Audit.WebApi.Core 25.0.4

dotnet add package Audit.WebApi.Core --version 25.0.4
NuGet\Install-Package Audit.WebApi.Core -Version 25.0.4
This command is intended to be used within the Package Manager Console in Visual Studio, as it uses the NuGet module's version of Install-Package.
<PackageReference Include="Audit.WebApi.Core" Version="25.0.4" />
For projects that support PackageReference, copy this XML node into the project file to reference the package.
paket add Audit.WebApi.Core --version 25.0.4
#r "nuget: Audit.WebApi.Core, 25.0.4"
#r directive can be used in F# Interactive and Polyglot Notebooks. Copy this into the interactive tool or source code of the script to reference the package.
// Install Audit.WebApi.Core as a Cake Addin
#addin nuget:?package=Audit.WebApi.Core&version=25.0.4

// Install Audit.WebApi.Core as a Cake Tool
#tool nuget:?package=Audit.WebApi.Core&version=25.0.4

Audit.WebApi

ASP.NET MVC Web API Audit Extension for Audit.NET library (An extensible framework to audit executing operations in .NET).

Generate Audit Trails for ASP.NET MVC Web API calls. This library provides a configurable infrastructure to log interactions with your Asp.NET (or Asp.NET Core) Web API.

Install

NuGet Package

NuGet Status NuGet Count

NuGet Status NuGet Count

To install the ASP.NET package run the following command on the Package Manager Console:

PM> Install-Package Audit.WebApi

To install the Asp Net Core package:

PM> Install-Package Audit.WebApi.Core

IMPORTANT NOTE

Previously, it was possible to reference the Audit.WebApi package for ASP.NET Core MVC.

However, starting from version 23, the Audit.WebApi package is now exclusively designed for ASP.NET Framework MVC, whereas the Audit.WebApi.Core package is exclusively tailored for ASP.NET Core MVC.

Please upgrade your references accordingly.

How it works

This library is implemented as an action filter that intercepts the execution of action methods to generate a detailed audit trail.

For Asp.NET Core, it is also implemented as a Middleware class that can be configured to log requests that does not reach the action filter (i.e. unsolved routes, parsing errors, etc).

Usage

The audit can be enabled in different ways:

  1. Local Action Filter: Decorating the controllers/actions to be audited with AuditApi action filter attribute.
  2. Global Action Filter: Adding the AuditApiGlobalFilter action filter as a global filter. This method allows more dynamic configuration of the audit settings.
  3. Middleware (Asp.Net Core): Adding the AuditMiddleware to the pipeline. This method allow to audit request that doesn't get to the action filter.
  4. Middleware + Action Filters (Asp.Net Core): Adding the Audit Middleware together with the Global Action Filter (or Local Action Filters). This is the recommended approach.
1- Local Action Filter

Decorate your controller with AuditApiAttribute:

using Audit.WebApi;

public class UsersController : ApiController
{
    [AuditApi]
    public IEnumerable<ApplicationUser> Get()
    {
      //...
    }

    [AuditApi(EventTypeName = "GetUser", 
        IncludeHeaders = true, IncludeResponseHeaders = true, IncludeResponseBody = true, IncludeRequestBody = true, IncludeModelState = true)]
    public IHttpActionResult Get(string id)
    {
     //...
    }
}

You can also decorate the controller class with the AuditApi attribute so it will apply to all the actions, for example:

using Audit.WebApi;

[AuditApi(EventTypeName = "{controller}/{action} ({verb})", IncludeResponseBody = true, IncludeRequestBody = true, IncludeModelState = true)]
public class UsersController : ApiController
{
    public IEnumerable<ApplicationUser> Get()
    {
      //...
    }

    public IHttpActionResult Get(string id)
    {
     //...
    }
}

You can also add the AuditApiAttribute as a global filter, for example for Asp.NET Core:

using Audit.WebApi;

public class Startup
{
    public void ConfigureServices(IServiceCollection services)
    {
        services.AddMvc(_ => _
            .Filters.Add(new AuditApiAttribute()));
    }
}

Note

For custom configuration it is recommended to use the AuditApiGlobalFilter as a global filter. See next section.

2- Global Action Filter

Alternatively, you can add one or more AuditApiGlobalFilter as global action filters. This method allows to dynamically change the audit settings as functions of the context, via a fluent API.

Note this action filter cannot be used to statically decorate the controllers.

using Audit.WebApi;

public class Startup
{
    public void ConfigureServices(IServiceCollection services)
    {
        services.AddMvc(mvc =>
        {
            mvc.AddAuditFilter(config => config
                .LogActionIf(d => d.ControllerName == "Orders" && d.ActionName != "GetOrder")
                .WithEventType("{verb}.{controller}.{action}")
                .IncludeHeaders(ctx => !ctx.ModelState.IsValid)
                .IncludeRequestBody()
                .IncludeModelState()
                .IncludeResponseBody(ctx => ctx.HttpContext.Response.StatusCode == 200));
        });
    }

3- Middleware

For Asp.NET Core, you can additionally (or alternatively) configure a middleware to be able to log requests that doesn't get into an action filter (i.e. request that cannot be routed, etc).

On your startup Configure method, call the UseAuditMiddleware() extension method:

using Audit.WebApi;

public class Startup
{
    public void Configure(IApplicationBuilder app)
    {
        app.UseAuditMiddleware(_ => _
            .FilterByRequest(rq => !rq.Path.Value.EndsWith("favicon.ico"))
            .WithEventType("{verb}:{url}")
            .IncludeHeaders()
            .IncludeResponseHeaders()
            .IncludeRequestBody()
            .IncludeResponseBody());

        app.UseMvc();
    }
}

Warning

You should call UseAuditMiddleware() before UseMvc(), otherwise the middleware will not be able to process MVC actions.

If you only configure the middleware (no audit action filters) but want to ignore actions via [AuditIgnoreAttribute], you must add an action filter to discard the AuditScope. This is needed because the middleware cannot inspect the MVC action attributes. You can use the AuditIgnoreActionFilter for this purpose, adding it to the MVC pipeline like this:

public void ConfigureServices(IServiceCollection services)
{
    services.AddMvc(mvc =>
    {
        mvc.Filters.Add(new AuditIgnoreActionFilter());
    });
}
4- Middleware + Action Filters

You can mix the Audit Middleware together with the Global Action Filter (and/or Local Action Filters). Take into account that:

  • Middleware will log any request regardless if an MVC action is reached or not.
  • If an action is reached, the Action Filter will include specific MVC context info to the Audit Event.
  • Only one Audit Event is generated per request, regardless of an action being processed by the Middleware and multiple Action Filters.
  • The AuditIgnore attribute is handled by the Action Filters, there is no need to add the AuditIgnoreActionFilter to the MVC filters when using a mixed approach.

Configuration

Output

The audit events are stored using a Data Provider. You can use one of the available data providers or implement your own. Please refer to the data providers section on Audit.NET documentation.

You can setup the data provider to use by registering an instance of an AuditDataProdiver to the IServiceCollection on your start-up code, for example:

var dataProvider = new FileDataProvider(cfg => cfg.Directory(@"C:\Logs"));
services.AddSingleton<AuditDataProvider>(dataProvider);

Or, alternatively, you can setup the data provider globally with the static configuration:

Audit.Core.Configuration.DataProvider = new FileDataProvider(cfg => cfg.Directory(@"C:\Logs"));

Or using the fluent API:

Audit.Core.Configuration.Setup()
    .UseFileLogProvider(cfg => cfg.Directory(@"C:\Logs"));

Settings (Action Filter)

The AuditApiAttribute can be configured with the following properties:

  • EventTypeName: A string that identifies the event type. Can contain the following placeholders:
    • {controller}: replaced with the controller name.
    • {action}: replaced with the action method name.
    • {verb}: replaced with the HTTP verb used (GET, POST, etc).
  • IncludeHeaders: Boolean to indicate whether to include the Http Request Headers or not. Default is false.
  • IncludeResponseHeaders: Boolean to indicate whether to include the Http Response Headers or not. Default is false.
  • IncludeRequestBody: Boolean to indicate whether to include or exclude the request body from the logs. Default is false. (Check the following note)
  • IncludeResponseBody: Boolean to indicate whether to include response body or not. Default is false.
  • IncludeResponseBodyFor: Alternative to IncludeResponseBody, to allow conditionally including the response body on the log, when certain Http Status Codes are returned.
  • ExcludeResponseBodyFor: Alternative to IncludeResponseBody, to allow conditionally excluding the response body from the log, when certain Http Status Codes are returned.
  • IncludeModelState: Boolean to indicate whether to include the Model State info or not. Default is false.
  • SerializeActionParameters: Boolean to indicate whether the action arguments should be pre-serialized to the audit event. Default is false.

The AuditApiGlobalFilter can be configured with the following methods:

  • LogActionIf() / LogRequestIf(): A function of the ContollerActionDescriptor / HttpRequest to determine whether the action should be logged or not.
  • WithEventType(): A string (or a function of the executing context that returns a string) that identifies the event type. Can contain the following placeholders:
    • {controller}: replaced with the controller name.
    • {action}: replaced with the action method name.
    • {verb}: replaced with the HTTP verb used (GET, POST, etc).
    • {url}: replaced with the request URL.
  • IncludeHeaders(): Boolean (or function of the executing context that returns a boolean) to indicate whether to include the Http Request Headers or not. Default is false.
  • IncludeResponseHeaders(): Boolean (or function of the executing context that returns a boolean) to indicate whether to include the Http Response Headers or not. Default is false.
  • IncludeRequestBody(): Boolean (or function of the executing context that returns a boolean) to indicate whether to include or exclude the request body from the logs. Default is false. (Check the following note)
  • IncludeResponseBody(): Boolean (or function of the executed context that returns a boolean) to indicate whether to include response body or not. Default is false.
  • IncludeModelState(): Boolean (or function of the executed context that returns a boolean) to indicate whether to include the Model State info or not. Default is false.
  • SerializeActionParameters(): Boolean to indicate whether the action arguments should be pre-serialized to the audit event. Default is false.

To configure the output persistence mechanism please see Event Output Configuration.

NOTE

When IncludeRequestBody is set to true (or when using IncludeRequestBodyFor/ExcludeRequestBodyFor), you must enable rewind on the request body stream, otherwise, the controller won't be able to read the request body since by default, it's a forward-only stream that can be read only once. You can enable rewind on your startup logic with the following code:

public void Configure(IApplicationBuilder app, IHostingEnvironment env)
{
    app.Use(async (context, next) => {  // <----
        context.Request.EnableBuffering(); // or .EnableRewind();
        await next();
    });
    
    app.UseMvc();
}

Settings (Middleware)

  • FilterByRequest(): A function of the HttpRequest to determine whether the request should be logged or not, by default all requests are logged.
  • IncludeHeaders(): Boolean (or function of the HTTP context that returns a boolean) to indicate whether to include the Http Request Headers or not. Default is false.
  • IncludeResponseHeaders(): Boolean (or function of the HTTP context that returns a boolean) to indicate whether to include the Http Response Headers or not. Default is false.
  • IncludeRequestBody(): Boolean (or function of the HTTP context that returns a boolean) to indicate whether to include or exclude the request body from the logs. Default is false. (Check the following note)
  • IncludeResponseBody(): Boolean (or function of the HTTP context that returns a boolean) to indicate whether to include response body or not. Default is false.
  • WithEventType(): A string (or a function of the HTTP context that returns a string) that identifies the event type. Can contain the following placeholders (default is "{verb} {url}"):
    • {verb}: replaced with the HTTP verb used (GET, POST, etc).
    • {url}: replaced with the request URL.

Audit Ignore attribute

To selectively exclude certain controllers, actions, action parameters or action responses, you can decorate them with AuditIgnore attribute.

For example:

[Route("api/[controller]")]
[AuditApi(EventTypeName = "{controller}/{action}")]
public class AccountController : Controller
{
    [HttpGet]
    [AuditIgnore]
    public IEnumerable<string> GetAccounts()
    {
        // this action will not be audited
    }

    [HttpPost]
    public IEnumerable<string> PostAccount(string user, [AuditIgnore]string password)
    {
        // password argument will not be audited
    }

    [HttpGet]
    [return:AuditIgnore]
    public IEnumerable<string> GetSecrets()
    {
        // the return value of this action will not be audited
    }

}

Output details

The following table describes the Audit.WebApi output fields:

Action

Field Name Type Description
TraceId string A unique identifier per request
HttpMethod string HTTP method (GET, POST, etc)
ControllerName string The controller name
ActionName string The action name
FormVariables Object Form-data input variables passed to the action
ActionParameters Object The action parameters passed
UserName string Username on the HttpContext Identity
RequestUrl string URL of the request
IpAddress string Client IP address
ResponseStatusCode integer HTTP response status code
ResponseStatus string Response status description
RequestBody BodyContent The request body (optional)
ResponseBody BodyContent The response body (optional)
Headers Object HTTP Request Headers (optional)
ResponseHeaders Object HTTP Response Headers (optional)
ModelStateValid boolean Boolean to indicate if the model is valid
ModelStateErrors string Error description when the model is invalid
Exception string The exception thrown details (if any)

BodyContent

Field Name Type Description
Type string The body type reported
Length long? The length of the body if reported
Value Object The body content

Customization

You can access the Audit Scope object for customization from the API controller action by calling the ApiController extension method GetCurrentAuditScope().

For example:

[AuditApi]
public class UsersController : ApiController
{
    public IHttpActionResult Get(string id)
    {
       //...
       var auditScope = this.GetCurrentAuditScope();
       auditScope.Comment("New comment from controller");
       auditScope.SetCustomField("TestField", Guid.NewGuid());
       //...
    }
}

See Audit.NET documentation about Custom Field and Comments for more information.

Output Sample

{  
   "EventType":"POST Values/Post",
   "Environment":{  
      "UserName":"Federico",
      "MachineName":"HP",
      "DomainName":"HP",
      "CallingMethodName":"WebApiTest.Controllers.ValuesController.Post()",
      "AssemblyName":"WebApiTest, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null",
      "Culture":"en-US"
   },
   "StartDate":"2017-03-09T18:03:05.5287603-06:00",
   "EndDate":"2017-03-09T18:03:05.5307604-06:00",
   "Duration":2,
   "Action":{  
      "TraceId": "0HLFLQP4HGFAF_00000001",
      "HttpMethod":"POST",
      "ControllerName":"Values",
      "ActionName":"Post",
      "ActionParameters":{  
         "value":{  
            "Id":100,
            "Text":"Test"
         }
      },
      "FormVariables":{  
      },
      "RequestUrl":"http://localhost:65080/api/values",
      "IpAddress":"127.0.0.1",
      "ResponseStatus":"OK",
      "ResponseStatusCode":200,
      "RequestBody":{  
         "Type":"application/json",
         "Length":27,
         "Value":"{ Id: 100, Text: \"Test\" }"
      },
      "ResponseBody":{  
         "Type":"SomeObject",
         "Value":{  
            "Id":1795824380,
            "Text":"Test"
         }
      },
      "Headers": {
        "Connection": "Keep-Alive",
        "Accept": "text/html, application/xhtml+xml, image/jxr, */*",
        "Accept-Encoding": "gzip, deflate",
        "Accept-Language": "en-GB",
        "Host": "localhost:37341",
        "User-Agent": "Mozilla/5.0, (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0), like, Gecko"
      }
   }
}

Web API template (dotnet new)

If you are creating an ASP.NET Core Web API project from scratch, you can use the dotnet new template provided on the library Audit.WebApi.Template. This allows to quickly generate an audit-enabled Web API project that can be used as a starting point for your project or as a working example.

To install the template on your system, just type:

dotnet new -i Audit.WebApi.Template

Once you install the template, you should see it on the dotnet new templates list with the name webapiaudit as follows:

capture

You can now create a new project on the current folder by running:

dotnet new webapiaudit

This will create a new Asp.NET Core project.

You can optionally include Entity Framework Core by adding the -E parameter

dotnet new webapiaudit -E

Also you can include a service interceptor (using Audit.DynamicProxy) for your service dependencies calls, by adding the -S parameter

dotnet new webapiaudit -S

To get help about the options:

dotnet new webapiaudit -h

Contribute

If you like this project please contribute in any of the following ways:

  • Star this project on GitHub.
  • Request a new feature or expose any bug you found by creating a new issue.
  • Ask any questions about the library on StackOverflow.
  • Subscribe to and use the Gitter Audit.NET channel.
  • Support the project by becoming a Backer: Backer    
  • Spread the word by blogging about it, or sharing it on social networks: <p class="share-buttons"> <a href="https://www.facebook.com/sharer/sharer.php?u=https://nuget.org/packages/Audit.NET/&t=Check+out+Audit.NET" target="_blank"> <img width="24" height="24" alt="Share this package on Facebook" src="https://nuget.org/Content/gallery/img/facebook.svg" / > </a> <a href="https://twitter.com/intent/tweet?url=https://nuget.org/packages/Audit.NET/&text=Check+out+Audit.NET" target="_blank"> <img width="24" height="24" alt="Tweet this package" src="https://nuget.org/Content/gallery/img/twitter.svg" /> </a> </p>
  • Make a donation via PayPal paypal
Product Compatible and additional computed target framework versions.
.NET net5.0 was computed.  net5.0-windows was computed.  net6.0 is compatible.  net6.0-android was computed.  net6.0-ios was computed.  net6.0-maccatalyst was computed.  net6.0-macos was computed.  net6.0-tvos was computed.  net6.0-windows was computed.  net7.0 was computed.  net7.0-android was computed.  net7.0-ios was computed.  net7.0-maccatalyst was computed.  net7.0-macos was computed.  net7.0-tvos was computed.  net7.0-windows was computed.  net8.0 was computed.  net8.0-android was computed.  net8.0-browser was computed.  net8.0-ios was computed.  net8.0-maccatalyst was computed.  net8.0-macos was computed.  net8.0-tvos was computed.  net8.0-windows was computed. 
.NET Core netcoreapp2.0 was computed.  netcoreapp2.1 was computed.  netcoreapp2.2 was computed.  netcoreapp3.0 was computed.  netcoreapp3.1 was computed. 
.NET Standard netstandard2.0 is compatible.  netstandard2.1 is compatible. 
.NET Framework net461 was computed.  net462 is compatible.  net463 was computed.  net47 was computed.  net471 was computed.  net472 was computed.  net48 was computed.  net481 was computed. 
MonoAndroid monoandroid was computed. 
MonoMac monomac was computed. 
MonoTouch monotouch was computed. 
Tizen tizen40 was computed.  tizen60 was computed. 
Xamarin.iOS xamarinios was computed. 
Xamarin.Mac xamarinmac was computed. 
Xamarin.TVOS xamarintvos was computed. 
Xamarin.WatchOS xamarinwatchos was computed. 
Compatible target framework(s)
Included target framework(s) (in package)
Learn more about Target Frameworks and .NET Standard.

NuGet packages (8)

Showing the top 5 NuGet packages that depend on Audit.WebApi.Core:

Package Downloads
Whipstaff.AspNetCore

Re-usable logic for working with ASP.NET Core.

RSecurityBackend

Basic security backend including user management and some general utilities for ASP.NET Core applications

SoftwaredeveloperDotAt.Infrastructure.Core.Web

Library for base .NET Classes

Lm.Nsp.Auditing

Package Description

Dalmarkit.AspNetCore

Dalmarkit is an opinionated .NET utility library that simplifies the building of AWS Cognito secured JSON REST APIs with audit trails using ASP.NET Core and Entity Framework Core with PostgreSQL.

GitHub repositories (1)

Showing the top 1 popular GitHub repositories that depend on Audit.WebApi.Core:

Repository Stars
thepirat000/Audit.NET
An extensible framework to audit executing operations in .NET and .NET Core.
Version Downloads Last updated
25.0.4 8,480 3/24/2024
25.0.3 1,848 3/13/2024
25.0.2 303 3/12/2024
25.0.1 2,434 2/28/2024
25.0.0 12,753 2/16/2024
24.0.1 4,198 2/12/2024
24.0.0 90 2/12/2024
23.0.0 21,608 12/14/2023
22.1.0 25,228 12/9/2023
22.0.2 15,444 12/1/2023
22.0.1 4,854 11/16/2023
22.0.0 809 11/14/2023
21.1.0 16,808 10/9/2023
21.0.4 34,172 9/15/2023
21.0.3 67,618 7/9/2023
21.0.2 294 7/6/2023
21.0.1 31,252 5/27/2023
21.0.0 19,983 4/15/2023
20.2.4 12,058 3/27/2023
20.2.3 4,163 3/17/2023
20.2.2 2,845 3/14/2023
20.2.1 1,157 3/11/2023
20.2.0 704 3/7/2023
20.1.6 4,823 2/23/2023
20.1.5 29,310 2/9/2023
20.1.4 7,090 1/28/2023
20.1.3 61,150 12/21/2022
20.1.2 7,805 12/14/2022
20.1.1 949 12/12/2022
20.1.0 1,742 12/4/2022
20.0.4 5,380 11/30/2022
20.0.3 20,338 10/28/2022
20.0.2 6,774 10/26/2022
20.0.1 5,110 10/21/2022
20.0.0 128,781 10/1/2022
19.4.1 26,623 9/10/2022
19.4.0 5,769 9/2/2022
19.3.0 31,472 8/23/2022
19.2.2 3,800 8/11/2022
19.2.1 2,567 8/6/2022
19.2.0 24,849 7/24/2022
19.1.4 42,228 5/23/2022
19.1.3 618 5/22/2022
19.1.2 2,265 5/18/2022
19.1.1 54,672 4/28/2022
19.1.0 18,755 4/10/2022
19.0.7 10,804 3/13/2022
19.0.6 1,753 3/7/2022
19.0.5 63,745 1/28/2022
19.0.4 14,623 1/23/2022
19.0.3 37,227 12/14/2021
19.0.2 631 12/11/2021
19.0.1 17,390 11/20/2021
19.0.0 6,732 11/11/2021
19.0.0-rc.net60.2 744 9/26/2021
19.0.0-rc.net60.1 203 9/16/2021
18.1.6 34,087 9/26/2021
18.1.5 8,462 9/7/2021
18.1.4 7,337 9/6/2021
18.1.3 9,732 8/19/2021
18.1.2 14,079 8/8/2021
18.1.1 1,385 8/5/2021
18.1.0 1,700 8/1/2021
18.0.1 680 7/30/2021
18.0.0 1,782 7/26/2021
17.0.8 21,718 7/7/2021
17.0.7 32,175 6/16/2021
17.0.6 14,367 6/5/2021
17.0.5 5,846 5/28/2021
17.0.4 16,054 5/4/2021
17.0.3 1,334 5/1/2021
17.0.2 18,182 4/22/2021
17.0.1 6,216 4/18/2021
17.0.0 5,540 3/26/2021
16.5.6 1,327 3/25/2021
16.5.5 1,912 3/23/2021
16.5.4 2,475 3/9/2021
16.5.3 1,846 2/26/2021
16.5.2 1,503 2/23/2021
16.5.1 1,130 2/21/2021
16.5.0 7,950 2/17/2021
16.4.5 770 2/15/2021
16.4.4 3,303 2/5/2021
16.4.3 994 1/27/2021
16.4.2 3,703 1/22/2021
16.4.1 610 1/21/2021
16.4.0 1,979 1/11/2021
16.3.3 761 1/8/2021
16.3.2 3,893 1/3/2021
16.3.1 949 12/31/2020
16.3.0 1,815 12/30/2020
16.2.1 1,864 12/27/2020
16.2.0 42,858 10/13/2020
16.1.5 1,190 10/4/2020
16.1.4 3,642 9/17/2020
16.1.3 1,576 9/13/2020
16.1.2 956 9/9/2020
16.1.1 6,873 9/3/2020
16.1.0 236,947 8/19/2020
16.0.3 961 8/15/2020
16.0.2 8,987 8/9/2020
16.0.1 1,011 8/8/2020
16.0.0 695 8/7/2020
15.3.0 94,505 7/23/2020
15.2.3 7,035 7/14/2020
15.2.2 73,802 5/19/2020
15.2.1 1,452 5/12/2020
15.2.0 985 5/9/2020
15.1.1 3,581 5/4/2020
15.1.0 2,360 4/13/2020
15.0.5 8,992 3/18/2020
15.0.4 6,535 2/28/2020
15.0.3 836 2/26/2020
15.0.2 63,793 1/20/2020
15.0.1 1,916 1/10/2020
15.0.0 5,172 12/17/2019
14.9.1 2,733 11/30/2019
14.9.0 739 11/29/2019
14.8.1 20,254 11/26/2019
14.8.0 13,148 11/20/2019
14.7.0 4,031 10/9/2019
14.6.6 735 10/8/2019
14.6.5 2,140 9/27/2019
14.6.4 1,226 9/21/2019
14.6.3 4,591 8/12/2019
14.6.2 3,377 8/3/2019
14.6.1 774 8/3/2019
14.6.0 868 7/26/2019
14.5.7 3,129 7/18/2019
14.5.6 3,840 7/10/2019
14.5.5 6,081 7/1/2019
14.5.4 2,602 6/17/2019
14.5.3 1,026 6/5/2019
14.5.2 843 5/30/2019
14.5.1 1,459 5/28/2019
14.5.0 1,293 5/24/2019
14.4.0 1,075 5/22/2019
14.3.4 4,277 5/14/2019
14.3.3 868 5/9/2019
14.3.2 2,203 4/30/2019
14.3.1 1,141 4/27/2019
14.3.0 954 4/24/2019
14.2.3 1,076 4/17/2019
14.2.2 1,095 4/10/2019
14.2.1 996 4/5/2019
14.2.0 17,471 3/16/2019
14.1.1 1,322 3/8/2019
14.1.0 3,516 2/11/2019
14.0.4 3,649 1/31/2019
14.0.3 1,088 1/22/2019
14.0.2 6,917 12/15/2018
14.0.1 11,235 11/29/2018
14.0.0 1,191 11/19/2018
13.3.0 964 11/16/2018
13.2.2 963 11/15/2018
13.2.1 1,035 11/13/2018
13.2.0 2,519 10/31/2018
13.1.5 976 10/31/2018
13.1.4 2,268 10/25/2018
13.1.3 1,387 10/18/2018
13.1.2 2,424 9/12/2018
13.1.1 1,327 9/11/2018
13.1.0 1,066 9/11/2018
13.0.0 1,998 8/29/2018
12.3.6 1,137 8/29/2018
12.3.5 1,871 8/22/2018
12.3.4 1,345 8/21/2018
12.3.3 25,841 8/21/2018
12.3.2 1,109 8/20/2018
12.3.1 1,052 8/20/2018
12.3.0 1,111 8/20/2018
12.2.2 1,310 8/15/2018
12.2.1 1,318 8/9/2018
12.2.0 1,144 8/8/2018
12.1.11 1,175 7/30/2018
12.1.10 8,246 7/20/2018
12.1.9 1,509 7/10/2018
12.1.8 1,316 7/2/2018
12.1.7 1,231 6/7/2018
12.1.6 1,178 6/4/2018
12.1.5 1,249 6/2/2018
12.1.4 1,339 5/25/2018
12.1.3 1,472 5/16/2018
12.1.2 1,273 5/15/2018
12.1.1 1,245 5/14/2018
12.1.0 1,276 5/9/2018
12.0.7 1,369 5/5/2018
12.0.6 1,386 5/4/2018
12.0.5 1,296 5/3/2018
12.0.4 3,820 4/30/2018
12.0.3 1,271 4/30/2018
12.0.2 1,088 4/27/2018
12.0.1 1,272 4/25/2018
12.0.0 1,135 4/22/2018
11.2.0 1,822 4/11/2018
11.1.0 1,426 4/8/2018
11.0.8 1,288 3/26/2018
11.0.7 1,248 3/20/2018
11.0.6 2,128 3/7/2018
11.0.5 1,208 2/22/2018
11.0.4 1,322 2/14/2018
11.0.3 1,294 2/12/2018
11.0.2 1,263 2/9/2018
11.0.1 1,818 1/29/2018
11.0.0 1,250 1/15/2018
10.0.3 1,274 12/29/2017
10.0.2 1,243 12/26/2017
10.0.1 1,243 12/18/2017
10.0.0 1,318 12/18/2017