Author: Alexey Milovidov, 2024-08-26.
CREATE MATERIALIZED VIEW [IF NOT EXISTS] [db.]table_name
REFRESH EVERY|AFTER interval [OFFSET interval]
RANDOMIZE FOR interval
DEPENDS ON [db.]name [, [db.]name [, ...]]
[TO [db.]name] [(columns)] [ENGINE = engine]
AS SELECT ...
??? π€
Developer: Michael Kolupaev, Michael Guzov.
Run the SELECT query in background
and atomically replace the table with its result.
Run the refresh process using a flexible configured schedule.
Support a dependency graph with multiple materialized views.
Motivation:
— periodic export from external databases
similar to dictionaries;
— periodic non-incremental calcualtions
in contrast to the (incremental) materialized views.
Developer: Michael Kolupaev, Michael Guzov.
A table engine for streaming consumption from
S3-compatible storages:
CREATE TABLE queue ENGINE = S3Queue('s3://clickhouse-public-datasets/
hits_compatible/athena_partitioned/hits_*.parquet') SETTINGS mode = 'unordered';
CREATE TABLE data
ENGINE = MergeTree ORDER BY ()
EMPTY AS SELECT * FROM queue;
CREATE MATERIALIZED VIEW consumer TO data AS SELECT * FROM queue;
— Consumes data from a bunch of files on S3.
— Consumes new files as soon as they appear.
— Supports parallel and distributed consumption.
Developer: Sergei Katkovskiy, Kseniia Sumarokova.
Preview the data:
SELECT *
FROM s3('s3://clickhouse-spot-instance-data-feed/*.gz', LineAsString)
LIMIT 10
Query id: 78026e69-1cc2-4c82-8be1-c114b1a15a09
ββlineβββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β #Version: 1.0 β
β #Fields: Timestamp UsageType Operation InstanceID MyBidID MyMaxPrice MarketPrice Charge Version β
β 2023-09-01 03:31:20 UTC SpotUsage:c5a.8xlarge RunInstances:SV001 i-00b91fe65059b4880 sir-s2eemc1k 1.2320000000 USD 1.0130000000 USD 0.0368620570 USD 1 β
β 2023-09-01 03:27:01 UTC SpotUsage:c5a.8xlarge RunInstances:SV001 i-02fd64d9c11effa34 sir-4ydpp3kj 1.2320000000 USD 1.0130000000 USD 0.0371436710 USD 1 β
β 2023-09-01 03:11:06 UTC SpotUsage:c5a.8xlarge RunInstances:SV001 i-0a4c1c90ac125800e sir-haxppnmk 1.2320000000 USD 1.0130000000 USD 0.0371436710 USD 1 β
β 2023-09-01 03:07:10 UTC SpotUsage:c5d.9xlarge RunInstances:SV006 i-04a2d1d907f42badc sir-haxpmkzg 1.7280000000 USD 0.6275000000 USD 0.2680818050 USD 1 β
β 2023-09-01 03:15:17 UTC SpotUsage:c5d.9xlarge RunInstances:SV006 i-05c084023a8e866f6 sir-t54ppm5k 1.7280000000 USD 0.6275000000 USD 0.1809289575 USD 1 β
β 2023-09-01 03:45:26 UTC SpotUsage:c5d.9xlarge RunInstances:SV006 i-08269560fb6a7444c sir-p6qyq3cg 1.7280000000 USD 0.6275000000 USD 0.6275000000 USD 1 β
β 2023-09-01 03:41:11 UTC SpotUsage:c5d.9xlarge RunInstances:SV006 i-09d71d667650f5c9a sir-m9spnjsj 1.7280000000 USD 0.6275000000 USD 0.0261460425 USD 1 β
β 2023-09-01 03:04:51 UTC SpotUsage:c5d.9xlarge RunInstances:SV006 i-0a94a38b2190e6717 sir-31feqd4g 1.7280000000 USD 0.6275000000 USD 0.0803551400 USD 1 β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
Process it as is:
WITH
parseDateTimeBestEffort(c1) AS time,
extractGroups(c2, '^(\w+):(.+)$') AS item_type,
item_type[1] AS item,
item_type[2] AS type,
c4 AS id,
CAST(extract(c6, '^\S+') AS Decimal(10, 6)) AS max_price,
CAST(extract(c7, '^\S+') AS Decimal(10, 6)) AS market_price,
CAST(extract(c8, '^\S+') AS Decimal(10, 6)) AS charge,
charge / market_price AS hours
SELECT
type,
count() AS c,
sum(hours) AS h,
sum(charge) AS cost
FROM s3('s3://clickhouse-spot-instance-data-feed/*.gz', TSV)
GROUP BY type ORDER BY h DESC
SETTINGS input_format_tsv_skip_first_lines = 2, schema_inference_make_columns_nullable = 0
ββtypeββββββββββββββ¬ββββββcββ¬ββββββββββββhββ¬βββββββββcostββ
β c6id.8xlarge β 875 β 379.432492 β 345.468028 β
β m7g.4xlarge β 912 β 362.599616 β 120.957285 β
β m6idn.2xlarge β 712 β 331.768934 β 87.381505 β
β m5d.2xlarge β 693 β 262.129137 β 65.735759 β
β r5b.2xlarge β 483 β 232.865149 β 59.732247 β
β r6g.2xlarge β 647 β 195.560188 β 42.264367 β
β c6a.4xlarge β 343 β 172.48896 β 46.570093 β
β r6id.4xlarge β 247 β 152.03035 β 77.222521 β
β m6i.8xlarge β 338 β 151.313531 β 105.488635 β
β m5zn.2xlarge β 313 β 146.439172 β 37.66433 β
β m7a.8xlarge β 279 β 128.709207 β 131.700535 β
β m5dn.2xlarge β 206 β 100.624052 β 25.753932 β
β r6gd.2xlarge β 364 β 84.635927 β 23.849737 β
β r6id.2xlarge β 126 β 78.014559 β 19.587254 β
β r5ad.2xlarge β 143 β 69.243293 β 17.757915 β
β m5ad.8xlarge β 122 β 67.560744 β 69.316617 β
β r5d.4xlarge β 172 β 58.593963 β 29.710109 β
β r5dn.2xlarge β 112 β 48.394754 β 12.393548 β
β x2gd.2xlarge β 125 β 45.796468 β 14.833519 β
β c6in.8xlarge β 59 β 23.07633 β 23.274454 β
β r6g.4xlarge β 31 β 16.225792 β 5.742319 β
β r5d.2xlarge β 47 β 16.11658 β 4.121735 β
β m5d.8xlarge β 55 β 14.517439 β 14.38119 β
β r6in.2xlarge β 19 β 13.441091 β 3.444952 β
β r5ad.4xlarge β 40 β 12.415226 β 6.759386 β
β c5n.9xlarge β 28 β 9.814967 β 10.964834 β
β m5n.8xlarge β 27 β 8.510248 β 8.424644 β
β m7i.8xlarge β 33 β 8.375798 β 7.812783 β
β m6in.8xlarge β 14 β 6.189432 β 6.338852 β
β m5a.8xlarge β 19 β 5.311926 β 3.826214 β
β c5ad.4xlarge β 8 β 5.29304 β 1.427534 β
β m6gd.4xlarge β 39 β 4.673265 β 1.631628 β
β r6idn.2xlarge β 10 β 3.247486 β 0.831033 β
β m5dn.8xlarge β 7 β 2.976105 β 3.062444 β
β m7i-flex.8xlarge β 6 β 1.698884 β 1.173879 β
β m6id.8xlarge β 2 β 0.27611 β 0.28293 β
β r7g.4xlarge β 1 β 0.254999 β 0.134818 β
β m6in.2xlarge β 1 β 0.148331 β 0.037958 β
ββββββββββββββββββββ΄βββββββββ΄βββββββββββββββ΄βββββββββββββββ
Subscribe to a queue:
CREATE TABLE queue
ENGINE = S3Queue('s3://clickhouse-spot-instance-data-feed/*.gz', TSV)
SETTINGS mode = 'unordered', s3queue_enable_logging_to_s3queue_log = 1,
input_format_tsv_skip_first_lines = 2, schema_inference_make_columns_nullable = 0;
CREATE TABLE feed ENGINE = MergeTree ORDER BY time
EMPTY
AS WITH
parseDateTimeBestEffort(c1) AS time,
extractGroups(c2, '^(\w+):(.+)$') AS item_type,
item_type[1] AS item,
item_type[2] AS type,
c4 AS id,
extract(c6, '^\S+')::Decimal(10, 6) AS max_price,
extract(c7, '^\S+')::Decimal(10, 6) AS market_price,
extract(c8, '^\S+')::Decimal(10, 6) AS charge,
charge / market_price AS hours
SELECT time, item, type, id, max_price, market_price, charge, hours
FROM queue;
CREATE MATERIALIZED VIEW consumer TO feed
AS WITH
parseDateTimeBestEffort(c1) AS time,
extractGroups(c2, '^(\w+):(.+)$') AS item_type,
item_type[1] AS item,
item_type[2] AS type,
c4 AS id,
extract(c6, '^\S+')::Decimal(10, 6) AS max_price,
extract(c7, '^\S+')::Decimal(10, 6) AS market_price,
extract(c8, '^\S+')::Decimal(10, 6) AS charge,
charge / market_price AS hours
SELECT time, item, type, id, max_price, market_price, charge, hours
FROM queue;
Monitor the queue:
:) SELECT sum(rows_processed) FROM system.s3queue_log
ββsum(rows_processed)ββ
β 1849211 β
βββββββββββββββββββββββ
:) DESCRIBE system.s3queue_log
ββnameβββββββββββββββββββ¬βtypeββββββββββββββββββββββββββββββββββ¬βdefault_typeββ¬βdefault_expressionββ¬βcommentββ¬βcodec_expressionββ¬βttl_expressionββ
β event_date β Date β β β β β β
β event_time β DateTime β β β β β β
β table_uuid β String β β β β β β
β file_name β String β β β β β β
β rows_processed β UInt64 β β β β β β
β status β Enum8('Processed' = 0, 'Failed' = 1) β β β β β β
β processing_start_time β Nullable(DateTime) β β β β β β
β processing_end_time β Nullable(DateTime) β β β β β β
β ProfileEvents β Map(String, UInt64) β β β β β β
β exception β String β β β β β β
βββββββββββββββββββββββββ΄βββββββββββββββββββββββββββββββββββββββ΄βββββββββββββββ΄βββββββββββββββββββββ΄ββββββββββ΄βββββββββββββββββββ΄βββββββββββββββββ
The data is continuously streamed into the table:
:) SELECT * FROM feed LIMIT 25
βββββββββββββββββtimeββ¬βitemβββββββ¬βtypeβββββββββββ¬βidβββββββββββββββββββ¬βmax_priceββ¬βmarket_priceββ¬βββchargeββ¬ββββhoursββ
β 2023-09-01 03:00:16 β SpotUsage β r6in.4xlarge β i-03eaee0ffa54380c1 β 1.394 β 0.5143 β 0.47187 β 0.917499 β
β 2023-09-01 03:01:57 β SpotUsage β m7a.2xlarge β i-0c63ae42ec8e55a2e β 0.463 β 0.2565 β 0.2565 β 1 β
β 2023-09-01 03:02:22 β SpotUsage β c5d.9xlarge β i-0e299eb8d2d6b6fc5 β 1.728 β 0.6275 β 0.157921 β 0.251666 β
β 2023-09-01 03:03:03 β SpotUsage β i4g.2xlarge β i-0d66a79dc81c7ae43 β 0.617 β 0.2563 β 0.020361 β 0.079442 β
β 2023-09-01 03:03:10 β SpotUsage β m6a.4xlarge β i-0d04c29fff9fa827f β 0.691 β 0.496 β 0.374893 β 0.755832 β
β 2023-09-01 03:03:16 β SpotUsage β r5dn.4xlarge β i-08d6d2e38b6cc1d8f β 1.336 β 0.5 β 0.207916 β 0.415832 β
β 2023-09-01 03:04:11 β SpotUsage β m6a.4xlarge β i-08015b849286b0d88 β 0.691 β 0.496 β 0.347475 β 0.700554 β
β 2023-09-01 03:04:12 β SpotUsage β m6a.4xlarge β i-031d72c1f42ef8d3d β 0.691 β 0.509 β 0.509 β 1 β
β 2023-09-01 03:04:12 β SpotUsage β r5dn.4xlarge β i-0dd7c5f1e4ae54981 β 1.336 β 0.5017 β 0.014911 β 0.02972 β
β 2023-09-01 03:04:13 β SpotUsage β m7a.4xlarge β i-0da7bb5b5cad27dfb β 0.927 β 0.5134 β 0.5134 β 1 β
β 2023-09-01 03:04:13 β SpotUsage β r6in.4xlarge β i-09677fc629e7bb177 β 1.394 β 0.5143 β 0.5143 β 1 β
β 2023-09-01 03:04:14 β SpotUsage β r6in.4xlarge β i-0be80b35d91b112fc β 1.394 β 0.5143 β 0.126289 β 0.245555 β
β 2023-09-01 03:04:51 β SpotUsage β c5d.9xlarge β i-0a94a38b2190e6717 β 1.728 β 0.6275 β 0.080355 β 0.128055 β
β 2023-09-01 03:05:13 β SpotUsage β m6a.4xlarge β i-04c756e5bc4550fdc β 0.691 β 0.509 β 0.509 β 1 β
β 2023-09-01 03:05:14 β SpotUsage β m7a.4xlarge β i-09a01aba465ddaf89 β 0.927 β 0.5134 β 0.5134 β 1 β
β 2023-09-01 03:05:14 β SpotUsage β r5n.4xlarge β i-0f895dcb4e96a20d4 β 1.192 β 0.5096 β 0.5096 β 1 β
β 2023-09-01 03:05:22 β SpotUsage β r5n.4xlarge β i-057e425617cdc86b2 β 1.192 β 0.4871 β 0.017725 β 0.036388 β
β 2023-09-01 03:05:32 β SpotUsage β r5dn.4xlarge β i-02c2a1a327e967b5d β 1.336 β 0.5017 β 0.041111 β 0.081943 β
β 2023-09-01 03:05:52 β SpotUsage β m6a.4xlarge β i-0f05728d26088e256 β 0.691 β 0.509 β 0.022056 β 0.043332 β
β 2023-09-01 03:06:10 β SpotUsage β r5n.4xlarge β i-0fa61797331b03cde β 1.192 β 0.4871 β 0.213512 β 0.438332 β
β 2023-09-01 03:06:18 β SpotUsage β m6idn.4xlarge β i-0a9883f45dddac9dc β 1.272 β 0.5118 β 0.457918 β 0.89472 β
β 2023-09-01 03:07:10 β SpotUsage β c5d.9xlarge β i-04a2d1d907f42badc β 1.728 β 0.6275 β 0.268081 β 0.42722 β
β 2023-09-01 03:07:15 β SpotUsage β r5dn.4xlarge β i-0fcd109ec0a5d72c9 β 1.336 β 0.4926 β 0.026271 β 0.053331 β
β 2023-09-01 03:08:00 β SpotUsage β m5ad.2xlarge β i-0d03ba891a7be45ef β 0.412 β 0.2576 β 0.010232 β 0.03972 β
β 2023-09-01 03:08:14 β SpotUsage β r5n.4xlarge β i-07cf673d6efc02bb8 β 1.192 β 0.4871 β 0.017995 β 0.036943 β
βββββββββββββββββββββββ΄ββββββββββββ΄ββββββββββββββββ΄ββββββββββββββββββββββ΄ββββββββββββ΄βββββββββββββββ΄βββββββββββ΄βββββββββββ
{
"ip": "188.132.130.41",
"data": {
"tls": {
"status": "success",
"protocol": "tls",
"result": {
"handshake_log": {
"server_hello": {
"version": {
"name": "TLSv1.2",
"value": 771
},
"random": "Xdxt8cDOO0iv3ZEiOaLKVlNWW+s5VxHAGF83f1sULdc=",
"session_id": "ASH0ObQdWuaaninII+3+QcWfaiGJuWuvrsh1QGxAHaY=",
"cipher_suite": {
"hex": "0xC014",
"name": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
"value": 49172
},
"compression_method": 0,
"ocsp_stapling": false,
"ticket": false,
"secure_renegotiation": true,
"heartbeat": false,
"extended_master_secret": false
},
"server_certificates": {
"certificate": {
"raw": "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",
"parsed": {
"version": 3,
"serial_number": "94784743401303724368163794918366247551",
"signature_algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"issuer": {
"common_name": [
"RapidSSL SHA256 CA"
],
"country": [
"US"
],
"organization": [
"GeoTrust Inc."
]
},
"issuer_dn": "C=US, O=GeoTrust Inc., CN=RapidSSL SHA256 CA",
"validity": {
"start": "2016-10-21T00:00:00Z",
"end": "2017-11-20T23:59:59Z",
"length": 34214399
},
"subject": {
"common_name": [
"www.3dprintdunyasi.com"
]
},
"subject_dn": "CN=www.3dprintdunyasi.com",
"subject_key_info": {
"key_algorithm": {
"name": "RSA"
},
"rsa_public_key": {
"exponent": 65537,
"modulus": "m/m77ToqLYSo75eYNBBSyoIsABE5asTYlBURohZAcZWK+5u97Zjw6/HJOmbpN72ixrAQPAb+MoGvsmxztSUuwc9JAxxX0NpXHKcbJC8fMlqGLl/F8QPKLosDSP0QelXYXYYtlc8s7AfeX8XC9UVa74ekU+ZIF++YXFO4hUt3mFB1X+nDGV0oFzWBr740f8JnBawq8DtRm8R2rOm2djzNG6UuFFFnBHjJsA4u/qNbNcDLK/7Ul3ZUw7PsEhsRls9xBK7F1Q84uvaSKBdhGUrJu1U76kQvEzLMWpouiVGsLogoRbQRqdSiN3BHEn/zMM3x8f7GatMNe4Lc/BL0DIBZUw==",
"length": 2048
},
"fingerprint_sha256": "a10c324e4862bc310f8630c161f15611a8be4d5ab463517320dbe6a989a62c4d"
},
"extensions": {
"key_usage": {
"digital_signature": true,
"key_encipherment": true,
"value": 5
},
"basic_constraints": {
"is_ca": false
},
"subject_alt_name": {
"dns_names": [
"www.3dprintdunyasi.com",
"3dprintdunyasi.com"
]
},
"crl_distribution_points": [
"http://gp.symcb.com/gp.crl"
],
"authority_key_id": "97c227509ec2c9ec0c8832c87cade2a6014fda6f",
"extended_key_usage": {
"server_auth": true,
"client_auth": true
},
"certificate_policies": [
{
"id": "2.23.140.1.2.1",
"cps": [
"https://www.rapidssl.com/legal"
],
"user_notice": [
{
"explicit_text": "https://www.rapidssl.com/legal"
}
]
}
],
"authority_info_access": {
"ocsp_urls": [
"http://gp.symcd.com"
],
"issuer_urls": [
"http://gp.symcb.com/gp.crt"
]
},
"signed_certificate_timestamps": [
{
"version": 0,
"log_id": "3esdK3oNT6Ygi4GtgWhwfi6OnQHVXIiNPRHEzbbsvsw=",
"timestamp": 1477059206,
"signature": "BAMARjBEAiAyihL+KZbiIzzLOeM4Zeh7rBBG7YJIJzy+alxOPbSAugIgY7+zvd3NpqRgFNZlZ5KRRekiSHhcyPiKJl91MIuy6vM="
},
{
"version": 0,
"log_id": "aPaY+B9kgr46jO65KB1M/HFRXWeT1ETRCmesu09P+8Q=",
"timestamp": 1477059207,
"signature": "BAMARjBEAiBlh0QtY9mXqXCvukQWVwkHE+OHyTxWEu9eNMj8rMnCFAIgdphPSL1Xc2SQN84JvRSirFNTcu957NTu3x+MTmes1s0="
}
]
},
"signature": {
"signature_algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"value": "Qr3VECkkKEQJ6dlMFDSqqN/9Dq7IYq/7iDut/1691lhh6VcKKSQrRJTEHqJfoh8avXvFVopPR+F4n3JH3nv/sa0l4GGeaCwWdPGFA5UWF9Iab6DYaLrhCPUb/sMdETL7JcFBog7GQ3HvwCp9K8ynonZvoN1szsIbo3VmGMIOt3t9sEPMy0VhpFl58GS5YCGq9/3aBrXnEwv04zhyiLyp76Omca0cjr3drxGTPbcUM+UAJmWGTHuoF4B2g3+qYaJEoZytvZ4bAq5zyJfWhXnATS7RSouqQbkjL+THGSsRVMB4q8dzvH+sdkL3aNDbDAOy6bnawJ7Bet5UciS9SEhDbw==",
"valid": false,
"self_signed": false
},
"fingerprint_md5": "5291b11c316d7c1f670b9532ab407733",
"fingerprint_sha1": "deb9372f6fb8710065dba26babc611d00cecd0ac",
"fingerprint_sha256": "c6fc3953bc708e9d96d84795cfaf48a01e08825f9b7f5cb8d35835a1d8e0cb0b",
"tbs_noct_fingerprint": "c1af788f28940b87e1401fff41c6798d8b98d155d1c25df96d5571afa1c40f9c",
"spki_subject_fingerprint": "9903ab6f68e23f3eaa1335c1deeec9b142090301bebe6830172e7e4199e93adc",
"tbs_fingerprint": "378611b68e34d1dcda1d2eeebb753c965469c658283a09203a89a524a63d011a",
"validation_level": "DV",
"names": [
"3dprintdunyasi.com",
"www.3dprintdunyasi.com"
],
"redacted": false
}
},
"chain": [
{
"raw": "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",
"parsed": {
"version": 3,
"serial_number": "57397899145990363081023081275480378375",
"signature_algorithm": {
"name": "SHA384-RSA",
"oid": "1.2.840.113549.1.1.12"
},
"issuer": {
"common_name": [
"COMODO RSA Certification Authority"
],
"country": [
"GB"
],
"locality": [
"Salford"
],
"province": [
"Greater Manchester"
],
"organization": [
"COMODO CA Limited"
]
},
"issuer_dn": "C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Certification Authority",
"validity": {
"start": "2014-02-12T00:00:00Z",
"end": "2029-02-11T23:59:59Z",
"length": 473385599
},
"subject": {
"common_name": [
"COMODO RSA Domain Validation Secure Server CA"
],
"country": [
"GB"
],
"locality": [
"Salford"
],
"province": [
"Greater Manchester"
],
"organization": [
"COMODO CA Limited"
]
},
"subject_dn": "C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Domain Validation Secure Server CA",
"subject_key_info": {
"key_algorithm": {
"name": "RSA"
},
"rsa_public_key": {
"exponent": 65537,
"modulus": "jsICGeGgWaTrODWNLP0B0NNJwGTHC2IFRRY6qKDADAJ/HczbxKFtdwOjD4b54wacPguBiptJG60DvvpL24wg7dXOXmWOPg2vTMKwt0VeUi803kgkZLRBrgCX975n3p7QeqdTgDt8rfWWVW+XRwp8hYsil42zhOCWV9BwGGCWj+4tB5OdobrK0c176cQqmighkU1vkk8lpfJ6Nd0m3Eal0KxZNYz/TpFDUD9Zkx5sUSHuWBSr/nVQeD5MsByGE/prmLzgO5QehVLcA5MkGG7LJ1FF5nDeJUOkDeFKpe22fsjNbe4uHSdzXdxFMICq47JBC6+9RIfaueUbnX+u5YWCpQ==",
"length": 2048
},
"fingerprint_sha256": "9253b6de74f67a11435c27f1dde1d30d1112333ddab23d66b8efb86887638ae6"
},
"extensions": {
"key_usage": {
"digital_signature": true,
"certificate_sign": true,
"crl_sign": true,
"value": 97
},
"basic_constraints": {
"is_ca": true,
"max_path_len": 0
},
"crl_distribution_points": [
"http://crl.comodoca.com/COMODORSACertificationAuthority.crl"
],
"authority_key_id": "bbaf7e023dfaa6f13c848eadee3898ecd93232d4",
"subject_key_id": "90af6a3a945a0bd890ea125673df43b43a28dae7",
"extended_key_usage": {
"server_auth": true,
"client_auth": true
},
"certificate_policies": [
{
"id": "2.5.29.32.0"
},
{
"id": "2.23.140.1.2.1"
}
],
"authority_info_access": {
"ocsp_urls": [
"http://ocsp.comodoca.com"
],
"issuer_urls": [
"http://crt.comodoca.com/COMODORSAAddTrustCA.crt"
]
}
},
"signature": {
"signature_algorithm": {
"name": "SHA384-RSA",
"oid": "1.2.840.113549.1.1.12"
},
"value": "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",
"valid": false,
"self_signed": false
},
"fingerprint_md5": "83e10465b722ef33ff0b6f535e8d996b",
"fingerprint_sha1": "339cdd57cfd5b141169b615ff31428782d1da639",
"fingerprint_sha256": "02ab57e4e67a0cb48dd2ff34830e8ac40f4476fb08ca6be3f5cd846f646840f0",
"tbs_noct_fingerprint": "283f159615688eb94753767ed2bd8a736cdaabfe20e6989ae4b62872e3071ae6",
"spki_subject_fingerprint": "5a1cfcf9f457df27d2efe4861523bbbf45a4b225878268b5f8c25d2ba3e173bc",
"tbs_fingerprint": "283f159615688eb94753767ed2bd8a736cdaabfe20e6989ae4b62872e3071ae6",
"validation_level": "DV",
"redacted": false
}
},
{
"raw": "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",
"parsed": {
"version": 3,
"serial_number": "52374340215108295845375962883522092578",
"signature_algorithm": {
"name": "SHA384-RSA",
"oid": "1.2.840.113549.1.1.12"
},
"issuer": {
"common_name": [
"AddTrust External CA Root"
],
"country": [
"SE"
],
"organization": [
"AddTrust AB"
],
"organizational_unit": [
"AddTrust External TTP Network"
]
},
"issuer_dn": "C=SE, O=AddTrust AB, OU=AddTrust External TTP Network, CN=AddTrust External CA Root",
"validity": {
"start": "2000-05-30T10:48:38Z",
"end": "2020-05-30T10:48:38Z",
"length": 631152000
},
"subject": {
"common_name": [
"COMODO RSA Certification Authority"
],
"country": [
"GB"
],
"locality": [
"Salford"
],
"province": [
"Greater Manchester"
],
"organization": [
"COMODO CA Limited"
]
},
"subject_dn": "C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Certification Authority",
"subject_key_info": {
"key_algorithm": {
"name": "RSA"
},
"rsa_public_key": {
"exponent": 65537,
"modulus": "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",
"length": 4096
},
"fingerprint_sha256": "82b5f84daf47a59c7ab521e4982aefa40a53406a3aec26039efa6b2e0e7244c1"
},
"extensions": {
"key_usage": {
"digital_signature": true,
"certificate_sign": true,
"crl_sign": true,
"value": 97
},
"basic_constraints": {
"is_ca": true
},
"crl_distribution_points": [
"http://crl.usertrust.com/AddTrustExternalCARoot.crl"
],
"authority_key_id": "adbd987a34b426f7fac42654ef03bde024cb541a",
"subject_key_id": "bbaf7e023dfaa6f13c848eadee3898ecd93232d4",
"certificate_policies": [
{
"id": "2.5.29.32.0"
}
],
"authority_info_access": {
"ocsp_urls": [
"http://ocsp.usertrust.com"
]
}
},
"signature": {
"signature_algorithm": {
"name": "SHA384-RSA",
"oid": "1.2.840.113549.1.1.12"
},
"value": "ZL+D8V+ahdDNuKEpVw3oWvfR6T7ydgRu8VJwux48/00NdGrMgYIl08OgKl1M9bqLoW3EVAl1x+MnDl2EeTdAE3f1tKwc0DurFxLW7zQYfivpedOrV0UMryj60NvlUJWIu9+FV2l9kthSynOBvxzz5rhuZhEFsx6ULX+RlZJZ8UzOo5FxTHxHDDsLGfahsWyGPlyqxC6Cy/kHlrpITZDylMipc6LrBnsjnd6i801Vn3phRZgYaMdeQGsj9Xl674y1a4u3b0b0e/E9SwTYk4BZWuBBJB2yjxVgWEfb725G/RX12V+as9vYuORAs82XOa6Fux2OvNyHm9Gm7/E7bxA4bw==",
"valid": false,
"self_signed": false
},
"fingerprint_md5": "1edaf9ae99ce2920667d0e9a8b3f8c9c",
"fingerprint_sha1": "f5ad0bcc1ad56cd150725b1c866c30ad92ef21b0",
"fingerprint_sha256": "4f32d5dc00f715250abcc486511e37f501a899deb3bf7ea8adbbd3aef1c412da",
"tbs_noct_fingerprint": "0d73a614eef7596cf5a34733f74daf2ccfe4df7b4a40069bf43c43e428264177",
"spki_subject_fingerprint": "8f7b3b10c2a4c769ba170e29bdb071bd49b42a8da31e7730f7898de94f7f0d73",
"tbs_fingerprint": "0d73a614eef7596cf5a34733f74daf2ccfe4df7b4a40069bf43c43e428264177",
"validation_level": "unknown",
"redacted": false
}
},
{
"raw": "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",
"parsed": {
"version": 3,
"serial_number": "146039",
"signature_algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"issuer": {
"common_name": [
"GeoTrust Global CA"
],
"country": [
"US"
],
"organization": [
"GeoTrust Inc."
]
},
"issuer_dn": "C=US, O=GeoTrust Inc., CN=GeoTrust Global CA",
"validity": {
"start": "2014-08-29T21:39:32Z",
"end": "2022-05-20T21:39:32Z",
"length": 243734400
},
"subject": {
"common_name": [
"RapidSSL SHA256 CA - G3"
],
"country": [
"US"
],
"organization": [
"GeoTrust Inc."
]
},
"subject_dn": "C=US, O=GeoTrust Inc., CN=RapidSSL SHA256 CA - G3",
"subject_key_info": {
"key_algorithm": {
"name": "RSA"
},
"rsa_public_key": {
"exponent": 65537,
"modulus": "r1Sb2VhdHixWxtXof/R9FgP/0Ita5I6n3VQu1ATAXZicjZAPvBBlX9qa1kR8wJ+16UqMCwZDBLv0luIm9mEBkWYxIsM0NF8/P5EvRF/cxxS2A5+GSw6j/6CAAoPD0x9pUtadZA/Jg+cbxHCslOfDpGosvbieadi+Co8WY1pocYB7MN4VBL/M078+SAVVerPXEAwD/Jv9CKeMjNunjvEeY9yzAS9/r1fDPEing2ghpy/npz/wtQz89YTRU7wOck9gDEK4mK0ZiFfXBOyHv36HTqMh+VP9NphIjdb4u0jyKchk0cxUSFOLr7dlHr8pMynZKWBI+P+RvFdY5TUuu2m2WQ==",
"length": 2048
},
"fingerprint_sha256": "e97d2234042d3c88d728455ca99070c8c711c2ad725bad39e3d6b16adbb7a031"
},
"extensions": {
"key_usage": {
"certificate_sign": true,
"crl_sign": true,
"value": 96
},
"basic_constraints": {
"is_ca": true,
"max_path_len": 0
},
"crl_distribution_points": [
"http://g.symcb.com/crls/gtglobal.crl"
],
"authority_key_id": "c07a98688d89fbab05640c117daa7d65b8cacc4e",
"subject_key_id": "c39cf3fcd3460834bbce467fa07c5bf3e208cb59",
"certificate_policies": [
{
"id": "2.16.840.1.113733.1.7.54",
"cps": [
"http://www.geotrust.com/resources/cps"
]
}
],
"authority_info_access": {
"ocsp_urls": [
"http://g.symcd.com"
]
}
},
"signature": {
"signature_algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"value": "o1gexkMyrKwvk3i36q5UQEctfniNUPb4ZqzWT3PWRO+vC8xbwfRPmo9JfmCvwifHFvH7k4GQqXzvb35uRZQWhL3sSfHEDvSvBFmDhw8sO5fDWhKbewQ1e6OVMwh7k3EiQrOp2W9PgZL8B7Z5vIRKnXcJ8cWJ8vC0nFSqEnsNuk/vkxns731OYaOOdpxZz4yUsYSX9xq5B7iyxk8Tedu/T1Ebf2kNUSrB1hX/N1E0ZVH0Hr44auwOq789ezkFe/Tz+xqh0Mh+TmSNzYxhVZD+OspdJQ/4HaNKdFZPGlVAcHUlpjMuukulXVOaDTDhjV9hLK/M77CZoYD/C/JiTHAmmA==",
"valid": false,
"self_signed": false
},
"fingerprint_md5": "23bb075facfbfb026935b31fb6ee063b",
"fingerprint_sha1": "0e34141846e7423d37f20dc0ab06c9bbd843dc24",
"fingerprint_sha256": "bc3f03a436240edba5f83714f6f677e34b37f9b1f0c08c1e558d981e279e8209",
"tbs_noct_fingerprint": "9dcaf37a11e0829a91cc646585572d94b49f998773c9c3bec22769cc2eee7cd4",
"spki_subject_fingerprint": "c592777989ca71d7533caf2a1610f4538b12bdc322c6758e617aa90420d65849",
"tbs_fingerprint": "9dcaf37a11e0829a91cc646585572d94b49f998773c9c3bec22769cc2eee7cd4",
"validation_level": "unknown",
"redacted": false
}
},
{
"raw": "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",
"parsed": {
"version": 3,
"serial_number": "8843850678629180984542216369971314136",
"signature_algorithm": {
"name": "SHA384-RSA",
"oid": "1.2.840.113549.1.1.12"
},
"issuer": {
"common_name": [
"COMODO RSA Certification Authority"
],
"country": [
"GB"
],
"locality": [
"Salford"
],
"province": [
"Greater Manchester"
],
"organization": [
"COMODO CA Limited"
]
},
"issuer_dn": "C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Certification Authority",
"validity": {
"start": "2012-02-12T00:00:00Z",
"end": "2027-02-11T23:59:59Z",
"length": 473385599
},
"subject": {
"common_name": [
"COMODO RSA Extended Validation Secure Server CA"
],
"country": [
"GB"
],
"locality": [
"Salford"
],
"province": [
"Greater Manchester"
],
"organization": [
"COMODO CA Limited"
]
},
"subject_dn": "C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Extended Validation Secure Server CA",
"subject_key_info": {
"key_algorithm": {
"name": "RSA"
},
"rsa_public_key": {
"exponent": 65537,
"modulus": "lVbeVLTf1QJJe9FbXKKyHo+cK2JMK40SKPMalaPGEP0p3uGfCzhAk9HvbpUQ/OGQF3cs7nU+e2PsYZJuTzurgElr3wDqAwB/L3XVKC/sVmePgIOjvdwDmZOLlJFWW6G4ajo/Br0OksxgnP214J9mMF/b5pTwlWqvyIqvgNnmiDkBfBzAxSr3e5Wg8narbZtyOTDr0VdVAZ1YEZ18bYSPSeidCfw8/QpKdhQhXBZzQCMZdMO6WAqmli7eNuWf0MLw4eDBYuPCGEUZUaoXHugjddTI0JYT/8ck0YwLJ66eetw6YWNgiJctXQUL5Tvrrs46R3N2qPos3cCHF+msMJn4Hw==",
"length": 2048
},
"fingerprint_sha256": "15baffe5a48ea382916a5f18138f6de2573be883a72bfa2da3d3565757122963"
},
"extensions": {
"key_usage": {
"certificate_sign": true,
"crl_sign": true,
"value": 96
},
"basic_constraints": {
"is_ca": true,
"max_path_len": 0
},
"crl_distribution_points": [
"http://crl.comodoca.com/COMODORSACertificationAuthority.crl"
],
"authority_key_id": "bbaf7e023dfaa6f13c848eadee3898ecd93232d4",
"subject_key_id": "39daffca28148aa8741308b9e40ea9d2fa7e9d69",
"certificate_policies": [
{
"id": "2.5.29.32.0",
"cps": [
"https://secure.comodo.com/CPS"
]
}
],
"authority_info_access": {
"ocsp_urls": [
"http://ocsp.comodoca.com"
],
"issuer_urls": [
"http://crt.comodoca.com/COMODORSAAddTrustCA.crt"
]
}
},
"signature": {
"signature_algorithm": {
"name": "SHA384-RSA",
"oid": "1.2.840.113549.1.1.12"
},
"value": "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",
"valid": false,
"self_signed": false
},
"fingerprint_md5": "17ba113e044a9b3cdeb0a54a6ae18987",
"fingerprint_sha1": "1f365c20e52ad2a6b09020a0e5539759c98df8d0",
"fingerprint_sha256": "7e0e16c0056f41a9f4c61f571503c3bcf079e2bddb228bf2219ac31200496b5c",
"tbs_noct_fingerprint": "11c343c727e254640a7345ce1e712fa3a67f5d30f4aab33e20da715bbde1f2c0",
"spki_subject_fingerprint": "c36bb4e1b75fef504529054ffdf02eaad42ef8da95b828a330a54d1153011a35",
"tbs_fingerprint": "11c343c727e254640a7345ce1e712fa3a67f5d30f4aab33e20da715bbde1f2c0",
"validation_level": "unknown",
"redacted": false
}
},
{
"raw": "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",
"parsed": {
"version": 3,
"serial_number": "52374340215108295845375962883522092578",
"signature_algorithm": {
"name": "SHA384-RSA",
"oid": "1.2.840.113549.1.1.12"
},
"issuer": {
"common_name": [
"AddTrust External CA Root"
],
"country": [
"SE"
],
"organization": [
"AddTrust AB"
],
"organizational_unit": [
"AddTrust External TTP Network"
]
},
"issuer_dn": "C=SE, O=AddTrust AB, OU=AddTrust External TTP Network, CN=AddTrust External CA Root",
"validity": {
"start": "2000-05-30T10:48:38Z",
"end": "2020-05-30T10:48:38Z",
"length": 631152000
},
"subject": {
"common_name": [
"COMODO RSA Certification Authority"
],
"country": [
"GB"
],
"locality": [
"Salford"
],
"province": [
"Greater Manchester"
],
"organization": [
"COMODO CA Limited"
]
},
"subject_dn": "C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Certification Authority",
"subject_key_info": {
"key_algorithm": {
"name": "RSA"
},
"rsa_public_key": {
"exponent": 65537,
"modulus": "kehUktIKVrGsDSTdxc9EZ3SZKzejfSNwAHG8U9/E+ioSj0t/EFa9n3Byt2F/yUsPF6c947AEYe7/EZfH9IY+Cvo+XPmT5jR62RRr55yzhaCCenavcZDX7P0N+pxs+t+wgvQUfvm+xKYvT3+Zf7X8Z0NyvQwA1onrayzT7Y+YHBSrfuXjbvzYqOSSJNpDa2K4Vf3qwbxstovzDo2a5JtsaZn4eEgwRdWt4Q08RWD8MpZRJ7xnw8outmvqRsfHIKCxH2XeSAi6pE6p8oNGN4Tr6MyBSENnTnIqm1y9TBsoilwie7SrmNnu4FGDwwlGTm0+mfqVF9p8M1dBPI1R7Qu2XK8sYxrfV8g/vOldxJuvRZnio1oktLqpVj3Pb6r/SVi+8Kj/9Lit6Tf7urj0Czr56ENCHonYhMsT8dm74YlguIwoVqwUHZwK53Hrzw7dPamWoUi9PPevtQ0iTMARgexWO/bTouJbt7IEIlKVgJNp6I5MZfGRAy1wdALqi2cVKWlSArvX31BqVUa/oKMoYX9w0MOiqiwhqkfOKJwGRXa/ghgntNWutMtQ5mv0TIZxMOmm3xaG4Nj/QN370EKIf6MzOi5cHkERgWPOGHFrK+ymircxXDpqR+DDeVnWIBqv8mqYqnK8V0rSS527EPywTEHl7R09XiidnMy/s1Hap0flhFM=",
"length": 4096
},
"fingerprint_sha256": "82b5f84daf47a59c7ab521e4982aefa40a53406a3aec26039efa6b2e0e7244c1"
},
"extensions": {
"key_usage": {
"digital_signature": true,
"certificate_sign": true,
"crl_sign": true,
"value": 97
},
"basic_constraints": {
"is_ca": true
},
"crl_distribution_points": [
"http://crl.usertrust.com/AddTrustExternalCARoot.crl"
],
"authority_key_id": "adbd987a34b426f7fac42654ef03bde024cb541a",
"subject_key_id": "bbaf7e023dfaa6f13c848eadee3898ecd93232d4",
"certificate_policies": [
{
"id": "2.5.29.32.0"
}
],
"authority_info_access": {
"ocsp_urls": [
"http://ocsp.usertrust.com"
]
}
},
"signature": {
"signature_algorithm": {
"name": "SHA384-RSA",
"oid": "1.2.840.113549.1.1.12"
},
"value": "ZL+D8V+ahdDNuKEpVw3oWvfR6T7ydgRu8VJwux48/00NdGrMgYIl08OgKl1M9bqLoW3EVAl1x+MnDl2EeTdAE3f1tKwc0DurFxLW7zQYfivpedOrV0UMryj60NvlUJWIu9+FV2l9kthSynOBvxzz5rhuZhEFsx6ULX+RlZJZ8UzOo5FxTHxHDDsLGfahsWyGPlyqxC6Cy/kHlrpITZDylMipc6LrBnsjnd6i801Vn3phRZgYaMdeQGsj9Xl674y1a4u3b0b0e/E9SwTYk4BZWuBBJB2yjxVgWEfb725G/RX12V+as9vYuORAs82XOa6Fux2OvNyHm9Gm7/E7bxA4bw==",
"valid": false,
"self_signed": false
},
"fingerprint_md5": "1edaf9ae99ce2920667d0e9a8b3f8c9c",
"fingerprint_sha1": "f5ad0bcc1ad56cd150725b1c866c30ad92ef21b0",
"fingerprint_sha256": "4f32d5dc00f715250abcc486511e37f501a899deb3bf7ea8adbbd3aef1c412da",
"tbs_noct_fingerprint": "0d73a614eef7596cf5a34733f74daf2ccfe4df7b4a40069bf43c43e428264177",
"spki_subject_fingerprint": "8f7b3b10c2a4c769ba170e29bdb071bd49b42a8da31e7730f7898de94f7f0d73",
"tbs_fingerprint": "0d73a614eef7596cf5a34733f74daf2ccfe4df7b4a40069bf43c43e428264177",
"validation_level": "unknown",
"redacted": false
}
},
{
"raw": "MIIGDjCCA/agAwIBAgIQBqdDgNTr/tQ1taP34Wq92DANBgkqhkiG9w0BAQwFADCBhTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxKzApBgNVBAMTIkNPTU9ETyBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMTIwMjEyMDAwMDAwWhcNMjcwMjExMjM1OTU5WjCBkjELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxODA2BgNVBAMTL0NPTU9ETyBSU0EgRXh0ZW5kZWQgVmFsaWRhdGlvbiBTZWN1cmUgU2VydmVyIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAlVbeVLTf1QJJe9FbXKKyHo+cK2JMK40SKPMalaPGEP0p3uGfCzhAk9HvbpUQ/OGQF3cs7nU+e2PsYZJuTzurgElr3wDqAwB/L3XVKC/sVmePgIOjvdwDmZOLlJFWW6G4ajo/Br0OksxgnP214J9mMF/b5pTwlWqvyIqvgNnmiDkBfBzAxSr3e5Wg8narbZtyOTDr0VdVAZ1YEZ18bYSPSeidCfw8/QpKdhQhXBZzQCMZdMO6WAqmli7eNuWf0MLw4eDBYuPCGEUZUaoXHugjddTI0JYT/8ck0YwLJ66eetw6YWNgiJctXQUL5Tvrrs46R3N2qPos3cCHF+msMJn4HwIDAQABo4IBaTCCAWUwHwYDVR0jBBgwFoAUu69+Aj36pvE8hI6t7jiY7NkyMtQwHQYDVR0OBBYEFDna/8ooFIqodBMIueQOqdL6fp1pMA4GA1UdDwEB/wQEAwIBBjASBgNVHRMBAf8ECDAGAQH/AgEAMD4GA1UdIAQ3MDUwMwYEVR0gADArMCkGCCsGAQUFBwIBFh1odHRwczovL3NlY3VyZS5jb21vZG8uY29tL0NQUzBMBgNVHR8ERTBDMEGgP6A9hjtodHRwOi8vY3JsLmNvbW9kb2NhLmNvbS9DT01PRE9SU0FDZXJ0aWZpY2F0aW9uQXV0aG9yaXR5LmNybDBxBggrBgEFBQcBAQRlMGMwOwYIKwYBBQUHMAKGL2h0dHA6Ly9jcnQuY29tb2RvY2EuY29tL0NPTU9ET1JTQUFkZFRydXN0Q0EuY3J0MCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5jb21vZG9jYS5jb20wDQYJKoZIhvcNAQEMBQADggIBAERCnUFRK0iIXZebeV4RAUpSGXtBLMeJPNBy3IX6WK/VJeQT+FhlZ58N/1eLqYVeyqZLsKeyLeCMIs37/3mkjCuN/gI9JN6pXV/kD0fQ22YlPodHDK4ixVAihNftSlka9pOlk7DgG4HyVsTIEFPk1Hax0VtpS3ey4E/EhOfUoFDuPPpE/NBXueEoU/1Tzdy5H3pAvTA/2GzS8+cHnx8iteoiccsq8FZ8/qyo0QYPFBRSTP5kKwxpKrgNUG4+BAe/eiCL+O5lCeHHSQgyPQ0ofkkdt0rvAucNgBfIXOBhYsvss2B5JdoaZXOcOBCgJjqwyBZ9kzEi7nQLiMBciUEAKKlHMd99SUWa9eanRRrSjhMQ34Ovmw2tfn6dNVA0BM7pINae253UqNpktNEvWS5eojZh1CSggjMziqHRbO9haKPl0latxf1eYusVqHQSTC8xjOnB3xBLAer2VBvNfzu9XJ/B288ByvK6YBIhMe2pZLiySVgXbVrXzYxtvp5/4gJYp9vDLVj2dAZqmvZh+fYAtmnYOosxWd2R5nwnI4fdAw+PKowegwFOAWEMUnNt/AiiuSpm5HZNMaBWm9lTjaK2jwLI5jqmBNFI+8NKAnb9L9K8E7bobTQk+p0pisehKxTxlgBzuRPpwLk6R1YCcYAnpLwltum95OmYdBbxN4SBB7SC",
"parsed": {
"version": 3,
"serial_number": "8843850678629180984542216369971314136",
"signature_algorithm": {
"name": "SHA384-RSA",
"oid": "1.2.840.113549.1.1.12"
},
"issuer": {
"common_name": [
"COMODO RSA Certification Authority"
],
"country": [
"GB"
],
"locality": [
"Salford"
],
"province": [
"Greater Manchester"
],
"organization": [
"COMODO CA Limited"
]
},
"issuer_dn": "C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Certification Authority",
"validity": {
"start": "2012-02-12T00:00:00Z",
"end": "2027-02-11T23:59:59Z",
"length": 473385599
},
"subject": {
"common_name": [
"COMODO RSA Extended Validation Secure Server CA"
],
"country": [
"GB"
],
"locality": [
"Salford"
],
"province": [
"Greater Manchester"
],
"organization": [
"COMODO CA Limited"
]
},
"subject_dn": "C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Extended Validation Secure Server CA",
"subject_key_info": {
"key_algorithm": {
"name": "RSA"
},
"rsa_public_key": {
"exponent": 65537,
"modulus": "lVbeVLTf1QJJe9FbXKKyHo+cK2JMK40SKPMalaPGEP0p3uGfCzhAk9HvbpUQ/OGQF3cs7nU+e2PsYZJuTzurgElr3wDqAwB/L3XVKC/sVmePgIOjvdwDmZOLlJFWW6G4ajo/Br0OksxgnP214J9mMF/b5pTwlWqvyIqvgNnmiDkBfBzAxSr3e5Wg8narbZtyOTDr0VdVAZ1YEZ18bYSPSeidCfw8/QpKdhQhXBZzQCMZdMO6WAqmli7eNuWf0MLw4eDBYuPCGEUZUaoXHugjddTI0JYT/8ck0YwLJ66eetw6YWNgiJctXQUL5Tvrrs46R3N2qPos3cCHF+msMJn4Hw==",
"length": 2048
},
"fingerprint_sha256": "15baffe5a48ea382916a5f18138f6de2573be883a72bfa2da3d3565757122963"
},
"extensions": {
"key_usage": {
"certificate_sign": true,
"crl_sign": true,
"value": 96
},
"basic_constraints": {
"is_ca": true,
"max_path_len": 0
},
"crl_distribution_points": [
"http://crl.comodoca.com/COMODORSACertificationAuthority.crl"
],
"authority_key_id": "bbaf7e023dfaa6f13c848eadee3898ecd93232d4",
"subject_key_id": "39daffca28148aa8741308b9e40ea9d2fa7e9d69",
"certificate_policies": [
{
"id": "2.5.29.32.0",
"cps": [
"https://secure.comodo.com/CPS"
]
}
],
"authority_info_access": {
"ocsp_urls": [
"http://ocsp.comodoca.com"
],
"issuer_urls": [
"http://crt.comodoca.com/COMODORSAAddTrustCA.crt"
]
}
},
"signature": {
"signature_algorithm": {
"name": "SHA384-RSA",
"oid": "1.2.840.113549.1.1.12"
},
"value": "REKdQVErSIhdl5t5XhEBSlIZe0Esx4k80HLchfpYr9Ul5BP4WGVnnw3/V4uphV7Kpkuwp7It4Iwizfv/eaSMK43+Aj0k3qldX+QPR9DbZiU+h0cMriLFUCKE1+1KWRr2k6WTsOAbgfJWxMgQU+TUdrHRW2lLd7LgT8SE59SgUO48+kT80Fe54ShT/VPN3LkfekC9MD/YbNLz5wefHyK16iJxyyrwVnz+rKjRBg8UFFJM/mQrDGkquA1Qbj4EB796IIv47mUJ4cdJCDI9DSh+SR23Su8C5w2AF8hc4GFiy+yzYHkl2hplc5w4EKAmOrDIFn2TMSLudAuIwFyJQQAoqUcx331JRZr15qdFGtKOExDfg6+bDa1+fp01UDQEzukg1p7bndSo2mS00S9ZLl6iNmHUJKCCMzOKodFs72Foo+XSVq3F/V5i6xWodBJMLzGM6cHfEEsB6vZUG81/O71cn8HbzwHK8rpgEiEx7alkuLJJWBdtWtfNjG2+nn/iAlin28MtWPZ0Bmqa9mH59gC2adg6izFZ3ZHmfCcjh90DD48qjB6DAU4BYQxSc238CKK5Kmbkdk0xoFab2VONoraPAsjmOqYE0Uj7w0oCdv0v0rwTtuhtNCT6nSmKx6ErFPGWAHO5E+nAuTpHVgJxgCekvCW26b3k6Zh0FvE3hIEHtII=",
"valid": false,
"self_signed": false
},
"fingerprint_md5": "17ba113e044a9b3cdeb0a54a6ae18987",
"fingerprint_sha1": "1f365c20e52ad2a6b09020a0e5539759c98df8d0",
"fingerprint_sha256": "7e0e16c0056f41a9f4c61f571503c3bcf079e2bddb228bf2219ac31200496b5c",
"tbs_noct_fingerprint": "11c343c727e254640a7345ce1e712fa3a67f5d30f4aab33e20da715bbde1f2c0",
"spki_subject_fingerprint": "c36bb4e1b75fef504529054ffdf02eaad42ef8da95b828a330a54d1153011a35",
"tbs_fingerprint": "11c343c727e254640a7345ce1e712fa3a67f5d30f4aab33e20da715bbde1f2c0",
"validation_level": "unknown",
"redacted": false
}
},
{
"raw": "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",
"parsed": {
"version": 3,
"serial_number": "52374340215108295845375962883522092578",
"signature_algorithm": {
"name": "SHA384-RSA",
"oid": "1.2.840.113549.1.1.12"
},
"issuer": {
"common_name": [
"AddTrust External CA Root"
],
"country": [
"SE"
],
"organization": [
"AddTrust AB"
],
"organizational_unit": [
"AddTrust External TTP Network"
]
},
"issuer_dn": "C=SE, O=AddTrust AB, OU=AddTrust External TTP Network, CN=AddTrust External CA Root",
"validity": {
"start": "2000-05-30T10:48:38Z",
"end": "2020-05-30T10:48:38Z",
"length": 631152000
},
"subject": {
"common_name": [
"COMODO RSA Certification Authority"
],
"country": [
"GB"
],
"locality": [
"Salford"
],
"province": [
"Greater Manchester"
],
"organization": [
"COMODO CA Limited"
]
},
"subject_dn": "C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Certification Authority",
"subject_key_info": {
"key_algorithm": {
"name": "RSA"
},
"rsa_public_key": {
"exponent": 65537,
"modulus": "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",
"length": 4096
},
"fingerprint_sha256": "82b5f84daf47a59c7ab521e4982aefa40a53406a3aec26039efa6b2e0e7244c1"
},
"extensions": {
"key_usage": {
"digital_signature": true,
"certificate_sign": true,
"crl_sign": true,
"value": 97
},
"basic_constraints": {
"is_ca": true
},
"crl_distribution_points": [
"http://crl.usertrust.com/AddTrustExternalCARoot.crl"
],
"authority_key_id": "adbd987a34b426f7fac42654ef03bde024cb541a",
"subject_key_id": "bbaf7e023dfaa6f13c848eadee3898ecd93232d4",
"certificate_policies": [
{
"id": "2.5.29.32.0"
}
],
"authority_info_access": {
"ocsp_urls": [
"http://ocsp.usertrust.com"
]
}
},
"signature": {
"signature_algorithm": {
"name": "SHA384-RSA",
"oid": "1.2.840.113549.1.1.12"
},
"value": "ZL+D8V+ahdDNuKEpVw3oWvfR6T7ydgRu8VJwux48/00NdGrMgYIl08OgKl1M9bqLoW3EVAl1x+MnDl2EeTdAE3f1tKwc0DurFxLW7zQYfivpedOrV0UMryj60NvlUJWIu9+FV2l9kthSynOBvxzz5rhuZhEFsx6ULX+RlZJZ8UzOo5FxTHxHDDsLGfahsWyGPlyqxC6Cy/kHlrpITZDylMipc6LrBnsjnd6i801Vn3phRZgYaMdeQGsj9Xl674y1a4u3b0b0e/E9SwTYk4BZWuBBJB2yjxVgWEfb725G/RX12V+as9vYuORAs82XOa6Fux2OvNyHm9Gm7/E7bxA4bw==",
"valid": false,
"self_signed": false
},
"fingerprint_md5": "1edaf9ae99ce2920667d0e9a8b3f8c9c",
"fingerprint_sha1": "f5ad0bcc1ad56cd150725b1c866c30ad92ef21b0",
"fingerprint_sha256": "4f32d5dc00f715250abcc486511e37f501a899deb3bf7ea8adbbd3aef1c412da",
"tbs_noct_fingerprint": "0d73a614eef7596cf5a34733f74daf2ccfe4df7b4a40069bf43c43e428264177",
"spki_subject_fingerprint": "8f7b3b10c2a4c769ba170e29bdb071bd49b42a8da31e7730f7898de94f7f0d73",
"tbs_fingerprint": "0d73a614eef7596cf5a34733f74daf2ccfe4df7b4a40069bf43c43e428264177",
"validation_level": "unknown",
"redacted": false
}
},
{
"raw": "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",
"parsed": {
"version": 3,
"serial_number": "8843850678629180984542216369971314136",
"signature_algorithm": {
"name": "SHA384-RSA",
"oid": "1.2.840.113549.1.1.12"
},
"issuer": {
"common_name": [
"COMODO RSA Certification Authority"
],
"country": [
"GB"
],
"locality": [
"Salford"
],
"province": [
"Greater Manchester"
],
"organization": [
"COMODO CA Limited"
]
},
"issuer_dn": "C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Certification Authority",
"validity": {
"start": "2012-02-12T00:00:00Z",
"end": "2027-02-11T23:59:59Z",
"length": 473385599
},
"subject": {
"common_name": [
"COMODO RSA Extended Validation Secure Server CA"
],
"country": [
"GB"
],
"locality": [
"Salford"
],
"province": [
"Greater Manchester"
],
"organization": [
"COMODO CA Limited"
]
},
"subject_dn": "C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Extended Validation Secure Server CA",
"subject_key_info": {
"key_algorithm": {
"name": "RSA"
},
"rsa_public_key": {
"exponent": 65537,
"modulus": "lVbeVLTf1QJJe9FbXKKyHo+cK2JMK40SKPMalaPGEP0p3uGfCzhAk9HvbpUQ/OGQF3cs7nU+e2PsYZJuTzurgElr3wDqAwB/L3XVKC/sVmePgIOjvdwDmZOLlJFWW6G4ajo/Br0OksxgnP214J9mMF/b5pTwlWqvyIqvgNnmiDkBfBzAxSr3e5Wg8narbZtyOTDr0VdVAZ1YEZ18bYSPSeidCfw8/QpKdhQhXBZzQCMZdMO6WAqmli7eNuWf0MLw4eDBYuPCGEUZUaoXHugjddTI0JYT/8ck0YwLJ66eetw6YWNgiJctXQUL5Tvrrs46R3N2qPos3cCHF+msMJn4Hw==",
"length": 2048
},
"fingerprint_sha256": "15baffe5a48ea382916a5f18138f6de2573be883a72bfa2da3d3565757122963"
},
"extensions": {
"key_usage": {
"certificate_sign": true,
"crl_sign": true,
"value": 96
},
"basic_constraints": {
"is_ca": true,
"max_path_len": 0
},
"crl_distribution_points": [
"http://crl.comodoca.com/COMODORSACertificationAuthority.crl"
],
"authority_key_id": "bbaf7e023dfaa6f13c848eadee3898ecd93232d4",
"subject_key_id": "39daffca28148aa8741308b9e40ea9d2fa7e9d69",
"certificate_policies": [
{
"id": "2.5.29.32.0",
"cps": [
"https://secure.comodo.com/CPS"
]
}
],
"authority_info_access": {
"ocsp_urls": [
"http://ocsp.comodoca.com"
],
"issuer_urls": [
"http://crt.comodoca.com/COMODORSAAddTrustCA.crt"
]
}
},
"signature": {
"signature_algorithm": {
"name": "SHA384-RSA",
"oid": "1.2.840.113549.1.1.12"
},
"value": "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",
"valid": false,
"self_signed": false
},
"fingerprint_md5": "17ba113e044a9b3cdeb0a54a6ae18987",
"fingerprint_sha1": "1f365c20e52ad2a6b09020a0e5539759c98df8d0",
"fingerprint_sha256": "7e0e16c0056f41a9f4c61f571503c3bcf079e2bddb228bf2219ac31200496b5c",
"tbs_noct_fingerprint": "11c343c727e254640a7345ce1e712fa3a67f5d30f4aab33e20da715bbde1f2c0",
"spki_subject_fingerprint": "c36bb4e1b75fef504529054ffdf02eaad42ef8da95b828a330a54d1153011a35",
"tbs_fingerprint": "11c343c727e254640a7345ce1e712fa3a67f5d30f4aab33e20da715bbde1f2c0",
"validation_level": "unknown",
"redacted": false
}
},
{
"raw": "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",
"parsed": {
"version": 3,
"serial_number": "52374340215108295845375962883522092578",
"signature_algorithm": {
"name": "SHA384-RSA",
"oid": "1.2.840.113549.1.1.12"
},
"issuer": {
"common_name": [
"AddTrust External CA Root"
],
"country": [
"SE"
],
"organization": [
"AddTrust AB"
],
"organizational_unit": [
"AddTrust External TTP Network"
]
},
"issuer_dn": "C=SE, O=AddTrust AB, OU=AddTrust External TTP Network, CN=AddTrust External CA Root",
"validity": {
"start": "2000-05-30T10:48:38Z",
"end": "2020-05-30T10:48:38Z",
"length": 631152000
},
"subject": {
"common_name": [
"COMODO RSA Certification Authority"
],
"country": [
"GB"
],
"locality": [
"Salford"
],
"province": [
"Greater Manchester"
],
"organization": [
"COMODO CA Limited"
]
},
"subject_dn": "C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Certification Authority",
"subject_key_info": {
"key_algorithm": {
"name": "RSA"
},
"rsa_public_key": {
"exponent": 65537,
"modulus": "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",
"length": 4096
},
"fingerprint_sha256": "82b5f84daf47a59c7ab521e4982aefa40a53406a3aec26039efa6b2e0e7244c1"
},
"extensions": {
"key_usage": {
"digital_signature": true,
"certificate_sign": true,
"crl_sign": true,
"value": 97
},
"basic_constraints": {
"is_ca": true
},
"crl_distribution_points": [
"http://crl.usertrust.com/AddTrustExternalCARoot.crl"
],
"authority_key_id": "adbd987a34b426f7fac42654ef03bde024cb541a",
"subject_key_id": "bbaf7e023dfaa6f13c848eadee3898ecd93232d4",
"certificate_policies": [
{
"id": "2.5.29.32.0"
}
],
"authority_info_access": {
"ocsp_urls": [
"http://ocsp.usertrust.com"
]
}
},
"signature": {
"signature_algorithm": {
"name": "SHA384-RSA",
"oid": "1.2.840.113549.1.1.12"
},
"value": "ZL+D8V+ahdDNuKEpVw3oWvfR6T7ydgRu8VJwux48/00NdGrMgYIl08OgKl1M9bqLoW3EVAl1x+MnDl2EeTdAE3f1tKwc0DurFxLW7zQYfivpedOrV0UMryj60NvlUJWIu9+FV2l9kthSynOBvxzz5rhuZhEFsx6ULX+RlZJZ8UzOo5FxTHxHDDsLGfahsWyGPlyqxC6Cy/kHlrpITZDylMipc6LrBnsjnd6i801Vn3phRZgYaMdeQGsj9Xl674y1a4u3b0b0e/E9SwTYk4BZWuBBJB2yjxVgWEfb725G/RX12V+as9vYuORAs82XOa6Fux2OvNyHm9Gm7/E7bxA4bw==",
"valid": false,
"self_signed": false
},
"fingerprint_md5": "1edaf9ae99ce2920667d0e9a8b3f8c9c",
"fingerprint_sha1": "f5ad0bcc1ad56cd150725b1c866c30ad92ef21b0",
"fingerprint_sha256": "4f32d5dc00f715250abcc486511e37f501a899deb3bf7ea8adbbd3aef1c412da",
"tbs_noct_fingerprint": "0d73a614eef7596cf5a34733f74daf2ccfe4df7b4a40069bf43c43e428264177",
"spki_subject_fingerprint": "8f7b3b10c2a4c769ba170e29bdb071bd49b42a8da31e7730f7898de94f7f0d73",
"tbs_fingerprint": "0d73a614eef7596cf5a34733f74daf2ccfe4df7b4a40069bf43c43e428264177",
"validation_level": "unknown",
"redacted": false
}
},
{
"raw": "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",
"parsed": {
"version": 3,
"serial_number": "7",
"signature_algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"issuer": {
"common_name": [
"Go Daddy Root Certificate Authority - G2"
],
"country": [
"US"
],
"locality": [
"Scottsdale"
],
"province": [
"Arizona"
],
"organization": [
"GoDaddy.com, Inc."
]
},
"issuer_dn": "C=US, ST=Arizona, L=Scottsdale, O=GoDaddy.com, Inc., CN=Go Daddy Root Certificate Authority - G2",
"validity": {
"start": "2011-05-03T07:00:00Z",
"end": "2031-05-03T07:00:00Z",
"length": 631152000
},
"subject": {
"common_name": [
"Go Daddy Secure Certificate Authority - G2"
],
"country": [
"US"
],
"locality": [
"Scottsdale"
],
"province": [
"Arizona"
],
"organization": [
"GoDaddy.com, Inc."
],
"organizational_unit": [
"http://certs.godaddy.com/repository/"
]
},
"subject_dn": "C=US, ST=Arizona, L=Scottsdale, O=GoDaddy.com, Inc., OU=http://certs.godaddy.com/repository/, CN=Go Daddy Secure Certificate Authority - G2",
"subject_key_info": {
"key_algorithm": {
"name": "RSA"
},
"rsa_public_key": {
"exponent": 65537,
"modulus": "ueDLENSvdr3Uk2LrMGS4gQhswwTZYheOL/8+Zc+PzmLmPFIc2hZFS1WreGtjg2KQzg9pbJnIGhSLTMxFM+qI3J6jryv+gGGdeVfEzy70PzA8XUf8mha8wzeWQVGOEUtU+Ci+0Iy+8DA4HvOwJvhmR2Nt3nEmR484R1PRRh2049wA6kWsvbxx2apvANvbzTA6eU9fTEf4He9bwsSdYDuxskOR2KQzTuqz1idPrSWKpcb01dCmrnQFZFeItURV1C0qOj74uL3pMgoClGTEFjpQ8Uqu53kzrwwgB3/o3wQ5wmkCbGNS+nfBG8h0h8i5kxhQVDVLaU68O9NJLh/cwdJS+w==",
"length": 2048
},
"fingerprint_sha256": "f11c3dd048f74edb7c45192b83e5980d2f67ec84b4ddb9396e33ff5173ed698f"
},
"extensions": {
"key_usage": {
"certificate_sign": true,
"crl_sign": true,
"value": 96
},
"basic_constraints": {
"is_ca": true
},
"crl_distribution_points": [
"http://crl.godaddy.com/gdroot-g2.crl"
],
"authority_key_id": "3a9a8507106728b6eff6bd05416e20c194da0fde",
"subject_key_id": "40c2bd278ecc348330a233d7fb6cb3f0b42c80ce",
"certificate_policies": [
{
"id": "2.5.29.32.0",
"cps": [
"https://certs.godaddy.com/repository/"
]
}
],
"authority_info_access": {
"ocsp_urls": [
"http://ocsp.godaddy.com/"
]
}
},
"signature": {
"signature_algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"value": "CH5skxDIOLiWqZBL/6FfTwTvbD6ciAbJUI+mc/dXMRu+vOQv2/i601vgtOfmeWIODKLXamNzMbX1qEikOwgtol2Q17R8JU8RVjDEtkSdeyyd5V7m7wxhqr/kKhvuhJ64g33BQ85EpxNwDZEf9MgTrYNg2dhyqHMkHrWsIg7KF4liWEQbq4klAQAPzcQbYttRtNMPUSqb9Lxz/HbONqTN2dgs6q6b9SqykNFNdRiKP4pBkCN9W0v+pANYm0ayw2Bgg/h9UEHOwqGQw7vvAi/SFVTuRBXZCq6nijPtsS12NibcBOuf92EfFdyHb+5GliitoSZ9CgmnLgSjjbz4vAQwAQ==",
"valid": false,
"self_signed": false
},
"fingerprint_md5": "96c25031bc0dc35cfba723731e1b4140",
"fingerprint_sha1": "27ac9369faf25207bb2627cefaccbe4ef9c319b8",
"fingerprint_sha256": "973a41276ffd01e027a2aad49e34c37846d3e976ff6a620b6712e33832041aa6",
"tbs_noct_fingerprint": "f9ff37f02e632cb7387025c07e57908a3d371b7c95d8cdd0390de231ed943a12",
"spki_subject_fingerprint": "340ffdeae9152c43ef716c6e790f869029dbb48a0f36a5b0756dd74e2b1e242d",
"tbs_fingerprint": "f9ff37f02e632cb7387025c07e57908a3d371b7c95d8cdd0390de231ed943a12",
"validation_level": "unknown",
"redacted": false
}
},
{
"raw": "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",
"parsed": {
"version": 3,
"serial_number": "1828629",
"signature_algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"issuer": {
"country": [
"US"
],
"organization": [
"The Go Daddy Group, Inc."
],
"organizational_unit": [
"Go Daddy Class 2 Certification Authority"
]
},
"issuer_dn": "C=US, O=The Go Daddy Group, Inc., OU=Go Daddy Class 2 Certification Authority",
"validity": {
"start": "2014-01-01T07:00:00Z",
"end": "2031-05-30T07:00:00Z",
"length": 549331200
},
"subject": {
"common_name": [
"Go Daddy Root Certificate Authority - G2"
],
"country": [
"US"
],
"locality": [
"Scottsdale"
],
"province": [
"Arizona"
],
"organization": [
"GoDaddy.com, Inc."
]
},
"subject_dn": "C=US, ST=Arizona, L=Scottsdale, O=GoDaddy.com, Inc., CN=Go Daddy Root Certificate Authority - G2",
"subject_key_info": {
"key_algorithm": {
"name": "RSA"
},
"rsa_public_key": {
"exponent": 65537,
"modulus": "v3FiCPH6WTT3G8kYo/eASVjpIoMTpsUgQwE7hPHmhUmfJ+r2hBtOoLTbcJjHMgGxBT4HTu70+k8vWTAi56sZVmvigAf88xZ1gDlRe+X5NbZ0TqmNghPktj+pA4P6or6KFWp/3gvDthkUBcrqw6gElDtGfDIN8wBmIsiNaW02jBEYt9OyHGC0OPoCjM7T3UYH3go+6118yHz7sCtTpJJiaVElBWEaRIGMLKlDliPfrDqBmg4pxRyp6V0etp6eMAo5zvGIgPtLXcwy7IViQyU0AlYnAZG0O3AqP26x6JyIAX2f1PnbU21gnb8s51iruF9G/M7EGwM8CetJMVxpRrPgRw==",
"length": 2048
},
"fingerprint_sha256": "2a8f2d8af0eb123898f74c866ac3fa669054e23c17bc7a95bd0234192dc635d0"
},
"extensions": {
"key_usage": {
"certificate_sign": true,
"crl_sign": true,
"value": 96
},
"basic_constraints": {
"is_ca": true
},
"crl_distribution_points": [
"http://crl.godaddy.com/gdroot.crl"
],
"authority_key_id": "d2c4b0d291d44c1171b361cb3da1fedda86ad4e3",
"subject_key_id": "3a9a8507106728b6eff6bd05416e20c194da0fde",
"certificate_policies": [
{
"id": "2.5.29.32.0",
"cps": [
"https://certs.godaddy.com/repository/"
]
}
],
"authority_info_access": {
"ocsp_urls": [
"http://ocsp.godaddy.com/"
]
}
},
"signature": {
"signature_algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"value": "WQtTvZKGEacke+1bMc8dH2xwxbhuvk679r6XUOEwf7ooXGKUwuN+M/f7QnaF25UcjCJYdQkMiGVnOQoWCcWgOJekxSOTP7QYpgEGRJHjp2kntFolfzq3Ms3dhP8qOCkzpN1nsoX+oYggHFCJyNwq9kIDN0zmiN/VryTyscPfzLXs4Jlet0lUIDyUGAzHHFIYSaRt4bNYC8nY7NmuHDKOKHAN4v6mF56ED71XcLNa6R+ghlO773z/aQvgSMO3kwvIClTErF0UZzdsyqUvMQg3qm5vjLyb4lddJIGvl5echK1srDdMZvNhkREg5L4wn3qkKQmw4TRfZHcYQFHfjDCmrw==",
"valid": false,
"self_signed": false
},
"fingerprint_md5": "81528b89e165204a75ad85e8c388cd68",
"fingerprint_sha1": "340b2880f446fcc04e59ed33f52b3d08d6242964",
"fingerprint_sha256": "3a2fbe92891e57fe05d57087f48e730f17e5a5f53ef403d618e5b74d7a7e6ecb",
"tbs_noct_fingerprint": "2b28d005cdd66259db111865ea17cbb60b3c8f547068638d902a64be784afdf8",
"spki_subject_fingerprint": "9a076dd81d34576c64b65bbdb28db1df943f7949d12c26de362178b1a9d2b6bf",
"tbs_fingerprint": "2b28d005cdd66259db111865ea17cbb60b3c8f547068638d902a64be784afdf8",
"validation_level": "unknown",
"redacted": false
}
},
{
"raw": "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",
"parsed": {
"version": 3,
"serial_number": "0",
"signature_algorithm": {
"name": "SHA1-RSA",
"oid": "1.2.840.113549.1.1.5"
},
"issuer": {
"country": [
"US"
],
"organization": [
"The Go Daddy Group, Inc."
],
"organizational_unit": [
"Go Daddy Class 2 Certification Authority"
]
},
"issuer_dn": "C=US, O=The Go Daddy Group, Inc., OU=Go Daddy Class 2 Certification Authority",
"validity": {
"start": "2004-06-29T17:06:20Z",
"end": "2034-06-29T17:06:20Z",
"length": 946684800
},
"subject": {
"country": [
"US"
],
"organization": [
"The Go Daddy Group, Inc."
],
"organizational_unit": [
"Go Daddy Class 2 Certification Authority"
]
},
"subject_dn": "C=US, O=The Go Daddy Group, Inc., OU=Go Daddy Class 2 Certification Authority",
"subject_key_info": {
"key_algorithm": {
"name": "RSA"
},
"rsa_public_key": {
"exponent": 3,
"modulus": "3p3X6lcYSaFb69dfSIbqvt3/5O9nHPRlaLNXcaBed7vtm0npcIA9VhhjCG/a8szQP38CVCJUENiygdTAdT1Lf8d3wz54qxoDtSBrL2orscWIfsS7HrDB2EUnb6o3WPeHJtfYLfapF7cfcjZOphc/ZZiS2ypuXaL+iOAL3n/ljRXh68s61eISohMt2I6vXxI9oAgFCLZcpWU4BEWZHqNgYHTFQaVyYhtixR9vXxpCvgJRZaiuIxhq/HgDqU1/gMP6q1r8oUCkyhkW/rLI715zDe53vZr2eZi8sQdnohUN3aBYxkR7Cj5iKF+6QQdTWM8Rfjh0xfj/tWmQj4R06pcbrw==",
"length": 2048
},
"fingerprint_sha256": "5632d97bfa775bf3c99ddea52fc2553410864016729c52dd6524c8a9c3b4489f"
},
"extensions": {
"basic_constraints": {
"is_ca": true
},
"authority_key_id": "d2c4b0d291d44c1171b361cb3da1fedda86ad4e3",
"subject_key_id": "d2c4b0d291d44c1171b361cb3da1fedda86ad4e3"
},
"signature": {
"signature_algorithm": {
"name": "SHA1-RSA",
"oid": "1.2.840.113549.1.1.5"
},
"value": "Mkvzsso+kfwSxqEHjI53oDMGFFyQHhj3CKY9Chn5h4ARbmnklhcw/zSRY3I47swcAaMdlCikMfZ6xFTX9uUxWAOizM5i25RFc7W/RckktdWCAq0jeWmNuLZNzs9MyjMj6ByIqp2LQW4WySDliZ7NO9pw936ZJiAUVCWrbnOF5pshnQpsgg6o+MIM+hAebJbvhw3ED2GLre6DK5X4jpKEcjnrIOqD7YPNl24IvOtOJrZzK+TT9kz+JnHiYRF0Sv9XGocPdUguz1FpF6ACEmGV1dFAshBM7sSsEEOmpZ4K1ZVimg3PiILFMgzkK59F5g2fKJyxuSpaV603D68df9u9nw==",
"valid": true,
"self_signed": true
},
"fingerprint_md5": "91de0625abdafd32170cbb25172a8467",
"fingerprint_sha1": "2796bae63f1801e277261ba0d77770028f20eee4",
"fingerprint_sha256": "c3846bf24b9e93ca64274c0ec67c1ecc5e024ffcacd2d74019350e81fe546ae4",
"tbs_noct_fingerprint": "e6924ddbf03e3feefd1894193ee042e06a69d6f248ad9e216da42b288f2c1019",
"spki_subject_fingerprint": "bb212cabca4d2a4dc90abe13d2a20b78ffd62f2f8171faebf51cdfe7d55fba5b",
"tbs_fingerprint": "e6924ddbf03e3feefd1894193ee042e06a69d6f248ad9e216da42b288f2c1019",
"validation_level": "unknown",
"redacted": false
}
},
{
"raw": "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",
"parsed": {
"version": 3,
"serial_number": "146040",
"signature_algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"issuer": {
"common_name": [
"GeoTrust Global CA"
],
"country": [
"US"
],
"organization": [
"GeoTrust Inc."
]
},
"issuer_dn": "C=US, O=GeoTrust Inc., CN=GeoTrust Global CA",
"validity": {
"start": "2014-08-29T22:24:58Z",
"end": "2022-05-20T22:24:58Z",
"length": 243734400
},
"subject": {
"common_name": [
"GeoTrust DV SSL CA - G4"
],
"country": [
"US"
],
"organization": [
"GeoTrust Inc."
],
"organizational_unit": [
"Domain Validated SSL"
]
},
"subject_dn": "C=US, O=GeoTrust Inc., OU=Domain Validated SSL, CN=GeoTrust DV SSL CA - G4",
"subject_key_info": {
"key_algorithm": {
"name": "RSA"
},
"rsa_public_key": {
"exponent": 65537,
"modulus": "30GUetr35DFDtuoBG1zOY+r6baPZau4tmnX51ZxbvTTf2BzJbdgEiNputbe18DCuQNZd+sRTwdQinQROEaaV1UV8QQVY4Ezd+e5VvV9G3K0TCJ0s5PeC5gcrng6MNKHOxKHggXCGAAY/Lep8myiuGyiLOQnT5/BFpLG6EWeQVXuP3u04XKHh44PEw3KRT5juHMKAqmSlPoNiHMzgnvhawBMSfaKni6PnnyrXm8rL7ZcBnCiEUQRQQby0/HjpG88U6h8P/C4BMo22NcsKGDvsWj48G9OZQx4v973zWxK5B17tPtGph8x3cifU2XWiY0uTNr3lXNe/X3kNszKnC7JjIw==",
"length": 2048
},
"fingerprint_sha256": "e3bbcca580da1675330d141d365b12a696760db3017cae6ec2104d6a46f3da7e"
},
"extensions": {
"key_usage": {
"certificate_sign": true,
"crl_sign": true,
"value": 96
},
"basic_constraints": {
"is_ca": true,
"max_path_len": 0
},
"crl_distribution_points": [
"http://g.symcb.com/crls/gtglobal.crl"
],
"authority_key_id": "c07a98688d89fbab05640c117daa7d65b8cacc4e",
"subject_key_id": "0b50ec77ef2a9bffec03a10affadc6e42a18c73e",
"certificate_policies": [
{
"id": "2.16.840.1.113733.1.7.54",
"cps": [
"http://www.geotrust.com/resources/cps"
]
}
],
"authority_info_access": {
"ocsp_urls": [
"http://g.symcd.com"
]
}
},
"signature": {
"signature_algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"value": "MyTVkKopDDW5L8PHQpPAxhBLAwh2hBCi4OdTEifyCtp/Otz9XHlajxd0Q1Ox1dFdWbmmhGTK8ToKWZYQv6mBV4tch9x/4+S7BXqgMgkTThCBKB+cA2K89AG1KYNGB7nnuF3I6dHdrTv4NNvB0ZWpkRjtPCw3EU3M/lM+UEP5w1ZBrFObbAWymuLgWVcwMrYmThMlzfpIcA91VWAR9TvVXlo8i1sPD2JCSGGFixD0wYi/f1+KwtfNK5RcHzRKCK/rromoSHVVlR27wJoBufQDIj7U5lIwDWe5wJH9LUwwjr2MpQSRu6Srfw/Yb/BmAMmjXPWwj4PmnFrmtrnFvL7kAg==",
"valid": false,
"self_signed": false
},
"fingerprint_md5": "ebaa3b442a69dbf9824c53532dbf4eaa",
"fingerprint_sha1": "35e540f4d36e94d9005b18dce27ca2ae8ca0020d",
"fingerprint_sha256": "8bc1b9d7defcca1ccd09bacda88f27762092f1ed4a34ae5e4602bb9cc915c506",
"tbs_noct_fingerprint": "28611f809895c11bd8ee76067e87bf16823d9077f36d2b32c5374d5de9b71b82",
"spki_subject_fingerprint": "f660106476da1d0343b0f2aabc739b6040a589183d64fd315a1a02edc1e23ee1",
"tbs_fingerprint": "28611f809895c11bd8ee76067e87bf16823d9077f36d2b32c5374d5de9b71b82",
"validation_level": "unknown",
"redacted": false
}
},
{
"raw": "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",
"parsed": {
"version": 3,
"serial_number": "1227750",
"signature_algorithm": {
"name": "SHA1-RSA",
"oid": "1.2.840.113549.1.1.5"
},
"issuer": {
"country": [
"US"
],
"organization": [
"Equifax"
],
"organizational_unit": [
"Equifax Secure Certificate Authority"
]
},
"issuer_dn": "C=US, O=Equifax, OU=Equifax Secure Certificate Authority",
"validity": {
"start": "2002-05-21T04:00:00Z",
"end": "2018-08-21T04:00:00Z",
"length": 512870400
},
"subject": {
"common_name": [
"GeoTrust Global CA"
],
"country": [
"US"
],
"organization": [
"GeoTrust Inc."
]
},
"subject_dn": "C=US, O=GeoTrust Inc., CN=GeoTrust Global CA",
"subject_key_info": {
"key_algorithm": {
"name": "RSA"
},
"rsa_public_key": {
"exponent": 65537,
"modulus": "2swYYzD99BcjGlZ+W988bDjkcbd4kdS8odhM+KhDtgPpTSEHCIjaWC9mOSm9BXiLnTjoBbdqfnGk5sRgprDvgOSJKA+eJdbtg/OtppHHmMlCGDUUna2YRpIuT8rxh0PBFpVXLVDviS2Aelet8u5fa9IAjbkU+BQVNdnARqN7csiRv8lVK83Qlz6cJmTM386DGXHKTubU1XupGc1V3sjs0l44U+VcT4wt/lAjNvxm5suOpDkZALeVAjmRCw7+OC7RHQWa9k0+bw8HHa8sHo9gOeL6NlMTOdReJivbPagUvTLrGAMoUgRx5aszPeE4uwc2hGKceeoWMPRfwCvocWvk+Q==",
"length": 2048
},
"fingerprint_sha256": "87af34d66fb3f2fdf36e09111e9aba2f6f44b207f3863f3d0b54b25023909aa5"
},
"extensions": {
"key_usage": {
"certificate_sign": true,
"crl_sign": true,
"value": 96
},
"basic_constraints": {
"is_ca": true
},
"crl_distribution_points": [
"http://crl.geotrust.com/crls/secureca.crl"
],
"authority_key_id": "48e668f92bd2b295d747d82320104f3398909fd4",
"subject_key_id": "c07a98688d89fbab05640c117daa7d65b8cacc4e",
"certificate_policies": [
{
"id": "2.5.29.32.0",
"cps": [
"https://www.geotrust.com/resources/repository"
]
}
]
},
"signature": {
"signature_algorithm": {
"name": "SHA1-RSA",
"oid": "1.2.840.113549.1.1.5"
},
"value": "duESbk5LFhKGMAaygQjP8AjHx3F+Zu7C7dQ7H//w8MhO1kM4sLkwfRjQVYOiass2EZzoSGajbX+4E9RH/otaXHP8rtkbMhk4q5c0FKqW0uujHBQISba75ZHvgzbrHVZvytq8c2OQ5H97PiLLPQftXzh0nOMDUE6hr5juYfKEPxI=",
"valid": false,
"self_signed": false
},
"fingerprint_md5": "2e7db2a31d0e3da4b25f49b9542a2e1a",
"fingerprint_sha1": "7359755c6df9a0abc3060bce369564c8ec4542a3",
"fingerprint_sha256": "3c35cc963eb004451323d3275d05b353235053490d9cd83729a2faf5e7ca1cc0",
"tbs_noct_fingerprint": "d9a0cb9c4ccbb1b56bfa3be2b1e323d83ec692c44617543a19817903472bd9b7",
"spki_subject_fingerprint": "9e5a774a418468af44637d1d9155bbe5d3f6a2c4517a84cbaf8b139efeda4982",
"tbs_fingerprint": "d9a0cb9c4ccbb1b56bfa3be2b1e323d83ec692c44617543a19817903472bd9b7",
"validation_level": "unknown",
"redacted": false
}
},
{
"raw": "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",
"parsed": {
"version": 3,
"serial_number": "146033",
"signature_algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"issuer": {
"common_name": [
"GeoTrust Global CA"
],
"country": [
"US"
],
"organization": [
"GeoTrust Inc."
]
},
"issuer_dn": "C=US, O=GeoTrust Inc., CN=GeoTrust Global CA",
"validity": {
"start": "2013-12-11T23:45:51Z",
"end": "2022-05-20T23:45:51Z",
"length": 266284800
},
"subject": {
"common_name": [
"RapidSSL SHA256 CA"
],
"country": [
"US"
],
"organization": [
"GeoTrust Inc."
]
},
"subject_dn": "C=US, O=GeoTrust Inc., CN=RapidSSL SHA256 CA",
"subject_key_info": {
"key_algorithm": {
"name": "RSA"
},
"rsa_public_key": {
"exponent": 65537,
"modulus": "u1jBEgEul9h9GKrIwuWF4hdsYC7JjTEFORoGmFbdVNcRjFlbPbFUrkshhTIWX1SG5tmx2GCJa1i+ctqgAEJ2sSdZTM3jutRc2aZ/uyt11UZEvexAXFm33Vmf8Wr3BvzWLxmKlRK6msrVMNI4/Bk7WxU7NtBDTdFlodSLwWBBs9ZwF8w5wJwMoD23ESJOztmpetIqYpygC04q18NhWoXdXBC5VD0tA/hJ8LySt7ecMcfpuKqCCwW5Mc0IW7siC/acjopVHHZDdvDibvDfqCl158ikh4tq8bsIyTYYZe5QQ7hdctUoOeFTPiUs2itP3YqeUFDgb5rE1RkmiQF1cwmbOw==",
"length": 2048
},
"fingerprint_sha256": "4a5b78f220554e3b914094e36f3a299a29d1ac7486b67758d3fb23d2515ff509"
},
"extensions": {
"key_usage": {
"certificate_sign": true,
"crl_sign": true,
"value": 96
},
"basic_constraints": {
"is_ca": true,
"max_path_len": 0
},
"subject_alt_name": {
"directory_names": [
{
"common_name": [
"SymantecPKI-1-569"
]
}
]
},
"crl_distribution_points": [
"http://g1.symcb.com/crls/gtglobal.crl"
],
"authority_key_id": "c07a98688d89fbab05640c117daa7d65b8cacc4e",
"subject_key_id": "97c227509ec2c9ec0c8832c87cade2a6014fda6f",
"certificate_policies": [
{
"id": "2.16.840.1.113733.1.7.54",
"cps": [
"http://www.geotrust.com/resources/cps"
]
}
],
"authority_info_access": {
"ocsp_urls": [
"http://g2.symcb.com"
]
}
},
"signature": {
"signature_algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"value": "NevhiyBWlLp6vXmp9uP+bji0MsGj21hWID59xzqxZ2nVeRQb9vrsYPJ5zQoMYIp0TKOTKqDwUX/N6fmS/ZarRfViPT9gRlATPSATGC6URq7VIf5Dockj/lPEvxrYrDrK3maXI67T30pNcx9vMaJRBBZqAOv5jUOB8FChH6bKOvMoPF9RrNcKRXdLDlJiG9g4UaCSLT+Qbsh+QJ8gRhVd4FB84XavXu0R0y8TubglpK9YCa81tGJUheNI3rzSkHp6pIQNo0LyUcDUrVNlXWz4Px8G8k/Ll6BKWcZ40egDuYVtLLrhX7atKz4lecWLVtXjCYDqwSfC2Q7sRwrp0Mr82A==",
"valid": false,
"self_signed": false
},
"fingerprint_md5": "901103db6490bcba382e65f965386519",
"fingerprint_sha1": "c86edbc71ab05078f61acdf3d8dc5db61eb75fb6",
"fingerprint_sha256": "e6683e88315cd1cb403c0cea490f7c4b4c82c91cd485037489aadbaa90839f61",
"tbs_noct_fingerprint": "6195cba89999775e05355bf42c846daefd3047ebd563f2caf1cb4fe6d043d6f7",
"spki_subject_fingerprint": "1c893a8e5d1e3110e7b23d526cf7c5655dbe5dcd88bf0b7a594b0a3eafaeb38a",
"tbs_fingerprint": "6195cba89999775e05355bf42c846daefd3047ebd563f2caf1cb4fe6d043d6f7",
"validation_level": "unknown",
"redacted": false
}
},
{
"raw": "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",
"parsed": {
"version": 3,
"serial_number": "1227750",
"signature_algorithm": {
"name": "SHA1-RSA",
"oid": "1.2.840.113549.1.1.5"
},
"issuer": {
"country": [
"US"
],
"organization": [
"Equifax"
],
"organizational_unit": [
"Equifax Secure Certificate Authority"
]
},
"issuer_dn": "C=US, O=Equifax, OU=Equifax Secure Certificate Authority",
"validity": {
"start": "2002-05-21T04:00:00Z",
"end": "2018-08-21T04:00:00Z",
"length": 512870400
},
"subject": {
"common_name": [
"GeoTrust Global CA"
],
"country": [
"US"
],
"organization": [
"GeoTrust Inc."
]
},
"subject_dn": "C=US, O=GeoTrust Inc., CN=GeoTrust Global CA",
"subject_key_info": {
"key_algorithm": {
"name": "RSA"
},
"rsa_public_key": {
"exponent": 65537,
"modulus": "2swYYzD99BcjGlZ+W988bDjkcbd4kdS8odhM+KhDtgPpTSEHCIjaWC9mOSm9BXiLnTjoBbdqfnGk5sRgprDvgOSJKA+eJdbtg/OtppHHmMlCGDUUna2YRpIuT8rxh0PBFpVXLVDviS2Aelet8u5fa9IAjbkU+BQVNdnARqN7csiRv8lVK83Qlz6cJmTM386DGXHKTubU1XupGc1V3sjs0l44U+VcT4wt/lAjNvxm5suOpDkZALeVAjmRCw7+OC7RHQWa9k0+bw8HHa8sHo9gOeL6NlMTOdReJivbPagUvTLrGAMoUgRx5aszPeE4uwc2hGKceeoWMPRfwCvocWvk+Q==",
"length": 2048
},
"fingerprint_sha256": "87af34d66fb3f2fdf36e09111e9aba2f6f44b207f3863f3d0b54b25023909aa5"
},
"extensions": {
"key_usage": {
"certificate_sign": true,
"crl_sign": true,
"value": 96
},
"basic_constraints": {
"is_ca": true
},
"crl_distribution_points": [
"http://crl.geotrust.com/crls/secureca.crl"
],
"authority_key_id": "48e668f92bd2b295d747d82320104f3398909fd4",
"subject_key_id": "c07a98688d89fbab05640c117daa7d65b8cacc4e",
"certificate_policies": [
{
"id": "2.5.29.32.0",
"cps": [
"https://www.geotrust.com/resources/repository"
]
}
]
},
"signature": {
"signature_algorithm": {
"name": "SHA1-RSA",
"oid": "1.2.840.113549.1.1.5"
},
"value": "duESbk5LFhKGMAaygQjP8AjHx3F+Zu7C7dQ7H//w8MhO1kM4sLkwfRjQVYOiass2EZzoSGajbX+4E9RH/otaXHP8rtkbMhk4q5c0FKqW0uujHBQISba75ZHvgzbrHVZvytq8c2OQ5H97PiLLPQftXzh0nOMDUE6hr5juYfKEPxI=",
"valid": false,
"self_signed": false
},
"fingerprint_md5": "2e7db2a31d0e3da4b25f49b9542a2e1a",
"fingerprint_sha1": "7359755c6df9a0abc3060bce369564c8ec4542a3",
"fingerprint_sha256": "3c35cc963eb004451323d3275d05b353235053490d9cd83729a2faf5e7ca1cc0",
"tbs_noct_fingerprint": "d9a0cb9c4ccbb1b56bfa3be2b1e323d83ec692c44617543a19817903472bd9b7",
"spki_subject_fingerprint": "9e5a774a418468af44637d1d9155bbe5d3f6a2c4517a84cbaf8b139efeda4982",
"tbs_fingerprint": "d9a0cb9c4ccbb1b56bfa3be2b1e323d83ec692c44617543a19817903472bd9b7",
"validation_level": "unknown",
"redacted": false
}
},
{
"raw": "MIIGDjCCA/agAwIBAgIQBqdDgNTr/tQ1taP34Wq92DANBgkqhkiG9w0BAQwFADCBhTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxKzApBgNVBAMTIkNPTU9ETyBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMTIwMjEyMDAwMDAwWhcNMjcwMjExMjM1OTU5WjCBkjELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxODA2BgNVBAMTL0NPTU9ETyBSU0EgRXh0ZW5kZWQgVmFsaWRhdGlvbiBTZWN1cmUgU2VydmVyIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAlVbeVLTf1QJJe9FbXKKyHo+cK2JMK40SKPMalaPGEP0p3uGfCzhAk9HvbpUQ/OGQF3cs7nU+e2PsYZJuTzurgElr3wDqAwB/L3XVKC/sVmePgIOjvdwDmZOLlJFWW6G4ajo/Br0OksxgnP214J9mMF/b5pTwlWqvyIqvgNnmiDkBfBzAxSr3e5Wg8narbZtyOTDr0VdVAZ1YEZ18bYSPSeidCfw8/QpKdhQhXBZzQCMZdMO6WAqmli7eNuWf0MLw4eDBYuPCGEUZUaoXHugjddTI0JYT/8ck0YwLJ66eetw6YWNgiJctXQUL5Tvrrs46R3N2qPos3cCHF+msMJn4HwIDAQABo4IBaTCCAWUwHwYDVR0jBBgwFoAUu69+Aj36pvE8hI6t7jiY7NkyMtQwHQYDVR0OBBYEFDna/8ooFIqodBMIueQOqdL6fp1pMA4GA1UdDwEB/wQEAwIBBjASBgNVHRMBAf8ECDAGAQH/AgEAMD4GA1UdIAQ3MDUwMwYEVR0gADArMCkGCCsGAQUFBwIBFh1odHRwczovL3NlY3VyZS5jb21vZG8uY29tL0NQUzBMBgNVHR8ERTBDMEGgP6A9hjtodHRwOi8vY3JsLmNvbW9kb2NhLmNvbS9DT01PRE9SU0FDZXJ0aWZpY2F0aW9uQXV0aG9yaXR5LmNybDBxBggrBgEFBQcBAQRlMGMwOwYIKwYBBQUHMAKGL2h0dHA6Ly9jcnQuY29tb2RvY2EuY29tL0NPTU9ET1JTQUFkZFRydXN0Q0EuY3J0MCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5jb21vZG9jYS5jb20wDQYJKoZIhvcNAQEMBQADggIBAERCnUFRK0iIXZebeV4RAUpSGXtBLMeJPNBy3IX6WK/VJeQT+FhlZ58N/1eLqYVeyqZLsKeyLeCMIs37/3mkjCuN/gI9JN6pXV/kD0fQ22YlPodHDK4ixVAihNftSlka9pOlk7DgG4HyVsTIEFPk1Hax0VtpS3ey4E/EhOfUoFDuPPpE/NBXueEoU/1Tzdy5H3pAvTA/2GzS8+cHnx8iteoiccsq8FZ8/qyo0QYPFBRSTP5kKwxpKrgNUG4+BAe/eiCL+O5lCeHHSQgyPQ0ofkkdt0rvAucNgBfIXOBhYsvss2B5JdoaZXOcOBCgJjqwyBZ9kzEi7nQLiMBciUEAKKlHMd99SUWa9eanRRrSjhMQ34Ovmw2tfn6dNVA0BM7pINae253UqNpktNEvWS5eojZh1CSggjMziqHRbO9haKPl0latxf1eYusVqHQSTC8xjOnB3xBLAer2VBvNfzu9XJ/B288ByvK6YBIhMe2pZLiySVgXbVrXzYxtvp5/4gJYp9vDLVj2dAZqmvZh+fYAtmnYOosxWd2R5nwnI4fdAw+PKowegwFOAWEMUnNt/AiiuSpm5HZNMaBWm9lTjaK2jwLI5jqmBNFI+8NKAnb9L9K8E7bobTQk+p0pisehKxTxlgBzuRPpwLk6R1YCcYAnpLwltum95OmYdBbxN4SBB7SC",
"parsed": {
"version": 3,
"serial_number": "8843850678629180984542216369971314136",
"signature_algorithm": {
"name": "SHA384-RSA",
"oid": "1.2.840.113549.1.1.12"
},
"issuer": {
"common_name": [
"COMODO RSA Certification Authority"
],
"country": [
"GB"
],
"locality": [
"Salford"
],
"province": [
"Greater Manchester"
],
"organization": [
"COMODO CA Limited"
]
},
"issuer_dn": "C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Certification Authority",
"validity": {
"start": "2012-02-12T00:00:00Z",
"end": "2027-02-11T23:59:59Z",
"length": 473385599
},
"subject": {
"common_name": [
"COMODO RSA Extended Validation Secure Server CA"
],
"country": [
"GB"
],
"locality": [
"Salford"
],
"province": [
"Greater Manchester"
],
"organization": [
"COMODO CA Limited"
]
},
"subject_dn": "C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Extended Validation Secure Server CA",
"subject_key_info": {
"key_algorithm": {
"name": "RSA"
},
"rsa_public_key": {
"exponent": 65537,
"modulus": "lVbeVLTf1QJJe9FbXKKyHo+cK2JMK40SKPMalaPGEP0p3uGfCzhAk9HvbpUQ/OGQF3cs7nU+e2PsYZJuTzurgElr3wDqAwB/L3XVKC/sVmePgIOjvdwDmZOLlJFWW6G4ajo/Br0OksxgnP214J9mMF/b5pTwlWqvyIqvgNnmiDkBfBzAxSr3e5Wg8narbZtyOTDr0VdVAZ1YEZ18bYSPSeidCfw8/QpKdhQhXBZzQCMZdMO6WAqmli7eNuWf0MLw4eDBYuPCGEUZUaoXHugjddTI0JYT/8ck0YwLJ66eetw6YWNgiJctXQUL5Tvrrs46R3N2qPos3cCHF+msMJn4Hw==",
"length": 2048
},
"fingerprint_sha256": "15baffe5a48ea382916a5f18138f6de2573be883a72bfa2da3d3565757122963"
},
"extensions": {
"key_usage": {
"certificate_sign": true,
"crl_sign": true,
"value": 96
},
"basic_constraints": {
"is_ca": true,
"max_path_len": 0
},
"crl_distribution_points": [
"http://crl.comodoca.com/COMODORSACertificationAuthority.crl"
],
"authority_key_id": "bbaf7e023dfaa6f13c848eadee3898ecd93232d4",
"subject_key_id": "39daffca28148aa8741308b9e40ea9d2fa7e9d69",
"certificate_policies": [
{
"id": "2.5.29.32.0",
"cps": [
"https://secure.comodo.com/CPS"
]
}
],
"authority_info_access": {
"ocsp_urls": [
"http://ocsp.comodoca.com"
],
"issuer_urls": [
"http://crt.comodoca.com/COMODORSAAddTrustCA.crt"
]
}
},
"signature": {
"signature_algorithm": {
"name": "SHA384-RSA",
"oid": "1.2.840.113549.1.1.12"
},
"value": "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",
"valid": false,
"self_signed": false
},
"fingerprint_md5": "17ba113e044a9b3cdeb0a54a6ae18987",
"fingerprint_sha1": "1f365c20e52ad2a6b09020a0e5539759c98df8d0",
"fingerprint_sha256": "7e0e16c0056f41a9f4c61f571503c3bcf079e2bddb228bf2219ac31200496b5c",
"tbs_noct_fingerprint": "11c343c727e254640a7345ce1e712fa3a67f5d30f4aab33e20da715bbde1f2c0",
"spki_subject_fingerprint": "c36bb4e1b75fef504529054ffdf02eaad42ef8da95b828a330a54d1153011a35",
"tbs_fingerprint": "11c343c727e254640a7345ce1e712fa3a67f5d30f4aab33e20da715bbde1f2c0",
"validation_level": "unknown",
"redacted": false
}
},
{
"raw": "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",
"parsed": {
"version": 3,
"serial_number": "52374340215108295845375962883522092578",
"signature_algorithm": {
"name": "SHA384-RSA",
"oid": "1.2.840.113549.1.1.12"
},
"issuer": {
"common_name": [
"AddTrust External CA Root"
],
"country": [
"SE"
],
"organization": [
"AddTrust AB"
],
"organizational_unit": [
"AddTrust External TTP Network"
]
},
"issuer_dn": "C=SE, O=AddTrust AB, OU=AddTrust External TTP Network, CN=AddTrust External CA Root",
"validity": {
"start": "2000-05-30T10:48:38Z",
"end": "2020-05-30T10:48:38Z",
"length": 631152000
},
"subject": {
"common_name": [
"COMODO RSA Certification Authority"
],
"country": [
"GB"
],
"locality": [
"Salford"
],
"province": [
"Greater Manchester"
],
"organization": [
"COMODO CA Limited"
]
},
"subject_dn": "C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Certification Authority",
"subject_key_info": {
"key_algorithm": {
"name": "RSA"
},
"rsa_public_key": {
"exponent": 65537,
"modulus": "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",
"length": 4096
},
"fingerprint_sha256": "82b5f84daf47a59c7ab521e4982aefa40a53406a3aec26039efa6b2e0e7244c1"
},
"extensions": {
"key_usage": {
"digital_signature": true,
"certificate_sign": true,
"crl_sign": true,
"value": 97
},
"basic_constraints": {
"is_ca": true
},
"crl_distribution_points": [
"http://crl.usertrust.com/AddTrustExternalCARoot.crl"
],
"authority_key_id": "adbd987a34b426f7fac42654ef03bde024cb541a",
"subject_key_id": "bbaf7e023dfaa6f13c848eadee3898ecd93232d4",
"certificate_policies": [
{
"id": "2.5.29.32.0"
}
],
"authority_info_access": {
"ocsp_urls": [
"http://ocsp.usertrust.com"
]
}
},
"signature": {
"signature_algorithm": {
"name": "SHA384-RSA",
"oid": "1.2.840.113549.1.1.12"
},
"value": "ZL+D8V+ahdDNuKEpVw3oWvfR6T7ydgRu8VJwux48/00NdGrMgYIl08OgKl1M9bqLoW3EVAl1x+MnDl2EeTdAE3f1tKwc0DurFxLW7zQYfivpedOrV0UMryj60NvlUJWIu9+FV2l9kthSynOBvxzz5rhuZhEFsx6ULX+RlZJZ8UzOo5FxTHxHDDsLGfahsWyGPlyqxC6Cy/kHlrpITZDylMipc6LrBnsjnd6i801Vn3phRZgYaMdeQGsj9Xl674y1a4u3b0b0e/E9SwTYk4BZWuBBJB2yjxVgWEfb725G/RX12V+as9vYuORAs82XOa6Fux2OvNyHm9Gm7/E7bxA4bw==",
"valid": false,
"self_signed": false
},
"fingerprint_md5": "1edaf9ae99ce2920667d0e9a8b3f8c9c",
"fingerprint_sha1": "f5ad0bcc1ad56cd150725b1c866c30ad92ef21b0",
"fingerprint_sha256": "4f32d5dc00f715250abcc486511e37f501a899deb3bf7ea8adbbd3aef1c412da",
"tbs_noct_fingerprint": "0d73a614eef7596cf5a34733f74daf2ccfe4df7b4a40069bf43c43e428264177",
"spki_subject_fingerprint": "8f7b3b10c2a4c769ba170e29bdb071bd49b42a8da31e7730f7898de94f7f0d73",
"tbs_fingerprint": "0d73a614eef7596cf5a34733f74daf2ccfe4df7b4a40069bf43c43e428264177",
"validation_level": "unknown",
"redacted": false
}
},
{
"raw": "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",
"parsed": {
"version": 3,
"serial_number": "1",
"signature_algorithm": {
"name": "SHA1-RSA",
"oid": "1.2.840.113549.1.1.5"
},
"issuer": {
"common_name": [
"AddTrust External CA Root"
],
"country": [
"SE"
],
"organization": [
"AddTrust AB"
],
"organizational_unit": [
"AddTrust External TTP Network"
]
},
"issuer_dn": "C=SE, O=AddTrust AB, OU=AddTrust External TTP Network, CN=AddTrust External CA Root",
"validity": {
"start": "2000-05-30T10:48:38Z",
"end": "2020-05-30T10:48:38Z",
"length": 631152000
},
"subject": {
"common_name": [
"AddTrust External CA Root"
],
"country": [
"SE"
],
"organization": [
"AddTrust AB"
],
"organizational_unit": [
"AddTrust External TTP Network"
]
},
"subject_dn": "C=SE, O=AddTrust AB, OU=AddTrust External TTP Network, CN=AddTrust External CA Root",
"subject_key_info": {
"key_algorithm": {
"name": "RSA"
},
"rsa_public_key": {
"exponent": 65537,
"modulus": "t/caM+byAAQtOeBOW+0fvGwPzbX6I7bO3psRM5ekKUx9k5+9SryT7QMa44/P5W1QWtaXKZRagLBJetsulf24yr83OC0ePpFBrXBWx/BPP+gynnTKyJBU6cZfD3idmkA8Dqxhql4Uj56HoWpQ3NeaTq8Fs6ZxlJxxs1BgCscTnTgHhgKo6ahpJhiQq0ywTyOrOk+E2N/On+Fpb7vXQtdrROTHre5tQV9yWnEIN7N5ZaRZoJQ39wAvDcKSctrQOHLbFKhFxF0qfbe01sTurM0TRLfJK91DACX6YblpalgjEbenM49WdVn1zSnXRrcKK2W200JvFbK4e/vv6V1T1TRaJw==",
"length": 2048
},
"fingerprint_sha256": "942a6916a6e4ae527711c5450247a2a74fb8e156a8254ca66e739a11493bb445"
},
"extensions": {
"key_usage": {
"certificate_sign": true,
"crl_sign": true,
"value": 96
},
"basic_constraints": {
"is_ca": true
},
"authority_key_id": "adbd987a34b426f7fac42654ef03bde024cb541a",
"subject_key_id": "adbd987a34b426f7fac42654ef03bde024cb541a"
},
"signature": {
"signature_algorithm": {
"name": "SHA1-RSA",
"oid": "1.2.840.113549.1.1.5"
},
"value": "sJvghSXC1iPiD5YGkp1BmJzZhHmB2R5bFAcjNmWPsNh3u6xBbEdgg1Gw+TI95/z2JhPHgBalv1r8h894eYkhmuJMBwqGNbzy3lHE0pa33H5O7nD9HDnrDAJRFC2OvRbgwd9Gdeckrez0QrSFk3AQZ7qdBjVKGNMresxRQqF6Y9Hmu6HFK8I2vhMN5r1jfnl7pwkNQKtq3Y+Kw/b2jBpCBVHURfWfp2IhaBUgQzyZ53y9JNipkRdziD9WGzE4GLRxD5rNyA6eji4b4YyYg8sfMfFETMYEc0l2YA/H+L0XgGsu6cxMDlqaeQ8gCi7VnmMmHlWSlNiCF1p70LzHj06GBA==",
"valid": true,
"self_signed": true
},
"fingerprint_md5": "1d3554048578b03f42424dbf20730a3f",
"fingerprint_sha1": "02faf3e291435468607857694df5e45b68851868",
"fingerprint_sha256": "687fa451382278fff0c8b11f8d43d576671c6eb2bceab413fb83d965d06d2ff2",
"tbs_noct_fingerprint": "32e1783f2384bc17836c03850527b18de7901a6909de7cf6b7d9d46659895d6c",
"spki_subject_fingerprint": "4df410fbf6761bcf75fe2a45e15fcab3640bf5e5d1300d0eeb5927152432179c",
"tbs_fingerprint": "32e1783f2384bc17836c03850527b18de7901a6909de7cf6b7d9d46659895d6c",
"validation_level": "unknown",
"redacted": false
}
},
{
"raw": "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",
"parsed": {
"version": 3,
"serial_number": "335681513262850983222012410400822068754",
"signature_algorithm": {
"name": "SHA384-RSA",
"oid": "1.2.840.113549.1.1.12"
},
"issuer": {
"common_name": [
"USERTrust RSA Certification Authority"
],
"country": [
"US"
],
"locality": [
"Jersey City"
],
"province": [
"New Jersey"
],
"organization": [
"The USERTRUST Network"
]
},
"issuer_dn": "C=US, ST=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust RSA Certification Authority",
"validity": {
"start": "2015-07-27T00:00:00Z",
"end": "2025-07-26T23:59:59Z",
"length": 315619199
},
"subject": {
"common_name": [
"SignSec Certification Authority"
],
"country": [
"US"
],
"locality": [
"Irvine"
],
"province": [
"CA"
],
"organization": [
"FBS Inc"
],
"organizational_unit": [
"SSL Department"
]
},
"subject_dn": "C=US, ST=CA, L=Irvine, O=FBS Inc, OU=SSL Department, CN=SignSec Certification Authority",
"subject_key_info": {
"key_algorithm": {
"name": "RSA"
},
"rsa_public_key": {
"exponent": 65537,
"modulus": "gQqWMaCHqD/1+lC01m6afRAYTTiYYqYeh5x5cYHkl2//p2E9PdK48+sQQ8K2w7ZJC/Xb1tlfn4ENeuUaoJ9kEWwtBxOphHb6/z/PFBgn05itWHcmG/jzG/+zHtkXK/uagjcAdoECkx9InSO5tKi721vQ0EPl2/FeXENKJZ2qqgIpFLvEGacaw9Szwc7U/p9DMs0ok353BpNFqWOvqKjf6hI22BtTuZZCwWmJnu1bBmYPOocO9a+vgepg8C+sG5Q6NTL0ietaGNcTHKOUuFYQAB7bNjI/mAYhziHV6CjyDG3CSr1jhIvxDG4haPaOM286GN3k/nDrk+NQwBvDoEtHpQ==",
"length": 2048
},
"fingerprint_sha256": "e357f31dedbd1ea109d3fa4600b5cdbd1b8fb26355d5c3fbc3c2fed9f8bb38f7"
},
"extensions": {
"key_usage": {
"digital_signature": true,
"certificate_sign": true,
"crl_sign": true,
"value": 97
},
"basic_constraints": {
"is_ca": true,
"max_path_len": 0
},
"crl_distribution_points": [
"http://crl.usertrust.com/USERTrustRSACertificationAuthority.crl"
],
"authority_key_id": "5379bf5aaa2b4acf5480e1d89bc09df2b20366cb",
"subject_key_id": "828f09243e2be1f6240b2d75b034e3304039416f",
"extended_key_usage": {
"server_auth": true,
"client_auth": true
},
"certificate_policies": [
{
"id": "1.3.6.1.4.1.6449.1.2.2.44"
},
{
"id": "2.23.140.1.2.1"
}
],
"authority_info_access": {
"ocsp_urls": [
"http://ocsp.usertrust.com"
],
"issuer_urls": [
"http://crt.usertrust.com/USERTrustRSAAddTrustCA.crt"
]
}
},
"signature": {
"signature_algorithm": {
"name": "SHA384-RSA",
"oid": "1.2.840.113549.1.1.12"
},
"value": "SGfwoglhis0l+MV1tYS3iGlWLZrvk7CA6JzTZoIrTXbNJk2FTV2DkQxvtEdz8yPHrJISklCkZJ9v/yBg710SzwqVAL1EtMHYIfgEetwpi6IynleSuia3jPL+GuKyjgyOJWlYc9qEaAEU1RrZfIlJ8J0ku5D4q3ErhGaR7E8ImPE32hOlsXAZ+pLGxJdFdgKxeQfSPkBIbrwPD/WgygEvQygJlOS9XUdq/GNmqL+X/7GmnfB90f1nyVkop7Yr4M6lzBYwmugbDU3dz+nYBtaS4XaDXVf80zQIZrVCFJJgok7K2wV5zOK3i8Q2wellXEBJeITGFeIK76Nvi3wobiZuZmUzVth6U3O1ebQC4RGYaNwdnWlgMCDxLAvcR6VH5iz1hr1nZvyEHVwsqCw02O8hPICUiOOqscnBg1kXAkPvC3+lHZ5FU+s/uhA2D2F70BirdZBiRUmywmzXdq1xDsn4f+AMejxkc80lDzfQP8bpIU0SPvXv0qu+Dnim6gSmqTB+MolQDPzzLI2xoWdzIKLdeMexfLEB05e24Fp32N8ygIweE7PJIHHWepKFn47k+J+cSUpU7URtr1VxpjfTkrylUQKCHg2RiT9Dfy0jLLFAWNup3rbpRjypHfiq1dY+Uv9m3tMg1t6D5Cf1KQtIjIQXUb0D3+oEsn4H3DSoo7t/ji0=",
"valid": false,
"self_signed": false
},
"fingerprint_md5": "ad858e764cf590c06af0b97123b6a10d",
"fingerprint_sha1": "e41f899e73d75db8215a8636bd8d71065357a547",
"fingerprint_sha256": "2c73ee9a52ffad07166b8728d7681d8cbefd99a90663345b25aacf9b1ef1f333",
"tbs_noct_fingerprint": "219fdddff13c15622ce04c746e0393159eeefdb6df771a71e99e3c62593221b0",
"spki_subject_fingerprint": "e1882d422b703ca40d0482f5269cf2dcb10cf8e9c639c833695f3a9b1217bdd2",
"tbs_fingerprint": "219fdddff13c15622ce04c746e0393159eeefdb6df771a71e99e3c62593221b0",
"validation_level": "DV",
"redacted": false
}
},
{
"raw": "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",
"parsed": {
"version": 3,
"serial_number": "26471149583208131559647911801012699958",
"signature_algorithm": {
"name": "SHA384-RSA",
"oid": "1.2.840.113549.1.1.12"
},
"issuer": {
"common_name": [
"AddTrust External CA Root"
],
"country": [
"SE"
],
"organization": [
"AddTrust AB"
],
"organizational_unit": [
"AddTrust External TTP Network"
]
},
"issuer_dn": "C=SE, O=AddTrust AB, OU=AddTrust External TTP Network, CN=AddTrust External CA Root",
"validity": {
"start": "2000-05-30T10:48:38Z",
"end": "2020-05-30T10:48:38Z",
"length": 631152000
},
"subject": {
"common_name": [
"USERTrust RSA Certification Authority"
],
"country": [
"US"
],
"locality": [
"Jersey City"
],
"province": [
"New Jersey"
],
"organization": [
"The USERTRUST Network"
]
},
"subject_dn": "C=US, ST=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust RSA Certification Authority",
"subject_key_info": {
"key_algorithm": {
"name": "RSA"
},
"rsa_public_key": {
"exponent": 65537,
"modulus": "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",
"length": 4096
},
"fingerprint_sha256": "c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde"
},
"extensions": {
"key_usage": {
"digital_signature": true,
"certificate_sign": true,
"crl_sign": true,
"value": 97
},
"basic_constraints": {
"is_ca": true
},
"crl_distribution_points": [
"http://crl.usertrust.com/AddTrustExternalCARoot.crl"
],
"authority_key_id": "adbd987a34b426f7fac42654ef03bde024cb541a",
"subject_key_id": "5379bf5aaa2b4acf5480e1d89bc09df2b20366cb",
"certificate_policies": [
{
"id": "2.5.29.32.0"
}
],
"authority_info_access": {
"ocsp_urls": [
"http://ocsp.usertrust.com"
]
}
},
"signature": {
"signature_algorithm": {
"name": "SHA384-RSA",
"oid": "1.2.840.113549.1.1.12"
},
"value": "k2X2N4OVD17Dghwf1nfnPIrAqgnw6Qsm8eDCanWhx3nJuVJgyCkSDvCtA9YJxHbf5aaBladG2oJXqZWSxbaPAyJsM3fBezIXbgfOWhRBOgUkG/YUBjuoJSQOu8wqdd25cEE/fNBjNiEHH0b/YKSR4We83h9+GRTJY2eR6mcHa7SPi8BuQ33DoYBssh68U4V93JChpLwt70ZyVzUFv7tGu25tN5m2/yOSkcZuQPiPKVbqX9VfFFOs8E9h6vcizKdWC+K4NB8m2XsZBWg/ujzUOAai0+aPDuO0cW1AQsWEtECVK/RloEh59h2BY5adT3Xg+HzkjqnR8q2Ks4zHIc3C7w==",
"valid": false,
"self_signed": false
},
"fingerprint_md5": "db78cbd190952735d940bc80ac2432c0",
"fingerprint_sha1": "eab040689a0d805b5d6fd654fc168cff00b78be3",
"fingerprint_sha256": "1a5174980a294a528a110726d5855650266c48d9883bea692b67b6d726da98c5",
"tbs_noct_fingerprint": "ad6aa4176b5386d8511f619ddb40b9abbadda4dd7fc17364db614483fdcca847",
"spki_subject_fingerprint": "2c1fb55882eb4d8c782a3fd3eb37e60c0518b5eedd91149a5b3e5a5a234a1c5f",
"tbs_fingerprint": "ad6aa4176b5386d8511f619ddb40b9abbadda4dd7fc17364db614483fdcca847",
"validation_level": "unknown",
"redacted": false
}
},
{
"raw": "MIIDdTCCAl2gAwIBAgILBAAAAAABFUtaw5QwDQYJKoZIhvcNAQEFBQAwVzELMAkGA1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExEDAOBgNVBAsTB1Jvb3QgQ0ExGzAZBgNVBAMTEkdsb2JhbFNpZ24gUm9vdCBDQTAeFw05ODA5MDExMjAwMDBaFw0yODAxMjgxMjAwMDBaMFcxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJHbG9iYWxTaWduIFJvb3QgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDaDuaZjc6j40+Kfvvxi4Mla+pIH/EqsLmVEQS98GPR4mdmzxzdzxtIK+6NiY6arymAZavpxy0Sy6scTHAHoT0KMM0VjU/43dSMUBUc71DuxC73/OlS8pF94G3VNTCOXkNz8kHp1Wrjsok6Vjk4bwY8iGlbKk3Fp1S4bInMm/k8yuX9ifUSPJJ4ltbcdG6TRGHRjcdGsnUOhugZitVtbNV4FpWi6cgKOOvyJBNPc1STE4U6G7weNLWLBYy5d4ux2x8gkasJU26Qzns3dLlwR5EiUWMWea6xrkEmCMgZK9FGqkjWZCrXgzT/LCrBbBlDSgeF59N89iFo7+ryUp9/k5DPAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBRge2YaRQ2XyolQL30EzTSo//z9SzANBgkqhkiG9w0BAQUFAAOCAQEA1nPnfE920I2/7LqivjTFKDK1fPxsnCwrvQmeU79rXqoRSLblCKOzyj1hTdNGCbM+w6DjY1Ub8rrvrTnhQ7k4o+YviiY776BQVvnGCv04zcQLcFGUl5gE38NflNUVyRRBnMRddWQVDf9VMOyGj/8N7yy5Y0b2qvzfvGn9LhJIZJrglfCm7ymPAbEVtQwdpf5pLGkkeB6zpxxxYu7KyJesF12KwvhHhm4qxFYxldBniYUr+WymXUadDKqC5JlR3XC321Y9YeRq4VzW9v493kHMB65jUr9TU/Qr6cf9tveCX4XSQRjbgbMEHMUfpIBvFSDJ3gyICh3WZlXi/EjJKSZp4A==",
"parsed": {
"version": 3,
"serial_number": "4835703278459707669005204",
"signature_algorithm": {
"name": "SHA1-RSA",
"oid": "1.2.840.113549.1.1.5"
},
"issuer": {
"common_name": [
"GlobalSign Root CA"
],
"country": [
"BE"
],
"organization": [
"GlobalSign nv-sa"
],
"organizational_unit": [
"Root CA"
]
},
"issuer_dn": "C=BE, O=GlobalSign nv-sa, OU=Root CA, CN=GlobalSign Root CA",
"validity": {
"start": "1998-09-01T12:00:00Z",
"end": "2028-01-28T12:00:00Z",
"length": 928022400
},
"subject": {
"common_name": [
"GlobalSign Root CA"
],
"country": [
"BE"
],
"organization": [
"GlobalSign nv-sa"
],
"organizational_unit": [
"Root CA"
]
},
"subject_dn": "C=BE, O=GlobalSign nv-sa, OU=Root CA, CN=GlobalSign Root CA",
"subject_key_info": {
"key_algorithm": {
"name": "RSA"
},
"rsa_public_key": {
"exponent": 65537,
"modulus": "2g7mmY3Oo+NPin778YuDJWvqSB/xKrC5lREEvfBj0eJnZs8c3c8bSCvujYmOmq8pgGWr6cctEsurHExwB6E9CjDNFY1P+N3UjFAVHO9Q7sQu9/zpUvKRfeBt1TUwjl5Dc/JB6dVq47KJOlY5OG8GPIhpWypNxadUuGyJzJv5PMrl/Yn1EjySeJbW3HRuk0Rh0Y3HRrJ1DoboGYrVbWzVeBaVounICjjr8iQTT3NUkxOFOhu8HjS1iwWMuXeLsdsfIJGrCVNukM57N3S5cEeRIlFjFnmusa5BJgjIGSvRRqpI1mQq14M0/ywqwWwZQ0oHhefTfPYhaO/q8lKff5OQzw==",
"length": 2048
},
"fingerprint_sha256": "2bcee858158cf5465fc9d76f0dfa312fef25a4dca8501da9b46b67d1fbfa1b64"
},
"extensions": {
"key_usage": {
"certificate_sign": true,
"crl_sign": true,
"value": 96
},
"basic_constraints": {
"is_ca": true
},
"subject_key_id": "607b661a450d97ca89502f7d04cd34a8fffcfd4b"
},
"signature": {
"signature_algorithm": {
"name": "SHA1-RSA",
"oid": "1.2.840.113549.1.1.5"
},
"value": "1nPnfE920I2/7LqivjTFKDK1fPxsnCwrvQmeU79rXqoRSLblCKOzyj1hTdNGCbM+w6DjY1Ub8rrvrTnhQ7k4o+YviiY776BQVvnGCv04zcQLcFGUl5gE38NflNUVyRRBnMRddWQVDf9VMOyGj/8N7yy5Y0b2qvzfvGn9LhJIZJrglfCm7ymPAbEVtQwdpf5pLGkkeB6zpxxxYu7KyJesF12KwvhHhm4qxFYxldBniYUr+WymXUadDKqC5JlR3XC321Y9YeRq4VzW9v493kHMB65jUr9TU/Qr6cf9tveCX4XSQRjbgbMEHMUfpIBvFSDJ3gyICh3WZlXi/EjJKSZp4A==",
"valid": true,
"self_signed": true
},
"fingerprint_md5": "3e455215095192e1b75d379fb187298a",
"fingerprint_sha1": "b1bc968bd4f49d622aa89a81f2150152a41d829c",
"fingerprint_sha256": "ebd41040e4bb3ec742c9e381d31ef2a41a48b6685c96e7cef3c1df6cd4331c99",
"tbs_noct_fingerprint": "e836109d8138d686c7a4662cceb810cc397c795d5779d70d6c40a315a08db7af",
"spki_subject_fingerprint": "69286dfaca43432d26f4c1810e5efc902bc3cff0b8430a2728009c013251c2c2",
"tbs_fingerprint": "e836109d8138d686c7a4662cceb810cc397c795d5779d70d6c40a315a08db7af",
"validation_level": "unknown",
"redacted": false
}
},
{
"raw": "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",
"parsed": {
"version": 3,
"serial_number": "4835703278459909592593969",
"signature_algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"issuer": {
"common_name": [
"GlobalSign Root CA"
],
"country": [
"BE"
],
"organization": [
"GlobalSign nv-sa"
],
"organizational_unit": [
"Root CA"
]
},
"issuer_dn": "C=BE, O=GlobalSign nv-sa, OU=Root CA, CN=GlobalSign Root CA",
"validity": {
"start": "2014-02-20T10:00:00Z",
"end": "2024-02-20T10:00:00Z",
"length": 315532800
},
"subject": {
"common_name": [
"AlphaSSL CA - SHA256 - G2"
],
"country": [
"BE"
],
"organization": [
"GlobalSign nv-sa"
]
},
"subject_dn": "C=BE, O=GlobalSign nv-sa, CN=AlphaSSL CA - SHA256 - G2",
"subject_key_info": {
"key_algorithm": {
"name": "RSA"
},
"rsa_public_key": {
"exponent": 65537,
"modulus": "2gHs5OxzYPt+j2q3xhfjkmQy1KwA2aIPue3ua4qGypJn2XTXXUcCPI9A1p5tFM3D2ik5pw8FCmiiZhoexLKLdljlq10dj0CzOYvvHoN9ItDjqQAu7FPPYhmFRChMwCfLew7sEGQAEKQFzKByvkFsMVtI5LHsuSPrVU3QfWJKpbSlpFmFxSWRpv6mCZ8GEG2PgQxkQF5zAJrgLmWYVBAAcJjI4e00X9icxw3A1iNZRfz+VXqG7pRgIvGu0eZVRvaZxRsIdF+ssGSEj4k4HKGnkCFPAm694GFn1PhChw8K98kEbSqpL+9Cpd/do1PbmB6B+Zpye1reTz5/olig4hetZw==",
"length": 2048
},
"fingerprint_sha256": "6a631e57a81bf50371d197fb16d275f566bfb7607b2a9085ff59f626cdd4b925"
},
"extensions": {
"key_usage": {
"certificate_sign": true,
"crl_sign": true,
"value": 96
},
"basic_constraints": {
"is_ca": true,
"max_path_len": 0
},
"crl_distribution_points": [
"http://crl.globalsign.net/root.crl"
],
"authority_key_id": "607b661a450d97ca89502f7d04cd34a8fffcfd4b",
"subject_key_id": "f5cdd53c0850f96a4f3ab797da5683e669d268f7",
"certificate_policies": [
{
"id": "2.5.29.32.0",
"cps": [
"https://www.alphassl.com/repository/"
]
}
],
"authority_info_access": {
"ocsp_urls": [
"http://ocsp.globalsign.com/rootr1"
]
}
},
"signature": {
"signature_algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"value": "YEBoFkfnFo3bXKFWKsv0XJuwHqJL9csCP/gLofKnQtS3TOvjZoDzJUN4LhsXVgdSGMvRqOzm+3M+pGKMgLTSxRJzo9P6Aji+Yz2EuJnB8br3n8NA0VgYU8Fi3a8YQn80TsVD1XGwMADH45CuP1eGl87qDBKOInDjZqdUfy4oy9RU0LMeYmcI+Sfhy+NmuCQbiWqJRGXy2UzSWByMTsCVodTvZy84IOgu/5ZR8LrYPZJwR2UcnnNytGAMXOLRc3bgr07i5TelRS+KIz6HxzDmMTh89N1SyvNTBCVXVmaU6Avu5gMUTu79bZRknl7OedSyps9AsUSoPocZXun4IRZZUw==",
"valid": false,
"self_signed": false
},
"fingerprint_md5": "342e1e02d91852d4a66f8a892167c8fa",
"fingerprint_sha1": "4c27431717565a3a07f3e6d0032c4258949cf9ec",
"fingerprint_sha256": "ee793643199474ed60efdc8ccde4d37445921683593aa751bbf8ee491a391e97",
"tbs_noct_fingerprint": "a2de33490c476d356e2dbc737c2779692249526b65ab8fba9a34280481c8bdfc",
"spki_subject_fingerprint": "e832cecfda0b3159265056d9b3fb5c9549dbf0c8c1901833aa3638a69309de62",
"tbs_fingerprint": "a2de33490c476d356e2dbc737c2779692249526b65ab8fba9a34280481c8bdfc",
"validation_level": "unknown",
"redacted": false
}
},
{
"raw": "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",
"parsed": {
"version": 3,
"serial_number": "11493844307800274610657794896956183369",
"signature_algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"issuer": {
"common_name": [
"DigiCert Global Root CA"
],
"country": [
"US"
],
"organization": [
"DigiCert Inc"
],
"organizational_unit": [
"www.digicert.com"
]
},
"issuer_dn": "C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root CA",
"validity": {
"start": "2017-11-06T12:23:33Z",
"end": "2027-11-06T12:23:33Z",
"length": 315532800
},
"subject": {
"common_name": [
"RapidSSL RSA CA 2018"
],
"country": [
"US"
],
"organization": [
"DigiCert Inc"
],
"organizational_unit": [
"www.digicert.com"
]
},
"subject_dn": "C=US, O=DigiCert Inc, OU=www.digicert.com, CN=RapidSSL RSA CA 2018",
"subject_key_info": {
"key_algorithm": {
"name": "RSA"
},
"rsa_public_key": {
"exponent": 65537,
"modulus": "5S2oihEo9nnpezoziDtx4WWLLCll/e0t1EYemE5n+MgP5viaHLy+VpHP+ndX5D18INIuuAV8wFq26KF5U0WNIZiQp6mLtIWjUeWDPA28OeyhTlj9TLk2beytbtFU6ypbpWUltmvY5V8ngspC7nFRNCjpfnDED2kRyJzO8yoKMFz4J4JE8N7NA1uJwUEFMUvHLs0scLoPZkKcewIRm1RV2AxmFQxJkdf7YN9Pckkif2Xgm3b48BZn0zf0qXsSeGu84ua9gwzjzI7tbTBjayTpT+/XpWuBVv6fvarI6bikKB859OSGQuw73XXgeuFwEPHTIRoUtkzu3/EQ+LtwznkkdQ==",
"length": 2048
},
"fingerprint_sha256": "9ca59cb18adcfb2e48f2f2dfd55181ca36edf879dab2397ef61f2534a272b681"
},
"extensions": {
"key_usage": {
"digital_signature": true,
"certificate_sign": true,
"crl_sign": true,
"value": 97
},
"basic_constraints": {
"is_ca": true,
"max_path_len": 0
},
"crl_distribution_points": [
"http://crl3.digicert.com/DigiCertGlobalRootCA.crl"
],
"authority_key_id": "03de503556d14cbb66f0a3e21b1bc397b23dd155",
"subject_key_id": "53ca1759fc6bc003212f1aaee4aaa81c8256da75",
"extended_key_usage": {
"server_auth": true,
"client_auth": true
},
"certificate_policies": [
{
"id": "2.16.840.1.114412.1.2",
"cps": [
"https://www.digicert.com/CPS"
]
},
{
"id": "2.16.840.1.114412.1.1"
},
{
"id": "2.23.140.1.2.1"
},
{
"id": "2.23.140.1.2.2"
}
],
"authority_info_access": {
"ocsp_urls": [
"http://ocsp.digicert.com"
]
}
},
"signature": {
"signature_algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"value": "fiPH8so1blmSUVxhazwSNubSfLMp5kLYo5VhHs/yB68rKyVabhejgFLMqvbfkWwnhoW3rICK/V5jS1n9k3Xxs4ZIZK2gRz8kTihwjOvw/kyDXWRFgduaBievVHF6SLmZJ5vf0MbFOkkPiQaGzmVc2ijhyidSKInApqofu+HZtqvJ3ykwhJqDzclSrJUZza1Y+k7Tfb38JaraSvKq/ro5IyPC6VTPR1d/g4dBqxHsI18iv7gpJxzoAGVDlEMXzo8Z4TqR3BJCQWIH9xDKw3KrSMQNBOR9ramOa5a0wI1sGeEVcFh6N+5siFpRsS/YU5AHd0Jq/4U+Dl4S95dNXIycag==",
"valid": false,
"self_signed": false
},
"fingerprint_md5": "eb2f0ff332094d37434e4dbfbacc9470",
"fingerprint_sha1": "98c6a8dc887963ba3cf9c2731cbdd3f7de05ac2d",
"fingerprint_sha256": "c790b47128447ec0b60f22bfcb795d71c326dd910ee12cbb4cc5a86191eb91bc",
"tbs_noct_fingerprint": "3fe338634e0510633de453ca350b15cec339b3dcb8ba9f2a2dd24d10a838feeb",
"spki_subject_fingerprint": "68b2569adf15bfd045f21946832bc524590aabed363deaa4feeb4f8a9344217c",
"tbs_fingerprint": "3fe338634e0510633de453ca350b15cec339b3dcb8ba9f2a2dd24d10a838feeb",
"validation_level": "OV",
"redacted": false
}
},
{
"raw": "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",
"parsed": {
"version": 3,
"serial_number": "10944719598952040374951832963794454346",
"signature_algorithm": {
"name": "SHA1-RSA",
"oid": "1.2.840.113549.1.1.5"
},
"issuer": {
"common_name": [
"DigiCert Global Root CA"
],
"country": [
"US"
],
"organization": [
"DigiCert Inc"
],
"organizational_unit": [
"www.digicert.com"
]
},
"issuer_dn": "C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root CA",
"validity": {
"start": "2006-11-10T00:00:00Z",
"end": "2031-11-10T00:00:00Z",
"length": 788918400
},
"subject": {
"common_name": [
"DigiCert Global Root CA"
],
"country": [
"US"
],
"organization": [
"DigiCert Inc"
],
"organizational_unit": [
"www.digicert.com"
]
},
"subject_dn": "C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root CA",
"subject_key_info": {
"key_algorithm": {
"name": "RSA"
},
"rsa_public_key": {
"exponent": 65537,
"modulus": "4jvhEXLeqKTTo1eqUKKPC3eQyaKl7hLOllsBCSDMAZOnTjC3U/dDxGkAV53ijSLdhwZAAIEJzs4bg7/fzTtxRuLWZscFs3YnFo97nh6Vfe63SKMI2tavegw5BmV/Sl0fvBf4q77uKNd0f3p4mVmFaG5cIzJLv07A6Fpt43C/dxC//AH2hdmoRBBYMql1GNXRor5H4idq9Joz+EkIYIvUX7Q6hL+hqkpMfT7PT19sdl6gSzeRntwi5m3OFBqOasv+zbMUZBfHWymeMr/y7vrTC0LUq7dBMtoM1O/4gdW7jVg/tRvoSSiicNoxBN33shbyTApOB6jtSj1etX+jkMOvJw==",
"length": 2048
},
"fingerprint_sha256": "aff988906dde12955d9bebbf928fdcc31cce328d5b9384f21c8941ca26e20391"
},
"extensions": {
"key_usage": {
"digital_signature": true,
"certificate_sign": true,
"crl_sign": true,
"value": 97
},
"basic_constraints": {
"is_ca": true
},
"authority_key_id": "03de503556d14cbb66f0a3e21b1bc397b23dd155",
"subject_key_id": "03de503556d14cbb66f0a3e21b1bc397b23dd155"
},
"signature": {
"signature_algorithm": {
"name": "SHA1-RSA",
"oid": "1.2.840.113549.1.1.5"
},
"value": "y5w3qkgTEgr63UScT1Kw9N+uBPV5eQijJBj8SyuEwC251cf+9MEfWMu4bZx6dOeYKasRteNwoKHNTIiZk4yRcOKrDxy+k6n/Y9XkB2DTo7+dWwnx1Y7jU/SOY/o/p9u0Zt9iZtbRbkGN8i216ndKn51Y4itZwEAj7S0ogkU+eVSSJpjggEioN+/w1nlgFt6s6A7NbqxEFzgvSdrhRT4quTZTzzpQBvcu6MRXSWxhIRjVBK14PCw6gGun668VFOnYicG5OGzikWyK/2S5dyVXMMAbJKPh3OnfR3y1tCQIBTDsLb0Lv0W/ULmp8+uYARKtyIjGmDRfjQo8xunVlZVt3g==",
"valid": true,
"self_signed": true
},
"fingerprint_md5": "79e4a9840d7d3a96d7c04fe2434c892e",
"fingerprint_sha1": "a8985d3a65e5e5c4b2d7d66d40c6dd2fb19c5436",
"fingerprint_sha256": "4348a0e9444c78cb265e058d5e8944b4d84f9662bd26db257f8934a443c70161",
"tbs_noct_fingerprint": "68538fc7818e81d2422a9060636fa5282a43f60dce1bba60c2d7f3abab660097",
"spki_subject_fingerprint": "10a522b4fcdbfa03c3553a371f272338e7b7aecb7c57548d931eeb4d370d2ad7",
"tbs_fingerprint": "68538fc7818e81d2422a9060636fa5282a43f60dce1bba60c2d7f3abab660097",
"validation_level": "unknown",
"redacted": false
}
}
],
"validation": {
"browser_trusted": false,
"browser_error": "x509: failed to load system roots and no roots provided"
}
},
"server_key_exchange": {
"ecdh_params": {
"curve_id": {
"name": "secp256r1",
"id": 23
},
"server_public": {
"x": {
"value": "cuk1JxW4I09V+0uhAb1x62SawmNubsNFnXYeJqEu8s8=",
"length": 256
},
"y": {
"value": "BcGlTb0eLfsrlmgoEfNRKbjWxgL5Suxp33+mKhnMxVA=",
"length": 256
}
}
},
"digest": "hZjDpxgKmsPMWPcilMyS3knkWR7KtGEx4YyoMzef68A=",
"signature": {
"raw": "l1gyn46MPG50WX26e24Yy9LjqhMGUvz8q0vnhuU5Do4u5zZkPWVf1JPiUUrFHdhHwVtOYwx0ANtpCgGRbskqQS69Qh/5tenbktF/c1fxTHNkgg1e+N0hDBz/bKrlDHUUi4xFdsSvhn/ULyJIoJyrORmzFhLFyhpbfDGge7rvozPIgNfJdGOJNgwfDnvT5lFDEp4jwXApBs+qC10U1hJSl518g66q9REdwgyWcuffQEKWEWfz4qaEO3GulPJphZIDPw6jRhTs+czkRaA/yLDCg1xBmds+9bSKGjqFPDIC9oT0YBscKVIUYl4vXz91wVjhx8sQbV++FzOHtVc2NyoA4Q==",
"type": "rsa",
"valid": true,
"signature_and_hash_type": {
"signature_algorithm": "rsa",
"hash_algorithm": "sha256"
},
"tls_version": {
"name": "TLSv1.2",
"value": 771
}
}
},
"client_key_exchange": {
"ecdh_params": {
"curve_id": {
"name": "secp256r1",
"id": 23
},
"client_public": {
"x": {
"value": "KWuwPuzXopA7IAxoshn/p1FWiKQAV2btBBFPwkP1v3c=",
"length": 256
},
"y": {
"value": "/LFvXQMA9/WVEUdMzQO08pxxjdefZCnwvaw0IJBGDdA=",
"length": 256
}
},
"client_private": {
"value": "Q+r3mOiXpnlNoHYeLZbN30vrv7IH8aly26dp48UyHXo=",
"length": 32
}
}
},
"client_finished": {
"verify_data": "tbHFf1Dt8TK4mrRh"
},
"server_finished": {
"verify_data": "ykpyfUxIqMkSrGLJ"
},
"key_material": {
"master_secret": {
"value": "JXhkLF/uDqyh/ki93IxV//HLkCN+ov3RGglqTmBVtAFGKXFmYH5mpbQfYUAz5cHX",
"length": 48
},
"pre_master_secret": {
"value": "yx2LCE6WjuQ7w9F0aNfHlQZn3onbi9tS8La3VMwWYmY=",
"length": 32
}
}
}
},
"timestamp": "2019-11-26T00:12:32Z"
}
}
}
Developer: Pavel Kruglov.
ip Nullable(String)
data Tuple(
tls Tuple(
error Nullable(String),
protocol Nullable(String),
result Tuple(
handshake_log Tuple(
client_finished Tuple(
verify_data Nullable(String)),
client_key_exchange Tuple(
dh_params Tuple(
client_private Tuple(
length Nullable(Int64),
value Nullable(String)),
client_public Tuple(
length Nullable(Int64),
value Nullable(String)),
generator Tuple(
length Nullable(Int64),
value Nullable(String)),
prime Tuple(
length Nullable(Int64),
value Nullable(String))),
ecdh_params Tuple(
client_private Tuple(
length Nullable(Int64),
value Nullable(String)),
client_public Tuple(
x Tuple(
length Nullable(Int64),
value Nullable(String)),
y Tuple(
length Nullable(Int64),
value Nullable(String))),
curve_id Tuple(
id Nullable(Int64),
name Nullable(String))),
rsa_params Tuple(
encrypted_pre_master_secret Nullable(String),
length Nullable(Int64))),
key_material Tuple(
master_secret Tuple(
length Nullable(Int64),
value Nullable(String)),
pre_master_secret Tuple(
length Nullable(Int64),
value Nullable(String))),
server_certificates Tuple(
certificate Tuple(
parsed Tuple(
extensions Tuple(
authority_info_access Tuple(
issuer_urls Array(Nullable(String)),
ocsp_urls Array(Nullable(String))),
authority_key_id Nullable(String),
basic_constraints Tuple(
is_ca Nullable(Bool),
max_path_len Nullable(Int64)),
certificate_policies Array(Tuple(
cps Array(Nullable(String)),
id Nullable(String),
user_notice Array(Tuple(
explicit_text Nullable(String),
notice_reference Array(Tuple(
notice_numbers Array(Nullable(Int64)),
organization Nullable(String))))))),
crl_distribution_points Array(Nullable(String)),
extended_key_usage Tuple(
client_auth Nullable(Bool),
code_signing Nullable(Bool),
email_protection Nullable(Bool),
ipsec_end_system Nullable(Bool),
ipsec_intermediate_system_usage Nullable(Bool),
ipsec_tunnel Nullable(Bool),
ipsec_user Nullable(Bool),
microsoft_server_gated_crypto Nullable(Bool),
netscape_server_gated_crypto Nullable(Bool),
ocsp_signing Nullable(Bool),
server_auth Nullable(Bool),
time_stamping Nullable(Bool)),
issuer_alt_name Tuple(
email_addresses Array(Nullable(String)),
uniform_resource_identifiers Array(Nullable(String))),
key_usage Tuple(
certificate_sign Nullable(Bool),
content_commitment Nullable(Bool),
crl_sign Nullable(Bool),
data_encipherment Nullable(Bool),
decipher_only Nullable(Bool),
digital_signature Nullable(Bool),
encipher_only Nullable(Bool),
key_agreement Nullable(Bool),
key_encipherment Nullable(Bool),
value Nullable(Int64)),
signed_certificate_timestamps Array(Tuple(
log_id Nullable(String),
signature Nullable(String),
timestamp Nullable(Int64),
version Nullable(Int64))),
subject_alt_name Tuple(
dns_names Array(Nullable(String)),
email_addresses Array(Nullable(String)),
ip_addresses Array(Nullable(String)),
other_names Array(Tuple(
id Nullable(String),
value Nullable(String))),
uniform_resource_identifiers Array(Nullable(String))),
subject_key_id Nullable(String)),
fingerprint_md5 Nullable(String),
fingerprint_sha1 Nullable(String),
fingerprint_sha256 Nullable(String),
issuer Tuple(
common_name Array(Nullable(String)),
country Array(Nullable(String)),
domain_component Array(Nullable(String)),
email_address Array(Nullable(String)),
given_name Array(Nullable(String)),
locality Array(Nullable(String)),
organization Array(Nullable(String)),
organizational_unit Array(Nullable(String)),
postal_code Array(Nullable(String)),
province Array(Nullable(String)),
serial_number Array(Nullable(String)),
street_address Array(Nullable(String)),
surname Array(Nullable(String))),
issuer_dn Nullable(String),
names Array(Nullable(String)),
redacted Nullable(Bool),
serial_number Nullable(String),
signature Tuple(
self_signed Nullable(Bool),
signature_algorithm Tuple(
name Nullable(String),
oid Nullable(String)),
valid Nullable(Bool),
value Nullable(String)),
signature_algorithm Tuple(
name Nullable(String),
oid Nullable(String)),
spki_subject_fingerprint Nullable(String),
subject Tuple(
common_name Array(Nullable(String)),
country Array(Nullable(String)),
domain_component Array(Nullable(String)),
email_address Array(Nullable(String)),
given_name Array(Nullable(String)),
jurisdiction_country Array(Nullable(String)),
jurisdiction_locality Array(Nullable(String)),
jurisdiction_province Array(Nullable(String)),
locality Array(Nullable(String)),
organization Array(Nullable(String)),
organizational_unit Array(Nullable(String)),
postal_code Array(Nullable(String)),
province Array(Nullable(String)),
serial_number Array(Nullable(String)),
street_address Array(Nullable(String)),
surname Array(Nullable(String))),
subject_dn Nullable(String),
subject_key_info Tuple(
ecdsa_public_key Tuple(
b Nullable(String),
curve Nullable(String),
gx Nullable(String),
gy Nullable(String),
length Nullable(Int64),
n Nullable(String),
p Nullable(String),
pub Nullable(String),
x Nullable(String),
y Nullable(String)),
fingerprint_sha256 Nullable(String),
key_algorithm Tuple(
name Nullable(String)),
rsa_public_key Tuple(
exponent Nullable(Int64),
length Nullable(Int64),
modulus Nullable(String))),
tbs_fingerprint Nullable(String),
tbs_noct_fingerprint Nullable(String),
unknown_extensions Array(Tuple(
critical Nullable(Bool),
id Nullable(String),
value Nullable(String))),
validation_level Nullable(String),
validity Tuple(
end Nullable(String),
length Nullable(Int64),
start Nullable(String)),
version Nullable(Int64)),
raw Nullable(String)),
chain Array(Tuple(
parsed Tuple(
extensions Tuple(
authority_info_access Tuple(
issuer_urls Array(Nullable(String)),
ocsp_urls Array(Nullable(String))),
authority_key_id Nullable(String),
basic_constraints Tuple(
is_ca Nullable(Bool),
max_path_len Nullable(Int64)),
certificate_policies Array(Tuple(
cps Array(Nullable(String)),
id Nullable(String),
user_notice Array(Tuple(
explicit_text Nullable(String),
notice_reference Array(Tuple(
organization Nullable(String))))))),
crl_distribution_points Array(Nullable(String)),
extended_key_usage Tuple(
client_auth Nullable(Bool),
code_signing Nullable(Bool),
ipsec_end_system Nullable(Bool),
ipsec_tunnel Nullable(Bool),
ipsec_user Nullable(Bool),
netscape_server_gated_crypto Nullable(Bool),
ocsp_signing Nullable(Bool),
server_auth Nullable(Bool),
unknown Array(Nullable(String))),
issuer_alt_name Tuple(
email_addresses Array(Nullable(String))),
key_usage Tuple(
certificate_sign Nullable(Bool),
content_commitment Nullable(Bool),
crl_sign Nullable(Bool),
digital_signature Nullable(Bool),
key_encipherment Nullable(Bool),
value Nullable(Int64)),
name_constraints Tuple(
critical Nullable(Bool),
excluded_ip_addresses Array(Tuple(
begin Nullable(String),
cidr Nullable(String),
end Nullable(String),
mask Nullable(String))),
excluded_names Array(Nullable(String)),
permitted_directory_names Array(Tuple(
organizational_unit Array(Nullable(String)))),
permitted_names Array(Nullable(String))),
signed_certificate_timestamps Array(Tuple(
log_id Nullable(String),
signature Nullable(String),
timestamp Nullable(Int64),
version Nullable(Int64))),
subject_alt_name Tuple(
directory_names Array(Tuple(
common_name Array(Nullable(String)))),
dns_names Array(Nullable(String)),
email_addresses Array(Nullable(String)),
ip_addresses Array(Nullable(String)),
uniform_resource_identifiers Array(Nullable(String))),
subject_key_id Nullable(String)),
fingerprint_md5 Nullable(String),
fingerprint_sha1 Nullable(String),
fingerprint_sha256 Nullable(String),
issuer Tuple(
common_name Array(Nullable(String)),
country Array(Nullable(String)),
domain_component Array(Nullable(String)),
email_address Array(Nullable(String)),
locality Array(Nullable(String)),
organization Array(Nullable(String)),
organizational_unit Array(Nullable(String)),
province Array(Nullable(String))),
issuer_dn Nullable(String),
names Array(Nullable(String)),
redacted Nullable(Bool),
serial_number Nullable(String),
signature Tuple(
self_signed Nullable(Bool),
signature_algorithm Tuple(
name Nullable(String),
oid Nullable(String)),
valid Nullable(Bool),
value Nullable(String)),
signature_algorithm Tuple(
name Nullable(String),
oid Nullable(String)),
spki_subject_fingerprint Nullable(String),
subject Tuple(
common_name Array(Nullable(String)),
country Array(Nullable(String)),
domain_component Array(Nullable(String)),
email_address Array(Nullable(String)),
locality Array(Nullable(String)),
organization Array(Nullable(String)),
organizational_unit Array(Nullable(String)),
postal_code Array(Nullable(String)),
province Array(Nullable(String)),
serial_number Array(Nullable(String)),
street_address Array(Nullable(String))),
subject_dn Nullable(String),
subject_key_info Tuple(
ecdsa_public_key Tuple(
b Nullable(String),
curve Nullable(String),
gx Nullable(String),
gy Nullable(String),
length Nullable(Int64),
n Nullable(String),
p Nullable(String),
pub Nullable(String),
x Nullable(String),
y Nullable(String)),
fingerprint_sha256 Nullable(String),
key_algorithm Tuple(
name Nullable(String)),
rsa_public_key Tuple(
exponent Nullable(Int64),
length Nullable(Int64),
modulus Nullable(String))),
tbs_fingerprint Nullable(String),
tbs_noct_fingerprint Nullable(String),
unknown_extensions Array(Tuple(
critical Nullable(Bool),
id Nullable(String),
value Nullable(String))),
validation_level Nullable(String),
validity Tuple(
end Nullable(String),
length Nullable(Int64),
start Nullable(String)),
version Nullable(Int64)),
raw Nullable(String))),
validation Tuple(
browser_error Nullable(String),
browser_trusted Nullable(Bool))),
server_finished Tuple(
verify_data Nullable(String)),
server_hello Tuple(
cipher_suite Tuple(
hex Nullable(String),
name Nullable(String),
value Nullable(Int64)),
compression_method Nullable(Int64),
extended_master_secret Nullable(Bool),
heartbeat Nullable(Bool),
ocsp_stapling Nullable(Bool),
random Nullable(String),
secure_renegotiation Nullable(Bool),
session_id Nullable(String),
ticket Nullable(Bool),
version Tuple(
name Nullable(String),
value Nullable(Int64))),
server_key_exchange Tuple(
dh_params Tuple(
generator Tuple(
length Nullable(Int64),
value Nullable(String)),
prime Tuple(
length Nullable(Int64),
value Nullable(String)),
server_public Tuple(
length Nullable(Int64),
value Nullable(String))),
digest Nullable(String),
ecdh_params Tuple(
curve_id Tuple(
id Nullable(Int64),
name Nullable(String)),
server_public Tuple(
x Tuple(
length Nullable(Int64),
value Nullable(String)),
y Tuple(
length Nullable(Int64),
value Nullable(String)))),
signature Tuple(
raw Nullable(String),
signature_and_hash_type Tuple(
hash_algorithm Nullable(String),
signature_algorithm Nullable(String)),
tls_version Tuple(
name Nullable(String),
value Nullable(Int64)),
type Nullable(String),
valid Nullable(Bool))))),
status Nullable(String),
timestamp Nullable(String)))
SET input_format_allow_errors_ratio = 0.5;
SELECT * FROM 'tls.json.lz4' LIMIT 10 FORMAT JSON;
SELECT
data.tls.result.handshake_log.server_certificates.certificate.parsed.issuer.organization[1]
AS org FROM 'tls.json.lz4' LIMIT 10 FORMAT JSON;
SELECT
data.tls.result.handshake_log.server_certificates.certificate.parsed.issuer.organization[1]
AS org, count() AS c FROM 'tls.json.lz4'
WHERE org IS NOT NULL GROUP BY org ORDER BY c DESC LIMIT 10;
Developer: Pavel Kruglov.
CREATE TABLE tls ENGINE = MergeTree ORDER BY ()
AS SELECT * FROM url('https://clickhouse-public-datasets.s3.amazonaws.com/
scansio/original/trial1_tls_censys_zgrab.json.lz4');
SELECT
data.tls.result.handshake_log.server_certificates.certificate.parsed.issuer.organization[1]
AS org, count() AS c FROM tls
WHERE org IS NOT NULL GROUP BY org ORDER BY c DESC LIMIT 10;
Developer: Pavel Kruglov.
$ echo '{"Hello": "world"}' > data1
$ echo 'Hello,world' > data2
$ echo -e 'Hello\tworld' > data3
:) SELECT * FROM file('data1') -- we didn't say it is JSON, but it works!
ββHelloββ
β world β
βββββββββ
:) SELECT * FROM file('data2') -- we didn't say it is CSV, but it works!
ββc1βββββ¬βc2βββββ
β Hello β world β
βββββββββ΄ββββββββ
:) SELECT * FROM file('data3') -- we didn't say it is TSV, but it works!
ββc1βββββ¬βc2βββββ
β Hello β world β
βββββββββ΄ββββββββ
Developer: Pavel Kruglov.
A new data type that can store values of different types.
Example: Variant(UInt64, String, Array(UInt64))
:) CREATE TABLE test (v Variant(UInt64, String, Array(UInt64))) ENGINE = Memory;
:) INSERT INTO test VALUES (NULL), (42), ('Hello, World!'), ([1, 2, 3]);
:) SELECT v FROM test;
ββvββββββββββββββ
β α΄Ία΅α΄Έα΄Έ β
β 42 β
β Hello, World! β
β [1,2,3] β
βββββββββββββββββ
Developer: Pavel Kruglov.
Allows creating Arrays, Maps of incompatible types,
or combining these types in a conditional expression:
:) SET allow_experimental_variant_type = 1, use_variant_as_common_type = 1;
:) SELECT number % 2 ? 'Hello' : 123 AS x, toTypeName(x) AS t FROM numbers(3)
ββxββββββ¬βtβββββββββββββββββββββββ
β 123 β Variant(String, UInt8) β
β Hello β Variant(String, UInt8) β
β 123 β Variant(String, UInt8) β
βββββββββ΄βββββββββββββββββββββββββ
:) SELECT map('Hello', 1, 'World', [2, 3]) AS x, toTypeName(x) AS t
ββxββββββββββββββββββββββββββ¬βtββββββββββββββββββββββββββββββββββββββββββ
β {'Hello':1,'World':[2,3]} β Map(String, Variant(Array(UInt8), UInt8)) β
βββββββββββββββββββββββββββββ΄ββββββββββββββββββββββββββββββββββββββββββββ
Developer: Pavel Kruglov.
Reading with explicit cast or subcolumns:
:) CREATE TEMPORARY TABLE test (x Variant(UInt64, String, Array(String)));
:) INSERT INTO test VALUES (123), ('Hello'), (['World', 'Googbye']);
:) SELECT x FROM test;
ββxββββββββββββββββββββ
β 123 β
β Hello β
β ['World','Googbye'] β
βββββββββββββββββββββββ
:) SELECT x::String FROM test; β :) SELECT x.String FROM test;
β
ββxββββββββββββββββββββ β ββx.Stringββ
β 123 β β β α΄Ία΅α΄Έα΄Έ β
β Hello β β β Hello β
β ['World','Googbye'] β β β α΄Ία΅α΄Έα΄Έ β
βββββββββββββββββββββββ β ββββββββββββ
Import from all supported semistructured formats (CSV, TSV, JSON, etc):
:) SELECT v, variantElement(v, 'String') AS str,
variantElement(v, 'UInt64') AS num, variantElement(v, 'Float64') AS float,
variantElement(v, 'DateTime') AS date, variantElement(v, 'Array(UInt64)') AS arr
FROM format(JSONEachRow, 'v Variant(String, UInt64, Float64, DateTime, Array(UInt64))',
$$ {"v" : "Hello, World!"}, {"v" : 42}, {"v" : 42.42},
{"v" : "2020-01-01 00:00:00"}, {"v" : [1, 2, 3]} $$)
ββvββββββββββββββββββββ¬βstrββββββββββββ¬ββnumββ¬βfloatββ¬ββββββββββββββββdateββ¬βarrββββββ
β Hello, World! β Hello, World! β α΄Ία΅α΄Έα΄Έ β α΄Ία΅α΄Έα΄Έ β α΄Ία΅α΄Έα΄Έ β [] β
β 42 β α΄Ία΅α΄Έα΄Έ β 42 β α΄Ία΅α΄Έα΄Έ β α΄Ία΅α΄Έα΄Έ β [] β
β 42.42 β α΄Ία΅α΄Έα΄Έ β α΄Ία΅α΄Έα΄Έ β 42.42 β α΄Ία΅α΄Έα΄Έ β [] β
β 2020-01-01 00:00:00 β α΄Ία΅α΄Έα΄Έ β α΄Ία΅α΄Έα΄Έ β α΄Ία΅α΄Έα΄Έ β 2020-01-01 00:00:00 β [] β
β [1,2,3] β α΄Ία΅α΄Έα΄Έ β α΄Ία΅α΄Έα΄Έ β α΄Ία΅α΄Έα΄Έ β α΄Ία΅α΄Έα΄Έ β [1,2,3] β
βββββββββββββββββββββββ΄ββββββββββββββββ΄βββββββ΄ββββββββ΄ββββββββββββββββββββββ΄ββββββββββ
A new experimental data type for semistructured data.
Similar to the Variant data type, but dynamic.
Variant(String, UInt64, Array(String)) — anything from the list of types.
Dynamic — anything, automatically extending the list of types.
Developer: Pavel Kruglov
Using Dynamic type in table's definition:
CREATE TABLE test (d Dynamic) ENGINE = Memory;
INSERT INTO test VALUES (NULL), (42), ('Hello, World!'), ([1, 2, 3]);
SELECT d, dynamicType(d) FROM test;
ββdββββββββββββββ¬βdynamicType(d)ββ
β α΄Ία΅α΄Έα΄Έ β None β
β 42 β Int64 β
β Hello, World! β String β
β [1,2,3] β Array(Int64) β
βββββββββββββββββ΄βββββββββββββββββ
Developer: Pavel Kruglov
CAST from an ordinary column:
SELECT 'Hello, World!'::Dynamic as d, dynamicType(d);
ββdββββββββββββββ¬βdynamicType(d)ββ
β Hello, World! β String β
βββββββββββββββββ΄βββββββββββββββββ
CAST from a Variant column:
SET allow_experimental_variant_type = 1, use_variant_as_common_type = 1;
SELECT multiIf(number % 3 = 0, number,
number % 3 = 1, range(number + 1), NULL)::Dynamic AS d, dynamicType(d)
FROM numbers(3)
ββdββββββ¬βdynamicType(d)ββ
β 0 β UInt64 β
β [0,1] β Array(UInt64) β
β α΄Ία΅α΄Έα΄Έ β None β
βββββββββ΄βββββββββββββββββ
Reading subcolumns of the Dynamic value:
SELECT d, dynamicType(d), d.String, d.`Array(Int64)` FROM test;
ββdββββββββββββββ¬βdynamicType(d)ββ¬βd.Stringβββββββ¬βd.Array(Int64)ββ
β α΄Ία΅α΄Έα΄Έ β None β α΄Ία΅α΄Έα΄Έ β [] β
β 42 β Int64 β α΄Ία΅α΄Έα΄Έ β [] β
β Hello, World! β String β Hello, World! β [] β
β [1,2,3] β Array(Int64) β α΄Ία΅α΄Έα΄Έ β [1,2,3] β
βββββββββββββββββ΄βββββββββββββββββ΄ββββββββββββββββ΄βββββββββββββββββ
SELECT toTypeName(d.String) FROM test;
ββtoTypeName(d.String)ββ
β Nullable(String) β
ββββββββββββββββββββββββ
SELECT d, dynamicType(d), dynamicElement(d, 'String') FROM test;
ββdββββββββββββββ¬βdynamicType(d)ββ¬βdynamicElement(d, 'String')ββ
β α΄Ία΅α΄Έα΄Έ β None β α΄Ία΅α΄Έα΄Έ β
β 42 β Int64 β α΄Ία΅α΄Έα΄Έ β
β Hello, World! β String β Hello, World! β
β [1,2,3] β Array(Int64) β α΄Ία΅α΄Έα΄Έ β
βββββββββββββββββ΄βββββββββββββββββ΄ββββββββββββββββββββββββββββββ
Type inference from data formats:
SELECT d, dynamicType(d)
FROM format(JSONEachRow, 'd Dynamic',
'
{"d" : "Hello, World!"},
{"d" : 42},
{"d" : 42.42},
{"d" : "2020-01-01"},
{"d" : [1, 2, 3]}
')
ββdββββββββββββββ¬βdynamicType(d)ββ
β Hello, World! β String β
β 42 β Int64 β
β 42.42 β Float64 β
β 2020-01-01 β Date β
β [1,2,3] β Array(Int64) β
βββββββββββββββββ΄βββββββββββββββββ
SET allow_experimental_json_type = 1;
CREATE TABLE test (time DateTime, data JSON) ORDER BY time;
-- or with parameters:
data JSON(
max_dynamic_paths = N,
max_dynamic_types = M,
some.path TypeName, -- a type hint
SKIP path.to.skip, -- ignore some paths
SKIP REGEXP 'paths_regexp')
Developer: Pavel Kruglov.
How it works:
— Analyzes the JSON and infers data types for every path.
— Stores every path and every distinct type as a subcolumn.
— Up to the maximum number, when it will fallback
to storing the rest of the paths together.
It enables fast column-oriented storage and queries
on arbitrary semistructured data!
Developer: Pavel Kruglov.
How to insert:
— insert with the JSONEachRow format;
— insert a string containing JSON to the column of JSON type;
— insert with the JSONAsObject format
to put the whole object into the JSON column;
— cast from String to JSON;
CREATE TABLE test (data JSON) ENGINE = Memory;
INSERT INTO test VALUES ('{"a" : {"b" : 42}, "c" : [1, 2, 3]}');
INSERT INTO test FORMAT JSONEachRow
{"data": {"a" : {"b" : 42}, "c" : [1, 2, 3]}};
SELECT data FROM test;
Developer: Pavel Kruglov.
How to select:
— read a certain path as a Dynamic column:
SELECT data.a AS x, toTypeName(x) FROM test;
— read a certain path and cast to the desired data type:
SELECT data.a.b::UInt32 AS x, toTypeName(x) FROM test;
— read a certain path and assume its data type:
SELECT data.a.b.:Int64 AS x, toTypeName(x) FROM test;
— read a subobject as JSON:
SELECT data.^a AS x, toTypeName(x) FROM test;
Developer: Pavel Kruglov.
Demo
Developer: Pavel Kruglov.
Analyzer — is a new infrastructure for query analysis
and optimization in ClickHouse.
It provides better compatibility and feature completeness
and enables complex query optimizations.
22.10: experimental π§βπ¬
24.3: beta π
24.8: production π₯³
It is battle-tested and enabled on all new services in ClickHouse Cloud!
Developers: Maksim Kita, Nikolai Kochetov, Dmitriy Novik, Vladimir Cherkasov,
Igor Nikonov, Yakov Olkhovskiy, ...
Allow to recursively run a subquery over result of itself.
Works for tree and graph traversal.
Standard SQL.
WITH RECURSIVE t AS (
SELECT 1 AS x
UNION ALL
SELECT x + 1 FROM t WHERE x < 10)
SELECT * FROM t
Developer: Maksim Kita
We imported tests from PostgreSQL. They work :)
WITH RECURSIVE search_tree AS (
SELECT id, link, data
FROM tree t
WHERE t.id = 0
UNION ALL
SELECT t.id, t.link, t.data
FROM tree t, search_tree st
WHERE t.link = st.id
)
SELECT * FROM search_tree;
But it is better than in PostgreSQL!
Developer: Maksim Kita
CREATE USER vasya VALID UNTIL '2023-09-31 01:02:03';
CREATE USER vasya IDENTIFIED BY 'password' VALID UNTIL '2023-09-31';
Example: you create a user for a single data import/export operation,
and you don't want to forget to delete it.
Developer: Nikolay Degterinsky.
$ cat users.d/alexey.yaml
users:
alexey:
ssh_keys:
ssh_key:
type: ssh-rsa
# cat ~/.ssh/id_rsa.pub
base64_key: 'AAAAB3NzaC1yc2EAAAABIwAAAQEAoZiwf7tVzIXGW26cuqnu...'
$ clickhouse-client --ssh-key-file ~/.ssh/id_rsa --user alexey
Enter your private key passphrase (leave empty for no passphrase):
Connected to ClickHouse server version 23.9.1 revision 54466.
Developer: George Gamezardashvili.
CREATE TABLE table1 (...);
CREATE VIEW view1 AS SELECT c1, c2 FROM table1 WHERE user = 'Vasya';
SELECT * FROM view1;
What access rights are required to read from view1?
By default, it is required to have access for both table1 and view1.
But if I want to give access to a view,
I also have to give access to the whole table.
CREATE VIEW view1 AS SELECT c1, c2 FROM table1 WHERE user = 'Vasya';
We want to give access to the view without giving access to the table.
To let the view control access to the subset of data.
Solution: the new SQL SECURITY and DEFINER specifications
for CREATE VIEW queries.
Applicable for ordinary VIEW and MATERIALIZED views
Developer: Artem Brustovetskii.
CREATE VIEW view1
[DEFINER = { user | CURRENT_USER }]
[SQL SECURITY { DEFINER | INVOKER | NONE }]
AS SELECT c1, c2 FROM table1 WHERE user = 'Vasya';
SQL SECURITY:
— INVOKER: the access rights for operations inside the view
are checked against the user running the query;
— this is equivalent to the default behavior for ordinary views;
— DEFINER: the access rights for operations inside the view
are checked against the defined user;
— this is the new behavior, allowing the view to remember the access rights;
Developer: Artem Brustovetskii.
-- Alice has access to table1 and creates view1:
CREATE VIEW view1
DEFINER = alice SQL SECURITY DEFINER
AS SELECT c1, c2 FROM table1 WHERE user = 'Bob';
-- She gives access to view1 to Bob:
GRANT SELECT ON default.view1 TO bob;
-- Bob does not have access to table1 but can use view1,
-- so view1 will SELECT from table1 on behalf of Alice.
Developer: Artem Brustovetskii.
The Kafka engine exists in ClickHouse since 2017
— it implements streaming consumption and data pipelines from Kafka.
Its downside: non-atomic commit to Kafka and to ClickHouse, leading to the possibility of duplicates in the case of retries.
Now there is an option to manage the offsets in Keeper:
SET allow_experimental_kafka_offsets_storage_in_keeper = 1;
CREATE TABLE ... ENGINE = Kafka(
'localhost:19092', 'topic', 'consumer', 'JSONEachRow')
SETTINGS
kafka_keeper_path = '/clickhouse/{database}/kafka',
kafka_replica_name = 'r1';
Developer: JΓ‘nos Benjamin Antal.
CREATE TABLE ... ENGINE = Kafka(
'localhost:19092', 'topic', 'consumer', 'JSONEachRow')
SETTINGS
kafka_keeper_path = '/clickhouse/{database}/kafka',
kafka_replica_name = 'r1';
With the new option it does not rely on Kafka to track the offsets,
and does it by itself with ClickHouse Keeper.
If an insertion attempt fails, it will take exactly the same chunk of data and repeat the insertion, regardless of network or server failures.
This enables deduplication and makes the consumption exactly-once.
Developer: JΓ‘nos Benjamin Antal.
Now ClickHouse supports Prometheus protocols for remote write and read.
The new, TimeSeries Engine implements storage for metrics.
SET allow_experimental_time_series_table = 1;
CREATE TABLE tbl ENGINE = TimeSeries; -- the default options.
CREATE TABLE tbl ENGINE = TimeSeries
DATA ENGINE = MergeTree
TAGS ENGINE = ReplacingMergeTree
METRICS ENGINE = ReplacingMergeTree;
Developer: Vitaly Baranov.
$ cat /etc/clickhouse-server/config.d/prometheus.yaml
prometheus:
port: 8053
handlers:
my_rule_1:
url: '/write'
handler:
type: remote_write
database: default
table: tbl
my_rule_2:
url: '/read'
handler:
type: remote_read
database: default
table: tbl
my_rule_3:
url: '/metrics'
handler:
type: expose_metrics
Developer: Vitaly Baranov.
ClickHouse is listening the Prometheus protocol
and ready to receive metrics.
TimeSeries engine is simple to use, but allows many customizations:
— put some tags (e.g., hostname) into separate columns;
— adjust table's primary key;
— adjust column types;
— ...
But there is more work to do:
— support for PromQL;
Developer: Vitaly Baranov.
How long does the server take to start up?
... if you have 10 000 replicated tables?
But having 10 000 tables is an anti-pattern...
Enable with async_load_databases in the config.xml.
ClickHouse will start instantly.
It accepts connections and start loading the tables at the same time.
If a query requires a table, its initialization will be put in front,
and the query will wait for it.
Pros: it's amazing! Cons: caveats exist.
Developer: Sergei Trifonov.
SET async_insert = true;
— allows to combine data for insertion from many concurrent clients;
to support highly concurrent, frequent inserts.
24.1: if there are not many inserts,
they will wait up to the timeout (= 200 ms by default);
— In 24.1, infrequent inserts have a higher latency.
Since 24.2: automatically adjusts to the frequency of inserts;
— In 24.2, you can enable async_insert and stop worrying.
Developer: Julia Kartseva.
$ pip install chdb
import chdb
res = chdb.query("SELECT 'Hello, Python!' AS x", "Arrow")
frame = chdb.to_df(res)
frame.info()
"chDB is an embedded OLAP SQL engine powered by ClickHouse"
Similar to clickhouse-local, but embedded into your app.
Works with local and remote datasets, Pandas dataframes,
and your own data types.
Integrates with Python functions as UDFs.