You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
573 lines
17 KiB
573 lines
17 KiB
#!/usr/bin/env ruby
|
|
# encoding: utf-8
|
|
#
|
|
# This file, gist, is generated code.
|
|
# Please DO NOT EDIT or send patches for it.
|
|
#
|
|
# Please take a look at the source from
|
|
# http://github.com/defunkt/gist
|
|
# and submit patches against the individual files
|
|
# that build gist.
|
|
#
|
|
|
|
module Gist
|
|
module Manpage
|
|
extend self
|
|
|
|
def display(name)
|
|
puts manpage(name)
|
|
end
|
|
|
|
def manpage(name)
|
|
return "** Can't find groff(1)" unless groff?
|
|
|
|
require 'open3'
|
|
out = nil
|
|
Open3.popen3(groff_command) do |stdin, stdout, _|
|
|
stdin.puts raw_manpage(name)
|
|
stdin.close
|
|
out = stdout.read.strip
|
|
end
|
|
out
|
|
end
|
|
|
|
def raw_manpage(name)
|
|
if File.exists? file = File.dirname(__FILE__) + "/../../man/#{name}.1"
|
|
File.read(file)
|
|
else
|
|
DATA.read.split("__CACERT__").first
|
|
end
|
|
end
|
|
|
|
def groff?
|
|
system("which groff > /dev/null")
|
|
end
|
|
|
|
def groff_command
|
|
"groff -Wall -mtty-char -mandoc -Tascii"
|
|
end
|
|
|
|
def puts(*args)
|
|
page_stdout
|
|
super
|
|
end
|
|
|
|
def page_stdout
|
|
return unless $stdout.tty?
|
|
|
|
read, write = IO.pipe
|
|
|
|
if Kernel.fork
|
|
$stdin.reopen(read)
|
|
read.close
|
|
write.close
|
|
|
|
ENV['LESS'] = 'FSRX'
|
|
|
|
Kernel.select [STDIN]
|
|
|
|
pager = ENV['PAGER'] || 'less -isr'
|
|
pager = 'cat' if pager.empty?
|
|
|
|
exec pager rescue exec "/bin/sh", "-c", pager
|
|
else
|
|
$stdout.reopen(write)
|
|
$stderr.reopen(write) if $stderr.tty?
|
|
read.close
|
|
write.close
|
|
end
|
|
end
|
|
end
|
|
end
|
|
module Gist
|
|
VERSION = Version = '2.0.3'
|
|
end
|
|
require 'open-uri'
|
|
require 'net/https'
|
|
require 'optparse'
|
|
|
|
require 'gist/manpage' unless defined?(Gist::Manpage)
|
|
require 'gist/version' unless defined?(Gist::Version)
|
|
|
|
module Gist
|
|
extend self
|
|
|
|
GIST_URL = 'https://gist.github.com/%s.txt'
|
|
CREATE_URL = 'https://gist.github.com/gists'
|
|
|
|
if ENV['HTTPS_PROXY']
|
|
PROXY = URI(ENV['HTTPS_PROXY'])
|
|
elsif ENV['HTTP_PROXY']
|
|
PROXY = URI(ENV['HTTP_PROXY'])
|
|
else
|
|
PROXY = nil
|
|
end
|
|
PROXY_HOST = PROXY ? PROXY.host : nil
|
|
PROXY_PORT = PROXY ? PROXY.port : nil
|
|
|
|
def execute(*args)
|
|
private_gist = defaults["private"]
|
|
gist_filename = nil
|
|
gist_extension = defaults["extension"]
|
|
browse_enabled = defaults["browse"]
|
|
|
|
opts = OptionParser.new do |opts|
|
|
opts.banner = "Usage: gist [options] [filename or stdin] [filename] ...\n" +
|
|
"Filename '-' forces gist to read from stdin."
|
|
|
|
opts.on('-p', '--[no-]private', 'Make the gist private') do |priv|
|
|
private_gist = priv
|
|
end
|
|
|
|
t_desc = 'Set syntax highlighting of the Gist by file extension'
|
|
opts.on('-t', '--type [EXTENSION]', t_desc) do |extension|
|
|
gist_extension = '.' + extension
|
|
end
|
|
|
|
opts.on('-o','--[no-]open', 'Open gist in browser') do |o|
|
|
browse_enabled = o
|
|
end
|
|
|
|
opts.on('-m', '--man', 'Print manual') do
|
|
Gist::Manpage.display("gist")
|
|
end
|
|
|
|
opts.on('-v', '--version', 'Print version') do
|
|
puts Gist::Version
|
|
exit
|
|
end
|
|
|
|
opts.on('-h', '--help', 'Display this screen') do
|
|
puts opts
|
|
exit
|
|
end
|
|
end
|
|
|
|
opts.parse!(args)
|
|
|
|
begin
|
|
if $stdin.tty? && args[0] != '-'
|
|
|
|
if args.empty?
|
|
puts opts
|
|
exit
|
|
end
|
|
|
|
files = args.inject([]) do |files, file|
|
|
abort "Can't find #{file}" unless File.exists?(file)
|
|
|
|
files.push({
|
|
:input => File.read(file),
|
|
:filename => file,
|
|
:extension => (File.extname(file) if file.include?('.'))
|
|
})
|
|
end
|
|
|
|
else
|
|
input = $stdin.read
|
|
files = [{:input => input, :extension => gist_extension}]
|
|
end
|
|
|
|
url = write(files, private_gist)
|
|
browse(url) if browse_enabled
|
|
puts copy(url)
|
|
rescue => e
|
|
warn e
|
|
puts opts
|
|
end
|
|
end
|
|
|
|
def write(files, private_gist = false)
|
|
url = URI.parse(CREATE_URL)
|
|
|
|
if PROXY_HOST
|
|
proxy = Net::HTTP::Proxy(PROXY_HOST, PROXY_PORT)
|
|
http = proxy.new(url.host, url.port)
|
|
else
|
|
http = Net::HTTP.new(url.host, url.port)
|
|
end
|
|
|
|
http.use_ssl = true
|
|
http.verify_mode = OpenSSL::SSL::VERIFY_PEER
|
|
http.ca_file = ca_cert
|
|
|
|
req = Net::HTTP::Post.new(url.path)
|
|
req.form_data = data(files, private_gist)
|
|
|
|
response = http.start{|h| h.request(req) }
|
|
case response
|
|
when Net::HTTPRedirection
|
|
response['Location']
|
|
else
|
|
puts "Creating gist failed: #{response.code} #{response.message}"
|
|
exit(false)
|
|
end
|
|
end
|
|
|
|
def read(gist_id)
|
|
open(GIST_URL % gist_id).read
|
|
end
|
|
|
|
def browse(url)
|
|
if RUBY_PLATFORM =~ /darwin/
|
|
`open #{url}`
|
|
elsif ENV['OS'] == 'Windows_NT' or
|
|
RUBY_PLATFORM =~ /djgpp|(cyg|ms|bcc)win|mingw|wince/i
|
|
`start "" "#{url}"`
|
|
end
|
|
end
|
|
|
|
def copy(content)
|
|
cmd = case true
|
|
when system("type pbcopy > /dev/null 2>&1")
|
|
:pbcopy
|
|
when system("type xclip > /dev/null 2>&1")
|
|
:xclip
|
|
when system("type putclip > /dev/null 2>&1")
|
|
:putclip
|
|
end
|
|
|
|
if cmd
|
|
IO.popen(cmd.to_s, 'r+') { |clip| clip.print content }
|
|
end
|
|
|
|
content
|
|
end
|
|
|
|
private
|
|
def data(files, private_gist)
|
|
data = {}
|
|
files.each do |file|
|
|
i = data.size + 1
|
|
data["file_ext[gistfile#{i}]"] = file[:extension] ? file[:extension] : '.txt'
|
|
data["file_name[gistfile#{i}]"] = file[:filename]
|
|
data["file_contents[gistfile#{i}]"] = file[:input]
|
|
end
|
|
data.merge(private_gist ? { 'action_button' => 'private' } : {}).merge(auth)
|
|
end
|
|
|
|
def auth
|
|
user = config("github.user")
|
|
token = config("github.token")
|
|
|
|
if user.to_s.empty? || token.to_s.empty?
|
|
{}
|
|
else
|
|
{ :login => user, :token => token }
|
|
end
|
|
end
|
|
|
|
def defaults
|
|
extension = config("gist.extension")
|
|
extension = nil if extension && extension.empty?
|
|
|
|
return {
|
|
"private" => config("gist.private"),
|
|
"browse" => config("gist.browse"),
|
|
"extension" => extension,
|
|
}
|
|
end
|
|
|
|
def config(key)
|
|
env_key = ENV[key.upcase.gsub(/\./, '_')]
|
|
return env_key if env_key and not env_key.empty?
|
|
|
|
str_to_bool `git config --global #{key}`.strip
|
|
end
|
|
|
|
def str_to_bool(str)
|
|
if str.size > 0 and str[0].chr == '!'
|
|
command = str[1, str.length]
|
|
value = `#{command}`
|
|
else
|
|
value = str
|
|
end
|
|
|
|
case value.downcase.strip
|
|
when "false", "0", "nil", "", "no", "off"
|
|
nil
|
|
when "true", "1", "yes", "on"
|
|
true
|
|
else
|
|
value
|
|
end
|
|
end
|
|
|
|
def ca_cert
|
|
cert_file = [
|
|
File.expand_path("../gist/cacert.pem", __FILE__),
|
|
"/tmp/gist_cacert.pem"
|
|
].find{|l| File.exist?(l) }
|
|
|
|
if cert_file
|
|
cert_file
|
|
else
|
|
File.open("/tmp/gist_cacert.pem", "w") do |f|
|
|
f.write(DATA.read.split("__CACERT__").last)
|
|
end
|
|
"/tmp/gist_cacert.pem"
|
|
end
|
|
end
|
|
|
|
end
|
|
Gist.execute(*ARGV)
|
|
__END__
|
|
.\" generated with Ronn/v0.7.3
|
|
.\" http://github.com/rtomayko/ronn/tree/0.7.3
|
|
.
|
|
.TH "GIST" "1" "April 2011" "GITHUB" "Gist Manual"
|
|
.
|
|
.SH "NAME"
|
|
\fBgist\fR \- gist on the command line
|
|
.
|
|
.SH "SYNOPSIS"
|
|
\fBgist\fR [\fB\-p\fR] [\fB\-t extension\fR] \fIFILE|\-\fR
|
|
.
|
|
.SH "DESCRIPTION"
|
|
\fBgist\fR can be used to create gists on gist\.github\.com from the command line\. There are two primary methods of creating gists\.
|
|
.
|
|
.P
|
|
If standard input is supplied, it will be used as the content of the new gist\. If \fIFILE\fR is provided, the content of that file will be used to create the gist\. If \fIFILE\fR is \'\-\' then gist will wait for content from standard input\.
|
|
.
|
|
.P
|
|
Once your gist is successfully created, the URL will be copied to your clipboard\. If you are on OS X, \fBgist\fR will open the gist in your browser, too\.
|
|
.
|
|
.SH "OPTIONS"
|
|
\fBgist\fR\'s default mode of operation is to read content from standard input and create a public, text gist from it, tied to your GitHub account if you user and token are provided (see \fBCONFIGURATION\fR)\.
|
|
.
|
|
.P
|
|
These options can be used to change this behavior:
|
|
.
|
|
.TP
|
|
\fB\-p\fR, \fB\-\-private\fR
|
|
Create a private gist instead of a public gist\.
|
|
.
|
|
.TP
|
|
\fB\-t\fR, \fB\-\-type\fR
|
|
Set the file extension explicitly\. Passing a type of \fBrb\fR ensure the gist is created as a Ruby file\.
|
|
.
|
|
.TP
|
|
\fB\-o\fR, \fB\-\-[no\-]open\fR
|
|
Open the gist in your browser after creation\. Or don\'t\. Defaults to \-\-open
|
|
.
|
|
.P
|
|
You may additionally ask for help:
|
|
.
|
|
.TP
|
|
\fB\-h\fR, \fB\-\-help\fR
|
|
Print help\.
|
|
.
|
|
.TP
|
|
\fB\-m\fR, \fB\-\-man\fR
|
|
Display this man page\.
|
|
.
|
|
.SH "AUTHENTICATION"
|
|
There are two ways to set GitHub user and token info:
|
|
.
|
|
.IP "\(bu" 4
|
|
Using env vars GITHUB_USER and GITHUB_TOKEN
|
|
.
|
|
.IP
|
|
$ export GITHUB_USER=johndoe
|
|
.
|
|
.br
|
|
$ export GITHUB_TOKEN=mysecretgithubtoken
|
|
.
|
|
.br
|
|
$ gist ~/example
|
|
.
|
|
.IP "\(bu" 4
|
|
Using git\-config(1)
|
|
.
|
|
.IP "" 0
|
|
.
|
|
.P
|
|
Use git\-config(1) to display the currently configured GitHub username:
|
|
.
|
|
.IP "" 4
|
|
.
|
|
.nf
|
|
|
|
$ git config \-\-global github\.user
|
|
.
|
|
.fi
|
|
.
|
|
.IP "" 0
|
|
.
|
|
.P
|
|
Or, set the GitHub username with:
|
|
.
|
|
.IP "" 4
|
|
.
|
|
.nf
|
|
|
|
$ git config \-\-global github\.user <username>
|
|
.
|
|
.fi
|
|
.
|
|
.IP "" 0
|
|
.
|
|
.P
|
|
See \fIhttp://github\.com/guides/local\-github\-config\fR for more information\.
|
|
.
|
|
.SH "CONFIGURATION"
|
|
You can set a few options in your git config (using git\-config(1)) to control the default behavior of gist(1)\.
|
|
.
|
|
.IP "\(bu" 4
|
|
gist\.private \- boolean (yes or no) \- Determines whether to make a gist private by default
|
|
.
|
|
.IP "\(bu" 4
|
|
gist\.extension \- string \- Default extension for gists you create\.
|
|
.
|
|
.IP "\(bu" 4
|
|
gist\.browse \- boolean (yes or no) \- Whether to open the gist in your browser after creation\. Default: yes
|
|
.
|
|
.IP "" 0
|
|
.
|
|
.SH "ENVIRONMENT"
|
|
The following environment variables affect the execution of \fBgist\fR:
|
|
.
|
|
.IP "\(bu" 4
|
|
HTTP_PROXY \- Proxy to use when Gisting\. Should be "http://host:port/"
|
|
.
|
|
.IP "" 0
|
|
.
|
|
.SH "EXAMPLES"
|
|
.
|
|
.nf
|
|
|
|
$ gist < file\.txt
|
|
$ echo secret | gist \-\-private
|
|
$ echo "puts :hi" | gist \-t rb
|
|
$ gist script\.py
|
|
$ gist \-
|
|
the quick brown fox jumps over the lazy dog
|
|
^D
|
|
.
|
|
.fi
|
|
.
|
|
.SH "BUGS"
|
|
\fIhttp://github\.com/defunkt/gist/issues\fR
|
|
.
|
|
.SH "AUTHOR"
|
|
Chris Wanstrath :: chris@ozmm\.org
|
|
.
|
|
.SH "SEE ALSO"
|
|
hub(1), git(1), git\-clone(1), \fIhttp://github\.com\fR, \fIhttp://github\.com/defunkt/gist\fR
|
|
__CACERT__
|
|
Certificate chain
|
|
0 s:/O=*.github.com/OU=Domain Control Validated/CN=*.github.com
|
|
i:/C=US/ST=Arizona/L=Scottsdale/O=GoDaddy.com, Inc./OU=http://certificates.godaddy.com/repository/CN=Go Daddy Secure Certification Authority/serialNumber=07969287
|
|
-----BEGIN CERTIFICATE-----
|
|
MIIFVTCCBD2gAwIBAgIHBGX+dPs18DANBgkqhkiG9w0BAQUFADCByjELMAkGA1UE
|
|
BhMCVVMxEDAOBgNVBAgTB0FyaXpvbmExEzARBgNVBAcTClNjb3R0c2RhbGUxGjAY
|
|
BgNVBAoTEUdvRGFkZHkuY29tLCBJbmMuMTMwMQYDVQQLEypodHRwOi8vY2VydGlm
|
|
aWNhdGVzLmdvZGFkZHkuY29tL3JlcG9zaXRvcnkxMDAuBgNVBAMTJ0dvIERhZGR5
|
|
IFNlY3VyZSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTERMA8GA1UEBRMIMDc5Njky
|
|
ODcwHhcNMDkxMjExMDUwMjM2WhcNMTQxMjExMDUwMjM2WjBRMRUwEwYDVQQKEwwq
|
|
LmdpdGh1Yi5jb20xITAfBgNVBAsTGERvbWFpbiBDb250cm9sIFZhbGlkYXRlZDEV
|
|
MBMGA1UEAxMMKi5naXRodWIuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB
|
|
CgKCAQEA7dOJw11wcgnzM08acnTZtlqVULtoYZ/3+x8Z4doEMa8VfBp/+XOvHeVD
|
|
K1YJAEVpSujEW9/Cd1JRGVvRK9k5ZTagMhkcQXP7MrI9n5jsglsLN2Q5LLcQg3LN
|
|
8OokS/rZlC7DhRU5qTr2iNr0J4mmlU+EojdOfCV4OsmDbQIXlXh9R6hVg+4TyBka
|
|
szzxX/47AuGF+xFmqwldn0xD8MckXilyKM7UdWhPJHIprjko/N+NT02Dc3QMbxGb
|
|
p91i3v/i6xfm/wy/wC0xO9ZZovLdh0pIe20zERRNNJ8yOPbIGZ3xtj3FRu9RC4rG
|
|
M+1IYcQdFxu9fLZn6TnPpVKACvTqzQIDAQABo4IBtjCCAbIwDwYDVR0TAQH/BAUw
|
|
AwEBADAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDgYDVR0PAQH/BAQD
|
|
AgWgMDMGA1UdHwQsMCowKKAmoCSGImh0dHA6Ly9jcmwuZ29kYWRkeS5jb20vZ2Rz
|
|
MS0xMS5jcmwwUwYDVR0gBEwwSjBIBgtghkgBhv1tAQcXATA5MDcGCCsGAQUFBwIB
|
|
FitodHRwOi8vY2VydGlmaWNhdGVzLmdvZGFkZHkuY29tL3JlcG9zaXRvcnkvMIGA
|
|
BggrBgEFBQcBAQR0MHIwJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmdvZGFkZHku
|
|
Y29tLzBKBggrBgEFBQcwAoY+aHR0cDovL2NlcnRpZmljYXRlcy5nb2RhZGR5LmNv
|
|
bS9yZXBvc2l0b3J5L2dkX2ludGVybWVkaWF0ZS5jcnQwHwYDVR0jBBgwFoAU/axh
|
|
MpNsRdbi7oVfmrrndplozOcwIwYDVR0RBBwwGoIMKi5naXRodWIuY29tggpnaXRo
|
|
dWIuY29tMB0GA1UdDgQWBBSH0Y8ZbuSHb1OMd5EHUN+jv1VHIDANBgkqhkiG9w0B
|
|
AQUFAAOCAQEAwIe/Bbuk1/r38aqb5wlXjoW6tAmLpzLRkKorDOcDUJLtN6a9XqAk
|
|
cgMai7NCI1YV+A4IjEENj53mV2xWLpniqLDHI5y2NbQuL2deu1jQSSNz7xE/nZCk
|
|
WGt8OEtm6YI2bUsq5EXy078avRbigBko1bqtFuG0s5+nFrKCjhQVIk+GX7cwiyr4
|
|
XJ49FxETvePrxNYr7x7n/Jju59KXTw3juPET+bAwNlRXmScjrMylMNUMr3sFcyLz
|
|
DciaVnnextu6+L0w1+5KNVbMKndRwgg/cRldBL4AgmtouTC3mlDGGG3U6eV75cdH
|
|
D03DXDfrYYjxmWjTRdO2GdbYnt1ToEgxyA==
|
|
-----END CERTIFICATE-----
|
|
1 s:/C=US/ST=Arizona/L=Scottsdale/O=GoDaddy.com, Inc./OU=http://certificates.godaddy.com/repository/CN=Go Daddy Secure Certification Authority/serialNumber=07969287
|
|
i:/C=US/O=The Go Daddy Group, Inc./OU=Go Daddy Class 2 Certification Authority
|
|
-----BEGIN CERTIFICATE-----
|
|
MIIE3jCCA8agAwIBAgICAwEwDQYJKoZIhvcNAQEFBQAwYzELMAkGA1UEBhMCVVMx
|
|
ITAfBgNVBAoTGFRoZSBHbyBEYWRkeSBHcm91cCwgSW5jLjExMC8GA1UECxMoR28g
|
|
RGFkZHkgQ2xhc3MgMiBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0wNjExMTYw
|
|
MTU0MzdaFw0yNjExMTYwMTU0MzdaMIHKMQswCQYDVQQGEwJVUzEQMA4GA1UECBMH
|
|
QXJpem9uYTETMBEGA1UEBxMKU2NvdHRzZGFsZTEaMBgGA1UEChMRR29EYWRkeS5j
|
|
b20sIEluYy4xMzAxBgNVBAsTKmh0dHA6Ly9jZXJ0aWZpY2F0ZXMuZ29kYWRkeS5j
|
|
b20vcmVwb3NpdG9yeTEwMC4GA1UEAxMnR28gRGFkZHkgU2VjdXJlIENlcnRpZmlj
|
|
YXRpb24gQXV0aG9yaXR5MREwDwYDVQQFEwgwNzk2OTI4NzCCASIwDQYJKoZIhvcN
|
|
AQEBBQADggEPADCCAQoCggEBAMQt1RWMnCZM7DI161+4WQFapmGBWTtwY6vj3D3H
|
|
KrjJM9N55DrtPDAjhI6zMBS2sofDPZVUBJ7fmd0LJR4h3mUpfjWoqVTr9vcyOdQm
|
|
VZWt7/v+WIbXnvQAjYwqDL1CBM6nPwT27oDyqu9SoWlm2r4arV3aLGbqGmu75RpR
|
|
SgAvSMeYddi5Kcju+GZtCpyz8/x4fKL4o/K1w/O5epHBp+YlLpyo7RJlbmr2EkRT
|
|
cDCVw5wrWCs9CHRK8r5RsL+H0EwnWGu1NcWdrxcx+AuP7q2BNgWJCJjPOq8lh8BJ
|
|
6qf9Z/dFjpfMFDniNoW1fho3/Rb2cRGadDAW/hOUoz+EDU8CAwEAAaOCATIwggEu
|
|
MB0GA1UdDgQWBBT9rGEyk2xF1uLuhV+auud2mWjM5zAfBgNVHSMEGDAWgBTSxLDS
|
|
kdRMEXGzYcs9of7dqGrU4zASBgNVHRMBAf8ECDAGAQH/AgEAMDMGCCsGAQUFBwEB
|
|
BCcwJTAjBggrBgEFBQcwAYYXaHR0cDovL29jc3AuZ29kYWRkeS5jb20wRgYDVR0f
|
|
BD8wPTA7oDmgN4Y1aHR0cDovL2NlcnRpZmljYXRlcy5nb2RhZGR5LmNvbS9yZXBv
|
|
c2l0b3J5L2dkcm9vdC5jcmwwSwYDVR0gBEQwQjBABgRVHSAAMDgwNgYIKwYBBQUH
|
|
AgEWKmh0dHA6Ly9jZXJ0aWZpY2F0ZXMuZ29kYWRkeS5jb20vcmVwb3NpdG9yeTAO
|
|
BgNVHQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQEFBQADggEBANKGwOy9+aG2Z+5mC6IG
|
|
OgRQjhVyrEp0lVPLN8tESe8HkGsz2ZbwlFalEzAFPIUyIXvJxwqoJKSQ3kbTJSMU
|
|
A2fCENZvD117esyfxVgqwcSeIaha86ykRvOe5GPLL5CkKSkB2XIsKd83ASe8T+5o
|
|
0yGPwLPk9Qnt0hCqU7S+8MxZC9Y7lhyVJEnfzuz9p0iRFEUOOjZv2kWzRaJBydTX
|
|
RE4+uXR21aITVSzGh6O1mawGhId/dQb8vxRMDsxuxN89txJx9OjxUUAiKEngHUuH
|
|
qDTMBqLdElrRhjZkAzVvb3du6/KFUJheqwNTrZEjYx8WnM25sgVjOuH0aBsXBTWV
|
|
U+4=
|
|
-----END CERTIFICATE-----
|
|
2 s:/C=US/O=The Go Daddy Group, Inc./OU=Go Daddy Class 2 Certification Authority
|
|
i:/L=ValiCert Validation Network/O=ValiCert, Inc./OU=ValiCert Class 2 Policy Validation Authority/CN=http://www.valicert.com//emailAddress=info@valicert.com
|
|
-----BEGIN CERTIFICATE-----
|
|
MIIE+zCCBGSgAwIBAgICAQ0wDQYJKoZIhvcNAQEFBQAwgbsxJDAiBgNVBAcTG1Zh
|
|
bGlDZXJ0IFZhbGlkYXRpb24gTmV0d29yazEXMBUGA1UEChMOVmFsaUNlcnQsIElu
|
|
Yy4xNTAzBgNVBAsTLFZhbGlDZXJ0IENsYXNzIDIgUG9saWN5IFZhbGlkYXRpb24g
|
|
QXV0aG9yaXR5MSEwHwYDVQQDExhodHRwOi8vd3d3LnZhbGljZXJ0LmNvbS8xIDAe
|
|
BgkqhkiG9w0BCQEWEWluZm9AdmFsaWNlcnQuY29tMB4XDTA0MDYyOTE3MDYyMFoX
|
|
DTI0MDYyOTE3MDYyMFowYzELMAkGA1UEBhMCVVMxITAfBgNVBAoTGFRoZSBHbyBE
|
|
YWRkeSBHcm91cCwgSW5jLjExMC8GA1UECxMoR28gRGFkZHkgQ2xhc3MgMiBDZXJ0
|
|
aWZpY2F0aW9uIEF1dGhvcml0eTCCASAwDQYJKoZIhvcNAQEBBQADggENADCCAQgC
|
|
ggEBAN6d1+pXGEmhW+vXX0iG6r7d/+TvZxz0ZWizV3GgXne77ZtJ6XCAPVYYYwhv
|
|
2vLM0D9/AlQiVBDYsoHUwHU9S3/Hd8M+eKsaA7Ugay9qK7HFiH7Eux6wwdhFJ2+q
|
|
N1j3hybX2C32qRe3H3I2TqYXP2WYktsqbl2i/ojgC95/5Y0V4evLOtXiEqITLdiO
|
|
r18SPaAIBQi2XKVlOARFmR6jYGB0xUGlcmIbYsUfb18aQr4CUWWoriMYavx4A6lN
|
|
f4DD+qta/KFApMoZFv6yyO9ecw3ud72a9nmYvLEHZ6IVDd2gWMZEewo+YihfukEH
|
|
U1jPEX44dMX4/7VpkI+EdOqXG68CAQOjggHhMIIB3TAdBgNVHQ4EFgQU0sSw0pHU
|
|
TBFxs2HLPaH+3ahq1OMwgdIGA1UdIwSByjCBx6GBwaSBvjCBuzEkMCIGA1UEBxMb
|
|
VmFsaUNlcnQgVmFsaWRhdGlvbiBOZXR3b3JrMRcwFQYDVQQKEw5WYWxpQ2VydCwg
|
|
SW5jLjE1MDMGA1UECxMsVmFsaUNlcnQgQ2xhc3MgMiBQb2xpY3kgVmFsaWRhdGlv
|
|
biBBdXRob3JpdHkxITAfBgNVBAMTGGh0dHA6Ly93d3cudmFsaWNlcnQuY29tLzEg
|
|
MB4GCSqGSIb3DQEJARYRaW5mb0B2YWxpY2VydC5jb22CAQEwDwYDVR0TAQH/BAUw
|
|
AwEB/zAzBggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmdv
|
|
ZGFkZHkuY29tMEQGA1UdHwQ9MDswOaA3oDWGM2h0dHA6Ly9jZXJ0aWZpY2F0ZXMu
|
|
Z29kYWRkeS5jb20vcmVwb3NpdG9yeS9yb290LmNybDBLBgNVHSAERDBCMEAGBFUd
|
|
IAAwODA2BggrBgEFBQcCARYqaHR0cDovL2NlcnRpZmljYXRlcy5nb2RhZGR5LmNv
|
|
bS9yZXBvc2l0b3J5MA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQUFAAOBgQC1
|
|
QPmnHfbq/qQaQlpE9xXUhUaJwL6e4+PrxeNYiY+Sn1eocSxI0YGyeR+sBjUZsE4O
|
|
WBsUs5iB0QQeyAfJg594RAoYC5jcdnplDQ1tgMQLARzLrUc+cb53S8wGd9D0Vmsf
|
|
SxOaFIqII6hR8INMqzW/Rn453HWkrugp++85j09VZw==
|
|
-----END CERTIFICATE-----
|
|
3 s:/L=ValiCert Validation Network/O=ValiCert, Inc./OU=ValiCert Class 2 Policy Validation Authority/CN=http://www.valicert.com//emailAddress=info@valicert.com
|
|
i:/L=ValiCert Validation Network/O=ValiCert, Inc./OU=ValiCert Class 2 Policy Validation Authority/CN=http://www.valicert.com//emailAddress=info@valicert.com
|
|
-----BEGIN CERTIFICATE-----
|
|
MIIC5zCCAlACAQEwDQYJKoZIhvcNAQEFBQAwgbsxJDAiBgNVBAcTG1ZhbGlDZXJ0
|
|
IFZhbGlkYXRpb24gTmV0d29yazEXMBUGA1UEChMOVmFsaUNlcnQsIEluYy4xNTAz
|
|
BgNVBAsTLFZhbGlDZXJ0IENsYXNzIDIgUG9saWN5IFZhbGlkYXRpb24gQXV0aG9y
|
|
aXR5MSEwHwYDVQQDExhodHRwOi8vd3d3LnZhbGljZXJ0LmNvbS8xIDAeBgkqhkiG
|
|
9w0BCQEWEWluZm9AdmFsaWNlcnQuY29tMB4XDTk5MDYyNjAwMTk1NFoXDTE5MDYy
|
|
NjAwMTk1NFowgbsxJDAiBgNVBAcTG1ZhbGlDZXJ0IFZhbGlkYXRpb24gTmV0d29y
|
|
azEXMBUGA1UEChMOVmFsaUNlcnQsIEluYy4xNTAzBgNVBAsTLFZhbGlDZXJ0IENs
|
|
YXNzIDIgUG9saWN5IFZhbGlkYXRpb24gQXV0aG9yaXR5MSEwHwYDVQQDExhodHRw
|
|
Oi8vd3d3LnZhbGljZXJ0LmNvbS8xIDAeBgkqhkiG9w0BCQEWEWluZm9AdmFsaWNl
|
|
cnQuY29tMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDOOnHK5avIWZJV16vY
|
|
dA757tn2VUdZZUcOBVXc65g2PFxTXdMwzzjsvUGJ7SVCCSRrCl6zfN1SLUzm1NZ9
|
|
WlmpZdRJEy0kTRxQb7XBhVQ7/nHk01xC+YDgkRoKWzk2Z/M/VXwbP7RfZHM047QS
|
|
v4dk+NoS/zcnwbNDu+97bi5p9wIDAQABMA0GCSqGSIb3DQEBBQUAA4GBADt/UG9v
|
|
UJSZSWI4OB9L+KXIPqeCgfYrx+jFzug6EILLGACOTb2oWH+heQC1u+mNr0HZDzTu
|
|
IYEZoDJJKPTEjlbVUjP9UNV+mWwD5MlM/Mtsq2azSiGM5bUMMj4QssxsodyamEwC
|
|
W/POuZ6lcg5Ktz885hZo+L7tdEy8W9ViH0Pd
|
|
-----END CERTIFICATE-----
|
|
|