Skip to content

Commit 9ff387c

Browse files
Update inspector datastream to support Cloud Detection and Response (CDR) workflow
1 parent 3c0f68a commit 9ff387c

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

42 files changed

+6944
-657
lines changed

packages/aws/_dev/build/docs/inspector.md

Lines changed: 29 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,19 @@
11
# Inspector
22

3-
The [AWS Inspector](https://docs.aws.amazon.com/inspector/) integration collects and parses data from AWS Inspector [Findings](https://docs.aws.amazon.com/inspector/v2/APIReference/API_ListFindings.html) REST APIs.
3+
The [Amazon Inspector](https://docs.aws.amazon.com/inspector/) integration collects and parses data from Amazon Inspector [Findings](https://docs.aws.amazon.com/inspector/v2/APIReference/API_ListFindings.html) REST APIs.
44

55
**IMPORTANT: Extra AWS charges on API requests will be generated by this integration. Check [API Requests](https://www.elastic.co/docs/current/integrations/aws#api-requests) for more details.**
66

77
## Compatibility
8+
This module is tested against `Amazon Inspector API version 2.0`.
89

9-
1. The minimum compatible version of this module is **Elastic Agent 8.4.0**.
10-
2. This module is tested against `AWS Inspector API version 2.0`.
10+
## Agentless-enabled integration
1111

12-
## To collect data from AWS Inspector API, users must have an Access Key and a Secret Key. To create API token follow below steps:
12+
Agentless integrations allow you to collect data without having to manage Elastic Agent in your cloud. They make manual agent deployment unnecessary, so you can focus on your data instead of the agent that collects it. For more information, refer to [Agentless integrations](https://www.elastic.co/guide/en/serverless/current/security-agentless-integrations.html) and the [Agentless integrations FAQ](https://www.elastic.co/guide/en/serverless/current/agentless-integration-troubleshooting.html).
13+
14+
Agentless deployments are only supported in Elastic Serverless and Elastic Cloud environments. This functionality is in beta and is subject to change. Beta features are not subject to the support SLA of official GA features.
15+
16+
## To collect data from Amazon Inspector API, users must have an Access Key and a Secret Key. To create API token follow below steps:
1317

1418
1. Login to https://console.aws.amazon.com/.
1519
2. Go to https://console.aws.amazon.com/iam/ to access the IAM console.
@@ -24,6 +28,27 @@ The [AWS Inspector](https://docs.aws.amazon.com/inspector/) integration collects
2428
- This data stream doesn't support setting a Role ARN.
2529
- Ensure your IAM has the `inspector2:ListFindings` permission granted. Without this permission, API requests will be denied.
2630

31+
## Troubleshooting
32+
33+
### Breaking Changes
34+
35+
#### Support for Elastic Vulnerability Findings page.
36+
37+
Version `4.0.0` of the AWS integration adds support for [Elastic Cloud Security workflow](https://www.elastic.co/docs/solutions/security/cloud/ingest-third-party-cloud-security-data#_ingest_third_party_security_posture_and_vulnerability_data). The enhancement enables the users of AWS integration to ingest their enriched vulnerabilities from Amazon Inspector platform into Elastic and get insights directly from Elastic [Vulnerability Findings page](https://www.elastic.co/docs/solutions/security/cloud/findings-page-3).
38+
This update adds [Elastic Latest Transform](https://www.elastic.co/docs/explore-analyze/transforms/transform-overview#latest-transform-overview) which copies the latest vulnerability findings from source indices matching the pattern `logs-aws.inspector-*` into new destination indices matching the pattern `security_solution-aws.vulnerability_latest-*`. The Elastic Vulnerability Findings page will display vulnerabilities based on the destination indices.
39+
40+
For existing users of AWS integration, before upgrading to `4.0.0` please ensure following requirements are met:
41+
42+
1. Users need [Elastic Security solution](https://www.elastic.co/docs/solutions/security) which has requirements documented [here](https://www.elastic.co/docs/solutions/security/get-started/elastic-security-requirements).
43+
2. To use transforms, users must have:
44+
- at least one [transform node](https://www.elastic.co/docs/deploy-manage/distributed-architecture/clusters-nodes-shards/node-roles#transform-node-role),
45+
- management features visible in the Kibana space, and
46+
- security privileges that:
47+
- grant use of transforms, and
48+
- grant access to source and destination indices
49+
For more details on Transform Setup, refer to the link [here](https://www.elastic.co/docs/explore-analyze/transforms/transform-setup)
50+
3. Because the latest copy of vulnerabilities is now indexed in two places, i.e., in both source and destination indices, users must anticipate storage requirements accordingly.
51+
2752
## Logs
2853

2954
### Inspector

packages/aws/changelog.yml

Lines changed: 17 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,18 @@
11
# newer versions go on top
2+
- version: "4.0.0"
3+
changes:
4+
- description: |
5+
Update `inspector` datastream to support the Cloud Detection and Response (CDR) vulnerability workflow.
6+
This will require a transform node, the necessary permissions to use the transform, and specified source and destination indices.
7+
It also stores the latest copy of vulnerabilities in the destination indices, which will require additional storage.
8+
type: breaking-change
9+
link: https://github.com/elastic/integrations/pull/1
10+
- description: Parse and map the newly introduced fields in the `inspector` datastream.
11+
type: enhancement
12+
link: https://github.com/elastic/integrations/pull/1
13+
- description: Add temporary processor to remove the fields added by the Agentless policy.
14+
type: bugfix
15+
link: https://github.com/elastic/integrations/pull/1
216
- version: "3.8.2"
317
changes:
418
- description: Fix null reference in securityhub_findings* data streams when extracting `host.ip`.
@@ -76,9 +90,9 @@
7690
link: https://github.com/elastic/integrations/pull/13367
7791
- version: "3.1.0"
7892
changes:
79-
- description: Enhancements for Guardduty dashboards.
80-
type: enhancement
81-
link: https://github.com/elastic/integrations/pull/13542
93+
- description: Enhancements for Guardduty dashboards.
94+
type: enhancement
95+
link: https://github.com/elastic/integrations/pull/13542
8296
- version: "3.0.0"
8397
changes:
8498
- description: Add new Security Hub Findings Full Posture data stream. If you rely on Findings > Misconfigurations view, enable this new data stream.
Lines changed: 16 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1,20 +1,18 @@
11
-----BEGIN CERTIFICATE-----
2-
MIIDUDCCAjgCCQCsyG2Sw6iMvzANBgkqhkiG9w0BAQsFADBqMQswCQYDVQQGEwJY
3-
WDEVMBMGA1UEBwwMRGVmYXVsdCBDaXR5MRwwGgYDVQQKDBNEZWZhdWx0IENvbXBh
4-
bnkgTHRkMSYwJAYDVQQDDB1pbnNwZWN0b3IyLnh4eHguYW1hem9uYXdzLmNvbTAe
5-
Fw0yMjA5MTkxMTE3NDlaFw0yMzA5MTkxMTE3NDlaMGoxCzAJBgNVBAYTAlhYMRUw
6-
EwYDVQQHDAxEZWZhdWx0IENpdHkxHDAaBgNVBAoME0RlZmF1bHQgQ29tcGFueSBM
7-
dGQxJjAkBgNVBAMMHWluc3BlY3RvcjIueHh4eC5hbWF6b25hd3MuY29tMIIBIjAN
8-
BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAs65SHVvohc00blWOWaZqqunMMw9G
9-
nZuhvWMvUdkk2FZE4nmkU0QB1VhewV7Yesfbelhq5OYj6NE2hEl0znSUju8CbQHy
10-
LfXH+Wp6zBe7o1lVNXVcb7PHwCx/nThXsohEHCHYRu8d9APbY7doUW0amFQOSHCD
11-
jbqmr1lcOsZ7C57X4A5iQyESaP3ASzYoTitSbsWQWWETq5Kq7Bl2Vm5Pk8p5fg2u
12-
7cSyY7XtRXxlKW0adAbaOIBe7+JZr5nukUjGWOL139K1Zl/YO/1lxDJvZLwKOffM
13-
zLTX111B0GX9Lmtk/8A0A6yzuL8u5byKEIGCwD/wW30+763y8TgFaWh0nwIDAQAB
14-
MA0GCSqGSIb3DQEBCwUAA4IBAQBY4KpmVFmCneRe0vtlx6FA0Pa2N4oAVgQmNs0r
15-
tySb22AB8c5FBh0KxDYTNRLzVRPOeFxEboDbVVMCIhGHem/EqbxVRiQPP5OJVjqG
16-
VSAhQ9maRxEnPOJ2BxMGm38etP1+TJkbPgIYmZTSswEODYksnqiC6YeoLVMnWDeX
17-
o6y1gqSKdndUHf4FO/RxZfrrXv85GwwpgnNGCjv5o09VxlO1yzXDNlml6KCarWuc
18-
DTMzUkky77XmBVrLVd+YF3jmL9frGB0s6Kud5E691gl9M3hmXJwPnzrEUgUNqrz9
19-
/eb6vyOPH3qLNpMfE2X12xNJ5cZ5CN7rT37b5Mce4QPNsX2M
2+
MIIC1zCCAb8CFBhBTt6yEnLtREKHvN40F2qLleIdMA0GCSqGSIb3DQEBCwUAMCgx
3+
JjAkBgNVBAMMHWluc3BlY3RvcjIueHh4eC5hbWF6b25hd3MuY29tMB4XDTI1MDYy
4+
NDA5MTQxMloXDTM1MDYyMjA5MTQxMlowKDEmMCQGA1UEAwwdaW5zcGVjdG9yMi54
5+
eHh4LmFtYXpvbmF3cy5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
6+
AQCbq5ChvdjWiM2/tpew4HATwk9KBXB2J4s70DaqxWJwLKzUYEGWXbujk9ONptE9
7+
7gkaQEGILWB8vjF47499a0WRt6LeC5KYjH5+Z3MoD+0Eixo2j6rh+jyxTBb64QR8
8+
GUT3oo0cEDOTXFbVF5ooS1Sber2S5Ww5Edm8jKSYuJ8cJxJDghg9Np4sZZ6JBFIq
9+
kftDoLCeCZf4W5u8n9/386g47TzgI7ojGEER3m2TXOPVIA7XooeGisqUiOpTPHWA
10+
0tctkSdjow+JJQ7oUi5NJJKdJ2cPbpA11kv9/9TYIpKZf+jUu8ZxTwAwbTjPLbyo
11+
qFzle0BYcc4j2zOdKuv4OkPXAgMBAAEwDQYJKoZIhvcNAQELBQADggEBACC7nvmw
12+
+4cR7DslQ6pGRIHbB23yK7ro3cFWqgcxsYg3ntbAJitgKuROWi/rv2vhOB0SfuHT
13+
9Oc/jcOIilgGni+mfOSTySIYT7B4OeYDjIonYzBsykSWjbt+QtHjJlRwNhZm38ws
14+
fG/nIjC69GCIS3BUqo9dxgnyCdHn+hO3rO8mE58MKVA/iq7uDuFIdLrU+xY1LFUT
15+
yb9ZRr3XMjgNFiC3LWnQDycxecFZo4OJcRETyGuwL+HcOybcO00ZOoGHMcemVjTA
16+
JPlgUImmsN+vezO92i2adepyb75vEbEbILQyz9G1WCg6MA9UWrdT9LtwOxq2+pCt
17+
KsEFaVXtUm4/YSo=
2018
-----END CERTIFICATE-----

packages/aws/data_stream/inspector/_dev/deploy/docker/files/config.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,4 +4,4 @@ rules:
44
responses:
55
- status_code: 200
66
body: |
7-
{"findings":[{"awsAccountId":"123456789","description":"Findins message","findingArn":"arn:aws:s3:::sample","firstObservedAt":"1.663703546405E9","inspectorScore":1.2,"inspectorScoreDetails":{"adjustedCvss":{"adjustments":[{"metric":"Base","reason":"use Base metric"}],"cvssSource":"scope1","score":8.9,"scoreSource":"scope2","scoringVector":"Attack Vector","version":"v3.1"}},"lastObservedAt":"1.663703546405E9","networkReachabilityDetails":{"networkPath":{"steps":[{"componentId":"02ce3860-3126-42af-8ac7-c2a661134129","componentType":"type"}]},"openPortRange":{"begin":1234,"end":4567},"protocol":"TCP"},"packageVulnerabilityDetails":{"cvss":[{"baseScore":1.1,"scoringVector":"Attack Vector","source":"scope3","version":"v3.1"}],"referenceUrls":["https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6111"],"relatedVulnerabilities":["security"],"source":"example","sourceUrl":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6111","vendorCreatedAt":"1.663703546405E9","vendorSeverity":"basic","vendorUpdatedAt":"1.663703546405E9","vulnerabilityId":"123456789","vulnerablePackages":[{"arch":"arch","epoch":123,"filePath":"/example","fixedInVersion":"3","name":"example","packageManager":"BUNDLER","release":"release","sourceLayerHash":"50d858e0985ecc7f60418aaf0cc5ab587f42c2570a884095a9e8ccacd0f6545c","version":"2.0"}]},"remediation":{"recommendation":{"text":"example","Url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6111"}},"resources":[{"details":{"awsEc2Instance":{"iamInstanceProfileArn":"arn:aws:s3:::iam","imageId":"123456789","ipV4Addresses":["89.160.20.128","81.2.69.192"],"ipV6Addresses":["2a02:cf40::"],"keyName":"sample","launchedAt":"1.663703546405E9","platform":"EC2","subnetId":"123456","type":"Instance","vpcId":"3265875"},"awsEcrContainerImage":{"architecture":"arch","author":"example","imageHash":"50d858e0985ecc7f60418aaf0cc5ab587f42c2570a884095a9e8ccacd0f6545d","imageTags":["sample"],"platform":"ECR","pushedAt":"1.663703546405E9","registry":"ecr registry","repositoryName":"sample"}},"id":"12345678","partition":"partition","region":"us-east-1","tags":{"string1":"string1","string2":"string2"},"type":"AWS_EC2_INSTANCE"}],"severity":"INFORMATIONAL","status":"ACTIVE","title":"sample findings","type":"NETWORK_REACHABILITY","updatedAt":"1.663703546405E9"}]}
7+
{"findings":[{"awsAccountId":"123456789012","description":"The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. <math>, <svg>, etc contexts).","epss":{"score":0.00024},"exploitAvailable":"NO","findingArn":"arn:aws:inspector2:us-east-2:123456789012:finding/fb6294abcdef0123456789abcdef8123","firstObservedAt":1748539687.919,"fixAvailable":"YES","inspectorScore":6.5,"inspectorScoreDetails":{"adjustedCvss":{"adjustments":[],"cvssSource":"NVD","score":6.5,"scoreSource":"NVD","scoringVector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L","version":"3.1"}},"lastObservedAt":1749165796.162,"packageVulnerabilityDetails":{"cvss":[{"baseScore":6.5,"scoringVector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L","source":"NVD","version":"3.1"},{"baseScore":6.5,"scoringVector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L","source":"NVD","version":"3.1"}],"referenceUrls":["https://groups.google.com/g/golang-announce/c/ezSKR9vqbqA","https://nvd.nist.gov/vuln/detail/CVE-2025-22872","https://alas.aws.amazon.com/AL2023/ALAS-2025-981.html","https://alas.aws.amazon.com/AL2/ALASDOCKER-2025-064.html","https://alas.aws.amazon.com/AL2023/ALAS-2025-980.html","https://alas.aws.amazon.com/AL2/ALASDOCKER-2025-063.html","https://alas.aws.amazon.com/AL2023/ALAS-2025-979.html","https://alas.aws.amazon.com/cve/json/v1/CVE-2025-22872.json","https://alas.aws.amazon.com/AL2/ALAS-2025-2863.html","https://alas.aws.amazon.com/cve/json/v1/CVE-2025-22872.json"],"relatedVulnerabilities":[],"source":"NVD","sourceUrl":"https://nvd.nist.gov/vuln/detail/CVE-2025-22872","vendorCreatedAt":1744827364,"vendorSeverity":"MEDIUM","vendorUpdatedAt":1747437319,"vulnerabilityId":"CVE-2025-22872","vulnerablePackages":[{"epoch":0,"filePath":"vol-0e47545061282cd35:/p1:opt/cni/bin/aws-cni","fixedInVersion":"0.38.0","name":"golang.org/x/net","packageManager":"GOBINARY","version":"v0.1.0"},{"epoch":0,"filePath":"vol-0e47545061282cd35:/p1:etc/eks/image-credential-provider/ecr-credential-provider","fixedInVersion":"0.38.0","name":"golang.org/x/net","packageManager":"GOBINARY","version":"v0.30.0"},{"epoch":0,"filePath":"vol-0e47545061282cd35:/p1:opt/cni/bin/dhcp","fixedInVersion":"0.38.0","name":"golang.org/x/net","packageManager":"GOBINARY","version":"v0.30.0"},{"epoch":0,"filePath":"vol-0e47545061282cd35:/p1:usr/bin/aws-iam-authenticator","fixedInVersion":"0.38.0","name":"golang.org/x/net","packageManager":"GOBINARY","version":"v0.30.0"},{"epoch":0,"filePath":"vol-0e47545061282cd35:/p1:usr/bin/kubelet","fixedInVersion":"0.38.0","name":"golang.org/x/net","packageManager":"GOBINARY","version":"v0.30.0"},{"arch":"X86_64","epoch":0,"fixedInVersion":"0:2.0.5-1.amzn2.0.1","name":"nerdctl","packageManager":"OS","release":"1.amzn2.0.1","remediation":"yum update nerdctl","version":"2.0.4"}]},"remediation":{"recommendation":{"text":"None Provided"}},"resources":[{"details":{"awsEc2Instance":{"iamInstanceProfileArn":"arn:aws:iam::123456789012:instance-profile/eks-0012345a-1234-5678-1234-6c1abcdef012","imageId":"ami-0e0f0123456789abd","ipV4Addresses":["10.90.1.245","10.90.1.45","10.90.1.168","10.90.1.157","1.128.0.1","10.90.1.103","10.90.1.197","10.90.1.220","10.90.1.86","10.90.1.29","10.90.1.18","10.90.1.181","10.90.1.161","10.90.1.229","10.90.1.108","10.90.1.219","10.90.1.9","10.90.1.106","10.90.1.206"],"ipV6Addresses":[],"launchedAt":1748534768,"platform":"AMAZON_LINUX_2","subnetId":"subnet-0ababcdefabcdef8b","type":"t3.medium","vpcId":"vpc-04ab0123456789123"}},"id":"i-0fabcdefabcdef50b","partition":"aws","region":"us-east-2","tags":{"aws:autoscaling:groupName":"eks-sei_demo_prod_linux-00c12345-abcd-1234-5678-601234567896","aws:ec2launchtemplate:version":"6","aws:eks:cluster-name":"sei_demo_prod","eks:cluster-name":"sei_demo_prod","eks:nodegroup-name":"sei_demo_prod_linux","k8s.io/cluster-autoscaler/enabled":"true","k8s.io/cluster-autoscaler/sei_demo_prod":"owned","kubernetes.io/cluster/sei_demo_prod":"owned"},"type":"AWS_EC2_INSTANCE"}],"severity":"MEDIUM","status":"ACTIVE","title":"CVE-2025-22872 - golang.org/x/net, golang.org/x/net and 4 more","type":"PACKAGE_VULNERABILITY","updatedAt":1749165796.162}]}
Lines changed: 26 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -1,28 +1,28 @@
11
-----BEGIN PRIVATE KEY-----
2-
MIIEvwIBADANBgkqhkiG9w0BAQEFAASCBKkwggSlAgEAAoIBAQCzrlIdW+iFzTRu
3-
VY5Zpmqq6cwzD0adm6G9Yy9R2STYVkTieaRTRAHVWF7BXth6x9t6WGrk5iPo0TaE
4-
SXTOdJSO7wJtAfIt9cf5anrMF7ujWVU1dVxvs8fALH+dOFeyiEQcIdhG7x30A9tj
5-
t2hRbRqYVA5IcIONuqavWVw6xnsLntfgDmJDIRJo/cBLNihOK1JuxZBZYROrkqrs
6-
GXZWbk+Tynl+Da7txLJjte1FfGUpbRp0Bto4gF7v4lmvme6RSMZY4vXf0rVmX9g7
7-
/WXEMm9kvAo598zMtNfXXUHQZf0ua2T/wDQDrLO4vy7lvIoQgYLAP/BbfT7vrfLx
8-
OAVpaHSfAgMBAAECggEBAK1pJhLzqtvHijyaEcJwHC5Laio1Kf/ePiDb4sVpfmfU
9-
CrNQlslNrz9KBFk3wlHtJONVBgVYH3wIvka55iOC3AV+oqa15Bd7R75th4oFtbAW
10-
/WeUltuvdK8Bwz/nKqxBWwqTl3oOOKhSOKBqWCGN3Mb7CLXc8PoOE+TTp3GKMSKq
11-
UJHftHNIcEhb0MqB6sV3KnD6Z00Y/TYIlbPm3LsbSwN7llOGeQAfFaf1iS9M42QT
12-
XCPp3No6kNokt/G/pc3afupbgOLEF3hh1VOtS5ooFq74WrA3O0M7iL4fZFIY2RZY
13-
JsyWEn0foKrwrCl+tdCmeCDjclgun2sk0FYCGR8LL6ECgYEA7fV5+MqwoF40Q0mI
14-
+ccnWYz/hBrmUdWZ+t4Y4s1LKbUkHyG99cR7W/Z5wUXihK/hybTZkZ3TI5TNWx0D
15-
pAMXOKDPLP6Lx3E5VsqREQq8laFF8byWmA3RVprU5j2WfQQudCUjStFxs+bN7zpk
16-
WklPg10uJRjHIaUFc2ECJ3GGV/kCgYEAwU27io7qQjsMWOLO07B6R2rt9mPT+jyX
17-
QD0H9uA++kJy7VWhQr04QBCA6rnnblEwMuNFmPQUJUMVHZDhdkDnEdTzMJL2orjY
18-
tQR0qdosReYDmnNRcHnLuvZZgs2hlPCOoSpHbtRWcydDz9R8tJGdQFnRnOkxyhG+
19-
Bk6bn3zOx1cCgYEAnHd+FUaJ71kiOmBe7gay7CJXXTEm4wZ18kwZxwBAfRM7xjC0
20-
rKbeinC+TIS8Vo0kBTKioSpKzCmrAk9Ito7FtRmgQLC7jo/3qQcXbkJGEIlz6Wkd
21-
CKyFStISTbaPfnLCbOKCm06u2iFYpgYaOHfeDb22evQY9BmDRQOzm+X89VkCgYBD
22-
njplPJrrchZenXA2EryjcN8u2jrThRBvkynPDSBakJX9OYAAhYpAtsUx1rgDGflf
23-
Q6sb1v2ZDz86qWyE3i02SqSLME2AHGMJ5zYcGEp2ZQCLrZ0mWCSREQ28uMu1+vQZ
24-
ol18gmB/RZPuBmldDLbSRNkTJ2uYQN6U/Dhp8NGwXwKBgQCbJsAqnGRi0Doogyr9
25-
sGVGH9yXcOOKHrHQuOLYcUo5X9uO6qy1MGEKUP3BfeLQr2bds4so3d2vbtVa32lH
26-
2zdUhDLShHNNhacSQkPb7HvRXSTN8g4IrK+nvl6WPSISVbi1tqKZZo195K8Q3bhy
27-
3zrW0FlJvp4I4mXZZf+KjUNHYA==
2+
MIIEvAIBADANBgkqhkiG9w0BAQEFAASCBKYwggSiAgEAAoIBAQCbq5ChvdjWiM2/
3+
tpew4HATwk9KBXB2J4s70DaqxWJwLKzUYEGWXbujk9ONptE97gkaQEGILWB8vjF4
4+
7499a0WRt6LeC5KYjH5+Z3MoD+0Eixo2j6rh+jyxTBb64QR8GUT3oo0cEDOTXFbV
5+
F5ooS1Sber2S5Ww5Edm8jKSYuJ8cJxJDghg9Np4sZZ6JBFIqkftDoLCeCZf4W5u8
6+
n9/386g47TzgI7ojGEER3m2TXOPVIA7XooeGisqUiOpTPHWA0tctkSdjow+JJQ7o
7+
Ui5NJJKdJ2cPbpA11kv9/9TYIpKZf+jUu8ZxTwAwbTjPLbyoqFzle0BYcc4j2zOd
8+
Kuv4OkPXAgMBAAECggEAJZGnw6kmMkxs32ZJQKpB0jr0WMhsRk+v1h0ffGJLqgfW
9+
JCEg4xG3DbjI9yg52mjesIOubReKcECUfvvN1PZ1IUBA4bbIR+GsS4Ra8eG6EX0i
10+
s+VDV+tFB4L2DtEMfIi6sMr9pDayw88ms6HRFgVsI2PhaZjN4A4TTuJgfO0dlTTm
11+
T8RPOhIT4ydRaVBawzZsA5NKpU4PX8mMwNSkoCvnruYNTFb/GE1tsozTnOnMiZ1q
12+
xPEWJNAhoiWPbiZDrjz5OHuTVqI31QDJH06aqfWuAx2H9qJL9BfyKJsotMjyR3Cn
13+
5hgbiJx+9/6rvmhclun4H6DSRmO68+aGQ+65P7wySQKBgQC/x/jmQoMpKCCbJL/A
14+
Nq1sm6/domIMD2DuNoIxdzf5tW7cPBiwu0HEvMFC9BsmhN4o1uiacGSiIJVLEe+Q
15+
/vUjVr+VnW28NvD43kCXceCxKWMInruqTxyqVaSHnPx2TK4uDtbdTqyIzDs6GQSX
16+
i22hbaafR+0/hR18WEy+t8iQ+QKBgQDPzA616QmdJz5PtGxBjKyPNNTokKPOA8Bg
17+
ZKl0Dz9BzEbRMHcBCGYd8DAkOZJvCovxBPoyp2swysjPUrBMpUUEGrh8Ds7a1Oqs
18+
lJLU/fpPMbBD3FpzRLFCaZd7nrZZBbVwkOLaYOiKbxYBkz0Pun8CwZCq0i/WA0U4
19+
I8KmcTp/TwKBgHgzaflH7tU45VbX7acXnhLYcZ3ETRep++LSHz/JrTfBU76NnBwJ
20+
AevBMpA4V1wJIwUNzbQehbRoH6pxj2mdox+HG4U2qrSw6s/Q3UMOiPoBKqUYeB8C
21+
fsDz9K9a4ZFz9ie//UOwL8t91hFP5OTm6sum4iwq9LQ/Rn/NCCzxG7BhAoGAOBLT
22+
oWkaTAsr+Gwyjlm8swRJs9xcJ5rBjgF77LK0mjfaoFaYtnGixM9s3kme51IMQ2TZ
23+
c1PUTB1cpP2mT3iFsD7Zq7h/P3QXQ6zwFoPWyQoai6VpzxMpVkeSNiy0/j7ZIGAo
24+
p09hUQH7CT/HSXhFD+RV+pKvj+vgAO89dpa1d2cCgYBwVgPyFdoxYIZhaz9+8f4H
25+
uWdCvgQDINEQD7FOj2SBcqunHehPrNp8uyby4YtSU31sOYyhOBTb5/1LvT8nt+JQ
26+
w4eK1i9FkzE6wSpWhq2Z24LhyL7KMFbqZl8pf2mUGIEMRXVTbD0Ef5s7TeY3YqHQ
27+
oYjDjXq0ttpfVu2mvOUchQ==
2828
-----END PRIVATE KEY-----

0 commit comments

Comments
 (0)