action_mailer_x509 0.7.0

Sign up to get free protection for your applications and to get access to all the features.
data/.gitignore ADDED
@@ -0,0 +1,15 @@
1
+ # See http://help.github.com/ignore-files/ for more about ignoring files.
2
+ #
3
+ # If you find yourself ignoring temporary files generated by your text editor
4
+ # or operating system, you probably want to add a global ignore instead:
5
+ # git config --global core.excludesfile ~/.gitignore_global
6
+
7
+ # Ignore bundler config
8
+ /.bundle
9
+
10
+ # Ignore the default SQLite database.
11
+ /db/*.sqlite3
12
+
13
+ # Ignore all logfiles and tempfiles.
14
+ .idea/
15
+ pkg/
data/.travis.yml ADDED
@@ -0,0 +1,7 @@
1
+ language: ruby
2
+ rvm:
3
+ # - "1.9.2"
4
+ - "1.9.3"
5
+ - "2.0.0"
6
+ # uncomment this line if your project needs to run something other than `rake`:
7
+ # script: bundle exec rspec spec
data/BSD-LICENSE ADDED
@@ -0,0 +1,24 @@
1
+ Copyright (c) 2013, Jenua Boiko
2
+
3
+ All rights reserved.
4
+ Redistribution and use in source and binary forms, with or without
5
+ modification, are permitted provided that the following conditions are met:
6
+
7
+ * Redistributions of source code must retain the above copyright
8
+ notice, this list of conditions and the following disclaimer.
9
+ * Redistributions in binary form must reproduce the above copyright
10
+ notice, this list of conditions and the following disclaimer in the
11
+ documentation and/or other materials provided with the distribution.
12
+ * Names of its contributors may be used to endorse or promote products
13
+ derived from this software without specific prior written permission.
14
+
15
+ THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY
16
+ EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
17
+ WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
18
+ DISCLAIMED. IN NO EVENT SHALL THE REGENTS AND CONTRIBUTORS BE LIABLE FOR ANY
19
+ DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
20
+ (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
21
+ LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
22
+ ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
23
+ (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
24
+ SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
data/Gemfile ADDED
@@ -0,0 +1,4 @@
1
+ source :rubygems
2
+ gemspec
3
+
4
+ gem "rspec-rails", :group => [:development, :test]
data/Gemfile.lock ADDED
@@ -0,0 +1,72 @@
1
+ PATH
2
+ remote: .
3
+ specs:
4
+ action_mailer_x509 (0.6.2)
5
+ actionmailer
6
+ mail
7
+ rake
8
+
9
+ GEM
10
+ remote: http://rubygems.org/
11
+ specs:
12
+ actionmailer (4.0.0)
13
+ actionpack (= 4.0.0)
14
+ mail (~> 2.5.3)
15
+ actionpack (4.0.0)
16
+ activesupport (= 4.0.0)
17
+ builder (~> 3.1.0)
18
+ erubis (~> 2.7.0)
19
+ rack (~> 1.5.2)
20
+ rack-test (~> 0.6.2)
21
+ activesupport (4.0.0)
22
+ i18n (~> 0.6, >= 0.6.4)
23
+ minitest (~> 4.2)
24
+ multi_json (~> 1.3)
25
+ thread_safe (~> 0.1)
26
+ tzinfo (~> 0.3.37)
27
+ atomic (1.1.12)
28
+ builder (3.1.4)
29
+ diff-lcs (1.2.4)
30
+ erubis (2.7.0)
31
+ i18n (0.6.5)
32
+ mail (2.5.4)
33
+ mime-types (~> 1.16)
34
+ treetop (~> 1.4.8)
35
+ mime-types (1.23)
36
+ minitest (4.7.5)
37
+ multi_json (1.7.9)
38
+ polyglot (0.3.3)
39
+ rack (1.5.2)
40
+ rack-test (0.6.2)
41
+ rack (>= 1.0)
42
+ railties (4.0.0)
43
+ actionpack (= 4.0.0)
44
+ activesupport (= 4.0.0)
45
+ rake (>= 0.8.7)
46
+ thor (>= 0.18.1, < 2.0)
47
+ rake (10.1.0)
48
+ rspec-core (2.14.4)
49
+ rspec-expectations (2.14.1)
50
+ diff-lcs (>= 1.1.3, < 2.0)
51
+ rspec-mocks (2.14.3)
52
+ rspec-rails (2.14.0)
53
+ actionpack (>= 3.0)
54
+ activesupport (>= 3.0)
55
+ railties (>= 3.0)
56
+ rspec-core (~> 2.14.0)
57
+ rspec-expectations (~> 2.14.0)
58
+ rspec-mocks (~> 2.14.0)
59
+ thor (0.18.1)
60
+ thread_safe (0.1.2)
61
+ atomic
62
+ treetop (1.4.14)
63
+ polyglot
64
+ polyglot (>= 0.3.1)
65
+ tzinfo (0.3.37)
66
+
67
+ PLATFORMS
68
+ ruby
69
+
70
+ DEPENDENCIES
71
+ action_mailer_x509!
72
+ rspec-rails
data/README.rdoc ADDED
@@ -0,0 +1,233 @@
1
+ {<img src="https://travis-ci.org/jeyboy/action_mailer_x509.png?branch=master" alt="Build Status" />}[https://travis-ci.org/jeyboy/action_mailer_x509]
2
+
3
+ = ActionmailerX509
4
+
5
+ Allows you to send X509 signed and/or crypted mails for Ruby on Rails. Also my you possibility verify and decrypt X509 signed and/or crypted mails.
6
+
7
+ It has been tested with Rails 3.2.12.
8
+
9
+ == Creation of the certificates
10
+
11
+ (1) Generate your own Certificate Authority (CA).
12
+
13
+ openssl genrsa -des3 -out ca.key 4096
14
+ openssl req -new -x509 -days 365 -key ca.key -out ca.crt
15
+
16
+ (2) Generate a server key and request for signing (csr).
17
+
18
+ Note : use your email address for the Common Name (CN) field
19
+
20
+ openssl genrsa -des3 -out server.key 4096
21
+ openssl req -new -key server.key -out server.csr
22
+
23
+ (3) Sign the certificate signing request (csr) with the self-created
24
+ certificate authority (CA) that you made earlier.
25
+
26
+ openssl x509 -req -days 365 -in server.csr -CA ca.crt -CAkey ca.key -set_serial 01 -out server.crt
27
+
28
+ (3 bis) or self sign your certificate with the same key.
29
+
30
+ openssl x509 -req -days 365 -in server.csr -signkey server.key -out server.crt
31
+
32
+ (4) Compute all thoses files into a PCKS#12 file (so you can include it in your mailer):
33
+
34
+ openssl pkcs12 -export -in server.crt -inkey server.key -certfile ca.key -name "My Cert" -out name-cert.p12
35
+
36
+ == Extracting the files from a PKCS#12 file
37
+
38
+ If you have a PKCS#12 file, usualy named .p12, you can extract the required files with
39
+ the following commands.
40
+
41
+ (1) Extract the private key
42
+
43
+ openssl pkcs12 -in file_input.p12 -clcerts -nocerts -out file_out.key -nodes
44
+
45
+ (2) Extract the certificate
46
+
47
+ openssl pkcs12 -in file_input.p12 -clcerts -nokeys -out file_out.crt -nodes
48
+
49
+ Please note the -nodes to leave the private key uncrypted, use -des if you wish
50
+ to protect it.
51
+
52
+ == Common way to connect your certificates
53
+
54
+ A lot of mailer apps has the same procedure of certificate inclusion which include next steps :
55
+
56
+ (1) Open the Preferences.
57
+ (2) Go to Advanced and open the Certificates tab. Click on View Certificates.
58
+ (3) Select the Your Certificates tab and click on Import. Browse the .p12 file you created and hit Open. Every time you import a certificate, you will need to give the export passphrase you specified when you created the .p12 document.
59
+ (4) Next, go to the Servers tab and click Import again. Here, browse the .crt file belonging to your certificate (there are two if you created a certificate authority).
60
+ (5) Still on the same tab, select the newly imported entry and click Edit.
61
+ (6) Select Trust the authenticity of this certificate and click Edit CA Trust.
62
+
63
+ You only need to do the next step if you created a CA.
64
+
65
+ (1) Go to the Authorities tab and hit Import.
66
+ (2) Now select the .crt file belonging to your certificate authority and hit Open. You will then be asked how far you want to trust the certificate authority. After pressing OK the created CA will be listed on the tab.
67
+
68
+ For Mac OS procedure has some differences:
69
+
70
+ To use your certificate on Mac, import the certificate into Keychain Access on that Mac. Double-click the certificate
71
+ file. If Keychain Access can’t import the certificate, drag the file onto the Keychain Access icon in Finder.
72
+ If you still can’t import the certificate, the certificate may have expired or may be invalid. You can verify whether
73
+ your certificate is successfully installed if it appears in the My Certificates category in Keychain Access.
74
+ Open your certificate in Keychain Access and make sure its trust setting is “Use System Defaults” or “Always Trust.”
75
+
76
+ == INSTALLING
77
+
78
+ Put this line in your Gemfile
79
+
80
+ gem 'actionmailer_x509'
81
+
82
+ == USING
83
+
84
+ First for all - run install generator, which adds configuration file
85
+
86
+ rails g action_mailer_x509:install
87
+
88
+ After the process, add base configurations for emails processing in '/config/initializers/x509_settings'
89
+
90
+ config.add_configuration :demo,
91
+ {
92
+ sign_enable: false,
93
+ crypt_enable: true,
94
+ sign_cert: 'cert.crt',
95
+ sign_key: 'cert.key',
96
+ sign_passphrase: 'demo',
97
+ crypt_cert: 'cert.crt',
98
+ crypt_key: 'cert.key',
99
+ crypt_passphrase: 'demo',
100
+ certs_path: Rails.root.join('certs')
101
+ }
102
+
103
+ config.add_configuration :none,
104
+ {
105
+ sign_enable: false,
106
+ crypt_enable: false,
107
+ }
108
+
109
+ and set default configuration
110
+
111
+ config.default_configuration = :hisp
112
+
113
+ You may also add the configurations dynamically in any place.
114
+
115
+ And you may also change the default configuration in any place of the program:
116
+
117
+ 1) Change globally
118
+
119
+ ActionMailerX509.default_configuration = :demo
120
+
121
+ 2) Change only for decoding and verifyng if you use Mail object
122
+
123
+ Mail.new(encoded_text).proceed(configuration)
124
+
125
+ If you set configuration as nil in "proceed" func, "ActionMailerX509.default_configuration" will be used.
126
+
127
+ == HELPERS
128
+
129
+ You may use some helpers for fast encoding in case when you proceed received email. Helper has the following signature:
130
+
131
+ method_name_as_new_encoding
132
+
133
+ For example:
134
+
135
+ mail = Mail.new(raw_email)
136
+ mail.body => return body in default encoding
137
+ mail.body_as_koi8_r => return body in koi8-r encoding
138
+
139
+ == USING TEST
140
+
141
+ You mau use rspec tests by command
142
+
143
+ bundle exec rake
144
+
145
+ or use next rake tests:
146
+
147
+ Start all main tests
148
+
149
+ rake action_mailer_x509:all
150
+
151
+ You can benchmark the gem with:
152
+
153
+ rake action_mailer_x509:performance_test
154
+
155
+ Send yourself a signed email with:
156
+
157
+ rake action_mailer_x509:send_test
158
+
159
+ Verify the gem which generates valid signature
160
+
161
+ rake action_mailer_x509:verify_signature
162
+
163
+ Generate a signed email in a local file
164
+
165
+ rake action_mailer_x509:generate_mail
166
+
167
+ Generates a crypted mail in a file
168
+
169
+ rake action_mailer_x509:generate_crypted_mail
170
+
171
+ Verify the gem which generates valid encrypted mail
172
+
173
+ rake action_mailer_x509:verify_crypt
174
+
175
+ Check if crypt text is valid by openssl
176
+
177
+ rake action_mailer_x509:verify_crypt_by_openssl
178
+
179
+ Check sign and crypt
180
+
181
+ rake action_mailer_x509:verify_sign_and_crypt
182
+
183
+ == REQUIREMENTS
184
+
185
+ * Ruby 1.9 or later (Ruby 1.8 is not tested)
186
+ * Rails 3.2 or later (All other versions are not tested)
187
+ * OpenSSL 0.9.8e or later and Ruby/OpenSSL 1.8.6.36 or later
188
+
189
+ == Mail User Agent tested
190
+
191
+ We checked with the following MUA for making sure the signed mails are
192
+ readable.
193
+
194
+ * Thunderbird 15.0: OK
195
+ * Apple Mail.app: OK
196
+ * Google Mail: A file smime.p7s appears as attachment
197
+ * Google Mail + Penango: OK
198
+
199
+ == AUTHORS
200
+
201
+ Gem was done by Jenua Boiko <jeyboy1985@gmail.com>.
202
+ Inspired by gem of petRUShka[https://github.com/petRUShka]
203
+
204
+ Special thanks to Ekaterina Krivich[https://github.com/kiote].
205
+
206
+ This code is under the BSD license.
207
+
208
+ == LICENSE
209
+
210
+ Copyright (c) 2013, Jenua Boiko
211
+
212
+ All rights reserved.
213
+ Redistribution and use in source and binary forms, with or without
214
+ modification, are permitted provided that the following conditions are met:
215
+
216
+ * Redistributions of source code must retain the above copyright
217
+ notice, this list of conditions and the following disclaimer.
218
+ * Redistributions in binary form must reproduce the above copyright
219
+ notice, this list of conditions and the following disclaimer in the
220
+ documentation and/or other materials provided with the distribution.
221
+ * Names of its contributors may be used to endorse or promote products
222
+ derived from this software without specific prior written permission.
223
+
224
+ THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY
225
+ EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
226
+ WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
227
+ DISCLAIMED. IN NO EVENT SHALL THE REGENTS AND CONTRIBUTORS BE LIABLE FOR ANY
228
+ DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
229
+ (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
230
+ LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
231
+ ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
232
+ (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
233
+ SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
data/Rakefile ADDED
@@ -0,0 +1,7 @@
1
+ require 'bundler'
2
+ require 'rspec/core/rake_task'
3
+
4
+ Bundler::GemHelper.install_tasks
5
+
6
+ RSpec::Core::RakeTask.new(:spec)
7
+ task :default => :spec
@@ -0,0 +1,19 @@
1
+ Gem::Specification.new do |s|
2
+ s.name = 'action_mailer_x509'
3
+ s.version = '0.7.0'
4
+ s.authors = ['Jenua Boiko']
5
+ s.email = 'jeyboy1985@gmail.com'
6
+ s.files = `git ls-files`.split("\n")
7
+ s.test_files = `git ls-files -- {test,spec,features}/*`.split("\n")
8
+ s.homepage = 'http://github.com/jeyboy/action_mailer_x509'
9
+ s.require_path = 'lib'
10
+ s.rubygems_version = '1.3.5'
11
+ s.summary = "This Rails gem allows you to send X509 signed and\\or crypted mails."
12
+ s.license = 'BSD'
13
+
14
+ s.add_dependency 'rake'
15
+ s.add_dependency 'actionmailer'
16
+ s.add_dependency 'mail'
17
+ #s.add_development_dependency 'rspec'
18
+ end
19
+
data/certs/ca.crt ADDED
@@ -0,0 +1,35 @@
1
+ -----BEGIN CERTIFICATE-----
2
+ MIIGBTCCA+2gAwIBAgIJAOKsbt/Ktd4yMA0GCSqGSIb3DQEBBQUAMIGYMQswCQYD
3
+ VQQGEwJVUzETMBEGA1UECAwKQ2FsaWZvcm5pYTESMBAGA1UEBwwJUGFsby1BbHRv
4
+ MREwDwYDVQQKDAhQZWxlc2VuZDENMAsGA1UECwwETWFpbjEbMBkGA1UEAwwSa2F0
5
+ eWFAcGVsZXNlbmQuY29tMSEwHwYJKoZIhvcNAQkBFhJrYXR5YUBwZWxlc2VuZC5j
6
+ b20wHhcNMTMwNzExMTExNjAxWhcNMTQwNzExMTExNjAxWjCBmDELMAkGA1UEBhMC
7
+ VVMxEzARBgNVBAgMCkNhbGlmb3JuaWExEjAQBgNVBAcMCVBhbG8tQWx0bzERMA8G
8
+ A1UECgwIUGVsZXNlbmQxDTALBgNVBAsMBE1haW4xGzAZBgNVBAMMEmthdHlhQHBl
9
+ bGVzZW5kLmNvbTEhMB8GCSqGSIb3DQEJARYSa2F0eWFAcGVsZXNlbmQuY29tMIIC
10
+ IjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA04cDxPpBzuVWmU+Jw4/07ru7
11
+ depsn+h9We5HnohN/Ed/eitQRSDBLstAAzsMb/jZfWQSlOuYxa22quMTXpUtPR+k
12
+ Py29Uxsg/OV3wgUlpeQToLJ1AU8y0RHKji/cp02oDQfPhqSiDwF3Q8wtT1ytF0SH
13
+ 1t7pCo4GlZEmAttsYz27fr0LK1LbTBmr5XpyHCGOg/c39GrQp2/AE++6kndBznlD
14
+ 0HxyE0ya7mFyBU2Wg3cv0SUfhpTuMpzG2oHKwSEW3oIo/r7KOL1kFaGT3/gpIxrh
15
+ kWKuIs6t14ZAdue5gfKaY0nLKrp5xkreWtqG53gjd5Tq1nWQa1UC2yUOJHbyMlem
16
+ KJu165jBuYDOrs7zUy87edhYQotWcLlufqwbx/TlloSeQzJv89AnAIDKmCr6hjty
17
+ Yh1XSNPMXGpXptIFZhboswNZkjQyzstNVG74KnmxoKy0/cELncRF3sgiKaw4EJu3
18
+ JIQgTHwoIemmpot19kCJBIBqL4DhH3HyMgpNL62E7JKS4c0b9W4lTn11akE2ADtV
19
+ pN+UtWTW1CxOGqy7SR+1bMCGHNrLA6ahx7F5UJNLRltMnQnKi5BoPvcuVqhHceqt
20
+ vGRvgLUwYBUVpq/OYlEKvp5Dv9adkjE8EXJdD0olUg1EPikKWwk1wmcjY8Nn4Qd8
21
+ LqpNVa4Gj6sf7X2a7v0CAwEAAaNQME4wHQYDVR0OBBYEFACLJSrUhG+Fvoug8lwf
22
+ Or7LiLaNMB8GA1UdIwQYMBaAFACLJSrUhG+Fvoug8lwfOr7LiLaNMAwGA1UdEwQF
23
+ MAMBAf8wDQYJKoZIhvcNAQEFBQADggIBAJl9ymKKVQtTcaxrb5YFmnJg7RO92VuA
24
+ VY50Ta+Jg4dm8o3iMFdShPvmpYGqnFFBf1UEhmwuUVft35rVicHiBV+Z8yWtUS+c
25
+ iI5p8wQWVXg1uxByxgrhi7XJYe/A1tQPxXQlMejXYJhAAl0DSBQA0eE084633RjA
26
+ +lUSyroFfYY+Ry/Z6/UcCZyd159iQWEQjcImbPe82qvLhn2Ek/xC9KbbxSZrsEaG
27
+ C18qKd4awLHWToD6md437upPr3ik53WxHL5lO4Xz6QyvAGYMOClQrab+lqxj8X2K
28
+ 6qTClgyF0K/ZIjGNk7Bkeb1AqR3JpTOpLnD3Fp17i9gbw5WJBf0hLWn5O7+mqsRB
29
+ O/tpYQMQPCn1dPq7MMHPV1awDWVgNsPxxSrD6zj1pF9vyyLONZhWve9gx4fT1gai
30
+ yDh0bFO3ZeU8tG3qgezYh9JobAlA7aUcYNv3Ul6leVqK1Aqq6kd+/AujhCWN1k7h
31
+ AYOFRfWkkJ75khZFZLy7hncb+VsXlznNEPfnZg6bqFh5j6zZmjrAHgB8b8JhCtnH
32
+ 3QWBk24cc7F2+u08IItXE0encPl1btnkr7esNr+4mbBWeZtLm6Q8Sc+M/cO1um4R
33
+ QdOwB7rL6bSx46QdDhrtDqjP7c3c0urmRjrjNfmuXUj4aNxIrDCvDmSI75YEeNft
34
+ +R7d8eARqwSj
35
+ -----END CERTIFICATE-----
data/certs/ca.key ADDED
@@ -0,0 +1,54 @@
1
+ -----BEGIN RSA PRIVATE KEY-----
2
+ Proc-Type: 4,ENCRYPTED
3
+ DEK-Info: DES-EDE3-CBC,7DA87384C868CBA5
4
+
5
+ iFNBw+WmZK8y8BoaHX0j2aK8q5zn5PjHNsmciGg2iS+i4E3iNEBn54/tFLj+jpGE
6
+ GfLB/0u5fDfx9Sc/fISz5hhXSDLuuzD8FitvRMUmzh8EwwtU5W8zLs47JlL87RzH
7
+ jJawf/CElMod3qrmfW10U6yQhStmpCkUoK48TtEkKeDE4TwHxIG1SLICFJeROlM6
8
+ L/SWNu6ogVrIid5W3EkQ+eIT4yc91w1b42NcqJiZNHaoaa0AxgBXVgqmc+PLq/sL
9
+ 4KTrQr5BCjtKjQ3SOhWWiz6xJ4o3RPM4N29CCRYIfacVfnCjL5dqzyXuvyMwhhBq
10
+ N/NZ0TdAEzktxbrvxbUphjlMZ+6GykBiIWbrWQj3S9dtlFdD0zhLQYdWPG3KHtCC
11
+ yjJBAw+7haYaPT8xsVUUieNUX+QbRUJa3MfboSpLRuRE8/pAdghsUVcrFp/qJw63
12
+ G+eKhLrdlm9W2ffhfI1ZoFWsWtB1ppErq2DYSRQ/3ZypMf3tO4rHfw42lx99mmgu
13
+ RLgklf/cKoXpfaC6SVUeUtVYuuUwW2EdGZrt48S2kGm4OzbuiJwIckb2rICEXyGw
14
+ Mpf4SAhyBudT/1Ha5bNZhiAKf94/fzSwQXY+2HY+jiEgLxyaiDtMUSlWie0epuB6
15
+ AaXGHKw8dw3d3KvkIDhToJ3s1vx7ljy2ZCetEmjoStcPqSof52L3Em9FO/aauptp
16
+ hWYzw8O4w4FnGX4TtQ+UZQeQmJozMQJaeBsxBZnCqe29ma2cznwld1GKry8hfP3F
17
+ BxotLc0lu5OhhiK/sC1h7TChGwncQHoamRGm7bZwul0STR55TjYKpSeoMdmQagbt
18
+ VPzav0xnvagp107AX1V9CwCOXxpztNQ6VrnZobcxtRJvgZR3vxtC10zboYBOQ3hb
19
+ hbRpadH857riqdgH3ZSsek3zgodMRdBw04hQQtoeiE4M2NLvu3IVl336au4FT531
20
+ mPS/eDkLO6BogOxKy80O04PyrsQ9m7WBV1GZJWTydxlHOlxRV69ExQ4Xz5baRbQJ
21
+ kLsCAsdEGy50ULrBTIfVpeVu+lu4m4X+NoBLfI9SVWGvr1lRn+mFW1hkm9WYW8jM
22
+ Alzs0BiaxVVCHtPLFnnDGIWGd/nvgg/X/j1ioMRMt7no2oSlxMQZNWS1wjd+ewfV
23
+ uWNjQrY4nN6PVL046m4lK7nKgPVq56MpTYMELMm+17/4u6WwGCO05vaXbY1ikgY+
24
+ G1cSE4jVnjhcHvASwbjzDl6gLclLZOal/xVKW8KgkUX+36HbTrCsIw00024PMrTO
25
+ ljKcq5TIf+a5NSnfZmApjo6N1FA58ePmwPe4J0U8s+b1EFDeiadlwRW94SUtsDUm
26
+ qie40BCQhISTnQZRtFs6C6hRXVsi4Hzn71a62odUc8nIi810EcAYWBpYpoCgSiJc
27
+ iocSnL5HdQZEXXsxfDEyiCPNOYOgQn3qe5xtnOPDAtOYdKT7ZwLezMo5fcMoYGzv
28
+ 4FWX9mp/QONp6C2rEwF4CDLHtuQNQJvRRO+mPXQ9BgfvIQPbdg3Kv4ZkEm9QP7SI
29
+ IMVPbnDumY8uF2HQD6v9hqlEEnw+oVef18yJxKfflKm3PlVSdB7lBHZJD9JLbV/U
30
+ RktvXbY9lxtmpNrl1mAzEljcueVCkB/857Dhwn7Rx18X+9FvBH9sjevd++bpwfKO
31
+ jsTwiMQoUPNOR64CT9w6ycDkt2Fs5tJaq6WHkgXDSDG4USFNKPXiisMtjYWe5Eoo
32
+ 6cyzhF93eeyo7YRiZOEuHmJKPVEdlz/PTDfPqGywmC52+Mfe+paB+UOynJjxDCGK
33
+ 99KSt4xjfUZ6E3V3/10fGeNgvhYuP6Nc8wDta1YztYsIsPnPKzMHSbhkxU+4HXdf
34
+ DVebaJ/sFwHRnKZEndHcfs4/r9bWSscT+g24b5bfVVQ2LqEcldtfMJXVKf722puD
35
+ 8VR4SsxzwFPf9ObQtS8kUcKTaXvlM6IowXEGMZiPCXqPUfHpdjuwAWhR+MgMhloY
36
+ /vWNjVCR5bPXdHUIx7G+kyvvFb77sDpW9Lf9uqBoqA7uEy0fol5vL9mmOukhYYp5
37
+ nzq9jab8qY5491EUDZCUDaqnbh8WUEM88xYCHvL+SRVN7VUynZC8wxGhzq6A0hqe
38
+ 3/CY1maaf5LTJEide+Y/el1iW1Q4gDqlSuRZh4iNAkKC4x51f8hYjACudtPZEjr9
39
+ CpnXFrpOwgNs4iGaUkggT0sFHzRw6tvUJRZP2EDPoZcvcRbYFbydgSVHDAC1lyrz
40
+ FwMA7H3hl1CclHtEIPPd1xF5O/DYPW/GofcHVDtBhP2TytKdOFkBlNTk+JPsA8qp
41
+ XulGpa6luEpmA5KZXRrEGujvN/F7OuPDgzP+zFVbVycbmbA0Fx7N8LZe/XVIVdt4
42
+ FwaC+ZJwruY4RpTpEYzmwmbiqn22WrIUcvxMnp6uFQ5SPElfBXEbVLpekte7RMdk
43
+ pq79bzli3Ew1xbNUqZKMzt+QB5abBNtmF3uZhb6w0jh0ecXa06+zK3rGV4H0ktz6
44
+ ucWGf+NsZYDIGGibsEnhy7HM/B+thXysj0Ku6nBb1ma6lnboFVIrdwaghRWLmL/Z
45
+ ObnnSXCnMhMK/WmEFtBLc+xal1mVQrvot+STwsZzUrgNIGlpV2g5bjy97Of3OD7U
46
+ R7rUQx7RbsKQZTn9nzUSEEdRLUF+XpW1oGrbr7JOldaB/oPcyMkP83YvWRGsir3F
47
+ 68tEUiAX/6Sl5vcG9FYpA7NrqazRyrGY25q4TeGCMmQYG+TRUn+M3oemCCFTuEJb
48
+ ClKB4QwtGcX2o2Pi618yNjP53oDE1fvmo+OhDU5zEJpmbq2kkRvuQn8DrJQT3Tac
49
+ ED2fZQGzpHnRRaTid3dn5XoQVGrqlR9D4xgXRjKf/w+EDvwRcYpyUcCsPV22GVqe
50
+ 7S+JcJE/IxfXs61So5bfq5QnaDsREtWvSn/rcknvDS+P4iSlh3vTM+EtWlnD58nd
51
+ ZwFGzS0FDwQKwiqdXMb+a0vD3IHfBHA8LpQ16xWfHOqKfDTVZ0UFyGMU8wv9FlpU
52
+ OoXsBS4FJnixzzAVYCDNpHh1ujq3EixP62LV81f7qswET6sdEmcKNUXnwehCDyer
53
+ bmCx7aRMITbnytgzkEALAk4teR9yqVIoay6mXw7stOjN+ckKgV27h9hzqYcRnI71
54
+ -----END RSA PRIVATE KEY-----