{\link[=listDeploymentFiles]{listDeploymentFiles()}} for more details.} \item{appMode}{Optional; the type of content being deployed. Provide this option when the inferred type of content is incorrect. This can happen, for example, when static HTML content includes a downloadable Shiny application \code{app.R}. Accepted values include \code{"shiny"}, \code{"api"}, \code{"rmd-static"}, \code{"rmd-shiny"}, \code{"quarto-static"}, \code{"quarto-shiny"}, and \code{"static"}. The Posit Connect API Reference contains a full set of available values. Not all servers support all types of content.} } \value{ A data frame with one row for each dependency (direct, indirect, and inferred), and 4 columns: \itemize{ \item \code{Package}: package name. \item \code{Version}: local version. \item \code{Source}: a short string describing the source of the package install, as described above. \item \code{Repository}: for CRAN and CRAN-like repositories, the URL to the repository. This will be ignored by the server if it has been configured with its own repository name -> repository URL mapping. } } \description{ \code{appDependencies()} recursively detects all R package dependencies for an application by parsing all \code{.R} and \code{.Rmd} files and looking for calls to \code{library()}, \code{require()}, \code{requireNamespace()}, \code{::}, and so on. It then adds implicit dependencies (i.e. an \code{.Rmd} requires Rmarkdown) and adds all recursive dependencies to create a complete manifest of package packages need to be installed to run the app. } \section{Dependency discovery}{ rsconnect use one of three mechanisms to find which packages your application uses: \enumerate{ \item If \code{renv.lock} is present, it will use the versions and sources defined in that file. If you're using the lockfile for some other purpose and don't want it to affect deployment, add \code{renv.lock} to \code{.rscignore}. \item Otherwise, rsconnect will call \code{renv::snapshot()} to find all packages used by your code. If you'd instead prefer to only use the packages declared in a \code{DESCRIPTION} file, run \code{renv::settings$snapshot.type("explicit")} to activate renv's "explicit" mode. \item Dependency resolution using renv is a new feature in rsconnect 1.0.0, and while we have done our best to test it, it still might fail for your app. If this happens, please \href{https://github.com/rstudio/rsconnect/issues}{file an issue} then set \code{options(rsconnect.packrat = TRUE)} to revert to the old dependency discovery mechanism. } } \section{Remote installation}{ When deployed, the app must first install all of these packages, and rsconnect ensures the versions used on the server will match the versions you used locally. It knows how to install packages from the following sources: \itemize{ \item CRAN and BioConductor (\code{Source: CRAN} or \code{Source: Bioconductor}). The remote server will ignore the specific CRAN or Bioconductor mirror that you use locally, always using the CRAN/BioC mirror that has been configured on the server. \item Other CRAN like and CRAN-like repositories. These packages will have a \code{Source} determined by the value of \code{getOptions("repos")}. For example, if you've set the following options: \if{html}{\out{

}}\preformatted{options( repos = c( CRAN = "https://cran.rstudio.com/", CORPORATE = "https://corporate-packages.development.company.com" ) ) }\if{html}{\out{
}} Then packages installed from your corporate package repository will have source \code{CORPORATE}. Posit Connect \href{https://docs.posit.co/connect/admin/appendix/configuration/#RPackageRepository}{can be configured} to override their repository url so that (e.g.) you can use different packages versions on staging and production servers. \item Packages installed from GitHub, GitLab, or BitBucket, have \code{Source} \code{github}, \code{gitlab}, and \code{bitbucket} respectively. When deployed, the bundle contains the additional metadata needed to precisely recreated the installed version. } It's not possible to recreate the packages that you have built and installed from a directory on your local computer. This will have \code{Source: NA} and will cause the deployment to error. To resolve this issue, you'll need to install from one of the known sources described above. } \section{Suggested packages}{ The \code{Suggests} field is not included when determining recursive dependencies, so it's possible that not every package required to run your application will be detected. For example, ggplot2's \code{geom_hex()} requires the hexbin package to be installed, but it is only suggested by ggplot2. So if your app uses \code{geom_hex()} it will fail, reporting that the hexbin package is not installed. You can overcome this problem with (e.g.) \code{requireNamespace(hexbin)}. This will tell rsconnect that your app needs the hexbin package, without otherwise affecting your code. } \examples{ \dontrun{ # dependencies for the app in the current working dir appDependencies() # dependencies for an app in another directory appDependencies("~/projects/shiny/app1") } } \seealso{ \link{rsconnectPackages}(Using Packages with rsconnect) } rsconnect/man/accountUsage.Rd0000644000176200001440000000214414513230050015725 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/usage.R \name{accountUsage} \alias{accountUsage} \title{Show Account Usage} \usage{ accountUsage( account = NULL, server = NULL, usageType = "hours", from = NULL, until = NULL, interval = NULL ) } \arguments{ \item{account, server}{Uniquely identify a remote server with either your user \code{account}, the \code{server} name, or both. If neither are supplied, and there are multiple options, you'll be prompted to pick one. Use \code{\link[=accounts]{accounts()}} to see the full list of available options.} \item{usageType}{Use metric to retreive (for example: "hours")} \item{from}{Date range starting timestamp (Unix timestamp or relative time delta such as "2d" or "3w").} \item{until}{Date range ending timestamp (Unix timestamp or relative time delta such as "2d" or "3w").} \item{interval}{Summarization interval. Data points at intervals less then this will be grouped. (Number of seconds or relative time delta e.g. "1h").} } \description{ Show account usage } \note{ This function only works for ShinyApps servers. } rsconnect/man/deploySite.Rd0000644000176200001440000000673314514472171015452 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/deploySite.R \name{deploySite} \alias{deploySite} \title{Deploy a website} \usage{ deploySite( siteDir = getwd(), siteName = NULL, siteTitle = NULL, account = NULL, server = NULL, render = c("none", "local", "server"), launch.browser = getOption("rsconnect.launch.browser", interactive()), logLevel = c("normal", "quiet", "verbose"), lint = FALSE, metadata = list(), python = NULL, recordDir = NULL, ... ) } \arguments{ \item{siteDir}{Directory containing website. Defaults to current directory.} \item{siteName}{Name for the site (names must be unique within an account). Defaults to the base name of the specified \code{siteDir} or to the name provided by a custom site generation function.} \item{siteTitle}{Title for the site. For quarto sites only, if not supplied uses the title recorded in \verb{_quarto.yml}.} \item{account, server}{Uniquely identify a remote server with either your user \code{account}, the \code{server} name, or both. If neither are supplied, and there are multiple options, you'll be prompted to pick one. Use \code{\link[=accounts]{accounts()}} to see the full list of available options.} \item{render}{Rendering behavior for site: \itemize{ \item \code{"none"} uploads a static version of the current contents of the site directory. \item \code{"local"} renders the site locally then uploads it. \item \code{"server"} uploads the source of the site to render on the server. } Note that for \code{"none"} and \code{"local"} source files (e.g. \code{.R}, \code{.Rmd} and \code{.md}) will not be uploaded to the server.} \item{launch.browser}{If true, the system's default web browser will be launched automatically after the app is started. Defaults to \code{TRUE} in interactive sessions only. If a function is passed, it will be called after the app is started, with the app URL as a paramter.} \item{logLevel}{One of \code{"quiet"}, \code{"normal"} or \code{"verbose"}; indicates how much logging to the console is to be performed. At \code{"quiet"} reports no information; at \code{"verbose"}, a full diagnostic log is captured.} \item{lint}{Lint the project before initiating deployment, to identify potentially problematic code?} \item{metadata}{Additional metadata fields to save with the deployment record. These fields will be returned on subsequent calls to \code{\link[=deployments]{deployments()}}. Multi-value fields are recorded as comma-separated values and returned in that form. Custom value serialization is the responsibility of the caller.} \item{python}{Full path to a python binary for use by \code{reticulate}. Required if \code{reticulate} is a dependency of the app being deployed. If python = NULL, and RETICULATE_PYTHON or RETICULATE_PYTHON_FALLBACK is set in the environment, its value will be used. The specified python binary will be invoked to determine its version and to list the python packages installed in the environment.} \item{recordDir}{The default, \code{NULL}, uses \code{siteDir}.} \item{...}{Additional arguments to \code{\link[=deployApp]{deployApp()}}. Do not supply \code{appDir} or \code{appFiles}; these parameters are automatically generated by \code{deploySite()}.} } \description{ Deploy an R Markdown or quarto website to a server. } \seealso{ Other Deployment functions: \code{\link{applications}()}, \code{\link{deployAPI}()}, \code{\link{deployApp}()}, \code{\link{deployDoc}()}, \code{\link{deployTFModel}()} } \concept{Deployment functions} rsconnect/man/forgetDeployment.Rd0000644000176200001440000000255014435652570016656 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/deployments.R \name{forgetDeployment} \alias{forgetDeployment} \title{Forget Application Deployment} \usage{ forgetDeployment( appPath = getwd(), name = NULL, account = NULL, server = NULL, dryRun = FALSE, force = !interactive() ) } \arguments{ \item{appPath}{The path to the content that was deployed, either a directory or an individual document.} \item{name}{The name of the content that was deployed (optional)} \item{account}{The name of the account to which the content was deployed (optional)} \item{server}{The name of the server to which the content was deployed (optional)} \item{dryRun}{Set to TRUE to preview the files/directories to be removed instead of actually removing them. Defaults to FALSE.} \item{force}{Set to TRUE to remove files and directories without prompting. Defaults to FALSE in interactive sessions.} } \value{ NULL, invisibly. } \description{ Forgets about an application deployment. This is useful if the application has been deleted on the server, or the local deployment information needs to be reset. } \details{ This method removes from disk the file containing deployment metadata. If "name", "account", and "server" are all NULL, then all of the deployments for the application are forgotten; otherwise, only the specified deployment is forgotten. } rsconnect/man/authorizedUsers.Rd0000644000176200001440000000063214435652570016526 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/auth.R \name{authorizedUsers} \alias{authorizedUsers} \title{(Deprecated) List authorized users for an application} \usage{ authorizedUsers(appDir = getwd()) } \arguments{ \item{appDir}{Directory containing application. Defaults to current working directory.} } \description{ (Deprecated) List authorized users for an application } rsconnect/man/rpubsUpload.Rd0000644000176200001440000000375014435652570015632 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/rpubs.R \name{rpubsUpload} \alias{rpubsUpload} \title{Upload a file to RPubs} \usage{ rpubsUpload(title, contentFile, originalDoc, id = NULL, properties = list()) } \arguments{ \item{title}{The title of the document.} \item{contentFile}{The path to the content file to upload.} \item{originalDoc}{The document that was rendered to produce the \code{contentFile}. May be \code{NULL} if the document is not known.} \item{id}{If this upload is an update of an existing document then the id parameter should specify the document id to update. Note that the id is provided as an element of the list returned by successful calls to \code{rpubsUpload}.} \item{properties}{A named list containing additional document properties (RPubs doesn't currently expect any additional properties, this parameter is reserved for future use).} } \value{ A named list. If the upload was successful then the list contains a \code{id} element that can be used to subsequently update the document as well as a \code{continueUrl} element that provides a URL that a browser should be opened to in order to complete publishing of the document. If the upload fails then the list contains an \code{error} element which contains an explanation of the error that occurred. } \description{ This function publishes a file to rpubs.com. If the upload succeeds a list that includes an \code{id} and \code{continueUrl} is returned. A browser should be opened to the \code{continueUrl} to complete publishing of the document. If an error occurs then a diagnostic message is returned in the \code{error} element of the list. } \examples{ \dontrun{ # upload a document result <- rpubsUpload("My document title", "Document.html") if (!is.null(result$continueUrl)) browseURL(result$continueUrl) else stop(result$error) # update the same document with a new title updateResult <- rpubsUpload("My updated title", "Document.html", id = result$id) } } rsconnect/man/accounts.Rd0000644000176200001440000000252114513230050015122 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/accounts.R \name{accounts} \alias{accounts} \alias{accountInfo} \alias{removeAccount} \title{Account Management Functions} \usage{ accounts(server = NULL) accountInfo(name = NULL, server = NULL) removeAccount(name = NULL, server = NULL) } \arguments{ \item{server}{Name of the server on which the account is registered (optional; see \code{\link[=servers]{servers()}})} \item{name}{Name of account} } \value{ \code{accounts} returns a data frame with the names of all accounts registered on the system and the servers on which they reside. \code{accountInfo} returns a list with account details. } \description{ Functions to enumerate and remove accounts on the local system. Prior to deploying applications you need to register your account on the local system. } \details{ You register an account using the \code{\link[=setAccountInfo]{setAccountInfo()}} function (for ShinyApps) or \code{\link[=connectUser]{connectUser()}} function (for other servers). You can subsequently remove the account using the \code{removeAccount} function. The \code{accounts} and \code{accountInfo} functions are provided for viewing previously registered accounts. } \seealso{ Other Account functions: \code{\link{connectApiUser}()}, \code{\link{setAccountInfo}()} } \concept{Account functions} rsconnect/man/makeLinterMessage.Rd0000644000176200001440000000106714513230050016707 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/lint.R \name{makeLinterMessage} \alias{makeLinterMessage} \title{Construct a Linter Message} \usage{ makeLinterMessage(header, content, lines) } \arguments{ \item{header}{A header message describing the linter.} \item{content}{The content of the file that was linted.} \item{lines}{The line numbers from \code{content} that contain lint.} } \description{ Pretty-prints a linter message. Primarily used as a helper for constructing linter messages with \code{\link[=linter]{linter()}}. } rsconnect/man/oldApplicationConfigDir.Rd0000644000176200001440000000131614513230050020033 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/configMigrate.R \name{oldApplicationConfigDir} \alias{oldApplicationConfigDir} \title{Old Application Config Directory} \usage{ oldApplicationConfigDir(appName) } \arguments{ \item{appName}{The application's name (connect or rsconnect)} } \value{ The old application configuration directory. } \description{ Returns the old application configuration directory used by rsconnect 0.8.24 and prior. These versions wrote configuration data to XDG compliant locations, but CRAN policy has since further restricted the disk locations that are permitted. See: } \details{ https://cran.r-project.org/web/packages/policies.html } \keyword{internal} rsconnect/man/showMetrics.Rd0000644000176200001440000000402114513230050015607 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/usage.R \name{showMetrics} \alias{showMetrics} \title{Show Application Metrics} \usage{ showMetrics( metricSeries, metricNames, appDir = getwd(), appName = NULL, account = NULL, server = "shinyapps.io", from = NULL, until = NULL, interval = NULL ) } \arguments{ \item{metricSeries}{Metric series to query. Refer to the \href{https://docs.posit.co/shinyapps.io/metrics.html#ApplicationMetrics}{shinyapps.io documentation} for available series.} \item{metricNames}{Metric names in the series to query. Refer to the \href{https://docs.posit.co/shinyapps.io/metrics.html#ApplicationMetrics}{shinyapps.io documentation} for available metrics.} \item{appDir}{A directory containing an application (e.g. a Shiny app or plumber API). Defaults to the current directory.} \item{appName}{Application name, a string consisting of letters, numbers, \verb{_} and \code{-}. The application name is used to identify applications on a server, so must be unique. If not specified, the first deployment will be automatically it from the \code{appDir} for directory and website, and from the \code{appPrimaryDoc} for document. On subsequent deploys, it will use the previously stored value.} \item{account, server}{Uniquely identify a remote server with either your user \code{account}, the \code{server} name, or both. If neither are supplied, and there are multiple options, you'll be prompted to pick one. Use \code{\link[=accounts]{accounts()}} to see the full list of available options.} \item{from}{Date range starting timestamp (Unix timestamp or relative time delta such as "2d" or "3w").} \item{until}{Date range ending timestamp (Unix timestamp or relative time delta such as "2d" or "3w").} \item{interval}{Summarization interval. Data points at intervals less then this will be grouped. (Relative time delta e.g. "120s" or "1h" or "30d").} } \description{ Show application metrics of a currently deployed application. This function only works for ShinyApps servers. } rsconnect/man/options.Rd0000644000176200001440000001260314513230050015000 0ustar liggesusers\name{rsconnectOptions} \alias{rsconnectOptions} \title{Package Options} \description{ The \pkg{rsconnect} package supports several options that control the method used for http communications, the printing of diagnostic information for http requests, and the launching of an external browser after deployment. } \details{ Supported global options include: \describe{ \item{\code{rsconnect.ca.bundle}}{Path to a custom bundle of Certificate Authority root certificates to use when connecting to servers via SSL. This option can also be specied in the environment variable \code{RSCONNECT_CA_BUNDLE}. Leave undefined to use your system's default certificate store.} \item{\code{rsconnect.check.certificate}}{Whether to check the SSL certificate when connecting to a remote host; defaults to \code{TRUE}. Setting to \code{FALSE} is insecure, but will allow you to connect to hosts using invalid certificates as a last resort.} \item{\code{rsconnect.http}}{Http implementation used for connections to the back-end service: \tabular{ll}{ \code{libcurl} \tab Secure https using the \code{curl} R package\cr \code{rcurl} \tab Secure https using the \code{Rcurl} R package (deprecated)\cr \code{curl} \tab Secure https using the curl system utility \cr \code{internal} \tab Insecure http using raw sockets\cr } If no option is specified then \code{libcurl} is used by default. } \item{\code{rsconnect.http.trace}}{When \code{TRUE}, trace http calls (prints the method, path, and total milliseconds for each http request)} \item{\code{rsconnect.http.trace.json}}{When \code{TRUE}, trace JSON content (shows JSON payloads sent to and received from the server))} \item{\code{rsconnect.http.verbose}}{When \code{TRUE}, print verbose output for http connections (useful only for debugging SSL certificate or http connection problems)} \item{\code{rsconnect.tar}}{By default, \code{rsconnect} uses R's internal \code{tar} implementation to compress content bundles. This may cause invalid bundles in some environments. In those cases, use this option to specify a path to an alternate \code{tar} executable. This option can also be specified in the environment variable \code{RSCONNECT_TAR}. Leave undefined to use the default \code{tar} implementation.} \item{\code{rsconnect.rcurl.options}}{A named list of additional cURL options to use when using the RCurl HTTP implementation in R. Run \code{RCurl::curlOptions()} to see available options.} \item{\code{rsconnect.libcurl.options}}{A named list of additional cURL options to use when using the curl HTTP implementation in R. Run \code{curl::curl_options()} to see available options.} \item{\code{rsconnect.error.trace}}{{When \code{TRUE}, print detailed stack traces for errors occurring during deployment.}} \item{\code{rsconnect.launch.browser}}{When \code{TRUE}, automatically launch a browser to view applications after they are deployed} \item{\code{rsconnect.locale.cache}}{When \code{FALSE}, disable the detected locale cache (Windows only). } \item{\code{rsconnect.locale}}{Override the detected locale. } \item{\code{rsconnect.max.bundle.size}}{The maximum size, in bytes, for deployed content. If not set, defaults to 3 GB.} \item{\code{rsconnect.max.bundle.files}}{The maximum number of files to deploy. If not set, defaults to 10,000.} \item{\code{rsconnect.force.update.apps}}{When \code{TRUE}, bypasses the prompt to confirm whether you wish to update previously-deployed content} \item{\code{rsconnect.pre.deploy}}{A function to run prior to deploying content; it receives as an argument the directory containing the content about to be deployed.} \item{\code{rsconnect.post.deploy}}{A function to run after successfully deploying content; it receives as an argument the directory containing the content about to be deployed.} \item{\code{rsconnect.python.enabled}}{When \code{TRUE}, use the python executable specified by the \code{RETICULATE_PYTHON} environment variable and add a \code{python} section to the deployment manifest. By default, python is enabled when deploying to Posit Connect and disabled when deploying to shinyapps.io.} } When deploying content from the RStudio IDE, the rsconnect package's deployment methods are executed in a vanilla R session that doesn't execute startup scripts. This can make it challenging to ensure options are set properly prior to push-button deployment, so the rsconnect package has a parallel set of ``startup'' scripts it runs prior to deploying. The follow are run in order, if they exist, prior to deployment: \describe{ \item{\code{$R_HOME/etc/rsconnect.site}}{Like \code{Rprofile.site}; for site-wide pre-flight and options.} \item{\code{~/.rsconnect_profile}}{Like \code{.Rprofile}; for user-specific content.} \item{\code{$PROJECT/.rsconnect_profile}}{Like \code{.Rprofile} for projects; \code{$PROJECT} here refers to the root directory of the content being deployed.} } Note that, unlike \code{.Rprofile}, these files don't replace each other; \emph{all three} will be run if they exist. } \examples{ \dontrun{ # use curl for http connections options(rsconnect.http = "curl") # trace http requests options(rsconnect.http.trace = TRUE) # print verbose output for http requests options(rsconnect.http.verbose = TRUE) # print JSON content options(rsconnect.http.trace.json = TRUE) # don't automatically launch a browser after deployment options(rsconnect.launch.browser = FALSE) } } rsconnect/man/restartApp.Rd0000644000176200001440000000174214435652570015456 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/restartApp.R \name{restartApp} \alias{restartApp} \title{Restart an Application} \usage{ restartApp(appName, account = NULL, server = NULL, quiet = FALSE) } \arguments{ \item{appName}{Name of application to restart} \item{account}{Account name. If a single account is registered on the system then this parameter can be omitted.} \item{server}{Server name. Required only if you use the same account name on multiple servers (see \code{\link[=servers]{servers()}})} \item{quiet}{Request that no status information be printed to the console during the operation.} } \description{ Restart an application currently running on a remote server. } \note{ This function works only for ShinyApps servers. } \examples{ \dontrun{ # restart an application restartApp("myapp") } } \seealso{ \code{\link[=applications]{applications()}}, \code{\link[=deployApp]{deployApp()}}, and \code{\link[=terminateApp]{terminateApp()}} } rsconnect/man/listBundleFiles.Rd0000644000176200001440000000222014513230050016367 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/bundleFiles.R \name{listBundleFiles} \alias{listBundleFiles} \title{List Files to be Bundled} \usage{ listBundleFiles(appDir) } \arguments{ \item{appDir}{Directory containing the application.} } \value{ Returns a list containing the following elements: \itemize{ \item \code{totalFiles}: Total number of files. \item \code{totalSize}: Total size of the files (in bytes). \item \code{contents}: Paths to bundle, relative to \code{appDir}. } } \description{ \ifelse{html}{\href{https://lifecycle.r-lib.org/articles/stages.html#superseded}{\figure{lifecycle-superseded.svg}{options: alt='[Superseded]'}}}{\strong{[Superseded]}} \code{listBundleFiles()} has been superseded in favour of \code{\link[=listDeploymentFiles]{listDeploymentFiles()}}. Given a directory containing an application, returns the names of the files that by default will be bundled in the application. It works similarly to a recursive directory listing from \code{\link[=list.files]{list.files()}} but enforces bundle sizes as described in \code{\link[=listDeploymentFiles]{listDeploymentFiles()}} } \keyword{internal} rsconnect/man/setAccountInfo.Rd0000644000176200001440000000145714513230050016236 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/accounts.R \name{setAccountInfo} \alias{setAccountInfo} \title{Register account on shinyapps.io or posit.cloud} \usage{ setAccountInfo(name, token, secret, server = "shinyapps.io") } \arguments{ \item{name}{Name of account to save or remove} \item{token}{User token for the account} \item{secret}{User secret for the account} \item{server}{Server to associate account with.} } \description{ Configure a ShinyApps or Posit Cloud account for publishing from this system. } \examples{ \dontrun{ # register an account setAccountInfo("user", "token", "secret") # remove the same account removeAccount("user") } } \seealso{ Other Account functions: \code{\link{accounts}()}, \code{\link{connectApiUser}()} } \concept{Account functions} rsconnect/man/showUsers.Rd0000644000176200001440000000163314513230050015310 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/auth.R \name{showUsers} \alias{showUsers} \title{List authorized users for an application} \usage{ showUsers(appDir = getwd(), appName = NULL, account = NULL, server = NULL) } \arguments{ \item{appDir}{Directory containing application. Defaults to current working directory.} \item{appName}{Name of application.} \item{account, server}{Uniquely identify a remote server with either your user \code{account}, the \code{server} name, or both. If neither are supplied, and there are multiple options, you'll be prompted to pick one. Use \code{\link[=accounts]{accounts()}} to see the full list of available options.} } \description{ List authorized users for an application } \note{ This function works only for ShinyApps servers. } \seealso{ \code{\link[=addAuthorizedUser]{addAuthorizedUser()}} and \code{\link[=showInvited]{showInvited()}} } rsconnect/man/showLogs.Rd0000644000176200001440000000246414435652570015140 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/applications.R \name{showLogs} \alias{showLogs} \title{Show Application Logs} \usage{ showLogs( appPath = getwd(), appFile = NULL, appName = NULL, account = NULL, server = NULL, entries = 50, streaming = FALSE ) } \arguments{ \item{appPath}{The path to the directory or file that was deployed.} \item{appFile}{The path to the R source file that contains the application (for single file applications).} \item{appName}{The name of the application to show logs for. May be omitted if only one application deployment was made from \code{appPath}.} \item{account}{The account under which the application was deployed. May be omitted if only one account is registered on the system.} \item{server}{Server name. Required only if you use the same account name on multiple servers.} \item{entries}{The number of log entries to show. Defaults to 50 entries.} \item{streaming}{Whether to stream the logs. If \code{TRUE}, then the function does not return; instead, log entries are written to the console as they are made, until R is interrupted. Defaults to \code{FALSE}.} } \description{ Show the logs for a deployed ShinyApps application. } \note{ This function only uses the \code{libcurl} transport, and works only for ShinyApps servers. } rsconnect/man/deployments.Rd0000644000176200001440000000351014513230050015645 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/deployments.R \name{deployments} \alias{deployments} \title{List Application Deployments} \usage{ deployments( appPath = ".", nameFilter = NULL, accountFilter = NULL, serverFilter = NULL, excludeOrphaned = TRUE ) } \arguments{ \item{appPath}{The path to the content that was deployed, either a directory or an individual document.} \item{nameFilter}{Return only deployments matching the given name (optional)} \item{accountFilter}{Return only deployments matching the given account (optional)} \item{serverFilter}{Return only deployments matching the given server (optional)} \item{excludeOrphaned}{If \code{TRUE} (the default), return only deployments made by a currently registered account. Deployments made from accounts that are no longer registered (via e.g.\code{\link[=removeAccount]{removeAccount()}}) will not be returned.} } \value{ Returns a data frame with at least following columns: \tabular{ll}{ \code{name} \tab Name of deployed application\cr \code{account} \tab Account owning deployed application\cr \code{bundleId} \tab Identifier of deployed application's bundle\cr \code{url} \tab URL of deployed application\cr \code{deploymentFile} \tab Name of configuration file\cr } If additional metadata has been saved with the deployment record using the \code{metadata} argument to \code{\link[=deployApp]{deployApp()}}, the frame will include additional columns. } \description{ List deployment records for a given application. } \examples{ \dontrun{ # Return all deployments of the ~/r/myapp directory made with the 'abc' # account deployments("~/r/myapp", accountFilter="abc") } } \seealso{ \code{\link[=applications]{applications()}} to get a list of deployments from the server, and \code{\link[=deployApp]{deployApp()}} to create a new deployment. } rsconnect/man/rsconnectProxies.Rd0000644000176200001440000000040214513230050016647 0ustar liggesusers% Generated by roxygen2: do not edit by hand % Please edit documentation in R/rsconnect-package.R \name{rsconnectProxies} \alias{rsconnectProxies} \title{HTTP Proxy Configuration} \description{ Please see \code{vignette("custom-http")}. } \keyword{internal} rsconnect/DESCRIPTION0000644000176200001440000000321414536742742013774 0ustar liggesusersType: Package Package: rsconnect Title: Deploy Docs, Apps, and APIs to 'Posit Connect', 'shinyapps.io', and 'RPubs' Version: 1.2.0 Authors@R: c( person("Aron", "Atkins", , "aron@posit.co", role = c("aut", "cre")), person("Toph", "Allen", role = "aut"), person("Hadley", "Wickham", role = "aut"), person("Jonathan", "McPherson", role = "aut"), person("JJ", "Allaire", role = "aut"), person("Posit Software, PBC", role = c("cph", "fnd")) ) Description: Programmatic deployment interface for 'RPubs', 'shinyapps.io', and 'Posit Connect'. Supported content types include R Markdown documents, Shiny applications, Plumber APIs, plots, and static web content. License: GPL-2 URL: https://github.com/rstudio/rsconnect BugReports: https://github.com/rstudio/rsconnect/issues Depends: R (>= 3.5.0) Imports: cli, curl, digest, jsonlite, lifecycle, openssl (>= 2.0.0), packrat (>= 0.6), renv (>= 1.0.0), rlang (>= 1.0.0), rstudioapi (>= 0.5), tools, yaml (>= 2.1.5) Suggests: Biobase, BiocManager, foreign, knitr, MASS, plumber (>= 0.3.2), quarto, RCurl, reticulate, rmarkdown (>= 1.1), shiny, testthat (>= 3.1.9), webfakes, withr VignetteBuilder: knitr Config/Needs/website: tidyverse/tidytemplate Config/testthat/edition: 3 Config/testthat/parallel: true Encoding: UTF-8 RoxygenNote: 7.2.3 NeedsCompilation: no Packaged: 2023-12-14 22:20:58 UTC; aron Author: Aron Atkins [aut, cre], Toph Allen [aut], Hadley Wickham [aut], Jonathan McPherson [aut], JJ Allaire [aut], Posit Software, PBC [cph, fnd] Maintainer: Aron Atkins Repository: CRAN Date/Publication: 2023-12-15 03:20:02 UTC rsconnect/build/0000755000176200001440000000000014536677711013370 5ustar liggesusersrsconnect/build/vignette.rds0000644000176200001440000000033314536677711015726 0ustar liggesusersb```b`afd`b2 1# 'O.-.()) MAtKgg+x()@6'$7ME@„5/17vԂԼ?iN,/AQU▙ 7$apq2݀a>9`~BMI,F(WJbI^ZP?rsconnect/tests/0000755000176200001440000000000014513230050013403 5ustar liggesusersrsconnect/tests/testthat/0000755000176200001440000000000014536742742015270 5ustar liggesusersrsconnect/tests/testthat/shinyapp-with-absolute-paths/0000755000176200001440000000000014513230050023000 5ustar liggesusersrsconnect/tests/testthat/shinyapp-with-absolute-paths/ShinyDocument.Rmd0000644000176200001440000000407514467166424026270 0ustar liggesusers--- title: "Shiny Document" author: "Phoenix Wright" date: "July 16, 2014" output: html_document runtime: shiny --- This R Markdown document is made interactive using Shiny. Unlike the more traditional workflow of creating static reports, you can now create documents that allow your readers to change the assumptions underlying your analysis and see the results immediately. To learn more, see [Interative Documents](http://rmarkdown.rstudio.com/authoring_shiny.html). ## Inputs and Outputs You can embed Shiny inputs and outputs in your document. Outputs are automatically updated whenever inputs change. This demonstrates how a standard R plot can be made interactive by wrapping it in the Shiny `renderPlot` function. The `selectInput` and `sliderInput` functions create the input widgets used to drive the plot. ```{r, echo=FALSE} inputPanel( selectInput("n_breaks", label = "Number of bins:", choices = c(10, 20, 35, 50), selected = 20), sliderInput("bw_adjust", label = "Bandwidth adjustment:", min = 0.2, max = 2, value = 1, step = 0.2) ) renderPlot({ hist(faithful$eruptions, probability = TRUE, breaks = as.numeric(input$n_breaks), xlab = "Duration (minutes)", main = "Geyser eruption duration") dens <- density(faithful$eruptions, adjust = input$bw_adjust) lines(dens, col = "blue") }) ``` ## Embedded Application It's also possible to embed an entire Shiny application within an R Markdown document using the `shinyAppDir` function. This example embeds a Shiny application located in another directory: ```{r, echo=FALSE} shinyAppDir( file.path("~/home/file.txt"), options = list( width = "100%", height = 550 ) ) ``` Note the use of the `height` parameter to determine how much vertical space the embedded application should occupy. You can also use the `shinyApp` function to define an application inline rather then in an external directory. In all of R code chunks above the `echo = FALSE` attribute is used. This is to prevent the R code within the chunk from rendering in the document alongside the Shiny components. rsconnect/tests/testthat/shinyapp-with-absolute-paths/data/0000755000176200001440000000000014513230050023711 5ustar liggesusersrsconnect/tests/testthat/shinyapp-with-absolute-paths/data/College.txt0000644000176200001440000000001514513230050026020 0ustar liggesusersfake,42,data rsconnect/tests/testthat/shinyapp-with-absolute-paths/server.R0000644000176200001440000000206114513230050024430 0ustar liggesusers # This is the server logic for a Shiny web application. # You can find out more about building applications with Shiny here: # # http://shiny.rstudio.com # library(shiny) shinyServer(function(input, output) { output$distPlot <- renderPlot({ # read a file on disk otherFile <- read.table("~/.rsconnect-tests/local-file.txt") anotherFile <- readLines("../../foo.bar") serverFile <- "\\\\server\\path\\to\\file" validWeblink <- "//www.google.com/" # generate bins based on input$bins from ui.R x <- faithful[, 2] bins <- seq(min(x), max(x), length.out = input$bins + 1) # don't warn on this line text <- paste0("x:", round(new_row$x, 2), " y:", round(new_row$y, 2)) # draw the histogram with the specified number of bins hist(x, breaks = bins, col = "darkgray", border = "white") ## read a csv file file <- read.csv("data/college.txt") ## bad file <- read.csv("data/College.txt") ## okay ## don't warn about absolute paths that could be URL query paths file <- paste("/applcations") }) }) rsconnect/tests/testthat/shinyapp-with-absolute-paths/ui.R0000644000176200001440000000123314467166424023564 0ustar liggesusers # This is the user-interface definition of a Shiny web application. # You can find out more about building applications with Shiny here: # # http://shiny.rstudio.com # library(shiny) shinyUI(fluidPage( # Application title titlePanel("Old Faithful Geyser Data"), # Some image img(src = "/images/icon.png"), # Sidebar with a slider input for number of bins sidebarLayout( sidebarPanel( sliderInput("bins", "Number of bins:", min = 1, max = 50, value = 30) ), # Show a plot of the generated distribution mainPanel( plotOutput("distPlot") ) ) )) rsconnect/tests/testthat/shinyapp-with-absolute-paths/ShinyPresentation.Rmd0000644000176200001440000000230614467166424027160 0ustar liggesusers--- title: "Shiny Presentation" author: "Miles Edgeworth" date: "July 16, 2014" output: ioslides_presentation runtime: shiny --- ## Shiny Presentation This R Markdown presentation is made interactive using Shiny. The viewers of the presentation can change the assumptions underlying what's presented and see the results immediately. To learn more, see [Interative Documents](http://rmarkdown.rstudio.com/authoring_shiny.html). Here's some internal help: [Helpful Link](/Users/MrBurns/) And another: [Favourite Goats](../../goats.txt) ## Slide with Interactive Plot ```{r, echo=FALSE} inputPanel( selectInput("n_breaks", label = "Number of bins:", choices = c(10, 20, 35, 50), selected = 20), sliderInput("bw_adjust", label = "Bandwidth adjustment:", min = 0.2, max = 2, value = 1, step = 0.2) ) renderPlot({ hist(faithful$eruptions, probability = TRUE, breaks = as.numeric(input$n_breaks), xlab = "Duration (minutes)", main = "Geyser eruption duration") dens <- density(faithful$eruptions, adjust = input$bw_adjust) lines(dens, col = "blue") }) ``` ## Slide with Bullets - Bullet 1 - Bullet 2 - Bullet 3 ## Slide with R Code and Output ```{r} summary(cars) ``` rsconnect/tests/testthat/test-http-curl.R0000644000176200001440000000041614513230050020266 0ustar liggesuserstest_that("basic HTTP methods work", { skip_if(Sys.which("curl") == "") withr::local_options(rsconnect.http = "curl", lifecycle_verbosity = "quiet") test_http_GET() test_http_POST_JSON() test_http_POST_empty() test_http_POST_file() test_http_headers() }) rsconnect/tests/testthat/test-http-libcurl.R0000644000176200001440000000256414513230050020763 0ustar liggesuserstest_that("basic HTTP methods work", { withr::local_options(rsconnect.http = "libcurl") test_http_GET() test_http_POST_JSON() test_http_POST_empty() test_http_POST_file() test_http_headers() }) test_that("can trace JSON", { withr::local_options(rsconnect.http.trace.json = TRUE) service <- httpbin_service() json_app <- webfakes::new_app() json_app$use(webfakes::mw_json()) json_app$post("/", function(req, res) { res$set_status(200L)$send_json(req$json) }) app <- webfakes::new_app_process(json_app) service <- parseHttpUrl(app$url()) expect_snapshot({ . <- POST_JSON(service, list(), "", list(a = 1, b = 2)) }) }) test_that("can get and set cookies", { skip_on_cran() # uses live httpbin since webfakes doesn't support cookie endpoints service <- parseHttpUrl("http://httpbin.org/") # Setting skip_on_http_failure(GET(service, list(), "cookies/set", query = "a=1")) cookies <- getCookies(service$host) expect_equal(cookies$name, "a") expect_equal(cookies$value, "1") # Overwriting skip_on_http_failure(GET(service, list(), "cookies/set", query = "a=2&b=1")) cookies <- getCookies(service$host) expect_equal(cookies$name, c("b", "a")) expect_equal(cookies$value, c("1", "2")) # Preserved across calls skip_on_http_failure(out <- GET(service, list(), "cookies")) expect_equal(out$cookies, list(a = "2", b = "1")) }) rsconnect/tests/testthat/test-rmds/0000755000176200001440000000000014536673165017214 5ustar liggesusersrsconnect/tests/testthat/test-rmds/simple.Rmd0000644000176200001440000000010414467166424021142 0ustar liggesusers--- title: Simple R Markdown document --- R Markdown is so simple. rsconnect/tests/testthat/test-rmds/parameterized.Rmd0000644000176200001440000000015014467166424022506 0ustar liggesusers--- title: Parameterized R Markdown document params: color: red --- Parameters are `r params$color`. rsconnect/tests/testthat/test-rmds/index.Rmd0000644000176200001440000000014114467166424020761 0ustar liggesusers--- title: The index R Markdown document --- For those times that you do not specify a primary. rsconnect/tests/testthat/quarto-proj-r-shiny/0000755000176200001440000000000014536673156021144 5ustar liggesusersrsconnect/tests/testthat/quarto-proj-r-shiny/_quarto.yml0000644000176200001440000000007114467166424023335 0ustar liggesusersproject: title: "quarto-proj-r-shiny" editor: visual rsconnect/tests/testthat/quarto-proj-r-shiny/quarto-proj-r-shiny.qmd0000644000176200001440000000176714536670534025531 0ustar liggesusers--- title: "quarto-proj-r-shiny" resource_files: - _quarto.yml format: html: page-layout: custom server: shiny --- # "Iris K-Means Clustering" This example is taken from the [Quarto website](https://quarto.org/docs/interactive/shiny/). ```{r} #| panel: sidebar vars <- setdiff(names(iris), "Species") selectInput("xcol", "X Variable", vars) selectInput("ycol", "Y Variable", vars, selected = vars[[2]]) numericInput("clusters", "Cluster count", 3, min = 1, max = 9) ``` ```{r} #| panel: fill plotOutput("plot1") ``` ```{r} #| context: server selectedData <- reactive({ iris[, c(input$xcol, input$ycol)] }) clusters <- reactive({ kmeans(selectedData(), input$clusters) }) output$plot1 <- renderPlot({ palette(c("#E41A1C", "#377EB8", "#4DAF4A", "#984EA3", "#FF7F00", "#FFFF33", "#A65628", "#F781BF", "#999999")) par(mar = c(5.1, 4.1, 0, 1)) plot(selectedData(), col = clusters()$cluster, pch = 20, cex = 3) points(clusters()$centers, pch = 4, cex = 4, lwd = 4) }) ``` rsconnect/tests/testthat/test-appMetadata-quarto.R0000644000176200001440000000543514513230050022104 0ustar liggesusers # quarto ------------------------------------------------------------------ fakeQuartoMetadata <- function(version, engines) { # See quarto-r/R/publish.R lines 396 and 113. metadata <- list() metadata$quarto_version <- version metadata$quarto_engines <- I(engines) return(metadata) } test_that("inferQuartoInfo correctly detects info when quarto is provided alone", { skip_if_no_quarto() quartoInfo <- inferQuartoInfo( metadata = list(), appDir = test_path("quarto-doc-none"), appPrimaryDoc = "quarto-doc-none.qmd" ) expect_named(quartoInfo, c("version", "engines")) expect_equal(quartoInfo$engines, I(c("markdown"))) quartoInfo <- inferQuartoInfo( appDir = test_path("quarto-website-r"), appPrimaryDoc = NULL, metadata = list() ) expect_named(quartoInfo, c("version", "engines")) expect_equal(quartoInfo$engines, I(c("knitr"))) }) test_that("inferQuartoInfo extracts info from metadata", { metadata <- fakeQuartoMetadata(version = "99.9.9", engines = c("internal-combustion")) quartoInfo <- inferQuartoInfo( appDir = test_path("quarto-website-r"), appPrimaryDoc = NULL, metadata = metadata ) expect_equal(quartoInfo, list( version = "99.9.9", engines = I("internal-combustion") )) }) test_that("inferQuartoInfo prefers using metadata over quarto inspect", { skip_if_no_quarto() metadata <- fakeQuartoMetadata(version = "99.9.9", engines = c("internal-combustion")) quartoInfo <- inferQuartoInfo( appDir = test_path("quarto-website-r"), appPrimaryDoc = NULL, metadata = metadata ) expect_equal(quartoInfo$engines, I(c("internal-combustion"))) }) test_that("inferQuartoInfo returns NULL for non-quarto content", { skip_if_no_quarto() quartoInfo <- inferQuartoInfo( appDir = test_path("shinyapp-simple"), appPrimaryDoc = NULL, metadata = list() ) expect_null(quartoInfo) }) test_that("quartoInspect requires quarto", { local_mocked_bindings(quarto_path = function() NULL) expect_snapshot(error = TRUE, { quartoInspect() }) }) test_that("quartoInspect identifies on Quarto projects", { skip_if_no_quarto() inspect <- quartoInspect(test_path("quarto-website-r")) expect_true(all(c("quarto", "engines") %in% names(inspect))) inspect <- quartoInspect(test_path("quarto-proj-r-shiny")) expect_true(all(c("quarto", "engines") %in% names(inspect))) }) test_that("quartoInspect identifies Quarto documents", { skip_if_no_quarto() inspect <- quartoInspect( appDir = test_path("quarto-doc-none"), appPrimaryDoc = "quarto-doc-none.qmd" ) expect_true(all(c("quarto", "engines") %in% names(inspect))) }) test_that("quartoInspect returns NULL on non-quarto Quarto content", { skip_if_no_quarto() inspect <- quartoInspect(test_path("shinyapp-simple")) expect_null(inspect) }) rsconnect/tests/testthat/test-http-internal.R0000644000176200001440000000035714513230050021141 0ustar liggesuserstest_that("basic HTTP methods work", { withr::local_options(rsconnect.http = "internal", lifecycle_verbosity = "quiet") test_http_GET() test_http_POST_JSON() test_http_POST_empty() test_http_POST_file() test_http_headers() }) rsconnect/tests/testthat/quarto-website-py/0000755000176200001440000000000014536673162020670 5ustar liggesusersrsconnect/tests/testthat/quarto-website-py/_quarto.yml0000644000176200001440000000036014467166424023065 0ustar liggesusersproject: type: website website: title: "quarto-website-py" navbar: background: primary left: - href: index.qmd text: Home - about.qmd format: html: theme: cosmo css: styles.css editor: visual rsconnect/tests/testthat/quarto-website-py/styles.css0000644000176200001440000000002114467166424022717 0ustar liggesusers/* css styles */ rsconnect/tests/testthat/quarto-website-py/index.qmd0000644000176200001440000000026514467166424022506 0ustar liggesusers--- title: "quarto-website-py" jupyter: python3 --- This is a Quarto website. To learn more about Quarto websites visit . ```{python} 1 + 1 ``` rsconnect/tests/testthat/quarto-website-py/about.qmd0000644000176200001440000000012014467166424022477 0ustar liggesusers--- title: "About" jupyter: python3 --- About this site ```{python} 1 + 1 ``` rsconnect/tests/testthat/quarto-website-py/requirements.txt0000644000176200001440000000001014467166424024144 0ustar liggesusersjupyter rsconnect/tests/testthat/test-linters.R0000644000176200001440000000336414513230050020031 0ustar liggesuserstest_that("linter warns about absolute paths and relative paths", { dirCreate("~/.rsconnect-tests") file.create("~/.rsconnect-tests/local-file.txt") withr::defer(unlink("~/.rsconnect-tests", recursive = TRUE)) result <- lint(test_path("shinyapp-with-absolute-paths")) expect_snapshot(result) absPathLintedIndices <- result[["server.R"]]$absolute.paths$indices expect_identical(as.numeric(absPathLintedIndices), 15) }) test_that("The linter identifies files not matching in case sensitivity", { result <- lint(test_path("shinyapp-with-absolute-paths")) server.R <- result[["server.R"]] filepath.capitalization <- server.R[["filepath.capitalization"]] expect_equal(as.integer(filepath.capitalization$indices), 31) }) test_that("The linter identifies files with Markdown links not matching in case sensitivity", { result <- lint(test_path("test-rmd-bad-case")) index.Rmd <- result[["index.Rmd"]] filepath.capitalization <- index.Rmd[["filepath.capitalization"]] expect_equal(as.integer(filepath.capitalization$indices), 29) }) test_that("The linter identifies browser() statements correctly", { result <- lint("shinyapp-with-browser") server.R <- result[["server.R"]] browseLines <- server.R[["browser"]] expect_true(browseLines$indices == 9) }) test_that("The linter identifies browseURL() statements correctly", { result <- lint("shinyapp-with-browser") server.R <- result[["server.R"]] browseLines <- server.R[["browseURL"]] expect_true(browseLines$indices == 5) }) test_that("The linter accepts a plumber API", { result <- lint("test-plumber") expect_false(is.null(result$plumber.R)) }) test_that("Linters can run on files with multibyte characters", { lint("multibyte-characters") expect_true(TRUE) # didn't stop }) rsconnect/tests/testthat/test-appDependencies.R0000644000176200001440000000563514513230050021443 0ustar liggesuserstest_that("appDependencies includes implicit deps", { skip_on_cran() withr::local_options(renv.verbose = TRUE) path <- local_temp_app(list("test.Rmd" = "")) deps <- appDependencies(path) expect_true("rmarkdown" %in% deps$Package) }) test_that("appDependencies includes implicit deps when appMode forced", { skip_on_cran() withr::local_options(renv.verbose = TRUE) dir <- local_temp_app(list( "app.R" = "", "plumber.R" = "", "report.Rmd" = "", "index.html" = "" )) files <- c("app.R", "plumber.R", "report.Rmd", "index.html") # unless forced to "static", the presence of *.Rmd forces rmarkdown as an R # dependency, regardless of appMode. # inference indicates a Plumber API. deps <- appDependencies(dir) expect_true("plumber" %in% deps$Package) expect_false("shiny" %in% deps$Package) expect_true("rmarkdown" %in% deps$Package) deps <- appDependencies(dir, appMode = "api") expect_true("plumber" %in% deps$Package) expect_false("shiny" %in% deps$Package) expect_true("rmarkdown" %in% deps$Package) deps <- appDependencies(dir, appMode = "shiny") expect_false("plumber" %in% deps$Package) expect_true("shiny" %in% deps$Package) expect_true("rmarkdown" %in% deps$Package) deps <- appDependencies(dir, appMode = "rmd-static") expect_false("plumber" %in% deps$Package) expect_false("shiny" %in% deps$Package) expect_true("rmarkdown" %in% deps$Package) deps <- appDependencies(dir, appMode = "static") expect_equal(deps, data.frame( Package = character(), Version = character(), Source = character(), Repository = character(), stringsAsFactors = FALSE )) }) test_that("static project doesn't have deps", { skip_on_cran() path <- local_temp_app(list("index.html" = "")) deps <- appDependencies(path) expect_equal(deps, data.frame( Package = character(), Version = character(), Source = character(), Repository = character(), stringsAsFactors = FALSE )) }) test_that("infers correct packages for each source", { skip_on_cran() simulateMetadata <- function(appMode, hasParameters = FALSE, documentsHavePython = FALSE) { list( appMode = appMode, hasParameters = hasParameters, documentsHavePython = documentsHavePython ) } # Simple regression test in preparation for refactoring expect_snapshot({ inferRPackageDependencies(simulateMetadata("rmd-static")) inferRPackageDependencies(simulateMetadata("rmd-static", hasParameters = TRUE)) inferRPackageDependencies(simulateMetadata("quarto-static")) inferRPackageDependencies(simulateMetadata("quarto-shiny")) inferRPackageDependencies(simulateMetadata("rmd-shiny")) inferRPackageDependencies(simulateMetadata("shiny")) inferRPackageDependencies(simulateMetadata("api")) inferRPackageDependencies(simulateMetadata("api", documentsHavePython = TRUE)) }) }) rsconnect/tests/testthat/test-appMetadata.R0000644000176200001440000002257514513230050020577 0ustar liggesusers# appMetadata ------------------------------------------------------------- test_that("quarto affects mode inference", { dir <- local_temp_app(list("foo.Rmd" = "")) metadata <- appMetadata(dir, c("foo.Rmd")) expect_equal(metadata$appMode, "rmd-static") metadata <- appMetadata(dir, c("foo.Rmd"), metadata = list(quarto_version = 1)) expect_equal(metadata$appMode, "quarto-static") }) test_that("quarto path is deprecated", { skip_if_no_quarto() dir <- local_temp_app(list("foo.Rmd" = "")) expect_snapshot(. <- appMetadata(dir, c("foo.Rmd"), quarto = "abc")) }) test_that("validates quarto argument", { dir <- local_temp_app(list("foo.Rmd" = "")) expect_snapshot(appMetadata(dir, c("foo.Rmd"), quarto = 1), error = TRUE) }) test_that("handles special case of appPrimaryDoc as R file", { dir <- local_temp_app(list("foo.R" = "")) metadata <- appMetadata(dir, c("foo.R"), appPrimaryDoc = "foo.R") expect_equal(metadata$appMode, "shiny") }) # https://github.com/rstudio/rsconnect/issues/942 test_that("files beneath the root are not ignored when determining app-mode", { dir <- local_temp_app(list("app.R" = "", "plumber/api/plumber.R" = "")) metadata <- appMetadata(dir, c("app.R", "plumber/api/plumber.R")) expect_equal(metadata$appMode, "shiny") }) test_that("content type (appMode) is inferred and can be overridden", { dir <- local_temp_app(list( "app.R" = "", "plumber.R" = "", "report.Rmd" = "", "index.html" = "" )) files <- c("app.R", "plumber.R", "report.Rmd", "index.html") metadata <- appMetadata(dir, files) expect_equal(metadata$appMode, "api") metadata <- appMetadata(dir, files, appMode = "shiny") expect_equal(metadata$appMode, "shiny") metadata <- appMetadata(dir, files, appMode = "rmd-static") expect_equal(metadata$appMode, "rmd-static") metadata <- appMetadata(dir, files, appMode = "static") expect_equal(metadata$appMode, "static") }) # checkLayout ------------------------------------------------------------- test_that("checkLayout() errors if primary doc & app.R", { dir <- local_temp_app(list( "app.R" = "", "myscript.R" = "" )) expect_snapshot(checkAppLayout(dir, appPrimaryDoc = "myscript.R"), error = TRUE) }) test_that("checkLayout succeeds with some common app structures", { rmd <- local_temp_app(list("foo.Rmd" = "")) expect_no_error(checkAppLayout(rmd)) qmd <- local_temp_app(list("foo.qmd" = "")) expect_no_error(checkAppLayout(qmd)) # perhaps script.R is a pre-render script that generates *.qmd project <- local_temp_app(list("_quarto.yml" = "", "script.R" = "")) expect_no_error(checkAppLayout(project)) md <- local_temp_app(list("_quarto.yml" = "", "index.md" = "")) expect_no_error(checkAppLayout(md)) shiny1 <- local_temp_app(list("app.R" = "")) expect_no_error(checkAppLayout(shiny1)) shiny2 <- local_temp_app(list("server.R" = "", "ui.R" = "")) expect_no_error(checkAppLayout(shiny2)) api <- local_temp_app(list("plumber.R" = "")) expect_no_error(checkAppLayout(api)) static <- local_temp_app(list("foo.html" = "")) expect_no_error(checkAppLayout(static)) staticxml <- local_temp_app(list("data.xml" = "")) expect_no_error(checkAppLayout(staticxml)) staticdata <- local_temp_app(list( "data.txt" = "", "cats.csv" = "" )) expect_no_error(checkAppLayout(staticdata)) }) # inferAppMode ------------------------------------------------------------ test_that("can infer mode for APIs", { expect_equal(inferAppMode("plumber.R"), "api") expect_equal(inferAppMode("entrypoint.R"), "api") }) test_that("can infer mode for shiny apps", { expect_equal(inferAppMode("app.R"), "shiny") expect_equal(inferAppMode("server.R"), "shiny") }) test_that("can infer mode for static quarto and rmd docs", { dir <- local_temp_app(list("foo.Rmd" = "")) paths <- list.files(dir, full.names = TRUE) expect_equal(inferAppMode(paths), "rmd-static") expect_equal(inferAppMode(paths, usesQuarto = TRUE), "quarto-static") # Static R Markdown treated as rmd-shiny for shinyapps targets expect_equal(inferAppMode(paths, isShinyappsServer = TRUE), "rmd-shiny") }) test_that("can infer mode for shiny rmd docs", { yaml_runtime <- function(runtime) { c("---", paste0("runtime: ", runtime), "---") } dir <- local_temp_app(list("index.Rmd" = yaml_runtime("shiny"))) paths <- list.files(dir, full.names = TRUE) expect_equal(inferAppMode(paths), "rmd-shiny") dir <- local_temp_app(list("index.Rmd" = yaml_runtime("shinyrmd"))) paths <- list.files(dir, full.names = TRUE) expect_equal(inferAppMode(paths), "rmd-shiny") dir <- local_temp_app(list("index.Rmd" = yaml_runtime("shiny_prerendered"))) paths <- list.files(dir, full.names = TRUE) expect_equal(inferAppMode(paths), "rmd-shiny") # can pair server.R with shiny runtime dir <- local_temp_app(list("index.Rmd" = yaml_runtime("shiny"), "server.R" = "")) paths <- list.files(dir, full.names = TRUE) expect_equal(inferAppMode(paths), "rmd-shiny") # Beats static rmarkdowns dir <- local_temp_app(list("index.Rmd" = yaml_runtime("shiny"), "foo.Rmd" = "")) paths <- list.files(dir, full.names = TRUE) expect_equal(inferAppMode(paths), "rmd-shiny") }) test_that("can infer mode for shiny qmd docs", { yaml_runtime <- function(runtime) { c("---", paste0("runtime: ", runtime), "---") } dir <- local_temp_app(list("index.Qmd" = yaml_runtime("shiny"))) paths <- list.files(dir, full.names = TRUE) expect_equal(inferAppMode(paths), "quarto-shiny") # Can force Rmd to use quarto dir <- local_temp_app(list("index.Rmd" = yaml_runtime("shiny"))) paths <- list.files(dir, full.names = TRUE) expect_equal(inferAppMode(paths, usesQuarto = TRUE), "quarto-shiny") # Prefers quarto if both present dir <- local_temp_app(list( "index.Qmd" = yaml_runtime("shiny"), "index.Rmd" = yaml_runtime("shiny") )) paths <- list.files(dir, full.names = TRUE) expect_equal(inferAppMode(paths), "quarto-shiny") }) test_that("Shiny R Markdown files are detected correctly", { expect_true(isShinyRmd(test_path("shiny-rmds/shiny-rmd-dashes.Rmd"))) expect_true(isShinyRmd(test_path("shiny-rmds/shiny-rmd-dots.Rmd"))) expect_false(isShinyRmd(test_path("shiny-rmds/non-shiny-rmd.Rmd"))) }) test_that("shiny metadata process correctly", { expect_false(is_shiny_prerendered(NULL, NULL)) expect_true(is_shiny_prerendered("shiny_prerendered", NULL)) expect_true(is_shiny_prerendered("shinyrmd", NULL)) expect_true(is_shiny_prerendered(NULL, "shiny")) expect_true(is_shiny_prerendered(NULL, list(type = "shiny"))) }) test_that("otherwise, fallsback to static deploy", { expect_equal(inferAppMode(c("a.html", "b.html")), "static") }) # inferAppPrimaryDoc ------------------------------------------------------ test_that("leaves addPrimaryDoc unchanged or not a document", { expect_equal(inferAppPrimaryDoc("foo.Rmd"), "foo.Rmd") expect_equal(inferAppPrimaryDoc(NULL, appMode = "shiny"), NULL) expect_equal(inferAppPrimaryDoc(NULL, appMode = "api"), NULL) }) test_that("uses index file if present", { files <- c("index.html", "index.Rmd", "a.html", "b.html", "a.Rmd", "b.Rmd") expect_equal(inferAppPrimaryDoc(NULL, files, "static"), "index.html") expect_equal(inferAppPrimaryDoc(NULL, files, "rmd-shiny"), "index.Rmd") }) test_that("otherwise fails back to first file with matching extensions", { files <- c("a.html", "b.html", "a.Rmd", "b.Rmd") expect_equal(inferAppPrimaryDoc(NULL, files, "static"), "a.html") expect_equal(inferAppPrimaryDoc(NULL, files, "rmd-shiny"), "a.Rmd") }) test_that("errors if no files with needed extension", { expect_snapshot(error = TRUE, { inferAppPrimaryDoc(NULL, "a.R", "static") inferAppPrimaryDoc(NULL, "a.R", "rmd-shiny") }) }) # appHasParameters -------------------------------------------------------- test_that("non-documents don't have parameters", { dir <- local_temp_app(list("foo.R" = "")) expect_false(appHasParameters(dir, "foo.R", "static")) expect_false(appHasParameters(dir, "foo.R", "shiny")) }) test_that("documents don't have parameters if part of a site", { dir <- local_temp_app(list("index.Rmd" = c("---", "params: [1, 2]", "---"))) expect_false(appHasParameters(dir, "index.Rmd", "rmd-static", "site")) expect_false(appHasParameters(dir, "index.Rmd", "qmd-shiny", "site")) }) test_that("non-Rmd files don't have parameters", { dir <- local_temp_app(list("app.r" = c(""))) expect_false(appHasParameters(dir, "app.R", "rmd-shiny")) }) test_that("otherwise look at yaml metadata", { dir <- local_temp_app(list("index.Rmd" = c("---", "params: [1, 2]", "---"))) expect_true(appHasParameters(dir, "index.Rmd", "rmd-shiny")) dir <- local_temp_app(list("index.Rmd" = c("---", "params: ~", "---"))) expect_false(appHasParameters(dir, "index.Rmd", "rmd-shiny")) }) # detectPythonInDocuments ------------------------------------------------- test_that("dir without Rmds doesn't have have python", { dir <- local_temp_app() expect_false(detectPythonInDocuments(dir)) dir <- local_temp_app(list("foo.R" = "")) expect_false(detectPythonInDocuments(dir)) }) test_that("Rmd or qmd with python chunk has python", { dir <- local_temp_app(list("foo.qmd" = c("```{r}", "1+1", "````"))) expect_false(detectPythonInDocuments(dir)) dir <- local_temp_app(list("foo.Rmd" = c("```{python}", "1+1", "````"))) expect_true(detectPythonInDocuments(dir)) dir <- local_temp_app(list("foo.qmd" = c("```{python}", "1+1", "````"))) expect_true(detectPythonInDocuments(dir)) }) rsconnect/tests/testthat/helper-http.R0000644000176200001440000000400114513230050017615 0ustar liggesuserscache <- new_environment() httpbin_service <- function() { app <- env_cache( cache, "test_app", webfakes::new_app_process(webfakes::httpbin_app()) ) parseHttpUrl(app$url()) } strip_port <- function(service) { function(x) gsub(service$port, "{port}", x) } local_cookie_store <- function(env = caller_env()) { nms <- env_names(.cookieStore) zaps <- rep_named(nms, list(zap())) old <- env_bind(.cookieStore, !!!zaps) withr::defer(env_bind(.cookieStore, !!!old), envir = env) } skip_on_http_failure <- function(code) { tryCatch( code, rsconnect_http = function(cnd) { testthat::skip("http request failed") } ) } # Generic tests of various http methods ----------------------------------- test_http_GET <- function() { service <- httpbin_service() # Perform the request resp <- GET(service, authInfo = NULL, path = "get") expect_equal(attr(resp, "httpContentType"), "application/json") expect_equal(resp$path, "/get") } test_http_POST_JSON <- function() { service <- httpbin_service() body <- list(a = 1, b = 2, c = 3) resp <- POST_JSON(service, authInfo = NULL, path = "post", json = body) expect_equal(resp$json, body) } test_http_POST_empty <- function() { service <- httpbin_service() resp <- POST(service, authInfo = NULL, path = "post") expect_equal(resp$json, set_names(list())) } test_http_POST_file <- function() { service <- httpbin_service() path <- withr::local_tempfile() con <- file(path, "wb") writeLines(c("1", "2", "3"), con = con) close(con) resp <- POST( service, authInfo = NULL, path = "post", contentType = "text/plain", file = path ) expect_equal(resp$data, "1\n2\n3\n") } test_http_headers <- function() { service <- httpbin_service() resp <- GET(service, authInfo = list(apiKey = "abc123"), path = "get") expect_equal(resp$headers$Authorization, "Key abc123") resp <- POST(service, authInfo = list(apiKey = "abc123"), path = "post") expect_equal(resp$headers$Authorization, "Key abc123") } rsconnect/tests/testthat/static-with-quarto-yaml/0000755000176200001440000000000014536673165022003 5ustar liggesusersrsconnect/tests/testthat/static-with-quarto-yaml/_quarto.yml0000644000176200001440000000003614467166424024175 0ustar liggesusersproject: title: "slideshow" rsconnect/tests/testthat/static-with-quarto-yaml/slideshow.html0000644000176200001440000007137014467166424024700 0ustar liggesusers slideshow

slideshow

Quarto

Quarto enables you to weave together content and executable code into a finished presentation. To learn more about Quarto presentations see https://quarto.org/docs/presentations/.

Bullets

When you click the Render button a document will be generated that includes:

  • Content authored with markdown
  • Output from executable code

Code

When you click the Render button a presentation will be generated that includes both content and the output of embedded code. You can embed code like this:

[1] 2
rsconnect/tests/testthat/test-plumber/0000755000176200001440000000000014467166424017713 5ustar liggesusersrsconnect/tests/testthat/test-plumber/plumber.R0000644000176200001440000000007314467166424021504 0ustar liggesusers #* @get /foo fooRoute <- function() { "hello world" } rsconnect/tests/testthat/shiny-app-in-subdir/0000755000176200001440000000000014467166424021072 5ustar liggesusersrsconnect/tests/testthat/shiny-app-in-subdir/my-app/0000755000176200001440000000000014513230050022250 5ustar liggesusersrsconnect/tests/testthat/shiny-app-in-subdir/my-app/server.R0000644000176200001440000000016114513230050023677 0ustar liggesusers# Stub server.R # # Its presence (along with ui.R) indicates that this directory contains a # Shiny application. rsconnect/tests/testthat/shiny-app-in-subdir/my-app/ui.r0000644000176200001440000000016114513230050023046 0ustar liggesusers# Stub ui.R # # Its presence (along with server.R) indicates that this directory contains a # Shiny application. rsconnect/tests/testthat/shinyapp-with-browser/0000755000176200001440000000000014467166424021555 5ustar liggesusersrsconnect/tests/testthat/shinyapp-with-browser/server.R0000644000176200001440000000050714467166424023210 0ustar liggesuserslibrary(shiny) shinyServer(function(input, output) { output$distPlot <- renderPlot({ # open Google. no reason, just do it browseURL("https://www.google.com/") dist <- rnorm(input$obs) hist(dist) # stop to examine state browser() }) output$obs <- renderText({paste(input$obs, "\n", input$obs)}) }) rsconnect/tests/testthat/shinyapp-with-browser/ui.R0000644000176200001440000000041214467166424022312 0ustar liggesuserslibrary(shiny) shinyUI(pageWithSidebar( headerPanel("Hello, Shiny!"), sidebarPanel( sliderInput("obs", "Number of observations:", min = 1, max = 1000, value = 500)), mainPanel( plotOutput("distPlot"))) ) rsconnect/tests/testthat/quarto-website-r-py/0000755000176200001440000000000014536673161021126 5ustar liggesusersrsconnect/tests/testthat/quarto-website-r-py/_quarto.yml0000644000176200001440000000036214467166424023326 0ustar liggesusersproject: type: website website: title: "quarto-website-r-py" navbar: background: primary left: - href: index.qmd text: Home - about.qmd format: html: theme: cosmo css: styles.css editor: visual rsconnect/tests/testthat/quarto-website-r-py/styles.css0000644000176200001440000000002114467166424023156 0ustar liggesusers/* css styles */ rsconnect/tests/testthat/quarto-website-r-py/index.qmd0000644000176200001440000000034614467166424022745 0ustar liggesusers--- title: "quarto-website-r-py" --- This is a Quarto website. To learn more about Quarto websites visit . ```{r} # This is an R chunk 1 + 1 ``` ```{python} # This is a Python chunk 1 + 1 ``` rsconnect/tests/testthat/quarto-website-r-py/about.qmd0000644000176200001440000000017714467166424022752 0ustar liggesusers--- title: "About" --- About this site ```{r} # This is an R chunk 1 + 1 ``` ```{python} # This is a Python chunk 1 + 1 ``` rsconnect/tests/testthat/quarto-website-r-py/requirements.txt0000644000176200001440000000012314513230050024363 0ustar liggesusers# stub requirements.txt # Its presence indicates the need for Python dependencies. rsconnect/tests/testthat/test-secret.R0000644000176200001440000000050614513230050017631 0ustar liggesuserstest_that("NULLs aren't secret", { expect_equal(secret(NULL), NULL) }) test_that("print and str obfuscate output", { expect_snapshot({ x <- secret("THIS IS MY PASSWORD: foo") x str(x) }) }) test_that("can put a secret in a data frame", { x <- secret("x") df <- data.frame(x) expect_equal(df$x, x) }) rsconnect/tests/testthat/test-config.R0000644000176200001440000000144514513230050017614 0ustar liggesuserstest_that("account file returned with server name", { local_temp_config() registerAccount("simple", "alice", 13, apiKey = "alice-api-key") expected <- normalizePath(file.path( rsconnectConfigDir("accounts"), "simple/alice.dcf" )) dir <- accountConfigFile("alice", server = "simple") expect_equal(dir, expected) }) test_that("account file containing pattern characters found with server name", { local_temp_config() registerAccount("complex", "hatter+mad@example.com", 42, apiKey = "hatter-api-key") # https://github.com/rstudio/rsconnect/issues/620 expected <- normalizePath(file.path( rsconnectConfigDir("accounts"), "complex/hatter+mad@example.com.dcf" )) dir <- accountConfigFile("hatter+mad@example.com", server = "complex") expect_equal(dir, expected) }) rsconnect/tests/testthat/multibyte-characters/0000755000176200001440000000000014467166424021423 5ustar liggesusersrsconnect/tests/testthat/multibyte-characters/app.R0000644000176200001440000000123614467166424022330 0ustar liggesusers # 定义用户界面 fluidPage( # 标题 titlePanel("麻麻再也不用担心我的Shiny应用不能显示中文了"), # 侧边栏布局 sidebarLayout( sidebarPanel( selectInput("dataset", "请选一个数据:", choices = c("岩石", "pressure", "cars")), uiOutput("rockvars"), numericInput("obs", "查看多少行数据?", 5), checkboxInput("summary", "显示概要", TRUE) ), # 展示一个HTML表格 mainPanel( conditionalPanel("input.dataset === '岩石'", plotOutput("rockplot")), verbatimTextOutput("summary这里也可以用中文"), tableOutput("view") ) ) ) rsconnect/tests/testthat/helper-paths.R0000644000176200001440000000106214513230050017761 0ustar liggesuserspythonPathOrSkip <- function() { skip_if_not_installed("reticulate") if (!reticulate::py_available(TRUE)) { skip("python not found by reticulate") } path <- reticulate::py_config()$python pipMissing <- system2(path, "-m pip help", stdout = NULL, stderr = NULL) if (pipMissing != 0) { skip("pip is not installed") } path } # quarto ------------------------------------------------------------------ skip_if_no_quarto <- function() { quarto <- quarto_path() skip_if(is.null(quarto), "quarto cli is not installed") invisible() } rsconnect/tests/testthat/test-bundle.R0000644000176200001440000001515414513230050017622 0ustar liggesuserstest_that("simple Shiny app bundle is runnable", { skip_on_cran() skip_if_not_installed("shiny") bundleTempDir <- local_shiny_bundle( "simple_shiny", test_path("shinyapp-simple"), NULL ) expect_true(inherits(shiny::shinyAppDir(bundleTempDir), "shiny.appobj")) }) test_that("app.R Shiny app bundle is runnable", { skip_on_cran() skip_if_not_installed("shiny") # shiny:::shinyAppDir() attach shiny so do it here so we can do it quietly library(shiny, warn.conflicts = FALSE, quietly = TRUE) bundleTempDir <- local_shiny_bundle( "app_r_shiny", test_path("shinyapp-appR"), NULL ) expect_true(inherits(shiny::shinyAppDir(bundleTempDir), "shiny.appobj")) }) test_that("single-file Shiny app bundle is runnable", { skip_on_cran() skip_if_not_installed("shiny") bundleTempDir <- local_shiny_bundle( "app_r_shiny", test_path("shinyapp-singleR"), "single.R" ) expect_true(inherits(shiny::shinyAppDir(bundleTempDir), "shiny.appobj")) }) test_that("simple Rmd as primary not identified as parameterized when parameterized Rmd in bundle", { skip_on_cran() bundleTempDir <- local_shiny_bundle( "rmd primary", test_path("test-rmds"), "simple.Rmd" ) manifest <- jsonlite::fromJSON(file.path(bundleTempDir, "manifest.json")) expect_equal(manifest$metadata$appmode, "rmd-static") expect_equal(manifest$metadata$primary_rmd, "simple.Rmd") expect_equal(manifest$metadata$has_parameters, FALSE) }) test_that("parameterized Rmd identified as parameterized when other Rmd in bundle", { skip_on_cran() bundleTempDir <- local_shiny_bundle( "rmd primary", test_path("test-rmds"), "parameterized.Rmd" ) manifest <- jsonlite::fromJSON(file.path(bundleTempDir, "manifest.json")) expect_equal(manifest$metadata$appmode, "rmd-static") expect_equal(manifest$metadata$primary_rmd, "parameterized.Rmd") expect_equal(manifest$metadata$has_parameters, TRUE) }) test_that("primary doc can be inferred (and non-parameterized dispite an included parameterized", { skip_on_cran() bundleTempDir <- local_shiny_bundle( "rmd primary", test_path("test-rmds"), NULL ) manifest <- jsonlite::fromJSON(file.path(bundleTempDir, "manifest.json")) expect_equal(manifest$metadata$appmode, "rmd-static") expect_equal(manifest$metadata$primary_rmd, "index.Rmd") expect_equal(manifest$metadata$has_parameters, FALSE) }) test_that("Rmd with reticulate as a dependency includes python in the manifest", { skip_on_cran() skip_if_not_installed("reticulate") python <- pythonPathOrSkip() bundleTempDir <- local_shiny_bundle( "reticulated rmd", test_path("test-reticulate-rmds"), NULL, python = python ) manifest <- jsonlite::fromJSON(file.path(bundleTempDir, "manifest.json")) expect_equal(manifest$metadata$appmode, "rmd-static") expect_equal(manifest$metadata$primary_rmd, "index.Rmd") expect_true("reticulate" %in% names(manifest$packages)) expect_true(file.exists(file.path(bundleTempDir, manifest$python$package_manager$package_file))) }) test_that("Rmd with reticulate as an inferred dependency includes reticulate and python in the manifest", { skip_on_cran() skip_if_not_installed("reticulate") python <- pythonPathOrSkip() bundleTempDir <- local_shiny_bundle( "reticulated rmd", test_path("test-reticulate-rmds"), "implicit.Rmd", python = python ) manifest <- jsonlite::fromJSON(file.path(bundleTempDir, "manifest.json")) expect_equal(manifest$metadata$appmode, "rmd-static") expect_equal(manifest$metadata$primary_rmd, "implicit.Rmd") expect_true("reticulate" %in% names(manifest$packages)) expect_true(file.exists(file.path(bundleTempDir, manifest$python$package_manager$package_file))) }) test_that("Rmd without a python block doesn't include reticulate or python in the manifest", { skip_on_cran() bundleTempDir <- local_shiny_bundle( "plain rmd", test_path("test-rmds"), "simple.Rmd", python = NULL ) manifest <- jsonlite::fromJSON(file.path(bundleTempDir, "manifest.json")) expect_equal(manifest$metadata$appmode, "rmd-static") expect_equal(manifest$metadata$primary_rmd, "simple.Rmd") expect_false("reticulate" %in% names(manifest$packages)) expect_equal(manifest$python, NULL) }) test_that("Rmd without a python block doesn't include reticulate or python in the manifest even if python specified", { skip_on_cran() skip_if_not_installed("reticulate") python <- pythonPathOrSkip() bundleTempDir <- local_shiny_bundle( "plain rmd", test_path("test-rmds"), "simple.Rmd", python = python ) manifest <- jsonlite::fromJSON(file.path(bundleTempDir, "manifest.json")) expect_equal(manifest$metadata$appmode, "rmd-static") expect_equal(manifest$metadata$primary_rmd, "simple.Rmd") expect_false("reticulate" %in% names(manifest$packages)) expect_equal(manifest$python, NULL) }) test_that("tarImplementation: checks environment variable and option before using default", { tar_implementation <- function(option, envvar) { withr::local_options(rsconnect.tar = option) withr::local_envvar(RSCONNECT_TAR = envvar) getTarImplementation() } # Environment variable only set should use environment varaible expect_equal(tar_implementation(NULL, "envvar"), "envvar") # Option only set should use option expect_equal(tar_implementation("option", NA), "option") # Both environment variable and option set should use option expect_equal(tar_implementation("option", "envvar"), "option") # Neither set should use "internal" expect_equal(tar_implementation(NULL, NA), "internal") }) # tweakRProfile ----------------------------------------------------------- test_that(".Rprofile tweaked automatically", { dir <- withr::local_tempdir() writeLines('source("renv/activate.R")', file.path(dir, ".Rprofile")) bundled <- bundleAppDir(dir, list.files(dir, all.files = TRUE)) expect_match( readLines(file.path(bundled, ".Rprofile")), "Modified by rsconnect", all = FALSE ) }) test_that(".Rprofile without renv/packrt left as is", { lines <- c("1 + 1", "# Line 2", "library(foo)") path <- withr::local_tempfile(lines = lines) tweakRProfile(path) expect_equal(readLines(path), lines) }) test_that("removes renv/packrat activation", { path <- withr::local_tempfile(lines = c( "# Line 1", 'source("renv/activate.R")', "# Line 3", 'source("packrat/init.R")', "# Line 5" )) expect_snapshot( { tweakRProfile(path) writeLines(readLines(path)) }, transform = function(x) { x <- gsub("on \\d{4}.+", "on ", x) x <- gsub(packageVersion("rsconnect"), "", x, fixed = TRUE) x } ) }) rsconnect/tests/testthat/test-client-connect.R0000644000176200001440000000727314513230050021261 0ustar liggesusers# NOTE: These tests expect that you're already running connect; the tests # will speak to that running connect process (if it can find it) findConnect <- function() { connect <- Sys.which("connect") if (connect == "") { possibleLocs <- c( "~/git/connect/bin" ) for (loc in possibleLocs) { if (file.exists(file.path(loc, "connect"))) { return(normalizePath(file.path(loc, "connect"))) } } stop("Couldn't find an appropriate 'connect' binary") } } test_that("Users API", { skip_on_cran() skip_on_os("windows") skip("connect user test skipped.") ## rm db/*.db server <- serverInfo(findServer()) connect <- connectClient(server$url, list()) id <- paste(as.hexmode(sample(256, bytes) - 1), collapse = "") # add a user record <- userRecord( email = paste0("user", id, "@gmail.com"), username = paste0("user", id), first_name = "User", last_name = "Resu", password = paste0("password", id) ) response <- connect$addUser(record) # check a couple main fields expect_equal( response[c("email", "first_name", "last_name", "username")], list( email = record$email, first_name = record$first_name, last_name = record$last_name, username = record$username ) ) # make sure we returned an empty password field (or no password field?) expect_true(response$password %in% "" || is.null(response$password)) # generate a token accountId <- response$id token <- generateToken() tokenResponse <- connect$addToken(list(token = token$token, public_key = token$public_key, user_id = accountId)) Sys.sleep(1) # open the URL in the browser utils::browseURL(tokenResponse$token_claim_url) # Sleep for a second so we can be sure that automatic auth happened Sys.sleep(2) # finally, create a fully authenticated client using the new token, and # keep trying to authenticate until we're successful connect <- connectClient(service = server$url, authInfo = list(token = token$token, private_key = token$private_key)) repeat { tryCatch({ user <- connect$currentUser() break }, error = function(e, ...) { # we expect this to return unauthorized until the token becomes active, # but bubble other errors if (length(grep("401 - Unauthorized", e$message)) == 0) { stop(e) } Sys.sleep(1) }) } # Create and remove an example application ## Create it splineReticulator <- connect$createApplication("SplineReticulator") # Update the account id (since we have moved from unauthed user # to authed user) accountId <- splineReticulator$user_id ## Confirm it exists apps <- connect$listApplications(accountId) app <- apps[[which(sapply(apps, `[[`, "id") == splineReticulator$id)]] expect_true(app$name == "SplineReticulator") ## Upload a bundle pwd_splat <- strsplit(getwd(), "/")[[1]] if (pwd_splat[length(pwd_splat)] == "rsconnect") { path <- "tests/testthat/test-shinyApp/test-shinyApp.tar.gz" } else { path <- "test-shinyApp/test-shinyApp.tar.gz" } response <- connect$uploadApplication( splineReticulator$id, normalizePath(path = path) ) ## Deploy an application appId <- response$app_id response <- connect$deployApplication(list(id = appId)) id <- response$id ## Query the app for success / failure response <- connect$waitForTask(id) ## Terminate the application (does not remove it from store) connect$terminateApplication(appId) apps <- connect$listApplications(accountId) expect_false(response$id %in% sapply(apps, "[[", "id")) }) rsconnect/tests/testthat/test-client-cloud.R0000644000176200001440000006223314516247550020753 0ustar liggesusersmockServerFactory <- function(initialResponses) { # Stock responses for certain endpoints. Can still be overridden by tests. if (is.null(initialResponses$"^GET /v1/users/current")) { initialResponses$"GET /v1/users/current" <- list( content = list( id = 100 ) ) } if (is.null(initialResponses$"^GET /v1/accounts/?")) { initialResponses$"^GET /v1/accounts/?" <- list( content = list( count = 1, total = 1, offset = 0, accounts = list( list( id = 50, name = "testthat-account", account = "testthat-account" ), list( id = 51, name = "testthat-superfluous-account", account = "testthat-superfluous-account" ) ) ) ) } mockServer <- list( responses = initialResponses ) mockServer$addResponse <- function(methodAndPath, response) { mockServer$responses <- append(mockServer$responses, response) } mockServer$impl <- function(protocol, host, port, method, path, headers, contentType = NULL, contentFile = NULL, certificate = NULL, timeout = NULL) { methodAndPath <- paste(method, path) request <- list( protocol = protocol, host = host, port = port, method = method, path = path ) response <- list( req = request, status = 200, location = "", contentType = "application/json" ) found <- FALSE for (pathRegex in names(mockServer$responses)) { match <- regexec(pathRegex, methodAndPath)[[1]] if (match[1] != -1) { found <- TRUE responseSupplement <- mockServer$responses[[pathRegex]] for (respProperty in names(responseSupplement)) { if (is.function(responseSupplement[[respProperty]])) { responseSupplement[[respProperty]] <- responseSupplement[[respProperty]]( methodAndPath, match, headers = headers, contentType = contentType, contentFile = contentFile) } response[[respProperty]] <- responseSupplement[[respProperty]] } if (is.list(response$content)) { response$content <- jsonlite::toJSON(response$content, auto_unbox = TRUE) } break } } if (!found) { stop(paste("No mocked response defined for", methodAndPath)) } response } mockServer } configureTestAccount <- function(server = "posit.cloud", name = NULL) { if (is.null(name)) { name <- "testthat-account" } existingAccount <- NULL tryCatch( existingAccount <- accountInfo(name, server), error = function(e) { existingAccount <- NULL } ) if (is.null(existingAccount)) { setAccountInfo( name = name, token = "foo", secret = "bar", server = server ) } name } test_that("Get application", { mockServer <- mockServerFactory(list( "^GET /outputs/([0-9]+)" = list( content = function(methodAndPath, match, ...) { end <- attr(match, "match.length")[2] + match[2] output_id <- strtoi(substr(methodAndPath, match[2], end)) if (output_id != 5) { cli::cli_abort( "404 error", class = "rsconnect_http_404" ) } list( "id" = 5, "source_id" = 10, "url" = "http://fake-url.test.me/", "state" = "active" ) } ), "^GET /applications/([0-9]+)" = list( content = function(methodAndPath, match, ...) { end <- attr(match, "match.length")[2] + match[2] application_id <- strtoi(substr(methodAndPath, match[2], end)) if (application_id != 10) { cli::cli_abort( "404 error", class = "rsconnect_http_404" ) } list( "id" = application_id, "content_id" = 5 ) } ) )) withr::local_options(rsconnect.http = mockServer$impl) fakeService <- list( protocol = "test", host = "unit-test", port = 42 ) client <- cloudClient(fakeService, NULL) app <- client$getApplication("10", NA) expect_equal(app$id, 5) expect_equal(app$application_id, 10) expect_equal(app$url, "http://fake-url.test.me/") app <- client$getApplication("5", 1) expect_equal(app$id, 5) expect_equal(app$application_id, 10) expect_equal(app$url, "http://fake-url.test.me/") app <- client$getApplication("5", "unknown") expect_equal(app$id, 5) expect_equal(app$application_id, 10) expect_equal(app$url, "http://fake-url.test.me/") app <- client$getApplication("10", "unknown") expect_equal(app$id, 5) expect_equal(app$application_id, 10) expect_equal(app$url, "http://fake-url.test.me/") }) test_that("Get application output trashed", { mockServer <- mockServerFactory(list( "^GET /outputs/([0-9]+)" = list( content = function(methodAndPath, match, ...) { end <- attr(match, "match.length")[2] + match[2] output_id <- strtoi(substr(methodAndPath, match[2], end)) list( "id" = output_id, "source_id" = 1, "url" = "http://fake-url.test.me/", "state" = "trashed" ) } ), "^GET /applications/([0-9]+)" = list( content = function(methodAndPath, match, ...) { end <- attr(match, "match.length")[2] + match[2] application_id <- strtoi(substr(methodAndPath, match[2], end)) list( "id" = application_id, "content_id" = 5 ) } ), "^PATCH /outputs/5" = list( content = function(methodAndPath, match, ...) { end <- attr(match, "match.length")[2] + match[2] output_id <- strtoi(substr(methodAndPath, match[2], end)) list() } ) )) withr::local_options(rsconnect.http = mockServer$impl) fakeService <- list( protocol = "test", host = "unit-test", port = 42 ) client <- cloudClient(fakeService, NULL) app <- client$getApplication(10, NA) expect_equal(app$id, 5) expect_equal(app$application_id, 10) expect_equal(app$url, "http://fake-url.test.me/") app <- client$getApplication(5, deploymentRecordVersion) expect_equal(app$id, 5) expect_equal(app$application_id, 1) expect_equal(app$url, "http://fake-url.test.me/") }) test_that("Create application", { mockServer <- mockServerFactory(list( "^POST /outputs" = list( content = function(methodAndPath, match, contentFile, ...) { content <- jsonlite::fromJSON(readChar(contentFile, file.info(contentFile)$size)) expect_equal(content$application_type, "connect") list( "id" = 1, "source_id" = 2, "url" = "http://fake-url.test.me/", "state" = "active" ) } ), "^GET /applications/([0-9]+)" = list( content = function(methodAndPath, match, ...) { end <- attr(match, "match.length")[2] + match[2] application_id <- strtoi(substr(methodAndPath, match[2], end)) list( "id" = application_id, "content_id" = 1 ) }) )) withr::local_options(rsconnect.http = mockServer$impl) fakeService <- list( protocol = "test", host = "unit-test", port = 42 ) client <- cloudClient(fakeService, NULL) app <- client$createApplication("test app", "unused?", "unused?", "unused?", "shiny") expect_equal(app$id, 1) expect_equal(app$application_id, 2) expect_equal(app$url, "http://fake-url.test.me/") }) test_that("Create application with space id", { mockServer <- mockServerFactory(list( "^POST /outputs" = list( content = function(methodAndPath, match, contentFile, ...) { content <- jsonlite::fromJSON(readChar(contentFile, file.info(contentFile)$size)) expect_equal(content$application_type, "connect") expect_equal(content$space, 333) list( "id" = 1, "source_id" = 2, "url" = "http://fake-url.test.me/", "state" = "active" ) } ), "^GET /applications/([0-9]+)" = list( content = function(methodAndPath, match, ...) { end <- attr(match, "match.length")[2] + match[2] application_id <- strtoi(substr(methodAndPath, match[2], end)) list( "id" = application_id, "content_id" = 1 ) }) )) withr::local_options(rsconnect.http = mockServer$impl) fakeService <- list( protocol = "test", host = "unit-test", port = 42 ) client <- cloudClient(fakeService, NULL) app <- client$createApplication("test app", "unused?", "unused?", "unused?", "shiny", spaceId = 333) expect_equal(app$id, 1) expect_equal(app$application_id, 2) expect_equal(app$url, "http://fake-url.test.me/") }) test_that("Create static application", { mockServer <- mockServerFactory(list( "^POST /outputs" = list( content = function(methodAndPath, match, contentFile, ...) { content <- jsonlite::fromJSON(readChar(contentFile, file.info(contentFile)$size)) expect_equal(content$application_type, "static") expect_equal(content$content_category, "document") list( "id" = 1, "source_id" = 2, "url" = "http://fake-url.test.me/", "state" = "active" ) } ), "^GET /applications/([0-9]+)" = list( content = function(methodAndPath, match, ...) { end <- attr(match, "match.length")[2] + match[2] application_id <- strtoi(substr(methodAndPath, match[2], end)) list( "id" = application_id, "content_id" = 1 ) }) )) withr::local_options(rsconnect.http = mockServer$impl) fakeService <- list( protocol = "test", host = "unit-test", port = 42 ) client <- cloudClient(fakeService, NULL) app <- client$createApplication("test app", "unused?", "unused?", "unused?", "static", "document") expect_equal(app$id, 1) expect_equal(app$application_id, 2) expect_equal(app$url, "http://fake-url.test.me/") }) test_that("Create static server-side-rendered application", { mockServer <- mockServerFactory(list( "^POST /outputs" = list( content = function(methodAndPath, match, contentFile, ...) { content <- jsonlite::fromJSON(readChar(contentFile, file.info(contentFile)$size)) expect_equal(content$application_type, "static") expect_equal(content$render_by, "server") expect_equal(content$content_category, "document") list( "id" = 1, "source_id" = 2, "url" = "http://fake-url.test.me/", "state" = "active" ) } ), "^GET /applications/([0-9]+)" = list( content = function(methodAndPath, match, ...) { end <- attr(match, "match.length")[2] + match[2] application_id <- strtoi(substr(methodAndPath, match[2], end)) list( "id" = application_id, "content_id" = 1 ) }) )) withr::local_options(rsconnect.http = mockServer$impl) fakeService <- list( protocol = "test", host = "unit-test", port = 42 ) client <- cloudClient(fakeService, NULL) app <- client$createApplication("test app", "unused?", "unused?", "unused?", "quarto-static", "document") expect_equal(app$id, 1) expect_equal(app$application_id, 2) expect_equal(app$url, "http://fake-url.test.me/") }) test_that("deployApplication updates the parent project", { mockServer <- mockServerFactory(list( "^GET /applications/([0-9]+)" = list( content = function(methodAndPath, match, ...) { end <- attr(match, "match.length")[2] + match[2] application_id <- substr(methodAndPath, match[2], end) expect_equal(application_id, "42") list( "id" = 42, "content_id" = 41 ) } ), "^PATCH /outputs" = list( content = function(methodAndPath, match, contentFile, ...) { content <- jsonlite::fromJSON(readChar(contentFile, file.info(contentFile)$size)) if (!is.null(content$project)) { expect_equal(content$project, 41) } else { expect_equal(content$space, 333) } list( "id" = 41 ) } ), "^POST /applications/([0-9]+)/deploy" = list( content = function(methodAndPath, match, contentFile, ...) { end <- attr(match, "match.length")[2] + match[2] application_id <- substr(methodAndPath, match[2], end) expect_equal(application_id, "101/") content <- jsonlite::fromJSON(readChar(contentFile, file.info(contentFile)$size)) expect_equal(content$rebuild, FALSE) list( "id" = 101 ) } ) )) withr::local_options(rsconnect.http = mockServer$impl) withr::local_envvar(LUCID_APPLICATION_ID = "42") fakeService <- list( protocol = "test", host = "unit-test", port = 42 ) client <- cloudClient(fakeService, NULL) application <- list( "id" = 100, "application_id" = 101 ) client$deployApplication(application, spaceId = 333) }) test_that("Create static RMD application", { mockServer <- mockServerFactory(list( "^POST /outputs" = list( content = function(methodAndPath, match, contentFile, ...) { content <- jsonlite::fromJSON(readChar(contentFile, file.info(contentFile)$size)) expect_equal(content$application_type, "static") expect_equal(content$render_by, "server") expect_equal(content$content_category, "document") list( "id" = 1, "source_id" = 2, "url" = "http://fake-url.test.me/", "state" = "active" ) } ), "^GET /applications/([0-9]+)" = list( content = function(methodAndPath, match, ...) { end <- attr(match, "match.length")[2] + match[2] application_id <- strtoi(substr(methodAndPath, match[2], end)) list( "id" = application_id, "content_id" = 1 ) }) )) withr::local_options(rsconnect.http = mockServer$impl) fakeService <- list( protocol = "test", host = "unit-test", port = 42 ) client <- cloudClient(fakeService, NULL) app <- client$createApplication("test app", "unused?", "unused?", "1", "rmd-static", "document") expect_equal(app$id, 1) expect_equal(app$application_id, 2) expect_equal(app$url, "http://fake-url.test.me/") }) test_that("Create application with linked source project", { mockServer <- mockServerFactory(list( "^POST /outputs" = list( content = function(methodAndPAth, match, contentFile, ...) { content <- jsonlite::fromJSON(readChar(contentFile, file.info(contentFile)$size)) expect_equal(content$project, 41) expect_equal(content$space, 99) list( "id" = 1, "source_id" = 2, "url" = "http://fake-url.test.me/", "state" = "active" ) } ), "^GET /applications/([0-9]+)" = list( content = function(methodAndPath, match, ...) { end <- attr(match, "match.length")[2] + match[2] application_id <- strtoi(substr(methodAndPath, match[2], end)) list( "id" = application_id, "content_id" = application_id - 1 ) } ), "^GET /content/41" = list( content = list( "id" = 41, "space_id" = 99 ) ) )) withr::local_options(rsconnect.http = mockServer$impl) Sys.setenv(LUCID_APPLICATION_ID = "42") withr::defer(Sys.unsetenv("LUCID_APPLICATION_ID")) fakeService <- list( protocol = "test", host = "unit-test", port = 42 ) client <- cloudClient(fakeService, NULL) app <- client$createApplication("test app", "unused?", "unused?", "unused?", "static") expect_equal(app$id, 1) expect_equal(app$application_id, 2) expect_equal(app$url, "http://fake-url.test.me/") }) test_that("findDeploymentTarget() results in correct Cloud API calls when given appId", { local_temp_config() mockServer <- mockServerFactory(list( "^GET /v1/applications/([0-9]+)" = list( content = function(methodAndPath, match, ...) { end <- attr(match, "match.length")[2] + match[2] application_id <- strtoi(substr(methodAndPath, match[2], end)) list( "id" = application_id, "content_id" = application_id - 1, "name" = paste("testthat app", application_id) ) } ), "^GET /v1/outputs/([0-9]+)" = list( content = function(methodAndPath, match, ...) { end <- attr(match, "match.length")[2] + match[2] output_id <- strtoi(substr(methodAndPath, match[2], end)) list( "id" = output_id, "source_id" = output_id + 1, "url" = "http://fake-url.test.me/", "state" = "active", "name" = "my output" ) } ) )) withr::local_options(rsconnect.http = mockServer$impl) testAccount <- configureTestAccount() withr::defer(removeAccount(testAccount)) target <- findDeploymentTarget( appId = 3, account = testAccount, server = "posit.cloud", ) accountDetails <- target$accountDetails deployment <- target$deployment expect_equal(deployment$name, "my output") expect_equal(deployment$account, testAccount) expect_equal(deployment$server, "posit.cloud") expect_equal(deployment$appId, 3) }) deployAppMockServerFactory <- function(expectedAppType, outputState) { outputResponse <- list( "id" = 1, "source_id" = 2, "url" = "http://fake-url.test.me/", "state" = outputState ) actualCalls <- list( outputCreated = FALSE, outputStateUpdated = FALSE, revisionCreated = FALSE, bundleCreated = FALSE, bundleUploaded = FALSE, bundleReady = FALSE, deployStarted = FALSE ) server <- mockServerFactory(list( # An attempt to search for preexisting applications with the same name. # This call should change, see https://github.com/rstudio/rsconnect/issues/808 "^GET /v1/applications/[?]filter=account_id:50&filter=type:connect" = list( content = list( count = 0, total = 0, applications = list() ) ), "^POST /v1/outputs$" = list( content = function(methodAndPath, match, contentFile, ...) { e <- environment() p <- parent.env(e) p$actualCalls$outputCreated <- TRUE content <- jsonlite::fromJSON(readChar(contentFile, file.info(contentFile)$size)) expect_equal(content$application_type, expectedAppType) expect_equal(content$name, "Desired name here") outputResponse } ), "^GET /v1/applications/([0-9]+)$" = list( content = function(methodAndPath, match, ...) { end <- attr(match, "match.length")[2] + match[2] application_id <- strtoi(substr(methodAndPath, match[2], end)) list( id = application_id, content_id = application_id - 1, name = paste("testthat app", application_id), type = expectedAppType ) } ), "^POST /v1/bundles/123/status$" = list( content = function(methodAndPath, match, contentFile, ...) { e <- environment() p <- parent.env(e) p$actualCalls$bundleReady <- TRUE content <- jsonlite::fromJSON(readChar(contentFile, file.info(contentFile)$size)) expect_equal(content$status, "ready") list() } ), "^POST /v1/bundles$" = list( content = function(methodAndPath, match, contentFile, ...) { e <- environment() p <- parent.env(e) p$actualCalls$bundleCreated <- TRUE content <- jsonlite::fromJSON(readChar(contentFile, file.info(contentFile)$size)) list( id = 123, presigned_url = "https://write-only-memory.com/fake-presigned-url", presigned_checksum = content$checksum ) } ), "^PUT /fake-presigned-url" = list( content = function(...) { e <- environment() p <- parent.env(e) p$actualCalls$bundleUploaded <- TRUE } ), "^GET /v1/bundles/123$" = list( content = list( id = 123, status = "ready" ) ), "^POST /v1/applications/[23]/deploy$" = list( content = function(...) { e <- environment() p <- parent.env(e) p$actualCalls$deployStarted <- TRUE list( task_id = "testthat-task-id" ) } ), "^GET /v1/tasks/testthat-task-id$" = list( content = list( status = "success", finished = TRUE ) ), # Fetch existing output when re-deploying from .dcf data "^GET /v1/outputs/1$" = list( content = outputResponse ), "^POST /v1/outputs/1/revisions" = list( content = function(...) { e <- environment() p <- parent.env(e) p$actualCalls$revisionCreated <- TRUE list( application_id = 3 ) } ), "^PATCH /v1/outputs" = list( content = function(...) { e <- environment() p <- parent.env(e) p$actualCalls$outputStateUpdated <- TRUE } ) )) expect_calls <- function(expectedCalls) { expect_equal(actualCalls, expectedCalls) } reset_calls <- function() { e <- environment() p <- parent.env(e) p$actualCalls <- list( outputCreated = FALSE, outputStateUpdated = FALSE, revisionCreated = FALSE, bundleCreated = FALSE, bundleUploaded = FALSE, bundleReady = FALSE, deployStarted = FALSE ) } list( server = server, expect_calls = expect_calls, reset_calls = reset_calls ) } test_that("deployApp() for shiny results in correct Cloud API calls", { skip_on_cran() local_temp_config() withr::local_options(renv.verbose = TRUE) mock <- deployAppMockServerFactory(expectedAppType = "connect", outputState = "active") mockServer <- mock$server withr::local_options(rsconnect.http = mockServer$impl) testAccount <- configureTestAccount() withr::defer(removeAccount(testAccount)) sourcePath <- test_path("shinyapp-simple") # Remove local deployment info at end for reproducibility and tidiness. withr::defer(forgetDeployment(appPath = sourcePath, force = TRUE)) deployApp( appName = "Desired name here", appDir = sourcePath, server = "posit.cloud", account = testAccount, logLevel = "quiet" ) mock$expect_calls(list( outputCreated = TRUE, outputStateUpdated = FALSE, revisionCreated = FALSE, bundleCreated = TRUE, bundleUploaded = TRUE, bundleReady = TRUE, deployStarted = TRUE )) mock$reset_calls() # deploy again to test existing deployment path deployApp( appDir = sourcePath, logLevel = "quiet" ) mock$expect_calls(list( outputCreated = FALSE, outputStateUpdated = FALSE, revisionCreated = FALSE, bundleCreated = TRUE, bundleUploaded = TRUE, bundleReady = TRUE, deployStarted = TRUE )) # Start over, add another posit.cloud account and test again with that environment mock$reset_calls() forgetDeployment(appPath = sourcePath, force = TRUE) extraLocalAccount <- configureTestAccount(name = "testthat-superfluous-account") withr::defer(removeAccount(extraLocalAccount)) deployApp( appName = "Desired name here", appDir = sourcePath, server = "posit.cloud", account = testAccount, logLevel = "quiet" ) mock$expect_calls(list( outputCreated = TRUE, outputStateUpdated = FALSE, revisionCreated = FALSE, bundleCreated = TRUE, bundleUploaded = TRUE, bundleReady = TRUE, deployStarted = TRUE )) mock$reset_calls() # deploy again to test existing deployment path deployApp( appDir = sourcePath, logLevel = "quiet" ) mock$expect_calls(list( outputCreated = FALSE, outputStateUpdated = FALSE, revisionCreated = FALSE, bundleCreated = TRUE, bundleUploaded = TRUE, bundleReady = TRUE, deployStarted = TRUE )) }) test_that("deployDoc() results in correct Cloud API calls", { local_temp_config() mock <- deployAppMockServerFactory(expectedAppType = "static", outputState = "active") mockServer <- mock$server withr::local_options(rsconnect.http = mockServer$impl) testAccount <- configureTestAccount() withr::defer(removeAccount(testAccount)) sourcePath <- test_path("static-with-quarto-yaml") # Remove local deployment info at end for reproducibility and tidiness. withr::defer(forgetDeployment(appPath = sourcePath, force = TRUE)) deployDoc( paste(sourcePath, "slideshow.html", sep = "/"), appName = "Desired name here", server = "posit.cloud", account = testAccount, logLevel = "quiet" ) mock$expect_calls(list( outputCreated = TRUE, outputStateUpdated = FALSE, revisionCreated = FALSE, bundleCreated = TRUE, bundleUploaded = TRUE, bundleReady = TRUE, deployStarted = TRUE )) mock$reset_calls() # deploy again to test existing deployment path deployApp( appDir = sourcePath, logLevel = "quiet" ) mock$expect_calls(list( outputCreated = FALSE, outputStateUpdated = FALSE, revisionCreated = TRUE, bundleCreated = TRUE, bundleUploaded = TRUE, bundleReady = TRUE, deployStarted = TRUE )) }) rsconnect/tests/testthat/shinyapp-appR/0000755000176200001440000000000014513230050017776 5ustar liggesusersrsconnect/tests/testthat/shinyapp-appR/rsconnect/0000755000176200001440000000000014513230050021774 5ustar liggesusersrsconnect/tests/testthat/shinyapp-appR/rsconnect/colorado.posit.co/0000755000176200001440000000000014513230050025333 5ustar liggesusersrsconnect/tests/testthat/shinyapp-appR/rsconnect/colorado.posit.co/hadley/0000755000176200001440000000000014513230050026601 5ustar liggesusersrsconnect/tests/testthat/shinyapp-appR/rsconnect/colorado.posit.co/hadley/shinyapp-appR.dcf0000644000176200001440000000036314513230050032014 0ustar liggesusersname: shinyapp-appR title: username: hadley account: hadley server: colorado.posit.co hostUrl: https://colorado.posit.co/rsc/__api__ appId: 15717 bundleId: 71906 url: https://colorado.posit.co/rsc/content/87507bba-4a69-4e19-becd-748b9406bad2/ rsconnect/tests/testthat/shinyapp-appR/app.R0000644000176200001440000000056514467166424020734 0ustar liggesusersserver <- function(input, output) { output$distPlot <- renderPlot({ hist(rnorm(input$obs), col = "darkgray", border = "white") }) } ui <- fluidPage( sidebarLayout( sidebarPanel( sliderInput("obs", "Number of observations:", min = 10, max = 500, value = 100)), mainPanel(plotOutput("distPlot")))) shinyApp(ui = ui, server = server) rsconnect/tests/testthat/test-bundlePython.R0000644000176200001440000000441014513230050021015 0ustar liggesuserstest_that("getPython looks in argument, RETICULATE_PYTHON, then RETICULATE_PYTHON_FALLBACK", { skip_on_cran() withr::local_envvar( RETICULATE_PYTHON = "~/python", RETICULATE_PYTHON_FALLBACK = "~/fallback" ) expect_equal(getPython("~/supplied"), path.expand("~/supplied")) expect_equal(getPython(NULL), path.expand("~/python")) withr::local_envvar( RETICULATE_PYTHON = NA, RETICULATE_PYTHON_FALLBACK = "~/fallback" ) expect_equal(getPython(NULL), path.expand("~/fallback")) withr::local_envvar( RETICULATE_PYTHON = NA, RETICULATE_PYTHON_FALLBACK = NA ) expect_equal(getPython(NULL), NULL) }) test_that("rsconnect.python.enabled overrides getPythonForTarget() default", { skip_on_cran() expect_equal(getPythonForTarget("p", list(server = "shinyapps.io")), NULL) expect_equal(getPythonForTarget("p", list(server = "example.com")), "p") withr::local_options(rsconnect.python.enabled = FALSE) expect_equal(getPythonForTarget("p", list(server = "shinyapps.io")), NULL) expect_equal(getPythonForTarget("p", list(server = "example.com")), NULL) withr::local_options(rsconnect.python.enabled = TRUE) expect_equal(getPythonForTarget("p", list(server = "shinyapps.io")), "p") expect_equal(getPythonForTarget("p", list(server = "example.com")), "p") }) test_that("can infer env from existing directory", { skip_on_cran() env <- inferPythonEnv(test_path("test-reticulate-rmds"), pythonPathOrSkip()) expect_named(env, c("version", "package_manager")) expect_named(env$package_manager, c("name", "version", "package_file", "contents")) }) test_that("doesn't override existing requirements.txt by default", { skip_on_cran() dir <- local_temp_app(list(requirements.txt = "pip")) env <- inferPythonEnv(dir, pythonPathOrSkip()) expect_equal(env$package_manager$contents, "pip\n") env <- inferPythonEnv(dir, pythonPathOrSkip(), forceGenerate = TRUE) expect_match(env$package_manager$contents, "generated by rsconnect-python") }) test_that("throws error if environment.py fails", { skip_on_cran() skip_on_os("windows") dir <- local_temp_app(list(requirements.txt = "\\")) Sys.chmod(file.path(dir, "requirements.txt"), "000") withr::local_dir(dir) expect_snapshot(inferPythonEnv(".", pythonPathOrSkip()), error = TRUE) }) rsconnect/tests/testthat/certs/0000755000176200001440000000000014467166424016410 5ustar liggesusersrsconnect/tests/testthat/certs/localhost.crt0000644000176200001440000000010014467166424021101 0ustar liggesusers-----BEGIN CERTIFICATE----- localhost -----END CERTIFICATE----- rsconnect/tests/testthat/certs/two-cas.crt0000644000176200001440000000610414467166424020500 0ustar liggesusersAmazon Root CA 1 ================ -----BEGIN CERTIFICATE----- MIIDQTCCAimgAwIBAgITBmyfz5m/jAo54vB4ikPmljZbyjANBgkqhkiG9w0BAQsF ADA5MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6 b24gUm9vdCBDQSAxMB4XDTE1MDUyNjAwMDAwMFoXDTM4MDExNzAwMDAwMFowOTEL MAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJv b3QgQ0EgMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALJ4gHHKeNXj ca9HgFB0fW7Y14h29Jlo91ghYPl0hAEvrAIthtOgQ3pOsqTQNroBvo3bSMgHFzZM 9O6II8c+6zf1tRn4SWiw3te5djgdYZ6k/oI2peVKVuRF4fn9tBb6dNqcmzU5L/qw IFAGbHrQgLKm+a/sRxmPUDgH3KKHOVj4utWp+UhnMJbulHheb4mjUcAwhmahRWa6 VOujw5H5SNz/0egwLX0tdHA114gk957EWW67c4cX8jJGKLhD+rcdqsq08p8kDi1L 93FcXmn/6pUCyziKrlA4b9v7LWIbxcceVOF34GfID5yHI9Y/QCB/IIDEgEw+OyQm jgSubJrIqg0CAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC AYYwHQYDVR0OBBYEFIQYzIU07LwMlJQuCFmcx7IQTgoIMA0GCSqGSIb3DQEBCwUA A4IBAQCY8jdaQZChGsV2USggNiMOruYou6r4lK5IpDB/G/wkjUu0yKGX9rbxenDI U5PMCCjjmCXPI6T53iHTfIUJrU6adTrCC2qJeHZERxhlbI1Bjjt/msv0tadQ1wUs N+gDS63pYaACbvXy8MWy7Vu33PqUXHeeE6V/Uq2V8viTO96LXFvKWlJbYK8U90vv o/ufQJVtMVT8QtPHRh8jrdkPSHCa2XV4cdFyQzR1bldZwgJcJmApzyMZFo6IQ6XU 5MsI+yMRQ+hDKXJioaldXgjUkK642M4UwtBV8ob2xJNDd2ZhwLnoQdeXeGADbkpy rqXRfboQnoZsG4q5WTP468SQvvG5 -----END CERTIFICATE----- Amazon Root CA 2 ================ -----BEGIN CERTIFICATE----- MIIFQTCCAymgAwIBAgITBmyf0pY1hp8KD+WGePhbJruKNzANBgkqhkiG9w0BAQwF ADA5MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6 b24gUm9vdCBDQSAyMB4XDTE1MDUyNjAwMDAwMFoXDTQwMDUyNjAwMDAwMFowOTEL MAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJv b3QgQ0EgMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAK2Wny2cSkxK gXlRmeyKy2tgURO8TW0G/LAIjd0ZEGrHJgw12MBvIITplLGbhQPDW9tK6Mj4kHbZ W0/jTOgGNk3Mmqw9DJArktQGGWCsN0R5hYGCrVo34A3MnaZMUnbqQ523BNFQ9lXg 1dKmSYXpN+nKfq5clU1Imj+uIFptiJXZNLhSGkOQsL9sBbm2eLfq0OQ6PBJTYv9K 8nu+NQWpEjTj82R0Yiw9AElaKP4yRLuH3WUnAnE72kr3H9rN9yFVkE8P7K6C4Z9r 2UXTu/Bfh+08LDmG2j/e7HJV63mjrdvdfLC6HM783k81ds8P+HgfajZRRidhW+me z/CiVX18JYpvL7TFz4QuK/0NURBs+18bvBt+xa47mAExkv8LV/SasrlX6avvDXbR 8O70zoan4G7ptGmh32n2M8ZpLpcTnqWHsFcQgTfJU7O7f/aS0ZzQGPSSbtqDT6Zj mUyl+17vIWR6IF9sZIUVyzfpYgwLKhbcAS4y2j5L9Z469hdAlO+ekQiG+r5jqFoz 7Mt0Q5X5bGlSNscpb/xVA1wf+5+9R+vnSUeVC06JIglJ4PVhHvG/LopyboBZ/1c6 +XUyo05f7O0oYtlNc/LMgRdg7c3r3NunysV+Ar3yVAhU/bQtCSwXVEqY0VThUWcI 0u1ufm8/0i2BWSlmy5A5lREedCf+3euvAgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMB Af8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBSwDPBMMPQFWAJI/TPlUq9LhONm UjANBgkqhkiG9w0BAQwFAAOCAgEAqqiAjw54o+Ci1M3m9Zh6O+oAA7CXDpO8Wqj2 LIxyh6mx/H9z/WNxeKWHWc8w4Q0QshNabYL1auaAn6AFC2jkR2vHat+2/XcycuUY +gn0oJMsXdKMdYV2ZZAMA3m3MSNjrXiDCYZohMr/+c8mmpJ5581LxedhpxfL86kS k5Nrp+gvU5LEYFiwzAJRGFuFjWJZY7attN6a+yb3ACfAXVU3dJnJUH/jWS5E4ywl 7uxMMne0nxrpS10gxdr9HIcWxkPo1LsmmkVwXqkLN1PiRnsn/eBG8om3zEK2yygm btmlyTrIQRNg91CMFa6ybRoVGld45pIq2WWQgj9sAq+uEjonljYE1x2igGOpm/Hl urR8FLBOybEfdF849lHqm/osohHUqS0nGkWxr7JOcQ3AWEbWaQbLU8uz/mtBzUF+ fUwPfHJ5elnNXkoOrJupmHN5fLT0zLm4BwyydFy4x2+IoZCn9Kr5v2c69BoVYh63 n749sSmvZ6ES8lgQGVMDMBu4Gon2nL2XA46jCfMdiyHxtN/kHNGfZQIG6lzWE7OE 76KlXIx3KadowGuuQNKotOrN8I1LOJwZmhsoVLiJkO/KdYE+HvJkJMcYr07/R54H 9jVlpNMKVv/1F2Rs76giJUmTtt8AF9pYfl3uxRuw0dFfIRDH+fO6AgonB8Xx1sfT 4PsJYGw= -----END CERTIFICATE----- rsconnect/tests/testthat/certs/invalid.crt0000644000176200001440000000071714467166424020555 0ustar liggesusersDo you remember still the falling stars that like swift horses through the heavens raced and suddenly leaped across the hurdles of our wishes--do you recall? And we did make so many! For there were countless numbers of stars: each time we looked above we were astounded by the swiftness of their daring play, while in our hearts we felt safe and secure watching these brilliant bodies disintegrate, knowing somehow we had survived their fall. Rainer Maria Rilke rsconnect/tests/testthat/certs/sample.crt0000644000176200001440000000247614467166424020414 0ustar liggesusers-----BEGIN CERTIFICATE----- MIIDszCCApugAwIBAgIJAJhKUgOoHiBhMA0GCSqGSIb3DQEBCwUAMIGAMQswCQYD VQQGEwJVUzELMAkGA1UECAwCV0ExEDAOBgNVBAcMB1JlZG1vbmQxEDAOBgNVBAoM B1JTdHVkaW8xGzAZBgNVBAMMEnJzdHVkaW8tbWVnYS5sb2NhbDEjMCEGCSqGSIb3 DQEJARYUam9uYXRoYW5AcnN0dWRpby5jb20wHhcNMTcwOTAxMjIxNTI5WhcNMjAw NTI3MjIxNTI5WjBVMQswCQYDVQQGEwJVUzENMAsGA1UECAwETm9uZTELMAkGA1UE BwwCTkIxDTALBgNVBAoMBE5vbmUxGzAZBgNVBAMMEnJzdHVkaW8tbWVnYS5sb2Nh bDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANq8Hgk1vyt7N8mL0qpc 8wVrVavFNo23G887/SDJ/OIQljd3PLY1zJ+KAIZjZ1DNWG3DCfZv3ghser3gi5x/ TTLVI2AMrxYafV9KLOic35ngH6Aj6fgXZC0U0uaqlx5cdd+2SFIgs2l2IZMWXM8o YLcdes+L5yOfJPlKkASz2Yh9aBCZR6Xf1Bg2M1brwAeMtBB+dXcnXgNAHD0u+dOS 3PMlUugjRPH4b0gmMVnSjLANGGVbJAJiIq2k0ZblgixjiAGpampTTe+ml9KQL38C HWiJkSTuC6ipZDyjk9BhJTz2fH3wR0yJsk/J3o8hm5u0WBlfttv/VMtsWlhBAc6A 4HkCAwEAAaNaMFgwHwYDVR0jBBgwFoAU21Bn94udZnSVWlZHji9jfc33Cb0wCQYD VR0TBAIwADALBgNVHQ8EBAMCBPAwHQYDVR0RBBYwFIIScnN0dWRpby1tZWdhLmxv Y2FsMA0GCSqGSIb3DQEBCwUAA4IBAQCIbnzfsTL80Ls8LmiSuZ6WEG2+9fgWxXYq VmOq+y0LJboe7Bf86FsbI8KNDJ3SEU0XFDDNio/txRoNomrSX2HKOUwoc9z8jGNV SWusvlOaaMbH0+Vrid1OMqy8Nk3yyZdhc3cAtN6juG//T/9c8XWA68qFq+W6TIUp qFpNsfcyN0NjP9pu4ANQzt5vTpVaqkmxHr1d53gAw89hHsBrgMLDpSeQRAnQNt6G 0mcCAwBfEqTK9lDzGiS8vnnD2ovFsQllRyJbzWSttQ7NvTa/nvCs1GfTTOK02K9G qXn256VmSEjzZgWrKB87Md1/ySOUxi5M8VGoVBRJ7mfuad2/h4S1 -----END CERTIFICATE----- rsconnect/tests/testthat/certs/store.crt0000644000176200001440000000003114467166424020250 0ustar liggesusers== system cert store == rsconnect/tests/testthat/shinyapp-singleR/0000755000176200001440000000000014536673154020524 5ustar liggesusersrsconnect/tests/testthat/shinyapp-singleR/single.R0000644000176200001440000000056514467166424022136 0ustar liggesusersserver <- function(input, output) { output$distPlot <- renderPlot({ hist(rnorm(input$obs), col = "darkgray", border = "white") }) } ui <- fluidPage( sidebarLayout( sidebarPanel( sliderInput("obs", "Number of observations:", min = 10, max = 500, value = 100)), mainPanel(plotOutput("distPlot")))) shinyApp(ui = ui, server = server) rsconnect/tests/testthat/quarto-doc-none/0000755000176200001440000000000014536673151020300 5ustar liggesusersrsconnect/tests/testthat/quarto-doc-none/quarto-doc-none.qmd0000644000176200001440000000027514467166424024025 0ustar liggesusers--- title: "quarto-doc-none" --- ## Quarto Quarto enables you to weave together content and executable code into a finished document. To learn more about Quarto see . rsconnect/tests/testthat/test-cert.R0000644000176200001440000000327214513230050017304 0ustar liggesuserstest_that("system and server cert stores are concatenated", { local_temp_config() # use a dummy CA bundle withr::local_options(rsconnect.ca.bundle = test_path("certs/store.crt")) # create and then read the temporary certificate file concatenated <- createCertificateFile(readLines(test_path("certs/localhost.crt"))) withr::defer(unlink(concatenated)) store <- paste(readLines(concatenated), collapse = "\n") # make sure that the localhost and system stores both exist in the # concatenated store expect_true(grepl("localhost", store, fixed = TRUE)) expect_true(grepl("system", store, fixed = TRUE)) }) test_that("invalid certificates cannot be added", { local_temp_config() expect_error(addTestServer( url = "https://localhost:4567/", name = "cert_test_e", certificate = test_path("certs/invalid.crt") )) }) test_that("certificates not used when making plain http connections", { local_temp_config() local_http_recorder() GET( list( protocol = "http", host = "localhost:4567", port = "80", path = "apps" ), authInfo = list(certificate = test_path("certs/localhost.crt")), "apps" ) expect_equal(httpLastRequest$certificate, NULL) }) test_that("certificates used when making https connections", { local_temp_config() local_http_recorder() GET( list( protocol = "https", host = "localhost:4567", port = "443", path = "apps" ), authInfo = list(certificate = test_path("certs/localhost.crt")), "apps" ) # we expect to get a cert file expect_true(file.exists(httpLastRequest$certificate)) # clean up unlink(httpLastRequest$certificate) }) rsconnect/tests/testthat/quarto-website-r/0000755000176200001440000000000014536742742020502 5ustar liggesusersrsconnect/tests/testthat/quarto-website-r/_quarto.yml0000644000176200001440000000035714467166424022704 0ustar liggesusersproject: type: website website: title: "quarto-website-r" navbar: background: primary left: - href: index.qmd text: Home - about.qmd format: html: theme: cosmo css: styles.css editor: visual rsconnect/tests/testthat/quarto-website-r/styles.css0000644000176200001440000000002114467166424022530 0ustar liggesusers/* css styles */ rsconnect/tests/testthat/quarto-website-r/README.md0000644000176200001440000000177214467166424021770 0ustar liggesusers# quarto-website-r A minimal Quarto website with an R/knitr runtime ## Creation and Contents - This project was created by making a new Quarto website in the IDE and selecting selecting knitr as the runtime. - The `manifest.json` was extracted from the source bundle after using push-button deployment in the IDE. It was edited to remove IDE files that don't exist in the bundle. ## `quarto inspect` ```json { "quarto": { "version": "0.9.16" }, "engines": [ "knitr" ], "config": { "project": { "type": "website", "lib-dir": "site_libs", "output-dir": "_site" }, "website": { "title": "quarto-website-r", "navbar": { "background": "primary", "left": [ { "href": "index.qmd", "text": "Home" }, "about.qmd" ] } }, "format": { "html": { "theme": "cosmo", "css": "styles.css" } }, "editor": "visual", "language": {} } } ``` rsconnect/tests/testthat/quarto-website-r/index.qmd0000644000176200001440000000023614467166424022315 0ustar liggesusers--- title: "quarto-website-r" --- This is a Quarto website. To learn more about Quarto websites visit . ```{r} 1 + 1 ``` rsconnect/tests/testthat/quarto-website-r/about.qmd0000644000176200001440000000007214467166424022316 0ustar liggesusers--- title: "About" --- About this site ```{r} 1 + 1 ``` rsconnect/tests/testthat/test-title.R0000644000176200001440000000157514513230050017474 0ustar liggesuserstest_that("generated application names do not exceed maximum length", { title <- "Good heavens, this title is simply enormous! I can't imagine why anyone would use such a cumbersome moniker." name <- generateAppName(title) expect_lt(nchar(name), 65) }) test_that("empty titles are rejected", { title <- "" expect_error(generateAppName(title)) }) test_that("path is used to generate valid title if title isn't specified", { title <- NULL path <- "shiny-app-in-subdir" name <- generateAppName(title, path) expect_gt(nchar(name), 5) }) test_that("invalid characters are removed from titles", { title <- "Free!* (* = With $5 Donation)" name <- generateAppName(title) expect_false(grepl("[!*=$]", name)) }) test_that("valid characters are not removed from titles", { title <- "inexpensive_kittens-5" name <- generateAppName(title) expect_identical(title, name) }) rsconnect/tests/testthat/test-applications.R0000644000176200001440000000175414513230050021040 0ustar liggesuserstest_that("syncAppMetadata updates deployment records", { local_temp_config() addTestServer() addTestAccount("ron") app <- local_temp_app() addTestDeployment(app, appId = "123", metadata = list(when = 123)) local_mocked_bindings(clientForAccount = function(...) { list( getApplication = function(...) list(title = "newtitle", url = "newurl") ) }) syncAppMetadata(app) deps <- deployments(app) expect_equal(deps$title, "newtitle") expect_equal(deps$url, "newurl") expect_equal(deps$when, NULL) }) test_that("syncAppMetadata deletes deployment records if needed", { local_temp_config() addTestServer() addTestAccount("ron") app <- local_temp_app() addTestDeployment(app, appId = "123", metadata = list(when = 123)) local_mocked_bindings(clientForAccount = function(...) { list( getApplication = function(...) abort(class = "rsconnect_http_404") ) }) expect_snapshot(syncAppMetadata(app)) expect_equal(nrow(deployments(app)), 0) }) rsconnect/tests/testthat/test-cookies.R0000644000176200001440000002304114513230050017777 0ustar liggesuserstest_that("Parsing cookies works", { # Note that the Expires field is ignored cookie <- parseCookie("mycookie=myvalue; Path=/; Expires=Sat, 24 Jun 2017 16:16:05 GMT; Max-Age=3600; HttpOnly", "/") expect_equal(cookie$name, "mycookie") expect_equal(cookie$value, "myvalue") expect_true(cookie$expires > Sys.time() + 3595) expect_true(cookie$expires < Sys.time() + 3605) expect_equal(cookie$path, "/") expect_false(cookie$secure) # Max-Age with no semicolon, non-root path cookie <- parseCookie("mycookie2=myvalue2; Secure; Path=/test; max-AGE=3600") expect_equal(cookie$name, "mycookie2") expect_equal(cookie$value, "myvalue2") expect_true(cookie$expires > Sys.time() + 3595) expect_true(cookie$expires < Sys.time() + 3605) expect_equal(cookie$path, "/test") expect_true(cookie$secure) # Path with no semicolon, no max age cookie <- parseCookie("mycookie2=myvalue2; PATH=/test") expect_equal(cookie$name, "mycookie2") expect_equal(cookie$value, "myvalue2") expect_true(cookie$expires > (Sys.time() + 10^9)) expect_equal(cookie$path, "/test") expect_false(cookie$secure) # No path, value with no semicolon cookie <- parseCookie("mycookie2=myvalue2") expect_equal(cookie$name, "mycookie2") expect_equal(cookie$value, "myvalue2") expect_true(cookie$expires > (Sys.time() + 10^9)) expect_equal(cookie$path, "/") expect_false(cookie$secure) # Trailing secure cookie <- parseCookie("mycookie2=myvalue2; Secure") expect_equal(cookie$name, "mycookie2") expect_equal(cookie$value, "myvalue2") expect_true(cookie$expires > (Sys.time() + 10^9)) expect_equal(cookie$path, "/") expect_true(cookie$secure) # Full cookie with spaces around =s cookie <- parseCookie("mycookie = myvalue; SEcure; Path = /; Expires = Sat, 24 Jun 2017 16:16:05 GMT; Max-Age = 3600; HttpOnly") expect_equal(cookie$name, "mycookie") expect_equal(cookie$value, "myvalue") expect_true(cookie$secure) expect_true(cookie$expires > Sys.time() + 3595) expect_true(cookie$expires < Sys.time() + 3605) expect_equal(cookie$path, "/") # Value-less cookie cookie <- parseCookie("mycookie=; Path = /") expect_equal(cookie$name, "mycookie") expect_equal(cookie$value, "") expect_equal(cookie$path, "/") # prove #229 is fixed cookie <- parseCookie("my_cookie-which/uses%20strange?characters=foo_-%20+?1234bar; Path = /") expect_equal(cookie$name, "my_cookie-which/uses%20strange?characters") expect_equal(cookie$value, "foo_-%20+?1234bar") expect_equal(cookie$path, "/") }) test_that("Invalid cookies fail parsing", { # Invalid path, doesn't match request's path expect_snapshot(cookie <- parseCookie("x=1; Path=/something/else", "/path")) expect_null(cookie) # Invalid key/val format expect_snapshot(cookie <- parseCookie("mycookie;")) expect_null(cookie) }) test_that("cookies can be stored", { local_cookie_store() parsedUrl <- parseHttpUrl("http://fakedomain:123/test/stuff") expect_warning({ storeCookies(parsedUrl, c( "mycookie=myvalue; Path=/; Max-Age=3600; HttpOnly", "anotherCookie=what; Path=/test; Max-Age=100", "wrongpath=huh; Path=/uhoh; Max-Age=100", "secureCookie=123; Secure", "third=cookie; Path=/; Max-Age=500") ) }, "Invalid path set for cookie") cookies <- get("fakedomain:123", envir = .cookieStore) expect_equal(nrow(cookies), 4) # Check the first cookie co <- cookies[cookies$name == "mycookie", ] expect_equal(co$name, "mycookie") expect_equal(co$value, "myvalue") expect_true(co$expires > Sys.time() + 3595) expect_true(co$expires < Sys.time() + 3605) expect_equal(co$path, "/") expect_false(co$secure) # And the other co <- cookies[cookies$name == "anotherCookie", ] expect_equal(co$name, "anotherCookie") expect_equal(co$value, "what") expect_true(co$expires > Sys.time() + 95) expect_true(co$expires < Sys.time() + 105) expect_equal(co$path, "/test") expect_false(co$secure) # Third co <- cookies[cookies$name == "third", ] expect_equal(co$name, "third") expect_equal(co$value, "cookie") expect_true(co$expires > Sys.time() + 495) expect_true(co$expires < Sys.time() + 505) expect_equal(co$path, "/") expect_false(co$secure) # Fourth co <- cookies[cookies$name == "secureCookie", ] expect_equal(co$name, "secureCookie") expect_equal(co$value, "123") expect_true(co$secure) }) test_that("duplicate cookies overwrite one another", { local_cookie_store() parsedUrl <- parseHttpUrl("http://fakedomain:123/test/stuff") storeCookies(parsedUrl, "mycookie=myvalue; Path=/; Max-Age=3600") cookies <- get("fakedomain:123", envir = .cookieStore) expect_equal(nrow(cookies), 1) # Add another valid cookie, same domain, same name, different path storeCookies(parsedUrl, "mycookie=myvalue; Path=/test; Max-Age=3600") cookies <- get("fakedomain:123", envir = .cookieStore) expect_equal(nrow(cookies), 2) # Duplicate cookie should overwrite storeCookies(parsedUrl, "mycookie=myvalue; Path=/test; Max-Age=99") cookies <- get("fakedomain:123", envir = .cookieStore) expect_equal(nrow(cookies), 2) # Confirm that the stored cookie is the more recent one. co <- cookies[cookies$path == "/test", ] expect_true(co$expires > Sys.time() + 94) expect_true(co$expires < Sys.time() + 104) }) test_that("appending cookie headers works", { local_cookie_store() parsedUrl <- parseHttpUrl("http://fakedomain:123/test/stuff") # Nothing to append, no-op headers <- appendCookieHeaders(parsedUrl, c(header1 = 123, header2 = "abc")) expect_length(headers, 2) expect_equal(headers[["header1"]], "123") expect_equal(headers[["header2"]], "abc") # Store a cookie storeCookies(parsedUrl, "cookie1=value1; Path=/; Max-Age=3600") headers <- appendCookieHeaders(parsedUrl, c(header1 = 123, header2 = "abc")) expect_length(headers, 3) expect_equal(headers[["header1"]], "123") expect_equal(headers[["header2"]], "abc") expect_equal(headers[["cookie"]], "cookie1=value1") # Store a couple more cookies storeCookies(parsedUrl, "cookie2=value2; Path=/test; Max-Age=3600") # This one has the wrong path, will be filtered out storeCookies(parseHttpUrl("http://fakedomain:123/another"), "cookie3=value3; Path=/another; Max-Age=3600") headers <- appendCookieHeaders(parsedUrl, c(header1 = 123, header2 = "abc")) expect_length(headers, 3) expect_equal(headers[["header1"]], "123") expect_equal(headers[["header2"]], "abc") expect_equal(headers[["cookie"]], "cookie2=value2; cookie1=value1") # If you already have a cookie header, you end up with two headers <- appendCookieHeaders(parsedUrl, c(cookie = "existing=value")) expect_length(headers, 2) expect_equal(headers[1], c(cookie = "existing=value")) expect_equal(headers[2], c(cookie = "cookie2=value2; cookie1=value1")) # Add a secure cookie storeCookies(parsedUrl, "securecookie=secureval; Path=/; Max-Age=3600; Secure") headers <- appendCookieHeaders(parsedUrl, c()) expect_equal(headers[["cookie"]], "cookie2=value2; cookie1=value1") # But over a secure channel, you'd include the secure cookie headers <- appendCookieHeaders(parseHttpUrl("https://fakedomain:123/test/stuff"), c()) expect_equal(headers[["cookie"]], "securecookie=secureval; cookie2=value2; cookie1=value1") }) test_that("Expired cookies are removed", { local_cookie_store() parsedUrl <- parseHttpUrl("http://fakedomain:123/test/stuff") # Expired cookies are removed from the store and not included in the request storeCookies(parsedUrl, "expired=something; Max-Age=-1") cookies <- get("fakedomain:123", envir = .cookieStore) expect_equal(nrow(cookies), 1) # Now it will recognize that it's expired and remove it headers <- appendCookieHeaders(parsedUrl, NULL) expect_null(headers) cookies <- get("fakedomain:123", envir = .cookieStore) expect_equal(nrow(cookies), 0) # And with multiple cookies, it still removes only the expired one storeCookies(parsedUrl, "expired=something; Max-Age=-1") storeCookies(parsedUrl, "notexpired=something") cookies <- get("fakedomain:123", envir = .cookieStore) expect_equal(nrow(cookies), 2) # Now it will recognize that it's expired and remove it headers <- appendCookieHeaders(parsedUrl, c()) expect_length(headers, 1) cookies <- get("fakedomain:123", envir = .cookieStore) expect_equal(nrow(cookies), 1) }) test_that("getCookieHost works", { expect_equal(getCookieHost(parseHttpUrl("http://rstudio.com")), "rstudio.com") expect_equal(getCookieHost(parseHttpUrl("http://rstudio.com:3939")), "rstudio.com:3939") expect_equal(getCookieHost(parseHttpUrl("http://127.0.0.1")), "127.0.0.1") expect_equal(getCookieHost(parseHttpUrl("http://127.0.0.1:3939")), "127.0.0.1:3939") }) test_that("getting and clearing cookies works", { local_cookie_store() all <- getCookies() expect_null(all) # Add a few cookies domain1 <- parseHttpUrl("http://domain1/test/stuff") storeCookies(domain1, "c1=v1") storeCookies(domain1, "c2=v2") domain2 <- parseHttpUrl("http://domain2:3939/test/stuff") storeCookies(domain2, "c3=v3") d1c <- getCookies("domain1") expect_equal(nrow(d1c), 2) expect_equal(d1c$host[1], "domain1") d2c <- getCookies("domain2") expect_null(d2c) d2c <- getCookies("domain2", 3939) expect_equal(nrow(d2c), 1) expect_equal(d2c$host[1], "domain2:3939") all <- getCookies() expect_equal(nrow(all), 3) # Delete cookies from one domain clearCookies("domain2", 3939) d2c <- getCookies("domain2", 3939) expect_null(d2c) all <- getCookies() expect_equal(nrow(all), 2) # Clear all cookies clearCookies() d1c <- getCookies("domain1") expect_null(d1c) all <- getCookies() expect_null(all) }) rsconnect/tests/testthat/shiny-rmds/0000755000176200001440000000000014536673154017365 5ustar liggesusersrsconnect/tests/testthat/shiny-rmds/non-shiny-rmd.Rmd0000644000176200001440000000011014467166424022523 0ustar liggesusers--- title: Not a Shiny R Markdown Document output: html_document --- rsconnect/tests/testthat/shiny-rmds/shiny-rmd-dots.Rmd0000644000176200001440000000014014467166424022705 0ustar liggesusers--- title: Shiny R Markdown with Dots output: html_document runtime: shiny ... Hello, world! rsconnect/tests/testthat/shiny-rmds/shiny-rmd-dashes.Rmd0000644000176200001440000000012314467166424023204 0ustar liggesusers--- title: Shiny R Markdown with Dashes output: html_document runtime: shiny --- rsconnect/tests/testthat/test-servers-deprec.R0000644000176200001440000000026414513230050021276 0ustar liggesuserstest_that("addConnectServer is deprecated", { skip_on_cran() local_temp_config() expect_snapshot( addConnectServer("https://colorado.posit.co/rsc", quiet = TRUE) ) }) rsconnect/tests/testthat/test-accounts.R0000644000176200001440000000466214536333553020213 0ustar liggesuserstest_that("no accounts returns empty data frame", { local_temp_config() expect_equal( accounts(), data.frame(name = character(), server = character(), stringsAsFactors = FALSE) ) }) test_that("hasAccounts works", { local_temp_config() addTestServer() addTestAccount("john") expect_true(hasAccount("john", "example.com")) expect_false(hasAccount("john", "example2.com")) expect_false(hasAccount("mary", "example.com")) }) test_that("secrets are hidden from casual inspection", { local_temp_config() registerAccount("server", "1", "id", token = "token", secret = "SECRET") registerAccount("server", "2", "id", token = "token", private_key = "SECRET") registerAccount("server", "3", "id", apiKey = "SECRET") expect_snapshot({ accountInfo("1")$secret accountInfo("2")$private_key accountInfo("3")$apiKey }) }) test_that("setAccountInfo() gives nice error on bad copy and paste", { expect_snapshot(setAccountInfo("name", "token", ""), error = TRUE) }) test_that("accountInfo() returns account information", { local_temp_config() addTestServer() addTestAccount("john") accountDetails <- accountInfo("john", "example.com") expect_equal(accountDetails$name, "john") expect_equal(accountDetails$username, "john") expect_equal(accountDetails$server, "example.com") }) test_that("accountInfo() returns account information", { local_temp_config() addTestServer() addTestAccount("john") accountDetails <- accountInfo("john", "example.com") expect_equal(accountDetails$name, "john") # username is included for backwards compatibility. (#1024) expect_equal(accountDetails$username, "john") expect_equal(accountDetails$server, "example.com") }) test_that("accountInfo() returns pre-rsconnect-1.0.0 account information", { local_temp_config() addTestServer() # Subset of rsconnect-0.8.29 account fields. fields <- list( username = "john", server = "example.com", accountId = "john" ) path <- accountConfigFile("john", "example.com") dir.create(dirname(path), recursive = TRUE, showWarnings = FALSE) write.dcf(compact(fields), path, width = 100) accountDetails <- accountInfo("john", "example.com") # name copied from username, as "name" is the current field name. expect_equal(accountDetails$name, "john") # username retained for backwards compatibility. expect_equal(accountDetails$username, "john") expect_equal(accountDetails$server, "example.com") }) rsconnect/tests/testthat/project-MASS/0000755000176200001440000000000014467166424017477 5ustar liggesusersrsconnect/tests/testthat/project-MASS/MASS.R0000644000176200001440000000001614467166424020362 0ustar liggesuserslibrary(MASS) rsconnect/tests/testthat/test-bundleFiles.R0000644000176200001440000002100014513230050020570 0ustar liggesusers # listDeploymentFiles ------------------------------------------------------ test_that("can read all files from directory", { dir <- local_temp_app(list("a.R" = "", "b.R" = "")) expect_equal(listDeploymentFiles(dir), c("a.R", "b.R")) expect_equal(listDeploymentFiles(dir, NULL, NULL), c("a.R", "b.R")) dir <- local_temp_app() expect_snapshot(listDeploymentFiles(dir), error = TRUE) }) test_that("can read selected files from directory", { dir <- local_temp_app(list("a.R" = "", "b.R" = "")) expect_equal(listDeploymentFiles(dir, "b.R"), "b.R") expect_snapshot(out <- listDeploymentFiles(dir, c("b.R", "c.R"))) expect_equal(out, "b.R") expect_snapshot(listDeploymentFiles(dir, character()), error = TRUE) }) test_that("can read selected files from manifest", { dir <- local_temp_app(list( "a.R" = "", "b.R" = "", "manifest" = "b.R" )) expect_equal( listDeploymentFiles(dir, appFileManifest = file.path(dir, "manifest")), "b.R" ) dir <- local_temp_app(list( "a.R" = "", "b.R" = "", "manifest" = c("b.R", "c.R") )) expect_snapshot( out <- listDeploymentFiles(dir, appFileManifest = file.path(dir, "manifest")), ) expect_equal(out, "b.R") # errors if no matching files dir <- local_temp_app(list( "manifest" = "" )) expect_snapshot( listDeploymentFiles(dir, appFileManifest = file.path(dir, "manifest")), error = TRUE ) }) test_that("checks its inputs", { dir <- local_temp_app() expect_snapshot(error = TRUE, { listDeploymentFiles(dir) listDeploymentFiles(dir, appFiles = "a.R", appFileManifest = "b.R") listDeploymentFiles(dir, appFiles = 1) listDeploymentFiles(dir, appFileManifest = "doestexist") }) }) # listBundleFiles --------------------------------------------------------- test_that("bundle directories are recursively enumerated", { dir <- withr::local_tempdir() # tree that resembles the case from https://github.com/rstudio/rsconnect/issues/464 files <- c( "app.R", "index.htm", "models/abcd/a_b_pt1/a/b/c1/1.RDS", "models/abcd/a_b_pt1/a/b/c1/2.RDS", "models/abcd/a_b_pt1/a/b/c1/3.RDS", "models/abcd/a_b_pt1/a/b/c1/4.RDS", "models/abcd/a_b_pt1/a/b/c1/5.RDS" ) dirCreate(file.path(dir, "models/abcd/a_b_pt1/a/b/c1/")) file.create(file.path(dir, files)) size <- sum(file.info(file.path(dir, files))$size) result <- listBundleFiles(dir) # Files are included in the list, count, and sizes, not directories. # Paths are enumerated relative to the target directory, not absolute paths. expect_identical(result$contents, files) expect_equal(result$totalSize, size) expect_equal(result$totalFiles, length(files)) }) test_that("ignores RStudio files", { dir <- withr::local_tempdir() file.create(file.path(dir, c("test.Rproj", ".Rproj.user", "rsconnect"))) expect_equal(bundleFiles(dir), character()) }) test_that("ignores knitr cache directories", { dir <- withr::local_tempdir() dirCreate(file.path(dir, c("foo_cache", "bar_cache"))) file.create(file.path(dir, c("foo_cache", "bar_cache"), "contents")) file.create(file.path(dir, c("foo.Rmd"))) expect_setequal(bundleFiles(dir), c("bar_cache/contents", "foo.Rmd")) }) test_that("ignores files anywhere in path", { dir <- withr::local_tempdir() dirCreate(file.path(dir, "a/b/c")) file.create(file.path(dir, c("x", "a/b/.gitignore", "a/b/c/.DS_Store"))) expect_equal(bundleFiles(dir), "x") }) test_that("ignores files listed in .rscignore", { dir <- local_temp_app() dirCreate(file.path(dir, "a")) file.create(file.path(dir, c("x", "a/y"))) expect_setequal(bundleFiles(dir), c("x", "a/y")) writeLines("x", file.path(dir, ".rscignore")) expect_setequal(bundleFiles(dir), "a/y") writeLines("y", file.path(dir, "a/.rscignore")) expect_setequal(bundleFiles(dir), character()) }) test_that("ignores temporary files", { ignored <- ignoreBundleFiles( dir = ".", contents = c("foo.xlsx", "~$foo.xlsx", "foo.csv", "foo.csv~") ) expect_equal(ignored, c("foo.xlsx", "foo.csv")) }) test_that("ignores Python virtual envs (non-Windows)", { dir <- withr::local_tempdir() names <- c( # well-known names ... ".env", ".venv", "venv", # other names ... "test" ) dirCreate(file.path(dir, names, "bin")) file.create(file.path(dir, names, "bin", "python")) expect_equal(bundleFiles(dir), character()) }) test_that("ignores Python virtual envs (Windows)", { dir <- withr::local_tempdir() names <- c( # well-known names ... ".env", ".venv", "venv", # other names ... "test" ) dirCreate(file.path(dir, names, "Scripts")) file.create(file.path(dir, names, "Scripts", "python.exe")) expect_equal(bundleFiles(dir), character()) }) test_that("ignores Python virtual envs (Windows-GUI)", { dir <- withr::local_tempdir() names <- c( # well-known names ... ".env", ".venv", "venv", # other names ... "test" ) dirCreate(file.path(dir, names, "Scripts")) file.create(file.path(dir, names, "Scripts", "pythonw.exe")) expect_equal(bundleFiles(dir), character()) }) test_that("ignores Python virtual envs (Windows-debug)", { dir <- withr::local_tempdir() names <- c( # well-known names ... ".env", ".venv", "venv", # other names ... "test" ) dirCreate(file.path(dir, names, "Scripts")) file.create(file.path(dir, names, "Scripts", "pythond.exe")) expect_equal(bundleFiles(dir), character()) }) test_that("preserves well-known names when not Python virtual environment", { dir <- withr::local_tempdir() file.create(file.path(dir, c(".env", ".venv", "venv"))) expect_setequal(bundleFiles(dir), c(".env", ".venv", "venv")) }) # explodeFiles ------------------------------------------------------------ test_that("returns relative paths", { dir <- withr::local_tempdir() dirCreate(file.path(dir, "x")) file.create(file.path(dir, "x", c("a", "b", "c"))) expect_equal(explodeFiles(dir, "x"), c("x/a", "x/b", "x/c")) }) test_that("drops drops non-existent files with warning", { dir <- withr::local_tempdir() file.create(file.path(dir, c("a", "b", "c"))) expect_snapshot(out <- explodeFiles(dir, c("a", "d"))) expect_equal(out, "a") }) test_that("expands files and directory", { dir <- withr::local_tempdir() dirCreate(file.path(dir, "x")) file.create(file.path(dir, "x", c("a", "b"))) file.create(file.path(dir, "c")) expect_equal(explodeFiles(dir, c("x", "c")), c("x/a", "x/b", "c")) }) test_that("can include nested files/directories", { dir <- withr::local_tempdir() dirCreate(file.path(dir, "x", "y")) file.create(file.path(dir, "x", c("a", "b", "c"))) file.create(file.path(dir, "x", "y", c("d", "e"))) expect_equal(explodeFiles(dir, "x/a"), "x/a") expect_equal(explodeFiles(dir, "x/y"), c("x/y/d", "x/y/e")) expect_equal(explodeFiles(dir, c("x/a", "x/y/d")), c("x/a", "x/y/d")) }) test_that("doesn't ignore user supplied files", { dir <- withr::local_tempdir() dirCreate(file.path(dir, "x", "y")) file.create(file.path(dir, "x", "packrat")) file.create(file.path(dir, "x", "y", "packrat")) expect_equal(explodeFiles(dir, "x"), c("x/packrat", "x/y/packrat")) }) # enforceBundleLimits ----------------------------------------------------- test_that("explodeFiles() and bundleFiles() both eagerly enforce limits", { dir <- withr::local_tempdir() dirCreate(file.path(dir, c("a", "b"))) file.create(file.path(dir, "a", letters)) file.create(file.path(dir, "b", letters)) withr::local_options(rsconnect.max.bundle.files = 1) # there are 52 files total, so eagerly implies we stop after one directory expect_error(explodeFiles(dir, c("a", "b")), "at least 2") expect_error(bundleFiles(dir), "at least 2") }) test_that("generate nicely formatted messages", { dir <- withr::local_tempdir() file.create(file.path(dir, c("a", "b"))) writeLines(letters, file.path(dir, "c")) withr::local_options( rsconnect.max.bundle.files = 1, rsconnect.max.bundle.size = 5 ) expect_snapshot( { explodeFiles(dir, c("a", "b")) explodeFiles(dir, "c") }, error = TRUE, transform = function(x) { x <- gsub(dir, "", x, fixed = TRUE) # file size is different on windows because of \r\n x <- gsub("\\d{2,} bytes", "?? bytes", x) x } ) }) # detectLongNames --------------------------------------------------------- test_that("detectLongNames produces informative warning if needed", { skip_on_os("windows") dir <- local_temp_app(c("a.r" = "", "b.r" = "", "c.r" = "")) expect_snapshot(detectLongNames(dir, 0)) expect_silent(detectLongNames(dir, Inf)) }) rsconnect/tests/testthat/test-deployments-find.R0000644000176200001440000000234414513230050021627 0ustar liggesuserstest_that("error when no deployments and no accounts", { local_temp_config() app <- local_temp_app() expect_snapshot(findDeployment(app, appName = "placeholder"), error = TRUE) }) test_that("returns stubbed details when single account has no deployments", { local_temp_config() addTestServer() addTestAccount() app <- local_temp_app() # derived from directory name. dep <- findDeployment(app) expect_equal(dep, list(name = basename(app), account = "ron", server = "example.com")) # name given. dep <- findDeployment(app, appName = "placeholder") expect_equal(dep, list(name = "placeholder", account = "ron", server = "example.com")) }) test_that("finds single deployment", { local_temp_config() addTestServer() addTestAccount() app <- local_temp_app() addTestDeployment(app) dep <- findDeployment(app) expect_equal(dep$name, "test") }) test_that("disambiguates multiple deployments", { local_temp_config() addTestServer() addTestAccount() app <- local_temp_app() addTestDeployment(app, "test1") addTestDeployment(app, "test2") expect_snapshot(findDeployment(app), error = TRUE) simulate_user_input(2) expect_snapshot(dep <- findDeployment(app)) expect_equal(dep$name, "test2") }) rsconnect/tests/testthat/test-bundlePackage.R0000644000176200001440000001124214513230050021070 0ustar liggesuserstest_that("can snapshot deps with renv", { app_dir <- local_temp_app(list(foo.R = "library(foreign); library(MASS)")) expect_snapshot(pkgs <- bundlePackages(app_dir)) # renv is not a dependency expect_named(pkgs, c("foreign", "MASS"), ignore.order = TRUE) expect_named(pkgs$foreign, c("Source", "Repository", "description")) expect_named(pkgs$MASS, c("Source", "Repository", "description")) # No renv lockfile left behind expect_equal(list.files(app_dir), "foo.R") }) test_that("can snapshot deps with packrat (option)", { withr::local_options(rsconnect.packrat = TRUE) app_dir <- local_temp_app(list(foo.R = "library(foreign); library(MASS)")) expect_snapshot(pkgs <- bundlePackages(app_dir)) expect_named(pkgs, c("foreign", "MASS"), ignore.order = TRUE) expect_named(pkgs$foreign, c("Source", "Repository", "description")) expect_named(pkgs$MASS, c("Source", "Repository", "description")) # No packrat lockfile left behind expect_equal(list.files(app_dir), "foo.R") }) test_that("can snapshot deps with packrat (env var)", { withr::local_envvar(RSCONNECT_PACKRAT = "TRUE") app_dir <- local_temp_app(list(foo.R = "library(foreign); library(MASS)")) expect_snapshot(pkgs <- bundlePackages(app_dir)) expect_named(pkgs, c("foreign", "MASS"), ignore.order = TRUE) expect_named(pkgs$foreign, c("Source", "Repository", "description")) expect_named(pkgs$MASS, c("Source", "Repository", "description")) # No packrat lockfile left behind expect_equal(list.files(app_dir), "foo.R") }) test_that("can capture deps from renv lockfile", { withr::local_options(renv.verbose = FALSE) app_dir <- local_temp_app(list(foo.R = "library(foreign); library(MASS)")) renv::snapshot(app_dir, prompt = FALSE) expect_snapshot(pkgs <- bundlePackages(app_dir)) # renv is included by the renv.lock expect_named(pkgs, c("foreign", "MASS", "renv"), ignore.order = TRUE) expect_named(pkgs$foreign, c("Source", "Repository", "description")) expect_named(pkgs$MASS, c("Source", "Repository", "description")) # No renv directory left behind, but the renv.lock is preserved. expect_equal(list.files(app_dir), c("foo.R", "renv.lock")) }) test_that("can capture deps with packrat even when renv lockfile present", { withr::local_envvar(RSCONNECT_PACKRAT = "TRUE") withr::local_options(renv.verbose = FALSE) app_dir <- local_temp_app(list(foo.R = "library(foreign); library(MASS)")) renv::snapshot(app_dir, prompt = FALSE) expect_snapshot(pkgs <- bundlePackages(app_dir)) # renv is not a dependency (not using renv.lock) expect_named(pkgs, c("foreign", "MASS"), ignore.order = TRUE) expect_named(pkgs$foreign, c("Source", "Repository", "description")) expect_named(pkgs$MASS, c("Source", "Repository", "description")) # The (incoming) renv.lock is discarded, mirroring rsconnect pre 1.0.0. expect_equal(list.files(app_dir), "foo.R") }) # ------------------------------------------------------------------------- test_that("error if can't find source", { local_mocked_bindings(snapshotRenvDependencies = function(...) { data.frame( Package = "shiny", Source = NA, Repository = NA, stringsAsFactors = FALSE ) }) app_dir <- withr::local_tempdir() writeLines(con = file.path(app_dir, "index.Rmd"), c( "```{r}", "library(shiny)", "```" )) expect_snapshot( . <- bundlePackages(app_dir), error = TRUE ) }) test_that("usePackrat respects the environment variable", { expect_false(usePackrat()) withr::local_envvar(RSCONNECT_PACKRAT = "TRUE") expect_true(usePackrat()) withr::local_envvar(RSCONNECT_PACKRAT = "FALSE") expect_false(usePackrat()) }) test_that("usePackrat respects the option", { expect_false(usePackrat()) withr::local_options(rsconnect.packrat = TRUE) expect_true(usePackrat()) withr::local_options(rsconnect.packrat = FALSE) expect_false(usePackrat()) }) test_that("usePackrat prefers the environment variable over the option", { expect_false(usePackrat()) withr::local_envvar(RSCONNECT_PACKRAT = "TRUE") withr::local_options(rsconnect.packrat = FALSE) expect_true(usePackrat()) withr::local_envvar(RSCONNECT_PACKRAT = "FALSE") withr::local_options(rsconnect.packrat = TRUE) expect_false(usePackrat()) }) test_that("package_record works", { latin1Record <- package_record("latin1package", lib_dir = test_path("packages")) expect_equal(latin1Record$Author, "Jens Fröhling") utf8Record <- package_record("utf8package", lib_dir = test_path("packages")) expect_equal(utf8Record$Author, "Jens Fröhling") windows1251Record <- package_record("windows1251package", lib_dir = test_path("packages")) expect_equal(windows1251Record$Author, "Сергей Брин") }) rsconnect/tests/testthat/test-locale.R0000644000176200001440000000110214513230050017574 0ustar liggesuserstest_that("locale is en_US on mac GHA", { skip_on_os(c("linux", "windows")) skip_if_not(identical(Sys.getenv("GITHUB_ACTIONS"), "true")) expect_equal(detectLocale(), "en_US") }) test_that("locale is en_US on mac GHA", { skip_on_os(c("linux", "mac")) skip_if_not(identical(Sys.getenv("GITHUB_ACTIONS"), "true")) expect_equal(windowsLocale(), "en_US") }) test_that("normalizeLocale handles common forms", { expect_equal(normalizeLocale("en-US"), "en_US") expect_equal(normalizeLocale("az-Cyrl"), "az") expect_equal(normalizeLocale("az-Cyrl-AZ"), "az_AZ") }) rsconnect/tests/testthat/test-deployDoc.R0000644000176200001440000000600514513230050020266 0ustar liggesuserstest_that("deployDoc correctly reports bad path", { skip_on_cran() expect_snapshot(deployDoc("doesntexist.Rmd"), error = TRUE) }) # standardizeSingleDocDeployment ------------------------------------------ test_that("turns appDir into appDir + appPrimarySourceDoc", { skip_on_cran() dir <- local_temp_app(list("foo.R" = "")) doc <- standardizeSingleDocDeployment(file.path(dir, "foo.R")) expect_equal(doc$appDir, normalizePath(dir)) expect_equal(doc$appPrimaryDoc, "foo.R") }) test_that("shiny rmd deploys whole directory", { skip_on_cran() dir <- local_temp_app(list("foo.Rmd" = c( "---", "runtime: shiny", "---" ))) doc <- standardizeSingleDocDeployment(file.path(dir, "foo.Rmd")) expect_equal(doc$appFiles, NULL) }) test_that("regular rmd deploys file and dependencies", { skip_on_cran() dir <- local_temp_app(list( "foo.Rmd" = c( "---", "resource_files: [foo.csv]", "---" ), "foo.csv" = "" )) doc <- standardizeSingleDocDeployment(file.path(dir, "foo.Rmd"), quiet = TRUE) expect_equal(doc$appFiles, c("foo.Rmd", "foo.csv")) }) test_that("regular rmd deploys .Rprofile, if present", { skip_on_cran() dir <- local_temp_app(list( "foo.Rmd" = "", ".Rprofile" = "" )) doc <- standardizeSingleDocDeployment(file.path(dir, "foo.Rmd"), quiet = TRUE) expect_equal(doc$appFiles, c("foo.Rmd", ".Rprofile")) }) test_that("regular rmd deploys requirements.txt, if present", { skip_on_cran() dir <- local_temp_app(list( "foo.Rmd" = "", "requirements.txt" = "" )) doc <- standardizeSingleDocDeployment(file.path(dir, "foo.Rmd"), quiet = TRUE) expect_equal(doc$appFiles, c("foo.Rmd", "requirements.txt")) }) test_that("regular rmd deploys renv.lock, if present", { skip_on_cran() dir <- local_temp_app(list( "foo.Rmd" = "", "renv.lock" = "" )) doc <- standardizeSingleDocDeployment(file.path(dir, "foo.Rmd"), quiet = TRUE) expect_equal(doc$appFiles, c("foo.Rmd", "renv.lock")) }) test_that("regular html does not deploy .Rprofile", { skip_on_cran() dir <- local_temp_app(list( "foo.html" = "", ".Rprofile" = "" )) doc <- standardizeSingleDocDeployment(file.path(dir, "foo.html"), quiet = TRUE) expect_equal(doc$appFiles, c("foo.html")) }) test_that("regular html does not deploy requirements.txt", { skip_on_cran() dir <- local_temp_app(list( "foo.html" = "", "requirements.txt" = "" )) doc <- standardizeSingleDocDeployment(file.path(dir, "foo.html"), quiet = TRUE) expect_equal(doc$appFiles, c("foo.html")) }) test_that("regular html does not deploy renv.lock", { skip_on_cran() dir <- local_temp_app(list( "foo.html" = "", "renv.lock" = "" )) doc <- standardizeSingleDocDeployment(file.path(dir, "foo.html"), quiet = TRUE) expect_equal(doc$appFiles, c("foo.html")) }) test_that("other types deploy that one file", { skip_on_cran() dir <- local_temp_app(list("foo.R" = "")) doc <- standardizeSingleDocDeployment(file.path(dir, "foo.R")) expect_equal(doc$appFiles, "foo.R") }) rsconnect/tests/testthat/test-deployments.R0000644000176200001440000001251614516247550020733 0ustar liggesuserstest_that("deployments() works empty data frame if no deployments", { dir <- local_temp_app() out <- deployments(dir) expect_s3_class(out, "data.frame") expect_named(out, c(deploymentFields, "deploymentFile")) expect_equal(nrow(out), 0) }) test_that("combines fields across deployments", { local_temp_config() dir <- local_temp_app() writeDeploymentRecord( list(x = 1), deploymentConfigFile(dir, "app1", "account", "server") ) writeDeploymentRecord( list(y = 1), deploymentConfigFile(dir, "app2", "account", "server") ) out <- deployments(dir, excludeOrphaned = FALSE) expect_s3_class(out, "data.frame") expect_named(out, c(deploymentFields, "x", "y", "deploymentFile")) expect_equal(nrow(out), 2) }) test_that("deployments() can filter", { local_temp_config() addTestServer("foo") addTestServer("bar") addTestAccount("foo", "foo") addTestAccount("bar", "bar") dir <- local_temp_app() addTestDeployment(dir, appName = "my-app", account = "foo", server = "foo") addTestDeployment(dir, appName = "my-app2", account = "bar", server = "bar") out <- deployments(dir) expect_s3_class(out, "data.frame") expect_equal(nrow(out), 2) out <- deployments(dir, nameFilter = "my-app") expect_equal(nrow(out), 1) out <- deployments(dir, serverFilter = "foo") expect_equal(nrow(out), 1) out <- deployments(dir, accountFilter = "foo") expect_equal(nrow(out), 1) }) test_that("deployments() can exclude orphans", { dir <- local_temp_app() addTestDeployment(dir, server = "bar1") out <- deployments(dir) expect_equal(nrow(out), 0) out <- deployments(dir, excludeOrphaned = FALSE) expect_equal(nrow(out), 1) }) test_that("can read/write metadata", { dir <- local_temp_app() addTestDeployment(dir, metadata = list(meta1 = "one", meta2 = "two")) out <- deployments(dir, excludeOrphaned = FALSE) expect_equal(out$meta1, "one") expect_equal(out$meta2, "two") }) test_that("can read/write metadata having multiple values", { dir <- local_temp_app() addTestDeployment(dir, metadata = list(engines = c("knitr", "markdown"))) out <- deployments(dir, excludeOrphaned = FALSE) expect_equal(nrow(out), 1) expect_equal(out$engines, "knitr, markdown") }) test_that("can read/write version", { dir <- local_temp_app() addTestDeployment(dir, version = "999") out <- deployments(dir, excludeOrphaned = FALSE) expect_equal(out$version, "999") }) test_that("can read/write missing version", { # also tests we can read files written by previous versions of package dir <- local_temp_app() path <- addTestDeployment(dir, version = NA) out <- deployments(dir, excludeOrphaned = FALSE) expect_false("version" %in% rownames(read.dcf(path))) expect_equal(out$version, NA) }) test_that("can read/write env vars", { app <- local_temp_app() addTestDeployment(app, "test1", envVars = c("TEST1", "TEST2")) addTestDeployment(app, "test2") deps <- deployments(app, excludeOrphaned = FALSE) expect_equal(deps$envVars, list(c("TEST1", "TEST2"), character())) }) test_that("can read/write empty env vars", { # also tests we can read files written by previous versions of package app <- local_temp_app() # With empty character vector path <- addTestDeployment(app, "test1", envVars = character()) deps <- deployments(app, excludeOrphaned = FALSE) expect_false("envVars" %in% rownames(read.dcf(path))) expect_equal(deps$envVars, list(character())) # Or with empty string path <- addTestDeployment(app, "test1", envVars = "") deps <- deployments(app, excludeOrphaned = FALSE) expect_false("envVars" %in% rownames(read.dcf(path))) expect_equal(deps$envVars, list(character())) }) test_that("can read/write env vars", { app <- local_temp_app() addTestDeployment(app, "test1", envVars = c("TEST1", "TEST2")) addTestDeployment(app, "test2") deps <- deployments(app, excludeOrphaned = FALSE) expect_equal(deps$envVars, list(c("TEST1", "TEST2"), character())) }) test_that("saveDeployment appends to global history", { local_temp_config() addTestServer("foo") addTestAccount("bar", "foo") dir <- local_temp_app() saveDeployment( dir, createDeployment( appName = "my-app", appTitle = "", appId = 10, envVars = "abc", # ensure there's an envVars column in output account = "foo", username = "foo", server = "bar", version = 1 ), application = list(id = 1), hostUrl = NULL ) history <- read.dcf(deploymentHistoryPath()) expect_equal(nrow(history), 1) expect_setequal(colnames(history), c(deploymentFields, "appPath")) }) test_that("saveDeployment captures hostUrl", { local_temp_config() addTestServer() addTestAccount("foo") dir <- local_temp_app() saveDeployment( dir, createDeployment( appName = "my-app", appTitle = "", appId = 10, envVars = NULL, account = "foo", username = "foo", server = "example.com", version = 1 ), application = list(id = 10) ) out <- deployments(dir) expect_equal(out$hostUrl, "https://example.com") }) test_that("addToDeploymentHistory() adds needed new lines", { local_temp_config() expect_snapshot({ addToDeploymentHistory("path", list(x = 1)) writeLines(readLines(deploymentHistoryPath())) addToDeploymentHistory("path", list(x = 2)) writeLines(readLines(deploymentHistoryPath())) }) }) rsconnect/tests/testthat/test-bundlePackagePackrat.R0000644000176200001440000001215414513230050022401 0ustar liggesuserstest_that("non-R apps don't have packages", { app_dir <- local_temp_app(list(index.html = "")) out <- snapshotPackratDependencies(app_dir) expect_equal(out, data.frame()) }) test_that("manifest has correct data types", { app <- local_temp_app(list("index.Rmd" = "")) deps <- snapshotPackratDependencies(app) expect_type(deps$description, "list") expect_type(deps$description[[1]], "list") }) test_that("uninstalled packages error", { app <- local_temp_app(list("index.Rmd" = c( "```{r}", "library(doesntexist1)", "library(doesntexist2)", "```" ))) expect_snapshot( snapshotPackratDependencies(app), error = TRUE, transform = function(x) gsub('"', "'", x, fixed = TRUE) ) }) test_that("recommended packages are snapshotted", { app <- local_temp_app(list("index.Rmd" = c( "```{r}", "library(MASS)", "```" ))) deps <- snapshotPackratDependencies(app) expect_true("MASS" %in% deps$Package) }) test_that("works with BioC packages", { skip_on_cran() skip_on_ci() app <- local_temp_app(list("index.Rmd" = c( "```{r}", "library(Biobase)", "```" ))) withr::local_options(repos = c( CRAN = "https://cran.rstudio.com", BioC = "https://bioconductor.org/packages/release/bioc" )) deps <- snapshotPackratDependencies(app) Biobase <- deps[deps$Package == "Biobase", ] expect_equal(Biobase$Source, "Bioconductor") expect_equal(Biobase$Repository, "https://bioconductor.org/packages/release/bioc") BiocGenerics <- deps[deps$Package == "BiocGenerics", ] expect_equal(BiocGenerics$Source, "Bioconductor") expect_equal(BiocGenerics$Repository, "https://bioconductor.org/packages/release/bioc") }) # addPackratSnapshot() ---------------------------------------------------- test_that("cleans up implicit dependency files", { dir <- withr::local_tempdir() addPackratSnapshot(dir, "rlang") expect_equal(list.files(dir), "packrat") }) # standardizePackratPackage ----------------------------------------- test_that("standardizeRepos adds names and normalizes paths", { repos <- c(ONE = "https://cran1.com", "https://cran2.com/") expect_equal( standardizeRepos(repos), c(ONE = "https://cran1.com", repo_2 = "https://cran2.com") ) }) test_that("SCM records are left alone", { bitbucket <- list(Package = "pkg", Source = "bitbucket") gitlab <- list(Package = "pkg", Source = "gitlab") github <- list(Package = "pkg", Source = "github") expect_equal( standardizePackratPackage(bitbucket), list(Source = "bitbucket", Repository = NA_character_) ) expect_equal( standardizePackratPackage(gitlab), list(Source = "gitlab", Repository = NA_character_) ) expect_equal( standardizePackratPackage(github), list(Source = "github", Repository = NA_character_) ) }) test_that("CRAN & BioC get normalized repo", { CRAN <- list(Package = "pkg1", Source = "CRAN") Bioconductor <- list(Package = "pkg2", Source = "Bioconductor") packages <- data.frame( Package = c("pkg1", "pkg2", "pkg3"), Repository = paste0( c("https://a.com", "https://b.com", "https://cran.com"), "/src/contrib" ), stringsAsFactors = FALSE ) expect_equal( standardizePackratPackage(CRAN, packages), list(Source = "CRAN", Repository = "https://a.com") ) expect_equal( standardizePackratPackage(Bioconductor, packages), list(Source = "Bioconductor", Repository = "https://b.com") ) }) test_that("packages installed from other repos get correctly named", { pkg <- list(Package = "pkg", Source = "https://test2.com") packages <- as.matrix(data.frame( Package = "pkg", Version = "1.0.0", Repository = "https://test2.com/src/contrib", stringsAsFactors = FALSE )) repos <- c(TEST1 = "https://test1.com", TEST2 = "https://test2.com") expect_equal( standardizePackratPackage(pkg, packages, repos = repos), list(Source = "TEST2", Repository = "https://test2.com") ) }) test_that("source packages can't be installed", { source <- list(Package = "pkg1", Source = "source") expect_equal( standardizePackratPackage(source), list(Source = NA_character_, Repository = NA_character_) ) }) test_that("locally installed CRAN packages are handled correctly", { packages <- as.matrix(data.frame( Package = "pkg", Version = "1.0.0", Repository = "https://cran.com/src/contrib", stringsAsFactors = FALSE )) repos <- c(CRAN = "https://cran.com") local <- list( Package = "pkg", Source = "CustomCRANLikeRepository", Version = "1.0.0" ) expect_equal( standardizePackratPackage(local, packages, repos), list(Source = "CRAN", Repository = "https://cran.com") ) local_dev <- list( Package = "pkg", Source = "CustomCRANLikeRepository", Version = "1.0.0.9000" ) expect_equal( standardizePackratPackage(local_dev, packages, repos), list(Source = NA_character_, Repository = NA_character_) ) archived <- list( Package = "pkg2", Source = "CustomCRANLikeRepository", Version = "1.0.0" ) expect_equal( standardizePackratPackage(archived, packages, repos), list(Source = NA_character_, Repository = NA_character_) ) }) rsconnect/tests/testthat/test-bundlePackageRenv.R0000644000176200001440000001406414536656443021757 0ustar liggesusers# snapshotRenvDependencies() ---------------------------------------------- test_that("non-R apps don't have packages", { skip_on_cran() app_dir <- local_temp_app(list(index.html = "")) out <- snapshotRenvDependencies(app_dir) expect_equal(out, data.frame()) }) test_that("manifest has correct data types", { skip_on_cran() withr::local_options(renv.verbose = TRUE) app <- local_temp_app(list("index.Rmd" = "")) deps <- snapshotRenvDependencies(app) expect_type(deps$description, "list") expect_type(deps$description[[1]], "list") }) test_that("recommended packages are snapshotted", { skip_on_cran() withr::local_options(renv.verbose = TRUE) app <- local_temp_app(list("index.Rmd" = c( "```{r}", "library(MASS)", "```" ))) deps <- snapshotRenvDependencies(app) expect_true("MASS" %in% deps$Package) }) test_that("extra packages are snapshotted", { skip_on_cran() withr::local_options(renv.verbose = TRUE) app <- local_temp_app(list("index.Rmd" = "")) deps <- snapshotRenvDependencies(app, extraPackages = c("foreign")) expect_true("foreign" %in% deps$Package) }) test_that("works with BioC packages", { skip_on_cran() skip_on_ci() app <- local_temp_app(list("index.R" = c( "library(Biobase)" ))) withr::local_options(repos = c( CRAN = "https://cran.rstudio.com", BioC = "https://bioconductor.org/packages/release/bioc" )) expect_no_condition( deps <- snapshotRenvDependencies(app), class = "rsconnect_biocRepos" ) Biobase <- deps[deps$Package == "Biobase", ] expect_equal(Biobase$Source, "Bioconductor") expect_equal(Biobase$Repository, "https://bioconductor.org/packages/release/bioc") withr::local_options(repos = c( CRAN = "https://cran.rstudio.com" )) expect_condition( deps <- snapshotRenvDependencies(app), class = "rsconnect_biocRepos" ) Biobase <- deps[deps$Package == "Biobase", ] expect_equal(Biobase$Source, "Bioconductor") expect_equal(Biobase$Repository, biocRepos(".")[[1]]) }) # https://github.com/rstudio/rsconnect/issues/968 test_that("large directories are analyzed", { skip_on_cran() app_dir <- local_temp_app(list("foo.R" = "library(foreign)")) data_dir <- file.path(app_dir, "data") dir.create(data_dir) for (each in seq_len(1001)) { writeLines(character(0), file.path(data_dir, paste0(each, ".txt"))) } expect_snapshot( deps <- snapshotRenvDependencies(app_dir) ) expect_contains(deps$Package, "foreign") }) # parseRenvDependencies --------------------------------------------------- test_that("gets DESCRIPTION from renv & system libraries", { withr::local_options(renv.verbose = FALSE) app_dir <- local_temp_app(list("foo.R" = "library(foreign); library(MASS)")) renv::snapshot(app_dir, prompt = FALSE) deps <- parseRenvDependencies(app_dir) expect_setequal(deps$Package, c("foreign", "MASS", "renv")) expect_type(deps$description, "list") expect_type(deps$description[[which(deps$Package == "foreign")]], "list") expect_type(deps$description[[which(deps$Package == "MASS")]], "list") }) test_that("errors if library and project are inconsistent", { withr::local_options(renv.verbose = FALSE) app_dir <- local_temp_app(list("foo.R" = "library(foreign); library(MASS)")) renv::snapshot(app_dir, prompt = FALSE) renv::record("MASS@0.1.1", project = app_dir) expect_snapshot(parseRenvDependencies(app_dir), error = TRUE) }) # standardizeRenvPackage ----------------------------------------- test_that("SCM get names translated", { bitbucket <- list(Package = "pkg", Source = "Bitbucket") gitlab <- list(Package = "pkg", Source = "GitLab") github <- list(Package = "pkg", Source = "GitHub") expect_equal( standardizeRenvPackage(bitbucket), list(Package = "pkg", Source = "bitbucket") ) expect_equal( standardizeRenvPackage(gitlab), list(Package = "pkg", Source = "gitlab") ) expect_equal( standardizeRenvPackage(github), list(Package = "pkg", Source = "github") ) }) test_that("BioC gets normalized repo", { Bioconductor <- list(Package = "pkg", Source = "Bioconductor") packages <- data.frame( Package = "pkg", Repository = "https://b.com/src/contrib", stringsAsFactors = FALSE ) expect_equal( standardizeRenvPackage(Bioconductor, packages), list(Package = "pkg", Source = "Bioconductor", Repository = "https://b.com") ) }) test_that("has special handling for CRAN packages", { packages <- as.matrix(data.frame( Package = "pkg", Version = "1.0.0", Repository = "https://cran.com/src/contrib", stringsAsFactors = FALSE )) repos <- c(CRAN = "https://cran.com") spec <- function(version, source = "Repository", repo = "CRAN") { list(Package = "pkg", Version = version, Source = source, Repository = repo) } expect_equal( standardizeRenvPackage(spec("1.0.0"), packages, repos), spec("1.0.0", "CRAN", "https://cran.com") ) expect_equal( standardizeRenvPackage(spec("1.0.0.9000"), packages, repos), spec("1.0.0.9000", NA_character_, NA_character_) ) }) test_that("packages installed from other repos get correctly named", { pkg <- list(Package = "pkg", Source = "Repository", Repository = "https://test2.com") packages <- as.matrix(data.frame( Package = "pkg", Version = "1.0.0", Repository = "https://test2.com/src/contrib", stringsAsFactors = FALSE )) repos <- c(TEST1 = "https://test1.com", TEST2 = "https://test2.com") expect_equal( standardizeRenvPackage(pkg, packages, repos = repos), list(Package = "pkg", Source = "TEST2", Repository = "https://test2.com") ) }) test_that("source packages get NA source + repository", { source <- list(Package = "pkg", Source = "unknown", Repository = "useless") expect_equal( standardizeRenvPackage(source), list(Package = "pkg", Source = NA_character_, Repository = NA_character_) ) }) test_that("Local packages get NA source + repository", { source <- list(Package = "pkg", Source = "Local", Repository = "useless") expect_equal( standardizeRenvPackage(source), list(Package = "pkg", Source = NA_character_, Repository = NA_character_) ) }) rsconnect/tests/testthat/helper.R0000644000176200001440000000741614516247550016675 0ustar liggesusersshowDcf <- function(df) { write.dcf(df, stdout()) invisible() } # last HTTP request made httpLastRequest <- list() # HTTP function which just saves the result for analysis httpTestRecorder <- function(protocol, host, port, method, path, headers, contentType = NULL, file = NULL, certificate = NULL, writer = NULL, timeout = NULL) { httpLastRequest <<- list( protocol = protocol, host = host, port = port, method = method, path = path, headers = headers, contentType = contentType, file = file, certificate = certificate, writer = writer, timeout = timeout ) list(status = 200, content = "", contentType = "plain/text") } local_http_recorder <- function(env = caller_env()) { withr::local_options(rsconnect.http = httpTestRecorder, .local_envir = env) } # Create and use a directory as temporary replacement for R_USER_CONFIG_DIR to # avoid having tests overwrite the "official" configuration locations. local_temp_config <- function(env = caller_env()) { path <- withr::local_tempdir(.local_envir = env) withr::local_envvar(R_USER_CONFIG_DIR = path, .local_envir = env) } local_temp_app <- function(files = list(), env = caller_env()) { dir <- withr::local_tempdir(.local_envir = env) for (name in names(files)) { content <- files[[name]] hier <- dirname(name) if (!hier == ".") { dir.create(file.path(dir, hier), recursive = TRUE) } writeLines(content, file.path(dir, name)) } dir } local_shiny_bundle <- function(appName, appDir, appPrimaryDoc, python = NULL) { appFiles <- bundleFiles(appDir) appMetadata <- appMetadata(appDir, appFiles, appPrimaryDoc = appPrimaryDoc) tarfile <- bundleApp( appName, appDir, appFiles = appFiles, appMetadata = appMetadata, pythonConfig = pythonConfigurator(python), quiet = TRUE ) bundleTempDir <- tempfile() utils::untar(tarfile, exdir = bundleTempDir) unlink(tarfile) defer(unlink(bundleTempDir, recursive = TRUE), env = caller_env()) bundleTempDir } # Servers and accounts ---------------------------------------------------- addTestAccount <- function(account = "ron", server = "example.com", userId = account) { registerAccount(server, account, userId, apiKey = "123") invisible() } addTestServer <- function(name = NULL, url = "https://example.com", certificate = NULL) { if (is.null(name)) { serverUrl <- parseHttpUrl(url) name <- serverUrl$host } registerServer( url = url, name = name, certificate = certificate ) invisible() } addTestDeployment <- function(path, appName = "test", appTitle = "", appId = "123", account = "ron", envVars = NULL, username = account, server = "example.com", url = paste0("https://", server, "/", username, "/", appId), hostUrl = NULL, version = deploymentRecordVersion, metadata = list()) { saveDeployment( path, createDeployment( appName = appName, appTitle = appTitle, appId = appId, envVars = envVars, account = account, username = username, server = server, version = version ), application = list(id = appId, url = url), hostUrl = hostUrl, metadata = metadata, addToHistory = FALSE ) } rsconnect/tests/testthat/_snaps/0000755000176200001440000000000014516760612016545 5ustar liggesusersrsconnect/tests/testthat/_snaps/linters.md0000644000176200001440000000142514536673131020552 0ustar liggesusers# linter warns about absolute paths and relative paths Code result Output --------------------- ShinyPresentation.Rmd --------------------- The following lines contain absolute paths: 15: Here's some internal help: [Helpful Link](/Users/MrBurns/) -------- server.R -------- The following lines contain absolute paths: 15: otherFile <- read.table("~/.rsconnect-tests/local-file.txt") The following lines contain paths to files not matching in case sensitivity: 31: file <- read.csv("data/college.txt") ## bad ['data/college.txt' -> 'data/College.txt'] Paths should be to files within the project directory. Filepaths are case-sensitive on deployment server. rsconnect/tests/testthat/_snaps/cookies.md0000644000176200001440000000061314536673122020524 0ustar liggesusers# Invalid cookies fail parsing Code cookie <- parseCookie("x=1; Path=/something/else", "/path") Condition Warning in `parseCookie()`: Invalid path set for cookie on request for '/path': x=1; Path=/something/else --- Code cookie <- parseCookie("mycookie;") Condition Warning in `parseCookie()`: Unable to parse set-cookie header: mycookie; rsconnect/tests/testthat/_snaps/appMetadata.md0000644000176200001440000000217314536673071021317 0ustar liggesusers# quarto path is deprecated Code . <- appMetadata(dir, c("foo.Rmd"), quarto = "abc") Condition Warning: The `quarto` argument of `deployApp()` can no longer be a path as of rsconnect 1.0.0. i Please use quarto = `TRUE` instead instead. # validates quarto argument Code appMetadata(dir, c("foo.Rmd"), quarto = 1) Condition Error in `appMetadata()`: ! `quarto` must be `TRUE`, `FALSE`, or `NA`, not the number 1. # checkLayout() errors if primary doc & app.R Code checkAppLayout(dir, appPrimaryDoc = "myscript.R") Condition Error in `checkAppLayout()`: ! Project must not contain both 'app.R' and a single-file Shiny app. # errors if no files with needed extension Code inferAppPrimaryDoc(NULL, "a.R", "static") Condition Error in `inferAppPrimaryDoc()`: ! Failed to determine `appPrimaryDoc`. x No files matching "\\.html?$". Code inferAppPrimaryDoc(NULL, "a.R", "rmd-shiny") Condition Error in `inferAppPrimaryDoc()`: ! Failed to determine `appPrimaryDoc`. x No files matching "\\.[Rq]md$". rsconnect/tests/testthat/_snaps/bundlePackagePackrat.md0000644000176200001440000000046114536673107023127 0ustar liggesusers# uninstalled packages error Code snapshotPackratDependencies(app) Condition Error in `addPackratSnapshot()`: ! Failed to snapshot dependencies Caused by error: ! Unable to retrieve package records for the following packages: - 'doesntexist1', 'doesntexist2' rsconnect/tests/testthat/_snaps/deployDoc.md0000644000176200001440000000026314536673124021015 0ustar liggesusers# deployDoc correctly reports bad path Code deployDoc("doesntexist.Rmd") Condition Error in `deployDoc()`: ! `doc`, "doesntexist.Rmd", does not exist. rsconnect/tests/testthat/_snaps/bundlePackageRenv.md0000644000176200001440000000063514536673122022454 0ustar liggesusers# large directories are analyzed Code deps <- snapshotRenvDependencies(app_dir) # errors if library and project are inconsistent Code parseRenvDependencies(app_dir) Condition Error in `parseRenvDependencies()`: ! Library and lockfile are out of sync i Use renv::restore() or renv::snapshot() to synchronise i Or ignore the lockfile by adding to your .rscignore rsconnect/tests/testthat/_snaps/deployments.md0000644000176200001440000000061514536673124021437 0ustar liggesusers# addToDeploymentHistory() adds needed new lines Code addToDeploymentHistory("path", list(x = 1)) writeLines(readLines(deploymentHistoryPath())) Output x: 1 appPath: path Code addToDeploymentHistory("path", list(x = 2)) writeLines(readLines(deploymentHistoryPath())) Output x: 2 appPath: path x: 1 appPath: path rsconnect/tests/testthat/_snaps/applications.md0000644000176200001440000000023714536673063021564 0ustar liggesusers# syncAppMetadata deletes deployment records if needed Code syncAppMetadata(app) Message Deleting deployment record for deleted app 123. rsconnect/tests/testthat/_snaps/ide.md0000644000176200001440000000060014536673136017632 0ustar liggesusers# getAppById() fails where expected Code getAppById("123", "susan", "unknown", "unknown.com") Condition Error in `getAppById()`: ! Can't find server with url "unknown.com". Code getAppById("123", "robert", "unknown", "https://example.com") Condition Error in `getAppById()`: ! Can't find account "robert" on server "example.com". rsconnect/tests/testthat/_snaps/lint.md0000644000176200001440000000071014536673131020034 0ustar liggesusers# lints give have useful print method Code lint(test_path("test-rmd-bad-case")) Output --------- index.Rmd --------- The following lines contain paths to files not matching in case sensitivity: 29: ![](img/rstudio.svg) ['img/rstudio.svg' -> 'img/RStudio.svg'] Filepaths are case-sensitive on deployment server. Code lint(test_path("shinyapp-appR")) Output No problems found rsconnect/tests/testthat/_snaps/http-libcurl.md0000644000176200001440000000027314536673130021502 0ustar liggesusers# can trace JSON Code . <- POST_JSON(service, list(), "", list(a = 1, b = 2)) Output << { << "a": 1, << "b": 2 << } >> {"a":[1],"b":[2]} rsconnect/tests/testthat/_snaps/deploymentTarget.md0000644000176200001440000001077414536673126022434 0ustar liggesusers# errors if no accounts Code findDeploymentTarget() Condition Error: ! No accounts registered. i Call `rsconnect::setAccountInfo()` to register an account. # errors if unknown account or server Code findDeploymentTarget(server = "unknown") Condition Error: ! Can't find any accounts with `server` = "unknown". i Known servers are "bar". Code findDeploymentTarget(account = "john") Condition Error: ! Can't find any accounts with `account` = "john". i Available account names: "foo". # errors if no previous deployments and multiple accounts Code findDeploymentTarget(app_dir) Condition Error: ! Found multiple accounts. Please disambiguate by setting `server` and/or `account`. i Available servers: "foo1" and "foo2". i Available account names: "ron". Code findDeploymentTarget(app_dir, appName = "test") Condition Error: ! Found multiple accounts. Please disambiguate by setting `server` and/or `account`. i Available servers: "foo1" and "foo2". i Available account names: "ron". # handles accounts if only server specified Code findDeploymentTarget(app_dir, server = "foo") Condition Error: ! Found multiple accounts for `server` = "foo". Please disambiguate by setting `account`. i Known account names are "john" and "ron". # errors/prompts if multiple deployments Code findDeploymentTarget(app_dir, appName = "test") Condition Error: ! This directory has been previously deployed in multiple places. Please use `appName`, `server` or `account` to disambiguate. Known applications: * test (server: server1.com / username: ron): * test (server: server2.com / username: ron): Code findDeploymentTarget(app_dir) Condition Error: ! This directory has been previously deployed in multiple places. Please use `appName`, `server` or `account` to disambiguate. Known applications: * test (server: server1.com / username: ron): * test (server: server2.com / username: ron): --- Code target <- findDeploymentTarget(app_dir) Message This directory has been previously deployed in multiple places. Which deployment do you want to use? 1: test (server: server1.com / username: ron): 2: test (server: server2.com / username: ron): Selection: 1 # succeeds if there are no deployments and a single account Code findDeploymentTarget(app_dir) Condition Error: ! Discovered a previously deployed app named "remotename" (View it at ) i Set `forceUpdate = TRUE` to update it. i Supply a unique `appName` to deploy a new application. # shouldUpdateApp errors when non-interactive Code shouldUpdateApp(app, "my_app-1") Condition Error: ! Discovered a previously deployed app named "my_app" (View it at ) i Set `forceUpdate = TRUE` to update it. i Supply a unique `appName` to deploy a new application. # shouldUpdateApp handles 3 options Code one <- shouldUpdateApp(app, "my_app-1") Message Discovered a previously deployed app named "my_app" (View it at ) What do you want to do? 1: Update the existing app. 2: Create a new app with automatically generated name ("my_app-1"). 3: Abort this deployment and supply a custom `appName`. Selection: 1 Code two <- shouldUpdateApp(app, "my_app-1") Message Discovered a previously deployed app named "my_app" (View it at ) What do you want to do? 1: Update the existing app. 2: Create a new app with automatically generated name ("my_app-1"). 3: Abort this deployment and supply a custom `appName`. Selection: 2 Code three <- shouldUpdateApp(app, "my_app-1") Message Discovered a previously deployed app named "my_app" (View it at ) What do you want to do? 1: Update the existing app. 2: Create a new app with automatically generated name ("my_app-1"). 3: Abort this deployment and supply a custom `appName`. Selection: 3 Condition Error: ! Quitting... rsconnect/tests/testthat/_snaps/appDependencies.md0000644000176200001440000000171314536673066022170 0ustar liggesusers# infers correct packages for each source Code inferRPackageDependencies(simulateMetadata("rmd-static")) Output [1] "rmarkdown" Code inferRPackageDependencies(simulateMetadata("rmd-static", hasParameters = TRUE)) Output [1] "rmarkdown" "shiny" Code inferRPackageDependencies(simulateMetadata("quarto-static")) Output [1] "rmarkdown" Code inferRPackageDependencies(simulateMetadata("quarto-shiny")) Output [1] "rmarkdown" "shiny" Code inferRPackageDependencies(simulateMetadata("rmd-shiny")) Output [1] "rmarkdown" "shiny" Code inferRPackageDependencies(simulateMetadata("shiny")) Output [1] "shiny" Code inferRPackageDependencies(simulateMetadata("api")) Output [1] "plumber" Code inferRPackageDependencies(simulateMetadata("api", documentsHavePython = TRUE)) Output [1] "plumber" "reticulate" rsconnect/tests/testthat/_snaps/http.md0000644000176200001440000000460014536673130020046 0ustar liggesusers# non-libCurl methods are deprecated Code . <- httpFunction() Condition Warning: The `rsconnect.http` option was deprecated in rsconnect 1.0.0. i It should no longer be necessary to set this option i If the default http handler doesn't work for you, please file an issue at # authHeaders() picks correct method based on supplied fields Code str(authHeaders(list(secret = "123"), url, "GET")) Output List of 3 $ Date : chr "Thu, 09 Mar 2023 14:29:00 GMT" $ X-Auth-Signature : chr "YmJiMjM1Y2E5MjFlNGFkOTMxZjQxNzU4NGQ1ZTk3MzYyYzg1YjcyMzUyMzhlYTY4Y2UxMjI1MzJkZWE1MDA3NQ==; version=1" $ X-Content-Checksum: chr "d41d8cd98f00b204e9800998ecf8427e" Code str(authHeaders(list(private_key = key), url, "GET")) Output List of 3 $ Date : chr "Thu, 09 Mar 2023 14:29:00 GMT" $ X-Auth-Signature : chr "tqz4HGcSmuWKIGzIj42OEkwYZQzfJBdrUynlBQKSEEok2zMFZwsgEpEzU8PzpoeMEmcX5+Cr1IuDLLASz0ivAQ==" $ X-Content-Checksum: chr "1B2M2Y8AsgTpgAmY7PhCfg==" # includes body in error if available Code handleResponse(resp_text) Condition Error: ! failed with HTTP status 400 Failed Code handleResponse(resp_json) Condition Error: ! failed with HTTP status 400 failed Code handleResponse(resp_html) Condition Error: ! failed with HTTP status 400 Failed # but still gives got error if no body Code handleResponse(resp_text) Condition Error: ! failed with HTTP status 400 Code handleResponse(resp_json) Condition Error: ! failed with HTTP status 400 Unexpected json response: Code handleResponse(resp_html) Condition Error: ! failed with HTTP status 400 # errors contain method Code GET(service, list(), path = "status/404") Condition Error in `GET()`: ! failed with HTTP status 404 Code POST(service, list(), path = "status/403") Condition Error in `POST()`: ! failed with HTTP status 403 rsconnect/tests/testthat/_snaps/bundlePython.md0000644000176200001440000000035414536673114021546 0ustar liggesusers# throws error if environment.py fails Code inferPythonEnv(".", pythonPathOrSkip()) Condition Error in `inferPythonEnv()`: ! Error reading requirements.txt: [Errno 13] Permission denied: './requirements.txt' rsconnect/tests/testthat/_snaps/writeManifest.md0000644000176200001440000000035314536673172021717 0ustar liggesusers# Deploying a Quarto project without Quarto is an error Code makeManifest(appDir) Condition Error in `quartoInspect()`: ! `quarto` not found. i Check that it is installed and available on your `PATH`. rsconnect/tests/testthat/_snaps/deployApp.md0000644000176200001440000000440114536673123021025 0ustar liggesusers# appDir must be an existing directory Code deployApp(1) Condition Error in `deployApp()`: ! `appDir` must be a single string, not the number 1. Code deployApp("doesntexist") Condition Error in `deployApp()`: ! `appDir`, "doesntexist", does not exist. # single document appDir is deprecated Code deployApp("foo.Rmd") Condition Warning: The `appDir` argument of `deployApp()` takes a directory, not a document, as of rsconnect 1.0.0. i Please use `deployDoc()` instead. Error in `deployDoc()`: ! `doc`, "foo.Rmd", does not exist. # appPrimaryDoc must exist, if supplied Code deployApp(dir, appPrimaryDoc = c("foo.Rmd", "bar.Rmd")) Condition Error in `deployApp()`: ! `appPrimaryDoc` must be a single string, not a character vector. Code deployApp(dir, appPrimaryDoc = "foo.Rmd") Condition Error in `deployApp()`: ! `appPrimaryDoc` not found inside `appDir` # startup scripts are logged by default Code runStartupScripts(".") Message i Running ./.rsconnect_profile # needsVisibilityChange() errors for cloud Code needsVisibilityChange("posit.cloud", appVisibility = "public") Condition Error in `needsVisibilityChange()`: ! Can't change cloud app visiblity from `deployApp()`. i Please change on posit.cloud instead. # deployHook executes function if set Code . <- runDeploymentHook("PATH", "rsconnect.pre.deploy", verbose = TRUE) Output Invoking `rsconnect.pre.deploy` hook # applicationDeleted() errors or prompts as needed Code applicationDeleted(client, target, app) Condition Error in `applicationDeleted()`: ! Failed to find existing application on server; it's probably been deleted. i Use `forgetDeployment()` to remove outdated record and try again. i Or use `applications()` to see other applications you have on the server. --- Code . <- applicationDeleted(client, target, app) Message Failed to find existing application on server; it's probably been deleted. What do you want to do? 1: Give up and try again later 2: Delete existing deployment & create a new app Selection: 2 rsconnect/tests/testthat/_snaps/account-find.md0000644000176200001440000000401714536673063021450 0ustar liggesusers# validates its arguments Code findAccount(1, NULL) Condition Error: ! `account` must be a single string or `NULL`, not the number 1. Code findAccount(NULL, 1) Condition Error: ! `server` must be a single string or `NULL`, not the number 1. # error if no accounts Code findAccount() Condition Error: ! No accounts registered. i Call `rsconnect::setAccountInfo()` to register an account. # error if no matching account Code findAccount("unknown", NULL) Condition Error: ! Can't find any accounts with `account` = "unknown". i Available account names: "albert". Code findAccount(NULL, "unknown") Condition Error: ! Can't find any accounts with `server` = "unknown". i Known servers are "example.com". Code findAccount("unknown", "unknown") Condition Error: ! Can't find account with `name` = "unknown" and `server` = "unknown" i Call `accounts()` to see available options. # error if ambiguous accounts in non-interactive environment Code findAccount() Condition Error: ! Found multiple accounts. Please disambiguate by setting `server` and/or `account`. i Available servers: "x" and "y". i Available account names: "a" and "b". Code findAccount("a", NULL) Condition Error: ! Found multiple accounts for `account` = "a". Please disambiguate by setting `server`. i Available servers: "x" and "y". Code findAccount(NULL, "y") Condition Error: ! Found multiple accounts for `server` = "y". Please disambiguate by setting `account`. i Known account names are "a" and "b". # prompted to pick account in interactive environment Code out <- findAccount() Message Found multiple accounts. Which one do you want to use? 1: server: x / username: a 2: server: y / username: a 3: server: y / username: b Selection: 2 rsconnect/tests/testthat/_snaps/secret.md0000644000176200001440000000031314536673131020352 0ustar liggesusers# print and str obfuscate output Code x <- secret("THIS IS MY PASSWORD: foo") x Output [1] "THIS I... (redacted)" Code str(x) Output THIS I... (redacted) rsconnect/tests/testthat/_snaps/bundlePackage.md0000644000176200001440000000237214536673102021617 0ustar liggesusers# can snapshot deps with renv Code pkgs <- bundlePackages(app_dir) Message i Capturing R dependencies with renv v Found 2 dependencies # can snapshot deps with packrat (option) Code pkgs <- bundlePackages(app_dir) Message i Capturing R dependencies with packrat v Found 2 dependencies # can snapshot deps with packrat (env var) Code pkgs <- bundlePackages(app_dir) Message i Capturing R dependencies with packrat v Found 2 dependencies # can capture deps from renv lockfile Code pkgs <- bundlePackages(app_dir) Message i Capturing R dependencies from renv.lock v Found 3 dependencies # can capture deps with packrat even when renv lockfile present Code pkgs <- bundlePackages(app_dir) Message i Capturing R dependencies with packrat v Found 2 dependencies # error if can't find source Code . <- bundlePackages(app_dir) Message i Capturing R dependencies with renv v Found 1 dependency Condition Error: ! All packages must be installed from a reproducible location. x Can't re-install packages installed from source: shiny. i See `rsconnect::appDependencies()` for more details. rsconnect/tests/testthat/_snaps/bundleFiles.md0000644000176200001440000000560214536673076021337 0ustar liggesusers# can read all files from directory Code listDeploymentFiles(dir) Condition Error: ! No content to deploy. x `appDir` is empty. # can read selected files from directory Code out <- listDeploymentFiles(dir, c("b.R", "c.R")) Condition Warning: All files listed in `appFiles` must exist. Problems: 'c.R' --- Code listDeploymentFiles(dir, character()) Condition Error: ! No content to deploy. x `appFiles` didn't match any files in `appDir`. # can read selected files from manifest Code out <- listDeploymentFiles(dir, appFileManifest = file.path(dir, "manifest")) Condition Warning: All files listed in `appFileManifest` must exist. Problems: 'c.R' --- Code listDeploymentFiles(dir, appFileManifest = file.path(dir, "manifest")) Condition Error: ! No content to deploy. x `appFileManifest` contains no usable files. # checks its inputs Code listDeploymentFiles(dir) Condition Error: ! No content to deploy. x `appDir` is empty. Code listDeploymentFiles(dir, appFiles = "a.R", appFileManifest = "b.R") Condition Error: ! Must specify at most one of `appFiles` and `appFileManifest` Code listDeploymentFiles(dir, appFiles = 1) Condition Error: ! `appFiles` must be a character vector or `NULL`, not the number 1. Code listDeploymentFiles(dir, appFileManifest = "doestexist") Condition Error: ! `appFileManifest`, "doestexist", does not exist. # drops drops non-existent files with warning Code out <- explodeFiles(dir, c("a", "d")) Condition Warning: All files listed in `appFiles` must exist. Problems: 'd' # generate nicely formatted messages Code explodeFiles(dir, c("a", "b")) Condition Error in `enforceBundleLimits()`: ! `appDir` ('') is too large to be deployed. x The maximum number of files is 1. x This directory contains at least 2 files. i Remove some files or adjust the rsconnect.max.bundle.files option. Code explodeFiles(dir, "c") Condition Error in `enforceBundleLimits()`: ! `appDir` ('') is too large to be deployed. x The maximum size is 5 bytes. x This directory is at least ?? bytes. i Remove some files or adjust the rsconnect.max.bundle.size option. # detectLongNames produces informative warning if needed Code detectLongNames(dir, 0) Condition Warning: The bundle contains files with user/group names longer than 0. x Files: 'a.r', 'b.r', and 'c.r' x Long user and group names cause the internal R tar implementation to produce invalid archives i Set the `rsconnect.tar` option or the `RSCONNECT_TAR` environment variable to the path to a tar executable. rsconnect/tests/testthat/_snaps/accounts.md0000644000176200001440000000110114536673062020703 0ustar liggesusers# secrets are hidden from casual inspection Code accountInfo("1")$secret Output [1] "SECRET... (redacted)" Code accountInfo("2")$private_key Output [1] "SECRET... (redacted)" Code accountInfo("3")$apiKey Output [1] "SECRET... (redacted)" # setAccountInfo() gives nice error on bad copy and paste Code setAccountInfo("name", "token", "") Condition Error in `setAccountInfo()`: ! You've copied and pasted the wrong thing. i Either click 'Show secret' or 'Copy to clipboard'. rsconnect/tests/testthat/_snaps/appMetadata-quarto.md0000644000176200001440000000031614536673075022631 0ustar liggesusers# quartoInspect requires quarto Code quartoInspect() Condition Error in `quartoInspect()`: ! `quarto` not found. i Check that it is installed and available on your `PATH`. rsconnect/tests/testthat/_snaps/servers-deprec.md0000644000176200001440000000036714536673132022030 0ustar liggesusers# addConnectServer is deprecated Code addConnectServer("https://colorado.posit.co/rsc", quiet = TRUE) Condition Warning: `addConnectServer()` was deprecated in rsconnect 1.0.0. i Please use `addServer()` instead. rsconnect/tests/testthat/_snaps/bundle.md0000644000176200001440000000063414536673106020346 0ustar liggesusers# removes renv/packrat activation Code tweakRProfile(path) writeLines(readLines(path)) Output # Modified by rsconnect package on # Line 1 # renv initialization disabled in published application # source("renv/activate.R") # Line 3 # Packrat initialization disabled in published application # source("packrat/init.R") # Line 5 rsconnect/tests/testthat/_snaps/servers.md0000644000176200001440000000534614536673133020573 0ustar liggesusers# servers() redacts the certificate Code servers() Output name url certificate 1 cert_test_a https://localhost:4567/ -----B... (redacted) 2 shinyapps.io https://api.shinyapps.io/v1 Amazon... (redacted) 3 posit.cloud https://api.posit.cloud/v1 Amazon... (redacted) # serverInfo() redacts the certificate Code str(serverInfo("posit.cloud")) Output List of 3 $ name : chr "posit.cloud" $ url : chr "https://api.posit.cloud/v1" $ certificate: Amazon... (redacted) Code str(serverInfo("shinyapps.io")) Output List of 3 $ name : chr "shinyapps.io" $ url : chr "https://api.shinyapps.io/v1" $ certificate: Amazon... (redacted) # serverInfo() errors if server not present Code serverInfo("foo") Condition Error in `findServer()`: ! Can't find `server` with name "foo". i Known servers are "shinyapps.io" and "posit.cloud". # addServer() errors if url not a connect server Code addServer(url) Condition Error in `addServer()`: ! `url` does not appear to be a Posit Connect server. # addServer() and addServerCertificate() inform about their actions Code addServer("https://example.com", validate = FALSE) Message Server 'example.com' added successfully: https://example.com Code addServerCertificate("example.com", certificate = cert) Message Certificate added to server 'example.com' # certificates can't be attached to plain http servers Code addServerCertificate("test", cert) Condition Error in `addServerCertificate()`: ! Certificates may only be attached to servers that use the HTTPS protocol. i Specify an HTTPS URL for the server, or omit the certificate. # findServer() errors if no servers Code findServer() Condition Error in `findServer()`: ! No local servers have been registered # findServer() errors/prompts of multiple servers present Code findServer() Condition Error in `findServer()`: ! Multiple servers found. i Use `server` to pick one of "myserver" and "yourserver". --- Code out <- findServer() Message Multiple servers found. Which one do you want to use? 1: myserver 2: yourserver Selection: 2 # findServer checks server name Code findServer(1) Condition Error: ! `server` must be a single string, not the number 1. Code findServer("foo") Condition Error in `findServer()`: ! Can't find `server` with name "foo". i Known servers are "shinyapps.io" and "posit.cloud". rsconnect/tests/testthat/_snaps/deployments-find.md0000644000176200001440000000202314536673123022347 0ustar liggesusers# error when no deployments and no accounts Code findDeployment(app, appName = "placeholder") Condition Error in `accountInfo()`: ! No accounts registered. i Call `rsconnect::setAccountInfo()` to register an account. # disambiguates multiple deployments Code findDeployment(app) Condition Error: ! This directory has been previously deployed in multiple places. Please use `appName`, `server` or `account` to disambiguate. Known applications: * test1 (server: example.com / username: ron): * test2 (server: example.com / username: ron): --- Code dep <- findDeployment(app) Message This directory has been previously deployed in multiple places. Which deployment do you want to use? 1: test1 (server: example.com / username: ron): 2: test2 (server: example.com / username: ron): Selection: 2 rsconnect/tests/testthat/test-shinyApp/0000755000176200001440000000000014467166424020040 5ustar liggesusersrsconnect/tests/testthat/test-shinyApp/test-shinyApp.tar.gz0000644000176200001440000001566014467166424023747 0ustar liggesusers\msFWL12U!A$HIlNbD;[@I^=HYc֭YE3==3tOV:[Fyf>g4㿶8ƶv\{~&QSʹ[ڡ|1 3YL_Q杣V}%JCuQi4Q,N;ˋ2ҾѾٷI4ITPu_(c~^~1n~d#>o_@ab*.~cYlE˱6_1 et\PA C/~>ս7^ojբ勦E.+uf܉O[۶ؚ]Dk;Þ=9֣X<gI`U_()mB,,e\tzehhb%U.BDImF(oD 7 ɠ.TD#%|8xOWL.o0w*.J@p]IieQ]PINC3# rf8]y>U͢&+YѼ"S:e2]N/U;{^d,{W" ޤO_U\$Ο -+V [[YݒAW?,0 Xeo _&gg?zcW\sA 굊wqxT5+HBX8QqqK r@B7:8+eR|s~jrq>9:i+PEy^zN8T:{ iZE&׽Xn #|q%E2;*M}F oJho4=7}i}{@'h "P8/(U)#q&˓ӌ:,*6X+ @+ ELzew XFu; cKLr dB"@JozP푱an{'t0z+B:emxM"G񍓳G&Z;djӁ@ _{h6$jSoD]i=5o;q|.3,]7}ww0O/PlNb[iz qfJVru_4Zoz~KiQ"MӷictB;nJ; ^:C^ez9lS^i48WЮ\ʾweߝ㆓tɢŲk<ݰ^_Qre?[@g+ cAQw]x4Dx+T5ǎ?=MG2KX^ZVQ]}(ر,2+M?/"|syI7n$Bkv h*AYkxh6#CvȂ_9 ((7dLփ> +L|9U[Baі W?=1t˼3܄~Bi^lp #ui6 %쇊L^: e 2/W[* UN)OR{ FCZZ>)=7؁=h L>WKݞm7 EѯjߒK&J]\^*~{Up*|6PLNPi $ ܣH$ ;"1C1u$e;n| i>5̐[5*xdHͪ3)x8€5[Er1Jf"D?YhERX 3onU7rUfʳa0JQc?a 4#eŒ itA-@hB9^FDXDs."4M1+Qjakm 5Γfa5ꊈ$Ɓ_FCN݆ W 4R;M44' &1z@Z#˸zG4LV^NrT^J_J4$ME[Fk^n[ !o⛷5Рe-:}t憕e(Ђ"<:kϞ<j/m:kു@^x!HP|{BӚYgn~U6 }-#?PtEdx`t[Yg{pm,hX?p\zZw$upp&GwY;bس{𖖴ٯa av(a\qHtq|jAVi,|.TQcP/Tpp.K#H-:/Ӥ+p ّrDٹx*KU ZaH>3  x4 /@0wbA%Yt.#/ؙE+x7/uNg//eT*~/er/,1+so@M& 4eHKI@8 ]BxDoڟ6"YDjK/ޮ\g 9i_Ý:!(k,%6ǣ&4]Yfm))_ޫ|){N(7i<XiAi*?~`(ĩjl<n 5ǹГeF%AS,f٭u)vNh=Kql%dX*Xºi #,[sg&Z)22TI4t]f@WWtD"К;HV6,!?f/0˴Cy?S͡|{ O@([%*oQ!@C*9mkαvP)`2uV;+vjY׽$t*KQnfwoތ]*~I.b8yk;Xd'Zem+fOUMs tg)cW}x0@9 z :GSiN=w7TٽсqooH TJfRO|' e\rr$虄ζ `g@% SpZMaҩUR>\)Yo:[bib,Q@Ȑ:O~X *Y~(6C;zc-+մ>#ZpRX$na6srH򸜛+>_d;)k6K~QAB)DIţ8Qz(⓴\ )z{d_l'7"Fv5>ˀγ$0e6vQ@E`\ɳfK*z/2t!W\96Gt\f[ILD,љZQoBi2ӳP?\;3`1 ^ "nFӇ|޾~Tn{A>eLc3t14W%𖙦D | CC'`h[+Zk]e( M!լ|:JJ+dU[{Z[ZB2ZKz)F˘:u6l"=gۻ"øBÆr'/Du'BU=u&d5J(r.ieZryQS:>5;DjX BU%(m(G|ń􍭪79 #4[R&̢A6f]NosΩ.9=:}(’ȵDeDIJ030bC[>[$␮nIz9b  Y>>ԻTɲxL 0_Mn8w:%DϣBijE$d6;HZǨqf#ӡJiz~75t)1h"JG[m5tT]; @HF"U,)je50zh F"o1q[ʑt&{ Y w&:=yV;D=nL%S/"}69BPp-+ 2,E6YXl=k%0t rC|X8.v Єpji-\KVe؍k<:z< {#]{.uX= v8\ r:vps?+o T `,~~ `NsۛxÉ;`|Ñ l"Fhr2g>X1+Sow?ܿz }=qIx?=Fǎ0,?w:-±-s!Tx8jWC (g m:G W(E B4:Q>p(Irn룵R@ hȅX E&FZM>h͸TQU^F>h T;y#=x2Ӡi8Hj|8x ṗa<&|ngerj?x;x;T Y&{|ΝcFCXJěNwjsz~` ca>'5 F#}wҷxxcc,1tDк3z+n@o#? S x>@sa{&CB_f%rzmS]se=Ήxhg;SC/t#׵ jxFvST0dC C^'Dxas8 YˇYlXA8{(x@\\{@xiH#s<ǽAqlОcg2 @B̽H󏍳~|1?ܽ?g4~*̃邞J3!~ѵg`-[Z *ZG:CW(IO|TWVe"λVΘNT>qozї!8-7=Q:_n"UV[ѣh$/SqBBjqE\b&2ppc?:(\ѓTŘ>>>>^A&~hrsconnect/tests/testthat/packages/0000755000176200001440000000000014536677712017052 5ustar liggesusersrsconnect/tests/testthat/packages/latin1package/0000755000176200001440000000000014513230050021525 5ustar liggesusersrsconnect/tests/testthat/packages/latin1package/NAMESPACE0000644000176200001440000000003714513230050022744 0ustar liggesusersexportPattern("^[[:alpha:]]+") rsconnect/tests/testthat/packages/latin1package/man/0000755000176200001440000000000014513230050022300 5ustar liggesusersrsconnect/tests/testthat/packages/latin1package/man/hello.Rd0000644000176200001440000000020014513230050023662 0ustar liggesusers\name{hello} \alias{hello} \title{Hello, World!} \usage{ hello() } \description{ Prints 'Hello, world!'. } \examples{ hello() } rsconnect/tests/testthat/packages/latin1package/DESCRIPTION0000644000176200001440000000035714513230050023240 0ustar liggesusersPackage: latin1package Type: Package Title: Provides some funky characters. Version: 0.1.0 Author: Jens Frhling Maintainer: Jens Frhling Description: a test package License: GPL-2 Encoding: latin1 LazyData: true rsconnect/tests/testthat/packages/latin1package/R/0000755000176200001440000000000014513230050021726 5ustar liggesusersrsconnect/tests/testthat/packages/latin1package/R/hello.R0000644000176200001440000000006114513230050023151 0ustar liggesusershello <- function() { print("Hello, world!") } rsconnect/tests/testthat/packages/utf8package/0000755000176200001440000000000014513230050021223 5ustar liggesusersrsconnect/tests/testthat/packages/utf8package/NAMESPACE0000644000176200001440000000003714513230050022442 0ustar liggesusersexportPattern("^[[:alpha:]]+") rsconnect/tests/testthat/packages/utf8package/man/0000755000176200001440000000000014513230050021776 5ustar liggesusersrsconnect/tests/testthat/packages/utf8package/man/hello.Rd0000644000176200001440000000020014513230050023360 0ustar liggesusers\name{hello} \alias{hello} \title{Hello, World!} \usage{ hello() } \description{ Prints 'Hello, world!'. } \examples{ hello() } rsconnect/tests/testthat/packages/utf8package/DESCRIPTION0000644000176200001440000000035614513230050022735 0ustar liggesusersPackage: utf8package Type: Package Title: Provides some funky characters. Version: 0.1.0 Author: Jens Fröhling Maintainer: Jens Fröhling Description: a test package License: GPL-2 Encoding: UTF-8 LazyData: true rsconnect/tests/testthat/packages/utf8package/R/0000755000176200001440000000000014513230050021424 5ustar liggesusersrsconnect/tests/testthat/packages/utf8package/R/hello.R0000644000176200001440000000006114513230050022647 0ustar liggesusershello <- function() { print("Hello, world!") } rsconnect/tests/testthat/packages/windows1251package/0000755000176200001440000000000014513230050022340 5ustar liggesusersrsconnect/tests/testthat/packages/windows1251package/NAMESPACE0000644000176200001440000000003714513230050023557 0ustar liggesusersexportPattern("^[[:alpha:]]+") rsconnect/tests/testthat/packages/windows1251package/man/0000755000176200001440000000000014513230050023113 5ustar liggesusersrsconnect/tests/testthat/packages/windows1251package/man/hello.Rd0000644000176200001440000000020014513230050024475 0ustar liggesusers\name{hello} \alias{hello} \title{Hello, World!} \usage{ hello() } \description{ Prints 'Hello, world!'. } \examples{ hello() } rsconnect/tests/testthat/packages/windows1251package/DESCRIPTION0000644000176200001440000000036614513230050024053 0ustar liggesusersPackage: windows1251package Type: Package Title: Provides some funky characters. Version: 0.1.0 Author: Maintainer: Description: a test package License: GPL-2 Encoding: Windows-1251 LazyData: true rsconnect/tests/testthat/packages/windows1251package/R/0000755000176200001440000000000014513230050022541 5ustar liggesusersrsconnect/tests/testthat/packages/windows1251package/R/hello.R0000644000176200001440000000006114513230050023764 0ustar liggesusershello <- function() { print("Hello, world!") } rsconnect/tests/testthat/test-servers.R0000644000176200001440000001373414513230050020044 0ustar liggesuserstest_that("servers() can return 0 row data frame", { local_temp_config() out <- servers(local = TRUE) expect_equal(nrow(out), 0) expect_named(out, c("name", "url", "certificate")) }) test_that("servers() redacts the certificate", { local_temp_config() # add a server with a sample certificate addTestServer( url = "https://localhost:4567/", name = "cert_test_a", certificate = test_path("certs/sample.crt") ) expect_snapshot(servers()) }) test_that("serverInfo() redacts the certificate", { expect_snapshot({ str(serverInfo("posit.cloud")) str(serverInfo("shinyapps.io")) }) }) test_that("serverInfo() errors if server not present", { local_temp_config() expect_snapshot(serverInfo("foo"), error = TRUE) }) test_that("normalizes connect urls", { expected <- "https://myserver.com/__api__" expect_equal(ensureConnectServerUrl("https://myserver.com"), expected) expect_equal(ensureConnectServerUrl("https://myserver.com/"), expected) expect_equal(ensureConnectServerUrl("https://myserver.com/__api__"), expected) expect_equal(ensureConnectServerUrl("https://myserver.com/__api__/"), expected) }) # addServer --------------------------------------------------------------- test_that("addServer() name defaults to hostname & port of url", { expect_equal(serverName("https://example.com/abc"), "example.com") expect_equal(serverName("https://example.com:8787/abc"), "example.com:8787") }) test_that("addServer() normalises url", { skip_on_cran() local_temp_config() addServer("connect.posit.it", name = "connect", quiet = TRUE) info <- serverInfo("connect") expect_equal(info$url, "https://connect.posit.it/__api__") }) test_that("addServer() errors if url not a connect server", { local_temp_config() service <- httpbin_service() url <- buildHttpUrl(service) expect_snapshot(addServer(url), error = TRUE) }) test_that("addServer() and addServerCertificate() inform about their actions", { local_temp_config() cert <- test_path("certs/sample.crt") expect_snapshot({ addServer("https://example.com", validate = FALSE) addServerCertificate("example.com", certificate = cert) }) }) test_that("can save certificates", { local_temp_config() addTestServer("test", certificate = test_path("certs/sample.crt")) info <- serverInfo("test") certLines <- paste(readLines(test_path("certs/sample.crt")), collapse = "\n") expect_equal(info$certificate, secret(certLines)) }) test_that("can add certificates after creation", { local_temp_config() addTestServer("test") addServerCertificate("test", certificate = test_path("certs/sample.crt"), quiet = TRUE ) info <- serverInfo("test") certLines <- paste(readLines(test_path("certs/sample.crt")), collapse = "\n") expect_equal(info$certificate, secret(certLines)) }) test_that("can store multiple certificates can exist in one dcf", { local_temp_config() addTestServer("test", certificate = test_path("certs/two-cas.crt")) info <- serverInfo("test") certLines <- paste(readLines(test_path("certs/two-cas.crt")), collapse = "\n") expect_equal(info$certificate, secret(certLines)) }) test_that("certificates can't be attached to plain http servers", { local_temp_config() addTestServer("test", "http://example.com") cert <- test_path("certs/sample.crt") expect_snapshot(addServerCertificate("test", cert), error = TRUE) }) # cloud servers ----------------------------------------------------------- test_that("All hosted product names are identified as cloud", { expect_true(isCloudServer("shinyapps.io")) expect_true(isCloudServer("rstudio.cloud")) expect_true(isCloudServer("posit.cloud")) expect_false(isCloudServer("connect.internal")) }) test_that("All hosted product names are identified as cloud", { checkCloudServer("shinyapps.io") checkCloudServer("rstudio.cloud") checkCloudServer("posit.cloud") expect_error(checkCloudServer("connect.internal")) }) test_that("only shinyapps.io is identified as shinyapps.io", { expect_true(isShinyappsServer("shinyapps.io")) expect_false(isShinyappsServer("rstudio.cloud")) expect_false(isShinyappsServer("posit.cloud")) expect_false(isShinyappsServer("connect.internal")) }) test_that("only shinyapps.io is identified as shinyapps.io", { checkShinyappsServer("shinyapps.io") expect_error(checkShinyappsServer("rstudio.cloud")) expect_error(checkShinyappsServer("posit.cloud")) expect_error(checkShinyappsServer("connect.internal")) }) test_that("predefined servers includes cloud and shinyapps", { local_temp_config() out <- servers() expect_equal(nrow(out), 2) expect_named(out, c("name", "url", "certificate")) expect_setequal(out$name, c("posit.cloud", "shinyapps.io")) }) test_that("predefined servers includes rstudio.cloud if needed", { local_temp_config() addTestAccount("john", "rstudio.cloud") expect_true("rstudio.cloud" %in% servers()$name) }) test_that("cloud server info matches name given if valid", { local_temp_config() addTestAccount("john", "rstudio.cloud") rstudioServer <- serverInfo("rstudio.cloud") expect_equal(rstudioServer$name, "rstudio.cloud") }) # findServer -------------------------------------------------------------- test_that("findServer() errors if no servers", { local_temp_config() expect_snapshot(findServer(), error = TRUE) }) test_that("findServer() picks server if only one present", { local_mocked_bindings(servers = function(...) { data.frame(name = "myserver", stringsAsFactors = FALSE) }) expect_equal(findServer(), "myserver") }) test_that("findServer() errors/prompts of multiple servers present", { local_mocked_bindings(servers = function(...) { data.frame(name = c("myserver", "yourserver"), stringsAsFactors = FALSE) }) expect_snapshot(findServer(), error = TRUE) simulate_user_input(2) expect_snapshot(out <- findServer()) expect_equal(out, "yourserver") }) test_that("findServer checks server name", { local_temp_config() expect_snapshot(error = TRUE, { findServer(1) findServer("foo") }) }) rsconnect/tests/testthat/test-rmd-bad-case/0000755000176200001440000000000014513230050020437 5ustar liggesusersrsconnect/tests/testthat/test-rmd-bad-case/img/0000755000176200001440000000000014513230050021213 5ustar liggesusersrsconnect/tests/testthat/test-rmd-bad-case/img/RStudio.svg0000644000176200001440000000012714513230050023325 0ustar liggesusers rsconnect/tests/testthat/test-rmd-bad-case/index.Rmd0000644000176200001440000000157014513230050022215 0ustar liggesusers--- title: "rmarkdown with bad link case" --- One of the embedded images uses `img/rstudio.svg` even though the on-disk filename is `img/RStudio.svg`. This will render fine on a Mac, for example, but will err when rendered on Linux. The Mac filesystem is case-preserving, but case-insensitive. The Linux filesystem is case-sensitive. The IDE and `rsconnect::deployDoc` attempt to deploy the as-linked filenames. With both `img/rstudio.svg` and `img/RStudio.svg` links, the bundle has two copies of the SVG! You can use `rsconnect::deployApp` directly to see the lint error in the R console: ```r rsconnect::deployApp( appDir = getwd(), appFiles = c("index.Rmd", "img/RStudio.svg")) ``` And now, the links! This one (line 29) is all lower-case and should trigger the error. ![](img/rstudio.svg) This one is mixed-case and matches the on-disk filename. ![](img/RStudio.svg) rsconnect/tests/testthat/test-client.R0000644000176200001440000000114414513230050017621 0ustar liggesuserstest_that("cloud accounts create cloud clients", { account <- list(server = "posit.cloud") client <- clientForAccount(account) expect_equal(client$service(), "posit.cloud") }) test_that("shinyapps accounts create shinyapps clients", { account <- list(server = "shinyapps.io") client <- clientForAccount(account) expect_equal(client$service(), "shinyapps.io") }) test_that("connect accounts create connect clients", { local_temp_config() addTestServer("example.com") account <- list(server = "example.com") client <- clientForAccount(account) expect_equal(client$service(), "connect") }) rsconnect/tests/testthat/shinyapp-simple/0000755000176200001440000000000014536677712020416 5ustar liggesusersrsconnect/tests/testthat/shinyapp-simple/server.R0000644000176200001440000000031314467166424022040 0ustar liggesuserslibrary(shiny) shinyServer(function(input, output) { output$distPlot <- renderPlot({ dist <- rnorm(input$obs) hist(dist) }) output$obs <- renderText({paste(input$obs, "\n", input$obs)}) }) rsconnect/tests/testthat/shinyapp-simple/ui.R0000644000176200001440000000041214467166424021147 0ustar liggesuserslibrary(shiny) shinyUI(pageWithSidebar( headerPanel("Hello, Shiny!"), sidebarPanel( sliderInput("obs", "Number of observations:", min = 1, max = 1000, value = 500)), mainPanel( plotOutput("distPlot"))) ) rsconnect/tests/testthat/test-deployApp.R0000644000176200001440000000600714516247550020323 0ustar liggesuserstest_that("appDir must be an existing directory", { expect_snapshot(error = TRUE, { deployApp(1) deployApp("doesntexist") }) }) test_that("single document appDir is deprecated", { skip_on_cran() expect_snapshot(error = TRUE, { deployApp("foo.Rmd") }) }) test_that("appPrimaryDoc must exist, if supplied", { skip_on_cran() dir <- local_temp_app() expect_snapshot(error = TRUE, { deployApp(dir, appPrimaryDoc = c("foo.Rmd", "bar.Rmd")) deployApp(dir, appPrimaryDoc = "foo.Rmd") }) }) test_that("startup scripts are logged by default", { dir <- local_temp_app() withr::local_dir(dir) writeLines("1 + 1", file.path(dir, ".rsconnect_profile")) expect_snapshot(runStartupScripts(".")) }) # record directory -------------------------------------------------------- test_that("findRecordPath() uses recordDir, then appPrimaryDoc, then appDir", { expect_equal(findRecordPath("a"), "a") expect_equal(findRecordPath("a", recordDir = "b"), "b") expect_equal(findRecordPath("a", appPrimaryDoc = "c"), "a/c") }) # app visibility ---------------------------------------------------------- test_that("needsVisibilityChange() returns FALSE when no change needed", { dummyApp <- function(visibility) { list( deployment = list( properties = list( application.visibility = visibility ) ) ) } expect_false(needsVisibilityChange("connect.com")) expect_false(needsVisibilityChange("shinyapps.io", dummyApp("public"), NULL)) expect_false(needsVisibilityChange("shinyapps.io", dummyApp("public"), "public")) expect_true(needsVisibilityChange("shinyapps.io", dummyApp(NULL), "private")) expect_true(needsVisibilityChange("shinyapps.io", dummyApp("public"), "private")) }) test_that("needsVisibilityChange() errors for cloud", { expect_snapshot(error = TRUE, needsVisibilityChange("posit.cloud", appVisibility = "public") ) }) test_that("deployHook executes function if set", { withr::local_options(rsconnect.pre.deploy = NULL) expect_equal( runDeploymentHook("PATH", "rsconnect.pre.deploy"), NULL ) withr::local_options(rsconnect.pre.deploy = function(path) path) expect_equal( runDeploymentHook("PATH", "rsconnect.pre.deploy"), "PATH" ) expect_snapshot( . <- runDeploymentHook("PATH", "rsconnect.pre.deploy", verbose = TRUE) ) }) # deleted apps ------------------------------------------------------------ test_that("applicationDeleted() errors or prompts as needed", { local_temp_config() addTestServer("s") addTestAccount("a", "s") app <- local_temp_app() addTestDeployment(app, appName = "name", account = "a", server = "s") target <- createDeployment("name", "title", "id", NULL, "a", "a", "s", 1) client <- list(createApplication = function(...) NULL) expect_snapshot(applicationDeleted(client, target, app), error = TRUE) expect_length(dir(app, recursive = TRUE), 1) simulate_user_input(2) expect_snapshot(. <- applicationDeleted(client, target, app)) expect_length(dir(app, recursive = TRUE), 0) }) rsconnect/tests/testthat/test-deploymentTarget.R0000644000176200001440000004213414522164250021706 0ustar liggesuserstest_that("errors if no accounts", { local_temp_config() expect_snapshot(findDeploymentTarget(), error = TRUE) }) test_that("errors if unknown account or server", { local_temp_config() addTestServer("bar") addTestAccount("foo", "bar") expect_snapshot(error = TRUE, { findDeploymentTarget(server = "unknown") findDeploymentTarget(account = "john") }) }) test_that("errors if no previous deployments and multiple accounts", { local_temp_config() addTestServer("foo1") addTestServer("foo2") addTestAccount("ron", "foo1") addTestAccount("ron", "foo2") app_dir <- withr::local_tempdir() file.create(file.path(app_dir, "app.R")) expect_snapshot(error = TRUE, { findDeploymentTarget(app_dir) findDeploymentTarget(app_dir, appName = "test") }) }) test_that("uses appId given a local deployment record; created by a local account", { # Demonstrates that the deployment record is sufficient without a call to # the remote server. local_temp_config() addTestServer("local") addTestAccount("leslie", "local") app_dir <- withr::local_tempdir() addTestDeployment(app_dir, appName = "local-record", appId = "the-appid", account = "leslie", server = "local") target <- findDeploymentTarget(app_dir, appId = "the-appid") accountDetails <- target$accountDetails deployment <- target$deployment expect_equal(accountDetails$name, "leslie") expect_equal(accountDetails$server, "local") expect_equal(deployment$appId, "the-appid") expect_equal(deployment$name, "local-record") expect_equal(deployment$username, "leslie") expect_equal(deployment$account, "leslie") expect_equal(deployment$server, "local") }) test_that("uses appId given a local deployment record; created by a collaborator", { # Demonstrates that the target account does not need to be the account that # created the deployment record. The deployment record is sufficient without # a call to the remote server. local_temp_config() addTestServer("local") addTestAccount("leslie", "local") app_dir <- withr::local_tempdir() addTestDeployment(app_dir, appName = "local-record", appId = "the-appid", account = "ron", server = "local") target <- findDeploymentTarget(app_dir, appId = "the-appid") accountDetails <- target$accountDetails deployment <- target$deployment expect_equal(accountDetails$name, "leslie") expect_equal(accountDetails$server, "local") expect_equal(deployment$appId, "the-appid") expect_equal(deployment$name, "local-record") expect_equal(deployment$username, "ron") expect_equal(deployment$account, "ron") expect_equal(deployment$server, "local") }) test_that("uses appId without local deployment record; created by local account", { local_temp_config() addTestServer("local") addTestAccount("leslie", "local") local_mocked_bindings( getApplication = function(...) data.frame( id = "the-appid", name = "remote-record", owner_username = "leslie", stringsAsFactors = FALSE ) ) app_dir <- withr::local_tempdir() target <- findDeploymentTarget(app_dir, appId = "the-appid") accountDetails <- target$accountDetails deployment <- target$deployment expect_equal(accountDetails$name, "leslie") expect_equal(accountDetails$server, "local") expect_equal(deployment$appId, "the-appid") expect_equal(deployment$name, "remote-record") expect_equal(deployment$username, "leslie") expect_equal(deployment$account, "leslie") expect_equal(deployment$server, "local") }) test_that("uses appId without local deployment record; created by collaborator", { local_temp_config() addTestServer("local") addTestAccount("leslie", "local") app_dir <- withr::local_tempdir() local_mocked_bindings( getApplication = function(...) data.frame( id = "the-appid", name = "remote-record", owner_username = "ron", stringsAsFactors = FALSE ) ) target <- findDeploymentTarget(app_dir, appId = "the-appid") accountDetails <- target$accountDetails deployment <- target$deployment expect_equal(accountDetails$name, "leslie") expect_equal(accountDetails$server, "local") expect_equal(deployment$appId, "the-appid") expect_equal(deployment$name, "remote-record") expect_equal(deployment$username, "ron") # note: account+server does not correspond to the "ron" account, but this is # the best we can do, as we do not have the original deployment record. expect_equal(deployment$account, "leslie") expect_equal(deployment$server, "local") }) test_that("handles accounts if only server specified", { local_temp_config() addTestServer("foo") addTestAccount("ron", "foo") addTestAccount("john", "foo") local_mocked_bindings(getAppByName = function(...) NULL) app_dir <- withr::local_tempdir() file.create(file.path(app_dir, "app.R")) expect_snapshot(findDeploymentTarget(app_dir, server = "foo"), error = TRUE) target <- findDeploymentTarget( app_dir, server = "foo", account = "ron" ) accountDetails <- target$accountDetails deployment <- target$deployment expect_equal(accountDetails$name, "ron") expect_equal(accountDetails$server, "foo") expect_equal(deployment$username, "ron") expect_equal(deployment$account, "ron") expect_equal(deployment$server, "foo") }) test_that("errors/prompts if multiple deployments", { local_temp_config() addTestServer("server1.com") addTestServer("server2.com") addTestAccount("ron", "server1.com") addTestAccount("ron", "server2.com") app_dir <- withr::local_tempdir() addTestDeployment(app_dir, server = "server1.com") addTestDeployment(app_dir, server = "server2.com") expect_snapshot(error = TRUE, { findDeploymentTarget(app_dir, appName = "test") findDeploymentTarget(app_dir) }) simulate_user_input(1) expect_snapshot(target <- findDeploymentTarget(app_dir)) accountDetails <- target$accountDetails deployment <- target$deployment expect_equal(accountDetails$name, "ron") expect_equal(accountDetails$server, "server1.com") expect_equal(deployment$name, "test") }) test_that("succeeds if there's a single existing deployment", { local_temp_config() addTestServer("example.com") addTestAccount("ron") app_dir <- withr::local_tempdir() addTestDeployment( app_dir, appName = "test", appId = "1", username = "ron", account = "ron", server = "example.com", version = "999" ) expect_equal(nrow(deployments(app_dir, accountFilter = "ron", serverFilter = "example.com")), 1) expect_equal(nrow(deployments(app_dir)), 1) target <- findDeploymentTarget(app_dir) accountDetails <- target$accountDetails deployment <- target$deployment expect_equal(accountDetails$name, "ron") expect_equal(accountDetails$server, "example.com") expect_equal(deployment$appId, "1") expect_equal(deployment$name, "test") expect_equal(deployment$username, "ron") expect_equal(deployment$account, "ron") expect_equal(deployment$server, "example.com") expect_equal(deployment$version, "999") target <- findDeploymentTarget(app_dir, appName = "test") accountDetails <- target$accountDetails deployment <- target$deployment expect_equal(accountDetails$name, "ron") expect_equal(accountDetails$server, "example.com") expect_equal(deployment$appId, "1") expect_equal(deployment$name, "test") expect_equal(deployment$username, "ron") expect_equal(deployment$account, "ron") expect_equal(deployment$server, "example.com") expect_equal(deployment$version, "999") }) test_that("appId is used even when name does not match", { local_temp_config() addTestServer() addTestAccount("ron") app_dir <- withr::local_tempdir() addTestDeployment(app_dir, appName = "test", appId = "1", username = "ron") addTestDeployment(app_dir, appName = "second", appId = "2", username = "ron") target <- findDeploymentTarget(app_dir, appName = "mismatched", appId = "1") accountDetails <- target$accountDetails deployment <- target$deployment expect_equal(accountDetails$name, "ron") expect_equal(accountDetails$server, "example.com") expect_equal(deployment$appId, "1") }) test_that("new title overrides existing title", { local_temp_config() addTestServer() addTestAccount("ron") app_dir <- withr::local_tempdir() addTestDeployment(app_dir, appTitle = "old title") target <- findDeploymentTarget(app_dir) deployment <- target$deployment expect_equal(deployment$title, "old title") target <- findDeploymentTarget(app_dir, appTitle = "new title") deployment <- target$deployment expect_equal(deployment$title, "new title") }) test_that("new env vars overrides existing", { local_temp_config() app <- local_temp_app() addTestServer() addTestAccount() addTestDeployment(app, envVars = "TEST1") target <- findDeploymentTarget(app) deployment <- target$deployment expect_equal(deployment$envVars, "TEST1") target <- findDeploymentTarget(app, envVars = "TEST2") deployment <- target$deployment expect_equal(deployment$envVars, "TEST2") # And check that it works with vectors addTestDeployment(app, envVars = c("TEST1", "TEST2")) target <- findDeploymentTarget(app) deployment <- target$deployment expect_equal(deployment$envVars, c("TEST1", "TEST2")) target <- findDeploymentTarget(app, envVars = "TEST2") deployment <- target$deployment expect_equal(deployment$envVars, "TEST2") }) test_that("empty character vector removes env vars", { local_temp_config() app <- local_temp_app() addTestServer() addTestAccount() addTestDeployment(app, envVars = "TEST1") target <- findDeploymentTarget(app, envVars = character()) deployment <- target$deployment expect_equal(deployment$envVars, character()) }) test_that("succeeds if there are no deployments and a single account", { local_temp_config() addTestServer() addTestAccount("ron") local_mocked_bindings( getAppByName = function(...) data.frame( name = "remotename", url = "app-url", stringsAsFactors = FALSE ) ) app_dir <- dirCreate(file.path(withr::local_tempdir(), "my_app")) expect_snapshot(error = TRUE, { findDeploymentTarget(app_dir) }) simulate_user_input(1) target <- findDeploymentTarget(app_dir) accountDetails <- target$accountDetails deployment <- target$deployment expect_equal(accountDetails$name, "ron") expect_equal(accountDetails$server, "example.com") expect_equal(deployment$name, "remotename") expect_equal(deployment$username, "ron") expect_equal(deployment$account, "ron") expect_equal(deployment$server, "example.com") target <- findDeploymentTarget(app_dir, forceUpdate = TRUE) accountDetails <- target$accountDetails deployment <- target$deployment expect_equal(accountDetails$name, "ron") expect_equal(accountDetails$server, "example.com") expect_equal(deployment$name, "remotename") expect_equal(deployment$username, "ron") expect_equal(deployment$account, "ron") expect_equal(deployment$server, "example.com") target <- findDeploymentTarget(app_dir, envVars = c("TEST1", "TEST2"), forceUpdate = TRUE) accountDetails <- target$accountDetails deployment <- target$deployment expect_equal(accountDetails$name, "ron") expect_equal(accountDetails$server, "example.com") expect_equal(deployment$name, "remotename") expect_equal(deployment$username, "ron") expect_equal(deployment$account, "ron") expect_equal(deployment$server, "example.com") expect_equal(deployment$envVars, c("TEST1", "TEST2")) target <- findDeploymentTarget(app_dir, appName = "foo", forceUpdate = TRUE) accountDetails <- target$accountDetails deployment <- target$deployment expect_equal(accountDetails$name, "ron") expect_equal(accountDetails$server, "example.com") expect_equal(deployment$name, "remotename") expect_equal(deployment$username, "ron") expect_equal(deployment$account, "ron") expect_equal(deployment$server, "example.com") }) test_that("default title is the empty string", { local_temp_config() addTestServer() addTestAccount("ron") local_mocked_bindings( getAppByName = function(...) data.frame( name = "remotename", url = "app-url", stringsAsFactors = FALSE ) ) app_dir <- withr::local_tempdir() target <- findDeploymentTarget(app_dir, forceUpdate = TRUE) deployment <- target$deployment expect_equal(deployment$title, "") }) confirm_existing_app_used <- function(server) { local_temp_config() addTestServer() addTestAccount("ron", server = server) local_mocked_bindings(getAppByName = function(...) data.frame( name = "my_app", id = 123, url = "http://example.com/test", stringsAsFactors = FALSE ), shouldUpdateApp = function(...) TRUE ) app_dir <- withr::local_tempdir() target <- findDeploymentTarget(app_dir, appName = "my_app", server = server) deployment <- target$deployment expect_equal(deployment$appId, 123) } test_that("can find existing application on server & use it", { confirm_existing_app_used("example.com") }) test_that("can find existing application on shinyapps.io & use it", { confirm_existing_app_used("shinyapps.io") }) confirm_existing_app_not_used <- function(server) { local_temp_config() addTestServer() addTestAccount("ron", server = server) local_mocked_bindings(getAppByName = function(...) data.frame( name = "my_app", id = 123, url = "http://example.com/test", stringsAsFactors = FALSE ), shouldUpdateApp = function(...) FALSE ) app_dir <- withr::local_tempdir() target <- findDeploymentTarget(app_dir, appName = "my_app", server = server) deployment <- target$deployment expect_equal(deployment$name, "my_app-1") expect_equal(deployment$appId, NULL) } test_that("can find existing application on server & not use it", { confirm_existing_app_not_used("example.com") }) test_that("can find existing application on shinyapps.io & not use it", { confirm_existing_app_not_used("shinyapps.io") }) # defaultAppName ---------------------------------------------------------- test_that("defaultAppName works with sites, documents, and directories", { expect_equal(defaultAppName("foo/bar.Rmd"), "bar") expect_equal(defaultAppName("foo/index.html"), "foo") expect_equal(defaultAppName("foo/bar"), "bar") }) test_that("defaultAppName reifies appNames for shinyApps", { expect_equal(defaultAppName("a b c", "shinyapps.io"), "a_b_c") expect_equal(defaultAppName("a!b!c", "shinyapps.io"), "a_b_c") expect_equal(defaultAppName("a b c", "shinyapps.io"), "a_b_c") long_name <- strrep("abcd", 64 / 4) expect_equal(defaultAppName(paste(long_name, "..."), "shinyapps.io"), long_name) }) # helpers ----------------------------------------------------------------- test_that("shouldUpdateApp errors when non-interactive", { app <- list(name = "my_app", url = "https://example.com") expect_snapshot(shouldUpdateApp(app, "my_app-1"), error = TRUE) }) test_that("forceUpdate shortcircuits shouldUpdateApp", { expect_true(shouldUpdateApp(forceUpdate = TRUE)) }) test_that("shouldUpdateApp handles 3 options", { app <- list(name = "my_app", url = "https://example.com") simulate_user_input(c(1, 2, 3)) expect_snapshot(error = TRUE, { one <- shouldUpdateApp(app, "my_app-1") two <- shouldUpdateApp(app, "my_app-1") three <- shouldUpdateApp(app, "my_app-1") }) expect_equal(one, TRUE) expect_equal(two, FALSE) }) test_that("findUnique always returns unique name", { expect_equal(findUnique("x", c("x", "y")), "x-1") expect_equal(findUnique("x", c("x", "x-1")), "x-2") expect_equal(findUnique("x", c("x", "x-1", "x-2")), "x-3") }) test_that("createDeploymentFromApplication promotes fields", { expect_equal(createDeploymentFromApplication( application = list( id = "1", name = "app-name", title = "app-title", owner_username = "alice.username" ), accountDetails = list( name = "alice", server = "example.com" ) ), list( name = "app-name", title = "app-title", envVars = NULL, appId = "1", username = "alice.username", account = "alice", server = "example.com", version = deploymentRecordVersion )) }) test_that("updateDeployment updates fields", { expect_equal(updateDeployment( list( name = "app-name", title = "app-title", envVars = NULL, appId = "1", username = "alice.username", account = "alice", server = "example.com", version = deploymentRecordVersion ), appTitle = "updated-title", envVars = c("VAR-NAME") ), list( name = "app-name", title = "updated-title", envVars = c("VAR-NAME"), appId = "1", username = "alice.username", account = "alice", server = "example.com", version = deploymentRecordVersion )) }) test_that("updateDeployment ignores NULL updates", { expect_equal(updateDeployment( list( name = "app-name", title = "app-title", envVars = c("VAR-NAME"), appId = "1", username = "alice.username", account = "alice", server = "example.com", version = deploymentRecordVersion ), appTitle = NULL, envVars = NULL ), list( name = "app-name", title = "app-title", envVars = c("VAR-NAME"), appId = "1", username = "alice.username", account = "alice", server = "example.com", version = deploymentRecordVersion )) }) rsconnect/tests/testthat/test-utils.R0000644000176200001440000000621114513230050017503 0ustar liggesuserstest_that("file_path_sans_ext removes extensions", { # extensions are removed. expect_equal( file_path_sans_ext(c("noext", "extension.ext", "doubledot..ext")), c("noext", "extension", "doubledot.") ) # compression extensions are removed first (when explicitly requested). expect_equal( file_path_sans_ext( c( "noext", "extension.ext", "doubledot..ext", "compressed.gz", "compressext.ext.bz2", "compressdoubledot..ext.xz" ), compression = TRUE ), c( "noext", "extension", "doubledot.", "compressed", "compressext", "compressdoubledot." ) ) }) # rbind_fill -------------------------------------------------------------- test_that("adds missing columns", { dfs <- list(data.frame(x = 1), data.frame(y = 2)) out <- rbind_fill(dfs) expect_equal(out, data.frame(x = c(1, NA), y = c(NA, 2))) }) test_that("order of col_names has preference", { dfs <- list(data.frame(y = 1, x = 2)) out <- rbind_fill(dfs, c("x", "y")) expect_equal(out, data.frame(x = 2, y = 1)) }) test_that("uses col_names if no inputs", { expect_equal(rbind_fill(list()), data.frame()) expect_equal( rbind_fill(list(), c("x", "y")), data.frame(x = logical(), y = logical()) ) }) test_that("can work with empty data frames", { out <- rbind_fill(list(data.frame(x = 1), data.frame())) expect_equal(out, data.frame(x = 1)) }) # hashing ----------------------------------------------------------------- test_that("we can hash an empty file", { emptyFile <- withr::local_tempfile() file.create(emptyFile) # computed by openssl::md5("") expect_equal(fileMD5(emptyFile), "d41d8cd98f00b204e9800998ecf8427e") expect_equal(fileMD5(NULL), "d41d8cd98f00b204e9800998ecf8427e") }) test_that("we can hash a file with well known contents", { path <- withr::local_tempfile() # Open in binary mode so the contents are identical on all platforms # (otherwise the file contains a \n on Unix and \r\n on Windows, which # hash differently) con <- file(path, open = "wb") writeLines("go bananas!", con) close(con) expect_equal(fileMD5(path), "52d2daa95d288f3c01e4d4d87f85727e") }) test_that("truthy is truthy", { # fallback-to-default checks expect_false(truthy(c())) expect_true(truthy(c(), default = TRUE)) expect_false(truthy(NA)) expect_true(truthy(NA, default = TRUE)) # true value checks expect_true(truthy(TRUE, default = FALSE)) expect_true(truthy("TRUE", default = FALSE)) expect_true(truthy("True", default = FALSE)) expect_true(truthy("true", default = FALSE)) expect_true(truthy("T", default = FALSE)) expect_true(truthy("1", default = FALSE)) expect_true(truthy(1, default = FALSE)) expect_true(truthy(42, default = FALSE)) # false value checks expect_false(truthy(FALSE, default = TRUE)) expect_false(truthy("FALSE", default = TRUE)) expect_false(truthy("False", default = TRUE)) expect_false(truthy("false", default = TRUE)) expect_false(truthy("F", default = TRUE)) expect_false(truthy("0", default = TRUE)) expect_false(truthy(0, default = TRUE)) expect_false(truthy("nonsense", default = TRUE)) }) rsconnect/tests/testthat/test-lint.R0000644000176200001440000000117614513230050017316 0ustar liggesuserstest_that("lints give have useful print method", { expect_snapshot({ lint(test_path("test-rmd-bad-case")) lint(test_path("shinyapp-appR")) }) }) test_that("The linter believes that the Shiny example apps are okay", { examples <- list.files(system.file("examples", package = "shiny"), full.names = TRUE) if (length(examples)) { results <- lapply(examples, lint) expect_output(lints <- lapply(results, print)) lapply(lints, function(project) { lapply(project, function(file) { lapply(file, function(linter) { expect_true(length(linter$indices) == 0) }) }) }) } }) rsconnect/tests/testthat/test-ide.R0000644000176200001440000000551714513230050017114 0ustar liggesuserstest_that("validateServerUrl() returns expected", { skip_on_cran() expect_false(validateServerUrl("https://posit.cloud")$valid) expect_false(validateServerUrl("https://shinyapps.io")$valid) expect_true(validateServerUrl("https://connect.posit.it/")$valid) expect_true(validateServerUrl("https://colorado.posit.co/rsc")$valid) }) test_that("validateServerUrl() normalises urls", { skip_on_cran() expect_true(validateServerUrl("connect.posit.it/")$valid) expect_true(validateServerUrl("colorado.posit.co/rsc")$valid) }) test_that("validateConnectUrl() returns expected return for some known endpoints", { skip_on_cran() expect_false(validateConnectUrl("https://posit.cloud")$valid) expect_false(validateConnectUrl("https://shinyapps.io")$valid) expect_true(validateConnectUrl("https://connect.posit.it/")$valid) expect_true(validateConnectUrl("https://colorado.posit.co/rsc")$valid) }) test_that("validateConnectUrl() normalises urls", { skip_on_cran() api_url <- "https://connect.posit.it/__api__" expect_equal(validateConnectUrl("connect.posit.it")$url, api_url) expect_equal(validateConnectUrl("connect.posit.it")$url, api_url) expect_equal(validateConnectUrl("https://connect.posit.it/")$url, api_url) }) test_that("validateConnectUrl() follows redirects", { skip_on_cran() api_url <- "https://connect.posit.it:443/__api__" expect_equal(validateConnectUrl("http://connect.posit.it")$url, api_url) }) test_that("getAppById() fails where expected", { local_temp_config() addTestServer() addTestAccount("susan") expect_snapshot(error = TRUE, { getAppById("123", "susan", "unknown", "unknown.com") getAppById("123", "robert", "unknown", "https://example.com") }) }) current_user_service <- function() { app <- env_cache( cache, "current_user_app", { json_app <- webfakes::new_app() json_app$use(webfakes::mw_json()) json_app$get("/users/current", function(req, res) { res$set_status(200L)$send_json(list(username = jsonlite::unbox("susan"))) }) app <- webfakes::new_app_process(json_app) } ) parseHttpUrl(app$url()) } test_that("getUserFromRawToken having a single matching server", { local_temp_config() service <- current_user_service() url <- buildHttpUrl(service) addTestServer("test", url = url) token <- generateToken() claimUrl <- url user <- getUserFromRawToken(claimUrl, token$token, token$private_key) expect_equal(user$username, "susan") }) test_that("getUserFromRawToken having multiple matching servers", { local_temp_config() service <- current_user_service() url <- buildHttpUrl(service) addTestServer("test", url = url) addTestServer("test2", url = url) token <- generateToken() claimUrl <- url user <- getUserFromRawToken(claimUrl, token$token, token$private_key) expect_equal(user$username, "susan") }) rsconnect/tests/testthat/test-account-find.R0000644000176200001440000000307014513230050020715 0ustar liggesuserstest_that("validates its arguments", { expect_snapshot(error = TRUE, { findAccount(1, NULL) findAccount(NULL, 1) }) }) test_that("error if no accounts", { local_temp_config() expect_snapshot(findAccount(), error = TRUE) }) test_that("error if no matching account", { local_temp_config() addTestServer() addTestAccount("albert") expect_snapshot(error = TRUE, { findAccount("unknown", NULL) findAccount(NULL, "unknown") findAccount("unknown", "unknown") }) }) test_that("error if ambiguous accounts in non-interactive environment", { local_temp_config() addTestServer("a") addTestServer("b") addTestAccount("a", "x") addTestAccount("a", "y") addTestAccount("b", "y") expect_snapshot(error = TRUE, { findAccount() findAccount("a", NULL) findAccount(NULL, "y") }) }) test_that("prompted to pick account in interactive environment", { local_temp_config() addTestServer("a") addTestServer("b") addTestAccount("a", "x") addTestAccount("a", "y") addTestAccount("b", "y") simulate_user_input(2) expect_snapshot(out <- findAccount()) expect_equal(out, list(name = "a", server = "y")) }) test_that("returns account + server when uniquely identified", { local_temp_config() addTestServer("a") addTestAccount("a", "x") expect_equal(findAccount(NULL, NULL), list(name = "a", server = "x")) expect_equal(findAccount("a", NULL), list(name = "a", server = "x")) expect_equal(findAccount(NULL, "x"), list(name = "a", server = "x")) expect_equal(findAccount("a", "x"), list(name = "a", server = "x")) }) rsconnect/tests/testthat/test-deploySite.R0000644000176200001440000000122514513230050020464 0ustar liggesuserstest_that("can extract quarto metadata", { skip_if_no_quarto() app <- local_temp_app(list(`_quarto.yaml` = c( "project:", " type: website", "", "website:", " title: 'website-quarto'" ))) site <- quartoSite(app) expect_equal(site$title, "website-quarto") expect_equal(site$output_dir, normalizePath(file.path(app, "_site"))) }) test_that("can extract rmarkdown metadata", { app <- local_temp_app(list( `_site.yml` = 'name: "my-website"' )) site <- rmarkdownSite(app) expect_equal(site$name, "my-website") expect_equal(site$title, NULL) expect_equal(site$output_dir, normalizePath(file.path(app, "_site"))) }) rsconnect/tests/testthat/test-http-rcurl.R0000644000176200001440000000041514513230050020447 0ustar liggesuserstest_that("basic HTTP methods work", { skip_if_not_installed("RCurl") withr::local_options(rsconnect.http = "rcurl", lifecycle_verbosity = "quiet") test_http_GET() test_http_POST_JSON() test_http_POST_empty() test_http_POST_file() test_http_headers() }) rsconnect/tests/testthat/renv-recommended/0000755000176200001440000000000014513230050020475 5ustar liggesusersrsconnect/tests/testthat/renv-recommended/dependences.R0000644000176200001440000000001614513230050023072 0ustar liggesuserslibrary(MASS) rsconnect/tests/testthat/renv-recommended/renv.lock0000644000176200001440000000202314513230050022316 0ustar liggesusers{ "R": { "Version": "4.2.1", "Repositories": [ { "Name": "CRAN", "URL": "https://cran.rstudio.com" }, { "Name": "BioC", "URL": "https://bioconductor.org/packages/3.16/bioc" } ] }, "Packages": { "MASS": { "Package": "MASS", "Version": "7.3-58.3", "Source": "Repository", "Repository": "CRAN", "Requirements": [ "R", "grDevices", "graphics", "methods", "stats", "utils" ], "Hash": "9586b552d57f5516fe4d25398c1bacd6" }, "renv": { "Package": "renv", "Version": "0.17.2", "Source": "Repository", "Repository": "CRAN", "RemoteType": "standard", "RemotePkgRef": "renv", "RemoteRef": "renv", "RemoteRepos": "https://cran.rstudio.com", "RemotePkgPlatform": "aarch64-apple-darwin20", "RemoteSha": "0.17.2", "Requirements": [ "utils" ], "Hash": "aaf3c7f769695266a2113db67a25148b" } } } rsconnect/tests/testthat/test-reticulate-rmds/0000755000176200001440000000000014536673141021345 5ustar liggesusersrsconnect/tests/testthat/test-reticulate-rmds/implicit.Rmd0000644000176200001440000000027114467166424023627 0ustar liggesusers--- title: An example R Markdown document that uses reticulate to run python content --- ```{python} from pprint import pprint xs = range(10) pprint([(x, x**2, x**3) for x in xs]) ``` rsconnect/tests/testthat/test-reticulate-rmds/index.Rmd0000644000176200001440000000033114467166424023121 0ustar liggesusers--- title: An example R Markdown document that uses reticulate to run python content --- ```{r} library(reticulate) ``` ```{python} from pprint import pprint xs = range(10) pprint([(x, x**2, x**3) for x in xs]) ``` rsconnect/tests/testthat/test-http.R0000644000176200001440000001154314513230050017326 0ustar liggesuserstest_that("non-libCurl methods are deprecated", { withr::local_options(rsconnect.http = "internal") expect_snapshot(. <- httpFunction()) }) # headers ----------------------------------------------------------------- test_that("authHeaders() picks correct method based on supplied fields", { url <- "https://example.com" expect_equal( authHeaders(list(), url, "GET"), list("X-Auth-Token" = "anonymous-access") ) expect_equal( authHeaders(list(apiKey = "123"), url, "GET"), list(Authorization = "Key 123") ) local_mocked_bindings( rfc2616Date = function() "Thu, 09 Mar 2023 14:29:00 GMT" ) # Dummy key created with # openssl::base64_encode(openssl::ed25519_keygen()) key <- "MC4CAQAwBQYDK2VwBCIEIDztfEgkp5CX7Jz0NCyrToaRW1L2tfmrWxNDgYyjO9bQ" expect_snapshot({ str(authHeaders(list(secret = "123"), url, "GET")) str(authHeaders(list(private_key = key), url, "GET")) }) }) test_that("can add user specific headers", { withr::local_options(rsconnect.http.headers = c(a = "1", b = "2")) service <- httpbin_service() json <- GET(service, list(), "get") expect_equal(json$headers$a, "1") expect_equal(json$headers$b, "2") }) test_that("can add user specific cookies", { skip_on_cran() # uses live httpbin since webfakes doesn't support cookie endpoints withr::local_options(rsconnect.http.cookies = c("a=1", "b=2")) service <- parseHttpUrl("http://httpbin.org/") skip_on_http_failure(json <- GET(service, list(), "cookies")) expect_equal(json$cookies, list(a = "1", b = "2")) withr::local_options(rsconnect.http.cookies = c("c=3", "d=4")) skip_on_http_failure(POST(service, list(), "post")) skip_on_http_failure(json <- GET(service, list(), "cookies")) expect_equal(json$cookies, list(a = "1", b = "2", c = "3", d = "4")) }) # handleResponse ---------------------------------------------------------- test_that("includes body in error if available", { service <- parseHttpUrl("http://example.com/error") service$method <- "GET" resp_text <- list( req = service, status = 400, contentType = "plain/text", content = "Failed" ) resp_json <- list( req = service, status = 400, contentType = "application/json", content = '{"error": "failed"}' ) resp_html <- list( req = service, status = 400, contentType = "text/html", content = "Failed" ) expect_snapshot(error = TRUE, { handleResponse(resp_text) handleResponse(resp_json) handleResponse(resp_html) }) }) test_that("but still gives got error if no body", { service <- parseHttpUrl("http://example.com/error") resp_text <- list( req = service, status = 400, contentType = "plain/text", content = "" ) resp_json <- list( req = service, status = 400, contentType = "application/json", content = "" ) resp_html <- list( req = service, status = 400, contentType = "text/html", content = "" ) expect_snapshot(error = TRUE, { handleResponse(resp_text) handleResponse(resp_json) handleResponse(resp_html) }) }) test_that("errors contain method", { service <- httpbin_service() expect_snapshot(error = TRUE, { GET(service, list(), path = "status/404") POST(service, list(), path = "status/403") }, transform = strip_port(service)) }) test_that("http error includes status in error class", { service <- httpbin_service() expect_error( GET(service, list(), path = "status/404"), class = "rsconnect_http_404" ) expect_error( GET(service, list(), path = "status/403"), class = "rsconnect_http_403" ) }) test_that("handles redirects", { service <- httpbin_service() out <- GET(service, list(), "absolute-redirect/3") expect_equal(out$url, paste0(buildHttpUrl(service), "get")) out <- GET(service, list(), "relative-redirect/3") expect_equal(out$url, paste0(buildHttpUrl(service), "get")) }) # parse/build ------------------------------------------------------------- test_that("URL parsing works", { p <- parseHttpUrl("http://yahoo.com") expect_equal(p$protocol, "http") expect_equal(p$host, "yahoo.com") expect_equal(p$port, "") expect_equal(p$path, "") #TODO: bug? Should default to /? p <- parseHttpUrl("https://rstudio.com/about") expect_equal(p$protocol, "https") expect_equal(p$host, "rstudio.com") expect_equal(p$port, "") expect_equal(p$path, "/about") p <- parseHttpUrl("http://127.0.0.1:3939/stuff/here/?who-knows") expect_equal(p$protocol, "http") expect_equal(p$host, "127.0.0.1") expect_equal(p$port, "3939") expect_equal(p$path, "/stuff/here/?who-knows") #TODO: bug? }) test_that("parse and build are symmetric", { round_trip <- function(x) { expect_equal(buildHttpUrl(parseHttpUrl(x)), x) } round_trip("http://google.com") round_trip("http://google.com:80") round_trip("https://google.com:80/a/b") round_trip("https://google.com:80/a/b/") }) rsconnect/tests/testthat/test-writeManifest.R0000644000176200001440000002417114513230050021171 0ustar liggesusersmakeManifest <- function(appDir, appPrimaryDoc = NULL, ...) { writeManifest(appDir, appPrimaryDoc = appPrimaryDoc, ..., quiet = TRUE) manifestFile <- file.path(appDir, "manifest.json") data <- readLines(manifestFile, warn = FALSE, encoding = "UTF-8") manifestJson <- jsonlite::fromJSON(data) unlink(manifestFile) manifestJson } test_that("renv.lock is included for renv projects", { skip_on_cran() withr::local_options(renv.verbose = FALSE) app_dir <- local_temp_app(list(app.R = "library(foreign); library(MASS)")) renv::snapshot(app_dir, prompt = FALSE) manifest <- makeManifest(app_dir) # note: we don't see an .Rprofile here because we only renv::snapshot and # do not fully create an renv project. expect_named(manifest$files, c("app.R", "renv.lock")) }) test_that("renv.lock is not included for non-renv projects", { skip_on_cran() withr::local_options(renv.verbose = FALSE) app_dir <- local_temp_app(list(app.R = "library(foreign); library(MASS)")) manifest <- makeManifest(app_dir) expect_named(manifest$files, c("app.R")) }) test_that("Rmd with reticulate as a dependency includes python in the manifest", { skip_on_cran() skip_if_not_installed("reticulate") python <- pythonPathOrSkip() appDir <- test_path("test-reticulate-rmds") manifest <- makeManifest(appDir, python = python) requirements_file <- file.path(appDir, manifest$python$package_manager$package_file) expect_equal(requirements_file, "test-reticulate-rmds/requirements.txt") defer(unlink(requirements_file)) expect_equal(manifest$metadata$appmode, "rmd-static") expect_equal(manifest$metadata$primary_rmd, "index.Rmd") expect_true(file.exists(requirements_file)) }) test_that("Rmd with reticulate as an inferred dependency includes reticulate and python in the manifest", { skip_on_cran() skip_if_not_installed("reticulate") python <- pythonPathOrSkip() appDir <- test_path("test-reticulate-rmds") manifest <- makeManifest(appDir, "implicit.Rmd", python = python) requirements_file <- file.path(appDir, manifest$python$package_manager$package_file) expect_equal(requirements_file, "test-reticulate-rmds/requirements.txt") defer(unlink(requirements_file)) expect_equal(manifest$metadata$appmode, "rmd-static") expect_equal(manifest$metadata$primary_rmd, "implicit.Rmd") expect_true(file.exists(requirements_file)) }) test_that("Rmd without a python block doesn't include reticulate or python in the manifest", { skip_on_cran() manifest <- makeManifest(test_path("test-rmds"), "simple.Rmd", python = NULL) expect_equal(manifest$metadata$appmode, "rmd-static") expect_equal(manifest$metadata$primary_rmd, "simple.Rmd") expect_null(manifest$python) }) test_that("Rmd without a python block doesn't include reticulate or python in the manifest even if python specified", { skip_on_cran() skip_if_not_installed("reticulate") python <- pythonPathOrSkip() manifest <- makeManifest("test-rmds", "simple.Rmd", python = python) expect_equal(manifest$metadata$appmode, "rmd-static") expect_equal(manifest$metadata$primary_rmd, "simple.Rmd") expect_equal(manifest$python, NULL) # Confirm that we have removed packrat entries from our file listing but # retain entries for other files. filenames <- names(manifest$files) expect_false(any(grepl("^packrat/", filenames, perl = TRUE)), filenames) expect_true(any(grepl("simple.Rmd", filenames, fixed = TRUE)), filenames) }) # Quarto Tests test_that("Quarto website includes quarto in the manifest", { skip_on_cran() skip_if_no_quarto() appDir <- test_path("quarto-website-r") manifest <- makeManifest(appDir, quarto = TRUE) expect_equal(manifest$metadata$appmode, "quarto-static") expect_equal(manifest$quarto$engines, "knitr") expect_equal(manifest$metadata$primary_rmd, "index.qmd") }) test_that("Quarto document includes quarto in the manifest", { skip_on_cran() skip_if_no_quarto() appDir <- test_path("quarto-doc-none") appPrimaryDoc <- "quarto-doc-none.qmd" manifest <- makeManifest(appDir, appPrimaryDoc, quarto = TRUE) expect_equal(manifest$metadata$appmode, "quarto-static") expect_equal(manifest$quarto$engines, "markdown") expect_equal(manifest$metadata$primary_rmd, "quarto-doc-none.qmd") }) test_that("Specifying quarto arg includes quarto in the manifest, even with no appPrimaryDoc specified (.qmd)", { skip_on_cran() skip_if_no_quarto() appDir <- test_path("quarto-doc-none") appPrimaryDoc <- NULL manifest <- makeManifest(appDir, appPrimaryDoc, quarto = TRUE) expect_equal(manifest$metadata$appmode, "quarto-static") expect_equal(manifest$quarto$engines, "markdown") expect_equal(manifest$metadata$primary_rmd, "quarto-doc-none.qmd") }) test_that("Specifying quarto arg includes quarto in the manifest, even with no appPrimaryDoc specified (.Rmd)", { skip_on_cran() skip_if_no_quarto() appDir <- test_path("shiny-rmds") appPrimaryDoc <- NULL manifest <- makeManifest(appDir, appPrimaryDoc, quarto = TRUE) expect_equal(manifest$metadata$appmode, "quarto-shiny") expect_equal(manifest$quarto$engines, "knitr") expect_equal(manifest$metadata$primary_rmd, "non-shiny-rmd.Rmd") }) test_that("specifying quarto arg with non-quarto app does not include quarto in the manifest", { skip_on_cran() skip_if_no_quarto() appDir <- test_path("shinyapp-singleR") appPrimaryDoc <- "single.R" manifest <- makeManifest(appDir, appPrimaryDoc, quarto = TRUE) expect_null(manifest$quarto) }) test_that("Quarto shiny project includes quarto in the manifest", { skip_on_cran() skip_if_no_quarto() appDir <- test_path("quarto-proj-r-shiny") manifest <- makeManifest(appDir, quarto = TRUE) expect_equal(manifest$metadata$appmode, "quarto-shiny") expect_equal(manifest$quarto$engines, "knitr") expect_equal(manifest$metadata$primary_rmd, "quarto-proj-r-shiny.qmd") }) test_that("Quarto R + Python website includes quarto and python in the manifest", { skip_on_cran() skip_if_not_installed("reticulate") skip_if_no_quarto() python <- pythonPathOrSkip() appDir <- test_path("quarto-website-r-py") manifest <- makeManifest(appDir, python = python, quarto = TRUE) expect_equal(manifest$metadata$appmode, "quarto-static") expect_equal(manifest$quarto$engines, "knitr") expect_equal(manifest$metadata$primary_rmd, "index.qmd") expect_true(all(c("quarto", "python") %in% names(manifest))) expect_true("reticulate" %in% names(manifest$packages)) }) test_that("Quarto Python-only website gets correct manifest data", { skip_on_cran() skip_if_not_installed("reticulate") skip_if_no_quarto() python <- pythonPathOrSkip() appDir <- test_path("quarto-website-py") manifest <- makeManifest(appDir, python = python, quarto = TRUE) expect_equal(manifest$metadata$appmode, "quarto-static") expect_equal(manifest$quarto$engines, "jupyter") expect_equal(manifest$metadata$primary_rmd, "index.qmd") # We expect Quarto and Python metadata, but no R packages. expect_true(all(c("quarto", "python") %in% names(manifest))) expect_null(manifest$packages) }) test_that("Deploying a Quarto project without Quarto is an error", { skip_on_cran() local_mocked_bindings(quarto_path = function() NULL) appDir <- test_path("quarto-website-r") expect_snapshot(makeManifest(appDir), error = TRUE) }) test_that("Deploying R Markdown content with Quarto gives a Quarto app mode", { skip_on_cran() skip_if_no_quarto() manifest <- makeManifest(test_path("test-rmds"), "simple.Rmd", quarto = TRUE) expect_equal(manifest$metadata$appmode, "quarto-static") expect_equal(manifest$quarto$engines, "knitr") expect_equal(manifest$metadata$primary_rmd, "simple.Rmd") }) test_that("Deploying static content with _quarto.yaml succeeds without quartoInfo", { skip_on_cran() manifest <- makeManifest(test_path("static-with-quarto-yaml")) expect_equal(manifest$metadata$appmode, "static") }) test_that("Sets environment.image in the manifest if one is provided", { skip_on_cran() withr::local_options(renv.verbose = TRUE) appDir <- test_path("shinyapp-simple") manifest <- makeManifest(appDir, image = "rstudio/content-base:latest") expect_equal(manifest$environment$image, "rstudio/content-base:latest") manifest <- makeManifest(appDir) expect_null(manifest$environment) }) test_that("Sets environment.environment_management in the manifest if envManagement is defined", { skip_on_cran() withr::local_options(renv.verbose = TRUE) appDir <- test_path("shinyapp-simple") # test shorthand arg manifest <- makeManifest(appDir, envManagement = FALSE, envManagementR = TRUE, envManagementPy = TRUE) expect_equal(manifest$environment$environment_management$r, FALSE) expect_equal(manifest$environment$environment_management$python, FALSE) # test R and Python args manifest <- makeManifest(appDir, envManagementR = TRUE) expect_equal(manifest$environment$environment_management$r, TRUE) expect_null(manifest$environment$environment_management$python) manifest <- makeManifest(appDir, envManagementPy = TRUE) expect_equal(manifest$environment$environment_management$python, TRUE) expect_null(manifest$environment$environment_management$r) # environment_management is not defined when envManagementR and envManagementPy are NULL manifest <- makeManifest(appDir, image = "rstudio/content-base:latest") expect_null(manifest$environment$environment_management) }) # appMode Inference tests test_that("content type (appMode) is inferred and can be overridden", { skip_on_cran() appDir <- local_temp_app(list( "app.R" = "", "index.html" = "", "plumber.R" = "", "report.Rmd" = "" )) files <- c("app.R", "index.html", "plumber.R", "report.Rmd") manifest <- makeManifest(appDir) expect_equal(manifest$metadata$appmode, "api") expect_named(manifest$files, files) manifest <- makeManifest(appDir, appMode = "shiny") expect_equal(manifest$metadata$appmode, "shiny") expect_named(manifest$files, files) manifest <- makeManifest(appDir, appMode = "rmd-static") expect_equal(manifest$metadata$appmode, "rmd-static") expect_named(manifest$files, files) manifest <- makeManifest(appDir, appMode = "static") expect_equal(manifest$metadata$appmode, "static") expect_named(manifest$files, files) }) rsconnect/tests/manual/0000755000176200001440000000000014513230050014660 5ustar liggesusersrsconnect/tests/manual/appMode.Rmd0000644000176200001440000000457714513230050016726 0ustar liggesusers# appMode overrides These test deploying one project to multiple targets having different types, confirming `deployApp()` support for its `appMode`. 1. Create a new project. ```r usethis::create_project("~/Desktop/appmode-lies") ``` 2. Populate that project with content. ```r writeLines(c( "shinyApp(ui = fluidPage('Shiny lying liars lie.'), server = function(input, output){})" ), "app.R") writeLines(c( "", "appmode lies", "", "

Static lying liars lie.

", "app.R,", "plumber.R,", "report.Rmd", "", "" ), "index.html") writeLines(c( "---", "title: Reporting lying liars lie.", "---", "", "Reporting lying liars lie." ), "report.Rmd") writeLines(c( "#* @get /lie", "function() { 'API lying liars lie.' }" ), "plumber.R") 3. Deploy this content in a variety of ways. ```r account <- "" server <- "" rsconnect::deployApp( appTitle = "lying: inference", appFiles = c("app.R", "index.html", "plumber.R", "report.Rmd"), account = account, server = server ) rsconnect::deployApp( appName = "appmode-lies-plumber", appTitle = "lying: plumber", appFiles = c("app.R", "index.html", "plumber.R", "report.Rmd"), appMode = "api", account = account, server = server ) rsconnect::deployApp( appName = "appmode-lies-shiny", appTitle = "lying: shiny", appFiles = c("app.R", "index.html", "plumber.R", "report.Rmd"), appMode = "shiny", account = account, server = server ) rsconnect::deployApp( appName = "appmode-lies-rmarkdown", appTitle = "lying: rmarkdown", appFiles = c("app.R", "index.html", "plumber.R", "report.Rmd"), appMode = "rmd-static", account = account, server = server ) rsconnect::deployApp( appName = "appmode-lies-static", appTitle = "lying: static", appFiles = c("app.R", "index.html", "plumber.R", "report.Rmd"), appMode = "static", account = account, server = server ) ``` rsconnect/tests/manual/dependencies.Rmd0000644000176200001440000000360614513230050017757 0ustar liggesusers# renv snapshots These test the full end-to-end publishing experience with renv. ## Archived package 1. Create a new project. ```r usethis::create_project("~/desktop/rsconnect-archived") ``` The remaining steps happen within this newly created project. 2. Install an old version of `rowr`. ```r devtools::install_version('rowr', '1.1.3') ``` 3. Run the following code to create an `app.R`: ```r writeLines(c( "library(rowr)", "shinyApp(ui = fluidPage('shiny rowr'), server = function(input, output){})" ), "app.R") ``` 4. Deploy to shinyapps.io: ```r rsconnect::deployApp(server = "shinyapps.io") ``` 5. Deploy to colorado (Posit employees, only): ```r rsconnect::deployApp(server = "colorado.posit.co") ``` Expected behaviour: - App successfully deploys to shinyapps. - App successfully deploys to colorado. ## CRAN, github, and BioC packages 1. Create a new project: ```r usethis::create_project("~/desktop/rsconnect-key-types") ```` The remaining steps happen within this newly created project. 2. Install CRAN, GitHub, and Bioconductor packages into your library: ```r pak::pak(c("rlang", "r-lib/waldo", "bioc::Biobase")) ``` 3. Run the following code to create an `app.R`: ```r writeLines(c( "library(rlang)", "library(waldo)", "library(Biobase)", "shinyApp(ui = fluidPage('shiny rowr'), server = function(input, output){})" ), "app.R") ``` 4. Deploy this app (analyzing your library): ```r rsconnect::deployApp() ``` 5. Create an renv snapshot: ```r renv::snapshot() ``` 6. Deploy this app (using the `renv.lock`): ```r rsconnect::deployApp() ``` Expected behaviour: - App deploys without error when analyzing your R library. - App deploys without error when analyzing the `renv.lock`. rsconnect/tests/manual/publishing-dialog.Rmd0000644000176200001440000000375214513230050020734 0ustar liggesusers# Connections ## Remove an account 1. Open Options | Publishing. 1. Select `colorado.posit.co` then click disconnect. Success: * No errors dialogs or error messages in console. * `nrow(rsconnect::accounts("colorado.posit.co"))` returns 0. ## Add a Connect account 1. Open Options | Publishing. 1. Click Connect, then "Posit Connect". 1. Paste in `https://colorado.posit.co/rsc` and click next. 1. Login connect in browser window, then click next. Success: * Dialog shows "Account Verified". * No errors dialogs or error messages in console. * `nrow(rsconnect::accounts("colorado.posit.co"))` returns 1. ### Add a shiny account 1. Open Options | Publishing. 1. Click Connect, then Shinyapps.io. 1. Follow the on-screen instuctions, then click Connect Account. Success: 1. No errors in console 1. `nrow(rsconnect::accounts("shinyapps.io"))` returns 1 or greater. # Apps 1. Create a new shiny app by clicking "New Project" | "New Directory" | "Shiny app" ### Deploy an app for the first time 1. Click the deploy button then select "colarado.posit.co" Success: 1. Deploy tab opens, and eventually deploy completes, and opens in connect. ### Re-deploy an app 1. Click the deploy button then click "Publish" Success: 1. Existing colorado deployment should appear in publish dialog 1. Deploy tab opens, and eventually deploy completes, and opens in connect. ### Re-deploy an with missing metadata 1. Run `unlink("rsconnect", recursive = TRUE)` 1. Click the deploy button then click "Publish". Success: 1. Dialog asks if you want to replace existing content. 1. After clicking "Replace" the deploy succeeds. ### Re-deploy to deleted app 1. On deployed app click "..." menu, then delete. 1. Click ok, wait 30s, then refresh the page to confirm the app is deleted. 1. Return to RStudio, then click the deploy drop down. Choose other destinations, then click deploy. Success: 1. Deploy tab opens, and eventually deploy completes, and opens in connect. Finish up by deleting the app you just deployed. rsconnect/tests/manual/deploySite.Rmd0000644000176200001440000000727214513230050017455 0ustar liggesusers# Sites ## Quarto ### Quarto using R (no additional dependencies) 1. Clone 1. Open the RStudio project `bundles/quarto-website-r`. 1. When opened, you may see a message indicating that the project library and lockfile are out of sync. If so, restore its environment: ```r renv::restore() ``` 1. Update rsconnect and renv within this project; as the lockfile probably references different versions than what you want to test: ```r install.packages(c("renv","rsconnect")) ``` 1. Deploy, then re-deploy. If this is the first time deploying from this directory, you will be prompted for a deployment target. The re-deploy should NEVER prompt. ```r # initial deploy: renders, then publishes. rsconnect::deploySite(render = "local") # re-deply: renders, then publishes. rsconnect::deploySite(render = "local") # re-deploy: NO RENDER, only publishes. rsconnect::deploySite(render = "none") ``` The content successfully deploys as static (HTML) that was rendered on the client. 1. Deploy having the content render on the server. If this is the first time deploying with this title, you will be prompted for a deployment target. ```r # initial deploy: publishes on the server. rsconnect::deploySite(siteName = "quarto-website-r-renders", render = "server") ``` The content successfully deploys as Quarto to be rendered by Connect. ### Quarto using R (having additional dependencies) 1. Clone 1. Open the RStudio project `bundles/quarto-website-r-deps`. 1. When opened, you may see a message indicating that the project library and lockfile are out of sync. If so, restore its environment: ```r renv::restore() ``` 1. Update rsconnect and renv within this project; as the lockfile probably references different versions than what you want to test: ```r install.packages(c("renv","rsconnect")) ``` 1. Deploy this content. Rendering happens on the server. If this is the first time deploying with this title, you will be prompted for a deployment target. ```r rsconnect::deploySite(render = "server") ``` The content successfully deploys as Quarto to be rendered by Connect. ## RMarkdown 1. Clone 1. Open the RStudio project `bundles/rmd-site`. 1. When opened, you may see a message indicating that the project library and lockfile are out of sync. If so, restore its environment: ```r renv::restore() ``` 1. Update rsconnect and renv within this project; as the lockfile probably references different versions than what you want to test: ```r install.packages(c("renv","rsconnect")) ``` 1. Deploy, then re-deploy. If this is the first time deploying from this directory, you will be prompted for a deployment target. The re-deploy should NEVER prompt. ```r # initial deploy: renders, then publishes. rsconnect::deploySite(render = "local") # re-deply: renders, then publishes. rsconnect::deploySite(render = "local") # re-deploy: NO RENDER, only publishes. rsconnect::deploySite(render = "none") ``` The content successfully deploys as static (HTML) that was rendered on the client. 1. Deploy having the content render on the server. If this is the first time deploying with this title, you will be prompted for a deployment target. ```r # initial deploy: publishes on the server. rsconnect::deploySite(siteName = "rmd-site-renders", render = "server") ``` The content successfully deploys as R Markdown to be rendered by Connect. rsconnect/tests/testthat.R0000644000176200001440000000007614513230050015371 0ustar liggesuserslibrary(testthat) library(rsconnect) test_check("rsconnect") rsconnect/vignettes/0000755000176200001440000000000014536677712014302 5ustar liggesusersrsconnect/vignettes/custom-http.Rmd0000644000176200001440000000611714513230050017211 0ustar liggesusers--- title: "Customising HTTP requests" output: rmarkdown::html_vignette vignette: > %\VignetteIndexEntry{Customising HTTP requests} %\VignetteEngine{knitr::rmarkdown} %\VignetteEncoding{UTF-8} --- ```{r, include = FALSE} knitr::opts_chunk$set( collapse = TRUE, comment = "#>" ) ``` ```{r setup} library(rsconnect) ``` Depending on the configuration of your environment, you may need to cutomize the way that rsconnect sends http requests. Typically, this is required for some special ## `.rsconnect_profile` When deploying content from the RStudio IDE, the rsconnect package's deployment methods are executed in a vanilla R session that doesn't execute startup scripts. This can make it challenging to ensure options are set properly prior to push-button deployment, so the rsconnect package has a parallel set of "startup" scripts it runs prior to deploying. The following are run in order, if they exist, prior to deployment: * `$R_HOME/etc/rsconnect.site`: Like `Rprofile.site` for site-wide pre-flight and options. This is typically used by system administrators. * `~/.rsconnect_profile`, like `.Rprofile`; this will affect all apps that you deploy. * `.rsconnect_profile`, like `.Rprofile`; this will affect the current app. Unlike `.Rprofile`, if `~/.rsconnect_profile`, is present, it will also be run. ## HTTP Proxy Environment Variable The most straightforward way to specify a proxy is to set the `HTTPS_PROXY` environment variable. For example, you could add the following code to your `.rsconnect_profile`: ```R Sys.setenv(https_proxy = "https://proxy.example.com") ``` Proxy settings can include a host-name, port, and username/password if necessary. The following are all valid values for the `http_proxy` environment variable: * `http://proxy.example.com/` * `http://proxy.example.com:1080/` * `http://username:password@proxy.example.com:1080/` ## Custom headers and cookies If you need to supply additional headers or cookies, you can use the options `rsconnect.http.headers` and `rsconnect.http.cookies` respectively. `rsconnect.http.headers` needs a named vector of header names and values: ```{r} options( rsconnect.http.headers = c( "CustomHeader1" = "CustomValue", "CustomHeader2" = "CustomValue2" ) ) ``` While `rsconnect.http.cookies` expects cookies formatted the same way that a webserver expects them: ```{r} options( rsconnect.http.headers = c("cookie1=value1", "cookie2=value2") ) ``` And you can supply other cookie parameters if needed: ```{r} options( rsconnect.http.headers = "cookie1=value1; Expires=Thu, 31 Oct 2021 07:28:00 GMT; Secure" ) ``` The custom headers are set first, so will be overridden by the headers that rsconnect needs to correctly operate. Similarly, cookies will be set prior to the first request, and will be overriden by anything returned by the server. ## Other custom options Finally, you can supply any additional options supported by `curl::curl_options()` with `rsconnect.libcurl.options`, e.g. ```R options(rsconnect.libcurl.options = list(proxy = "http://proxy.example.com") ``` Run `curl::curl_options()` to see a list of options. rsconnect/R/0000755000176200001440000000000014536677712012473 5ustar liggesusersrsconnect/R/configMigrate.R0000644000176200001440000000725614513230050015355 0ustar liggesusers# account/server ---------------------------------------------------------- migrateConfig <- function(configDir) { # For historical reasons too painful to enumerate here, there are not one # but *two* old locations for configuration files to check. If we find # one, we need to move its contents to the new folder. oldConfigDir <- oldApplicationConfigDir("rsconnect") if (!dirExists(oldConfigDir)) { oldConfigDir <- oldApplicationConfigDir("connect") } # We have no configuration directory but we do have an old one; migrate it. if (dirExists(oldConfigDir)) { # Create the parent folder if necessary dirCreate(dirname(configDir)) # Migrate the old directory to the new one file.rename(oldConfigDir, configDir) } } #' Old Application Config Directory #' #' Returns the old application configuration directory used by rsconnect #' 0.8.24 and prior. These versions wrote configuration data to XDG compliant #' locations, but CRAN policy has since further restricted the disk locations #' that are permitted. See: #' #' https://cran.r-project.org/web/packages/policies.html #' #' @param appName The application's name (connect or rsconnect) #' #' @return The old application configuration directory. #' #' @keywords internal oldApplicationConfigDir <- function(appName) { # get the home directory from the operating system (in case # the user has redefined the meaning of ~) but fault back # to ~ if there is no HOME variable defined homeDir <- Sys.getenv("HOME", unset = "~") # check for R specific config dir configDir <- Sys.getenv("R_USER_CONFIG_DIR") if (nzchar(configDir)) { # R specific config dir, append app name only configDir <- file.path(configDir, appName) } else { # no R specific config dir; determine application config dir (platform specific) sysName <- Sys.info()[["sysname"]] if (identical(sysName, "Windows")) configDir <- Sys.getenv("APPDATA") else if (identical(sysName, "Darwin")) configDir <- file.path(homeDir, "Library/Application Support") else configDir <- Sys.getenv("XDG_CONFIG_HOME", file.path(homeDir, ".config")) # append the application name configDir <- file.path(configDir, "R", appName) } # normalize path normalizePath(configDir) } # deployments ------------------------------------------------------------- migrateDeploymentsConfig <- function(appPath) { # calculate migration dir--all shinyapps deployment records go into the root # folder since it wasn't possible to deploy individual docs using the # shinyapps package migrateRoot <- if (isDocumentPath(appPath)) dirname(appPath) else appPath # migrate shinyapps package created records if necessary shinyappsDir <- file.path(migrateRoot, "shinyapps") if (!file.exists(shinyappsDir)) { return() } migrateDir <- file.path(migrateRoot, "rsconnect") for (shinyappsFile in list.files(shinyappsDir, glob2rx("*.dcf"), recursive = TRUE)) { # read deployment record shinyappsDCF <- file.path(shinyappsDir, shinyappsFile) deployment <- as.data.frame(read.dcf(shinyappsDCF), stringsAsFactors = FALSE) deployment$server <- "shinyapps.io" # write the new record rsconnectDCF <- file.path(migrateDir, "shinyapps.io", shinyappsFile) dirCreate(dirname(rsconnectDCF)) write.dcf(deployment, rsconnectDCF) # remove old DCF file.remove(shinyappsDCF) } # remove shinyapps dir if it's completely empty remainingFiles <- list.files(shinyappsDir, recursive = TRUE, all.files = TRUE) if (length(remainingFiles) == 0) unlink(shinyappsDir, recursive = TRUE) } rsconnect/R/cookies.R0000644000176200001440000001531314513230050014224 0ustar liggesusers # Environment in which cookies will be stored. Cookies are expected to survive # the duration of the R session, but are not persisted outside of the R # session. .cookieStore <- new.env(parent = emptyenv()) # Returns the cookies associated with a particular host/port # If no hostname is specified, returns all cookies getCookies <- function(hostname, port = NULL) { if (missing(hostname)) { hosts <- ls(envir = .cookieStore) cookies <- lapply(hosts, function(h) { getCookiesHostname(h) }) do.call("rbind", cookies) } else { host <- getCookieHost(list(host = hostname, port = port)) getCookiesHostname(host) } } # Get cookies for a particular hostname(:port) getCookiesHostname <- function(host) { if (!exists(host, .cookieStore)) { NULL } else { cookies <- get(host, envir = .cookieStore) cookies$host <- host cookies } } # Clears the cookies associated with a particular hostname/port combination. # If hostname and port are omitted, clears all the cookies clearCookies <- function(hostname, port = NULL) { if (missing(hostname)) { rm(list = ls(envir = .cookieStore), envir = .cookieStore) } else { host <- getCookieHost(list(host = hostname, port = port)) rm(list = host, envir = .cookieStore) } } # Parse out the raw headers provided and insert them into the cookieStore # NOTE: Domain attribute is currently ignored # @param requestURL the parsed URL as returned from `parseHttpUrl` # @param cookieHeaders a list of characters strings representing the raw # Set-Cookie header value with the "Set-Cookie: " prefix omitted storeCookies <- function(requestURL, cookieHeaders) { cookies <- lapply(cookieHeaders, parseCookie, requestPath = requestURL$path) # Filter out invalid cookies (which would return as NULL) cookies <- Filter(Negate(is.null), cookies) host <- getCookieHost(requestURL) hostCookies <- NULL if (!exists(host, .cookieStore)) { # Create a new data frame for this host hostCookies <- data.frame( path = character(0), name = character(0), value = character(0), secure = logical(0), expires = character(0), stringsAsFactors = FALSE ) } else { hostCookies <- get(host, envir = .cookieStore) } lapply(cookies, function(co) { # Remove any duplicates # RFC says duplicate cookies are ones that have the same domain, name, and path hostCookies <<- hostCookies[!(co$name == hostCookies$name & co$path == hostCookies$path), ] # append this new cookie on hostCookies <<- rbind(as.data.frame(co, stringsAsFactors = FALSE), hostCookies) }) # Save this host's cookies into the cookies store. assign(host, hostCookies, envir = .cookieStore) } # Parse out an individual cookie # @param cookieHeader the raw text contents of the Set-Cookie header with the # header name omitted. # @param requestPath the parsed URL as returned from `parseHttpUrl` parseCookie <- function(cookieHeader, requestPath = NULL) { keyval <- regmatches(cookieHeader, regexec( # https://curl.haxx.se/rfc/cookie_spec.html # "characters excluding semi-colon, comma and white space" # white space is not excluded from values so we can capture `expires` "^([^;=, ]+)\\s*=\\s*([^;,]*)(;|$)", cookieHeader, ignore.case = TRUE))[[1]] if (length(keyval) == 0) { # Invalid cookie format. warning("Unable to parse set-cookie header: ", cookieHeader) return(NULL) } key <- keyval[2] val <- keyval[3] # Path path <- regmatches(cookieHeader, regexec( "^.*\\sPath\\s*=\\s*([^;]+)(;|$).*$", cookieHeader, ignore.case = TRUE))[[1]] if (length(path) == 0) { path <- "/" } else { path <- path[2] } # Per the RFC, the cookie's path must be a prefix of the request URL if (!is.null(requestPath) && !hasPrefix(requestPath, path)) { warning("Invalid path set for cookie on request for '", requestPath, "': ", cookieHeader) return(NULL) } # MaxAge maxage <- regmatches(cookieHeader, regexec( "^.*\\sMax-Age\\s*=\\s*(-?\\d+)(;|$).*$", cookieHeader, ignore.case = TRUE))[[1]] # If no maxage specified, then this is a session cookie, which means that # (since our cookies only survive for a single session anyways...) we should # keep this cookie around as long as we're alive. expires <- Sys.time() + 10^10 if (length(maxage) > 0) { # Compute time maxage seconds from now expires <- Sys.time() + as.numeric(maxage[2]) } # Secure secure <- grepl(";\\s+Secure(;|$)", cookieHeader, ignore.case = TRUE) list(name = key, value = val, expires = expires, path = path, secure = secure) } # Appends a cookie header from the .cookieStore to the existing set of headers # @param requestURL the parsed URL as returned from `parseHttpUrl` # @param headers a named character vector containing the set of headers to be extended appendCookieHeaders <- function(requestURL, headers) { host <- getCookieHost(requestURL) if (!exists(host, .cookieStore)) { # Nothing to do return(headers) } cookies <- get(host, envir = .cookieStore) # If any cookies are expired, remove them from the cookie store if (any(cookies$expires < as.integer(Sys.time()))) { cookies <- cookies[cookies$expires >= as.integer(Sys.time()), ] # Update the store, removing the expired cookies assign(host, cookies, envir = .cookieStore) } if (nrow(cookies) == 0) { # Short-circuit, return unmodified headers. return(headers) } # Filter to only include cookies that match the path prefix cookies <- cookies[substring(requestURL$path, 1, nchar(cookies$path)) == cookies$path, ] # If insecure channel, filter out secure cookies if (tolower(requestURL$protocol) != "https") { cookies <- cookies[!cookies$secure, ] } # TODO: Technically per the RFC we're supposed to order these cookies by which # paths most specifically match the request. cookieHeader <- paste( apply(cookies, 1, function(x) paste0(x["name"], "=", x["value"])), collapse = "; " ) c(headers, cookie = cookieHeader) } getCookieHost <- function(requestURL) { host <- requestURL$host port <- requestURL$port if (!is.null(port) && nchar(port) > 0) { port <- sub("^:", "", port) # By my reading of the RFC, we technically only need to include the port # # in the index if the host is an IP address. But here we're including the # port number as a part of the host whether using a domain name or IP. # Erring on the side of not sending the cookies to the wrong services host <- paste(host, port, sep = ":") } host } showCookies <- function(urlstr) { url <- parseHttpUrl(urlstr) cat("Cookies:", "\n") host <- getCookieHost(url) if (exists(host, .cookieStore)) { print(get(host, envir = .cookieStore)) } else { print("None") } } rsconnect/R/accounts.R0000644000176200001440000002531214536333553014430 0ustar liggesusers#' Account Management Functions #' #' Functions to enumerate and remove accounts on the local system. Prior to #' deploying applications you need to register your account on the local system. #' #' You register an account using the [setAccountInfo()] function (for #' ShinyApps) or [connectUser()] function (for other servers). You can #' subsequently remove the account using the `removeAccount` function. #' #' The `accounts` and `accountInfo` functions are provided for viewing #' previously registered accounts. #' #' @param name Name of account #' @param server Name of the server on which the account is registered #' (optional; see [servers()]) #' #' @return `accounts` returns a data frame with the names of all accounts #' registered on the system and the servers on which they reside. #' `accountInfo` returns a list with account details. #' #' @rdname accounts #' @export accounts <- function(server = NULL) { configPaths <- accountConfigFiles(server) names <- file_path_sans_ext(basename(configPaths)) servers <- basename(dirname(configPaths)) servers[servers == "."] <- "shinyapps.io" data.frame(name = names, server = servers, stringsAsFactors = FALSE) } #' Register account on Posit Connect # #' @description #' `connectUser()` and `connectApiUser()` connect your Posit Connect account to #' the rsconnect package so that it can deploy and manage applications on #' your behalf. #' #' `connectUser()` is the easiest place to start because it allows you to #' authenticate in-browser to your Posit Connect server. `connectApiUser()` is #' appropriate for non-interactive settings; you'll need to copy-and-paste the #' API key from your account settings. #' #' @param account A name for the account to connect. #' @param server The server to connect to. #' @param launch.browser If true, the system's default web browser will be #' launched automatically after the app is started. Defaults to `TRUE` in #' interactive sessions only. If a function is passed, it will be called #' after the app is started, with the app URL as a parameter. #' @param apiKey The API key used to authenticate the user #' @param quiet Whether or not to show messages and prompts while connecting the #' account. #' @family Account functions #' @export connectApiUser <- function(account = NULL, server = NULL, apiKey, quiet = FALSE) { server <- findServer(server) user <- getAuthedUser(server, apiKey = apiKey) registerAccount( serverName = server, accountName = account %||% user$username, accountId = user$id, apiKey = apiKey ) if (!quiet) { accountLabel <- accountLabel(user$username, server) cli::cli_alert_success("Registered account for {accountLabel}") } invisible() } #' @rdname connectApiUser #' @export connectUser <- function(account = NULL, server = NULL, quiet = FALSE, launch.browser = getOption("rsconnect.launch.browser", interactive())) { server <- findServer(server) resp <- getAuthTokenAndUser(server, launch.browser) registerAccount( serverName = server, accountName = account %||% resp$user$username, accountId = resp$user$id, token = resp$token$token, private_key = resp$token$private_key ) if (!quiet) { accountLabel <- accountLabel(resp$user$username, server) cli::cli_alert_success("Registered account for {accountLabel}") } invisible() } getAuthTokenAndUser <- function(server, launch.browser = TRUE) { token <- getAuthToken(server) if (isTRUE(launch.browser)) utils::browseURL(token$claim_url) else if (is.function(launch.browser)) launch.browser(token$claim_url) if (isFALSE(launch.browser)) { cli::cli_alert_warning("Open {.url {token$claim_url}} to authenticate") } else { cli::cli_alert_info("A browser window should open to complete authentication") cli::cli_alert_warning("If it doesn't open, please go to {.url {token$claim_url}}") } user <- waitForAuthedUser( server, token = token$token, private_key = token$private_key ) list( token = token, user = user ) } # Used by the IDE getAuthToken <- function(server, userId = 0) { token <- generateToken() # Send public key to server, and generate URL where the token can be claimed account <- list(server = server) client <- clientForAccount(account) response <- client$addToken(list( token = token$token, public_key = token$public_key, user_id = 0L )) list( token = token$token, private_key = secret(token$private_key), claim_url = response$token_claim_url ) } # generateToken generates a token for signing requests sent to the Posit # Connect service. The token's ID and public key are sent to the server, and # the private key is saved locally. generateToken <- function() { key <- openssl::rsa_keygen(2048L) priv.der <- openssl::write_der(key) pub.der <- openssl::write_der(key$pubkey) tokenId <- paste(c("T", openssl::rand_bytes(16)), collapse = "") list( token = tokenId, public_key = openssl::base64_encode(pub.der), private_key = openssl::base64_encode(priv.der) ) } waitForAuthedUser <- function(server, token = NULL, private_key = NULL, apiKey = NULL) { # keep trying to authenticate until we're successful; server returns # 500 "Token is unclaimed error" while waiting for interactive auth to complete cli::cli_progress_bar(format = "{cli::pb_spin} Waiting for authentication...") repeat { for (i in 1:10) { Sys.sleep(0.1) cli::cli_progress_update() } user <- tryCatch( getAuthedUser( server, token = token, private_key = private_key, apiKey = apiKey ), rsconnect_http_500 = function(err) NULL ) if (!is.null(user)) { cli::cli_progress_done() break } } user } getAuthedUser <- function(server, token = NULL, private_key = NULL, apiKey = NULL) { if (!xor(is.null(token) && is.null(private_key), is.null(apiKey))) { cli::cli_abort("Must supply either {.arg token} + {private_key} or {.arg apiKey}") } account <- list( server = server, apiKey = apiKey, token = token, private_key = private_key ) client <- clientForAccount(account) client$currentUser() } #' Register account on shinyapps.io or posit.cloud #' #' Configure a ShinyApps or Posit Cloud account for publishing from this system. #' #' @param name Name of account to save or remove #' @param token User token for the account #' @param secret User secret for the account #' @param server Server to associate account with. #' #' @examples #' \dontrun{ #' #' # register an account #' setAccountInfo("user", "token", "secret") #' #' # remove the same account #' removeAccount("user") #' } #' #' @family Account functions #' @export setAccountInfo <- function(name, token, secret, server = "shinyapps.io") { check_string(name) check_string(token) check_string(secret) check_string(server) accountId <- findShinyAppsAccountId(name, token, secret, server) registerAccount( serverName = server, accountName = name, accountId = accountId, token = token, secret = secret ) invisible() } # A user can have multiple accounts, so iterate over all accounts looking # for one with the specified name findShinyAppsAccountId <- function(name, token, secret, server, error_call = caller_env()) { if (secret == "") { cli::cli_abort( c( "You've copied and pasted the wrong thing.", i = "Either click 'Show secret' or 'Copy to clipboard'." ), call = error_call ) } account <- list(token = token, secret = secret, server = server) client <- clientForAccount(account) userId <- client$currentUser()$id accountId <- NULL accounts <- client$accountsForUser(userId) for (account in accounts) { if (identical(account$name, name)) { return(account$id) } } cli::cli_abort("Unable to determine {.arg accountId} for account {.str {name}}") } #' @rdname accounts #' @family Account functions #' @export accountInfo <- function(name = NULL, server = NULL) { findAccountInfo(name, server) } # Discovers then loads details about an account from disk. # Internal equivalent to accountInfo that lets callers provide error context. findAccountInfo <- function(name = NULL, server = NULL, error_call = caller_env()) { fullAccount <- findAccount(name, server, error_call = error_call) configFile <- accountConfigFile(fullAccount$name, fullAccount$server) accountDcf <- read.dcf(configFile, all = TRUE) info <- as.list(accountDcf) # Account records previously had username, now have name. Internal callers expect "name", but # external callers may expect "username". (#1024) info$name <- info$name %||% info$username info$username <- info$name # remove all whitespace from private key if (!is.null(info$private_key)) { info$private_key <- gsub("[[:space:]]", "", info$private_key) } # Hide credentials info$private_key <- secret(info$private_key) info$secret <- secret(info$secret) info$apiKey <- secret(info$apiKey) info } hasAccount <- function(name, server) { file.exists(accountConfigFile(name, server)) } #' @rdname accounts #' @export removeAccount <- function(name = NULL, server = NULL) { fullAccount <- findAccount(name, server) configFile <- accountConfigFile(fullAccount$name, fullAccount$server) file.remove(configFile) invisible(NULL) } registerAccount <- function(serverName, accountName, accountId, token = NULL, secret = NULL, private_key = NULL, apiKey = NULL) { check_string(serverName) check_string(accountName) if (!is.null(secret)) { secret <- as.character(secret) } fields <- list( name = accountName, server = serverName, accountId = accountId, token = token, secret = secret, private_key = private_key, apiKey = apiKey ) path <- accountConfigFile(accountName, serverName) dir.create(dirname(path), recursive = TRUE, showWarnings = FALSE) write.dcf(compact(fields), path, width = 100) # set restrictive permissions on it if possible if (identical(.Platform$OS.type, "unix")) Sys.chmod(path, mode = "0600") path } accountLabel <- function(account, server) { # Note: The incoming "account" may correspond to our local account name, which does not always # match the remote username. paste0("server: ", server, " / username: ", account) } rsconnect/R/http.R0000644000176200001440000004102714513230050013550 0ustar liggesusers #' @param authInfo Typically an object created by `accountInfo()` augmented #' with the `certificate` from the corresponding `serverInfo()`. #' #' There are three different fields used for auth: #' * `secret`: set in `setAccountInfo()` #' * `private_key`: set in `connectUser()` #' * `apiKey`: set in `connectApiUser()` #' #' @noRd httpRequest <- function(service, authInfo, method, path, query, headers = list(), timeout = NULL, error_call = caller_env()) { storeCookies(service, httpCookies()) path <- buildPath(service$path, path, query) headers <- c(headers, authHeaders(authInfo, method, path), httpHeaders()) certificate <- requestCertificate(service$protocol, authInfo$certificate) # perform request http <- httpFunction() httpResponse <- http( protocol = service$protocol, host = service$host, port = service$port, method = method, path = path, headers = headers, timeout = timeout, certificate = certificate ) while (isRedirect(httpResponse$status)) { service <- redirectService(service, httpResponse$location) httpResponse <- http( protocol = service$protocol, host = service$host, port = service$port, method = method, path = service$path, headers = headers, timeout = timeout, certificate = certificate ) } handleResponse(httpResponse, error_call = error_call) } httpRequestWithBody <- function(service, authInfo, method, path, query = NULL, contentType = NULL, file = NULL, content = NULL, headers = list(), error_call = caller_env()) { if ((is.null(file) && is.null(content))) { stop("You must specify either the file or content parameter.") } if ((!is.null(file) && !is.null(content))) { stop("You must specify either the file or content parameter but not both.") } # if we have content then write it to a temp file before posting if (!is.null(content)) { file <- tempfile() writeChar(content, file, eos = NULL, useBytes = TRUE) } storeCookies(service, httpCookies()) path <- buildPath(service$path, path, query) headers <- c(headers, httpHeaders()) authed_headers <- c(headers, authHeaders(authInfo, method, path, file)) certificate <- requestCertificate(service$protocol, authInfo$certificate) # perform request http <- httpFunction() httpResponse <- http( protocol = service$protocol, host = service$host, port = service$port, method = method, path = path, headers = authed_headers, contentType = contentType, contentFile = file, certificate = certificate ) while (isRedirect(httpResponse$status)) { # This is a simplification of the spec, since we should preserve # the method for 307 and 308, but that's unlikely to arise for our apps # https://www.rfc-editor.org/rfc/rfc9110.html#name-redirection-3xx service <- redirectService(service, httpResponse$location) authed_headers <- c(headers, authHeaders(authInfo, "GET", service$path)) httpResponse <- http( protocol = service$protocol, host = service$host, port = service$port, method = "GET", path = service$path, headers = authed_headers, certificate = certificate ) httpResponse } handleResponse(httpResponse, error_call = error_call) } isRedirect <- function(status) { status %in% c(301, 302, 307, 308) } redirectService <- function(service, location) { if (grepl("^/", location)) { service$path <- location service } else { parseHttpUrl(location) } } handleResponse <- function(response, error_call = caller_env()) { url <- buildHttpUrl(response$req) reportError <- function(msg) { cli::cli_abort( c("<{url}> failed with HTTP status {response$status}", msg), class = c(paste0("rsconnect_http_", response$status), "rsconnect_http"), call = error_call ) } if (isContentType(response$contentType, "application/json")) { # parse json responses if (nzchar(response$content)) { json <- jsonlite::fromJSON(response$content, simplifyVector = FALSE) } else { json <- list() } if (response$status %in% 200:399) { out <- json } else if (!is.null(json$error)) { reportError(unlist(json$error)) } else { reportError(paste("Unexpected json response:", response$content)) } } else if (isContentType(response$contentType, "text/html")) { # extract body of html responses body <- regexExtract(".*?(.*?).*", response$content) if (response$status >= 200 && response$status < 400) { # Good response, return the body if we have one, or the content if not if (!is.null(body)) { out <- body } else { out <- response$content } } else { # Error response if (!is.null(body)) { reportError(body) } else { reportError(response$content) } } } else { # otherwise just dump the whole thing if (response$status %in% 200:399) { out <- response$content } else { reportError(response$content) } } attr(out, "httpContentType") <- response$contentType attr(out, "httpUrl") <- url out } # Wrappers for HTTP methods ----------------------------------------------- GET <- function(service, authInfo, path, query = NULL, headers = list(), timeout = NULL) { httpRequest(service, authInfo, "GET", path, query, headers, timeout) } DELETE <- function(service, authInfo, path, query = NULL, headers = list()) { httpRequest(service, authInfo, "DELETE", path, query, headers) } POST <- function(service, authInfo, path, query = NULL, contentType = NULL, file = NULL, content = NULL, headers = list()) { # check if the request needs a body if ((is.null(file) && is.null(content))) { # no file or content, don't include a body with the request httpRequest(service, authInfo, "POST", path, query, headers) } else { # include the request's data in the body httpRequestWithBody( service = service, authInfo = authInfo, method = "POST", path = path, query = query, contentType = contentType, file = file, content = content, headers = headers ) } } POST_JSON <- function(service, authInfo, path, json, query = NULL, headers = list()) { POST( service = service, authInfo = authInfo, path = path, query = query, contentType = "application/json", content = toJSON(json), headers = headers ) } PUT <- function(service, authInfo, path, query = NULL, contentType = NULL, file = NULL, content = NULL, headers = list()) { httpRequestWithBody( service = service, authInfo = authInfo, method = "PUT", path = path, query = query, contentType = contentType, file = file, content = content, headers = headers ) } PUT_JSON <- function(service, authInfo, path, json, query = NULL, headers = list()) { PUT( service = service, authInfo = authInfo, path = path, query = query, contentType = "application/json", content = toJSON(json), headers = headers ) } PATCH <- function(service, authInfo, path, query = NULL, contentType = NULL, file = NULL, content = NULL, headers = list()) { httpRequestWithBody( service = service, authInfo = authInfo, method = "PATCH", path = path, query = query, contentType = contentType, file = file, content = content, headers = headers ) } PATCH_JSON <- function(service, authInfo, path, json, query = NULL, headers = list()) { PATCH( service = service, authInfo = authInfo, path = path, query = query, contentType = "application/json", content = toJSON(json), headers = headers ) } # User options ------------------------------------------------------------ httpVerbose <- function() { getOption("rsconnect.http.verbose", FALSE) } httpTraceJson <- function() { getOption("rsconnect.http.trace.json", FALSE) } httpTrace <- function(method, path, time) { if (getOption("rsconnect.http.trace", FALSE)) { cat(method, " ", path, " ", as.integer(time[["elapsed"]] * 1000), "ms\n", sep = "" ) } } httpCookies <- function() { getOption("rsconnect.http.cookies", character()) } httpHeaders <- function() { getOption("rsconnect.http.headers", character()) } httpFunction <- function() { httpType <- getOption("rsconnect.http", "libcurl") if (is_string(httpType) && httpType != "libcurl") { lifecycle::deprecate_warn( "1.0.0", I("The `rsconnect.http` option"), details = c( "It should no longer be necessary to set this option", "If the default http handler doesn't work for you, please file an issue at " ) ) } if (identical("libcurl", httpType)) { httpLibCurl } else if (identical("rcurl", httpType)) { httpRCurl } else if (identical("curl", httpType)) { httpCurl } else if (identical("internal", httpType)) { httpInternal } else if (is.function(httpType)) { httpType } else { stop(paste( "Invalid http option specified:", httpType, ". Valid values are libcurl, rcurl, curl, and internal" )) } } # URL manipulation -------------------------------------------------------- parseHttpUrl <- function(urlText) { matches <- regexec("(http|https)://([^:/#?]+)(?::(\\d+))?(.*)", urlText) components <- regmatches(urlText, matches)[[1]] if (length(components) == 0) { stop("Invalid url: ", urlText) } url <- list() url$protocol <- components[[2]] url$host <- components[[3]] url$port <- components[[4]] url$path <- components[[5]] url } buildHttpUrl <- function(x) { colon <- if (!is.null(x$port) && nzchar(x$port)) ":" paste0(x$protocol, "://", x$host, colon, x$port, x$path) } urlDecode <- function(x) { curl::curl_unescape(x) } urlEncode <- function(x) { if (inherits(x, "AsIs")) { return(x) } RCurl::curlEscape(x) } buildPath <- function(apiPath, path, query = NULL) { # prepend the service path url <- paste(apiPath, path, sep = "") # append the query if (!is.null(query)) { # URL encode query args query <- utils::URLencode(query) url <- paste(url, "?", query, sep = "") } url } queryString <- function(elements) { stopifnot(is.list(elements)) elements <- elements[!sapply(elements, is.null)] names <- curl::curl_escape(names(elements)) values <- vapply(elements, urlEncode, character(1)) if (length(elements) > 0) { result <- paste0(names, "=", values, collapse = "&") } else { result <- "" } return(result) } # Auth -------------------------------------------------------------------- requestCertificate <- function(protocol, certificate = NULL) { if (identical(protocol, "https")) { createCertificateFile(certificate) } else { NULL } } authHeaders <- function(authInfo, method, path, file = NULL) { if (!is.null(authInfo$secret) || !is.null(authInfo$private_key)) { signatureHeaders(authInfo, method, path, file) } else if (!is.null(authInfo$apiKey)) { list(`Authorization` = paste("Key", authInfo$apiKey)) } else { # The value doesn't actually matter here, but the header needs to be set. list(`X-Auth-Token` = "anonymous-access") } } # https://github.com/rstudio/connect/wiki/token-authentication#request-signing-rsconnect signatureHeaders <- function(authInfo, method, path, file = NULL) { # headers to return headers <- list() # remove query string from path if necessary path <- strsplit(path, "?", fixed = TRUE)[[1]][[1]] # generate date date <- rfc2616Date() if (!is.null(authInfo$secret)) { # the content hash is a string of hex characters when using secret. md5 <- fileMD5(file) # build canonical request canonicalRequest <- paste(method, path, date, md5, sep = "\n") # sign request using shared secret decodedSecret <- openssl::base64_decode(authInfo$secret) hmac <- openssl::sha256(canonicalRequest, key = decodedSecret) signature <- paste(openssl::base64_encode(hmac), "; version=1", sep = "") } else if (!is.null(authInfo$private_key)) { # the raw content hash is base64 encoded hex values when using private key. md5 <- openssl::base64_encode(fileMD5(file, raw = TRUE)) # build canonical request canonicalRequest <- paste(method, path, date, md5, sep = "\n") # sign request using local private key private_key <- openssl::read_key( openssl::base64_decode(authInfo$private_key), der = TRUE ) # OpenSSL defaults to sha1 hash function (which is what we need) rawsig <- openssl::signature_create(charToRaw(canonicalRequest), key = private_key) signature <- openssl::base64_encode(rawsig) } else { stop("can't sign request: no shared secret or private key") } # return headers headers$Date <- date headers$`X-Auth-Token` <- authInfo$token headers$`X-Auth-Signature` <- signature headers$`X-Content-Checksum` <- md5 headers } rfc2616Date <- function(time = Sys.time()) { # set locale to POSIX/C to ensure ASCII date old <- Sys.setlocale("LC_TIME", "C") defer(Sys.setlocale("LC_TIME", old)) strftime(Sys.time(), "%a, %d %b %Y %H:%M:%S GMT", tz = "GMT") } # Helpers ----------------------------------------------------------------- userAgent <- function() { paste("rsconnect", packageVersion("rsconnect"), sep = "/") } parseHttpHeader <- function(header) { split <- strsplit(header, ": ")[[1]] if (length(split) == 2) { return(list(name = split[1], value = split[2])) } else { return(NULL) } } parseHttpStatusCode <- function(statusLine) { # extract status code; needs to deal with HTTP/1.0, HTTP/1.1, and HTTP/2 statusCode <- regexExtract("HTTP/[0-9]+\\.?[0-9]* ([0-9]+).*", statusLine) if (is.null(statusCode)) { return(-1) } else { return(as.integer(statusCode)) } } # @param request A list containing protocol, host, port, method, and path fields # @param conn The connection to read the response from. readHttpResponse <- function(request, conn) { # read status code resp <- readLines(conn, 1) statusCode <- parseHttpStatusCode(resp[1]) # read response headers contentLength <- NULL contentType <- NULL location <- NULL setCookies <- NULL repeat { resp <- readLines(conn, 1) if (nzchar(resp) == 0) { break() } header <- parseHttpHeader(resp) if (!is.null(header)) { name <- tolower(header$name) if (name == "content-type") { contentType <- header$value } if (name == "content-length") { contentLength <- as.integer(header$value) } if (name == "location") { location <- header$value } if (name == "set-cookie") { setCookies <- c(setCookies, header$value) } } } # Store the cookies that were found in the request storeCookies(request, setCookies) # read the response content if (is.null(contentLength)) { # content length is unknown, so stream remaining text content <- paste(readLines(con = conn), collapse = "\n") } else { # we know the content length, so read exactly that many bytes content <- rawToChar(readBin( con = conn, what = "raw", n = contentLength )) } # emit JSON trace if requested if (httpTraceJson() && identical(contentType, "application/json")) { cat(paste0(">> ", content, "\n")) } # return list list( req = request, status = statusCode, location = location, contentType = contentType, content = content ) } rsconnect/R/deployments-find.R0000644000176200001440000000334114516247550016067 0ustar liggesusersfindDeployment <- function(appPath = getwd(), appName = NULL, server = NULL, account = NULL, error_call = caller_env()) { deps <- deployments( appPath, nameFilter = appName, serverFilter = server, accountFilter = account ) if (nrow(deps) == 0) { # When the name and account information does not discover a single deployment, return a skeleton # deployment object, which can subsequently be used to query the service. # Infers account when not provided... accountDetails <- accountInfo(account, server) if (is.null(appName)) { appName <- generateAppName(NULL, appPath, account = accountDetails$name, unique = FALSE) } list( name = appName, account = accountDetails$name, server = accountDetails$server ) } else if (nrow(deps) == 1) { as.list(deps) } else { disambiguateDeployments(deps, error_call = error_call) } } disambiguateDeployments <- function(appDeployments, error_call = caller_env()) { if (nrow(appDeployments) == 1) { return(appDeployments[1, ]) } apps <- paste0( appDeployments$name, " ", "(", accountLabel(appDeployments$account, appDeployments$server), "): ", "{.url ", appDeployments$url, "}" ) not_interactive <- c( "Please use {.arg appName}, {.arg server} or {.arg account} to disambiguate.", "Known applications:", set_names(apps, "*") ) idx <- cli_menu( "This directory has been previously deployed in multiple places.", "Which deployment do you want to use?", choices = apps, not_interactive = not_interactive, error_call = error_call ) as.list(appDeployments[idx, ]) } rsconnect/R/tasks.R0000644000176200001440000000360014513230050013711 0ustar liggesusers#' List Tasks #' #' @inheritParams deployApp #' @return #' Returns a data frame with the following columns: #' \tabular{ll}{ #' `id` \tab Task id \cr #' `action` \tab Task action\cr #' `status` \tab Current task status\cr #' `created_time` \tab Task creation time\cr #' `finished_time` \tab Task finished time\cr #' } #' @examples #' \dontrun{ #' #' # list tasks for the default account #' tasks() #' #' } #' @seealso [taskLog()] #' @export tasks <- function(account = NULL, server = NULL) { # resolve account and create connect client accountDetails <- accountInfo(account, server) client <- clientForAccount(accountDetails) # list tasks tasks <- client$listTasks(accountDetails$accountId) # extract the subset of fields we're interested in res <- lapply(tasks, `[`, c("id", "action", "status", "created_time")) # convert to data frame res <- do.call(rbind, res) as.data.frame(res, stringsAsFactors = FALSE) } #' Show task log #' #' Writes the task log for the given task #' @param taskId Task Id #' @inheritParams deployApp #' @param output Where to write output. Valid values are `NULL` or `stderr` #' @examples #' \dontrun{ #' #' # write task log to stdout #' taskLog(12345) #' #' # write task log to stderr #' taskLog(12345, output="stderr") #' #' } #' @seealso [tasks()] #' @export taskLog <- function(taskId, account = NULL, server = NULL, output = NULL) { accountDetails <- accountInfo(account, server) client <- clientForAccount(accountDetails) if (identical(output, "stderr")) { conn <- stderr() } else{ conn <- "" } # show task log cat(client$getTaskLogs(taskId), file = conn) # get child tasks tasks <- client$listTasks(accountDetails$accountId, filters = filterQuery("parent_id", taskId)) # get child task logs for (task in tasks) { taskLog(task["id"], account = account, server = server, output = output) } } rsconnect/R/deployDoc.R0000644000176200001440000000540414513230050014512 0ustar liggesusers#' Deploy a single document #' #' @description #' Deploys a single R Markdown, Quarto document, or other file (e.g. `.html` or #' `.pdf`). #' #' When deploying an `.Rmd`, `.Qmd`, or `.html`, `deployDoc()` will attempt to #' automatically discover dependencies using [rmarkdown::find_external_resources()], #' and include an `.Rprofile` if present. If you find that the document is #' missing dependencies, either specify the dependencies explicitly in the #' document (see [rmarkdown::find_external_resources()] for details), or call #' [deployApp()] directly and specify your own file list in `appFiles`. #' #' @param doc Path to the document to deploy. #' @param ... Additional arguments to [deployApp()]. Do not supply `appDir`, #' `appFiles`, or `appPrimaryDoc`; these three parameters are automatically #' generated by `deployDoc` from the document. #' @inheritParams deployApp #' @family Deployment functions #' @export #' @examples #' \dontrun{ #' deployDoc("my-report.Rmd") #' deployDoc("static-file.html") #' } deployDoc <- function(doc, ..., logLevel = c("normal", "quiet", "verbose")) { logLevel <- arg_match(logLevel) doc <- standardizeSingleDocDeployment(doc, quiet = logLevel == "quiet") deployApp( appDir = doc$appDir, appPrimaryDoc = doc$appPrimaryDoc, appFiles = doc$appFiles, ..., logLevel = logLevel ) } standardizeSingleDocDeployment <- function(path, quiet = FALSE, error_call = caller_env(), error_arg = caller_arg(path)) { check_installed( "rmarkdown", version = "0.5.2", reason = "to deploy individual R Markdown documents" ) check_file(path, error_call = error_call, error_arg = error_arg) path <- normalizePath(path) if (isShinyRmd(path)) { # deploy entire directory appFiles <- NULL } else if (isStaticFile(path)) { taskStart(quiet, "Discovering document dependencies...") resources <- rmarkdown::find_external_resources(path) taskComplete(quiet, "Document dependencies discovered") appFiles <- c(basename(path), resources$path) if (isRenderedFile(path)) { candidates <- c(".Rprofile", "renv.lock", "requirements.txt") exists <- file.exists(file.path(dirname(path), candidates)) appFiles <- c(appFiles, candidates[exists]) } appFiles } else { # deploy just the file appFiles <- basename(path) } list( appDir = normalizePath(dirname(path)), appPrimaryDoc = basename(path), appFiles = appFiles ) } isStaticFile <- function(path) { ext <- tolower(tools::file_ext(path)) ext %in% c("rmd", "qmd", "html", "htm") } isRenderedFile <- function(path) { ext <- tolower(tools::file_ext(path)) ext %in% c("rmd", "qmd") } rsconnect/R/ide.R0000644000176200001440000000726514514011431013341 0ustar liggesusers# These functions are intended to be called primarily by the RStudio IDE. # This function is poorly named because as well as validating the server # url it will also register the server if needed. validateServerUrl <- function(url, certificate = NULL) { res <- validateConnectUrl(url, certificate) if (res$valid) { name <- findAndRegisterLocalServer(res$url) c(list(valid = TRUE, url = res$url, name = name), res$response) } else { res } } # given a server URL, returns that server's short name. if the server is not # currently registered, the server is registered and the short name of the newly # registered server is returned. findAndRegisterLocalServer <- function(url) { # helper to find a server given its URL findServerByUrl <- function(url) { allServers <- rsconnect::servers(local = TRUE) match <- allServers[allServers$url == url, , drop = FALSE] if (nrow(match) == 0) NULL else as.character(match[1, "name"]) } # if there are no local servers with the given URL, add one and return its # name name <- findServerByUrl(url) if (is.null(name)) { url <- ensureConnectServerUrl(url) addServer( url = url, name = NULL, certificate = NULL, quiet = TRUE, validate = FALSE ) findServerByUrl(url) } else { name } } registerUserToken <- function(serverName, accountName, userId, token, privateKey) { registerAccount( serverName = serverName, accountName = accountName, accountId = userId, token = token, private_key = privateKey ) } # generate the markers showRstudioSourceMarkers <- function(basePath, lint) { markers <- list() applied <- lapply(lint, function(file) { lapply(file, function(linter) { lapply(linter$indices, function(index) { marker <- list() marker$type <- "warning" marker$file <- file.path(basePath, linter$file) marker$line <- index marker$column <- 1 marker$message <- linter$suggestion markers <<- c(markers, list(marker)) marker }) }) }) rstudioapi::callFun("sourceMarkers", name = "Publish Content Issues", markers = markers, basePath = basePath, autoSelect = "first") } # getAppById() ----------------------------------------------------------------- # https://github.com/rstudio/rstudio/blob/ee56d49b0fca5f3d7c3f5214a4010355d1bb0212/src/gwt/src/org/rstudio/studio/client/rsconnect/ui/RSConnectDeploy.java#L699 getAppById <- function(id, account, server, hostUrl) { check_string(account) check_string(server) check_string(hostUrl) if (!hasAccount(account, server)) { # If can't find record for account + server, try hostUrl servers <- servers() matches <- servers$url == hostUrl if (any(matches)) { server <- servers$name[which(matches)[[1]]] if (!hasAccount(account, server)) { cli::cli_abort( "Can't find account {.str {account}} on server {.str {server}}." ) } } else { cli::cli_abort("Can't find server with url {.str {hostUrl}}.") } } getApplication(account, server, id) } # ------------------------------------------------------------------------- # passthrough function for compatibility with old IDE versions getUserFromRawToken <- function(serverUrl, token, privateKey, serverCertificate = NULL) { # Look up server name from url servers <- servers() matches <- servers$url == serverUrl server <- servers$name[which(matches)[[1]]] waitForAuthedUser(server, token = token, private_key = privateKey) } rsconnect/R/writeManifest.R0000644000176200001440000000572014513230050015412 0ustar liggesusers#' Create a `manifest.json` #' #' @description #' Use `writeManifest()` to generate a `manifest.json`. Among other things, #' you can commit this file to git to activate #' [Git-Backed content](https://docs.posit.co/connect/user/git-backed/) #' for Posit Connect. #' #' `manifest.json` contains a list of all files in the app along with their #' dependencies, so you will need to re-run `writeManifest()` when either of #' these change. #' #' @inheritParams deployApp #' @param contentCategory Set this to `"site"` if you'd deploy with #' [deploySite()]; otherwise leave as is. #' @param verbose If `TRUE`, prints detailed progress messages. #' @param quiet If `FALSE`, prints progress messages. #' @export writeManifest <- function(appDir = getwd(), appFiles = NULL, appFileManifest = NULL, appPrimaryDoc = NULL, appMode = NULL, contentCategory = NULL, python = NULL, forceGeneratePythonEnvironment = FALSE, quarto = NA, image = NULL, envManagement = NULL, envManagementR = NULL, envManagementPy = NULL, verbose = FALSE, quiet = FALSE) { appFiles <- listDeploymentFiles( appDir, appFiles = appFiles, appFileManifest = appFileManifest ) appMetadata <- appMetadata( appDir = appDir, appFiles = appFiles, appPrimaryDoc = appPrimaryDoc, quarto = quarto, appMode = appMode, contentCategory = contentCategory, ) # copy files to bundle dir to stage bundleDir <- bundleAppDir( appDir = appDir, appFiles = appFiles, appPrimaryDoc = appMetadata$appPrimaryDoc ) defer(unlink(bundleDir, recursive = TRUE)) python <- getPython(python) pythonConfig <- pythonConfigurator(python, forceGeneratePythonEnvironment) # generate the manifest and write it into the bundle dir manifest <- createAppManifest( appDir = bundleDir, appMetadata = appMetadata, pythonConfig = pythonConfig, retainPackratDirectory = FALSE, image = image, envManagement = envManagement, envManagementR = envManagementR, envManagementPy = envManagementPy, verbose = verbose, quiet = quiet ) manifestJson <- toJSON(manifest) manifestPath <- file.path(appDir, "manifest.json") writeLines(manifestJson, manifestPath, useBytes = TRUE) requirementsFilename <- manifest$python$package_manager$package_file if (is.null(requirementsFilename)) { requirementsFilename <- "requirements.txt" } srcRequirementsFile <- file.path(bundleDir, requirementsFilename) dstRequirementsFile <- file.path(appDir, requirementsFilename) if (file.exists(srcRequirementsFile) && !file.exists(dstRequirementsFile)) { file.copy(srcRequirementsFile, dstRequirementsFile) } invisible() } rsconnect/R/lint-framework.R0000644000176200001440000000311514513230050015526 0ustar liggesusers.__LINTERS__. <- new.env(parent = emptyenv()) ##' Add a Linter ##' ##' Add a linter, to be used in subsequent calls to [lint()]. ##' ##' @param name The name of the linter, as a string. ##' @param linter A [linter()]. ##' @export ##' @example examples/example-linter.R addLinter <- function(name, linter) { assign(name, linter, envir = .__LINTERS__.) } ##' Create a Linter ##' ##' Generate a linter, which can identify errors or problematic regions in a ##' project. ##' ##' @param apply Function that, given the content of a file, returns the indices ##' at which problems were found. ##' @param takes Function that, given a set of paths, returns the subset of ##' paths that this linter uses. ##' @param message Function that, given content and lines, returns an ##' informative message for the user. Typically generated with ##' [makeLinterMessage()]. ##' @param suggestion String giving a prescribed fix for the linted problem. ##' @export ##' @example examples/example-linter.R linter <- function(apply, takes, message, suggestion) { result <- list( apply = apply, takes = takes, message = message, suggestion = suggestion ) class(result) <- "linter" result } getLinterApplicableFiles <- function(linter, files) { result <- linter$takes(files) if (is.numeric(result) || is.logical(result)) { files[result] } else { result } } applyLinter <- function(linter, ...) { result <- linter$apply(...) if (is.logical(result)) { output <- which(result) } else { output <- as.numeric(result) } attributes(output) <- attributes(result) output } rsconnect/R/utils.R0000644000176200001440000001025114513230050013724 0ustar liggesusers# Returns a logging function when enabled, a noop function otherwise. verboseLogger <- function(verbose) { if (verbose) { function(...) { timestamp <- paste("[", as.character(Sys.time()), "]", sep = "") cat(paste0(timestamp, " ", ..., "\n")) } } else { function(...) {} } } regexExtract <- function(re, input) { match <- regexec(re, input) matchLoc <- match[1][[1]] if (length(matchLoc) > 1) { matchLen <- attributes(matchLoc)$match.length return(substr(input, matchLoc[2], matchLoc[2] + matchLen[2] - 1)) } else { return(NULL) } } displayStatus <- function(quiet) { quiet <- quiet || httpDiagnosticsEnabled() function(status) { if (!quiet) { cat(status) } } } httpDiagnosticsEnabled <- function() { return(getOption("rsconnect.http.trace", FALSE) || getOption("rsconnect.http.verbose", FALSE)) } # Replacement for tools::file_path_sans_ext to work around an issue where # filenames like "foo..ext" are not returned as "foo.". file_path_sans_ext <- function(x, compression = FALSE) { if (compression) { x <- sub("[.](gz|bz2|xz)$", "", x) } sub("(.+)\\.[[:alnum:]]+$", "\\1", x) } dirExists <- function(x) { utils::file_test("-d", x) } # Returns the MD5 for path as a raw sequence of 16 hexadecimal pairs. fileMD5 <- function(path, raw = FALSE) { # Use digest::digest to compute file MD5. FIPS mode disables openssl::md5. Workaround until we can # migrate away from MD5 for file content checks. # # See: https://github.com/rstudio/rsconnect/issues/363 if (is.null(path)) { digest::digest("", algo = "md5", serialize = FALSE, raw = raw) } else { digest::digest(path, algo = "md5", file = TRUE, raw = raw) } } check_file <- function(x, error_arg = caller_arg(x), error_call = caller_env()) { check_string( x, allow_empty = FALSE, error_arg = error_arg, error_call = error_call ) if (!file.exists(x)) { cli::cli_abort( "{.arg {error_arg}}, {.str {x}}, does not exist.", call = error_call ) } } check_directory <- function(x, error_arg = caller_arg(x), error_call = caller_env()) { check_file(x, error_arg = error_arg, error_call = error_call) if (!dirExists(x)) { cli::cli_abort( "{.arg {error_arg}}, {.str {x}}, is not a directory.", call = error_call ) } } file_size <- function(path) { x <- file.info(path)$size x[is.na(x)] <- 0 x } rbind_fill <- function(dfs, col_names = character()) { if (length(dfs) == 0) { df <- rep(list(logical(0)), length(col_names)) names(df) <- col_names return(as.data.frame(df)) } all_names <- unique(unlist(lapply(dfs, names))) all_names <- union(col_names, all_names) add_missing_cols <- function(df) { df[setdiff(all_names, names(df))] <- rep(NA, nrow(df)) df } complete <- lapply(dfs, add_missing_cols) out <- do.call("rbind", complete) out[all_names] } # Ensure slashes are the same direction on every platform to make snapshot # testing simpler normalizePath <- function(path, mustWork = FALSE) { base::normalizePath(path, winslash = "/", mustWork = mustWork) } compact <- function(x) { x[!vapply(x, is.null, logical(1))] } hasPrefix <- function(x, prefix) { substring(x, 1, nchar(prefix)) == prefix } # Lightweight equivalent of withr::defer() defer <- function(expr, env = caller_env(), after = FALSE) { thunk <- as.call(list(function() expr)) do.call(on.exit, list(thunk, TRUE, after), envir = env) } dirCreate <- function(paths) { for (path in paths) { dir.create(path, showWarnings = FALSE, recursive = TRUE) } paths } fromIDE <- function() { !is.na(Sys.getenv("RSTUDIO", unset = NA)) && !identical(.Platform$GUI, "RStudio") } toJSON <- function(x, ...) { jsonlite::toJSON( x, dataframe = "columns", null = "null", na = "null", auto_unbox = TRUE, pretty = TRUE, digits = 30, ... ) } truthy <- function(value, default = FALSE) { if (!is.atomic(value) || length(value) != 1 || is.na(value)) default else if (is.character(value)) value %in% c("TRUE", "True", "true", "T", "1") else as.logical(value) } rsconnect/R/secret.R0000644000176200001440000000122114513230050014046 0ustar liggesuserssecret <- function(x) { if (is.null(x)) return(NULL) stopifnot(is.character(x) || all(is.na(x))) structure(x, class = "rsconnect_secret") } #' @export format.rsconnect_secret <- function(x, ...) { paste0(substr(x, 1, 6), "... (redacted)") } #' @export print.rsconnect_secret <- function(x, ...) { print(format(x)) invisible(x) } #' @export str.rsconnect_secret <- function(object, ...) { cat(" ", format(object), "\n", sep = "") } #' @export as.data.frame.rsconnect_secret <- function(x, ...) { structure( list(x), row.names = .set_row_names(length(x)), class = "data.frame" ) } rsconnect/R/client-connect.R0000644000176200001440000001345314513230050015500 0ustar liggesusers# Docs: https://docs.posit.co/connect/api/ connectClient <- function(service, authInfo) { list( service = function() { "connect" }, ## Server settings API serverSettings = function() { GET(service, authInfo, file.path("/server_settings")) }, ## User API addUser = function(userRecord) { userRecord <- validateUserRecord(userRecord) POST_JSON(service, authInfo, "/users", userRecord) }, getUser = function(userId) { GET(service, authInfo, file.path("/users", userId)) }, currentUser = function() { GET(service, authInfo, "/users/current") }, ## Tokens API addToken = function(token) { POST_JSON(service, authInfo, "/tokens", token) }, ## Applications API listApplications = function(accountId, filters = NULL) { if (is.null(filters)) { filters <- vector() } path <- "/applications" query <- paste(filterQuery( c("account_id", names(filters)), c(accountId, unname(filters)) ), collapse = "&") listApplicationsRequest(service, authInfo, path, query, "applications") }, createApplication = function(name, title, template, accountId, appMode, contentCategory = NULL, spaceId = NULL) { # add name; inject title if specified details <- list(name = name) if (!is.null(title) && nzchar(title)) details$title <- title # RSC doesn't currently use the template or account ID # parameters; they exist for compatibility with lucid. application <- POST_JSON(service, authInfo, "/applications", details) list( id = application$id, guid = application$guid, url = application$url ) }, terminateApplication = function(applicationId) { path <- paste("/applications/", applicationId, "/terminate", sep = "") POST_JSON(service, authInfo, path, list()) }, uploadApplication = function(appId, bundlePath) { path <- file.path("/applications", appId, "upload") POST( service, authInfo, path, contentType = "application/x-gzip", file = bundlePath ) }, deployApplication = function(application, bundleId = NULL, spaceId = NULL) { path <- paste("/applications/", application$id, "/deploy", sep = "") json <- list() json$bundle <- as.numeric(bundleId) POST_JSON(service, authInfo, path, json) }, configureApplication = function(applicationId) { GET(service, authInfo, paste( "/applications/", applicationId, "/config", sep = "")) }, getApplication = function(applicationId, deploymentRecordVersion) { GET(service, authInfo, paste0("/applications/", applicationId)) }, ## Tasks API listTasks = function() { path <- "/tasks" GET(service, authInfo, path) }, getTask = function(taskId) { path <- file.path("/tasks", taskId) GET(service, authInfo, path) }, killTask = function(taskId) { path <- file.path("/tasks", taskId, "kill") POST_JSON(service, authInfo, path, list()) }, waitForTask = function(taskId, quiet) { start <- 0 while (TRUE) { path <- paste0(file.path("/tasks", taskId), "?first_status=", start) response <- GET(service, authInfo, path) if (length(response$status) > 0) { messages <- unlist(response$status) # Strip timestamps, if found timestamp_re <- "\\d{4}/\\d{2}/\\d{2} \\d{2}:\\d{2}:\\d{2}\\.\\d{3,} " messages <- gsub(timestamp_re, "", messages) # Made headers more prominent. heading <- grepl("^# ", messages) messages[heading] <- cli::style_bold(messages[heading]) cat(paste0(messages, "\n", collapse = "")) start <- response$last_status } if (length(response$finished) > 0 && response$finished) { return(response) } Sys.sleep(1) } }, # - Environment variables ----------------------------------------------- # https://docs.posit.co/connect/api/#get-/v1/content/{guid}/environment getEnvVars = function(guid) { path <- file.path("/v1/content", guid, "environment") as.character(unlist(GET(service, authInfo, path, list()))) }, setEnvVars = function(guid, vars) { path <- file.path("/v1/content", guid, "environment") body <- unname(Map( function(name, value) { list( name = name, value = if (is.na(value)) NULL else value ) }, vars, Sys.getenv(vars, unset = NA) )) PATCH_JSON(service, authInfo, path, body) } ) } # userRecord -------------------------------------------------------------- userRecord <- function(email, username, first_name, last_name, password) { list( email = email, username = username, first_name = first_name, last_name = last_name, password = password ) } prettyPasteFields <- function(message, fields) { header <- paste(message, ":\n- ", sep = "") body <- paste(strwrap(paste(shQuote(fields), collapse = ", ")), collapse = "\n") paste(header, body, sep = "") } validateUserRecord <- function(record) { requiredFields <- c("email", "username", "first_name", "last_name", "password") missingFields <- setdiff(requiredFields, names(record)) extraFields <- setdiff(names(record), requiredFields) ## Construct error message if necessary msg <- NULL if (length(missingFields)) { msg <- prettyPasteFields("The following required fields are missing", missingFields) } if (length(extraFields)) { msg <- paste(msg, prettyPasteFields("The following extraneous fields were found", extraFields)) } if (!is.null(msg)) { stop(msg) } record } rsconnect/R/static-analysis.R0000644000176200001440000000000014435652570015705 0ustar liggesusersrsconnect/R/auth.R0000644000176200001440000002174714513230050013541 0ustar liggesuserscleanupPasswordFile <- function(appDir) { check_directory(appDir) appDir <- normalizePath(appDir) # get data dir from appDir dataDir <- file.path(appDir, "shinyapps") # get password file passwordFile <- file.path(dataDir, paste("passwords", ".txt", sep = "")) # check if password file exists if (file.exists(passwordFile)) { message("WARNING: Password file found! This application is configured to use scrypt ", "authentication, which is no longer supported.\nIf you choose to proceed, ", "all existing users of this application will be removed, ", "and will NOT be recoverable.\nFor for more information please visit: ", "http://shiny.rstudio.com/articles/migration.html") response <- readline("Do you want to proceed? [Y/n]: ") if (tolower(substring(response, 1, 1)) != "y") { stop("Cancelled", call. = FALSE) } else { # remove old password file file.remove(passwordFile) } } invisible(TRUE) } #' Add authorized user to application #' #' @param email Email address of user to add. #' @param appDir Directory containing application. Defaults to #' current working directory. #' @param appName Name of application. #' @inheritParams deployApp #' @param sendEmail Send an email letting the user know the application #' has been shared with them. #' @param emailMessage Optional character vector of length 1 containing a #' custom message to send in email invitation. Defaults to NULL, which #' will use default invitation message. #' @seealso [removeAuthorizedUser()] and [showUsers()] #' @note This function works only for ShinyApps servers. #' @export addAuthorizedUser <- function(email, appDir = getwd(), appName = NULL, account = NULL, server = NULL, sendEmail = NULL, emailMessage = NULL) { accountDetails <- accountInfo(account, server) checkShinyappsServer(accountDetails$server) # resolve application if (is.null(appName)) appName <- basename(appDir) application <- resolveApplication(accountDetails, appName) # check for and remove password file cleanupPasswordFile(appDir) # fetch authoriztion list api <- clientForAccount(accountDetails) api$inviteApplicationUser(application$id, validateEmail(email), sendEmail, emailMessage) message(paste("Added:", email, "to application", sep = " ")) invisible(TRUE) } #' Remove authorized user from an application #' #' @param user The user to remove. Can be id or email address. #' @param appDir Directory containing application. Defaults to #' current working directory. #' @param appName Name of application. #' @inheritParams deployApp #' @seealso [addAuthorizedUser()] and [showUsers()] #' @note This function works only for ShinyApps servers. #' @export removeAuthorizedUser <- function(user, appDir = getwd(), appName = NULL, account = NULL, server = NULL) { accountDetails <- accountInfo(account, server) checkShinyappsServer(accountDetails$server) # resolve application if (is.null(appName)) appName <- basename(appDir) application <- resolveApplication(accountDetails, appName) # check and remove password file cleanupPasswordFile(appDir) # get users users <- showUsers(appDir, appName, account, server) if (is.numeric(user)) { # lookup by id if (user %in% users$id) { user <- users[users$id == user, ] } else { stop("User ", user, " not found", call. = FALSE) } } else { # lookup by email if (user %in% users$email) { user <- users[users$email == user, ] } else { stop("User \"", user, "\" not found", call. = FALSE) } } # remove user api <- clientForAccount(accountDetails) api$removeApplicationUser(application$id, user$id) message(paste("Removed:", user$email, "from application", sep = " ")) invisible(TRUE) } #' List authorized users for an application #' #' @param appDir Directory containing application. Defaults to #' current working directory. #' @param appName Name of application. #' @inheritParams deployApp #' @seealso [addAuthorizedUser()] and [showInvited()] #' @note This function works only for ShinyApps servers. #' @export showUsers <- function(appDir = getwd(), appName = NULL, account = NULL, server = NULL) { accountDetails <- accountInfo(account, server) checkShinyappsServer(accountDetails$server) # resolve application if (is.null(appName)) appName <- basename(appDir) application <- resolveApplication(accountDetails, appName) # fetch authoriztion list api <- clientForAccount(accountDetails) res <- api$listApplicationAuthorization(application$id) # get interesting fields users <- lapply(res, function(x) { a <- list() a$id <- x$user$id a$email <- x$user$email if (!is.null(x$account)) { a$account <- x$account } else { a$account <- NA } return(a) }) # convert to data frame users <- do.call(rbind, users) df <- as.data.frame(users, stringsAsFactors = FALSE) return(df) } #' List invited users for an application #' #' @param appDir Directory containing application. Defaults to #' current working directory. #' @param appName Name of application. #' @inheritParams deployApp #' @seealso [addAuthorizedUser()] and [showUsers()] #' @note This function works only for ShinyApps servers. #' @export showInvited <- function(appDir = getwd(), appName = NULL, account = NULL, server = NULL) { accountDetails <- accountInfo(account, server) checkShinyappsServer(accountDetails$server) # resolve application if (is.null(appName)) appName <- basename(appDir) application <- resolveApplication(accountDetails, appName) # fetch invitation list api <- clientForAccount(accountDetails) res <- api$listApplicationInvitations(application$id) # get interesting fields users <- lapply(res, function(x) { a <- list() a$id <- x$id a$email <- x$email a$link <- x$link a$expired <- x$expired return(a) }) # convert to data frame users <- do.call(rbind, users) df <- as.data.frame(users, stringsAsFactors = FALSE) return(df) } #' Resend invitation for invited users of an application #' #' @param invite The invitation to resend. Can be id or email address. #' @param regenerate Regenerate the invite code. Can be helpful is the #' invitation has expired. #' @param appDir Directory containing application. Defaults to #' current working directory. #' @param appName Name of application. #' @inheritParams deployApp #' @seealso [showInvited()] #' @note This function works only for ShinyApps servers. #' @export resendInvitation <- function(invite, regenerate = FALSE, appDir = getwd(), appName = NULL, account = NULL, server = NULL) { accountDetails <- accountInfo(account, server) checkShinyappsServer(accountDetails$server) # get invitations invited <- showInvited(appDir, appName, account, server) if (is.numeric(invite)) { # lookup by id if (invite %in% invited$id) { invite <- invited[invited$id == invite, ] } else { stop("Invitation \"", invite, "\" not found", call. = FALSE) } } else { # lookup by email if (invite %in% invited$email) { invite <- invited[invited$email == invite, ] } else { stop("Invitiation for \"", invite, "\" not found", call. = FALSE) } } # resend invitation api <- clientForAccount(accountDetails) api$resendApplicationInvitation(invite$id, regenerate) message(paste("Sent invitation to", invite$email, "", sep = " ")) invisible(TRUE) } #' (Deprecated) List authorized users for an application #' #' @param appDir Directory containing application. Defaults to current working #' directory. #' @export authorizedUsers <- function(appDir = getwd()) { .Deprecated("showUsers") # read password file path <- getPasswordFile(appDir) if (file.exists(path)) { passwords <- readPasswordFile(path) } else { passwords <- NULL } return(passwords) } validateEmail <- function(email) { if (is.null(email) || !grepl(".+\\@.+\\..+", email)) { stop("Invalid email address.", call. = FALSE) } invisible(email) } getPasswordFile <- function(appDir) { check_directory(appDir) file.path(normalizePath(appDir), "shinyapps", "passwords.txt") } readPasswordFile <- function(path) { # open and read file lines <- readLines(path) # extract fields fields <- do.call(rbind, strsplit(lines, ":")) users <- fields[, 1] hashes <- fields[, 2] # convert to data frame df <- data.frame(user = users, hash = hashes, stringsAsFactors = FALSE) # return data frame return(df) } writePasswordFile <- function(path, passwords) { # open and file f <- file(path, open = "w") defer(close(f)) # write passwords apply(passwords, 1, function(r) { l <- paste(r[1], ":", r[2], "\n", sep = "") cat(l, file = f, sep = "") }) message("Password file updated. You must deploy your application for these changes to take effect.") } rsconnect/R/bundlePackageRenv.R0000644000176200001440000001131514513230050016146 0ustar liggesuserssnapshotRenvDependencies <- function(bundleDir, extraPackages = character(), verbose = FALSE) { recordExtraDependencies(bundleDir, extraPackages) old <- options( renv.verbose = FALSE, renv.consent = TRUE ) defer(options(old)) dependenciesLimit <- getOption("renv.config.dependencies.limit") if (is.null(dependenciesLimit)) { maxFiles <- getOption("rsconnect.max.bundle.files", 10000) oldlim <- options( renv.config.dependencies.limit = maxFiles ) defer(options(oldlim)) } # analyze code dependencies ourselves rather than relying on the scan during renv::snapshot, as # that will add renv to renv.lock as a dependency. deps <- renv::dependencies(bundleDir, root = bundleDir, progress = FALSE) renv::snapshot(bundleDir, packages = deps$Package, prompt = FALSE) defer(removeRenv(bundleDir)) parseRenvDependencies(bundleDir, snapshot = TRUE) } parseRenvDependencies <- function(bundleDir, snapshot = FALSE) { renv <- jsonlite::read_json(renvLockFile(bundleDir)) repos <- setNames( vapply(renv$R$Repositories, "[[", "URL", FUN.VALUE = character(1)), vapply(renv$R$Repositories, "[[", "Name", FUN.VALUE = character(1)) ) deps <- standardizeRenvPackages( renv$Packages, repos, biocPackages = biocPackages(bundleDir) ) if (nrow(deps) == 0) { return(data.frame()) } deps$description <- lapply(deps$Package, package_record) if (!snapshot) { lib_versions <- unlist(lapply(deps$description, "[[", "Version")) if (any(deps$Version != lib_versions)) { cli::cli_abort(c( "Library and lockfile are out of sync", i = "Use renv::restore() or renv::snapshot() to synchronise", i = "Or ignore the lockfile by adding to your .rscignore" )) } } deps } standardizeRenvPackages <- function(packages, repos, biocPackages = NULL) { repos <- standardizeRepos(repos) availablePackages <- availablePackages(repos) names(packages) <- NULL out <- lapply( packages, standardizeRenvPackage, availablePackages = availablePackages, biocPackages = biocPackages, repos = repos ) out <- compact(out) out <- lapply(out, as.data.frame, stringsAsFactors = FALSE) rbind_fill(out) } standardizeRenvPackage <- function(pkg, availablePackages, biocPackages = NULL, repos = character(), bioc) { # Convert renv source to manifest source/repository # https://github.com/rstudio/renv/blob/0.17.2/R/snapshot.R#L730-L773 if (is.null(pkg$Repository) && !is.null(pkg$RemoteRepos) && grepl("bioconductor.org", pkg$RemoteRepos)) { # Work around bug where renv fails to detect BioC package installed by pak # https://github.com/rstudio/renv/issues/1202 pkg$Source <- "Bioconductor" } if (pkg$Source == "Repository") { if (identical(pkg$Repository, "CRAN")) { if (isDevVersion(pkg, availablePackages)) { pkg$Source <- NA_character_ pkg$Repository <- NA_character_ } else { pkg$Source <- "CRAN" pkg$Repository <- findRepoUrl(pkg$Package, availablePackages) } } else { # $Repository comes from DESCRIPTION and is set by repo, so can be # anything. So we must look up from the package name pkg$Repository <- findRepoUrl(pkg$Package, availablePackages) pkg$Source <- findRepoName(pkg$Repository, repos) } } else if (pkg$Source == "Bioconductor") { pkg$Repository <- findRepoUrl(pkg$Package, availablePackages) if (is.na(pkg$Repository)) { # Try packages defined from default bioC repos pkg$Repository <- findRepoUrl(pkg$Package, biocPackages) } } else if (pkg$Source %in% c("Bitbucket", "GitHub", "GitLab")) { pkg$Source <- tolower(pkg$Source) } else if (pkg$Source %in% c("Local", "unknown")) { pkg$Source <- NA_character_ pkg$Repository <- NA_character_ } # Remove Remote fields that pak adds for "standard" installs from CRAN if (identical(pkg$RemoteType, "standard")) { pkg <- pkg[!grepl("^Remote", names(pkg))] } pkg[manifestPackageColumns(pkg)] } biocPackages <- function(bundleDir) { signal("evaluating", class = "rsconnect_biocRepos") # used for testing availablePackages(biocRepos(bundleDir)) } biocRepos <- function(bundleDir) { repos <- getFromNamespace("renv_bioconductor_repos", "renv")(bundleDir) repos[setdiff(names(repos), "CRAN")] } renvLockFile <- function(bundleDir) { file.path(bundleDir, "renv.lock") } removeRenv <- function(path, lockfile = TRUE) { if (lockfile) { unlink(renvLockFile(path)) } unlink(file.path(path, "renv"), recursive = TRUE) } rsconnect/R/deployAPI.R0000644000176200001440000000163614513230050014421 0ustar liggesusers#' Deploy a Plumber API #' #' Deploys an application consisting of plumber API routes. The given directory #' must contain a script returning a `plumb` object or a plumber API definition. #' #' @param api Path to the API project directory. Must contain either #' `entrypoint.R` or `plumber.R` #' @param ... Additional arguments to [deployApp()]. #' #' @details Deploy a plumber API definition by either supplying a directory #' containing `plumber.R` (an API definition) or `entrypoint.R` that returns a #' `plumb` object created by `plumber::plumb()`. See the plumber documentation #' for more information. #' #' @family Deployment functions #' @export deployAPI <- function(api, ...) { check_installed( "plumber", version = "0.3.2", reason = "to deploy plumber APIs" ) check_directory(api) # Checking for entrypoint.R or plumber.R is done in `lint-framework.R` deployApp(appDir = api, ...) } rsconnect/R/bundlePackagePackrat.R0000644000176200001440000001371214513230050016624 0ustar liggesuserssnapshotPackratDependencies <- function(bundleDir, implicit_dependencies = character(), verbose = FALSE) { addPackratSnapshot(bundleDir, implicit_dependencies, verbose = verbose) lockFilePath <- packratLockFile(bundleDir) df <- as.data.frame(read.dcf(lockFilePath), stringsAsFactors = FALSE) unlink(dirname(lockFilePath), recursive = TRUE) # get repos defined in the lockfile repos <- gsub("[\r\n]", " ", df[1, "Repos"]) repos <- strsplit(unlist(strsplit(repos, "\\s*,\\s*", perl = TRUE)), "=", fixed = TRUE) repos <- setNames( sapply(repos, "[[", 2), sapply(repos, "[[", 1) ) # get packages records defined in the lockfile records <- utils::tail(df, -1) if (nrow(records) == 0) { return(data.frame()) } rownames(records) <- NULL records <- records[manifestPackageColumns(records)] records[c("Source", "Repository")] <- standardizeRecords(records, repos) records$description <- lapply(records$Package, package_record) records } standardizeRecords <- function(records, repos) { availablePackages <- availablePackages(repos) repos <- standardizeRepos(repos) rows <- lapply(seq_len(nrow(records)), function(i) { standardizePackratPackage(records[i, ], availablePackages, repos = repos) }) rows <- lapply(rows, as.data.frame, stringsAsFactors = FALSE) rbind_fill(rows, c("Source", "Repository")) } standardizeRepos <- function(repos) { # Ensure that each repository has a unique name names(repos) <- ifelse( names2(repos) == "", paste0("repo_", seq_along(repos)), names2(repos) ) # And strip trailing / repos <- gsub("/$", "", repos) repos } standardizePackratPackage <- function(record, availablePackages, repos = character()) { pkg <- record$Package source <- record$Source # source types are defined by packrat: # https://github.com/rstudio/packrat/blob/v0.9.0/R/pkg.R#L328 if (source %in% c("github", "gitlab", "bitbucket")) { # SCM information is recorded elsewhere repository <- NA_character_ } else if (source == "source") { # can't install source packages elsewhere repository <- NA_character_ source <- NA_character_ } else if (source == "CustomCRANLikeRepository" && isDevVersion(record, availablePackages)) { # Package was installed from source, but packrat guessed it was installed # from a known repo. repository <- NA_character_ source <- NA_character_ } else if (source %in% c("CRAN", "Bioconductor")) { # shinyapps & posit.cloud will ignore, but connect will use (unless admin # has set up an override) repository <- findRepoUrl(pkg, availablePackages) } else { # Installed from custom repository. Find URL from available.packages() # and then name from repos. repository <- findRepoUrl(pkg, availablePackages) source <- findRepoName(repository, repos) } list(Source = source, Repository = repository) } findRepoName <- function(repository, repos) { idx <- match(repository, repos) names(repos)[idx] } findRepoUrl <- function(pkg, availablePackages) { idx <- match(pkg, availablePackages[, "Package"]) if (!is.na(idx)) { repo <- availablePackages[[idx, "Repository"]] # Strip `/src/contrib/*` from package repository: `contrib.url()` # adds /src/contrib, and RSPM adds additional directories gsub("/src/contrib.*$", "", repo) } else { NA_character_ } } isDevVersion <- function(record, availablePackages) { idx <- match(record$Package, availablePackages[, "Package"]) if (is.na(idx)) { return(FALSE) } local_version <- record$Version repo_version <- availablePackages[idx, "Version"] package_version(local_version) > package_version(repo_version) } addPackratSnapshot <- function(bundleDir, implicit_dependencies = character(), verbose = FALSE) { # if we discovered any extra dependencies, write them to a file for packrat to # discover when it creates the snapshot recordExtraDependencies(bundleDir, implicit_dependencies) withCallingHandlers( performPackratSnapshot(bundleDir, verbose = verbose), error = function(err) { abort("Failed to snapshot dependencies", parent = err) }, warning = function(cnd) { invokeRestart("muffleWarning") } ) invisible() } recordExtraDependencies <- function(bundleDir, pkgs, env = caller_env()) { if (length(pkgs) == 0) { return() } depPath <- file.path(bundleDir, "__rsconnect_deps.R") writeLines(paste0("library(", pkgs, ")\n"), depPath) # Automatically delete when the _caller_ finishes defer(unlink(depPath), env = env) invisible() } performPackratSnapshot <- function(bundleDir, verbose = FALSE) { # ensure we snapshot recommended packages srp <- packrat::opts$snapshot.recommended.packages() packrat::opts$snapshot.recommended.packages(TRUE, persist = FALSE) defer(packrat::opts$snapshot.recommended.packages(srp, persist = FALSE)) # Force renv dependency scanning within packrat unless the option has been # explicitly configured. This is a no-op for older versions of packrat. renvDiscovery <- getOption("packrat.dependency.discovery.renv") if (is.null(renvDiscovery)) { old <- options("packrat.dependency.discovery.renv" = TRUE) defer(options(old)) } # attempt to eagerly load the BiocInstaller or BiocManaager package if # installed, to work around an issue where attempts to load the package could # fail within a 'suppressMessages()' context packages <- c("BiocManager", "BiocInstaller") for (package in packages) { if (is_installed(package)) { requireNamespace(package, quietly = TRUE) break } } suppressMessages( packrat::.snapshotImpl( project = bundleDir, snapshot.sources = FALSE, fallback.ok = TRUE, verbose = verbose, implicit.packrat.dependency = FALSE ) ) invisible() } packratLockFile <- function(bundleDir) { file.path(bundleDir, "packrat", "packrat.lock") } rsconnect/R/deployApp.R0000644000176200001440000006664614536333553014565 0ustar liggesusers#' Deploy an Application #' #' Deploy a [shiny][shiny::shiny-package] application, an #' [RMarkdown][rmarkdown::rmarkdown-package] document, a plumber API, or HTML #' content to a server. #' #' ## Deployment records #' #' When deploying an app, `deployApp()` will save a deployment record that #' makes it easy to update the app on server from your local source code. This #' generally means that you need to only need to supply important arguments #' (e.g. `appName`, `appTitle`, `server`/`account`) on the first deploy, and #' rsconnect will reuse the same settings on subsequent deploys. #' #' The metadata needs to make this work is stored in `{appDir}/rsconnect/`. #' You should generally check these files into version control to ensure that #' future you and other collaborators will publish to the same location. #' #' If you have lost this directory, all is not lost, as `deployApp()` will #' attempt to rediscover existing deployments. This is easiest if you are #' updating an app that you created, as you can just supply the `appName` #' (and `server`/`account` if you have multiple accounts) and `deployApp()` #' will find the existing application account. If you need to update an app #' that was created by someone else (that you have write permission) for, you'll #' instead need to supply the `appId`. #' #' @param appDir A directory containing an application (e.g. a Shiny app #' or plumber API). Defaults to the current directory. #' @param appFiles,appFileManifest Use `appFiles` to specify a #' character vector of files to bundle in the app or `appManifestFiles` #' to provide a path to a file containing a list of such files. If neither #' are supplied, will bundle all files in `appDir`, apart from standard #' exclusions and files listed in a `.rscignore` file. See #' [listDeploymentFiles()] for more details. #' @param appPrimaryDoc If the application contains more than one document, this #' parameter indicates the primary one, as a path relative to `appDir`. Can be #' `NULL`, in which case the primary document is inferred from the contents #' being deployed. #' @param appSourceDoc `r lifecycle::badge("deprecated")` Please use #' `recordDir` instead. #' @param appName Application name, a string consisting of letters, numbers, #' `_` and `-`. The application name is used to identify applications on a #' server, so must be unique. #' #' If not specified, the first deployment will be automatically it from the #' `appDir` for directory and website, and from the `appPrimaryDoc` for #' document. On subsequent deploys, it will use the previously stored value. #' @param appTitle Free-form descriptive title of application. Optional; if #' supplied, will often be displayed in favor of the name. If ommitted, #' on second and subsequent deploys, the title will be unchanged. #' @param envVars A character vector giving the names of environment variables #' whose values should be synchronised with the server (currently supported by #' Connect only). The values of the environment variables are sent over an #' encrypted connection and are not stored in the bundle, making this a safe #' way to send private data to Connect. #' #' The names (not values) are stored in the deployment record so that future #' deployments will automatically update their values. Other environment #' variables on the server will not be affected. This means that removing an #' environment variable from `envVars` will leave it unchanged on the server. #' To remove it, either delete it using the Connect UI, or temporarily unset #' it (with `Sys.unsetenv()` or similar) then re-deploy. #' #' Environment variables are set prior to deployment so that your code #' can use them and the first deployment can still succeed. Note that means #' that if the deployment fails, the values will still be updated. #' @param appId Use this to deploy to an exact known application, ignoring all #' existing deployment records and `appName`. #' #' You can use this to update an existing application that is missing a #' deployment record. If you're re-deploying an application that you #' created it's generally easier to use `appName`; `appId` is best reserved #' for re-deploying apps created by someone else. #' #' You can find the `appId` in the following places: #' * On shinyapps.io, it's the `id` listed on the applications page. #' * For Posit Connect, it's `guid` from the info tab on the content page. #' @param appMode Optional; the type of content being deployed. #' Provide this option when the inferred type of content is incorrect. This #' can happen, for example, when static HTML content includes a downloadable #' Shiny application `app.R`. Accepted values include `"shiny"`, `"api"`, #' `"rmd-static"`, `"rmd-shiny"`, `"quarto-static"`, `"quarto-shiny"`, and #' `"static"`. The Posit Connect API Reference contains a full set of #' available values. Not all servers support all types of content. #' @param contentCategory Optional; classifies the kind of content being #' deployed (e.g. `"plot"` or `"site"`). #' @param account,server Uniquely identify a remote server with either your #' user `account`, the `server` name, or both. If neither are supplied, and #' there are multiple options, you'll be prompted to pick one. #' #' Use [accounts()] to see the full list of available options. #' @param upload If `TRUE` (the default) then the application is uploaded from #' the local system prior to deployment. If `FALSE` then it is re-deployed #' using the last version that was uploaded. `FALSE` is only supported on #' shinyapps.io; `TRUE` is required on Posit Connect. #' @param recordDir Directory where deployment record is written. The default, #' `NULL`, uses `appDir`, since this is usually where you want the deployment #' data to be stored. This argument is typically only needed when deploying #' a directory of static files since you want to store the record with the #' code that generated those files, not the files themselves. #' @param launch.browser If true, the system's default web browser will be #' launched automatically after the app is started. Defaults to `TRUE` in #' interactive sessions only. If a function is passed, it will be called #' after the app is started, with the app URL as a paramter. #' @param on.failure Function to be called if the deployment fails. If a #' deployment log URL is available, it's passed as a parameter. #' @param logLevel One of `"quiet"`, `"normal"` or `"verbose"`; indicates how #' much logging to the console is to be performed. At `"quiet"` reports no #' information; at `"verbose"`, a full diagnostic log is captured. #' @param lint Lint the project before initiating deployment, to identify #' potentially problematic code? #' @param metadata Additional metadata fields to save with the deployment #' record. These fields will be returned on subsequent calls to #' [deployments()]. #' #' Multi-value fields are recorded as comma-separated values and returned in #' that form. Custom value serialization is the responsibility of the caller. #' @param forceUpdate What should happen if there's no deployment record for #' the app, but there's an app with the same name on the server? If `TRUE`, #' will always update the previously-deployed app. If `FALSE`, will ask #' the user what to do, or fail if not in an interactive context. #' #' Defaults to `TRUE` when called automatically by the IDE, and `FALSE` #' otherwise. You can override the default by setting option #' `rsconnect.force.update.apps`. #' @param python Full path to a python binary for use by `reticulate`. #' Required if `reticulate` is a dependency of the app being deployed. #' If python = NULL, and RETICULATE_PYTHON or RETICULATE_PYTHON_FALLBACK is #' set in the environment, its value will be used. The specified python binary #' will be invoked to determine its version and to list the python packages #' installed in the environment. #' @param forceGeneratePythonEnvironment Optional. If an existing #' `requirements.txt` file is found, it will be overwritten when this argument #' is `TRUE`. #' @param quarto Should the deployed content be built by quarto? #' (`TRUE`, `FALSE`, or `NA`). The default, `NA`, will use quarto if #' there are `.qmd` files in the bundle, or if there is a #' `_quarto.yml` and `.Rmd` files. #' #' (This option is ignored and quarto will always be used if the #' `metadata` contains `quarto_version` and `quarto_engines` fields.) #' @param appVisibility One of `NULL`, `"private"`, or `"public"`; the #' visibility of the deployment. When `NULL`, no change to visibility is #' made. Currently has an effect only on deployments to shinyapps.io. #' @param image Optional. The name of the image to use when building and #' executing this content. If none is provided, Posit Connect will #' attempt to choose an image based on the content requirements. #' @param envManagement Optional. Should Posit Connect install R and Python #' packages for this content? (`TRUE`, `FALSE`, or `NULL`). #' The default, `NULL`, will not write any values to the bundle manifest, #' and Connect will fall back to the application default environment #' management strategy, or the server default if no application default #' is defined. #' #' (This option is a shorthand flag which overwrites the values of both #' `envManagementR` and `envManagementPy`.) #' @param envManagementR Optional. Should Posit Connect install R packages #' for this content? (`TRUE`, `FALSE`, or `NULL`). The default, `NULL`, will #' not write any values to the bundle manifest, and Connect will fall back to #' the application default R environment management strategy, or the server #' default if no application default is defined. #' #' (This option is ignored when `envManagement` is non-`NULL`.) #' @param envManagementPy Optional. Should Posit Connect install Python packages #' for this content? (`TRUE`, `FALSE`, or `NULL`). The default, `NULL`, will #' not write any values to the bundle manifest, and Connect will fall back to #' the application default Python environment management strategy, or the #' server default if no application default is defined. #' #' (This option is ignored when `envManagement` is non-`NULL`.) #' @param space Optional. For Posit Cloud, the id of the space where the content #' should be deployed. If none is provided, content will be deployed to the #' deploying user's workspace or deployed to the same space in case of #' redeploy. #' @examples #' \dontrun{ #' #' # deploy the application in the current working dir #' deployApp() #' #' # deploy an application in another directory #' deployApp("~/projects/shiny/app1") #' #' # deploy using an alternative application name and title #' deployApp("~/projects/shiny/app1", appName = "myapp", #' appTitle = "My Application") #' #' # deploy specifying an explicit account name, then #' # redeploy with no arguments (will automatically use #' # the previously specified account) #' deployApp(account = "jsmith") #' deployApp() #' #' # deploy but don't launch a browser when completed #' deployApp(launch.browser = FALSE) #' #' # deploy a Quarto website, using the quarto package to #' # find the Quarto binary #' deployApp("~/projects/quarto/site1") #' #' # deploy application with environment variables #' # (e.g., `SECRET_PASSWORD=XYZ` is set via an ~/.Renviron file) #' rsconnect::deployApp(envVars = c("SECRET_PASSWORD")) #' } #' @seealso [applications()], [terminateApp()], and [restartApp()] #' @family Deployment functions #' @export deployApp <- function(appDir = getwd(), appFiles = NULL, appFileManifest = NULL, appPrimaryDoc = NULL, appSourceDoc = NULL, appName = NULL, appTitle = NULL, envVars = NULL, appId = NULL, appMode = NULL, contentCategory = NULL, account = NULL, server = NULL, upload = TRUE, recordDir = NULL, launch.browser = getOption("rsconnect.launch.browser", is_interactive()), on.failure = NULL, logLevel = c("normal", "quiet", "verbose"), lint = TRUE, metadata = list(), forceUpdate = NULL, python = NULL, forceGeneratePythonEnvironment = FALSE, quarto = NA, appVisibility = NULL, image = NULL, envManagement = NULL, envManagementR = NULL, envManagementPy = NULL, space = NULL ) { check_string(appDir) if (isStaticFile(appDir) && !dirExists(appDir)) { lifecycle::deprecate_warn( when = "1.0.0", what = "deployApp(appDir = 'takes a directory, not a document,')", with = "deployDoc()" ) return(deployDoc( appDir, appName = appName, appTitle = appTitle, account = account, server = server, upload = upload, recordDir = recordDir, launch.browser = launch.browser, logLevel = logLevel, lint = lint )) } check_directory(appDir) appDir <- normalizePath(appDir) check_string(appName, allow_null = TRUE) if (!is.null(appPrimaryDoc)) { check_string(appPrimaryDoc) if (!file.exists(file.path(appDir, appPrimaryDoc))) { cli::cli_abort("`appPrimaryDoc` not found inside `appDir`") } } if (!is.null(appSourceDoc)) { # Used by IDE so can't deprecate recordDir <- appSourceDoc } # set up logging helpers logLevel <- match.arg(logLevel) quiet <- identical(logLevel, "quiet") verbose <- identical(logLevel, "verbose") logger <- verboseLogger(verbose) displayStatus <- displayStatus(quiet) # run startup scripts to pick up any user options and establish pre/post deploy hooks runStartupScripts(appDir, quiet = quiet, verbose = verbose) # at verbose log level, turn on all tracing options implicitly for the # duration of the call if (verbose) { old_verbose <- options( rsconnect.http.trace = TRUE, rsconnect.http.trace.json = TRUE, rsconnect.error.trace = TRUE ) defer(options(old_verbose)) } # install error handler if requested if (isTRUE(getOption("rsconnect.error.trace"))) { old_error <- options(error = function(e) { cat("----- Deployment error -----\n") cat(geterrmessage(), "\n") cat("----- Error stack trace -----\n") traceback(x = sys.calls(), max.lines = 3) }) defer(options(old_error)) } # at verbose log level, generate header if (verbose) { logger("Deployment log started") cat("Deploy command:", "\n", deparse(sys.call(1)), "\n\n") cat("Session information: \n") print(utils::sessionInfo()) } # invoke pre-deploy hook if we have one runDeploymentHook(appDir, "rsconnect.pre.deploy", verbose = verbose) appFiles <- listDeploymentFiles(appDir, appFiles, appFileManifest) if (isTRUE(lint)) { lintResults <- lint(appDir, appFiles, appPrimaryDoc) showLintResults(appDir, lintResults) } if (!quiet) { cli::cli_rule("Preparing for deployment") } forceUpdate <- forceUpdate %||% getOption("rsconnect.force.update.apps") %||% fromIDE() # determine the target deployment record and deploying account recordPath <- findRecordPath(appDir, recordDir, appPrimaryDoc) target <- findDeploymentTarget( recordPath = recordPath, appId = appId, appName = appName, appTitle = appTitle, envVars = envVars, account = account, server = server, forceUpdate = forceUpdate ) accountDetails <- target$accountDetails deployment <- target$deployment if (is.null(deployment$appId)) { dest <- accountLabel(accountDetails$name, accountDetails$server) taskComplete(quiet, "Deploying {.val {deployment$name}} using {.val {dest}}") } else { dest <- accountLabel(accountDetails$name, accountDetails$server) taskComplete(quiet, "Re-deploying {.val {deployment$name}} using {.val {dest}}") } # Run checks prior to first saveDeployment() to avoid errors that will always # prevent a successful upload from generating a partial deployment if (!isCloudServer(accountDetails$server) && identical(upload, FALSE)) { # it is not possible to deploy to Connect without uploading stop("Posit Connect does not support deploying without uploading. ", "Specify upload=TRUE to upload and re-deploy your application.") } if (!isConnectServer(accountDetails$server) && length(envVars) > 1) { cli::cli_abort("{.arg envVars} only supported for Posit Connect servers") } client <- clientForAccount(accountDetails) if (verbose) { showCookies(serverInfo(accountDetails$server)$url) } isShinyappsServer <- isShinyappsServer(accountDetails$server) logger("Inferring App mode and parameters") appMetadata <- appMetadata( appDir = appDir, appFiles = appFiles, appPrimaryDoc = appPrimaryDoc, quarto = quarto, appMode = appMode, contentCategory = contentCategory, isShinyappsServer = isShinyappsServer, metadata = metadata ) if (is.null(deployment$appId)) { taskStart(quiet, "Creating application on server...") application <- client$createApplication( deployment$name, deployment$title, "shiny", accountDetails$accountId, appMetadata$appMode, contentCategory, space ) taskComplete(quiet, "Created application with id {.val {application$id}}") } else { taskStart(quiet, "Looking up application with id {.val {deployment$appId}}...") application <- tryCatch( { application <- client$getApplication(deployment$appId, deployment$version) taskComplete(quiet, "Found application {.url {application$url}}") if (identical(application$type, "static")) { application$application_id <- client$createRevision(application, contentCategory) } application }, rsconnect_http_404 = function(err) { application <- applicationDeleted(client, deployment, recordPath, appMetadata) taskComplete(quiet, "Created application with id {.val {application$id}}") application } ) } saveDeployment( recordPath, deployment = deployment, application = application, metadata = metadata ) # Change _visibility_ & set env vars before uploading contents if (needsVisibilityChange(accountDetails$server, application, appVisibility)) { taskStart(quiet, "Setting visibility to {appVisibility}...") client$setApplicationProperty( application$id, "application.visibility", appVisibility ) taskComplete(quiet, "Visibility updated") } if (length(deployment$envVars) > 0) { taskStart(quiet, "Updating environment variables {envVars}...") client$setEnvVars(application$guid, deployment$envVars) taskComplete(quiet, "Environment variables updated") } if (upload) { python <- getPythonForTarget(python, accountDetails) pythonConfig <- pythonConfigurator(python, forceGeneratePythonEnvironment) taskStart(quiet, "Bundling {length(appFiles)} file{?s}: {.file {appFiles}}") bundlePath <- bundleApp( appName = deployment$name, appDir = appDir, appFiles = appFiles, appMetadata = appMetadata, quiet = quiet, verbose = verbose, pythonConfig = pythonConfig, image = image, envManagement = envManagement, envManagementR = envManagementR, envManagementPy = envManagementPy ) size <- format(file_size(bundlePath), big.mark = ",") taskComplete(quiet, "Created {size}b bundle") # create, and upload the bundle taskStart(quiet, "Uploading bundle...") if (isCloudServer(accountDetails$server)) { bundle <- uploadCloudBundle(client, application$application_id, bundlePath) } else { bundle <- client$uploadApplication(application$id, bundlePath) } taskComplete(quiet, "Uploaded bundle with id {.val {bundle$id}}") saveDeployment( recordPath, deployment = deployment, application = application, bundleId = bundle$id, metadata = metadata ) } else { # redeploy current bundle bundle <- application$deployment$bundle } if (!quiet) { cli::cli_rule("Deploying to server") } task <- client$deployApplication(application, bundle$id, space) taskId <- if (is.null(task$task_id)) task$id else task$task_id # wait for the deployment to complete (will raise an error if it can't) response <- client$waitForTask(taskId, quiet) if (!quiet) { cli::cli_rule("Deployment complete") } # wait 1/10th of a second for any queued output get picked by RStudio # before emitting the final status, to ensure it's the last line the user sees Sys.sleep(0.10) deploymentSucceeded <- is.null(response$code) || response$code == 0 if (!quiet) { if (deploymentSucceeded) { cli::cli_alert_success("Successfully deployed to {.url {application$url}}") } else { cli::cli_alert_danger("Deployment failed with error: {response$error}") } } if (!quiet) openURL(client, application, launch.browser, on.failure, deploymentSucceeded) # invoke post-deploy hook if we have one if (deploymentSucceeded) { runDeploymentHook(appDir, "rsconnect.post.deploy", verbose = verbose) } logger("Deployment log finished") invisible(deploymentSucceeded) } taskStart <- function(quiet, message, .envir = caller_env()) { if (quiet) return() cli::cli_alert_info(message, .envir = .envir) } taskComplete <- function(quiet, message, .envir = caller_env()) { if (quiet) return() cli::cli_alert_success(message, .envir = .envir) } findRecordPath <- function(appDir, recordDir = NULL, appPrimaryDoc = NULL) { if (!is.null(recordDir)) { recordDir } else if (!is.null(appPrimaryDoc)) { file.path(appDir, appPrimaryDoc) } else { appDir } } # Need to set _before_ deploy needsVisibilityChange <- function(server, application, appVisibility = NULL) { if (is.null(appVisibility)) { return(FALSE) } if (isConnectServer(server)) { # Defaults to private visibility return(FALSE) } if (!isShinyappsServer(server)) { cli::cli_abort(c( "Can't change cloud app visiblity from {.fun deployApp}.", i = "Please change on posit.cloud instead." )) } cur <- application$deployment$properties$application.visibility if (is.null(cur)) { cur <- "public" } cur != appVisibility } runDeploymentHook <- function(appDir, option, verbose = FALSE) { hook <- getOption(option) if (!is.function(hook)) { return() } if (verbose) { cat("Invoking `", option, "` hook\n", sep = "") } hook(appDir) } applicationDeleted <- function(client, deployment, recordPath, appMetadata) { header <- "Failed to find existing application on server; it's probably been deleted." not_interactive <- c( i = "Use {.fn forgetDeployment} to remove outdated record and try again.", i = "Or use {.fn applications} to see other applications you have on the server." ) prompt <- "What do you want to do?" choices <- c( "Give up and try again later", "Delete existing deployment & create a new app" ) cli_menu(header, prompt, choices, not_interactive = not_interactive, quit = 1) # Must be option 2 path <- deploymentConfigFile( recordPath, deployment$name, deployment$account, deployment$server ) unlink(path) accountDetails <- accountInfo(deployment$account, deployment$server) client$createApplication( deployment$name, deployment$title, "shiny", accountDetails$accountId, appMetadata$appMode ) } # Does almost exactly the same work as writeManifest(), but called within # deployApp() instead of being exposed to the user. Returns the path to the # bundle directory, whereas writeManifest() returns nothing and deletes the # bundle directory after writing the manifest. bundleApp <- function(appName, appDir, appFiles, appMetadata, verbose = FALSE, quiet = FALSE, pythonConfig = NULL, image = NULL, envManagement = NULL, envManagementR = NULL, envManagementPy = NULL) { logger <- verboseLogger(verbose) # get application users (for non-document deployments) users <- NULL if (is.null(appMetadata$appPrimaryDoc)) { users <- suppressWarnings(authorizedUsers(appDir)) } # copy files to bundle dir to stage logger("Bundling app dir") bundleDir <- bundleAppDir( appDir = appDir, appFiles = appFiles, appPrimaryDoc = appMetadata$appPrimaryDoc) defer(unlink(bundleDir, recursive = TRUE)) # generate the manifest and write it into the bundle dir logger("Generate manifest.json") manifest <- createAppManifest( appDir = bundleDir, appMetadata = appMetadata, users = users, pythonConfig = pythonConfig, retainPackratDirectory = TRUE, image = image, envManagement = envManagement, envManagementR = envManagementR, envManagementPy = envManagementPy, verbose = verbose, quiet = quiet ) manifestJson <- toJSON(manifest) manifestPath <- file.path(bundleDir, "manifest.json") writeLines(manifestJson, manifestPath, useBytes = TRUE) # create the bundle and return its path logger("Compressing the bundle") bundlePath <- tempfile("rsconnect-bundle", fileext = ".tar.gz") writeBundle(bundleDir, bundlePath) bundlePath } validURL <- function(url) { !(is.null(url) || url == "") } openURL <- function(client, application, launch.browser, on.failure, deploymentSucceeded) { # function to browse to a URL using user-supplied browser (config or final) showURL <- function(url) { if (isTRUE(launch.browser)) utils::browseURL(url) else if (is.function(launch.browser)) launch.browser(url) } # Check to see if we should open config url or app url if (!is.null(client$configureApplication)) { config <- client$configureApplication(application$id) url <- config$config_url if (!deploymentSucceeded && validURL(config$logs_url)) { # With 1.5.5+, Connect application configuration includes # a logs URL to be shown on unsuccessful deployment. url <- config$logs_url } if (validURL(url)) { # Connect should always end up here, even on deployment failures if (deploymentSucceeded) { showURL(url) } else if (is.function(on.failure)) { on.failure(url) } } } else if (deploymentSucceeded) { # shinyapps.io should land here if things succeeded showURL(application$url) } else if (is.function(on.failure)) { on.failure(NULL) } # or open no url if things failed } runStartupScripts <- function(appDir, quiet = FALSE, verbose = FALSE) { scripts <- c( # the site-wide startup script file.path(R.home("etc"), "rsconnect.site"), # the user startup script path.expand("~/.rsconnect_profile"), # a startup script specific to this application file.path(appDir, ".rsconnect_profile") ) scripts <- scripts[file.exists(scripts)] # iterate over the startup scripts for (script in scripts) { taskStart(quiet, "Running {script}") env <- new_environment(parent = globalenv()) source(script, verbose = verbose, local = env) } } rsconnect/R/envvars.R0000644000176200001440000000466614513230050014265 0ustar liggesusers#' Maintain environment variables across multiple applications #' #' @description #' * `listAccountEnvVars()` lists the environment variables used by #' every application published to the specified account. #' * `updateAccountEnvVars()` updates the specified environment variables with #' their current values for every app that uses them. #' #' Secure environment variable are currently only supported by Posit Connect #' so other server types will generate an error. #' #' @inheritParams deployApp #' @export #' @return `listAccountEnvVars()` returns a data frame with one row #' for each data frame. It has variables `id`, `guid`, `name`, and #' `envVars`. `envVars` is a list-column. listAccountEnvVars <- function(server = NULL, account = NULL) { accountDetails <- accountInfo(account, server) checkServerHasEnvVars(accountDetails$server) apps <- applications( account = accountDetails$name, server = accountDetails$server ) apps <- apps[c("id", "guid", "name")] client <- clientForAccount(accountDetails) envVars <- lapply(apps$guid, client$getEnvVars) apps$envVars <- envVars apps } #' @export #' @rdname listAccountEnvVars #' @param envVars Names of environment variables to update. Their #' values will be automatically retrieved from the current process. #' #' If you specify multiple environment variables, any application that #' uses any of them will be updated with all of them. updateAccountEnvVars <- function(envVars, server = NULL, account = NULL) { check_character(envVars) accountDetails <- accountInfo(account, server) checkServerHasEnvVars(accountDetails$server) apps <- listAccountEnvVars( account = accountDetails$name, server = accountDetails$server ) uses_vars <- vapply(apps$envVars, function(x) any(envVars %in% x), logical(1)) if (!any(uses_vars)) { cli::cli_abort("No applications use environment variable{?s} {.arg {envVars}}") } guids <- apps$guid[uses_vars] cli::cli_progress_bar("Updating application...", total = length(guids)) client <- clientForAccount(accountDetails) for (guid in guids) { client$setEnvVars(guid, envVars) cli::cli_progress_update() } } # Helpers ----------------------------------------------------------------- checkServerHasEnvVars <- function(server, error_call = caller_env()) { if (isConnectServer(server)) { return() } cli::cli_abort( "The {.arg server} {.str server} does not support environment variables" ) } rsconnect/R/client-cloud.R0000644000176200001440000003171414513230050015155 0ustar liggesusers# Docs: https://build.posit.it/job/hostedapps/job/lucid-pipeline/job/main/API/ getCurrentProjectId <- function(service, authInfo) { currentApplicationId <- Sys.getenv("LUCID_APPLICATION_ID") if (currentApplicationId != "") { path <- paste0("/applications/", currentApplicationId) current_application <- GET(service, authInfo, path) return(current_application$content_id) } } cloudClient <- function(service, authInfo) { list( status = function() { GET(service, authInfo, "/internal/status") }, service = function() { "posit.cloud" }, currentUser = function() { GET(service, authInfo, "/users/current/") }, accountsForUser = function(userId) { path <- "/accounts/" query <- "" listRequest(service, authInfo, path, query, "accounts") }, getAccountUsage = function(accountId, usageType = "hours", applicationId = NULL, from = NULL, until = NULL, interval = NULL) { path <- paste0("/accounts/", accountId, "/usage/", usageType, "/") query <- list() if (!is.null(applicationId)) query$application <- applicationId if (!is.null(from)) query$from <- from if (!is.null(until)) query$until <- until if (!is.null(interval)) query$interval <- interval GET(service, authInfo, path, queryString(query)) }, getBundle = function(bundleId) { path <- paste0("/bundles/", bundleId) GET(service, authInfo, path) }, updateBundleStatus = function(bundleId, status) { path <- paste0("/bundles/", bundleId, "/status") json <- list() json$status <- status POST_JSON(service, authInfo, path, json) }, createBundle = function(application, content_type, content_length, checksum) { json <- list() json$application <- application json$content_type <- content_type json$content_length <- content_length json$checksum <- checksum POST_JSON(service, authInfo, "/bundles", json) }, listApplications = function(accountId, filters = list()) { path <- "/applications/" query <- paste(filterQuery( c("account_id", "type", names(filters)), c(accountId, "connect", unname(filters)) ), collapse = "&") listRequest(service, authInfo, path, query, "applications") }, getApplication = function(outputOrApplicationId, deploymentRecordVersion) { # The IDE doesn't know whether the id is for a content or an application, so we # support both. if (is.na(deploymentRecordVersion)) { # In pre-versioned dcf files, outputOrApplicationId is the id of the application. # TODO: consider removing support for this case a year after the release of 1.0.0 path <- paste0("/applications/", outputOrApplicationId) application <- GET(service, authInfo, path) output_id <- application$output_id %||% application$content_id path <- paste0("/outputs/", output_id) output <- GET(service, authInfo, path) } else if (deploymentRecordVersion == "unknown") { handleError <- function(err) { path <- paste0("/applications/", outputOrApplicationId) application <- GET(service, authInfo, path) output_id <- application$output_id %||% application$content_id path <- paste0("/outputs/", output_id) output <- GET(service, authInfo, path) list(application = application, output = output) } applicationAndOutput <- tryCatch( { path <- paste0("/outputs/", outputOrApplicationId) output <- GET(service, authInfo, path) path <- paste0("/applications/", output$source_id) application <- GET(service, authInfo, path) list(application = application, output = output) }, rsconnect_http_403 = handleError, rsconnect_http_404 = handleError ) application <- applicationAndOutput$application output <- applicationAndOutput$output } else { # from dcf version >= 1, outputOrApplicationId is the id of the output. path <- paste0("/outputs/", outputOrApplicationId) output <- GET(service, authInfo, path) path <- paste0("/applications/", output$source_id) application <- GET(service, authInfo, path) application } # if the output is trashed or archived, restore it to the active state if (output$state == "trashed" || output$state == "archived") { json <- list() json$state <- "active" PATCH_JSON(service, authInfo, paste0("/outputs/", output$id), json) } # Each redeployment of a static output creates a new application. Since # those applications can be deleted, it's more reliable to reference # outputs by their own id instead of the applications'. application$application_id <- application$id application$id <- output$id application$url <- output$url application$name <- output$name application }, getApplicationMetrics = function(applicationId, series, metrics, from = NULL, until = NULL, interval = NULL) { path <- paste0("/applications/", applicationId, "/metrics/", series, "/") query <- list() m <- paste(lapply(metrics, function(x) { paste("metric", urlEncode(x), sep = "=") }), collapse = "&") if (!is.null(from)) query$from <- from if (!is.null(until)) query$until <- until if (!is.null(interval)) query$interval <- interval GET(service, authInfo, path, paste(m, queryString(query), sep = "&")) }, getLogs = function(applicationId, entries = 50) { path <- paste0("/applications/", applicationId, "/logs") query <- paste0("count=", entries, "&tail=0") GET(service, authInfo, path, query) }, createApplication = function(name, title, template, accountId, appMode, contentCategory = NULL, spaceId = NULL) { json <- list() json$name <- name json$application_type <- if (appMode %in% c("rmd-static", "quarto-static", "static")) "static" else "connect" if (appMode %in% c("rmd-static", "quarto-static")) { json$render_by <- "server" } currentProjectId <- getCurrentProjectId(service, authInfo) # in case the source cloud project is a temporary copy, there is no # content id. The output will be published without a space id. if (!is.null(currentProjectId)) { json$project <- currentProjectId path <- paste0("/content/", currentProjectId) currentProject <- GET(service, authInfo, path) json$space <- currentProject$space_id } json$content_category <- contentCategory if (is.null(currentProjectId) && !is.null(spaceId)) { json$space <- spaceId } output <- POST_JSON(service, authInfo, "/outputs", json) path <- paste0("/applications/", output$source_id) application <- GET(service, authInfo, path) list( id = output$id, application_id = application$id, url = output$url ) }, listApplicationProperties = function(applicationId) { path <- paste0("/applications/", applicationId, "/properties/") GET(service, authInfo, path) }, setApplicationProperty = function(applicationId, propertyName, propertyValue, force = FALSE) { path <- paste0("/applications/", applicationId, "/properties/", propertyName) v <- list() v$value <- propertyValue query <- paste0("force=", if (force) "1" else "0") PUT_JSON(service, authInfo, path, v, query) }, unsetApplicationProperty = function(applicationId, propertyName, force = FALSE) { path <- paste0("/applications/", applicationId, "/properties/", propertyName) query <- paste0("force=", if (force) "1" else "0") DELETE(service, authInfo, path, query) }, uploadApplication = function(applicationId, bundlePath) { path <- paste0("/applications/", applicationId, "/upload") POST( service, authInfo, path, contentType = "application/x-gzip", file = bundlePath ) }, createRevision = function(application, contentCategory) { path <- paste0("/outputs/", application$id, "/revisions") json <- list(content_category = contentCategory) revision <- POST_JSON(service, authInfo, path, json) revision$application_id }, deployApplication = function(application, bundleId = NULL, spaceId = NULL) { currentProjectId <- getCurrentProjectId(service, authInfo) if (!is.null(currentProjectId)) { PATCH_JSON(service, authInfo, paste0("/outputs/", application$id), list(project = currentProjectId)) } if (!is.null(spaceId)) { PATCH_JSON(service, authInfo, paste0("/outputs/", application$id), list(space = spaceId)) } path <- paste0("/applications/", application$application_id, "/deploy") json <- list() if (length(bundleId) > 0 && nzchar(bundleId)) json$bundle <- as.numeric(bundleId) else json$rebuild <- FALSE POST_JSON(service, authInfo, path, json) }, terminateApplication = function(applicationId) { path <- paste0("/applications/", applicationId, "/terminate") POST(service, authInfo, path) }, purgeApplication = function(applicationId) { path <- paste0("/applications/", applicationId, "/purge") POST(service, authInfo, path) }, inviteApplicationUser = function(applicationId, email, invite_email = NULL, invite_email_message = NULL) { path <- paste0("/applications/", applicationId, "/authorization/users") json <- list() json$email <- email if (!is.null(invite_email)) json$invite_email <- invite_email if (!is.null(invite_email_message)) json$invite_email_message <- invite_email_message POST_JSON(service, authInfo, path, json) }, addApplicationUser = function(applicationId, userId) { path <- paste0("/applications/", applicationId, "/authorization/users/", userId) PUT(service, authInfo, path, NULL) }, removeApplicationUser = function(applicationId, userId) { path <- paste0("/applications/", applicationId, "/authorization/users/", userId) DELETE(service, authInfo, path) }, listApplicationAuthorization = function(applicationId) { path <- paste0("/applications/", applicationId, "/authorization") listRequest(service, authInfo, path, NULL, "authorization") }, listApplicationUsers = function(applicationId) { path <- paste0("/applications/", applicationId, "/authorization/users") listRequest(service, authInfo, path, NULL, "users") }, listApplicationGroups = function(applicationId) { path <- paste0("/applications/", applicationId, "/authorization/groups") listRequest(service, authInfo, path, NULL, "groups") }, listApplicationInvitations = function(applicationId) { path <- "/invitations/" query <- paste(filterQuery("app_id", applicationId), collapse = "&") listRequest(service, authInfo, path, query, "invitations") }, listTasks = function(accountId, filters = NULL) { if (is.null(filters)) { filters <- vector() } path <- "/tasks/" filters <- c(filterQuery("account_id", accountId), filters) query <- paste(filters, collapse = "&") listRequest(service, authInfo, path, query, "tasks", max = 100) }, getTaskInfo = function(taskId) { path <- paste0("/tasks/", taskId) GET(service, authInfo, path) }, getTaskLogs = function(taskId) { path <- paste0("/tasks/", taskId, "/logs/") GET(service, authInfo, path) }, waitForTask = function(taskId, quiet = FALSE) { if (!quiet) { cat("Waiting for task: ", taskId, "\n", sep = "") } path <- paste0("/tasks/", taskId) lastStatus <- NULL while (TRUE) { # check status status <- GET(service, authInfo, path) # display status to the user if it changed if (!identical(lastStatus, status$description)) { if (!quiet) cat(" ", status$status, ": ", status$description, "\n", sep = "") lastStatus <- status$description } # are we finished? (note: this codepath is the only way to exit this function) if (status$finished) { if (identical(status$status, "success")) { return(NULL) } else { # always show task log on error cli::cat_rule("Begin Task Log", line = "#") taskLog(taskId, authInfo$name, authInfo$server, output = "stderr") cli::cat_rule("End Task Log", line = "#") stop(status$error, call. = FALSE) } } # wait for 1 second before polling again Sys.sleep(1) } } ) } rsconnect/R/bundlePackage.R0000644000176200001440000001043114513230050015311 0ustar liggesusersbundlePackages <- function(bundleDir, extraPackages = character(), quiet = FALSE, verbose = FALSE, error_call = caller_env()) { deps <- computePackageDependencies( bundleDir, extraPackages, quiet = quiet, verbose = verbose ) if (nrow(deps) == 0) { return(list()) } checkBundlePackages(deps, call = error_call) # Manifest packages used to generate packrat file on Connect # https://github.com/rstudio/connect/blob/v2023.03.0/src/connect/manifest/convert.go#L261-L320 packages_list <- lapply(seq_len(nrow(deps)), function(i) { out <- as.list(deps[i, , drop = FALSE]) out$description <- out$description[[1]] out$Package <- NULL out$Version <- NULL out }) names(packages_list) <- deps$Package packages_list } usePackrat <- function() { # Use RSCONNECT_PACKRAT when it has any value; fall-back to rsconnect.packrat when the environment # variable is unset. value <- Sys.getenv("RSCONNECT_PACKRAT", unset = NA) if (is.na(value)) { value <- getOption("rsconnect.packrat", default = FALSE) } return(truthy(value)) } computePackageDependencies <- function(bundleDir, extraPackages = character(), quiet = FALSE, verbose = FALSE) { if (usePackrat()) { taskStart(quiet, "Capturing R dependencies with packrat") # Remove renv.lock so the packrat call to renv::dependencies does not report an implicit renv # dependency. Mirrors rsconnect before 1.0.0, which did not include renv.lock in bundles. # https://github.com/rstudio/rsconnect/blob/v0.8.29/R/bundle.R#L96 removeRenv(bundleDir) deps <- snapshotPackratDependencies(bundleDir, extraPackages, verbose = verbose) } else if (file.exists(renvLockFile(bundleDir))) { # This ignores extraPackages; if you're using a lockfile it's your # responsibility to install any other packages you need taskStart(quiet, "Capturing R dependencies from renv.lock") deps <- parseRenvDependencies(bundleDir) # Once we've captured the deps, we can remove the renv directory # from the bundle (retaining the renv.lock). removeRenv(bundleDir, lockfile = FALSE) } else { taskStart(quiet, "Capturing R dependencies with renv") # TODO: give user option to choose between implicit and explicit deps <- snapshotRenvDependencies(bundleDir, extraPackages, verbose = verbose) } taskComplete(quiet, "Found {nrow(deps)} dependenc{?y/ies}") deps } checkBundlePackages <- function(deps, call = caller_env()) { unknown_source <- is.na(deps$Source) if (any(unknown_source)) { pkgs <- deps$Package[unknown_source] cli::cli_abort( c( "All packages must be installed from a reproducible location.", x = "Can't re-install packages installed from source: {.pkg {pkgs}}.", i = "See {.fun rsconnect::appDependencies} for more details." ), call = call ) } } manifestPackageColumns <- function(df) { # Fields defined in https://bit.ly/42CbD4P # Most fields are retrieved from the complete embedded description. # shinyapps.io needs GitHub fields for backward compatibility github_cols <- grep("^Github", names(df), perl = TRUE, value = TRUE) intersect( c("Package", "Version", "Source", "Repository", github_cols), names(df) ) } availablePackages <- function(repos) { # read available.packages filters (allow user to override if necessary; # this is primarily to allow debugging) # # note that we explicitly exclude the "R_version" filter as we want to ensure # that packages which require newer versions of R than the one currently # in use can still be marked as available on CRAN -- for example, currently # the package "foreign" requires "R (>= 4.0.0)" but older versions of R # can still successfully install older versions from the CRAN archive filters <- c( getOption("rsconnect.available_packages_filters", default = c()), "duplicates" ) available.packages( repos = repos, type = "source", filters = filters ) } package_record <- function(name, lib_dir = NULL) { record <- packageDescription(name, lib.loc = lib_dir, encoding = "UTF-8") unclass(record) } rsconnect/R/import-standalone-types-check.R0000644000176200001440000002475414513230050020456 0ustar liggesusers# Standalone file: do not edit by hand # Source: # ---------------------------------------------------------------------- # # --- # repo: r-lib/rlang # file: standalone-types-check.R # last-updated: 2022-10-07 # license: https://unlicense.org # dependencies: standalone-obj-type.R # --- # # ## Changelog # # 2022-10-07: # - `check_number_whole()` and `_decimal()` no longer treat # non-numeric types such as factors or dates as numbers. Numeric # types are detected with `is.numeric()`. # # 2022-10-04: # - Added `check_name()` that forbids the empty string. # `check_string()` allows the empty string by default. # # 2022-09-28: # - Removed `what` arguments. # - Added `allow_na` and `allow_null` arguments. # - Added `allow_decimal` and `allow_infinite` arguments. # - Improved errors with absent arguments. # # # 2022-09-16: # - Unprefixed usage of rlang functions with `rlang::` to # avoid onLoad issues when called from rlang (#1482). # # 2022-08-11: # - Added changelog. # # nocov start # Scalars ----------------------------------------------------------------- check_bool <- function(x, ..., allow_na = FALSE, allow_null = FALSE, arg = caller_arg(x), call = caller_env()) { if (!missing(x)) { if (is_bool(x)) { return(invisible(NULL)) } if (allow_null && is_null(x)) { return(invisible(NULL)) } if (allow_na && identical(x, NA)) { return(invisible(NULL)) } } stop_input_type( x, c("`TRUE`", "`FALSE`"), ..., allow_na = allow_na, allow_null = allow_null, arg = arg, call = call ) } check_string <- function(x, ..., allow_empty = TRUE, allow_na = FALSE, allow_null = FALSE, arg = caller_arg(x), call = caller_env()) { if (!missing(x)) { is_string <- .rlang_check_is_string( x, allow_empty = allow_empty, allow_na = allow_na, allow_null = allow_null ) if (is_string) { return(invisible(NULL)) } } stop_input_type( x, "a single string", ..., allow_na = allow_na, allow_null = allow_null, arg = arg, call = call ) } .rlang_check_is_string <- function(x, allow_empty, allow_na, allow_null) { if (is_string(x)) { if (allow_empty || !is_string(x, "")) { return(TRUE) } } if (allow_null && is_null(x)) { return(TRUE) } if (allow_na && (identical(x, NA) || identical(x, na_chr))) { return(TRUE) } FALSE } check_name <- function(x, ..., allow_null = FALSE, arg = caller_arg(x), call = caller_env()) { if (!missing(x)) { is_string <- .rlang_check_is_string( x, allow_empty = FALSE, allow_na = FALSE, allow_null = allow_null ) if (is_string) { return(invisible(NULL)) } } stop_input_type( x, "a valid name", ..., allow_na = FALSE, allow_null = allow_null, arg = arg, call = call ) } check_number_decimal <- function(x, ..., min = -Inf, max = Inf, allow_infinite = TRUE, allow_na = FALSE, allow_null = FALSE, arg = caller_arg(x), call = caller_env()) { .rlang_types_check_number( x, ..., min = min, max = max, allow_decimal = TRUE, allow_infinite = allow_infinite, allow_na = allow_na, allow_null = allow_null, arg = arg, call = call ) } check_number_whole <- function(x, ..., min = -Inf, max = Inf, allow_na = FALSE, allow_null = FALSE, arg = caller_arg(x), call = caller_env()) { .rlang_types_check_number( x, ..., min = min, max = max, allow_decimal = FALSE, allow_infinite = FALSE, allow_na = allow_na, allow_null = allow_null, arg = arg, call = call ) } .rlang_types_check_number <- function(x, ..., min = -Inf, max = Inf, allow_decimal = FALSE, allow_infinite = FALSE, allow_na = FALSE, allow_null = FALSE, arg = caller_arg(x), call = caller_env()) { if (allow_decimal) { what <- "a number" } else { what <- "a whole number" } .stop <- function(x, what, ...) stop_input_type( x, what, ..., allow_na = allow_na, allow_null = allow_null, arg = arg, call = call ) if (!missing(x)) { is_number <- is_number( x, allow_decimal = allow_decimal, allow_infinite = allow_infinite ) if (is_number) { if (min > -Inf && max < Inf) { what <- sprintf("a number between %s and %s", min, max) } else { what <- NULL } if (x < min) { what <- what %||% sprintf("a number larger than %s", min) .stop(x, what, ...) } if (x > max) { what <- what %||% sprintf("a number smaller than %s", max) .stop(x, what, ...) } return(invisible(NULL)) } if (allow_null && is_null(x)) { return(invisible(NULL)) } if (allow_na && (identical(x, NA) || identical(x, na_dbl) || identical(x, na_int))) { return(invisible(NULL)) } } .stop(x, what, ...) } is_number <- function(x, allow_decimal = FALSE, allow_infinite = FALSE) { if (!typeof(x) %in% c("integer", "double")) { return(FALSE) } if (!is.numeric(x)) { return(FALSE) } if (length(x) != 1) { return(FALSE) } if (is.na(x)) { return(FALSE) } if (!allow_decimal && !is_integerish(x)) { return(FALSE) } if (!allow_infinite && is.infinite(x)) { return(FALSE) } TRUE } check_symbol <- function(x, ..., allow_null = FALSE, arg = caller_arg(x), call = caller_env()) { if (!missing(x)) { if (is_symbol(x)) { return(invisible(NULL)) } if (allow_null && is_null(x)) { return(invisible(NULL)) } } stop_input_type( x, "a symbol", ..., allow_null = allow_null, arg = arg, call = call ) } check_arg <- function(x, ..., allow_null = FALSE, arg = caller_arg(x), call = caller_env()) { if (!missing(x)) { if (is_symbol(x)) { return(invisible(NULL)) } if (allow_null && is_null(x)) { return(invisible(NULL)) } } stop_input_type( x, "an argument name", ..., allow_null = allow_null, arg = arg, call = call ) } check_call <- function(x, ..., allow_null = FALSE, arg = caller_arg(x), call = caller_env()) { if (!missing(x)) { if (is_call(x)) { return(invisible(NULL)) } if (allow_null && is_null(x)) { return(invisible(NULL)) } } stop_input_type( x, "a defused call", ..., allow_null = allow_null, arg = arg, call = call ) } check_environment <- function(x, ..., allow_null = FALSE, arg = caller_arg(x), call = caller_env()) { if (!missing(x)) { if (is_environment(x)) { return(invisible(NULL)) } if (allow_null && is_null(x)) { return(invisible(NULL)) } } stop_input_type( x, "an environment", ..., allow_null = allow_null, arg = arg, call = call ) } check_function <- function(x, ..., allow_null = FALSE, arg = caller_arg(x), call = caller_env()) { if (!missing(x)) { if (is_function(x)) { return(invisible(NULL)) } if (allow_null && is_null(x)) { return(invisible(NULL)) } } stop_input_type( x, "a function", ..., allow_null = allow_null, arg = arg, call = call ) } check_closure <- function(x, ..., allow_null = FALSE, arg = caller_arg(x), call = caller_env()) { if (!missing(x)) { if (is_closure(x)) { return(invisible(NULL)) } if (allow_null && is_null(x)) { return(invisible(NULL)) } } stop_input_type( x, "an R function", ..., allow_null = allow_null, arg = arg, call = call ) } check_formula <- function(x, ..., allow_null = FALSE, arg = caller_arg(x), call = caller_env()) { if (!missing(x)) { if (is_formula(x)) { return(invisible(NULL)) } if (allow_null && is_null(x)) { return(invisible(NULL)) } } stop_input_type( x, "a formula", ..., allow_null = allow_null, arg = arg, call = call ) } # Vectors ----------------------------------------------------------------- check_character <- function(x, ..., allow_null = FALSE, arg = caller_arg(x), call = caller_env()) { if (!missing(x)) { if (is_character(x)) { return(invisible(NULL)) } if (allow_null && is_null(x)) { return(invisible(NULL)) } } stop_input_type( x, "a character vector", ..., allow_null = allow_null, arg = arg, call = call ) } # nocov end rsconnect/R/utils-cli.R0000644000176200001440000000323014513230050014470 0ustar liggesusers# https://github.com/r-lib/cli/issues/228 --------------------------------- simulate_user_input <- function(x, env = caller_env()) { withr::local_options( rlang_interactive = TRUE, cli_prompt = as.character(x), .local_envir = env ) } cli_menu <- function(header, prompt, choices, not_interactive = choices, quit = integer(), .envir = caller_env(), error_call = caller_env()) { if (!is_interactive()) { cli::cli_abort( c(header, not_interactive), .envir = .envir, call = error_call ) } choices <- paste0(cli::style_bold(seq_along(choices)), ": ", choices) cli::cli_inform( c(header, prompt, choices), .envir = .envir ) repeat { selected <- cli_readline("Selection: ") if (selected %in% c("0", seq_along(choices))) { break } cli::cli_inform( "Type a number between 1 and {length(choices)}, or type 0 to exit." ) } selected <- as.integer(selected) if (selected %in% c(0, quit)) { if (is_testing()) { cli::cli_abort("Quitting...", call = NULL) } else { cli::cli_alert_danger("Quitting...") # simulate user pressing Ctrl + C invokeRestart("abort", cnd) } } selected } cli_readline <- function(prompt) { testing <- getOption("cli_prompt", character()) if (length(testing) > 0) { selected <- testing[[1]] cli::cli_inform(paste0(prompt, selected)) options(cli_prompt = testing[-1]) selected } else { readline(prompt) } } is_testing <- function() { identical(Sys.getenv("TESTTHAT"), "true") } rsconnect/R/client-shinyapps.R0000644000176200001440000002242214513230050016061 0ustar liggesusersshinyAppsClient <- function(service, authInfo) { list( status = function() { GET(service, authInfo, "/internal/status") }, service = function() { "shinyapps.io" }, currentUser = function() { GET(service, authInfo, "/users/current/") }, accountsForUser = function(userId) { path <- "/accounts/" query <- "" listRequest(service, authInfo, path, query, "accounts") }, getAccountUsage = function(accountId, usageType = "hours", applicationId = NULL, from = NULL, until = NULL, interval = NULL) { path <- paste("/accounts/", accountId, "/usage/", usageType, "/", sep = "") query <- list() if (!is.null(applicationId)) query$application <- applicationId if (!is.null(from)) query$from <- from if (!is.null(until)) query$until <- until if (!is.null(interval)) query$interval <- interval GET(service, authInfo, path, queryString(query)) }, getBundle = function(bundleId) { path <- paste("/bundles/", bundleId, sep = "") GET(service, authInfo, path) }, updateBundleStatus = function(bundleId, status) { path <- paste("/bundles/", bundleId, "/status", sep = "") json <- list() json$status <- status POST_JSON(service, authInfo, path, json) }, createBundle = function(application, content_type, content_length, checksum) { json <- list() json$application <- application json$content_type <- content_type json$content_length <- content_length json$checksum <- checksum POST_JSON(service, authInfo, "/bundles", json) }, listApplications = function(accountId, filters = list()) { path <- "/applications/" query <- paste(filterQuery( c("account_id", "type", names(filters)), c(accountId, "shiny", unname(filters)) ), collapse = "&") listRequest(service, authInfo, path, query, "applications") }, getApplication = function(applicationId, deploymentRecordVersion) { path <- paste("/applications/", applicationId, sep = "") application <- GET(service, authInfo, path) application$application_id <- application$id application }, getApplicationMetrics = function(applicationId, series, metrics, from = NULL, until = NULL, interval = NULL) { path <- paste("/applications/", applicationId, "/metrics/", series, "/", sep = "") query <- list() m <- paste(lapply(metrics, function(x) { paste("metric", urlEncode(x), sep = "=") }), collapse = "&") if (!is.null(from)) query$from <- from if (!is.null(until)) query$until <- until if (!is.null(interval)) query$interval <- interval GET(service, authInfo, path, paste(m, queryString(query), sep = "&")) }, getLogs = function(applicationId, entries = 50) { path <- paste0("/applications/", applicationId, "/logs") query <- paste0("count=", entries, "&tail=0") GET(service, authInfo, path, query) }, createApplication = function(name, title, template, accountId, appMode, contentCategory = NULL, spaceId = NULL) { json <- list() json$name <- name # the title field is only used on connect json$template <- template json$account <- as.numeric(accountId) application <- POST_JSON(service, authInfo, "/applications/", json) list( id = application$id, application_id = application$id, url = application$url ) }, listApplicationProperties = function(applicationId) { path <- paste("/applications/", applicationId, "/properties/", sep = "") GET(service, authInfo, path) }, setApplicationProperty = function(applicationId, propertyName, propertyValue, force = FALSE) { path <- paste("/applications/", applicationId, "/properties/", propertyName, sep = "") v <- list() v$value <- propertyValue query <- paste("force=", if (force) "1" else "0", sep = "") PUT_JSON(service, authInfo, path, v, query) }, unsetApplicationProperty = function(applicationId, propertyName, force = FALSE) { path <- paste("/applications/", applicationId, "/properties/", propertyName, sep = "") query <- paste("force=", if (force) "1" else "0", sep = "") DELETE(service, authInfo, path, query) }, uploadApplication = function(applicationId, bundlePath) { path <- paste("/applications/", applicationId, "/upload", sep = "") POST( service, authInfo, path, contentType = "application/x-gzip", file = bundlePath ) }, deployApplication = function(application, bundleId = NULL, spaceId = NULL) { path <- paste("/applications/", application$id, "/deploy", sep = "") json <- list() if (length(bundleId) > 0 && nzchar(bundleId)) json$bundle <- as.numeric(bundleId) else json$rebuild <- FALSE POST_JSON(service, authInfo, path, json) }, terminateApplication = function(applicationId) { path <- paste("/applications/", applicationId, "/terminate", sep = "") POST(service, authInfo, path) }, purgeApplication = function(applicationId) { path <- paste("/applications/", applicationId, "/purge", sep = "") POST(service, authInfo, path) }, inviteApplicationUser = function(applicationId, email, invite_email = NULL, invite_email_message = NULL) { path <- paste("/applications/", applicationId, "/authorization/users", sep = "") json <- list() json$email <- email if (!is.null(invite_email)) json$invite_email <- invite_email if (!is.null(invite_email_message)) json$invite_email_message <- invite_email_message POST_JSON(service, authInfo, path, json) }, addApplicationUser = function(applicationId, userId) { path <- paste("/applications/", applicationId, "/authorization/users/", userId, sep = "") PUT(service, authInfo, path, NULL) }, removeApplicationUser = function(applicationId, userId) { path <- paste("/applications/", applicationId, "/authorization/users/", userId, sep = "") DELETE(service, authInfo, path, NULL) }, listApplicationAuthorization = function(applicationId) { path <- paste("/applications/", applicationId, "/authorization", sep = "") listRequest(service, authInfo, path, NULL, "authorization") }, listApplicationUsers = function(applicationId) { path <- paste("/applications/", applicationId, "/authorization/users", sep = "") listRequest(service, authInfo, path, NULL, "users") }, listApplicationGroups = function(applicationId) { path <- paste("/applications/", applicationId, "/authorization/groups", sep = "") listRequest(service, authInfo, path, NULL, "groups") }, listApplicationInvitations = function(applicationId) { path <- "/invitations/" query <- paste(filterQuery("app_id", applicationId), collapse = "&") listRequest(service, authInfo, path, query, "invitations") }, resendApplicationInvitation = function(invitationId, regenerate = FALSE) { path <- paste("/invitations/", invitationId, "/send", sep = "") json <- list() json$regenerate <- regenerate POST_JSON(service, authInfo, path, json) }, listTasks = function(accountId, filters = NULL) { if (is.null(filters)) { filters <- vector() } path <- "/tasks/" filters <- c(filterQuery("account_id", accountId), filters) query <- paste(filters, collapse = "&") listRequest(service, authInfo, path, query, "tasks", max = 100) }, getTaskInfo = function(taskId) { path <- paste("/tasks/", taskId, sep = "") GET(service, authInfo, path) }, getTaskLogs = function(taskId) { path <- paste("/tasks/", taskId, "/logs/", sep = "") GET(service, authInfo, path) }, waitForTask = function(taskId, quiet = FALSE) { if (!quiet) { cat("Waiting for task: ", taskId, "\n", sep = "") } path <- paste("/tasks/", taskId, sep = "") lastStatus <- NULL while (TRUE) { # check status status <- GET(service, authInfo, path) # display status to the user if it changed if (!identical(lastStatus, status$description)) { if (!quiet) cat(" ", status$status, ": ", status$description, "\n", sep = "") lastStatus <- status$description } # are we finished? (note: this codepath is the only way to exit this function) if (status$finished) { if (identical(status$status, "success")) { return(NULL) } else { # always show task log on error cli::cat_rule("Begin Task Log", line = "#") taskLog(taskId, authInfo$name, authInfo$server, output = "stderr") cli::cat_rule("End Task Log", line = "#") stop(status$error, call. = FALSE) } } # wait for 1 second before polling again Sys.sleep(1) } } ) } rsconnect/R/deployments.R0000644000176200001440000002167014522164250015146 0ustar liggesusers#' List Application Deployments #' #' List deployment records for a given application. #' @param appPath The path to the content that was deployed, either a directory #' or an individual document. #' @param nameFilter Return only deployments matching the given name (optional) #' @param accountFilter Return only deployments matching the given account #' (optional) #' @param serverFilter Return only deployments matching the given server #' (optional) #' @param excludeOrphaned If `TRUE` (the default), return only deployments #' made by a currently registered account. Deployments made from accounts that #' are no longer registered (via e.g.[removeAccount()]) will not be #' returned. #' @return #' Returns a data frame with at least following columns: #' \tabular{ll}{ #' `name` \tab Name of deployed application\cr #' `account` \tab Account owning deployed application\cr #' `bundleId` \tab Identifier of deployed application's bundle\cr #' `url` \tab URL of deployed application\cr #' `deploymentFile` \tab Name of configuration file\cr #' } #' #' If additional metadata has been saved with the deployment record using the #' `metadata` argument to [deployApp()], the frame will include #' additional columns. #' #' @examples #' \dontrun{ #' #' # Return all deployments of the ~/r/myapp directory made with the 'abc' #' # account #' deployments("~/r/myapp", accountFilter="abc") #' } #' @seealso [applications()] to get a list of deployments from the #' server, and [deployApp()] to create a new deployment. #' @export deployments <- function(appPath = ".", nameFilter = NULL, accountFilter = NULL, serverFilter = NULL, excludeOrphaned = TRUE) { migrateDeploymentsConfig(appPath) paths <- deploymentConfigFiles(appPath) dcf <- lapply(paths, read.dcf) dcf <- lapply(dcf, as.data.frame, stringsAsFactors = FALSE) deployments <- rbind_fill(dcf, deploymentFields) deployments$deploymentFile <- paths # Apply filters ok <- rep(TRUE, nrow(deployments)) if (!is.null(nameFilter)) { ok <- ok & deployments$name == nameFilter } if (!is.null(accountFilter)) { ok <- ok & deployments$account == accountFilter } if (!is.null(serverFilter)) { ok <- ok & deployments$server == serverFilter } if (excludeOrphaned) { activeAccounts <- accounts() activeAccountServers <- paste0(activeAccounts$server, "@", activeAccounts$name) accountServer <- paste0(deployments$server, "@", deployments$account) okServer <- isRPubs(deployments$server) | accountServer %in% activeAccountServers ok <- ok & okServer } deployments$envVars[is.na(deployments$envVars)] <- "" if (is.character(deployments$envVars)) { deployments$envVars <- strsplit(deployments$envVars, ", ") } deployments[ok, , drop = FALSE] } deploymentFields <- c( "name", "title", "username", "account", "server", "hostUrl", "appId", "bundleId", "url", "envVars", "version" ) deploymentRecordVersion <- 1L # Save a deployment record to disk using an incoming record (which may or may # not correspond to an existing on-disk deployment record). Created by # deploymentRecord() or by findDeploymentTarget(), and possibly loaded from # disk. saveDeployment <- function(recordDir, deployment, application, bundleId = NULL, hostUrl = serverInfo(deployment$server)$url, metadata = list(), addToHistory = TRUE) { deployment <- deploymentRecord( name = deployment$name, title = deployment$title, username = deployment$username, account = deployment$account, server = deployment$server, envVars = deployment$envVars, version = deployment$version, hostUrl = hostUrl, appId = application$id, bundleId = bundleId, url = application$url, metadata = metadata ) path <- deploymentConfigFile(recordDir, deployment$name, deployment$account, deployment$server) writeDeploymentRecord(deployment, path) # also save to global history if (addToHistory) { addToDeploymentHistory(recordDir, deployment) } invisible(path) } deploymentRecord <- function(name, title, username, account, server, envVars = NULL, hostUrl = NULL, appId = NULL, bundleId = NULL, url = NULL, version = deploymentRecordVersion, metadata = list()) { check_character(envVars, allow_null = TRUE) standard <- list( name = name, title = title %||% "", username = username, account = account, server = server, envVars = if (length(envVars) > 0) paste0(envVars, collapse = ", ") else NA, hostUrl = hostUrl %||% "", appId = appId %||% "", bundleId = bundleId %||% "", url = url %||% "", version = version ) # convert any multi-value metadata entries into comma-separated values # this prevents write.dcf from writing multiple records into one file. metadata <- lapply(metadata, function(v) paste0(v, collapse = ", ")) c(standard, metadata) } writeDeploymentRecord <- function(record, filePath) { # use a long width so URLs don't line-wrap write.dcf(record, filePath, width = 4096) } # Workbench uses to show a list of recently deployed content on user dashboard addToDeploymentHistory <- function(appPath, deploymentRecord) { # add the appPath to the deploymentRecord deploymentRecord$appPath <- appPath # write new history file newHistory <- deploymentHistoryPath(new = TRUE) writeDeploymentRecord(deploymentRecord, newHistory) history <- deploymentHistoryPath() # append existing history to new history if (file.exists(history)) { cat("\n", file = newHistory, append = TRUE) file.append(newHistory, history) } # overwrite with new history file.rename(newHistory, history) invisible() } #' Forget Application Deployment #' #' Forgets about an application deployment. This is useful if the application #' has been deleted on the server, or the local deployment information needs to #' be reset. #' #' @param appPath The path to the content that was deployed, either a directory #' or an individual document. #' @param name The name of the content that was deployed (optional) #' @param account The name of the account to which the content was deployed #' (optional) #' @param server The name of the server to which the content was deployed #' (optional) #' @param dryRun Set to TRUE to preview the files/directories to be removed #' instead of actually removing them. Defaults to FALSE. #' @param force Set to TRUE to remove files and directories without prompting. #' Defaults to FALSE in interactive sessions. #' @return NULL, invisibly. #' #' @details This method removes from disk the file containing deployment #' metadata. If "name", "account", and "server" are all NULL, then all of the #' deployments for the application are forgotten; otherwise, only the #' specified deployment is forgotten. #' #' @export forgetDeployment <- function(appPath = getwd(), name = NULL, account = NULL, server = NULL, dryRun = FALSE, force = !interactive()) { if (is.null(name) && is.null(account) && is.null(server)) { dcfDir <- deploymentConfigDir(appPath) if (dryRun) message("Would remove the directory ", dcfDir) else if (file.exists(dcfDir)) { if (!force) { prompt <- paste("Forget all deployment records for ", appPath, "? [Y/n] ", sep = "") input <- readline(prompt) if (nzchar(input) && !identical(input, "y") && !identical(input, "Y")) stop("No deployment records removed.", call. = FALSE) } unlink(dcfDir, recursive = TRUE) } else { message("No deployments found for the application at ", appPath) } } else { if (is.null(name) || is.null(account) || is.null(server)) { stop("Invalid argument. ", "Supply the name, account, and server of the deployment record to delete. ", "Supply NULL for all three to delete all deployment records.") } dcf <- deploymentConfigFile(appPath, name, account, server) if (dryRun) message("Would remove the file ", dcf) else if (file.exists(dcf)) { if (!force) { prompt <- paste("Forget deployment of ", appPath, " to '", name, "' on ", server, "? [Y/n] ", sep = "") input <- readline(prompt) if (nzchar(input) && !identical(input, "y") && !identical(input, "Y")) stop("Cancelled. No deployment records removed.", call. = FALSE) } unlink(dcf) } else { message("No deployment of ", appPath, " to '", name, "' on ", server, " found.") } } invisible(NULL) } rsconnect/R/config.R0000644000176200001440000000757314513230050014046 0ustar liggesusers#' rsconnect Configuration Directory #' #' Forms the path to a location on disk where user-level configuration data for #' the package is stored. #' #' @param subDir An optional subdirectory to be included as the last element of #' the path. #' #' @return The path to the configuration directory. #' #' @keywords internal rsconnectConfigDir <- function(subDir = NULL) { configDir <- applicationConfigDir() # If the configuration directory doesn't exist, see if there's an old one to # migrate if (!dirExists(configDir)) { migrateConfig(configDir) } # Form the target and append the optional subdirectory if given target <- configDir if (!is.null(subDir)) { target <- file.path(target, subDir) } dirCreate(target) } #' Application Configuration Directory #' #' Returns the root path used to store per user configuration data. Does not #' check old locations or create the path; use \code{rsconnectConfigDir} for #' most cases. #' #' @return A string containing the path of the configuration folder. #' #' @keywords internal applicationConfigDir <- function() { if (exists("R_user_dir", envir = asNamespace("tools"))) { # In newer versions of R (>=4.0), we can ask R itself where configuration should be stored. # Load from the namespace to avoid check warnings with old R. f <- get("R_user_dir", envir = asNamespace("tools")) f("rsconnect", "config") } else { # In older versions of R, use an implementation derived from R_user_dir home <- Sys.getenv("HOME", unset = normalizePath("~")) path <- if (nzchar(p <- Sys.getenv("R_USER_CONFIG_DIR"))) p else if (nzchar(p <- Sys.getenv("XDG_CONFIG_HOME"))) p else if (.Platform$OS.type == "windows") file.path(Sys.getenv("APPDATA"), "R", "config") else if (Sys.info()["sysname"] == "Darwin") file.path(home, "Library", "Preferences", "org.R-project.R") else file.path(home, ".config") file.path(path, "R", "rsconnect") } } # server ------------------------------------------------------------------ serverConfigDir <- function() { rsconnectConfigDir("servers") } serverConfigFile <- function(name) { normalizePath( file.path(serverConfigDir(), paste(name, ".dcf", sep = "")) ) } serverConfigFiles <- function() { list.files(serverConfigDir(), pattern = glob2rx("*.dcf"), full.names = TRUE) } # account ----------------------------------------------------------------- accountConfigDir <- function() { rsconnectConfigDir("accounts") } accountConfigFile <- function(name, server) { normalizePath( file.path(accountConfigDir(), server, paste(name, ".dcf", sep = "")) ) } accountConfigFiles <- function(server = NULL) { path <- accountConfigDir() if (!is.null(server)) { path <- file.path(path, server) } list.files(path, pattern = glob2rx("*.dcf"), recursive = TRUE, full.names = TRUE) } # deployments ------------------------------------------------------------- deploymentHistoryPath <- function(new = FALSE) { file.path( rsconnectConfigDir("deployments"), paste0("history", if (new) ".new", ".dcf") ) } # given a path, return the directory under which rsconnect package state is # stored deploymentConfigDir <- function(recordPath) { if (isDocumentPath(recordPath)) { file.path(dirname(recordPath), "rsconnect", "documents", basename(recordPath)) } else { file.path(recordPath, "rsconnect") } } deploymentConfigFile <- function(recordPath, name, account, server) { accountDir <- file.path(deploymentConfigDir(recordPath), server, account) dirCreate(accountDir) file.path(accountDir, paste0(name, ".dcf")) } deploymentConfigFiles <- function(recordPath) { dir <- deploymentConfigDir(recordPath) list.files(dir, glob2rx("*.dcf"), recursive = TRUE, full.names = TRUE) } # Does the path point to an individual piece of content? isDocumentPath <- function(path) { tools::file_ext(path) != "" } rsconnect/R/rsconnect-package.R0000644000176200001440000000061214513230050016153 0ustar liggesusers#' @keywords internal "_PACKAGE" #' Using Packages with rsconnect #' #' See ?[appDependencies()] #' @keywords internal #' @name rsconnectPackages NULL #' HTTP Proxy Configuration #' #' Please see `vignette("custom-http")`. #' #' @keywords internal #' @name rsconnectProxies NULL ## usethis namespace: start #' @import rlang #' @importFrom lifecycle deprecated ## usethis namespace: end NULL rsconnect/R/http-libcurl.R0000644000176200001440000001006014513230050015173 0ustar liggesusershttpLibCurl <- function(protocol, host, port, method, path, headers, contentType = NULL, contentFile = NULL, certificate = NULL, timeout = NULL) { request <- list( protocol = protocol, host = host, port = port, method = method, path = path ) handle <- createCurlHandle( method = method, timeout = timeout, certificate = certificate ) if (!is.null(contentFile)) { if (is.null(contentType)) { stop("You must specify a contentType for the specified file") } fileLength <- file.info(contentFile)$size headers$`Content-Type` <- contentType headers$`Content-Length` <- as.character(fileLength) # open a connection to read the file, and ensure it's closed when we're done contentCon <- file(contentFile, "rb") defer(if (!is.null(contentCon)) close(contentCon)) progress <- is_interactive() && fileLength >= 10 * 1024^2 curl::handle_setopt( handle, noprogress = !progress, upload = TRUE, infilesize_large = fileLength, readfunction = function(nbytes, ...) { if (is.null(contentCon)) { return(raw()) } bin <- readBin(contentCon, "raw", nbytes) if (length(bin) < nbytes) { close(contentCon) contentCon <<- NULL } bin } ) } headers <- appendCookieHeaders(request, headers) curl::handle_setheaders(handle, .list = headers) # make the request url <- buildHttpUrl(request) start <- proc.time() response <- curl::curl_fetch_memory(url, handle = handle) time <- proc.time() - start httpTrace(method, path, time) # Process headers headers <- curl::parse_headers_list(rawToChar(response$headers)) # Parse cookies from header; bear in mind that there may be multiple headers cookieHeaders <- headers[names(headers) == "set-cookie"] storeCookies(request, cookieHeaders) # presume a plain text response unless specified otherwise contentType <- headers[["content-type"]] %||% "text/plain" contentValue <- rawToChar(response$content) # emit JSON trace if requested jsonTracingEnabled <- httpTraceJson() && contentType == "application/json" if (jsonTracingEnabled) { if (!is.null(contentFile)) { cat(paste0("<< ", readLines(contentFile, warn = FALSE), "\n", collapse = "")) } lines <- strsplit(contentValue, "\n")[[1]] cat(paste0(">> ", lines, "\n", collapse = "")) } list( req = request, status = response$status_code, location = headers$location, contentType = contentType, content = contentValue ) } createCurlHandle <- function(method, timeout = NULL, certificate = NULL) { # create curl handle handle <- curl::new_handle() # overlay user-supplied options userOptions <- getOption("rsconnect.libcurl.options") if (is.list(userOptions)) { curl::handle_setopt(handle, .list = userOptions) } curl::handle_setopt(handle, customrequest = method) curl::handle_setopt(handle, useragent = userAgent()) if (isTRUE(getOption("rsconnect.check.certificate", TRUE))) { curl::handle_setopt(handle, ssl_verifypeer = TRUE) # apply certificate information if present if (!is.null(certificate)) { curl::handle_setopt(handle, cainfo = certificate) } } else { # don't verify peer (less secure but tolerant to self-signed cert issues) curl::handle_setopt(handle, ssl_verifypeer = FALSE) } # use timeout if supplied if (!is.null(timeout)) { curl::handle_setopt(handle, timeout = timeout) } # verbose if requested if (httpVerbose()) { curl::handle_setopt(handle, verbose = TRUE) } # suppress curl's automatically handling of redirects, since we have to # handle ourselves in httpRequest()/httpRequestWithBody() due to our # specialised auth needs curl::handle_setopt(handle, followlocation = FALSE) handle } rsconnect/R/http-curl.R0000644000176200001440000000636214513230050014516 0ustar liggesusers# HTTP transport using the curl command-line utility. Useful on systems that have a working curl but # not necessarily a working curl library, such as Windows 10. httpCurl <- function(protocol, host, port, method, path, headers, contentType = NULL, contentFile = NULL, certificate = NULL, timeout = NULL) { if (!is.null(contentFile) && is.null(contentType)) stop("You must specify a contentType for the specified file") if (!is.null(contentFile)) fileLength <- file.info(contentFile)$size headers <- appendCookieHeaders( list(protocol = protocol, host = host, port = port, path = path), headers) extraHeaders <- character() for (header in names(headers)) { if (!identical(header, "Content-Type") && !identical(header, "Content-Length")) { extraHeaders <- paste(extraHeaders, "--header") extraHeaders <- paste(extraHeaders, paste('"', header, ": ", headers[[header]], '"', sep = "")) } } outputFile <- tempfile() command <- paste("curl", "-i", "-X", method) if (httpVerbose()) command <- paste(command, "-v") if (!is.null(timeout)) command <- paste(command, "--connect-timeout", timeout) if (!is.null(contentFile)) { command <- paste(command, "-T", shQuote(contentFile), "--header", paste('"', "Content-Type: ", contentType, '"', sep = ""), "--header", paste('"', "Content-Length: ", fileLength, '"', sep = "")) } # add prefix to port if necessary if (nzchar(port)) port <- paste(":", port, sep = "") if (!isTRUE(getOption("rsconnect.check.certificate", TRUE))) { # suppressed certificate check command <- paste(command, "--insecure") } else if (!is.null(certificate)) { # cert check not suppressed and we have a supplied cert command <- paste(command, "--cacert", shQuote(certificate)) } command <- paste(command, extraHeaders, "--header", "Expect:", "--user-agent", userAgent(), "--silent", "--show-error", "-o", shQuote(outputFile), paste('"', protocol, "://", host, port, path, '"', sep = "")) result <- NULL time <- system.time(gcFirst = FALSE, { result <- system(command) }) httpTrace(method, path, time) # emit JSON trace if requested if (!is.null(contentFile) && httpTraceJson() && identical(contentType, "application/json")) { fileLength <- file.info(contentFile)$size fileContents <- readBin(contentFile, what = "raw", n = fileLength) cat(paste0("<< ", rawToChar(fileContents), "\n")) } if (result == 0) { fileConn <- file(outputFile, "rb") defer(close(fileConn)) readHttpResponse(list( protocol = protocol, host = host, port = port, method = method, path = path), fileConn) } else { stop(paste("Curl request failed (curl error", result, "occurred)")) } } rsconnect/R/http-internal.R0000644000176200001440000000621014513230050015355 0ustar liggesusers# Internal sockets HTTP transport. Not recommended since it does not support HTTPS, but useful as a # last resort if other methods don't work since it can piggyback on IE proxy settings via R's own # internet configuration. httpInternal <- function(protocol, host, port, method, path, headers, contentType = NULL, contentFile = NULL, certificate = NULL, timeout = NULL) { if (!is.null(contentFile) && is.null(contentType)) stop("You must specify a contentType for the specified file") # default port to 80 if necessary if (!nzchar(port)) port <- "80" # read file in binary mode if (!is.null(contentFile)) { fileLength <- file.info(contentFile)$size fileContents <- readBin(contentFile, what = "raw", n = fileLength) } # build http request request <- NULL request <- c(request, paste(method, " ", path, " HTTP/1.1\r\n", sep = "")) request <- c(request, "User-Agent: ", userAgent(), "\r\n") request <- c(request, "Host: ", host, "\r\n", sep = "") request <- c(request, "Accept: */*\r\n") if (!is.null(contentFile)) { request <- c(request, paste("Content-Type: ", contentType, "\r\n", sep = "")) request <- c(request, paste("Content-Length: ", fileLength, "\r\n", sep = "")) } headers <- appendCookieHeaders( list(protocol = protocol, host = host, port = port, path = path), headers) for (name in names(headers)) { request <- c(request, paste(name, ": ", headers[[name]], "\r\n", sep = "")) } request <- c(request, "\r\n") # output request if in verbose mode if (httpVerbose()) cat(request) # use timeout if supplied, default timeout if not (matches parameter behavior # for socketConnection) timeout <- if (is.null(timeout)) getOption("timeout") else timeout # open socket connection time <- system.time(gcFirst = FALSE, { conn <- socketConnection(host = host, port = as.integer(port), open = "w+b", blocking = TRUE, timeout = timeout) defer(close(conn)) # write the request header and file payload writeBin(charToRaw(paste(request, collapse = "")), conn, size = 1) if (!is.null(contentFile)) { writeBin(fileContents, conn, size = 1) } # read the response response <- readHttpResponse(list( protocol = protocol, host = host, port = port, method = method, path = path), conn) }) httpTrace(method, path, time) # print if in verbose mode if (httpVerbose()) print(response) # output JSON if requested if (httpTraceJson() && identical(contentType, "application/json")) cat(paste0("<< ", rawToChar(fileContents), "\n")) # return it response } rsconnect/R/restartApp.R0000644000176200001440000000230214513230050014707 0ustar liggesusers#' Restart an Application #' #' Restart an application currently running on a remote server. #' #' @param appName Name of application to restart #' @param account Account name. If a single account is registered on the system #' then this parameter can be omitted. #' @param server Server name. Required only if you use the same account name on #' multiple servers (see [servers()]) #' @param quiet Request that no status information be printed to the console #' during the operation. #' @examples #' \dontrun{ #' #' # restart an application #' restartApp("myapp") #' } #' @seealso [applications()], [deployApp()], and #' [terminateApp()] #' @note This function works only for ShinyApps servers. #' @export restartApp <- function(appName, account = NULL, server = NULL, quiet = FALSE) { accountDetails <- accountInfo(account, server) checkShinyappsServer(accountDetails$server) # define deploy task taskDef <- list() taskDef$beginStatus <- "Restarting application" taskDef$endStatus <- "Application successfully restarted" taskDef$action <- function(client, application) { client$deployApplication(application) } # perform it applicationTask(taskDef, appName, accountDetails, quiet) } rsconnect/R/usage.R0000644000176200001440000001212614513230050013673 0ustar liggesusers#' Show Application Usage #' #' Show application usage of a currently deployed application #' @param appName Name of application #' @param appDir Directory containing application. Defaults to #' current working directory. #' @inheritParams deployApp #' @param usageType Use metric to retreive (for example: "hours") #' @param from Date range starting timestamp (Unix timestamp or relative time #' delta such as "2d" or "3w"). #' @param until Date range ending timestamp (Unix timestamp or relative time #' delta such as "2d" or "3w"). #' @param interval Summarization interval. Data points at intervals less then this #' will be grouped. (Relative time delta e.g. "120s" or "1h" or "30d"). #' @note This function only works for ShinyApps servers. #' @export showUsage <- function(appDir = getwd(), appName = NULL, account = NULL, server = NULL, usageType = "hours", from = NULL, until = NULL, interval = NULL) { accountDetails <- accountInfo(account, server) checkShinyappsServer(accountDetails$server) api <- clientForAccount(accountDetails) # resolve application if (is.null(appName)) appName <- basename(appDir) application <- resolveApplication(accountDetails, appName) # get application usage data <- api$getAccountUsage(accountDetails$accountId, usageType, application$id, from, until, interval) if (length(data$points) < 1) { stop("No data.", call. = FALSE) } # get data points points <- data$points[[1]] points <- lapply(points, function(X) { X[[1]] <- X[[1]] / 1000 # convert from milliseconds to seconds X }) # convert to data frame df <- data.frame(matrix(unlist(points), nrow = length(points), byrow = TRUE), stringsAsFactors = FALSE) colnames(df) <- c("timestamp", usageType) return(df) } #' Show Application Metrics #' #' Show application metrics of a currently deployed application. #' This function only works for ShinyApps servers. #' #' @param metricSeries Metric series to query. Refer to the #' [shinyapps.io documentation]() #' for available series. #' @param metricNames Metric names in the series to query. Refer to the #' [shinyapps.io documentation]() #' for available metrics. #' @inheritParams deployApp #' @param from Date range starting timestamp (Unix timestamp or relative time #' delta such as "2d" or "3w"). #' @param until Date range ending timestamp (Unix timestamp or relative time #' delta such as "2d" or "3w"). #' @param interval Summarization interval. Data points at intervals less then this #' will be grouped. (Relative time delta e.g. "120s" or "1h" or "30d"). #' @export showMetrics <- function(metricSeries, metricNames, appDir = getwd(), appName = NULL, account = NULL, server = "shinyapps.io", from = NULL, until = NULL, interval = NULL) { accountDetails <- accountInfo(account, server) api <- clientForAccount(accountDetails) # resolve application if (is.null(appName)) appName <- basename(appDir) application <- resolveApplication(accountDetails, appName) # get application usage data <- api$getApplicationMetrics(application$id, metricSeries, metricNames, from, until, interval) if (length(data$points) < 1) { stop("No data.", call. = FALSE) } points <- lapply(data$points, as.data.frame, stringsAsFactors = FALSE) points <- do.call(rbind, points) points$time <- .POSIXct(points$time / 1000) points } #' Show Account Usage #' #' Show account usage #' @inheritParams deployApp #' @param usageType Use metric to retreive (for example: "hours") #' @param from Date range starting timestamp (Unix timestamp or relative time #' delta such as "2d" or "3w"). #' @param until Date range ending timestamp (Unix timestamp or relative time #' delta such as "2d" or "3w"). #' @param interval Summarization interval. Data points at intervals less then this #' will be grouped. (Number of seconds or relative time delta e.g. "1h"). #' @note This function only works for ShinyApps servers. #' @export accountUsage <- function(account = NULL, server = NULL, usageType = "hours", from = NULL, until = NULL, interval = NULL) { accountDetails <- accountInfo(account, server) checkShinyappsServer(accountDetails$server) api <- clientForAccount(accountDetails) # get application usage data <- api$getAccountUsage(accountDetails$accountId, usageType, NULL, from, until, interval) } rsconnect/R/appMetadata.R0000644000176200001440000002207014513230050015007 0ustar liggesusersappMetadata <- function(appDir, appFiles, appPrimaryDoc = NULL, quarto = NA, appMode = NULL, contentCategory = NULL, isShinyappsServer = FALSE, metadata = list()) { checkAppLayout(appDir, appPrimaryDoc) if (is_string(quarto)) { lifecycle::deprecate_warn( when = "1.0.0", what = "deployApp(quarto = 'can no longer be a path')", with = I("quarto = `TRUE` instead") ) quarto <- TRUE } else { check_bool(quarto, allow_na = TRUE) } # If quarto package/IDE has supplied metadata, always use quarto # https://github.com/quarto-dev/quarto-r/blob/08caf0f42504e7/R/publish.R#L117-L121 # https://github.com/rstudio/rstudio/blob/3d45a20307f650/src/cpp/session/modules/SessionRSConnect.cpp#L81-L123 if (hasQuartoMetadata(metadata)) { quarto <- TRUE } if (is.null(appMode)) { # Generally we want to infer appPrimaryDoc from appMode, but there's one # special case if (!is.null(appPrimaryDoc) && tolower(tools::file_ext(appPrimaryDoc)) == "r") { appMode <- "shiny" } else { # Inference only uses top-level files rootFiles <- appFiles[dirname(appFiles) == "."] appMode <- inferAppMode( file.path(appDir, rootFiles), usesQuarto = quarto, isShinyappsServer = isShinyappsServer ) } } appPrimaryDoc <- inferAppPrimaryDoc( appPrimaryDoc = appPrimaryDoc, appFiles = appFiles, appMode = appMode ) hasParameters <- appHasParameters( appDir = appDir, appPrimaryDoc = appPrimaryDoc, appMode = appMode, contentCategory = contentCategory ) documentsHavePython <- detectPythonInDocuments( appDir = appDir, files = appFiles ) if (appIsQuartoDocument(appMode)) { quartoInfo <- inferQuartoInfo( metadata = metadata, appDir = appDir, appPrimaryDoc = appPrimaryDoc ) } else { quartoInfo <- NULL } list( appMode = appMode, appPrimaryDoc = appPrimaryDoc, hasParameters = hasParameters, contentCategory = contentCategory, documentsHavePython = documentsHavePython, quartoInfo = quartoInfo ) } checkAppLayout <- function(appDir, appPrimaryDoc = NULL) { appFilesBase <- tolower(list.files(appDir)) primaryIsRScript <- identical(tolower(tools::file_ext(appPrimaryDoc)), "r") # check for single-file app collision if (primaryIsRScript && "app.r" %in% appFilesBase) { cli::cli_abort( "Project must not contain both {.file app.R} and a single-file Shiny app." ) } # all other layouts are allowed; the server determines (with the required packages) if the content # can be run/served. } # infer the mode of the application from files in the root dir inferAppMode <- function(absoluteRootFiles, usesQuarto = NA, isShinyappsServer = FALSE) { matchingNames <- function(paths, pattern) { idx <- grepl(pattern, basename(paths), ignore.case = TRUE, perl = TRUE) paths[idx] } # plumber API plumberFiles <- matchingNames(absoluteRootFiles, "^(plumber|entrypoint).r$") if (length(plumberFiles) > 0) { return("api") } # Shiny application using single-file app.R style. appR <- matchingNames(absoluteRootFiles, "^app.r$") if (length(appR) > 0) { return("shiny") } rmdFiles <- matchingNames(absoluteRootFiles, "\\.rmd$") qmdFiles <- matchingNames(absoluteRootFiles, "\\.qmd$") if (is.na(usesQuarto)) { # Can't use _quarto.yml alone because it causes deployment failures for # static content: https://github.com/rstudio/rstudio/issues/11444 quartoYml <- matchingNames(absoluteRootFiles, "^_quarto.y(a)?ml$") usesQuarto <- length(qmdFiles) > 0 || (length(quartoYml) > 0 && length(rmdFiles > 0)) } # Documents with "server: shiny" in their YAML front matter need shiny too hasShinyRmd <- any(sapply(rmdFiles, isShinyRmd)) hasShinyQmd <- any(sapply(qmdFiles, isShinyRmd)) if (hasShinyQmd) { return("quarto-shiny") } else if (hasShinyRmd) { if (usesQuarto) { return("quarto-shiny") } else { return("rmd-shiny") } } # Shiny application using server.R; checked later than Rmd with shiny runtime # because server.R may contain the server code paired with a ShinyRmd and needs # to be run by rmarkdown::run (rmd-shiny). serverR <- matchingNames(absoluteRootFiles, "^server.r$") if (length(serverR) > 0) { return("shiny") } # Any non-Shiny R Markdown or Quarto documents are rendered content and get # rmd-static or quarto-static. if (length(rmdFiles) > 0 || length(qmdFiles) > 0) { if (usesQuarto) { return("quarto-static") } else { # For shinyapps.io, treat "rmd-static" app mode as "rmd-shiny" so that # it can be served from a shiny process in Connect if (isShinyappsServer) { return("rmd-shiny") } return("rmd-static") } } # no renderable content "static" } isShinyRmd <- function(filename) { yaml <- yamlFromRmd(filename) if (is.null(yaml)) { return(FALSE) } is_shiny_prerendered(yaml$runtime, yaml$server) } yamlFromRmd <- function(filename) { lines <- readLines(filename, warn = FALSE, encoding = "UTF-8") delim <- grep("^(---|\\.\\.\\.)\\s*$", lines) if (length(delim) >= 2) { # If at least two --- or ... lines were found... if (delim[[1]] == 1 || all(grepl("^\\s*$", lines[1:delim[[1]]]))) { # and the first is a --- if (grepl("^---\\s*$", lines[delim[[1]]])) { # ...and the first --- line is not preceded by non-whitespace... if (diff(delim[1:2]) > 1) { # ...and there is actually something between the two --- lines... yamlData <- paste(lines[(delim[[1]] + 1):(delim[[2]] - 1)], collapse = "\n") return(yaml::yaml.load(yamlData)) } } } } return(NULL) } # Adapted from rmarkdown:::is_shiny_prerendered() is_shiny_prerendered <- function(runtime, server = NULL) { if (!is.null(runtime) && grepl("^shiny", runtime)) { TRUE } else if (identical(server, "shiny")) { TRUE } else if (is.list(server) && identical(server[["type"]], "shiny")) { TRUE } else { FALSE } } # If deploying an R Markdown, Quarto, or static content, infer a primary # document if one is not already specified. # Note: functionality in inferQuartoInfo() depends on primary doc inference # working the same across app modes. inferAppPrimaryDoc <- function(appPrimaryDoc, appFiles, appMode) { if (!is.null(appPrimaryDoc)) { return(appPrimaryDoc) } # Only documents and static apps don't have primary _doc_ if (!(appIsDocument(appMode) || appMode == "static")) { return(appPrimaryDoc) } # determine expected primary document extension ext <- if (appMode == "static") "\\.html?$" else "\\.[Rq]md$" # use index file if it exists matching <- grepl(paste0("^index", ext), appFiles, ignore.case = TRUE) if (!any(matching)) { # no index file found, so pick the first one we find matching <- grepl(ext, appFiles, ignore.case = TRUE) if (!any(matching)) { cli::cli_abort(c( "Failed to determine {.arg appPrimaryDoc}.", x = "No files matching {.str {ext}}." )) } } if (sum(matching) > 1) { # if we have multiple matches, pick the first appFiles[matching][[1]] } else { appFiles[matching] } } appIsDocument <- function(appMode) { appMode %in% c( "rmd-static", "rmd-shiny", "quarto-static", "quarto-shiny" ) } appIsQuartoDocument <- function(appMode) { appMode %in% c( "quarto-static", "quarto-shiny" ) } appHasParameters <- function(appDir, appPrimaryDoc, appMode, contentCategory = NULL) { # Only Rmd deployments are marked as having parameters. Shiny applications # may distribute an Rmd alongside app.R, but that does not cause the # deployment to be considered parameterized. # # https://github.com/rstudio/rsconnect/issues/246 if (!(appIsDocument(appMode))) { return(FALSE) } # Sites don't ever have parameters if (identical(contentCategory, "site")) { return(FALSE) } # Only Rmd files have parameters. if (tolower(tools::file_ext(appPrimaryDoc)) == "rmd") { filename <- file.path(appDir, appPrimaryDoc) yaml <- yamlFromRmd(filename) if (!is.null(yaml)) { params <- yaml[["params"]] # We don't care about deep parameter processing, only that they exist. return(!is.null(params) && length(params) > 0) } } FALSE } detectPythonInDocuments <- function(appDir, files = NULL) { if (is.null(files)) { # for testing files <- bundleFiles(appDir) } rmdFiles <- grep("^[^/\\\\]+\\.[rq]md$", files, ignore.case = TRUE, perl = TRUE, value = TRUE) for (rmdFile in rmdFiles) { if (documentHasPythonChunk(file.path(appDir, rmdFile))) { return(TRUE) } } return(FALSE) } documentHasPythonChunk <- function(filename) { lines <- readLines(filename, warn = FALSE, encoding = "UTF-8") matches <- grep("`{python", lines, fixed = TRUE) return(length(matches) > 0) } rsconnect/R/servers.R0000644000176200001440000002034314513230050014260 0ustar liggesusers#' Server metadata #' #' `servers()` lists all known servers; `serverInfo()` gets metadata about #' a specific server. Cloud servers `shinyapps.io` and `posit.cloud` are always #' automatically registered and available. #' #' @param name Server name. If omitted, you'll be prompted to pick a server. #' @param local Return only local servers? (i.e. not automatically registered #' cloud servers) #' @return #' `servers()` returns a data frame with registered server names and URLs. #' `serverInfo()` returns a list with details for a particular server. #' @export #' @examples #' # List all registered servers #' servers() #' #' # Get information about a server #' serverInfo("posit.cloud") servers <- function(local = FALSE) { servers <- serverNames(local) info <- lapply(servers, serverInfo) info <- lapply(info, as.data.frame, stringsAsFactors = FALSE) out <- rbind_fill(info, c("name", "url", "certificate")) out$certificate <- secret(out$certificate) out } #' @rdname servers #' @export serverInfo <- function(name = NULL) { name <- findServer(name, local = FALSE) if (isPositCloudServer(name)) { info <- cloudServerInfo(name, "https://api.posit.cloud/v1") } else if (isShinyappsServer(name)) { info <- cloudServerInfo(name, "https://api.shinyapps.io/v1") } else { configFile <- serverConfigFile(name) serverDcf <- read.dcf(serverConfigFile(name), all = TRUE) info <- as.list(serverDcf) } info$certificate <- secret(info$certificate) info } serverNames <- function(local = FALSE) { names <- gsub("\\.dcf$", "", basename(serverConfigFiles())) if (!local) { names <- c(names, "shinyapps.io", "posit.cloud") if (nrow(accounts(server = "rstudio.cloud")) > 0) { names <- c(names, "rstudio.cloud") } } names } isShinyappsServer <- function(server) { identical(server, "shinyapps.io") } isPositCloudServer <- function(server) { server %in% c("posit.cloud", "rstudio.cloud") } isCloudServer <- function(server) { isPositCloudServer(server) || isShinyappsServer(server) } checkCloudServer <- function(server, call = caller_env()) { if (!isCloudServer(server)) { cli::cli_abort("`server` must be shinyapps.io or posit.cloud", call = call) } } checkShinyappsServer <- function(server, call = caller_env()) { if (!isShinyappsServer(server)) { cli::cli_abort("`server` must be shinyapps.io", call = call) } } isRPubs <- function(server) { identical(server, "rpubs.com") } isConnectServer <- function(server) { !isCloudServer(server) && !isRPubs(server) } cloudServerInfo <- function(name, url) { list( name = name, url = getOption("rsconnect.shinyapps_url", url), certificate = inferCertificateContents( system.file("cert/shinyapps.io.pem", package = "rsconnect") ) ) } findServer <- function(server = NULL, local = TRUE, error_call = caller_env()) { if (!is.null(server)) { check_string(server, call = error_call) existing <- serverNames() if (!server %in% existing) { cli::cli_abort(c( "Can't find {.arg server} with name {.str {server}}.", i = "Known servers are {.str {existing}}." )) } server } else { existing <- servers(local = local) if (length(existing) == 0 || nrow(existing) == 0) { cli::cli_abort("No local servers have been registered") } else if (nrow(existing) == 1) { existing$name } else { idx <- cli_menu( "Multiple servers found.", "Which one do you want to use?", c(i = "Use {.arg server} to pick one of {.str {existing$name}}."), choices = existing$name ) existing$name[idx] } } } #' Server management #' #' @description #' These functions manage the list of known servers: #' #' * `addServer()` registers a Posit connect server. Once it has been #' registered, you can connect to an account on the server using #' [connectUser()]. #' * `removeServer()` removes a server from the registry. #' * `addServerCertificate()` adds a certificate to a server. #' #' @param url URL for the server. Can be a bare hostname like #' `connect.mycompany.com` or a url like `http://posit.mycompany.com/connect`. #' @param name Server name. If omitted, the server hostname is used. #' @param certificate Optional. Either a path to certificate file or a #' character vector containing the certificate's contents. #' @param validate Validate that `url` actually points to a Posit Connect #' server? #' @param quiet Suppress output and prompts where possible. #' @export #' @examples #' \dontrun{ #' # register a local server #' addServer("http://myrsconnect/", "myserver") #' #' # list servers #' servers(local = TRUE) #' #' # connect to an account on the server #' connectUser(server = "myserver") #' } #' @export addServer <- function(url, name = NULL, certificate = NULL, validate = TRUE, quiet = FALSE) { check_string(url) check_name(name, allow_null = TRUE) if (validate) { out <- validateConnectUrl(url, certificate) if (!out$valid) { cli::cli_abort("{.arg url} does not appear to be a Posit Connect server.") } url <- out$url } name <- name %||% serverName(url) registerServer(name, url, certificate) if (!quiet) { message("Server '", name, "' added successfully: ", url) } } # Validate a connect server URL by hitting a known configuration endpoint # The URL may be specified with or without the protocol and port; this function # will try both http and https and follow any redirects given by the server. validateConnectUrl <- function(url, certificate = NULL) { # Add protocol if missing, assuming https except for local installs if (!grepl("://", url, fixed = TRUE)) { if (grepl(":3939", url, fixed = TRUE)) { url <- paste0("http://", url) } else { url <- paste0("https://", url) } } url <- ensureConnectServerUrl(url) is_http <- grepl("^http://", url) GET_server_settings <- function(url) { timeout <- getOption("rsconnect.http.timeout", if (isWindows()) 20 else 10) auth_info <- list(certificate = inferCertificateContents(certificate)) GET( parseHttpUrl(url), auth_info, "/server_settings", timeout = timeout ) } response <- NULL cnd <- catch_cnd(response <- GET_server_settings(url), "error") if (is_http && cnd_inherits(cnd, "OPERATION_TIMEDOUT")) { url <- gsub("^http://", "https://", url) cnd <- catch_cnd(response <- GET_server_settings(url), "error") } if (!is.null(cnd)) { return(list(valid = FALSE, message = conditionMessage(cnd))) } contentType <- attr(response, "httpContentType") if (!isContentType(contentType, "application/json")) { return(list(valid = FALSE, message = "Endpoint did not return JSON")) } url <- gsub("/server_settings$", "", attr(response, "httpUrl")) list(valid = TRUE, url = url, response = response) } # Return a URL that can be concatenated with sub-paths like /content ensureConnectServerUrl <- function(url) { # strip trailing / url <- gsub("/$", "", url) # ensure 'url' ends with '/__api__' if (!grepl("/__api__$", url)) url <- paste(url, "/__api__", sep = "") url } registerServer <- function(name, url, certificate = NULL, error_call = caller_env()) { certificate <- inferCertificateContents(certificate) if (!identical(substr(url, 1, 5), "https") && !is.null(certificate)) { cli::cli_abort( c( "Certificates may only be attached to servers that use the HTTPS protocol.", i = "Specify an HTTPS URL for the server, or omit the certificate." ), call = error_call ) } path <- serverConfigFile(name) fields <- list( name = name, url = url, certificate = certificate %||% NA ) write.dcf(fields, path, keep.white = "certificate") } #' @rdname addServer #' @export removeServer <- function(name = NULL) { name <- findServer(name) configFile <- serverConfigFile(name) unlink(configFile) } #' @rdname addServer #' @export addServerCertificate <- function(name, certificate, quiet = FALSE) { info <- serverInfo(name) registerServer(name, info$url, certificate) if (!quiet) message("Certificate added to server '", name, "'") invisible(NULL) } serverName <- function(url) { url <- parseHttpUrl(url) paste0(url$host, if (nchar(url$port) > 0) ":", url$port) } rsconnect/R/certificates.R0000644000176200001440000001177514513230050015245 0ustar liggesusers # sanity check to make sure we're looking at an ASCII armored cert validateCertificate <- function(certificate) { return(any(grepl("-----BEGIN CERTIFICATE-----", certificate, fixed = TRUE))) } createCertificateFile <- function(certificate) { certificateFile <- NULL # check the R option first, then fall back on the environment variable systemStore <- getOption("rsconnect.ca.bundle") if (is.null(systemStore) || !nzchar(systemStore)) { systemStore <- Sys.getenv("RSCONNECT_CA_BUNDLE") } # start by checking for a cert file specified in an environment variable if (!is.null(systemStore) && nzchar(systemStore)) { if (file.exists(systemStore)) { certificateFile <- systemStore } else { warning("The certificate store '", systemStore, "' specified in the ", if (identical(systemStore, getOption("rsconnect.ca.bundle"))) "rsconnect.ca.bundle option " else "RSCONNECT_CA_BUNDLE environment variable ", "does not exist. The system certificate store will be used instead.") } } # if no certificate contents specified, we're done if (is.null(certificate)) return(certificateFile) # if we don't have a certificate file yet, try to find the system store if (is.null(certificateFile)) { if (.Platform$OS.type == "unix") { # search known locations on Unix-like stores <- c("/etc/ssl/certs/ca-certificates.crt", "/etc/pki/tls/certs/ca-bundle.crt", "/usr/share/ssl/certs/ca-bundle.crt", "/usr/local/share/certs/ca-root.crt", "/etc/ssl/cert.pem", "/var/lib/ca-certificates/ca-bundle.pem") } else { # mirror behavior of curl on Windows, which looks in system folders, # the working directory, and %PATH%. stores <- c(file.path(getwd(), "curl-ca-bundle.crt"), "C:/Windows/System32/curl-ca-bundle.crt", "C:/Windows/curl-ca-bundle.crt", file.path(strsplit(Sys.getenv("PATH"), ";", fixed = TRUE), "curl-ca-bundle.crt")) } # use our own baked-in bundle as a last resort stores <- c(stores, system.file(package = "rsconnect", "cert", "cacert.pem")) for (store in stores) { if (file.exists(store)) { # if the bundle exists, stop here certificateFile <- store break } } # if we didn't find the system store, it's okay; the fact that we're here # means that we have a server-specific certificate so it's probably going # to be all right to use only that cert. } # create a temporary file to house the certificates certificateStore <- tempfile(pattern = "cacerts", fileext = ".pem") dirCreate(dirname(certificateStore)) file.create(certificateStore) # open temporary cert store con <- file(certificateStore, open = "at") defer(close(con)) # copy the contents of the certificate file into the store, if we found one # (we don't do a straight file copy since we don't want to inherit or # correct permissions) if (!is.null(certificateFile)) { certLines <- readLines(certificateFile, warn = FALSE) writeLines(text = certLines, con = con) } # append the server-specific certificate (with a couple of blank lines) writeLines(text = c("", "", certificate), con = con) return(certificateStore) } inferCertificateContents <- function(certificate) { # certificate can be specified as either a character vector or a filename; # infer which we're dealing with # tolerate NULL, which is a valid case representing no certificate if (is.null(certificate) || identical(certificate, "")) return(NULL) # collapse to a single string if we got a vector of lines if (length(certificate) > 1) certificate <- paste(certificate, collapse = "\n") # looks like ASCII armored certificate data, return as-is if (validateCertificate(substr(certificate, 1, 27))) return(certificate) # looks like a file; return its contents if (file.exists(certificate)) { if (file.size(certificate) > 1048576) { stop("The file '", certificate, "' is too large. Certificate files must ", "be less than 1MB.") } contents <- paste(readLines(con = certificate, warn = FALSE), collapse = "\n") if (validateCertificate(contents)) return(contents) else stop("The file '", certificate, "' does not appear to be a certificate. ", "Certificate files should be in ASCII armored PEM format, with a ", "first line reading -----BEGIN CERTIFICATE-----.") } # doesn't look like something we can deal with; guess error based on length if (nchar(certificate) < 200) { stop("The certificate file '", certificate, "' does not exist.") } else { stop("The certificate '", substr(certificate, 1, 10), "...' is not ", "correctly formed. Specify the certificate as either an ASCII armored string, ", "beginning with -----BEGIN CERTIFICATE----, or a valid path to a file ", "containing the certificate.") } } rsconnect/R/deploymentTarget.R0000644000176200001440000003015614522164250016131 0ustar liggesusers# Discover the deployment target given the passed information. # # Returns a list containing a deployment record and the account details to use # when performing the deployment. # # When appId is provided, it must identify an existing application. The # application may have been created by some other user. That application may # or may not have an existing deployment record on disk. # # When using appId, a search across all deployment records occurs, even when # there is no local account+server referenced by the deployment record. This # lets us identify on-disk deployment records created by some collaborator. # When there is no on-disk deployment record, the configured account+server is # queried for the appId. # # It is an error when appId does not identify an existing application. # # When appName is provided, it may identify an existing application owned by # the calling user (e.g. associated with a locally known account). # # When using appName, the search across deployment records is restricted to # the incoming account+server. When there is no incoming account+server, the # search is restricted to deployments which have a corresponding local # account. # # Without appId or appName to identify an existing deployment, deployment # records associated with local accounts (possibly restricted by incoming # account+server) are considered before falling back to a generated name. # # When the targeted name does not exist locally or on the targeted # account+server, a deployment record with NULL appId is returned, which # signals to the caller that an application should be created. findDeploymentTarget <- function( recordPath = ".", appId = NULL, appName = NULL, appTitle = NULL, envVars = NULL, account = NULL, server = NULL, forceUpdate = FALSE, error_call = caller_env() ) { if (!is.null(appId)) { return(findDeploymentTargetByAppId( recordPath = recordPath, appId = appId, appName = appName, appTitle = appTitle, envVars = envVars, account = account, server = server, error_call = error_call )) } if (!is.null(appName)) { return(findDeploymentTargetByAppName( recordPath = recordPath, appName = appName, appTitle = appTitle, envVars = envVars, account = account, server = server, forceUpdate = forceUpdate, error_call = error_call )) } # No identifying appId or appName. # When there are existing deployments, ask the user to select one and use # it. Only deployments associated with locally configured account+server # combinations are considered. allDeployments <- deployments( appPath = recordPath, accountFilter = account, serverFilter = server ) if (nrow(allDeployments) > 0) { deployment <- disambiguateDeployments(allDeployments, error_call = error_call) deployment <- updateDeployment(deployment, appTitle, envVars) accountDetails <- findAccountInfo(deployment$account, deployment$server, error_call = error_call) return(list( accountDetails = accountDetails, deployment = deployment )) } # Otherwise, identify a target account (given just one available or prompted # by the user), generate a name, and locate the deployment. accountDetails <- findAccountInfo(account, server, error_call = error_call) appName <- generateAppName(appTitle, recordPath, accountDetails$name, unique = FALSE) return(findDeploymentTargetByAppName( recordPath = recordPath, appName = appName, appTitle = appTitle, envVars = envVars, account = accountDetails$name, server = accountDetails$server, forceUpdate = forceUpdate, error_call = error_call )) } # Discover the deployment target given appId. # # When appId is provided, all other information is secondary. An appId is an # indication from the caller that the content has already been deployed # elsewhere. If we cannot locate that content, deployment fails. # # Local deployment records are considered first before looking for the appId # on the target server. # # The target content may have been created by some other user; the account for # this session may differ from the account used when creating the content. findDeploymentTargetByAppId <- function( recordPath = ".", appId = NULL, appName = NULL, appTitle = NULL, envVars = NULL, account = NULL, server = NULL, error_call = caller_env() ) { # We must have a target account+server in order to use the appId. # The selected account may not be the original creator of the content. accountDetails <- findAccountInfo(account, server, error_call = error_call) # Filtering is only by server and includes all deployments in case we have a deployment record # from a collaborator. appDeployments <- deployments( appPath = recordPath, serverFilter = server, excludeOrphaned = FALSE ) appDeployments <- appDeployments[appDeployments$appId == appId, ] if (nrow(appDeployments) > 1) { cli::cli_abort( c( "Supplied {.arg appId} ({appId}) identifies multiple deployments.", i = "Manage obsolete deployments with rsconnect::forgetDeployment()." ), call = error_call ) } # Existing local deployment record. if (nrow(appDeployments) == 1) { deployment <- appDeployments[1, ] deployment <- updateDeployment(deployment, appTitle, envVars) return(list( accountDetails = accountDetails, deployment = deployment )) } # No local deployment record. Get it from the server. application <- getApplication(accountDetails$name, accountDetails$server, appId) # Note: The account+server of this deployment record may # not correspond to the original content creator. deployment <- createDeploymentFromApplication(application, accountDetails) deployment <- updateDeployment(deployment, appTitle, envVars) return(list( accountDetails = accountDetails, deployment = deployment )) } # Discover the deployment target given appName. # # When appName is provided it identifies content previously created by a # locally configured account. # # The account details from the deployment record identify the final # credentials we will use, as account+server may not have been specified by # the caller. findDeploymentTargetByAppName <- function( recordPath = ".", appName = NULL, appTitle = NULL, envVars = NULL, account = NULL, server = NULL, forceUpdate = FALSE, error_call = caller_env() ) { appDeployments <- deployments( appPath = recordPath, nameFilter = appName, accountFilter = account, serverFilter = server ) # When the appName along with the (optional) account+server identifies # exactly one previous deployment, use it. if (nrow(appDeployments) == 1) { deployment <- appDeployments[1, ] deployment <- updateDeployment(deployment, appTitle, envVars) accountDetails <- findAccountInfo(deployment$account, deployment$server, error_call = error_call) return(list( accountDetails = accountDetails, deployment = deployment )) } # When the appName identifies multiple records, we may not have had an # account+server constraint. Ask the user to choose. if (nrow(appDeployments) > 1) { deployment <- disambiguateDeployments(appDeployments, error_call = error_call) deployment <- updateDeployment(deployment, appTitle, envVars) accountDetails <- findAccountInfo(deployment$account, deployment$server, error_call = error_call) return(list( accountDetails = accountDetails, deployment = deployment )) } # When the appName does not identify a record, see if it exists on the # server. That content is conditionally used. A resolved account is # required. accountDetails <- findAccountInfo(account, server, error_call = error_call) if (!isPositCloudServer(accountDetails$server)) { client <- clientForAccount(accountDetails) application <- tryCatch( getAppByName(client, accountDetails, appName, error_call = error_call), rsconnect_app_not_found = function(err) NULL ) if (!is.null(application)) { uniqueName <- findUnique(appName, application$name) if (shouldUpdateApp(application, uniqueName, forceUpdate, error_call = error_call)) { deployment <- createDeploymentFromApplication(application, accountDetails) deployment <- updateDeployment(deployment, appTitle, envVars) return(list( accountDetails = accountDetails, deployment = deployment )) } else { appName <- uniqueName } } } # No existing deployment, or the caller does not want to re-use that content. deployment <- createDeployment( appName = appName, appTitle = appTitle, appId = NULL, envVars = envVars, username = accountDetails$name, account = accountDetails$name, server = accountDetails$server ) return(list( accountDetails = accountDetails, deployment = deployment )) } createDeployment <- function(appName, appTitle, appId, envVars, username, account, server, version = deploymentRecordVersion) { # Consider merging this object with the object returned by # deploymentRecord(). # # Field names are shared with deploymentRecord() objects to avoid lots of # record rewriting. Objects returned by findDeploymentTargetByAppName may # have fields from the on-disk records, which were created by # deploymentRecord(). list( name = appName, title = appTitle %||% "", envVars = envVars, appId = appId, username = username, account = account, server = server, version = version ) } createDeploymentFromApplication <- function(application, accountDetails) { createDeployment( appName = application$name, appTitle = application$title, appId = application$id, envVars = NULL, username = application$owner_username %||% accountDetails$name, account = accountDetails$name, server = accountDetails$server ) } updateDeployment <- function(previous, appTitle = NULL, envVars = NULL) { createDeployment( appName = previous$name, appTitle = appTitle %||% previous$title, appId = previous$appId, envVars = envVars %||% previous$envVars[[1]], # if username not previously recorded, use current account username = previous$username %||% previous$account, account = previous$account, server = previous$server, version = previous$version ) } defaultAppName <- function(recordPath, server = NULL) { if (isDocumentPath(recordPath)) { name <- file_path_sans_ext(basename(recordPath)) if (name == "index") { # parent directory will give more informative name name <- basename(dirname(recordPath)) } else { # deploying a document } } else { # deploying a directory name <- basename(recordPath) } if (isShinyappsServer(server)) { # Replace non-alphanumerics with underscores, trim to length 64 name <- tolower(gsub("[^[:alnum:]_-]+", "_", name, perl = TRUE)) name <- gsub("_+", "_", name) if (nchar(name) > 64) { name <- substr(name, 1, 64) } } name } shouldUpdateApp <- function(application, uniqueName, forceUpdate = FALSE, error_call = caller_env()) { if (forceUpdate) { return(TRUE) } message <- c( "Discovered a previously deployed app named {.str {application$name}}", "(View it at {.url {application$url}})" ) prompt <- "What do you want to do?" choices <- c( "Update the existing app.", "Create a new app with automatically generated name ({.str {uniqueName}}).", "Abort this deployment and supply a custom `appName`." ) not_interactive <- c( i = "Set `forceUpdate = TRUE` to update it.", i = "Supply a unique `appName` to deploy a new application." ) cli_menu(message, prompt, choices, not_interactive, quit = 3, error_call = error_call) == 1 } findUnique <- function(x, existing) { i <- 1 name <- paste0(x, "-", i) while (name %in% existing) { i <- i + 1 name <- paste0(x, "-", i) } name } rsconnect/R/purgeApp.R0000644000176200001440000000230314513230050014346 0ustar liggesusers#' Purge an Application #' #' Purge a currently archived ShinyApps application. #' #' @param appName Name of application to purge #' @param account Account name. If a single account is registered on the system #' then this parameter can be omitted. #' @param server Server name. Required only if you use the same account name on #' multiple servers (see [servers()]) #' @param quiet Request that no status information be printed to the console #' during the termination. #' #' @note This function only works for ShinyApps servers. #' #' @examples #' \dontrun{ #' #' # purge an application #' purgeApp("myapp") #' } #' @seealso [applications()], [deployApp()], and #' [restartApp()] #' @export purgeApp <- function(appName, account = NULL, server = NULL, quiet = FALSE) { accountDetails <- accountInfo(account, server) checkShinyappsServer(accountDetails$server) # define purge task taskDef <- list() taskDef$beginStatus <- "Purging application" taskDef$endStatus <- "Application successfully purged" taskDef$action <- function(client, application) { client$purgeApplication(application$id) } # perform it applicationTask(taskDef, appName, accountDetails, quiet) } rsconnect/R/bundleFiles.R0000644000176200001440000002204414513230050015023 0ustar liggesusers#' Gather files to be bundled with an app #' #' @description #' Given an app directory, and optional `appFiles` and `appFileManifest` #' arguments, returns vector of paths to bundle in the app. (Note that #' documents follow a different strategy; see [deployDoc()] for details.) #' #' When neither `appFiles` nor `appFileManifest` is supplied, #' `listDeploymentFiles()` will include all files under `appDir`, apart #' from the following: #' #' * Certain files and folders that don't need to be bundled, such as #' version control directories, internal config files, and RStudio state, #' are automatically excluded. #' #' * You can exclude additional files by listing them in in a `.rscignore` #' file. This file must have one file or directory per line (with path #' relative to the current directory). It doesn't support wildcards, or #' ignoring files in subdirectories. #' #' `listDeploymentFiles()` will throw an error if the total file size exceeds #' the maximum bundle size (as controlled by option `rsconnect.max.bundle.size`), #' or the number of files exceeds the maximum file limit (as controlled by #' option `rsconnect.max.bundle.files`). This prevents you from accidentally #' bundling a very large direcfory (i.e. you home directory). #' #' @inheritParams deployApp #' @param error_call The call or environment for error reporting; expert #' use only. #' @return Character of paths to bundle, relative to `appDir`. #' @export listDeploymentFiles <- function(appDir, appFiles = NULL, appFileManifest = NULL, error_call = caller_env()) { no_content <- function(message) { cli::cli_abort( c("No content to deploy.", x = message), call = error_call ) } if (!is.null(appFiles) && !is.null(appFileManifest)) { cli::cli_abort( "Must specify at most one of {.arg appFiles} and {.arg appFileManifest}", call = error_call ) } else if (is.null(appFiles) && is.null(appFileManifest)) { # no files supplied at all, just bundle the whole directory appFiles <- bundleFiles(appDir) if (length(appFiles) == 0) { no_content("{.arg appDir} is empty.") } } else if (!is.null(appFiles)) { check_character(appFiles, allow_null = TRUE, call = error_call) appFiles <- explodeFiles(appDir, appFiles, "appFiles") if (length(appFiles) == 0) { no_content("{.arg appFiles} didn't match any files in {.arg appDir}.") } } else if (!is.null(appFileManifest)) { check_file(appFileManifest, error_call = error_call) appFiles <- readFileManifest(appFileManifest) appFiles <- explodeFiles(appDir, appFiles, "appFileManifest") if (length(appFiles) == 0) { no_content("{.arg appFileManifest} contains no usable files.") } } appFiles } readFileManifest <- function(appFileManifest, error_call = caller_env()) { lines <- readLines(appFileManifest, warn = FALSE) # remove empty/comment lines lines <- lines[nzchar(lines)] lines <- lines[!grepl("^#", lines)] lines } #' List Files to be Bundled #' #' @description #' `r lifecycle::badge("superseded")` #' #' `listBundleFiles()` has been superseded in favour of [listDeploymentFiles()]. #' #' Given a directory containing an application, returns the names of the files #' that by default will be bundled in the application. It works similarly to #' a recursive directory listing from [list.files()] but enforces bundle sizes #' as described in [listDeploymentFiles()] #' #' @param appDir Directory containing the application. #' @return Returns a list containing the following elements: #' * `totalFiles`: Total number of files. #' * `totalSize`: Total size of the files (in bytes). #' * `contents`: Paths to bundle, relative to `appDir`. #' @export #' @keywords internal listBundleFiles <- function(appDir) { recursiveBundleFiles(appDir) } bundleFiles <- function(appDir) { listBundleFiles(appDir)$contents } explodeFiles <- function(dir, files, error_arg = "appFiles") { missing <- !file.exists(file.path(dir, files)) if (any(missing)) { cli::cli_warn(c( "All files listed in {.arg {error_arg}} must exist.", "Problems: {.file {files[missing]}}" )) files <- files[!missing] } recursiveBundleFiles(dir, contents = files, ignoreFiles = FALSE)$contents } recursiveBundleFiles <- function(dir, contents = NULL, rootDir = dir, totalFiles = 0, totalSize = 0, ignoreFiles = TRUE) { # generate a list of files at this level if (is.null(contents)) { contents <- list.files(dir, all.files = TRUE, no.. = TRUE) } if (ignoreFiles) { contents <- ignoreBundleFiles(dir, contents) } # Info for each file lets us know to recurse (directories) or aggregate (files). is_dir <- dir.exists(file.path(dir, contents)) names(is_dir) <- contents children <- character() for (name in contents) { if (isTRUE(is_dir[[name]])) { out <- recursiveBundleFiles( dir = file.path(dir, name), rootDir = rootDir, totalFiles = totalFiles, totalSize = totalSize, ignoreFiles = ignoreFiles ) children <- append(children, file.path(name, out$contents)) totalFiles <- out$totalFiles totalSize <- out$totalSize } else { children <- append(children, name) totalFiles <- totalFiles + 1 totalSize <- totalSize + file_size(file.path(dir, name)) } enforceBundleLimits(rootDir, totalFiles, totalSize) } list( contents = children, totalFiles = totalFiles, totalSize = totalSize ) } ignoreBundleFiles <- function(dir, contents) { # entries ignored regardless of type ignored <- c( # rsconnect packages "rsconnect", "rsconnect-python", "manifest.json", # packrat + renv, "renv", "packrat", # version control ".git", ".gitignore", ".svn", # R/RStudio ".Rhistory", ".Rproj.user", # other ".DS_Store", ".quarto", "app_cache", "__pycache__/" ) contents <- setdiff(contents, ignored) contents <- contents[!isKnitrCacheDir(contents)] contents <- contents[!isPythonEnv(dir, contents)] contents <- contents[!grepl("^~|~$", contents)] contents <- contents[!grepl(glob2rx("*.Rproj"), contents)] # remove any files lines listed .rscignore if (".rscignore" %in% contents) { ignoreContents <- readLines(file.path(dir, ".rscignore")) contents <- setdiff(contents, c(ignoreContents, ".rscignore")) } contents } isKnitrCacheDir <- function(files) { is_cache <- grepl("^.+_cache$", files) cache_rmd <- gsub("_cache$", ".Rmd", files) has_rmd <- tolower(cache_rmd) %in% tolower(files) ifelse(is_cache, has_rmd, FALSE) } # https://github.com/rstudio/rsconnect-python/blob/94dbd28797ee503d6/rsconnect/bundle.py#L541-L543 isPythonEnv <- function(dir, files) { (file.exists(file.path(dir, files, "bin", "python")) | file.exists(file.path(dir, files, "Scripts", "python.exe")) | file.exists(file.path(dir, files, "Scripts", "pythond.exe")) | file.exists(file.path(dir, files, "Scripts", "pythonw.exe"))) } enforceBundleLimits <- function(appDir, totalFiles, totalSize) { maxSize <- getOption("rsconnect.max.bundle.size", 3000 * 1024^2) maxFiles <- getOption("rsconnect.max.bundle.files", 10000) if (totalSize > maxSize) { cli::cli_abort(c( "{.arg appDir} ({.path {appDir}}) is too large to be deployed.", x = "The maximum size is {maxSize} bytes.", x = "This directory is at least {totalSize} bytes.", i = "Remove some files or adjust the rsconnect.max.bundle.size option." )) } if (totalFiles > maxFiles) { cli::cli_abort(c( "{.arg appDir} ({.path {appDir}}) is too large to be deployed.", x = "The maximum number of files is {maxFiles}.", x = "This directory contains at least {totalFiles} files.", i = "Remove some files or adjust the rsconnect.max.bundle.files option." )) } } # Scan the bundle directory looking for long user/group names. # # Warn that the internal tar implementation may produce invalid archives. # https://github.com/rstudio/rsconnect/issues/446 # https://bugs.r-project.org/bugzilla/show_bug.cgi?id=17871 detectLongNames <- function(bundleDir, lengthLimit = 32) { files <- list.files( bundleDir, recursive = TRUE, all.files = TRUE, include.dirs = TRUE, no.. = TRUE ) info <- file.info(file.path(bundleDir, files)) ok <- (is.na(info$uname) | nchar(info$uname) <= lengthLimit) & (is.na(info$grname) | nchar(info$grname) <= lengthLimit) if (all(ok)) { return(invisible(FALSE)) } bad_files <- files[!ok] cli::cli_warn( c( "The bundle contains files with user/group names longer than {lengthLimit}.", x = "Files: {.path {bad_files}}", x = "Long user and group names cause the internal R tar implementation to produce invalid archives", i = "Set the {.code rsconnect.tar} option or the {.code RSCONNECT_TAR} environment variable to the path to a tar executable." ) ) return(invisible(FALSE)) } rsconnect/R/terminateApp.R0000644000176200001440000000237314513230050015223 0ustar liggesusers#' Terminate an Application #' #' Terminate and archive a currently deployed ShinyApps application. #' #' @param appName Name of application to terminate #' @param account Account name. If a single account is registered on the system #' then this parameter can be omitted. #' @param server Server name. Required only if you use the same account name on #' multiple servers (see [servers()]) #' @param quiet Request that no status information be printed to the console #' during the termination. #' #' @note This function only works for ShinyApps servers. #' #' @examples #' \dontrun{ #' #' # terminate an application #' terminateApp("myapp") #' } #' @seealso [applications()], [deployApp()], and #' [restartApp()] #' @export terminateApp <- function(appName, account = NULL, server = NULL, quiet = FALSE) { accountDetails <- accountInfo(account, server) checkShinyappsServer(accountDetails$server) # define terminate task taskDef <- list() taskDef$beginStatus <- "Terminating application" taskDef$endStatus <- "Application successfully terminated" taskDef$action <- function(client, application) { client$terminateApplication(application$id) } # perform it applicationTask(taskDef, appName, accountDetails, quiet) } rsconnect/R/applications.R0000644000176200001440000002415114516247550015276 0ustar liggesusers #' List Deployed Applications #' #' List all applications currently deployed for a given account. #' @inheritParams deployApp #' @return #' Returns a data frame with the following columns: #' \tabular{ll}{ #' `id` \tab Application unique id \cr #' `name` \tab Name of application \cr #' `title` \tab Application title \cr #' `url` \tab URL where application can be accessed \cr #' #' `status` \tab Current status of application. Valid values are `pending`, #' `deploying`, `running`, `terminating`, and `terminated` \cr #' `size` \tab Instance size (small, medium, large, etc.) (on #' ShinyApps.io) \cr #' `instances` \tab Number of instances (on ShinyApps.io) \cr #' `config_url` \tab URL where application can be configured \cr #' } #' @note To register an account you call the [setAccountInfo()] function. #' @examples #' \dontrun{ #' #' # list all applications for the default account #' applications() #' #' # list all applications for a specific account #' applications("myaccount") #' #' # view the list of applications in the data viewer #' View(applications()) #' } #' @seealso [deployApp()], [terminateApp()] #' @family Deployment functions #' @export applications <- function(account = NULL, server = NULL) { # resolve account and create connect client accountDetails <- accountInfo(account, server) serverDetails <- serverInfo(accountDetails$server) client <- clientForAccount(accountDetails) isConnect <- isConnectServer(accountDetails$server) # retrieve applications apps <- client$listApplications(accountDetails$accountId) # extract the subset of fields we're interested in keep <- if (isConnect) { c( "id", "name", "title", "url", "build_status", "created_time", "last_deployed_time", "guid" ) } else { c( "id", "name", "url", "status", "created_time", "updated_time", "deployment" ) } res <- lapply(apps, `[`, keep) res <- if (isConnect) { lapply(res, function(x) { # set size and instance to NA since Connect doesn't return this info x$size <- NA x$instances <- NA x$title <- x$title %||% NA_character_ x }) } else { lapply(res, function(x) { # promote the size and instance data to first-level fields x$size <- x$deployment$properties$application.instances.template if (is.null(x$size)) x$size <- NA x$instances <- x$deployment$properties$application.instances.count if (is.null(x$instances)) x$instances <- NA x$deployment <- NULL x$guid <- NA x$title <- NA_character_ x }) } # The config URL may be provided by the server at some point, but for now # infer it from the account type res <- lapply(res, function(row) { if (isConnect) { prefix <- sub("/__api__", "", serverDetails$url) row$config_url <- paste(prefix, "connect/#/apps", row$id, sep = "/") } else { row$config_url <- paste("https://www.shinyapps.io/admin/#/application", row$id, sep = "/") } row }) # convert to data frame res <- lapply(res, as.data.frame, stringsAsFactors = FALSE) res <- do.call("rbind", res) # Ensure the Connect and ShinyApps.io data frames have same column names idx <- match("last_deployed_time", names(res)) if (!is.na(idx)) names(res)[idx] <- "updated_time" idx <- match("build_status", names(res)) if (!is.na(idx)) names(res)[idx] <- "status" return(res) } # Use the API to filter applications by name and error when it does not exist. getAppByName <- function(client, accountInfo, name, error_call = caller_env()) { # NOTE: returns a list with 0 or 1 elements app <- client$listApplications(accountInfo$accountId, filters = list(name = name)) if (length(app)) { return(app[[1]]) } cli::cli_abort( c( "No application found", i = "Specify the application directory, name, and/or associated account." ), call = error_call, class = "rsconnect_app_not_found" ) } # Use the API to list all applications then filter the results client-side. resolveApplication <- function(accountDetails, appName) { client <- clientForAccount(accountDetails) apps <- client$listApplications(accountDetails$accountId) for (app in apps) { if (identical(app$name, appName)) return(app) } stopWithApplicationNotFound(appName) } getApplication <- function(account, server, appId) { accountDetails <- accountInfo(account, server) client <- clientForAccount(accountDetails) withCallingHandlers( client$getApplication(appId, "unknown"), rsconnect_http_404 = function(err) { cli::cli_abort("Can't find app with id {.str {appId}}", parent = err) } ) } stopWithApplicationNotFound <- function(appName) { stop(paste("No application named '", appName, "' is currently deployed.", sep = ""), call. = FALSE) } applicationTask <- function(taskDef, appName, accountDetails, quiet) { # resolve target account and application application <- resolveApplication(accountDetails, appName) # get status function and display initial status displayStatus <- displayStatus(quiet) displayStatus(paste(taskDef$beginStatus, "...\n", sep = "")) # perform the action client <- clientForAccount(accountDetails) task <- taskDef$action(client, application) client$waitForTask(task$task_id, quiet) displayStatus(paste(taskDef$endStatus, "\n", sep = "")) invisible(NULL) } # streams application logs from ShinyApps streamApplicationLogs <- function(authInfo, applicationId, entries, skip) { # build the URL url <- paste0(serverInfo("shinyapps.io")$url, "/applications/", applicationId, "/logs?", "count=", entries, "&tail=1") parsed <- parseHttpUrl(url) # create the curl handle and perform the minimum necessary to create an # authenticated request. we ignore the rsconnect.http option here because only # curl supports the kind of streaming connection that we need. handle <- createCurlHandle("GET") curl::handle_setheaders(handle, .list = signatureHeaders(authInfo, "GET", parsed$path, NULL) ) # begin the stream curl::curl_fetch_stream(url = url, fun = function(data) { if (skip > 0) skip <<- skip - 1 else cat(rawToChar(data)) }, handle = handle) } #' Show Application Logs #' #' Show the logs for a deployed ShinyApps application. #' #' @param appPath The path to the directory or file that was deployed. #' @param appFile The path to the R source file that contains the application #' (for single file applications). #' @param appName The name of the application to show logs for. May be omitted #' if only one application deployment was made from `appPath`. #' @param account The account under which the application was deployed. May be #' omitted if only one account is registered on the system. #' @param server Server name. Required only if you use the same account name on #' multiple servers. #' @param entries The number of log entries to show. Defaults to 50 entries. #' @param streaming Whether to stream the logs. If `TRUE`, then the #' function does not return; instead, log entries are written to the console #' as they are made, until R is interrupted. Defaults to `FALSE`. #' #' @note This function only uses the \code{libcurl} transport, and works only for #' ShinyApps servers. #' #' @export showLogs <- function(appPath = getwd(), appFile = NULL, appName = NULL, account = NULL, server = NULL, entries = 50, streaming = FALSE) { # determine the log target and target account info deployment <- findDeployment( appPath = appPath, appName = appName, server = server, account = account ) accountDetails <- accountInfo(deployment$account, deployment$server) client <- clientForAccount(accountDetails) application <- getAppByName(client, accountDetails, deployment$name) if (streaming) { # streaming; poll for the entries directly skip <- 0 repeat { tryCatch({ streamApplicationLogs(accountDetails, application$id, entries, skip) # after the first fetch, we've seen all recent entries, so show # only new entries. unfortunately /logs/ doesn't support getting 0 # entries, so get one and don't log it. entries <- 1 skip <- 1 }, error = function(e) { # if the server times out, ignore the error; otherwise, let it # bubble through if (!identical(e$message, "transfer closed with outstanding read data remaining")) { stop(e) } }) } } else { # if not streaming, poll for the entries directly logs <- client$getLogs(application$id, entries) cat(logs) } } #' Update deployment records #' #' Update the deployment records for applications published to Posit Connect. #' This updates application title and URL, and deletes records for deployments #' where the application has been deleted on the server. #' #' @param appPath The path to the directory or file that was deployed. #' @export syncAppMetadata <- function(appPath = ".") { check_directory(appPath) deploys <- deployments(appPath) for (i in seq_len(nrow(deploys))) { curDeploy <- deploys[i, ] # don't sync if published to RPubs if (isRPubs(curDeploy$server)) { next } account <- accountInfo(curDeploy$account, curDeploy$server) client <- clientForAccount(account) application <- tryCatch( client$getApplication(curDeploy$appId), rsconnect_http_404 = function(c) { # if the app has been deleted, delete the deployment record file.remove(curDeploy$deploymentFile) cli::cli_inform("Deleting deployment record for deleted app {curDeploy$appId}.") NULL } ) if (is.null(application)) { next } # update the record and save out a new config file path <- curDeploy$deploymentFile curDeploy$deploymentFile <- NULL # added on read # remove old fields curDeploy$when <- NULL curDeploy$lastSyncTime <- NULL curDeploy$title <- application$title curDeploy$url <- application$url writeDeploymentRecord(curDeploy, path) } } rsconnect/R/bundle.R0000644000176200001440000001773414513230050014052 0ustar liggesusers# Given a path to an directory and a list of files in that directory, copies # those files to a new temporary directory. Performs some small modifications # in this process, including renaming single-file Shiny apps to "app.R" and # stripping packrat and renv commands from .Rprofile. Returns the path to the # temporary directory. bundleAppDir <- function(appDir, appFiles, appPrimaryDoc = NULL, verbose = FALSE) { logger <- verboseLogger(verbose) logger("Creating tempfile for appdir") # create a directory to stage the application bundle in bundleDir <- dirCreate(tempfile()) defer(unlink(bundleDir)) logger("Copying files") # copy the files into the bundle dir for (file in appFiles) { logger("Copying", file) from <- file.path(appDir, file) to <- file.path(bundleDir, file) # if deploying a single-file Shiny application, name it "app.R" so it can # be run as an ordinary Shiny application if (is.character(appPrimaryDoc) && tolower(tools::file_ext(appPrimaryDoc)) == "r" && file == appPrimaryDoc) { to <- file.path(bundleDir, "app.R") } dirCreate(dirname(to)) file.copy(from, to, copy.date = TRUE) # ensure .Rprofile doesn't call packrat/init.R or renv/activate.R if (basename(to) == ".Rprofile") { tweakRProfile(to) } } bundleDir } tweakRProfile <- function(path) { lines <- readLines(path) packratLines <- grep('source("packrat/init.R")', lines, fixed = TRUE) if (length(packratLines) > 0) { lines[packratLines] <- paste0( "# Packrat initialization disabled in published application\n", '# source("packrat/init.R")' ) } renvLines <- grep('source("renv/activate.R")', lines, fixed = TRUE) if (length(renvLines) > 0) { lines[renvLines] <- paste0( "# renv initialization disabled in published application\n", '# source("renv/activate.R")' ) } if (length(renvLines) > 0 || length(packratLines) > 0) { msg <- sprintf( "# Modified by rsconnect package %s on %s", packageVersion("rsconnect"), Sys.time() ) lines <- c(msg, lines) } writeLines(lines, path) } # Writes a tar.gz file located at bundlePath containing all files in bundleDir. writeBundle <- function(bundleDir, bundlePath, verbose = FALSE) { logger <- verboseLogger(verbose) prevDir <- setwd(bundleDir) defer(setwd(prevDir)) tarImplementation <- getTarImplementation() logger("Using tar: ", tarImplementation) if (tarImplementation == "internal") { detectLongNames(bundleDir) } utils::tar(bundlePath, files = NULL, compression = "gzip", tar = tarImplementation) } getTarImplementation <- function() { # Check the rsconnect.tar option first. If that is unset, check the # RSCONNECT_TAR environment var. If neither are set, use "internal". tarImplementation <- getOption("rsconnect.tar", default = NA) if (is.na(tarImplementation) || !nzchar(tarImplementation)) { tarImplementation <- Sys.getenv("RSCONNECT_TAR", unset = NA) } if (is.na(tarImplementation) || !nzchar(tarImplementation)) { tarImplementation <- "internal" } return(tarImplementation) } isWindows <- function() { Sys.info()[["sysname"]] == "Windows" } createAppManifest <- function(appDir, appMetadata, users = NULL, pythonConfig = NULL, retainPackratDirectory = TRUE, image = NULL, envManagement = NULL, envManagementR = NULL, envManagementPy = NULL, verbose = FALSE, quiet = FALSE) { if (needsR(appMetadata)) { extraPackages <- inferRPackageDependencies(appMetadata) # provide package entries for all dependencies packages <- bundlePackages( bundleDir = appDir, extraPackages = extraPackages, verbose = verbose, quiet = quiet ) } else { packages <- list() } needsPython <- appMetadata$documentsHavePython || "jupyter" %in% appMetadata$quartoInfo$engines || "reticulate" %in% names(packages) if (needsPython && !is.null(pythonConfig)) { python <- pythonConfig(appDir) packageFile <- file.path(appDir, python$package_manager$package_file) writeLines(python$package_manager$contents, packageFile) python$package_manager$contents <- NULL } else { python <- NULL } if (!retainPackratDirectory) { # Optionally remove the packrat directory when it will not be included in # deployments, such as manifest-only deployments. unlink(file.path(appDir, "packrat"), recursive = TRUE) } # build the list of files to checksum files <- list.files(appDir, recursive = TRUE, all.files = TRUE, full.names = FALSE) # provide checksums for all files filelist <- list() for (file in files) { filepath <- file.path(appDir, file) checksum <- list(checksum = fileMD5(filepath)) filelist[[file]] <- I(checksum) } # create userlist userlist <- list() if (!is.null(users) && length(users) > 0) { for (i in 1:nrow(users)) { user <- users[i, "user"] hash <- users[i, "hash"] userinfo <- list() userinfo$hash <- hash userlist[[user]] <- userinfo } } # create the manifest manifest <- list() manifest$version <- 1 manifest$locale <- getOption("rsconnect.locale", detectLocale()) manifest$platform <- paste(R.Version()$major, R.Version()$minor, sep = ".") metadata <- list(appmode = appMetadata$appMode) # emit appropriate primary document information primaryDoc <- ifelse(is.null(appMetadata$appPrimaryDoc) || tolower(tools::file_ext(appMetadata$appPrimaryDoc)) == "r", NA, appMetadata$appPrimaryDoc) metadata$primary_rmd <- ifelse(appMetadata$appMode %in% c("rmd-shiny", "rmd-static", "quarto-shiny", "quarto-static"), primaryDoc, NA) metadata$primary_html <- ifelse(appMetadata$appMode == "static", primaryDoc, NA) # emit content category (plots, etc) metadata$content_category <- ifelse(!is.null(appMetadata$contentCategory), appMetadata$contentCategory, NA) metadata$has_parameters <- appMetadata$hasParameters # add metadata manifest$metadata <- metadata # handle shorthand arg to enable/disable both R and Python if (!is.null(envManagement)) { envManagementR <- envManagement envManagementPy <- envManagement } # if envManagement is explicitly enabled/disabled, # create an environment_management obj envManagementInfo <- list() if (!is.null(envManagementR)) { envManagementInfo$r <- envManagementR } if (!is.null(envManagementPy)) { envManagementInfo$python <- envManagementPy } # emit the environment field if (!is.null(image) || length(envManagementInfo) > 0) { manifest$environment <- list() # if there is a target image, attach it to the environment if (!is.null(image)) { manifest$environment$image <- image } # if either environment_management.r or environment_management.python # is provided, write the environment_management field if (length(envManagementInfo) > 0) { manifest$environment$environment_management <- envManagementInfo } } # indicate whether this is a quarto app/doc manifest$quarto <- appMetadata$quartoInfo # if there is python info for reticulate or Quarto, attach it if (!is.null(python)) { manifest$python <- python } # if there are no packages set manifest$packages to NA (json null) if (length(packages) > 0) { manifest$packages <- I(packages) } else { manifest$packages <- NA } # if there are no files, set manifest$files to NA (json null) if (length(files) > 0) { manifest$files <- I(filelist) } else { manifest$files <- NA } # if there are no users set manifest$users to NA (json null) if (length(users) > 0) { manifest$users <- I(userlist) } else { manifest$users <- NA } manifest } rsconnect/R/configureApp.R0000644000176200001440000001346114515740414015230 0ustar liggesusers#' Configure an Application #' #' Configure an application running on a remote server. #' #' @inheritParams deployApp #' #' @param appName Name of application to configure #' @param appDir Directory containing application. Defaults to #' current working directory. #' @inheritParams deployApp #' @param redeploy Re-deploy application after its been configured. #' @param size Configure application instance size #' @param instances Configure number of application instances #' @examples #' \dontrun{ #' #' # set instance size for an application #' configureApp("myapp", size="xlarge") #' } #' @seealso [applications()], [deployApp()] #' @note This function works only for ShinyApps servers. #' @export configureApp <- function(appName, appDir = getwd(), account = NULL, server = NULL, redeploy = TRUE, size = NULL, instances = NULL, logLevel = c("normal", "quiet", "verbose")) { accountDetails <- accountInfo(account, server) checkShinyappsServer(accountDetails$server) if (is.null(appName)) appName <- basename(appDir) application <- resolveApplication(accountDetails, appName) displayStatus <- displayStatus(identical(logLevel, "quiet")) # some properties may required a rebuild to take effect rebuildRequired <- FALSE # get a list of properties to set properties <- list() if (! is.null(size)) { properties[["application.instances.template"]] <- size } if (! is.null(instances)) { properties[["application.instances.count"]] <- instances } # set application properties client <- clientForAccount(accountDetails) for (i in names(properties)) { propertyName <- i propertyValue <- properties[[i]] # dispatch to the appropriate client implementation if (is.function(client$configureApplication)) client$configureApplication(application$id, propertyName, propertyValue) else if (is.function(client$setApplicationProperty)) client$setApplicationProperty(application$id, propertyName, propertyValue) else stop("Server ", accountDetails$server, " has no appropriate configuration method.") } # redeploy application if requested if (redeploy) { if (length(properties) > 0) { deployApp(appDir = appDir, appName = appName, account = account, logLevel = logLevel, upload = rebuildRequired) } else { displayStatus("No configuration changes to deploy") } } } #' Set Application property #' #' Set a property on currently deployed ShinyApps application. #' #' @param propertyName Name of property #' @param propertyValue Property value #' @param appName Name of application #' @param appPath Directory or file that was deployed. Defaults to current #' working directory. #' @inheritParams deployApp #' @param force Forcibly set the property #' #' @note This function only works for ShinyApps servers. #' #' @examples #' \dontrun{ #' #' # set instance size for an application #' setProperty("application.instances.count", 1) #' #' # disable application package cache #' setProperty("application.package.cache", FALSE) #' #' } #' @export setProperty <- function(propertyName, propertyValue, appPath = getwd(), appName = NULL, account = NULL, server = NULL, force = FALSE) { deployment <- findDeployment( appPath = appPath, appName = appName, server = server, account = account ) accountDetails <- accountInfo(deployment$account, deployment$server) checkShinyappsServer(accountDetails$server) client <- clientForAccount(accountDetails) application <- getAppByName(client, accountDetails, deployment$name) invisible(client$setApplicationProperty(application$id, propertyName, propertyValue, force)) } #' Unset Application property #' #' Unset a property on currently deployed ShinyApps application (restoring to #' its default value) #' #' @inheritParams setProperty #' @param force Forcibly unset the property #' #' @note This function only works for ShinyApps servers. #' #' @examples #' \dontrun{ #' #' # unset application package cache property to revert to default #' unsetProperty("application.package.cache") #' #' } #' @export unsetProperty <- function(propertyName, appPath = getwd(), appName = NULL, account = NULL, server = NULL, force = FALSE) { deployment <- findDeployment( appPath = appPath, appName = appName, server = server, account = account ) accountDetails <- accountInfo(deployment$account, deployment$server) checkShinyappsServer(accountDetails$server) client <- clientForAccount(accountDetails) application <- getAppByName(client, accountInfo, deployment$name) invisible(client$unsetApplicationProperty(application$id, propertyName, force)) } #' Show Application property #' #' Show properties of an application deployed to ShinyApps. #' #' @param appName Name of application #' @param appPath Directory or file that was deployed. Defaults to current #' working directory. #' @inheritParams deployApp #' #' @note This function works only for ShinyApps servers. #' #' @export showProperties <- function(appPath = getwd(), appName = NULL, account = NULL, server = NULL) { deployment <- findDeployment( appPath = appPath, appName = appName, account = account, server = server ) accountDetails <- accountInfo(deployment$account, deployment$server) checkShinyappsServer(accountDetails$server) client <- clientForAccount(accountDetails) application <- getAppByName(client, accountDetails, deployment$name) # convert to data frame res <- do.call(rbind, application$deployment$properties) df <- as.data.frame(res, stringsAsFactors = FALSE) names(df) <- c("value") return(df) } rsconnect/R/account-find.R0000644000176200001440000000642014516247550015161 0ustar liggesusers# Return a list containing the name and server associated with a matching account. # # Use `accountInfo()` and `findAccountInfo()` to load credentials associated with this account. findAccount <- function(accountName = NULL, server = NULL, error_call = caller_env()) { check_string(accountName, allow_null = TRUE, arg = "account", call = error_call) check_string(server, allow_null = TRUE, call = error_call) accounts <- accounts() if (nrow(accounts) == 0) { cli::cli_abort( c( "No accounts registered.", i = "Call {.fun rsconnect::setAccountInfo} to register an account." ), call = error_call ) } if (!is.null(accountName) && !is.null(server)) { theseAccounts <- accounts[accounts$server == server & accounts$name == accountName, , drop = FALSE] if (nrow(theseAccounts) == 0) { cli::cli_abort( c( "Can't find account with {.arg name} = {.str {accountName}} and {.arg server} = {.str {server}}", i = "Call {.fun accounts} to see available options." ), call = error_call ) } } else if (is.null(accountName) && !is.null(server)) { theseAccounts <- accounts[accounts$server == server, , drop = FALSE] if (nrow(theseAccounts) == 0) { cli::cli_abort( c( "Can't find any accounts with {.arg server} = {.str {server}}.", i = "Known servers are {.str {unique(accounts$server)}}." ), call = error_call ) } else if (nrow(theseAccounts) > 1) { cli::cli_abort( c( "Found multiple accounts for {.arg server} = {.str {server}}.", "Please disambiguate by setting {.arg account}.", i = "Known account names are {.str {theseAccounts$name}}." ), call = error_call ) } } else if (!is.null(accountName) && is.null(server)) { theseAccounts <- accounts[accounts$name == accountName, , drop = FALSE] if (nrow(theseAccounts) == 0) { cli::cli_abort( c( "Can't find any accounts with {.arg account} = {.str {accountName}}.", i = "Available account names: {.str {unique(accounts$name)}}." ), call = error_call ) } else if (nrow(theseAccounts) > 1) { cli::cli_abort( c( "Found multiple accounts for {.arg account} = {.str {accountName}}.", "Please disambiguate by setting {.arg server}.", i = "Available servers: {.str {theseAccounts$server}}." ), call = error_call ) } } else { theseAccounts <- accounts if (nrow(theseAccounts) > 1) { if (is_interactive()) { labels <- accountLabel(accounts$name, accounts$server) choice <- cli_menu( "Found multiple accounts.", "Which one do you want to use?", labels ) theseAccounts <- theseAccounts[choice, , drop = FALSE] } else { cli::cli_abort( c( "Found multiple accounts.", "Please disambiguate by setting {.arg server} and/or {.arg account}.", i = "Available servers: {.str {unique(theseAccounts$server)}}.", i = "Available account names: {.str {unique(theseAccounts$name)}}." ), call = error_call ) } } } as.list(theseAccounts) } rsconnect/R/deploySite.R0000644000176200001440000001114414513230050014707 0ustar liggesusers#' Deploy a website #' #' Deploy an R Markdown or quarto website to a server. #' #' @inheritParams deployApp #' @param siteDir Directory containing website. Defaults to current directory. #' @param siteName Name for the site (names must be unique within #' an account). Defaults to the base name of the specified `siteDir` #' or to the name provided by a custom site generation function. #' @param siteTitle Title for the site. For quarto sites only, if not #' supplied uses the title recorded in `_quarto.yml`. #' @param render Rendering behavior for site: #' #' * `"none"` uploads a static version of the current contents of #' the site directory. #' * `"local"` renders the site locally then uploads it. #' * `"server"` uploads the source of the site to render on the server. #' #' Note that for `"none"` and `"local"` source files (e.g. `.R`, `.Rmd` and #' `.md`) will not be uploaded to the server. #' @param recordDir The default, `NULL`, uses `siteDir`. #' @param ... Additional arguments to [deployApp()]. Do not supply `appDir` #' or `appFiles`; these parameters are automatically generated by #' `deploySite()`. #' @family Deployment functions #' @export deploySite <- function(siteDir = getwd(), siteName = NULL, siteTitle = NULL, account = NULL, server = NULL, render = c("none", "local", "server"), launch.browser = getOption("rsconnect.launch.browser", interactive()), logLevel = c("normal", "quiet", "verbose"), lint = FALSE, metadata = list(), python = NULL, recordDir = NULL, ...) { check_directory(siteDir) isQuarto <- file.exists(file.path(siteDir, "_quarto.yml")) || file.exists(file.path(siteDir, "_quarto.yaml")) quiet <- identical(match.arg(logLevel), "quiet") if (isQuarto) { site <- quartoSite(siteDir, quiet = quiet) } else { site <- rmarkdownSite(siteDir, quiet = quiet) } # render locally if requested render <- arg_match(render) if (render == "local") { site$render() } # determine appDir based on whether we are rendering on the server if (render == "server") { appDir <- siteDir } else { appDir <- site$output_dir } # Need to override recordDir to always record in the source directory if (is.null(recordDir)) { # We're deploying an entire directory, so we don't really need to set # a path here, but we don't want to break existing deployments so # we leave the existing behaviour for RMarkdown if (!isQuarto) { name <- if (file.exists("index.Rmd")) "index.Rmd" else "index.md" recordDir <- file.path(siteDir, name) } else { recordDir <- siteDir } } deployApp( appName = siteName %||% site$name, appTitle = siteTitle %||% site$title, appDir = appDir, recordDir = recordDir, contentCategory = "site", account = account, server = server, launch.browser = launch.browser, logLevel = logLevel, lint = lint, metadata = metadata, python = python, ... ) } quartoSite <- function(path, quiet = FALSE, error_call = caller_env()) { check_installed( "quarto", reason = "to deploy quarto sites", call = error_call ) config <- quarto::quarto_inspect(path)$config list( render = function() quarto::quarto_render(path, quiet = quiet, as_job = FALSE), name = basename(normalizePath(path)), title = config$website$title %||% config$book$title %||% config$title, # non-site projects build in current directory output_dir = outputDir(path, config$project$`output-dir` %||% ".") ) } rmarkdownSite <- function(siteDir, quiet = FALSE, error_call = caller_env()) { check_installed( "rmarkdown", version = "0.9.5.3", reason = "to deploy RMarkdown sites", call = error_call ) # discover the site generator siteGenerator <- rmarkdown::site_generator(siteDir) if (is.null(siteGenerator)) { cli::cli_abort( "No `_site.yml` found in {.path {siteDir}.}", call = error_call ) } list( render = function() { siteGenerator$render( input_file = NULL, output_format = NULL, envir = new.env(), quiet = quiet, encoding = getOption("encoding") ) }, name = siteGenerator$name, title = NULL, output_dir = outputDir(siteDir, siteGenerator$output_dir) ) } outputDir <- function(wd, path) { old <- setwd(wd) defer(setwd(old)) normalizePath(dirCreate(path), mustWork = FALSE) } rsconnect/R/client.R0000644000176200001440000001060614513230050014046 0ustar liggesusersclientForAccount <- function(account) { serverInfo <- serverInfo(account$server) account$certificate <- serverInfo$certificate serverUrl <- parseHttpUrl(serverInfo$url) if (isShinyappsServer(account$server)) { shinyAppsClient(serverUrl, account) } else if (isPositCloudServer(account$server)) { cloudClient(serverUrl, account) } else { connectClient(serverUrl, account) } } # Appropriate when the list API includes "count" and "total" fields in the response JSON and the API # supports pagination with the query arguments count=PAGE_SIZE&offset=STARTING_POINT. listRequest <- function(service, authInfo, path, query, listName, page = 100, max = NULL) { # accumulate multiple pages of results offset <- 0 results <- list() repeat { # add query params queryWithList <- paste(query, "&count=", page, "&offset=", offset, sep = "") # make request and append the results response <- GET(service, authInfo, path, queryWithList) results <- append(results, response[[listName]]) # update the offset offset <- offset + response$count # get all results if no max was specified if (is.null(max)) { max <- response$total } # exit if we've got them all if (length(results) >= response$total || length(results) >= max) break } return(results) } # /__api__/applications response with { applications: [], count: M, total: N, continuation: "CONTINUATION" } # To paginate, use the query arguments cont=CONTINUATION&start=START&count=MAX listApplicationsRequest <- function(service, authInfo, path, query, listName, page = 100, max = NULL) { # accumulate multiple pages of results start <- 0 cont <- "" results <- list() repeat { # add query params queryWithList <- paste(query, "&count=", page, "&start=", start, "&cont=", cont, sep = "") # make request and append the results response <- GET(service, authInfo, path, queryWithList) results <- append(results, response[[listName]]) # update the starting point for the next request start <- start + response$count cont <- response$continuation # get all results if no max was specified if (is.null(max)) { max <- response$total } # exit if we've got them all if (length(results) >= response$total || length(results) >= max) break } return(results) } filterQuery <- function(param, value, operator = NULL) { if (is.null(operator)) { op <- ":" } else { op <- paste(":", operator, ":", sep = "") } q <- paste("filter=", param, op, value, sep = "") return(q) } isContentType <- function(x, contentType) { grepl(contentType, x, fixed = TRUE) } uploadCloudBundle <- function(client, application_id, bundlePath, verbose = FALSE) { # Step 1. Create presigned URL and register pending bundle. bundleSize <- file.info(bundlePath)$size bundle <- client$createBundle( application_id, content_type = "application/x-tar", content_length = bundleSize, checksum = fileMD5(bundlePath) ) # Step 2. Upload Bundle to presigned URL logger <- verboseLogger(verbose) logger("Starting upload now") if (!uploadBundle(bundle, bundleSize, bundlePath)) { stop("Could not upload file.") } logger("Upload complete") # Step 3. Upload revise bundle status. response <- client$updateBundleStatus(bundle$id, status = "ready") # Step 4. Retrieve updated bundle post status change client$getBundle(bundle$id) } uploadBundle <- function(bundle, bundleSize, bundlePath) { presigned_service <- parseHttpUrl(bundle$presigned_url) headers <- list() headers$`Content-Type` <- "application/x-tar" headers$`Content-Length` <- bundleSize # AWS requires a base64 encoded hash headers$`Content-MD5` <- bundle$presigned_checksum # AWS seems very sensitive to additional headers (likely becauseit was not included and signed # for when the presigned link was created). So the lower level library is used here. http <- httpFunction() response <- http( presigned_service$protocol, presigned_service$host, presigned_service$port, "PUT", presigned_service$path, headers, headers$`Content-Type`, bundlePath ) response$status == 200 } rsconnect/R/rpubs.R0000644000176200001440000001343714513230050013730 0ustar liggesusers#' Upload a file to RPubs #' #' This function publishes a file to rpubs.com. If the upload succeeds a #' list that includes an `id` and `continueUrl` is returned. A browser #' should be opened to the `continueUrl` to complete publishing of the #' document. If an error occurs then a diagnostic message is returned in the #' `error` element of the list. #' #' @param title The title of the document. #' @param contentFile The path to the content file to upload. #' @param originalDoc The document that was rendered to produce the #' `contentFile`. May be `NULL` if the document is not known. #' @param id If this upload is an update of an existing document then the id #' parameter should specify the document id to update. Note that the id is #' provided as an element of the list returned by successful calls to #' `rpubsUpload`. #' @param properties A named list containing additional document properties #' (RPubs doesn't currently expect any additional properties, this parameter #' is reserved for future use). #' #' @return A named list. If the upload was successful then the list contains a #' `id` element that can be used to subsequently update the document as #' well as a `continueUrl` element that provides a URL that a browser #' should be opened to in order to complete publishing of the document. If the #' upload fails then the list contains an `error` element which contains #' an explanation of the error that occurred. #' #' @examples #' \dontrun{ #' # upload a document #' result <- rpubsUpload("My document title", "Document.html") #' if (!is.null(result$continueUrl)) #' browseURL(result$continueUrl) #' else #' stop(result$error) #' #' # update the same document with a new title #' updateResult <- rpubsUpload("My updated title", "Document.html", #' id = result$id) #' } #' @export rpubsUpload <- function(title, contentFile, originalDoc, id = NULL, properties = list()) { check_string(title, allow_empty = FALSE) check_file(contentFile) if (!is.list(properties)) stop("properties paramater must be a named list") pathFromId <- function(id) { split <- strsplit(id, "^https?://[^/]+")[[1]] if (length(split) == 2) return(split[2]) else return(NULL) } buildPackage <- function(title, contentFile, properties = list()) { # build package.json properties$title <- title packageJson <- toJSON(properties) # create a tempdir to build the package in and copy the files to it fileSep <- .Platform$file.sep packageDir <- dirCreate(tempfile()) packageFile <- function(fileName) { paste(packageDir, fileName, sep = fileSep) } writeLines(packageJson, packageFile("package.json")) file.copy(contentFile, packageFile("index.html")) # create the tarball tarfile <- tempfile("package", fileext = ".tar.gz") writeBundle(packageDir, tarfile) # return the full path to the tarball return(tarfile) } # build the package packageFile <- buildPackage(title, contentFile, properties) # determine whether this is a new doc or an update isUpdate <- FALSE method <- "POST" path <- "/api/v1/document" headers <- list() headers$Connection <- "close" if (!is.null(id)) { isUpdate <- TRUE path <- pathFromId(id) method <- "PUT" } # use https if using a curl R package, and vanilla HTTP otherwise http <- httpFunction() if (identical(http, httpRCurl) || identical(http, httpLibCurl)) { protocol <- "https" port <- 443 } else { protocol <- "http" port <- 80 } # send the request result <- http(protocol = protocol, host = "api.rpubs.com", port = port, method = method, path = path, headers = headers, contentType = "application/x-compressed", contentFile = packageFile) # check for success succeeded <- FALSE if (isUpdate && (result$status == 200)) succeeded <- TRUE else if (result$status == 201) succeeded <- TRUE # mark content as UTF-8 content <- result$content Encoding(content) <- "UTF-8" # return either id & continueUrl or error if (succeeded) { parsedContent <- jsonlite::fromJSON(content) id <- ifelse(isUpdate, id, result$location) url <- as.character(parsedContent["continueUrl"]) # we use the source doc as the key for the deployment record as long as # it's a recognized document path; otherwise we use the content file recordSource <- ifelse(!is.null(originalDoc) && isDocumentPath(originalDoc), originalDoc, contentFile) # use the title if given, and the filename name of the document if not recordName <- ifelse(is.null(title) || nchar(title) == 0, basename(recordSource), title) rpubsRec <- deploymentRecord(name = recordName, title = "", username = "", account = "rpubs", server = "rpubs.com", hostUrl = "rpubs.com", appId = id, bundleId = id, url = url) rpubsRecFile <- deploymentConfigFile(recordSource, recordName, "rpubs", "rpubs.com") write.dcf(rpubsRec, rpubsRecFile, width = 4096) # record in global history if (!is.null(originalDoc) && nzchar(originalDoc)) addToDeploymentHistory(originalDoc, rpubsRec) # return the publish information return(list(id = id, continueUrl = url)) } else { return(list(error = content)) } } rsconnect/R/linters.R0000644000176200001440000002174414513230050014255 0ustar liggesusers.__LINTERS__. <- new.env(parent = emptyenv()) ##' Add a Linter ##' ##' Add a linter, to be used in subsequent calls to [lint()]. ##' ##' @param name The name of the linter, as a string. ##' @param linter A [linter()]. ##' @export ##' @example examples/example-linter.R addLinter <- function(name, linter) { assign(name, linter, envir = .__LINTERS__.) } ##' Create a Linter ##' ##' Generate a linter, which can identify errors or problematic regions in a ##' project. ##' ##' @param apply Function that, given the content of a file, returns the indices ##' at which problems were found. ##' @param takes Function that, given a set of paths, returns the subset of ##' paths that this linter uses. ##' @param message Function that, given content and lines, returns an ##' informative message for the user. Typically generated with ##' [makeLinterMessage()]. ##' @param suggestion String giving a prescribed fix for the linted problem. ##' @export ##' @example examples/example-linter.R linter <- function(apply, takes, message, suggestion) { result <- list( apply = apply, takes = takes, message = message, suggestion = suggestion ) class(result) <- "linter" result } getLinterApplicableFiles <- function(linter, files) { result <- linter$takes(files) if (is.numeric(result) || is.logical(result)) { files[result] } else { result } } applyLinter <- function(linter, ...) { result <- linter$apply(...) if (is.logical(result)) { output <- which(result) } else { output <- as.numeric(result) } attributes(output) <- attributes(result) output } isRCodeFile <- function(path) { grepl("\\.[rR]$|\\.[rR]md$|\\.[rR]nw$", path) } addLinter("absolute.paths", linter( apply = function(content, ...) { content <- stripComments(content) which(hasAbsolutePaths(content)) }, takes = isRCodeFile, message = function(content, lines) { makeLinterMessage("The following lines contain absolute paths", content, lines) }, suggestion = "Paths should be to files within the project directory." )) addLinter("filepath.capitalization", linter( apply = function(content, project, path, files) { content <- stripComments(content) # Extract references between bounding (unescaped) quotes. extractQuoted <- function(regex) { matches <- gregexpr(regex, content, perl = TRUE) results <- vector("list", length(content)) for (i in seq_along(matches)) { x <- matches[[i]] if (x[[1]] == -1L || length(x) %% 2 != 0) next starts <- x[seq(1, length(x), by = 2)] ends <- x[seq(2, length(x), by = 2)] results[[i]] <- character(length(starts)) for (j in seq_along(starts)) { results[[i]][[j]] <- substring(content[i], starts[j] + 1, ends[j] - 1) } } results } # Extract targets from Markdown links. extractLinked <- function() { regex <- "\\]\\(.*?\\)" matches <- gregexpr(regex, content, perl = TRUE) results <- vector("list", length(content)) for (i in seq_along(matches)) { x <- matches[[i]] if (x[[1]] == -1L) next results[[i]] <- character(length(x)) attr <- attributes(x) for (j in seq_along(x)) { raw <- x[[j]] raw.length <- attr$match.length[[j]] # skip past "](" and discard ")" start <- as.integer(raw) + 2 end <- as.integer(raw) + raw.length - 2 results[[i]][[j]] <- substring(content[i], start, end) } } results } # Inferred files within source documents; between matching quotes or in # something that looks like a Markdown link. inferredFiles <- list( "single.quotes" = extractQuoted("(?!\\\\)\'"), "double.quotes" = extractQuoted("(?!\\\\)\""), "markdown.links" = extractLinked() ) ## Replace '\' with '/' in filepaths for consistency in comparisons inferredFiles <- lapply(inferredFiles, function(x) { lapply(x, function(xx) { gsub("\\\\", "/", xx, perl = TRUE) }) }) # Compare in case sensitive, case insensitive fashion projectFiles <- files projectFilesLower <- tolower(files) badLines <- lapply(inferredFiles, function(regex) { lapply(regex, function(x) { which( # Only examine paths containing a slash to reduce false positives grepl("/", x, fixed = TRUE) & (tolower(x) %in% projectFilesLower) & (!(x %in% projectFiles)) ) }) }) indices <- Reduce(union, lapply(badLines, function(x) { which(sapply(x, length) > 0) })) if (!length(indices)) return(integer()) from <- lapply(inferredFiles, function(x) x[indices]) to <- lapply(from, function(x) { lapply(x, function(xx) { projectFiles[tolower(xx) == projectFilesLower] }) }) messages <- lapply(seq_along(from), function(regex) { lapply(seq_along(regex), function(i) { if (length(from[[regex]][[i]])) paste(collapse = ", ", paste("[", sQuote(from[[regex]][[i]]), " -> ", sQuote(to[[regex]][[i]]), "]", sep = "") ) else "" }) }) transposed <- transposeList(messages) lint <- sapply(transposed, function(x) { paste(x[x != ""], collapse = ", ") }) indices <- as.numeric(indices) attr(indices, "lint") <- lint indices }, takes = isRCodeFile, message = function(content, lines) { makeLinterMessage( "The following lines contain paths to files not matching in case sensitivity", content, lines ) }, suggestion = "Filepaths are case-sensitive on deployment server." )) addLinter("browser", linter( apply = function(content, ...) { content <- stripComments(content) which(hasBrowserCalls(content)) }, takes = isRCodeFile, message = function(content, lines) { makeLinterMessage("The following lines contain the browser() debugging function", content, lines) }, suggestion = "The browser() debugging function should be removed." )) addLinter("browseURL", linter( apply = function(content, ...) { content <- stripComments(content) which(hasBrowseURLCalls(content)) }, takes = isRCodeFile, message = function(content, lines) { makeLinterMessage("The following lines contain calls to the browseURL function", content, lines) }, suggestion = "Remove browseURL calls; browseURL does not work in deployed applications." )) stripComments <- function(content) { gsub("#.*", "", content, perl = TRUE) } hasBrowserCalls <- function(content) { # look for calls to browser(); they will cause a debug halt, which is almost # never wanted in a production application grepl("\\bbrowser\\([^)]*\\)", content, perl = TRUE) } hasBrowseURLCalls <- function(content) { # look for calls to browseURL(); browsers can't be opened on the server in # deployed applications grepl("\\bbrowseURL\\([^)]*\\)", content, perl = TRUE) } hasAbsolutePaths <- function(content) { regex <- c( "\\[(.*?)\\]\\(\\s*[a-zA-Z]:/[^\"\']", ## windows-style markdown references [Some image](C:/...) "\\[(.*?)\\]\\(\\s*/[^/]", ## unix-style markdown references [Some image](/Users/...) NULL ## so we don't worry about commas above ) regexResults <- as.logical(Reduce(`+`, lapply(regex, function(rex) { grepl(rex, content, perl = TRUE) }))) # Strip out all strings in the document, and check to see if any of them # resolve to absolute paths on the system. sQuoteRegex <- "['](?:(?:\\\\.)|(?:[^'\\\\]))*?[']" dQuoteRegex <- '["](?:(?:\\\\.)|(?:[^"\\\\]))*?["]' extractedStrings <- lapply(c(sQuoteRegex, dQuoteRegex), function(regex) { matches <- gregexpr(regex, content, perl = TRUE) lapply(seq_along(matches), function(i) { match <- matches[[i]] if (c(match[[1]]) == -1L) return(character()) starts <- as.integer(match) + 1 ends <- starts + attr(match, "match.length") - 3 substring(content[[i]], starts, ends) }) }) strings <- vector("list", length(extractedStrings[[1]])) for (i in seq_along(extractedStrings[[1]])) { strings[[i]] <- unique(c(extractedStrings[[1]][[i]], extractedStrings[[2]][[i]])) strings[[i]] <- strings[[i]][nchar(strings[[i]]) >= 5] } lineHasAbsolutePath <- unlist(lapply(strings, function(x) { any( grepl("^/|^[a-zA-Z]:/|^~", x, perl = TRUE) & file.exists(x) & !dirExists(x) & vapply(gregexpr("[~/]", x, perl = TRUE), USE.NAMES = FALSE, FUN.VALUE = numeric(1), length) >= 3 ) })) as.logical(lineHasAbsolutePath + regexResults) } noMatch <- function(x) { identical(attr(x, "match.length"), -1L) } transposeList <- function(list) { unname(as.list( as.data.frame( t( as.matrix( as.data.frame(list, stringsAsFactors = FALSE) ) ), stringsAsFactors = FALSE) )) } rsconnect/R/locale.R0000644000176200001440000000132314513230050014023 0ustar liggesusersdetectLocale <- function() { if (!isWindows()) { locales <- strsplit(Sys.getlocale("LC_CTYPE"), ".", fixed = TRUE)[[1]] locales[[1]] } else { tryCatch(windowsLocale(), error = function(err) "en_US") } } # Possible values # listed at https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-lcid windowsLocale <- function() { key <- utils::readRegistry("Control Panel\\International", hive = "HCU") normalizeLocale(key$LocaleName) } # Remove script tag, if present normalizeLocale <- function(x) { pieces <- strsplit(x, "-")[[1]] all_upper <- pieces[pieces == toupper(pieces)] if (length(all_upper) == 0) { pieces[[1]] } else { paste0(pieces[[1]], "_", all_upper[[1]]) } } rsconnect/R/bundlePython.R0000644000176200001440000000611614513230050015244 0ustar liggesusers# Create anonymous function that we can later call to get all needed python # metdata for the manifest pythonConfigurator <- function(python, forceGenerate = FALSE) { if (is.null(python)) { return(NULL) } force(forceGenerate) function(appDir) { withCallingHandlers( inferPythonEnv( appDir, python = python, forceGenerate = forceGenerate ), error = function(err) { cli::cli_abort( "Failed to detect python environment", parent = err ) } ) } } # python is enabled on Connect and posit.cloud, but not on Shinyapps getPythonForTarget <- function(path, accountDetails) { targetIsShinyapps <- isShinyappsServer(accountDetails$server) pythonEnabled <- getOption("rsconnect.python.enabled", !targetIsShinyapps) if (pythonEnabled) { getPython(path) } else { NULL } } getPython <- function(path = NULL) { if (!is.null(path)) { return(path.expand(path)) } path <- Sys.getenv("RETICULATE_PYTHON") if (path != "") { return(path.expand(path)) } path <- Sys.getenv("RETICULATE_PYTHON_FALLBACK") if (path != "") { return(path.expand(path)) } NULL } inferPythonEnv <- function(workdir, python = getPython(), forceGenerate = FALSE) { # run the python introspection script env_py <- system.file("resources/environment.py", package = "rsconnect") args <- c( shQuote(env_py), if (forceGenerate) "-f", shQuote(workdir) ) hasConda <- is_installed("reticulate") && reticulate::py_available(initialize = FALSE) && reticulate::py_config()$anaconda if (hasConda) { prefix <- getCondaEnvPrefix(python) conda <- getCondaExeForPrefix(prefix) args <- c("run", "-p", prefix, python, args) # conda run -p python inst/resources/environment.py output <- system2(command = conda, args = args, stdout = TRUE, stderr = NULL, wait = TRUE) } else { output <- system2(command = python, args = args, stdout = TRUE, stderr = NULL, wait = TRUE) } environment <- jsonlite::fromJSON(output) if (is.null(environment$error)) { list( version = environment$python, package_manager = list( name = environment$package_manager, version = environment[[environment$package_manager]], package_file = environment$filename, contents = environment$contents ) ) } else { cli::cli_abort(environment$error) } } getCondaEnvPrefix <- function(python) { prefix <- dirname(dirname(python)) if (!file.exists(file.path(prefix, "conda-meta"))) { stop(paste("Python from", python, "does not look like a conda environment: cannot find `conda-meta`")) } prefix } getCondaExeForPrefix <- function(prefix) { miniconda <- dirname(dirname(prefix)) conda <- file.path(miniconda, "bin", "conda") if (isWindows()) { conda <- paste(conda, ".exe", sep = "") } if (!file.exists(conda)) { stop(paste("Conda env prefix", prefix, "does not have the `conda` command line interface.")) } conda } rsconnect/R/http-rcurl.R0000644000176200001440000001330614435652570014716 0ustar liggesusers# HTTP transport using the RCurl package. DEPRECATED; exists only for backwards compatibility (it # was the default transport for many years). In a future release of rsconnect, the RCurl transport # will be removed entirely, and the "rcurl" option will be interpreted as "libcurl". httpRCurl <- function(protocol, host, port, method, path, headers, contentType = NULL, contentFile = NULL, certificate = NULL, timeout = NULL) { if (!is.null(contentFile) && is.null(contentType)) stop("You must specify a contentType for the specified file") # add prefix to port if necessary if (!is.null(port) && nzchar(port)) port <- paste(":", port, sep = "") # build url url <- paste(protocol, "://", host, port, path, sep = "") # read file in binary mode if (!is.null(contentFile)) { fileLength <- file.info(contentFile)$size fileContents <- readBin(contentFile, what = "raw", n = fileLength) headers$`Content-Type` <- contentType } # establish options options <- RCurl::curlOptions(url) options$useragent <- userAgent() # overlay user-supplied options userOptions <- getOption("rsconnect.rcurl.options") if (is.list(userOptions)) { for (option in names(userOptions)) { options[option] <- userOptions[option] } } if (isTRUE(getOption("rsconnect.check.certificate", TRUE))) { options$ssl.verifypeer <- TRUE # apply certificate information if present if (!is.null(certificate)) options$cainfo <- certificate } else { # don't verify peer (less secure but tolerant to self-signed cert issues) options$ssl.verifypeer <- FALSE } headerGatherer <- RCurl::basicHeaderGatherer() options$headerfunction <- headerGatherer$update # the text processing done by .mapUnicode has the unfortunate side effect # of turning escaped backslashes into ordinary backslashes but leaving # ordinary backslashes alone, which can create malformed JSON. textGatherer <- RCurl::basicTextGatherer(.mapUnicode = FALSE) # use timeout if supplied if (!is.null(timeout)) { options$timeout <- timeout } # verbose if requested if (httpVerbose()) options$verbose <- TRUE # add extra headers headers <- appendCookieHeaders( list(protocol = protocol, host = host, port = port, path = path), headers) extraHeaders <- as.character(headers) names(extraHeaders) <- names(headers) options$httpheader <- extraHeaders # make the request time <- system.time(gcFirst = FALSE, tryCatch({ if (!is.null(contentFile)) { RCurl::curlPerform(url = url, .opts = options, customrequest = method, readfunction = fileContents, infilesize = fileLength, writefunction = textGatherer$update, upload = TRUE) } else if (method == "DELETE") { RCurl::curlPerform(url = url, .opts = options, customrequest = method) } else { if (identical(method, "GET")) { RCurl::getURL(url, .opts = options, write = textGatherer) } else { RCurl::curlPerform(url = url, .opts = options, customrequest = method, writefunction = textGatherer$update) } }}, error = function(e, ...) { # ignore errors resulting from timeout or user abort if (identical(e$message, "Callback aborted") || identical(e$message, "transfer closed with outstanding read data remaining")) return(NULL) # bubble remaining errors through else stop(e) })) httpTrace(method, path, time) # get list of HTTP response headers headers <- headerGatherer$value() # deduce status. we do this *before* lowercase conversion, as it is possible # for both "Status" and "status" headers to exist status <- 200 statuses <- headers[names(headers) == "status"] # find status header statuses <- statuses[grepl("^\\d+$", statuses)] # ensure fully numeric if (length(statuses) > 0) { # we found a numeric status header status <- as.integer(statuses[[1]]) } # lowercase all header names for normalization; HTTP/2 uses lowercase headers # by default but they're typically capitalized in HTTP/1 names(headers) <- tolower(names(headers)) if ("location" %in% names(headers)) location <- headers[["location"]] else location <- NULL # presume a plain text response unless specified otherwise contentType <- if ("content-type" %in% names(headers)) { headers[["content-type"]] } else { "text/plain" } # emit JSON trace if requested if (!is.null(contentFile) && httpTraceJson() && identical(contentType, "application/json")) cat(paste0("<< ", rawToChar(fileContents), "\n")) # Parse cookies from header; bear in mind that there may be multiple headers cookieHeaders <- headers[names(headers) == "set-cookie"] storeCookies(list(protocol = protocol, host = host, port = port, path = path), cookieHeaders) contentValue <- textGatherer$value() # emit JSON trace if requested if (httpTraceJson() && identical(contentType, "application/json")) cat(paste0(">> ", contentValue, "\n")) list(req = list(protocol = protocol, host = host, port = port, method = method, path = path), status = status, location = location, contentType = contentType, content = contentValue) } rsconnect/R/lint.R0000644000176200001440000001655614513230050013550 0ustar liggesusers##' Lint a Project ##' ##' Takes the set of active linters (see [addLinter()]), and applies ##' them to all files within a project. ##' ##' @param project Path to a project directory. ##' @param files Specific files to lint. Can be NULL, in which case all ##' the files in the directory will be linted. ##' @param appPrimaryDoc The primary file in the project directory. Can be NULL, ##' in which case it's inferred (if possible) from the directory contents. ##' @export lint <- function(project, files = NULL, appPrimaryDoc = NULL) { check_directory(project) files <- listDeploymentFiles(project, files) # Perform actions within the project directory (so relative paths are easily used) owd <- getwd() defer(setwd(owd)) setwd(project) linters <- mget(objects(.__LINTERS__.), envir = .__LINTERS__.) # Identify all files that will be read in by one or more linters projectFilesToLint <- Reduce(union, lapply(linters, function(linter) { getLinterApplicableFiles(linter, files) })) # Read in the files encoding <- activeEncoding(project) projectContent <- lapply(projectFilesToLint, function(file) { # force native encoding (disable any potential internal conversion) old <- options(encoding = "native.enc") defer(options(old)) # read content with requested encoding # TODO: may consider converting from native encoding to UTF-8 if appropriate readLines(file, encoding = encoding, warn = FALSE) }) names(projectContent) <- projectFilesToLint lintResults <- vector("list", length(linters)) names(lintResults) <- names(linters) ## Apply each linter for (i in seq_along(linters)) { linter <- linters[[i]] applicableFiles <- getLinterApplicableFiles(linter, projectFilesToLint) lintIndices <- vector("list", length(applicableFiles)) names(lintIndices) <- applicableFiles ## Apply linter to each file for (j in seq_along(applicableFiles)) { file <- applicableFiles[[j]] tryCatch( expr = { lintIndices[[j]] <- applyLinter(linter, projectContent[[file]], project = project, path = file, files = files) }, error = function(e) { message("Failed to lint file '", file, "'") message("The linter failed with message:\n") message(e$message) lintIndices[[j]] <- numeric(0) } ) } ## Get the messages associated with each lint lintMessages <- enumerate(lintIndices, function(x, i) { if (length(x)) { message <- linter$message if (is.function(message)) { linter$message(projectContent[[names(lintIndices)[i]]], x) } else { makeLinterMessage(message, projectContent[[names(lintIndices)[i]]], x) } } else { character() } }) ## Assign the result lintResults[[i]] <- list( files = applicableFiles, indices = lintIndices, message = lintMessages, suggestion = linter$suggestion ) } ## Get all of the linted files, and transform the results into a by-file format lintedFiles <- Reduce(union, lapply(lintResults, function(x) { names(x$indices) })) lintFields <- c("indices", "message") fileResults <- lapply(lintedFiles, function(file) { result <- lapply(lintResults, function(result) { subResult <- lapply(lintFields, function(field) { result[[field]][[file]] }) names(subResult) <- lintFields subResult$suggestion <- result$suggestion subResult$file <- file class(subResult) <- "lint" subResult }) class(result) <- "lintList" result }) names(fileResults) <- lintedFiles class(fileResults) <- "linterResults" fileResults } lintHeader <- function(file) { dashSep <- paste(rep("-", nchar(file)), collapse = "") header <- paste0( dashSep, "\n", file, "\n", dashSep, "\n" ) cat(paste(header, collapse = "\n")) } #' @export print.linterResults <- function(x, ...) { if (!hasLint(x)) { cat("No problems found\n") return(invisible(x)) } lapply(x, printLintList, ...) cat(paste(collectSuggestions(x), collapse = "\n")) invisible(x) } printLintList <- function(x, ...) { has_message <- vapply(x, function(x) length(x$message), integer(1)) if (!any(has_message)) { return() } lintHeader(x[[1]]$file) lapply(x, function(x) { cat(paste(x$message, collapse = "\n")) }) } collectSuggestions <- function(fileResults) { suggestions <- lapply(fileResults, function(fileResult) { unlist(lapply(fileResult, function(lintInfo) { if (length(lintInfo$indices) > 0) { paste(as.character(lintInfo$suggestion), collapse = "\n") } })) }) Reduce(union, suggestions) } showLintResults <- function(appDir, lintResults) { if (!hasLint(lintResults)) { return(invisible()) } if (interactive()) { # if enabled, show warnings in friendly marker tab in addition to # printing to console if (getOption("rsconnect.rstudio_source_markers", TRUE) && rstudioapi::hasFun("sourceMarkers")) { showRstudioSourceMarkers(appDir, lintResults) } } message("The following potential problems were identified in the project files:\n") print(lintResults) if (interactive()) { response <- readline("Do you want to proceed with deployment? [y/N]: ") if (tolower(substring(response, 1, 1)) != "y") { cli::cli_abort("Cancelling deployment.") } } else { # message( # "\nIf you believe these errors are spurious, run:\n\n", # "\tdeployApp(lint = FALSE)\n\n", # "to disable linting." # ) message("If your code fails to run post-deployment, ", "please double-check these messages.") invisible() } } #' Construct a Linter Message #' #' Pretty-prints a linter message. Primarily used as a helper #' for constructing linter messages with [linter()]. #' #' @param header A header message describing the linter. #' @param content The content of the file that was linted. #' @param lines The line numbers from `content` that contain lint. makeLinterMessage <- function(header, content, lines) { lint <- attr(lines, "lint") c( paste0(header, ":"), paste(lines, ": ", content[lines], if (!is.null(lint)) paste(" ", lint, sep = ""), sep = ""), "\n" ) } enumerate <- function(X, FUN, ...) { FUN <- match.fun(FUN) result <- vector("list", length(X)) for (i in seq_along(X)) { result[[i]] <- FUN(X[[i]], i, ...) } names(result) <- names(X) result } hasLint <- function(x) { any(unlist(lapply(x, function(x) { lapply(x, function(x) { length(x$indices) > 0 }) }))) } activeEncoding <- function(project = getwd()) { defaultEncoding <- getOption("encoding") if (identical(defaultEncoding, "native.enc")) defaultEncoding <- "unknown" # attempt to locate .Rproj file files <- list.files(project, full.names = TRUE) rprojFile <- grep("\\.Rproj$", files, value = TRUE) if (length(rprojFile) != 1) return(defaultEncoding) # read the file contents <- readLines(rprojFile, warn = FALSE, encoding = "UTF-8") encodingLine <- grep("^Encoding:", contents, value = TRUE) if (length(encodingLine) != 1) return(defaultEncoding) # remove "Encoding:" prefix sub("^Encoding:\\s*", "", encodingLine) } rsconnect/R/import-standalone-obj-type.R0000644000176200001440000002026714513230050017763 0ustar liggesusers# Standalone file: do not edit by hand # Source: # ---------------------------------------------------------------------- # # --- # repo: r-lib/rlang # file: standalone-obj-type.R # last-updated: 2022-10-04 # license: https://unlicense.org # --- # # ## Changelog # # 2022-10-04: # - `obj_type_friendly(value = TRUE)` now shows numeric scalars # literally. # - `stop_friendly_type()` now takes `show_value`, passed to # `obj_type_friendly()` as the `value` argument. # # 2022-10-03: # - Added `allow_na` and `allow_null` arguments. # - `NULL` is now backticked. # - Better friendly type for infinities and `NaN`. # # 2022-09-16: # - Unprefixed usage of rlang functions with `rlang::` to # avoid onLoad issues when called from rlang (#1482). # # 2022-08-11: # - Prefixed usage of rlang functions with `rlang::`. # # 2022-06-22: # - `friendly_type_of()` is now `obj_type_friendly()`. # - Added `obj_type_oo()`. # # 2021-12-20: # - Added support for scalar values and empty vectors. # - Added `stop_input_type()` # # 2021-06-30: # - Added support for missing arguments. # # 2021-04-19: # - Added support for matrices and arrays (#141). # - Added documentation. # - Added changelog. # # nocov start #' Return English-friendly type #' @param x Any R object. #' @param value Whether to describe the value of `x`. Special values #' like `NA` or `""` are always described. #' @param length Whether to mention the length of vectors and lists. #' @return A string describing the type. Starts with an indefinite #' article, e.g. "an integer vector". #' @noRd obj_type_friendly <- function(x, value = TRUE) { if (is_missing(x)) { return("absent") } if (is.object(x)) { if (inherits(x, "quosure")) { type <- "quosure" } else { type <- paste(class(x), collapse = "/") } return(sprintf("a <%s> object", type)) } if (!is_vector(x)) { return(.rlang_as_friendly_type(typeof(x))) } n_dim <- length(dim(x)) if (!n_dim) { if (!is_list(x) && length(x) == 1) { if (is_na(x)) { return(switch( typeof(x), logical = "`NA`", integer = "an integer `NA`", double = if (is.nan(x)) { "`NaN`" } else { "a numeric `NA`" }, complex = "a complex `NA`", character = "a character `NA`", .rlang_stop_unexpected_typeof(x) )) } show_infinites <- function(x) { if (x > 0) { "`Inf`" } else { "`-Inf`" } } str_encode <- function(x, width = 30, ...) { if (nchar(x) > width) { x <- substr(x, 1, width - 3) x <- paste0(x, "...") } encodeString(x, ...) } if (value) { if (is.numeric(x) && is.infinite(x)) { return(show_infinites(x)) } if (is.numeric(x) || is.complex(x)) { number <- as.character(round(x, 2)) what <- if (is.complex(x)) "the complex number" else "the number" return(paste(what, number)) } return(switch( typeof(x), logical = if (x) "`TRUE`" else "`FALSE`", character = { what <- if (nzchar(x)) "the string" else "the empty string" paste(what, str_encode(x, quote = "\"")) }, raw = paste("the raw value", as.character(x)), .rlang_stop_unexpected_typeof(x) )) } return(switch( typeof(x), logical = "a logical value", integer = "an integer", double = if (is.infinite(x)) show_infinites(x) else "a number", complex = "a complex number", character = if (nzchar(x)) "a string" else "\"\"", raw = "a raw value", .rlang_stop_unexpected_typeof(x) )) } if (length(x) == 0) { return(switch( typeof(x), logical = "an empty logical vector", integer = "an empty integer vector", double = "an empty numeric vector", complex = "an empty complex vector", character = "an empty character vector", raw = "an empty raw vector", list = "an empty list", .rlang_stop_unexpected_typeof(x) )) } } vec_type_friendly(x) } vec_type_friendly <- function(x, length = FALSE) { if (!is_vector(x)) { abort("`x` must be a vector.") } type <- typeof(x) n_dim <- length(dim(x)) add_length <- function(type) { if (length && !n_dim) { paste0(type, sprintf(" of length %s", length(x))) } else { type } } if (type == "list") { if (n_dim < 2) { return(add_length("a list")) } else if (is.data.frame(x)) { return("a data frame") } else if (n_dim == 2) { return("a list matrix") } else { return("a list array") } } type <- switch( type, logical = "a logical %s", integer = "an integer %s", numeric = , double = "a double %s", complex = "a complex %s", character = "a character %s", raw = "a raw %s", type = paste0("a ", type, " %s") ) if (n_dim < 2) { kind <- "vector" } else if (n_dim == 2) { kind <- "matrix" } else { kind <- "array" } out <- sprintf(type, kind) if (n_dim >= 2) { out } else { add_length(out) } } .rlang_as_friendly_type <- function(type) { switch( type, list = "a list", NULL = "`NULL`", environment = "an environment", externalptr = "a pointer", weakref = "a weak reference", S4 = "an S4 object", name = , symbol = "a symbol", language = "a call", pairlist = "a pairlist node", expression = "an expression vector", char = "an internal string", promise = "an internal promise", ... = "an internal dots object", any = "an internal `any` object", bytecode = "an internal bytecode object", primitive = , builtin = , special = "a primitive function", closure = "a function", type ) } .rlang_stop_unexpected_typeof <- function(x, call = caller_env()) { abort( sprintf("Unexpected type <%s>.", typeof(x)), call = call ) } #' Return OO type #' @param x Any R object. #' @return One of `"bare"` (for non-OO objects), `"S3"`, `"S4"`, #' `"R6"`, or `"R7"`. #' @noRd obj_type_oo <- function(x) { if (!is.object(x)) { return("bare") } class <- inherits(x, c("R6", "R7_object"), which = TRUE) if (class[[1]]) { "R6" } else if (class[[2]]) { "R7" } else if (isS4(x)) { "S4" } else { "S3" } } #' @param x The object type which does not conform to `what`. Its #' `obj_type_friendly()` is taken and mentioned in the error message. #' @param what The friendly expected type as a string. Can be a #' character vector of expected types, in which case the error #' message mentions all of them in an "or" enumeration. #' @param show_value Passed to `value` argument of `obj_type_friendly()`. #' @param ... Arguments passed to [abort()]. #' @inheritParams args_error_context #' @noRd stop_input_type <- function(x, what, ..., allow_na = FALSE, allow_null = FALSE, show_value = TRUE, arg = caller_arg(x), call = caller_env()) { # From standalone-cli.R cli <- env_get_list( nms = c("format_arg", "format_code"), last = topenv(), default = function(x) sprintf("`%s`", x), inherit = TRUE ) if (allow_na) { what <- c(what, cli$format_code("NA")) } if (allow_null) { what <- c(what, cli$format_code("NULL")) } if (length(what)) { what <- oxford_comma(what) } message <- sprintf( "%s must be %s, not %s.", cli$format_arg(arg), what, obj_type_friendly(x, value = show_value) ) abort(message, ..., call = call, arg = arg) } oxford_comma <- function(chr, sep = ", ", final = "or") { n <- length(chr) if (n < 2) { return(chr) } head <- chr[seq_len(n - 1)] last <- chr[n] head <- paste(head, collapse = sep) # Write a or b. But a, b, or c. if (n > 2) { paste0(head, sep, final, " ", last) } else { paste0(head, " ", final, " ", last) } } # nocov end rsconnect/R/appDependencies.R0000644000176200001440000001431114513230050015654 0ustar liggesusers#' Detect application dependencies #' #' @description #' `appDependencies()` recursively detects all R package dependencies for an #' application by parsing all `.R` and `.Rmd` files and looking for calls #' to `library()`, `require()`, `requireNamespace()`, `::`, and so on. #' It then adds implicit dependencies (i.e. an `.Rmd` requires Rmarkdown) #' and adds all recursive dependencies to create a complete manifest of #' package packages need to be installed to run the app. #' #' # Dependency discovery #' #' rsconnect use one of three mechanisms to find which packages your application #' uses: #' #' 1. If `renv.lock` is present, it will use the versions and sources defined in #' that file. If you're using the lockfile for some other purpose and #' don't want it to affect deployment, add `renv.lock` to `.rscignore`. #' #' 2. Otherwise, rsconnect will call `renv::snapshot()` to find all packages #' used by your code. If you'd instead prefer to only use the packages #' declared in a `DESCRIPTION` file, run #' `renv::settings$snapshot.type("explicit")` to activate renv's "explicit" #' mode. #' #' 3. Dependency resolution using renv is a new feature in rsconnect 1.0.0, and #' while we have done our best to test it, it still might fail for your app. #' If this happens, please [file an issue](https://github.com/rstudio/rsconnect/issues) #' then set `options(rsconnect.packrat = TRUE)` to revert to the old #' dependency discovery mechanism. #' #' # Remote installation #' #' When deployed, the app must first install all of these packages, and #' rsconnect ensures the versions used on the server will match the versions #' you used locally. It knows how to install packages from the following #' sources: #' #' * CRAN and BioConductor (`Source: CRAN` or `Source: Bioconductor`). The #' remote server will ignore the specific CRAN or Bioconductor mirror that #' you use locally, always using the CRAN/BioC mirror that has been configured #' on the server. #' #' * Other CRAN like and CRAN-like repositories. These packages will have #' a `Source` determined by the value of `getOptions("repos")`. For example, #' if you've set the following options: #' #' ```R #' options( #' repos = c( #' CRAN = "https://cran.rstudio.com/", #' CORPORATE = "https://corporate-packages.development.company.com" #' ) #' ) #' ``` #' #' Then packages installed from your corporate package repository will #' have source `CORPORATE`. Posit Connect #' [can be configured](https://docs.posit.co/connect/admin/appendix/configuration/#RPackageRepository) #' to override their repository url so that (e.g.) you can use different #' packages versions on staging and production servers. #' #' * Packages installed from GitHub, GitLab, or BitBucket, have `Source` #' `github`, `gitlab`, and `bitbucket` respectively. When deployed, the #' bundle contains the additional metadata needed to precisely recreated #' the installed version. #' #' It's not possible to recreate the packages that you have built and installed #' from a directory on your local computer. This will have `Source: NA` and #' will cause the deployment to error. To resolve this issue, you'll need to #' install from one of the known sources described above. #' #' # Suggested packages #' #' The `Suggests` field is not included when determining recursive dependencies, #' so it's possible that not every package required to run your application will #' be detected. #' #' For example, ggplot2's `geom_hex()` requires the hexbin package to be #' installed, but it is only suggested by ggplot2. So if your app uses #' `geom_hex()` it will fail, reporting that the hexbin package is not #' installed. #' #' You can overcome this problem with (e.g.) `requireNamespace(hexbin)`. #' This will tell rsconnect that your app needs the hexbin package, without #' otherwise affecting your code. #' #' @inheritParams deployApp #' @returns A data frame with one row for each dependency (direct, indirect, #' and inferred), and 4 columns: #' #' * `Package`: package name. #' * `Version`: local version. #' * `Source`: a short string describing the source of the package install, #' as described above. #' * `Repository`: for CRAN and CRAN-like repositories, the URL to the #' repository. This will be ignored by the server if it has been configured #' with its own repository name -> repository URL mapping. #' @examples #' \dontrun{ #' #' # dependencies for the app in the current working dir #' appDependencies() #' #' # dependencies for an app in another directory #' appDependencies("~/projects/shiny/app1") #' } #' @seealso [rsconnectPackages](Using Packages with rsconnect) #' @export appDependencies <- function(appDir = getwd(), appFiles = NULL, appFileManifest = NULL, appMode = NULL) { appFiles <- listDeploymentFiles(appDir, appFiles, appFileManifest) appMetadata <- appMetadata(appDir, appFiles = appFiles, appMode = appMode) if (!needsR(appMetadata)) { return(data.frame( Package = character(), Version = character(), Source = character(), Repository = character(), stringsAsFactors = FALSE )) } bundleDir <- bundleAppDir(appDir, appFiles) defer(unlink(bundleDir, recursive = TRUE)) extraPackages <- inferRPackageDependencies(appMetadata) deps <- computePackageDependencies(bundleDir, extraPackages, quiet = TRUE) deps[c("Package", "Version", "Source", "Repository")] } needsR <- function(appMetadata) { if (appMetadata$appMode == "static") { return(FALSE) } # All non-Quarto content currently uses R by default. # Currently R is only supported by the "knitr" engine, not "jupyter" or # "markdown" is.null(appMetadata$quartoInfo) || "knitr" %in% appMetadata$quartoInfo[["engines"]] } inferRPackageDependencies <- function(appMetadata) { deps <- switch(appMetadata$appMode, "rmd-static" = c("rmarkdown", if (appMetadata$hasParameters) "shiny"), "quarto-static" = "rmarkdown", "quarto-shiny" = c("rmarkdown", "shiny"), "rmd-shiny" = c("rmarkdown", "shiny"), "shiny" = "shiny", "api" = "plumber" ) if (appMetadata$documentsHavePython) { deps <- c(deps, "reticulate") } deps } rsconnect/R/imports.R0000644000176200001440000000027014513230050014261 0ustar liggesusers #' @importFrom stats na.omit setNames #' @importFrom utils available.packages installed.packages contrib.url getFromNamespace glob2rx packageVersion packageDescription read.csv NULL rsconnect/R/servers-deprec.R0000644000176200001440000000256714513230050015530 0ustar liggesusers#' Discover servers automatically #' #' @description #' `r lifecycle::badge("deprecated")` #' #' This function has never worked usefully, so has been removed. #' #' @export #' @keywords internal discoverServers <- function(quiet = FALSE) { lifecycle::deprecate_warn("1.0.0", "discoverServers()") discovered <- getOption("rsconnect.local_servers", "http://localhost:3939/__api__") # get the URLs of the known servers, and silently add any that aren't yet # present existing <- servers()[, "url"] introduced <- setdiff(discovered, existing) lapply(introduced, function(url) { addServer(url, quiet = TRUE) }) if (!quiet && length(introduced) > 0) { message("Discovered ", length(introduced), (if (length(introduced) == 1) "server" else "servers"), ":") lapply(introduced, message) } else if (!quiet) { message("No new servers found.") } invisible(introduced) } #' Add a server #' #' @description #' `r lifecycle::badge("deprecated")` #' #' This function does the same thing as [addServer()] so has been removed. #' #' @export #' @inheritParams addServer #' @keywords internal addConnectServer <- function(url, name = NULL, certificate = NULL, quiet = FALSE) { lifecycle::deprecate_warn("1.0.0", "addConnectServer()", "addServer()") addServer( ensureConnectServerUrl(url), name = name, certificate = certificate, quiet = quiet ) } rsconnect/R/deployTFModel.R0000644000176200001440000000130614513230050015274 0ustar liggesusers#' Deploy a TensorFlow saved model #' #' This function is defunct. Posit Connect no longer supports hosting of #' TensorFlow Model APIs. A TensorFlow model can be deployed as a #' [Plumber API](https://tensorflow.rstudio.com/guides/deploy/plumber.html), #' [Shiny application](https://tensorflow.rstudio.com/guides/deploy/shiny), or #' other supported content type. #' #' @param modelDir Path to the saved model directory. Unused. #' @param ... Unused. #' #' @family Deployment functions #' @export deployTFModel <- function(modelDir, ...) { lifecycle::deprecate_stop( when = "1.0.0", what = "deployTFModel()", details = "Posit Connect no longer supports hosting of TensorFlow Model APIs." ) } rsconnect/R/title.R0000644000176200001440000000626514522164250013727 0ustar liggesusers#' Generate Application Name #' #' @description #' Generate a short name (identifier) for an application given an application #' title. #' #' @param appTitle A descriptive title for the application. #' @param appPath The path to the application's content, either a directory #' or an individual document. Optional. #' @param account The account where the application will be deployed. Optional. #' @param unique Whether to try to generate a unique name. #' @return #' Returns a valid short name for the application. #' #' @details #' This function modifies the title until it forms a suitable application name. #' Suitable application names are 3 - 64 characters long and contain only #' alphanumeric characters. #' #' The function is intended to be used to find a name for a new application. #' If `appPath` and `account` are both specified, then the returned #' name will also be unique among locally known deployments of the directory #' (note that it is not guaranteed to be unique on the server). This behavior #' can be disabled by setting `unique = FALSE`. #' #' @keywords internal #' @examples #' \dontrun{ #' # Generate a short name for a sample application #' generateAppName("My Father's Country", "~/fathers-country", "myacct") #' } #' @export generateAppName <- function(appTitle, appPath = NULL, account = NULL, unique = TRUE) { munge <- function(title) { # safe default if no title specified if (is.null(title)) { return("") } # start by removing most non-Latin characters and converting to lowercase name <- tolower(gsub("[^A-Za-z0-9_ -]+", "", title)) # replace spaces with underscores name <- gsub(" ", "_", name, fixed = TRUE) # trim to 64 characters if (nchar(name) > 64) { name <- substr(name, 1, 64) } name } name <- munge(appTitle) # if we wound up with too few characters, try generating from the directory # name instead if (nchar(name) < 3 && !is.null(appPath) && file.exists(appPath)) { # strip extension if present base <- basename(appPath) if (nzchar(tools::file_ext(base))) { base <- file_path_sans_ext(base) # if we stripped an extension and the name is now "index", use the parent # folder's name if (identical(base, "index")) { base <- basename(dirname(appPath)) } } name <- munge(base) } # validate that we wound up with a valid name if (nchar(name) < 3) { stop("The generated app name '", name, "' is invalid. Include at least 3 ", "alphanumeric characters in the title.") } # if we have an account and a directory, make the new app name unique to the # best of our local knowledge if (unique && !is.null(appPath) && nzchar(appPath) && !is.null(account)) { apps <- deployments(appPath, accountFilter = account) if (name %in% apps$name) { # trim a few characters if necessary so we can add unique numbers to the end base <- substr(name, 1, 62) suffix <- 2 candidate <- paste0(base, suffix) # keep incrementing the suffix until we find a unique name while (candidate %in% apps$name) { suffix <- suffix + 1 candidate <- paste0(base, suffix) } name <- candidate } } name } rsconnect/R/appMetadata-quarto.R0000644000176200001440000000327614513230050016327 0ustar liggesusersinferQuartoInfo <- function(metadata, appDir, appPrimaryDoc) { if (hasQuartoMetadata(metadata)) { return(list( version = metadata[["quarto_version"]], engines = metadata[["quarto_engines"]] )) } # If we don't yet have Quarto details, run quarto inspect ourselves inspect <- quartoInspect( appDir = appDir, appPrimaryDoc = appPrimaryDoc ) if (is.null(inspect)) { return(NULL) } list( version = inspect[["quarto"]][["version"]], engines = I(inspect[["engines"]]) ) } hasQuartoMetadata <- function(x) { !is.null(x$quarto_version) } # Run "quarto inspect" on the target and returns its output as a parsed object. quartoInspect <- function(appDir = NULL, appPrimaryDoc = NULL) { # If "quarto inspect appDir" fails, we will try "quarto inspect # appPrimaryDoc", so that we can support single files as well as projects. quarto <- quarto_path() if (is.null(quarto)) { cli::cli_abort(c( "`quarto` not found.", i = "Check that it is installed and available on your {.envvar PATH}." )) } paths <- c(appDir, file.path(appDir, appPrimaryDoc)) for (path in paths) { args <- c("inspect", path.expand(path)) inspect <- tryCatch( { json <- suppressWarnings(system2(quarto, args, stdout = TRUE, stderr = TRUE)) parsed <- jsonlite::fromJSON(json) return(parsed) }, error = function(e) NULL ) } return(NULL) } # inlined from quarto::quarto_path() quarto_path <- function() { path_env <- Sys.getenv("QUARTO_PATH", unset = NA) if (is.na(path_env)) { path <- unname(Sys.which("quarto")) if (nzchar(path)) { path } else { NULL } } else { path_env } } rsconnect/NEWS.md0000644000176200001440000005355714536677632013410 0ustar liggesusers# rsconnect 1.2.0 * Addressed a number of republishing and collaboration issues where the content was incorrectly published to a new location rather than reusing an existing deployment. (#981, #1007, #1013, #1019) * `showLogs()`, `configureApp()`, `setProperty()`, and `unsetProperty()` search for the application by name when there are no matching deployment records. (#985, #989) * `rpubsUpload()` correctly records the initial RPubs destination, allowing republishing. (#976) * `deployApp()` and friends record multi-value `metadata` entries as comma-separated values. (#1017) * `accountInfo()` includes `name` and `username` fields. Older versions of rsconnect store account records with a `username` field. Recent rsconnect versions record `name`. Both `name` and `username` should contain the same value. (#1024) # rsconnect 1.1.1 * Added `space` parameter to deploy directly to a space in Posit Cloud. * Improve reporting of errors returned by shinyapps.io. (#997) * Remove most directory layout validation checks. (#998) * Do not use `getOption("available_packages_filters")` option when calling `available.packages()`. (#1002) * Packages installed from source within an renv project are not associated with repositories. (#1004) # rsconnect 1.1.0 * Fixed analysis of directories that were smaller than the `rsconnect.max.bundle.files=10000` limit but larger than the `renv.config.dependencies.limit=1000` limit. (#968) * Ignore `.env`, `.venv`, and `venv` files only when they reference Python virtual environments. (#972) * `deployApp()` and `writeManifest()` accept optional `envManagement`, `envManagementR`, and `envManagementPy` arguments. These args specify whether Posit Connect should install packages in the package cache. If `envManagement` is `FALSE` then Connect will not perform any package installation and it is the administrator's responsibility to ensure the required R/Python packages are available in the runtime environment. This is especially useful if off-host execution is enabled, when the execution environment (specified by the `image` argument) already contains the required packages. These values are ignored when `Applications.ManifestEnvironmentManagementSelection = false`. Requires Posit Connect `>=2023.07.0`. (#977) * Fix account discovery by `showProperties()`. (#980) # rsconnect 1.0.2 * Fixed redeployments to shinyapps.io where `appName` is provided, but no local record of the deployment exists. (#932) * `deployApp()` and `writeManifest()` now error if your library and `renv.lock` are out-of-sync. Previously it always used what was defined in the `renv.lock` but that was (a) slow and (b) could lead to different results than what you see when running locally (#930). * Deploying from an renv project includes the `renv.lock` in the bundle. A manifest created for an renv project references the `renv.lock` in the `manifest.json`. (#926) * Use the environment variable `RSCONNECT_PACKRAT` to analyze dependencies using packrat, as was done prior to rsconnect-1.0.0. Use of the `rsconnect.packrat` option is discouraged, as it is not effective when using push-button deployment in the RStudio IDE. (#935) * The `renv.lock` is ignored when the `RSCONNECT_PACKRAT` environment variable or the `rsconnect.packrat` option is set. (#936) * The content type is inferred by analyzing the set of top-level files. (#942) * `deployApp()` and `writeManifest()` accept an optional `appMode` argument. Provide this argument if your project includes auxiliary files which mislead the existing `appMode` inference. For example, if an HTML project includes a downloadable Shiny `app.R`, that content will be assumed to be a Shiny application even if that application is not meant to be run. (#948) * `appDependencies()` accepts an `appFileManifest` argument as an alternate way of providing the target set of files. # rsconnect 1.0.1 * `deployDoc()` includes `.Rprofile`, `requirements.txt` and `renv.lock` when deploying `.Rmd` or `.qmd`. These additional files are not included with rendered HTML documents. (#919) * Explicit renv dependencies are preserved. (#916) # rsconnect 1.0.0 ## New features * `deployApp()` and `deployDoc()` now support deploying static content to Posit Cloud. Static RMarkdown and Quarto content can be rendered server-side. * rsconnect requires renv 1.0.0. * `deployApp()` and `writeManifest()` now respect renv lock files, if present. If you don't want to use these lockfiles, and instead return the previous behaviour of snapshotting on every deploy, add your `renv.lock` to `.rscignore` (#671). Learn more `?appDependencies()`. Additionally, `deployApp()` and `writeManifest()` now use renv to capture app dependencies, rather than packrat. If this causes a previously working deploy to fail, please file an issue then set `options(rsconnect.packrat = TRUE)` to revert to the previous behaviour. * `deployApp()`'s `quarto` argument now takes values `TRUE`, `FALSE` or `NA`. The previous value (a path to a quarto binary) is now ignored, and instead we automatically figure out the package from `QUARTO_PATH` and `PATH` env vars (#658). `deploySite()` now supports quarto websites (#813). * `deployApp()` gains a new `envVars` argument which takes a vector of the names of environment variables that should be securely copied to the server. The names (not values) of these environment variables are also saved in the deployment record and will be updated each time you re-deploy the app (#667). This currently only works with Connect, but we hope to add support to Posit cloud and shinyapps.io in the future. * rsconnect gains two new functions for understanding and updating the environment variables that your apps currently use. `listServerEnvVars()` will return a data frame of applications, with a `envVars` list-column giving the names of the environment variables used by each application. `updateServerEnvVars()` will update all applications that use a specific environment variable with the current value of that environment variable (#667). ## Lifecycle changes * Non-libcurl `rsconnect.http` options have been deprecated. This allows us to focus our efforts on a single backend, rather than spreading development efforts across five. The old backends will remain available for at least 2 years, but if you are using them because libcurl doesn't work for you, please report the problem ASAP so we can fix it. * `addConnectServer()` has been deprecated because it does the same thing as `addServer()` now that `addServer()` also validates URLs. * `deployTFModel()` is defunct. Posit Connect no longer supports hosting of TensorFlow Model APIs. A TensorFlow model can be deployed as a [Plumber API](https://tensorflow.rstudio.com/guides/deploy/plumber.html), [Shiny application](https://tensorflow.rstudio.com/guides/deploy/shiny), or other supported content type. * `discoverServer()` has been deprecated; it never worked. * `deployApp("foo.Rmd")` has been deprecated. It was never documented, and it does the same job as `deployDoc()` (#698). ## Minor improvements and bug fixes * New `rsconnect.http.headers` and `rsconnect.http.cookies` allow you to set extra arbitrary additional headers/cookies on each request (#405). Their use is documented in the new `vignette("custom-http")`. * Uploading large files to RPubs works once more (#450). * When recording details about deployments to Posit Cloud, appId now represents the content id (as seen in URLs of the format `https://posit.cloud/content/{id}`) instead of the application id. * Deployment records no longer contain the time the app was deployed (`when`) or when it's metadata was last synced (`lastSyncTime`) as these variables are not very useful, and they lead to uninteresting diffs if you have committed the deployment records to git (#770). A `version` field has been added to deployment DCF files to facilitate future file format changes, if needed. Its value for this release is `1`., * `accounts()` returns a zero-row data frame if no accounts are registered. * `accountInfo()` and `removeAccount()` no longer require `account` be supplied (#666). * `accountInfo()` and `servers()` redact sensitive information (secrets, private keys, and certificates) to make it hard to accidentally reveal such information in logs (#675). * `addServer()` includes the port in the default server name, if present. * `appDependencies()` includes implicit dependencies, and returns an additional column giving the Repository (#670). Its documentation contains more information about how dependency discovery works, and how you can control it, if needed. * `applications()` now returns the application title, if available (#484), and processes multiple pages of results from a Connect server (#860). * `connectApiUser()` now clearly requires an `apiKey` (#741). * `deployApp()` output has been thoroughly reviewed and tweaked. As well as general polish it now gives you more information about what it has discovered about the deployment, like the app name, account & server, and which files are included in the bundle (#669). * `deployApp()` is more aggressive about saving deployment data, which should make it less likely that you need to repeat yourself after a failed deployment. In particular, it now saves both before and after uploading the contents (#677) and it saves when you're updating content originally created by someone else (#270). * `deployApp()` now gives an actionable error if you attempt to set visibility of an app deployed to posit.cloud (#838). * `deployApp()` now uses a stricter policy for determining whether or not a locally installed package can be successfully installed on the deployment server. This means that you're more likely to get a clean failure prior to deployment (#659). * `deployApp()` will now detect if you're attempting to publish to an app that has been deleted and will prompt you to create a new app (#226). * `deployApp()` includes some new conveniences for large uploads including reporting the size of the bundle you're uploading and showing a progress bar in interactive sessions (#754). * `deployApp()` now follows redirects, which should make it more robust to your server moving to a new url (#674). * `deployApp()` uses simpler logic for determining whether it should create a new app or update an existing app. Now `appName`, `account`, and `server` are used to find existing deployments. If none are found, it will create a new deployment; if one is found, it'll be updated; if more than one are found, it will prompt you to disambiguate (#666). * `deployApp()` improves account resolution from `account` and `server` arguments by giving specific recommendations on the values that you might use in the case of ambiguity or lack of matches (#666). Additionally, you'll now receive a clear error if you accidentally provide something other than a string or `NULL` to these arguments. * `deployApp()` now generates an interactive prompt to select `account`/`server` (if no previous deployments) or `appName`/`account`/`server` (if multiple previous deployments) (#691). * `deployApp()` now advertises which startup scripts are run at the normal `logLevel`, and it evaluates each script in its own environment (#542). * `deployApp()` now derives `appName` from `appDir` and `appPrimaryDoc`, never using the title (#538). It now only simplifies the path if you are publishing to shinyapps.io, since its restrictions on application names are much tighter than those of Posit Connect. * `deployApp()` will now warn if `appFiles` or `appManifestFiles` contain files that don't exist, rather than silently ignoring them (#706). * `deployApp()` excludes temporary backup files (names starting or ending with `~`) when automatically determining files to bundle (#111) as well as directories that are likely to be Python virtual environments (#632). Additionally, ignore rules are always now applied to all directories; previously some (like `.Rproj.user` and `"manifest.json"`) were only applied to the root directory. It correctly handles `.rscignore` files (i.e. as documented) (#568). * `deployApp(appSourceDoc)` has been deprecated; it did the same job as `recordDir`. * `deployDoc()` includes a `.Rprofile` in the bundle, if one is found in the same directory as the document. * `lint()` should have fewer false positives for path problems: the relative path linter has been removed (#244) and the case-sensitive linter now only checks strings containing a `/` (#611). * New `listDeploymentFiles()`, which supsersedes `listBundleFiles()`. It now errors when if the bundle is either too large or contains too many files, rather than silently truncating as before (#684). * `serverInfo()` and `removeServer()` no longer require a `server` when called interactively. * `showMetrics()` once again returns a correctly named data frame (#528). * Removed Rmd generation code (`writeRmdIndex()`) which had not worked, or been necessary, for quite some time (#106, #109). * Locale detection has been improved on windows (#233). * The `rsconnect.pre.deploy` and `rsconnect.post.deploy` hooks are now always called with the content directory, not sometimes the path to a specific file (#696). * Functions that should only interact with shinyapps.io enforce the server type. Updated `addAuthorizedUser()`, `removeAuthorizedUser()`, `showUsers()`, `showInvited()`, `resendInvitation()`, `configureApp()`, `setProperty()`, `unsetProperty()`, `purgeApp()`, `restartApp()`, `terminateApp()`, `showUsage()`, and `showMetrics()` (#863, #864). * When needed packages are not installed, and you're in an interactive environment, rsconnect will now prompt you to install them (#665). * The confirmation prompt presented upon lint failures indicates "no" as its default. (#652) # rsconnect 0.8.29 * Introduced support for publishing to Posit Cloud. This feature is currently in closed beta and requires access to an enabled account on Posit Cloud. See [Posit Cloud's Announcement](https://posit.cloud/learn/whats-new#publishing) for more information and to request access. * Update company and product names for rebranding to Posit. # rsconnect 0.8.28 * Shiny applications and Shiny documents no longer include an implicit dependency on [`ragg`](https://ragg.r-lib.org) when that package is present in the local environment. This reverts a change introduced in 0.8.27. Shiny applications should add an explicit dependency on `ragg` (usually with a `library("ragg")` statement) to see it used by `shiny::renderPlot` (via `shiny::plotPNG`). The documentation for `shiny::plotPNG` explains the use of `ragg`. (#598) * Fix bug that prevented publishing or writing manifests for non-Quarto content when a Quarto path was provided to the `quarto` argument of `writeManifest()`, `deployApp()`, and related functions. * Escape account names when performing a directory search to determine an appropriate server. (#620) # rsconnect 0.8.27 * Quarto content will no longer silently deploy as R Markdown content when Quarto metadata is missing or cannot be gathered. Functions will error, requesting the path to a Quarto binary in the `quarto` argument. (#594) * Fix typo for `.rscignore`. (#599) * Quarto deployments specifying only an `appDir` and `quarto` binary but not an `appPrimaryDoc` work more consistently. A directory containing a `.qmd` file will deploy as Quarto content instead of failing, and a directory containing an `.Rmd` file will successfully deploy as Quarto content instead of falling back to R Markdown. (#601) * If the `ragg` package is installed locally, it is now added as an implicit dependency to `shiny` apps since `shiny::renderPlot()` now uses it by default (when available). This way, `shiny` apps won't have to add `library(ragg)` to get consistent (higher-quality) PNG images when deployed. (#598) # rsconnect 0.8.26 * Add ability to resend shinyapps.io application invitations (#543) * Show expiration status in shinyapps.io for invitations (#543) * Allow shinyapps.io deployments to be private at creation time (#403) * Update the minimum `openssl` version to 2.0.0 to enable publishing for users on FIPS-compliant systems without the need for API keys. (#452) * Added Quarto support to `writeManifest`, which requires passing the absolute path to a Quarto executable to its new `quarto` parameter * Added `quarto` parameter to `deployApp` to enable deploying Quarto documents and websites by supplying the path to a Quarto executable * Added support for deploying Quarto content that uses only the `jupyter` runtime * Added support for selecting a target `image` in the bundle manifest * The `showLogs` function takes a `server` parameter. (#57) * Added the `rsconnect.tar` option, which can be used to specify the path to a `tar` implementation instead of R's internal implementation. The previous method, using the `RSCONNECT_TAR` environment variable, still works, but the new option will take precedence if both are set. # rsconnect 0.8.25 * Use the `curl` option `-T` when uploading files to avoid out of memory errors with large files. (#544) * The `rsconnect.max.bundle.size` and `rsconnect.max.bundle.files` options are enforced when processing an enumerated set of files. Previously, these limits were enforced only when bundling an entire content directory. (#542) * Preserve file time stamps when copying files into the bundle staging directory, which then propagates into the created tar file. (#540) * Configuration directories align with CRAN policy and use the location named by `tools::R_user_dir`. Configuration created by earlier versions of this package is automatically migrated to the new location. (#550) # rsconnect 0.8.24 * Added support for publishing Quarto documents and websites * Added support for `.rscignore` file to exclude files or directories from publishing (#368) * Fixed issue causing missing value errors when publishing content containing filenames with extended characters (#514) * Fixed issue preventing error tracebacks from displaying (#518) # rsconnect 0.8.18 * Fixed issue causing configuration directory to be left behind after `R CMD CHECK` * Fixed incorrect subdirectory nesting when storing configuration in `R_USER_CONFIG_DIR` * Added linter for different-case Markdown links (#388) * Use new Packrat release on CRAN, 0.6.0 (#501) * Fix incorrect linter messages referring to `shiny.R` instead of `server.R` (#509) * Warn, rather than err, when the repository URL for a package dependency cannot be validated. This allows deployment when using archived CRAN packages, or when using packages installed from source that are available on the server. (#508) * Err when the app-mode cannot be inferred; seen with empty directories/file-sets (#512) * Add `verbose` option to `writeManifest` utility (#468) # rsconnect 0.8.17 * Fixed issue where setting `options(rsconnect.http.trace.json = TRUE)` could cause deployment errors with some HTTP transports (#490) * Improve how large bundles (file size and count) are detected (#464) * The `RSCONNECT_TAR` environment variable can be used to select the tar implementation used to create bundles (#446) * Warn when files are owned by users or groups with long names, as this can cause the internal R tar implementation to produce invalid archives (#446) * Add support for syncing the deployment metadata with the server (#396) * Insist on ShinyApps accounts in `showUsers()` (#398) * Improve the regex used for the browser and browseURL lints to include a word boundary (#400) * Fixed bug where `connectApiUser()` did not set a user id (#407) * New arguments to `deployApp` to force the generation of a Python environment file or a `requirements.txt` file (#409) * Fail when no repository URL is available for a dependent package (#410) * Fix error when an old version of a package is installed and a current version isn't available (#431, #436) * Fix error where packages couldn't be found with nonstandard contrib URLs. (#451, #457) * Improve detection of Shiny R Markdown files when `server.R` is present (#461) * Fix failure to write manifest when package requires a newer R version than the active version (#467) * Increase default HTTP timeout on non-Windows platforms (#476) * Require `packrat` 0.5 or later (#434) * Fix error when handling empty application / content lists (#417, #395) * Calls to `writeManifest()` no longer reference `packrat` files in the generated `manifest.json`. The `packrat` entries were transient and only existed while computing dependencies. (#472) * Fix `applications` when ShinyApps does not return `size` details (#496) * GitLab is seen as a valid SCM source (#491) # rsconnect 0.8.16 * Prevent attempts to deploy Connect applications without uploading (#145) * Flag usage of `browser()` debugging calls when deploying (#196) * Prevent accidental deployment of Plumber APIs to shinyapps.io (#204) * Allow `appId` and other global deployment parameters to `deploySite` (#231) * Fix error when running `deployments()` without any registered accounts (#261) * Omit `renv` files from deployment bundle (#367) * Fix failure to deploy in Packrat projects (#370) * Fix issue deploying when a package exists in multiple repos (#372) * Honor `RETICULATE_PYTHON` when writing manifests (#374) * Add `on.failure` user hook to run a function when `deployApp()` fails (#375) * Fix error when showing non-streaming logs (#377) * Use internally computed MD5 sums when MD5 is disabled in FIPS mode (#378, #382) * Make it clearer which log entries are emitted by RStudio Connect (#385) * Add support for `requirements.txt` for Python, if it exists (#386) * Restore compatibility with R < 3.5 (#394) * Add support for authenticating with Connect via an API key rather than a token (#393) # rsconnect 0.8.15 * Switch from **RCurl** to **curl** as the default HTTP backend (#325) * Add `purgeApp()` function to purge previously deployed shinyapps.io applications (#352) rsconnect/MD50000644000176200001440000004273414536742742012610 0ustar liggesusers68606045302c2781878a22f3b26d24be *DESCRIPTION b55cd0e3ffdca029c0817270fcfd8084 *NAMESPACE 17b0ead0622129c20f95ed948264918f *NEWS.md b18067e85fd7c9727390f198eb90f92e *R/account-find.R dd95690ae7af8db36e2e221319619a78 *R/accounts.R a27d82bd834abc6982f2b572bff8cf8d *R/appDependencies.R bec754a82dc2973420eb484ff14300c7 *R/appMetadata-quarto.R 8da4afb0188469d7e52e64791a090e38 *R/appMetadata.R a9de5a16cd3d6534ee8c8e7c4414a149 *R/applications.R 83f12a46dc1408d27ae64935eb2bbde8 *R/auth.R 2ef3f1b3ab6948ebae258e319762c8bd *R/bundle.R f13531b8c0a9cb918b0924d71a3aa718 *R/bundleFiles.R c230b4f1cf0cbd05da0a2d38150d8b23 *R/bundlePackage.R 660cc9e12c46dcde121d326466d77ba6 *R/bundlePackagePackrat.R b2abf5ad6394286f986adada8047d4c1 *R/bundlePackageRenv.R 90409ce683565af2d44543a7e097c972 *R/bundlePython.R d45f273c2bb61f2d3fcfb9ebb472ba02 *R/certificates.R 50b3f8363fcd40180692f5aba286798c *R/client-cloud.R b8b43cfc8ae25e67cea772750ad2bf57 *R/client-connect.R 356ea7a643cb40615a5111cd7f1e5f87 *R/client-shinyapps.R 1ed078b982736fabc664cb00df8d3604 *R/client.R af9f63219195a7e437e4a180757b62a2 *R/config.R 9e5464126e6c5589d811f01a58b0c18f *R/configMigrate.R a94d26fd0d2ab157625d88b127b38eee *R/configureApp.R e9c10c87cd1ed981e1b7d9a01b568ad7 *R/cookies.R 03335c1fc361685890bf97c9959cc15b *R/deployAPI.R 381e7a0deac60c1936ce0ddfebd54dd4 *R/deployApp.R e5100efd160275bb32a0ff6af40e0c09 *R/deployDoc.R 91c6496e2f4a074fd66e90873dd88cfe *R/deploySite.R ee7edd8d8bdc341de817e4133d98fa82 *R/deployTFModel.R ee6feb7156edddedfd1e2ac3654531ed *R/deploymentTarget.R 2f2d4627078c300a9629278a7a81d0f7 *R/deployments-find.R dd0201c1b3a2fcb14bc46d8d49685b5c *R/deployments.R 07b598c061dcf021fed3297eea0e2ee7 *R/envvars.R a33820530fa06e25273650698ef4d5bd *R/http-curl.R acd29383e178ec8475d319c09f6908dc *R/http-internal.R 3f24d34ab0aa79e4cb5e71a8bac58c65 *R/http-libcurl.R 5da03ce806e00789b60c2a07fcc84f01 *R/http-rcurl.R f9e26192f54319cdeaa84c46ceabb378 *R/http.R 6c4772eff25f96cd06fb48143ef95b21 *R/ide.R 8c5f08458cfd4e7f75a27924b2789c83 *R/import-standalone-obj-type.R 5b49b9c463766fac246aaf38deb93504 *R/import-standalone-types-check.R 61fb8363051cef7aa3b30a8561fc59df *R/imports.R 30b3ba170bdbd25a1a79c926288e3aca *R/lint-framework.R 3c208ecafb23384a35a15a93846d0076 *R/lint.R d3899e3930dcb9607e97ef08dff38028 *R/linters.R aaa2ffa5c1e1eb41acc88d5170387fe9 *R/locale.R df6db08e5736db0e6c3e02c9ff92a95a *R/purgeApp.R 98a4fd412ad5325b9dbacbf00c56df9e *R/restartApp.R b986ae754050bac4139f361ba5f2b9fd *R/rpubs.R 409a0f6ddf618355414c630aba1da996 *R/rsconnect-package.R 82af738f65bcec05814899ff041ea6fc *R/secret.R 127fa19d0fed9ac9ad5b28657a92bcb3 *R/servers-deprec.R 0937cf2e01f503316a0db99b862409b6 *R/servers.R d41d8cd98f00b204e9800998ecf8427e *R/static-analysis.R 857dbd4f3221e0fbbd0a984542553715 *R/tasks.R 5462de334d684f10ea37f5b3be90b077 *R/terminateApp.R 915a8b2c1eec1e0d8175e4abde1955ad *R/title.R dee26321f4ce67bbb46d457443adc320 *R/usage.R dab1d18bb1b1d43fd33dbc8e62af62ab *R/utils-cli.R 1d07cc2449a07f8f6f4ee9c0d6039daf *R/utils.R aa5294ab5224eb98fb8652dc10ae7c61 *R/writeManifest.R d74b64b4b3975dc8ecd264790e3c9436 *README.md 43794bdeac721d782318bd8f2caec218 *build/vignette.rds 2aeba46562a9b9117a9217520f67adc0 *inst/cert/cacert.pem 2378364f2f7b529c5c5997413cd69d39 *inst/cert/shinyapps.io.pem 34cdb8c94e7941cbdc7fae1bdd1c84e9 *inst/doc/custom-http.R ff7cda5df06795b98404748730db1f57 *inst/doc/custom-http.Rmd 0e7b304448cf60ca002b5a0cbe2a0004 *inst/doc/custom-http.html dd9df5df88fdf07be178f552eda03d89 *inst/examples/diamonds/server.R 1b276d13ac94663d12f7a2521755c6ab *inst/examples/diamonds/ui.R c4583de8a35d29910d6b24bcf5e1fb1d *inst/examples/sessioninfo/server.R 7dee3567e52504bac683fb9362147a36 *inst/examples/sessioninfo/ui.R c90b28ab8304e1fc3e9ed0ea587af1fd *inst/resources/environment.py f78bc3f369e2a5b1b671a99a2fd72f0f *man/accountUsage.Rd 50d71c291f7cd5611d9cf9a60c2a7a07 *man/accounts.Rd 684a857d51f1f8779b928b632980d955 *man/addAuthorizedUser.Rd bcca327b0b6268c0ed449381105af199 *man/addConnectServer.Rd b972c4e6a7112ea1204c5064fdc0f1a4 *man/addLinter.Rd 5f96c73a25675e426493ea535e21258b *man/addServer.Rd 3c0643157c4355112f88f3f8841fdddf *man/appDependencies.Rd ed009d0fb02fb72ee22f51e196dad77b *man/applicationConfigDir.Rd 9b52edfb2d1d699bf9fe31c51ac86c10 *man/applications.Rd dd4a3cdf6f8a526697bbd9334d890fcf *man/authorizedUsers.Rd d0eee3c1b1e8d7a07bc02d0c8e2388e9 *man/configureApp.Rd 29cea1533a5f88566b29a0dcbade2827 *man/connectApiUser.Rd b8ec40215d5748eaf03c342ef09f375e *man/deployAPI.Rd e1fefd1bd55991194ac65dd70f65c130 *man/deployApp.Rd a297130e785465a2083e2550fd31dba2 *man/deployDoc.Rd 5ac9507d8e9d3554946aa08a94ee96d7 *man/deploySite.Rd 0b9cacb8569580514c674fb2b1de06d0 *man/deployTFModel.Rd 8141d4f63969b3bfa9c7df403fb30006 *man/deployments.Rd 0029160e3c9eebd7bd70bbec4bdf991d *man/discoverServers.Rd a1cbaf3f328e8d74e747faacf640c7fc *man/figures/lifecycle-archived.svg 6f521fb1819410630e279d1abf88685a *man/figures/lifecycle-defunct.svg 391f696f961e28914508628a7af31b74 *man/figures/lifecycle-deprecated.svg 691b1eb2aec9e1bec96b79d11ba5e631 *man/figures/lifecycle-experimental.svg 405e252e54a79b33522e9699e4e9051c *man/figures/lifecycle-maturing.svg f41ed996be135fb35afe00641621da61 *man/figures/lifecycle-questioning.svg 306bef67d1c636f209024cf2403846fd *man/figures/lifecycle-soft-deprecated.svg ed42e3fbd7cc30bc6ca8fa9b658e24a8 *man/figures/lifecycle-stable.svg 99f6e77d8cd1072e42e744a4950e143a *man/figures/lifecycle-superseded.svg 04524b9a1ab478bdac257e6ae4e97d85 *man/figures/logo.png 9978780470ec7957a7ca567f85319614 *man/figures/logo.svg e3bd29df33942aa2223517ef0ac935f6 *man/forgetDeployment.Rd ffce56fb53d8f1394e18171c2408941e *man/generateAppName.Rd b13eede7a2c7df91552b5117bb14efe4 *man/lint.Rd 028f46e75c8496250fe4f9d06e28977c *man/linter.Rd b9e3d5c2e05cbee03ada871727c920b1 *man/listAccountEnvVars.Rd bf98c97392cb639ffe25352c99796c87 *man/listBundleFiles.Rd c2cbd3cfaae4572ca998dec087b359fd *man/listDeploymentFiles.Rd afb832c8f9b10a2951b7c7899a43f18d *man/makeLinterMessage.Rd 91bd64aff632fcf8acd33dc5c1a593d7 *man/oldApplicationConfigDir.Rd 34daa4b00d5464fef69e2ade09621766 *man/options.Rd 67f34d78895e2796db406151c67d5837 *man/purgeApp.Rd d959f03abd1347873a0d08a80a0d7d66 *man/removeAuthorizedUser.Rd fd7bda293474c8122268d540cb93ede8 *man/resendInvitation.Rd 53ecaecb030968be567a5338330e3fe2 *man/restartApp.Rd c7e27d78d1cd7c0b92a200404ebb492f *man/rpubsUpload.Rd 92b479112c77995bd838055e62583041 *man/rsconnect-package.Rd a3c3e1fce92b233f28b76ff7bef48ce4 *man/rsconnectConfigDir.Rd d2daf29dbd1c31cbfe1864a81278519d *man/rsconnectPackages.Rd a781b69f8d360ecf7558b36f7235bb7a *man/rsconnectProxies.Rd 85c709d23e204e4d6790991983c09464 *man/servers.Rd 8ac94e9c86338e1a32ecc850086b946e *man/setAccountInfo.Rd bca598f599ff4f67fa608a78412cd740 *man/setProperty.Rd f6be60a5fda83866c33b022dd6fc43a0 *man/showInvited.Rd 35d3b5761c3520d487949bf665568f60 *man/showLogs.Rd 7ff50af68f29ae845bcdb77a858d09b8 *man/showMetrics.Rd f7381c79897359cd9442783ed59dd626 *man/showProperties.Rd 1dcdb65fb1758b688eb64e3f6b8edd3d *man/showUsage.Rd a7ddebb09e4527c54d141884f742e52a *man/showUsers.Rd f3d68c85eaac670b1f08cddc2336b062 *man/syncAppMetadata.Rd 10e38c5136d54e69794bd68064a8fa83 *man/taskLog.Rd 11d48b0e36c8da52c845335126460415 *man/tasks.Rd 0bc676496f2adf39370991ca5f270e6f *man/terminateApp.Rd 726c0636c49b19a9c0cc101414819b00 *man/unsetProperty.Rd 0bf280f189803785d67a4f1e1ce91356 *man/writeManifest.Rd 3a70f0034bf67db985f3c59103f26a27 *tests/manual/appMode.Rmd 6b34c1f91e7b9f758f8cd1a18942cdc8 *tests/manual/dependencies.Rmd 57cf966ca8ceb214cb5cb61344d454c7 *tests/manual/deploySite.Rmd 3f7d6aba077222a5c2f8519462d51ba9 *tests/manual/publishing-dialog.Rmd 51818524b66214f5b677fbb82f38af31 *tests/testthat.R afbfedcf5b28461580f1dc0838aa14f3 *tests/testthat/_snaps/account-find.md 7208e02a31e9213972a3d6c149e136a3 *tests/testthat/_snaps/accounts.md 658a06866d867364349d3f5424e15ee0 *tests/testthat/_snaps/appDependencies.md cf6fa968f3dd92d189b394f7e9f80902 *tests/testthat/_snaps/appMetadata-quarto.md ebe285b6d25f51dd313fcd304051c75b *tests/testthat/_snaps/appMetadata.md 5653ed01e209a7b9e4eb19191576f878 *tests/testthat/_snaps/applications.md c1fc1f71804fc2d5092d1129470f5b94 *tests/testthat/_snaps/bundle.md 6e18d29a541d3ae8ac4f9b10cbc93bb5 *tests/testthat/_snaps/bundleFiles.md 9bb36e2502dd8b4dc1861347cde02859 *tests/testthat/_snaps/bundlePackage.md d55d8f6de699fb2bddcb73bcd40514dd *tests/testthat/_snaps/bundlePackagePackrat.md 0c1badbec4ba51c65d97cfdbd4e3bcef *tests/testthat/_snaps/bundlePackageRenv.md fce16248e944fa4e43dbae00c5be4e3f *tests/testthat/_snaps/bundlePython.md e6a7dc199abad18c49f1bcf85331e6f5 *tests/testthat/_snaps/cookies.md f11783e9d82fd52d4d3449ad977045a7 *tests/testthat/_snaps/deployApp.md b79b40c2bac04f8ef08c85aa5c593964 *tests/testthat/_snaps/deployDoc.md e95f502db3f7fed996fb1a0279bd496c *tests/testthat/_snaps/deploymentTarget.md e9c59d5fffc2a3a4dbf20d4d61d8b7c2 *tests/testthat/_snaps/deployments-find.md 15d48ce6f9c7533834ff0b6404d68bbb *tests/testthat/_snaps/deployments.md 8a0be89978ab887a10808d39496e6b83 *tests/testthat/_snaps/http-libcurl.md 33c467004e4d580902dc9bfb9c77191e *tests/testthat/_snaps/http.md 42446d4c8ac00460ac404ce2837b1e73 *tests/testthat/_snaps/ide.md 918758055afefa7fd276aadf9c857952 *tests/testthat/_snaps/lint.md 91f8d25cf144e338cde76677a1f4338c *tests/testthat/_snaps/linters.md 3fca8a9f7869bf2186a8f0d6bc2abec8 *tests/testthat/_snaps/secret.md 940bb21b0c25262220b99e0c4ebb89d1 *tests/testthat/_snaps/servers-deprec.md df06aeb13137c211839f9e598efc0b53 *tests/testthat/_snaps/servers.md 20f7d93d3e38ffe001a55352e7f5ee6b *tests/testthat/_snaps/writeManifest.md 28358d7a7da5b98ef72f87ef9f7e3c71 *tests/testthat/certs/invalid.crt 2119c1e4e48a07544a2620810c8d9fe0 *tests/testthat/certs/localhost.crt d35b5136333b0177b962a61506653041 *tests/testthat/certs/sample.crt a38a451d1d8f8c2f4a438c9624a5a432 *tests/testthat/certs/store.crt 35989bf34a047efe49e71cabe2f3b055 *tests/testthat/certs/two-cas.crt ef8154837fa51b4794f9919419b4b86e *tests/testthat/helper-http.R d3ac096c8258b621b7cca61ec550b6a3 *tests/testthat/helper-paths.R a215d744db977f01e383161df95e6754 *tests/testthat/helper.R facf106f5d8245d54470f461b6730b7f *tests/testthat/multibyte-characters/app.R 873643945602ffbc56c89577fe33af42 *tests/testthat/packages/latin1package/DESCRIPTION 8b54e5a89fbda3af5e077053d40bec76 *tests/testthat/packages/latin1package/NAMESPACE e5e0f10a3ef6eeab66ccbb80099ea1c5 *tests/testthat/packages/latin1package/R/hello.R 99567271980ebfdb87ea5653e5af0267 *tests/testthat/packages/latin1package/man/hello.Rd 6aaedf6a431c4acf676cb2d01b194447 *tests/testthat/packages/utf8package/DESCRIPTION 8b54e5a89fbda3af5e077053d40bec76 *tests/testthat/packages/utf8package/NAMESPACE e5e0f10a3ef6eeab66ccbb80099ea1c5 *tests/testthat/packages/utf8package/R/hello.R 99567271980ebfdb87ea5653e5af0267 *tests/testthat/packages/utf8package/man/hello.Rd c377ea1f04daab9e355461a245efa429 *tests/testthat/packages/windows1251package/DESCRIPTION 8b54e5a89fbda3af5e077053d40bec76 *tests/testthat/packages/windows1251package/NAMESPACE e5e0f10a3ef6eeab66ccbb80099ea1c5 *tests/testthat/packages/windows1251package/R/hello.R 99567271980ebfdb87ea5653e5af0267 *tests/testthat/packages/windows1251package/man/hello.Rd 7cec49988744201b8587102340e23b16 *tests/testthat/project-MASS/MASS.R 3934e07d678ab1df32c048898d3e9441 *tests/testthat/quarto-doc-none/quarto-doc-none.qmd b3ae14e020bebd8a266e50b690b7ec15 *tests/testthat/quarto-proj-r-shiny/_quarto.yml 58d6745717c2f4d942817eee0957ed31 *tests/testthat/quarto-proj-r-shiny/quarto-proj-r-shiny.qmd b40cd4315c9165fc4714362fb37de47f *tests/testthat/quarto-website-py/_quarto.yml 774bb98825779ba5884422ea2ac0431b *tests/testthat/quarto-website-py/about.qmd d72645570dc2d02270c398ae0a29b716 *tests/testthat/quarto-website-py/index.qmd 3d6786713ada9727e0371c63cd9b6455 *tests/testthat/quarto-website-py/requirements.txt e31c3cdea03dfab8a29456978017bd10 *tests/testthat/quarto-website-py/styles.css d075744c2de5c268bee12343b62f4191 *tests/testthat/quarto-website-r-py/_quarto.yml a76d96fb10a2bc00261df0e593a83191 *tests/testthat/quarto-website-r-py/about.qmd f6bfa05b658f18f162240e5c2119c76f *tests/testthat/quarto-website-r-py/index.qmd f618019a224ed2f8e6bc39116267a173 *tests/testthat/quarto-website-r-py/requirements.txt e31c3cdea03dfab8a29456978017bd10 *tests/testthat/quarto-website-r-py/styles.css 80577cb2b6d167108f0a17870911cec4 *tests/testthat/quarto-website-r/README.md 54d417481a8c9efc703c407cd68a4cc6 *tests/testthat/quarto-website-r/_quarto.yml a754ce02c0472c0b163d8ffb898e69ac *tests/testthat/quarto-website-r/about.qmd ea850466e0170ed3157c8e26bdc7ac91 *tests/testthat/quarto-website-r/index.qmd e31c3cdea03dfab8a29456978017bd10 *tests/testthat/quarto-website-r/styles.css 7cec49988744201b8587102340e23b16 *tests/testthat/renv-recommended/dependences.R d0360d35d74196e2d368b2255239ebde *tests/testthat/renv-recommended/renv.lock d43a894bb2afaa0915043d9cf3c681cf *tests/testthat/shiny-app-in-subdir/my-app/server.R 99383448a53e115d08ae7a3e48af3d86 *tests/testthat/shiny-app-in-subdir/my-app/ui.r 0ac9325362678856ae8cee30cfbcff6d *tests/testthat/shiny-rmds/non-shiny-rmd.Rmd 9985f91dc258e78419eca67dbe710c6a *tests/testthat/shiny-rmds/shiny-rmd-dashes.Rmd 15e53373a9b8d9de81cc74eaef9816b3 *tests/testthat/shiny-rmds/shiny-rmd-dots.Rmd 70d0da110cd5fe44db2e0d88361596cb *tests/testthat/shinyapp-appR/app.R 782507835baf9dc5174849b2f23a8689 *tests/testthat/shinyapp-appR/rsconnect/colorado.posit.co/hadley/shinyapp-appR.dcf 0ef204e32d59f05adf1c2285c343193b *tests/testthat/shinyapp-simple/server.R 6c56aafc35413ea21878610ff30f170d *tests/testthat/shinyapp-simple/ui.R 70d0da110cd5fe44db2e0d88361596cb *tests/testthat/shinyapp-singleR/single.R 2a0790d076a8f6d31fdcb8d71c793693 *tests/testthat/shinyapp-with-absolute-paths/ShinyDocument.Rmd 1c158ec0250a43fd72c04bae04d26c8d *tests/testthat/shinyapp-with-absolute-paths/ShinyPresentation.Rmd 1d35c9da467943fbe5a516d6d7a6ad2a *tests/testthat/shinyapp-with-absolute-paths/data/College.txt f23aef304963331a3140943e10e586fc *tests/testthat/shinyapp-with-absolute-paths/server.R 021b793fc81bd80128e9bec11cfd8b36 *tests/testthat/shinyapp-with-absolute-paths/ui.R cafae18750ea211b29befe09d1036ab2 *tests/testthat/shinyapp-with-browser/server.R 6c56aafc35413ea21878610ff30f170d *tests/testthat/shinyapp-with-browser/ui.R 2c70795694d00afd0309082c5cbefa83 *tests/testthat/static-with-quarto-yaml/_quarto.yml 86bdd85fe7f0223b0a366debb21beb38 *tests/testthat/static-with-quarto-yaml/slideshow.html 7b0051124c431c4ca17c3cfe73bdf689 *tests/testthat/test-account-find.R e2ccd88f1c27b7136d126d7227d72f51 *tests/testthat/test-accounts.R 51cc42da45698c62d1df1dc20a5b7621 *tests/testthat/test-appDependencies.R 560058d8e32ba9cb7b249d10b68940df *tests/testthat/test-appMetadata-quarto.R 2e4bf168e5850c249cc2ef206b954241 *tests/testthat/test-appMetadata.R 092ca0329b8241984a21417f7fedd8c8 *tests/testthat/test-applications.R 88428d57a6fbeacca159360c34ee0942 *tests/testthat/test-bundle.R b8dfd6d787ef423b0c74f397d43325ef *tests/testthat/test-bundleFiles.R d73b9cad74fbb0538a73b825d4846a28 *tests/testthat/test-bundlePackage.R ce7447ba446a0c5a9422c3194460c279 *tests/testthat/test-bundlePackagePackrat.R 4c569ca19056e33bbd4776a84e456404 *tests/testthat/test-bundlePackageRenv.R abedc9ff59f329d049eccafa0d7d7d24 *tests/testthat/test-bundlePython.R f00bd6e1e2e7d0ff5c7172c810b78d8c *tests/testthat/test-cert.R b0b6e38fbf1c85490ea6156a5cacab0c *tests/testthat/test-client-cloud.R e6f16ffe5c534054d7ff7128b5e7e774 *tests/testthat/test-client-connect.R 22ad53af87737b4b110d5f39c242b1e2 *tests/testthat/test-client.R a4c3c684243fef42b1d3a7b2a2da955e *tests/testthat/test-config.R fb42cfee8b0669f0efddb60096d46e23 *tests/testthat/test-cookies.R aec17219f486a9f6108d89ef4cc1ec14 *tests/testthat/test-deployApp.R 9b18acf0c35a760c2782172c950584e0 *tests/testthat/test-deployDoc.R c8fd452277c9d3c534b7e80e5bac9d4a *tests/testthat/test-deploySite.R 56eb8ed47c08fadb2d33b6f88d9fce65 *tests/testthat/test-deploymentTarget.R cd28d5b2cca75c18175633641ce58b18 *tests/testthat/test-deployments-find.R f4f14d27ca8970ffa46ec47b161dae11 *tests/testthat/test-deployments.R 5c00104a9c8dbe087183277337bb6be0 *tests/testthat/test-http-curl.R 0605698a1d663edac0537ef04f6eddaf *tests/testthat/test-http-internal.R c9b76d1982e7d993c51e6eb72c945d34 *tests/testthat/test-http-libcurl.R d07996765ce6af1da9d23e20fcf349ac *tests/testthat/test-http-rcurl.R be4df1c9a8119dcf624d5e03551bf6cc *tests/testthat/test-http.R a51fd047805905accbfa608da4290fd5 *tests/testthat/test-ide.R aa46a3376729c25ac37bef832cd36c43 *tests/testthat/test-lint.R 0480ccd71d2a7065d59ffa0c2cea2edb *tests/testthat/test-linters.R 18485c4a42334bb0411f1caa9c8fbdb4 *tests/testthat/test-locale.R caf1244263fc0eef0787d0e604c8a3c0 *tests/testthat/test-plumber/plumber.R ba99abf56aae6fec4d2a988d75070c4e *tests/testthat/test-reticulate-rmds/implicit.Rmd c78f15224343592ea6ec67f83da59f85 *tests/testthat/test-reticulate-rmds/index.Rmd 07f51c85e4fe5d23e3b6b691c9b4239b *tests/testthat/test-rmd-bad-case/img/RStudio.svg a1e6b39036aa4e8b63b333e6318ec3db *tests/testthat/test-rmd-bad-case/index.Rmd 579d8c200f96501ba5ceaa9296c1fd96 *tests/testthat/test-rmds/index.Rmd f4fffcb3c1baaf6841f553e9aa7b1024 *tests/testthat/test-rmds/parameterized.Rmd 27ed9400e0161011c22d821bcef6e96f *tests/testthat/test-rmds/simple.Rmd 1019670988cc161cdd4fb04f9b5edb2f *tests/testthat/test-secret.R c4db546d2f7ef422079ee498de8bd7dc *tests/testthat/test-servers-deprec.R dcda64b47a2e8d00e8bd7f5ddaee5772 *tests/testthat/test-servers.R 3d03aed29a634daf1098730366428231 *tests/testthat/test-shinyApp/test-shinyApp.tar.gz c907c603ffe887ac731f9710ea26a05e *tests/testthat/test-title.R 7bb23127b057846e2bf930e4e5da3f5d *tests/testthat/test-utils.R db51ca0d771327d35be6f54372a3dc9a *tests/testthat/test-writeManifest.R ff7cda5df06795b98404748730db1f57 *vignettes/custom-http.Rmd rsconnect/inst/0000755000176200001440000000000014536677711013246 5ustar liggesusersrsconnect/inst/examples/0000755000176200001440000000000014435652570015056 5ustar liggesusersrsconnect/inst/examples/sessioninfo/0000755000176200001440000000000014456314431017407 5ustar liggesusersrsconnect/inst/examples/sessioninfo/server.R0000644000176200001440000000123614456314431021042 0ustar liggesuserslibrary(shiny) shinyServer(function(input, output, session) { # output sessionInfo output$sessionInfo <- renderPrint({ sessionInfo() }) # output urlInfo output$urlInfo <- renderText({ paste(sep = "", "protocol: ", session$clientData$url_protocol, "\n", "hostname: ", session$clientData$url_hostname, "\n", "pathname: ", session$clientData$url_pathname, "\n", "port: ", session$clientData$url_port, "\n", "search: ", session$clientData$url_search, "\n" ) }) # output userInfo output$userInfo <- renderText({ paste(sep = "", "user: ", session$user, "\n") }) }) rsconnect/inst/examples/sessioninfo/ui.R0000644000176200001440000000027314435652570020157 0ustar liggesuserslibrary(shiny) shinyUI(fluidPage( h3("URL"), verbatimTextOutput("urlInfo"), h3("Session"), verbatimTextOutput("sessionInfo"), h3("User"), verbatimTextOutput("userInfo") )) rsconnect/inst/examples/diamonds/0000755000176200001440000000000014435652570016654 5ustar liggesusersrsconnect/inst/examples/diamonds/server.R0000644000176200001440000000117314435652570020307 0ustar liggesuserslibrary(shiny) library(ggplot2) shinyServer(function(input, output) { dataset <- reactive(function() { diamonds[sample(nrow(diamonds), input$sampleSize), ] }) output$plot <- reactivePlot(function() { p <- ggplot(dataset(), aes_string(x = input$x, y = input$y)) + geom_point() if (input$color != "None") p <- p + aes_string(color = input$color) facets <- paste(input$facet_row, "~", input$facet_col) if (facets != ". ~ .") p <- p + facet_grid(facets) if (input$jitter) p <- p + geom_jitter() if (input$smooth) p <- p + geom_smooth() print(p) }, height = 700) }) rsconnect/inst/examples/diamonds/ui.R0000644000176200001440000000133414435652570017415 0ustar liggesuserslibrary(shiny) library(ggplot2) dataset <- diamonds shinyUI(pageWithSidebar( headerPanel("Diamonds Explorer"), sidebarPanel( sliderInput("sampleSize", "Sample Size", min = 1, max = nrow(dataset), value = min(1000, nrow(dataset)), step = 500, round = 0), selectInput("x", "X", names(dataset)), selectInput("y", "Y", names(dataset), names(dataset)[[2]]), selectInput("color", "Color", c("None", names(dataset))), checkboxInput("jitter", "Jitter"), checkboxInput("smooth", "Smooth"), selectInput("facet_row", "Facet Row", c(None = ".", names(dataset))), selectInput("facet_col", "Facet Column", c(None = ".", names(dataset))) ), mainPanel( plotOutput("plot") ) )) rsconnect/inst/doc/0000755000176200001440000000000014536677711014013 5ustar liggesusersrsconnect/inst/doc/custom-http.R0000644000176200001440000000141714536677711016430 0ustar liggesusers## ----include = FALSE---------------------------------------------------------- knitr::opts_chunk$set( collapse = TRUE, comment = "#>" ) ## ----setup-------------------------------------------------------------------- library(rsconnect) ## ----------------------------------------------------------------------------- options( rsconnect.http.headers = c( "CustomHeader1" = "CustomValue", "CustomHeader2" = "CustomValue2" ) ) ## ----------------------------------------------------------------------------- options( rsconnect.http.headers = c("cookie1=value1", "cookie2=value2") ) ## ----------------------------------------------------------------------------- options( rsconnect.http.headers = "cookie1=value1; Expires=Thu, 31 Oct 2021 07:28:00 GMT; Secure" ) rsconnect/inst/doc/custom-http.Rmd0000644000176200001440000000611714513230050016723 0ustar liggesusers--- title: "Customising HTTP requests" output: rmarkdown::html_vignette vignette: > %\VignetteIndexEntry{Customising HTTP requests} %\VignetteEngine{knitr::rmarkdown} %\VignetteEncoding{UTF-8} --- ```{r, include = FALSE} knitr::opts_chunk$set( collapse = TRUE, comment = "#>" ) ``` ```{r setup} library(rsconnect) ``` Depending on the configuration of your environment, you may need to cutomize the way that rsconnect sends http requests. Typically, this is required for some special ## `.rsconnect_profile` When deploying content from the RStudio IDE, the rsconnect package's deployment methods are executed in a vanilla R session that doesn't execute startup scripts. This can make it challenging to ensure options are set properly prior to push-button deployment, so the rsconnect package has a parallel set of "startup" scripts it runs prior to deploying. The following are run in order, if they exist, prior to deployment: * `$R_HOME/etc/rsconnect.site`: Like `Rprofile.site` for site-wide pre-flight and options. This is typically used by system administrators. * `~/.rsconnect_profile`, like `.Rprofile`; this will affect all apps that you deploy. * `.rsconnect_profile`, like `.Rprofile`; this will affect the current app. Unlike `.Rprofile`, if `~/.rsconnect_profile`, is present, it will also be run. ## HTTP Proxy Environment Variable The most straightforward way to specify a proxy is to set the `HTTPS_PROXY` environment variable. For example, you could add the following code to your `.rsconnect_profile`: ```R Sys.setenv(https_proxy = "https://proxy.example.com") ``` Proxy settings can include a host-name, port, and username/password if necessary. The following are all valid values for the `http_proxy` environment variable: * `http://proxy.example.com/` * `http://proxy.example.com:1080/` * `http://username:password@proxy.example.com:1080/` ## Custom headers and cookies If you need to supply additional headers or cookies, you can use the options `rsconnect.http.headers` and `rsconnect.http.cookies` respectively. `rsconnect.http.headers` needs a named vector of header names and values: ```{r} options( rsconnect.http.headers = c( "CustomHeader1" = "CustomValue", "CustomHeader2" = "CustomValue2" ) ) ``` While `rsconnect.http.cookies` expects cookies formatted the same way that a webserver expects them: ```{r} options( rsconnect.http.headers = c("cookie1=value1", "cookie2=value2") ) ``` And you can supply other cookie parameters if needed: ```{r} options( rsconnect.http.headers = "cookie1=value1; Expires=Thu, 31 Oct 2021 07:28:00 GMT; Secure" ) ``` The custom headers are set first, so will be overridden by the headers that rsconnect needs to correctly operate. Similarly, cookies will be set prior to the first request, and will be overriden by anything returned by the server. ## Other custom options Finally, you can supply any additional options supported by `curl::curl_options()` with `rsconnect.libcurl.options`, e.g. ```R options(rsconnect.libcurl.options = list(proxy = "http://proxy.example.com") ``` Run `curl::curl_options()` to see a list of options. rsconnect/inst/doc/custom-http.html0000644000176200001440000003324114536677711017173 0ustar liggesusers Customising HTTP requests

Customising HTTP requests

library(rsconnect)

Depending on the configuration of your environment, you may need to cutomize the way that rsconnect sends http requests. Typically, this is required for some special

.rsconnect_profile

When deploying content from the RStudio IDE, the rsconnect package’s deployment methods are executed in a vanilla R session that doesn’t execute startup scripts. This can make it challenging to ensure options are set properly prior to push-button deployment, so the rsconnect package has a parallel set of “startup” scripts it runs prior to deploying.

The following are run in order, if they exist, prior to deployment:

  • $R_HOME/etc/rsconnect.site: Like Rprofile.site for site-wide pre-flight and options. This is typically used by system administrators.

  • ~/.rsconnect_profile, like .Rprofile; this will affect all apps that you deploy.

  • .rsconnect_profile, like .Rprofile; this will affect the current app. Unlike .Rprofile, if ~/.rsconnect_profile, is present, it will also be run.

HTTP Proxy Environment Variable

The most straightforward way to specify a proxy is to set the HTTPS_PROXY environment variable. For example, you could add the following code to your .rsconnect_profile:

Sys.setenv(https_proxy = "https://proxy.example.com")

Proxy settings can include a host-name, port, and username/password if necessary. The following are all valid values for the http_proxy environment variable:

  • http://proxy.example.com/
  • http://proxy.example.com:1080/
  • http://username:password@proxy.example.com:1080/

Custom headers and cookies

If you need to supply additional headers or cookies, you can use the options rsconnect.http.headers and rsconnect.http.cookies respectively. rsconnect.http.headers needs a named vector of header names and values:

options(
  rsconnect.http.headers = c(
    "CustomHeader1" = "CustomValue", "CustomHeader2" = "CustomValue2"
  )
)

While rsconnect.http.cookies expects cookies formatted the same way that a webserver expects them:

options(
  rsconnect.http.headers = c("cookie1=value1", "cookie2=value2")
)

And you can supply other cookie parameters if needed:

options(
  rsconnect.http.headers = "cookie1=value1; Expires=Thu, 31 Oct 2021 07:28:00 GMT; Secure"
)

The custom headers are set first, so will be overridden by the headers that rsconnect needs to correctly operate. Similarly, cookies will be set prior to the first request, and will be overriden by anything returned by the server.

Other custom options

Finally, you can supply any additional options supported by curl::curl_options() with rsconnect.libcurl.options, e.g.

options(rsconnect.libcurl.options = list(proxy = "http://proxy.example.com")

Run curl::curl_options() to see a list of options.

rsconnect/inst/resources/0000755000176200001440000000000014435652570015252 5ustar liggesusersrsconnect/inst/resources/environment.py0000644000176200001440000002166314435652570020200 0ustar liggesusers#!/usr/bin/env python """ Environment data class abstraction that is usable as an executable module ```bash python -m rsconnect.environment ``` """ import collections import datetime import json import locale import os import re import subprocess import sys try: import typing from typing import Optional except ImportError: typing = None version_re = re.compile(r"\d+\.\d+(\.\d+)?") conda_version_re = re.compile(r"^(?:\s*-\s*)?python=(\d+\.\d+(?:\.\d+)?)", re.MULTILINE) exec_dir = os.path.dirname(sys.executable) Environment = collections.namedtuple( "Environment", ("conda", "contents", "error", "filename", "locale", "package_manager", "pip", "python", "source",), ) def MakeEnvironment( conda=None, # type: Optional[str] contents="", # type: Optional[str] error=None, # type: Optional[str] filename="", # type: Optional[str] locale="", # type: Optional[str] package_manager="", # type: Optional[str] pip=None, # type: Optional[str] python=None, # type: Optional[str] source=None, # type: Optional[str] ): return Environment(conda, contents, error, filename, locale, package_manager, pip, python, source) class EnvironmentException(Exception): pass def detect_environment(dirname, force_generate=False, conda_mode=False, conda=None): # type: (str, bool, bool, typing.Optional[str]) -> Environment """Determine the python dependencies in the environment. `pip freeze` will be used to introspect the environment unless `conda_mode` is set to `True`. In that case, an attempt will be made to use Conda to introspect the environment. :param: dirname Directory name :param: force_generate Force the generation of an environment :param: conda_mode inspect the environment assuming Conda :return: a dictionary containing the package spec filename and contents if successful, or a dictionary containing `error` on failure. """ conda = get_conda(conda) if conda_mode and conda: if force_generate: result = conda_env_export(conda) else: result = output_file(dirname, "environment.yml", "conda") or conda_env_export(conda) else: if force_generate: result = pip_freeze() else: result = output_file(dirname, "requirements.txt", "pip") or pip_freeze() if result is not None: if conda_mode and result["package_manager"] != "conda": return MakeEnvironment( error=( 'Conda was requested but no activated Conda environment was found. See "conda activate ' '--help" for more information.' ) ) result["python"] = get_python_version(MakeEnvironment(**result)) result["pip"] = get_version("pip") if conda: result["conda"] = get_conda_version(conda) result["locale"] = get_default_locale() return MakeEnvironment(**result) def get_conda(conda=None): """get_conda tries to find the conda executable if we're in a conda environment. If not, or if we cannot find the executable, return None. :returns: conda string path to conda or None. """ if os.environ.get("CONDA_PREFIX", None) is None and conda is None: return None else: return conda or os.environ.get("CONDA_EXE", None) def get_python_version(environment): # type: (Environment) -> str if environment.package_manager == "conda": versions = conda_version_re.findall(environment.contents) if len(versions) > 0: version = versions[0] if version.count(".") == 1: version = version + ".0" return version v = sys.version_info return "%d.%d.%d" % (v[0], v[1], v[2]) def get_conda_version(conda): try: args = [conda, "-V"] proc = subprocess.Popen(args, stdout=subprocess.PIPE, stderr=subprocess.PIPE, universal_newlines=True,) stdout, stderr = proc.communicate() match = version_re.search(stdout or stderr) if match: return match.group() msg = "Failed to get version of conda from the output of: %s - standard output: %s; standard error: %s" % ( " ".join(args), stdout, stderr, ) raise EnvironmentException(msg) except Exception as exception: raise EnvironmentException("Error getting conda version: %s" % str(exception)) def get_default_locale(locale_source=locale.getdefaultlocale): result = ".".join([item or "" for item in locale_source()]) return "" if result == "." else result def get_version(module): try: args = [sys.executable, "-m", module, "--version"] proc = subprocess.Popen(args, stdout=subprocess.PIPE, stderr=subprocess.PIPE, universal_newlines=True,) stdout, stderr = proc.communicate() match = version_re.search(stdout) if match: return match.group() msg = "Failed to get version of '%s' from the output of: %s" % (module, " ".join(args),) raise EnvironmentException(msg) except Exception as exception: raise EnvironmentException("Error getting '%s' version: %s" % (module, str(exception))) def output_file(dirname, filename, package_manager): """Read an existing package spec file. Returns a dictionary containing the filename and contents if successful, None if the file does not exist, or a dictionary containing 'error' on failure. """ try: path = os.path.join(dirname, filename) if not os.path.exists(path): return None with open(path, "r") as f: data = f.read() data = "\n".join([line for line in data.split("\n") if "rsconnect" not in line]) return { "filename": filename, "contents": data, "source": "file", "package_manager": package_manager, } except Exception as exception: raise EnvironmentException("Error reading %s: %s" % (filename, str(exception))) def pip_freeze(): """Inspect the environment using `pip freeze`. Returns a dictionary containing the filename (always 'requirements.txt') and contents if successful, or a dictionary containing 'error' on failure. """ try: proc = subprocess.Popen( [sys.executable, "-m", "pip", "list", "--format=freeze"], stdout=subprocess.PIPE, stderr=subprocess.PIPE, universal_newlines=True, ) pip_stdout, pip_stderr = proc.communicate() pip_status = proc.returncode except Exception as exception: raise EnvironmentException("Error during pip freeze: %s" % str(exception)) if pip_status != 0: msg = pip_stderr or ("exited with code %d" % pip_status) raise EnvironmentException("Error during pip freeze: %s" % msg) pip_stdout = "\n".join([line for line in pip_stdout.split("\n") if "rsconnect" not in line]) pip_stdout = ( "# requirements.txt generated by rsconnect-python on " + str(datetime.datetime.utcnow()) + "\n" + pip_stdout ) return { "filename": "requirements.txt", "contents": pip_stdout, "source": "pip_freeze", "package_manager": "pip", } def conda_env_export(conda): """Inspect the environment using `conda env export` :param: conda path to the `conda` tool :return: dictionary containing the key "environment.yml" and the data inside """ try: proc = subprocess.Popen( [conda, "env", "export"], stdout=subprocess.PIPE, stderr=subprocess.PIPE, universal_newlines=True, ) conda_stdout, conda_stderr = proc.communicate() conda_status = proc.returncode except Exception as exception: raise EnvironmentException("Error during conda env export: %s" % str(exception)) if conda_status != 0: msg = conda_stderr or ("exited with code %d" % conda_status) raise EnvironmentException("Error during conda env export: %s" % msg) return { "filename": "environment.yml", "contents": conda_stdout, "source": "conda_env_export", "package_manager": "conda", } def main(): """ Run `detect_environment` and dump the result as JSON. """ try: if len(sys.argv) < 2: raise EnvironmentException("Usage: %s [-fc] DIRECTORY" % sys.argv[0]) # directory is always the last argument directory = sys.argv[len(sys.argv) - 1] flags = "" force_generate = False conda_mode = False if len(sys.argv) > 2: flags = sys.argv[1] if "f" in flags: force_generate = True if "c" in flags: conda_mode = True json.dump( detect_environment(directory, force_generate, conda_mode)._asdict(), sys.stdout, indent=4, ) except EnvironmentException as exception: json.dump(dict(error=str(exception)), sys.stdout, indent=4) if __name__ == "__main__": main() rsconnect/inst/cert/0000755000176200001440000000000014435652570014175 5ustar liggesusersrsconnect/inst/cert/cacert.pem0000644000176200001440000071503514435652570016154 0ustar liggesusers## ## Bundle of CA Root Certificates ## ## Certificate data from Mozilla as of: Wed Sep 20 03:12:05 2017 GMT ## ## This is a bundle of X.509 certificates of public Certificate Authorities ## (CA). These were automatically extracted from Mozilla's root certificates ## file (certdata.txt). This file can be found in the mozilla source tree: ## https://hg.mozilla.org/releases/mozilla-release/raw-file/default/security/nss/lib/ckfw/builtins/certdata.txt ## ## It contains the certificates in PEM format and therefore ## can be directly used with curl / libcurl / php_curl, or with ## an Apache+mod_ssl webserver for SSL client authentication. ## Just configure this file as the SSLCACertificateFile. ## ## Conversion done with mk-ca-bundle.pl version 1.27. ## SHA256: 2b2dbe5244e0047e088c597998883a913f6c5fffd1cb5c0fe5a368c8466cb2ec ## GlobalSign Root CA ================== -----BEGIN CERTIFICATE----- MIIDdTCCAl2gAwIBAgILBAAAAAABFUtaw5QwDQYJKoZIhvcNAQEFBQAwVzELMAkGA1UEBhMCQkUx GTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExEDAOBgNVBAsTB1Jvb3QgQ0ExGzAZBgNVBAMTEkds b2JhbFNpZ24gUm9vdCBDQTAeFw05ODA5MDExMjAwMDBaFw0yODAxMjgxMjAwMDBaMFcxCzAJBgNV BAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYD VQQDExJHbG9iYWxTaWduIFJvb3QgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDa DuaZjc6j40+Kfvvxi4Mla+pIH/EqsLmVEQS98GPR4mdmzxzdzxtIK+6NiY6arymAZavpxy0Sy6sc THAHoT0KMM0VjU/43dSMUBUc71DuxC73/OlS8pF94G3VNTCOXkNz8kHp1Wrjsok6Vjk4bwY8iGlb Kk3Fp1S4bInMm/k8yuX9ifUSPJJ4ltbcdG6TRGHRjcdGsnUOhugZitVtbNV4FpWi6cgKOOvyJBNP c1STE4U6G7weNLWLBYy5d4ux2x8gkasJU26Qzns3dLlwR5EiUWMWea6xrkEmCMgZK9FGqkjWZCrX gzT/LCrBbBlDSgeF59N89iFo7+ryUp9/k5DPAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNV HRMBAf8EBTADAQH/MB0GA1UdDgQWBBRge2YaRQ2XyolQL30EzTSo//z9SzANBgkqhkiG9w0BAQUF AAOCAQEA1nPnfE920I2/7LqivjTFKDK1fPxsnCwrvQmeU79rXqoRSLblCKOzyj1hTdNGCbM+w6Dj Y1Ub8rrvrTnhQ7k4o+YviiY776BQVvnGCv04zcQLcFGUl5gE38NflNUVyRRBnMRddWQVDf9VMOyG j/8N7yy5Y0b2qvzfvGn9LhJIZJrglfCm7ymPAbEVtQwdpf5pLGkkeB6zpxxxYu7KyJesF12KwvhH hm4qxFYxldBniYUr+WymXUadDKqC5JlR3XC321Y9YeRq4VzW9v493kHMB65jUr9TU/Qr6cf9tveC X4XSQRjbgbMEHMUfpIBvFSDJ3gyICh3WZlXi/EjJKSZp4A== -----END CERTIFICATE----- GlobalSign Root CA - R2 ======================= -----BEGIN CERTIFICATE----- MIIDujCCAqKgAwIBAgILBAAAAAABD4Ym5g0wDQYJKoZIhvcNAQEFBQAwTDEgMB4GA1UECxMXR2xv YmFsU2lnbiBSb290IENBIC0gUjIxEzARBgNVBAoTCkdsb2JhbFNpZ24xEzARBgNVBAMTCkdsb2Jh bFNpZ24wHhcNMDYxMjE1MDgwMDAwWhcNMjExMjE1MDgwMDAwWjBMMSAwHgYDVQQLExdHbG9iYWxT aWduIFJvb3QgQ0EgLSBSMjETMBEGA1UEChMKR2xvYmFsU2lnbjETMBEGA1UEAxMKR2xvYmFsU2ln bjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKbPJA6+Lm8omUVCxKs+IVSbC9N/hHD6 ErPLv4dfxn+G07IwXNb9rfF73OX4YJYJkhD10FPe+3t+c4isUoh7SqbKSaZeqKeMWhG8eoLrvozp s6yWJQeXSpkqBy+0Hne/ig+1AnwblrjFuTosvNYSuetZfeLQBoZfXklqtTleiDTsvHgMCJiEbKjN S7SgfQx5TfC4LcshytVsW33hoCmEofnTlEnLJGKRILzdC9XZzPnqJworc5HGnRusyMvo4KD0L5CL TfuwNhv2GXqF4G3yYROIXJ/gkwpRl4pazq+r1feqCapgvdzZX99yqWATXgAByUr6P6TqBwMhAo6C ygPCm48CAwEAAaOBnDCBmTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4E FgQUm+IHV2ccHsBqBt5ZtJot39wZhi4wNgYDVR0fBC8wLTAroCmgJ4YlaHR0cDovL2NybC5nbG9i YWxzaWduLm5ldC9yb290LXIyLmNybDAfBgNVHSMEGDAWgBSb4gdXZxwewGoG3lm0mi3f3BmGLjAN BgkqhkiG9w0BAQUFAAOCAQEAmYFThxxol4aR7OBKuEQLq4GsJ0/WwbgcQ3izDJr86iw8bmEbTUsp 9Z8FHSbBuOmDAGJFtqkIk7mpM0sYmsL4h4hO291xNBrBVNpGP+DTKqttVCL1OmLNIG+6KYnX3ZHu 01yiPqFbQfXf5WRDLenVOavSot+3i9DAgBkcRcAtjOj4LaR0VknFBbVPFd5uRHg5h6h+u/N5GJG7 9G+dwfCMNYxdAfvDbbnvRG15RjF+Cv6pgsH/76tuIMRQyV+dTZsXjAzlAcmgQWpzU/qlULRuJQ/7 TBj0/VLZjmmx6BEP3ojY+x1J96relc8geMJgEtslQIxq/H5COEBkEveegeGTLg== -----END CERTIFICATE----- Verisign Class 3 Public Primary Certification Authority - G3 ============================================================ -----BEGIN CERTIFICATE----- MIIEGjCCAwICEQCbfgZJoz5iudXukEhxKe9XMA0GCSqGSIb3DQEBBQUAMIHKMQswCQYDVQQGEwJV UzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdv cmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNl IG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNh dGlvbiBBdXRob3JpdHkgLSBHMzAeFw05OTEwMDEwMDAwMDBaFw0zNjA3MTYyMzU5NTlaMIHKMQsw CQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRy dXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhv cml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkg Q2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMzCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC ggEBAMu6nFL8eB8aHm8bN3O9+MlrlBIwT/A2R/XQkQr1F8ilYcEWQE37imGQ5XYgwREGfassbqb1 EUGO+i2tKmFZpGcmTNDovFJbcCAEWNF6yaRpvIMXZK0Fi7zQWM6NjPXr8EJJC52XJ2cybuGukxUc cLwgTS8Y3pKI6GyFVxEa6X7jJhFUokWWVYPKMIno3Nij7SqAP395ZVc+FSBmCC+Vk7+qRy+oRpfw EuL+wgorUeZ25rdGt+INpsyow0xZVYnm6FNcHOqd8GIWC6fJXwzw3sJ2zq/3avL6QaaiMxTJ5Xpj 055iN9WFZZ4O5lMkdBteHRJTW8cs54NJOxWuimi5V5cCAwEAATANBgkqhkiG9w0BAQUFAAOCAQEA ERSWwauSCPc/L8my/uRan2Te2yFPhpk0djZX3dAVL8WtfxUfN2JzPtTnX84XA9s1+ivbrmAJXx5f j267Cz3qWhMeDGBvtcC1IyIuBwvLqXTLR7sdwdela8wv0kL9Sd2nic9TutoAWii/gt/4uhMdUIaC /Y4wjylGsB49Ndo4YhYYSq3mtlFs3q9i6wHQHiT+eo8SGhJouPtmmRQURVyu565pF4ErWjfJXir0 xuKhXFSbplQAz/DxwceYMBo7Nhbbo27q/a2ywtrvAkcTisDxszGtTxzhT5yvDwyd93gN2PQ1VoDa t20Xj50egWTh/sVFuq1ruQp6Tk9LhO5L8X3dEQ== -----END CERTIFICATE----- Entrust.net Premium 2048 Secure Server CA ========================================= -----BEGIN CERTIFICATE----- MIIEKjCCAxKgAwIBAgIEOGPe+DANBgkqhkiG9w0BAQUFADCBtDEUMBIGA1UEChMLRW50cnVzdC5u ZXQxQDA+BgNVBAsUN3d3dy5lbnRydXN0Lm5ldC9DUFNfMjA0OCBpbmNvcnAuIGJ5IHJlZi4gKGxp bWl0cyBsaWFiLikxJTAjBgNVBAsTHChjKSAxOTk5IEVudHJ1c3QubmV0IExpbWl0ZWQxMzAxBgNV BAMTKkVudHJ1c3QubmV0IENlcnRpZmljYXRpb24gQXV0aG9yaXR5ICgyMDQ4KTAeFw05OTEyMjQx NzUwNTFaFw0yOTA3MjQxNDE1MTJaMIG0MRQwEgYDVQQKEwtFbnRydXN0Lm5ldDFAMD4GA1UECxQ3 d3d3LmVudHJ1c3QubmV0L0NQU18yMDQ4IGluY29ycC4gYnkgcmVmLiAobGltaXRzIGxpYWIuKTEl MCMGA1UECxMcKGMpIDE5OTkgRW50cnVzdC5uZXQgTGltaXRlZDEzMDEGA1UEAxMqRW50cnVzdC5u ZXQgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgKDIwNDgpMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A MIIBCgKCAQEArU1LqRKGsuqjIAcVFmQqK0vRvwtKTY7tgHalZ7d4QMBzQshowNtTK91euHaYNZOL Gp18EzoOH1u3Hs/lJBQesYGpjX24zGtLA/ECDNyrpUAkAH90lKGdCCmziAv1h3edVc3kw37XamSr hRSGlVuXMlBvPci6Zgzj/L24ScF2iUkZ/cCovYmjZy/Gn7xxGWC4LeksyZB2ZnuU4q941mVTXTzW nLLPKQP5L6RQstRIzgUyVYr9smRMDuSYB3Xbf9+5CFVghTAp+XtIpGmG4zU/HoZdenoVve8AjhUi VBcAkCaTvA5JaJG/+EfTnZVCwQ5N328mz8MYIWJmQ3DW1cAH4QIDAQABo0IwQDAOBgNVHQ8BAf8E BAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUVeSB0RGAvtiJuQijMfmhJAkWuXAwDQYJ KoZIhvcNAQEFBQADggEBADubj1abMOdTmXx6eadNl9cZlZD7Bh/KM3xGY4+WZiT6QBshJ8rmcnPy T/4xmf3IDExoU8aAghOY+rat2l098c5u9hURlIIM7j+VrxGrD9cv3h8Dj1csHsm7mhpElesYT6Yf zX1XEC+bBAlahLVu2B064dae0Wx5XnkcFMXj0EyTO2U87d89vqbllRrDtRnDvV5bu/8j72gZyxKT J1wDLW8w0B62GqzeWvfRqqgnpv55gcR5mTNXuhKwqeBCbJPKVt7+bYQLCIt+jerXmCHG8+c8eS9e nNFMFY3h7CI3zJpDC5fcgJCNs2ebb0gIFVbPv/ErfF6adulZkMV8gzURZVE= -----END CERTIFICATE----- Baltimore CyberTrust Root ========================= -----BEGIN CERTIFICATE----- MIIDdzCCAl+gAwIBAgIEAgAAuTANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJJRTESMBAGA1UE ChMJQmFsdGltb3JlMRMwEQYDVQQLEwpDeWJlclRydXN0MSIwIAYDVQQDExlCYWx0aW1vcmUgQ3li ZXJUcnVzdCBSb290MB4XDTAwMDUxMjE4NDYwMFoXDTI1MDUxMjIzNTkwMFowWjELMAkGA1UEBhMC SUUxEjAQBgNVBAoTCUJhbHRpbW9yZTETMBEGA1UECxMKQ3liZXJUcnVzdDEiMCAGA1UEAxMZQmFs dGltb3JlIEN5YmVyVHJ1c3QgUm9vdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKME uyKrmD1X6CZymrV51Cni4eiVgLGw41uOKymaZN+hXe2wCQVt2yguzmKiYv60iNoS6zjrIZ3AQSsB UnuId9Mcj8e6uYi1agnnc+gRQKfRzMpijS3ljwumUNKoUMMo6vWrJYeKmpYcqWe4PwzV9/lSEy/C G9VwcPCPwBLKBsua4dnKM3p31vjsufFoREJIE9LAwqSuXmD+tqYF/LTdB1kC1FkYmGP1pWPgkAx9 XbIGevOF6uvUA65ehD5f/xXtabz5OTZydc93Uk3zyZAsuT3lySNTPx8kmCFcB5kpvcY67Oduhjpr l3RjM71oGDHweI12v/yejl0qhqdNkNwnGjkCAwEAAaNFMEMwHQYDVR0OBBYEFOWdWTCCR1jMrPoI VDaGezq1BE3wMBIGA1UdEwEB/wQIMAYBAf8CAQMwDgYDVR0PAQH/BAQDAgEGMA0GCSqGSIb3DQEB BQUAA4IBAQCFDF2O5G9RaEIFoN27TyclhAO992T9Ldcw46QQF+vaKSm2eT929hkTI7gQCvlYpNRh cL0EYWoSihfVCr3FvDB81ukMJY2GQE/szKN+OMY3EU/t3WgxjkzSswF07r51XgdIGn9w/xZchMB5 hbgF/X++ZRGjD8ACtPhSNzkE1akxehi/oCr0Epn3o0WC4zxe9Z2etciefC7IpJ5OCBRLbf1wbWsa Y71k5h+3zvDyny67G7fyUIhzksLi4xaNmjICq44Y3ekQEe5+NauQrz4wlHrQMz2nZQ/1/I6eYs9H RCwBXbsdtTLSR9I4LtD+gdwyah617jzV/OeBHRnDJELqYzmp -----END CERTIFICATE----- AddTrust External Root ====================== -----BEGIN CERTIFICATE----- MIIENjCCAx6gAwIBAgIBATANBgkqhkiG9w0BAQUFADBvMQswCQYDVQQGEwJTRTEUMBIGA1UEChML QWRkVHJ1c3QgQUIxJjAkBgNVBAsTHUFkZFRydXN0IEV4dGVybmFsIFRUUCBOZXR3b3JrMSIwIAYD VQQDExlBZGRUcnVzdCBFeHRlcm5hbCBDQSBSb290MB4XDTAwMDUzMDEwNDgzOFoXDTIwMDUzMDEw NDgzOFowbzELMAkGA1UEBhMCU0UxFDASBgNVBAoTC0FkZFRydXN0IEFCMSYwJAYDVQQLEx1BZGRU cnVzdCBFeHRlcm5hbCBUVFAgTmV0d29yazEiMCAGA1UEAxMZQWRkVHJ1c3QgRXh0ZXJuYWwgQ0Eg Um9vdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALf3GjPm8gAELTngTlvtH7xsD821 +iO2zt6bETOXpClMfZOfvUq8k+0DGuOPz+VtUFrWlymUWoCwSXrbLpX9uMq/NzgtHj6RQa1wVsfw Tz/oMp50ysiQVOnGXw94nZpAPA6sYapeFI+eh6FqUNzXmk6vBbOmcZSccbNQYArHE504B4YCqOmo aSYYkKtMsE8jqzpPhNjfzp/haW+710LXa0Tkx63ubUFfclpxCDezeWWkWaCUN/cALw3CknLa0Dhy 2xSoRcRdKn23tNbE7qzNE0S3ySvdQwAl+mG5aWpYIxG3pzOPVnVZ9c0p10a3CitlttNCbxWyuHv7 7+ldU9U0WicCAwEAAaOB3DCB2TAdBgNVHQ4EFgQUrb2YejS0Jvf6xCZU7wO94CTLVBowCwYDVR0P BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wgZkGA1UdIwSBkTCBjoAUrb2YejS0Jvf6xCZU7wO94CTL VBqhc6RxMG8xCzAJBgNVBAYTAlNFMRQwEgYDVQQKEwtBZGRUcnVzdCBBQjEmMCQGA1UECxMdQWRk VHJ1c3QgRXh0ZXJuYWwgVFRQIE5ldHdvcmsxIjAgBgNVBAMTGUFkZFRydXN0IEV4dGVybmFsIENB IFJvb3SCAQEwDQYJKoZIhvcNAQEFBQADggEBALCb4IUlwtYj4g+WBpKdQZic2YR5gdkeWxQHIzZl j7DYd7usQWxHYINRsPkyPef89iYTx4AWpb9a/IfPeHmJIZriTAcKhjW88t5RxNKWt9x+Tu5w/Rw5 6wwCURQtjr0W4MHfRnXnJK3s9EK0hZNwEGe6nQY1ShjTK3rMUUKhemPR5ruhxSvCNr4TDea9Y355 e6cJDUCrat2PisP29owaQgVR1EX1n6diIWgVIEM8med8vSTYqZEXc4g/VhsxOBi0cQ+azcgOno4u G+GMmIPLHzHxREzGBHNJdmAPx/i9F4BrLunMTA5amnkPIAou1Z5jJh5VkpTYghdae9C8x49OhgQ= -----END CERTIFICATE----- Entrust Root Certification Authority ==================================== -----BEGIN CERTIFICATE----- MIIEkTCCA3mgAwIBAgIERWtQVDANBgkqhkiG9w0BAQUFADCBsDELMAkGA1UEBhMCVVMxFjAUBgNV BAoTDUVudHJ1c3QsIEluYy4xOTA3BgNVBAsTMHd3dy5lbnRydXN0Lm5ldC9DUFMgaXMgaW5jb3Jw b3JhdGVkIGJ5IHJlZmVyZW5jZTEfMB0GA1UECxMWKGMpIDIwMDYgRW50cnVzdCwgSW5jLjEtMCsG A1UEAxMkRW50cnVzdCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MB4XDTA2MTEyNzIwMjM0 MloXDTI2MTEyNzIwNTM0MlowgbAxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMu MTkwNwYDVQQLEzB3d3cuZW50cnVzdC5uZXQvQ1BTIGlzIGluY29ycG9yYXRlZCBieSByZWZlcmVu Y2UxHzAdBgNVBAsTFihjKSAyMDA2IEVudHJ1c3QsIEluYy4xLTArBgNVBAMTJEVudHJ1c3QgUm9v dCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB ALaVtkNC+sZtKm9I35RMOVcF7sN5EUFoNu3s/poBj6E4KPz3EEZmLk0eGrEaTsbRwJWIsMn/MYsz A9u3g3s+IIRe7bJWKKf44LlAcTfFy0cOlypowCKVYhXbR9n10Cv/gkvJrT7eTNuQgFA/CYqEAOww Cj0Yzfv9KlmaI5UXLEWeH25DeW0MXJj+SKfFI0dcXv1u5x609mhF0YaDW6KKjbHjKYD+JXGIrb68 j6xSlkuqUY3kEzEZ6E5Nn9uss2rVvDlUccp6en+Q3X0dgNmBu1kmwhH+5pPi94DkZfs0Nw4pgHBN rziGLp5/V6+eF67rHMsoIV+2HNjnogQi+dPa2MsCAwEAAaOBsDCBrTAOBgNVHQ8BAf8EBAMCAQYw DwYDVR0TAQH/BAUwAwEB/zArBgNVHRAEJDAigA8yMDA2MTEyNzIwMjM0MlqBDzIwMjYxMTI3MjA1 MzQyWjAfBgNVHSMEGDAWgBRokORnpKZTgMeGZqTx90tD+4S9bTAdBgNVHQ4EFgQUaJDkZ6SmU4DH hmak8fdLQ/uEvW0wHQYJKoZIhvZ9B0EABBAwDhsIVjcuMTo0LjADAgSQMA0GCSqGSIb3DQEBBQUA A4IBAQCT1DCw1wMgKtD5Y+iRDAUgqV8ZyntyTtSx29CW+1RaGSwMCPeyvIWonX9tO1KzKtvn1ISM Y/YPyyYBkVBs9F8U4pN0wBOeMDpQ47RgxRzwIkSNcUesyBrJ6ZuaAGAT/3B+XxFNSRuzFVJ7yVTa v52Vr2ua2J7p8eRDjeIRRDq/r72DQnNSi6q7pynP9WQcCk3RvKqsnyrQ/39/2n3qse0wJcGE2jTS W3iDVuycNsMm4hH2Z0kdkquM++v/eu6FSqdQgPCnXEqULl8FmTxSQeDNtGPPAUO6nIPcj2A781q0 tHuu2guQOHXvgR1m0vdXcDazv/wor3ElhVsT/h5/WrQ8 -----END CERTIFICATE----- GeoTrust Global CA ================== -----BEGIN CERTIFICATE----- MIIDVDCCAjygAwIBAgIDAjRWMA0GCSqGSIb3DQEBBQUAMEIxCzAJBgNVBAYTAlVTMRYwFAYDVQQK Ew1HZW9UcnVzdCBJbmMuMRswGQYDVQQDExJHZW9UcnVzdCBHbG9iYWwgQ0EwHhcNMDIwNTIxMDQw MDAwWhcNMjIwNTIxMDQwMDAwWjBCMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNR2VvVHJ1c3QgSW5j LjEbMBkGA1UEAxMSR2VvVHJ1c3QgR2xvYmFsIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB CgKCAQEA2swYYzD99BcjGlZ+W988bDjkcbd4kdS8odhM+KhDtgPpTSEHCIjaWC9mOSm9BXiLnTjo BbdqfnGk5sRgprDvgOSJKA+eJdbtg/OtppHHmMlCGDUUna2YRpIuT8rxh0PBFpVXLVDviS2Aelet 8u5fa9IAjbkU+BQVNdnARqN7csiRv8lVK83Qlz6cJmTM386DGXHKTubU1XupGc1V3sjs0l44U+Vc T4wt/lAjNvxm5suOpDkZALeVAjmRCw7+OC7RHQWa9k0+bw8HHa8sHo9gOeL6NlMTOdReJivbPagU vTLrGAMoUgRx5aszPeE4uwc2hGKceeoWMPRfwCvocWvk+QIDAQABo1MwUTAPBgNVHRMBAf8EBTAD AQH/MB0GA1UdDgQWBBTAephojYn7qwVkDBF9qn1luMrMTjAfBgNVHSMEGDAWgBTAephojYn7qwVk DBF9qn1luMrMTjANBgkqhkiG9w0BAQUFAAOCAQEANeMpauUvXVSOKVCUn5kaFOSPeCpilKInZ57Q zxpeR+nBsqTP3UEaBU6bS+5Kb1VSsyShNwrrZHYqLizz/Tt1kL/6cdjHPTfStQWVYrmm3ok9Nns4 d0iXrKYgjy6myQzCsplFAMfOEVEiIuCl6rYVSAlk6l5PdPcFPseKUgzbFbS9bZvlxrFUaKnjaZC2 mqUPuLk/IH2uSrW4nOQdtqvmlKXBx4Ot2/Unhw4EbNX/3aBd7YdStysVAq45pmp06drE57xNNB6p XE0zX5IJL4hmXXeXxx12E6nV5fEWCRE11azbJHFwLJhWC9kXtNHjUStedejV0NxPNO3CBWaAocvm Mw== -----END CERTIFICATE----- GeoTrust Universal CA ===================== -----BEGIN CERTIFICATE----- MIIFaDCCA1CgAwIBAgIBATANBgkqhkiG9w0BAQUFADBFMQswCQYDVQQGEwJVUzEWMBQGA1UEChMN R2VvVHJ1c3QgSW5jLjEeMBwGA1UEAxMVR2VvVHJ1c3QgVW5pdmVyc2FsIENBMB4XDTA0MDMwNDA1 MDAwMFoXDTI5MDMwNDA1MDAwMFowRTELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUdlb1RydXN0IElu Yy4xHjAcBgNVBAMTFUdlb1RydXN0IFVuaXZlcnNhbCBDQTCCAiIwDQYJKoZIhvcNAQEBBQADggIP ADCCAgoCggIBAKYVVaCjxuAfjJ0hUNfBvitbtaSeodlyWL0AG0y/YckUHUWCq8YdgNY96xCcOq9t JPi8cQGeBvV8Xx7BDlXKg5pZMK4ZyzBIle0iN430SppyZj6tlcDgFgDgEB8rMQ7XlFTTQjOgNB0e RXbdT8oYN+yFFXoZCPzVx5zw8qkuEKmS5j1YPakWaDwvdSEYfyh3peFhF7em6fgemdtzbvQKoiFs 7tqqhZJmr/Z6a4LauiIINQ/PQvE1+mrufislzDoR5G2vc7J2Ha3QsnhnGqQ5HFELZ1aD/ThdDc7d 8Lsrlh/eezJS/R27tQahsiFepdaVaH/wmZ7cRQg+59IJDTWU3YBOU5fXtQlEIGQWFwMCTFMNaN7V qnJNk22CDtucvc+081xdVHppCZbW2xHBjXWotM85yM48vCR85mLK4b19p71XZQvk/iXttmkQ3Cga Rr0BHdCXteGYO8A3ZNY9lO4L4fUorgtWv3GLIylBjobFS1J72HGrH4oVpjuDWtdYAVHGTEHZf9hB Z3KiKN9gg6meyHv8U3NyWfWTehd2Ds735VzZC1U0oqpbtWpU5xPKV+yXbfReBi9Fi1jUIxaS5BZu KGNZMN9QAZxjiRqf2xeUgnA3wySemkfWWspOqGmJch+RbNt+nhutxx9z3SxPGWX9f5NAEC7S8O08 ni4oPmkmM8V7AgMBAAGjYzBhMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFNq7LqqwDLiIJlF0 XG0D08DYj3rWMB8GA1UdIwQYMBaAFNq7LqqwDLiIJlF0XG0D08DYj3rWMA4GA1UdDwEB/wQEAwIB hjANBgkqhkiG9w0BAQUFAAOCAgEAMXjmx7XfuJRAyXHEqDXsRh3ChfMoWIawC/yOsjmPRFWrZIRc aanQmjg8+uUfNeVE44B5lGiku8SfPeE0zTBGi1QrlaXv9z+ZhP015s8xxtxqv6fXIwjhmF7DWgh2 qaavdy+3YL1ERmrvl/9zlcGO6JP7/TG37FcREUWbMPEaiDnBTzynANXH/KttgCJwpQzgXQQpAvvL oJHRfNbDflDVnVi+QTjruXU8FdmbyUqDWcDaU/0zuzYYm4UPFd3uLax2k7nZAY1IEKj79TiG8dsK xr2EoyNB3tZ3b4XUhRxQ4K5RirqNPnbiucon8l+f725ZDQbYKxek0nxru18UGkiPGkzns0ccjkxF KyDuSN/n3QmOGKjaQI2SJhFTYXNd673nxE0pN2HrrDktZy4W1vUAg4WhzH92xH3kt0tm7wNFYGm2 DFKWkoRepqO1pD4r2czYG0eq8kTaT/kD6PAUyz/zg97QwVTjt+gKN02LIFkDMBmhLMi9ER/frslK xfMnZmaGrGiR/9nmUxwPi1xpZQomyB40w11Re9epnAahNt3ViZS82eQtDF4JbAiXfKM9fJP/P6EU p8+1Xevb2xzEdt+Iub1FBZUbrvxGakyvSOPOrg/SfuvmbJxPgWp6ZKy7PtXny3YuxadIwVyQD8vI P/rmMuGNG2+k5o7Y+SlIis5z/iw= -----END CERTIFICATE----- GeoTrust Universal CA 2 ======================= -----BEGIN CERTIFICATE----- MIIFbDCCA1SgAwIBAgIBATANBgkqhkiG9w0BAQUFADBHMQswCQYDVQQGEwJVUzEWMBQGA1UEChMN R2VvVHJ1c3QgSW5jLjEgMB4GA1UEAxMXR2VvVHJ1c3QgVW5pdmVyc2FsIENBIDIwHhcNMDQwMzA0 MDUwMDAwWhcNMjkwMzA0MDUwMDAwWjBHMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNR2VvVHJ1c3Qg SW5jLjEgMB4GA1UEAxMXR2VvVHJ1c3QgVW5pdmVyc2FsIENBIDIwggIiMA0GCSqGSIb3DQEBAQUA A4ICDwAwggIKAoICAQCzVFLByT7y2dyxUxpZKeexw0Uo5dfR7cXFS6GqdHtXr0om/Nj1XqduGdt0 DE81WzILAePb63p3NeqqWuDW6KFXlPCQo3RWlEQwAx5cTiuFJnSCegx2oG9NzkEtoBUGFF+3Qs17 j1hhNNwqCPkuwwGmIkQcTAeC5lvO0Ep8BNMZcyfwqph/Lq9O64ceJHdqXbboW0W63MOhBW9Wjo8Q JqVJwy7XQYci4E+GymC16qFjwAGXEHm9ADwSbSsVsaxLse4YuU6W3Nx2/zu+z18DwPw76L5GG//a QMJS9/7jOvdqdzXQ2o3rXhhqMcceujwbKNZrVMaqW9eiLBsZzKIC9ptZvTdrhrVtgrrY6slWvKk2 WP0+GfPtDCapkzj4T8FdIgbQl+rhrcZV4IErKIM6+vR7IVEAvlI4zs1meaj0gVbi0IMJR1FbUGrP 20gaXT73y/Zl92zxlfgCOzJWgjl6W70viRu/obTo/3+NjN8D8WBOWBFM66M/ECuDmgFz2ZRthAAn ZqzwcEAJQpKtT5MNYQlRJNiS1QuUYbKHsu3/mjX/hVTK7URDrBs8FmtISgocQIgfksILAAX/8sgC SqSqqcyZlpwvWOB94b67B9xfBHJcMTTD7F8t4D1kkCLm0ey4Lt1ZrtmhN79UNdxzMk+MBB4zsslG 8dhcyFVQyWi9qLo2CQIDAQABo2MwYTAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBR281Xh+qQ2 +/CfXGJx7Tz0RzgQKzAfBgNVHSMEGDAWgBR281Xh+qQ2+/CfXGJx7Tz0RzgQKzAOBgNVHQ8BAf8E BAMCAYYwDQYJKoZIhvcNAQEFBQADggIBAGbBxiPz2eAubl/oz66wsCVNK/g7WJtAJDday6sWSf+z dXkzoS9tcBc0kf5nfo/sm+VegqlVHy/c1FEHEv6sFj4sNcZj/NwQ6w2jqtB8zNHQL1EuxBRa3ugZ 4T7GzKQp5y6EqgYweHZUcyiYWTjgAA1i00J9IZ+uPTqM1fp3DRgrFg5fNuH8KrUwJM/gYwx7WBr+ mbpCErGR9Hxo4sjoryzqyX6uuyo9DRXcNJW2GHSoag/HtPQTxORb7QrSpJdMKu0vbBKJPfEncKpq A1Ihn0CoZ1Dy81of398j9tx4TuaYT1U6U+Pv8vSfx3zYWK8pIpe44L2RLrB27FcRz+8pRPPphXpg Y+RdM4kX2TGq2tbzGDVyz4crL2MjhF2EjD9XoIj8mZEoJmmZ1I+XRL6O1UixpCgp8RW04eWe3fiP pm8m1wk8OhwRDqZsN/etRIcsKMfYdIKz0G9KV7s1KSegi+ghp4dkNl3M2Basx7InQJJVOCiNUW7d FGdTbHFcJoRNdVq2fmBWqU2t+5sel/MN2dKXVHfaPRK34B7vCAas+YWH6aLcr34YEoP9VhdBLtUp gn2Z9DH2canPLAEnpQW5qrJITirvn5NSUZU8UnOOVkwXQMAJKOSLakhT2+zNVVXxxvjpoixMptEm X36vWkzaH6byHCx+rgIW0lbQL1dTR+iS -----END CERTIFICATE----- Visa eCommerce Root =================== -----BEGIN CERTIFICATE----- MIIDojCCAoqgAwIBAgIQE4Y1TR0/BvLB+WUF1ZAcYjANBgkqhkiG9w0BAQUFADBrMQswCQYDVQQG EwJVUzENMAsGA1UEChMEVklTQTEvMC0GA1UECxMmVmlzYSBJbnRlcm5hdGlvbmFsIFNlcnZpY2Ug QXNzb2NpYXRpb24xHDAaBgNVBAMTE1Zpc2EgZUNvbW1lcmNlIFJvb3QwHhcNMDIwNjI2MDIxODM2 WhcNMjIwNjI0MDAxNjEyWjBrMQswCQYDVQQGEwJVUzENMAsGA1UEChMEVklTQTEvMC0GA1UECxMm VmlzYSBJbnRlcm5hdGlvbmFsIFNlcnZpY2UgQXNzb2NpYXRpb24xHDAaBgNVBAMTE1Zpc2EgZUNv bW1lcmNlIFJvb3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCvV95WHm6h2mCxlCfL F9sHP4CFT8icttD0b0/Pmdjh28JIXDqsOTPHH2qLJj0rNfVIsZHBAk4ElpF7sDPwsRROEW+1QK8b RaVK7362rPKgH1g/EkZgPI2h4H3PVz4zHvtH8aoVlwdVZqW1LS7YgFmypw23RuwhY/81q6UCzyr0 TP579ZRdhE2o8mCP2w4lPJ9zcc+U30rq299yOIzzlr3xF7zSujtFWsan9sYXiwGd/BmoKoMWuDpI /k4+oKsGGelT84ATB+0tvz8KPFUgOSwsAGl0lUq8ILKpeeUYiZGo3BxN77t+Nwtd/jmliFKMAGzs GHxBvfaLdXe6YJ2E5/4tAgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEG MB0GA1UdDgQWBBQVOIMPPyw/cDMezUb+B4wg4NfDtzANBgkqhkiG9w0BAQUFAAOCAQEAX/FBfXxc CLkr4NWSR/pnXKUTwwMhmytMiUbPWU3J/qVAtmPN3XEolWcRzCSs00Rsca4BIGsDoo8Ytyk6feUW YFN4PMCvFYP3j1IzJL1kk5fui/fbGKhtcbP3LBfQdCVp9/5rPJS+TUtBjE7ic9DjkCJzQ83z7+pz zkWKsKZJ/0x9nXGIxHYdkFsd7v3M9+79YKWxehZx0RbQfBI8bGmX265fOZpwLwU8GUYEmSA20GBu YQa7FkKMcPcw++DbZqMAAb3mLNqRX6BGi01qnD093QVG/na/oAo85ADmJ7f/hC3euiInlhBx6yLt 398znM/jra6O1I7mT1GvFpLgXPYHDw== -----END CERTIFICATE----- Certum Root CA ============== -----BEGIN CERTIFICATE----- MIIDDDCCAfSgAwIBAgIDAQAgMA0GCSqGSIb3DQEBBQUAMD4xCzAJBgNVBAYTAlBMMRswGQYDVQQK ExJVbml6ZXRvIFNwLiB6IG8uby4xEjAQBgNVBAMTCUNlcnR1bSBDQTAeFw0wMjA2MTExMDQ2Mzla Fw0yNzA2MTExMDQ2MzlaMD4xCzAJBgNVBAYTAlBMMRswGQYDVQQKExJVbml6ZXRvIFNwLiB6IG8u by4xEjAQBgNVBAMTCUNlcnR1bSBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAM6x wS7TT3zNJc4YPk/EjG+AanPIW1H4m9LcuwBcsaD8dQPugfCI7iNS6eYVM42sLQnFdvkrOYCJ5JdL kKWoePhzQ3ukYbDYWMzhbGZ+nPMJXlVjhNWo7/OxLjBos8Q82KxujZlakE403Daaj4GIULdtlkIJ 89eVgw1BS7Bqa/j8D35in2fE7SZfECYPCE/wpFcozo+47UX2bu4lXapuOb7kky/ZR6By6/qmW6/K Uz/iDsaWVhFu9+lmqSbYf5VT7QqFiLpPKaVCjF62/IUgAKpoC6EahQGcxEZjgoi2IrHu/qpGWX7P NSzVttpd90gzFFS269lvzs2I1qsb2pY7HVkCAwEAAaMTMBEwDwYDVR0TAQH/BAUwAwEB/zANBgkq hkiG9w0BAQUFAAOCAQEAuI3O7+cUus/usESSbLQ5PqKEbq24IXfS1HeCh+YgQYHu4vgRt2PRFze+ GXYkHAQaTOs9qmdvLdTN/mUxcMUbpgIKumB7bVjCmkn+YzILa+M6wKyrO7Do0wlRjBCDxjTgxSvg GrZgFCdsMneMvLJymM/NzD+5yCRCFNZX/OYmQ6kd5YCQzgNUKD73P9P4Te1qCjqTE5s7FCMTY5w/ 0YcneeVMUeMBrYVdGjux1XMQpNPyvG5k9VpWkKjHDkx0Dy5xO/fIR/RpbxXyEV6DHpx8Uq79AtoS qFlnGNu8cN2bsWntgM6JQEhqDjXKKWYVIZQs6GAqm4VKQPNriiTsBhYscw== -----END CERTIFICATE----- Comodo AAA Services root ======================== -----BEGIN CERTIFICATE----- MIIEMjCCAxqgAwIBAgIBATANBgkqhkiG9w0BAQUFADB7MQswCQYDVQQGEwJHQjEbMBkGA1UECAwS R3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHDAdTYWxmb3JkMRowGAYDVQQKDBFDb21vZG8gQ0Eg TGltaXRlZDEhMB8GA1UEAwwYQUFBIENlcnRpZmljYXRlIFNlcnZpY2VzMB4XDTA0MDEwMTAwMDAw MFoXDTI4MTIzMTIzNTk1OVowezELMAkGA1UEBhMCR0IxGzAZBgNVBAgMEkdyZWF0ZXIgTWFuY2hl c3RlcjEQMA4GA1UEBwwHU2FsZm9yZDEaMBgGA1UECgwRQ29tb2RvIENBIExpbWl0ZWQxITAfBgNV BAMMGEFBQSBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC ggEBAL5AnfRu4ep2hxxNRUSOvkbIgwadwSr+GB+O5AL686tdUIoWMQuaBtDFcCLNSS1UY8y2bmhG C1Pqy0wkwLxyTurxFa70VJoSCsN6sjNg4tqJVfMiWPPe3M/vg4aijJRPn2jymJBGhCfHdr/jzDUs i14HZGWCwEiwqJH5YZ92IFCokcdmtet4YgNW8IoaE+oxox6gmf049vYnMlhvB/VruPsUK6+3qszW Y19zjNoFmag4qMsXeDZRrOme9Hg6jc8P2ULimAyrL58OAd7vn5lJ8S3frHRNG5i1R8XlKdH5kBjH Ypy+g8cmez6KJcfA3Z3mNWgQIJ2P2N7Sw4ScDV7oL8kCAwEAAaOBwDCBvTAdBgNVHQ4EFgQUoBEK Iz6W8Qfs4q8p74Klf9AwpLQwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wewYDVR0f BHQwcjA4oDagNIYyaHR0cDovL2NybC5jb21vZG9jYS5jb20vQUFBQ2VydGlmaWNhdGVTZXJ2aWNl cy5jcmwwNqA0oDKGMGh0dHA6Ly9jcmwuY29tb2RvLm5ldC9BQUFDZXJ0aWZpY2F0ZVNlcnZpY2Vz LmNybDANBgkqhkiG9w0BAQUFAAOCAQEACFb8AvCb6P+k+tZ7xkSAzk/ExfYAWMymtrwUSWgEdujm 7l3sAg9g1o1QGE8mTgHj5rCl7r+8dFRBv/38ErjHT1r0iWAFf2C3BUrz9vHCv8S5dIa2LX1rzNLz Rt0vxuBqw8M0Ayx9lt1awg6nCpnBBYurDC/zXDrPbDdVCYfeU0BsWO/8tqtlbgT2G9w84FoVxp7Z 8VlIMCFlA2zs6SFz7JsDoeA3raAVGI/6ugLOpyypEBMs1OUIJqsil2D4kF501KKaU73yqWjgom7C 12yxow+ev+to51byrvLjKzg6CYG1a4XXvi3tPxq3smPi9WIsgtRqAEFQ8TmDn5XpNpaYbg== -----END CERTIFICATE----- QuoVadis Root CA ================ -----BEGIN CERTIFICATE----- MIIF0DCCBLigAwIBAgIEOrZQizANBgkqhkiG9w0BAQUFADB/MQswCQYDVQQGEwJCTTEZMBcGA1UE ChMQUXVvVmFkaXMgTGltaXRlZDElMCMGA1UECxMcUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0 eTEuMCwGA1UEAxMlUXVvVmFkaXMgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0wMTAz MTkxODMzMzNaFw0yMTAzMTcxODMzMzNaMH8xCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRp cyBMaW1pdGVkMSUwIwYDVQQLExxSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MS4wLAYDVQQD EyVRdW9WYWRpcyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MIIBIjANBgkqhkiG9w0BAQEF AAOCAQ8AMIIBCgKCAQEAv2G1lVO6V/z68mcLOhrfEYBklbTRvM16z/Ypli4kVEAkOPcahdxYTMuk J0KX0J+DisPkBgNbAKVRHnAEdOLB1Dqr1607BxgFjv2DrOpm2RgbaIr1VxqYuvXtdj182d6UajtL F8HVj71lODqV0D1VNk7feVcxKh7YWWVJWCCYfqtffp/p1k3sg3Spx2zY7ilKhSoGFPlU5tPaZQeL YzcS19Dsw3sgQUSj7cugF+FxZc4dZjH3dgEZyH0DWLaVSR2mEiboxgx24ONmy+pdpibu5cxfvWen AScOospUxbF6lR1xHkopigPcakXBpBlebzbNw6Kwt/5cOOJSvPhEQ+aQuwIDAQABo4ICUjCCAk4w PQYIKwYBBQUHAQEEMTAvMC0GCCsGAQUFBzABhiFodHRwczovL29jc3AucXVvdmFkaXNvZmZzaG9y ZS5jb20wDwYDVR0TAQH/BAUwAwEB/zCCARoGA1UdIASCAREwggENMIIBCQYJKwYBBAG+WAABMIH7 MIHUBggrBgEFBQcCAjCBxxqBxFJlbGlhbmNlIG9uIHRoZSBRdW9WYWRpcyBSb290IENlcnRpZmlj YXRlIGJ5IGFueSBwYXJ0eSBhc3N1bWVzIGFjY2VwdGFuY2Ugb2YgdGhlIHRoZW4gYXBwbGljYWJs ZSBzdGFuZGFyZCB0ZXJtcyBhbmQgY29uZGl0aW9ucyBvZiB1c2UsIGNlcnRpZmljYXRpb24gcHJh Y3RpY2VzLCBhbmQgdGhlIFF1b1ZhZGlzIENlcnRpZmljYXRlIFBvbGljeS4wIgYIKwYBBQUHAgEW Fmh0dHA6Ly93d3cucXVvdmFkaXMuYm0wHQYDVR0OBBYEFItLbe3TKbkGGew5Oanwl4Rqy+/fMIGu BgNVHSMEgaYwgaOAFItLbe3TKbkGGew5Oanwl4Rqy+/foYGEpIGBMH8xCzAJBgNVBAYTAkJNMRkw FwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMSUwIwYDVQQLExxSb290IENlcnRpZmljYXRpb24gQXV0 aG9yaXR5MS4wLAYDVQQDEyVRdW9WYWRpcyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5ggQ6 tlCLMA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQUFAAOCAQEAitQUtf70mpKnGdSkfnIYj9lo fFIk3WdvOXrEql494liwTXCYhGHoG+NpGA7O+0dQoE7/8CQfvbLO9Sf87C9TqnN7Az10buYWnuul LsS/VidQK2K6vkscPFVcQR0kvoIgR13VRH56FmjffU1RcHhXHTMe/QKZnAzNCgVPx7uOpHX6Sm2x gI4JVrmcGmD+XcHXetwReNDWXcG31a0ymQM6isxUJTkxgXsTIlG6Rmyhu576BGxJJnSP0nPrzDCi 5upZIof4l/UO/erMkqQWxFIY6iHOsfHmhIHluqmGKPJDWl0Snawe2ajlCmqnf6CHKc/yiU3U7MXi 5nrQNiOKSnQ2+Q== -----END CERTIFICATE----- QuoVadis Root CA 2 ================== -----BEGIN CERTIFICATE----- MIIFtzCCA5+gAwIBAgICBQkwDQYJKoZIhvcNAQEFBQAwRTELMAkGA1UEBhMCQk0xGTAXBgNVBAoT EFF1b1ZhZGlzIExpbWl0ZWQxGzAZBgNVBAMTElF1b1ZhZGlzIFJvb3QgQ0EgMjAeFw0wNjExMjQx ODI3MDBaFw0zMTExMjQxODIzMzNaMEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBM aW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDIwggIiMA0GCSqGSIb3DQEBAQUAA4IC DwAwggIKAoICAQCaGMpLlA0ALa8DKYrwD4HIrkwZhR0In6spRIXzL4GtMh6QRr+jhiYaHv5+HBg6 XJxgFyo6dIMzMH1hVBHL7avg5tKifvVrbxi3Cgst/ek+7wrGsxDp3MJGF/hd/aTa/55JWpzmM+Yk lvc/ulsrHHo1wtZn/qtmUIttKGAr79dgw8eTvI02kfN/+NsRE8Scd3bBrrcCaoF6qUWD4gXmuVbB lDePSHFjIuwXZQeVikvfj8ZaCuWw419eaxGrDPmF60Tp+ARz8un+XJiM9XOva7R+zdRcAitMOeGy lZUtQofX1bOQQ7dsE/He3fbE+Ik/0XX1ksOR1YqI0JDs3G3eicJlcZaLDQP9nL9bFqyS2+r+eXyt 66/3FsvbzSUr5R/7mp/iUcw6UwxI5g69ybR2BlLmEROFcmMDBOAENisgGQLodKcftslWZvB1Jdxn wQ5hYIizPtGo/KPaHbDRsSNU30R2be1B2MGyIrZTHN81Hdyhdyox5C315eXbyOD/5YDXC2Og/zOh D7osFRXql7PSorW+8oyWHhqPHWykYTe5hnMz15eWniN9gqRMgeKh0bpnX5UHoycR7hYQe7xFSkyy BNKr79X9DFHOUGoIMfmR2gyPZFwDwzqLID9ujWc9Otb+fVuIyV77zGHcizN300QyNQliBJIWENie J0f7OyHj+OsdWwIDAQABo4GwMIGtMA8GA1UdEwEB/wQFMAMBAf8wCwYDVR0PBAQDAgEGMB0GA1Ud DgQWBBQahGK8SEwzJQTU7tD2A8QZRtGUazBuBgNVHSMEZzBlgBQahGK8SEwzJQTU7tD2A8QZRtGU a6FJpEcwRTELMAkGA1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxGzAZBgNVBAMT ElF1b1ZhZGlzIFJvb3QgQ0EgMoICBQkwDQYJKoZIhvcNAQEFBQADggIBAD4KFk2fBluornFdLwUv Z+YTRYPENvbzwCYMDbVHZF34tHLJRqUDGCdViXh9duqWNIAXINzng/iN/Ae42l9NLmeyhP3ZRPx3 UIHmfLTJDQtyU/h2BwdBR5YM++CCJpNVjP4iH2BlfF/nJrP3MpCYUNQ3cVX2kiF495V5+vgtJodm VjB3pjd4M1IQWK4/YY7yarHvGH5KWWPKjaJW1acvvFYfzznB4vsKqBUsfU16Y8Zsl0Q80m/DShcK +JDSV6IZUaUtl0HaB0+pUNqQjZRG4T7wlP0QADj1O+hA4bRuVhogzG9Yje0uRY/W6ZM/57Es3zrW IozchLsib9D45MY56QSIPMO661V6bYCZJPVsAfv4l7CUW+v90m/xd2gNNWQjrLhVoQPRTUIZ3Ph1 WVaj+ahJefivDrkRoHy3au000LYmYjgahwz46P0u05B/B5EqHdZ+XIWDmbA4CD/pXvk1B+TJYm5X f6dQlfe6yJvmjqIBxdZmv3lh8zwc4bmCXF2gw+nYSL0ZohEUGW6yhhtoPkg3Goi3XZZenMfvJ2II 4pEZXNLxId26F0KCl3GBUzGpn/Z9Yr9y4aOTHcyKJloJONDO1w2AFrR4pTqHTI2KpdVGl/IsELm8 VCLAAVBpQ570su9t+Oza8eOx79+Rj1QqCyXBJhnEUhAFZdWCEOrCMc0u -----END CERTIFICATE----- QuoVadis Root CA 3 ================== -----BEGIN CERTIFICATE----- MIIGnTCCBIWgAwIBAgICBcYwDQYJKoZIhvcNAQEFBQAwRTELMAkGA1UEBhMCQk0xGTAXBgNVBAoT EFF1b1ZhZGlzIExpbWl0ZWQxGzAZBgNVBAMTElF1b1ZhZGlzIFJvb3QgQ0EgMzAeFw0wNjExMjQx OTExMjNaFw0zMTExMjQxOTA2NDRaMEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBM aW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDMwggIiMA0GCSqGSIb3DQEBAQUAA4IC DwAwggIKAoICAQDMV0IWVJzmmNPTTe7+7cefQzlKZbPoFog02w1ZkXTPkrgEQK0CSzGrvI2RaNgg DhoB4hp7Thdd4oq3P5kazethq8Jlph+3t723j/z9cI8LoGe+AaJZz3HmDyl2/7FWeUUrH556VOij KTVopAFPD6QuN+8bv+OPEKhyq1hX51SGyMnzW9os2l2ObjyjPtr7guXd8lyyBTNvijbO0BNO/79K DDRMpsMhvVAEVeuxu537RR5kFd5VAYwCdrXLoT9CabwvvWhDFlaJKjdhkf2mrk7AyxRllDdLkgbv BNDInIjbC3uBr7E9KsRlOni27tyAsdLTmZw67mtaa7ONt9XOnMK+pUsvFrGeaDsGb659n/je7Mwp p5ijJUMv7/FfJuGITfhebtfZFG4ZM2mnO4SJk8RTVROhUXhA+LjJou57ulJCg54U7QVSWllWp5f8 nT8KKdjcT5EOE7zelaTfi5m+rJsziO+1ga8bxiJTyPbH7pcUsMV8eFLI8M5ud2CEpukqdiDtWAEX MJPpGovgc2PZapKUSU60rUqFxKMiMPwJ7Wgic6aIDFUhWMXhOp8q3crhkODZc6tsgLjoC2SToJyM Gf+z0gzskSaHirOi4XCPLArlzW1oUevaPwV/izLmE1xr/l9A4iLItLRkT9a6fUg+qGkM17uGcclz uD87nSVL2v9A6wIDAQABo4IBlTCCAZEwDwYDVR0TAQH/BAUwAwEB/zCB4QYDVR0gBIHZMIHWMIHT BgkrBgEEAb5YAAMwgcUwgZMGCCsGAQUFBwICMIGGGoGDQW55IHVzZSBvZiB0aGlzIENlcnRpZmlj YXRlIGNvbnN0aXR1dGVzIGFjY2VwdGFuY2Ugb2YgdGhlIFF1b1ZhZGlzIFJvb3QgQ0EgMyBDZXJ0 aWZpY2F0ZSBQb2xpY3kgLyBDZXJ0aWZpY2F0aW9uIFByYWN0aWNlIFN0YXRlbWVudC4wLQYIKwYB BQUHAgEWIWh0dHA6Ly93d3cucXVvdmFkaXNnbG9iYWwuY29tL2NwczALBgNVHQ8EBAMCAQYwHQYD VR0OBBYEFPLAE+CCQz777i9nMpY1XNu4ywLQMG4GA1UdIwRnMGWAFPLAE+CCQz777i9nMpY1XNu4 ywLQoUmkRzBFMQswCQYDVQQGEwJCTTEZMBcGA1UEChMQUXVvVmFkaXMgTGltaXRlZDEbMBkGA1UE AxMSUXVvVmFkaXMgUm9vdCBDQSAzggIFxjANBgkqhkiG9w0BAQUFAAOCAgEAT62gLEz6wPJv92ZV qyM07ucp2sNbtrCD2dDQ4iH782CnO11gUyeim/YIIirnv6By5ZwkajGxkHon24QRiSemd1o417+s hvzuXYO8BsbRd2sPbSQvS3pspweWyuOEn62Iix2rFo1bZhfZFvSLgNLd+LJ2w/w4E6oM3kJpK27z POuAJ9v1pkQNn1pVWQvVDVJIxa6f8i+AxeoyUDUSly7B4f/xI4hROJ/yZlZ25w9Rl6VSDE1JUZU2 Pb+iSwwQHYaZTKrzchGT5Or2m9qoXadNt54CrnMAyNojA+j56hl0YgCUyyIgvpSnWbWCar6ZeXqp 8kokUvd0/bpO5qgdAm6xDYBEwa7TIzdfu4V8K5Iu6H6li92Z4b8nby1dqnuH/grdS/yO9SbkbnBC bjPsMZ57k8HkyWkaPcBrTiJt7qtYTcbQQcEr6k8Sh17rRdhs9ZgC06DYVYoGmRmioHfRMJ6szHXu g/WwYjnPbFfiTNKRCw51KBuav/0aQ/HKd/s7j2G4aSgWQgRecCocIdiP4b0jWy10QJLZYxkNc91p vGJHvOB0K7Lrfb5BG7XARsWhIstfTsEokt4YutUqKLsRixeTmJlglFwjz1onl14LBQaTNx47aTbr qZ5hHY8y2o4M1nQ+ewkk2gF3R8Q7zTSMmfXK4SVhM7JZG+Ju1zdXtg2pEto= -----END CERTIFICATE----- Security Communication Root CA ============================== -----BEGIN CERTIFICATE----- MIIDWjCCAkKgAwIBAgIBADANBgkqhkiG9w0BAQUFADBQMQswCQYDVQQGEwJKUDEYMBYGA1UEChMP U0VDT00gVHJ1c3QubmV0MScwJQYDVQQLEx5TZWN1cml0eSBDb21tdW5pY2F0aW9uIFJvb3RDQTEw HhcNMDMwOTMwMDQyMDQ5WhcNMjMwOTMwMDQyMDQ5WjBQMQswCQYDVQQGEwJKUDEYMBYGA1UEChMP U0VDT00gVHJ1c3QubmV0MScwJQYDVQQLEx5TZWN1cml0eSBDb21tdW5pY2F0aW9uIFJvb3RDQTEw ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCzs/5/022x7xZ8V6UMbXaKL0u/ZPtM7orw 8yl89f/uKuDp6bpbZCKamm8sOiZpUQWZJtzVHGpxxpp9Hp3dfGzGjGdnSj74cbAZJ6kJDKaVv0uM DPpVmDvY6CKhS3E4eayXkmmziX7qIWgGmBSWh9JhNrxtJ1aeV+7AwFb9Ms+k2Y7CI9eNqPPYJayX 5HA49LY6tJ07lyZDo6G8SVlyTCMwhwFY9k6+HGhWZq/NQV3Is00qVUarH9oe4kA92819uZKAnDfd DJZkndwi92SL32HeFZRSFaB9UslLqCHJxrHty8OVYNEP8Ktw+N/LTX7s1vqr2b1/VPKl6Xn62dZ2 JChzAgMBAAGjPzA9MB0GA1UdDgQWBBSgc0mZaNyFW2XjmygvV5+9M7wHSDALBgNVHQ8EBAMCAQYw DwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQUFAAOCAQEAaECpqLvkT115swW1F7NgE+vGkl3g 0dNq/vu+m22/xwVtWSDEHPC32oRYAmP6SBbvT6UL90qY8j+eG61Ha2POCEfrUj94nK9NrvjVT8+a mCoQQTlSxN3Zmw7vkwGusi7KaEIkQmywszo+zenaSMQVy+n5Bw+SUEmK3TGXX8npN6o7WWWXlDLJ s58+OmJYxUmtYg5xpTKqL8aJdkNAExNnPaJUJRDL8Try2frbSVa7pv6nQTXD4IhhyYjH3zYQIphZ 6rBK+1YWc26sTfcioU+tHXotRSflMMFe8toTyyVCUZVHA4xsIcx0Qu1T/zOLjw9XARYvz6buyXAi FL39vmwLAw== -----END CERTIFICATE----- Sonera Class 2 Root CA ====================== -----BEGIN CERTIFICATE----- MIIDIDCCAgigAwIBAgIBHTANBgkqhkiG9w0BAQUFADA5MQswCQYDVQQGEwJGSTEPMA0GA1UEChMG U29uZXJhMRkwFwYDVQQDExBTb25lcmEgQ2xhc3MyIENBMB4XDTAxMDQwNjA3Mjk0MFoXDTIxMDQw NjA3Mjk0MFowOTELMAkGA1UEBhMCRkkxDzANBgNVBAoTBlNvbmVyYTEZMBcGA1UEAxMQU29uZXJh IENsYXNzMiBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAJAXSjWdyvANlsdE+hY3 /Ei9vX+ALTU74W+oZ6m/AxxNjG8yR9VBaKQTBME1DJqEQ/xcHf+Js+gXGM2RX/uJ4+q/Tl18GybT dXnt5oTjV+WtKcT0OijnpXuENmmz/V52vaMtmdOQTiMofRhj8VQ7Jp12W5dCsv+u8E7s3TmVToMG f+dJQMjFAbJUWmYdPfz56TwKnoG4cPABi+QjVHzIrviQHgCWctRUz2EjvOr7nQKV0ba5cTppCD8P tOFCx4j1P5iop7oc4HFx71hXgVB6XGt0Rg6DA5jDjqhu8nYybieDwnPz3BjotJPqdURrBGAgcVeH nfO+oJAjPYok4doh28MCAwEAAaMzMDEwDwYDVR0TAQH/BAUwAwEB/zARBgNVHQ4ECgQISqCqWITT XjwwCwYDVR0PBAQDAgEGMA0GCSqGSIb3DQEBBQUAA4IBAQBazof5FnIVV0sd2ZvnoiYw7JNn39Yt 0jSv9zilzqsWuasvfDXLrNAPtEwr/IDva4yRXzZ299uzGxnq9LIR/WFxRL8oszodv7ND6J+/3DEI cbCdjdY0RzKQxmUk96BKfARzjzlvF4xytb1LyHr4e4PDKE6cCepnP7JnBBvDFNr450kkkdAdavph Oe9r5yF1BgfYErQhIHBCcYHaPJo2vqZbDWpsmh+Re/n570K6Tk6ezAyNlNzZRZxe7EJQY670XcSx EtzKO6gunRRaBXW37Ndj4ro1tgQIkejanZz2ZrUYrAqmVCY0M9IbwdR/GjqOC6oybtv8TyWf2TLH llpwrN9M -----END CERTIFICATE----- Camerfirma Chambers of Commerce Root ==================================== -----BEGIN CERTIFICATE----- MIIEvTCCA6WgAwIBAgIBADANBgkqhkiG9w0BAQUFADB/MQswCQYDVQQGEwJFVTEnMCUGA1UEChMe QUMgQ2FtZXJmaXJtYSBTQSBDSUYgQTgyNzQzMjg3MSMwIQYDVQQLExpodHRwOi8vd3d3LmNoYW1i ZXJzaWduLm9yZzEiMCAGA1UEAxMZQ2hhbWJlcnMgb2YgQ29tbWVyY2UgUm9vdDAeFw0wMzA5MzAx NjEzNDNaFw0zNzA5MzAxNjEzNDRaMH8xCzAJBgNVBAYTAkVVMScwJQYDVQQKEx5BQyBDYW1lcmZp cm1hIFNBIENJRiBBODI3NDMyODcxIzAhBgNVBAsTGmh0dHA6Ly93d3cuY2hhbWJlcnNpZ24ub3Jn MSIwIAYDVQQDExlDaGFtYmVycyBvZiBDb21tZXJjZSBSb290MIIBIDANBgkqhkiG9w0BAQEFAAOC AQ0AMIIBCAKCAQEAtzZV5aVdGDDg2olUkfzIx1L4L1DZ77F1c2VHfRtbunXF/KGIJPov7coISjlU xFF6tdpg6jg8gbLL8bvZkSM/SAFwdakFKq0fcfPJVD0dBmpAPrMMhe5cG3nCYsS4No41XQEMIwRH NaqbYE6gZj3LJgqcQKH0XZi/caulAGgq7YN6D6IUtdQis4CwPAxaUWktWBiP7Zme8a7ileb2R6jW DA+wWFjbw2Y3npuRVDM30pQcakjJyfKl2qUMI/cjDpwyVV5xnIQFUZot/eZOKjRa3spAN2cMVCFV d9oKDMyXroDclDZK9D7ONhMeU+SsTjoF7Nuucpw4i9A5O4kKPnf+dQIBA6OCAUQwggFAMBIGA1Ud EwEB/wQIMAYBAf8CAQwwPAYDVR0fBDUwMzAxoC+gLYYraHR0cDovL2NybC5jaGFtYmVyc2lnbi5v cmcvY2hhbWJlcnNyb290LmNybDAdBgNVHQ4EFgQU45T1sU3p26EpW1eLTXYGduHRooowDgYDVR0P AQH/BAQDAgEGMBEGCWCGSAGG+EIBAQQEAwIABzAnBgNVHREEIDAegRxjaGFtYmVyc3Jvb3RAY2hh bWJlcnNpZ24ub3JnMCcGA1UdEgQgMB6BHGNoYW1iZXJzcm9vdEBjaGFtYmVyc2lnbi5vcmcwWAYD VR0gBFEwTzBNBgsrBgEEAYGHLgoDATA+MDwGCCsGAQUFBwIBFjBodHRwOi8vY3BzLmNoYW1iZXJz aWduLm9yZy9jcHMvY2hhbWJlcnNyb290Lmh0bWwwDQYJKoZIhvcNAQEFBQADggEBAAxBl8IahsAi fJ/7kPMa0QOx7xP5IV8EnNrJpY0nbJaHkb5BkAFyk+cefV/2icZdp0AJPaxJRUXcLo0waLIJuvvD L8y6C98/d3tGfToSJI6WjzwFCm/SlCgdbQzALogi1djPHRPH8EjX1wWnz8dHnjs8NMiAT9QUu/wN UPf6s+xCX6ndbcj0dc97wXImsQEcXCz9ek60AcUFV7nnPKoF2YjpB0ZBzu9Bga5Y34OirsrXdx/n ADydb47kMgkdTXg0eDQ8lJsm7U9xxhl6vSAiSFr+S30Dt+dYvsYyTnQeaN2oaFuzPu5ifdmA6Ap1 erfutGWaIZDgqtCYvDi1czyL+Nw= -----END CERTIFICATE----- Camerfirma Global Chambersign Root ================================== -----BEGIN CERTIFICATE----- MIIExTCCA62gAwIBAgIBADANBgkqhkiG9w0BAQUFADB9MQswCQYDVQQGEwJFVTEnMCUGA1UEChMe QUMgQ2FtZXJmaXJtYSBTQSBDSUYgQTgyNzQzMjg3MSMwIQYDVQQLExpodHRwOi8vd3d3LmNoYW1i ZXJzaWduLm9yZzEgMB4GA1UEAxMXR2xvYmFsIENoYW1iZXJzaWduIFJvb3QwHhcNMDMwOTMwMTYx NDE4WhcNMzcwOTMwMTYxNDE4WjB9MQswCQYDVQQGEwJFVTEnMCUGA1UEChMeQUMgQ2FtZXJmaXJt YSBTQSBDSUYgQTgyNzQzMjg3MSMwIQYDVQQLExpodHRwOi8vd3d3LmNoYW1iZXJzaWduLm9yZzEg MB4GA1UEAxMXR2xvYmFsIENoYW1iZXJzaWduIFJvb3QwggEgMA0GCSqGSIb3DQEBAQUAA4IBDQAw ggEIAoIBAQCicKLQn0KuWxfH2H3PFIP8T8mhtxOviteePgQKkotgVvq0Mi+ITaFgCPS3CU6gSS9J 1tPfnZdan5QEcOw/Wdm3zGaLmFIoCQLfxS+EjXqXd7/sQJ0lcqu1PzKY+7e3/HKE5TWH+VX6ox8O by4o3Wmg2UIQxvi1RMLQQ3/bvOSiPGpVeAp3qdjqGTK3L/5cPxvusZjsyq16aUXjlg9V9ubtdepl 6DJWk0aJqCWKZQbua795B9Dxt6/tLE2Su8CoX6dnfQTyFQhwrJLWfQTSM/tMtgsL+xrJxI0DqX5c 8lCrEqWhz0hQpe/SyBoT+rB/sYIcd2oPX9wLlY/vQ37mRQklAgEDo4IBUDCCAUwwEgYDVR0TAQH/ BAgwBgEB/wIBDDA/BgNVHR8EODA2MDSgMqAwhi5odHRwOi8vY3JsLmNoYW1iZXJzaWduLm9yZy9j aGFtYmVyc2lnbnJvb3QuY3JsMB0GA1UdDgQWBBRDnDafsJ4wTcbOX60Qq+UDpfqpFDAOBgNVHQ8B Af8EBAMCAQYwEQYJYIZIAYb4QgEBBAQDAgAHMCoGA1UdEQQjMCGBH2NoYW1iZXJzaWducm9vdEBj aGFtYmVyc2lnbi5vcmcwKgYDVR0SBCMwIYEfY2hhbWJlcnNpZ25yb290QGNoYW1iZXJzaWduLm9y ZzBbBgNVHSAEVDBSMFAGCysGAQQBgYcuCgEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly9jcHMuY2hh bWJlcnNpZ24ub3JnL2Nwcy9jaGFtYmVyc2lnbnJvb3QuaHRtbDANBgkqhkiG9w0BAQUFAAOCAQEA PDtwkfkEVCeR4e3t/mh/YV3lQWVPMvEYBZRqHN4fcNs+ezICNLUMbKGKfKX0j//U2K0X1S0E0T9Y gOKBWYi+wONGkyT+kL0mojAt6JcmVzWJdJYY9hXiryQZVgICsroPFOrGimbBhkVVi76SvpykBMdJ PJ7oKXqJ1/6v/2j1pReQvayZzKWGVwlnRtvWFsJG8eSpUPWP0ZIV018+xgBJOm5YstHRJw0lyDL4 IBHNfTIzSJRUTN3cecQwn+uOuFW114hcxWokPbLTBQNRxgfvzBRydD1ucs4YKIxKoHflCStFREes t2d/AYoFWpO+ocH/+OcOZ6RHSXZddZAa9SaP8A== -----END CERTIFICATE----- XRamp Global CA Root ==================== -----BEGIN CERTIFICATE----- MIIEMDCCAxigAwIBAgIQUJRs7Bjq1ZxN1ZfvdY+grTANBgkqhkiG9w0BAQUFADCBgjELMAkGA1UE BhMCVVMxHjAcBgNVBAsTFXd3dy54cmFtcHNlY3VyaXR5LmNvbTEkMCIGA1UEChMbWFJhbXAgU2Vj dXJpdHkgU2VydmljZXMgSW5jMS0wKwYDVQQDEyRYUmFtcCBHbG9iYWwgQ2VydGlmaWNhdGlvbiBB dXRob3JpdHkwHhcNMDQxMTAxMTcxNDA0WhcNMzUwMTAxMDUzNzE5WjCBgjELMAkGA1UEBhMCVVMx HjAcBgNVBAsTFXd3dy54cmFtcHNlY3VyaXR5LmNvbTEkMCIGA1UEChMbWFJhbXAgU2VjdXJpdHkg U2VydmljZXMgSW5jMS0wKwYDVQQDEyRYUmFtcCBHbG9iYWwgQ2VydGlmaWNhdGlvbiBBdXRob3Jp dHkwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCYJB69FbS638eMpSe2OAtp87ZOqCwu IR1cRN8hXX4jdP5efrRKt6atH67gBhbim1vZZ3RrXYCPKZ2GG9mcDZhtdhAoWORlsH9KmHmf4MMx foArtYzAQDsRhtDLooY2YKTVMIJt2W7QDxIEM5dfT2Fa8OT5kavnHTu86M/0ay00fOJIYRyO82FE zG+gSqmUsE3a56k0enI4qEHMPJQRfevIpoy3hsvKMzvZPTeL+3o+hiznc9cKV6xkmxnr9A8ECIqs AxcZZPRaJSKNNCyy9mgdEm3Tih4U2sSPpuIjhdV6Db1q4Ons7Be7QhtnqiXtRYMh/MHJfNViPvry xS3T/dRlAgMBAAGjgZ8wgZwwEwYJKwYBBAGCNxQCBAYeBABDAEEwCwYDVR0PBAQDAgGGMA8GA1Ud EwEB/wQFMAMBAf8wHQYDVR0OBBYEFMZPoj0GY4QJnM5i5ASsjVy16bYbMDYGA1UdHwQvMC0wK6Ap oCeGJWh0dHA6Ly9jcmwueHJhbXBzZWN1cml0eS5jb20vWEdDQS5jcmwwEAYJKwYBBAGCNxUBBAMC AQEwDQYJKoZIhvcNAQEFBQADggEBAJEVOQMBG2f7Shz5CmBbodpNl2L5JFMn14JkTpAuw0kbK5rc /Kh4ZzXxHfARvbdI4xD2Dd8/0sm2qlWkSLoC295ZLhVbO50WfUfXN+pfTXYSNrsf16GBBEYgoyxt qZ4Bfj8pzgCT3/3JknOJiWSe5yvkHJEs0rnOfc5vMZnT5r7SHpDwCRR5XCOrTdLaIR9NmXmd4c8n nxCbHIgNsIpkQTG4DmyQJKSbXHGPurt+HBvbaoAPIbzp26a3QPSyi6mx5O+aGtA9aZnuqCij4Tyz 8LIRnM98QObd50N9otg6tamN8jSZxNQQ4Qb9CYQQO+7ETPTsJ3xCwnR8gooJybQDJbw= -----END CERTIFICATE----- Go Daddy Class 2 CA =================== -----BEGIN CERTIFICATE----- MIIEADCCAuigAwIBAgIBADANBgkqhkiG9w0BAQUFADBjMQswCQYDVQQGEwJVUzEhMB8GA1UEChMY VGhlIEdvIERhZGR5IEdyb3VwLCBJbmMuMTEwLwYDVQQLEyhHbyBEYWRkeSBDbGFzcyAyIENlcnRp ZmljYXRpb24gQXV0aG9yaXR5MB4XDTA0MDYyOTE3MDYyMFoXDTM0MDYyOTE3MDYyMFowYzELMAkG A1UEBhMCVVMxITAfBgNVBAoTGFRoZSBHbyBEYWRkeSBHcm91cCwgSW5jLjExMC8GA1UECxMoR28g RGFkZHkgQ2xhc3MgMiBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTCCASAwDQYJKoZIhvcNAQEBBQAD ggENADCCAQgCggEBAN6d1+pXGEmhW+vXX0iG6r7d/+TvZxz0ZWizV3GgXne77ZtJ6XCAPVYYYwhv 2vLM0D9/AlQiVBDYsoHUwHU9S3/Hd8M+eKsaA7Ugay9qK7HFiH7Eux6wwdhFJ2+qN1j3hybX2C32 qRe3H3I2TqYXP2WYktsqbl2i/ojgC95/5Y0V4evLOtXiEqITLdiOr18SPaAIBQi2XKVlOARFmR6j YGB0xUGlcmIbYsUfb18aQr4CUWWoriMYavx4A6lNf4DD+qta/KFApMoZFv6yyO9ecw3ud72a9nmY vLEHZ6IVDd2gWMZEewo+YihfukEHU1jPEX44dMX4/7VpkI+EdOqXG68CAQOjgcAwgb0wHQYDVR0O BBYEFNLEsNKR1EwRcbNhyz2h/t2oatTjMIGNBgNVHSMEgYUwgYKAFNLEsNKR1EwRcbNhyz2h/t2o atTjoWekZTBjMQswCQYDVQQGEwJVUzEhMB8GA1UEChMYVGhlIEdvIERhZGR5IEdyb3VwLCBJbmMu MTEwLwYDVQQLEyhHbyBEYWRkeSBDbGFzcyAyIENlcnRpZmljYXRpb24gQXV0aG9yaXR5ggEAMAwG A1UdEwQFMAMBAf8wDQYJKoZIhvcNAQEFBQADggEBADJL87LKPpH8EsahB4yOd6AzBhRckB4Y9wim PQoZ+YeAEW5p5JYXMP80kWNyOO7MHAGjHZQopDH2esRU1/blMVgDoszOYtuURXO1v0XJJLXVggKt I3lpjbi2Tc7PTMozI+gciKqdi0FuFskg5YmezTvacPd+mSYgFFQlq25zheabIZ0KbIIOqPjCDPoQ HmyW74cNxA9hi63ugyuV+I6ShHI56yDqg+2DzZduCLzrTia2cyvk0/ZM/iZx4mERdEr/VxqHD3VI Ls9RaRegAhJhldXRQLIQTO7ErBBDpqWeCtWVYpoNz4iCxTIM5CufReYNnyicsbkqWletNw+vHX/b vZ8= -----END CERTIFICATE----- Starfield Class 2 CA ==================== -----BEGIN CERTIFICATE----- MIIEDzCCAvegAwIBAgIBADANBgkqhkiG9w0BAQUFADBoMQswCQYDVQQGEwJVUzElMCMGA1UEChMc U3RhcmZpZWxkIFRlY2hub2xvZ2llcywgSW5jLjEyMDAGA1UECxMpU3RhcmZpZWxkIENsYXNzIDIg Q2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMDQwNjI5MTczOTE2WhcNMzQwNjI5MTczOTE2WjBo MQswCQYDVQQGEwJVUzElMCMGA1UEChMcU3RhcmZpZWxkIFRlY2hub2xvZ2llcywgSW5jLjEyMDAG A1UECxMpU3RhcmZpZWxkIENsYXNzIDIgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwggEgMA0GCSqG SIb3DQEBAQUAA4IBDQAwggEIAoIBAQC3Msj+6XGmBIWtDBFk385N78gDGIc/oav7PKaf8MOh2tTY bitTkPskpD6E8J7oX+zlJ0T1KKY/e97gKvDIr1MvnsoFAZMej2YcOadN+lq2cwQlZut3f+dZxkqZ JRRU6ybH838Z1TBwj6+wRir/resp7defqgSHo9T5iaU0X9tDkYI22WY8sbi5gv2cOj4QyDvvBmVm epsZGD3/cVE8MC5fvj13c7JdBmzDI1aaK4UmkhynArPkPw2vCHmCuDY96pzTNbO8acr1zJ3o/WSN F4Azbl5KXZnJHoe0nRrA1W4TNSNe35tfPe/W93bC6j67eA0cQmdrBNj41tpvi/JEoAGrAgEDo4HF MIHCMB0GA1UdDgQWBBS/X7fRzt0fhvRbVazc1xDCDqmI5zCBkgYDVR0jBIGKMIGHgBS/X7fRzt0f hvRbVazc1xDCDqmI56FspGowaDELMAkGA1UEBhMCVVMxJTAjBgNVBAoTHFN0YXJmaWVsZCBUZWNo bm9sb2dpZXMsIEluYy4xMjAwBgNVBAsTKVN0YXJmaWVsZCBDbGFzcyAyIENlcnRpZmljYXRpb24g QXV0aG9yaXR5ggEAMAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQEFBQADggEBAAWdP4id0ckaVaGs afPzWdqbAYcaT1epoXkJKtv3L7IezMdeatiDh6GX70k1PncGQVhiv45YuApnP+yz3SFmH8lU+nLM PUxA2IGvd56Deruix/U0F47ZEUD0/CwqTRV/p2JdLiXTAAsgGh1o+Re49L2L7ShZ3U0WixeDyLJl xy16paq8U4Zt3VekyvggQQto8PT7dL5WXXp59fkdheMtlb71cZBDzI0fmgAKhynpVSJYACPq4xJD KVtHCN2MQWplBqjlIapBtJUhlbl90TSrE9atvNziPTnNvT51cKEYWQPJIrSPnNVeKtelttQKbfi3 QBFGmh95DmK/D5fs4C8fF5Q= -----END CERTIFICATE----- StartCom Certification Authority ================================ -----BEGIN CERTIFICATE----- MIIHyTCCBbGgAwIBAgIBATANBgkqhkiG9w0BAQUFADB9MQswCQYDVQQGEwJJTDEWMBQGA1UEChMN U3RhcnRDb20gTHRkLjErMCkGA1UECxMiU2VjdXJlIERpZ2l0YWwgQ2VydGlmaWNhdGUgU2lnbmlu ZzEpMCcGA1UEAxMgU3RhcnRDb20gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMDYwOTE3MTk0 NjM2WhcNMzYwOTE3MTk0NjM2WjB9MQswCQYDVQQGEwJJTDEWMBQGA1UEChMNU3RhcnRDb20gTHRk LjErMCkGA1UECxMiU2VjdXJlIERpZ2l0YWwgQ2VydGlmaWNhdGUgU2lnbmluZzEpMCcGA1UEAxMg U3RhcnRDb20gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAw ggIKAoICAQDBiNsJvGxGfHiflXu1M5DycmLWwTYgIiRezul38kMKogZkpMyONvg45iPwbm2xPN1y o4UcodM9tDMr0y+v/uqwQVlntsQGfQqedIXWeUyAN3rfOQVSWff0G0ZDpNKFhdLDcfN1YjS6LIp/ Ho/u7TTQEceWzVI9ujPW3U3eCztKS5/CJi/6tRYccjV3yjxd5srhJosaNnZcAdt0FCX+7bWgiA/d eMotHweXMAEtcnn6RtYTKqi5pquDSR3l8u/d5AGOGAqPY1MWhWKpDhk6zLVmpsJrdAfkK+F2PrRt 2PZE4XNiHzvEvqBTViVsUQn3qqvKv3b9bZvzndu/PWa8DFaqr5hIlTpL36dYUNk4dalb6kMMAv+Z 6+hsTXBbKWWc3apdzK8BMewM69KN6Oqce+Zu9ydmDBpI125C4z/eIT574Q1w+2OqqGwaVLRcJXrJ osmLFqa7LH4XXgVNWG4SHQHuEhANxjJ/GP/89PrNbpHoNkm+Gkhpi8KWTRoSsmkXwQqQ1vp5Iki/ untp+HDH+no32NgN0nZPV/+Qt+OR0t3vwmC3Zzrd/qqc8NSLf3Iizsafl7b4r4qgEKjZ+xjGtrVc UjyJthkqcwEKDwOzEmDyei+B26Nu/yYwl/WL3YlXtq09s68rxbd2AvCl1iuahhQqcvbjM4xdCUsT 37uMdBNSSwIDAQABo4ICUjCCAk4wDAYDVR0TBAUwAwEB/zALBgNVHQ8EBAMCAa4wHQYDVR0OBBYE FE4L7xqkQFulF2mHMMo0aEPQQa7yMGQGA1UdHwRdMFswLKAqoCiGJmh0dHA6Ly9jZXJ0LnN0YXJ0 Y29tLm9yZy9zZnNjYS1jcmwuY3JsMCugKaAnhiVodHRwOi8vY3JsLnN0YXJ0Y29tLm9yZy9zZnNj YS1jcmwuY3JsMIIBXQYDVR0gBIIBVDCCAVAwggFMBgsrBgEEAYG1NwEBATCCATswLwYIKwYBBQUH AgEWI2h0dHA6Ly9jZXJ0LnN0YXJ0Y29tLm9yZy9wb2xpY3kucGRmMDUGCCsGAQUFBwIBFilodHRw Oi8vY2VydC5zdGFydGNvbS5vcmcvaW50ZXJtZWRpYXRlLnBkZjCB0AYIKwYBBQUHAgIwgcMwJxYg U3RhcnQgQ29tbWVyY2lhbCAoU3RhcnRDb20pIEx0ZC4wAwIBARqBl0xpbWl0ZWQgTGlhYmlsaXR5 LCByZWFkIHRoZSBzZWN0aW9uICpMZWdhbCBMaW1pdGF0aW9ucyogb2YgdGhlIFN0YXJ0Q29tIENl cnRpZmljYXRpb24gQXV0aG9yaXR5IFBvbGljeSBhdmFpbGFibGUgYXQgaHR0cDovL2NlcnQuc3Rh cnRjb20ub3JnL3BvbGljeS5wZGYwEQYJYIZIAYb4QgEBBAQDAgAHMDgGCWCGSAGG+EIBDQQrFilT dGFydENvbSBGcmVlIFNTTCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTANBgkqhkiG9w0BAQUFAAOC AgEAFmyZ9GYMNPXQhV59CuzaEE44HF7fpiUFS5Eyweg78T3dRAlbB0mKKctmArexmvclmAk8jhvh 3TaHK0u7aNM5Zj2gJsfyOZEdUauCe37Vzlrk4gNXcGmXCPleWKYK34wGmkUWFjgKXlf2Ysd6AgXm vB618p70qSmD+LIU424oh0TDkBreOKk8rENNZEXO3SipXPJzewT4F+irsfMuXGRuczE6Eri8sxHk fY+BUZo7jYn0TZNmezwD7dOaHZrzZVD1oNB1ny+v8OqCQ5j4aZyJecRDjkZy42Q2Eq/3JR44iZB3 fsNrarnDy0RLrHiQi+fHLB5LEUTINFInzQpdn4XBidUaePKVEFMy3YCEZnXZtWgo+2EuvoSoOMCZ EoalHmdkrQYuL6lwhceWD3yJZfWOQ1QOq92lgDmUYMA0yZZwLKMS9R9Ie70cfmu3nZD0Ijuu+Pwq yvqCUqDvr0tVk+vBtfAii6w0TiYiBKGHLHVKt+V9E9e4DGTANtLJL4YSjCMJwRuCO3NJo2pXh5Tl 1njFmUNj403gdy3hZZlyaQQaRwnmDwFWJPsfvw55qVguucQJAX6Vum0ABj6y6koQOdjQK/W/7HW/ lwLFCRsI3FU34oH7N4RDYiDK51ZLZer+bMEkkyShNOsF/5oirpt9P/FlUQqmMGqz9IgcgA38coro g14= -----END CERTIFICATE----- Taiwan GRCA =========== -----BEGIN CERTIFICATE----- MIIFcjCCA1qgAwIBAgIQH51ZWtcvwgZEpYAIaeNe9jANBgkqhkiG9w0BAQUFADA/MQswCQYDVQQG EwJUVzEwMC4GA1UECgwnR292ZXJubWVudCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MB4X DTAyMTIwNTEzMjMzM1oXDTMyMTIwNTEzMjMzM1owPzELMAkGA1UEBhMCVFcxMDAuBgNVBAoMJ0dv dmVybm1lbnQgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTCCAiIwDQYJKoZIhvcNAQEBBQAD ggIPADCCAgoCggIBAJoluOzMonWoe/fOW1mKydGGEghU7Jzy50b2iPN86aXfTEc2pBsBHH8eV4qN w8XRIePaJD9IK/ufLqGU5ywck9G/GwGHU5nOp/UKIXZ3/6m3xnOUT0b3EEk3+qhZSV1qgQdW8or5 BtD3cCJNtLdBuTK4sfCxw5w/cP1T3YGq2GN49thTbqGsaoQkclSGxtKyyhwOeYHWtXBiCAEuTk8O 1RGvqa/lmr/czIdtJuTJV6L7lvnM4T9TjGxMfptTCAtsF/tnyMKtsc2AtJfcdgEWFelq16TheEfO htX7MfP6Mb40qij7cEwdScevLJ1tZqa2jWR+tSBqnTuBto9AAGdLiYa4zGX+FVPpBMHWXx1E1wov J5pGfaENda1UhhXcSTvxls4Pm6Dso3pdvtUqdULle96ltqqvKKyskKw4t9VoNSZ63Pc78/1Fm9G7 Q3hub/FCVGqY8A2tl+lSXunVanLeavcbYBT0peS2cWeqH+riTcFCQP5nRhc4L0c/cZyu5SHKYS1t B6iEfC3uUSXxY5Ce/eFXiGvviiNtsea9P63RPZYLhY3Naye7twWb7LuRqQoHEgKXTiCQ8P8NHuJB O9NAOueNXdpm5AKwB1KYXA6OM5zCppX7VRluTI6uSw+9wThNXo+EHWbNxWCWtFJaBYmOlXqYwZE8 lSOyDvR5tMl8wUohAgMBAAGjajBoMB0GA1UdDgQWBBTMzO/MKWCkO7GStjz6MmKPrCUVOzAMBgNV HRMEBTADAQH/MDkGBGcqBwAEMTAvMC0CAQAwCQYFKw4DAhoFADAHBgVnKgMAAAQUA5vwIhP/lSg2 09yewDL7MTqKUWUwDQYJKoZIhvcNAQEFBQADggIBAECASvomyc5eMN1PhnR2WPWus4MzeKR6dBcZ TulStbngCnRiqmjKeKBMmo4sIy7VahIkv9Ro04rQ2JyftB8M3jh+Vzj8jeJPXgyfqzvS/3WXy6Tj Zwj/5cAWtUgBfen5Cv8b5Wppv3ghqMKnI6mGq3ZW6A4M9hPdKmaKZEk9GhiHkASfQlK3T8v+R0F2 Ne//AHY2RTKbxkaFXeIksB7jSJaYV0eUVXoPQbFEJPPB/hprv4j9wabak2BegUqZIJxIZhm1AHlU D7gsL0u8qV1bYH+Mh6XgUmMqvtg7hUAV/h62ZT/FS9p+tXo1KaMuephgIqP0fSdOLeq0dDzpD6Qz DxARvBMB1uUO07+1EqLhRSPAzAhuYbeJq4PjJB7mXQfnHyA+z2fI56wwbSdLaG5LKlwCCDTb+Hbk Z6MmnD+iMsJKxYEYMRBWqoTvLQr/uB930r+lWKBi5NdLkXWNiYCYfm3LU05er/ayl4WXudpVBrkk 7tfGOB5jGxI7leFYrPLfhNVfmS8NVVvmONsuP3LpSIXLuykTjx44VbnzssQwmSNOXfJIoRIM3BKQ CZBUkQM8R+XVyWXgt0t97EfTsws+rZ7QdAAO671RrcDeLMDDav7v3Aun+kbfYNucpllQdSNpc5Oy +fwC00fmcc4QAu4njIT/rEUNE1yDMuAlpYYsfPQS -----END CERTIFICATE----- DigiCert Assured ID Root CA =========================== -----BEGIN CERTIFICATE----- MIIDtzCCAp+gAwIBAgIQDOfg5RfYRv6P5WD8G/AwOTANBgkqhkiG9w0BAQUFADBlMQswCQYDVQQG EwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSQw IgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgQ0EwHhcNMDYxMTEwMDAwMDAwWhcNMzEx MTEwMDAwMDAwWjBlMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQL ExB3d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgQ0Ew ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCtDhXO5EOAXLGH87dg+XESpa7cJpSIqvTO 9SA5KFhgDPiA2qkVlTJhPLWxKISKityfCgyDF3qPkKyK53lTXDGEKvYPmDI2dsze3Tyoou9q+yHy UmHfnyDXH+Kx2f4YZNISW1/5WBg1vEfNoTb5a3/UsDg+wRvDjDPZ2C8Y/igPs6eD1sNuRMBhNZYW /lmci3Zt1/GiSw0r/wty2p5g0I6QNcZ4VYcgoc/lbQrISXwxmDNsIumH0DJaoroTghHtORedmTpy oeb6pNnVFzF1roV9Iq4/AUaG9ih5yLHa5FcXxH4cDrC0kqZWs72yl+2qp/C3xag/lRbQ/6GW6whf GHdPAgMBAAGjYzBhMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBRF 66Kv9JLLgjEtUYunpyGd823IDzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823IDzANBgkq hkiG9w0BAQUFAAOCAQEAog683+Lt8ONyc3pklL/3cmbYMuRCdWKuh+vy1dneVrOfzM4UKLkNl2Bc EkxY5NM9g0lFWJc1aRqoR+pWxnmrEthngYTffwk8lOa4JiwgvT2zKIn3X/8i4peEH+ll74fg38Fn SbNd67IJKusm7Xi+fT8r87cmNW1fiQG2SVufAQWbqz0lwcy2f8Lxb4bG+mRo64EtlOtCt/qMHt1i 8b5QZ7dsvfPxH2sMNgcWfzd8qVttevESRmCD1ycEvkvOl77DZypoEd+A5wwzZr8TDRRu838fYxAe +o0bJW1sj6W3YQGx0qMmoRBxna3iw/nDmVG3KwcIzi7mULKn+gpFL6Lw8g== -----END CERTIFICATE----- DigiCert Global Root CA ======================= -----BEGIN CERTIFICATE----- MIIDrzCCApegAwIBAgIQCDvgVpBCRrGhdWrJWZHHSjANBgkqhkiG9w0BAQUFADBhMQswCQYDVQQG EwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSAw HgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBDQTAeFw0wNjExMTAwMDAwMDBaFw0zMTExMTAw MDAwMDBaMGExCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3 dy5kaWdpY2VydC5jb20xIDAeBgNVBAMTF0RpZ2lDZXJ0IEdsb2JhbCBSb290IENBMIIBIjANBgkq hkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA4jvhEXLeqKTTo1eqUKKPC3eQyaKl7hLOllsBCSDMAZOn TjC3U/dDxGkAV53ijSLdhwZAAIEJzs4bg7/fzTtxRuLWZscFs3YnFo97nh6Vfe63SKMI2tavegw5 BmV/Sl0fvBf4q77uKNd0f3p4mVmFaG5cIzJLv07A6Fpt43C/dxC//AH2hdmoRBBYMql1GNXRor5H 4idq9Joz+EkIYIvUX7Q6hL+hqkpMfT7PT19sdl6gSzeRntwi5m3OFBqOasv+zbMUZBfHWymeMr/y 7vrTC0LUq7dBMtoM1O/4gdW7jVg/tRvoSSiicNoxBN33shbyTApOB6jtSj1etX+jkMOvJwIDAQAB o2MwYTAOBgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUA95QNVbRTLtm 8KPiGxvDl7I90VUwHwYDVR0jBBgwFoAUA95QNVbRTLtm8KPiGxvDl7I90VUwDQYJKoZIhvcNAQEF BQADggEBAMucN6pIExIK+t1EnE9SsPTfrgT1eXkIoyQY/EsrhMAtudXH/vTBH1jLuG2cenTnmCmr EbXjcKChzUyImZOMkXDiqw8cvpOp/2PV5Adg06O/nVsJ8dWO41P0jmP6P6fbtGbfYmbW0W5BjfIt tep3Sp+dWOIrWcBAI+0tKIJFPnlUkiaY4IBIqDfv8NZ5YBberOgOzW6sRBc4L0na4UU+Krk2U886 UAb3LujEV0lsYSEY1QSteDwsOoBrp+uvFRTp2InBuThs4pFsiv9kuXclVzDAGySj4dzp30d8tbQk CAUw7C29C79Fv1C5qfPrmAESrciIxpg0X40KPMbp1ZWVbd4= -----END CERTIFICATE----- DigiCert High Assurance EV Root CA ================================== -----BEGIN CERTIFICATE----- MIIDxTCCAq2gAwIBAgIQAqxcJmoLQJuPC3nyrkYldzANBgkqhkiG9w0BAQUFADBsMQswCQYDVQQG EwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSsw KQYDVQQDEyJEaWdpQ2VydCBIaWdoIEFzc3VyYW5jZSBFViBSb290IENBMB4XDTA2MTExMDAwMDAw MFoXDTMxMTExMDAwMDAwMFowbDELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZ MBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTErMCkGA1UEAxMiRGlnaUNlcnQgSGlnaCBBc3N1cmFu Y2UgRVYgUm9vdCBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMbM5XPm+9S75S0t Mqbf5YE/yc0lSbZxKsPVlDRnogocsF9ppkCxxLeyj9CYpKlBWTrT3JTWPNt0OKRKzE0lgvdKpVMS OO7zSW1xkX5jtqumX8OkhPhPYlG++MXs2ziS4wblCJEMxChBVfvLWokVfnHoNb9Ncgk9vjo4UFt3 MRuNs8ckRZqnrG0AFFoEt7oT61EKmEFBIk5lYYeBQVCmeVyJ3hlKV9Uu5l0cUyx+mM0aBhakaHPQ NAQTXKFx01p8VdteZOE3hzBWBOURtCmAEvF5OYiiAhF8J2a3iLd48soKqDirCmTCv2ZdlYTBoSUe h10aUAsgEsxBu24LUTi4S8sCAwEAAaNjMGEwDgYDVR0PAQH/BAQDAgGGMA8GA1UdEwEB/wQFMAMB Af8wHQYDVR0OBBYEFLE+w2kD+L9HAdSYJhoIAu9jZCvDMB8GA1UdIwQYMBaAFLE+w2kD+L9HAdSY JhoIAu9jZCvDMA0GCSqGSIb3DQEBBQUAA4IBAQAcGgaX3NecnzyIZgYIVyHbIUf4KmeqvxgydkAQ V8GK83rZEWWONfqe/EW1ntlMMUu4kehDLI6zeM7b41N5cdblIZQB2lWHmiRk9opmzN6cN82oNLFp myPInngiK3BD41VHMWEZ71jFhS9OMPagMRYjyOfiZRYzy78aG6A9+MpeizGLYAiJLQwGXFK3xPkK mNEVX58Svnw2Yzi9RKR/5CYrCsSXaQ3pjOLAEFe4yHYSkVXySGnYvCoCWw9E1CAx2/S6cCZdkGCe vEsXCS+0yx5DaMkHJ8HSXPfqIbloEpw8nL+e/IBcm2PN7EeqJSdnoDfzAIJ9VNep+OkuE6N36B9K -----END CERTIFICATE----- Certplus Class 2 Primary CA =========================== -----BEGIN CERTIFICATE----- MIIDkjCCAnqgAwIBAgIRAIW9S/PY2uNp9pTXX8OlRCMwDQYJKoZIhvcNAQEFBQAwPTELMAkGA1UE BhMCRlIxETAPBgNVBAoTCENlcnRwbHVzMRswGQYDVQQDExJDbGFzcyAyIFByaW1hcnkgQ0EwHhcN OTkwNzA3MTcwNTAwWhcNMTkwNzA2MjM1OTU5WjA9MQswCQYDVQQGEwJGUjERMA8GA1UEChMIQ2Vy dHBsdXMxGzAZBgNVBAMTEkNsYXNzIDIgUHJpbWFyeSBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEP ADCCAQoCggEBANxQltAS+DXSCHh6tlJw/W/uz7kRy1134ezpfgSN1sxvc0NXYKwzCkTsA18cgCSR 5aiRVhKC9+Ar9NuuYS6JEI1rbLqzAr3VNsVINyPi8Fo3UjMXEuLRYE2+L0ER4/YXJQyLkcAbmXuZ Vg2v7tK8R1fjeUl7NIknJITesezpWE7+Tt9avkGtrAjFGA7v0lPubNCdEgETjdyAYveVqUSISnFO YFWe2yMZeVYHDD9jC1yw4r5+FfyUM1hBOHTE4Y+L3yasH7WLO7dDWWuwJKZtkIvEcupdM5i3y95e e++U8Rs+yskhwcWYAqqi9lt3m/V+llU0HGdpwPFC40es/CgcZlUCAwEAAaOBjDCBiTAPBgNVHRME CDAGAQH/AgEKMAsGA1UdDwQEAwIBBjAdBgNVHQ4EFgQU43Mt38sOKAze3bOkynm4jrvoMIkwEQYJ YIZIAYb4QgEBBAQDAgEGMDcGA1UdHwQwMC4wLKAqoCiGJmh0dHA6Ly93d3cuY2VydHBsdXMuY29t L0NSTC9jbGFzczIuY3JsMA0GCSqGSIb3DQEBBQUAA4IBAQCnVM+IRBnL39R/AN9WM2K191EBkOvD P9GIROkkXe/nFL0gt5o8AP5tn9uQ3Nf0YtaLcF3n5QRIqWh8yfFC82x/xXp8HVGIutIKPidd3i1R TtMTZGnkLuPT55sJmabglZvOGtd/vjzOUrMRFcEPF80Du5wlFbqidon8BvEY0JNLDnyCt6X09l/+ 7UCmnYR0ObncHoUW2ikbhiMAybuJfm6AiB4vFLQDJKgybwOaRywwvlbGp0ICcBvqQNi6BQNwB6SW //1IMwrh3KWBkJtN3X3n57LNXMhqlfil9o3EXXgIvnsG1knPGTZQIy4I5p4FTUcY1Rbpsda2ENW7 l7+ijrRU -----END CERTIFICATE----- DST Root CA X3 ============== -----BEGIN CERTIFICATE----- MIIDSjCCAjKgAwIBAgIQRK+wgNajJ7qJMDmGLvhAazANBgkqhkiG9w0BAQUFADA/MSQwIgYDVQQK ExtEaWdpdGFsIFNpZ25hdHVyZSBUcnVzdCBDby4xFzAVBgNVBAMTDkRTVCBSb290IENBIFgzMB4X DTAwMDkzMDIxMTIxOVoXDTIxMDkzMDE0MDExNVowPzEkMCIGA1UEChMbRGlnaXRhbCBTaWduYXR1 cmUgVHJ1c3QgQ28uMRcwFQYDVQQDEw5EU1QgUm9vdCBDQSBYMzCCASIwDQYJKoZIhvcNAQEBBQAD ggEPADCCAQoCggEBAN+v6ZdQCINXtMxiZfaQguzH0yxrMMpb7NnDfcdAwRgUi+DoM3ZJKuM/IUmT rE4Orz5Iy2Xu/NMhD2XSKtkyj4zl93ewEnu1lcCJo6m67XMuegwGMoOifooUMM0RoOEqOLl5CjH9 UL2AZd+3UWODyOKIYepLYYHsUmu5ouJLGiifSKOeDNoJjj4XLh7dIN9bxiqKqy69cK3FCxolkHRy xXtqqzTWMIn/5WgTe1QLyNau7Fqckh49ZLOMxt+/yUFw7BZy1SbsOFU5Q9D8/RhcQPGX69Wam40d utolucbY38EVAjqr2m7xPi71XAicPNaDaeQQmxkqtilX4+U9m5/wAl0CAwEAAaNCMEAwDwYDVR0T AQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFMSnsaR7LHH62+FLkHX/xBVghYkQ MA0GCSqGSIb3DQEBBQUAA4IBAQCjGiybFwBcqR7uKGY3Or+Dxz9LwwmglSBd49lZRNI+DT69ikug dB/OEIKcdBodfpga3csTS7MgROSR6cz8faXbauX+5v3gTt23ADq1cEmv8uXrAvHRAosZy5Q6XkjE GB5YGV8eAlrwDPGxrancWYaLbumR9YbK+rlmM6pZW87ipxZzR8srzJmwN0jP41ZL9c8PDHIyh8bw RLtTcm1D9SZImlJnt1ir/md2cXjbDaJWFBM5JDGFoqgCWjBH4d1QB7wCCZAA62RjYJsWvIjJEubS fZGL+T0yjWW06XyxV3bqxbYoOb8VZRzI9neWagqNdwvYkQsEjgfbKbYK7p2CNTUQ -----END CERTIFICATE----- DST ACES CA X6 ============== -----BEGIN CERTIFICATE----- MIIECTCCAvGgAwIBAgIQDV6ZCtadt3js2AdWO4YV2TANBgkqhkiG9w0BAQUFADBbMQswCQYDVQQG EwJVUzEgMB4GA1UEChMXRGlnaXRhbCBTaWduYXR1cmUgVHJ1c3QxETAPBgNVBAsTCERTVCBBQ0VT MRcwFQYDVQQDEw5EU1QgQUNFUyBDQSBYNjAeFw0wMzExMjAyMTE5NThaFw0xNzExMjAyMTE5NTha MFsxCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdEaWdpdGFsIFNpZ25hdHVyZSBUcnVzdDERMA8GA1UE CxMIRFNUIEFDRVMxFzAVBgNVBAMTDkRTVCBBQ0VTIENBIFg2MIIBIjANBgkqhkiG9w0BAQEFAAOC AQ8AMIIBCgKCAQEAuT31LMmU3HWKlV1j6IR3dma5WZFcRt2SPp/5DgO0PWGSvSMmtWPuktKe1jzI DZBfZIGxqAgNTNj50wUoUrQBJcWVHAx+PhCEdc/BGZFjz+iokYi5Q1K7gLFViYsx+tC3dr5BPTCa pCIlF3PoHuLTrCq9Wzgh1SpL11V94zpVvddtawJXa+ZHfAjIgrrep4c9oW24MFbCswKBXy314pow GCi4ZtPLAZZv6opFVdbgnf9nKxcCpk4aahELfrd755jWjHZvwTvbUJN+5dCOHze4vbrGn2zpfDPy MjwmR/onJALJfh1biEITajV8fTXpLmaRcpPVMibEdPVTo7NdmvYJywIDAQABo4HIMIHFMA8GA1Ud EwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgHGMB8GA1UdEQQYMBaBFHBraS1vcHNAdHJ1c3Rkc3Qu Y29tMGIGA1UdIARbMFkwVwYKYIZIAWUDAgEBATBJMEcGCCsGAQUFBwIBFjtodHRwOi8vd3d3LnRy dXN0ZHN0LmNvbS9jZXJ0aWZpY2F0ZXMvcG9saWN5L0FDRVMtaW5kZXguaHRtbDAdBgNVHQ4EFgQU CXIGThhDD+XWzMNqizF7eI+og7gwDQYJKoZIhvcNAQEFBQADggEBAKPYjtay284F5zLNAdMEA+V2 5FYrnJmQ6AgwbN99Pe7lv7UkQIRJ4dEorsTCOlMwiPH1d25Ryvr/ma8kXxug/fKshMrfqfBfBC6t Fr8hlxCBPeP/h40y3JTlR4peahPJlJU90u7INJXQgNStMgiAVDzgvVJT11J8smk/f3rPanTK+gQq nExaBqXpIK1FZg9p8d2/6eMyi/rgwYZNcjwu2JN4Cir42NInPRmJX1p7ijvMDNpRrscL9yuwNwXs vFcj4jjSm2jzVhKIT0J8uDHEtdvkyCE06UgRNe76x5JXxZ805Mf29w4LTJxoeHtxMcfrHuBnQfO3 oKfN5XozNmr6mis= -----END CERTIFICATE----- SwissSign Gold CA - G2 ====================== -----BEGIN CERTIFICATE----- MIIFujCCA6KgAwIBAgIJALtAHEP1Xk+wMA0GCSqGSIb3DQEBBQUAMEUxCzAJBgNVBAYTAkNIMRUw EwYDVQQKEwxTd2lzc1NpZ24gQUcxHzAdBgNVBAMTFlN3aXNzU2lnbiBHb2xkIENBIC0gRzIwHhcN MDYxMDI1MDgzMDM1WhcNMzYxMDI1MDgzMDM1WjBFMQswCQYDVQQGEwJDSDEVMBMGA1UEChMMU3dp c3NTaWduIEFHMR8wHQYDVQQDExZTd2lzc1NpZ24gR29sZCBDQSAtIEcyMIICIjANBgkqhkiG9w0B AQEFAAOCAg8AMIICCgKCAgEAr+TufoskDhJuqVAtFkQ7kpJcyrhdhJJCEyq8ZVeCQD5XJM1QiyUq t2/876LQwB8CJEoTlo8jE+YoWACjR8cGp4QjK7u9lit/VcyLwVcfDmJlD909Vopz2q5+bbqBHH5C jCA12UNNhPqE21Is8w4ndwtrvxEvcnifLtg+5hg3Wipy+dpikJKVyh+c6bM8K8vzARO/Ws/BtQpg vd21mWRTuKCWs2/iJneRjOBiEAKfNA+k1ZIzUd6+jbqEemA8atufK+ze3gE/bk3lUIbLtK/tREDF ylqM2tIrfKjuvqblCqoOpd8FUrdVxyJdMmqXl2MT28nbeTZ7hTpKxVKJ+STnnXepgv9VHKVxaSvR AiTysybUa9oEVeXBCsdtMDeQKuSeFDNeFhdVxVu1yzSJkvGdJo+hB9TGsnhQ2wwMC3wLjEHXuend jIj3o02yMszYF9rNt85mndT9Xv+9lz4pded+p2JYryU0pUHHPbwNUMoDAw8IWh+Vc3hiv69yFGkO peUDDniOJihC8AcLYiAQZzlG+qkDzAQ4embvIIO1jEpWjpEA/I5cgt6IoMPiaG59je883WX0XaxR 7ySArqpWl2/5rX3aYT+YdzylkbYcjCbaZaIJbcHiVOO5ykxMgI93e2CaHt+28kgeDrpOVG2Y4OGi GqJ3UM/EY5LsRxmd6+ZrzsECAwEAAaOBrDCBqTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUw AwEB/zAdBgNVHQ4EFgQUWyV7lqRlUX64OfPAeGZe6Drn8O4wHwYDVR0jBBgwFoAUWyV7lqRlUX64 OfPAeGZe6Drn8O4wRgYDVR0gBD8wPTA7BglghXQBWQECAQEwLjAsBggrBgEFBQcCARYgaHR0cDov L3JlcG9zaXRvcnkuc3dpc3NzaWduLmNvbS8wDQYJKoZIhvcNAQEFBQADggIBACe645R88a7A3hfm 5djV9VSwg/S7zV4Fe0+fdWavPOhWfvxyeDgD2StiGwC5+OlgzczOUYrHUDFu4Up+GC9pWbY9ZIEr 44OE5iKHjn3g7gKZYbge9LgriBIWhMIxkziWMaa5O1M/wySTVltpkuzFwbs4AOPsF6m43Md8AYOf Mke6UiI0HTJ6CVanfCU2qT1L2sCCbwq7EsiHSycR+R4tx5M/nttfJmtS2S6K8RTGRI0Vqbe/vd6m Gu6uLftIdxf+u+yvGPUqUfA5hJeVbG4bwyvEdGB5JbAKJ9/fXtI5z0V9QkvfsywexcZdylU6oJxp mo/a77KwPJ+HbBIrZXAVUjEaJM9vMSNQH4xPjyPDdEFjHFWoFN0+4FFQz/EbMFYOkrCChdiDyyJk vC24JdVUorgG6q2SpCSgwYa1ShNqR88uC1aVVMvOmttqtKay20EIhid392qgQmwLOM7XdVAyksLf KzAiSNDVQTglXaTpXZ/GlHXQRf0wl0OPkKsKx4ZzYEppLd6leNcG2mqeSz53OiATIgHQv2ieY2Br NU0LbbqhPcCT4H8js1WtciVORvnSFu+wZMEBnunKoGqYDs/YYPIvSbjkQuE4NRb0yG5P94FW6Lqj viOvrv1vA+ACOzB2+httQc8Bsem4yWb02ybzOqR08kkkW8mw0FfB+j564ZfJ -----END CERTIFICATE----- SwissSign Silver CA - G2 ======================== -----BEGIN CERTIFICATE----- MIIFvTCCA6WgAwIBAgIITxvUL1S7L0swDQYJKoZIhvcNAQEFBQAwRzELMAkGA1UEBhMCQ0gxFTAT BgNVBAoTDFN3aXNzU2lnbiBBRzEhMB8GA1UEAxMYU3dpc3NTaWduIFNpbHZlciBDQSAtIEcyMB4X DTA2MTAyNTA4MzI0NloXDTM2MTAyNTA4MzI0NlowRzELMAkGA1UEBhMCQ0gxFTATBgNVBAoTDFN3 aXNzU2lnbiBBRzEhMB8GA1UEAxMYU3dpc3NTaWduIFNpbHZlciBDQSAtIEcyMIICIjANBgkqhkiG 9w0BAQEFAAOCAg8AMIICCgKCAgEAxPGHf9N4Mfc4yfjDmUO8x/e8N+dOcbpLj6VzHVxumK4DV644 N0MvFz0fyM5oEMF4rhkDKxD6LHmD9ui5aLlV8gREpzn5/ASLHvGiTSf5YXu6t+WiE7brYT7QbNHm +/pe7R20nqA1W6GSy/BJkv6FCgU+5tkL4k+73JU3/JHpMjUi0R86TieFnbAVlDLaYQ1HTWBCrpJH 6INaUFjpiou5XaHc3ZlKHzZnu0jkg7Y360g6rw9njxcH6ATK72oxh9TAtvmUcXtnZLi2kUpCe2Uu MGoM9ZDulebyzYLs2aFK7PayS+VFheZteJMELpyCbTapxDFkH4aDCyr0NQp4yVXPQbBH6TCfmb5h qAaEuSh6XzjZG6k4sIN/c8HDO0gqgg8hm7jMqDXDhBuDsz6+pJVpATqJAHgE2cn0mRmrVn5bi4Y5 FZGkECwJMoBgs5PAKrYYC51+jUnyEEp/+dVGLxmSo5mnJqy7jDzmDrxHB9xzUfFwZC8I+bRHHTBs ROopN4WSaGa8gzj+ezku01DwH/teYLappvonQfGbGHLy9YR0SslnxFSuSGTfjNFusB3hB48IHpmc celM2KX3RxIfdNFRnobzwqIjQAtz20um53MGjMGg6cFZrEb65i/4z3GcRm25xBWNOHkDRUjvxF3X CO6HOSKGsg0PWEP3calILv3q1h8CAwEAAaOBrDCBqTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/ BAUwAwEB/zAdBgNVHQ4EFgQUF6DNweRBtjpbO8tFnb0cwpj6hlgwHwYDVR0jBBgwFoAUF6DNweRB tjpbO8tFnb0cwpj6hlgwRgYDVR0gBD8wPTA7BglghXQBWQEDAQEwLjAsBggrBgEFBQcCARYgaHR0 cDovL3JlcG9zaXRvcnkuc3dpc3NzaWduLmNvbS8wDQYJKoZIhvcNAQEFBQADggIBAHPGgeAn0i0P 4JUw4ppBf1AsX19iYamGamkYDHRJ1l2E6kFSGG9YrVBWIGrGvShpWJHckRE1qTodvBqlYJ7YH39F kWnZfrt4csEGDyrOj4VwYaygzQu4OSlWhDJOhrs9xCrZ1x9y7v5RoSJBsXECYxqCsGKrXlcSH9/L 3XWgwF15kIwb4FDm3jH+mHtwX6WQ2K34ArZv02DdQEsixT2tOnqfGhpHkXkzuoLcMmkDlm4fS/Bx /uNncqCxv1yL5PqZIseEuRuNI5c/7SXgz2W79WEE790eslpBIlqhn10s6FvJbakMDHiqYMZWjwFa DGi8aRl5xB9+lwW/xekkUV7U1UtT7dkjWjYDZaPBA61BMPNGG4WQr2W11bHkFlt4dR2Xem1ZqSqP e97Dh4kQmUlzeMg9vVE1dCrV8X5pGyq7O70luJpaPXJhkGaH7gzWTdQRdAtq/gsD/KNVV4n+Ssuu WxcFyPKNIzFTONItaj+CuY0IavdeQXRuwxF+B6wpYJE/OMpXEA29MC/HpeZBoNquBYeaoKRlbEwJ DIm6uNO5wJOKMPqN5ZprFQFOZ6raYlY+hAhm0sQ2fac+EPyI4NSA5QC9qvNOBqN6avlicuMJT+ub DgEj8Z+7fNzcbBGXJbLytGMU0gYqZ4yD9c7qB9iaah7s5Aq7KkzrCWA5zspi2C5u -----END CERTIFICATE----- GeoTrust Primary Certification Authority ======================================== -----BEGIN CERTIFICATE----- MIIDfDCCAmSgAwIBAgIQGKy1av1pthU6Y2yv2vrEoTANBgkqhkiG9w0BAQUFADBYMQswCQYDVQQG EwJVUzEWMBQGA1UEChMNR2VvVHJ1c3QgSW5jLjExMC8GA1UEAxMoR2VvVHJ1c3QgUHJpbWFyeSBD ZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0wNjExMjcwMDAwMDBaFw0zNjA3MTYyMzU5NTlaMFgx CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMTEwLwYDVQQDEyhHZW9UcnVzdCBQ cmltYXJ5IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB CgKCAQEAvrgVe//UfH1nrYNke8hCUy3f9oQIIGHWAVlqnEQRr+92/ZV+zmEwu3qDXwK9AWbK7hWN b6EwnL2hhZ6UOvNWiAAxz9juapYC2e0DjPt1befquFUWBRaa9OBesYjAZIVcFU2Ix7e64HXprQU9 nceJSOC7KMgD4TCTZF5SwFlwIjVXiIrxlQqD17wxcwE07e9GceBrAqg1cmuXm2bgyxx5X9gaBGge RwLmnWDiNpcB3841kt++Z8dtd1k7j53WkBWUvEI0EME5+bEnPn7WinXFsq+W06Lem+SYvn3h6YGt tm/81w7a4DSwDRp35+MImO9Y+pyEtzavwt+s0vQQBnBxNQIDAQABo0IwQDAPBgNVHRMBAf8EBTAD AQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQULNVQQZcVi/CPNmFbSvtr2ZnJM5IwDQYJKoZI hvcNAQEFBQADggEBAFpwfyzdtzRP9YZRqSa+S7iq8XEN3GHHoOo0Hnp3DwQ16CePbJC/kRYkRj5K Ts4rFtULUh38H2eiAkUxT87z+gOneZ1TatnaYzr4gNfTmeGl4b7UVXGYNTq+k+qurUKykG/g/CFN NWMziUnWm07Kx+dOCQD32sfvmWKZd7aVIl6KoKv0uHiYyjgZmclynnjNS6yvGaBzEi38wkG6gZHa Floxt/m0cYASSJlyc1pZU8FjUjPtp8nSOQJw+uCxQmYpqptR7TBUIhRf2asdweSU8Pj1K/fqynhG 1riR/aYNKxoUAT6A8EKglQdebc3MS6RFjasS6LPeWuWgfOgPIh1a6Vk= -----END CERTIFICATE----- thawte Primary Root CA ====================== -----BEGIN CERTIFICATE----- MIIEIDCCAwigAwIBAgIQNE7VVyDV7exJ9C/ON9srbTANBgkqhkiG9w0BAQUFADCBqTELMAkGA1UE BhMCVVMxFTATBgNVBAoTDHRoYXd0ZSwgSW5jLjEoMCYGA1UECxMfQ2VydGlmaWNhdGlvbiBTZXJ2 aWNlcyBEaXZpc2lvbjE4MDYGA1UECxMvKGMpIDIwMDYgdGhhd3RlLCBJbmMuIC0gRm9yIGF1dGhv cml6ZWQgdXNlIG9ubHkxHzAdBgNVBAMTFnRoYXd0ZSBQcmltYXJ5IFJvb3QgQ0EwHhcNMDYxMTE3 MDAwMDAwWhcNMzYwNzE2MjM1OTU5WjCBqTELMAkGA1UEBhMCVVMxFTATBgNVBAoTDHRoYXd0ZSwg SW5jLjEoMCYGA1UECxMfQ2VydGlmaWNhdGlvbiBTZXJ2aWNlcyBEaXZpc2lvbjE4MDYGA1UECxMv KGMpIDIwMDYgdGhhd3RlLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxHzAdBgNVBAMT FnRoYXd0ZSBQcmltYXJ5IFJvb3QgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCs oPD7gFnUnMekz52hWXMJEEUMDSxuaPFsW0hoSVk3/AszGcJ3f8wQLZU0HObrTQmnHNK4yZc2AreJ 1CRfBsDMRJSUjQJib+ta3RGNKJpchJAQeg29dGYvajig4tVUROsdB58Hum/u6f1OCyn1PoSgAfGc q/gcfomk6KHYcWUNo1F77rzSImANuVud37r8UVsLr5iy6S7pBOhih94ryNdOwUxkHt3Ph1i6Sk/K aAcdHJ1KxtUvkcx8cXIcxcBn6zL9yZJclNqFwJu/U30rCfSMnZEfl2pSy94JNqR32HuHUETVPm4p afs5SSYeCaWAe0At6+gnhcn+Yf1+5nyXHdWdAgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYD VR0PAQH/BAQDAgEGMB0GA1UdDgQWBBR7W0XPr87Lev0xkhpqtvNG61dIUDANBgkqhkiG9w0BAQUF AAOCAQEAeRHAS7ORtvzw6WfUDW5FvlXok9LOAz/t2iWwHVfLHjp2oEzsUHboZHIMpKnxuIvW1oeE uzLlQRHAd9mzYJ3rG9XRbkREqaYB7FViHXe4XI5ISXycO1cRrK1zN44veFyQaEfZYGDm/Ac9IiAX xPcW6cTYcvnIc3zfFi8VqT79aie2oetaupgf1eNNZAqdE8hhuvU5HIe6uL17In/2/qxAeeWsEG89 jxt5dovEN7MhGITlNgDrYyCZuen+MwS7QcjBAvlEYyCegc5C09Y/LHbTY5xZ3Y+m4Q6gLkH3LpVH z7z9M/P2C2F+fpErgUfCJzDupxBdN49cOSvkBPB7jVaMaA== -----END CERTIFICATE----- VeriSign Class 3 Public Primary Certification Authority - G5 ============================================================ -----BEGIN CERTIFICATE----- MIIE0zCCA7ugAwIBAgIQGNrRniZ96LtKIVjNzGs7SjANBgkqhkiG9w0BAQUFADCByjELMAkGA1UE BhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQLExZWZXJpU2lnbiBUcnVzdCBO ZXR3b3JrMTowOAYDVQQLEzEoYykgMjAwNiBWZXJpU2lnbiwgSW5jLiAtIEZvciBhdXRob3JpemVk IHVzZSBvbmx5MUUwQwYDVQQDEzxWZXJpU2lnbiBDbGFzcyAzIFB1YmxpYyBQcmltYXJ5IENlcnRp ZmljYXRpb24gQXV0aG9yaXR5IC0gRzUwHhcNMDYxMTA4MDAwMDAwWhcNMzYwNzE2MjM1OTU5WjCB yjELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQLExZWZXJpU2ln biBUcnVzdCBOZXR3b3JrMTowOAYDVQQLEzEoYykgMjAwNiBWZXJpU2lnbiwgSW5jLiAtIEZvciBh dXRob3JpemVkIHVzZSBvbmx5MUUwQwYDVQQDEzxWZXJpU2lnbiBDbGFzcyAzIFB1YmxpYyBQcmlt YXJ5IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0gRzUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw ggEKAoIBAQCvJAgIKXo1nmAMqudLO07cfLw8RRy7K+D+KQL5VwijZIUVJ/XxrcgxiV0i6CqqpkKz j/i5Vbext0uz/o9+B1fs70PbZmIVYc9gDaTY3vjgw2IIPVQT60nKWVSFJuUrjxuf6/WhkcIzSdhD Y2pSS9KP6HBRTdGJaXvHcPaz3BJ023tdS1bTlr8Vd6Gw9KIl8q8ckmcY5fQGBO+QueQA5N06tRn/ Arr0PO7gi+s3i+z016zy9vA9r911kTMZHRxAy3QkGSGT2RT+rCpSx4/VBEnkjWNHiDxpg8v+R70r fk/Fla4OndTRQ8Bnc+MUCH7lP59zuDMKz10/NIeWiu5T6CUVAgMBAAGjgbIwga8wDwYDVR0TAQH/ BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwbQYIKwYBBQUHAQwEYTBfoV2gWzBZMFcwVRYJaW1hZ2Uv Z2lmMCEwHzAHBgUrDgMCGgQUj+XTGoasjY5rw8+AatRIGCx7GS4wJRYjaHR0cDovL2xvZ28udmVy aXNpZ24uY29tL3ZzbG9nby5naWYwHQYDVR0OBBYEFH/TZafC3ey78DAJ80M5+gKvMzEzMA0GCSqG SIb3DQEBBQUAA4IBAQCTJEowX2LP2BqYLz3q3JktvXf2pXkiOOzEp6B4Eq1iDkVwZMXnl2YtmAl+ X6/WzChl8gGqCBpH3vn5fJJaCGkgDdk+bW48DW7Y5gaRQBi5+MHt39tBquCWIMnNZBU4gcmU7qKE KQsTb47bDN0lAtukixlE0kF6BWlKWE9gyn6CagsCqiUXObXbf+eEZSqVir2G3l6BFoMtEMze/aiC Km0oHw0LxOXnGiYZ4fQRbxC1lfznQgUy286dUV4otp6F01vvpX1FQHKOtw5rDgb7MzVIcbidJ4vE ZV8NhnacRHr2lVz2XTIIM6RUthg/aFzyQkqFOFSDX9HoLPKsEdao7WNq -----END CERTIFICATE----- SecureTrust CA ============== -----BEGIN CERTIFICATE----- MIIDuDCCAqCgAwIBAgIQDPCOXAgWpa1Cf/DrJxhZ0DANBgkqhkiG9w0BAQUFADBIMQswCQYDVQQG EwJVUzEgMB4GA1UEChMXU2VjdXJlVHJ1c3QgQ29ycG9yYXRpb24xFzAVBgNVBAMTDlNlY3VyZVRy dXN0IENBMB4XDTA2MTEwNzE5MzExOFoXDTI5MTIzMTE5NDA1NVowSDELMAkGA1UEBhMCVVMxIDAe BgNVBAoTF1NlY3VyZVRydXN0IENvcnBvcmF0aW9uMRcwFQYDVQQDEw5TZWN1cmVUcnVzdCBDQTCC ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKukgeWVzfX2FI7CT8rU4niVWJxB4Q2ZQCQX OZEzZum+4YOvYlyJ0fwkW2Gz4BERQRwdbvC4u/jep4G6pkjGnx29vo6pQT64lO0pGtSO0gMdA+9t DWccV9cGrcrI9f4Or2YlSASWC12juhbDCE/RRvgUXPLIXgGZbf2IzIaowW8xQmxSPmjL8xk037uH GFaAJsTQ3MBv396gwpEWoGQRS0S8Hvbn+mPeZqx2pHGj7DaUaHp3pLHnDi+BeuK1cobvomuL8A/b 01k/unK8RCSc43Oz969XL0Imnal0ugBS8kvNU3xHCzaFDmapCJcWNFfBZveA4+1wVMeT4C4oFVmH ursCAwEAAaOBnTCBmjATBgkrBgEEAYI3FAIEBh4EAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/ BAUwAwEB/zAdBgNVHQ4EFgQUQjK2FvoE/f5dS3rD/fdMQB1aQ68wNAYDVR0fBC0wKzApoCegJYYj aHR0cDovL2NybC5zZWN1cmV0cnVzdC5jb20vU1RDQS5jcmwwEAYJKwYBBAGCNxUBBAMCAQAwDQYJ KoZIhvcNAQEFBQADggEBADDtT0rhWDpSclu1pqNlGKa7UTt36Z3q059c4EVlew3KW+JwULKUBRSu SceNQQcSc5R+DCMh/bwQf2AQWnL1mA6s7Ll/3XpvXdMc9P+IBWlCqQVxyLesJugutIxq/3HcuLHf mbx8IVQr5Fiiu1cprp6poxkmD5kuCLDv/WnPmRoJjeOnnyvJNjR7JLN4TJUXpAYmHrZkUjZfYGfZ nMUFdAvnZyPSCPyI6a6Lf+Ew9Dd+/cYy2i2eRDAwbO4H3tI0/NL/QPZL9GZGBlSm8jIKYyYwa5vR 3ItHuuG51WLQoqD0ZwV4KWMabwTW+MZMo5qxN7SN5ShLHZ4swrhovO0C7jE= -----END CERTIFICATE----- Secure Global CA ================ -----BEGIN CERTIFICATE----- MIIDvDCCAqSgAwIBAgIQB1YipOjUiolN9BPI8PjqpTANBgkqhkiG9w0BAQUFADBKMQswCQYDVQQG EwJVUzEgMB4GA1UEChMXU2VjdXJlVHJ1c3QgQ29ycG9yYXRpb24xGTAXBgNVBAMTEFNlY3VyZSBH bG9iYWwgQ0EwHhcNMDYxMTA3MTk0MjI4WhcNMjkxMjMxMTk1MjA2WjBKMQswCQYDVQQGEwJVUzEg MB4GA1UEChMXU2VjdXJlVHJ1c3QgQ29ycG9yYXRpb24xGTAXBgNVBAMTEFNlY3VyZSBHbG9iYWwg Q0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCvNS7YrGxVaQZx5RNoJLNP2MwhR/jx YDiJiQPpvepeRlMJ3Fz1Wuj3RSoC6zFh1ykzTM7HfAo3fg+6MpjhHZevj8fcyTiW89sa/FHtaMbQ bqR8JNGuQsiWUGMu4P51/pinX0kuleM5M2SOHqRfkNJnPLLZ/kG5VacJjnIFHovdRIWCQtBJwB1g 8NEXLJXr9qXBkqPFwqcIYA1gBBCWeZ4WNOaptvolRTnIHmX5k/Wq8VLcmZg9pYYaDDUz+kulBAYV HDGA76oYa8J719rO+TMg1fW9ajMtgQT7sFzUnKPiXB3jqUJ1XnvUd+85VLrJChgbEplJL4hL/VBi 0XPnj3pDAgMBAAGjgZ0wgZowEwYJKwYBBAGCNxQCBAYeBABDAEEwCwYDVR0PBAQDAgGGMA8GA1Ud EwEB/wQFMAMBAf8wHQYDVR0OBBYEFK9EBMJBfkiD2045AuzshHrmzsmkMDQGA1UdHwQtMCswKaAn oCWGI2h0dHA6Ly9jcmwuc2VjdXJldHJ1c3QuY29tL1NHQ0EuY3JsMBAGCSsGAQQBgjcVAQQDAgEA MA0GCSqGSIb3DQEBBQUAA4IBAQBjGghAfaReUw132HquHw0LURYD7xh8yOOvaliTFGCRsoTciE6+ OYo68+aCiV0BN7OrJKQVDpI1WkpEXk5X+nXOH0jOZvQ8QCaSmGwb7iRGDBezUqXbpZGRzzfTb+cn CDpOGR86p1hcF895P4vkp9MmI50mD1hp/Ed+stCNi5O/KU9DaXR2Z0vPB4zmAve14bRDtUstFJ/5 3CYNv6ZHdAbYiNE6KTCEztI5gGIbqMdXSbxqVVFnFUq+NQfk1XWYN3kwFNspnWzFacxHVaIw98xc f8LDmBxrThaA63p4ZUWiABqvDA1VZDRIuJK58bRQKfJPIx/abKwfROHdI3hRW8cW -----END CERTIFICATE----- COMODO Certification Authority ============================== -----BEGIN CERTIFICATE----- MIIEHTCCAwWgAwIBAgIQToEtioJl4AsC7j41AkblPTANBgkqhkiG9w0BAQUFADCBgTELMAkGA1UE BhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgG A1UEChMRQ09NT0RPIENBIExpbWl0ZWQxJzAlBgNVBAMTHkNPTU9ETyBDZXJ0aWZpY2F0aW9uIEF1 dGhvcml0eTAeFw0wNjEyMDEwMDAwMDBaFw0yOTEyMzEyMzU5NTlaMIGBMQswCQYDVQQGEwJHQjEb MBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFD T01PRE8gQ0EgTGltaXRlZDEnMCUGA1UEAxMeQ09NT0RPIENlcnRpZmljYXRpb24gQXV0aG9yaXR5 MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0ECLi3LjkRv3UcEbVASY06m/weaKXTuH +7uIzg3jLz8GlvCiKVCZrts7oVewdFFxze1CkU1B/qnI2GqGd0S7WWaXUF601CxwRM/aN5VCaTww xHGzUvAhTaHYujl8HJ6jJJ3ygxaYqhZ8Q5sVW7euNJH+1GImGEaaP+vB+fGQV+useg2L23IwambV 4EajcNxo2f8ESIl33rXp+2dtQem8Ob0y2WIC8bGoPW43nOIv4tOiJovGuFVDiOEjPqXSJDlqR6sA 1KGzqSX+DT+nHbrTUcELpNqsOO9VUCQFZUaTNE8tja3G1CEZ0o7KBWFxB3NH5YoZEr0ETc5OnKVI rLsm9wIDAQABo4GOMIGLMB0GA1UdDgQWBBQLWOWLxkwVN6RAqTCpIb5HNlpW/zAOBgNVHQ8BAf8E BAMCAQYwDwYDVR0TAQH/BAUwAwEB/zBJBgNVHR8EQjBAMD6gPKA6hjhodHRwOi8vY3JsLmNvbW9k b2NhLmNvbS9DT01PRE9DZXJ0aWZpY2F0aW9uQXV0aG9yaXR5LmNybDANBgkqhkiG9w0BAQUFAAOC AQEAPpiem/Yb6dc5t3iuHXIYSdOH5EOC6z/JqvWote9VfCFSZfnVDeFs9D6Mk3ORLgLETgdxb8CP OGEIqB6BCsAvIC9Bi5HcSEW88cbeunZrM8gALTFGTO3nnc+IlP8zwFboJIYmuNg4ON8qa90SzMc/ RxdMosIGlgnW2/4/PEZB31jiVg88O8EckzXZOFKs7sjsLjBOlDW0JB9LeGna8gI4zJVSk/BwJVmc IGfE7vmLV2H0knZ9P4SNVbfo5azV8fUZVqZa+5Acr5Pr5RzUZ5ddBA6+C4OmF4O5MBKgxTMVBbkN +8cFduPYSo38NBejxiEovjBFMR7HeL5YYTisO+IBZQ== -----END CERTIFICATE----- Network Solutions Certificate Authority ======================================= -----BEGIN CERTIFICATE----- MIID5jCCAs6gAwIBAgIQV8szb8JcFuZHFhfjkDFo4DANBgkqhkiG9w0BAQUFADBiMQswCQYDVQQG EwJVUzEhMB8GA1UEChMYTmV0d29yayBTb2x1dGlvbnMgTC5MLkMuMTAwLgYDVQQDEydOZXR3b3Jr IFNvbHV0aW9ucyBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHhcNMDYxMjAxMDAwMDAwWhcNMjkxMjMx MjM1OTU5WjBiMQswCQYDVQQGEwJVUzEhMB8GA1UEChMYTmV0d29yayBTb2x1dGlvbnMgTC5MLkMu MTAwLgYDVQQDEydOZXR3b3JrIFNvbHV0aW9ucyBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwggEiMA0G CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDkvH6SMG3G2I4rC7xGzuAnlt7e+foS0zwzc7MEL7xx jOWftiJgPl9dzgn/ggwbmlFQGiaJ3dVhXRncEg8tCqJDXRfQNJIg6nPPOCwGJgl6cvf6UDL4wpPT aaIjzkGxzOTVHzbRijr4jGPiFFlp7Q3Tf2vouAPlT2rlmGNpSAW+Lv8ztumXWWn4Zxmuk2GWRBXT crA/vGp97Eh/jcOrqnErU2lBUzS1sLnFBgrEsEX1QV1uiUV7PTsmjHTC5dLRfbIR1PtYMiKagMnc /Qzpf14Dl847ABSHJ3A4qY5usyd2mFHgBeMhqxrVhSI8KbWaFsWAqPS7azCPL0YCorEMIuDTAgMB AAGjgZcwgZQwHQYDVR0OBBYEFCEwyfsA106Y2oeqKtCnLrFAMadMMA4GA1UdDwEB/wQEAwIBBjAP BgNVHRMBAf8EBTADAQH/MFIGA1UdHwRLMEkwR6BFoEOGQWh0dHA6Ly9jcmwubmV0c29sc3NsLmNv bS9OZXR3b3JrU29sdXRpb25zQ2VydGlmaWNhdGVBdXRob3JpdHkuY3JsMA0GCSqGSIb3DQEBBQUA A4IBAQC7rkvnt1frf6ott3NHhWrB5KUd5Oc86fRZZXe1eltajSU24HqXLjjAV2CDmAaDn7l2em5Q 4LqILPxFzBiwmZVRDuwduIj/h1AcgsLj4DKAv6ALR8jDMe+ZZzKATxcheQxpXN5eNK4CtSbqUN9/ GGUsyfJj4akH/nxxH2szJGoeBfcFaMBqEssuXmHLrijTfsK0ZpEmXzwuJF/LWA/rKOyvEZbz3Htv wKeI8lN3s2Berq4o2jUsbzRF0ybh3uxbTydrFny9RAQYgrOJeRcQcT16ohZO9QHNpGxlaKFJdlxD ydi8NmdspZS11My5vWo1ViHe2MPr+8ukYEywVaCge1ey -----END CERTIFICATE----- COMODO ECC Certification Authority ================================== -----BEGIN CERTIFICATE----- MIICiTCCAg+gAwIBAgIQH0evqmIAcFBUTAGem2OZKjAKBggqhkjOPQQDAzCBhTELMAkGA1UEBhMC R0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgGA1UE ChMRQ09NT0RPIENBIExpbWl0ZWQxKzApBgNVBAMTIkNPTU9ETyBFQ0MgQ2VydGlmaWNhdGlvbiBB dXRob3JpdHkwHhcNMDgwMzA2MDAwMDAwWhcNMzgwMTE4MjM1OTU5WjCBhTELMAkGA1UEBhMCR0Ix GzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgGA1UEChMR Q09NT0RPIENBIExpbWl0ZWQxKzApBgNVBAMTIkNPTU9ETyBFQ0MgQ2VydGlmaWNhdGlvbiBBdXRo b3JpdHkwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQDR3svdcmCFYX7deSRFtSrYpn1PlILBs5BAH+X 4QokPB0BBO490o0JlwzgdeT6+3eKKvUDYEs2ixYjFq0JcfRK9ChQtP6IHG4/bC8vCVlbpVsLM5ni wz2J+Wos77LTBumjQjBAMB0GA1UdDgQWBBR1cacZSBm8nZ3qQUfflMRId5nTeTAOBgNVHQ8BAf8E BAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAKBggqhkjOPQQDAwNoADBlAjEA7wNbeqy3eApyt4jf/7VG FAkK+qDmfQjGGoe9GKhzvSbKYAydzpmfz1wPMOG+FDHqAjAU9JM8SaczepBGR7NjfRObTrdvGDeA U/7dIOA1mjbRxwG55tzd8/8dLDoWV9mSOdY= -----END CERTIFICATE----- Security Communication EV RootCA1 ================================= -----BEGIN CERTIFICATE----- MIIDfTCCAmWgAwIBAgIBADANBgkqhkiG9w0BAQUFADBgMQswCQYDVQQGEwJKUDElMCMGA1UEChMc U0VDT00gVHJ1c3QgU3lzdGVtcyBDTy4sTFRELjEqMCgGA1UECxMhU2VjdXJpdHkgQ29tbXVuaWNh dGlvbiBFViBSb290Q0ExMB4XDTA3MDYwNjAyMTIzMloXDTM3MDYwNjAyMTIzMlowYDELMAkGA1UE BhMCSlAxJTAjBgNVBAoTHFNFQ09NIFRydXN0IFN5c3RlbXMgQ08uLExURC4xKjAoBgNVBAsTIVNl Y3VyaXR5IENvbW11bmljYXRpb24gRVYgUm9vdENBMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCC AQoCggEBALx/7FebJOD+nLpCeamIivqA4PUHKUPqjgo0No0c+qe1OXj/l3X3L+SqawSERMqm4miO /VVQYg+kcQ7OBzgtQoVQrTyWb4vVog7P3kmJPdZkLjjlHmy1V4qe70gOzXppFodEtZDkBp2uoQSX WHnvIEqCa4wiv+wfD+mEce3xDuS4GBPMVjZd0ZoeUWs5bmB2iDQL87PRsJ3KYeJkHcFGB7hj3R4z ZbOOCVVSPbW9/wfrrWFVGCypaZhKqkDFMxRldAD5kd6vA0jFQFTcD4SQaCDFkpbcLuUCRarAX1T4 bepJz11sS6/vmsJWXMY1VkJqMF/Cq/biPT+zyRGPMUzXn0kCAwEAAaNCMEAwHQYDVR0OBBYEFDVK 9U2vP9eCOKyrcWUXdYydVZPmMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MA0GCSqG SIb3DQEBBQUAA4IBAQCoh+ns+EBnXcPBZsdAS5f8hxOQWsTvoMpfi7ent/HWtWS3irO4G8za+6xm iEHO6Pzk2x6Ipu0nUBsCMCRGef4Eh3CXQHPRwMFXGZpppSeZq51ihPZRwSzJIxXYKLerJRO1RuGG Av8mjMSIkh1W/hln8lXkgKNrnKt34VFxDSDbEJrbvXZ5B3eZKK2aXtqxT0QsNY6llsf9g/BYxnnW mHyojf6GPgcWkuF75x3sM3Z+Qi5KhfmRiWiEA4Glm5q+4zfFVKtWOxgtQaQM+ELbmaDgcm+7XeEW T1MKZPlO9L9OVL14bIjqv5wTJMJwaaJ/D8g8rQjJsJhAoyrniIPtd490 -----END CERTIFICATE----- OISTE WISeKey Global Root GA CA =============================== -----BEGIN CERTIFICATE----- MIID8TCCAtmgAwIBAgIQQT1yx/RrH4FDffHSKFTfmjANBgkqhkiG9w0BAQUFADCBijELMAkGA1UE BhMCQ0gxEDAOBgNVBAoTB1dJU2VLZXkxGzAZBgNVBAsTEkNvcHlyaWdodCAoYykgMjAwNTEiMCAG A1UECxMZT0lTVEUgRm91bmRhdGlvbiBFbmRvcnNlZDEoMCYGA1UEAxMfT0lTVEUgV0lTZUtleSBH bG9iYWwgUm9vdCBHQSBDQTAeFw0wNTEyMTExNjAzNDRaFw0zNzEyMTExNjA5NTFaMIGKMQswCQYD VQQGEwJDSDEQMA4GA1UEChMHV0lTZUtleTEbMBkGA1UECxMSQ29weXJpZ2h0IChjKSAyMDA1MSIw IAYDVQQLExlPSVNURSBGb3VuZGF0aW9uIEVuZG9yc2VkMSgwJgYDVQQDEx9PSVNURSBXSVNlS2V5 IEdsb2JhbCBSb290IEdBIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAy0+zAJs9 Nt350UlqaxBJH+zYK7LG+DKBKUOVTJoZIyEVRd7jyBxRVVuuk+g3/ytr6dTqvirdqFEr12bDYVxg Asj1znJ7O7jyTmUIms2kahnBAbtzptf2w93NvKSLtZlhuAGio9RN1AU9ka34tAhxZK9w8RxrfvbD d50kc3vkDIzh2TbhmYsFmQvtRTEJysIA2/dyoJaqlYfQjse2YXMNdmaM3Bu0Y6Kff5MTMPGhJ9vZ /yxViJGg4E8HsChWjBgbl0SOid3gF27nKu+POQoxhILYQBRJLnpB5Kf+42TMwVlxSywhp1t94B3R LoGbw9ho972WG6xwsRYUC9tguSYBBQIDAQABo1EwTzALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUw AwEB/zAdBgNVHQ4EFgQUswN+rja8sHnR3JQmthG+IbJphpQwEAYJKwYBBAGCNxUBBAMCAQAwDQYJ KoZIhvcNAQEFBQADggEBAEuh/wuHbrP5wUOxSPMowB0uyQlB+pQAHKSkq0lPjz0e701vvbyk9vIm MMkQyh2I+3QZH4VFvbBsUfk2ftv1TDI6QU9bR8/oCy22xBmddMVHxjtqD6wU2zz0c5ypBd8A3HR4 +vg1YFkCExh8vPtNsCBtQ7tgMHpnM1zFmdH4LTlSc/uMqpclXHLZCB6rTjzjgTGfA6b7wP4piFXa hNVQA7bihKOmNqoROgHhGEvWRGizPflTdISzRpFGlgC3gCy24eMQ4tui5yiPAZZiFj4A4xylNoEY okxSdsARo27mHbrjWr42U8U+dY+GaSlYU7Wcu2+fXMUY7N0v4ZjJ/L7fCg0= -----END CERTIFICATE----- Certigna ======== -----BEGIN CERTIFICATE----- MIIDqDCCApCgAwIBAgIJAP7c4wEPyUj/MA0GCSqGSIb3DQEBBQUAMDQxCzAJBgNVBAYTAkZSMRIw EAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25hMB4XDTA3MDYyOTE1MTMwNVoXDTI3 MDYyOTE1MTMwNVowNDELMAkGA1UEBhMCRlIxEjAQBgNVBAoMCURoaW15b3RpczERMA8GA1UEAwwI Q2VydGlnbmEwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDIaPHJ1tazNHUmgh7stL7q XOEm7RFHYeGifBZ4QCHkYJ5ayGPhxLGWkv8YbWkj4Sti993iNi+RB7lIzw7sebYs5zRLcAglozyH GxnygQcPOJAZ0xH+hrTy0V4eHpbNgGzOOzGTtvKg0KmVEn2lmsxryIRWijOp5yIVUxbwzBfsV1/p ogqYCd7jX5xv3EjjhQsVWqa6n6xI4wmy9/Qy3l40vhx4XUJbzg4ij02Q130yGLMLLGq/jj8UEYkg DncUtT2UCIf3JR7VsmAA7G8qKCVuKj4YYxclPz5EIBb2JsglrgVKtOdjLPOMFlN+XPsRGgjBRmKf Irjxwo1p3Po6WAbfAgMBAAGjgbwwgbkwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUGu3+QTmQ tCRZvgHyUtVF9lo53BEwZAYDVR0jBF0wW4AUGu3+QTmQtCRZvgHyUtVF9lo53BGhOKQ2MDQxCzAJ BgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25hggkA/tzjAQ/J SP8wDgYDVR0PAQH/BAQDAgEGMBEGCWCGSAGG+EIBAQQEAwIABzANBgkqhkiG9w0BAQUFAAOCAQEA hQMeknH2Qq/ho2Ge6/PAD/Kl1NqV5ta+aDY9fm4fTIrv0Q8hbV6lUmPOEvjvKtpv6zf+EwLHyzs+ ImvaYS5/1HI93TDhHkxAGYwP15zRgzB7mFncfca5DClMoTOi62c6ZYTTluLtdkVwj7Ur3vkj1klu PBS1xp81HlDQwY9qcEQCYsuuHWhBp6pX6FOqB9IG9tUUBguRA3UsbHK1YZWaDYu5Def131TN3ubY 1gkIl2PlwS6wt0QmwCbAr1UwnjvVNioZBPRcHv/PLLf/0P2HQBHVESO7SMAhqaQoLf0V+LBOK/Qw WyH8EZE0vkHve52Xdf+XlcCWWC/qu0bXu+TZLg== -----END CERTIFICATE----- Deutsche Telekom Root CA 2 ========================== -----BEGIN CERTIFICATE----- MIIDnzCCAoegAwIBAgIBJjANBgkqhkiG9w0BAQUFADBxMQswCQYDVQQGEwJERTEcMBoGA1UEChMT RGV1dHNjaGUgVGVsZWtvbSBBRzEfMB0GA1UECxMWVC1UZWxlU2VjIFRydXN0IENlbnRlcjEjMCEG A1UEAxMaRGV1dHNjaGUgVGVsZWtvbSBSb290IENBIDIwHhcNOTkwNzA5MTIxMTAwWhcNMTkwNzA5 MjM1OTAwWjBxMQswCQYDVQQGEwJERTEcMBoGA1UEChMTRGV1dHNjaGUgVGVsZWtvbSBBRzEfMB0G A1UECxMWVC1UZWxlU2VjIFRydXN0IENlbnRlcjEjMCEGA1UEAxMaRGV1dHNjaGUgVGVsZWtvbSBS b290IENBIDIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCrC6M14IspFLEUha88EOQ5 bzVdSq7d6mGNlUn0b2SjGmBmpKlAIoTZ1KXleJMOaAGtuU1cOs7TuKhCQN/Po7qCWWqSG6wcmtoI KyUn+WkjR/Hg6yx6m/UTAtB+NHzCnjwAWav12gz1MjwrrFDa1sPeg5TKqAyZMg4ISFZbavva4VhY AUlfckE8FQYBjl2tqriTtM2e66foai1SNNs671x1Udrb8zH57nGYMsRUFUQM+ZtV7a3fGAigo4aK Se5TBY8ZTNXeWHmb0mocQqvF1afPaA+W5OFhmHZhyJF81j4A4pFQh+GdCuatl9Idxjp9y7zaAzTV jlsB9WoHtxa2bkp/AgMBAAGjQjBAMB0GA1UdDgQWBBQxw3kbuvVT1xfgiXotF2wKsyudMzAPBgNV HRMECDAGAQH/AgEFMA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQUFAAOCAQEAlGRZrTlk5ynr E/5aw4sTV8gEJPB0d8Bg42f76Ymmg7+Wgnxu1MM9756AbrsptJh6sTtU6zkXR34ajgv8HzFZMQSy zhfzLMdiNlXiItiJVbSYSKpk+tYcNthEeFpaIzpXl/V6ME+un2pMSyuOoAPjPuCp1NJ70rOo4nI8 rZ7/gFnkm0W09juwzTkZmDLl6iFhkOQxIY40sfcvNUqFENrnijchvllj4PKFiDFT1FQUhXB59C4G dyd1Lx+4ivn+xbrYNuSD7Odlt79jWvNGr4GUN9RBjNYj1h7P9WgbRGOiWrqnNVmh5XAFmw4jV5mU Cm26OWMohpLzGITY+9HPBVZkVw== -----END CERTIFICATE----- Cybertrust Global Root ====================== -----BEGIN CERTIFICATE----- MIIDoTCCAomgAwIBAgILBAAAAAABD4WqLUgwDQYJKoZIhvcNAQEFBQAwOzEYMBYGA1UEChMPQ3li ZXJ0cnVzdCwgSW5jMR8wHQYDVQQDExZDeWJlcnRydXN0IEdsb2JhbCBSb290MB4XDTA2MTIxNTA4 MDAwMFoXDTIxMTIxNTA4MDAwMFowOzEYMBYGA1UEChMPQ3liZXJ0cnVzdCwgSW5jMR8wHQYDVQQD ExZDeWJlcnRydXN0IEdsb2JhbCBSb290MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA +Mi8vRRQZhP/8NN57CPytxrHjoXxEnOmGaoQ25yiZXRadz5RfVb23CO21O1fWLE3TdVJDm71aofW 0ozSJ8bi/zafmGWgE07GKmSb1ZASzxQG9Dvj1Ci+6A74q05IlG2OlTEQXO2iLb3VOm2yHLtgwEZL AfVJrn5GitB0jaEMAs7u/OePuGtm839EAL9mJRQr3RAwHQeWP032a7iPt3sMpTjr3kfb1V05/Iin 89cqdPHoWqI7n1C6poxFNcJQZZXcY4Lv3b93TZxiyWNzFtApD0mpSPCzqrdsxacwOUBdrsTiXSZT 8M4cIwhhqJQZugRiQOwfOHB3EgZxpzAYXSUnpQIDAQABo4GlMIGiMA4GA1UdDwEB/wQEAwIBBjAP BgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBS2CHsNesysIEyGVjJez6tuhS1wVzA/BgNVHR8EODA2 MDSgMqAwhi5odHRwOi8vd3d3Mi5wdWJsaWMtdHJ1c3QuY29tL2NybC9jdC9jdHJvb3QuY3JsMB8G A1UdIwQYMBaAFLYIew16zKwgTIZWMl7Pq26FLXBXMA0GCSqGSIb3DQEBBQUAA4IBAQBW7wojoFRO lZfJ+InaRcHUowAl9B8Tq7ejhVhpwjCt2BWKLePJzYFa+HMjWqd8BfP9IjsO0QbE2zZMcwSO5bAi 5MXzLqXZI+O4Tkogp24CJJ8iYGd7ix1yCcUxXOl5n4BHPa2hCwcUPUf/A2kaDAtE52Mlp3+yybh2 hO0j9n0Hq0V+09+zv+mKts2oomcrUtW3ZfA5TGOgkXmTUg9U3YO7n9GPp1Nzw8v/MOx8BLjYRB+T X3EJIrduPuocA06dGiBh+4E37F78CkWr1+cXVdCg6mCbpvbjjFspwgZgFJ0tl0ypkxWdYcQBX0jW WL1WMRJOEcgh4LMRkWXbtKaIOM5V -----END CERTIFICATE----- ePKI Root Certification Authority ================================= -----BEGIN CERTIFICATE----- MIIFsDCCA5igAwIBAgIQFci9ZUdcr7iXAF7kBtK8nTANBgkqhkiG9w0BAQUFADBeMQswCQYDVQQG EwJUVzEjMCEGA1UECgwaQ2h1bmdod2EgVGVsZWNvbSBDby4sIEx0ZC4xKjAoBgNVBAsMIWVQS0kg Um9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0wNDEyMjAwMjMxMjdaFw0zNDEyMjAwMjMx MjdaMF4xCzAJBgNVBAYTAlRXMSMwIQYDVQQKDBpDaHVuZ2h3YSBUZWxlY29tIENvLiwgTHRkLjEq MCgGA1UECwwhZVBLSSBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MIICIjANBgkqhkiG9w0B AQEFAAOCAg8AMIICCgKCAgEA4SUP7o3biDN1Z82tH306Tm2d0y8U82N0ywEhajfqhFAHSyZbCUNs IZ5qyNUD9WBpj8zwIuQf5/dqIjG3LBXy4P4AakP/h2XGtRrBp0xtInAhijHyl3SJCRImHJ7K2RKi lTza6We/CKBk49ZCt0Xvl/T29de1ShUCWH2YWEtgvM3XDZoTM1PRYfl61dd4s5oz9wCGzh1NlDiv qOx4UXCKXBCDUSH3ET00hl7lSM2XgYI1TBnsZfZrxQWh7kcT1rMhJ5QQCtkkO7q+RBNGMD+XPNjX 12ruOzjjK9SXDrkb5wdJfzcq+Xd4z1TtW0ado4AOkUPB1ltfFLqfpo0kR0BZv3I4sjZsN/+Z0V0O WQqraffAsgRFelQArr5T9rXn4fg8ozHSqf4hUmTFpmfwdQcGlBSBVcYn5AGPF8Fqcde+S/uUWH1+ ETOxQvdibBjWzwloPn9s9h6PYq2lY9sJpx8iQkEeb5mKPtf5P0B6ebClAZLSnT0IFaUQAS2zMnao lQ2zepr7BxB4EW/hj8e6DyUadCrlHJhBmd8hh+iVBmoKs2pHdmX2Os+PYhcZewoozRrSgx4hxyy/ vv9haLdnG7t4TY3OZ+XkwY63I2binZB1NJipNiuKmpS5nezMirH4JYlcWrYvjB9teSSnUmjDhDXi Zo1jDiVN1Rmy5nk3pyKdVDECAwEAAaNqMGgwHQYDVR0OBBYEFB4M97Zn8uGSJglFwFU5Lnc/Qkqi MAwGA1UdEwQFMAMBAf8wOQYEZyoHAAQxMC8wLQIBADAJBgUrDgMCGgUAMAcGBWcqAwAABBRFsMLH ClZ87lt4DJX5GFPBphzYEDANBgkqhkiG9w0BAQUFAAOCAgEACbODU1kBPpVJufGBuvl2ICO1J2B0 1GqZNF5sAFPZn/KmsSQHRGoqxqWOeBLoR9lYGxMqXnmbnwoqZ6YlPwZpVnPDimZI+ymBV3QGypzq KOg4ZyYr8dW1P2WT+DZdjo2NQCCHGervJ8A9tDkPJXtoUHRVnAxZfVo9QZQlUgjgRywVMRnVvwdV xrsStZf0X4OFunHB2WyBEXYKCrC/gpf36j36+uwtqSiUO1bd0lEursC9CBWMd1I0ltabrNMdjmEP NXubrjlpC2JgQCA2j6/7Nu4tCEoduL+bXPjqpRugc6bY+G7gMwRfaKonh+3ZwZCc7b3jajWvY9+r GNm65ulK6lCKD2GTHuItGeIwlDWSXQ62B68ZgI9HkFFLLk3dheLSClIKF5r8GrBQAuUBo2M3IUxE xJtRmREOc5wGj1QupyheRDmHVi03vYVElOEMSyycw5KFNGHLD7ibSkNS/jQ6fbjpKdx2qcgw+BRx gMYeNkh0IkFch4LoGHGLQYlE535YW6i4jRPpp2zDR+2zGp1iro2C6pSe3VkQw63d4k3jMdXH7Ojy sP6SHhYKGvzZ8/gntsm+HbRsZJB/9OTEW9c3rkIO3aQab3yIVMUWbuF6aC74Or8NpDyJO3inTmOD BCEIZ43ygknQW/2xzQ+DhNQ+IIX3Sj0rnP0qCglN6oH4EZw= -----END CERTIFICATE----- T\xc3\x9c\x42\xC4\xB0TAK UEKAE K\xC3\xB6k Sertifika Hizmet Sa\xC4\x9Flay\xc4\xb1\x63\xc4\xb1s\xc4\xb1 - S\xC3\xBCr\xC3\xBCm 3 ============================================================================================================================= -----BEGIN CERTIFICATE----- MIIFFzCCA/+gAwIBAgIBETANBgkqhkiG9w0BAQUFADCCASsxCzAJBgNVBAYTAlRSMRgwFgYDVQQH DA9HZWJ6ZSAtIEtvY2FlbGkxRzBFBgNVBAoMPlTDvHJraXllIEJpbGltc2VsIHZlIFRla25vbG9q aWsgQXJhxZ90xLFybWEgS3VydW11IC0gVMOcQsSwVEFLMUgwRgYDVQQLDD9VbHVzYWwgRWxla3Ry b25payB2ZSBLcmlwdG9sb2ppIEFyYcWfdMSxcm1hIEVuc3RpdMO8c8O8IC0gVUVLQUUxIzAhBgNV BAsMGkthbXUgU2VydGlmaWthc3lvbiBNZXJrZXppMUowSAYDVQQDDEFUw5xCxLBUQUsgVUVLQUUg S8O2ayBTZXJ0aWZpa2EgSGl6bWV0IFNhxJ9sYXnEsWPEsXPEsSAtIFPDvHLDvG0gMzAeFw0wNzA4 MjQxMTM3MDdaFw0xNzA4MjExMTM3MDdaMIIBKzELMAkGA1UEBhMCVFIxGDAWBgNVBAcMD0dlYnpl IC0gS29jYWVsaTFHMEUGA1UECgw+VMO8cmtpeWUgQmlsaW1zZWwgdmUgVGVrbm9sb2ppayBBcmHF n3TEsXJtYSBLdXJ1bXUgLSBUw5xCxLBUQUsxSDBGBgNVBAsMP1VsdXNhbCBFbGVrdHJvbmlrIHZl IEtyaXB0b2xvamkgQXJhxZ90xLFybWEgRW5zdGl0w7xzw7wgLSBVRUtBRTEjMCEGA1UECwwaS2Ft dSBTZXJ0aWZpa2FzeW9uIE1lcmtlemkxSjBIBgNVBAMMQVTDnELEsFRBSyBVRUtBRSBLw7ZrIFNl cnRpZmlrYSBIaXptZXQgU2HEn2xhecSxY8Sxc8SxIC0gU8O8csO8bSAzMIIBIjANBgkqhkiG9w0B AQEFAAOCAQ8AMIIBCgKCAQEAim1L/xCIOsP2fpTo6iBkcK4hgb46ezzb8R1Sf1n68yJMlaCQvEhO Eav7t7WNeoMojCZG2E6VQIdhn8WebYGHV2yKO7Rm6sxA/OOqbLLLAdsyv9Lrhc+hDVXDWzhXcLh1 xnnRFDDtG1hba+818qEhTsXOfJlfbLm4IpNQp81McGq+agV/E5wrHur+R84EpW+sky58K5+eeROR 6Oqeyjh1jmKwlZMq5d/pXpduIF9fhHpEORlAHLpVK/swsoHvhOPc7Jg4OQOFCKlUAwUp8MmPi+oL hmUZEdPpCSPeaJMDyTYcIW7OjGbxmTDY17PDHfiBLqi9ggtm/oLL4eAagsNAgQIDAQABo0IwQDAd BgNVHQ4EFgQUvYiHyY/2pAoLquvF/pEjnatKijIwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQF MAMBAf8wDQYJKoZIhvcNAQEFBQADggEBAB18+kmPNOm3JpIWmgV050vQbTlswyb2zrgxvMTfvCr4 N5EY3ATIZJkrGG2AA1nJrvhY0D7twyOfaTyGOBye79oneNGEN3GKPEs5z35FBtYt2IpNeBLWrcLT y9LQQfMmNkqblWwM7uXRQydmwYj3erMgbOqwaSvHIOgMA8RBBZniP+Rr+KCGgceExh/VS4ESshYh LBOhgLJeDEoTniDYYkCrkOpkSi+sDQESeUWoL4cZaMjihccwsnX5OD+ywJO0a+IDRM5noN+J1q2M dqMTw5RhK2vZbMEHCiIHhWyFJEapvj+LeISCfiQMnf2BN+MlqO02TpUsyZyQ2uypQjyttgI= -----END CERTIFICATE----- certSIGN ROOT CA ================ -----BEGIN CERTIFICATE----- MIIDODCCAiCgAwIBAgIGIAYFFnACMA0GCSqGSIb3DQEBBQUAMDsxCzAJBgNVBAYTAlJPMREwDwYD VQQKEwhjZXJ0U0lHTjEZMBcGA1UECxMQY2VydFNJR04gUk9PVCBDQTAeFw0wNjA3MDQxNzIwMDRa Fw0zMTA3MDQxNzIwMDRaMDsxCzAJBgNVBAYTAlJPMREwDwYDVQQKEwhjZXJ0U0lHTjEZMBcGA1UE CxMQY2VydFNJR04gUk9PVCBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALczuX7I JUqOtdu0KBuqV5Do0SLTZLrTk+jUrIZhQGpgV2hUhE28alQCBf/fm5oqrl0Hj0rDKH/v+yv6efHH rfAQUySQi2bJqIirr1qjAOm+ukbuW3N7LBeCgV5iLKECZbO9xSsAfsT8AzNXDe3i+s5dRdY4zTW2 ssHQnIFKquSyAVwdj1+ZxLGt24gh65AIgoDzMKND5pCCrlUoSe1b16kQOA7+j0xbm0bqQfWwCHTD 0IgztnzXdN/chNFDDnU5oSVAKOp4yw4sLjmdjItuFhwvJoIQ4uNllAoEwF73XVv4EOLQunpL+943 AAAaWyjj0pxzPjKHmKHJUS/X3qwzs08CAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8B Af8EBAMCAcYwHQYDVR0OBBYEFOCMm9slSbPxfIbWskKHC9BroNnkMA0GCSqGSIb3DQEBBQUAA4IB AQA+0hyJLjX8+HXd5n9liPRyTMks1zJO890ZeUe9jjtbkw9QSSQTaxQGcu8J06Gh40CEyecYMnQ8 SG4Pn0vU9x7Tk4ZkVJdjclDVVc/6IJMCopvDI5NOFlV2oHB5bc0hH88vLbwZ44gx+FkagQnIl6Z0 x2DEW8xXjrJ1/RsCCdtZb3KTafcxQdaIOL+Hsr0Wefmq5L6IJd1hJyMctTEHBDa0GpC9oHRxUIlt vBTjD4au8as+x6AJzKNI0eDbZOeStc+vckNwi/nDhDwTqn6Sm1dTk/pwwpEOMfmbZ13pljheX7Nz TogVZ96edhBiIL5VaZVDADlN9u6wWk5JRFRYX0KD -----END CERTIFICATE----- GeoTrust Primary Certification Authority - G3 ============================================= -----BEGIN CERTIFICATE----- MIID/jCCAuagAwIBAgIQFaxulBmyeUtB9iepwxgPHzANBgkqhkiG9w0BAQsFADCBmDELMAkGA1UE BhMCVVMxFjAUBgNVBAoTDUdlb1RydXN0IEluYy4xOTA3BgNVBAsTMChjKSAyMDA4IEdlb1RydXN0 IEluYy4gLSBGb3IgYXV0aG9yaXplZCB1c2Ugb25seTE2MDQGA1UEAxMtR2VvVHJ1c3QgUHJpbWFy eSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIEczMB4XDTA4MDQwMjAwMDAwMFoXDTM3MTIwMTIz NTk1OVowgZgxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMTkwNwYDVQQLEzAo YykgMjAwOCBHZW9UcnVzdCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxNjA0BgNVBAMT LUdlb1RydXN0IFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMzCCASIwDQYJKoZI hvcNAQEBBQADggEPADCCAQoCggEBANziXmJYHTNXOTIz+uvLh4yn1ErdBojqZI4xmKU4kB6Yzy5j K/BGvESyiaHAKAxJcCGVn2TAppMSAmUmhsalifD614SgcK9PGpc/BkTVyetyEH3kMSj7HGHmKAdE c5IiaacDiGydY8hS2pgn5whMcD60yRLBxWeDXTPzAxHsatBT4tG6NmCUgLthY2xbF37fQJQeqw3C IShwiP/WJmxsYAQlTlV+fe+/lEjetx3dcI0FX4ilm/LC7urRQEFtYjgdVgbFA0dRIBn8exALDmKu dlW/X3e+PkkBUz2YJQN2JFodtNuJ6nnltrM7P7pMKEF/BqxqjsHQ9gUdfeZChuOl1UcCAwEAAaNC MEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFMR5yo6hTgMdHNxr 2zFblD4/MH8tMA0GCSqGSIb3DQEBCwUAA4IBAQAtxRPPVoB7eni9n64smefv2t+UXglpp+duaIy9 cr5HqQ6XErhK8WTTOd8lNNTBzU6B8A8ExCSzNJbGpqow32hhc9f5joWJ7w5elShKKiePEI4ufIbE Ap7aDHdlDkQNkv39sxY2+hENHYwOB4lqKVb3cvTdFZx3NWZXqxNT2I7BQMXXExZacse3aQHEerGD AWh9jUGhlBjBJVz88P6DAod8DQ3PLghcSkANPuyBYeYk28rgDi0Hsj5W3I31QYUHSJsMC8tJP33s t/3LjWeJGqvtux6jAAgIFyqCXDFdRootD4abdNlF+9RAsXqqaC2Gspki4cErx5z481+oghLrGREt -----END CERTIFICATE----- thawte Primary Root CA - G2 =========================== -----BEGIN CERTIFICATE----- MIICiDCCAg2gAwIBAgIQNfwmXNmET8k9Jj1Xm67XVjAKBggqhkjOPQQDAzCBhDELMAkGA1UEBhMC VVMxFTATBgNVBAoTDHRoYXd0ZSwgSW5jLjE4MDYGA1UECxMvKGMpIDIwMDcgdGhhd3RlLCBJbmMu IC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxJDAiBgNVBAMTG3RoYXd0ZSBQcmltYXJ5IFJvb3Qg Q0EgLSBHMjAeFw0wNzExMDUwMDAwMDBaFw0zODAxMTgyMzU5NTlaMIGEMQswCQYDVQQGEwJVUzEV MBMGA1UEChMMdGhhd3RlLCBJbmMuMTgwNgYDVQQLEy8oYykgMjAwNyB0aGF3dGUsIEluYy4gLSBG b3IgYXV0aG9yaXplZCB1c2Ugb25seTEkMCIGA1UEAxMbdGhhd3RlIFByaW1hcnkgUm9vdCBDQSAt IEcyMHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEotWcgnuVnfFSeIf+iha/BebfowJPDQfGAFG6DAJS LSKkQjnE/o/qycG+1E3/n3qe4rF8mq2nhglzh9HnmuN6papu+7qzcMBniKI11KOasf2twu8x+qi5 8/sIxpHR+ymVo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQU mtgAMADna3+FGO6Lts6KDPgR4bswCgYIKoZIzj0EAwMDaQAwZgIxAN344FdHW6fmCsO99YCKlzUN G4k8VIZ3KMqh9HneteY4sPBlcIx/AlTCv//YoT7ZzwIxAMSNlPzcU9LcnXgWHxUzI1NS41oxXZ3K rr0TKUQNJ1uo52icEvdYPy5yAlejj6EULg== -----END CERTIFICATE----- thawte Primary Root CA - G3 =========================== -----BEGIN CERTIFICATE----- MIIEKjCCAxKgAwIBAgIQYAGXt0an6rS0mtZLL/eQ+zANBgkqhkiG9w0BAQsFADCBrjELMAkGA1UE BhMCVVMxFTATBgNVBAoTDHRoYXd0ZSwgSW5jLjEoMCYGA1UECxMfQ2VydGlmaWNhdGlvbiBTZXJ2 aWNlcyBEaXZpc2lvbjE4MDYGA1UECxMvKGMpIDIwMDggdGhhd3RlLCBJbmMuIC0gRm9yIGF1dGhv cml6ZWQgdXNlIG9ubHkxJDAiBgNVBAMTG3RoYXd0ZSBQcmltYXJ5IFJvb3QgQ0EgLSBHMzAeFw0w ODA0MDIwMDAwMDBaFw0zNzEyMDEyMzU5NTlaMIGuMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMdGhh d3RlLCBJbmMuMSgwJgYDVQQLEx9DZXJ0aWZpY2F0aW9uIFNlcnZpY2VzIERpdmlzaW9uMTgwNgYD VQQLEy8oYykgMjAwOCB0aGF3dGUsIEluYy4gLSBGb3IgYXV0aG9yaXplZCB1c2Ugb25seTEkMCIG A1UEAxMbdGhhd3RlIFByaW1hcnkgUm9vdCBDQSAtIEczMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A MIIBCgKCAQEAsr8nLPvb2FvdeHsbnndmgcs+vHyu86YnmjSjaDFxODNi5PNxZnmxqWWjpYvVj2At P0LMqmsywCPLLEHd5N/8YZzic7IilRFDGF/Eth9XbAoFWCLINkw6fKXRz4aviKdEAhN0cXMKQlkC +BsUa0Lfb1+6a4KinVvnSr0eAXLbS3ToO39/fR8EtCab4LRarEc9VbjXsCZSKAExQGbY2SS99irY 7CFJXJv2eul/VTV+lmuNk5Mny5K76qxAwJ/C+IDPXfRa3M50hqY+bAtTyr2SzhkGcuYMXDhpxwTW vGzOW/b3aJzcJRVIiKHpqfiYnODz1TEoYRFsZ5aNOZnLwkUkOQIDAQABo0IwQDAPBgNVHRMBAf8E BTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUrWyqlGCc7eT/+j4KdCtjA/e2Wb8wDQYJ KoZIhvcNAQELBQADggEBABpA2JVlrAmSicY59BDlqQ5mU1143vokkbvnRFHfxhY0Cu9qRFHqKweK A3rD6z8KLFIWoCtDuSWQP3CpMyVtRRooOyfPqsMpQhvfO0zAMzRbQYi/aytlryjvsvXDqmbOe1bu t8jLZ8HJnBoYuMTDSQPxYA5QzUbF83d597YV4Djbxy8ooAw/dyZ02SUS2jHaGh7cKUGRIjxpp7sC 8rZcJwOJ9Abqm+RyguOhCcHpABnTPtRwa7pxpqpYrvS76Wy274fMm7v/OeZWYdMKp8RcTGB7BXcm er/YB1IsYvdwY9k5vG8cwnncdimvzsUsZAReiDZuMdRAGmI0Nj81Aa6sY6A= -----END CERTIFICATE----- GeoTrust Primary Certification Authority - G2 ============================================= -----BEGIN CERTIFICATE----- MIICrjCCAjWgAwIBAgIQPLL0SAoA4v7rJDteYD7DazAKBggqhkjOPQQDAzCBmDELMAkGA1UEBhMC VVMxFjAUBgNVBAoTDUdlb1RydXN0IEluYy4xOTA3BgNVBAsTMChjKSAyMDA3IEdlb1RydXN0IElu Yy4gLSBGb3IgYXV0aG9yaXplZCB1c2Ugb25seTE2MDQGA1UEAxMtR2VvVHJ1c3QgUHJpbWFyeSBD ZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIEcyMB4XDTA3MTEwNTAwMDAwMFoXDTM4MDExODIzNTk1 OVowgZgxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMTkwNwYDVQQLEzAoYykg MjAwNyBHZW9UcnVzdCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxNjA0BgNVBAMTLUdl b1RydXN0IFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjB2MBAGByqGSM49AgEG BSuBBAAiA2IABBWx6P0DFUPlrOuHNxFi79KDNlJ9RVcLSo17VDs6bl8VAsBQps8lL33KSLjHUGMc KiEIfJo22Av+0SbFWDEwKCXzXV2juLaltJLtbCyf691DiaI8S0iRHVDsJt/WYC69IaNCMEAwDwYD VR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFBVfNVdRVfslsq0DafwBo/q+ EVXVMAoGCCqGSM49BAMDA2cAMGQCMGSWWaboCd6LuvpaiIjwH5HTRqjySkwCY/tsXzjbLkGTqQ7m ndwxHLKgpxgceeHHNgIwOlavmnRs9vuD4DPTCF+hnMJbn0bWtsuRBmOiBuczrD6ogRLQy7rQkgu2 npaqBA+K -----END CERTIFICATE----- VeriSign Universal Root Certification Authority =============================================== -----BEGIN CERTIFICATE----- MIIEuTCCA6GgAwIBAgIQQBrEZCGzEyEDDrvkEhrFHTANBgkqhkiG9w0BAQsFADCBvTELMAkGA1UE BhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQLExZWZXJpU2lnbiBUcnVzdCBO ZXR3b3JrMTowOAYDVQQLEzEoYykgMjAwOCBWZXJpU2lnbiwgSW5jLiAtIEZvciBhdXRob3JpemVk IHVzZSBvbmx5MTgwNgYDVQQDEy9WZXJpU2lnbiBVbml2ZXJzYWwgUm9vdCBDZXJ0aWZpY2F0aW9u IEF1dGhvcml0eTAeFw0wODA0MDIwMDAwMDBaFw0zNzEyMDEyMzU5NTlaMIG9MQswCQYDVQQGEwJV UzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdv cmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNl IG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNhbCBSb290IENlcnRpZmljYXRpb24gQXV0 aG9yaXR5MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAx2E3XrEBNNti1xWb/1hajCMj 1mCOkdeQmIN65lgZOIzF9uVkhbSicfvtvbnazU0AtMgtc6XHaXGVHzk8skQHnOgO+k1KxCHfKWGP MiJhgsWHH26MfF8WIFFE0XBPV+rjHOPMee5Y2A7Cs0WTwCznmhcrewA3ekEzeOEz4vMQGn+HLL72 9fdC4uW/h2KJXwBL38Xd5HVEMkE6HnFuacsLdUYI0crSK5XQz/u5QGtkjFdN/BMReYTtXlT2NJ8I AfMQJQYXStrxHXpma5hgZqTZ79IugvHw7wnqRMkVauIDbjPTrJ9VAMf2CGqUuV/c4DPxhGD5WycR tPwW8rtWaoAljQIDAQABo4GyMIGvMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMG0G CCsGAQUFBwEMBGEwX6FdoFswWTBXMFUWCWltYWdlL2dpZjAhMB8wBwYFKw4DAhoEFI/l0xqGrI2O a8PPgGrUSBgsexkuMCUWI2h0dHA6Ly9sb2dvLnZlcmlzaWduLmNvbS92c2xvZ28uZ2lmMB0GA1Ud DgQWBBS2d/ppSEefUxLVwuoHMnYH0ZcHGTANBgkqhkiG9w0BAQsFAAOCAQEASvj4sAPmLGd75JR3 Y8xuTPl9Dg3cyLk1uXBPY/ok+myDjEedO2Pzmvl2MpWRsXe8rJq+seQxIcaBlVZaDrHC1LGmWazx Y8u4TB1ZkErvkBYoH1quEPuBUDgMbMzxPcP1Y+Oz4yHJJDnp/RVmRvQbEdBNc6N9Rvk97ahfYtTx P/jgdFcrGJ2BtMQo2pSXpXDrrB2+BxHw1dvd5Yzw1TKwg+ZX4o+/vqGqvz0dtdQ46tewXDpPaj+P wGZsY6rp2aQW9IHRlRQOfc2VNNnSj3BzgXucfr2YYdhFh5iQxeuGMMY1v/D/w1WIg0vvBZIGcfK4 mJO37M2CYfE45k+XmCpajQ== -----END CERTIFICATE----- VeriSign Class 3 Public Primary Certification Authority - G4 ============================================================ -----BEGIN CERTIFICATE----- MIIDhDCCAwqgAwIBAgIQL4D+I4wOIg9IZxIokYesszAKBggqhkjOPQQDAzCByjELMAkGA1UEBhMC VVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQLExZWZXJpU2lnbiBUcnVzdCBOZXR3 b3JrMTowOAYDVQQLEzEoYykgMjAwNyBWZXJpU2lnbiwgSW5jLiAtIEZvciBhdXRob3JpemVkIHVz ZSBvbmx5MUUwQwYDVQQDEzxWZXJpU2lnbiBDbGFzcyAzIFB1YmxpYyBQcmltYXJ5IENlcnRpZmlj YXRpb24gQXV0aG9yaXR5IC0gRzQwHhcNMDcxMTA1MDAwMDAwWhcNMzgwMTE4MjM1OTU5WjCByjEL MAkGA1UEBhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQLExZWZXJpU2lnbiBU cnVzdCBOZXR3b3JrMTowOAYDVQQLEzEoYykgMjAwNyBWZXJpU2lnbiwgSW5jLiAtIEZvciBhdXRo b3JpemVkIHVzZSBvbmx5MUUwQwYDVQQDEzxWZXJpU2lnbiBDbGFzcyAzIFB1YmxpYyBQcmltYXJ5 IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0gRzQwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAASnVnp8 Utpkmw4tXNherJI9/gHmGUo9FANL+mAnINmDiWn6VMaaGF5VKmTeBvaNSjutEDxlPZCIBIngMGGz rl0Bp3vefLK+ymVhAIau2o970ImtTR1ZmkGxvEeA3J5iw/mjgbIwga8wDwYDVR0TAQH/BAUwAwEB /zAOBgNVHQ8BAf8EBAMCAQYwbQYIKwYBBQUHAQwEYTBfoV2gWzBZMFcwVRYJaW1hZ2UvZ2lmMCEw HzAHBgUrDgMCGgQUj+XTGoasjY5rw8+AatRIGCx7GS4wJRYjaHR0cDovL2xvZ28udmVyaXNpZ24u Y29tL3ZzbG9nby5naWYwHQYDVR0OBBYEFLMWkf3upm7ktS5Jj4d4gYDs5bG1MAoGCCqGSM49BAMD A2gAMGUCMGYhDBgmYFo4e1ZC4Kf8NoRRkSAsdk1DPcQdhCPQrNZ8NQbOzWm9kA3bbEhCHQ6qQgIx AJw9SDkjOVgaFRJZap7v1VmyHVIsmXHNxynfGyphe3HR3vPA5Q06Sqotp9iGKt0uEA== -----END CERTIFICATE----- NetLock Arany (Class Gold) Főtanúsítvány ======================================== -----BEGIN CERTIFICATE----- MIIEFTCCAv2gAwIBAgIGSUEs5AAQMA0GCSqGSIb3DQEBCwUAMIGnMQswCQYDVQQGEwJIVTERMA8G A1UEBwwIQnVkYXBlc3QxFTATBgNVBAoMDE5ldExvY2sgS2Z0LjE3MDUGA1UECwwuVGFuw7pzw610 dsOhbnlraWFkw7NrIChDZXJ0aWZpY2F0aW9uIFNlcnZpY2VzKTE1MDMGA1UEAwwsTmV0TG9jayBB cmFueSAoQ2xhc3MgR29sZCkgRsWRdGFuw7pzw610dsOhbnkwHhcNMDgxMjExMTUwODIxWhcNMjgx MjA2MTUwODIxWjCBpzELMAkGA1UEBhMCSFUxETAPBgNVBAcMCEJ1ZGFwZXN0MRUwEwYDVQQKDAxO ZXRMb2NrIEtmdC4xNzA1BgNVBAsMLlRhbsO6c8OtdHbDoW55a2lhZMOzayAoQ2VydGlmaWNhdGlv biBTZXJ2aWNlcykxNTAzBgNVBAMMLE5ldExvY2sgQXJhbnkgKENsYXNzIEdvbGQpIEbFkXRhbsO6 c8OtdHbDoW55MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAxCRec75LbRTDofTjl5Bu 0jBFHjzuZ9lk4BqKf8owyoPjIMHj9DrTlF8afFttvzBPhCf2nx9JvMaZCpDyD/V/Q4Q3Y1GLeqVw /HpYzY6b7cNGbIRwXdrzAZAj/E4wqX7hJ2Pn7WQ8oLjJM2P+FpD/sLj916jAwJRDC7bVWaaeVtAk H3B5r9s5VA1lddkVQZQBr17s9o3x/61k/iCa11zr/qYfCGSji3ZVrR47KGAuhyXoqq8fxmRGILdw fzzeSNuWU7c5d+Qa4scWhHaXWy+7GRWF+GmF9ZmnqfI0p6m2pgP8b4Y9VHx2BJtr+UBdADTHLpl1 neWIA6pN+APSQnbAGwIDAKiLo0UwQzASBgNVHRMBAf8ECDAGAQH/AgEEMA4GA1UdDwEB/wQEAwIB BjAdBgNVHQ4EFgQUzPpnk/C2uNClwB7zU/2MU9+D15YwDQYJKoZIhvcNAQELBQADggEBAKt/7hwW qZw8UQCgwBEIBaeZ5m8BiFRhbvG5GK1Krf6BQCOUL/t1fC8oS2IkgYIL9WHxHG64YTjrgfpioTta YtOUZcTh5m2C+C8lcLIhJsFyUR+MLMOEkMNaj7rP9KdlpeuY0fsFskZ1FSNqb4VjMIDw1Z4fKRzC bLBQWV2QWzuoDTDPv31/zvGdg73JRm4gpvlhUbohL3u+pRVjodSVh/GeufOJ8z2FuLjbvrW5Kfna NwUASZQDhETnv0Mxz3WLJdH0pmT1kvarBes96aULNmLazAZfNou2XjG4Kvte9nHfRCaexOYNkbQu dZWAUWpLMKawYqGT8ZvYzsRjdT9ZR7E= -----END CERTIFICATE----- Staat der Nederlanden Root CA - G2 ================================== -----BEGIN CERTIFICATE----- MIIFyjCCA7KgAwIBAgIEAJiWjDANBgkqhkiG9w0BAQsFADBaMQswCQYDVQQGEwJOTDEeMBwGA1UE CgwVU3RhYXQgZGVyIE5lZGVybGFuZGVuMSswKQYDVQQDDCJTdGFhdCBkZXIgTmVkZXJsYW5kZW4g Um9vdCBDQSAtIEcyMB4XDTA4MDMyNjExMTgxN1oXDTIwMDMyNTExMDMxMFowWjELMAkGA1UEBhMC TkwxHjAcBgNVBAoMFVN0YWF0IGRlciBOZWRlcmxhbmRlbjErMCkGA1UEAwwiU3RhYXQgZGVyIE5l ZGVybGFuZGVuIFJvb3QgQ0EgLSBHMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMVZ 5291qj5LnLW4rJ4L5PnZyqtdj7U5EILXr1HgO+EASGrP2uEGQxGZqhQlEq0i6ABtQ8SpuOUfiUtn vWFI7/3S4GCI5bkYYCjDdyutsDeqN95kWSpGV+RLufg3fNU254DBtvPUZ5uW6M7XxgpT0GtJlvOj CwV3SPcl5XCsMBQgJeN/dVrlSPhOewMHBPqCYYdu8DvEpMfQ9XQ+pV0aCPKbJdL2rAQmPlU6Yiil e7Iwr/g3wtG61jj99O9JMDeZJiFIhQGp5Rbn3JBV3w/oOM2ZNyFPXfUib2rFEhZgF1XyZWampzCR OME4HYYEhLoaJXhena/MUGDWE4dS7WMfbWV9whUYdMrhfmQpjHLYFhN9C0lK8SgbIHRrxT3dsKpI CT0ugpTNGmXZK4iambwYfp/ufWZ8Pr2UuIHOzZgweMFvZ9C+X+Bo7d7iscksWXiSqt8rYGPy5V65 48r6f1CGPqI0GAwJaCgRHOThuVw+R7oyPxjMW4T182t0xHJ04eOLoEq9jWYv6q012iDTiIJh8BIi trzQ1aTsr1SIJSQ8p22xcik/Plemf1WvbibG/ufMQFxRRIEKeN5KzlW/HdXZt1bv8Hb/C3m1r737 qWmRRpdogBQ2HbN/uymYNqUg+oJgYjOk7Na6B6duxc8UpufWkjTYgfX8HV2qXB72o007uPc5AgMB AAGjgZcwgZQwDwYDVR0TAQH/BAUwAwEB/zBSBgNVHSAESzBJMEcGBFUdIAAwPzA9BggrBgEFBQcC ARYxaHR0cDovL3d3dy5wa2lvdmVyaGVpZC5ubC9wb2xpY2llcy9yb290LXBvbGljeS1HMjAOBgNV HQ8BAf8EBAMCAQYwHQYDVR0OBBYEFJFoMocVHYnitfGsNig0jQt8YojrMA0GCSqGSIb3DQEBCwUA A4ICAQCoQUpnKpKBglBu4dfYszk78wIVCVBR7y29JHuIhjv5tLySCZa59sCrI2AGeYwRTlHSeYAz +51IvuxBQ4EffkdAHOV6CMqqi3WtFMTC6GY8ggen5ieCWxjmD27ZUD6KQhgpxrRW/FYQoAUXvQwj f/ST7ZwaUb7dRUG/kSS0H4zpX897IZmflZ85OkYcbPnNe5yQzSipx6lVu6xiNGI1E0sUOlWDuYaN kqbG9AclVMwWVxJKgnjIFNkXgiYtXSAfea7+1HAWFpWD2DU5/1JddRwWxRNVz0fMdWVSSt7wsKfk CpYL+63C4iWEst3kvX5ZbJvw8NjnyvLplzh+ib7M+zkXYT9y2zqR2GUBGR2tUKRXCnxLvJxxcypF URmFzI79R6d0lR2o0a9OF7FpJsKqeFdbxU2n5Z4FF5TKsl+gSRiNNOkmbEgeqmiSBeGCc1qb3Adb CG19ndeNIdn8FCCqwkXfP+cAslHkwvgFuXkajDTznlvkN1trSt8sV4pAWja63XVECDdCcAz+3F4h oKOKwJCcaNpQ5kUQR3i2TtJlycM33+FCY7BXN0Ute4qcvwXqZVUz9zkQxSgqIXobisQk+T8VyJoV IPVVYpbtbZNQvOSqeK3Zywplh6ZmwcSBo3c6WB4L7oOLnR7SUqTMHW+wmG2UMbX4cQrcufx9MmDm 66+KAQ== -----END CERTIFICATE----- Hongkong Post Root CA 1 ======================= -----BEGIN CERTIFICATE----- MIIDMDCCAhigAwIBAgICA+gwDQYJKoZIhvcNAQEFBQAwRzELMAkGA1UEBhMCSEsxFjAUBgNVBAoT DUhvbmdrb25nIFBvc3QxIDAeBgNVBAMTF0hvbmdrb25nIFBvc3QgUm9vdCBDQSAxMB4XDTAzMDUx NTA1MTMxNFoXDTIzMDUxNTA0NTIyOVowRzELMAkGA1UEBhMCSEsxFjAUBgNVBAoTDUhvbmdrb25n IFBvc3QxIDAeBgNVBAMTF0hvbmdrb25nIFBvc3QgUm9vdCBDQSAxMIIBIjANBgkqhkiG9w0BAQEF AAOCAQ8AMIIBCgKCAQEArP84tulmAknjorThkPlAj3n54r15/gK97iSSHSL22oVyaf7XPwnU3ZG1 ApzQjVrhVcNQhrkpJsLj2aDxaQMoIIBFIi1WpztUlVYiWR8o3x8gPW2iNr4joLFutbEnPzlTCeqr auh0ssJlXI6/fMN4hM2eFvz1Lk8gKgifd/PFHsSaUmYeSF7jEAaPIpjhZY4bXSNmO7ilMlHIhqqh qZ5/dpTCpmy3QfDVyAY45tQM4vM7TG1QjMSDJ8EThFk9nnV0ttgCXjqQesBCNnLsak3c78QA3xMY V18meMjWCnl3v/evt3a5pQuEF10Q6m/hq5URX208o1xNg1vysxmKgIsLhwIDAQABoyYwJDASBgNV HRMBAf8ECDAGAQH/AgEDMA4GA1UdDwEB/wQEAwIBxjANBgkqhkiG9w0BAQUFAAOCAQEADkbVPK7i h9legYsCmEEIjEy82tvuJxuC52pF7BaLT4Wg87JwvVqWuspube5Gi27nKi6Wsxkz67SfqLI37pio l7Yutmcn1KZJ/RyTZXaeQi/cImyaT/JaFTmxcdcrUehtHJjA2Sr0oYJ71clBoiMBdDhViw+5Lmei IAQ32pwL0xch4I+XeTRvhEgCIDMb5jREn5Fw9IBehEPCKdJsEhTkYY2sEJCehFC78JZvRZ+K88ps T/oROhUVRsPNH4NbLUES7VBnQRM9IauUiqpOfMGx+6fWtScvl6tu4B3i0RwsH0Ti/L6RoZz71ilT c4afU9hDDl3WY4JxHYB0yvbiAmvZWg== -----END CERTIFICATE----- SecureSign RootCA11 =================== -----BEGIN CERTIFICATE----- MIIDbTCCAlWgAwIBAgIBATANBgkqhkiG9w0BAQUFADBYMQswCQYDVQQGEwJKUDErMCkGA1UEChMi SmFwYW4gQ2VydGlmaWNhdGlvbiBTZXJ2aWNlcywgSW5jLjEcMBoGA1UEAxMTU2VjdXJlU2lnbiBS b290Q0ExMTAeFw0wOTA0MDgwNDU2NDdaFw0yOTA0MDgwNDU2NDdaMFgxCzAJBgNVBAYTAkpQMSsw KQYDVQQKEyJKYXBhbiBDZXJ0aWZpY2F0aW9uIFNlcnZpY2VzLCBJbmMuMRwwGgYDVQQDExNTZWN1 cmVTaWduIFJvb3RDQTExMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA/XeqpRyQBTvL TJszi1oURaTnkBbR31fSIRCkF/3frNYfp+TbfPfs37gD2pRY/V1yfIw/XwFndBWW4wI8h9uuywGO wvNmxoVF9ALGOrVisq/6nL+k5tSAMJjzDbaTj6nU2DbysPyKyiyhFTOVMdrAG/LuYpmGYz+/3ZMq g6h2uRMft85OQoWPIucuGvKVCbIFtUROd6EgvanyTgp9UK31BQ1FT0Zx/Sg+U/sE2C3XZR1KG/rP O7AxmjVuyIsG0wCR8pQIZUyxNAYAeoni8McDWc/V1uinMrPmmECGxc0nEovMe863ETxiYAcjPitA bpSACW22s293bzUIUPsCh8U+iQIDAQABo0IwQDAdBgNVHQ4EFgQUW/hNT7KlhtQ60vFjmqC+CfZX t94wDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEFBQADggEBAKCh OBZmLqdWHyGcBvod7bkixTgm2E5P7KN/ed5GIaGHd48HCJqypMWvDzKYC3xmKbabfSVSSUOrTC4r bnpwrxYO4wJs+0LmGJ1F2FXI6Dvd5+H0LgscNFxsWEr7jIhQX5Ucv+2rIrVls4W6ng+4reV6G4pQ Oh29Dbx7VFALuUKvVaAYga1lme++5Jy/xIWrQbJUb9wlze144o4MjQlJ3WN7WmmWAiGovVJZ6X01 y8hSyn+B/tlr0/cR7SXf+Of5pPpyl4RTDaXQMhhRdlkUbA/r7F+AjHVDg8OFmP9Mni0N5HeDk061 lgeLKBObjBmNQSdJQO7e5iNEOdyhIta6A/I= -----END CERTIFICATE----- ACEDICOM Root ============= -----BEGIN CERTIFICATE----- MIIFtTCCA52gAwIBAgIIYY3HhjsBggUwDQYJKoZIhvcNAQEFBQAwRDEWMBQGA1UEAwwNQUNFRElD T00gUm9vdDEMMAoGA1UECwwDUEtJMQ8wDQYDVQQKDAZFRElDT00xCzAJBgNVBAYTAkVTMB4XDTA4 MDQxODE2MjQyMloXDTI4MDQxMzE2MjQyMlowRDEWMBQGA1UEAwwNQUNFRElDT00gUm9vdDEMMAoG A1UECwwDUEtJMQ8wDQYDVQQKDAZFRElDT00xCzAJBgNVBAYTAkVTMIICIjANBgkqhkiG9w0BAQEF AAOCAg8AMIICCgKCAgEA/5KV4WgGdrQsyFhIyv2AVClVYyT/kGWbEHV7w2rbYgIB8hiGtXxaOLHk WLn709gtn70yN78sFW2+tfQh0hOR2QetAQXW8713zl9CgQr5auODAKgrLlUTY4HKRxx7XBZXehuD YAQ6PmXDzQHe3qTWDLqO3tkE7hdWIpuPY/1NFgu3e3eM+SW10W2ZEi5PGrjm6gSSrj0RuVFCPYew MYWveVqc/udOXpJPQ/yrOq2lEiZmueIM15jO1FillUAKt0SdE3QrwqXrIhWYENiLxQSfHY9g5QYb m8+5eaA9oiM/Qj9r+hwDezCNzmzAv+YbX79nuIQZ1RXve8uQNjFiybwCq0Zfm/4aaJQ0PZCOrfbk HQl/Sog4P75n/TSW9R28MHTLOO7VbKvU/PQAtwBbhTIWdjPp2KOZnQUAqhbm84F9b32qhm2tFXTT xKJxqvQUfecyuB+81fFOvW8XAjnXDpVCOscAPukmYxHqC9FK/xidstd7LzrZlvvoHpKuE1XI2Sf2 3EgbsCTBheN3nZqk8wwRHQ3ItBTutYJXCb8gWH8vIiPYcMt5bMlL8qkqyPyHK9caUPgn6C9D4zq9 2Fdx/c6mUlv53U3t5fZvie27k5x2IXXwkkwp9y+cAS7+UEaeZAwUswdbxcJzbPEHXEUkFDWug/Fq TYl6+rPYLWbwNof1K1MCAwEAAaOBqjCBpzAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFKaz 4SsrSbbXc6GqlPUB53NlTKxQMA4GA1UdDwEB/wQEAwIBhjAdBgNVHQ4EFgQUprPhKytJttdzoaqU 9QHnc2VMrFAwRAYDVR0gBD0wOzA5BgRVHSAAMDEwLwYIKwYBBQUHAgEWI2h0dHA6Ly9hY2VkaWNv bS5lZGljb21ncm91cC5jb20vZG9jMA0GCSqGSIb3DQEBBQUAA4ICAQDOLAtSUWImfQwng4/F9tqg aHtPkl7qpHMyEVNEskTLnewPeUKzEKbHDZ3Ltvo/Onzqv4hTGzz3gvoFNTPhNahXwOf9jU8/kzJP eGYDdwdY6ZXIfj7QeQCM8htRM5u8lOk6e25SLTKeI6RF+7YuE7CLGLHdztUdp0J/Vb77W7tH1Pwk zQSulgUV1qzOMPPKC8W64iLgpq0i5ALudBF/TP94HTXa5gI06xgSYXcGCRZj6hitoocf8seACQl1 ThCojz2GuHURwCRiipZ7SkXp7FnFvmuD5uHorLUwHv4FB4D54SMNUI8FmP8sX+g7tq3PgbUhh8oI KiMnMCArz+2UW6yyetLHKKGKC5tNSixthT8Jcjxn4tncB7rrZXtaAWPWkFtPF2Y9fwsZo5NjEFIq nxQWWOLcpfShFosOkYuByptZ+thrkQdlVV9SH686+5DdaaVbnG0OLLb6zqylfDJKZ0DcMDQj3dcE I2bw/FWAp/tmGYI1Z2JwOV5vx+qQQEQIHriy1tvuWacNGHk0vFQYXlPKNFHtRQrmjseCNj6nOGOp MCwXEGCSn1WHElkQwg9naRHMTh5+Spqtr0CodaxWkHS4oJyleW/c6RrIaQXpuvoDs3zk4E7Czp3o tkYNbn5XOmeUwssfnHdKZ05phkOTOPu220+DkdRgfks+KzgHVZhepA== -----END CERTIFICATE----- Microsec e-Szigno Root CA 2009 ============================== -----BEGIN CERTIFICATE----- MIIECjCCAvKgAwIBAgIJAMJ+QwRORz8ZMA0GCSqGSIb3DQEBCwUAMIGCMQswCQYDVQQGEwJIVTER MA8GA1UEBwwIQnVkYXBlc3QxFjAUBgNVBAoMDU1pY3Jvc2VjIEx0ZC4xJzAlBgNVBAMMHk1pY3Jv c2VjIGUtU3ppZ25vIFJvb3QgQ0EgMjAwOTEfMB0GCSqGSIb3DQEJARYQaW5mb0BlLXN6aWduby5o dTAeFw0wOTA2MTYxMTMwMThaFw0yOTEyMzAxMTMwMThaMIGCMQswCQYDVQQGEwJIVTERMA8GA1UE BwwIQnVkYXBlc3QxFjAUBgNVBAoMDU1pY3Jvc2VjIEx0ZC4xJzAlBgNVBAMMHk1pY3Jvc2VjIGUt U3ppZ25vIFJvb3QgQ0EgMjAwOTEfMB0GCSqGSIb3DQEJARYQaW5mb0BlLXN6aWduby5odTCCASIw DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAOn4j/NjrdqG2KfgQvvPkd6mJviZpWNwrZuuyjNA fW2WbqEORO7hE52UQlKavXWFdCyoDh2Tthi3jCyoz/tccbna7P7ofo/kLx2yqHWH2Leh5TvPmUpG 0IMZfcChEhyVbUr02MelTTMuhTlAdX4UfIASmFDHQWe4oIBhVKZsTh/gnQ4H6cm6M+f+wFUoLAKA pxn1ntxVUwOXewdI/5n7N4okxFnMUBBjjqqpGrCEGob5X7uxUG6k0QrM1XF+H6cbfPVTbiJfyyvm 1HxdrtbCxkzlBQHZ7Vf8wSN5/PrIJIOV87VqUQHQd9bpEqH5GoP7ghu5sJf0dgYzQ0mg/wu1+rUC AwEAAaOBgDB+MA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBTLD8bf QkPMPcu1SCOhGnqmKrs0aDAfBgNVHSMEGDAWgBTLD8bfQkPMPcu1SCOhGnqmKrs0aDAbBgNVHREE FDASgRBpbmZvQGUtc3ppZ25vLmh1MA0GCSqGSIb3DQEBCwUAA4IBAQDJ0Q5eLtXMs3w+y/w9/w0o lZMEyL/azXm4Q5DwpL7v8u8hmLzU1F0G9u5C7DBsoKqpyvGvivo/C3NqPuouQH4frlRheesuCDfX I/OMn74dseGkddug4lQUsbocKaQY9hK6ohQU4zE1yED/t+AFdlfBHFny+L/k7SViXITwfn4fs775 tyERzAMBVnCnEJIeGzSBHq2cGsMEPO0CYdYeBvNfOofyK/FFh+U9rNHHV4S9a67c2Pm2G2JwCz02 yULyMtd6YebS2z3PyKnJm9zbWETXbzivf3jTo60adbocwTZ8jx5tHMN1Rq41Bab2XD0h7lbwyYIi LXpUq3DDfSJlgnCW -----END CERTIFICATE----- GlobalSign Root CA - R3 ======================= -----BEGIN CERTIFICATE----- MIIDXzCCAkegAwIBAgILBAAAAAABIVhTCKIwDQYJKoZIhvcNAQELBQAwTDEgMB4GA1UECxMXR2xv YmFsU2lnbiBSb290IENBIC0gUjMxEzARBgNVBAoTCkdsb2JhbFNpZ24xEzARBgNVBAMTCkdsb2Jh bFNpZ24wHhcNMDkwMzE4MTAwMDAwWhcNMjkwMzE4MTAwMDAwWjBMMSAwHgYDVQQLExdHbG9iYWxT aWduIFJvb3QgQ0EgLSBSMzETMBEGA1UEChMKR2xvYmFsU2lnbjETMBEGA1UEAxMKR2xvYmFsU2ln bjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMwldpB5BngiFvXAg7aEyiie/QV2EcWt iHL8RgJDx7KKnQRfJMsuS+FggkbhUqsMgUdwbN1k0ev1LKMPgj0MK66X17YUhhB5uzsTgHeMCOFJ 0mpiLx9e+pZo34knlTifBtc+ycsmWQ1z3rDI6SYOgxXG71uL0gRgykmmKPZpO/bLyCiR5Z2KYVc3 rHQU3HTgOu5yLy6c+9C7v/U9AOEGM+iCK65TpjoWc4zdQQ4gOsC0p6Hpsk+QLjJg6VfLuQSSaGjl OCZgdbKfd/+RFO+uIEn8rUAVSNECMWEZXriX7613t2Saer9fwRPvm2L7DWzgVGkWqQPabumDk3F2 xmmFghcCAwEAAaNCMEAwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYE FI/wS3+oLkUkrk1Q+mOai97i3Ru8MA0GCSqGSIb3DQEBCwUAA4IBAQBLQNvAUKr+yAzv95ZURUm7 lgAJQayzE4aGKAczymvmdLm6AC2upArT9fHxD4q/c2dKg8dEe3jgr25sbwMpjjM5RcOO5LlXbKr8 EpbsU8Yt5CRsuZRj+9xTaGdWPoO4zzUhw8lo/s7awlOqzJCK6fBdRoyV3XpYKBovHd7NADdBj+1E bddTKJd+82cEHhXXipa0095MJ6RMG3NzdvQXmcIfeg7jLQitChws/zyrVQ4PkX4268NXSb7hLi18 YIvDQVETI53O9zJrlAGomecsMx86OyXShkDOOyyGeMlhLxS67ttVb9+E7gUJTb0o2HLO02JQZR7r kpeDMdmztcpHWD9f -----END CERTIFICATE----- Autoridad de Certificacion Firmaprofesional CIF A62634068 ========================================================= -----BEGIN CERTIFICATE----- MIIGFDCCA/ygAwIBAgIIU+w77vuySF8wDQYJKoZIhvcNAQEFBQAwUTELMAkGA1UEBhMCRVMxQjBA BgNVBAMMOUF1dG9yaWRhZCBkZSBDZXJ0aWZpY2FjaW9uIEZpcm1hcHJvZmVzaW9uYWwgQ0lGIEE2 MjYzNDA2ODAeFw0wOTA1MjAwODM4MTVaFw0zMDEyMzEwODM4MTVaMFExCzAJBgNVBAYTAkVTMUIw QAYDVQQDDDlBdXRvcmlkYWQgZGUgQ2VydGlmaWNhY2lvbiBGaXJtYXByb2Zlc2lvbmFsIENJRiBB NjI2MzQwNjgwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDKlmuO6vj78aI14H9M2uDD Utd9thDIAl6zQyrET2qyyhxdKJp4ERppWVevtSBC5IsP5t9bpgOSL/UR5GLXMnE42QQMcas9UX4P B99jBVzpv5RvwSmCwLTaUbDBPLutN0pcyvFLNg4kq7/DhHf9qFD0sefGL9ItWY16Ck6WaVICqjaY 7Pz6FIMMNx/Jkjd/14Et5cS54D40/mf0PmbR0/RAz15iNA9wBj4gGFrO93IbJWyTdBSTo3OxDqqH ECNZXyAFGUftaI6SEspd/NYrspI8IM/hX68gvqB2f3bl7BqGYTM+53u0P6APjqK5am+5hyZvQWyI plD9amML9ZMWGxmPsu2bm8mQ9QEM3xk9Dz44I8kvjwzRAv4bVdZO0I08r0+k8/6vKtMFnXkIoctX MbScyJCyZ/QYFpM6/EfY0XiWMR+6KwxfXZmtY4laJCB22N/9q06mIqqdXuYnin1oKaPnirjaEbsX LZmdEyRG98Xi2J+Of8ePdG1asuhy9azuJBCtLxTa/y2aRnFHvkLfuwHb9H/TKI8xWVvTyQKmtFLK bpf7Q8UIJm+K9Lv9nyiqDdVF8xM6HdjAeI9BZzwelGSuewvF6NkBiDkal4ZkQdU7hwxu+g/GvUgU vzlN1J5Bto+WHWOWk9mVBngxaJ43BjuAiUVhOSPHG0SjFeUc+JIwuwIDAQABo4HvMIHsMBIGA1Ud EwEB/wQIMAYBAf8CAQEwDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBRlzeurNR4APn7VdMActHNH DhpkLzCBpgYDVR0gBIGeMIGbMIGYBgRVHSAAMIGPMC8GCCsGAQUFBwIBFiNodHRwOi8vd3d3LmZp cm1hcHJvZmVzaW9uYWwuY29tL2NwczBcBggrBgEFBQcCAjBQHk4AUABhAHMAZQBvACAAZABlACAA bABhACAAQgBvAG4AYQBuAG8AdgBhACAANAA3ACAAQgBhAHIAYwBlAGwAbwBuAGEAIAAwADgAMAAx ADcwDQYJKoZIhvcNAQEFBQADggIBABd9oPm03cXF661LJLWhAqvdpYhKsg9VSytXjDvlMd3+xDLx 51tkljYyGOylMnfX40S2wBEqgLk9am58m9Ot/MPWo+ZkKXzR4Tgegiv/J2Wv+xYVxC5xhOW1//qk R71kMrv2JYSiJ0L1ILDCExARzRAVukKQKtJE4ZYm6zFIEv0q2skGz3QeqUvVhyj5eTSSPi5E6PaP T481PyWzOdxjKpBrIF/EUhJOlywqrJ2X3kjyo2bbwtKDlaZmp54lD+kLM5FlClrD2VQS3a/DTg4f Jl4N3LON7NWBcN7STyQF82xO9UxJZo3R/9ILJUFI/lGExkKvgATP0H5kSeTy36LssUzAKh3ntLFl osS88Zj0qnAHY7S42jtM+kAiMFsRpvAFDsYCA0irhpuF3dvd6qJ2gHN99ZwExEWN57kci57q13XR crHedUTnQn3iV2t93Jm8PYMo6oCTjcVMZcFwgbg4/EMxsvYDNEeyrPsiBsse3RdHHF9mudMaotoR saS8I8nkvof/uZS2+F0gStRf571oe2XyFR7SOqkt6dhrJKyXWERHrVkY8SFlcN7ONGCoQPHzPKTD KCOM/iczQ0CgFzzr6juwcqajuUpLXhZI9LK8yIySxZ2frHI2vDSANGupi5LAuBft7HZT9SQBjLMi 6Et8Vcad+qMUu2WFbm5PEn4KPJ2V -----END CERTIFICATE----- Izenpe.com ========== -----BEGIN CERTIFICATE----- MIIF8TCCA9mgAwIBAgIQALC3WhZIX7/hy/WL1xnmfTANBgkqhkiG9w0BAQsFADA4MQswCQYDVQQG EwJFUzEUMBIGA1UECgwLSVpFTlBFIFMuQS4xEzARBgNVBAMMCkl6ZW5wZS5jb20wHhcNMDcxMjEz MTMwODI4WhcNMzcxMjEzMDgyNzI1WjA4MQswCQYDVQQGEwJFUzEUMBIGA1UECgwLSVpFTlBFIFMu QS4xEzARBgNVBAMMCkl6ZW5wZS5jb20wggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDJ 03rKDx6sp4boFmVqscIbRTJxldn+EFvMr+eleQGPicPK8lVx93e+d5TzcqQsRNiekpsUOqHnJJAK ClaOxdgmlOHZSOEtPtoKct2jmRXagaKH9HtuJneJWK3W6wyyQXpzbm3benhB6QiIEn6HLmYRY2xU +zydcsC8Lv/Ct90NduM61/e0aL6i9eOBbsFGb12N4E3GVFWJGjMxCrFXuaOKmMPsOzTFlUFpfnXC PCDFYbpRR6AgkJOhkEvzTnyFRVSa0QUmQbC1TR0zvsQDyCV8wXDbO/QJLVQnSKwv4cSsPsjLkkxT OTcj7NMB+eAJRE1NZMDhDVqHIrytG6P+JrUV86f8hBnp7KGItERphIPzidF0BqnMC9bC3ieFUCbK F7jJeodWLBoBHmy+E60QrLUk9TiRodZL2vG70t5HtfG8gfZZa88ZU+mNFctKy6lvROUbQc/hhqfK 0GqfvEyNBjNaooXlkDWgYlwWTvDjovoDGrQscbNYLN57C9saD+veIR8GdwYDsMnvmfzAuU8Lhij+ 0rnq49qlw0dpEuDb8PYZi+17cNcC1u2HGCgsBCRMd+RIihrGO5rUD8r6ddIBQFqNeb+Lz0vPqhbB leStTIo+F5HUsWLlguWABKQDfo2/2n+iD5dPDNMN+9fR5XJ+HMh3/1uaD7euBUbl8agW7EekFwID AQABo4H2MIHzMIGwBgNVHREEgagwgaWBD2luZm9AaXplbnBlLmNvbaSBkTCBjjFHMEUGA1UECgw+ SVpFTlBFIFMuQS4gLSBDSUYgQTAxMzM3MjYwLVJNZXJjLlZpdG9yaWEtR2FzdGVpeiBUMTA1NSBG NjIgUzgxQzBBBgNVBAkMOkF2ZGEgZGVsIE1lZGl0ZXJyYW5lbyBFdG9yYmlkZWEgMTQgLSAwMTAx MCBWaXRvcmlhLUdhc3RlaXowDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0O BBYEFB0cZQ6o8iV7tJHP5LGx5r1VdGwFMA0GCSqGSIb3DQEBCwUAA4ICAQB4pgwWSp9MiDrAyw6l Fn2fuUhfGI8NYjb2zRlrrKvV9pF9rnHzP7MOeIWblaQnIUdCSnxIOvVFfLMMjlF4rJUT3sb9fbga kEyrkgPH7UIBzg/YsfqikuFgba56awmqxinuaElnMIAkejEWOVt+8Rwu3WwJrfIxwYJOubv5vr8q hT/AQKM6WfxZSzwoJNu0FXWuDYi6LnPAvViH5ULy617uHjAimcs30cQhbIHsvm0m5hzkQiCeR7Cs g1lwLDXWrzY0tM07+DKo7+N4ifuNRSzanLh+QBxh5z6ikixL8s36mLYp//Pye6kfLqCTVyvehQP5 aTfLnnhqBbTFMXiJ7HqnheG5ezzevh55hM6fcA5ZwjUukCox2eRFekGkLhObNA5me0mrZJfQRsN5 nXJQY6aYWwa9SG3YOYNw6DXwBdGqvOPbyALqfP2C2sJbUjWumDqtujWTI6cfSN01RpiyEGjkpTHC ClguGYEQyVB1/OpaFs4R1+7vUIgtYf8/QnMFlEPVjjxOAToZpR9GTnfQXeWBIiGH/pR9hNiTrdZo Q0iy2+tzJOeRf1SktoA+naM8THLCV8Sg1Mw4J87VBp6iSNnpn86CcDaTmjvfliHjWbcM2pE38P1Z WrOZyGlsQyYBNWNgVYkDOnXYukrZVP/u3oDYLdE41V4tC5h9Pmzb/CaIxw== -----END CERTIFICATE----- Chambers of Commerce Root - 2008 ================================ -----BEGIN CERTIFICATE----- MIIHTzCCBTegAwIBAgIJAKPaQn6ksa7aMA0GCSqGSIb3DQEBBQUAMIGuMQswCQYDVQQGEwJFVTFD MEEGA1UEBxM6TWFkcmlkIChzZWUgY3VycmVudCBhZGRyZXNzIGF0IHd3dy5jYW1lcmZpcm1hLmNv bS9hZGRyZXNzKTESMBAGA1UEBRMJQTgyNzQzMjg3MRswGQYDVQQKExJBQyBDYW1lcmZpcm1hIFMu QS4xKTAnBgNVBAMTIENoYW1iZXJzIG9mIENvbW1lcmNlIFJvb3QgLSAyMDA4MB4XDTA4MDgwMTEy Mjk1MFoXDTM4MDczMTEyMjk1MFowga4xCzAJBgNVBAYTAkVVMUMwQQYDVQQHEzpNYWRyaWQgKHNl ZSBjdXJyZW50IGFkZHJlc3MgYXQgd3d3LmNhbWVyZmlybWEuY29tL2FkZHJlc3MpMRIwEAYDVQQF EwlBODI3NDMyODcxGzAZBgNVBAoTEkFDIENhbWVyZmlybWEgUy5BLjEpMCcGA1UEAxMgQ2hhbWJl cnMgb2YgQ29tbWVyY2UgUm9vdCAtIDIwMDgwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC AQCvAMtwNyuAWko6bHiUfaN/Gh/2NdW928sNRHI+JrKQUrpjOyhYb6WzbZSm891kDFX29ufyIiKA XuFixrYp4YFs8r/lfTJqVKAyGVn+H4vXPWCGhSRv4xGzdz4gljUha7MI2XAuZPeEklPWDrCQiorj h40G072QDuKZoRuGDtqaCrsLYVAGUvGef3bsyw/QHg3PmTA9HMRFEFis1tPo1+XqxQEHd9ZR5gN/ ikilTWh1uem8nk4ZcfUyS5xtYBkL+8ydddy/Js2Pk3g5eXNeJQ7KXOt3EgfLZEFHcpOrUMPrCXZk NNI5t3YRCQ12RcSprj1qr7V9ZS+UWBDsXHyvfuK2GNnQm05aSd+pZgvMPMZ4fKecHePOjlO+Bd5g D2vlGts/4+EhySnB8esHnFIbAURRPHsl18TlUlRdJQfKFiC4reRB7noI/plvg6aRArBsNlVq5331 lubKgdaX8ZSD6e2wsWsSaR6s+12pxZjptFtYer49okQ6Y1nUCyXeG0+95QGezdIp1Z8XGQpvvwyQ 0wlf2eOKNcx5Wk0ZN5K3xMGtr/R5JJqyAQuxr1yW84Ay+1w9mPGgP0revq+ULtlVmhduYJ1jbLhj ya6BXBg14JC7vjxPNyK5fuvPnnchpj04gftI2jE9K+OJ9dC1vX7gUMQSibMjmhAxhduub+84Mxh2 EQIDAQABo4IBbDCCAWgwEgYDVR0TAQH/BAgwBgEB/wIBDDAdBgNVHQ4EFgQU+SSsD7K1+HnA+mCI G8TZTQKeFxkwgeMGA1UdIwSB2zCB2IAU+SSsD7K1+HnA+mCIG8TZTQKeFxmhgbSkgbEwga4xCzAJ BgNVBAYTAkVVMUMwQQYDVQQHEzpNYWRyaWQgKHNlZSBjdXJyZW50IGFkZHJlc3MgYXQgd3d3LmNh bWVyZmlybWEuY29tL2FkZHJlc3MpMRIwEAYDVQQFEwlBODI3NDMyODcxGzAZBgNVBAoTEkFDIENh bWVyZmlybWEgUy5BLjEpMCcGA1UEAxMgQ2hhbWJlcnMgb2YgQ29tbWVyY2UgUm9vdCAtIDIwMDiC CQCj2kJ+pLGu2jAOBgNVHQ8BAf8EBAMCAQYwPQYDVR0gBDYwNDAyBgRVHSAAMCowKAYIKwYBBQUH AgEWHGh0dHA6Ly9wb2xpY3kuY2FtZXJmaXJtYS5jb20wDQYJKoZIhvcNAQEFBQADggIBAJASryI1 wqM58C7e6bXpeHxIvj99RZJe6dqxGfwWPJ+0W2aeaufDuV2I6A+tzyMP3iU6XsxPpcG1Lawk0lgH 3qLPaYRgM+gQDROpI9CF5Y57pp49chNyM/WqfcZjHwj0/gF/JM8rLFQJ3uIrbZLGOU8W6jx+ekbU RWpGqOt1glanq6B8aBMz9p0w8G8nOSQjKpD9kCk18pPfNKXG9/jvjA9iSnyu0/VU+I22mlaHFoI6 M6taIgj3grrqLuBHmrS1RaMFO9ncLkVAO+rcf+g769HsJtg1pDDFOqxXnrN2pSB7+R5KBWIBpih1 YJeSDW4+TTdDDZIVnBgizVGZoCkaPF+KMjNbMMeJL0eYD6MDxvbxrN8y8NmBGuScvfaAFPDRLLmF 9dijscilIeUcE5fuDr3fKanvNFNb0+RqE4QGtjICxFKuItLcsiFCGtpA8CnJ7AoMXOLQusxI0zcK zBIKinmwPQN/aUv0NCB9szTqjktk9T79syNnFQ0EuPAtwQlRPLJsFfClI9eDdOTlLsn+mCdCxqvG nrDQWzilm1DefhiYtUU79nm06PcaewaD+9CL2rvHvRirCG88gGtAPxkZumWK5r7VXNM21+9AUiRg OGcEMeyP84LG3rlV8zsxkVrctQgVrXYlCg17LofiDKYGvCYQbTed7N14jHyAxfDZd0jQ -----END CERTIFICATE----- Global Chambersign Root - 2008 ============================== -----BEGIN CERTIFICATE----- MIIHSTCCBTGgAwIBAgIJAMnN0+nVfSPOMA0GCSqGSIb3DQEBBQUAMIGsMQswCQYDVQQGEwJFVTFD MEEGA1UEBxM6TWFkcmlkIChzZWUgY3VycmVudCBhZGRyZXNzIGF0IHd3dy5jYW1lcmZpcm1hLmNv bS9hZGRyZXNzKTESMBAGA1UEBRMJQTgyNzQzMjg3MRswGQYDVQQKExJBQyBDYW1lcmZpcm1hIFMu QS4xJzAlBgNVBAMTHkdsb2JhbCBDaGFtYmVyc2lnbiBSb290IC0gMjAwODAeFw0wODA4MDExMjMx NDBaFw0zODA3MzExMjMxNDBaMIGsMQswCQYDVQQGEwJFVTFDMEEGA1UEBxM6TWFkcmlkIChzZWUg Y3VycmVudCBhZGRyZXNzIGF0IHd3dy5jYW1lcmZpcm1hLmNvbS9hZGRyZXNzKTESMBAGA1UEBRMJ QTgyNzQzMjg3MRswGQYDVQQKExJBQyBDYW1lcmZpcm1hIFMuQS4xJzAlBgNVBAMTHkdsb2JhbCBD aGFtYmVyc2lnbiBSb290IC0gMjAwODCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMDf VtPkOpt2RbQT2//BthmLN0EYlVJH6xedKYiONWwGMi5HYvNJBL99RDaxccy9Wglz1dmFRP+RVyXf XjaOcNFccUMd2drvXNL7G706tcuto8xEpw2uIRU/uXpbknXYpBI4iRmKt4DS4jJvVpyR1ogQC7N0 ZJJ0YPP2zxhPYLIj0Mc7zmFLmY/CDNBAspjcDahOo7kKrmCgrUVSY7pmvWjg+b4aqIG7HkF4ddPB /gBVsIdU6CeQNR1MM62X/JcumIS/LMmjv9GYERTtY/jKmIhYF5ntRQOXfjyGHoiMvvKRhI9lNNgA TH23MRdaKXoKGCQwoze1eqkBfSbW+Q6OWfH9GzO1KTsXO0G2Id3UwD2ln58fQ1DJu7xsepeY7s2M H/ucUa6LcL0nn3HAa6x9kGbo1106DbDVwo3VyJ2dwW3Q0L9R5OP4wzg2rtandeavhENdk5IMagfe Ox2YItaswTXbo6Al/3K1dh3ebeksZixShNBFks4c5eUzHdwHU1SjqoI7mjcv3N2gZOnm3b2u/GSF HTynyQbehP9r6GsaPMWis0L7iwk+XwhSx2LE1AVxv8Rk5Pihg+g+EpuoHtQ2TS9x9o0o9oOpE9Jh wZG7SMA0j0GMS0zbaRL/UJScIINZc+18ofLx/d33SdNDWKBWY8o9PeU1VlnpDsogzCtLkykPAgMB AAGjggFqMIIBZjASBgNVHRMBAf8ECDAGAQH/AgEMMB0GA1UdDgQWBBS5CcqcHtvTbDprru1U8VuT BjUuXjCB4QYDVR0jBIHZMIHWgBS5CcqcHtvTbDprru1U8VuTBjUuXqGBsqSBrzCBrDELMAkGA1UE BhMCRVUxQzBBBgNVBAcTOk1hZHJpZCAoc2VlIGN1cnJlbnQgYWRkcmVzcyBhdCB3d3cuY2FtZXJm aXJtYS5jb20vYWRkcmVzcykxEjAQBgNVBAUTCUE4Mjc0MzI4NzEbMBkGA1UEChMSQUMgQ2FtZXJm aXJtYSBTLkEuMScwJQYDVQQDEx5HbG9iYWwgQ2hhbWJlcnNpZ24gUm9vdCAtIDIwMDiCCQDJzdPp 1X0jzjAOBgNVHQ8BAf8EBAMCAQYwPQYDVR0gBDYwNDAyBgRVHSAAMCowKAYIKwYBBQUHAgEWHGh0 dHA6Ly9wb2xpY3kuY2FtZXJmaXJtYS5jb20wDQYJKoZIhvcNAQEFBQADggIBAICIf3DekijZBZRG /5BXqfEv3xoNa/p8DhxJJHkn2EaqbylZUohwEurdPfWbU1Rv4WCiqAm57OtZfMY18dwY6fFn5a+6 ReAJ3spED8IXDneRRXozX1+WLGiLwUePmJs9wOzL9dWCkoQ10b42OFZyMVtHLaoXpGNR6woBrX/s dZ7LoR/xfxKxueRkf2fWIyr0uDldmOghp+G9PUIadJpwr2hsUF1Jz//7Dl3mLEfXgTpZALVza2Mg 9jFFCDkO9HB+QHBaP9BrQql0PSgvAm11cpUJjUhjxsYjV5KTXjXBjfkK9yydYhz2rXzdpjEetrHH foUm+qRqtdpjMNHvkzeyZi99Bffnt0uYlDXA2TopwZ2yUDMdSqlapskD7+3056huirRXhOukP9Du qqqHW2Pok+JrqNS4cnhrG+055F3Lm6qH1U9OAP7Zap88MQ8oAgF9mOinsKJknnn4SPIVqczmyETr P3iZ8ntxPjzxmKfFGBI/5rsoM0LpRQp8bfKGeS/Fghl9CYl8slR2iK7ewfPM4W7bMdaTrpmg7yVq c5iJWzouE4gev8CSlDQb4ye3ix5vQv/n6TebUB0tovkC7stYWDpxvGjjqsGvHCgfotwjZT+B6q6Z 09gwzxMNTxXJhLynSC34MCN32EZLeW32jO06f2ARePTpm67VVMB0gNELQp/B -----END CERTIFICATE----- Go Daddy Root Certificate Authority - G2 ======================================== -----BEGIN CERTIFICATE----- MIIDxTCCAq2gAwIBAgIBADANBgkqhkiG9w0BAQsFADCBgzELMAkGA1UEBhMCVVMxEDAOBgNVBAgT B0FyaXpvbmExEzARBgNVBAcTClNjb3R0c2RhbGUxGjAYBgNVBAoTEUdvRGFkZHkuY29tLCBJbmMu MTEwLwYDVQQDEyhHbyBEYWRkeSBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAtIEcyMB4XDTA5 MDkwMTAwMDAwMFoXDTM3MTIzMTIzNTk1OVowgYMxCzAJBgNVBAYTAlVTMRAwDgYDVQQIEwdBcml6 b25hMRMwEQYDVQQHEwpTY290dHNkYWxlMRowGAYDVQQKExFHb0RhZGR5LmNvbSwgSW5jLjExMC8G A1UEAxMoR28gRGFkZHkgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgLSBHMjCCASIwDQYJKoZI hvcNAQEBBQADggEPADCCAQoCggEBAL9xYgjx+lk09xvJGKP3gElY6SKDE6bFIEMBO4Tx5oVJnyfq 9oQbTqC023CYxzIBsQU+B07u9PpPL1kwIuerGVZr4oAH/PMWdYA5UXvl+TW2dE6pjYIT5LY/qQOD +qK+ihVqf94Lw7YZFAXK6sOoBJQ7RnwyDfMAZiLIjWltNowRGLfTshxgtDj6AozO091GB94KPutd fMh8+7ArU6SSYmlRJQVhGkSBjCypQ5Yj36w6gZoOKcUcqeldHraenjAKOc7xiID7S13MMuyFYkMl NAJWJwGRtDtwKj9useiciAF9n9T521NtYJ2/LOdYq7hfRvzOxBsDPAnrSTFcaUaz4EcCAwEAAaNC MEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFDqahQcQZyi27/a9 BUFuIMGU2g/eMA0GCSqGSIb3DQEBCwUAA4IBAQCZ21151fmXWWcDYfF+OwYxdS2hII5PZYe096ac vNjpL9DbWu7PdIxztDhC2gV7+AJ1uP2lsdeu9tfeE8tTEH6KRtGX+rcuKxGrkLAngPnon1rpN5+r 5N9ss4UXnT3ZJE95kTXWXwTrgIOrmgIttRD02JDHBHNA7XIloKmf7J6raBKZV8aPEjoJpL1E/QYV N8Gb5DKj7Tjo2GTzLH4U/ALqn83/B2gX2yKQOC16jdFU8WnjXzPKej17CuPKf1855eJ1usV2GDPO LPAvTK33sefOT6jEm0pUBsV/fdUID+Ic/n4XuKxe9tQWskMJDE32p2u0mYRlynqI4uJEvlz36hz1 -----END CERTIFICATE----- Starfield Root Certificate Authority - G2 ========================================= -----BEGIN CERTIFICATE----- MIID3TCCAsWgAwIBAgIBADANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCVVMxEDAOBgNVBAgT B0FyaXpvbmExEzARBgNVBAcTClNjb3R0c2RhbGUxJTAjBgNVBAoTHFN0YXJmaWVsZCBUZWNobm9s b2dpZXMsIEluYy4xMjAwBgNVBAMTKVN0YXJmaWVsZCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0 eSAtIEcyMB4XDTA5MDkwMTAwMDAwMFoXDTM3MTIzMTIzNTk1OVowgY8xCzAJBgNVBAYTAlVTMRAw DgYDVQQIEwdBcml6b25hMRMwEQYDVQQHEwpTY290dHNkYWxlMSUwIwYDVQQKExxTdGFyZmllbGQg VGVjaG5vbG9naWVzLCBJbmMuMTIwMAYDVQQDEylTdGFyZmllbGQgUm9vdCBDZXJ0aWZpY2F0ZSBB dXRob3JpdHkgLSBHMjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL3twQP89o/8ArFv W59I2Z154qK3A2FWGMNHttfKPTUuiUP3oWmb3ooa/RMgnLRJdzIpVv257IzdIvpy3Cdhl+72WoTs bhm5iSzchFvVdPtrX8WJpRBSiUZV9Lh1HOZ/5FSuS/hVclcCGfgXcVnrHigHdMWdSL5stPSksPNk N3mSwOxGXn/hbVNMYq/NHwtjuzqd+/x5AJhhdM8mgkBj87JyahkNmcrUDnXMN/uLicFZ8WJ/X7Nf ZTD4p7dNdloedl40wOiWVpmKs/B/pM293DIxfJHP4F8R+GuqSVzRmZTRouNjWwl2tVZi4Ut0HZbU JtQIBFnQmA4O5t78w+wfkPECAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC AQYwHQYDVR0OBBYEFHwMMh+n2TB/xH1oo2Kooc6rB1snMA0GCSqGSIb3DQEBCwUAA4IBAQARWfol TwNvlJk7mh+ChTnUdgWUXuEok21iXQnCoKjUsHU48TRqneSfioYmUeYs0cYtbpUgSpIB7LiKZ3sx 4mcujJUDJi5DnUox9g61DLu34jd/IroAow57UvtruzvE03lRTs2Q9GcHGcg8RnoNAX3FWOdt5oUw F5okxBDgBPfg8n/Uqgr/Qh037ZTlZFkSIHc40zI+OIF1lnP6aI+xy84fxez6nH7PfrHxBy22/L/K pL/QlwVKvOoYKAKQvVR4CSFx09F9HdkWsKlhPdAKACL8x3vLCWRFCztAgfd9fDL1mMpYjn0q7pBZ c2T5NnReJaH1ZgUufzkVqSr7UIuOhWn0 -----END CERTIFICATE----- Starfield Services Root Certificate Authority - G2 ================================================== -----BEGIN CERTIFICATE----- MIID7zCCAtegAwIBAgIBADANBgkqhkiG9w0BAQsFADCBmDELMAkGA1UEBhMCVVMxEDAOBgNVBAgT B0FyaXpvbmExEzARBgNVBAcTClNjb3R0c2RhbGUxJTAjBgNVBAoTHFN0YXJmaWVsZCBUZWNobm9s b2dpZXMsIEluYy4xOzA5BgNVBAMTMlN0YXJmaWVsZCBTZXJ2aWNlcyBSb290IENlcnRpZmljYXRl IEF1dGhvcml0eSAtIEcyMB4XDTA5MDkwMTAwMDAwMFoXDTM3MTIzMTIzNTk1OVowgZgxCzAJBgNV BAYTAlVTMRAwDgYDVQQIEwdBcml6b25hMRMwEQYDVQQHEwpTY290dHNkYWxlMSUwIwYDVQQKExxT dGFyZmllbGQgVGVjaG5vbG9naWVzLCBJbmMuMTswOQYDVQQDEzJTdGFyZmllbGQgU2VydmljZXMg Um9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgLSBHMjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCC AQoCggEBANUMOsQq+U7i9b4Zl1+OiFOxHz/Lz58gE20pOsgPfTz3a3Y4Y9k2YKibXlwAgLIvWX/2 h/klQ4bnaRtSmpDhcePYLQ1Ob/bISdm28xpWriu2dBTrz/sm4xq6HZYuajtYlIlHVv8loJNwU4Pa hHQUw2eeBGg6345AWh1KTs9DkTvnVtYAcMtS7nt9rjrnvDH5RfbCYM8TWQIrgMw0R9+53pBlbQLP LJGmpufehRhJfGZOozptqbXuNC66DQO4M99H67FrjSXZm86B0UVGMpZwh94CDklDhbZsc7tk6mFB rMnUVN+HL8cisibMn1lUaJ/8viovxFUcdUBgF4UCVTmLfwUCAwEAAaNCMEAwDwYDVR0TAQH/BAUw AwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFJxfAN+qAdcwKziIorhtSpzyEZGDMA0GCSqG SIb3DQEBCwUAA4IBAQBLNqaEd2ndOxmfZyMIbw5hyf2E3F/YNoHN2BtBLZ9g3ccaaNnRbobhiCPP E95Dz+I0swSdHynVv/heyNXBve6SbzJ08pGCL72CQnqtKrcgfU28elUSwhXqvfdqlS5sdJ/PHLTy xQGjhdByPq1zqwubdQxtRbeOlKyWN7Wg0I8VRw7j6IPdj/3vQQF3zCepYoUz8jcI73HPdwbeyBkd iEDPfUYd/x7H4c7/I9vG+o1VTqkC50cRRj70/b17KSa7qWFiNyi2LSr2EIZkyXCn0q23KXB56jza YyWf/Wi3MOxw+3WKt21gZ7IeyLnp2KhvAotnDU0mV3HaIPzBSlCNsSi6 -----END CERTIFICATE----- AffirmTrust Commercial ====================== -----BEGIN CERTIFICATE----- MIIDTDCCAjSgAwIBAgIId3cGJyapsXwwDQYJKoZIhvcNAQELBQAwRDELMAkGA1UEBhMCVVMxFDAS BgNVBAoMC0FmZmlybVRydXN0MR8wHQYDVQQDDBZBZmZpcm1UcnVzdCBDb21tZXJjaWFsMB4XDTEw MDEyOTE0MDYwNloXDTMwMTIzMTE0MDYwNlowRDELMAkGA1UEBhMCVVMxFDASBgNVBAoMC0FmZmly bVRydXN0MR8wHQYDVQQDDBZBZmZpcm1UcnVzdCBDb21tZXJjaWFsMIIBIjANBgkqhkiG9w0BAQEF AAOCAQ8AMIIBCgKCAQEA9htPZwcroRX1BiLLHwGy43NFBkRJLLtJJRTWzsO3qyxPxkEylFf6Eqdb DuKPHx6GGaeqtS25Xw2Kwq+FNXkyLbscYjfysVtKPcrNcV/pQr6U6Mje+SJIZMblq8Yrba0F8PrV C8+a5fBQpIs7R6UjW3p6+DM/uO+Zl+MgwdYoic+U+7lF7eNAFxHUdPALMeIrJmqbTFeurCA+ukV6 BfO9m2kVrn1OIGPENXY6BwLJN/3HR+7o8XYdcxXyl6S1yHp52UKqK39c/s4mT6NmgTWvRLpUHhww MmWd5jyTXlBOeuM61G7MGvv50jeuJCqrVwMiKA1JdX+3KNp1v47j3A55MQIDAQABo0IwQDAdBgNV HQ4EFgQUnZPGU4teyq8/nx4P5ZmVvCT2lI8wDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC AQYwDQYJKoZIhvcNAQELBQADggEBAFis9AQOzcAN/wr91LoWXym9e2iZWEnStB03TX8nfUYGXUPG hi4+c7ImfU+TqbbEKpqrIZcUsd6M06uJFdhrJNTxFq7YpFzUf1GO7RgBsZNjvbz4YYCanrHOQnDi qX0GJX0nof5v7LMeJNrjS1UaADs1tDvZ110w/YETifLCBivtZ8SOyUOyXGsViQK8YvxO8rUzqrJv 0wqiUOP2O+guRMLbZjipM1ZI8W0bM40NjD9gN53Tym1+NH4Nn3J2ixufcv1SNUFFApYvHLKac0kh sUlHRUe072o0EclNmsxZt9YCnlpOZbWUrhvfKbAW8b8Angc6F2S1BLUjIZkKlTuXfO8= -----END CERTIFICATE----- AffirmTrust Networking ====================== -----BEGIN CERTIFICATE----- MIIDTDCCAjSgAwIBAgIIfE8EORzUmS0wDQYJKoZIhvcNAQEFBQAwRDELMAkGA1UEBhMCVVMxFDAS BgNVBAoMC0FmZmlybVRydXN0MR8wHQYDVQQDDBZBZmZpcm1UcnVzdCBOZXR3b3JraW5nMB4XDTEw MDEyOTE0MDgyNFoXDTMwMTIzMTE0MDgyNFowRDELMAkGA1UEBhMCVVMxFDASBgNVBAoMC0FmZmly bVRydXN0MR8wHQYDVQQDDBZBZmZpcm1UcnVzdCBOZXR3b3JraW5nMIIBIjANBgkqhkiG9w0BAQEF AAOCAQ8AMIIBCgKCAQEAtITMMxcua5Rsa2FSoOujz3mUTOWUgJnLVWREZY9nZOIG41w3SfYvm4SE Hi3yYJ0wTsyEheIszx6e/jarM3c1RNg1lho9Nuh6DtjVR6FqaYvZ/Ls6rnla1fTWcbuakCNrmreI dIcMHl+5ni36q1Mr3Lt2PpNMCAiMHqIjHNRqrSK6mQEubWXLviRmVSRLQESxG9fhwoXA3hA/Pe24 /PHxI1Pcv2WXb9n5QHGNfb2V1M6+oF4nI979ptAmDgAp6zxG8D1gvz9Q0twmQVGeFDdCBKNwV6gb h+0t+nvujArjqWaJGctB+d1ENmHP4ndGyH329JKBNv3bNPFyfvMMFr20FQIDAQABo0IwQDAdBgNV HQ4EFgQUBx/S55zawm6iQLSwelAQUHTEyL0wDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC AQYwDQYJKoZIhvcNAQEFBQADggEBAIlXshZ6qML91tmbmzTCnLQyFE2npN/svqe++EPbkTfOtDIu UFUaNU52Q3Eg75N3ThVwLofDwR1t3Mu1J9QsVtFSUzpE0nPIxBsFZVpikpzuQY0x2+c06lkh1QF6 12S4ZDnNye2v7UsDSKegmQGA3GWjNq5lWUhPgkvIZfFXHeVZLgo/bNjR9eUJtGxUAArgFU2HdW23 WJZa3W3SAKD0m0i+wzekujbgfIeFlxoVot4uolu9rxj5kFDNcFn4J2dHy8egBzp90SxdbBk6ZrV9 /ZFvgrG+CJPbFEfxojfHRZ48x3evZKiT3/Zpg4Jg8klCNO1aAFSFHBY2kgxc+qatv9s= -----END CERTIFICATE----- AffirmTrust Premium =================== -----BEGIN CERTIFICATE----- MIIFRjCCAy6gAwIBAgIIbYwURrGmCu4wDQYJKoZIhvcNAQEMBQAwQTELMAkGA1UEBhMCVVMxFDAS BgNVBAoMC0FmZmlybVRydXN0MRwwGgYDVQQDDBNBZmZpcm1UcnVzdCBQcmVtaXVtMB4XDTEwMDEy OTE0MTAzNloXDTQwMTIzMTE0MTAzNlowQTELMAkGA1UEBhMCVVMxFDASBgNVBAoMC0FmZmlybVRy dXN0MRwwGgYDVQQDDBNBZmZpcm1UcnVzdCBQcmVtaXVtMIICIjANBgkqhkiG9w0BAQEFAAOCAg8A MIICCgKCAgEAxBLfqV/+Qd3d9Z+K4/as4Tx4mrzY8H96oDMq3I0gW64tb+eT2TZwamjPjlGjhVtn BKAQJG9dKILBl1fYSCkTtuG+kU3fhQxTGJoeJKJPj/CihQvL9Cl/0qRY7iZNyaqoe5rZ+jjeRFcV 5fiMyNlI4g0WJx0eyIOFJbe6qlVBzAMiSy2RjYvmia9mx+n/K+k8rNrSs8PhaJyJ+HoAVt70VZVs +7pk3WKL3wt3MutizCaam7uqYoNMtAZ6MMgpv+0GTZe5HMQxK9VfvFMSF5yZVylmd2EhMQcuJUmd GPLu8ytxjLW6OQdJd/zvLpKQBY0tL3d770O/Nbua2Plzpyzy0FfuKE4mX4+QaAkvuPjcBukumj5R p9EixAqnOEhss/n/fauGV+O61oV4d7pD6kh/9ti+I20ev9E2bFhc8e6kGVQa9QPSdubhjL08s9NI S+LI+H+SqHZGnEJlPqQewQcDWkYtuJfzt9WyVSHvutxMAJf7FJUnM7/oQ0dG0giZFmA7mn7S5u04 6uwBHjxIVkkJx0w3AJ6IDsBz4W9m6XJHMD4Q5QsDyZpCAGzFlH5hxIrff4IaC1nEWTJ3s7xgaVY5 /bQGeyzWZDbZvUjthB9+pSKPKrhC9IK31FOQeE4tGv2Bb0TXOwF0lkLgAOIua+rF7nKsu7/+6qqo +Nz2snmKtmcCAwEAAaNCMEAwHQYDVR0OBBYEFJ3AZ6YMItkm9UWrpmVSESfYRaxjMA8GA1UdEwEB /wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMA0GCSqGSIb3DQEBDAUAA4ICAQCzV00QYk465KzquByv MiPIs0laUZx2KI15qldGF9X1Uva3ROgIRL8YhNILgM3FEv0AVQVhh0HctSSePMTYyPtwni94loMg Nt58D2kTiKV1NpgIpsbfrM7jWNa3Pt668+s0QNiigfV4Py/VpfzZotReBA4Xrf5B8OWycvpEgjNC 6C1Y91aMYj+6QrCcDFx+LmUmXFNPALJ4fqENmS2NuB2OosSw/WDQMKSOyARiqcTtNd56l+0OOF6S L5Nwpamcb6d9Ex1+xghIsV5n61EIJenmJWtSKZGc0jlzCFfemQa0W50QBuHCAKi4HEoCChTQwUHK +4w1IX2COPKpVJEZNZOUbWo6xbLQu4mGk+ibyQ86p3q4ofB4Rvr8Ny/lioTz3/4E2aFooC8k4gmV BtWVyuEklut89pMFu+1z6S3RdTnX5yTb2E5fQ4+e0BQ5v1VwSJlXMbSc7kqYA5YwH2AG7hsj/oFg IxpHYoWlzBk0gG+zrBrjn/B7SK3VAdlntqlyk+otZrWyuOQ9PLLvTIzq6we/qzWaVYa8GKa1qF60 g2xraUDTn9zxw2lrueFtCfTxqlB2Cnp9ehehVZZCmTEJ3WARjQUwfuaORtGdFNrHF+QFlozEJLUb zxQHskD4o55BhrwE0GuWyCqANP2/7waj3VjFhT0+j/6eKeC2uAloGRwYQw== -----END CERTIFICATE----- AffirmTrust Premium ECC ======================= -----BEGIN CERTIFICATE----- MIIB/jCCAYWgAwIBAgIIdJclisc/elQwCgYIKoZIzj0EAwMwRTELMAkGA1UEBhMCVVMxFDASBgNV BAoMC0FmZmlybVRydXN0MSAwHgYDVQQDDBdBZmZpcm1UcnVzdCBQcmVtaXVtIEVDQzAeFw0xMDAx MjkxNDIwMjRaFw00MDEyMzExNDIwMjRaMEUxCzAJBgNVBAYTAlVTMRQwEgYDVQQKDAtBZmZpcm1U cnVzdDEgMB4GA1UEAwwXQWZmaXJtVHJ1c3QgUHJlbWl1bSBFQ0MwdjAQBgcqhkjOPQIBBgUrgQQA IgNiAAQNMF4bFZ0D0KF5Nbc6PJJ6yhUczWLznCZcBz3lVPqj1swS6vQUX+iOGasvLkjmrBhDeKzQ N8O9ss0s5kfiGuZjuD0uL3jET9v0D6RoTFVya5UdThhClXjMNzyR4ptlKymjQjBAMB0GA1UdDgQW BBSaryl6wBE1NSZRMADDav5A1a7WPDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAK BggqhkjOPQQDAwNnADBkAjAXCfOHiFBar8jAQr9HX/VsaobgxCd05DhT1wV/GzTjxi+zygk8N53X 57hG8f2h4nECMEJZh0PUUd+60wkyWs6Iflc9nF9Ca/UHLbXwgpP5WW+uZPpY5Yse42O+tYHNbwKM eQ== -----END CERTIFICATE----- Certum Trusted Network CA ========================= -----BEGIN CERTIFICATE----- MIIDuzCCAqOgAwIBAgIDBETAMA0GCSqGSIb3DQEBBQUAMH4xCzAJBgNVBAYTAlBMMSIwIAYDVQQK ExlVbml6ZXRvIFRlY2hub2xvZ2llcyBTLkEuMScwJQYDVQQLEx5DZXJ0dW0gQ2VydGlmaWNhdGlv biBBdXRob3JpdHkxIjAgBgNVBAMTGUNlcnR1bSBUcnVzdGVkIE5ldHdvcmsgQ0EwHhcNMDgxMDIy MTIwNzM3WhcNMjkxMjMxMTIwNzM3WjB+MQswCQYDVQQGEwJQTDEiMCAGA1UEChMZVW5pemV0byBU ZWNobm9sb2dpZXMgUy5BLjEnMCUGA1UECxMeQ2VydHVtIENlcnRpZmljYXRpb24gQXV0aG9yaXR5 MSIwIAYDVQQDExlDZXJ0dW0gVHJ1c3RlZCBOZXR3b3JrIENBMIIBIjANBgkqhkiG9w0BAQEFAAOC AQ8AMIIBCgKCAQEA4/t9o3K6wvDJFIf1awFO4W5AB7ptJ11/91sts1rHUV+rpDKmYYe2bg+G0jAC l/jXaVehGDldamR5xgFZrDwxSjh80gTSSyjoIF87B6LMTXPb865Px1bVWqeWifrzq2jUI4ZZJ88J J7ysbnKDHDBy3+Ci6dLhdHUZvSqeexVUBBvXQzmtVSjF4hq79MDkrjhJM8x2hZ85RdKknvISjFH4 fOQtf/WsX+sWn7Et0brMkUJ3TCXJkDhv2/DM+44el1k+1WBO5gUo7Ul5E0u6SNsv+XLTOcr+H9g0 cvW0QM8xAcPs3hEtF10fuFDRXhmnad4HMyjKUJX5p1TLVIZQRan5SQIDAQABo0IwQDAPBgNVHRMB Af8EBTADAQH/MB0GA1UdDgQWBBQIds3LB/8k9sXN7buQvOKEN0Z19zAOBgNVHQ8BAf8EBAMCAQYw DQYJKoZIhvcNAQEFBQADggEBAKaorSLOAT2mo/9i0Eidi15ysHhE49wcrwn9I0j6vSrEuVUEtRCj jSfeC4Jj0O7eDDd5QVsisrCaQVymcODU0HfLI9MA4GxWL+FpDQ3Zqr8hgVDZBqWo/5U30Kr+4rP1 mS1FhIrlQgnXdAIv94nYmem8J9RHjboNRhx3zxSkHLmkMcScKHQDNP8zGSal6Q10tz6XxnboJ5aj Zt3hrvJBW8qYVoNzcOSGGtIxQbovvi0TWnZvTuhOgQ4/WwMioBK+ZlgRSssDxLQqKi2WF+A5VLxI 03YnnZotBqbJ7DnSq9ufmgsnAjUpsUCV5/nonFWIGUbWtzT1fs45mtk48VH3Tyw= -----END CERTIFICATE----- Certinomis - Autorité Racine ============================ -----BEGIN CERTIFICATE----- MIIFnDCCA4SgAwIBAgIBATANBgkqhkiG9w0BAQUFADBjMQswCQYDVQQGEwJGUjETMBEGA1UEChMK Q2VydGlub21pczEXMBUGA1UECxMOMDAwMiA0MzM5OTg5MDMxJjAkBgNVBAMMHUNlcnRpbm9taXMg LSBBdXRvcml0w6kgUmFjaW5lMB4XDTA4MDkxNzA4Mjg1OVoXDTI4MDkxNzA4Mjg1OVowYzELMAkG A1UEBhMCRlIxEzARBgNVBAoTCkNlcnRpbm9taXMxFzAVBgNVBAsTDjAwMDIgNDMzOTk4OTAzMSYw JAYDVQQDDB1DZXJ0aW5vbWlzIC0gQXV0b3JpdMOpIFJhY2luZTCCAiIwDQYJKoZIhvcNAQEBBQAD ggIPADCCAgoCggIBAJ2Fn4bT46/HsmtuM+Cet0I0VZ35gb5j2CN2DpdUzZlMGvE5x4jYF1AMnmHa wE5V3udauHpOd4cN5bjr+p5eex7Ezyh0x5P1FMYiKAT5kcOrJ3NqDi5N8y4oH3DfVS9O7cdxbwly Lu3VMpfQ8Vh30WC8Tl7bmoT2R2FFK/ZQpn9qcSdIhDWerP5pqZ56XjUl+rSnSTV3lqc2W+HN3yNw 2F1MpQiD8aYkOBOo7C+ooWfHpi2GR+6K/OybDnT0K0kCe5B1jPyZOQE51kqJ5Z52qz6WKDgmi92N jMD2AR5vpTESOH2VwnHu7XSu5DaiQ3XV8QCb4uTXzEIDS3h65X27uK4uIJPT5GHfceF2Z5c/tt9q c1pkIuVC28+BA5PY9OMQ4HL2AHCs8MF6DwV/zzRpRbWT5BnbUhYjBYkOjUjkJW+zeL9i9Qf6lSTC lrLooyPCXQP8w9PlfMl1I9f09bze5N/NgL+RiH2nE7Q5uiy6vdFrzPOlKO1Enn1So2+WLhl+HPNb xxaOu2B9d2ZHVIIAEWBsMsGoOBvrbpgT1u449fCfDu/+MYHB0iSVL1N6aaLwD4ZFjliCK0wi1F6g 530mJ0jfJUaNSih8hp75mxpZuWW/Bd22Ql095gBIgl4g9xGC3srYn+Y3RyYe63j3YcNBZFgCQfna 4NH4+ej9Uji29YnfAgMBAAGjWzBZMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0G A1UdDgQWBBQNjLZh2kS40RR9w759XkjwzspqsDAXBgNVHSAEEDAOMAwGCiqBegFWAgIAAQEwDQYJ KoZIhvcNAQEFBQADggIBACQ+YAZ+He86PtvqrxyaLAEL9MW12Ukx9F1BjYkMTv9sov3/4gbIOZ/x WqndIlgVqIrTseYyCYIDbNc/CMf4uboAbbnW/FIyXaR/pDGUu7ZMOH8oMDX/nyNTt7buFHAAQCva R6s0fl6nVjBhK4tDrP22iCj1a7Y+YEq6QpA0Z43q619FVDsXrIvkxmUP7tCMXWY5zjKn2BCXwH40 nJ+U8/aGH88bc62UeYdocMMzpXDn2NU4lG9jeeu/Cg4I58UvD0KgKxRA/yHgBcUn4YQRE7rWhh1B CxMjidPJC+iKunqjo3M3NYB9Ergzd0A4wPpeMNLytqOx1qKVl4GbUu1pTP+A5FPbVFsDbVRfsbjv JL1vnxHDx2TCDyhihWZeGnuyt++uNckZM6i4J9szVb9o4XVIRFb7zdNIu0eJOqxp9YDG5ERQL1TE qkPFMTFYvZbF6nVsmnWxTfj3l/+WFvKXTej28xH5On2KOG4Ey+HTRRWqpdEdnV1j6CTmNhTih60b WfVEm/vXd3wfAXBioSAaosUaKPQhA+4u2cGA6rnZgtZbdsLLO7XSAPCjDuGtbkD326C00EauFddE wk01+dIL8hf2rGbVJLJP0RyZwG71fet0BLj5TXcJ17TPBzAJ8bgAVtkXFhYKK4bfjwEZGuW7gmP/ vgt2Fl43N+bYdJeimUV5 -----END CERTIFICATE----- TWCA Root Certification Authority ================================= -----BEGIN CERTIFICATE----- MIIDezCCAmOgAwIBAgIBATANBgkqhkiG9w0BAQUFADBfMQswCQYDVQQGEwJUVzESMBAGA1UECgwJ VEFJV0FOLUNBMRAwDgYDVQQLDAdSb290IENBMSowKAYDVQQDDCFUV0NBIFJvb3QgQ2VydGlmaWNh dGlvbiBBdXRob3JpdHkwHhcNMDgwODI4MDcyNDMzWhcNMzAxMjMxMTU1OTU5WjBfMQswCQYDVQQG EwJUVzESMBAGA1UECgwJVEFJV0FOLUNBMRAwDgYDVQQLDAdSb290IENBMSowKAYDVQQDDCFUV0NB IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK AoIBAQCwfnK4pAOU5qfeCTiRShFAh6d8WWQUe7UREN3+v9XAu1bihSX0NXIP+FPQQeFEAcK0HMMx QhZHhTMidrIKbw/lJVBPhYa+v5guEGcevhEFhgWQxFnQfHgQsIBct+HHK3XLfJ+utdGdIzdjp9xC oi2SBBtQwXu4PhvJVgSLL1KbralW6cH/ralYhzC2gfeXRfwZVzsrb+RH9JlF/h3x+JejiB03HFyP 4HYlmlD4oFT/RJB2I9IyxsOrBr/8+7/zrX2SYgJbKdM1o5OaQ2RgXbL6Mv87BK9NQGr5x+PvI/1r y+UPizgN7gr8/g+YnzAx3WxSZfmLgb4i4RxYA7qRG4kHAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIB BjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBRqOFsmjd6LWvJPelSDGRjjCDWmujANBgkqhkiG 9w0BAQUFAAOCAQEAPNV3PdrfibqHDAhUaiBQkr6wQT25JmSDCi/oQMCXKCeCMErJk/9q56YAf4lC mtYR5VPOL8zy2gXE/uJQxDqGfczafhAJO5I1KlOy/usrBdlsXebQ79NqZp4VKIV66IIArB6nCWlW QtNoURi+VJq/REG6Sb4gumlc7rh3zc5sH62Dlhh9DrUUOYTxKOkto557HnpyWoOzeW/vtPzQCqVY T0bf+215WfKEIlKuD8z7fDvnaspHYcN6+NOSBB+4IIThNlQWx0DeO4pz3N/GCUzf7Nr/1FNCocny Yh0igzyXxfkZYiesZSLX0zzG5Y6yU8xJzrww/nsOM5D77dIUkR8Hrw== -----END CERTIFICATE----- Security Communication RootCA2 ============================== -----BEGIN CERTIFICATE----- MIIDdzCCAl+gAwIBAgIBADANBgkqhkiG9w0BAQsFADBdMQswCQYDVQQGEwJKUDElMCMGA1UEChMc U0VDT00gVHJ1c3QgU3lzdGVtcyBDTy4sTFRELjEnMCUGA1UECxMeU2VjdXJpdHkgQ29tbXVuaWNh dGlvbiBSb290Q0EyMB4XDTA5MDUyOTA1MDAzOVoXDTI5MDUyOTA1MDAzOVowXTELMAkGA1UEBhMC SlAxJTAjBgNVBAoTHFNFQ09NIFRydXN0IFN5c3RlbXMgQ08uLExURC4xJzAlBgNVBAsTHlNlY3Vy aXR5IENvbW11bmljYXRpb24gUm9vdENBMjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB ANAVOVKxUrO6xVmCxF1SrjpDZYBLx/KWvNs2l9amZIyoXvDjChz335c9S672XewhtUGrzbl+dp++ +T42NKA7wfYxEUV0kz1XgMX5iZnK5atq1LXaQZAQwdbWQonCv/Q4EpVMVAX3NuRFg3sUZdbcDE3R 3n4MqzvEFb46VqZab3ZpUql6ucjrappdUtAtCms1FgkQhNBqyjoGADdH5H5XTz+L62e4iKrFvlNV spHEfbmwhRkGeC7bYRr6hfVKkaHnFtWOojnflLhwHyg/i/xAXmODPIMqGplrz95Zajv8bxbXH/1K EOtOghY6rCcMU/Gt1SSwawNQwS08Ft1ENCcadfsCAwEAAaNCMEAwHQYDVR0OBBYEFAqFqXdlBZh8 QIH4D5csOPEK7DzPMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEB CwUAA4IBAQBMOqNErLlFsceTfsgLCkLfZOoc7llsCLqJX2rKSpWeeo8HxdpFcoJxDjrSzG+ntKEj u/Ykn8sX/oymzsLS28yN/HH8AynBbF0zX2S2ZTuJbxh2ePXcokgfGT+Ok+vx+hfuzU7jBBJV1uXk 3fs+BXziHV7Gp7yXT2g69ekuCkO2r1dcYmh8t/2jioSgrGK+KwmHNPBqAbubKVY8/gA3zyNs8U6q tnRGEmyR7jTV7JqR50S+kDFy1UkC9gLl9B/rfNmWVan/7Ir5mUf/NVoCqgTLiluHcSmRvaS0eg29 mvVXIwAHIRc/SjnRBUkLp7Y3gaVdjKozXoEofKd9J+sAro03 -----END CERTIFICATE----- EC-ACC ====== -----BEGIN CERTIFICATE----- MIIFVjCCBD6gAwIBAgIQ7is969Qh3hSoYqwE893EATANBgkqhkiG9w0BAQUFADCB8zELMAkGA1UE BhMCRVMxOzA5BgNVBAoTMkFnZW5jaWEgQ2F0YWxhbmEgZGUgQ2VydGlmaWNhY2lvIChOSUYgUS0w ODAxMTc2LUkpMSgwJgYDVQQLEx9TZXJ2ZWlzIFB1YmxpY3MgZGUgQ2VydGlmaWNhY2lvMTUwMwYD VQQLEyxWZWdldSBodHRwczovL3d3dy5jYXRjZXJ0Lm5ldC92ZXJhcnJlbCAoYykwMzE1MDMGA1UE CxMsSmVyYXJxdWlhIEVudGl0YXRzIGRlIENlcnRpZmljYWNpbyBDYXRhbGFuZXMxDzANBgNVBAMT BkVDLUFDQzAeFw0wMzAxMDcyMzAwMDBaFw0zMTAxMDcyMjU5NTlaMIHzMQswCQYDVQQGEwJFUzE7 MDkGA1UEChMyQWdlbmNpYSBDYXRhbGFuYSBkZSBDZXJ0aWZpY2FjaW8gKE5JRiBRLTA4MDExNzYt SSkxKDAmBgNVBAsTH1NlcnZlaXMgUHVibGljcyBkZSBDZXJ0aWZpY2FjaW8xNTAzBgNVBAsTLFZl Z2V1IGh0dHBzOi8vd3d3LmNhdGNlcnQubmV0L3ZlcmFycmVsIChjKTAzMTUwMwYDVQQLEyxKZXJh cnF1aWEgRW50aXRhdHMgZGUgQ2VydGlmaWNhY2lvIENhdGFsYW5lczEPMA0GA1UEAxMGRUMtQUND MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAsyLHT+KXQpWIR4NA9h0X84NzJB5R85iK w5K4/0CQBXCHYMkAqbWUZRkiFRfCQ2xmRJoNBD45b6VLeqpjt4pEndljkYRm4CgPukLjbo73FCeT ae6RDqNfDrHrZqJyTxIThmV6PttPB/SnCWDaOkKZx7J/sxaVHMf5NLWUhdWZXqBIoH7nF2W4onW4 HvPlQn2v7fOKSGRdghST2MDk/7NQcvJ29rNdQlB50JQ+awwAvthrDk4q7D7SzIKiGGUzE3eeml0a E9jD2z3Il3rucO2n5nzbcc8tlGLfbdb1OL4/pYUKGbio2Al1QnDE6u/LDsg0qBIimAy4E5S2S+zw 0JDnJwIDAQABo4HjMIHgMB0GA1UdEQQWMBSBEmVjX2FjY0BjYXRjZXJ0Lm5ldDAPBgNVHRMBAf8E BTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUoMOLRKo3pUW/l4Ba0fF4opvpXY0wfwYD VR0gBHgwdjB0BgsrBgEEAfV4AQMBCjBlMCwGCCsGAQUFBwIBFiBodHRwczovL3d3dy5jYXRjZXJ0 Lm5ldC92ZXJhcnJlbDA1BggrBgEFBQcCAjApGidWZWdldSBodHRwczovL3d3dy5jYXRjZXJ0Lm5l dC92ZXJhcnJlbCAwDQYJKoZIhvcNAQEFBQADggEBAKBIW4IB9k1IuDlVNZyAelOZ1Vr/sXE7zDkJ lF7W2u++AVtd0x7Y/X1PzaBB4DSTv8vihpw3kpBWHNzrKQXlxJ7HNd+KDM3FIUPpqojlNcAZQmNa Al6kSBg6hW/cnbw/nZzBh7h6YQjpdwt/cKt63dmXLGQehb+8dJahw3oS7AwaboMMPOhyRp/7SNVe l+axofjk70YllJyJ22k4vuxcDlbHZVHlUIiIv0LVKz3l+bqeLrPK9HOSAgu+TGbrIP65y7WZf+a2 E/rKS03Z7lNGBjvGTq2TWoF+bCpLagVFjPIhpDGQh2xlnJ2lYJU6Un/10asIbvPuW/mIPX64b24D 5EI= -----END CERTIFICATE----- Hellenic Academic and Research Institutions RootCA 2011 ======================================================= -----BEGIN CERTIFICATE----- MIIEMTCCAxmgAwIBAgIBADANBgkqhkiG9w0BAQUFADCBlTELMAkGA1UEBhMCR1IxRDBCBgNVBAoT O0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgQ2VydC4gQXV0aG9y aXR5MUAwPgYDVQQDEzdIZWxsZW5pYyBBY2FkZW1pYyBhbmQgUmVzZWFyY2ggSW5zdGl0dXRpb25z IFJvb3RDQSAyMDExMB4XDTExMTIwNjEzNDk1MloXDTMxMTIwMTEzNDk1MlowgZUxCzAJBgNVBAYT AkdSMUQwQgYDVQQKEztIZWxsZW5pYyBBY2FkZW1pYyBhbmQgUmVzZWFyY2ggSW5zdGl0dXRpb25z IENlcnQuIEF1dGhvcml0eTFAMD4GA1UEAxM3SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNo IEluc3RpdHV0aW9ucyBSb290Q0EgMjAxMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB AKlTAOMupvaO+mDYLZU++CwqVE7NuYRhlFhPjz2L5EPzdYmNUeTDN9KKiE15HrcS3UN4SoqS5tdI 1Q+kOilENbgH9mgdVc04UfCMJDGFr4PJfel3r+0ae50X+bOdOFAPplp5kYCvN66m0zH7tSYJnTxa 71HFK9+WXesyHgLacEnsbgzImjeN9/E2YEsmLIKe0HjzDQ9jpFEw4fkrJxIH2Oq9GGKYsFk3fb7u 8yBRQlqD75O6aRXxYp2fmTmCobd0LovUxQt7L/DICto9eQqakxylKHJzkUOap9FNhYS5qXSPFEDH 3N6sQWRstBmbAmNtJGSPRLIl6s5ddAxjMlyNh+UCAwEAAaOBiTCBhjAPBgNVHRMBAf8EBTADAQH/ MAsGA1UdDwQEAwIBBjAdBgNVHQ4EFgQUppFC/RNhSiOeCKQp5dgTBCPuQSUwRwYDVR0eBEAwPqA8 MAWCAy5ncjAFggMuZXUwBoIELmVkdTAGggQub3JnMAWBAy5ncjAFgQMuZXUwBoEELmVkdTAGgQQu b3JnMA0GCSqGSIb3DQEBBQUAA4IBAQAf73lB4XtuP7KMhjdCSk4cNx6NZrokgclPEg8hwAOXhiVt XdMiKahsog2p6z0GW5k6x8zDmjR/qw7IThzh+uTczQ2+vyT+bOdrwg3IBp5OjWEopmr95fZi6hg8 TqBTnbI6nOulnJEWtk2C4AwFSKls9cz4y51JtPACpf1wA+2KIaWuE4ZJwzNzvoc7dIsXRSZMFpGD /md9zU1jZ/rzAxKWeAaNsWftjj++n08C9bMJL/NMh98qy5V8AcysNnq/onN694/BtZqhFLKPM58N 7yLcZnuEvUUXBj08yrl3NI/K6s8/MT7jiOOASSXIl7WdmplNsDz4SgCbZN2fOUvRJ9e4 -----END CERTIFICATE----- Actalis Authentication Root CA ============================== -----BEGIN CERTIFICATE----- MIIFuzCCA6OgAwIBAgIIVwoRl0LE48wwDQYJKoZIhvcNAQELBQAwazELMAkGA1UEBhMCSVQxDjAM BgNVBAcMBU1pbGFuMSMwIQYDVQQKDBpBY3RhbGlzIFMucC5BLi8wMzM1ODUyMDk2NzEnMCUGA1UE AwweQWN0YWxpcyBBdXRoZW50aWNhdGlvbiBSb290IENBMB4XDTExMDkyMjExMjIwMloXDTMwMDky MjExMjIwMlowazELMAkGA1UEBhMCSVQxDjAMBgNVBAcMBU1pbGFuMSMwIQYDVQQKDBpBY3RhbGlz IFMucC5BLi8wMzM1ODUyMDk2NzEnMCUGA1UEAwweQWN0YWxpcyBBdXRoZW50aWNhdGlvbiBSb290 IENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAp8bEpSmkLO/lGMWwUKNvUTufClrJ wkg4CsIcoBh/kbWHuUA/3R1oHwiD1S0eiKD4j1aPbZkCkpAW1V8IbInX4ay8IMKx4INRimlNAJZa by/ARH6jDuSRzVju3PvHHkVH3Se5CAGfpiEd9UEtL0z9KK3giq0itFZljoZUj5NDKd45RnijMCO6 zfB9E1fAXdKDa0hMxKufgFpbOr3JpyI/gCczWw63igxdBzcIy2zSekciRDXFzMwujt0q7bd9Zg1f YVEiVRvjRuPjPdA1YprbrxTIW6HMiRvhMCb8oJsfgadHHwTrozmSBp+Z07/T6k9QnBn+locePGX2 oxgkg4YQ51Q+qDp2JE+BIcXjDwL4k5RHILv+1A7TaLndxHqEguNTVHnd25zS8gebLra8Pu2Fbe8l EfKXGkJh90qX6IuxEAf6ZYGyojnP9zz/GPvG8VqLWeICrHuS0E4UT1lF9gxeKF+w6D9Fz8+vm2/7 hNN3WpVvrJSEnu68wEqPSpP4RCHiMUVhUE4Q2OM1fEwZtN4Fv6MGn8i1zeQf1xcGDXqVdFUNaBr8 EBtiZJ1t4JWgw5QHVw0U5r0F+7if5t+L4sbnfpb2U8WANFAoWPASUHEXMLrmeGO89LKtmyuy/uE5 jF66CyCU3nuDuP/jVo23Eek7jPKxwV2dpAtMK9myGPW1n0sCAwEAAaNjMGEwHQYDVR0OBBYEFFLY iDrIn3hm7YnzezhwlMkCAjbQMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAUUtiIOsifeGbt ifN7OHCUyQICNtAwDgYDVR0PAQH/BAQDAgEGMA0GCSqGSIb3DQEBCwUAA4ICAQALe3KHwGCmSUyI WOYdiPcUZEim2FgKDk8TNd81HdTtBjHIgT5q1d07GjLukD0R0i70jsNjLiNmsGe+b7bAEzlgqqI0 JZN1Ut6nna0Oh4lScWoWPBkdg/iaKWW+9D+a2fDzWochcYBNy+A4mz+7+uAwTc+G02UQGRjRlwKx K3JCaKygvU5a2hi/a5iB0P2avl4VSM0RFbnAKVy06Ij3Pjaut2L9HmLecHgQHEhb2rykOLpn7VU+ Xlff1ANATIGk0k9jpwlCCRT8AKnCgHNPLsBA2RF7SOp6AsDT6ygBJlh0wcBzIm2Tlf05fbsq4/aC 4yyXX04fkZT6/iyj2HYauE2yOE+b+h1IYHkm4vP9qdCa6HCPSXrW5b0KDtst842/6+OkfcvHlXHo 2qN8xcL4dJIEG4aspCJTQLas/kx2z/uUMsA1n3Y/buWQbqCmJqK4LL7RK4X9p2jIugErsWx0Hbhz lefut8cl8ABMALJ+tguLHPPAUJ4lueAI3jZm/zel0btUZCzJJ7VLkn5l/9Mt4blOvH+kQSGQQXem OR/qnuOf0GZvBeyqdn6/axag67XH/JJULysRJyU3eExRarDzzFhdFPFqSBX/wge2sY0PjlxQRrM9 vwGYT7JZVEc+NHt4bVaTLnPqZih4zR0Uv6CPLy64Lo7yFIrM6bV8+2ydDKXhlg== -----END CERTIFICATE----- Trustis FPS Root CA =================== -----BEGIN CERTIFICATE----- MIIDZzCCAk+gAwIBAgIQGx+ttiD5JNM2a/fH8YygWTANBgkqhkiG9w0BAQUFADBFMQswCQYDVQQG EwJHQjEYMBYGA1UEChMPVHJ1c3RpcyBMaW1pdGVkMRwwGgYDVQQLExNUcnVzdGlzIEZQUyBSb290 IENBMB4XDTAzMTIyMzEyMTQwNloXDTI0MDEyMTExMzY1NFowRTELMAkGA1UEBhMCR0IxGDAWBgNV BAoTD1RydXN0aXMgTGltaXRlZDEcMBoGA1UECxMTVHJ1c3RpcyBGUFMgUm9vdCBDQTCCASIwDQYJ KoZIhvcNAQEBBQADggEPADCCAQoCggEBAMVQe547NdDfxIzNjpvto8A2mfRC6qc+gIMPpqdZh8mQ RUN+AOqGeSoDvT03mYlmt+WKVoaTnGhLaASMk5MCPjDSNzoiYYkchU59j9WvezX2fihHiTHcDnlk H5nSW7r+f2C/revnPDgpai/lkQtV/+xvWNUtyd5MZnGPDNcE2gfmHhjjvSkCqPoc4Vu5g6hBSLwa cY3nYuUtsuvffM/bq1rKMfFMIvMFE/eC+XN5DL7XSxzA0RU8k0Fk0ea+IxciAIleH2ulrG6nS4zt o3Lmr2NNL4XSFDWaLk6M6jKYKIahkQlBOrTh4/L68MkKokHdqeMDx4gVOxzUGpTXn2RZEm0CAwEA AaNTMFEwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBS6+nEleYtXQSUhhgtx67JkDoshZzAd BgNVHQ4EFgQUuvpxJXmLV0ElIYYLceuyZA6LIWcwDQYJKoZIhvcNAQEFBQADggEBAH5Y//01GX2c GE+esCu8jowU/yyg2kdbw++BLa8F6nRIW/M+TgfHbcWzk88iNVy2P3UnXwmWzaD+vkAMXBJV+JOC yinpXj9WV4s4NvdFGkwozZ5BuO1WTISkQMi4sKUraXAEasP41BIy+Q7DsdwyhEQsb8tGD+pmQQ9P 8Vilpg0ND2HepZ5dfWWhPBfnqFVO76DH7cZEf1T1o+CP8HxVIo8ptoGj4W1OLBuAZ+ytIJ8MYmHV l/9D7S3B2l0pKoU/rGXuhg8FjZBf3+6f9L/uHfuY5H+QK4R4EA5sSVPvFVtlRkpdr7r7OnIdzfYl iB6XzCGcKQENZetX2fNXlrtIzYE= -----END CERTIFICATE----- StartCom Certification Authority ================================ -----BEGIN CERTIFICATE----- MIIHhzCCBW+gAwIBAgIBLTANBgkqhkiG9w0BAQsFADB9MQswCQYDVQQGEwJJTDEWMBQGA1UEChMN U3RhcnRDb20gTHRkLjErMCkGA1UECxMiU2VjdXJlIERpZ2l0YWwgQ2VydGlmaWNhdGUgU2lnbmlu ZzEpMCcGA1UEAxMgU3RhcnRDb20gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMDYwOTE3MTk0 NjM3WhcNMzYwOTE3MTk0NjM2WjB9MQswCQYDVQQGEwJJTDEWMBQGA1UEChMNU3RhcnRDb20gTHRk LjErMCkGA1UECxMiU2VjdXJlIERpZ2l0YWwgQ2VydGlmaWNhdGUgU2lnbmluZzEpMCcGA1UEAxMg U3RhcnRDb20gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAw ggIKAoICAQDBiNsJvGxGfHiflXu1M5DycmLWwTYgIiRezul38kMKogZkpMyONvg45iPwbm2xPN1y o4UcodM9tDMr0y+v/uqwQVlntsQGfQqedIXWeUyAN3rfOQVSWff0G0ZDpNKFhdLDcfN1YjS6LIp/ Ho/u7TTQEceWzVI9ujPW3U3eCztKS5/CJi/6tRYccjV3yjxd5srhJosaNnZcAdt0FCX+7bWgiA/d eMotHweXMAEtcnn6RtYTKqi5pquDSR3l8u/d5AGOGAqPY1MWhWKpDhk6zLVmpsJrdAfkK+F2PrRt 2PZE4XNiHzvEvqBTViVsUQn3qqvKv3b9bZvzndu/PWa8DFaqr5hIlTpL36dYUNk4dalb6kMMAv+Z 6+hsTXBbKWWc3apdzK8BMewM69KN6Oqce+Zu9ydmDBpI125C4z/eIT574Q1w+2OqqGwaVLRcJXrJ osmLFqa7LH4XXgVNWG4SHQHuEhANxjJ/GP/89PrNbpHoNkm+Gkhpi8KWTRoSsmkXwQqQ1vp5Iki/ untp+HDH+no32NgN0nZPV/+Qt+OR0t3vwmC3Zzrd/qqc8NSLf3Iizsafl7b4r4qgEKjZ+xjGtrVc UjyJthkqcwEKDwOzEmDyei+B26Nu/yYwl/WL3YlXtq09s68rxbd2AvCl1iuahhQqcvbjM4xdCUsT 37uMdBNSSwIDAQABo4ICEDCCAgwwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYD VR0OBBYEFE4L7xqkQFulF2mHMMo0aEPQQa7yMB8GA1UdIwQYMBaAFE4L7xqkQFulF2mHMMo0aEPQ Qa7yMIIBWgYDVR0gBIIBUTCCAU0wggFJBgsrBgEEAYG1NwEBATCCATgwLgYIKwYBBQUHAgEWImh0 dHA6Ly93d3cuc3RhcnRzc2wuY29tL3BvbGljeS5wZGYwNAYIKwYBBQUHAgEWKGh0dHA6Ly93d3cu c3RhcnRzc2wuY29tL2ludGVybWVkaWF0ZS5wZGYwgc8GCCsGAQUFBwICMIHCMCcWIFN0YXJ0IENv bW1lcmNpYWwgKFN0YXJ0Q29tKSBMdGQuMAMCAQEagZZMaW1pdGVkIExpYWJpbGl0eSwgcmVhZCB0 aGUgc2VjdGlvbiAqTGVnYWwgTGltaXRhdGlvbnMqIG9mIHRoZSBTdGFydENvbSBDZXJ0aWZpY2F0 aW9uIEF1dGhvcml0eSBQb2xpY3kgYXZhaWxhYmxlIGF0IGh0dHA6Ly93d3cuc3RhcnRzc2wuY29t L3BvbGljeS5wZGYwEQYJYIZIAYb4QgEBBAQDAgAHMDgGCWCGSAGG+EIBDQQrFilTdGFydENvbSBG cmVlIFNTTCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTANBgkqhkiG9w0BAQsFAAOCAgEAjo/n3JR5 fPGFf59Jb2vKXfuM/gTFwWLRfUKKvFO3lANmMD+x5wqnUCBVJX92ehQN6wQOQOY+2IirByeDqXWm N3PH/UvSTa0XQMhGvjt/UfzDtgUx3M2FIk5xt/JxXrAaxrqTi3iSSoX4eA+D/i+tLPfkpLst0OcN Org+zvZ49q5HJMqjNTbOx8aHmNrs++myziebiMMEofYLWWivydsQD032ZGNcpRJvkrKTlMeIFw6T tn5ii5B/q06f/ON1FE8qMt9bDeD1e5MNq6HPh+GlBEXoPBKlCcWw0bdT82AUuoVpaiF8H3VhFyAX e2w7QSlc4axa0c2Mm+tgHRns9+Ww2vl5GKVFP0lDV9LdJNUso/2RjSe15esUBppMeyG7Oq0wBhjA 2MFrLH9ZXF2RsXAiV+uKa0hK1Q8p7MZAwC+ITGgBF3f0JBlPvfrhsiAhS90a2Cl9qrjeVOwhVYBs HvUwyKMQ5bLmKhQxw4UtjJixhlpPiVktucf3HMiKf8CdBUrmQk9io20ppB+Fq9vlgcitKj1MXVuE JnHEhV5xJMqlG2zYYdMa4FTbzrqpMrUi9nNBCV24F10OD5mQ1kfabwo6YigUZ4LZ8dCAWZvLMdib D4x3TrVoivJs9iQOLWxwxXPR3hTQcY+203sC9uO41Alua551hDnmfyWl8kgAwKQB2j8= -----END CERTIFICATE----- StartCom Certification Authority G2 =================================== -----BEGIN CERTIFICATE----- MIIFYzCCA0ugAwIBAgIBOzANBgkqhkiG9w0BAQsFADBTMQswCQYDVQQGEwJJTDEWMBQGA1UEChMN U3RhcnRDb20gTHRkLjEsMCoGA1UEAxMjU3RhcnRDb20gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkg RzIwHhcNMTAwMTAxMDEwMDAxWhcNMzkxMjMxMjM1OTAxWjBTMQswCQYDVQQGEwJJTDEWMBQGA1UE ChMNU3RhcnRDb20gTHRkLjEsMCoGA1UEAxMjU3RhcnRDb20gQ2VydGlmaWNhdGlvbiBBdXRob3Jp dHkgRzIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC2iTZbB7cgNr2Cu+EWIAOVeq8O o1XJJZlKxdBWQYeQTSFgpBSHO839sj60ZwNq7eEPS8CRhXBF4EKe3ikj1AENoBB5uNsDvfOpL9HG 4A/LnooUCri99lZi8cVytjIl2bLzvWXFDSxu1ZJvGIsAQRSCb0AgJnooD/Uefyf3lLE3PbfHkffi Aez9lInhzG7TNtYKGXmu1zSCZf98Qru23QumNK9LYP5/Q0kGi4xDuFby2X8hQxfqp0iVAXV16iul Q5XqFYSdCI0mblWbq9zSOdIxHWDirMxWRST1HFSr7obdljKF+ExP6JV2tgXdNiNnvP8V4so75qbs O+wmETRIjfaAKxojAuuKHDp2KntWFhxyKrOq42ClAJ8Em+JvHhRYW6Vsi1g8w7pOOlz34ZYrPu8H vKTlXcxNnw3h3Kq74W4a7I/htkxNeXJdFzULHdfBR9qWJODQcqhaX2YtENwvKhOuJv4KHBnM0D4L nMgJLvlblnpHnOl68wVQdJVznjAJ85eCXuaPOQgeWeU1FEIT/wCc976qUM/iUUjXuG+v+E5+M5iS FGI6dWPPe/regjupuznixL0sAA7IF6wT700ljtizkC+p2il9Ha90OrInwMEePnWjFqmveiJdnxMa z6eg6+OGCtP95paV1yPIN93EfKo2rJgaErHgTuixO/XWb/Ew1wIDAQABo0IwQDAPBgNVHRMBAf8E BTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUS8W0QGutHLOlHGVuRjaJhwUMDrYwDQYJ KoZIhvcNAQELBQADggIBAHNXPyzVlTJ+N9uWkusZXn5T50HsEbZH77Xe7XRcxfGOSeD8bpkTzZ+K 2s06Ctg6Wgk/XzTQLwPSZh0avZyQN8gMjgdalEVGKua+etqhqaRpEpKwfTbURIfXUfEpY9Z1zRbk J4kd+MIySP3bmdCPX1R0zKxnNBFi2QwKN4fRoxdIjtIXHfbX/dtl6/2o1PXWT6RbdejF0mCy2wl+ JYt7ulKSnj7oxXehPOBKc2thz4bcQ///If4jXSRK9dNtD2IEBVeC2m6kMyV5Sy5UGYvMLD0w6dEG /+gyRr61M3Z3qAFdlsHB1b6uJcDJHgoJIIihDsnzb02CVAAgp9KP5DlUFy6NHrgbuxu9mk47EDTc nIhT76IxW1hPkWLIwpqazRVdOKnWvvgTtZ8SafJQYqz7Fzf07rh1Z2AQ+4NQ+US1dZxAF7L+/Xld blhYXzD8AK6vM8EOTmy6p6ahfzLbOOCxchcKK5HsamMm7YnUeMx0HgX4a/6ManY5Ka5lIxKVCCIc l85bBu4M4ru8H0ST9tg4RQUh7eStqxK2A6RCLi3ECToDZ2mEmuFZkIoohdVddLHRDiBYmxOlsGOm 7XtH/UVVMKTumtTm4ofvmMkyghEpIrwACjFeLQ/Ajulrso8uBtjRkcfGEvRM/TAXw8HaOFvjqerm obp573PYtlNXLfbQ4ddI -----END CERTIFICATE----- Buypass Class 2 Root CA ======================= -----BEGIN CERTIFICATE----- MIIFWTCCA0GgAwIBAgIBAjANBgkqhkiG9w0BAQsFADBOMQswCQYDVQQGEwJOTzEdMBsGA1UECgwU QnV5cGFzcyBBUy05ODMxNjMzMjcxIDAeBgNVBAMMF0J1eXBhc3MgQ2xhc3MgMiBSb290IENBMB4X DTEwMTAyNjA4MzgwM1oXDTQwMTAyNjA4MzgwM1owTjELMAkGA1UEBhMCTk8xHTAbBgNVBAoMFEJ1 eXBhc3MgQVMtOTgzMTYzMzI3MSAwHgYDVQQDDBdCdXlwYXNzIENsYXNzIDIgUm9vdCBDQTCCAiIw DQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANfHXvfBB9R3+0Mh9PT1aeTuMgHbo4Yf5FkNuud1 g1Lr6hxhFUi7HQfKjK6w3Jad6sNgkoaCKHOcVgb/S2TwDCo3SbXlzwx87vFKu3MwZfPVL4O2fuPn 9Z6rYPnT8Z2SdIrkHJasW4DptfQxh6NR/Md+oW+OU3fUl8FVM5I+GC911K2GScuVr1QGbNgGE41b /+EmGVnAJLqBcXmQRFBoJJRfuLMR8SlBYaNByyM21cHxMlAQTn/0hpPshNOOvEu/XAFOBz3cFIqU CqTqc/sLUegTBxj6DvEr0VQVfTzh97QZQmdiXnfgolXsttlpF9U6r0TtSsWe5HonfOV116rLJeff awrbD02TTqigzXsu8lkBarcNuAeBfos4GzjmCleZPe4h6KP1DBbdi+w0jpwqHAAVF41og9JwnxgI zRFo1clrUs3ERo/ctfPYV3Me6ZQ5BL/T3jjetFPsaRyifsSP5BtwrfKi+fv3FmRmaZ9JUaLiFRhn Bkp/1Wy1TbMz4GHrXb7pmA8y1x1LPC5aAVKRCfLf6o3YBkBjqhHk/sM3nhRSP/TizPJhk9H9Z2vX Uq6/aKtAQ6BXNVN48FP4YUIHZMbXb5tMOA1jrGKvNouicwoN9SG9dKpN6nIDSdvHXx1iY8f93ZHs M+71bbRuMGjeyNYmsHVee7QHIJihdjK4TWxPAgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wHQYD VR0OBBYEFMmAd+BikoL1RpzzuvdMw964o605MA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQsF AAOCAgEAU18h9bqwOlI5LJKwbADJ784g7wbylp7ppHR/ehb8t/W2+xUbP6umwHJdELFx7rxP462s A20ucS6vxOOto70MEae0/0qyexAQH6dXQbLArvQsWdZHEIjzIVEpMMpghq9Gqx3tOluwlN5E40EI osHsHdb9T7bWR9AUC8rmyrV7d35BH16Dx7aMOZawP5aBQW9gkOLo+fsicdl9sz1Gv7SEr5AcD48S aq/v7h56rgJKihcrdv6sVIkkLE8/trKnToyokZf7KcZ7XC25y2a2t6hbElGFtQl+Ynhw/qlqYLYd DnkM/crqJIByw5c/8nerQyIKx+u2DISCLIBrQYoIwOula9+ZEsuK1V6ADJHgJgg2SMX6OBE1/yWD LfJ6v9r9jv6ly0UsH8SIU653DtmadsWOLB2jutXsMq7Aqqz30XpN69QH4kj3Io6wpJ9qzo6ysmD0 oyLQI+uUWnpp3Q+/QFesa1lQ2aOZ4W7+jQF5JyMV3pKdewlNWudLSDBaGOYKbeaP4NK75t98biGC wWg5TbSYWGZizEqQXsP6JwSxeRV0mcy+rSDeJmAc61ZRpqPq5KM/p/9h3PFaTWwyI0PurKju7koS CTxdccK+efrCh2gdC/1cacwG0Jp9VJkqyTkaGa9LKkPzY11aWOIv4x3kqdbQCtCev9eBCfHJxyYN rJgWVqA= -----END CERTIFICATE----- Buypass Class 3 Root CA ======================= -----BEGIN CERTIFICATE----- MIIFWTCCA0GgAwIBAgIBAjANBgkqhkiG9w0BAQsFADBOMQswCQYDVQQGEwJOTzEdMBsGA1UECgwU QnV5cGFzcyBBUy05ODMxNjMzMjcxIDAeBgNVBAMMF0J1eXBhc3MgQ2xhc3MgMyBSb290IENBMB4X DTEwMTAyNjA4Mjg1OFoXDTQwMTAyNjA4Mjg1OFowTjELMAkGA1UEBhMCTk8xHTAbBgNVBAoMFEJ1 eXBhc3MgQVMtOTgzMTYzMzI3MSAwHgYDVQQDDBdCdXlwYXNzIENsYXNzIDMgUm9vdCBDQTCCAiIw DQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKXaCpUWUOOV8l6ddjEGMnqb8RB2uACatVI2zSRH sJ8YZLya9vrVediQYkwiL944PdbgqOkcLNt4EemOaFEVcsfzM4fkoF0LXOBXByow9c3EN3coTRiR 5r/VUv1xLXA+58bEiuPwKAv0dpihi4dVsjoT/Lc+JzeOIuOoTyrvYLs9tznDDgFHmV0ST9tD+leh 7fmdvhFHJlsTmKtdFoqwNxxXnUX/iJY2v7vKB3tvh2PX0DJq1l1sDPGzbjniazEuOQAnFN44wOwZ ZoYS6J1yFhNkUsepNxz9gjDthBgd9K5c/3ATAOux9TN6S9ZV+AWNS2mw9bMoNlwUxFFzTWsL8TQH 2xc519woe2v1n/MuwU8XKhDzzMro6/1rqy6any2CbgTUUgGTLT2G/H783+9CHaZr77kgxve9oKeV /afmiSTYzIw0bOIjL9kSGiG5VZFvC5F5GQytQIgLcOJ60g7YaEi7ghM5EFjp2CoHxhLbWNvSO1UQ RwUVZ2J+GGOmRj8JDlQyXr8NYnon74Do29lLBlo3WiXQCBJ31G8JUJc9yB3D34xFMFbG02SrZvPA Xpacw8Tvw3xrizp5f7NJzz3iiZ+gMEuFuZyUJHmPfWupRWgPK9Dx2hzLabjKSWJtyNBjYt1gD1iq j6G8BaVmos8bdrKEZLFMOVLAMLrwjEsCsLa3AgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wHQYD VR0OBBYEFEe4zf/lb+74suwvTg75JbCOPGvDMA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQsF AAOCAgEAACAjQTUEkMJAYmDv4jVM1z+s4jSQuKFvdvoWFqRINyzpkMLyPPgKn9iB5btb2iUspKdV cSQy9sgL8rxq+JOssgfCX5/bzMiKqr5qb+FJEMwx14C7u8jYog5kV+qi9cKpMRXSIGrs/CIBKM+G uIAeqcwRpTzyFrNHnfzSgCHEy9BHcEGhyoMZCCxt8l13nIoUE9Q2HJLw5QY33KbmkJs4j1xrG0aG Q0JfPgEHU1RdZX33inOhmlRaHylDFCfChQ+1iHsaO5S3HWCntZznKWlXWpuTekMwGwPXYshApqr8 ZORK15FTAaggiG6cX0S5y2CBNOxv033aSF/rtJC8LakcC6wc1aJoIIAE1vyxjy+7SjENSoYc6+I2 KSb12tjE8nVhz36udmNKekBlk4f4HoCMhuWG1o8O/FMsYOgWYRqiPkN7zTlgVGr18okmAWiDSKIz 6MkEkbIRNBE+6tBDGR8Dk5AM/1E9V/RBbuHLoL7ryWPNbczk+DaqaJ3tvV2XcEQNtg413OEMXbug UZTLfhbrES+jkkXITHHZvMmZUldGL1DPvTVp9D0VzgalLA8+9oG6lLvDu79leNKGef9JOxqDDPDe eOzI8k1MGt6CKfjBWtrt7uYnXuhF0J0cUahoq0Tj0Itq4/g7u9xN12TyUb7mqqta6THuBrxzvxNi Cp/HuZc= -----END CERTIFICATE----- T-TeleSec GlobalRoot Class 3 ============================ -----BEGIN CERTIFICATE----- MIIDwzCCAqugAwIBAgIBATANBgkqhkiG9w0BAQsFADCBgjELMAkGA1UEBhMCREUxKzApBgNVBAoM IlQtU3lzdGVtcyBFbnRlcnByaXNlIFNlcnZpY2VzIEdtYkgxHzAdBgNVBAsMFlQtU3lzdGVtcyBU cnVzdCBDZW50ZXIxJTAjBgNVBAMMHFQtVGVsZVNlYyBHbG9iYWxSb290IENsYXNzIDMwHhcNMDgx MDAxMTAyOTU2WhcNMzMxMDAxMjM1OTU5WjCBgjELMAkGA1UEBhMCREUxKzApBgNVBAoMIlQtU3lz dGVtcyBFbnRlcnByaXNlIFNlcnZpY2VzIEdtYkgxHzAdBgNVBAsMFlQtU3lzdGVtcyBUcnVzdCBD ZW50ZXIxJTAjBgNVBAMMHFQtVGVsZVNlYyBHbG9iYWxSb290IENsYXNzIDMwggEiMA0GCSqGSIb3 DQEBAQUAA4IBDwAwggEKAoIBAQC9dZPwYiJvJK7genasfb3ZJNW4t/zN8ELg63iIVl6bmlQdTQyK 9tPPcPRStdiTBONGhnFBSivwKixVA9ZIw+A5OO3yXDw/RLyTPWGrTs0NvvAgJ1gORH8EGoel15YU NpDQSXuhdfsaa3Ox+M6pCSzyU9XDFES4hqX2iys52qMzVNn6chr3IhUciJFrf2blw2qAsCTz34ZF iP0Zf3WHHx+xGwpzJFu5ZeAsVMhg02YXP+HMVDNzkQI6pn97djmiH5a2OK61yJN0HZ65tOVgnS9W 0eDrXltMEnAMbEQgqxHY9Bn20pxSN+f6tsIxO0rUFJmtxxr1XV/6B7h8DR/Wgx6zAgMBAAGjQjBA MA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBS1A/d2O2GCahKqGFPr AyGUv/7OyjANBgkqhkiG9w0BAQsFAAOCAQEAVj3vlNW92nOyWL6ukK2YJ5f+AbGwUgC4TeQbIXQb fsDuXmkqJa9c1h3a0nnJ85cp4IaH3gRZD/FZ1GSFS5mvJQQeyUapl96Cshtwn5z2r3Ex3XsFpSzT ucpH9sry9uetuUg/vBa3wW306gmv7PO15wWeph6KU1HWk4HMdJP2udqmJQV0eVp+QD6CSyYRMG7h P0HHRwA11fXT91Q+gT3aSWqas+8QPebrb9HIIkfLzM8BMZLZGOMivgkeGj5asuRrDFR6fUNOuIml e9eiPZaGzPImNC1qkp2aGtAw4l1OBLBfiyB+d8E9lYLRRpo7PHi4b6HQDWSieB4pTpPDpFQUWw== -----END CERTIFICATE----- EE Certification Centre Root CA =============================== -----BEGIN CERTIFICATE----- MIIEAzCCAuugAwIBAgIQVID5oHPtPwBMyonY43HmSjANBgkqhkiG9w0BAQUFADB1MQswCQYDVQQG EwJFRTEiMCAGA1UECgwZQVMgU2VydGlmaXRzZWVyaW1pc2tlc2t1czEoMCYGA1UEAwwfRUUgQ2Vy dGlmaWNhdGlvbiBDZW50cmUgUm9vdCBDQTEYMBYGCSqGSIb3DQEJARYJcGtpQHNrLmVlMCIYDzIw MTAxMDMwMTAxMDMwWhgPMjAzMDEyMTcyMzU5NTlaMHUxCzAJBgNVBAYTAkVFMSIwIAYDVQQKDBlB UyBTZXJ0aWZpdHNlZXJpbWlza2Vza3VzMSgwJgYDVQQDDB9FRSBDZXJ0aWZpY2F0aW9uIENlbnRy ZSBSb290IENBMRgwFgYJKoZIhvcNAQkBFglwa2lAc2suZWUwggEiMA0GCSqGSIb3DQEBAQUAA4IB DwAwggEKAoIBAQDIIMDs4MVLqwd4lfNE7vsLDP90jmG7sWLqI9iroWUyeuuOF0+W2Ap7kaJjbMeM TC55v6kF/GlclY1i+blw7cNRfdCT5mzrMEvhvH2/UpvObntl8jixwKIy72KyaOBhU8E2lf/slLo2 rpwcpzIP5Xy0xm90/XsY6KxX7QYgSzIwWFv9zajmofxwvI6Sc9uXp3whrj3B9UiHbCe9nyV0gVWw 93X2PaRka9ZP585ArQ/dMtO8ihJTmMmJ+xAdTX7Nfh9WDSFwhfYggx/2uh8Ej+p3iDXE/+pOoYtN P2MbRMNE1CV2yreN1x5KZmTNXMWcg+HCCIia7E6j8T4cLNlsHaFLAgMBAAGjgYowgYcwDwYDVR0T AQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFBLyWj7qVhy/zQas8fElyalL1BSZ MEUGA1UdJQQ+MDwGCCsGAQUFBwMCBggrBgEFBQcDAQYIKwYBBQUHAwMGCCsGAQUFBwMEBggrBgEF BQcDCAYIKwYBBQUHAwkwDQYJKoZIhvcNAQEFBQADggEBAHv25MANqhlHt01Xo/6tu7Fq1Q+e2+Rj xY6hUFaTlrg4wCQiZrxTFGGVv9DHKpY5P30osxBAIWrEr7BSdxjhlthWXePdNl4dp1BUoMUq5KqM lIpPnTX/dqQGE5Gion0ARD9V04I8GtVbvFZMIi5GQ4okQC3zErg7cBqklrkar4dBGmoYDQZPxz5u uSlNDUmJEYcyW+ZLBMjkXOZ0c5RdFpgTlf7727FE5TpwrDdr5rMzcijJs1eg9gIWiAYLtqZLICjU 3j2LrTcFU3T+bsy8QxdxXvnFzBqpYe73dgzzcvRyrc9yAjYHR8/vGVCJYMzpJJUPwssd8m92kMfM dcGWxZ0= -----END CERTIFICATE----- TURKTRUST Certificate Services Provider Root 2007 ================================================= -----BEGIN CERTIFICATE----- MIIEPTCCAyWgAwIBAgIBATANBgkqhkiG9w0BAQUFADCBvzE/MD0GA1UEAww2VMOcUktUUlVTVCBF bGVrdHJvbmlrIFNlcnRpZmlrYSBIaXptZXQgU2HEn2xhecSxY8Sxc8SxMQswCQYDVQQGEwJUUjEP MA0GA1UEBwwGQW5rYXJhMV4wXAYDVQQKDFVUw5xSS1RSVVNUIEJpbGdpIMSwbGV0acWfaW0gdmUg QmlsacWfaW0gR8O8dmVubGnEn2kgSGl6bWV0bGVyaSBBLsWeLiAoYykgQXJhbMSxayAyMDA3MB4X DTA3MTIyNTE4MzcxOVoXDTE3MTIyMjE4MzcxOVowgb8xPzA9BgNVBAMMNlTDnFJLVFJVU1QgRWxl a3Ryb25payBTZXJ0aWZpa2EgSGl6bWV0IFNhxJ9sYXnEsWPEsXPEsTELMAkGA1UEBhMCVFIxDzAN BgNVBAcMBkFua2FyYTFeMFwGA1UECgxVVMOcUktUUlVTVCBCaWxnaSDEsGxldGnFn2ltIHZlIEJp bGnFn2ltIEfDvHZlbmxpxJ9pIEhpem1ldGxlcmkgQS7Fni4gKGMpIEFyYWzEsWsgMjAwNzCCASIw DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKu3PgqMyKVYFeaK7yc9SrToJdPNM8Ig3BnuiD9N YvDdE3ePYakqtdTyuTFYKTsvP2qcb3N2Je40IIDu6rfwxArNK4aUyeNgsURSsloptJGXg9i3phQv KUmi8wUG+7RP2qFsmmaf8EMJyupyj+sA1zU511YXRxcw9L6/P8JorzZAwan0qafoEGsIiveGHtya KhUG9qPw9ODHFNRRf8+0222vR5YXm3dx2KdxnSQM9pQ/hTEST7ruToK4uT6PIzdezKKqdfcYbwnT rqdUKDT74eA7YH2gvnmJhsifLfkKS8RQouf9eRbHegsYz85M733WB2+Y8a+xwXrXgTW4qhe04MsC AwEAAaNCMEAwHQYDVR0OBBYEFCnFkKslrxHkYb+j/4hhkeYO/pyBMA4GA1UdDwEB/wQEAwIBBjAP BgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBBQUAA4IBAQAQDdr4Ouwo0RSVgrESLFF6QSU2TJ/s Px+EnWVUXKgWAkD6bho3hO9ynYYKVZ1WKKxmLNA6VpM0ByWtCLCPyA8JWcqdmBzlVPi5RX9ql2+I aE1KBiY3iAIOtsbWcpnOa3faYjGkVh+uX4132l32iPwa2Z61gfAyuOOI0JzzaqC5mxRZNTZPz/OO Xl0XrRWV2N2y1RVuAE6zS89mlOTgzbUF2mNXi+WzqtvALhyQRNsaXRik7r4EW5nVcV9VZWRi1aKb BFmGyGJ353yCRWo9F7/snXUMrqNvWtMvmDb08PUZqxFdyKbjKlhqQgnDvZImZjINXQhVdP+MmNAK poRq0Tl9 -----END CERTIFICATE----- D-TRUST Root Class 3 CA 2 2009 ============================== -----BEGIN CERTIFICATE----- MIIEMzCCAxugAwIBAgIDCYPzMA0GCSqGSIb3DQEBCwUAME0xCzAJBgNVBAYTAkRFMRUwEwYDVQQK DAxELVRydXN0IEdtYkgxJzAlBgNVBAMMHkQtVFJVU1QgUm9vdCBDbGFzcyAzIENBIDIgMjAwOTAe Fw0wOTExMDUwODM1NThaFw0yOTExMDUwODM1NThaME0xCzAJBgNVBAYTAkRFMRUwEwYDVQQKDAxE LVRydXN0IEdtYkgxJzAlBgNVBAMMHkQtVFJVU1QgUm9vdCBDbGFzcyAzIENBIDIgMjAwOTCCASIw DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANOySs96R+91myP6Oi/WUEWJNTrGa9v+2wBoqOAD ER03UAifTUpolDWzU9GUY6cgVq/eUXjsKj3zSEhQPgrfRlWLJ23DEE0NkVJD2IfgXU42tSHKXzlA BF9bfsyjxiupQB7ZNoTWSPOSHjRGICTBpFGOShrvUD9pXRl/RcPHAY9RySPocq60vFYJfxLLHLGv KZAKyVXMD9O0Gu1HNVpK7ZxzBCHQqr0ME7UAyiZsxGsMlFqVlNpQmvH/pStmMaTJOKDfHR+4CS7z p+hnUquVH+BGPtikw8paxTGA6Eian5Rp/hnd2HN8gcqW3o7tszIFZYQ05ub9VxC1X3a/L7AQDcUC AwEAAaOCARowggEWMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFP3aFMSfMN4hvR5COfyrYyNJ 4PGEMA4GA1UdDwEB/wQEAwIBBjCB0wYDVR0fBIHLMIHIMIGAoH6gfIZ6bGRhcDovL2RpcmVjdG9y eS5kLXRydXN0Lm5ldC9DTj1ELVRSVVNUJTIwUm9vdCUyMENsYXNzJTIwMyUyMENBJTIwMiUyMDIw MDksTz1ELVRydXN0JTIwR21iSCxDPURFP2NlcnRpZmljYXRlcmV2b2NhdGlvbmxpc3QwQ6BBoD+G PWh0dHA6Ly93d3cuZC10cnVzdC5uZXQvY3JsL2QtdHJ1c3Rfcm9vdF9jbGFzc18zX2NhXzJfMjAw OS5jcmwwDQYJKoZIhvcNAQELBQADggEBAH+X2zDI36ScfSF6gHDOFBJpiBSVYEQBrLLpME+bUMJm 2H6NMLVwMeniacfzcNsgFYbQDfC+rAF1hM5+n02/t2A7nPPKHeJeaNijnZflQGDSNiH+0LS4F9p0 o3/U37CYAqxva2ssJSRyoWXuJVrl5jLn8t+rSfrzkGkj2wTZ51xY/GXUl77M/C4KzCUqNQT4YJEV dT1B/yMfGchs64JTBKbkTCJNjYy6zltz7GRUUG3RnFX7acM2w4y8PIWmawomDeCTmGCufsYkl4ph X5GOZpIJhzbNi5stPvZR1FDUWSi9g/LMKHtThm3YJohw1+qRzT65ysCQblrGXnRl11z+o+I= -----END CERTIFICATE----- D-TRUST Root Class 3 CA 2 EV 2009 ================================= -----BEGIN CERTIFICATE----- MIIEQzCCAyugAwIBAgIDCYP0MA0GCSqGSIb3DQEBCwUAMFAxCzAJBgNVBAYTAkRFMRUwEwYDVQQK DAxELVRydXN0IEdtYkgxKjAoBgNVBAMMIUQtVFJVU1QgUm9vdCBDbGFzcyAzIENBIDIgRVYgMjAw OTAeFw0wOTExMDUwODUwNDZaFw0yOTExMDUwODUwNDZaMFAxCzAJBgNVBAYTAkRFMRUwEwYDVQQK DAxELVRydXN0IEdtYkgxKjAoBgNVBAMMIUQtVFJVU1QgUm9vdCBDbGFzcyAzIENBIDIgRVYgMjAw OTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAJnxhDRwui+3MKCOvXwEz75ivJn9gpfS egpnljgJ9hBOlSJzmY3aFS3nBfwZcyK3jpgAvDw9rKFs+9Z5JUut8Mxk2og+KbgPCdM03TP1YtHh zRnp7hhPTFiu4h7WDFsVWtg6uMQYZB7jM7K1iXdODL/ZlGsTl28So/6ZqQTMFexgaDbtCHu39b+T 7WYxg4zGcTSHThfqr4uRjRxWQa4iN1438h3Z0S0NL2lRp75mpoo6Kr3HGrHhFPC+Oh25z1uxav60 sUYgovseO3Dvk5h9jHOW8sXvhXCtKSb8HgQ+HKDYD8tSg2J87otTlZCpV6LqYQXY+U3EJ/pure35 11H3a6UCAwEAAaOCASQwggEgMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFNOUikxiEyoZLsyv cop9NteaHNxnMA4GA1UdDwEB/wQEAwIBBjCB3QYDVR0fBIHVMIHSMIGHoIGEoIGBhn9sZGFwOi8v ZGlyZWN0b3J5LmQtdHJ1c3QubmV0L0NOPUQtVFJVU1QlMjBSb290JTIwQ2xhc3MlMjAzJTIwQ0El MjAyJTIwRVYlMjAyMDA5LE89RC1UcnVzdCUyMEdtYkgsQz1ERT9jZXJ0aWZpY2F0ZXJldm9jYXRp b25saXN0MEagRKBChkBodHRwOi8vd3d3LmQtdHJ1c3QubmV0L2NybC9kLXRydXN0X3Jvb3RfY2xh c3NfM19jYV8yX2V2XzIwMDkuY3JsMA0GCSqGSIb3DQEBCwUAA4IBAQA07XtaPKSUiO8aEXUHL7P+ PPoeUSbrh/Yp3uDx1MYkCenBz1UbtDDZzhr+BlGmFaQt77JLvyAoJUnRpjZ3NOhk31KxEcdzes05 nsKtjHEh8lprr988TlWvsoRlFIm5d8sqMb7Po23Pb0iUMkZv53GMoKaEGTcH8gNFCSuGdXzfX2lX ANtu2KZyIktQ1HWYVt+3GP9DQ1CuekR78HlR10M9p9OB0/DJT7naxpeG0ILD5EJt/rDiZE4OJudA NCa1CInXCGNjOCd1HjPqbqjdn5lPdE2BiYBL3ZqXKVwvvoFBuYz/6n1gBp7N1z3TLqMVvKjmJuVv w9y4AyHqnxbxLFS1 -----END CERTIFICATE----- PSCProcert ========== -----BEGIN CERTIFICATE----- MIIJhjCCB26gAwIBAgIBCzANBgkqhkiG9w0BAQsFADCCAR4xPjA8BgNVBAMTNUF1dG9yaWRhZCBk ZSBDZXJ0aWZpY2FjaW9uIFJhaXogZGVsIEVzdGFkbyBWZW5lem9sYW5vMQswCQYDVQQGEwJWRTEQ MA4GA1UEBxMHQ2FyYWNhczEZMBcGA1UECBMQRGlzdHJpdG8gQ2FwaXRhbDE2MDQGA1UEChMtU2lz dGVtYSBOYWNpb25hbCBkZSBDZXJ0aWZpY2FjaW9uIEVsZWN0cm9uaWNhMUMwQQYDVQQLEzpTdXBl cmludGVuZGVuY2lhIGRlIFNlcnZpY2lvcyBkZSBDZXJ0aWZpY2FjaW9uIEVsZWN0cm9uaWNhMSUw IwYJKoZIhvcNAQkBFhZhY3JhaXpAc3VzY2VydGUuZ29iLnZlMB4XDTEwMTIyODE2NTEwMFoXDTIw MTIyNTIzNTk1OVowgdExJjAkBgkqhkiG9w0BCQEWF2NvbnRhY3RvQHByb2NlcnQubmV0LnZlMQ8w DQYDVQQHEwZDaGFjYW8xEDAOBgNVBAgTB01pcmFuZGExKjAoBgNVBAsTIVByb3ZlZWRvciBkZSBD ZXJ0aWZpY2Fkb3MgUFJPQ0VSVDE2MDQGA1UEChMtU2lzdGVtYSBOYWNpb25hbCBkZSBDZXJ0aWZp Y2FjaW9uIEVsZWN0cm9uaWNhMQswCQYDVQQGEwJWRTETMBEGA1UEAxMKUFNDUHJvY2VydDCCAiIw DQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANW39KOUM6FGqVVhSQ2oh3NekS1wwQYalNo97BVC wfWMrmoX8Yqt/ICV6oNEolt6Vc5Pp6XVurgfoCfAUFM+jbnADrgV3NZs+J74BCXfgI8Qhd19L3uA 3VcAZCP4bsm+lU/hdezgfl6VzbHvvnpC2Mks0+saGiKLt38GieU89RLAu9MLmV+QfI4tL3czkkoh RqipCKzx9hEC2ZUWno0vluYC3XXCFCpa1sl9JcLB/KpnheLsvtF8PPqv1W7/U0HU9TI4seJfxPmO EO8GqQKJ/+MMbpfg353bIdD0PghpbNjU5Db4g7ayNo+c7zo3Fn2/omnXO1ty0K+qP1xmk6wKImG2 0qCZyFSTXai20b1dCl53lKItwIKOvMoDKjSuc/HUtQy9vmebVOvh+qBa7Dh+PsHMosdEMXXqP+UH 0quhJZb25uSgXTcYOWEAM11G1ADEtMo88aKjPvM6/2kwLkDd9p+cJsmWN63nOaK/6mnbVSKVUyqU td+tFjiBdWbjxywbk5yqjKPK2Ww8F22c3HxT4CAnQzb5EuE8XL1mv6JpIzi4mWCZDlZTOpx+FIyw Bm/xhnaQr/2v/pDGj59/i5IjnOcVdo/Vi5QTcmn7K2FjiO/mpF7moxdqWEfLcU8UC17IAggmosvp r2uKGcfLFFb14dq12fy/czja+eevbqQ34gcnAgMBAAGjggMXMIIDEzASBgNVHRMBAf8ECDAGAQH/ AgEBMDcGA1UdEgQwMC6CD3N1c2NlcnRlLmdvYi52ZaAbBgVghl4CAqASDBBSSUYtRy0yMDAwNDAz Ni0wMB0GA1UdDgQWBBRBDxk4qpl/Qguk1yeYVKIXTC1RVDCCAVAGA1UdIwSCAUcwggFDgBStuyId xuDSAaj9dlBSk+2YwU2u06GCASakggEiMIIBHjE+MDwGA1UEAxM1QXV0b3JpZGFkIGRlIENlcnRp ZmljYWNpb24gUmFpeiBkZWwgRXN0YWRvIFZlbmV6b2xhbm8xCzAJBgNVBAYTAlZFMRAwDgYDVQQH EwdDYXJhY2FzMRkwFwYDVQQIExBEaXN0cml0byBDYXBpdGFsMTYwNAYDVQQKEy1TaXN0ZW1hIE5h Y2lvbmFsIGRlIENlcnRpZmljYWNpb24gRWxlY3Ryb25pY2ExQzBBBgNVBAsTOlN1cGVyaW50ZW5k ZW5jaWEgZGUgU2VydmljaW9zIGRlIENlcnRpZmljYWNpb24gRWxlY3Ryb25pY2ExJTAjBgkqhkiG 9w0BCQEWFmFjcmFpekBzdXNjZXJ0ZS5nb2IudmWCAQowDgYDVR0PAQH/BAQDAgEGME0GA1UdEQRG MESCDnByb2NlcnQubmV0LnZloBUGBWCGXgIBoAwMClBTQy0wMDAwMDKgGwYFYIZeAgKgEgwQUklG LUotMzE2MzUzNzMtNzB2BgNVHR8EbzBtMEagRKBChkBodHRwOi8vd3d3LnN1c2NlcnRlLmdvYi52 ZS9sY3IvQ0VSVElGSUNBRE8tUkFJWi1TSEEzODRDUkxERVIuY3JsMCOgIaAfhh1sZGFwOi8vYWNy YWl6LnN1c2NlcnRlLmdvYi52ZTA3BggrBgEFBQcBAQQrMCkwJwYIKwYBBQUHMAGGG2h0dHA6Ly9v Y3NwLnN1c2NlcnRlLmdvYi52ZTBBBgNVHSAEOjA4MDYGBmCGXgMBAjAsMCoGCCsGAQUFBwIBFh5o dHRwOi8vd3d3LnN1c2NlcnRlLmdvYi52ZS9kcGMwDQYJKoZIhvcNAQELBQADggIBACtZ6yKZu4Sq T96QxtGGcSOeSwORR3C7wJJg7ODU523G0+1ng3dS1fLld6c2suNUvtm7CpsR72H0xpkzmfWvADmN g7+mvTV+LFwxNG9s2/NkAZiqlCxB3RWGymspThbASfzXg0gTB1GEMVKIu4YXx2sviiCtxQuPcD4q uxtxj7mkoP3YldmvWb8lK5jpY5MvYB7Eqvh39YtsL+1+LrVPQA3uvFd359m21D+VJzog1eWuq2w1 n8GhHVnchIHuTQfiSLaeS5UtQbHh6N5+LwUeaO6/u5BlOsju6rEYNxxik6SgMexxbJHmpHmJWhSn FFAFTKQAVzAswbVhltw+HoSvOULP5dAssSS830DD7X9jSr3hTxJkhpXzsOfIt+FTvZLm8wyWuevo 5pLtp4EJFAv8lXrPj9Y0TzYS3F7RNHXGRoAvlQSMx4bEqCaJqD8Zm4G7UaRKhqsLEQ+xrmNTbSjq 3TNWOByyrYDT13K9mmyZY+gAu0F2BbdbmRiKw7gSXFbPVgx96OLP7bx0R/vu0xdOIk9W/1DzLuY5 poLWccret9W6aAjtmcz9opLLabid+Qqkpj5PkygqYWwHJgD/ll9ohri4zspV4KuxPX+Y1zMOWj3Y eMLEYC/HYvBhkdI4sPaeVdtAgAUSM84dkpvRabP/v/GSCmE1P93+hvS84Bpxs2Km -----END CERTIFICATE----- CA Disig Root R1 ================ -----BEGIN CERTIFICATE----- MIIFaTCCA1GgAwIBAgIJAMMDmu5QkG4oMA0GCSqGSIb3DQEBBQUAMFIxCzAJBgNVBAYTAlNLMRMw EQYDVQQHEwpCcmF0aXNsYXZhMRMwEQYDVQQKEwpEaXNpZyBhLnMuMRkwFwYDVQQDExBDQSBEaXNp ZyBSb290IFIxMB4XDTEyMDcxOTA5MDY1NloXDTQyMDcxOTA5MDY1NlowUjELMAkGA1UEBhMCU0sx EzARBgNVBAcTCkJyYXRpc2xhdmExEzARBgNVBAoTCkRpc2lnIGEucy4xGTAXBgNVBAMTEENBIERp c2lnIFJvb3QgUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCqw3j33Jijp1pedxiy 3QRkD2P9m5YJgNXoqqXinCaUOuiZc4yd39ffg/N4T0Dhf9Kn0uXKE5Pn7cZ3Xza1lK/oOI7bm+V8 u8yN63Vz4STN5qctGS7Y1oprFOsIYgrY3LMATcMjfF9DCCMyEtztDK3AfQ+lekLZWnDZv6fXARz2 m6uOt0qGeKAeVjGu74IKgEH3G8muqzIm1Cxr7X1r5OJeIgpFy4QxTaz+29FHuvlglzmxZcfe+5nk CiKxLU3lSCZpq+Kq8/v8kiky6bM+TR8noc2OuRf7JT7JbvN32g0S9l3HuzYQ1VTW8+DiR0jm3hTa YVKvJrT1cU/J19IG32PK/yHoWQbgCNWEFVP3Q+V8xaCJmGtzxmjOZd69fwX3se72V6FglcXM6pM6 vpmumwKjrckWtc7dXpl4fho5frLABaTAgqWjR56M6ly2vGfb5ipN0gTco65F97yLnByn1tUD3AjL LhbKXEAz6GfDLuemROoRRRw1ZS0eRWEkG4IupZ0zXWX4Qfkuy5Q/H6MMMSRE7cderVC6xkGbrPAX ZcD4XW9boAo0PO7X6oifmPmvTiT6l7Jkdtqr9O3jw2Dv1fkCyC2fg69naQanMVXVz0tv/wQFx1is XxYb5dKj6zHbHzMVTdDypVP1y+E9Tmgt2BLdqvLmTZtJ5cUoobqwWsagtQIDAQABo0IwQDAPBgNV HRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUiQq0OJMa5qvum5EY+fU8PjXQ 04IwDQYJKoZIhvcNAQEFBQADggIBADKL9p1Kyb4U5YysOMo6CdQbzoaz3evUuii+Eq5FLAR0rBNR xVgYZk2C2tXck8An4b58n1KeElb21Zyp9HWc+jcSjxyT7Ff+Bw+r1RL3D65hXlaASfX8MPWbTx9B LxyE04nH4toCdu0Jz2zBuByDHBb6lM19oMgY0sidbvW9adRtPTXoHqJPYNcHKfyyo6SdbhWSVhlM CrDpfNIZTUJG7L399ldb3Zh+pE3McgODWF3vkzpBemOqfDqo9ayk0d2iLbYq/J8BjuIQscTK5Gfb VSUZP/3oNn6z4eGBrxEWi1CXYBmCAMBrTXO40RMHPuq2MU/wQppt4hF05ZSsjYSVPCGvxdpHyN85 YmLLW1AL14FABZyb7bq2ix4Eb5YgOe2kfSnbSM6C3NQCjR0EMVrHS/BsYVLXtFHCgWzN4funodKS ds+xDzdYpPJScWc/DIh4gInByLUfkmO+p3qKViwaqKactV2zY9ATIKHrkWzQjX2v3wvkF7mGnjix lAxYjOBVqjtjbZqJYLhkKpLGN/R+Q0O3c+gB53+XD9fyexn9GtePyfqFa3qdnom2piiZk4hA9z7N UaPK6u95RyG1/jLix8NRb76AdPCkwzryT+lf3xkK8jsTQ6wxpLPn6/wY1gGp8yqPNg7rtLG8t0zJ a7+h89n07eLw4+1knj0vllJPgFOL -----END CERTIFICATE----- CA Disig Root R2 ================ -----BEGIN CERTIFICATE----- MIIFaTCCA1GgAwIBAgIJAJK4iNuwisFjMA0GCSqGSIb3DQEBCwUAMFIxCzAJBgNVBAYTAlNLMRMw EQYDVQQHEwpCcmF0aXNsYXZhMRMwEQYDVQQKEwpEaXNpZyBhLnMuMRkwFwYDVQQDExBDQSBEaXNp ZyBSb290IFIyMB4XDTEyMDcxOTA5MTUzMFoXDTQyMDcxOTA5MTUzMFowUjELMAkGA1UEBhMCU0sx EzARBgNVBAcTCkJyYXRpc2xhdmExEzARBgNVBAoTCkRpc2lnIGEucy4xGTAXBgNVBAMTEENBIERp c2lnIFJvb3QgUjIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCio8QACdaFXS1tFPbC w3OeNcJxVX6B+6tGUODBfEl45qt5WDza/3wcn9iXAng+a0EE6UG9vgMsRfYvZNSrXaNHPWSb6Wia xswbP7q+sos0Ai6YVRn8jG+qX9pMzk0DIaPY0jSTVpbLTAwAFjxfGs3Ix2ymrdMxp7zo5eFm1tL7 A7RBZckQrg4FY8aAamkw/dLukO8NJ9+flXP04SXabBbeQTg06ov80egEFGEtQX6sx3dOy1FU+16S GBsEWmjGycT6txOgmLcRK7fWV8x8nhfRyyX+hk4kLlYMeE2eARKmK6cBZW58Yh2EhN/qwGu1pSqV g8NTEQxzHQuyRpDRQjrOQG6Vrf/GlK1ul4SOfW+eioANSW1z4nuSHsPzwfPrLgVv2RvPN3YEyLRa 5Beny912H9AZdugsBbPWnDTYltxhh5EF5EQIM8HauQhl1K6yNg3ruji6DOWbnuuNZt2Zz9aJQfYE koopKW1rOhzndX0CcQ7zwOe9yxndnWCywmZgtrEE7snmhrmaZkCo5xHtgUUDi/ZnWejBBhG93c+A Ak9lQHhcR1DIm+YfgXvkRKhbhZri3lrVx/k6RGZL5DJUfORsnLMOPReisjQS1n6yqEm70XooQL6i Fh/f5DcfEXP7kAplQ6INfPgGAVUzfbANuPT1rqVCV3w2EYx7XsQDnYx5nQIDAQABo0IwQDAPBgNV HRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUtZn4r7CU9eMg1gqtzk5WpC5u Qu0wDQYJKoZIhvcNAQELBQADggIBACYGXnDnZTPIgm7ZnBc6G3pmsgH2eDtpXi/q/075KMOYKmFM tCQSin1tERT3nLXK5ryeJ45MGcipvXrA1zYObYVybqjGom32+nNjf7xueQgcnYqfGopTpti72TVV sRHFqQOzVju5hJMiXn7B9hJSi+osZ7z+Nkz1uM/Rs0mSO9MpDpkblvdhuDvEK7Z4bLQjb/D907Je dR+Zlais9trhxTF7+9FGs9K8Z7RiVLoJ92Owk6Ka+elSLotgEqv89WBW7xBci8QaQtyDW2QOy7W8 1k/BfDxujRNt+3vrMNDcTa/F1balTFtxyegxvug4BkihGuLq0t4SOVga/4AOgnXmt8kHbA7v/zjx mHHEt38OFdAlab0inSvtBfZGR6ztwPDUO+Ls7pZbkBNOHlY667DvlruWIxG68kOGdGSVyCh13x01 utI3gzhTODY7z2zp+WsO0PsE6E9312UBeIYMej4hYvF/Y3EMyZ9E26gnonW+boE+18DrG5gPcFw0 sorMwIUY6256s/daoQe/qUKS82Ail+QUoQebTnbAjn39pCXHR+3/H3OszMOl6W8KjptlwlCFtaOg UxLMVYdh84GuEEZhvUQhuMI9dM9+JDX6HAcOmz0iyu8xL4ysEr3vQCj8KWefshNPZiTEUxnpHikV 7+ZtsH8tZ/3zbBt1RqPlShfppNcL -----END CERTIFICATE----- ACCVRAIZ1 ========= -----BEGIN CERTIFICATE----- MIIH0zCCBbugAwIBAgIIXsO3pkN/pOAwDQYJKoZIhvcNAQEFBQAwQjESMBAGA1UEAwwJQUNDVlJB SVoxMRAwDgYDVQQLDAdQS0lBQ0NWMQ0wCwYDVQQKDARBQ0NWMQswCQYDVQQGEwJFUzAeFw0xMTA1 MDUwOTM3MzdaFw0zMDEyMzEwOTM3MzdaMEIxEjAQBgNVBAMMCUFDQ1ZSQUlaMTEQMA4GA1UECwwH UEtJQUNDVjENMAsGA1UECgwEQUNDVjELMAkGA1UEBhMCRVMwggIiMA0GCSqGSIb3DQEBAQUAA4IC DwAwggIKAoICAQCbqau/YUqXry+XZpp0X9DZlv3P4uRm7x8fRzPCRKPfmt4ftVTdFXxpNRFvu8gM jmoYHtiP2Ra8EEg2XPBjs5BaXCQ316PWywlxufEBcoSwfdtNgM3802/J+Nq2DoLSRYWoG2ioPej0 RGy9ocLLA76MPhMAhN9KSMDjIgro6TenGEyxCQ0jVn8ETdkXhBilyNpAlHPrzg5XPAOBOp0KoVdD aaxXbXmQeOW1tDvYvEyNKKGno6e6Ak4l0Squ7a4DIrhrIA8wKFSVf+DuzgpmndFALW4ir50awQUZ 0m/A8p/4e7MCQvtQqR0tkw8jq8bBD5L/0KIV9VMJcRz/RROE5iZe+OCIHAr8Fraocwa48GOEAqDG WuzndN9wrqODJerWx5eHk6fGioozl2A3ED6XPm4pFdahD9GILBKfb6qkxkLrQaLjlUPTAYVtjrs7 8yM2x/474KElB0iryYl0/wiPgL/AlmXz7uxLaL2diMMxs0Dx6M/2OLuc5NF/1OVYm3z61PMOm3WR 5LpSLhl+0fXNWhn8ugb2+1KoS5kE3fj5tItQo05iifCHJPqDQsGH+tUtKSpacXpkatcnYGMN285J 9Y0fkIkyF/hzQ7jSWpOGYdbhdQrqeWZ2iE9x6wQl1gpaepPluUsXQA+xtrn13k/c4LOsOxFwYIRK Q26ZIMApcQrAZQIDAQABo4ICyzCCAscwfQYIKwYBBQUHAQEEcTBvMEwGCCsGAQUFBzAChkBodHRw Oi8vd3d3LmFjY3YuZXMvZmlsZWFkbWluL0FyY2hpdm9zL2NlcnRpZmljYWRvcy9yYWl6YWNjdjEu Y3J0MB8GCCsGAQUFBzABhhNodHRwOi8vb2NzcC5hY2N2LmVzMB0GA1UdDgQWBBTSh7Tj3zcnk1X2 VuqB5TbMjB4/vTAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNKHtOPfNyeTVfZW6oHlNsyM Hj+9MIIBcwYDVR0gBIIBajCCAWYwggFiBgRVHSAAMIIBWDCCASIGCCsGAQUFBwICMIIBFB6CARAA QQB1AHQAbwByAGkAZABhAGQAIABkAGUAIABDAGUAcgB0AGkAZgBpAGMAYQBjAGkA8wBuACAAUgBh AO0AegAgAGQAZQAgAGwAYQAgAEEAQwBDAFYAIAAoAEEAZwBlAG4AYwBpAGEAIABkAGUAIABUAGUA YwBuAG8AbABvAGcA7QBhACAAeQAgAEMAZQByAHQAaQBmAGkAYwBhAGMAaQDzAG4AIABFAGwAZQBj AHQAcgDzAG4AaQBjAGEALAAgAEMASQBGACAAUQA0ADYAMAAxADEANQA2AEUAKQAuACAAQwBQAFMA IABlAG4AIABoAHQAdABwADoALwAvAHcAdwB3AC4AYQBjAGMAdgAuAGUAczAwBggrBgEFBQcCARYk aHR0cDovL3d3dy5hY2N2LmVzL2xlZ2lzbGFjaW9uX2MuaHRtMFUGA1UdHwROMEwwSqBIoEaGRGh0 dHA6Ly93d3cuYWNjdi5lcy9maWxlYWRtaW4vQXJjaGl2b3MvY2VydGlmaWNhZG9zL3JhaXphY2N2 MV9kZXIuY3JsMA4GA1UdDwEB/wQEAwIBBjAXBgNVHREEEDAOgQxhY2N2QGFjY3YuZXMwDQYJKoZI hvcNAQEFBQADggIBAJcxAp/n/UNnSEQU5CmH7UwoZtCPNdpNYbdKl02125DgBS4OxnnQ8pdpD70E R9m+27Up2pvZrqmZ1dM8MJP1jaGo/AaNRPTKFpV8M9xii6g3+CfYCS0b78gUJyCpZET/LtZ1qmxN YEAZSUNUY9rizLpm5U9EelvZaoErQNV/+QEnWCzI7UiRfD+mAM/EKXMRNt6GGT6d7hmKG9Ww7Y49 nCrADdg9ZuM8Db3VlFzi4qc1GwQA9j9ajepDvV+JHanBsMyZ4k0ACtrJJ1vnE5Bc5PUzolVt3OAJ TS+xJlsndQAJxGJ3KQhfnlmstn6tn1QwIgPBHnFk/vk4CpYY3QIUrCPLBhwepH2NDd4nQeit2hW3 sCPdK6jT2iWH7ehVRE2I9DZ+hJp4rPcOVkkO1jMl1oRQQmwgEh0q1b688nCBpHBgvgW1m54ERL5h I6zppSSMEYCUWqKiuUnSwdzRp+0xESyeGabu4VXhwOrPDYTkF7eifKXeVSUG7szAh1xA2syVP1Xg Nce4hL60Xc16gwFy7ofmXx2utYXGJt/mwZrpHgJHnyqobalbz+xFd3+YJ5oyXSrjhO7FmGYvliAd 3djDJ9ew+f7Zfc3Qn48LFFhRny+Lwzgt3uiP1o2HpPVWQxaZLPSkVrQ0uGE3ycJYgBugl6H8WY3p EfbRD0tVNEYqi4Y7 -----END CERTIFICATE----- TWCA Global Root CA =================== -----BEGIN CERTIFICATE----- MIIFQTCCAymgAwIBAgICDL4wDQYJKoZIhvcNAQELBQAwUTELMAkGA1UEBhMCVFcxEjAQBgNVBAoT CVRBSVdBTi1DQTEQMA4GA1UECxMHUm9vdCBDQTEcMBoGA1UEAxMTVFdDQSBHbG9iYWwgUm9vdCBD QTAeFw0xMjA2MjcwNjI4MzNaFw0zMDEyMzExNTU5NTlaMFExCzAJBgNVBAYTAlRXMRIwEAYDVQQK EwlUQUlXQU4tQ0ExEDAOBgNVBAsTB1Jvb3QgQ0ExHDAaBgNVBAMTE1RXQ0EgR2xvYmFsIFJvb3Qg Q0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCwBdvI64zEbooh745NnHEKH1Jw7W2C nJfF10xORUnLQEK1EjRsGcJ0pDFfhQKX7EMzClPSnIyOt7h52yvVavKOZsTuKwEHktSz0ALfUPZV r2YOy+BHYC8rMjk1Ujoog/h7FsYYuGLWRyWRzvAZEk2tY/XTP3VfKfChMBwqoJimFb3u/Rk28OKR Q4/6ytYQJ0lM793B8YVwm8rqqFpD/G2Gb3PpN0Wp8DbHzIh1HrtsBv+baz4X7GGqcXzGHaL3SekV tTzWoWH1EfcFbx39Eb7QMAfCKbAJTibc46KokWofwpFFiFzlmLhxpRUZyXx1EcxwdE8tmx2RRP1W KKD+u4ZqyPpcC1jcxkt2yKsi2XMPpfRaAok/T54igu6idFMqPVMnaR1sjjIsZAAmY2E2TqNGtz99 sy2sbZCilaLOz9qC5wc0GZbpuCGqKX6mOL6OKUohZnkfs8O1CWfe1tQHRvMq2uYiN2DLgbYPoA/p yJV/v1WRBXrPPRXAb94JlAGD1zQbzECl8LibZ9WYkTunhHiVJqRaCPgrdLQABDzfuBSO6N+pjWxn kjMdwLfS7JLIvgm/LCkFbwJrnu+8vyq8W8BQj0FwcYeyTbcEqYSjMq+u7msXi7Kx/mzhkIyIqJdI zshNy/MGz19qCkKxHh53L46g5pIOBvwFItIm4TFRfTLcDwIDAQABoyMwITAOBgNVHQ8BAf8EBAMC AQYwDwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQsFAAOCAgEAXzSBdu+WHdXltdkCY4QWwa6g cFGn90xHNcgL1yg9iXHZqjNB6hQbbCEAwGxCGX6faVsgQt+i0trEfJdLjbDorMjupWkEmQqSpqsn LhpNgb+E1HAerUf+/UqdM+DyucRFCCEK2mlpc3INvjT+lIutwx4116KD7+U4x6WFH6vPNOw/KP4M 8VeGTslV9xzU2KV9Bnpv1d8Q34FOIWWxtuEXeZVFBs5fzNxGiWNoRI2T9GRwoD2dKAXDOXC4Ynsg /eTb6QihuJ49CcdP+yz4k3ZB3lLg4VfSnQO8d57+nile98FRYB/e2guyLXW3Q0iT5/Z5xoRdgFlg lPx4mI88k1HtQJAH32RjJMtOcQWh15QaiDLxInQirqWm2BJpTGCjAu4r7NRjkgtevi92a6O2JryP A9gK8kxkRr05YuWW6zRjESjMlfGt7+/cgFhI6Uu46mWs6fyAtbXIRfmswZ/ZuepiiI7E8UuDEq3m i4TWnsLrgxifarsbJGAzcMzs9zLzXNl5fe+epP7JI8Mk7hWSsT2RTyaGvWZzJBPqpK5jwa19hAM8 EHiGG3njxPPyBJUgriOCxLM6AGK/5jYk4Ve6xx6QddVfP5VhK8E7zeWzaGHQRiapIVJpLesux+t3 zqY6tQMzT3bR51xUAV3LePTJDL/PEo4XLSNolOer/qmyKwbQBM0= -----END CERTIFICATE----- TeliaSonera Root CA v1 ====================== -----BEGIN CERTIFICATE----- MIIFODCCAyCgAwIBAgIRAJW+FqD3LkbxezmCcvqLzZYwDQYJKoZIhvcNAQEFBQAwNzEUMBIGA1UE CgwLVGVsaWFTb25lcmExHzAdBgNVBAMMFlRlbGlhU29uZXJhIFJvb3QgQ0EgdjEwHhcNMDcxMDE4 MTIwMDUwWhcNMzIxMDE4MTIwMDUwWjA3MRQwEgYDVQQKDAtUZWxpYVNvbmVyYTEfMB0GA1UEAwwW VGVsaWFTb25lcmEgUm9vdCBDQSB2MTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMK+ 6yfwIaPzaSZVfp3FVRaRXP3vIb9TgHot0pGMYzHw7CTww6XScnwQbfQ3t+XmfHnqjLWCi65ItqwA 3GV17CpNX8GH9SBlK4GoRz6JI5UwFpB/6FcHSOcZrr9FZ7E3GwYq/t75rH2D+1665I+XZ75Ljo1k B1c4VWk0Nj0TSO9P4tNmHqTPGrdeNjPUtAa9GAH9d4RQAEX1jF3oI7x+/jXh7VB7qTCNGdMJjmhn Xb88lxhTuylixcpecsHHltTbLaC0H2kD7OriUPEMPPCs81Mt8Bz17Ww5OXOAFshSsCPN4D7c3TxH oLs1iuKYaIu+5b9y7tL6pe0S7fyYGKkmdtwoSxAgHNN/Fnct7W+A90m7UwW7XWjH1Mh1Fj+JWov3 F0fUTPHSiXk+TT2YqGHeOh7S+F4D4MHJHIzTjU3TlTazN19jY5szFPAtJmtTfImMMsJu7D0hADnJ oWjiUIMusDor8zagrC/kb2HCUQk5PotTubtn2txTuXZZNp1D5SDgPTJghSJRt8czu90VL6R4pgd7 gUY2BIbdeTXHlSw7sKMXNeVzH7RcWe/a6hBle3rQf5+ztCo3O3CLm1u5K7fsslESl1MpWtTwEhDc TwK7EpIvYtQ/aUN8Ddb8WHUBiJ1YFkveupD/RwGJBmr2X7KQarMCpgKIv7NHfirZ1fpoeDVNAgMB AAGjPzA9MA8GA1UdEwEB/wQFMAMBAf8wCwYDVR0PBAQDAgEGMB0GA1UdDgQWBBTwj1k4ALP1j5qW DNXr+nuqF+gTEjANBgkqhkiG9w0BAQUFAAOCAgEAvuRcYk4k9AwI//DTDGjkk0kiP0Qnb7tt3oNm zqjMDfz1mgbldxSR651Be5kqhOX//CHBXfDkH1e3damhXwIm/9fH907eT/j3HEbAek9ALCI18Bmx 0GtnLLCo4MBANzX2hFxc469CeP6nyQ1Q6g2EdvZR74NTxnr/DlZJLo961gzmJ1TjTQpgcmLNkQfW pb/ImWvtxBnmq0wROMVvMeJuScg/doAmAyYp4Db29iBT4xdwNBedY2gea+zDTYa4EzAvXUYNR0PV G6pZDrlcjQZIrXSHX8f8MVRBE+LHIQ6e4B4N4cB7Q4WQxYpYxmUKeFfyxiMPAdkgS94P+5KFdSpc c41teyWRyu5FrgZLAMzTsVlQ2jqIOylDRl6XK1TOU2+NSueW+r9xDkKLfP0ooNBIytrEgUy7onOT JsjrDNYmiLbAJM+7vVvrdX3pCI6GMyx5dwlppYn8s3CQh3aP0yK7Qs69cwsgJirQmz1wHiRszYd2 qReWt88NkvuOGKmYSdGe/mBEciG5Ge3C9THxOUiIkCR1VBatzvT4aRRkOfujuLpwQMcnHL/EVlP6 Y2XQ8xwOFvVrhlhNGNTkDY6lnVuR3HYkUD/GKvvZt5y11ubQ2egZixVxSK236thZiNSQvxaz2ems WWFUyBy6ysHK4bkgTI86k4mloMy/0/Z1pHWWbVY= -----END CERTIFICATE----- E-Tugra Certification Authority =============================== -----BEGIN CERTIFICATE----- MIIGSzCCBDOgAwIBAgIIamg+nFGby1MwDQYJKoZIhvcNAQELBQAwgbIxCzAJBgNVBAYTAlRSMQ8w DQYDVQQHDAZBbmthcmExQDA+BgNVBAoMN0UtVHXEn3JhIEVCRyBCaWxpxZ9pbSBUZWtub2xvamls ZXJpIHZlIEhpem1ldGxlcmkgQS7Fni4xJjAkBgNVBAsMHUUtVHVncmEgU2VydGlmaWthc3lvbiBN ZXJrZXppMSgwJgYDVQQDDB9FLVR1Z3JhIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MB4XDTEzMDMw NTEyMDk0OFoXDTIzMDMwMzEyMDk0OFowgbIxCzAJBgNVBAYTAlRSMQ8wDQYDVQQHDAZBbmthcmEx QDA+BgNVBAoMN0UtVHXEn3JhIEVCRyBCaWxpxZ9pbSBUZWtub2xvamlsZXJpIHZlIEhpem1ldGxl cmkgQS7Fni4xJjAkBgNVBAsMHUUtVHVncmEgU2VydGlmaWthc3lvbiBNZXJrZXppMSgwJgYDVQQD DB9FLVR1Z3JhIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MIICIjANBgkqhkiG9w0BAQEFAAOCAg8A MIICCgKCAgEA4vU/kwVRHoViVF56C/UYB4Oufq9899SKa6VjQzm5S/fDxmSJPZQuVIBSOTkHS0vd hQd2h8y/L5VMzH2nPbxHD5hw+IyFHnSOkm0bQNGZDbt1bsipa5rAhDGvykPL6ys06I+XawGb1Q5K CKpbknSFQ9OArqGIW66z6l7LFpp3RMih9lRozt6Plyu6W0ACDGQXwLWTzeHxE2bODHnv0ZEoq1+g ElIwcxmOj+GMB6LDu0rw6h8VqO4lzKRG+Bsi77MOQ7osJLjFLFzUHPhdZL3Dk14opz8n8Y4e0ypQ BaNV2cvnOVPAmJ6MVGKLJrD3fY185MaeZkJVgkfnsliNZvcHfC425lAcP9tDJMW/hkd5s3kc91r0 E+xs+D/iWR+V7kI+ua2oMoVJl0b+SzGPWsutdEcf6ZG33ygEIqDUD13ieU/qbIWGvaimzuT6w+Gz rt48Ue7LE3wBf4QOXVGUnhMMti6lTPk5cDZvlsouDERVxcr6XQKj39ZkjFqzAQqptQpHF//vkUAq jqFGOjGY5RH8zLtJVor8udBhmm9lbObDyz51Sf6Pp+KJxWfXnUYTTjF2OySznhFlhqt/7x3U+Lzn rFpct1pHXFXOVbQicVtbC/DP3KBhZOqp12gKY6fgDT+gr9Oq0n7vUaDmUStVkhUXU8u3Zg5mTPj5 dUyQ5xJwx0UCAwEAAaNjMGEwHQYDVR0OBBYEFC7j27JJ0JxUeVz6Jyr+zE7S6E5UMA8GA1UdEwEB /wQFMAMBAf8wHwYDVR0jBBgwFoAULuPbsknQnFR5XPonKv7MTtLoTlQwDgYDVR0PAQH/BAQDAgEG MA0GCSqGSIb3DQEBCwUAA4ICAQAFNzr0TbdF4kV1JI+2d1LoHNgQk2Xz8lkGpD4eKexd0dCrfOAK kEh47U6YA5n+KGCRHTAduGN8qOY1tfrTYXbm1gdLymmasoR6d5NFFxWfJNCYExL/u6Au/U5Mh/jO XKqYGwXgAEZKgoClM4so3O0409/lPun++1ndYYRP0lSWE2ETPo+Aab6TR7U1Q9Jauz1c77NCR807 VRMGsAnb/WP2OogKmW9+4c4bU2pEZiNRCHu8W1Ki/QY3OEBhj0qWuJA3+GbHeJAAFS6LrVE1Uweo a2iu+U48BybNCAVwzDk/dr2l02cmAYamU9JgO3xDf1WKvJUawSg5TB9D0pH0clmKuVb8P7Sd2nCc dlqMQ1DujjByTd//SffGqWfZbawCEeI6FiWnWAjLb1NBnEg4R2gz0dfHj9R0IdTDBZB6/86WiLEV KV0jq9BgoRJP3vQXzTLlyb/IQ639Lo7xr+L0mPoSHyDYwKcMhcWQ9DstliaxLL5Mq+ux0orJ23gT Dx4JnW2PAJ8C2sH6H3p6CcRK5ogql5+Ji/03X186zjhZhkuvcQu02PJwT58yE+Owp1fl2tpDy4Q0 8ijE6m30Ku/Ba3ba+367hTzSU8JNvnHhRdH9I2cNE3X7z2VnIp2usAnRCf8dNL/+I5c30jn6PQ0G C7TbO6Orb1wdtn7os4I07QZcJA== -----END CERTIFICATE----- T-TeleSec GlobalRoot Class 2 ============================ -----BEGIN CERTIFICATE----- MIIDwzCCAqugAwIBAgIBATANBgkqhkiG9w0BAQsFADCBgjELMAkGA1UEBhMCREUxKzApBgNVBAoM IlQtU3lzdGVtcyBFbnRlcnByaXNlIFNlcnZpY2VzIEdtYkgxHzAdBgNVBAsMFlQtU3lzdGVtcyBU cnVzdCBDZW50ZXIxJTAjBgNVBAMMHFQtVGVsZVNlYyBHbG9iYWxSb290IENsYXNzIDIwHhcNMDgx MDAxMTA0MDE0WhcNMzMxMDAxMjM1OTU5WjCBgjELMAkGA1UEBhMCREUxKzApBgNVBAoMIlQtU3lz dGVtcyBFbnRlcnByaXNlIFNlcnZpY2VzIEdtYkgxHzAdBgNVBAsMFlQtU3lzdGVtcyBUcnVzdCBD ZW50ZXIxJTAjBgNVBAMMHFQtVGVsZVNlYyBHbG9iYWxSb290IENsYXNzIDIwggEiMA0GCSqGSIb3 DQEBAQUAA4IBDwAwggEKAoIBAQCqX9obX+hzkeXaXPSi5kfl82hVYAUdAqSzm1nzHoqvNK38DcLZ SBnuaY/JIPwhqgcZ7bBcrGXHX+0CfHt8LRvWurmAwhiCFoT6ZrAIxlQjgeTNuUk/9k9uN0goOA/F vudocP05l03Sx5iRUKrERLMjfTlH6VJi1hKTXrcxlkIF+3anHqP1wvzpesVsqXFP6st4vGCvx970 2cu+fjOlbpSD8DT6IavqjnKgP6TeMFvvhk1qlVtDRKgQFRzlAVfFmPHmBiiRqiDFt1MmUUOyCxGV WOHAD3bZwI18gfNycJ5v/hqO2V81xrJvNHy+SE/iWjnX2J14np+GPgNeGYtEotXHAgMBAAGjQjBA MA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBS/WSA2AHmgoCJrjNXy YdK4LMuCSjANBgkqhkiG9w0BAQsFAAOCAQEAMQOiYQsfdOhyNsZt+U2e+iKo4YFWz827n+qrkRk4 r6p8FU3ztqONpfSO9kSpp+ghla0+AGIWiPACuvxhI+YzmzB6azZie60EI4RYZeLbK4rnJVM3YlNf vNoBYimipidx5joifsFvHZVwIEoHNN/q/xWA5brXethbdXwFeilHfkCoMRN3zUA7tFFHei4R40cR 3p1m0IvVVGb6g1XqfMIpiRvpb7PO4gWEyS8+eIVibslfwXhjdFjASBgMmTnrpMwatXlajRWc2BQN 9noHV8cigwUtPJslJj0Ys6lDfMjIq2SPDqO/nBudMNva0Bkuqjzx+zOAduTNrRlPBSeOE6Fuwg== -----END CERTIFICATE----- Atos TrustedRoot 2011 ===================== -----BEGIN CERTIFICATE----- MIIDdzCCAl+gAwIBAgIIXDPLYixfszIwDQYJKoZIhvcNAQELBQAwPDEeMBwGA1UEAwwVQXRvcyBU cnVzdGVkUm9vdCAyMDExMQ0wCwYDVQQKDARBdG9zMQswCQYDVQQGEwJERTAeFw0xMTA3MDcxNDU4 MzBaFw0zMDEyMzEyMzU5NTlaMDwxHjAcBgNVBAMMFUF0b3MgVHJ1c3RlZFJvb3QgMjAxMTENMAsG A1UECgwEQXRvczELMAkGA1UEBhMCREUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCV hTuXbyo7LjvPpvMpNb7PGKw+qtn4TaA+Gke5vJrf8v7MPkfoepbCJI419KkM/IL9bcFyYie96mvr 54rMVD6QUM+A1JX76LWC1BTFtqlVJVfbsVD2sGBkWXppzwO3bw2+yj5vdHLqqjAqc2K+SZFhyBH+ DgMq92og3AIVDV4VavzjgsG1xZ1kCWyjWZgHJ8cblithdHFsQ/H3NYkQ4J7sVaE3IqKHBAUsR320 HLliKWYoyrfhk/WklAOZuXCFteZI6o1Q/NnezG8HDt0Lcp2AMBYHlT8oDv3FdU9T1nSatCQujgKR z3bFmx5VdJx4IbHwLfELn8LVlhgf8FQieowHAgMBAAGjfTB7MB0GA1UdDgQWBBSnpQaxLKYJYO7R l+lwrrw7GWzbITAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFKelBrEspglg7tGX6XCuvDsZ bNshMBgGA1UdIAQRMA8wDQYLKwYBBAGwLQMEAQEwDgYDVR0PAQH/BAQDAgGGMA0GCSqGSIb3DQEB CwUAA4IBAQAmdzTblEiGKkGdLD4GkGDEjKwLVLgfuXvTBznk+j57sj1O7Z8jvZfza1zv7v1Apt+h k6EKhqzvINB5Ab149xnYJDE0BAGmuhWawyfc2E8PzBhj/5kPDpFrdRbhIfzYJsdHt6bPWHJxfrrh TZVHO8mvbaG0weyJ9rQPOLXiZNwlz6bb65pcmaHFCN795trV1lpFDMS3wrUU77QR/w4VtfX128a9 61qn8FYiqTxlVMYVqL2Gns2Dlmh6cYGJ4Qvh6hEbaAjMaZ7snkGeRDImeuKHCnE96+RapNLbxc3G 3mB/ufNPRJLvKrcYPqcZ2Qt9sTdBQrC6YB3y/gkRsPCHe6ed -----END CERTIFICATE----- QuoVadis Root CA 1 G3 ===================== -----BEGIN CERTIFICATE----- MIIFYDCCA0igAwIBAgIUeFhfLq0sGUvjNwc1NBMotZbUZZMwDQYJKoZIhvcNAQELBQAwSDELMAkG A1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxHjAcBgNVBAMTFVF1b1ZhZGlzIFJv b3QgQ0EgMSBHMzAeFw0xMjAxMTIxNzI3NDRaFw00MjAxMTIxNzI3NDRaMEgxCzAJBgNVBAYTAkJN MRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMR4wHAYDVQQDExVRdW9WYWRpcyBSb290IENBIDEg RzMwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCgvlAQjunybEC0BJyFuTHK3C3kEakE PBtVwedYMB0ktMPvhd6MLOHBPd+C5k+tR4ds7FtJwUrVu4/sh6x/gpqG7D0DmVIB0jWerNrwU8lm PNSsAgHaJNM7qAJGr6Qc4/hzWHa39g6QDbXwz8z6+cZM5cOGMAqNF34168Xfuw6cwI2H44g4hWf6 Pser4BOcBRiYz5P1sZK0/CPTz9XEJ0ngnjybCKOLXSoh4Pw5qlPafX7PGglTvF0FBM+hSo+LdoIN ofjSxxR3W5A2B4GbPgb6Ul5jxaYA/qXpUhtStZI5cgMJYr2wYBZupt0lwgNm3fME0UDiTouG9G/l g6AnhF4EwfWQvTA9xO+oabw4m6SkltFi2mnAAZauy8RRNOoMqv8hjlmPSlzkYZqn0ukqeI1RPToV 7qJZjqlc3sX5kCLliEVx3ZGZbHqfPT2YfF72vhZooF6uCyP8Wg+qInYtyaEQHeTTRCOQiJ/GKubX 9ZqzWB4vMIkIG1SitZgj7Ah3HJVdYdHLiZxfokqRmu8hqkkWCKi9YSgxyXSthfbZxbGL0eUQMk1f iyA6PEkfM4VZDdvLCXVDaXP7a3F98N/ETH3Goy7IlXnLc6KOTk0k+17kBL5yG6YnLUlamXrXXAkg t3+UuU/xDRxeiEIbEbfnkduebPRq34wGmAOtzCjvpUfzUwIDAQABo0IwQDAPBgNVHRMBAf8EBTAD AQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUo5fW816iEOGrRZ88F2Q87gFwnMwwDQYJKoZI hvcNAQELBQADggIBABj6W3X8PnrHX3fHyt/PX8MSxEBd1DKquGrX1RUVRpgjpeaQWxiZTOOtQqOC MTaIzen7xASWSIsBx40Bz1szBpZGZnQdT+3Btrm0DWHMY37XLneMlhwqI2hrhVd2cDMT/uFPpiN3 GPoajOi9ZcnPP/TJF9zrx7zABC4tRi9pZsMbj/7sPtPKlL92CiUNqXsCHKnQO18LwIE6PWThv6ct Tr1NxNgpxiIY0MWscgKCP6o6ojoilzHdCGPDdRS5YCgtW2jgFqlmgiNR9etT2DGbe+m3nUvriBbP +V04ikkwj+3x6xn0dxoxGE1nVGwvb2X52z3sIexe9PSLymBlVNFxZPT5pqOBMzYzcfCkeF9OrYMh 3jRJjehZrJ3ydlo28hP0r+AJx2EqbPfgna67hkooby7utHnNkDPDs3b69fBsnQGQ+p6Q9pxyz0fa wx/kNSBT8lTR32GDpgLiJTjehTItXnOQUl1CxM49S+H5GYQd1aJQzEH7QRTDvdbJWqNjZgKAvQU6 O0ec7AAmTPWIUb+oI38YB7AL7YsmoWTTYUrrXJ/es69nA7Mf3W1daWhpq1467HxpvMc7hU6eFbm0 FU/DlXpY18ls6Wy58yljXrQs8C097Vpl4KlbQMJImYFtnh8GKjwStIsPm6Ik8KaN1nrgS7ZklmOV hMJKzRwuJIczYOXD -----END CERTIFICATE----- QuoVadis Root CA 2 G3 ===================== -----BEGIN CERTIFICATE----- MIIFYDCCA0igAwIBAgIURFc0JFuBiZs18s64KztbpybwdSgwDQYJKoZIhvcNAQELBQAwSDELMAkG A1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxHjAcBgNVBAMTFVF1b1ZhZGlzIFJv b3QgQ0EgMiBHMzAeFw0xMjAxMTIxODU5MzJaFw00MjAxMTIxODU5MzJaMEgxCzAJBgNVBAYTAkJN MRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMR4wHAYDVQQDExVRdW9WYWRpcyBSb290IENBIDIg RzMwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQChriWyARjcV4g/Ruv5r+LrI3HimtFh ZiFfqq8nUeVuGxbULX1QsFN3vXg6YOJkApt8hpvWGo6t/x8Vf9WVHhLL5hSEBMHfNrMWn4rjyduY NM7YMxcoRvynyfDStNVNCXJJ+fKH46nafaF9a7I6JaltUkSs+L5u+9ymc5GQYaYDFCDy54ejiK2t oIz/pgslUiXnFgHVy7g1gQyjO/Dh4fxaXc6AcW34Sas+O7q414AB+6XrW7PFXmAqMaCvN+ggOp+o MiwMzAkd056OXbxMmO7FGmh77FOm6RQ1o9/NgJ8MSPsc9PG/Srj61YxxSscfrf5BmrODXfKEVu+l V0POKa2Mq1W/xPtbAd0jIaFYAI7D0GoT7RPjEiuA3GfmlbLNHiJuKvhB1PLKFAeNilUSxmn1uIZo L1NesNKqIcGY5jDjZ1XHm26sGahVpkUG0CM62+tlXSoREfA7T8pt9DTEceT/AFr2XK4jYIVz8eQQ sSWu1ZK7E8EM4DnatDlXtas1qnIhO4M15zHfeiFuuDIIfR0ykRVKYnLP43ehvNURG3YBZwjgQQvD 6xVu+KQZ2aKrr+InUlYrAoosFCT5v0ICvybIxo/gbjh9Uy3l7ZizlWNof/k19N+IxWA1ksB8aRxh lRbQ694Lrz4EEEVlWFA4r0jyWbYW8jwNkALGcC4BrTwV1wIDAQABo0IwQDAPBgNVHRMBAf8EBTAD AQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQU7edvdlq/YOxJW8ald7tyFnGbxD0wDQYJKoZI hvcNAQELBQADggIBAJHfgD9DCX5xwvfrs4iP4VGyvD11+ShdyLyZm3tdquXK4Qr36LLTn91nMX66 AarHakE7kNQIXLJgapDwyM4DYvmL7ftuKtwGTTwpD4kWilhMSA/ohGHqPHKmd+RCroijQ1h5fq7K pVMNqT1wvSAZYaRsOPxDMuHBR//47PERIjKWnML2W2mWeyAMQ0GaW/ZZGYjeVYg3UQt4XAoeo0L9 x52ID8DyeAIkVJOviYeIyUqAHerQbj5hLja7NQ4nlv1mNDthcnPxFlxHBlRJAHpYErAK74X9sbgz dWqTHBLmYF5vHX/JHyPLhGGfHoJE+V+tYlUkmlKY7VHnoX6XOuYvHxHaU4AshZ6rNRDbIl9qxV6X U/IyAgkwo1jwDQHVcsaxfGl7w/U2Rcxhbl5MlMVerugOXou/983g7aEOGzPuVBj+D77vfoRrQ+Nw mNtddbINWQeFFSM51vHfqSYP1kjHs6Yi9TM3WpVHn3u6GBVv/9YUZINJ0gpnIdsPNWNgKCLjsZWD zYWm3S8P52dSbrsvhXz1SnPnxT7AvSESBT/8twNJAlvIJebiVDj1eYeMHVOyToV7BjjHLPj4sHKN JeV3UvQDHEimUF+IIDBu8oJDqz2XhOdT+yHBTw8imoa4WSr2Rz0ZiC3oheGe7IUIarFsNMkd7Egr O3jtZsSOeWmD3n+M -----END CERTIFICATE----- QuoVadis Root CA 3 G3 ===================== -----BEGIN CERTIFICATE----- MIIFYDCCA0igAwIBAgIULvWbAiin23r/1aOp7r0DoM8Sah0wDQYJKoZIhvcNAQELBQAwSDELMAkG A1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxHjAcBgNVBAMTFVF1b1ZhZGlzIFJv b3QgQ0EgMyBHMzAeFw0xMjAxMTIyMDI2MzJaFw00MjAxMTIyMDI2MzJaMEgxCzAJBgNVBAYTAkJN MRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMR4wHAYDVQQDExVRdW9WYWRpcyBSb290IENBIDMg RzMwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCzyw4QZ47qFJenMioKVjZ/aEzHs286 IxSR/xl/pcqs7rN2nXrpixurazHb+gtTTK/FpRp5PIpM/6zfJd5O2YIyC0TeytuMrKNuFoM7pmRL Mon7FhY4futD4tN0SsJiCnMK3UmzV9KwCoWdcTzeo8vAMvMBOSBDGzXRU7Ox7sWTaYI+FrUoRqHe 6okJ7UO4BUaKhvVZR74bbwEhELn9qdIoyhA5CcoTNs+cra1AdHkrAj80//ogaX3T7mH1urPnMNA3 I4ZyYUUpSFlob3emLoG+B01vr87ERRORFHAGjx+f+IdpsQ7vw4kZ6+ocYfx6bIrc1gMLnia6Et3U VDmrJqMz6nWB2i3ND0/kA9HvFZcba5DFApCTZgIhsUfei5pKgLlVj7WiL8DWM2fafsSntARE60f7 5li59wzweyuxwHApw0BiLTtIadwjPEjrewl5qW3aqDCYz4ByA4imW0aucnl8CAMhZa634RylsSqi Md5mBPfAdOhx3v89WcyWJhKLhZVXGqtrdQtEPREoPHtht+KPZ0/l7DxMYIBpVzgeAVuNVejH38DM dyM0SXV89pgR6y3e7UEuFAUCf+D+IOs15xGsIs5XPd7JMG0QA4XN8f+MFrXBsj6IbGB/kE+V9/Yt rQE5BwT6dYB9v0lQ7e/JxHwc64B+27bQ3RP+ydOc17KXqQIDAQABo0IwQDAPBgNVHRMBAf8EBTAD AQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUxhfQvKjqAkPyGwaZXSuQILnXnOQwDQYJKoZI hvcNAQELBQADggIBADRh2Va1EodVTd2jNTFGu6QHcrxfYWLopfsLN7E8trP6KZ1/AvWkyaiTt3px KGmPc+FSkNrVvjrlt3ZqVoAh313m6Tqe5T72omnHKgqwGEfcIHB9UqM+WXzBusnIFUBhynLWcKzS t/Ac5IYp8M7vaGPQtSCKFWGafoaYtMnCdvvMujAWzKNhxnQT5WvvoxXqA/4Ti2Tk08HS6IT7SdEQ TXlm66r99I0xHnAUrdzeZxNMgRVhvLfZkXdxGYFgu/BYpbWcC/ePIlUnwEsBbTuZDdQdm2NnL9Du DcpmvJRPpq3t/O5jrFc/ZSXPsoaP0Aj/uHYUbt7lJ+yreLVTubY/6CD50qi+YUbKh4yE8/nxoGib Ih6BJpsQBJFxwAYf3KDTuVan45gtf4Od34wrnDKOMpTwATwiKp9Dwi7DmDkHOHv8XgBCH/MyJnmD hPbl8MFREsALHgQjDFSlTC9JxUrRtm5gDWv8a4uFJGS3iQ6rJUdbPM9+Sb3H6QrG2vd+DhcI00iX 0HGS8A85PjRqHH3Y8iKuu2n0M7SmSFXRDw4m6Oy2Cy2nhTXN/VnIn9HNPlopNLk9hM6xZdRZkZFW dSHBd575euFgndOtBBj0fOtek49TSiIp+EgrPk2GrFt/ywaZWWDYWGWVjUTR939+J399roD1B0y2 PpxxVJkES/1Y+Zj0 -----END CERTIFICATE----- DigiCert Assured ID Root G2 =========================== -----BEGIN CERTIFICATE----- MIIDljCCAn6gAwIBAgIQC5McOtY5Z+pnI7/Dr5r0SzANBgkqhkiG9w0BAQsFADBlMQswCQYDVQQG EwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSQw IgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgRzIwHhcNMTMwODAxMTIwMDAwWhcNMzgw MTE1MTIwMDAwWjBlMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQL ExB3d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgRzIw ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDZ5ygvUj82ckmIkzTz+GoeMVSAn61UQbVH 35ao1K+ALbkKz3X9iaV9JPrjIgwrvJUXCzO/GU1BBpAAvQxNEP4HteccbiJVMWWXvdMX0h5i89vq bFCMP4QMls+3ywPgym2hFEwbid3tALBSfK+RbLE4E9HpEgjAALAcKxHad3A2m67OeYfcgnDmCXRw VWmvo2ifv922ebPynXApVfSr/5Vh88lAbx3RvpO704gqu52/clpWcTs/1PPRCv4o76Pu2ZmvA9OP YLfykqGxvYmJHzDNw6YuYjOuFgJ3RFrngQo8p0Quebg/BLxcoIfhG69Rjs3sLPr4/m3wOnyqi+Rn lTGNAgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBTO w0q5mVXyuNtgv6l+vVa1lzan1jANBgkqhkiG9w0BAQsFAAOCAQEAyqVVjOPIQW5pJ6d1Ee88hjZv 0p3GeDgdaZaikmkuOGybfQTUiaWxMTeKySHMq2zNixya1r9I0jJmwYrA8y8678Dj1JGG0VDjA9tz d29KOVPt3ibHtX2vK0LRdWLjSisCx1BL4GnilmwORGYQRI+tBev4eaymG+g3NJ1TyWGqolKvSnAW hsI6yLETcDbYz+70CjTVW0z9B5yiutkBclzzTcHdDrEcDcRjvq30FPuJ7KJBDkzMyFdA0G4Dqs0M jomZmWzwPDCvON9vvKO+KSAnq3T/EyJ43pdSVR6DtVQgA+6uwE9W3jfMw3+qBCe703e4YtsXfJwo IhNzbM8m9Yop5w== -----END CERTIFICATE----- DigiCert Assured ID Root G3 =========================== -----BEGIN CERTIFICATE----- MIICRjCCAc2gAwIBAgIQC6Fa+h3foLVJRK/NJKBs7DAKBggqhkjOPQQDAzBlMQswCQYDVQQGEwJV UzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSQwIgYD VQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgRzMwHhcNMTMwODAxMTIwMDAwWhcNMzgwMTE1 MTIwMDAwWjBlMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgRzMwdjAQ BgcqhkjOPQIBBgUrgQQAIgNiAAQZ57ysRGXtzbg/WPuNsVepRC0FFfLvC/8QdJ+1YlJfZn4f5dwb RXkLzMZTCp2NXQLZqVneAlr2lSoOjThKiknGvMYDOAdfVdp+CW7if17QRSAPWXYQ1qAk8C3eNvJs KTmjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBTL0L2p4ZgF UaFNN6KDec6NHSrkhDAKBggqhkjOPQQDAwNnADBkAjAlpIFFAmsSS3V0T8gj43DydXLefInwz5Fy YZ5eEJJZVrmDxxDnOOlYJjZ91eQ0hjkCMHw2U/Aw5WJjOpnitqM7mzT6HtoQknFekROn3aRukswy 1vUhZscv6pZjamVFkpUBtA== -----END CERTIFICATE----- DigiCert Global Root G2 ======================= -----BEGIN CERTIFICATE----- MIIDjjCCAnagAwIBAgIQAzrx5qcRqaC7KGSxHQn65TANBgkqhkiG9w0BAQsFADBhMQswCQYDVQQG EwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSAw HgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBHMjAeFw0xMzA4MDExMjAwMDBaFw0zODAxMTUx MjAwMDBaMGExCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3 dy5kaWdpY2VydC5jb20xIDAeBgNVBAMTF0RpZ2lDZXJ0IEdsb2JhbCBSb290IEcyMIIBIjANBgkq hkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuzfNNNx7a8myaJCtSnX/RrohCgiN9RlUyfuI2/Ou8jqJ kTx65qsGGmvPrC3oXgkkRLpimn7Wo6h+4FR1IAWsULecYxpsMNzaHxmx1x7e/dfgy5SDN67sH0NO 3Xss0r0upS/kqbitOtSZpLYl6ZtrAGCSYP9PIUkY92eQq2EGnI/yuum06ZIya7XzV+hdG82MHauV BJVJ8zUtluNJbd134/tJS7SsVQepj5WztCO7TG1F8PapspUwtP1MVYwnSlcUfIKdzXOS0xZKBgyM UNGPHgm+F6HmIcr9g+UQvIOlCsRnKPZzFBQ9RnbDhxSJITRNrw9FDKZJobq7nMWxM4MphQIDAQAB o0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBhjAdBgNVHQ4EFgQUTiJUIBiV5uNu 5g/6+rkS7QYXjzkwDQYJKoZIhvcNAQELBQADggEBAGBnKJRvDkhj6zHd6mcY1Yl9PMWLSn/pvtsr F9+wX3N3KjITOYFnQoQj8kVnNeyIv/iPsGEMNKSuIEyExtv4NeF22d+mQrvHRAiGfzZ0JFrabA0U WTW98kndth/Jsw1HKj2ZL7tcu7XUIOGZX1NGFdtom/DzMNU+MeKNhJ7jitralj41E6Vf8PlwUHBH QRFXGU7Aj64GxJUTFy8bJZ918rGOmaFvE7FBcf6IKshPECBV1/MUReXgRPTqh5Uykw7+U0b6LJ3/ iyK5S9kJRaTepLiaWN0bfVKfjllDiIGknibVb63dDcY3fe0Dkhvld1927jyNxF1WW6LZZm6zNTfl MrY= -----END CERTIFICATE----- DigiCert Global Root G3 ======================= -----BEGIN CERTIFICATE----- MIICPzCCAcWgAwIBAgIQBVVWvPJepDU1w6QP1atFcjAKBggqhkjOPQQDAzBhMQswCQYDVQQGEwJV UzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSAwHgYD VQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBHMzAeFw0xMzA4MDExMjAwMDBaFw0zODAxMTUxMjAw MDBaMGExCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5k aWdpY2VydC5jb20xIDAeBgNVBAMTF0RpZ2lDZXJ0IEdsb2JhbCBSb290IEczMHYwEAYHKoZIzj0C AQYFK4EEACIDYgAE3afZu4q4C/sLfyHS8L6+c/MzXRq8NOrexpu80JX28MzQC7phW1FGfp4tn+6O YwwX7Adw9c+ELkCDnOg/QW07rdOkFFk2eJ0DQ+4QE2xy3q6Ip6FrtUPOZ9wj/wMco+I+o0IwQDAP BgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBhjAdBgNVHQ4EFgQUs9tIpPmhxdiuNkHMEWNp Yim8S8YwCgYIKoZIzj0EAwMDaAAwZQIxAK288mw/EkrRLTnDCgmXc/SINoyIJ7vmiI1Qhadj+Z4y 3maTD/HMsQmP3Wyr+mt/oAIwOWZbwmSNuJ5Q3KjVSaLtx9zRSX8XAbjIho9OjIgrqJqpisXRAL34 VOKa5Vt8sycX -----END CERTIFICATE----- DigiCert Trusted Root G4 ======================== -----BEGIN CERTIFICATE----- MIIFkDCCA3igAwIBAgIQBZsbV56OITLiOQe9p3d1XDANBgkqhkiG9w0BAQwFADBiMQswCQYDVQQG EwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEw HwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMTMwODAxMTIwMDAwWhcNMzgwMTE1 MTIwMDAwWjBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwggIiMA0G CSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC/5pBzaN675F1KPDAiMGkz7MKnJS7JIT3yithZwuEp pz1Yq3aaza57G4QNxDAf8xukOBbrVsaXbR2rsnnyyhHS5F/WBTxSD1Ifxp4VpX6+n6lXFllVcq9o k3DCsrp1mWpzMpTREEQQLt+C8weE5nQ7bXHiLQwb7iDVySAdYyktzuxeTsiT+CFhmzTrBcZe7Fsa vOvJz82sNEBfsXpm7nfISKhmV1efVFiODCu3T6cw2Vbuyntd463JT17lNecxy9qTXtyOj4DatpGY QJB5w3jHtrHEtWoYOAMQjdjUN6QuBX2I9YI+EJFwq1WCQTLX2wRzKm6RAXwhTNS8rhsDdV14Ztk6 MUSaM0C/CNdaSaTC5qmgZ92kJ7yhTzm1EVgX9yRcRo9k98FpiHaYdj1ZXUJ2h4mXaXpI8OCiEhtm mnTK3kse5w5jrubU75KSOp493ADkRSWJtppEGSt+wJS00mFt6zPZxd9LBADMfRyVw4/3IbKyEbe7 f/LVjHAsQWCqsWMYRJUadmJ+9oCw++hkpjPRiQfhvbfmQ6QYuKZ3AeEPlAwhHbJUKSWJbOUOUlFH dL4mrLZBdd56rF+NP8m800ERElvlEFDrMcXKchYiCd98THU/Y+whX8QgUWtvsauGi0/C1kVfnSD8 oR7FwI+isX4KJpn15GkvmB0t9dmpsh3lGwIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1Ud DwEB/wQEAwIBhjAdBgNVHQ4EFgQU7NfjgtJxXWRM3y5nP+e6mK4cD08wDQYJKoZIhvcNAQEMBQAD ggIBALth2X2pbL4XxJEbw6GiAI3jZGgPVs93rnD5/ZpKmbnJeFwMDF/k5hQpVgs2SV1EY+CtnJYY ZhsjDT156W1r1lT40jzBQ0CuHVD1UvyQO7uYmWlrx8GnqGikJ9yd+SeuMIW59mdNOj6PWTkiU0Tr yF0Dyu1Qen1iIQqAyHNm0aAFYF/opbSnr6j3bTWcfFqK1qI4mfN4i/RN0iAL3gTujJtHgXINwBQy 7zBZLq7gcfJW5GqXb5JQbZaNaHqasjYUegbyJLkJEVDXCLG4iXqEI2FCKeWjzaIgQdfRnGTZ6iah ixTXTBmyUEFxPT9NcCOGDErcgdLMMpSEDQgJlxxPwO5rIHQw0uA5NBCFIRUBCOhVMt5xSdkoF1BN 5r5N0XWs0Mr7QbhDparTwwVETyw2m+L64kW4I1NsBm9nVX9GtUw/bihaeSbSpKhil9Ie4u1Ki7wb /UdKDd9nZn6yW0HQO+T0O/QEY+nvwlQAUaCKKsnOeMzV6ocEGLPOr0mIr/OSmbaz5mEP0oUA51Aa 5BuVnRmhuZyxm7EAHu/QD09CbMkKvO5D+jpxpchNJqU1/YldvIViHTLSoCtU7ZpXwdv6EM8Zt4tK G48BtieVU+i2iW1bvGjUI+iLUaJW+fCmgKDWHrO8Dw9TdSmq6hN35N6MgSGtBxBHEa2HPQfRdbzP 82Z+ -----END CERTIFICATE----- WoSign ====== -----BEGIN CERTIFICATE----- MIIFdjCCA16gAwIBAgIQXmjWEXGUY1BWAGjzPsnFkTANBgkqhkiG9w0BAQUFADBVMQswCQYDVQQG EwJDTjEaMBgGA1UEChMRV29TaWduIENBIExpbWl0ZWQxKjAoBgNVBAMTIUNlcnRpZmljYXRpb24g QXV0aG9yaXR5IG9mIFdvU2lnbjAeFw0wOTA4MDgwMTAwMDFaFw0zOTA4MDgwMTAwMDFaMFUxCzAJ BgNVBAYTAkNOMRowGAYDVQQKExFXb1NpZ24gQ0EgTGltaXRlZDEqMCgGA1UEAxMhQ2VydGlmaWNh dGlvbiBBdXRob3JpdHkgb2YgV29TaWduMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA vcqNrLiRFVaXe2tcesLea9mhsMMQI/qnobLMMfo+2aYpbxY94Gv4uEBf2zmoAHqLoE1UfcIiePyO CbiohdfMlZdLdNiefvAA5A6JrkkoRBoQmTIPJYhTpA2zDxIIFgsDcSccf+Hb0v1naMQFXQoOXXDX 2JegvFNBmpGN9J42Znp+VsGQX+axaCA2pIwkLCxHC1l2ZjC1vt7tj/id07sBMOby8w7gLJKA84X5 KIq0VC6a7fd2/BVoFutKbOsuEo/Uz/4Mx1wdC34FMr5esAkqQtXJTpCzWQ27en7N1QhatH/YHGkR +ScPewavVIMYe+HdVHpRaG53/Ma/UkpmRqGyZxq7o093oL5d//xWC0Nyd5DKnvnyOfUNqfTq1+ez EC8wQjchzDBwyYaYD8xYTYO7feUapTeNtqwylwA6Y3EkHp43xP901DfA4v6IRmAR3Qg/UDaruHqk lWJqbrDKaiFaafPz+x1wOZXzp26mgYmhiMU7ccqjUu6Du/2gd/Tkb+dC221KmYo0SLwX3OSACCK2 8jHAPwQ+658geda4BmRkAjHXqc1S+4RFaQkAKtxVi8QGRkvASh0JWzko/amrzgD5LkhLJuYwTKVY yrREgk/nkR4zw7CT/xH8gdLKH3Ep3XZPkiWvHYG3Dy+MwwbMLyejSuQOmbp8HkUff6oZRZb9/D0C AwEAAaNCMEAwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFOFmzw7R 8bNLtwYgFP6HEtX2/vs+MA0GCSqGSIb3DQEBBQUAA4ICAQCoy3JAsnbBfnv8rWTjMnvMPLZdRtP1 LOJwXcgu2AZ9mNELIaCJWSQBnfmvCX0KI4I01fx8cpm5o9dU9OpScA7F9dY74ToJMuYhOZO9sxXq T2r09Ys/L3yNWC7F4TmgPsc9SnOeQHrAK2GpZ8nzJLmzbVUsWh2eJXLOC62qx1ViC777Y7NhRCOj y+EaDveaBk3e1CNOIZZbOVtXHS9dCF4Jef98l7VNg64N1uajeeAz0JmWAjCnPv/So0M/BVoG6kQC 2nz4SNAzqfkHx5Xh9T71XXG68pWpdIhhWeO/yloTunK0jF02h+mmxTwTv97QRCbut+wucPrXnbes 5cVAWubXbHssw1abR80LzvobtCHXt2a49CUwi1wNuepnsvRtrtWhnk/Yn+knArAdBtaP4/tIEp9/ EaEQPkxROpaw0RPxx9gmrjrKkcRpnd8BKWRRb2jaFOwIQZeQjdCygPLPwj2/kWjFgGcexGATVdVh mVd8upUPYUk6ynW8yQqTP2cOEvIo4jEbwFcW3wh8GcF+Dx+FHgo2fFt+J7x6v+Db9NpSvd4MVHAx kUOVyLzwPt0JfjBkUO1/AaQzZ01oT74V77D2AhGiGxMlOtzCWfHjXEa7ZywCRuoeSKbmW9m1vFGi kpbbqsY3Iqb+zCB0oy2pLmvLwIIRIbWTee5Ehr7XHuQe+w== -----END CERTIFICATE----- WoSign China ============ -----BEGIN CERTIFICATE----- MIIFWDCCA0CgAwIBAgIQUHBrzdgT/BtOOzNy0hFIjTANBgkqhkiG9w0BAQsFADBGMQswCQYDVQQG EwJDTjEaMBgGA1UEChMRV29TaWduIENBIExpbWl0ZWQxGzAZBgNVBAMMEkNBIOayg+mAmuagueiv geS5pjAeFw0wOTA4MDgwMTAwMDFaFw0zOTA4MDgwMTAwMDFaMEYxCzAJBgNVBAYTAkNOMRowGAYD VQQKExFXb1NpZ24gQ0EgTGltaXRlZDEbMBkGA1UEAwwSQ0Eg5rKD6YCa5qC56K+B5LmmMIICIjAN BgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA0EkhHiX8h8EqwqzbdoYGTufQdDTc7WU1/FDWiD+k 8H/rD195L4mx/bxjWDeTmzj4t1up+thxx7S8gJeNbEvxUNUqKaqoGXqW5pWOdO2XCld19AXbbQs5 uQF/qvbW2mzmBeCkTVL829B0txGMe41P/4eDrv8FAxNXUDf+jJZSEExfv5RxadmWPgxDT74wwJ85 dE8GRV2j1lY5aAfMh09Qd5Nx2UQIsYo06Yms25tO4dnkUkWMLhQfkWsZHWgpLFbE4h4TV2TwYeO5 Ed+w4VegG63XX9Gv2ystP9Bojg/qnw+LNVgbExz03jWhCl3W6t8Sb8D7aQdGctyB9gQjF+BNdeFy b7Ao65vh4YOhn0pdr8yb+gIgthhid5E7o9Vlrdx8kHccREGkSovrlXLp9glk3Kgtn3R46MGiCWOc 76DbT52VqyBPt7D3h1ymoOQ3OMdc4zUPLK2jgKLsLl3Az+2LBcLmc272idX10kaO6m1jGx6KyX2m +Jzr5dVjhU1zZmkR/sgO9MHHZklTfuQZa/HpelmjbX7FF+Ynxu8b22/8DU0GAbQOXDBGVWCvOGU6 yke6rCzMRh+yRpY/8+0mBe53oWprfi1tWFxK1I5nuPHa1UaKJ/kR8slC/k7e3x9cxKSGhxYzoacX GKUN5AXlK8IrC6KVkLn9YDxOiT7nnO4fuwECAwEAAaNCMEAwDgYDVR0PAQH/BAQDAgEGMA8GA1Ud EwEB/wQFMAMBAf8wHQYDVR0OBBYEFOBNv9ybQV0T6GTwp+kVpOGBwboxMA0GCSqGSIb3DQEBCwUA A4ICAQBqinA4WbbaixjIvirTthnVZil6Xc1bL3McJk6jfW+rtylNpumlEYOnOXOvEESS5iVdT2H6 yAa+Tkvv/vMx/sZ8cApBWNromUuWyXi8mHwCKe0JgOYKOoICKuLJL8hWGSbueBwj/feTZU7n85iY r83d2Z5AiDEoOqsuC7CsDCT6eiaY8xJhEPRdF/d+4niXVOKM6Cm6jBAyvd0zaziGfjk9DgNyp115 j0WKWa5bIW4xRtVZjc8VX90xJc/bYNaBRHIpAlf2ltTW/+op2znFuCyKGo3Oy+dCMYYFaA6eFN0A kLppRQjbbpCBhqcqBT/mhDn4t/lXX0ykeVoQDF7Va/81XwVRHmyjdanPUIPTfPRm94KNPQx96N97 qA4bLJyuQHCH2u2nFoJavjVsIE4iYdm8UXrNemHcSxH5/mc0zy4EZmFcV5cjjPOGG0jfKq+nwf/Y jj4Du9gqsPoUJbJRa4ZDhS4HIxaAjUz7tGM7zMN07RujHv41D198HRaG9Q7DlfEvr10lO1Hm13ZB ONFLAzkopR6RctR9q5czxNM+4Gm2KHmgCY0c0f9BckgG/Jou5yD5m6Leie2uPAmvylezkolwQOQv T8Jwg0DXJCxr5wkf09XHwQj02w47HAcLQxGEIYbpgNR12KvxAmLBsX5VYc8T1yaw15zLKYs4SgsO kI26oQ== -----END CERTIFICATE----- COMODO RSA Certification Authority ================================== -----BEGIN CERTIFICATE----- MIIF2DCCA8CgAwIBAgIQTKr5yttjb+Af907YWwOGnTANBgkqhkiG9w0BAQwFADCBhTELMAkGA1UE BhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgG A1UEChMRQ09NT0RPIENBIExpbWl0ZWQxKzApBgNVBAMTIkNPTU9ETyBSU0EgQ2VydGlmaWNhdGlv biBBdXRob3JpdHkwHhcNMTAwMTE5MDAwMDAwWhcNMzgwMTE4MjM1OTU5WjCBhTELMAkGA1UEBhMC R0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgGA1UE ChMRQ09NT0RPIENBIExpbWl0ZWQxKzApBgNVBAMTIkNPTU9ETyBSU0EgQ2VydGlmaWNhdGlvbiBB dXRob3JpdHkwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCR6FSS0gpWsawNJN3Fz0Rn dJkrN6N9I3AAcbxT38T6KhKPS38QVr2fcHK3YX/JSw8Xpz3jsARh7v8Rl8f0hj4K+j5c+ZPmNHrZ FGvnnLOFoIJ6dq9xkNfs/Q36nGz637CC9BR++b7Epi9Pf5l/tfxnQ3K9DADWietrLNPtj5gcFKt+ 5eNu/Nio5JIk2kNrYrhV/erBvGy2i/MOjZrkm2xpmfh4SDBF1a3hDTxFYPwyllEnvGfDyi62a+pG x8cgoLEfZd5ICLqkTqnyg0Y3hOvozIFIQ2dOciqbXL1MGyiKXCJ7tKuY2e7gUYPDCUZObT6Z+pUX 2nwzV0E8jVHtC7ZcryxjGt9XyD+86V3Em69FmeKjWiS0uqlWPc9vqv9JWL7wqP/0uK3pN/u6uPQL OvnoQ0IeidiEyxPx2bvhiWC4jChWrBQdnArncevPDt09qZahSL0896+1DSJMwBGB7FY79tOi4lu3 sgQiUpWAk2nojkxl8ZEDLXB0AuqLZxUpaVICu9ffUGpVRr+goyhhf3DQw6KqLCGqR84onAZFdr+C GCe01a60y1Dma/RMhnEw6abfFobg2P9A3fvQQoh/ozM6LlweQRGBY84YcWsr7KaKtzFcOmpH4MN5 WdYgGq/yapiqcrxXStJLnbsQ/LBMQeXtHT1eKJ2czL+zUdqnR+WEUwIDAQABo0IwQDAdBgNVHQ4E FgQUu69+Aj36pvE8hI6t7jiY7NkyMtQwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8w DQYJKoZIhvcNAQEMBQADggIBAArx1UaEt65Ru2yyTUEUAJNMnMvlwFTPoCWOAvn9sKIN9SCYPBMt rFaisNZ+EZLpLrqeLppysb0ZRGxhNaKatBYSaVqM4dc+pBroLwP0rmEdEBsqpIt6xf4FpuHA1sj+ nq6PK7o9mfjYcwlYRm6mnPTXJ9OV2jeDchzTc+CiR5kDOF3VSXkAKRzH7JsgHAckaVd4sjn8OoSg tZx8jb8uk2IntznaFxiuvTwJaP+EmzzV1gsD41eeFPfR60/IvYcjt7ZJQ3mFXLrrkguhxuhoqEwW sRqZCuhTLJK7oQkYdQxlqHvLI7cawiiFwxv/0Cti76R7CZGYZ4wUAc1oBmpjIXUDgIiKboHGhfKp pC3n9KUkEEeDys30jXlYsQab5xoq2Z0B15R97QNKyvDb6KkBPvVWmckejkk9u+UJueBPSZI9FoJA zMxZxuY67RIuaTxslbH9qh17f4a+Hg4yRvv7E491f0yLS0Zj/gA0QHDBw7mh3aZw4gSzQbzpgJHq ZJx64SIDqZxubw5lT2yHh17zbqD5daWbQOhTsiedSrnAdyGN/4fy3ryM7xfft0kL0fJuMAsaDk52 7RH89elWsn2/x20Kk4yl0MC2Hb46TpSi125sC8KKfPog88Tk5c0NqMuRkrF8hey1FGlmDoLnzc7I LaZRfyHBNVOFBkpdn627G190 -----END CERTIFICATE----- USERTrust RSA Certification Authority ===================================== -----BEGIN CERTIFICATE----- MIIF3jCCA8agAwIBAgIQAf1tMPyjylGoG7xkDjUDLTANBgkqhkiG9w0BAQwFADCBiDELMAkGA1UE BhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNVBAcTC0plcnNleSBDaXR5MR4wHAYDVQQK ExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNh dGlvbiBBdXRob3JpdHkwHhcNMTAwMjAxMDAwMDAwWhcNMzgwMTE4MjM1OTU5WjCBiDELMAkGA1UE BhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNVBAcTC0plcnNleSBDaXR5MR4wHAYDVQQK ExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNh dGlvbiBBdXRob3JpdHkwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCAEmUXNg7D2wiz 0KxXDXbtzSfTTK1Qg2HiqiBNCS1kCdzOiZ/MPans9s/B3PHTsdZ7NygRK0faOca8Ohm0X6a9fZ2j Y0K2dvKpOyuR+OJv0OwWIJAJPuLodMkYtJHUYmTbf6MG8YgYapAiPLz+E/CHFHv25B+O1ORRxhFn RghRy4YUVD+8M/5+bJz/Fp0YvVGONaanZshyZ9shZrHUm3gDwFA66Mzw3LyeTP6vBZY1H1dat//O +T23LLb2VN3I5xI6Ta5MirdcmrS3ID3KfyI0rn47aGYBROcBTkZTmzNg95S+UzeQc0PzMsNT79uq /nROacdrjGCT3sTHDN/hMq7MkztReJVni+49Vv4M0GkPGw/zJSZrM233bkf6c0Plfg6lZrEpfDKE Y1WJxA3Bk1QwGROs0303p+tdOmw1XNtB1xLaqUkL39iAigmTYo61Zs8liM2EuLE/pDkP2QKe6xJM lXzzawWpXhaDzLhn4ugTncxbgtNMs+1b/97lc6wjOy0AvzVVdAlJ2ElYGn+SNuZRkg7zJn0cTRe8 yexDJtC/QV9AqURE9JnnV4eeUB9XVKg+/XRjL7FQZQnmWEIuQxpMtPAlR1n6BB6T1CZGSlCBst6+ eLf8ZxXhyVeEHg9j1uliutZfVS7qXMYoCAQlObgOK6nyTJccBz8NUvXt7y+CDwIDAQABo0IwQDAd BgNVHQ4EFgQUU3m/WqorSs9UgOHYm8Cd8rIDZsswDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQF MAMBAf8wDQYJKoZIhvcNAQEMBQADggIBAFzUfA3P9wF9QZllDHPFUp/L+M+ZBn8b2kMVn54CVVeW FPFSPCeHlCjtHzoBN6J2/FNQwISbxmtOuowhT6KOVWKR82kV2LyI48SqC/3vqOlLVSoGIG1VeCkZ 7l8wXEskEVX/JJpuXior7gtNn3/3ATiUFJVDBwn7YKnuHKsSjKCaXqeYalltiz8I+8jRRa8YFWSQ Eg9zKC7F4iRO/Fjs8PRF/iKz6y+O0tlFYQXBl2+odnKPi4w2r78NBc5xjeambx9spnFixdjQg3IM 8WcRiQycE0xyNN+81XHfqnHd4blsjDwSXWXavVcStkNr/+XeTWYRUc+ZruwXtuhxkYzeSf7dNXGi FSeUHM9h4ya7b6NnJSFd5t0dCy5oGzuCr+yDZ4XUmFF0sbmZgIn/f3gZXHlKYC6SQK5MNyosycdi yA5d9zZbyuAlJQG03RoHnHcAP9Dc1ew91Pq7P8yF1m9/qS3fuQL39ZeatTXaw2ewh0qpKJ4jjv9c J2vhsE/zB+4ALtRZh8tSQZXq9EfX7mRBVXyNWQKV3WKdwrnuWih0hKWbt5DHDAff9Yk2dDLWKMGw sAvgnEzDHNb842m1R0aBL6KCq9NjRHDEjf8tM7qtj3u1cIiuPhnPQCjY/MiQu12ZIvVS5ljFH4gx Q+6IHdfGjjxDah2nGN59PRbxYvnKkKj9 -----END CERTIFICATE----- USERTrust ECC Certification Authority ===================================== -----BEGIN CERTIFICATE----- MIICjzCCAhWgAwIBAgIQXIuZxVqUxdJxVt7NiYDMJjAKBggqhkjOPQQDAzCBiDELMAkGA1UEBhMC VVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNVBAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVU aGUgVVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMTJVVTRVJUcnVzdCBFQ0MgQ2VydGlmaWNhdGlv biBBdXRob3JpdHkwHhcNMTAwMjAxMDAwMDAwWhcNMzgwMTE4MjM1OTU5WjCBiDELMAkGA1UEBhMC VVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNVBAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVU aGUgVVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMTJVVTRVJUcnVzdCBFQ0MgQ2VydGlmaWNhdGlv biBBdXRob3JpdHkwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQarFRaqfloI+d61SRvU8Za2EurxtW2 0eZzca7dnNYMYf3boIkDuAUU7FfO7l0/4iGzzvfUinngo4N+LZfQYcTxmdwlkWOrfzCjtHDix6Ez nPO/LlxTsV+zfTJ/ijTjeXmjQjBAMB0GA1UdDgQWBBQ64QmG1M8ZwpZ2dEl23OA1xmNjmjAOBgNV HQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAKBggqhkjOPQQDAwNoADBlAjA2Z6EWCNzklwBB HU6+4WMBzzuqQhFkoJ2UOQIReVx7Hfpkue4WQrO/isIJxOzksU0CMQDpKmFHjFJKS04YcPbWRNZu 9YO6bVi9JNlWSOrvxKJGgYhqOkbRqZtNyWHa0V1Xahg= -----END CERTIFICATE----- GlobalSign ECC Root CA - R4 =========================== -----BEGIN CERTIFICATE----- MIIB4TCCAYegAwIBAgIRKjikHJYKBN5CsiilC+g0mAIwCgYIKoZIzj0EAwIwUDEkMCIGA1UECxMb R2xvYmFsU2lnbiBFQ0MgUm9vdCBDQSAtIFI0MRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQD EwpHbG9iYWxTaWduMB4XDTEyMTExMzAwMDAwMFoXDTM4MDExOTAzMTQwN1owUDEkMCIGA1UECxMb R2xvYmFsU2lnbiBFQ0MgUm9vdCBDQSAtIFI0MRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQD EwpHbG9iYWxTaWduMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEuMZ5049sJQ6fLjkZHAOkrprl OQcJFspjsbmG+IpXwVfOQvpzofdlQv8ewQCybnMO/8ch5RikqtlxP6jUuc6MHaNCMEAwDgYDVR0P AQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFFSwe61FuOJAf/sKbvu+M8k8o4TV MAoGCCqGSM49BAMCA0gAMEUCIQDckqGgE6bPA7DmxCGXkPoUVy0D7O48027KqGx2vKLeuwIgJ6iF JzWbVsaj8kfSt24bAgAXqmemFZHe+pTsewv4n4Q= -----END CERTIFICATE----- GlobalSign ECC Root CA - R5 =========================== -----BEGIN CERTIFICATE----- MIICHjCCAaSgAwIBAgIRYFlJ4CYuu1X5CneKcflK2GwwCgYIKoZIzj0EAwMwUDEkMCIGA1UECxMb R2xvYmFsU2lnbiBFQ0MgUm9vdCBDQSAtIFI1MRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQD EwpHbG9iYWxTaWduMB4XDTEyMTExMzAwMDAwMFoXDTM4MDExOTAzMTQwN1owUDEkMCIGA1UECxMb R2xvYmFsU2lnbiBFQ0MgUm9vdCBDQSAtIFI1MRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQD EwpHbG9iYWxTaWduMHYwEAYHKoZIzj0CAQYFK4EEACIDYgAER0UOlvt9Xb/pOdEh+J8LttV7HpI6 SFkc8GIxLcB6KP4ap1yztsyX50XUWPrRd21DosCHZTQKH3rd6zwzocWdTaRvQZU4f8kehOvRnkmS h5SHDDqFSmafnVmTTZdhBoZKo0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAd BgNVHQ4EFgQUPeYpSJvqB8ohREom3m7e0oPQn1kwCgYIKoZIzj0EAwMDaAAwZQIxAOVpEslu28Yx uglB4Zf4+/2a4n0Sye18ZNPLBSWLVtmg515dTguDnFt2KaAJJiFqYgIwcdK1j1zqO+F4CYWodZI7 yFz9SO8NdCKoCOJuxUnOxwy8p2Fp8fc74SrL+SvzZpA3 -----END CERTIFICATE----- Staat der Nederlanden Root CA - G3 ================================== -----BEGIN CERTIFICATE----- MIIFdDCCA1ygAwIBAgIEAJiiOTANBgkqhkiG9w0BAQsFADBaMQswCQYDVQQGEwJOTDEeMBwGA1UE CgwVU3RhYXQgZGVyIE5lZGVybGFuZGVuMSswKQYDVQQDDCJTdGFhdCBkZXIgTmVkZXJsYW5kZW4g Um9vdCBDQSAtIEczMB4XDTEzMTExNDExMjg0MloXDTI4MTExMzIzMDAwMFowWjELMAkGA1UEBhMC TkwxHjAcBgNVBAoMFVN0YWF0IGRlciBOZWRlcmxhbmRlbjErMCkGA1UEAwwiU3RhYXQgZGVyIE5l ZGVybGFuZGVuIFJvb3QgQ0EgLSBHMzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAL4y olQPcPssXFnrbMSkUeiFKrPMSjTysF/zDsccPVMeiAho2G89rcKezIJnByeHaHE6n3WWIkYFsO2t x1ueKt6c/DrGlaf1F2cY5y9JCAxcz+bMNO14+1Cx3Gsy8KL+tjzk7FqXxz8ecAgwoNzFs21v0IJy EavSgWhZghe3eJJg+szeP4TrjTgzkApyI/o1zCZxMdFyKJLZWyNtZrVtB0LrpjPOktvA9mxjeM3K Tj215VKb8b475lRgsGYeCasH/lSJEULR9yS6YHgamPfJEf0WwTUaVHXvQ9Plrk7O53vDxk5hUUur mkVLoR9BvUhTFXFkC4az5S6+zqQbwSmEorXLCCN2QyIkHxcE1G6cxvx/K2Ya7Irl1s9N9WMJtxU5 1nus6+N86U78dULI7ViVDAZCopz35HCz33JvWjdAidiFpNfxC95DGdRKWCyMijmev4SH8RY7Ngzp 07TKbBlBUgmhHbBqv4LvcFEhMtwFdozL92TkA1CvjJFnq8Xy7ljY3r735zHPbMk7ccHViLVlvMDo FxcHErVc0qsgk7TmgoNwNsXNo42ti+yjwUOH5kPiNL6VizXtBznaqB16nzaeErAMZRKQFWDZJkBE 41ZgpRDUajz9QdwOWke275dhdU/Z/seyHdTtXUmzqWrLZoQT1Vyg3N9udwbRcXXIV2+vD3dbAgMB AAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBRUrfrHkleu yjWcLhL75LpdINyUVzANBgkqhkiG9w0BAQsFAAOCAgEAMJmdBTLIXg47mAE6iqTnB/d6+Oea31BD U5cqPco8R5gu4RV78ZLzYdqQJRZlwJ9UXQ4DO1t3ApyEtg2YXzTdO2PCwyiBwpwpLiniyMMB8jPq KqrMCQj3ZWfGzd/TtiunvczRDnBfuCPRy5FOCvTIeuXZYzbB1N/8Ipf3YF3qKS9Ysr1YvY2WTxB1 v0h7PVGHoTx0IsL8B3+A3MSs/mrBcDCw6Y5p4ixpgZQJut3+TcCDjJRYwEYgr5wfAvg1VUkvRtTA 8KCWAg8zxXHzniN9lLf9OtMJgwYh/WA9rjLA0u6NpvDntIJ8CsxwyXmA+P5M9zWEGYox+wrZ13+b 8KKaa8MFSu1BYBQw0aoRQm7TIwIEC8Zl3d1Sd9qBa7Ko+gE4uZbqKmxnl4mUnrzhVNXkanjvSr0r mj1AfsbAddJu+2gw7OyLnflJNZoaLNmzlTnVHpL3prllL+U9bTpITAjc5CgSKL59NVzq4BZ+Extq 1z7XnvwtdbLBFNUjA9tbbws+eC8N3jONFrdI54OagQ97wUNNVQQXOEpR1VmiiXTTn74eS9fGbbeI JG9gkaSChVtWQbzQRKtqE77RLFi3EjNYsjdj3BP1lB0/QFH1T/U67cjF68IeHRaVesd+QnGTbksV tzDfqu1XhUisHWrdOWnk4Xl4vs4Fv6EM94B7IWcnMFk= -----END CERTIFICATE----- Staat der Nederlanden EV Root CA ================================ -----BEGIN CERTIFICATE----- MIIFcDCCA1igAwIBAgIEAJiWjTANBgkqhkiG9w0BAQsFADBYMQswCQYDVQQGEwJOTDEeMBwGA1UE CgwVU3RhYXQgZGVyIE5lZGVybGFuZGVuMSkwJwYDVQQDDCBTdGFhdCBkZXIgTmVkZXJsYW5kZW4g RVYgUm9vdCBDQTAeFw0xMDEyMDgxMTE5MjlaFw0yMjEyMDgxMTEwMjhaMFgxCzAJBgNVBAYTAk5M MR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xKTAnBgNVBAMMIFN0YWF0IGRlciBOZWRl cmxhbmRlbiBFViBSb290IENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA48d+ifkk SzrSM4M1LGns3Amk41GoJSt5uAg94JG6hIXGhaTK5skuU6TJJB79VWZxXSzFYGgEt9nCUiY4iKTW O0Cmws0/zZiTs1QUWJZV1VD+hq2kY39ch/aO5ieSZxeSAgMs3NZmdO3dZ//BYY1jTw+bbRcwJu+r 0h8QoPnFfxZpgQNH7R5ojXKhTbImxrpsX23Wr9GxE46prfNeaXUmGD5BKyF/7otdBwadQ8QpCiv8 Kj6GyzyDOvnJDdrFmeK8eEEzduG/L13lpJhQDBXd4Pqcfzho0LKmeqfRMb1+ilgnQ7O6M5HTp5gV XJrm0w912fxBmJc+qiXbj5IusHsMX/FjqTf5m3VpTCgmJdrV8hJwRVXj33NeN/UhbJCONVrJ0yPr 08C+eKxCKFhmpUZtcALXEPlLVPxdhkqHz3/KRawRWrUgUY0viEeXOcDPusBCAUCZSCELa6fS/ZbV 0b5GnUngC6agIk440ME8MLxwjyx1zNDFjFE7PZQIZCZhfbnDZY8UnCHQqv0XcgOPvZuM5l5Tnrmd 74K74bzickFbIZTTRTeU0d8JOV3nI6qaHcptqAqGhYqCvkIH1vI4gnPah1vlPNOePqc7nvQDs/nx fRN0Av+7oeX6AHkcpmZBiFxgV6YuCcS6/ZrPpx9Aw7vMWgpVSzs4dlG4Y4uElBbmVvMCAwEAAaNC MEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFP6rAJCYniT8qcwa ivsnuL8wbqg7MA0GCSqGSIb3DQEBCwUAA4ICAQDPdyxuVr5Os7aEAJSrR8kN0nbHhp8dB9O2tLsI eK9p0gtJ3jPFrK3CiAJ9Brc1AsFgyb/E6JTe1NOpEyVa/m6irn0F3H3zbPB+po3u2dfOWBfoqSmu c0iH55vKbimhZF8ZE/euBhD/UcabTVUlT5OZEAFTdfETzsemQUHSv4ilf0X8rLiltTMMgsT7B/Zq 5SWEXwbKwYY5EdtYzXc7LMJMD16a4/CrPmEbUCTCwPTxGfARKbalGAKb12NMcIxHowNDXLldRqAN b/9Zjr7dn3LDWyvfjFvO5QxGbJKyCqNMVEIYFRIYvdr8unRu/8G2oGTYqV9Vrp9canaW2HNnh/tN f1zuacpzEPuKqf2evTY4SUmH9A4U8OmHuD+nT3pajnnUk+S7aFKErGzp85hwVXIy+TSrK0m1zSBi 5Dp6Z2Orltxtrpfs/J92VoguZs9btsmksNcFuuEnL5O7Jiqik7Ab846+HUCjuTaPPoIaGl6I6lD4 WeKDRikL40Rc4ZW2aZCaFG+XroHPaO+Zmr615+F/+PoTRxZMzG0IQOeLeG9QgkRQP2YGiqtDhFZK DyAthg710tvSeopLzaXoTvFeJiUBWSOgftL2fiFX1ye8FVdMpEbB4IMeDExNH08GGeL5qPQ6gqGy eUN51q1veieQA6TqJIc/2b3Z6fJfUEkc7uzXLg== -----END CERTIFICATE----- IdenTrust Commercial Root CA 1 ============================== -----BEGIN CERTIFICATE----- MIIFYDCCA0igAwIBAgIQCgFCgAAAAUUjyES1AAAAAjANBgkqhkiG9w0BAQsFADBKMQswCQYDVQQG EwJVUzESMBAGA1UEChMJSWRlblRydXN0MScwJQYDVQQDEx5JZGVuVHJ1c3QgQ29tbWVyY2lhbCBS b290IENBIDEwHhcNMTQwMTE2MTgxMjIzWhcNMzQwMTE2MTgxMjIzWjBKMQswCQYDVQQGEwJVUzES MBAGA1UEChMJSWRlblRydXN0MScwJQYDVQQDEx5JZGVuVHJ1c3QgQ29tbWVyY2lhbCBSb290IENB IDEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCnUBneP5k91DNG8W9RYYKyqU+PZ4ld hNlT3Qwo2dfw/66VQ3KZ+bVdfIrBQuExUHTRgQ18zZshq0PirK1ehm7zCYofWjK9ouuU+ehcCuz/ mNKvcbO0U59Oh++SvL3sTzIwiEsXXlfEU8L2ApeN2WIrvyQfYo3fw7gpS0l4PJNgiCL8mdo2yMKi 1CxUAGc1bnO/AljwpN3lsKImesrgNqUZFvX9t++uP0D1bVoE/c40yiTcdCMbXTMTEl3EASX2MN0C XZ/g1Ue9tOsbobtJSdifWwLziuQkkORiT0/Br4sOdBeo0XKIanoBScy0RnnGF7HamB4HWfp1IYVl 3ZBWzvurpWCdxJ35UrCLvYf5jysjCiN2O/cz4ckA82n5S6LgTrx+kzmEB/dEcH7+B1rlsazRGMzy NeVJSQjKVsk9+w8YfYs7wRPCTY/JTw436R+hDmrfYi7LNQZReSzIJTj0+kuniVyc0uMNOYZKdHzV WYfCP04MXFL0PfdSgvHqo6z9STQaKPNBiDoT7uje/5kdX7rL6B7yuVBgwDHTc+XvvqDtMwt0viAg xGds8AgDelWAf0ZOlqf0Hj7h9tgJ4TNkK2PXMl6f+cB7D3hvl7yTmvmcEpB4eoCHFddydJxVdHix uuFucAS6T6C6aMN7/zHwcz09lCqxC0EOoP5NiGVreTO01wIDAQABo0IwQDAOBgNVHQ8BAf8EBAMC AQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU7UQZwNPwBovupHu+QucmVMiONnYwDQYJKoZI hvcNAQELBQADggIBAA2ukDL2pkt8RHYZYR4nKM1eVO8lvOMIkPkp165oCOGUAFjvLi5+U1KMtlwH 6oi6mYtQlNeCgN9hCQCTrQ0U5s7B8jeUeLBfnLOic7iPBZM4zY0+sLj7wM+x8uwtLRvM7Kqas6pg ghstO8OEPVeKlh6cdbjTMM1gCIOQ045U8U1mwF10A0Cj7oV+wh93nAbowacYXVKV7cndJZ5t+qnt ozo00Fl72u1Q8zW/7esUTTHHYPTa8Yec4kjixsU3+wYQ+nVZZjFHKdp2mhzpgq7vmrlR94gjmmmV YjzlVYA211QC//G5Xc7UI2/YRYRKW2XviQzdFKcgyxilJbQN+QHwotL0AMh0jqEqSI5l2xPE4iUX feu+h1sXIFRRk0pTAwvsXcoz7WL9RccvW9xYoIA55vrX/hMUpu09lEpCdNTDd1lzzY9GvlU47/ro kTLql1gEIt44w8y8bckzOmoKaT+gyOpyj4xjhiO9bTyWnpXgSUyqorkqG5w2gXjtw+hG4iZZRHUe 2XWJUc0QhJ1hYMtd+ZciTY6Y5uN/9lu7rs3KSoFrXgvzUeF0K+l+J6fZmUlO+KWA2yUPHGNiiskz Z2s8EIPGrd6ozRaOjfAHN3Gf8qv8QfXBi+wAN10J5U6A7/qxXDgGpRtK4dw4LTzcqx+QGtVKnO7R cGzM7vRX+Bi6hG6H -----END CERTIFICATE----- IdenTrust Public Sector Root CA 1 ================================= -----BEGIN CERTIFICATE----- MIIFZjCCA06gAwIBAgIQCgFCgAAAAUUjz0Z8AAAAAjANBgkqhkiG9w0BAQsFADBNMQswCQYDVQQG EwJVUzESMBAGA1UEChMJSWRlblRydXN0MSowKAYDVQQDEyFJZGVuVHJ1c3QgUHVibGljIFNlY3Rv ciBSb290IENBIDEwHhcNMTQwMTE2MTc1MzMyWhcNMzQwMTE2MTc1MzMyWjBNMQswCQYDVQQGEwJV UzESMBAGA1UEChMJSWRlblRydXN0MSowKAYDVQQDEyFJZGVuVHJ1c3QgUHVibGljIFNlY3RvciBS b290IENBIDEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC2IpT8pEiv6EdrCvsnduTy P4o7ekosMSqMjbCpwzFrqHd2hCa2rIFCDQjrVVi7evi8ZX3yoG2LqEfpYnYeEe4IFNGyRBb06tD6 Hi9e28tzQa68ALBKK0CyrOE7S8ItneShm+waOh7wCLPQ5CQ1B5+ctMlSbdsHyo+1W/CD80/HLaXI rcuVIKQxKFdYWuSNG5qrng0M8gozOSI5Cpcu81N3uURF/YTLNiCBWS2ab21ISGHKTN9T0a9SvESf qy9rg3LvdYDaBjMbXcjaY8ZNzaxmMc3R3j6HEDbhuaR672BQssvKplbgN6+rNBM5Jeg5ZuSYeqoS mJxZZoY+rfGwyj4GD3vwEUs3oERte8uojHH01bWRNszwFcYr3lEXsZdMUD2xlVl8BX0tIdUAvwFn ol57plzy9yLxkA2T26pEUWbMfXYD62qoKjgZl3YNa4ph+bz27nb9cCvdKTz4Ch5bQhyLVi9VGxyh LrXHFub4qjySjmm2AcG1hp2JDws4lFTo6tyePSW8Uybt1as5qsVATFSrsrTZ2fjXctscvG29ZV/v iDUqZi/u9rNl8DONfJhBaUYPQxxp+pu10GFqzcpL2UyQRqsVWaFHVCkugyhfHMKiq3IXAAaOReyL 4jM9f9oZRORicsPfIsbyVtTdX5Vy7W1f90gDW/3FKqD2cyOEEBsB5wIDAQABo0IwQDAOBgNVHQ8B Af8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU43HgntinQtnbcZFrlJPrw6PRFKMw DQYJKoZIhvcNAQELBQADggIBAEf63QqwEZE4rU1d9+UOl1QZgkiHVIyqZJnYWv6IAcVYpZmxI1Qj t2odIFflAWJBF9MJ23XLblSQdf4an4EKwt3X9wnQW3IV5B4Jaj0z8yGa5hV+rVHVDRDtfULAj+7A mgjVQdZcDiFpboBhDhXAuM/FSRJSzL46zNQuOAXeNf0fb7iAaJg9TaDKQGXSc3z1i9kKlT/YPyNt GtEqJBnZhbMX73huqVjRI9PHE+1yJX9dsXNw0H8GlwmEKYBhHfpe/3OsoOOJuBxxFcbeMX8S3OFt m6/n6J91eEyrRjuazr8FGF1NFTwWmhlQBJqymm9li1JfPFgEKCXAZmExfrngdbkaqIHWchezxQMx NRF4eKLg6TCMf4DfWN88uieW4oA0beOY02QnrEh+KHdcxiVhJfiFDGX6xDIvpZgF5PgLZxYWxoK4 Mhn5+bl53B/N66+rDt0b20XkeucC4pVd/GnwU2lhlXV5C15V5jgclKlZM57IcXR5f1GJtshquDDI ajjDbp7hNxbqBWJMWxJH7ae0s1hWx0nzfxJoCTFx8G34Tkf71oXuxVhAGaQdp/lLQzfcaFpPz+vC ZHTetBXZ9FRUGi8c15dxVJCO2SCdUyt/q4/i6jC8UDfv8Ue1fXwsBOxonbRJRBD0ckscZOf85muQ 3Wl9af0AVqW3rLatt8o+Ae+c -----END CERTIFICATE----- Entrust Root Certification Authority - G2 ========================================= -----BEGIN CERTIFICATE----- MIIEPjCCAyagAwIBAgIESlOMKDANBgkqhkiG9w0BAQsFADCBvjELMAkGA1UEBhMCVVMxFjAUBgNV BAoTDUVudHJ1c3QsIEluYy4xKDAmBgNVBAsTH1NlZSB3d3cuZW50cnVzdC5uZXQvbGVnYWwtdGVy bXMxOTA3BgNVBAsTMChjKSAyMDA5IEVudHJ1c3QsIEluYy4gLSBmb3IgYXV0aG9yaXplZCB1c2Ug b25seTEyMDAGA1UEAxMpRW50cnVzdCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0gRzIw HhcNMDkwNzA3MTcyNTU0WhcNMzAxMjA3MTc1NTU0WjCBvjELMAkGA1UEBhMCVVMxFjAUBgNVBAoT DUVudHJ1c3QsIEluYy4xKDAmBgNVBAsTH1NlZSB3d3cuZW50cnVzdC5uZXQvbGVnYWwtdGVybXMx OTA3BgNVBAsTMChjKSAyMDA5IEVudHJ1c3QsIEluYy4gLSBmb3IgYXV0aG9yaXplZCB1c2Ugb25s eTEyMDAGA1UEAxMpRW50cnVzdCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0gRzIwggEi MA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC6hLZy254Ma+KZ6TABp3bqMriVQRrJ2mFOWHLP /vaCeb9zYQYKpSfYs1/TRU4cctZOMvJyig/3gxnQaoCAAEUesMfnmr8SVycco2gvCoe9amsOXmXz HHfV1IWNcCG0szLni6LVhjkCsbjSR87kyUnEO6fe+1R9V77w6G7CebI6C1XiUJgWMhNcL3hWwcKU s/Ja5CeanyTXxuzQmyWC48zCxEXFjJd6BmsqEZ+pCm5IO2/b1BEZQvePB7/1U1+cPvQXLOZprE4y TGJ36rfo5bs0vBmLrpxR57d+tVOxMyLlbc9wPBr64ptntoP0jaWvYkxN4FisZDQSA/i2jZRjJKRx AgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBRqciZ6 0B7vfec7aVHUbI2fkBJmqzANBgkqhkiG9w0BAQsFAAOCAQEAeZ8dlsa2eT8ijYfThwMEYGprmi5Z iXMRrEPR9RP/jTkrwPK9T3CMqS/qF8QLVJ7UG5aYMzyorWKiAHarWWluBh1+xLlEjZivEtRh2woZ Rkfz6/djwUAFQKXSt/S1mja/qYh2iARVBCuch38aNzx+LaUa2NSJXsq9rD1s2G2v1fN2D807iDgi nWyTmsQ9v4IbZT+mD12q/OWyFcq1rca8PdCE6OoGcrBNOTJ4vz4RnAuknZoh8/CbCzB428Hch0P+ vGOaysXCHMnHjf87ElgI5rY97HosTvuDls4MPGmHVHOkc8KT/1EQrBVUAdj8BbGJoX90g5pJ19xO e4pIb4tF9g== -----END CERTIFICATE----- Entrust Root Certification Authority - EC1 ========================================== -----BEGIN CERTIFICATE----- MIIC+TCCAoCgAwIBAgINAKaLeSkAAAAAUNCR+TAKBggqhkjOPQQDAzCBvzELMAkGA1UEBhMCVVMx FjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNVBAsTH1NlZSB3d3cuZW50cnVzdC5uZXQvbGVn YWwtdGVybXMxOTA3BgNVBAsTMChjKSAyMDEyIEVudHJ1c3QsIEluYy4gLSBmb3IgYXV0aG9yaXpl ZCB1c2Ugb25seTEzMDEGA1UEAxMqRW50cnVzdCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5 IC0gRUMxMB4XDTEyMTIxODE1MjUzNloXDTM3MTIxODE1NTUzNlowgb8xCzAJBgNVBAYTAlVTMRYw FAYDVQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQLEx9TZWUgd3d3LmVudHJ1c3QubmV0L2xlZ2Fs LXRlcm1zMTkwNwYDVQQLEzAoYykgMjAxMiBFbnRydXN0LCBJbmMuIC0gZm9yIGF1dGhvcml6ZWQg dXNlIG9ubHkxMzAxBgNVBAMTKkVudHJ1c3QgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAt IEVDMTB2MBAGByqGSM49AgEGBSuBBAAiA2IABIQTydC6bUF74mzQ61VfZgIaJPRbiWlH47jCffHy AsWfoPZb1YsGGYZPUxBtByQnoaD41UcZYUx9ypMn6nQM72+WCf5j7HBdNq1nd67JnXxVRDqiY1Ef 9eNi1KlHBz7MIKNCMEAwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYE FLdj5xrdjekIplWDpOBqUEFlEUJJMAoGCCqGSM49BAMDA2cAMGQCMGF52OVCR98crlOZF7ZvHH3h vxGU0QOIdeSNiaSKd0bebWHvAvX7td/M/k7//qnmpwIwW5nXhTcGtXsI/esni0qU+eH6p44mCOh8 kmhtc9hvJqwhAriZtyZBWyVgrtBIGu4G -----END CERTIFICATE----- CFCA EV ROOT ============ -----BEGIN CERTIFICATE----- MIIFjTCCA3WgAwIBAgIEGErM1jANBgkqhkiG9w0BAQsFADBWMQswCQYDVQQGEwJDTjEwMC4GA1UE CgwnQ2hpbmEgRmluYW5jaWFsIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MRUwEwYDVQQDDAxDRkNB IEVWIFJPT1QwHhcNMTIwODA4MDMwNzAxWhcNMjkxMjMxMDMwNzAxWjBWMQswCQYDVQQGEwJDTjEw MC4GA1UECgwnQ2hpbmEgRmluYW5jaWFsIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MRUwEwYDVQQD DAxDRkNBIEVWIFJPT1QwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDXXWvNED8fBVnV BU03sQ7smCuOFR36k0sXgiFxEFLXUWRwFsJVaU2OFW2fvwwbwuCjZ9YMrM8irq93VCpLTIpTUnrD 7i7es3ElweldPe6hL6P3KjzJIx1qqx2hp/Hz7KDVRM8Vz3IvHWOX6Jn5/ZOkVIBMUtRSqy5J35DN uF++P96hyk0g1CXohClTt7GIH//62pCfCqktQT+x8Rgp7hZZLDRJGqgG16iI0gNyejLi6mhNbiyW ZXvKWfry4t3uMCz7zEasxGPrb382KzRzEpR/38wmnvFyXVBlWY9ps4deMm/DGIq1lY+wejfeWkU7 xzbh72fROdOXW3NiGUgthxwG+3SYIElz8AXSG7Ggo7cbcNOIabla1jj0Ytwli3i/+Oh+uFzJlU9f py25IGvPa931DfSCt/SyZi4QKPaXWnuWFo8BGS1sbn85WAZkgwGDg8NNkt0yxoekN+kWzqotaK8K gWU6cMGbrU1tVMoqLUuFG7OA5nBFDWteNfB/O7ic5ARwiRIlk9oKmSJgamNgTnYGmE69g60dWIol hdLHZR4tjsbftsbhf4oEIRUpdPA+nJCdDC7xij5aqgwJHsfVPKPtl8MeNPo4+QgO48BdK4PRVmrJ tqhUUy54Mmc9gn900PvhtgVguXDbjgv5E1hvcWAQUhC5wUEJ73IfZzF4/5YFjQIDAQABo2MwYTAf BgNVHSMEGDAWgBTj/i39KNALtbq2osS/BqoFjJP7LzAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB /wQEAwIBBjAdBgNVHQ4EFgQU4/4t/SjQC7W6tqLEvwaqBYyT+y8wDQYJKoZIhvcNAQELBQADggIB ACXGumvrh8vegjmWPfBEp2uEcwPenStPuiB/vHiyz5ewG5zz13ku9Ui20vsXiObTej/tUxPQ4i9q ecsAIyjmHjdXNYmEwnZPNDatZ8POQQaIxffu2Bq41gt/UP+TqhdLjOztUmCypAbqTuv0axn96/Ua 4CUqmtzHQTb3yHQFhDmVOdYLO6Qn+gjYXB74BGBSESgoA//vU2YApUo0FmZ8/Qmkrp5nGm9BC2sG E5uPhnEFtC+NiWYzKXZUmhH4J/qyP5Hgzg0b8zAarb8iXRvTvyUFTeGSGn+ZnzxEk8rUQElsgIfX BDrDMlI1Dlb4pd19xIsNER9Tyx6yF7Zod1rg1MvIB671Oi6ON7fQAUtDKXeMOZePglr4UeWJoBjn aH9dCi77o0cOPaYjesYBx4/IXr9tgFa+iiS6M+qf4TIRnvHST4D2G0CvOJ4RUHlzEhLN5mydLIhy PDCBBpEi6lmt2hkuIsKNuYyH4Ga8cyNfIWRjgEj1oDwYPZTISEEdQLpe/v5WOaHIz16eGWRGENoX kbcFgKyLmZJ956LYBws2J+dIeWCKw9cTXPhyQN9Ky8+ZAAoACxGV2lZFA4gKn2fQ1XmxqI1AbQ3C ekD6819kR5LLU7m7Wc5P/dAVUwHY3+vZ5nbv0CO7O6l5s9UCKc2Jo5YPSjXnTkLAdc0Hz+Ys63su -----END CERTIFICATE----- TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H5 ==================================================== -----BEGIN CERTIFICATE----- MIIEJzCCAw+gAwIBAgIHAI4X/iQggTANBgkqhkiG9w0BAQsFADCBsTELMAkGA1UEBhMCVFIxDzAN BgNVBAcMBkFua2FyYTFNMEsGA1UECgxEVMOcUktUUlVTVCBCaWxnaSDEsGxldGnFn2ltIHZlIEJp bGnFn2ltIEfDvHZlbmxpxJ9pIEhpem1ldGxlcmkgQS7Fni4xQjBABgNVBAMMOVTDnFJLVFJVU1Qg RWxla3Ryb25payBTZXJ0aWZpa2EgSGl6bWV0IFNhxJ9sYXnEsWPEsXPEsSBINTAeFw0xMzA0MzAw ODA3MDFaFw0yMzA0MjgwODA3MDFaMIGxMQswCQYDVQQGEwJUUjEPMA0GA1UEBwwGQW5rYXJhMU0w SwYDVQQKDERUw5xSS1RSVVNUIEJpbGdpIMSwbGV0acWfaW0gdmUgQmlsacWfaW0gR8O8dmVubGnE n2kgSGl6bWV0bGVyaSBBLsWeLjFCMEAGA1UEAww5VMOcUktUUlVTVCBFbGVrdHJvbmlrIFNlcnRp ZmlrYSBIaXptZXQgU2HEn2xhecSxY8Sxc8SxIEg1MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB CgKCAQEApCUZ4WWe60ghUEoI5RHwWrom/4NZzkQqL/7hzmAD/I0Dpe3/a6i6zDQGn1k19uwsu537 jVJp45wnEFPzpALFp/kRGml1bsMdi9GYjZOHp3GXDSHHmflS0yxjXVW86B8BSLlg/kJK9siArs1m ep5Fimh34khon6La8eHBEJ/rPCmBp+EyCNSgBbGM+42WAA4+Jd9ThiI7/PS98wl+d+yG6w8z5UNP 9FR1bSmZLmZaQ9/LXMrI5Tjxfjs1nQ/0xVqhzPMggCTTV+wVunUlm+hkS7M0hO8EuPbJbKoCPrZV 4jI3X/xml1/N1p7HIL9Nxqw/dV8c7TKcfGkAaZHjIxhT6QIDAQABo0IwQDAdBgNVHQ4EFgQUVpkH HtOsDGlktAxQR95DLL4gwPswDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZI hvcNAQELBQADggEBAJ5FdnsXSDLyOIspve6WSk6BGLFRRyDN0GSxDsnZAdkJzsiZ3GglE9Rc8qPo BP5yCccLqh0lVX6Wmle3usURehnmp349hQ71+S4pL+f5bFgWV1Al9j4uPqrtd3GqqpmWRgqujuwq URawXs3qZwQcWDD1YIq9pr1N5Za0/EKJAWv2cMhQOQwt1WbZyNKzMrcbGW3LM/nfpeYVhDfwwvJl lpKQd/Ct9JDpEXjXk4nAPQu6KfTomZ1yju2dL+6SfaHx/126M2CFYv4HAqGEVka+lgqaE9chTLd8 B59OTj+RdPsnnRHM3eaxynFNExc5JsUpISuTKWqW+qtB4Uu2NQvAmxU= -----END CERTIFICATE----- Certinomis - Root CA ==================== -----BEGIN CERTIFICATE----- MIIFkjCCA3qgAwIBAgIBATANBgkqhkiG9w0BAQsFADBaMQswCQYDVQQGEwJGUjETMBEGA1UEChMK Q2VydGlub21pczEXMBUGA1UECxMOMDAwMiA0MzM5OTg5MDMxHTAbBgNVBAMTFENlcnRpbm9taXMg LSBSb290IENBMB4XDTEzMTAyMTA5MTcxOFoXDTMzMTAyMTA5MTcxOFowWjELMAkGA1UEBhMCRlIx EzARBgNVBAoTCkNlcnRpbm9taXMxFzAVBgNVBAsTDjAwMDIgNDMzOTk4OTAzMR0wGwYDVQQDExRD ZXJ0aW5vbWlzIC0gUm9vdCBDQTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANTMCQos P5L2fxSeC5yaah1AMGT9qt8OHgZbn1CF6s2Nq0Nn3rD6foCWnoR4kkjW4znuzuRZWJflLieY6pOo d5tK8O90gC3rMB+12ceAnGInkYjwSond3IjmFPnVAy//ldu9n+ws+hQVWZUKxkd8aRi5pwP5ynap z8dvtF4F/u7BUrJ1Mofs7SlmO/NKFoL21prbcpjp3vDFTKWrteoB4owuZH9kb/2jJZOLyKIOSY00 8B/sWEUuNKqEUL3nskoTuLAPrjhdsKkb5nPJWqHZZkCqqU2mNAKthH6yI8H7KsZn9DS2sJVqM09x RLWtwHkziOC/7aOgFLScCbAK42C++PhmiM1b8XcF4LVzbsF9Ri6OSyemzTUK/eVNfaoqoynHWmgE 6OXWk6RiwsXm9E/G+Z8ajYJJGYrKWUM66A0ywfRMEwNvbqY/kXPLynNvEiCL7sCCeN5LLsJJwx3t FvYk9CcbXFcx3FXuqB5vbKziRcxXV4p1VxngtViZSTYxPDMBbRZKzbgqg4SGm/lg0h9tkQPTYKbV PZrdd5A9NaSfD171UkRpucC63M9933zZxKyGIjK8e2uR73r4F2iw4lNVYC2vPsKD2NkJK/DAZNuH i5HMkesE/Xa0lZrmFAYb1TQdvtj/dBxThZngWVJKYe2InmtJiUZ+IFrZ50rlau7SZRFDAgMBAAGj YzBhMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTvkUz1pcMw6C8I 6tNxIqSSaHh02TAfBgNVHSMEGDAWgBTvkUz1pcMw6C8I6tNxIqSSaHh02TANBgkqhkiG9w0BAQsF AAOCAgEAfj1U2iJdGlg+O1QnurrMyOMaauo++RLrVl89UM7g6kgmJs95Vn6RHJk/0KGRHCwPT5iV WVO90CLYiF2cN/z7ZMF4jIuaYAnq1fohX9B0ZedQxb8uuQsLrbWwF6YSjNRieOpWauwK0kDDPAUw Pk2Ut59KA9N9J0u2/kTO+hkzGm2kQtHdzMjI1xZSg081lLMSVX3l4kLr5JyTCcBMWwerx20RoFAX lCOotQqSD7J6wWAsOMwaplv/8gzjqh8c3LigkyfeY+N/IZ865Z764BNqdeuWXGKRlI5nU7aJ+BIJ y29SWwNyhlCVCNSNh4YVH5Uk2KRvms6knZtt0rJ2BobGVgjF6wnaNsIbW0G+YSrjcOa4pvi2WsS9 Iff/ql+hbHY5ZtbqTFXhADObE5hjyW/QASAJN1LnDE8+zbz1X5YnpyACleAu6AdBBR8Vbtaw5Bng DwKTACdyxYvRVB9dSsNAl35VpnzBMwQUAR1JIGkLGZOdblgi90AMRgwjY/M50n92Uaf0yKHxDHYi I0ZSKS3io0EHVmmY0gUJvGnHWmHNj4FgFU2A3ZDifcRQ8ow7bkrHxuaAKzyBvBGAFhAn1/DNP3nM cyrDflOR1m749fPH0FFNjkulW+YZFzvWgQncItzujrnEj1PhZ7szuIgVRs/taTX/dQ1G885x4cVr hkIGuUE= -----END CERTIFICATE----- OISTE WISeKey Global Root GB CA =============================== -----BEGIN CERTIFICATE----- MIIDtTCCAp2gAwIBAgIQdrEgUnTwhYdGs/gjGvbCwDANBgkqhkiG9w0BAQsFADBtMQswCQYDVQQG EwJDSDEQMA4GA1UEChMHV0lTZUtleTEiMCAGA1UECxMZT0lTVEUgRm91bmRhdGlvbiBFbmRvcnNl ZDEoMCYGA1UEAxMfT0lTVEUgV0lTZUtleSBHbG9iYWwgUm9vdCBHQiBDQTAeFw0xNDEyMDExNTAw MzJaFw0zOTEyMDExNTEwMzFaMG0xCzAJBgNVBAYTAkNIMRAwDgYDVQQKEwdXSVNlS2V5MSIwIAYD VQQLExlPSVNURSBGb3VuZGF0aW9uIEVuZG9yc2VkMSgwJgYDVQQDEx9PSVNURSBXSVNlS2V5IEds b2JhbCBSb290IEdCIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA2Be3HEokKtaX scriHvt9OO+Y9bI5mE4nuBFde9IllIiCFSZqGzG7qFshISvYD06fWvGxWuR51jIjK+FTzJlFXHtP rby/h0oLS5daqPZI7H17Dc0hBt+eFf1Biki3IPShehtX1F1Q/7pn2COZH8g/497/b1t3sWtuuMlk 9+HKQUYOKXHQuSP8yYFfTvdv37+ErXNku7dCjmn21HYdfp2nuFeKUWdy19SouJVUQHMD9ur06/4o Qnc/nSMbsrY9gBQHTC5P99UKFg29ZkM3fiNDecNAhvVMKdqOmq0NpQSHiB6F4+lT1ZvIiwNjeOvg GUpuuy9rM2RYk61pv48b74JIxwIDAQABo1EwTzALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB /zAdBgNVHQ4EFgQUNQ/INmNe4qPs+TtmFc5RUuORmj0wEAYJKwYBBAGCNxUBBAMCAQAwDQYJKoZI hvcNAQELBQADggEBAEBM+4eymYGQfp3FsLAmzYh7KzKNbrghcViXfa43FK8+5/ea4n32cZiZBKpD dHij40lhPnOMTZTg+XHEthYOU3gf1qKHLwI5gSk8rxWYITD+KJAAjNHhy/peyP34EEY7onhCkRd0 VQreUGdNZtGn//3ZwLWoo4rOZvUPQ82nK1d7Y0Zqqi5S2PTt4W2tKZB4SLrhI6qjiey1q5bAtEui HZeeevJuQHHfaPFlTc58Bd9TZaml8LGXBHAVRgOY1NK/VLSgWH1Sb9pWJmLU2NuJMW8c8CLC02Ic Nc1MaRVUGpCY3useX8p3x8uOPUNpnJpY0CQ73xtAln41rYHHTnG6iBM= -----END CERTIFICATE----- Certification Authority of WoSign G2 ==================================== -----BEGIN CERTIFICATE----- MIIDfDCCAmSgAwIBAgIQayXaioidfLwPBbOxemFFRDANBgkqhkiG9w0BAQsFADBYMQswCQYDVQQG EwJDTjEaMBgGA1UEChMRV29TaWduIENBIExpbWl0ZWQxLTArBgNVBAMTJENlcnRpZmljYXRpb24g QXV0aG9yaXR5IG9mIFdvU2lnbiBHMjAeFw0xNDExMDgwMDU4NThaFw00NDExMDgwMDU4NThaMFgx CzAJBgNVBAYTAkNOMRowGAYDVQQKExFXb1NpZ24gQ0EgTGltaXRlZDEtMCsGA1UEAxMkQ2VydGlm aWNhdGlvbiBBdXRob3JpdHkgb2YgV29TaWduIEcyMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB CgKCAQEAvsXEoCKASU+/2YcRxlPhuw+9YH+v9oIOH9ywjj2X4FA8jzrvZjtFB5sg+OPXJYY1kBai XW8wGQiHC38Gsp1ij96vkqVg1CuAmlI/9ZqD6TRay9nVYlzmDuDfBpgOgHzKtB0TiGsOqCR3A9Du W/PKaZE1OVbFbeP3PU9ekzgkyhjpJMuSA93MHD0JcOQg5PGurLtzaaNjOg9FD6FKmsLRY6zLEPg9 5k4ot+vElbGs/V6r+kHLXZ1L3PR8du9nfwB6jdKgGlxNIuG12t12s9R23164i5jIFFTMaxeSt+BK v0mUYQs4kI9dJGwlezt52eJ+na2fmKEG/HgUYFf47oB3sQIDAQABo0IwQDAOBgNVHQ8BAf8EBAMC AQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU+mCp62XF3RYUCE4MD42b4Pdkr2cwDQYJKoZI hvcNAQELBQADggEBAFfDejaCnI2Y4qtAqkePx6db7XznPWZaOzG73/MWM5H8fHulwqZm46qwtyeY P0nXYGdnPzZPSsvxFPpahygc7Y9BMsaV+X3avXtbwrAh449G3CE4Q3RM+zD4F3LBMvzIkRfEzFg3 TgvMWvchNSiDbGAtROtSjFA9tWwS1/oJu2yySrHFieT801LYYRf+epSEj3m2M1m6D8QL4nCgS3gu +sif/a+RZQp4OBXllxcU3fngLDT4ONCEIgDAFFEYKwLcMFrw6AF8NTojrwjkr6qOKEJJLvD1mTS+ 7Q9LGOHSJDy7XUe3IfKN0QqZjuNuPq1w4I+5ysxugTH2e5x6eeRncRg= -----END CERTIFICATE----- CA WoSign ECC Root ================== -----BEGIN CERTIFICATE----- MIICCTCCAY+gAwIBAgIQaEpYcIBr8I8C+vbe6LCQkDAKBggqhkjOPQQDAzBGMQswCQYDVQQGEwJD TjEaMBgGA1UEChMRV29TaWduIENBIExpbWl0ZWQxGzAZBgNVBAMTEkNBIFdvU2lnbiBFQ0MgUm9v dDAeFw0xNDExMDgwMDU4NThaFw00NDExMDgwMDU4NThaMEYxCzAJBgNVBAYTAkNOMRowGAYDVQQK ExFXb1NpZ24gQ0EgTGltaXRlZDEbMBkGA1UEAxMSQ0EgV29TaWduIEVDQyBSb290MHYwEAYHKoZI zj0CAQYFK4EEACIDYgAE4f2OuEMkq5Z7hcK6C62N4DrjJLnSsb6IOsq/Srj57ywvr1FQPEd1bPiU t5v8KB7FVMxjnRZLU8HnIKvNrCXSf4/CwVqCXjCLelTOA7WRf6qU0NGKSMyCBSah1VES1ns2o0Iw QDAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUqv3VWqP2h4syhf3R MluARZPzA7gwCgYIKoZIzj0EAwMDaAAwZQIxAOSkhLCB1T2wdKyUpOgOPQB0TKGXa/kNUTyh2Tv0 Daupn75OcsqF1NnstTJFGG+rrQIwfcf3aWMvoeGY7xMQ0Xk/0f7qO3/eVvSQsRUR2LIiFdAvwyYu a/GRspBl9JrmkO5K -----END CERTIFICATE----- SZAFIR ROOT CA2 =============== -----BEGIN CERTIFICATE----- MIIDcjCCAlqgAwIBAgIUPopdB+xV0jLVt+O2XwHrLdzk1uQwDQYJKoZIhvcNAQELBQAwUTELMAkG A1UEBhMCUEwxKDAmBgNVBAoMH0tyYWpvd2EgSXpiYSBSb3psaWN6ZW5pb3dhIFMuQS4xGDAWBgNV BAMMD1NaQUZJUiBST09UIENBMjAeFw0xNTEwMTkwNzQzMzBaFw0zNTEwMTkwNzQzMzBaMFExCzAJ BgNVBAYTAlBMMSgwJgYDVQQKDB9LcmFqb3dhIEl6YmEgUm96bGljemVuaW93YSBTLkEuMRgwFgYD VQQDDA9TWkFGSVIgUk9PVCBDQTIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC3vD5Q qEvNQLXOYeeWyrSh2gwisPq1e3YAd4wLz32ohswmUeQgPYUM1ljj5/QqGJ3a0a4m7utT3PSQ1hNK DJA8w/Ta0o4NkjrcsbH/ON7Dui1fgLkCvUqdGw+0w8LBZwPd3BucPbOw3gAeqDRHu5rr/gsUvTaE 2g0gv/pby6kWIK05YO4vdbbnl5z5Pv1+TW9NL++IDWr63fE9biCloBK0TXC5ztdyO4mTp4CEHCdJ ckm1/zuVnsHMyAHs6A6KCpbns6aH5db5BSsNl0BwPLqsdVqc1U2dAgrSS5tmS0YHF2Wtn2yIANwi ieDhZNRnvDF5YTy7ykHNXGoAyDw4jlivAgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0P AQH/BAQDAgEGMB0GA1UdDgQWBBQuFqlKGLXLzPVvUPMjX/hd56zwyDANBgkqhkiG9w0BAQsFAAOC AQEAtXP4A9xZWx126aMqe5Aosk3AM0+qmrHUuOQn/6mWmc5G4G18TKI4pAZw8PRBEew/R40/cof5 O/2kbytTAOD/OblqBw7rHRz2onKQy4I9EYKL0rufKq8h5mOGnXkZ7/e7DDWQw4rtTw/1zBLZpD67 oPwglV9PJi8RI4NOdQcPv5vRtB3pEAT+ymCPoky4rc/hkA/NrgrHXXu3UNLUYfrVFdvXn4dRVOul 4+vJhaAlIDf7js4MNIThPIGyd05DpYhfhmehPea0XGG2Ptv+tyjFogeutcrKjSoS75ftwjCkySp6 +/NNIxuZMzSgLvWpCz/UXeHPhJ/iGcJfitYgHuNztw== -----END CERTIFICATE----- Certum Trusted Network CA 2 =========================== -----BEGIN CERTIFICATE----- MIIF0jCCA7qgAwIBAgIQIdbQSk8lD8kyN/yqXhKN6TANBgkqhkiG9w0BAQ0FADCBgDELMAkGA1UE BhMCUEwxIjAgBgNVBAoTGVVuaXpldG8gVGVjaG5vbG9naWVzIFMuQS4xJzAlBgNVBAsTHkNlcnR1 bSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTEkMCIGA1UEAxMbQ2VydHVtIFRydXN0ZWQgTmV0d29y ayBDQSAyMCIYDzIwMTExMDA2MDgzOTU2WhgPMjA0NjEwMDYwODM5NTZaMIGAMQswCQYDVQQGEwJQ TDEiMCAGA1UEChMZVW5pemV0byBUZWNobm9sb2dpZXMgUy5BLjEnMCUGA1UECxMeQ2VydHVtIENl cnRpZmljYXRpb24gQXV0aG9yaXR5MSQwIgYDVQQDExtDZXJ0dW0gVHJ1c3RlZCBOZXR3b3JrIENB IDIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC9+Xj45tWADGSdhhuWZGc/IjoedQF9 7/tcZ4zJzFxrqZHmuULlIEub2pt7uZld2ZuAS9eEQCsn0+i6MLs+CRqnSZXvK0AkwpfHp+6bJe+o CgCXhVqqndwpyeI1B+twTUrWwbNWuKFBOJvR+zF/j+Bf4bE/D44WSWDXBo0Y+aomEKsq09DRZ40b Rr5HMNUuctHFY9rnY3lEfktjJImGLjQ/KUxSiyqnwOKRKIm5wFv5HdnnJ63/mgKXwcZQkpsCLL2p uTRZCr+ESv/f/rOf69me4Jgj7KZrdxYq28ytOxykh9xGc14ZYmhFV+SQgkK7QtbwYeDBoz1mo130 GO6IyY0XRSmZMnUCMe4pJshrAua1YkV/NxVaI2iJ1D7eTiew8EAMvE0Xy02isx7QBlrd9pPPV3WZ 9fqGGmd4s7+W/jTcvedSVuWz5XV710GRBdxdaeOVDUO5/IOWOZV7bIBaTxNyxtd9KXpEulKkKtVB Rgkg/iKgtlswjbyJDNXXcPiHUv3a76xRLgezTv7QCdpw75j6VuZt27VXS9zlLCUVyJ4ueE742pye hizKV/Ma5ciSixqClnrDvFASadgOWkaLOusm+iPJtrCBvkIApPjW/jAux9JG9uWOdf3yzLnQh1vM BhBgu4M1t15n3kfsmUjxpKEV/q2MYo45VU85FrmxY53/twIDAQABo0IwQDAPBgNVHRMBAf8EBTAD AQH/MB0GA1UdDgQWBBS2oVQ5AsOgP46KvPrU+Bym0ToO/TAOBgNVHQ8BAf8EBAMCAQYwDQYJKoZI hvcNAQENBQADggIBAHGlDs7k6b8/ONWJWsQCYftMxRQXLYtPU2sQF/xlhMcQSZDe28cmk4gmb3DW Al45oPePq5a1pRNcgRRtDoGCERuKTsZPpd1iHkTfCVn0W3cLN+mLIMb4Ck4uWBzrM9DPhmDJ2vuA L55MYIR4PSFk1vtBHxgP58l1cb29XN40hz5BsA72udY/CROWFC/emh1auVbONTqwX3BNXuMp8SMo clm2q8KMZiYcdywmdjWLKKdpoPk79SPdhRB0yZADVpHnr7pH1BKXESLjokmUbOe3lEu6LaTaM4tM pkT/WjzGHWTYtTHkpjx6qFcL2+1hGsvxznN3Y6SHb0xRONbkX8eftoEq5IVIeVheO/jbAoJnwTnb w3RLPTYe+SmTiGhbqEQZIfCn6IENLOiTNrQ3ssqwGyZ6miUfmpqAnksqP/ujmv5zMnHCnsZy4Ypo J/HkD7TETKVhk/iXEAcqMCWpuchxuO9ozC1+9eB+D4Kob7a6bINDd82Kkhehnlt4Fj1F4jNy3eFm ypnTycUm/Q1oBEauttmbjL4ZvrHG8hnjXALKLNhvSgfZyTXaQHXyxKcZb55CEJh15pWLYLztxRLX is7VmFxWlgPF7ncGNf/P5O4/E2Hu29othfDNrp2yGAlFw5Khchf8R7agCyzxxN5DaAhqXzvwdmP7 zAYspsbiDrW5viSP -----END CERTIFICATE----- Hellenic Academic and Research Institutions RootCA 2015 ======================================================= -----BEGIN CERTIFICATE----- MIIGCzCCA/OgAwIBAgIBADANBgkqhkiG9w0BAQsFADCBpjELMAkGA1UEBhMCR1IxDzANBgNVBAcT BkF0aGVuczFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0 aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNl YXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTUwHhcNMTUwNzA3MTAxMTIxWhcNNDAwNjMwMTAx MTIxWjCBpjELMAkGA1UEBhMCR1IxDzANBgNVBAcTBkF0aGVuczFEMEIGA1UEChM7SGVsbGVuaWMg QWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNV BAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIw MTUwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDC+Kk/G4n8PDwEXT2QNrCROnk8Zlrv bTkBSRq0t89/TSNTt5AA4xMqKKYx8ZEA4yjsriFBzh/a/X0SWwGDD7mwX5nh8hKDgE0GPt+sr+eh iGsxr/CL0BgzuNtFajT0AoAkKAoCFZVedioNmToUW/bLy1O8E00BiDeUJRtCvCLYjqOWXjrZMts+ 6PAQZe104S+nfK8nNLspfZu2zwnI5dMK/IhlZXQK3HMcXM1AsRzUtoSMTFDPaI6oWa7CJ06CojXd FPQf/7J31Ycvqm59JCfnxssm5uX+Zwdj2EUN3TpZZTlYepKZcj2chF6IIbjV9Cz82XBST3i4vTwr i5WY9bPRaM8gFH5MXF/ni+X1NYEZN9cRCLdmvtNKzoNXADrDgfgXy5I2XdGj2HUb4Ysn6npIQf1F GQatJ5lOwXBH3bWfgVMS5bGMSF0xQxfjjMZ6Y5ZLKTBOhE5iGV48zpeQpX8B653g+IuJ3SWYPZK2 fu/Z8VFRfS0myGlZYeCsargqNhEEelC9MoS+L9xy1dcdFkfkR2YgP/SWxa+OAXqlD3pk9Q0Yh9mu iNX6hME6wGkoLfINaFGq46V3xqSQDqE3izEjR8EJCOtu93ib14L8hCCZSRm2Ekax+0VVFqmjZayc Bw/qa9wfLgZy7IaIEuQt218FL+TwA9MmM+eAws1CoRc0CwIDAQABo0IwQDAPBgNVHRMBAf8EBTAD AQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUcRVnyMjJvXVdctA4GGqd83EkVAswDQYJKoZI hvcNAQELBQADggIBAHW7bVRLqhBYRjTyYtcWNl0IXtVsyIe9tC5G8jH4fOpCtZMWVdyhDBKg2mF+ D1hYc2Ryx+hFjtyp8iY/xnmMsVMIM4GwVhO+5lFc2JsKT0ucVlMC6U/2DWDqTUJV6HwbISHTGzrM d/K4kPFox/la/vot9L/J9UUbzjgQKjeKeaO04wlshYaT/4mWJ3iBj2fjRnRUjtkNaeJK9E10A/+y d+2VZ5fkscWrv2oj6NSU4kQoYsRL4vDY4ilrGnB+JGGTe08DMiUNRSQrlrRGar9KC/eaj8GsGsVn 82800vpzY4zvFrCopEYq+OsS7HK07/grfoxSwIuEVPkvPuNVqNxmsdnhX9izjFk0WaSrT2y7Hxjb davYy5LNlDhhDgcGH0tGEPEVvo2FXDtKK4F5D7Rpn0lQl033DlZdwJVqwjbDG2jJ9SrcR5q+ss7F Jej6A7na+RZukYT1HCjI/CbM1xyQVqdfbzoEvM14iQuODy+jqk+iGxI9FghAD/FGTNeqewjBCvVt J94Cj8rDtSvK6evIIVM4pcw72Hc3MKJP2W/R8kCtQXoXxdZKNYm3QdV8hn9VTYNKpXMgwDqvkPGa JI7ZjnHKe7iG2rKPmT4dEw0SEe7Uq/DpFXYC5ODfqiAeW2GFZECpkJcNrVPSWh2HagCXZWK0vm9q p/UsQu0yrbYhnr68 -----END CERTIFICATE----- Hellenic Academic and Research Institutions ECC RootCA 2015 =========================================================== -----BEGIN CERTIFICATE----- MIICwzCCAkqgAwIBAgIBADAKBggqhkjOPQQDAjCBqjELMAkGA1UEBhMCR1IxDzANBgNVBAcTBkF0 aGVuczFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9u cyBDZXJ0LiBBdXRob3JpdHkxRDBCBgNVBAMTO0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJj aCBJbnN0aXR1dGlvbnMgRUNDIFJvb3RDQSAyMDE1MB4XDTE1MDcwNzEwMzcxMloXDTQwMDYzMDEw MzcxMlowgaoxCzAJBgNVBAYTAkdSMQ8wDQYDVQQHEwZBdGhlbnMxRDBCBgNVBAoTO0hlbGxlbmlj IEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgQ2VydC4gQXV0aG9yaXR5MUQwQgYD VQQDEztIZWxsZW5pYyBBY2FkZW1pYyBhbmQgUmVzZWFyY2ggSW5zdGl0dXRpb25zIEVDQyBSb290 Q0EgMjAxNTB2MBAGByqGSM49AgEGBSuBBAAiA2IABJKgQehLgoRc4vgxEZmGZE4JJS+dQS8KrjVP dJWyUWRrjWvmP3CV8AVER6ZyOFB2lQJajq4onvktTpnvLEhvTCUp6NFxW98dwXU3tNf6e3pCnGoK Vlp8aQuqgAkkbH7BRqNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0O BBYEFLQiC4KZJAEOnLvkDv2/+5cgk5kqMAoGCCqGSM49BAMCA2cAMGQCMGfOFmI4oqxiRaeplSTA GiecMjvAwNW6qef4BENThe5SId6d9SWDPp5YSy/XZxMOIQIwBeF1Ad5o7SofTUwJCA3sS61kFyjn dc5FZXIhF8siQQ6ME5g4mlRtm8rifOoCWCKR -----END CERTIFICATE----- Certplus Root CA G1 =================== -----BEGIN CERTIFICATE----- MIIFazCCA1OgAwIBAgISESBVg+QtPlRWhS2DN7cs3EYRMA0GCSqGSIb3DQEBDQUAMD4xCzAJBgNV BAYTAkZSMREwDwYDVQQKDAhDZXJ0cGx1czEcMBoGA1UEAwwTQ2VydHBsdXMgUm9vdCBDQSBHMTAe Fw0xNDA1MjYwMDAwMDBaFw0zODAxMTUwMDAwMDBaMD4xCzAJBgNVBAYTAkZSMREwDwYDVQQKDAhD ZXJ0cGx1czEcMBoGA1UEAwwTQ2VydHBsdXMgUm9vdCBDQSBHMTCCAiIwDQYJKoZIhvcNAQEBBQAD ggIPADCCAgoCggIBANpQh7bauKk+nWT6VjOaVj0W5QOVsjQcmm1iBdTYj+eJZJ+622SLZOZ5KmHN r49aiZFluVj8tANfkT8tEBXgfs+8/H9DZ6itXjYj2JizTfNDnjl8KvzsiNWI7nC9hRYt6kuJPKNx Qv4c/dMcLRC4hlTqQ7jbxofaqK6AJc96Jh2qkbBIb6613p7Y1/oA/caP0FG7Yn2ksYyy/yARujVj BYZHYEMzkPZHogNPlk2dT8Hq6pyi/jQu3rfKG3akt62f6ajUeD94/vI4CTYd0hYCyOwqaK/1jpTv LRN6HkJKHRUxrgwEV/xhc/MxVoYxgKDEEW4wduOU8F8ExKyHcomYxZ3MVwia9Az8fXoFOvpHgDm2 z4QTd28n6v+WZxcIbekN1iNQMLAVdBM+5S//Ds3EC0pd8NgAM0lm66EYfFkuPSi5YXHLtaW6uOrc 4nBvCGrch2c0798wct3zyT8j/zXhviEpIDCB5BmlIOklynMxdCm+4kLV87ImZsdo/Rmz5yCTmehd 4F6H50boJZwKKSTUzViGUkAksnsPmBIgJPaQbEfIDbsYIC7Z/fyL8inqh3SV4EJQeIQEQWGw9CEj jy3LKCHyamz0GqbFFLQ3ZU+V/YDI+HLlJWvEYLF7bY5KinPOWftwenMGE9nTdDckQQoRb5fc5+R+ ob0V8rqHDz1oihYHAgMBAAGjYzBhMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MB0G A1UdDgQWBBSowcCbkahDFXxdBie0KlHYlwuBsTAfBgNVHSMEGDAWgBSowcCbkahDFXxdBie0KlHY lwuBsTANBgkqhkiG9w0BAQ0FAAOCAgEAnFZvAX7RvUz1isbwJh/k4DgYzDLDKTudQSk0YcbX8ACh 66Ryj5QXvBMsdbRX7gp8CXrc1cqh0DQT+Hern+X+2B50ioUHj3/MeXrKls3N/U/7/SMNkPX0XtPG YX2eEeAC7gkE2Qfdpoq3DIMku4NQkv5gdRE+2J2winq14J2by5BSS7CTKtQ+FjPlnsZlFT5kOwQ/ 2wyPX1wdaR+v8+khjPPvl/aatxm2hHSco1S1cE5j2FddUyGbQJJD+tZ3VTNPZNX70Cxqjm0lpu+F 6ALEUz65noe8zDUa3qHpimOHZR4RKttjd5cUvpoUmRGywO6wT/gUITJDT5+rosuoD6o7BlXGEilX CNQ314cnrUlZp5GrRHpejXDbl85IULFzk/bwg2D5zfHhMf1bfHEhYxQUqq/F3pN+aLHsIqKqkHWe tUNy6mSjhEv9DKgma3GX7lZjZuhCVPnHHd/Qj1vfyDBviP4NxDMcU6ij/UgQ8uQKTuEVV/xuZDDC VRHc6qnNSlSsKWNEz0pAoNZoWRsz+e86i9sgktxChL8Bq4fA1SCC28a5g4VCXA9DO2pJNdWY9BW/ +mGBDAkgGNLQFwzLSABQ6XaCjGTXOqAHVcweMcDvOrRl++O/QmueD6i9a5jc2NvLi6Td11n0bt3+ qsOR0C5CB8AMTVPNJLFMWx5R9N/pkvo= -----END CERTIFICATE----- Certplus Root CA G2 =================== -----BEGIN CERTIFICATE----- MIICHDCCAaKgAwIBAgISESDZkc6uo+jF5//pAq/Pc7xVMAoGCCqGSM49BAMDMD4xCzAJBgNVBAYT AkZSMREwDwYDVQQKDAhDZXJ0cGx1czEcMBoGA1UEAwwTQ2VydHBsdXMgUm9vdCBDQSBHMjAeFw0x NDA1MjYwMDAwMDBaFw0zODAxMTUwMDAwMDBaMD4xCzAJBgNVBAYTAkZSMREwDwYDVQQKDAhDZXJ0 cGx1czEcMBoGA1UEAwwTQ2VydHBsdXMgUm9vdCBDQSBHMjB2MBAGByqGSM49AgEGBSuBBAAiA2IA BM0PW1aC3/BFGtat93nwHcmsltaeTpwftEIRyoa/bfuFo8XlGVzX7qY/aWfYeOKmycTbLXku54uN Am8xIk0G42ByRZ0OQneezs/lf4WbGOT8zC5y0xaTTsqZY1yhBSpsBqNjMGEwDgYDVR0PAQH/BAQD AgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFNqDYwJ5jtpMxjwjFNiPwyCrKGBZMB8GA1Ud IwQYMBaAFNqDYwJ5jtpMxjwjFNiPwyCrKGBZMAoGCCqGSM49BAMDA2gAMGUCMHD+sAvZ94OX7PNV HdTcswYO/jOYnYs5kGuUIe22113WTNchp+e/IQ8rzfcq3IUHnQIxAIYUFuXcsGXCwI4Un78kFmjl vPl5adytRSv3tjFzzAalU5ORGpOucGpnutee5WEaXw== -----END CERTIFICATE----- OpenTrust Root CA G1 ==================== -----BEGIN CERTIFICATE----- MIIFbzCCA1egAwIBAgISESCzkFU5fX82bWTCp59rY45nMA0GCSqGSIb3DQEBCwUAMEAxCzAJBgNV BAYTAkZSMRIwEAYDVQQKDAlPcGVuVHJ1c3QxHTAbBgNVBAMMFE9wZW5UcnVzdCBSb290IENBIEcx MB4XDTE0MDUyNjA4NDU1MFoXDTM4MDExNTAwMDAwMFowQDELMAkGA1UEBhMCRlIxEjAQBgNVBAoM CU9wZW5UcnVzdDEdMBsGA1UEAwwUT3BlblRydXN0IFJvb3QgQ0EgRzEwggIiMA0GCSqGSIb3DQEB AQUAA4ICDwAwggIKAoICAQD4eUbalsUwXopxAy1wpLuwxQjczeY1wICkES3d5oeuXT2R0odsN7fa Yp6bwiTXj/HbpqbfRm9RpnHLPhsxZ2L3EVs0J9V5ToybWL0iEA1cJwzdMOWo010hOHQX/uMftk87 ay3bfWAfjH1MBcLrARYVmBSO0ZB3Ij/swjm4eTrwSSTilZHcYTSSjFR077F9jAHiOH3BX2pfJLKO YheteSCtqx234LSWSE9mQxAGFiQD4eCcjsZGT44ameGPuY4zbGneWK2gDqdkVBFpRGZPTBKnjix9 xNRbxQA0MMHZmf4yzgeEtE7NCv82TWLxp2NX5Ntqp66/K7nJ5rInieV+mhxNaMbBGN4zK1FGSxyO 9z0M+Yo0FMT7MzUj8czxKselu7Cizv5Ta01BG2Yospb6p64KTrk5M0ScdMGTHPjgniQlQ/GbI4Kq 3ywgsNw2TgOzfALU5nsaqocTvz6hdLubDuHAk5/XpGbKuxs74zD0M1mKB3IDVedzagMxbm+WG+Oi n6+Sx+31QrclTDsTBM8clq8cIqPQqwWyTBIjUtz9GVsnnB47ev1CI9sjgBPwvFEVVJSmdz7QdFG9 URQIOTfLHzSpMJ1ShC5VkLG631UAC9hWLbFJSXKAqWLXwPYYEQRVzXR7z2FwefR7LFxckvzluFqr TJOVoSfupb7PcSNCupt2LQIDAQABo2MwYTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB /zAdBgNVHQ4EFgQUl0YhVyE12jZVx/PxN3DlCPaTKbYwHwYDVR0jBBgwFoAUl0YhVyE12jZVx/Px N3DlCPaTKbYwDQYJKoZIhvcNAQELBQADggIBAB3dAmB84DWn5ph76kTOZ0BP8pNuZtQ5iSas000E PLuHIT839HEl2ku6q5aCgZG27dmxpGWX4m9kWaSW7mDKHyP7Rbr/jyTwyqkxf3kfgLMtMrpkZ2Cv uVnN35pJ06iCsfmYlIrM4LvgBBuZYLFGZdwIorJGnkSI6pN+VxbSFXJfLkur1J1juONI5f6ELlgK n0Md/rcYkoZDSw6cMoYsYPXpSOqV7XAp8dUv/TW0V8/bhUiZucJvbI/NeJWsZCj9VrDDb8O+WVLh X4SPgPL0DTatdrOjteFkdjpY3H1PXlZs5VVZV6Xf8YpmMIzUUmI4d7S+KNfKNsSbBfD4Fdvb8e80 nR14SohWZ25g/4/Ii+GOvUKpMwpZQhISKvqxnUOOBZuZ2mKtVzazHbYNeS2WuOvyDEsMpZTGMKcm GS3tTAZQMPH9WD25SxdfGbRqhFS0OE85og2WaMMolP3tLR9Ka0OWLpABEPs4poEL0L9109S5zvE/ bw4cHjdx5RiHdRk/ULlepEU0rbDK5uUTdg8xFKmOLZTW1YVNcxVPS/KyPu1svf0OnWZzsD2097+o 4BGkxK51CUpjAEggpsadCwmKtODmzj7HPiY46SvepghJAwSQiumPv+i2tCqjI40cHLI5kqiPAlxA OXXUc0ECd97N4EOH1uS6SsNsEn/+KuYj1oxx -----END CERTIFICATE----- OpenTrust Root CA G2 ==================== -----BEGIN CERTIFICATE----- MIIFbzCCA1egAwIBAgISESChaRu/vbm9UpaPI+hIvyYRMA0GCSqGSIb3DQEBDQUAMEAxCzAJBgNV BAYTAkZSMRIwEAYDVQQKDAlPcGVuVHJ1c3QxHTAbBgNVBAMMFE9wZW5UcnVzdCBSb290IENBIEcy MB4XDTE0MDUyNjAwMDAwMFoXDTM4MDExNTAwMDAwMFowQDELMAkGA1UEBhMCRlIxEjAQBgNVBAoM CU9wZW5UcnVzdDEdMBsGA1UEAwwUT3BlblRydXN0IFJvb3QgQ0EgRzIwggIiMA0GCSqGSIb3DQEB AQUAA4ICDwAwggIKAoICAQDMtlelM5QQgTJT32F+D3Y5z1zCU3UdSXqWON2ic2rxb95eolq5cSG+ Ntmh/LzubKh8NBpxGuga2F8ORAbtp+Dz0mEL4DKiltE48MLaARf85KxP6O6JHnSrT78eCbY2albz 4e6WiWYkBuTNQjpK3eCasMSCRbP+yatcfD7J6xcvDH1urqWPyKwlCm/61UWY0jUJ9gNDlP7ZvyCV eYCYitmJNbtRG6Q3ffyZO6v/v6wNj0OxmXsWEH4db0fEFY8ElggGQgT4hNYdvJGmQr5J1WqIP7wt UdGejeBSzFfdNTVY27SPJIjki9/ca1TSgSuyzpJLHB9G+h3Ykst2Z7UJmQnlrBcUVXDGPKBWCgOz 3GIZ38i1MH/1PCZ1Eb3XG7OHngevZXHloM8apwkQHZOJZlvoPGIytbU6bumFAYueQ4xncyhZW+vj 3CzMpSZyYhK05pyDRPZRpOLAeiRXyg6lPzq1O4vldu5w5pLeFlwoW5cZJ5L+epJUzpM5ChaHvGOz 9bGTXOBut9Dq+WIyiET7vycotjCVXRIouZW+j1MY5aIYFuJWpLIsEPUdN6b4t/bQWVyJ98LVtZR0 0dX+G7bw5tYee9I8y6jj9RjzIR9u701oBnstXW5DiabA+aC/gh7PU3+06yzbXfZqfUAkBXKJOAGT y3HCOV0GEfZvePg3DTmEJwIDAQABo2MwYTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB /zAdBgNVHQ4EFgQUajn6QiL35okATV59M4PLuG53hq8wHwYDVR0jBBgwFoAUajn6QiL35okATV59 M4PLuG53hq8wDQYJKoZIhvcNAQENBQADggIBAJjLq0A85TMCl38th6aP1F5Kr7ge57tx+4BkJamz Gj5oXScmp7oq4fBXgwpkTx4idBvpkF/wrM//T2h6OKQQbA2xx6R3gBi2oihEdqc0nXGEL8pZ0keI mUEiyTCYYW49qKgFbdEfwFFEVn8nNQLdXpgKQuswv42hm1GqO+qTRmTFAHneIWv2V6CG1wZy7HBG S4tz3aAhdT7cHcCP009zHIXZ/n9iyJVvttN7jLpTwm+bREx50B1ws9efAvSyB7DH5fitIw6mVskp EndI2S9G/Tvw/HRwkqWOOAgfZDC2t0v7NqwQjqBSM2OdAzVWxWm9xiNaJ5T2pBL4LTM8oValX9YZ 6e18CL13zSdkzJTaTkZQh+D5wVOAHrut+0dSixv9ovneDiK3PTNZbNTe9ZUGMg1RGUFcPk8G97kr gCf2o6p6fAbhQ8MTOWIaNr3gKC6UAuQpLmBVrkA9sHSSXvAgZJY/X0VdiLWK2gKgW0VU3jg9CcCo SmVGFvyqv1ROTVu+OEO3KMqLM6oaJbolXCkvW0pujOotnCr2BXbgd5eAiN1nE28daCSLT7d0geX0 YJ96Vdc+N9oWaz53rK4YcJUIeSkDiv7BO7M/Gg+kO14fWKGVyasvc0rQLW6aWQ9VGHgtPFGml4vm u7JwqkwR3v98KzfUetF3NI/n+UL3PIEMS1IK -----END CERTIFICATE----- OpenTrust Root CA G3 ==================== -----BEGIN CERTIFICATE----- MIICITCCAaagAwIBAgISESDm+Ez8JLC+BUCs2oMbNGA/MAoGCCqGSM49BAMDMEAxCzAJBgNVBAYT AkZSMRIwEAYDVQQKDAlPcGVuVHJ1c3QxHTAbBgNVBAMMFE9wZW5UcnVzdCBSb290IENBIEczMB4X DTE0MDUyNjAwMDAwMFoXDTM4MDExNTAwMDAwMFowQDELMAkGA1UEBhMCRlIxEjAQBgNVBAoMCU9w ZW5UcnVzdDEdMBsGA1UEAwwUT3BlblRydXN0IFJvb3QgQ0EgRzMwdjAQBgcqhkjOPQIBBgUrgQQA IgNiAARK7liuTcpm3gY6oxH84Bjwbhy6LTAMidnW7ptzg6kjFYwvWYpa3RTqnVkrQ7cG7DK2uu5B ta1doYXM6h0UZqNnfkbilPPntlahFVmhTzeXuSIevRHr9LIfXsMUmuXZl5mjYzBhMA4GA1UdDwEB /wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBRHd8MUi2I5DMlv4VBN0BBY3JWIbTAf BgNVHSMEGDAWgBRHd8MUi2I5DMlv4VBN0BBY3JWIbTAKBggqhkjOPQQDAwNpADBmAjEAj6jcnboM BBf6Fek9LykBl7+BFjNAk2z8+e2AcG+qj9uEwov1NcoG3GRvaBbhj5G5AjEA2Euly8LQCGzpGPta 3U1fJAuwACEl74+nBCZx4nxp5V2a+EEfOzmTk51V6s2N8fvB -----END CERTIFICATE----- ISRG Root X1 ============ -----BEGIN CERTIFICATE----- MIIFazCCA1OgAwIBAgIRAIIQz7DSQONZRGPgu2OCiwAwDQYJKoZIhvcNAQELBQAwTzELMAkGA1UE BhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2VhcmNoIEdyb3VwMRUwEwYDVQQD EwxJU1JHIFJvb3QgWDEwHhcNMTUwNjA0MTEwNDM4WhcNMzUwNjA0MTEwNDM4WjBPMQswCQYDVQQG EwJVUzEpMCcGA1UEChMgSW50ZXJuZXQgU2VjdXJpdHkgUmVzZWFyY2ggR3JvdXAxFTATBgNVBAMT DElTUkcgUm9vdCBYMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAK3oJHP0FDfzm54r Vygch77ct984kIxuPOZXoHj3dcKi/vVqbvYATyjb3miGbESTtrFj/RQSa78f0uoxmyF+0TM8ukj1 3Xnfs7j/EvEhmkvBioZxaUpmZmyPfjxwv60pIgbz5MDmgK7iS4+3mX6UA5/TR5d8mUgjU+g4rk8K b4Mu0UlXjIB0ttov0DiNewNwIRt18jA8+o+u3dpjq+sWT8KOEUt+zwvo/7V3LvSye0rgTBIlDHCN Aymg4VMk7BPZ7hm/ELNKjD+Jo2FR3qyHB5T0Y3HsLuJvW5iB4YlcNHlsdu87kGJ55tukmi8mxdAQ 4Q7e2RCOFvu396j3x+UCB5iPNgiV5+I3lg02dZ77DnKxHZu8A/lJBdiB3QW0KtZB6awBdpUKD9jf 1b0SHzUvKBds0pjBqAlkd25HN7rOrFleaJ1/ctaJxQZBKT5ZPt0m9STJEadao0xAH0ahmbWnOlFu hjuefXKnEgV4We0+UXgVCwOPjdAvBbI+e0ocS3MFEvzG6uBQE3xDk3SzynTnjh8BCNAw1FtxNrQH usEwMFxIt4I7mKZ9YIqioymCzLq9gwQbooMDQaHWBfEbwrbwqHyGO0aoSCqI3Haadr8faqU9GY/r OPNk3sgrDQoo//fb4hVC1CLQJ13hef4Y53CIrU7m2Ys6xt0nUW7/vGT1M0NPAgMBAAGjQjBAMA4G A1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBR5tFnme7bl5AFzgAiIyBpY 9umbbjANBgkqhkiG9w0BAQsFAAOCAgEAVR9YqbyyqFDQDLHYGmkgJykIrGF1XIpu+ILlaS/V9lZL ubhzEFnTIZd+50xx+7LSYK05qAvqFyFWhfFQDlnrzuBZ6brJFe+GnY+EgPbk6ZGQ3BebYhtF8GaV 0nxvwuo77x/Py9auJ/GpsMiu/X1+mvoiBOv/2X/qkSsisRcOj/KKNFtY2PwByVS5uCbMiogziUwt hDyC3+6WVwW6LLv3xLfHTjuCvjHIInNzktHCgKQ5ORAzI4JMPJ+GslWYHb4phowim57iaztXOoJw TdwJx4nLCgdNbOhdjsnvzqvHu7UrTkXWStAmzOVyyghqpZXjFaH3pO3JLF+l+/+sKAIuvtd7u+Nx e5AW0wdeRlN8NwdCjNPElpzVmbUq4JUagEiuTDkHzsxHpFKVK7q4+63SM1N95R1NbdWhscdCb+ZA JzVcoyi3B43njTOQ5yOf+1CceWxG1bQVs5ZufpsMljq4Ui0/1lvh+wjChP4kqKOJ2qxq4RgqsahD YVvTH9w7jXbyLeiNdd8XM2w9U/t7y0Ff/9yi0GE44Za4rF2LN9d11TPAmRGunUHBcnWEvgJBQl9n JEiU0Zsnvgc/ubhPgXRR4Xq37Z0j4r7g1SgEEzwxA57demyPxgcYxn/eR44/KJ4EBs+lVDR3veyJ m+kXQ99b21/+jh5Xos1AnX5iItreGCc= -----END CERTIFICATE----- AC RAIZ FNMT-RCM ================ -----BEGIN CERTIFICATE----- MIIFgzCCA2ugAwIBAgIPXZONMGc2yAYdGsdUhGkHMA0GCSqGSIb3DQEBCwUAMDsxCzAJBgNVBAYT AkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJWiBGTk1ULVJDTTAeFw0wODEw MjkxNTU5NTZaFw0zMDAxMDEwMDAwMDBaMDsxCzAJBgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJD TTEZMBcGA1UECwwQQUMgUkFJWiBGTk1ULVJDTTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC ggIBALpxgHpMhm5/yBNtwMZ9HACXjywMI7sQmkCpGreHiPibVmr75nuOi5KOpyVdWRHbNi63URcf qQgfBBckWKo3Shjf5TnUV/3XwSyRAZHiItQDwFj8d0fsjz50Q7qsNI1NOHZnjrDIbzAzWHFctPVr btQBULgTfmxKo0nRIBnuvMApGGWn3v7v3QqQIecaZ5JCEJhfTzC8PhxFtBDXaEAUwED653cXeuYL j2VbPNmaUtu1vZ5Gzz3rkQUCwJaydkxNEJY7kvqcfw+Z374jNUUeAlz+taibmSXaXvMiwzn15Cou 08YfxGyqxRxqAQVKL9LFwag0Jl1mpdICIfkYtwb1TplvqKtMUejPUBjFd8g5CSxJkjKZqLsXF3mw WsXmo8RZZUc1g16p6DULmbvkzSDGm0oGObVo/CK67lWMK07q87Hj/LaZmtVC+nFNCM+HHmpxffnT tOmlcYF7wk5HlqX2doWjKI/pgG6BU6VtX7hI+cL5NqYuSf+4lsKMB7ObiFj86xsc3i1w4peSMKGJ 47xVqCfWS+2QrYv6YyVZLag13cqXM7zlzced0ezvXg5KkAYmY6252TUtB7p2ZSysV4999AeU14EC ll2jB0nVetBX+RvnU0Z1qrB5QstocQjpYL05ac70r8NWQMetUqIJ5G+GR4of6ygnXYMgrwTJbFaa i0b1AgMBAAGjgYMwgYAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYE FPd9xf3E6Jobd2Sn9R2gzL+HYJptMD4GA1UdIAQ3MDUwMwYEVR0gADArMCkGCCsGAQUFBwIBFh1o dHRwOi8vd3d3LmNlcnQuZm5tdC5lcy9kcGNzLzANBgkqhkiG9w0BAQsFAAOCAgEAB5BK3/MjTvDD nFFlm5wioooMhfNzKWtN/gHiqQxjAb8EZ6WdmF/9ARP67Jpi6Yb+tmLSbkyU+8B1RXxlDPiyN8+s D8+Nb/kZ94/sHvJwnvDKuO+3/3Y3dlv2bojzr2IyIpMNOmqOFGYMLVN0V2Ue1bLdI4E7pWYjJ2cJ j+F3qkPNZVEI7VFY/uY5+ctHhKQV8Xa7pO6kO8Rf77IzlhEYt8llvhjho6Tc+hj507wTmzl6NLrT Qfv6MooqtyuGC2mDOL7Nii4LcK2NJpLuHvUBKwrZ1pebbuCoGRw6IYsMHkCtA+fdZn71uSANA+iW +YJF1DngoABd15jmfZ5nc8OaKveri6E6FO80vFIOiZiaBECEHX5FaZNXzuvO+FB8TxxuBEOb+dY7 Ixjp6o7RTUaN8Tvkasq6+yO3m/qZASlaWFot4/nUbQ4mrcFuNLwy+AwF+mWj2zs3gyLp1txyM/1d 8iC9djwj2ij3+RvrWWTV3F9yfiD8zYm1kGdNYno/Tq0dwzn+evQoFt9B9kiABdcPUXmsEKvU7ANm 5mqwujGSQkBqvjrTcuFqN1W8rB2Vt2lh8kORdOag0wokRqEIr9baRRmW1FMdW4R58MD3R++Lj8UG rp1MYp3/RgT408m2ECVAdf4WqslKYIYvuu8wd+RU4riEmViAqhOLUTpPSPaLtrM= -----END CERTIFICATE----- Amazon Root CA 1 ================ -----BEGIN CERTIFICATE----- MIIDQTCCAimgAwIBAgITBmyfz5m/jAo54vB4ikPmljZbyjANBgkqhkiG9w0BAQsFADA5MQswCQYD VQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6b24gUm9vdCBDQSAxMB4XDTE1 MDUyNjAwMDAwMFoXDTM4MDExNzAwMDAwMFowOTELMAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpv bjEZMBcGA1UEAxMQQW1hem9uIFJvb3QgQ0EgMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC ggEBALJ4gHHKeNXjca9HgFB0fW7Y14h29Jlo91ghYPl0hAEvrAIthtOgQ3pOsqTQNroBvo3bSMgH FzZM9O6II8c+6zf1tRn4SWiw3te5djgdYZ6k/oI2peVKVuRF4fn9tBb6dNqcmzU5L/qwIFAGbHrQ gLKm+a/sRxmPUDgH3KKHOVj4utWp+UhnMJbulHheb4mjUcAwhmahRWa6VOujw5H5SNz/0egwLX0t dHA114gk957EWW67c4cX8jJGKLhD+rcdqsq08p8kDi1L93FcXmn/6pUCyziKrlA4b9v7LWIbxcce VOF34GfID5yHI9Y/QCB/IIDEgEw+OyQmjgSubJrIqg0CAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB /zAOBgNVHQ8BAf8EBAMCAYYwHQYDVR0OBBYEFIQYzIU07LwMlJQuCFmcx7IQTgoIMA0GCSqGSIb3 DQEBCwUAA4IBAQCY8jdaQZChGsV2USggNiMOruYou6r4lK5IpDB/G/wkjUu0yKGX9rbxenDIU5PM CCjjmCXPI6T53iHTfIUJrU6adTrCC2qJeHZERxhlbI1Bjjt/msv0tadQ1wUsN+gDS63pYaACbvXy 8MWy7Vu33PqUXHeeE6V/Uq2V8viTO96LXFvKWlJbYK8U90vvo/ufQJVtMVT8QtPHRh8jrdkPSHCa 2XV4cdFyQzR1bldZwgJcJmApzyMZFo6IQ6XU5MsI+yMRQ+hDKXJioaldXgjUkK642M4UwtBV8ob2 xJNDd2ZhwLnoQdeXeGADbkpyrqXRfboQnoZsG4q5WTP468SQvvG5 -----END CERTIFICATE----- Amazon Root CA 2 ================ -----BEGIN CERTIFICATE----- MIIFQTCCAymgAwIBAgITBmyf0pY1hp8KD+WGePhbJruKNzANBgkqhkiG9w0BAQwFADA5MQswCQYD VQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6b24gUm9vdCBDQSAyMB4XDTE1 MDUyNjAwMDAwMFoXDTQwMDUyNjAwMDAwMFowOTELMAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpv bjEZMBcGA1UEAxMQQW1hem9uIFJvb3QgQ0EgMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC ggIBAK2Wny2cSkxKgXlRmeyKy2tgURO8TW0G/LAIjd0ZEGrHJgw12MBvIITplLGbhQPDW9tK6Mj4 kHbZW0/jTOgGNk3Mmqw9DJArktQGGWCsN0R5hYGCrVo34A3MnaZMUnbqQ523BNFQ9lXg1dKmSYXp N+nKfq5clU1Imj+uIFptiJXZNLhSGkOQsL9sBbm2eLfq0OQ6PBJTYv9K8nu+NQWpEjTj82R0Yiw9 AElaKP4yRLuH3WUnAnE72kr3H9rN9yFVkE8P7K6C4Z9r2UXTu/Bfh+08LDmG2j/e7HJV63mjrdvd fLC6HM783k81ds8P+HgfajZRRidhW+mez/CiVX18JYpvL7TFz4QuK/0NURBs+18bvBt+xa47mAEx kv8LV/SasrlX6avvDXbR8O70zoan4G7ptGmh32n2M8ZpLpcTnqWHsFcQgTfJU7O7f/aS0ZzQGPSS btqDT6ZjmUyl+17vIWR6IF9sZIUVyzfpYgwLKhbcAS4y2j5L9Z469hdAlO+ekQiG+r5jqFoz7Mt0 Q5X5bGlSNscpb/xVA1wf+5+9R+vnSUeVC06JIglJ4PVhHvG/LopyboBZ/1c6+XUyo05f7O0oYtlN c/LMgRdg7c3r3NunysV+Ar3yVAhU/bQtCSwXVEqY0VThUWcI0u1ufm8/0i2BWSlmy5A5lREedCf+ 3euvAgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBSw DPBMMPQFWAJI/TPlUq9LhONmUjANBgkqhkiG9w0BAQwFAAOCAgEAqqiAjw54o+Ci1M3m9Zh6O+oA A7CXDpO8Wqj2LIxyh6mx/H9z/WNxeKWHWc8w4Q0QshNabYL1auaAn6AFC2jkR2vHat+2/XcycuUY +gn0oJMsXdKMdYV2ZZAMA3m3MSNjrXiDCYZohMr/+c8mmpJ5581LxedhpxfL86kSk5Nrp+gvU5LE YFiwzAJRGFuFjWJZY7attN6a+yb3ACfAXVU3dJnJUH/jWS5E4ywl7uxMMne0nxrpS10gxdr9HIcW xkPo1LsmmkVwXqkLN1PiRnsn/eBG8om3zEK2yygmbtmlyTrIQRNg91CMFa6ybRoVGld45pIq2WWQ gj9sAq+uEjonljYE1x2igGOpm/HlurR8FLBOybEfdF849lHqm/osohHUqS0nGkWxr7JOcQ3AWEbW aQbLU8uz/mtBzUF+fUwPfHJ5elnNXkoOrJupmHN5fLT0zLm4BwyydFy4x2+IoZCn9Kr5v2c69BoV Yh63n749sSmvZ6ES8lgQGVMDMBu4Gon2nL2XA46jCfMdiyHxtN/kHNGfZQIG6lzWE7OE76KlXIx3 KadowGuuQNKotOrN8I1LOJwZmhsoVLiJkO/KdYE+HvJkJMcYr07/R54H9jVlpNMKVv/1F2Rs76gi JUmTtt8AF9pYfl3uxRuw0dFfIRDH+fO6AgonB8Xx1sfT4PsJYGw= -----END CERTIFICATE----- Amazon Root CA 3 ================ -----BEGIN CERTIFICATE----- MIIBtjCCAVugAwIBAgITBmyf1XSXNmY/Owua2eiedgPySjAKBggqhkjOPQQDAjA5MQswCQYDVQQG EwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6b24gUm9vdCBDQSAzMB4XDTE1MDUy NjAwMDAwMFoXDTQwMDUyNjAwMDAwMFowOTELMAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZ MBcGA1UEAxMQQW1hem9uIFJvb3QgQ0EgMzBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABCmXp8ZB f8ANm+gBG1bG8lKlui2yEujSLtf6ycXYqm0fc4E7O5hrOXwzpcVOho6AF2hiRVd9RFgdszflZwjr Zt6jQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBSrttvXBp43 rDCGB5Fwx5zEGbF4wDAKBggqhkjOPQQDAgNJADBGAiEA4IWSoxe3jfkrBqWTrBqYaGFy+uGh0Psc eGCmQ5nFuMQCIQCcAu/xlJyzlvnrxir4tiz+OpAUFteMYyRIHN8wfdVoOw== -----END CERTIFICATE----- Amazon Root CA 4 ================ -----BEGIN CERTIFICATE----- MIIB8jCCAXigAwIBAgITBmyf18G7EEwpQ+Vxe3ssyBrBDjAKBggqhkjOPQQDAzA5MQswCQYDVQQG EwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6b24gUm9vdCBDQSA0MB4XDTE1MDUy NjAwMDAwMFoXDTQwMDUyNjAwMDAwMFowOTELMAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZ MBcGA1UEAxMQQW1hem9uIFJvb3QgQ0EgNDB2MBAGByqGSM49AgEGBSuBBAAiA2IABNKrijdPo1MN /sGKe0uoe0ZLY7Bi9i0b2whxIdIA6GO9mif78DluXeo9pcmBqqNbIJhFXRbb/egQbeOc4OO9X4Ri 83BkM6DLJC9wuoihKqB1+IGuYgbEgds5bimwHvouXKNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNV HQ8BAf8EBAMCAYYwHQYDVR0OBBYEFNPsxzplbszh2naaVvuc84ZtV+WBMAoGCCqGSM49BAMDA2gA MGUCMDqLIfG9fhGt0O9Yli/W651+kI0rz2ZVwyzjKKlwCkcO8DdZEv8tmZQoTipPNU0zWgIxAOp1 AE47xDqUEpHJWEadIRNyp4iciuRMStuW1KyLa2tJElMzrdfkviT8tQp21KW8EA== -----END CERTIFICATE----- LuxTrust Global Root 2 ====================== -----BEGIN CERTIFICATE----- MIIFwzCCA6ugAwIBAgIUCn6m30tEntpqJIWe5rgV0xZ/u7EwDQYJKoZIhvcNAQELBQAwRjELMAkG A1UEBhMCTFUxFjAUBgNVBAoMDUx1eFRydXN0IFMuQS4xHzAdBgNVBAMMFkx1eFRydXN0IEdsb2Jh bCBSb290IDIwHhcNMTUwMzA1MTMyMTU3WhcNMzUwMzA1MTMyMTU3WjBGMQswCQYDVQQGEwJMVTEW MBQGA1UECgwNTHV4VHJ1c3QgUy5BLjEfMB0GA1UEAwwWTHV4VHJ1c3QgR2xvYmFsIFJvb3QgMjCC AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANeFl78RmOnwYoNMPIf5U2o3C/IPPIfOb9wm Kb3FibrJgz337spbxm1Jc7TJRqMbNBM/wYlFV/TZsfs2ZUv7COJIcRHIbjuend+JZTemhfY7RBi2 xjcwYkSSl2l9QjAk5A0MiWtj3sXh306pFGxT4GHO9hcvHTy95iJMHZP1EMShduxq3sVs35a0VkBC wGKSMKEtFZSg0iAGCW5qbeXrt77U8PEVfIvmTroTzEsnXpk8F12PgX8zPU/TPxvsXD/wPEx1bvKm 1Z3aLQdjAsZy6ZS8TEmVT4hSyNvoaYL4zDRbIvCGp4m9SAptZoFtyMhk+wHh9OHe2Z7d21vUKpkm FRseTJIpgp7VkoGSQXAZ96Tlk0u8d2cx3Rz9MXANF5kM+Qw5GSoXtTBxVdUPrljhPS80m8+f9niF wpN6cj5mj5wWEWCPnolvZ77gR1o7DJpni89Gxq44o/KnvObWhWszJHAiS8sIm7vI+AIpHb4gDEa/ a4ebsypmQjVGbKq6rfmYe+lQVRQxv7HaLe2ArWgk+2mr2HETMOZns4dA/Yl+8kPREd8vZS9kzl8U ubG/Mb2HeFpZZYiq/FkySIbWTLkpS5XTdvN3JW1CHDiDTf2jX5t/Lax5Gw5CMZdjpPuKadUiDTSQ MC6otOBttpSsvItO13D8xTiOZCXhTTmQzsmHhFhxAgMBAAGjgagwgaUwDwYDVR0TAQH/BAUwAwEB /zBCBgNVHSAEOzA5MDcGByuBKwEBAQowLDAqBggrBgEFBQcCARYeaHR0cHM6Ly9yZXBvc2l0b3J5 Lmx1eHRydXN0Lmx1MA4GA1UdDwEB/wQEAwIBBjAfBgNVHSMEGDAWgBT/GCh2+UgFLKGu8SsbK7JT +Et8szAdBgNVHQ4EFgQU/xgodvlIBSyhrvErGyuyU/hLfLMwDQYJKoZIhvcNAQELBQADggIBAGoZ FO1uecEsh9QNcH7X9njJCwROxLHOk3D+sFTAMs2ZMGQXvw/l4jP9BzZAcg4atmpZ1gDlaCDdLnIN H2pkMSCEfUmmWjfrRcmF9dTHF5kH5ptV5AzoqbTOjFu1EVzPig4N1qx3gf4ynCSecs5U89BvolbW 7MM3LGVYvlcAGvI1+ut7MV3CwRI9loGIlonBWVx65n9wNOeD4rHh4bhY79SV5GCc8JaXcozrhAIu ZY+kt9J/Z93I055cqqmkoCUUBpvsT34tC38ddfEz2O3OuHVtPlu5mB0xDVbYQw8wkbIEa91WvpWA VWe+2M2D2RjuLg+GLZKecBPs3lHJQ3gCpU3I+V/EkVhGFndadKpAvAefMLmx9xIX3eP/JEAdemrR TxgKqpAd60Ae36EeRJIQmvKN4dFLRp7oRUKX6kWZ8+xm1QL68qZKJKrezrnK+T+Tb/mjuuqlPpmt /f97mfVl7vBZKGfXkJWkE4SphMHozs51k2MavDzq1WQfLSoSOcbDWjLtR5EWDrw4wVDej8oqkDQc 7kGUnF4ZLvhFSZl0kbAEb+MEWrGrKqv+x9CWttrhSmQGbmBNvUJO/3jaJMobtNeWOWyu8Q6qp31I iyBMz2TWuJdGsE7RKlY6oJO9r4Ak4Ap+58rVyuiFVdw2KuGUaJPHZnJED4AhMmwlxyOAgwrr -----END CERTIFICATE----- TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1 ============================================= -----BEGIN CERTIFICATE----- MIIEYzCCA0ugAwIBAgIBATANBgkqhkiG9w0BAQsFADCB0jELMAkGA1UEBhMCVFIxGDAWBgNVBAcT D0dlYnplIC0gS29jYWVsaTFCMEAGA1UEChM5VHVya2l5ZSBCaWxpbXNlbCB2ZSBUZWtub2xvamlr IEFyYXN0aXJtYSBLdXJ1bXUgLSBUVUJJVEFLMS0wKwYDVQQLEyRLYW11IFNlcnRpZmlrYXN5b24g TWVya2V6aSAtIEthbXUgU00xNjA0BgNVBAMTLVRVQklUQUsgS2FtdSBTTSBTU0wgS29rIFNlcnRp ZmlrYXNpIC0gU3VydW0gMTAeFw0xMzExMjUwODI1NTVaFw00MzEwMjUwODI1NTVaMIHSMQswCQYD VQQGEwJUUjEYMBYGA1UEBxMPR2ViemUgLSBLb2NhZWxpMUIwQAYDVQQKEzlUdXJraXllIEJpbGlt c2VsIHZlIFRla25vbG9qaWsgQXJhc3Rpcm1hIEt1cnVtdSAtIFRVQklUQUsxLTArBgNVBAsTJEth bXUgU2VydGlmaWthc3lvbiBNZXJrZXppIC0gS2FtdSBTTTE2MDQGA1UEAxMtVFVCSVRBSyBLYW11 IFNNIFNTTCBLb2sgU2VydGlmaWthc2kgLSBTdXJ1bSAxMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A MIIBCgKCAQEAr3UwM6q7a9OZLBI3hNmNe5eA027n/5tQlT6QlVZC1xl8JoSNkvoBHToP4mQ4t4y8 6Ij5iySrLqP1N+RAjhgleYN1Hzv/bKjFxlb4tO2KRKOrbEz8HdDc72i9z+SqzvBV96I01INrN3wc wv61A+xXzry0tcXtAA9TNypN9E8Mg/uGz8v+jE69h/mniyFXnHrfA2eJLJ2XYacQuFWQfw4tJzh0 3+f92k4S400VIgLI4OD8D62K18lUUMw7D8oWgITQUVbDjlZ/iSIzL+aFCr2lqBs23tPcLG07xxO9 WSMs5uWk99gL7eqQQESolbuT1dCANLZGeA4fAJNG4e7p+exPFwIDAQABo0IwQDAdBgNVHQ4EFgQU ZT/HiobGPN08VFw1+DrtUgxHV8gwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wDQYJ KoZIhvcNAQELBQADggEBACo/4fEyjq7hmFxLXs9rHmoJ0iKpEsdeV31zVmSAhHqT5Am5EM2fKifh AHe+SMg1qIGf5LgsyX8OsNJLN13qudULXjS99HMpw+0mFZx+CFOKWI3QSyjfwbPfIPP54+M638yc lNhOT8NrF7f3cuitZjO1JVOr4PhMqZ398g26rrnZqsZr+ZO7rqu4lzwDGrpDxpa5RXI4s6ehlj2R e37AIVNMh+3yC1SVUZPVIqUNivGTDj5UDrDYyU7c8jEyVupk+eq1nRZmQnLzf9OxMUP8pI4X8W0j q5Rm+K37DwhuJi1/FwcJsoz7UMCflo3Ptv0AnVoUmr8CRPXBwp8iXqIPoeM= -----END CERTIFICATE----- rsconnect/inst/cert/shinyapps.io.pem0000644000176200001440000002754514435652570017341 0ustar liggesusersAmazon Root CA 1 ================ -----BEGIN CERTIFICATE----- MIIDQTCCAimgAwIBAgITBmyfz5m/jAo54vB4ikPmljZbyjANBgkqhkiG9w0BAQsF ADA5MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6 b24gUm9vdCBDQSAxMB4XDTE1MDUyNjAwMDAwMFoXDTM4MDExNzAwMDAwMFowOTEL MAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJv b3QgQ0EgMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALJ4gHHKeNXj ca9HgFB0fW7Y14h29Jlo91ghYPl0hAEvrAIthtOgQ3pOsqTQNroBvo3bSMgHFzZM 9O6II8c+6zf1tRn4SWiw3te5djgdYZ6k/oI2peVKVuRF4fn9tBb6dNqcmzU5L/qw IFAGbHrQgLKm+a/sRxmPUDgH3KKHOVj4utWp+UhnMJbulHheb4mjUcAwhmahRWa6 VOujw5H5SNz/0egwLX0tdHA114gk957EWW67c4cX8jJGKLhD+rcdqsq08p8kDi1L 93FcXmn/6pUCyziKrlA4b9v7LWIbxcceVOF34GfID5yHI9Y/QCB/IIDEgEw+OyQm jgSubJrIqg0CAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC AYYwHQYDVR0OBBYEFIQYzIU07LwMlJQuCFmcx7IQTgoIMA0GCSqGSIb3DQEBCwUA A4IBAQCY8jdaQZChGsV2USggNiMOruYou6r4lK5IpDB/G/wkjUu0yKGX9rbxenDI U5PMCCjjmCXPI6T53iHTfIUJrU6adTrCC2qJeHZERxhlbI1Bjjt/msv0tadQ1wUs N+gDS63pYaACbvXy8MWy7Vu33PqUXHeeE6V/Uq2V8viTO96LXFvKWlJbYK8U90vv o/ufQJVtMVT8QtPHRh8jrdkPSHCa2XV4cdFyQzR1bldZwgJcJmApzyMZFo6IQ6XU 5MsI+yMRQ+hDKXJioaldXgjUkK642M4UwtBV8ob2xJNDd2ZhwLnoQdeXeGADbkpy rqXRfboQnoZsG4q5WTP468SQvvG5 -----END CERTIFICATE----- Amazon Root CA 2 ================ -----BEGIN CERTIFICATE----- MIIFQTCCAymgAwIBAgITBmyf0pY1hp8KD+WGePhbJruKNzANBgkqhkiG9w0BAQwF ADA5MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6 b24gUm9vdCBDQSAyMB4XDTE1MDUyNjAwMDAwMFoXDTQwMDUyNjAwMDAwMFowOTEL MAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJv b3QgQ0EgMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAK2Wny2cSkxK gXlRmeyKy2tgURO8TW0G/LAIjd0ZEGrHJgw12MBvIITplLGbhQPDW9tK6Mj4kHbZ W0/jTOgGNk3Mmqw9DJArktQGGWCsN0R5hYGCrVo34A3MnaZMUnbqQ523BNFQ9lXg 1dKmSYXpN+nKfq5clU1Imj+uIFptiJXZNLhSGkOQsL9sBbm2eLfq0OQ6PBJTYv9K 8nu+NQWpEjTj82R0Yiw9AElaKP4yRLuH3WUnAnE72kr3H9rN9yFVkE8P7K6C4Z9r 2UXTu/Bfh+08LDmG2j/e7HJV63mjrdvdfLC6HM783k81ds8P+HgfajZRRidhW+me z/CiVX18JYpvL7TFz4QuK/0NURBs+18bvBt+xa47mAExkv8LV/SasrlX6avvDXbR 8O70zoan4G7ptGmh32n2M8ZpLpcTnqWHsFcQgTfJU7O7f/aS0ZzQGPSSbtqDT6Zj mUyl+17vIWR6IF9sZIUVyzfpYgwLKhbcAS4y2j5L9Z469hdAlO+ekQiG+r5jqFoz 7Mt0Q5X5bGlSNscpb/xVA1wf+5+9R+vnSUeVC06JIglJ4PVhHvG/LopyboBZ/1c6 +XUyo05f7O0oYtlNc/LMgRdg7c3r3NunysV+Ar3yVAhU/bQtCSwXVEqY0VThUWcI 0u1ufm8/0i2BWSlmy5A5lREedCf+3euvAgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMB Af8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBSwDPBMMPQFWAJI/TPlUq9LhONm UjANBgkqhkiG9w0BAQwFAAOCAgEAqqiAjw54o+Ci1M3m9Zh6O+oAA7CXDpO8Wqj2 LIxyh6mx/H9z/WNxeKWHWc8w4Q0QshNabYL1auaAn6AFC2jkR2vHat+2/XcycuUY +gn0oJMsXdKMdYV2ZZAMA3m3MSNjrXiDCYZohMr/+c8mmpJ5581LxedhpxfL86kS k5Nrp+gvU5LEYFiwzAJRGFuFjWJZY7attN6a+yb3ACfAXVU3dJnJUH/jWS5E4ywl 7uxMMne0nxrpS10gxdr9HIcWxkPo1LsmmkVwXqkLN1PiRnsn/eBG8om3zEK2yygm btmlyTrIQRNg91CMFa6ybRoVGld45pIq2WWQgj9sAq+uEjonljYE1x2igGOpm/Hl urR8FLBOybEfdF849lHqm/osohHUqS0nGkWxr7JOcQ3AWEbWaQbLU8uz/mtBzUF+ fUwPfHJ5elnNXkoOrJupmHN5fLT0zLm4BwyydFy4x2+IoZCn9Kr5v2c69BoVYh63 n749sSmvZ6ES8lgQGVMDMBu4Gon2nL2XA46jCfMdiyHxtN/kHNGfZQIG6lzWE7OE 76KlXIx3KadowGuuQNKotOrN8I1LOJwZmhsoVLiJkO/KdYE+HvJkJMcYr07/R54H 9jVlpNMKVv/1F2Rs76giJUmTtt8AF9pYfl3uxRuw0dFfIRDH+fO6AgonB8Xx1sfT 4PsJYGw= -----END CERTIFICATE----- Amazon Root CA 3 ================ -----BEGIN CERTIFICATE----- MIIBtjCCAVugAwIBAgITBmyf1XSXNmY/Owua2eiedgPySjAKBggqhkjOPQQDAjA5 MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6b24g Um9vdCBDQSAzMB4XDTE1MDUyNjAwMDAwMFoXDTQwMDUyNjAwMDAwMFowOTELMAkG A1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJvb3Qg Q0EgMzBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABCmXp8ZBf8ANm+gBG1bG8lKl ui2yEujSLtf6ycXYqm0fc4E7O5hrOXwzpcVOho6AF2hiRVd9RFgdszflZwjrZt6j QjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBSr ttvXBp43rDCGB5Fwx5zEGbF4wDAKBggqhkjOPQQDAgNJADBGAiEA4IWSoxe3jfkr BqWTrBqYaGFy+uGh0PsceGCmQ5nFuMQCIQCcAu/xlJyzlvnrxir4tiz+OpAUFteM YyRIHN8wfdVoOw== -----END CERTIFICATE----- Amazon Root CA 4 ================ -----BEGIN CERTIFICATE----- MIIB8jCCAXigAwIBAgITBmyf18G7EEwpQ+Vxe3ssyBrBDjAKBggqhkjOPQQDAzA5 MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6b24g Um9vdCBDQSA0MB4XDTE1MDUyNjAwMDAwMFoXDTQwMDUyNjAwMDAwMFowOTELMAkG A1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJvb3Qg Q0EgNDB2MBAGByqGSM49AgEGBSuBBAAiA2IABNKrijdPo1MN/sGKe0uoe0ZLY7Bi 9i0b2whxIdIA6GO9mif78DluXeo9pcmBqqNbIJhFXRbb/egQbeOc4OO9X4Ri83Bk M6DLJC9wuoihKqB1+IGuYgbEgds5bimwHvouXKNCMEAwDwYDVR0TAQH/BAUwAwEB /zAOBgNVHQ8BAf8EBAMCAYYwHQYDVR0OBBYEFNPsxzplbszh2naaVvuc84ZtV+WB MAoGCCqGSM49BAMDA2gAMGUCMDqLIfG9fhGt0O9Yli/W651+kI0rz2ZVwyzjKKlw CkcO8DdZEv8tmZQoTipPNU0zWgIxAOp1AE47xDqUEpHJWEadIRNyp4iciuRMStuW 1KyLa2tJElMzrdfkviT8tQp21KW8EA== -----END CERTIFICATE----- Starfield Services Root CA ========================== -----BEGIN CERTIFICATE----- MIID7zCCAtegAwIBAgIBADANBgkqhkiG9w0BAQsFADCBmDELMAkGA1UEBhMCVVMx EDAOBgNVBAgTB0FyaXpvbmExEzARBgNVBAcTClNjb3R0c2RhbGUxJTAjBgNVBAoT HFN0YXJmaWVsZCBUZWNobm9sb2dpZXMsIEluYy4xOzA5BgNVBAMTMlN0YXJmaWVs ZCBTZXJ2aWNlcyBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAtIEcyMB4XDTA5 MDkwMTAwMDAwMFoXDTM3MTIzMTIzNTk1OVowgZgxCzAJBgNVBAYTAlVTMRAwDgYD VQQIEwdBcml6b25hMRMwEQYDVQQHEwpTY290dHNkYWxlMSUwIwYDVQQKExxTdGFy ZmllbGQgVGVjaG5vbG9naWVzLCBJbmMuMTswOQYDVQQDEzJTdGFyZmllbGQgU2Vy dmljZXMgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgLSBHMjCCASIwDQYJKoZI hvcNAQEBBQADggEPADCCAQoCggEBANUMOsQq+U7i9b4Zl1+OiFOxHz/Lz58gE20p OsgPfTz3a3Y4Y9k2YKibXlwAgLIvWX/2h/klQ4bnaRtSmpDhcePYLQ1Ob/bISdm2 8xpWriu2dBTrz/sm4xq6HZYuajtYlIlHVv8loJNwU4PahHQUw2eeBGg6345AWh1K Ts9DkTvnVtYAcMtS7nt9rjrnvDH5RfbCYM8TWQIrgMw0R9+53pBlbQLPLJGmpufe hRhJfGZOozptqbXuNC66DQO4M99H67FrjSXZm86B0UVGMpZwh94CDklDhbZsc7tk 6mFBrMnUVN+HL8cisibMn1lUaJ/8viovxFUcdUBgF4UCVTmLfwUCAwEAAaNCMEAw DwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFJxfAN+q AdcwKziIorhtSpzyEZGDMA0GCSqGSIb3DQEBCwUAA4IBAQBLNqaEd2ndOxmfZyMI bw5hyf2E3F/YNoHN2BtBLZ9g3ccaaNnRbobhiCPPE95Dz+I0swSdHynVv/heyNXB ve6SbzJ08pGCL72CQnqtKrcgfU28elUSwhXqvfdqlS5sdJ/PHLTyxQGjhdByPq1z qwubdQxtRbeOlKyWN7Wg0I8VRw7j6IPdj/3vQQF3zCepYoUz8jcI73HPdwbeyBkd iEDPfUYd/x7H4c7/I9vG+o1VTqkC50cRRj70/b17KSa7qWFiNyi2LSr2EIZkyXCn 0q23KXB56jzaYyWf/Wi3MOxw+3WKt21gZ7IeyLnp2KhvAotnDU0mV3HaIPzBSlCN sSi6 -----END CERTIFICATE----- DigiCert Assured ID Root G2 =========================== -----BEGIN CERTIFICATE----- MIIDljCCAn6gAwIBAgIQC5McOtY5Z+pnI7/Dr5r0SzANBgkqhkiG9w0BAQsFADBl MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJv b3QgRzIwHhcNMTMwODAxMTIwMDAwWhcNMzgwMTE1MTIwMDAwWjBlMQswCQYDVQQG EwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNl cnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgRzIwggEi MA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDZ5ygvUj82ckmIkzTz+GoeMVSA n61UQbVH35ao1K+ALbkKz3X9iaV9JPrjIgwrvJUXCzO/GU1BBpAAvQxNEP4Htecc biJVMWWXvdMX0h5i89vqbFCMP4QMls+3ywPgym2hFEwbid3tALBSfK+RbLE4E9Hp EgjAALAcKxHad3A2m67OeYfcgnDmCXRwVWmvo2ifv922ebPynXApVfSr/5Vh88lA bx3RvpO704gqu52/clpWcTs/1PPRCv4o76Pu2ZmvA9OPYLfykqGxvYmJHzDNw6Yu YjOuFgJ3RFrngQo8p0Quebg/BLxcoIfhG69Rjs3sLPr4/m3wOnyqi+RnlTGNAgMB AAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQW BBTOw0q5mVXyuNtgv6l+vVa1lzan1jANBgkqhkiG9w0BAQsFAAOCAQEAyqVVjOPI QW5pJ6d1Ee88hjZv0p3GeDgdaZaikmkuOGybfQTUiaWxMTeKySHMq2zNixya1r9I 0jJmwYrA8y8678Dj1JGG0VDjA9tzd29KOVPt3ibHtX2vK0LRdWLjSisCx1BL4Gni lmwORGYQRI+tBev4eaymG+g3NJ1TyWGqolKvSnAWhsI6yLETcDbYz+70CjTVW0z9 B5yiutkBclzzTcHdDrEcDcRjvq30FPuJ7KJBDkzMyFdA0G4Dqs0MjomZmWzwPDCv ON9vvKO+KSAnq3T/EyJ43pdSVR6DtVQgA+6uwE9W3jfMw3+qBCe703e4YtsXfJwo IhNzbM8m9Yop5w== -----END CERTIFICATE----- DigiCert Global Root G2 ======================= -----BEGIN CERTIFICATE----- MIIDjjCCAnagAwIBAgIQAzrx5qcRqaC7KGSxHQn65TANBgkqhkiG9w0BAQsFADBh MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 d3cuZGlnaWNlcnQuY29tMSAwHgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBH MjAeFw0xMzA4MDExMjAwMDBaFw0zODAxMTUxMjAwMDBaMGExCzAJBgNVBAYTAlVT MRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5j b20xIDAeBgNVBAMTF0RpZ2lDZXJ0IEdsb2JhbCBSb290IEcyMIIBIjANBgkqhkiG 9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuzfNNNx7a8myaJCtSnX/RrohCgiN9RlUyfuI 2/Ou8jqJkTx65qsGGmvPrC3oXgkkRLpimn7Wo6h+4FR1IAWsULecYxpsMNzaHxmx 1x7e/dfgy5SDN67sH0NO3Xss0r0upS/kqbitOtSZpLYl6ZtrAGCSYP9PIUkY92eQ q2EGnI/yuum06ZIya7XzV+hdG82MHauVBJVJ8zUtluNJbd134/tJS7SsVQepj5Wz tCO7TG1F8PapspUwtP1MVYwnSlcUfIKdzXOS0xZKBgyMUNGPHgm+F6HmIcr9g+UQ vIOlCsRnKPZzFBQ9RnbDhxSJITRNrw9FDKZJobq7nMWxM4MphQIDAQABo0IwQDAP BgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBhjAdBgNVHQ4EFgQUTiJUIBiV 5uNu5g/6+rkS7QYXjzkwDQYJKoZIhvcNAQELBQADggEBAGBnKJRvDkhj6zHd6mcY 1Yl9PMWLSn/pvtsrF9+wX3N3KjITOYFnQoQj8kVnNeyIv/iPsGEMNKSuIEyExtv4 NeF22d+mQrvHRAiGfzZ0JFrabA0UWTW98kndth/Jsw1HKj2ZL7tcu7XUIOGZX1NG Fdtom/DzMNU+MeKNhJ7jitralj41E6Vf8PlwUHBHQRFXGU7Aj64GxJUTFy8bJZ91 8rGOmaFvE7FBcf6IKshPECBV1/MUReXgRPTqh5Uykw7+U0b6LJ3/iyK5S9kJRaTe pLiaWN0bfVKfjllDiIGknibVb63dDcY3fe0Dkhvld1927jyNxF1WW6LZZm6zNTfl MrY= -----END CERTIFICATE----- DigiCert Assured ID CA G2 ========================= -----BEGIN CERTIFICATE----- MIIEmjCCA4KgAwIBAgIQD1/M/Ksg89+ObaPYR2fCkzANBgkqhkiG9w0BAQsFADBl MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJv b3QgRzIwHhcNMTMwODAxMTIwMDAwWhcNMjgwODAxMTIwMDAwWjBIMQswCQYDVQQG EwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMSIwIAYDVQQDExlEaWdpQ2VydCBB c3N1cmVkIElEIENBIEcyMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA tFLF3hmmiyDchhlz2ZMtsf4L23l6z+g5odzcrNDI8QcZTBUm9xV9w5YZ6bRXU7jw ZlKaaVtxrqugWHNdlNfKL27RzC4kn1aKvwdt5Gj9j+UMzc/BMx3ksvGiHwQMBMGF zPAVG9aUpVXCXdUt0vSOLZxzI3x2Oqz2jL9pxc2l/bmgf9uhE4v2noPxViUQ4DF2 h/cDRzV5qyZUq8FPw9y1JUi8Pl6HHAzFei/4OvhAQogerd8lvl8chlkT5h9UNeS0 zdv5uDrNs5C/hJqXidKZU7nZTqh08B/RD8vsu9f66HavmbyrKXa2CveC0uqZvfQZ 0SBCj4ykeElnxyveHfOvUQIDAQABo4IBYTCCAV0wEgYDVR0TAQH/BAgwBgEB/wIB ADAOBgNVHQ8BAf8EBAMCAYYwNAYIKwYBBQUHAQEEKDAmMCQGCCsGAQUFBzABhhho dHRwOi8vb2NzcC5kaWdpY2VydC5jb20wgYEGA1UdHwR6MHgwOqA4oDaGNGh0dHA6 Ly9jcmw0LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RHMi5jcmww OqA4oDaGNGh0dHA6Ly9jcmwzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEFzc3VyZWRJ RFJvb3RHMi5jcmwwPQYDVR0gBDYwNDAyBgRVHSAAMCowKAYIKwYBBQUHAgEWHGh0 dHBzOi8vd3d3LmRpZ2ljZXJ0LmNvbS9DUFMwHQYDVR0OBBYEFLHP9qHl5oHFZkeN eIR3e/mBy0qmMB8GA1UdIwQYMBaAFM7DSrmZVfK422C/qX69VrWXNqfWMA0GCSqG SIb3DQEBCwUAA4IBAQA/C7UkzAlgi5mvLq7ukp0JS9Vg+rMNyx3XVkBF84vz9exk 74Y0vPnniZoy/pAgOaFFGbsVBI7SNf/iGI5x5UG5PKWo+K0AP0fwkZFnfEAN0wJy Dezr2oLi95s2XCoqThxhtJe6t1A8Lh6klGQGkgREdyF7Y6obGQq+7hDz4VRR4MCM m5QHcPcYJzh0pQueTxadgp6AbksehUf/g9eGzwzHqdkkAIQ9mzpRRxjoqkaPTtSd kpPl/ZZcDqPzDzWXhzKfJs90lSuYy1z1fQEgFZP/X1DGT8SGzAlfv83e+FC3ja7w JZJ4ZTqw8UTUUpI52U2HVCMXKNtEFEyMYLeRJe+j -----END CERTIFICATE----- DigiCert Baltimore CA-2 G2 ========================== -----BEGIN CERTIFICATE----- MIIEYzCCA0ugAwIBAgIQAYL4CY6i5ia5GjsnhB+5rzANBgkqhkiG9w0BAQsFADBa MQswCQYDVQQGEwJJRTESMBAGA1UEChMJQmFsdGltb3JlMRMwEQYDVQQLEwpDeWJl clRydXN0MSIwIAYDVQQDExlCYWx0aW1vcmUgQ3liZXJUcnVzdCBSb290MB4XDTE1 MTIwODEyMDUwN1oXDTI1MDUxMDEyMDAwMFowZDELMAkGA1UEBhMCVVMxFTATBgNV BAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEjMCEG A1UEAxMaRGlnaUNlcnQgQmFsdGltb3JlIENBLTIgRzIwggEiMA0GCSqGSIb3DQEB AQUAA4IBDwAwggEKAoIBAQC75wD+AAFz75uI8FwIdfBccHMf/7V6H40II/3HwRM/ sSEGvU3M2y24hxkx3tprDcFd0lHVsF5y1PBm1ITykRhBtQkmsgOWBGmVU/oHTz6+ hjpDK7JZtavRuvRZQHJaZ7bN5lX8CSukmLK/zKkf1L+Hj4Il/UWAqeydjPl0kM8c +GVQr834RavIL42ONh3e6onNslLZ5QnNNnEr2sbQm8b2pFtbObYfAB8ZpPvTvgzm +4/dDoDmpOdaxMAvcu6R84Nnyc3KzkqwIIH95HKvCRjnT0LsTSdCTQeg3dUNdfc2 YMwmVJihiDfwg/etKVkgz7sl4dWe5vOuwQHrtQaJ4gqPAgMBAAGjggEZMIIBFTAd BgNVHQ4EFgQUwBKyKHRoRmfpcCV0GgBFWwZ9XEQwHwYDVR0jBBgwFoAU5Z1ZMIJH WMys+ghUNoZ7OrUETfAwEgYDVR0TAQH/BAgwBgEB/wIBADAOBgNVHQ8BAf8EBAMC AYYwNAYIKwYBBQUHAQEEKDAmMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdp Y2VydC5jb20wOgYDVR0fBDMwMTAvoC2gK4YpaHR0cDovL2NybDMuZGlnaWNlcnQu Y29tL09tbmlyb290MjAyNS5jcmwwPQYDVR0gBDYwNDAyBgRVHSAAMCowKAYIKwYB BQUHAgEWHGh0dHBzOi8vd3d3LmRpZ2ljZXJ0LmNvbS9DUFMwDQYJKoZIhvcNAQEL BQADggEBAC/iN2bDGs+RVe4pFPpQEL6ZjeIo8XQWB2k7RDA99blJ9Wg2/rcwjang B0lCY0ZStWnGm0nyGg9Xxva3vqt1jQ2iqzPkYoVDVKtjlAyjU6DqHeSmpqyVDmV4 7DOMvpQ+2HCr6sfheM4zlbv7LFjgikCmbUHY2Nmz+S8CxRtwa+I6hXsdGLDRS5rB bxcQKegOw+FUllSlkZUIII1pLJ4vP1C0LuVXH6+kc9KhJLsNkP5FEx2noSnYZgvD 0WyzT7QrhExHkOyL4kGJE7YHRndC/bseF/r/JUuOUFfrjsxOFT+xJd1BDKCcYm1v upcHi9nzBhDFKdT3uhaQqNBU4UtJx5g= -----END CERTIFICATE-----