action_mailer_x509 0.7.0
Sign up to get free protection for your applications and to get access to all the features.
- data/.gitignore +15 -0
- data/.travis.yml +7 -0
- data/BSD-LICENSE +24 -0
- data/Gemfile +4 -0
- data/Gemfile.lock +72 -0
- data/README.rdoc +233 -0
- data/Rakefile +7 -0
- data/actionmailer_x509.gemspec +19 -0
- data/certs/ca.crt +35 -0
- data/certs/ca.key +54 -0
- data/certs/cert-name.p12 +0 -0
- data/certs/cert.crt +31 -0
- data/certs/cert.key +54 -0
- data/init.rb +3 -0
- data/lib/action_mailer_x509.rb +36 -0
- data/lib/action_mailer_x509/configuration.rb +170 -0
- data/lib/action_mailer_x509/railtie.rb +9 -0
- data/lib/action_mailer_x509/x509.rb +81 -0
- data/lib/generators/action_mailer_x509/install_generator.rb +12 -0
- data/lib/generators/action_mailer_x509/templates/x509_settings.rb +47 -0
- data/lib/models/notifier.rb +12 -0
- data/lib/overrides/action_mailer/base.rb +46 -0
- data/lib/overrides/mail/message.rb +110 -0
- data/lib/tasks/action_mailer_x509.rake +184 -0
- data/lib/views/notifier/fufu.erb +3 -0
- data/spec/ops_spec.rb +129 -0
- data/spec/spec_helper.rb +55 -0
- metadata +120 -0
data/.gitignore
ADDED
@@ -0,0 +1,15 @@
|
|
1
|
+
# See http://help.github.com/ignore-files/ for more about ignoring files.
|
2
|
+
#
|
3
|
+
# If you find yourself ignoring temporary files generated by your text editor
|
4
|
+
# or operating system, you probably want to add a global ignore instead:
|
5
|
+
# git config --global core.excludesfile ~/.gitignore_global
|
6
|
+
|
7
|
+
# Ignore bundler config
|
8
|
+
/.bundle
|
9
|
+
|
10
|
+
# Ignore the default SQLite database.
|
11
|
+
/db/*.sqlite3
|
12
|
+
|
13
|
+
# Ignore all logfiles and tempfiles.
|
14
|
+
.idea/
|
15
|
+
pkg/
|
data/.travis.yml
ADDED
data/BSD-LICENSE
ADDED
@@ -0,0 +1,24 @@
|
|
1
|
+
Copyright (c) 2013, Jenua Boiko
|
2
|
+
|
3
|
+
All rights reserved.
|
4
|
+
Redistribution and use in source and binary forms, with or without
|
5
|
+
modification, are permitted provided that the following conditions are met:
|
6
|
+
|
7
|
+
* Redistributions of source code must retain the above copyright
|
8
|
+
notice, this list of conditions and the following disclaimer.
|
9
|
+
* Redistributions in binary form must reproduce the above copyright
|
10
|
+
notice, this list of conditions and the following disclaimer in the
|
11
|
+
documentation and/or other materials provided with the distribution.
|
12
|
+
* Names of its contributors may be used to endorse or promote products
|
13
|
+
derived from this software without specific prior written permission.
|
14
|
+
|
15
|
+
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY
|
16
|
+
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
17
|
+
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
18
|
+
DISCLAIMED. IN NO EVENT SHALL THE REGENTS AND CONTRIBUTORS BE LIABLE FOR ANY
|
19
|
+
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
|
20
|
+
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
21
|
+
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
|
22
|
+
ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
23
|
+
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
|
24
|
+
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
data/Gemfile
ADDED
data/Gemfile.lock
ADDED
@@ -0,0 +1,72 @@
|
|
1
|
+
PATH
|
2
|
+
remote: .
|
3
|
+
specs:
|
4
|
+
action_mailer_x509 (0.6.2)
|
5
|
+
actionmailer
|
6
|
+
mail
|
7
|
+
rake
|
8
|
+
|
9
|
+
GEM
|
10
|
+
remote: http://rubygems.org/
|
11
|
+
specs:
|
12
|
+
actionmailer (4.0.0)
|
13
|
+
actionpack (= 4.0.0)
|
14
|
+
mail (~> 2.5.3)
|
15
|
+
actionpack (4.0.0)
|
16
|
+
activesupport (= 4.0.0)
|
17
|
+
builder (~> 3.1.0)
|
18
|
+
erubis (~> 2.7.0)
|
19
|
+
rack (~> 1.5.2)
|
20
|
+
rack-test (~> 0.6.2)
|
21
|
+
activesupport (4.0.0)
|
22
|
+
i18n (~> 0.6, >= 0.6.4)
|
23
|
+
minitest (~> 4.2)
|
24
|
+
multi_json (~> 1.3)
|
25
|
+
thread_safe (~> 0.1)
|
26
|
+
tzinfo (~> 0.3.37)
|
27
|
+
atomic (1.1.12)
|
28
|
+
builder (3.1.4)
|
29
|
+
diff-lcs (1.2.4)
|
30
|
+
erubis (2.7.0)
|
31
|
+
i18n (0.6.5)
|
32
|
+
mail (2.5.4)
|
33
|
+
mime-types (~> 1.16)
|
34
|
+
treetop (~> 1.4.8)
|
35
|
+
mime-types (1.23)
|
36
|
+
minitest (4.7.5)
|
37
|
+
multi_json (1.7.9)
|
38
|
+
polyglot (0.3.3)
|
39
|
+
rack (1.5.2)
|
40
|
+
rack-test (0.6.2)
|
41
|
+
rack (>= 1.0)
|
42
|
+
railties (4.0.0)
|
43
|
+
actionpack (= 4.0.0)
|
44
|
+
activesupport (= 4.0.0)
|
45
|
+
rake (>= 0.8.7)
|
46
|
+
thor (>= 0.18.1, < 2.0)
|
47
|
+
rake (10.1.0)
|
48
|
+
rspec-core (2.14.4)
|
49
|
+
rspec-expectations (2.14.1)
|
50
|
+
diff-lcs (>= 1.1.3, < 2.0)
|
51
|
+
rspec-mocks (2.14.3)
|
52
|
+
rspec-rails (2.14.0)
|
53
|
+
actionpack (>= 3.0)
|
54
|
+
activesupport (>= 3.0)
|
55
|
+
railties (>= 3.0)
|
56
|
+
rspec-core (~> 2.14.0)
|
57
|
+
rspec-expectations (~> 2.14.0)
|
58
|
+
rspec-mocks (~> 2.14.0)
|
59
|
+
thor (0.18.1)
|
60
|
+
thread_safe (0.1.2)
|
61
|
+
atomic
|
62
|
+
treetop (1.4.14)
|
63
|
+
polyglot
|
64
|
+
polyglot (>= 0.3.1)
|
65
|
+
tzinfo (0.3.37)
|
66
|
+
|
67
|
+
PLATFORMS
|
68
|
+
ruby
|
69
|
+
|
70
|
+
DEPENDENCIES
|
71
|
+
action_mailer_x509!
|
72
|
+
rspec-rails
|
data/README.rdoc
ADDED
@@ -0,0 +1,233 @@
|
|
1
|
+
{<img src="https://travis-ci.org/jeyboy/action_mailer_x509.png?branch=master" alt="Build Status" />}[https://travis-ci.org/jeyboy/action_mailer_x509]
|
2
|
+
|
3
|
+
= ActionmailerX509
|
4
|
+
|
5
|
+
Allows you to send X509 signed and/or crypted mails for Ruby on Rails. Also my you possibility verify and decrypt X509 signed and/or crypted mails.
|
6
|
+
|
7
|
+
It has been tested with Rails 3.2.12.
|
8
|
+
|
9
|
+
== Creation of the certificates
|
10
|
+
|
11
|
+
(1) Generate your own Certificate Authority (CA).
|
12
|
+
|
13
|
+
openssl genrsa -des3 -out ca.key 4096
|
14
|
+
openssl req -new -x509 -days 365 -key ca.key -out ca.crt
|
15
|
+
|
16
|
+
(2) Generate a server key and request for signing (csr).
|
17
|
+
|
18
|
+
Note : use your email address for the Common Name (CN) field
|
19
|
+
|
20
|
+
openssl genrsa -des3 -out server.key 4096
|
21
|
+
openssl req -new -key server.key -out server.csr
|
22
|
+
|
23
|
+
(3) Sign the certificate signing request (csr) with the self-created
|
24
|
+
certificate authority (CA) that you made earlier.
|
25
|
+
|
26
|
+
openssl x509 -req -days 365 -in server.csr -CA ca.crt -CAkey ca.key -set_serial 01 -out server.crt
|
27
|
+
|
28
|
+
(3 bis) or self sign your certificate with the same key.
|
29
|
+
|
30
|
+
openssl x509 -req -days 365 -in server.csr -signkey server.key -out server.crt
|
31
|
+
|
32
|
+
(4) Compute all thoses files into a PCKS#12 file (so you can include it in your mailer):
|
33
|
+
|
34
|
+
openssl pkcs12 -export -in server.crt -inkey server.key -certfile ca.key -name "My Cert" -out name-cert.p12
|
35
|
+
|
36
|
+
== Extracting the files from a PKCS#12 file
|
37
|
+
|
38
|
+
If you have a PKCS#12 file, usualy named .p12, you can extract the required files with
|
39
|
+
the following commands.
|
40
|
+
|
41
|
+
(1) Extract the private key
|
42
|
+
|
43
|
+
openssl pkcs12 -in file_input.p12 -clcerts -nocerts -out file_out.key -nodes
|
44
|
+
|
45
|
+
(2) Extract the certificate
|
46
|
+
|
47
|
+
openssl pkcs12 -in file_input.p12 -clcerts -nokeys -out file_out.crt -nodes
|
48
|
+
|
49
|
+
Please note the -nodes to leave the private key uncrypted, use -des if you wish
|
50
|
+
to protect it.
|
51
|
+
|
52
|
+
== Common way to connect your certificates
|
53
|
+
|
54
|
+
A lot of mailer apps has the same procedure of certificate inclusion which include next steps :
|
55
|
+
|
56
|
+
(1) Open the Preferences.
|
57
|
+
(2) Go to Advanced and open the Certificates tab. Click on View Certificates.
|
58
|
+
(3) Select the Your Certificates tab and click on Import. Browse the .p12 file you created and hit Open. Every time you import a certificate, you will need to give the export passphrase you specified when you created the .p12 document.
|
59
|
+
(4) Next, go to the Servers tab and click Import again. Here, browse the .crt file belonging to your certificate (there are two if you created a certificate authority).
|
60
|
+
(5) Still on the same tab, select the newly imported entry and click Edit.
|
61
|
+
(6) Select Trust the authenticity of this certificate and click Edit CA Trust.
|
62
|
+
|
63
|
+
You only need to do the next step if you created a CA.
|
64
|
+
|
65
|
+
(1) Go to the Authorities tab and hit Import.
|
66
|
+
(2) Now select the .crt file belonging to your certificate authority and hit Open. You will then be asked how far you want to trust the certificate authority. After pressing OK the created CA will be listed on the tab.
|
67
|
+
|
68
|
+
For Mac OS procedure has some differences:
|
69
|
+
|
70
|
+
To use your certificate on Mac, import the certificate into Keychain Access on that Mac. Double-click the certificate
|
71
|
+
file. If Keychain Access can’t import the certificate, drag the file onto the Keychain Access icon in Finder.
|
72
|
+
If you still can’t import the certificate, the certificate may have expired or may be invalid. You can verify whether
|
73
|
+
your certificate is successfully installed if it appears in the My Certificates category in Keychain Access.
|
74
|
+
Open your certificate in Keychain Access and make sure its trust setting is “Use System Defaults” or “Always Trust.”
|
75
|
+
|
76
|
+
== INSTALLING
|
77
|
+
|
78
|
+
Put this line in your Gemfile
|
79
|
+
|
80
|
+
gem 'actionmailer_x509'
|
81
|
+
|
82
|
+
== USING
|
83
|
+
|
84
|
+
First for all - run install generator, which adds configuration file
|
85
|
+
|
86
|
+
rails g action_mailer_x509:install
|
87
|
+
|
88
|
+
After the process, add base configurations for emails processing in '/config/initializers/x509_settings'
|
89
|
+
|
90
|
+
config.add_configuration :demo,
|
91
|
+
{
|
92
|
+
sign_enable: false,
|
93
|
+
crypt_enable: true,
|
94
|
+
sign_cert: 'cert.crt',
|
95
|
+
sign_key: 'cert.key',
|
96
|
+
sign_passphrase: 'demo',
|
97
|
+
crypt_cert: 'cert.crt',
|
98
|
+
crypt_key: 'cert.key',
|
99
|
+
crypt_passphrase: 'demo',
|
100
|
+
certs_path: Rails.root.join('certs')
|
101
|
+
}
|
102
|
+
|
103
|
+
config.add_configuration :none,
|
104
|
+
{
|
105
|
+
sign_enable: false,
|
106
|
+
crypt_enable: false,
|
107
|
+
}
|
108
|
+
|
109
|
+
and set default configuration
|
110
|
+
|
111
|
+
config.default_configuration = :hisp
|
112
|
+
|
113
|
+
You may also add the configurations dynamically in any place.
|
114
|
+
|
115
|
+
And you may also change the default configuration in any place of the program:
|
116
|
+
|
117
|
+
1) Change globally
|
118
|
+
|
119
|
+
ActionMailerX509.default_configuration = :demo
|
120
|
+
|
121
|
+
2) Change only for decoding and verifyng if you use Mail object
|
122
|
+
|
123
|
+
Mail.new(encoded_text).proceed(configuration)
|
124
|
+
|
125
|
+
If you set configuration as nil in "proceed" func, "ActionMailerX509.default_configuration" will be used.
|
126
|
+
|
127
|
+
== HELPERS
|
128
|
+
|
129
|
+
You may use some helpers for fast encoding in case when you proceed received email. Helper has the following signature:
|
130
|
+
|
131
|
+
method_name_as_new_encoding
|
132
|
+
|
133
|
+
For example:
|
134
|
+
|
135
|
+
mail = Mail.new(raw_email)
|
136
|
+
mail.body => return body in default encoding
|
137
|
+
mail.body_as_koi8_r => return body in koi8-r encoding
|
138
|
+
|
139
|
+
== USING TEST
|
140
|
+
|
141
|
+
You mau use rspec tests by command
|
142
|
+
|
143
|
+
bundle exec rake
|
144
|
+
|
145
|
+
or use next rake tests:
|
146
|
+
|
147
|
+
Start all main tests
|
148
|
+
|
149
|
+
rake action_mailer_x509:all
|
150
|
+
|
151
|
+
You can benchmark the gem with:
|
152
|
+
|
153
|
+
rake action_mailer_x509:performance_test
|
154
|
+
|
155
|
+
Send yourself a signed email with:
|
156
|
+
|
157
|
+
rake action_mailer_x509:send_test
|
158
|
+
|
159
|
+
Verify the gem which generates valid signature
|
160
|
+
|
161
|
+
rake action_mailer_x509:verify_signature
|
162
|
+
|
163
|
+
Generate a signed email in a local file
|
164
|
+
|
165
|
+
rake action_mailer_x509:generate_mail
|
166
|
+
|
167
|
+
Generates a crypted mail in a file
|
168
|
+
|
169
|
+
rake action_mailer_x509:generate_crypted_mail
|
170
|
+
|
171
|
+
Verify the gem which generates valid encrypted mail
|
172
|
+
|
173
|
+
rake action_mailer_x509:verify_crypt
|
174
|
+
|
175
|
+
Check if crypt text is valid by openssl
|
176
|
+
|
177
|
+
rake action_mailer_x509:verify_crypt_by_openssl
|
178
|
+
|
179
|
+
Check sign and crypt
|
180
|
+
|
181
|
+
rake action_mailer_x509:verify_sign_and_crypt
|
182
|
+
|
183
|
+
== REQUIREMENTS
|
184
|
+
|
185
|
+
* Ruby 1.9 or later (Ruby 1.8 is not tested)
|
186
|
+
* Rails 3.2 or later (All other versions are not tested)
|
187
|
+
* OpenSSL 0.9.8e or later and Ruby/OpenSSL 1.8.6.36 or later
|
188
|
+
|
189
|
+
== Mail User Agent tested
|
190
|
+
|
191
|
+
We checked with the following MUA for making sure the signed mails are
|
192
|
+
readable.
|
193
|
+
|
194
|
+
* Thunderbird 15.0: OK
|
195
|
+
* Apple Mail.app: OK
|
196
|
+
* Google Mail: A file smime.p7s appears as attachment
|
197
|
+
* Google Mail + Penango: OK
|
198
|
+
|
199
|
+
== AUTHORS
|
200
|
+
|
201
|
+
Gem was done by Jenua Boiko <jeyboy1985@gmail.com>.
|
202
|
+
Inspired by gem of petRUShka[https://github.com/petRUShka]
|
203
|
+
|
204
|
+
Special thanks to Ekaterina Krivich[https://github.com/kiote].
|
205
|
+
|
206
|
+
This code is under the BSD license.
|
207
|
+
|
208
|
+
== LICENSE
|
209
|
+
|
210
|
+
Copyright (c) 2013, Jenua Boiko
|
211
|
+
|
212
|
+
All rights reserved.
|
213
|
+
Redistribution and use in source and binary forms, with or without
|
214
|
+
modification, are permitted provided that the following conditions are met:
|
215
|
+
|
216
|
+
* Redistributions of source code must retain the above copyright
|
217
|
+
notice, this list of conditions and the following disclaimer.
|
218
|
+
* Redistributions in binary form must reproduce the above copyright
|
219
|
+
notice, this list of conditions and the following disclaimer in the
|
220
|
+
documentation and/or other materials provided with the distribution.
|
221
|
+
* Names of its contributors may be used to endorse or promote products
|
222
|
+
derived from this software without specific prior written permission.
|
223
|
+
|
224
|
+
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY
|
225
|
+
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
226
|
+
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
227
|
+
DISCLAIMED. IN NO EVENT SHALL THE REGENTS AND CONTRIBUTORS BE LIABLE FOR ANY
|
228
|
+
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
|
229
|
+
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
230
|
+
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
|
231
|
+
ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
232
|
+
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
|
233
|
+
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
data/Rakefile
ADDED
@@ -0,0 +1,19 @@
|
|
1
|
+
Gem::Specification.new do |s|
|
2
|
+
s.name = 'action_mailer_x509'
|
3
|
+
s.version = '0.7.0'
|
4
|
+
s.authors = ['Jenua Boiko']
|
5
|
+
s.email = 'jeyboy1985@gmail.com'
|
6
|
+
s.files = `git ls-files`.split("\n")
|
7
|
+
s.test_files = `git ls-files -- {test,spec,features}/*`.split("\n")
|
8
|
+
s.homepage = 'http://github.com/jeyboy/action_mailer_x509'
|
9
|
+
s.require_path = 'lib'
|
10
|
+
s.rubygems_version = '1.3.5'
|
11
|
+
s.summary = "This Rails gem allows you to send X509 signed and\\or crypted mails."
|
12
|
+
s.license = 'BSD'
|
13
|
+
|
14
|
+
s.add_dependency 'rake'
|
15
|
+
s.add_dependency 'actionmailer'
|
16
|
+
s.add_dependency 'mail'
|
17
|
+
#s.add_development_dependency 'rspec'
|
18
|
+
end
|
19
|
+
|
data/certs/ca.crt
ADDED
@@ -0,0 +1,35 @@
|
|
1
|
+
-----BEGIN CERTIFICATE-----
|
2
|
+
MIIGBTCCA+2gAwIBAgIJAOKsbt/Ktd4yMA0GCSqGSIb3DQEBBQUAMIGYMQswCQYD
|
3
|
+
VQQGEwJVUzETMBEGA1UECAwKQ2FsaWZvcm5pYTESMBAGA1UEBwwJUGFsby1BbHRv
|
4
|
+
MREwDwYDVQQKDAhQZWxlc2VuZDENMAsGA1UECwwETWFpbjEbMBkGA1UEAwwSa2F0
|
5
|
+
eWFAcGVsZXNlbmQuY29tMSEwHwYJKoZIhvcNAQkBFhJrYXR5YUBwZWxlc2VuZC5j
|
6
|
+
b20wHhcNMTMwNzExMTExNjAxWhcNMTQwNzExMTExNjAxWjCBmDELMAkGA1UEBhMC
|
7
|
+
VVMxEzARBgNVBAgMCkNhbGlmb3JuaWExEjAQBgNVBAcMCVBhbG8tQWx0bzERMA8G
|
8
|
+
A1UECgwIUGVsZXNlbmQxDTALBgNVBAsMBE1haW4xGzAZBgNVBAMMEmthdHlhQHBl
|
9
|
+
bGVzZW5kLmNvbTEhMB8GCSqGSIb3DQEJARYSa2F0eWFAcGVsZXNlbmQuY29tMIIC
|
10
|
+
IjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA04cDxPpBzuVWmU+Jw4/07ru7
|
11
|
+
depsn+h9We5HnohN/Ed/eitQRSDBLstAAzsMb/jZfWQSlOuYxa22quMTXpUtPR+k
|
12
|
+
Py29Uxsg/OV3wgUlpeQToLJ1AU8y0RHKji/cp02oDQfPhqSiDwF3Q8wtT1ytF0SH
|
13
|
+
1t7pCo4GlZEmAttsYz27fr0LK1LbTBmr5XpyHCGOg/c39GrQp2/AE++6kndBznlD
|
14
|
+
0HxyE0ya7mFyBU2Wg3cv0SUfhpTuMpzG2oHKwSEW3oIo/r7KOL1kFaGT3/gpIxrh
|
15
|
+
kWKuIs6t14ZAdue5gfKaY0nLKrp5xkreWtqG53gjd5Tq1nWQa1UC2yUOJHbyMlem
|
16
|
+
KJu165jBuYDOrs7zUy87edhYQotWcLlufqwbx/TlloSeQzJv89AnAIDKmCr6hjty
|
17
|
+
Yh1XSNPMXGpXptIFZhboswNZkjQyzstNVG74KnmxoKy0/cELncRF3sgiKaw4EJu3
|
18
|
+
JIQgTHwoIemmpot19kCJBIBqL4DhH3HyMgpNL62E7JKS4c0b9W4lTn11akE2ADtV
|
19
|
+
pN+UtWTW1CxOGqy7SR+1bMCGHNrLA6ahx7F5UJNLRltMnQnKi5BoPvcuVqhHceqt
|
20
|
+
vGRvgLUwYBUVpq/OYlEKvp5Dv9adkjE8EXJdD0olUg1EPikKWwk1wmcjY8Nn4Qd8
|
21
|
+
LqpNVa4Gj6sf7X2a7v0CAwEAAaNQME4wHQYDVR0OBBYEFACLJSrUhG+Fvoug8lwf
|
22
|
+
Or7LiLaNMB8GA1UdIwQYMBaAFACLJSrUhG+Fvoug8lwfOr7LiLaNMAwGA1UdEwQF
|
23
|
+
MAMBAf8wDQYJKoZIhvcNAQEFBQADggIBAJl9ymKKVQtTcaxrb5YFmnJg7RO92VuA
|
24
|
+
VY50Ta+Jg4dm8o3iMFdShPvmpYGqnFFBf1UEhmwuUVft35rVicHiBV+Z8yWtUS+c
|
25
|
+
iI5p8wQWVXg1uxByxgrhi7XJYe/A1tQPxXQlMejXYJhAAl0DSBQA0eE084633RjA
|
26
|
+
+lUSyroFfYY+Ry/Z6/UcCZyd159iQWEQjcImbPe82qvLhn2Ek/xC9KbbxSZrsEaG
|
27
|
+
C18qKd4awLHWToD6md437upPr3ik53WxHL5lO4Xz6QyvAGYMOClQrab+lqxj8X2K
|
28
|
+
6qTClgyF0K/ZIjGNk7Bkeb1AqR3JpTOpLnD3Fp17i9gbw5WJBf0hLWn5O7+mqsRB
|
29
|
+
O/tpYQMQPCn1dPq7MMHPV1awDWVgNsPxxSrD6zj1pF9vyyLONZhWve9gx4fT1gai
|
30
|
+
yDh0bFO3ZeU8tG3qgezYh9JobAlA7aUcYNv3Ul6leVqK1Aqq6kd+/AujhCWN1k7h
|
31
|
+
AYOFRfWkkJ75khZFZLy7hncb+VsXlznNEPfnZg6bqFh5j6zZmjrAHgB8b8JhCtnH
|
32
|
+
3QWBk24cc7F2+u08IItXE0encPl1btnkr7esNr+4mbBWeZtLm6Q8Sc+M/cO1um4R
|
33
|
+
QdOwB7rL6bSx46QdDhrtDqjP7c3c0urmRjrjNfmuXUj4aNxIrDCvDmSI75YEeNft
|
34
|
+
+R7d8eARqwSj
|
35
|
+
-----END CERTIFICATE-----
|
data/certs/ca.key
ADDED
@@ -0,0 +1,54 @@
|
|
1
|
+
-----BEGIN RSA PRIVATE KEY-----
|
2
|
+
Proc-Type: 4,ENCRYPTED
|
3
|
+
DEK-Info: DES-EDE3-CBC,7DA87384C868CBA5
|
4
|
+
|
5
|
+
iFNBw+WmZK8y8BoaHX0j2aK8q5zn5PjHNsmciGg2iS+i4E3iNEBn54/tFLj+jpGE
|
6
|
+
GfLB/0u5fDfx9Sc/fISz5hhXSDLuuzD8FitvRMUmzh8EwwtU5W8zLs47JlL87RzH
|
7
|
+
jJawf/CElMod3qrmfW10U6yQhStmpCkUoK48TtEkKeDE4TwHxIG1SLICFJeROlM6
|
8
|
+
L/SWNu6ogVrIid5W3EkQ+eIT4yc91w1b42NcqJiZNHaoaa0AxgBXVgqmc+PLq/sL
|
9
|
+
4KTrQr5BCjtKjQ3SOhWWiz6xJ4o3RPM4N29CCRYIfacVfnCjL5dqzyXuvyMwhhBq
|
10
|
+
N/NZ0TdAEzktxbrvxbUphjlMZ+6GykBiIWbrWQj3S9dtlFdD0zhLQYdWPG3KHtCC
|
11
|
+
yjJBAw+7haYaPT8xsVUUieNUX+QbRUJa3MfboSpLRuRE8/pAdghsUVcrFp/qJw63
|
12
|
+
G+eKhLrdlm9W2ffhfI1ZoFWsWtB1ppErq2DYSRQ/3ZypMf3tO4rHfw42lx99mmgu
|
13
|
+
RLgklf/cKoXpfaC6SVUeUtVYuuUwW2EdGZrt48S2kGm4OzbuiJwIckb2rICEXyGw
|
14
|
+
Mpf4SAhyBudT/1Ha5bNZhiAKf94/fzSwQXY+2HY+jiEgLxyaiDtMUSlWie0epuB6
|
15
|
+
AaXGHKw8dw3d3KvkIDhToJ3s1vx7ljy2ZCetEmjoStcPqSof52L3Em9FO/aauptp
|
16
|
+
hWYzw8O4w4FnGX4TtQ+UZQeQmJozMQJaeBsxBZnCqe29ma2cznwld1GKry8hfP3F
|
17
|
+
BxotLc0lu5OhhiK/sC1h7TChGwncQHoamRGm7bZwul0STR55TjYKpSeoMdmQagbt
|
18
|
+
VPzav0xnvagp107AX1V9CwCOXxpztNQ6VrnZobcxtRJvgZR3vxtC10zboYBOQ3hb
|
19
|
+
hbRpadH857riqdgH3ZSsek3zgodMRdBw04hQQtoeiE4M2NLvu3IVl336au4FT531
|
20
|
+
mPS/eDkLO6BogOxKy80O04PyrsQ9m7WBV1GZJWTydxlHOlxRV69ExQ4Xz5baRbQJ
|
21
|
+
kLsCAsdEGy50ULrBTIfVpeVu+lu4m4X+NoBLfI9SVWGvr1lRn+mFW1hkm9WYW8jM
|
22
|
+
Alzs0BiaxVVCHtPLFnnDGIWGd/nvgg/X/j1ioMRMt7no2oSlxMQZNWS1wjd+ewfV
|
23
|
+
uWNjQrY4nN6PVL046m4lK7nKgPVq56MpTYMELMm+17/4u6WwGCO05vaXbY1ikgY+
|
24
|
+
G1cSE4jVnjhcHvASwbjzDl6gLclLZOal/xVKW8KgkUX+36HbTrCsIw00024PMrTO
|
25
|
+
ljKcq5TIf+a5NSnfZmApjo6N1FA58ePmwPe4J0U8s+b1EFDeiadlwRW94SUtsDUm
|
26
|
+
qie40BCQhISTnQZRtFs6C6hRXVsi4Hzn71a62odUc8nIi810EcAYWBpYpoCgSiJc
|
27
|
+
iocSnL5HdQZEXXsxfDEyiCPNOYOgQn3qe5xtnOPDAtOYdKT7ZwLezMo5fcMoYGzv
|
28
|
+
4FWX9mp/QONp6C2rEwF4CDLHtuQNQJvRRO+mPXQ9BgfvIQPbdg3Kv4ZkEm9QP7SI
|
29
|
+
IMVPbnDumY8uF2HQD6v9hqlEEnw+oVef18yJxKfflKm3PlVSdB7lBHZJD9JLbV/U
|
30
|
+
RktvXbY9lxtmpNrl1mAzEljcueVCkB/857Dhwn7Rx18X+9FvBH9sjevd++bpwfKO
|
31
|
+
jsTwiMQoUPNOR64CT9w6ycDkt2Fs5tJaq6WHkgXDSDG4USFNKPXiisMtjYWe5Eoo
|
32
|
+
6cyzhF93eeyo7YRiZOEuHmJKPVEdlz/PTDfPqGywmC52+Mfe+paB+UOynJjxDCGK
|
33
|
+
99KSt4xjfUZ6E3V3/10fGeNgvhYuP6Nc8wDta1YztYsIsPnPKzMHSbhkxU+4HXdf
|
34
|
+
DVebaJ/sFwHRnKZEndHcfs4/r9bWSscT+g24b5bfVVQ2LqEcldtfMJXVKf722puD
|
35
|
+
8VR4SsxzwFPf9ObQtS8kUcKTaXvlM6IowXEGMZiPCXqPUfHpdjuwAWhR+MgMhloY
|
36
|
+
/vWNjVCR5bPXdHUIx7G+kyvvFb77sDpW9Lf9uqBoqA7uEy0fol5vL9mmOukhYYp5
|
37
|
+
nzq9jab8qY5491EUDZCUDaqnbh8WUEM88xYCHvL+SRVN7VUynZC8wxGhzq6A0hqe
|
38
|
+
3/CY1maaf5LTJEide+Y/el1iW1Q4gDqlSuRZh4iNAkKC4x51f8hYjACudtPZEjr9
|
39
|
+
CpnXFrpOwgNs4iGaUkggT0sFHzRw6tvUJRZP2EDPoZcvcRbYFbydgSVHDAC1lyrz
|
40
|
+
FwMA7H3hl1CclHtEIPPd1xF5O/DYPW/GofcHVDtBhP2TytKdOFkBlNTk+JPsA8qp
|
41
|
+
XulGpa6luEpmA5KZXRrEGujvN/F7OuPDgzP+zFVbVycbmbA0Fx7N8LZe/XVIVdt4
|
42
|
+
FwaC+ZJwruY4RpTpEYzmwmbiqn22WrIUcvxMnp6uFQ5SPElfBXEbVLpekte7RMdk
|
43
|
+
pq79bzli3Ew1xbNUqZKMzt+QB5abBNtmF3uZhb6w0jh0ecXa06+zK3rGV4H0ktz6
|
44
|
+
ucWGf+NsZYDIGGibsEnhy7HM/B+thXysj0Ku6nBb1ma6lnboFVIrdwaghRWLmL/Z
|
45
|
+
ObnnSXCnMhMK/WmEFtBLc+xal1mVQrvot+STwsZzUrgNIGlpV2g5bjy97Of3OD7U
|
46
|
+
R7rUQx7RbsKQZTn9nzUSEEdRLUF+XpW1oGrbr7JOldaB/oPcyMkP83YvWRGsir3F
|
47
|
+
68tEUiAX/6Sl5vcG9FYpA7NrqazRyrGY25q4TeGCMmQYG+TRUn+M3oemCCFTuEJb
|
48
|
+
ClKB4QwtGcX2o2Pi618yNjP53oDE1fvmo+OhDU5zEJpmbq2kkRvuQn8DrJQT3Tac
|
49
|
+
ED2fZQGzpHnRRaTid3dn5XoQVGrqlR9D4xgXRjKf/w+EDvwRcYpyUcCsPV22GVqe
|
50
|
+
7S+JcJE/IxfXs61So5bfq5QnaDsREtWvSn/rcknvDS+P4iSlh3vTM+EtWlnD58nd
|
51
|
+
ZwFGzS0FDwQKwiqdXMb+a0vD3IHfBHA8LpQ16xWfHOqKfDTVZ0UFyGMU8wv9FlpU
|
52
|
+
OoXsBS4FJnixzzAVYCDNpHh1ujq3EixP62LV81f7qswET6sdEmcKNUXnwehCDyer
|
53
|
+
bmCx7aRMITbnytgzkEALAk4teR9yqVIoay6mXw7stOjN+ckKgV27h9hzqYcRnI71
|
54
|
+
-----END RSA PRIVATE KEY-----
|