Audit.WebApi 25.0.4

dotnet add package Audit.WebApi --version 25.0.4
NuGet\Install-Package Audit.WebApi -Version 25.0.4
This command is intended to be used within the Package Manager Console in Visual Studio, as it uses the NuGet module's version of Install-Package.
<PackageReference Include="Audit.WebApi" Version="25.0.4" />
For projects that support PackageReference, copy this XML node into the project file to reference the package.
paket add Audit.WebApi --version 25.0.4
#r "nuget: Audit.WebApi, 25.0.4"
#r directive can be used in F# Interactive and Polyglot Notebooks. Copy this into the interactive tool or source code of the script to reference the package.
// Install Audit.WebApi as a Cake Addin
#addin nuget:?package=Audit.WebApi&version=25.0.4

// Install Audit.WebApi as a Cake Tool
#tool nuget:?package=Audit.WebApi&version=25.0.4

Audit.WebApi

ASP.NET MVC Web API Audit Extension for Audit.NET library (An extensible framework to audit executing operations in .NET).

Generate Audit Trails for ASP.NET MVC Web API calls. This library provides a configurable infrastructure to log interactions with your Asp.NET (or Asp.NET Core) Web API.

Install

NuGet Package

NuGet Status NuGet Count

NuGet Status NuGet Count

To install the ASP.NET package run the following command on the Package Manager Console:

PM> Install-Package Audit.WebApi

To install the Asp Net Core package:

PM> Install-Package Audit.WebApi.Core

IMPORTANT NOTE

Previously, it was possible to reference the Audit.WebApi package for ASP.NET Core MVC.

However, starting from version 23, the Audit.WebApi package is now exclusively designed for ASP.NET Framework MVC, whereas the Audit.WebApi.Core package is exclusively tailored for ASP.NET Core MVC.

Please upgrade your references accordingly.

How it works

This library is implemented as an action filter that intercepts the execution of action methods to generate a detailed audit trail.

For Asp.NET Core, it is also implemented as a Middleware class that can be configured to log requests that does not reach the action filter (i.e. unsolved routes, parsing errors, etc).

Usage

The audit can be enabled in different ways:

  1. Local Action Filter: Decorating the controllers/actions to be audited with AuditApi action filter attribute.
  2. Global Action Filter: Adding the AuditApiGlobalFilter action filter as a global filter. This method allows more dynamic configuration of the audit settings.
  3. Middleware (Asp.Net Core): Adding the AuditMiddleware to the pipeline. This method allow to audit request that doesn't get to the action filter.
  4. Middleware + Action Filters (Asp.Net Core): Adding the Audit Middleware together with the Global Action Filter (or Local Action Filters). This is the recommended approach.
1- Local Action Filter

Decorate your controller with AuditApiAttribute:

using Audit.WebApi;

public class UsersController : ApiController
{
    [AuditApi]
    public IEnumerable<ApplicationUser> Get()
    {
      //...
    }

    [AuditApi(EventTypeName = "GetUser", 
        IncludeHeaders = true, IncludeResponseHeaders = true, IncludeResponseBody = true, IncludeRequestBody = true, IncludeModelState = true)]
    public IHttpActionResult Get(string id)
    {
     //...
    }
}

You can also decorate the controller class with the AuditApi attribute so it will apply to all the actions, for example:

using Audit.WebApi;

[AuditApi(EventTypeName = "{controller}/{action} ({verb})", IncludeResponseBody = true, IncludeRequestBody = true, IncludeModelState = true)]
public class UsersController : ApiController
{
    public IEnumerable<ApplicationUser> Get()
    {
      //...
    }

    public IHttpActionResult Get(string id)
    {
     //...
    }
}

You can also add the AuditApiAttribute as a global filter, for example for Asp.NET Core:

using Audit.WebApi;

public class Startup
{
    public void ConfigureServices(IServiceCollection services)
    {
        services.AddMvc(_ => _
            .Filters.Add(new AuditApiAttribute()));
    }
}

Note

For custom configuration it is recommended to use the AuditApiGlobalFilter as a global filter. See next section.

2- Global Action Filter

Alternatively, you can add one or more AuditApiGlobalFilter as global action filters. This method allows to dynamically change the audit settings as functions of the context, via a fluent API.

Note this action filter cannot be used to statically decorate the controllers.

using Audit.WebApi;

public class Startup
{
    public void ConfigureServices(IServiceCollection services)
    {
        services.AddMvc(mvc =>
        {
            mvc.AddAuditFilter(config => config
                .LogActionIf(d => d.ControllerName == "Orders" && d.ActionName != "GetOrder")
                .WithEventType("{verb}.{controller}.{action}")
                .IncludeHeaders(ctx => !ctx.ModelState.IsValid)
                .IncludeRequestBody()
                .IncludeModelState()
                .IncludeResponseBody(ctx => ctx.HttpContext.Response.StatusCode == 200));
        });
    }

3- Middleware

For Asp.NET Core, you can additionally (or alternatively) configure a middleware to be able to log requests that doesn't get into an action filter (i.e. request that cannot be routed, etc).

On your startup Configure method, call the UseAuditMiddleware() extension method:

using Audit.WebApi;

public class Startup
{
    public void Configure(IApplicationBuilder app)
    {
        app.UseAuditMiddleware(_ => _
            .FilterByRequest(rq => !rq.Path.Value.EndsWith("favicon.ico"))
            .WithEventType("{verb}:{url}")
            .IncludeHeaders()
            .IncludeResponseHeaders()
            .IncludeRequestBody()
            .IncludeResponseBody());

        app.UseMvc();
    }
}

Warning

You should call UseAuditMiddleware() before UseMvc(), otherwise the middleware will not be able to process MVC actions.

If you only configure the middleware (no audit action filters) but want to ignore actions via [AuditIgnoreAttribute], you must add an action filter to discard the AuditScope. This is needed because the middleware cannot inspect the MVC action attributes. You can use the AuditIgnoreActionFilter for this purpose, adding it to the MVC pipeline like this:

public void ConfigureServices(IServiceCollection services)
{
    services.AddMvc(mvc =>
    {
        mvc.Filters.Add(new AuditIgnoreActionFilter());
    });
}
4- Middleware + Action Filters

You can mix the Audit Middleware together with the Global Action Filter (and/or Local Action Filters). Take into account that:

  • Middleware will log any request regardless if an MVC action is reached or not.
  • If an action is reached, the Action Filter will include specific MVC context info to the Audit Event.
  • Only one Audit Event is generated per request, regardless of an action being processed by the Middleware and multiple Action Filters.
  • The AuditIgnore attribute is handled by the Action Filters, there is no need to add the AuditIgnoreActionFilter to the MVC filters when using a mixed approach.

Configuration

Output

The audit events are stored using a Data Provider. You can use one of the available data providers or implement your own. Please refer to the data providers section on Audit.NET documentation.

You can setup the data provider to use by registering an instance of an AuditDataProdiver to the IServiceCollection on your start-up code, for example:

var dataProvider = new FileDataProvider(cfg => cfg.Directory(@"C:\Logs"));
services.AddSingleton<AuditDataProvider>(dataProvider);

Or, alternatively, you can setup the data provider globally with the static configuration:

Audit.Core.Configuration.DataProvider = new FileDataProvider(cfg => cfg.Directory(@"C:\Logs"));

Or using the fluent API:

Audit.Core.Configuration.Setup()
    .UseFileLogProvider(cfg => cfg.Directory(@"C:\Logs"));

Settings (Action Filter)

The AuditApiAttribute can be configured with the following properties:

  • EventTypeName: A string that identifies the event type. Can contain the following placeholders:
    • {controller}: replaced with the controller name.
    • {action}: replaced with the action method name.
    • {verb}: replaced with the HTTP verb used (GET, POST, etc).
  • IncludeHeaders: Boolean to indicate whether to include the Http Request Headers or not. Default is false.
  • IncludeResponseHeaders: Boolean to indicate whether to include the Http Response Headers or not. Default is false.
  • IncludeRequestBody: Boolean to indicate whether to include or exclude the request body from the logs. Default is false. (Check the following note)
  • IncludeResponseBody: Boolean to indicate whether to include response body or not. Default is false.
  • IncludeResponseBodyFor: Alternative to IncludeResponseBody, to allow conditionally including the response body on the log, when certain Http Status Codes are returned.
  • ExcludeResponseBodyFor: Alternative to IncludeResponseBody, to allow conditionally excluding the response body from the log, when certain Http Status Codes are returned.
  • IncludeModelState: Boolean to indicate whether to include the Model State info or not. Default is false.
  • SerializeActionParameters: Boolean to indicate whether the action arguments should be pre-serialized to the audit event. Default is false.

The AuditApiGlobalFilter can be configured with the following methods:

  • LogActionIf() / LogRequestIf(): A function of the ContollerActionDescriptor / HttpRequest to determine whether the action should be logged or not.
  • WithEventType(): A string (or a function of the executing context that returns a string) that identifies the event type. Can contain the following placeholders:
    • {controller}: replaced with the controller name.
    • {action}: replaced with the action method name.
    • {verb}: replaced with the HTTP verb used (GET, POST, etc).
    • {url}: replaced with the request URL.
  • IncludeHeaders(): Boolean (or function of the executing context that returns a boolean) to indicate whether to include the Http Request Headers or not. Default is false.
  • IncludeResponseHeaders(): Boolean (or function of the executing context that returns a boolean) to indicate whether to include the Http Response Headers or not. Default is false.
  • IncludeRequestBody(): Boolean (or function of the executing context that returns a boolean) to indicate whether to include or exclude the request body from the logs. Default is false. (Check the following note)
  • IncludeResponseBody(): Boolean (or function of the executed context that returns a boolean) to indicate whether to include response body or not. Default is false.
  • IncludeModelState(): Boolean (or function of the executed context that returns a boolean) to indicate whether to include the Model State info or not. Default is false.
  • SerializeActionParameters(): Boolean to indicate whether the action arguments should be pre-serialized to the audit event. Default is false.

To configure the output persistence mechanism please see Event Output Configuration.

NOTE

When IncludeRequestBody is set to true (or when using IncludeRequestBodyFor/ExcludeRequestBodyFor), you must enable rewind on the request body stream, otherwise, the controller won't be able to read the request body since by default, it's a forward-only stream that can be read only once. You can enable rewind on your startup logic with the following code:

public void Configure(IApplicationBuilder app, IHostingEnvironment env)
{
    app.Use(async (context, next) => {  // <----
        context.Request.EnableBuffering(); // or .EnableRewind();
        await next();
    });
    
    app.UseMvc();
}

Settings (Middleware)

  • FilterByRequest(): A function of the HttpRequest to determine whether the request should be logged or not, by default all requests are logged.
  • IncludeHeaders(): Boolean (or function of the HTTP context that returns a boolean) to indicate whether to include the Http Request Headers or not. Default is false.
  • IncludeResponseHeaders(): Boolean (or function of the HTTP context that returns a boolean) to indicate whether to include the Http Response Headers or not. Default is false.
  • IncludeRequestBody(): Boolean (or function of the HTTP context that returns a boolean) to indicate whether to include or exclude the request body from the logs. Default is false. (Check the following note)
  • IncludeResponseBody(): Boolean (or function of the HTTP context that returns a boolean) to indicate whether to include response body or not. Default is false.
  • WithEventType(): A string (or a function of the HTTP context that returns a string) that identifies the event type. Can contain the following placeholders (default is "{verb} {url}"):
    • {verb}: replaced with the HTTP verb used (GET, POST, etc).
    • {url}: replaced with the request URL.

Audit Ignore attribute

To selectively exclude certain controllers, actions, action parameters or action responses, you can decorate them with AuditIgnore attribute.

For example:

[Route("api/[controller]")]
[AuditApi(EventTypeName = "{controller}/{action}")]
public class AccountController : Controller
{
    [HttpGet]
    [AuditIgnore]
    public IEnumerable<string> GetAccounts()
    {
        // this action will not be audited
    }

    [HttpPost]
    public IEnumerable<string> PostAccount(string user, [AuditIgnore]string password)
    {
        // password argument will not be audited
    }

    [HttpGet]
    [return:AuditIgnore]
    public IEnumerable<string> GetSecrets()
    {
        // the return value of this action will not be audited
    }

}

Output details

The following table describes the Audit.WebApi output fields:

Action

Field Name Type Description
TraceId string A unique identifier per request
HttpMethod string HTTP method (GET, POST, etc)
ControllerName string The controller name
ActionName string The action name
FormVariables Object Form-data input variables passed to the action
ActionParameters Object The action parameters passed
UserName string Username on the HttpContext Identity
RequestUrl string URL of the request
IpAddress string Client IP address
ResponseStatusCode integer HTTP response status code
ResponseStatus string Response status description
RequestBody BodyContent The request body (optional)
ResponseBody BodyContent The response body (optional)
Headers Object HTTP Request Headers (optional)
ResponseHeaders Object HTTP Response Headers (optional)
ModelStateValid boolean Boolean to indicate if the model is valid
ModelStateErrors string Error description when the model is invalid
Exception string The exception thrown details (if any)

BodyContent

Field Name Type Description
Type string The body type reported
Length long? The length of the body if reported
Value Object The body content

Customization

You can access the Audit Scope object for customization from the API controller action by calling the ApiController extension method GetCurrentAuditScope().

For example:

[AuditApi]
public class UsersController : ApiController
{
    public IHttpActionResult Get(string id)
    {
       //...
       var auditScope = this.GetCurrentAuditScope();
       auditScope.Comment("New comment from controller");
       auditScope.SetCustomField("TestField", Guid.NewGuid());
       //...
    }
}

See Audit.NET documentation about Custom Field and Comments for more information.

Output Sample

{  
   "EventType":"POST Values/Post",
   "Environment":{  
      "UserName":"Federico",
      "MachineName":"HP",
      "DomainName":"HP",
      "CallingMethodName":"WebApiTest.Controllers.ValuesController.Post()",
      "AssemblyName":"WebApiTest, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null",
      "Culture":"en-US"
   },
   "StartDate":"2017-03-09T18:03:05.5287603-06:00",
   "EndDate":"2017-03-09T18:03:05.5307604-06:00",
   "Duration":2,
   "Action":{  
      "TraceId": "0HLFLQP4HGFAF_00000001",
      "HttpMethod":"POST",
      "ControllerName":"Values",
      "ActionName":"Post",
      "ActionParameters":{  
         "value":{  
            "Id":100,
            "Text":"Test"
         }
      },
      "FormVariables":{  
      },
      "RequestUrl":"http://localhost:65080/api/values",
      "IpAddress":"127.0.0.1",
      "ResponseStatus":"OK",
      "ResponseStatusCode":200,
      "RequestBody":{  
         "Type":"application/json",
         "Length":27,
         "Value":"{ Id: 100, Text: \"Test\" }"
      },
      "ResponseBody":{  
         "Type":"SomeObject",
         "Value":{  
            "Id":1795824380,
            "Text":"Test"
         }
      },
      "Headers": {
        "Connection": "Keep-Alive",
        "Accept": "text/html, application/xhtml+xml, image/jxr, */*",
        "Accept-Encoding": "gzip, deflate",
        "Accept-Language": "en-GB",
        "Host": "localhost:37341",
        "User-Agent": "Mozilla/5.0, (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0), like, Gecko"
      }
   }
}

Web API template (dotnet new)

If you are creating an ASP.NET Core Web API project from scratch, you can use the dotnet new template provided on the library Audit.WebApi.Template. This allows to quickly generate an audit-enabled Web API project that can be used as a starting point for your project or as a working example.

To install the template on your system, just type:

dotnet new -i Audit.WebApi.Template

Once you install the template, you should see it on the dotnet new templates list with the name webapiaudit as follows:

capture

You can now create a new project on the current folder by running:

dotnet new webapiaudit

This will create a new Asp.NET Core project.

You can optionally include Entity Framework Core by adding the -E parameter

dotnet new webapiaudit -E

Also you can include a service interceptor (using Audit.DynamicProxy) for your service dependencies calls, by adding the -S parameter

dotnet new webapiaudit -S

To get help about the options:

dotnet new webapiaudit -h

Contribute

If you like this project please contribute in any of the following ways:

  • Star this project on GitHub.
  • Request a new feature or expose any bug you found by creating a new issue.
  • Ask any questions about the library on StackOverflow.
  • Subscribe to and use the Gitter Audit.NET channel.
  • Support the project by becoming a Backer: Backer    
  • Spread the word by blogging about it, or sharing it on social networks: <p class="share-buttons"> <a href="https://www.facebook.com/sharer/sharer.php?u=https://nuget.org/packages/Audit.NET/&t=Check+out+Audit.NET" target="_blank"> <img width="24" height="24" alt="Share this package on Facebook" src="https://nuget.org/Content/gallery/img/facebook.svg" / > </a> <a href="https://twitter.com/intent/tweet?url=https://nuget.org/packages/Audit.NET/&text=Check+out+Audit.NET" target="_blank"> <img width="24" height="24" alt="Tweet this package" src="https://nuget.org/Content/gallery/img/twitter.svg" /> </a> </p>
  • Make a donation via PayPal paypal
Product Compatible and additional computed target framework versions.
.NET Framework net462 is compatible.  net463 was computed.  net47 was computed.  net471 was computed.  net472 was computed.  net48 was computed.  net481 was computed. 
Compatible target framework(s)
Included target framework(s) (in package)
Learn more about Target Frameworks and .NET Standard.

NuGet packages (3)

Showing the top 3 NuGet packages that depend on Audit.WebApi:

Package Downloads
RezisFramework

Package Description

BuildingBlocks.Logging

Componente para geração de logs.

TimCodes.Auditing.Web

Assists in auditing actions

GitHub repositories (1)

Showing the top 1 popular GitHub repositories that depend on Audit.WebApi:

Repository Stars
thepirat000/spleeter-api
Audio separation API using Spleeter from Deezer
Version Downloads Last updated
25.0.4 249 3/24/2024
25.0.3 108 3/13/2024
25.0.2 81 3/12/2024
25.0.1 124 2/28/2024
25.0.0 232 2/16/2024
24.0.1 118 2/12/2024
24.0.0 89 2/12/2024
23.0.0 401 12/14/2023
22.1.0 1,603 12/9/2023
22.0.2 929 12/1/2023
22.0.1 3,431 11/16/2023
22.0.0 126 11/14/2023
21.1.0 5,979 10/9/2023
21.0.4 4,131 9/15/2023
21.0.3 11,531 7/9/2023
21.0.2 230 7/6/2023
21.0.1 11,030 5/27/2023
21.0.0 9,340 4/15/2023
20.2.4 2,402 3/27/2023
20.2.3 4,914 3/17/2023
20.2.2 320 3/14/2023
20.2.1 3,765 3/11/2023
20.2.0 652 3/7/2023
20.1.6 816 2/23/2023
20.1.5 3,536 2/9/2023
20.1.4 12,896 1/28/2023
20.1.3 4,893 12/21/2022
20.1.2 914 12/14/2022
20.1.1 345 12/12/2022
20.1.0 582 12/4/2022
20.0.4 2,259 11/30/2022
20.0.3 6,020 10/28/2022
20.0.2 478 10/26/2022
20.0.1 522 10/21/2022
20.0.0 5,287 10/1/2022
19.4.1 7,699 9/10/2022
19.4.0 921 9/2/2022
19.3.0 1,061 8/23/2022
19.2.2 2,846 8/11/2022
19.2.1 1,819 8/6/2022
19.2.0 1,885 7/24/2022
19.1.4 32,978 5/23/2022
19.1.3 610 5/22/2022
19.1.2 631 5/18/2022
19.1.1 1,432 4/28/2022
19.1.0 6,298 4/10/2022
19.0.7 38,344 3/13/2022
19.0.6 852 3/7/2022
19.0.5 6,797 1/28/2022
19.0.4 2,392 1/23/2022
19.0.3 7,614 12/14/2021
19.0.2 489 12/11/2021
19.0.1 7,921 11/20/2021
19.0.0 5,061 11/11/2021
19.0.0-rc.net60.2 162 9/26/2021
19.0.0-rc.net60.1 208 9/16/2021
18.1.6 37,532 9/26/2021
18.1.5 1,707 9/7/2021
18.1.4 558 9/6/2021
18.1.3 6,367 8/19/2021
18.1.2 671 8/8/2021
18.1.1 595 8/5/2021
18.1.0 1,253 8/1/2021
18.0.1 2,589 7/30/2021
18.0.0 3,404 7/26/2021
17.0.8 11,042 7/7/2021
17.0.7 979 6/16/2021
17.0.6 2,108 6/5/2021
17.0.5 1,406 5/28/2021
17.0.4 6,781 5/4/2021
17.0.3 645 5/1/2021
17.0.2 19,584 4/22/2021
17.0.1 631 4/18/2021
17.0.0 4,355 3/26/2021
16.5.6 2,093 3/25/2021
16.5.5 1,563 3/23/2021
16.5.4 845 3/9/2021
16.5.3 649 2/26/2021
16.5.2 788 2/23/2021
16.5.1 654 2/21/2021
16.5.0 938 2/17/2021
16.4.5 620 2/15/2021
16.4.4 2,054 2/5/2021
16.4.3 6,079 1/27/2021
16.4.2 796 1/22/2021
16.4.1 685 1/21/2021
16.4.0 2,225 1/11/2021
16.3.3 677 1/8/2021
16.3.2 799 1/3/2021
16.3.1 2,944 12/31/2020
16.3.0 640 12/30/2020
16.2.1 1,349 12/27/2020
16.2.0 10,309 10/13/2020
16.1.5 4,162 10/4/2020
16.1.4 1,563 9/17/2020
16.1.3 1,094 9/13/2020
16.1.2 698 9/9/2020
16.1.1 755 9/3/2020
16.1.0 2,160 8/19/2020
16.0.3 824 8/15/2020
16.0.2 13,864 8/9/2020
16.0.1 857 8/8/2020
16.0.0 765 8/7/2020
15.3.0 24,022 7/23/2020
15.2.3 1,339 7/14/2020
15.2.2 5,797 5/19/2020
15.2.1 7,028 5/12/2020
15.2.0 841 5/9/2020
15.1.1 953 5/4/2020
15.1.0 6,471 4/13/2020
15.0.5 5,818 3/18/2020
15.0.4 4,476 2/28/2020
15.0.3 836 2/26/2020
15.0.2 29,533 1/20/2020
15.0.1 4,418 1/10/2020
15.0.0 3,855 12/17/2019
14.9.1 1,428 11/30/2019
14.9.0 814 11/29/2019
14.8.1 4,426 11/26/2019
14.8.0 2,185 11/20/2019
14.7.0 19,178 10/9/2019
14.6.6 859 10/8/2019
14.6.5 36,377 9/27/2019
14.6.4 1,165 9/21/2019
14.6.3 7,668 8/12/2019
14.6.2 1,234 8/3/2019
14.6.1 892 8/3/2019
14.6.0 1,307 7/26/2019
14.5.7 3,258 7/18/2019
14.5.6 5,884 7/10/2019
14.5.5 1,450 7/1/2019
14.5.4 5,510 6/17/2019
14.5.3 8,253 6/5/2019
14.5.2 1,005 5/30/2019
14.5.1 869 5/28/2019
14.5.0 3,906 5/24/2019
14.4.0 1,673 5/22/2019
14.3.4 1,411 5/14/2019
14.3.3 1,108 5/9/2019
14.3.2 1,075 4/30/2019
14.3.1 1,335 4/27/2019
14.3.0 991 4/24/2019
14.2.3 972 4/17/2019
14.2.2 939 4/10/2019
14.2.1 1,811 4/5/2019
14.2.0 2,529 3/16/2019
14.1.1 1,245 3/8/2019
14.1.0 1,940 2/11/2019
14.0.4 1,375 1/31/2019
14.0.3 1,483 1/22/2019
14.0.2 15,902 12/15/2018
14.0.1 2,120 11/29/2018
14.0.0 3,748 11/19/2018
13.3.0 1,181 11/16/2018
13.2.2 1,109 11/15/2018
13.2.1 1,152 11/13/2018
13.2.0 2,025 10/31/2018
13.1.5 1,111 10/31/2018
13.1.4 1,160 10/25/2018
13.1.3 1,149 10/18/2018
13.1.2 3,621 9/12/2018
13.1.1 2,428 9/11/2018
13.1.0 1,143 9/11/2018
13.0.0 8,153 8/29/2018
12.3.6 1,217 8/29/2018
12.3.5 1,313 8/22/2018
12.3.4 1,141 8/21/2018
12.3.3 25,910 8/21/2018
12.3.2 1,168 8/20/2018
12.3.1 1,184 8/20/2018
12.3.0 1,132 8/20/2018
12.2.2 1,240 8/15/2018
12.2.1 1,236 8/9/2018
12.2.0 1,212 8/8/2018
12.1.11 1,231 7/30/2018
12.1.10 2,787 7/20/2018
12.1.9 1,307 7/10/2018
12.1.8 1,437 7/2/2018
12.1.7 5,302 6/7/2018
12.1.6 5,006 6/4/2018
12.1.5 1,373 6/2/2018
12.1.4 1,411 5/25/2018
12.1.3 2,121 5/16/2018
12.1.2 1,279 5/15/2018
12.1.1 1,368 5/14/2018
12.1.0 1,299 5/9/2018
12.0.7 1,337 5/5/2018
12.0.6 1,460 5/4/2018
12.0.5 1,464 5/3/2018
12.0.4 1,425 4/30/2018
12.0.3 1,425 4/30/2018
12.0.2 1,296 4/27/2018
12.0.1 1,593 4/25/2018
12.0.0 1,268 4/22/2018
11.2.0 7,588 4/11/2018
11.1.0 3,384 4/8/2018
11.0.8 1,423 3/26/2018
11.0.7 1,340 3/20/2018
11.0.6 4,956 3/7/2018
11.0.5 1,464 2/22/2018
11.0.4 1,474 2/14/2018
11.0.3 1,530 2/12/2018
11.0.2 1,348 2/9/2018
11.0.1 2,421 1/29/2018
11.0.0 3,006 1/15/2018
10.0.3 3,159 12/29/2017
10.0.2 1,294 12/26/2017
10.0.1 1,604 12/18/2017
10.0.0 1,258 12/18/2017
9.3.0 1,406 12/17/2017
9.2.0 1,218 12/17/2017
9.1.3 1,522 12/5/2017
9.1.2 1,580 11/27/2017
9.1.1 2,474 11/21/2017
9.1.0 1,222 11/21/2017
9.0.1 1,297 11/11/2017
9.0.0 1,287 11/10/2017
8.7.0 1,304 11/9/2017
8.6.0 1,297 11/9/2017
8.5.0 4,713 10/3/2017
8.4.0 1,203 10/3/2017
8.3.1 1,559 9/8/2017
8.3.0 1,264 9/8/2017
8.2.0 1,328 9/4/2017
8.1.0 1,456 8/22/2017
8.0.0 1,476 8/19/2017
7.1.3 1,474 8/14/2017
7.1.2 1,327 8/2/2017
7.1.1 1,322 7/26/2017
7.1.0 7,067 7/5/2017
7.0.9 1,381 6/28/2017
7.0.8 1,353 6/19/2017
7.0.6 15,591 4/7/2017
7.0.5 1,617 3/21/2017
7.0.4 1,361 3/21/2017
7.0.3 1,707 3/20/2017
7.0.2 1,385 3/13/2017
7.0.0 1,654 3/1/2017
6.2.0 1,439 2/25/2017
6.1.0 1,624 2/14/2017
6.0.0 1,312 2/9/2017
5.3.0 1,350 2/5/2017
5.2.0 1,482 1/26/2017
5.1.0 1,245 1/19/2017
5.0.0 1,296 1/7/2017
4.11.0 1,257 1/5/2017
4.10.0 1,265 12/31/2016
4.9.0 1,201 12/26/2016
4.8.0 1,418 12/17/2016
4.7.0 1,262 12/8/2016
4.6.5 1,251 12/4/2016
4.6.4 1,276 11/25/2016
4.6.2 2,290 11/18/2016
4.6.1 1,149 11/15/2016
4.6.0 1,234 11/11/2016
4.5.9 1,605 11/2/2016
4.5.8 1,281 11/2/2016
4.5.7 1,278 10/26/2016
4.5.6 1,228 10/6/2016
4.5.5 1,214 10/3/2016
4.5.4 1,196 10/2/2016
4.5.3 1,217 9/30/2016
4.5.2 1,225 9/28/2016
4.5.1 1,184 9/28/2016
4.5.0 1,254 9/28/2016
4.4.0 1,346 9/23/2016
4.3.0 1,359 9/22/2016
4.2.0 1,591 9/19/2016
4.1.0 1,218 9/13/2016
4.0.1 1,188 9/9/2016
4.0.0 1,235 9/9/2016
3.6.0 1,239 9/7/2016
3.4.0 1,228 9/7/2016
3.3.0 1,220 9/4/2016
3.2.0 1,233 9/3/2016
3.1.0 1,242 9/2/2016
3.0.0 1,524 8/31/2016
2.5.0 1,251 8/27/2016
2.4.0 1,822 8/26/2016