nanoFramework.WebServer 1.2.70

Prefix Reserved
dotnet add package nanoFramework.WebServer --version 1.2.70                
NuGet\Install-Package nanoFramework.WebServer -Version 1.2.70                
This command is intended to be used within the Package Manager Console in Visual Studio, as it uses the NuGet module's version of Install-Package.
<PackageReference Include="nanoFramework.WebServer" Version="1.2.70" />                
For projects that support PackageReference, copy this XML node into the project file to reference the package.
paket add nanoFramework.WebServer --version 1.2.70                
#r "nuget: nanoFramework.WebServer, 1.2.70"                
#r directive can be used in F# Interactive and Polyglot Notebooks. Copy this into the interactive tool or source code of the script to reference the package.
// Install nanoFramework.WebServer as a Cake Addin
#addin nuget:?package=nanoFramework.WebServer&version=1.2.70

// Install nanoFramework.WebServer as a Cake Tool
#tool nuget:?package=nanoFramework.WebServer&version=1.2.70                

Quality Gate Status Reliability Rating NuGet #yourfirstpr Discord

nanoFramework logo


Welcome to the .NET nanoFramework WebServer repository

Build status

Component Build Status NuGet Package
nanoFramework.WebServer Build Status NuGet
nanoFramework.WebServer.FileSystem Build Status NuGet

.NET nanoFramework WebServer

This library was coded by Laurent Ellerbach who generously offered it to the .NET nanoFramework project.

This is a simple nanoFramework WebServer. Features:

  • Handle multi-thread requests
  • Serve static files from any storage using nanoFramework.WebServer.FileSystem NuGet. Requires a target device with support for storage (having System.IO.FileSystem capability).
  • Handle parameter in URL
  • Possible to have multiple WebServer running at the same time
  • supports GET/PUT and any other word
  • Supports any type of header
  • Supports content in POST
  • Reflection for easy usage of controllers and notion of routes
  • Helpers to return error code directly facilitating REST API
  • HTTPS support
  • URL decode/encode

Limitations:

  • Does not support any zip in the request or response stream

Usage

You just need to specify a port and a timeout for the queries and add an event handler when a request is incoming. With this first way, you will have an event raised every time you'll receive a request.

using (WebServer server = new WebServer(80, HttpProtocol.Http)
{
    // Add a handler for commands that are received by the server.
    server.CommandReceived += ServerCommandReceived;

    // Start the server.
    server.Start();

    Thread.Sleep(Timeout.Infinite);
}

You can as well pass a controller where you can use decoration for the routes and method supported.

using (WebServer server = new WebServer(80, HttpProtocol.Http, new Type[] { typeof(ControllerPerson), typeof(ControllerTest) }))
{
    // Start the server.
    server.Start();

    Thread.Sleep(Timeout.Infinite);
}

In this case, you're passing 2 classes where you have public methods decorated which will be called every time the route is found.

With the previous example, a very simple and straight forward Test controller will look like that:

public class ControllerTest
{
    [Route("test"), Route("Test2"), Route("tEst42"), Route("TEST")]
    [CaseSensitive]
    [Method("GET")]
    public void RoutePostTest(WebServerEventArgs e)
    {
        string route = $"The route asked is {e.Context.Request.RawUrl.TrimStart('/').Split('/')[0]}";
        e.Context.Response.ContentType = "text/plain";
        WebServer.OutPutStream(e.Context.Response, route);
    }

    [Route("test/any")]
    public void RouteAnyTest(WebServerEventArgs e)
    {
        WebServer.OutputHttpCode(e.Context.Response, HttpStatusCode.OK);
    }
}

In this example, the RoutePostTest will be called every time the called url will be test or Test2 or tEst42 or TEST, the url can be with parameters and the method GET. Be aware that Test won't call the function, neither test/.

The RouteAnyTestis called whenever the url is test/any whatever the method is.

There is a more advance example with simple REST API to get a list of Person and add a Person. Check it in the sample.

[!Important]

By default the routes are not case sensitive and the attribute must be lowercase. If you want to use case sensitive routes like in the previous example, use the attribute CaseSensitive. As in the previous example, you must write the route as you want it to be responded to.

A simple GPIO controller REST API

You will find in simple GPIO controller sample REST API. The controller not case sensitive and is working like this:

  • To open the pin 2 as output: http://yoururl/open/2/output
  • To open pin 4 as input: http://yoururl/open/4/input
  • To write the value high to pin 2: http://yoururl/write/2/high
    • You can use high or 1, it has the same effect and will place the pin in high value
    • You can use low of 0, it has the same effect and will place the pin in low value
  • To read the pin 4: http://yoururl/read/4, you will get as a raw text highor lowdepending on the state

Authentication on controllers

Controllers support authentication. 3 types of authentications are currently implemented on controllers only:

  • Basic: the classic user and password following the HTTP standard. Usage:
    • [Authentication("Basic")] will use the default credential of the webserver
    • [Authentication("Basic:myuser mypassword")] will use myuser as a user and my password as a password. Note: the user cannot contains spaces.
  • APiKey in header: add ApiKey in headers with the API key. Usage:
    • [Authentication("ApiKey")] will use the default credential of the webserver
    • [Authentication("ApiKeyc:akey")] will use akey as ApiKey.
  • None: no authentication required. Usage:
    • [Authentication("None")] will use the default credential of the webserver

The Authentication attribute applies to both public Classes an public Methods.

As for the rest of the controller, you can add attributes to define them, override them. The following example gives an idea of what can be done:

[Authentication("Basic")]
class ControllerAuth
{
    [Route("authbasic")]
    public void Basic(WebServerEventArgs e)
    {
        WebServer.OutputHttpCode(e.Context.Response, HttpStatusCode.OK);
    }

    [Route("authbasicspecial")]
    [Authentication("Basic:user2 password")]
    public void Special(WebServerEventArgs e)
    {
        WebServer.OutputHttpCode(e.Context.Response, HttpStatusCode.OK);
    }

    [Authentication("ApiKey:superKey1234")]
    [Route("authapi")]
    public void Key(WebServerEventArgs e)
    {
        WebServer.OutputHttpCode(e.Context.Response, HttpStatusCode.OK);
    }

    [Route("authnone")]
    [Authentication("None")]
    public void None(WebServerEventArgs e)
    {
        WebServer.OutputHttpCode(e.Context.Response, HttpStatusCode.OK);
    }

    [Authentication("ApiKey")]
    [Route("authdefaultapi")]
    public void DefaultApi(WebServerEventArgs e)
    {
        WebServer.OutputHttpCode(e.Context.Response, HttpStatusCode.OK);
    }
}

And you can pass default credentials to the server:

using (WebServer server = new WebServer(80, HttpProtocol.Http, new Type[] { typeof(ControllerPerson), typeof(ControllerTest), typeof(ControllerAuth) }))
{
    // To test authentication with various scenarios
    server.ApiKey = "ATopSecretAPIKey1234";
    server.Credential = new NetworkCredential("topuser", "topPassword");

    // Start the server.
    server.Start();

    Thread.Sleep(Timeout.Infinite);
}

With the previous example the following happens:

  • All the controller by default, even when nothing is specified will use the controller credentials. In our case, the Basic authentication with the default user (topuser) and password (topPassword) will be used.
    • When calling http://yoururl/authbasic from a browser, you will be prompted for the user and password, use the default one topuser and topPassword to get access
    • When calling http://yoururl/authnone, you won't be prompted because the authentication has been overridden for no authentication
    • When calling http://yoururl/authbasicspecial, the user and password are different from the defautl ones, user2 and password is the right couple here
  • If you would have define in the controller a specific user and password like [Authentication("Basic:myuser mypassword")], then the default one for all the controller would have been myuser and mypassword
  • When calling http://yoururl/authapi, you must pass the header ApiKey (case sensitive) with the value superKey1234 to get authorized, this is overridden the default Basic authentication
  • When calling http://yoururl/authdefaultapi, the default key ATopSecretAPIKey1234 will be used so you have to pass it in the headers of the request

All up, this is an example to show how to use authentication, it's been defined to allow flexibility.

The webserver supports having multiple authentication methods or credentials for the same route. Each pair of authentication method plus credentials should have its own method in the controller:

class MixedController
{

    [Route("sameroute")]
    [Authentication("Basic")]
    public void Basic(WebServerEventArgs e)
    {
        WebServer.OutPutStream(e.Context.Response, "sameroute: Basic");
    }

    [Authentication("ApiKey:superKey1234")]
    [Route("sameroute")]
    public void Key(WebServerEventArgs e)
    {
        WebServer.OutPutStream(e.Context.Response, "sameroute: API key #1");
    }

    [Authentication("ApiKey:superKey5678")]
    [Route("sameroute")]
    public void Key2(WebServerEventArgs e)
    {
        WebServer.OutPutStream(e.Context.Response, "sameroute: API key #2");
    }

    [Route("sameroute")]
    public void None(WebServerEventArgs e)
    {
        WebServer.OutPutStream(e.Context.Response, "sameroute: Public");
    }
}

The webserver selects the route for a request:

  • If there are no matching methods, a not-found response (404) is returned.
  • If authentication information is passed in the header of the request, then only methods that require authentication are considered. If one of the method's credentials matches the credentials passed in the request, that method is called. Otherwise a non-authorized response (401) will be returned.
  • If no authentication information is passed in the header of the request:
    • If one of the methods does not require authentication, that method is called.
    • Otherwise a non-authorized response (401) will be returned. If one of the methods requires basic authentication, the WWW-Authenticate header is included to request credentials.

The webserver does not support more than one matching method. Calling multiple methods most likely results in an exception as a subsequent method tries to modify a response that is already processed by the first method. The webserver does not know what to do and returns an internal server error (500). The body of the response lists the matching methods.

Having multiple matching methods is considered a programming error. One way this occurs is if two methods in a controller accidentally have the same route. Returning an internal server error with the names of the methods makes it easy to discover the error. It is expected that the error is discovered and fixed in testing. Then the internal error will not occur in the application that is deployed to a device.

Managing incoming queries thru events

Very basic usage is the following:

private static void ServerCommandReceived(object source, WebServerEventArgs e)
{
    var url = e.Context.Request.RawUrl;
    Debug.WriteLine($"Command received: {url}, Method: {e.Context.Request.HttpMethod}");

    if (url.ToLower() == "/sayhello")
    {
        // This is simple raw text returned
        WebServer.OutPutStream(e.Context.Response, "It's working, url is empty, this is just raw text, /sayhello is just returning a raw text");
    }
    else
    {
        WebServer.OutputHttpCode(e.Context.Response, HttpStatusCode.NotFound);
    }
}

You can do more advance scenario like returning a full HTML page:

WebServer.OutPutStream(e.Context.Response, "<html><head>" +
    "<title>Hi from nanoFramework Server</title></head><body>You want me to say hello in a real HTML page!<br/><a href='/useinternal'>Generate an internal text.txt file</a><br />" +
    "<a href='/Text.txt'>Download the Text.txt file</a><br>" +
    "Try this url with parameters: <a href='/param.htm?param1=42&second=24&NAme=Ellerbach'>/param.htm?param1=42&second=24&NAme=Ellerbach</a></body></html>");

And can get parameters from a URL a an example from the previous link on the param.html page:

if (url.ToLower().IndexOf("/param.htm") == 0)
{
    // Test with parameters
    var parameters = WebServer.decryptParam(url);
    string toOutput = "<html><head>" +
        "<title>Hi from nanoFramework Server</title></head><body>Here are the parameters of this URL: <br />";
    foreach (var par in parameters)
    {
        toOutput += $"Parameter name: {par.Name}, Value: {par.Value}<br />";
    }
    toOutput += "</body></html>";
    WebServer.OutPutStream(e.Context.Response, toOutput);
}

And server static files:

// E = USB storage
// D = SD Card
// I = Internal storage
// Adjust this based on your configuration
const string DirectoryPath = "I:\\";
string[] _listFiles;

// Gets the list of all files in a specific directory
// See the MountExample for more details if you need to mount an SD card and adjust here
// https://github.com/nanoframework/Samples/blob/main/samples/System.IO.FileSystem/MountExample/Program.cs
_listFiles = Directory.GetFiles(DirectoryPath);
// Remove the root directory
for (int i = 0; i < _listFiles.Length; i++)
{
    _listFiles[i] = _listFiles[i].Substring(DirectoryPath.Length);
}

var fileName = url.Substring(1);
// Note that the file name is case sensitive
// Very simple example serving a static file on an SD card                   
foreach (var file in _listFiles)
{
    if (file == fileName)
    {
        WebServer.SendFileOverHTTP(e.Context.Response, DirectoryPath + file);
        return;
    }
}

WebServer.OutputHttpCode(e.Context.Response, HttpStatusCode.NotFound);

[!Important]

Serving files requires the nanoFramework.WebServer.FileSystem nuget AND that the device supports storage so System.IO.FileSystem.

And also REST API is supported, here is a comprehensive example:

if (url.ToLower().IndexOf("/api/") == 0)
{
    string ret = $"Your request type is: {e.Context.Request.HttpMethod}\r\n";
    ret += $"The request URL is: {e.Context.Request.RawUrl}\r\n";
    var parameters = WebServer.DecodeParam(e.Context.Request.RawUrl);
    if (parameters != null)
    {
        ret += "List of url parameters:\r\n";
        foreach (var param in parameters)
        {
            ret += $"  Parameter name: {param.Name}, value: {param.Value}\r\n";
        }
    }

    if (e.Context.Request.Headers != null)
    {
        ret += $"Number of headers: {e.Context.Request.Headers.Count}\r\n";
    }
    else
    {
        ret += "There is no header in this request\r\n";
    }

    foreach (var head in e.Context.Request.Headers?.AllKeys)
    {
        ret += $"  Header name: {head}, Values:";
        var vals = e.Context.Request.Headers.GetValues(head);
        foreach (var val in vals)
        {
            ret += $"{val} ";
        }

        ret += "\r\n";
    }

    if (e.Context.Request.ContentLength64 > 0)
    {

        ret += $"Size of content: {e.Context.Request.ContentLength64}\r\n";

        var contentTypes = e.Context.Request.Headers?.GetValues("Content-Type");
        var isMultipartForm = contentTypes != null && contentTypes.Length > 0 && contentTypes[0].StartsWith("multipart/form-data;");

        if(isMultipartForm)
        {
            var form = e.Context.Request.ReadForm();
            ret += $"Received a form with {form.Parameters.Length} parameters and {form.Files.Length} files.";
        }
        else 
        {
            var body = e.Context.Request.ReadBody();

            ret += $"Request body hex string representation:\r\n";
            for (int i = 0; i < body.Length; i++)
            {
                ret += body[i].ToString("X") + " ";
            }
        }

    }

    WebServer.OutPutStream(e.Context.Response, ret);
}

This API example is basic but as you get the method, you can choose what to do.

As you get the url, you can check for a specific controller called. And you have the parameters and the content payload!

Notice the extension methods to read the body of the request:

  • ReadBody will read the data from the InputStream while the data is flowing in which might be in multiple passes depending on the size of the body
  • ReadForm allows to read a multipart/form-data form and returns the text key/value pairs as well as any files in the request

Example of a result with call:

result

And more! Check the complete example for more about this WebServer!

Using HTTPS

You will need to generate a certificate and keys:

X509Certificate _myWebServerCertificate509 = new X509Certificate2(_myWebServerCrt, _myWebServerPrivateKey, "1234");

// X509 RSA key PEM format 2048 bytes
        // generate with openssl:
        // > openssl req -newkey rsa:2048 -nodes -keyout selfcert.key -x509 -days 365 -out selfcert.crt
        // and paste selfcert.crt content below:
        private const string _myWebServerCrt =
@"-----BEGIN CERTIFICATE-----
MORETEXT
-----END CERTIFICATE-----";

        // this one is generated with the command below. We need a password.
        // > openssl rsa -des3 -in selfcert.key -out selfcertenc.key
        // the one below was encoded with '1234' as the password.
        private const string _myWebServerPrivateKey =
@"-----BEGIN RSA PRIVATE KEY-----
MORETEXTANDENCRYPTED
-----END RSA PRIVATE KEY-----";

using (WebServer server = new WebServer(443, HttpProtocol.Https)
{
    // Add a handler for commands that are received by the server.
    server.CommandReceived += ServerCommandReceived;
    server.HttpsCert = _myWebServerCertificate509;

    server.SslProtocols = System.Net.Security.SslProtocols.Tls | System.Net.Security.SslProtocols.Tls11 | System.Net.Security.SslProtocols.Tls12;
    // Start the server.
    server.Start();

    Thread.Sleep(Timeout.Infinite);
}

[!IMPORTANT] Because the certificate above is not issued from a Certificate Authority it won't be recognized as a valid certificate. If you want to access the nanoFramework device with your browser, for example, you'll have to add the CRT file as a trusted one. On Windows, you just have to double click on the CRT file and then click "Install Certificate...".

You can of course use the routes as defined earlier. Both will work, event or route with the notion of controller.

WebServer status

It is possible to subscribe to an event to get the WebServer status. That can be useful to restart the server, put in place a retry mechanism or equivalent.

server.WebServerStatusChanged += WebServerStatusChanged;

private static void WebServerStatusChanged(object obj, WebServerStatusEventArgs e)
{
    // Do whatever you need like restarting the server
    Debug.WriteLine($"The web server is now {(e.Status == WebServerStatus.Running ? "running" : "stopped" )}");
}

E2E tests

There is a collection of postman tests nanoFramework WebServer E2E Tests.postman_collection.json in WebServerE2ETests which should be used for testing WebServer in real world scenario. Usage is simple:

  • Import json file into Postman
  • Deploy WebServerE2ETests to your device - copy IP
  • Set the base_url variable to match your device IP address
  • Choose request you want to test or run whole collection and check tests results.

The WebServerE2ETests project requires the name and credentials for the WiFi access point. That is stored in the WiFi.cs file that is not part of the git repository. Build the WebServerE2ETests to create a template for that file, then change the SSID and credentials. Your credentials will not be part of a commit.

Feedback and documentation

For documentation, providing feedback, issues and finding out how to contribute please refer to the Home repo.

Join our Discord community here.

Credits

The list of contributors to this project can be found at CONTRIBUTORS.

License

The nanoFramework WebServer library is licensed under the MIT license.

Code of Conduct

This project has adopted the code of conduct defined by the Contributor Covenant to clarify expected behaviour in our community. For more information see the .NET Foundation Code of Conduct.

.NET Foundation

This project is supported by the .NET Foundation.

Product Compatible and additional computed target framework versions.
.NET Framework net is compatible. 
Compatible target framework(s)
Included target framework(s) (in package)
Learn more about Target Frameworks and .NET Standard.

NuGet packages

This package is not used by any NuGet packages.

GitHub repositories (2)

Showing the top 2 popular GitHub repositories that depend on nanoFramework.WebServer:

Repository Stars
nanoframework/Samples
🍬 Code samples from the nanoFramework team used in testing, proof of concepts and other explorational endeavours
nanoframework/nanoFramework.IoT.Device
📦 This repo includes .NET nanoFramework implementations for various sensors, chips, displays, hats and drivers
Version Downloads Last updated
1.2.70 183 12/11/2024
1.2.69 72 12/11/2024
1.2.63 488 10/8/2024
1.2.60 181 9/26/2024
1.2.56 236 7/30/2024
1.2.55 161 7/24/2024
1.2.52 268 6/3/2024
1.2.48 174 5/17/2024
1.2.45 116 5/13/2024
1.2.43 170 5/10/2024
1.2.40 244 4/12/2024
1.2.38 132 4/9/2024
1.2.36 120 4/8/2024
1.2.34 134 4/5/2024
1.2.32 130 4/3/2024
1.2.30 117 4/3/2024
1.2.27 347 2/14/2024
1.2.25 132 2/12/2024
1.2.23 221 1/26/2024
1.2.21 109 1/26/2024
1.2.19 111 1/26/2024
1.2.17 148 1/24/2024
1.2.14 448 11/17/2023
1.2.12 159 11/10/2023
1.2.9 150 11/9/2023
1.2.7 171 11/8/2023
1.2.6 131 11/8/2023
1.2.3 256 10/27/2023
1.2.1 167 10/25/2023
1.1.79 218 10/10/2023
1.1.77 204 10/4/2023
1.1.75 426 8/8/2023
1.1.73 259 7/27/2023
1.1.71 154 7/27/2023
1.1.65 686 2/17/2023
1.1.63 387 1/24/2023
1.1.61 288 1/24/2023
1.1.59 321 1/24/2023
1.1.56 412 12/30/2022
1.1.54 327 12/28/2022
1.1.51 342 12/27/2022
1.1.47 720 10/26/2022
1.1.44 391 10/25/2022
1.1.41 390 10/24/2022
1.1.39 432 10/23/2022
1.1.36 435 10/10/2022
1.1.32 427 10/8/2022
1.1.29 474 9/22/2022
1.1.27 446 9/22/2022
1.1.25 458 9/22/2022
1.1.23 514 9/16/2022
1.1.21 488 9/15/2022
1.1.19 527 8/29/2022
1.1.17 551 8/6/2022
1.1.14 448 8/4/2022
1.1.12 415 8/3/2022
1.1.10 455 8/3/2022
1.1.8 419 8/3/2022
1.1.6 615 6/13/2022
1.1.4 485 6/8/2022
1.1.2 443 6/8/2022
1.1.1 484 5/30/2022
1.0.0 714 3/30/2022
1.0.0-preview.260 156 3/29/2022
1.0.0-preview.258 134 3/28/2022
1.0.0-preview.256 134 3/28/2022
1.0.0-preview.254 145 3/28/2022
1.0.0-preview.252 125 3/28/2022
1.0.0-preview.250 133 3/28/2022
1.0.0-preview.248 155 3/17/2022
1.0.0-preview.246 138 3/14/2022
1.0.0-preview.244 139 3/14/2022
1.0.0-preview.242 131 3/14/2022
1.0.0-preview.240 135 3/14/2022
1.0.0-preview.238 138 3/8/2022
1.0.0-preview.236 139 3/8/2022
1.0.0-preview.234 129 3/4/2022
1.0.0-preview.232 128 3/3/2022
1.0.0-preview.230 138 3/2/2022
1.0.0-preview.228 138 2/28/2022
1.0.0-preview.226 170 2/24/2022
1.0.0-preview.222 145 2/17/2022
1.0.0-preview.220 142 2/17/2022
1.0.0-preview.218 174 2/6/2022
1.0.0-preview.216 137 2/4/2022
1.0.0-preview.214 152 2/4/2022
1.0.0-preview.212 160 1/28/2022
1.0.0-preview.210 157 1/28/2022
1.0.0-preview.208 155 1/28/2022
1.0.0-preview.206 145 1/25/2022
1.0.0-preview.204 142 1/21/2022
1.0.0-preview.202 135 1/21/2022
1.0.0-preview.200 144 1/21/2022
1.0.0-preview.198 141 1/21/2022
1.0.0-preview.196 144 1/21/2022
1.0.0-preview.194 160 1/13/2022
1.0.0-preview.192 156 1/12/2022
1.0.0-preview.190 148 1/12/2022
1.0.0-preview.188 145 1/11/2022
1.0.0-preview.186 149 1/11/2022
1.0.0-preview.183 161 1/6/2022
1.0.0-preview.181 148 1/5/2022
1.0.0-preview.180 155 1/3/2022
1.0.0-preview.179 148 1/3/2022
1.0.0-preview.178 151 1/3/2022
1.0.0-preview.177 150 12/30/2021
1.0.0-preview.176 158 12/28/2021
1.0.0-preview.174 194 12/3/2021
1.0.0-preview.172 164 12/3/2021
1.0.0-preview.170 153 12/3/2021
1.0.0-preview.168 154 12/3/2021
1.0.0-preview.166 154 12/3/2021
1.0.0-preview.164 157 12/2/2021
1.0.0-preview.162 162 12/2/2021
1.0.0-preview.160 153 12/2/2021
1.0.0-preview.158 153 12/2/2021
1.0.0-preview.156 156 12/2/2021
1.0.0-preview.154 151 12/2/2021
1.0.0-preview.152 163 12/1/2021
1.0.0-preview.150 150 12/1/2021
1.0.0-preview.148 164 12/1/2021
1.0.0-preview.145 203 11/11/2021
1.0.0-preview.143 202 10/22/2021
1.0.0-preview.141 187 10/18/2021
1.0.0-preview.138 207 10/18/2021
1.0.0-preview.136 292 7/17/2021
1.0.0-preview.134 167 7/16/2021
1.0.0-preview.132 170 7/16/2021
1.0.0-preview.130 183 7/15/2021
1.0.0-preview.128 188 7/14/2021
1.0.0-preview.126 278 6/19/2021
1.0.0-preview.124 266 6/19/2021
1.0.0-preview.122 173 6/17/2021
1.0.0-preview.119 177 6/7/2021
1.0.0-preview.117 165 6/7/2021
1.0.0-preview.115 205 6/7/2021
1.0.0-preview.113 202 6/7/2021
1.0.0-preview.111 219 6/6/2021
1.0.0-preview.109 916 6/5/2021
1.0.0-preview.107 179 6/3/2021
1.0.0-preview.105 169 6/2/2021
1.0.0-preview.103 169 6/2/2021
1.0.0-preview.101 180 6/1/2021
1.0.0-preview.99 195 6/1/2021
1.0.0-preview.96 193 6/1/2021
1.0.0-preview.94 201 5/31/2021
1.0.0-preview.92 210 5/30/2021
1.0.0-preview.90 182 5/27/2021
1.0.0-preview.88 180 5/26/2021
1.0.0-preview.86 293 5/23/2021
1.0.0-preview.84 197 5/22/2021
1.0.0-preview.82 234 5/21/2021
1.0.0-preview.80 189 5/19/2021
1.0.0-preview.78 176 5/19/2021
1.0.0-preview.76 197 5/19/2021
1.0.0-preview.71 180 5/15/2021
1.0.0-preview.69 155 5/14/2021
1.0.0-preview.66 185 5/13/2021
1.0.0-preview.64 191 5/11/2021
1.0.0-preview.62 179 5/11/2021
1.0.0-preview.59 236 5/6/2021
1.0.0-preview.57 162 5/5/2021
1.0.0-preview.51 185 4/12/2021
1.0.0-preview.49 180 4/12/2021
1.0.0-preview.47 192 4/10/2021
1.0.0-preview.44 190 4/6/2021
1.0.0-preview.41 170 4/5/2021
1.0.0-preview.32 208 3/21/2021
1.0.0-preview.30 234 3/20/2021
1.0.0-preview.28 214 3/19/2021
1.0.0-preview.26 199 3/18/2021
1.0.0-preview.24 163 3/17/2021
1.0.0-preview.22 172 3/17/2021
1.0.0-preview.20 202 3/5/2021
1.0.0-preview.18 173 3/2/2021
1.0.0-preview.15 417 1/19/2021
1.0.0-preview.13 185 1/19/2021
1.0.0-preview.11 244 1/7/2021
1.0.0-preview.10 205 12/22/2020
1.0.0-preview.6 273 12/1/2020
1.0.0-preview.3 276 11/6/2020