appsignal 4.5.0-java → 4.5.2-java
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +26 -0
- data/lib/appsignal/config.rb +14 -12
- data/lib/appsignal/integrations/capistrano/appsignal.cap +4 -8
- data/lib/appsignal/integrations/capistrano/capistrano_2_tasks.rb +8 -11
- data/lib/appsignal/marker.rb +1 -1
- data/lib/appsignal/version.rb +1 -1
- data/lib/appsignal.rb +19 -2
- data/resources/cacert.pem +164 -87
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 06b4723348286e7d34cd22d6dd63acf5fa6c3c009fcedb02a063762445865f66
|
4
|
+
data.tar.gz: cd669a754156ec1a8a2854efaa1e927397eae75d58f9df5e6c277e856711df91
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 483ea8070af1318b3a9d1a8c8344186ad776111dc35b67e9df73a558f9577828cbad1886f53c4aca36d565cd9d945f359024d97f7340a9f71fd9d39db25022d9
|
7
|
+
data.tar.gz: 6edd7715a85f5ae40c7ff6679ad432c16811ad45dd3541f83392c194391178174db0987a9ffd47797e1138f4df4176b03021f20e9091d6bc84df44c36acefc78
|
data/CHANGELOG.md
CHANGED
@@ -1,5 +1,31 @@
|
|
1
1
|
# AppSignal for Ruby gem Changelog
|
2
2
|
|
3
|
+
## 4.5.2
|
4
|
+
|
5
|
+
_Published on 2025-02-24._
|
6
|
+
|
7
|
+
### Fixed
|
8
|
+
|
9
|
+
- Validate application environment sources so nil values and empty strings are not valid app environments.
|
10
|
+
Symbols are now always cast to a String before set as the application environment.
|
11
|
+
|
12
|
+
```ruby
|
13
|
+
# These will no longer be accepted as valid app environments
|
14
|
+
Appsignal.configure("")
|
15
|
+
Appsignal.configure(" ")
|
16
|
+
```
|
17
|
+
|
18
|
+
(patch [bfe37be9](https://github.com/appsignal/appsignal-ruby/commit/bfe37be9ca14248f5e5a030d0cab42998d371d36))
|
19
|
+
- Fix Capistrano version 2 and 3 support when using an `appsignal.rb` config file. It will now pick up the config from `appsignal.rb` file. (patch [2a694196](https://github.com/appsignal/appsignal-ruby/commit/2a6941967435d6672c122e0aa07ec9c2de3e30bc))
|
20
|
+
|
21
|
+
## 4.5.1
|
22
|
+
|
23
|
+
_Published on 2025-02-24._
|
24
|
+
|
25
|
+
### Changed
|
26
|
+
|
27
|
+
- [b3748870](https://github.com/appsignal/appsignal-ruby/commit/b3748870b0de1973566761308c365ce5c5de7d00) patch - Update bundled trusted root certificates
|
28
|
+
|
3
29
|
## 4.5.0
|
4
30
|
|
5
31
|
_Published on 2025-02-21._
|
data/lib/appsignal/config.rb
CHANGED
@@ -39,8 +39,10 @@ module Appsignal
|
|
39
39
|
ENV.fetch("APPSIGNAL_APP_ENV", nil),
|
40
40
|
ENV.fetch("RAILS_ENV", nil),
|
41
41
|
ENV.fetch("RACK_ENV", nil)
|
42
|
-
].compact.each do |
|
43
|
-
|
42
|
+
].compact.each do |env_value|
|
43
|
+
value = env_value.to_s.strip
|
44
|
+
next if value.empty?
|
45
|
+
return value if value
|
44
46
|
end
|
45
47
|
|
46
48
|
loader_defaults.reverse.each do |loader_defaults|
|
@@ -246,8 +248,8 @@ module Appsignal
|
|
246
248
|
)
|
247
249
|
@load_yaml_file = load_yaml_file
|
248
250
|
@root_path = root_path.to_s
|
249
|
-
@
|
250
|
-
@
|
251
|
+
@yml_config_file_error = false
|
252
|
+
@yml_config_file = yml_config_file
|
251
253
|
@valid = false
|
252
254
|
|
253
255
|
@env = env.to_s
|
@@ -479,9 +481,9 @@ module Appsignal
|
|
479
481
|
|
480
482
|
# @api private
|
481
483
|
def yml_config_file?
|
482
|
-
return false unless
|
484
|
+
return false unless yml_config_file
|
483
485
|
|
484
|
-
File.exist?(
|
486
|
+
File.exist?(yml_config_file)
|
485
487
|
end
|
486
488
|
|
487
489
|
private
|
@@ -490,8 +492,8 @@ module Appsignal
|
|
490
492
|
Appsignal.internal_logger
|
491
493
|
end
|
492
494
|
|
493
|
-
def
|
494
|
-
@
|
495
|
+
def yml_config_file
|
496
|
+
@yml_config_file ||=
|
495
497
|
root_path.nil? ? nil : File.join(root_path, "config", "appsignal.yml")
|
496
498
|
end
|
497
499
|
|
@@ -510,7 +512,7 @@ module Appsignal
|
|
510
512
|
return unless yml_config_file?
|
511
513
|
|
512
514
|
read_options = YAML::VERSION >= "4.0.0" ? { :aliases => true } : {}
|
513
|
-
configurations = YAML.load(ERB.new(File.read(
|
515
|
+
configurations = YAML.load(ERB.new(File.read(yml_config_file)).result, **read_options)
|
514
516
|
config_for_this_env = configurations[env]
|
515
517
|
if config_for_this_env
|
516
518
|
config_for_this_env.transform_keys(&:to_sym)
|
@@ -519,10 +521,10 @@ module Appsignal
|
|
519
521
|
nil
|
520
522
|
end
|
521
523
|
rescue => e
|
522
|
-
@
|
524
|
+
@yml_config_file_error = true
|
523
525
|
message = "An error occurred while loading the AppSignal config file. " \
|
524
526
|
"Not starting AppSignal.\n" \
|
525
|
-
"File: #{
|
527
|
+
"File: #{yml_config_file.inspect}\n" \
|
526
528
|
"#{e.class.name}: #{e}"
|
527
529
|
Kernel.warn "appsignal: #{message}"
|
528
530
|
logger.error "#{message}\n#{e.backtrace.join("\n")}"
|
@@ -574,7 +576,7 @@ module Appsignal
|
|
574
576
|
# If an error was detected during config file reading/parsing and the new
|
575
577
|
# behavior is enabled to not start AppSignal on incomplete config, do not
|
576
578
|
# start AppSignal.
|
577
|
-
config[:active] = false if @
|
579
|
+
config[:active] = false if @yml_config_file_error
|
578
580
|
|
579
581
|
if config_hash[:activejob_report_errors] == "discard" &&
|
580
582
|
!Appsignal::Hooks::ActiveJobHook.version_7_1_or_higher?
|
@@ -8,22 +8,18 @@ namespace :appsignal do
|
|
8
8
|
user = fetch(:appsignal_user, ENV["USER"] || ENV.fetch("USERNAME", nil))
|
9
9
|
revision = fetch(:appsignal_revision, fetch(:current_revision))
|
10
10
|
|
11
|
-
|
12
|
-
|
13
|
-
appsignal_env
|
14
|
-
).tap do |c|
|
15
|
-
c.merge_dsl_options(fetch(:appsignal_config, {}))
|
16
|
-
c.validate
|
11
|
+
Appsignal._load_config!(appsignal_env) do |config|
|
12
|
+
config&.merge_dsl_options(fetch(:appsignal_config, {}))
|
17
13
|
end
|
18
14
|
Appsignal._start_logger
|
19
15
|
|
20
|
-
if
|
16
|
+
if Appsignal.config&.active?
|
21
17
|
marker_data = {
|
22
18
|
:revision => revision,
|
23
19
|
:user => user
|
24
20
|
}
|
25
21
|
|
26
|
-
marker = Appsignal::Marker.new(marker_data,
|
22
|
+
marker = Appsignal::Marker.new(marker_data, Appsignal.config)
|
27
23
|
# {#dry_run?} helper was added in Capistrano 3.5.0
|
28
24
|
# https://github.com/capistrano/capistrano/commit/38d8d6d2c8485f1b5643857465b16ff01da57aff
|
29
25
|
if respond_to?(:dry_run?) && dry_run?
|
@@ -5,40 +5,37 @@ module Appsignal
|
|
5
5
|
# @api private
|
6
6
|
class Capistrano
|
7
7
|
def self.tasks(config)
|
8
|
-
config.load do
|
8
|
+
config.load do
|
9
9
|
after "deploy", "appsignal:deploy"
|
10
10
|
after "deploy:migrations", "appsignal:deploy"
|
11
11
|
|
12
12
|
namespace :appsignal do
|
13
13
|
task :deploy do
|
14
|
-
|
14
|
+
appsignal_env = fetch(:appsignal_env,
|
15
15
|
fetch(:stage, fetch(:rails_env, fetch(:rack_env, "production"))))
|
16
16
|
user = fetch(:appsignal_user, ENV["USER"] || ENV.fetch("USERNAME", nil))
|
17
17
|
revision = fetch(:appsignal_revision, fetch(:current_revision))
|
18
18
|
|
19
|
-
|
20
|
-
|
21
|
-
env
|
22
|
-
).tap do |c|
|
23
|
-
c.merge_dsl_options(fetch(:appsignal_config, {}))
|
24
|
-
c.validate
|
19
|
+
Appsignal._load_config!(appsignal_env) do |conf|
|
20
|
+
conf&.merge_dsl_options(fetch(:appsignal_config, {}))
|
25
21
|
end
|
26
22
|
Appsignal._start_logger
|
27
23
|
|
28
|
-
if
|
24
|
+
if Appsignal.config&.active?
|
29
25
|
marker_data = {
|
30
26
|
:revision => revision,
|
31
27
|
:user => user
|
32
28
|
}
|
33
29
|
|
34
|
-
marker = Marker.new(marker_data,
|
30
|
+
marker = Marker.new(marker_data, Appsignal.config)
|
35
31
|
if config.dry_run
|
36
32
|
puts "Dry run: AppSignal deploy marker not actually sent."
|
37
33
|
else
|
38
34
|
marker.transmit
|
39
35
|
end
|
40
36
|
else
|
41
|
-
puts "Not notifying of deploy, config is not active for
|
37
|
+
puts "Not notifying of deploy, config is not active for " \
|
38
|
+
"environment: #{appsignal_env}"
|
42
39
|
end
|
43
40
|
end
|
44
41
|
end
|
data/lib/appsignal/marker.rb
CHANGED
@@ -49,7 +49,7 @@ module Appsignal
|
|
49
49
|
# @return [void]
|
50
50
|
def transmit
|
51
51
|
transmitter = Transmitter.new(ACTION, config)
|
52
|
-
puts "Notifying AppSignal of deploy with
|
52
|
+
puts "Notifying AppSignal of '#{config.env}' deploy with " \
|
53
53
|
"revision: #{marker_data[:revision]}, user: #{marker_data[:user]}"
|
54
54
|
|
55
55
|
response = transmitter.transmit(marker_data)
|
data/lib/appsignal/version.rb
CHANGED
data/lib/appsignal.rb
CHANGED
@@ -152,7 +152,12 @@ module Appsignal
|
|
152
152
|
# @param env_var [String, NilClass] Used by diagnose CLI to pass through
|
153
153
|
# the environment CLI option value.
|
154
154
|
# @api private
|
155
|
-
def _load_config!(env_param = nil)
|
155
|
+
def _load_config!(env_param = nil, &block)
|
156
|
+
# Ensure it's not an empty string if it's a value
|
157
|
+
proper_env_param = env_param&.to_s&.strip
|
158
|
+
# Unset it if it's an empty string
|
159
|
+
proper_env_param = nil if proper_env_param&.empty?
|
160
|
+
|
156
161
|
context = Appsignal::Config::Context.new(
|
157
162
|
:env => Config.determine_env(env_param),
|
158
163
|
:root_path => Config.determine_root_path
|
@@ -171,13 +176,25 @@ module Appsignal
|
|
171
176
|
Appsignal::Utils::StdoutAndLoggerMessage.warning(message)
|
172
177
|
else
|
173
178
|
# Load it when no config is present
|
174
|
-
|
179
|
+
#
|
180
|
+
# We don't pass the `env_var` or `context.env` here so that the
|
181
|
+
# `Appsignal.configure` or `Appsignal.start` can figure out the
|
182
|
+
# environment themselves if it was not explicitly set.
|
183
|
+
# This way we prevent forcing an environment that's auto loaded on
|
184
|
+
# the to-be-loaded config file.
|
185
|
+
#
|
186
|
+
# The `(proper)_env_param` is only set when it's explicitly set,
|
187
|
+
# which means it needs to override any auto detected environment.
|
188
|
+
load_dsl_config_file(context.dsl_config_file, proper_env_param)
|
175
189
|
end
|
176
190
|
else
|
177
191
|
# Load config if no config file was found and no config is present yet
|
178
192
|
# This will load the config/appsignal.yml file automatically
|
179
193
|
@config ||= Config.new(context.root_path, context.env)
|
180
194
|
end
|
195
|
+
# Allow a block to be given to customize the config and override any
|
196
|
+
# loaded config before it's validated.
|
197
|
+
block.call(config) if block_given?
|
181
198
|
# Validate the config, if present
|
182
199
|
config&.validate
|
183
200
|
end
|
data/resources/cacert.pem
CHANGED
@@ -1,7 +1,9 @@
|
|
1
1
|
##
|
2
2
|
## Bundle of CA Root Certificates
|
3
3
|
##
|
4
|
-
## Certificate data from Mozilla as of: Tue Dec
|
4
|
+
## Certificate data from Mozilla as of: Tue Dec 31 04:12:05 2024 GMT
|
5
|
+
##
|
6
|
+
## Find updated versions here: https://curl.se/docs/caextract.html
|
5
7
|
##
|
6
8
|
## This is a bundle of X.509 certificates of public Certificate Authorities
|
7
9
|
## (CA). These were automatically extracted from Mozilla's root certificates
|
@@ -14,7 +16,7 @@
|
|
14
16
|
## Just configure this file as the SSLCACertificateFile.
|
15
17
|
##
|
16
18
|
## Conversion done with mk-ca-bundle.pl version 1.29.
|
17
|
-
## SHA256:
|
19
|
+
## SHA256: c99d6d3f8d3d4e47719ba2b648992f5b58b150128d3aca3c05c566d8dc98e116
|
18
20
|
##
|
19
21
|
|
20
22
|
|
@@ -582,27 +584,6 @@ NwUASZQDhETnv0Mxz3WLJdH0pmT1kvarBes96aULNmLazAZfNou2XjG4Kvte9nHfRCaexOYNkbQu
|
|
582
584
|
dZWAUWpLMKawYqGT8ZvYzsRjdT9ZR7E=
|
583
585
|
-----END CERTIFICATE-----
|
584
586
|
|
585
|
-
SecureSign RootCA11
|
586
|
-
===================
|
587
|
-
-----BEGIN CERTIFICATE-----
|
588
|
-
MIIDbTCCAlWgAwIBAgIBATANBgkqhkiG9w0BAQUFADBYMQswCQYDVQQGEwJKUDErMCkGA1UEChMi
|
589
|
-
SmFwYW4gQ2VydGlmaWNhdGlvbiBTZXJ2aWNlcywgSW5jLjEcMBoGA1UEAxMTU2VjdXJlU2lnbiBS
|
590
|
-
b290Q0ExMTAeFw0wOTA0MDgwNDU2NDdaFw0yOTA0MDgwNDU2NDdaMFgxCzAJBgNVBAYTAkpQMSsw
|
591
|
-
KQYDVQQKEyJKYXBhbiBDZXJ0aWZpY2F0aW9uIFNlcnZpY2VzLCBJbmMuMRwwGgYDVQQDExNTZWN1
|
592
|
-
cmVTaWduIFJvb3RDQTExMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA/XeqpRyQBTvL
|
593
|
-
TJszi1oURaTnkBbR31fSIRCkF/3frNYfp+TbfPfs37gD2pRY/V1yfIw/XwFndBWW4wI8h9uuywGO
|
594
|
-
wvNmxoVF9ALGOrVisq/6nL+k5tSAMJjzDbaTj6nU2DbysPyKyiyhFTOVMdrAG/LuYpmGYz+/3ZMq
|
595
|
-
g6h2uRMft85OQoWPIucuGvKVCbIFtUROd6EgvanyTgp9UK31BQ1FT0Zx/Sg+U/sE2C3XZR1KG/rP
|
596
|
-
O7AxmjVuyIsG0wCR8pQIZUyxNAYAeoni8McDWc/V1uinMrPmmECGxc0nEovMe863ETxiYAcjPitA
|
597
|
-
bpSACW22s293bzUIUPsCh8U+iQIDAQABo0IwQDAdBgNVHQ4EFgQUW/hNT7KlhtQ60vFjmqC+CfZX
|
598
|
-
t94wDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEFBQADggEBAKCh
|
599
|
-
OBZmLqdWHyGcBvod7bkixTgm2E5P7KN/ed5GIaGHd48HCJqypMWvDzKYC3xmKbabfSVSSUOrTC4r
|
600
|
-
bnpwrxYO4wJs+0LmGJ1F2FXI6Dvd5+H0LgscNFxsWEr7jIhQX5Ucv+2rIrVls4W6ng+4reV6G4pQ
|
601
|
-
Oh29Dbx7VFALuUKvVaAYga1lme++5Jy/xIWrQbJUb9wlze144o4MjQlJ3WN7WmmWAiGovVJZ6X01
|
602
|
-
y8hSyn+B/tlr0/cR7SXf+Of5pPpyl4RTDaXQMhhRdlkUbA/r7F+AjHVDg8OFmP9Mni0N5HeDk061
|
603
|
-
lgeLKBObjBmNQSdJQO7e5iNEOdyhIta6A/I=
|
604
|
-
-----END CERTIFICATE-----
|
605
|
-
|
606
587
|
Microsec e-Szigno Root CA 2009
|
607
588
|
==============================
|
608
589
|
-----BEGIN CERTIFICATE-----
|
@@ -2317,40 +2298,6 @@ hcErulWuBurQB7Lcq9CClnXO0lD+mefPL5/ndtFhKvshuzHQqp9HpLIiyhY6UFfEW0NnxWViA0kB
|
|
2317
2298
|
dBb9HxEGmpv0
|
2318
2299
|
-----END CERTIFICATE-----
|
2319
2300
|
|
2320
|
-
Entrust Root Certification Authority - G4
|
2321
|
-
=========================================
|
2322
|
-
-----BEGIN CERTIFICATE-----
|
2323
|
-
MIIGSzCCBDOgAwIBAgIRANm1Q3+vqTkPAAAAAFVlrVgwDQYJKoZIhvcNAQELBQAwgb4xCzAJBgNV
|
2324
|
-
BAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQLEx9TZWUgd3d3LmVudHJ1c3Qu
|
2325
|
-
bmV0L2xlZ2FsLXRlcm1zMTkwNwYDVQQLEzAoYykgMjAxNSBFbnRydXN0LCBJbmMuIC0gZm9yIGF1
|
2326
|
-
dGhvcml6ZWQgdXNlIG9ubHkxMjAwBgNVBAMTKUVudHJ1c3QgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1
|
2327
|
-
dGhvcml0eSAtIEc0MB4XDTE1MDUyNzExMTExNloXDTM3MTIyNzExNDExNlowgb4xCzAJBgNVBAYT
|
2328
|
-
AlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQLEx9TZWUgd3d3LmVudHJ1c3QubmV0
|
2329
|
-
L2xlZ2FsLXRlcm1zMTkwNwYDVQQLEzAoYykgMjAxNSBFbnRydXN0LCBJbmMuIC0gZm9yIGF1dGhv
|
2330
|
-
cml6ZWQgdXNlIG9ubHkxMjAwBgNVBAMTKUVudHJ1c3QgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhv
|
2331
|
-
cml0eSAtIEc0MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAsewsQu7i0TD/pZJH4i3D
|
2332
|
-
umSXbcr3DbVZwbPLqGgZ2K+EbTBwXX7zLtJTmeH+H17ZSK9dE43b/2MzTdMAArzE+NEGCJR5WIoV
|
2333
|
-
3imz/f3ET+iq4qA7ec2/a0My3dl0ELn39GjUu9CH1apLiipvKgS1sqbHoHrmSKvS0VnM1n4j5pds
|
2334
|
-
8ELl3FFLFUHtSUrJ3hCX1nbB76W1NhSXNdh4IjVS70O92yfbYVaCNNzLiGAMC1rlLAHGVK/XqsEQ
|
2335
|
-
e9IFWrhAnoanw5CGAlZSCXqc0ieCU0plUmr1POeo8pyvi73TDtTUXm6Hnmo9RR3RXRv06QqsYJn7
|
2336
|
-
ibT/mCzPfB3pAqoEmh643IhuJbNsZvc8kPNXwbMv9W3y+8qh+CmdRouzavbmZwe+LGcKKh9asj5X
|
2337
|
-
xNMhIWNlUpEbsZmOeX7m640A2Vqq6nPopIICR5b+W45UYaPrL0swsIsjdXJ8ITzI9vF01Bx7owVV
|
2338
|
-
7rtNOzK+mndmnqxpkCIHH2E6lr7lmk/MBTwoWdPBDFSoWWG9yHJM6Nyfh3+9nEg2XpWjDrk4JFX8
|
2339
|
-
dWbrAuMINClKxuMrLzOg2qOGpRKX/YAr2hRC45K9PvJdXmd0LhyIRyk0X+IyqJwlN4y6mACXi0mW
|
2340
|
-
Hv0liqzc2thddG5msP9E36EYxr5ILzeUePiVSj9/E15dWf10hkNjc0kCAwEAAaNCMEAwDwYDVR0T
|
2341
|
-
AQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFJ84xFYjwznooHFs6FRM5Og6sb9n
|
2342
|
-
MA0GCSqGSIb3DQEBCwUAA4ICAQAS5UKme4sPDORGpbZgQIeMJX6tuGguW8ZAdjwD+MlZ9POrYs4Q
|
2343
|
-
jbRaZIxowLByQzTSGwv2LFPSypBLhmb8qoMi9IsabyZIrHZ3CL/FmFz0Jomee8O5ZDIBf9PD3Vht
|
2344
|
-
7LGrhFV0d4QEJ1JrhkzO3bll/9bGXp+aEJlLdWr+aumXIOTkdnrG0CSqkM0gkLpHZPt/B7NTeLUK
|
2345
|
-
YvJzQ85BK4FqLoUWlFPUa19yIqtRLULVAJyZv967lDtX/Zr1hstWO1uIAeV8KEsD+UmDfLJ/fOPt
|
2346
|
-
jqF/YFOOVZ1QNBIPt5d7bIdKROf1beyAN/BYGW5KaHbwH5Lk6rWS02FREAutp9lfx1/cH6NcjKF+
|
2347
|
-
m7ee01ZvZl4HliDtC3T7Zk6LERXpgUl+b7DUUH8i119lAg2m9IUe2K4GS0qn0jFmwvjO5QimpAKW
|
2348
|
-
RGhXxNUzzxkvFMSUHHuk2fCfDrGA4tGeEWSpiBE6doLlYsKA2KSD7ZPvfC+QsDJMlhVoSFLUmQjA
|
2349
|
-
JOgc47OlIQ6SwJAfzyBfyjs4x7dtOvPmRLgOMWuIjnDrnBdSqEGULoe256YSxXXfW8AKbnuk5F6G
|
2350
|
-
+TaU33fD6Q3AOfF5u0aOq0NZJ7cguyPpVkAh7DE9ZapD8j3fcEThuk0mEDuYn/PIjhs4ViFqUZPT
|
2351
|
-
kcpG2om3PVODLAgfi49T3f+sHw==
|
2352
|
-
-----END CERTIFICATE-----
|
2353
|
-
|
2354
2301
|
Microsoft ECC Root Certificate Authority 2017
|
2355
2302
|
=============================================
|
2356
2303
|
-----BEGIN CERTIFICATE-----
|
@@ -3168,36 +3115,6 @@ AwMDaAAwZQIxALGOWiDDshliTd6wT99u0nCK8Z9+aozmut6Dacpps6kFtZaSF4fC0urQe87YQVt8
|
|
3168
3115
|
rgIwRt7qy12a7DLCZRawTDBcMPPaTnOGBtjOiQRINzf43TNRnXCve1XYAS59BWQOhriR
|
3169
3116
|
-----END CERTIFICATE-----
|
3170
3117
|
|
3171
|
-
Security Communication RootCA3
|
3172
|
-
==============================
|
3173
|
-
-----BEGIN CERTIFICATE-----
|
3174
|
-
MIIFfzCCA2egAwIBAgIJAOF8N0D9G/5nMA0GCSqGSIb3DQEBDAUAMF0xCzAJBgNVBAYTAkpQMSUw
|
3175
|
-
IwYDVQQKExxTRUNPTSBUcnVzdCBTeXN0ZW1zIENPLixMVEQuMScwJQYDVQQDEx5TZWN1cml0eSBD
|
3176
|
-
b21tdW5pY2F0aW9uIFJvb3RDQTMwHhcNMTYwNjE2MDYxNzE2WhcNMzgwMTE4MDYxNzE2WjBdMQsw
|
3177
|
-
CQYDVQQGEwJKUDElMCMGA1UEChMcU0VDT00gVHJ1c3QgU3lzdGVtcyBDTy4sTFRELjEnMCUGA1UE
|
3178
|
-
AxMeU2VjdXJpdHkgQ29tbXVuaWNhdGlvbiBSb290Q0EzMIICIjANBgkqhkiG9w0BAQEFAAOCAg8A
|
3179
|
-
MIICCgKCAgEA48lySfcw3gl8qUCBWNO0Ot26YQ+TUG5pPDXC7ltzkBtnTCHsXzW7OT4rCmDvu20r
|
3180
|
-
hvtxosis5FaU+cmvsXLUIKx00rgVrVH+hXShuRD+BYD5UpOzQD11EKzAlrenfna84xtSGc4RHwsE
|
3181
|
-
NPXY9Wk8d/Nk9A2qhd7gCVAEF5aEt8iKvE1y/By7z/MGTfmfZPd+pmaGNXHIEYBMwXFAWB6+oHP2
|
3182
|
-
/D5Q4eAvJj1+XCO1eXDe+uDRpdYMQXF79+qMHIjH7Iv10S9VlkZ8WjtYO/u62C21Jdp6Ts9EriGm
|
3183
|
-
npjKIG58u4iFW/vAEGK78vknR+/RiTlDxN/e4UG/VHMgly1s2vPUB6PmudhvrvyMGS7TZ2crldtY
|
3184
|
-
XLVqAvO4g160a75BflcJdURQVc1aEWEhCmHCqYj9E7wtiS/NYeCVvsq1e+F7NGcLH7YMx3weGVPK
|
3185
|
-
p7FKFSBWFHA9K4IsD50VHUeAR/94mQ4xr28+j+2GaR57GIgUssL8gjMunEst+3A7caoreyYn8xrC
|
3186
|
-
3PsXuKHqy6C0rtOUfnrQq8PsOC0RLoi/1D+tEjtCrI8Cbn3M0V9hvqG8OmpI6iZVIhZdXw3/JzOf
|
3187
|
-
GAN0iltSIEdrRU0id4xVJ/CvHozJgyJUt5rQT9nO/NkuHJYosQLTA70lUhw0Zk8jq/R3gpYd0Vcw
|
3188
|
-
CBEF/VfR2ccCAwEAAaNCMEAwHQYDVR0OBBYEFGQUfPxYchamCik0FW8qy7z8r6irMA4GA1UdDwEB
|
3189
|
-
/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDAUAA4ICAQDcAiMI4u8hOscNtybS
|
3190
|
-
YpOnpSNyByCCYN8Y11StaSWSntkUz5m5UoHPrmyKO1o5yGwBQ8IibQLwYs1OY0PAFNr0Y/Dq9HHu
|
3191
|
-
Tofjcan0yVflLl8cebsjqodEV+m9NU1Bu0soo5iyG9kLFwfl9+qd9XbXv8S2gVj/yP9kaWJ5rW4O
|
3192
|
-
H3/uHWnlt3Jxs/6lATWUVCvAUm2PVcTJ0rjLyjQIUYWg9by0F1jqClx6vWPGOi//lkkZhOpn2ASx
|
3193
|
-
YfQAW0q3nHE3GYV5v4GwxxMOdnE+OoAGrgYWp421wsTL/0ClXI2lyTrtcoHKXJg80jQDdwj98ClZ
|
3194
|
-
XSEIx2C/pHF7uNkegr4Jr2VvKKu/S7XuPghHJ6APbw+LP6yVGPO5DtxnVW5inkYO0QR4ynKudtml
|
3195
|
-
+LLfiAlhi+8kTtFZP1rUPcmTPCtk9YENFpb3ksP+MW/oKjJ0DvRMmEoYDjBU1cXrvMUVnuiZIesn
|
3196
|
-
KwkK2/HmcBhWuwzkvvnoEKQTkrgc4NtnHVMDpCKn3F2SEDzq//wbEBrD2NCcnWXL0CsnMQMeNuE9
|
3197
|
-
dnUM/0Umud1RvCPHX9jYhxBAEg09ODfnRDwYwFMJZI//1ZqmfHAuc1Uh6N//g7kdPjIe1qZ9LPFm
|
3198
|
-
6Vwdp6POXiUyK+OVrCoHzrQoeIY8LaadTdJ0MN1kURXbg4NR16/9M51NZg==
|
3199
|
-
-----END CERTIFICATE-----
|
3200
|
-
|
3201
3118
|
Security Communication ECC RootCA1
|
3202
3119
|
==================================
|
3203
3120
|
-----BEGIN CERTIFICATE-----
|
@@ -3532,3 +3449,163 @@ dVwPaFsdZcJfMw8eD/A7hvWwTruc9+olBdytoptLFwG+Qt81IR2tq670v64fG9PiO/yzcnMcmyiQ
|
|
3532
3449
|
iRM9HcEARwmWmjgb3bHPDcK0RPOWlc4yOo80nOAXx17Org3bhzjlP1v9mxnhMUF6cKojawHhRUzN
|
3533
3450
|
lM47ni3niAIi9G7oyOzWPPO5std3eqx7
|
3534
3451
|
-----END CERTIFICATE-----
|
3452
|
+
|
3453
|
+
Telekom Security TLS ECC Root 2020
|
3454
|
+
==================================
|
3455
|
+
-----BEGIN CERTIFICATE-----
|
3456
|
+
MIICQjCCAcmgAwIBAgIQNjqWjMlcsljN0AFdxeVXADAKBggqhkjOPQQDAzBjMQswCQYDVQQGEwJE
|
3457
|
+
RTEnMCUGA1UECgweRGV1dHNjaGUgVGVsZWtvbSBTZWN1cml0eSBHbWJIMSswKQYDVQQDDCJUZWxl
|
3458
|
+
a29tIFNlY3VyaXR5IFRMUyBFQ0MgUm9vdCAyMDIwMB4XDTIwMDgyNTA3NDgyMFoXDTQ1MDgyNTIz
|
3459
|
+
NTk1OVowYzELMAkGA1UEBhMCREUxJzAlBgNVBAoMHkRldXRzY2hlIFRlbGVrb20gU2VjdXJpdHkg
|
3460
|
+
R21iSDErMCkGA1UEAwwiVGVsZWtvbSBTZWN1cml0eSBUTFMgRUNDIFJvb3QgMjAyMDB2MBAGByqG
|
3461
|
+
SM49AgEGBSuBBAAiA2IABM6//leov9Wq9xCazbzREaK9Z0LMkOsVGJDZos0MKiXrPk/OtdKPD/M1
|
3462
|
+
2kOLAoC+b1EkHQ9rK8qfwm9QMuU3ILYg/4gND21Ju9sGpIeQkpT0CdDPf8iAC8GXs7s1J8nCG6NC
|
3463
|
+
MEAwHQYDVR0OBBYEFONyzG6VmUex5rNhTNHLq+O6zd6fMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0P
|
3464
|
+
AQH/BAQDAgEGMAoGCCqGSM49BAMDA2cAMGQCMHVSi7ekEE+uShCLsoRbQuHmKjYC2qBuGT8lv9pZ
|
3465
|
+
Mo7k+5Dck2TOrbRBR2Diz6fLHgIwN0GMZt9Ba9aDAEH9L1r3ULRn0SyocddDypwnJJGDSA3PzfdU
|
3466
|
+
ga/sf+Rn27iQ7t0l
|
3467
|
+
-----END CERTIFICATE-----
|
3468
|
+
|
3469
|
+
Telekom Security TLS RSA Root 2023
|
3470
|
+
==================================
|
3471
|
+
-----BEGIN CERTIFICATE-----
|
3472
|
+
MIIFszCCA5ugAwIBAgIQIZxULej27HF3+k7ow3BXlzANBgkqhkiG9w0BAQwFADBjMQswCQYDVQQG
|
3473
|
+
EwJERTEnMCUGA1UECgweRGV1dHNjaGUgVGVsZWtvbSBTZWN1cml0eSBHbWJIMSswKQYDVQQDDCJU
|
3474
|
+
ZWxla29tIFNlY3VyaXR5IFRMUyBSU0EgUm9vdCAyMDIzMB4XDTIzMDMyODEyMTY0NVoXDTQ4MDMy
|
3475
|
+
NzIzNTk1OVowYzELMAkGA1UEBhMCREUxJzAlBgNVBAoMHkRldXRzY2hlIFRlbGVrb20gU2VjdXJp
|
3476
|
+
dHkgR21iSDErMCkGA1UEAwwiVGVsZWtvbSBTZWN1cml0eSBUTFMgUlNBIFJvb3QgMjAyMzCCAiIw
|
3477
|
+
DQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAO01oYGA88tKaVvC+1GDrib94W7zgRJ9cUD/h3VC
|
3478
|
+
KSHtgVIs3xLBGYSJwb3FKNXVS2xE1kzbB5ZKVXrKNoIENqil/Cf2SfHVcp6R+SPWcHu79ZvB7JPP
|
3479
|
+
GeplfohwoHP89v+1VmLhc2o0mD6CuKyVU/QBoCcHcqMAU6DksquDOFczJZSfvkgdmOGjup5czQRx
|
3480
|
+
UX11eKvzWarE4GC+j4NSuHUaQTXtvPM6Y+mpFEXX5lLRbtLevOP1Czvm4MS9Q2QTps70mDdsipWo
|
3481
|
+
l8hHD/BeEIvnHRz+sTugBTNoBUGCwQMrAcjnj02r6LX2zWtEtefdi+zqJbQAIldNsLGyMcEWzv/9
|
3482
|
+
FIS3R/qy8XDe24tsNlikfLMR0cN3f1+2JeANxdKz+bi4d9s3cXFH42AYTyS2dTd4uaNir73Jco4v
|
3483
|
+
zLuu2+QVUhkHM/tqty1LkCiCc/4YizWN26cEar7qwU02OxY2kTLvtkCJkUPg8qKrBC7m8kwOFjQg
|
3484
|
+
rIfBLX7JZkcXFBGk8/ehJImr2BrIoVyxo/eMbcgByU/J7MT8rFEz0ciD0cmfHdRHNCk+y7AO+oML
|
3485
|
+
KFjlKdw/fKifybYKu6boRhYPluV75Gp6SG12mAWl3G0eQh5C2hrgUve1g8Aae3g1LDj1H/1Joy7S
|
3486
|
+
WWO/gLCMk3PLNaaZlSJhZQNg+y+TS/qanIA7AgMBAAGjYzBhMA4GA1UdDwEB/wQEAwIBBjAdBgNV
|
3487
|
+
HQ4EFgQUtqeXgj10hZv3PJ+TmpV5dVKMbUcwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBS2
|
3488
|
+
p5eCPXSFm/c8n5OalXl1UoxtRzANBgkqhkiG9w0BAQwFAAOCAgEAqMxhpr51nhVQpGv7qHBFfLp+
|
3489
|
+
sVr8WyP6Cnf4mHGCDG3gXkaqk/QeoMPhk9tLrbKmXauw1GLLXrtm9S3ul0A8Yute1hTWjOKWi0Fp
|
3490
|
+
kzXmuZlrYrShF2Y0pmtjxrlO8iLpWA1WQdH6DErwM807u20hOq6OcrXDSvvpfeWxm4bu4uB9tPcy
|
3491
|
+
/SKE8YXJN3nptT+/XOR0so8RYgDdGGah2XsjX/GO1WfoVNpbOms2b/mBsTNHM3dA+VKq3dSDz4V4
|
3492
|
+
mZqTuXNnQkYRIer+CqkbGmVps4+uFrb2S1ayLfmlyOw7YqPta9BO1UAJpB+Y1zqlklkg5LB9zVtz
|
3493
|
+
aL1txKITDmcZuI1CfmwMmm6gJC3VRRvcxAIU/oVbZZfKTpBQCHpCNfnqwmbU+AGuHrS+w6jv/naa
|
3494
|
+
oqYfRvaE7fzbzsQCzndILIyy7MMAo+wsVRjBfhnu4S/yrYObnqsZ38aKL4x35bcF7DvB7L6Gs4a8
|
3495
|
+
wPfc5+pbrrLMtTWGS9DiP7bY+A4A7l3j941Y/8+LN+ljX273CXE2whJdV/LItM3z7gLfEdxquVeE
|
3496
|
+
HVlNjM7IDiPCtyaaEBRx/pOyiriA8A4QntOoUAw3gi/q4Iqd4Sw5/7W0cwDk90imc6y/st53BIe0
|
3497
|
+
o82bNSQ3+pCTE4FCxpgmdTdmQRCsu/WU48IxK63nI1bMNSWSs1A=
|
3498
|
+
-----END CERTIFICATE-----
|
3499
|
+
|
3500
|
+
FIRMAPROFESIONAL CA ROOT-A WEB
|
3501
|
+
==============================
|
3502
|
+
-----BEGIN CERTIFICATE-----
|
3503
|
+
MIICejCCAgCgAwIBAgIQMZch7a+JQn81QYehZ1ZMbTAKBggqhkjOPQQDAzBuMQswCQYDVQQGEwJF
|
3504
|
+
UzEcMBoGA1UECgwTRmlybWFwcm9mZXNpb25hbCBTQTEYMBYGA1UEYQwPVkFURVMtQTYyNjM0MDY4
|
3505
|
+
MScwJQYDVQQDDB5GSVJNQVBST0ZFU0lPTkFMIENBIFJPT1QtQSBXRUIwHhcNMjIwNDA2MDkwMTM2
|
3506
|
+
WhcNNDcwMzMxMDkwMTM2WjBuMQswCQYDVQQGEwJFUzEcMBoGA1UECgwTRmlybWFwcm9mZXNpb25h
|
3507
|
+
bCBTQTEYMBYGA1UEYQwPVkFURVMtQTYyNjM0MDY4MScwJQYDVQQDDB5GSVJNQVBST0ZFU0lPTkFM
|
3508
|
+
IENBIFJPT1QtQSBXRUIwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAARHU+osEaR3xyrq89Zfe9MEkVz6
|
3509
|
+
iMYiuYMQYneEMy3pA4jU4DP37XcsSmDq5G+tbbT4TIqk5B/K6k84Si6CcyvHZpsKjECcfIr28jlg
|
3510
|
+
st7L7Ljkb+qbXbdTkBgyVcUgt5SjYzBhMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAUk+FD
|
3511
|
+
Y1w8ndYn81LsF7Kpryz3dvgwHQYDVR0OBBYEFJPhQ2NcPJ3WJ/NS7Beyqa8s93b4MA4GA1UdDwEB
|
3512
|
+
/wQEAwIBBjAKBggqhkjOPQQDAwNoADBlAjAdfKR7w4l1M+E7qUW/Runpod3JIha3RxEL2Jq68cgL
|
3513
|
+
cFBTApFwhVmpHqTm6iMxoAACMQD94vizrxa5HnPEluPBMBnYfubDl94cT7iJLzPrSA8Z94dGXSaQ
|
3514
|
+
pYXFuXqUPoeovQA=
|
3515
|
+
-----END CERTIFICATE-----
|
3516
|
+
|
3517
|
+
TWCA CYBER Root CA
|
3518
|
+
==================
|
3519
|
+
-----BEGIN CERTIFICATE-----
|
3520
|
+
MIIFjTCCA3WgAwIBAgIQQAE0jMIAAAAAAAAAATzyxjANBgkqhkiG9w0BAQwFADBQMQswCQYDVQQG
|
3521
|
+
EwJUVzESMBAGA1UEChMJVEFJV0FOLUNBMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJUV0NB
|
3522
|
+
IENZQkVSIFJvb3QgQ0EwHhcNMjIxMTIyMDY1NDI5WhcNNDcxMTIyMTU1OTU5WjBQMQswCQYDVQQG
|
3523
|
+
EwJUVzESMBAGA1UEChMJVEFJV0FOLUNBMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJUV0NB
|
3524
|
+
IENZQkVSIFJvb3QgQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDG+Moe2Qkgfh1s
|
3525
|
+
Ts6P40czRJzHyWmqOlt47nDSkvgEs1JSHWdyKKHfi12VCv7qze33Kc7wb3+szT3vsxxFavcokPFh
|
3526
|
+
V8UMxKNQXd7UtcsZyoC5dc4pztKFIuwCY8xEMCDa6pFbVuYdHNWdZsc/34bKS1PE2Y2yHer43CdT
|
3527
|
+
o0fhYcx9tbD47nORxc5zb87uEB8aBs/pJ2DFTxnk684iJkXXYJndzk834H/nY62wuFm40AZoNWDT
|
3528
|
+
Nq5xQwTxaWV4fPMf88oon1oglWa0zbfuj3ikRRjpJi+NmykosaS3Om251Bw4ckVYsV7r8Cibt4LK
|
3529
|
+
/c/WMw+f+5eesRycnupfXtuq3VTpMCEobY5583WSjCb+3MX2w7DfRFlDo7YDKPYIMKoNM+HvnKkH
|
3530
|
+
IuNZW0CP2oi3aQiotyMuRAlZN1vH4xfyIutuOVLF3lSnmMlLIJXcRolftBL5hSmO68gnFSDAS9TM
|
3531
|
+
fAxsNAwmmyYxpjyn9tnQS6Jk/zuZQXLB4HCX8SS7K8R0IrGsayIyJNN4KsDAoS/xUgXJP+92ZuJF
|
3532
|
+
2A09rZXIx4kmyA+upwMu+8Ff+iDhcK2wZSA3M2Cw1a/XDBzCkHDXShi8fgGwsOsVHkQGzaRP6AzR
|
3533
|
+
wyAQ4VRlnrZR0Bp2a0JaWHY06rc3Ga4udfmW5cFZ95RXKSWNOkyrTZpB0F8mAwIDAQABo2MwYTAO
|
3534
|
+
BgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBSdhWEUfMFib5do5E83
|
3535
|
+
QOGt4A1WNzAdBgNVHQ4EFgQUnYVhFHzBYm+XaORPN0DhreANVjcwDQYJKoZIhvcNAQEMBQADggIB
|
3536
|
+
AGSPesRiDrWIzLjHhg6hShbNcAu3p4ULs3a2D6f/CIsLJc+o1IN1KriWiLb73y0ttGlTITVX1olN
|
3537
|
+
c79pj3CjYcya2x6a4CD4bLubIp1dhDGaLIrdaqHXKGnK/nZVekZn68xDiBaiA9a5F/gZbG0jAn/x
|
3538
|
+
X9AKKSM70aoK7akXJlQKTcKlTfjF/biBzysseKNnTKkHmvPfXvt89YnNdJdhEGoHK4Fa0o635yDR
|
3539
|
+
IG4kqIQnoVesqlVYL9zZyvpoBJ7tRCT5dEA7IzOrg1oYJkK2bVS1FmAwbLGg+LhBoF1JSdJlBTrq
|
3540
|
+
/p1hvIbZv97Tujqxf36SNI7JAG7cmL3c7IAFrQI932XtCwP39xaEBDG6k5TY8hL4iuO/Qq+n1M0R
|
3541
|
+
FxbIQh0UqEL20kCGoE8jypZFVmAGzbdVAaYBlGX+bgUJurSkquLvWL69J1bY73NxW0Qz8ppy6rBe
|
3542
|
+
Pm6pUlvscG21h483XjyMnM7k8M4MZ0HMzvaAq07MTFb1wWFZk7Q+ptq4NxKfKjLji7gh7MMrZQzv
|
3543
|
+
It6IKTtM1/r+t+FHvpw+PoP7UV31aPcuIYXcv/Fa4nzXxeSDwWrruoBa3lwtcHb4yOWHh8qgnaHl
|
3544
|
+
IhInD0Q9HWzq1MKLL295q39QpsQZp6F6t5b5wR9iWqJDB0BeJsas7a5wFsWqynKKTbDPAYsDP27X
|
3545
|
+
-----END CERTIFICATE-----
|
3546
|
+
|
3547
|
+
SecureSign Root CA12
|
3548
|
+
====================
|
3549
|
+
-----BEGIN CERTIFICATE-----
|
3550
|
+
MIIDcjCCAlqgAwIBAgIUZvnHwa/swlG07VOX5uaCwysckBYwDQYJKoZIhvcNAQELBQAwUTELMAkG
|
3551
|
+
A1UEBhMCSlAxIzAhBgNVBAoTGkN5YmVydHJ1c3QgSmFwYW4gQ28uLCBMdGQuMR0wGwYDVQQDExRT
|
3552
|
+
ZWN1cmVTaWduIFJvb3QgQ0ExMjAeFw0yMDA0MDgwNTM2NDZaFw00MDA0MDgwNTM2NDZaMFExCzAJ
|
3553
|
+
BgNVBAYTAkpQMSMwIQYDVQQKExpDeWJlcnRydXN0IEphcGFuIENvLiwgTHRkLjEdMBsGA1UEAxMU
|
3554
|
+
U2VjdXJlU2lnbiBSb290IENBMTIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC6OcE3
|
3555
|
+
emhFKxS06+QT61d1I02PJC0W6K6OyX2kVzsqdiUzg2zqMoqUm048luT9Ub+ZyZN+v/mtp7JIKwcc
|
3556
|
+
J/VMvHASd6SFVLX9kHrko+RRWAPNEHl57muTH2SOa2SroxPjcf59q5zdJ1M3s6oYwlkm7Fsf0uZl
|
3557
|
+
fO+TvdhYXAvA42VvPMfKWeP+bl+sg779XSVOKik71gurFzJ4pOE+lEa+Ym6b3kaosRbnhW70CEBF
|
3558
|
+
EaCeVESE99g2zvVQR9wsMJvuwPWW0v4JhscGWa5Pro4RmHvzC1KqYiaqId+OJTN5lxZJjfU+1Uef
|
3559
|
+
NzFJM3IFTQy2VYzxV4+Kh9GtxRESOaCtAgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0P
|
3560
|
+
AQH/BAQDAgEGMB0GA1UdDgQWBBRXNPN0zwRL1SXm8UC2LEzZLemgrTANBgkqhkiG9w0BAQsFAAOC
|
3561
|
+
AQEAPrvbFxbS8hQBICw4g0utvsqFepq2m2um4fylOqyttCg6r9cBg0krY6LdmmQOmFxv3Y67ilQi
|
3562
|
+
LUoT865AQ9tPkbeGGuwAtEGBpE/6aouIs3YIcipJQMPTw4WJmBClnW8Zt7vPemVV2zfrPIpyMpce
|
3563
|
+
mik+rY3moxtt9XUa5rBouVui7mlHJzWhhpmA8zNL4WukJsPvdFlseqJkth5Ew1DgDzk9qTPxpfPS
|
3564
|
+
vWKErI4cqc1avTc7bgoitPQV55FYxTpE05Uo2cBl6XLK0A+9H7MV2anjpEcJnuDLN/v9vZfVvhga
|
3565
|
+
aaI5gdka9at/yOPiZwud9AzqVN/Ssq+xIvEg37xEHA==
|
3566
|
+
-----END CERTIFICATE-----
|
3567
|
+
|
3568
|
+
SecureSign Root CA14
|
3569
|
+
====================
|
3570
|
+
-----BEGIN CERTIFICATE-----
|
3571
|
+
MIIFcjCCA1qgAwIBAgIUZNtaDCBO6Ncpd8hQJ6JaJ90t8sswDQYJKoZIhvcNAQEMBQAwUTELMAkG
|
3572
|
+
A1UEBhMCSlAxIzAhBgNVBAoTGkN5YmVydHJ1c3QgSmFwYW4gQ28uLCBMdGQuMR0wGwYDVQQDExRT
|
3573
|
+
ZWN1cmVTaWduIFJvb3QgQ0ExNDAeFw0yMDA0MDgwNzA2MTlaFw00NTA0MDgwNzA2MTlaMFExCzAJ
|
3574
|
+
BgNVBAYTAkpQMSMwIQYDVQQKExpDeWJlcnRydXN0IEphcGFuIENvLiwgTHRkLjEdMBsGA1UEAxMU
|
3575
|
+
U2VjdXJlU2lnbiBSb290IENBMTQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDF0nqh
|
3576
|
+
1oq/FjHQmNE6lPxauG4iwWL3pwon71D2LrGeaBLwbCRjOfHw3xDG3rdSINVSW0KZnvOgvlIfX8xn
|
3577
|
+
bacuUKLBl422+JX1sLrcneC+y9/3OPJH9aaakpUqYllQC6KxNedlsmGy6pJxaeQp8E+BgQQ8sqVb
|
3578
|
+
1MWoWWd7VRxJq3qdwudzTe/NCcLEVxLbAQ4jeQkHO6Lo/IrPj8BGJJw4J+CDnRugv3gVEOuGTgpa
|
3579
|
+
/d/aLIJ+7sr2KeH6caH3iGicnPCNvg9JkdjqOvn90Ghx2+m1K06Ckm9mH+Dw3EzsytHqunQG+bOE
|
3580
|
+
kJTRX45zGRBdAuVwpcAQ0BB8b8VYSbSwbprafZX1zNoCr7gsfXmPvkPx+SgojQlD+Ajda8iLLCSx
|
3581
|
+
jVIHvXiby8posqTdDEx5YMaZ0ZPxMBoH064iwurO8YQJzOAUbn8/ftKChazcqRZOhaBgy/ac18iz
|
3582
|
+
ju3Gm5h1DVXoX+WViwKkrkMpKBGk5hIwAUt1ax5mnXkvpXYvHUC0bcl9eQjs0Wq2XSqypWa9a4X0
|
3583
|
+
dFbD9ed1Uigspf9mR6XU/v6eVL9lfgHWMI+lNpyiUBzuOIABSMbHdPTGrMNASRZhdCyvjG817XsY
|
3584
|
+
AFs2PJxQDcqSMxDxJklt33UkN4Ii1+iW/RVLApY+B3KVfqs9TC7XyvDf4Fg/LS8EmjijAQIDAQAB
|
3585
|
+
o0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUBpOjCl4oaTeq
|
3586
|
+
YR3r6/wtbyPk86AwDQYJKoZIhvcNAQEMBQADggIBAJaAcgkGfpzMkwQWu6A6jZJOtxEaCnFxEM0E
|
3587
|
+
rX+lRVAQZk5KQaID2RFPeje5S+LGjzJmdSX7684/AykmjbgWHfYfM25I5uj4V7Ibed87hwriZLoA
|
3588
|
+
ymzvftAj63iP/2SbNDefNWWipAA9EiOWWF3KY4fGoweITedpdopTzfFP7ELyk+OZpDc8h7hi2/Ds
|
3589
|
+
Hzc/N19DzFGdtfCXwreFamgLRB7lUe6TzktuhsHSDCRZNhqfLJGP4xjblJUK7ZGqDpncllPjYYPG
|
3590
|
+
FrojutzdfhrGe0K22VoF3Jpf1d+42kd92jjbrDnVHmtsKheMYc2xbXIBw8MgAGJoFjHVdqqGuw6q
|
3591
|
+
nsb58Nn4DSEC5MUoFlkRudlpcyqSeLiSV5sI8jrlL5WwWLdrIBRtFO8KvH7YVdiI2i/6GaX7i+B/
|
3592
|
+
OfVyK4XELKzvGUWSTLNhB9xNH27SgRNcmvMSZ4PPmz+Ln52kuaiWA3rF7iDeM9ovnhp6dB7h7sxa
|
3593
|
+
OgTdsxoEqBRjrLdHEoOabPXm6RUVkRqEGQ6UROcSjiVbgGcZ3GOTEAtlLor6CZpO2oYofaphNdgO
|
3594
|
+
pygau1LgePhsumywbrmHXumZNTfxPWQrqaA0k89jL9WB365jJ6UeTo3cKXhZ+PmhIIynJkBugnLN
|
3595
|
+
eLLIjzwec+fBH7/PzqUqm9tEZDKgu39cJRNItX+S
|
3596
|
+
-----END CERTIFICATE-----
|
3597
|
+
|
3598
|
+
SecureSign Root CA15
|
3599
|
+
====================
|
3600
|
+
-----BEGIN CERTIFICATE-----
|
3601
|
+
MIICIzCCAamgAwIBAgIUFhXHw9hJp75pDIqI7fBw+d23PocwCgYIKoZIzj0EAwMwUTELMAkGA1UE
|
3602
|
+
BhMCSlAxIzAhBgNVBAoTGkN5YmVydHJ1c3QgSmFwYW4gQ28uLCBMdGQuMR0wGwYDVQQDExRTZWN1
|
3603
|
+
cmVTaWduIFJvb3QgQ0ExNTAeFw0yMDA0MDgwODMyNTZaFw00NTA0MDgwODMyNTZaMFExCzAJBgNV
|
3604
|
+
BAYTAkpQMSMwIQYDVQQKExpDeWJlcnRydXN0IEphcGFuIENvLiwgTHRkLjEdMBsGA1UEAxMUU2Vj
|
3605
|
+
dXJlU2lnbiBSb290IENBMTUwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQLUHSNZDKZmbPSYAi4Io5G
|
3606
|
+
dCx4wCtELW1fHcmuS1Iggz24FG1Th2CeX2yF2wYUleDHKP+dX+Sq8bOLbe1PL0vJSpSRZHX+AezB
|
3607
|
+
2Ot6lHhWGENfa4HL9rzatAy2KZMIaY+jQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQD
|
3608
|
+
AgEGMB0GA1UdDgQWBBTrQciu/NWeUUj1vYv0hyCTQSvT9DAKBggqhkjOPQQDAwNoADBlAjEA2S6J
|
3609
|
+
fl5OpBEHvVnCB96rMjhTKkZEBhd6zlHp4P9mLQlO4E/0BdGF9jVg3PVys0Z9AjBEmEYagoUeYWmJ
|
3610
|
+
SwdLZrWeqrqgHkHZAXQ6bkU6iYAZezKYVWOr62Nuk22rGwlgMU4=
|
3611
|
+
-----END CERTIFICATE-----
|
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: appsignal
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 4.5.
|
4
|
+
version: 4.5.2
|
5
5
|
platform: java
|
6
6
|
authors:
|
7
7
|
- Robert Beekman
|
@@ -10,7 +10,7 @@ authors:
|
|
10
10
|
autorequire:
|
11
11
|
bindir: bin
|
12
12
|
cert_chain: []
|
13
|
-
date: 2025-02-
|
13
|
+
date: 2025-02-24 00:00:00.000000000 Z
|
14
14
|
dependencies:
|
15
15
|
- !ruby/object:Gem::Dependency
|
16
16
|
name: logger
|