12 Revīzijas 04c17ffcc9 ... fc1c0ea8d3

Autors SHA1 Ziņojums Datums
  shayne_lo fc1c0ea8d3 fix enter user id / password by env variable 3 mēneši atpakaļ
  Jessica Tseng 7d039ebb1a Sync updates from DockerEBUS in general repo(Commit SHA:d44462c)to security repo 4 mēneši atpakaļ
  Jessica Tseng d44462c774 sync advancedsecurity git data 4 mēneši atpakaļ
  Jessica Tseng bd21c470a3 Sync updates from DockerEBUS in general repo(Commit SHA:1886081)to security repo 4 mēneši atpakaļ
  Jessica Tseng 1886081f38 Clear the event after build 4 mēneši atpakaļ
  Jessica Tseng 07f9849fb9 Sync updates from DockerEBUS in general repo(Commit SHA:abb7800)to security repo 4 mēneši atpakaļ
  Jessica Tseng abb7800cfb Add advancedsecurity feature 4 mēneši atpakaļ
  Jessica Tseng eeedf388ef Add advancedsecurity feature 4 mēneši atpakaļ
  Robert 43a1222b51 add webdb online log db apilog db 8 mēneši atpakaļ
  Robert 28aa628542 allow datatransfer vendor id empty 9 mēneši atpakaļ
  Robert 54d391da5f change OccurenceConstraintViolation Description 10 mēneši atpakaļ
  Robert ce563ed1ca 1. Add the field "FinishedOn" on MachineError table 10 mēneši atpakaļ
100 mainītis faili ar 923 papildinājumiem un 0 dzēšanām
  1. 1 0
      .gitignore
  2. 1 0
      AdvSecurityGit/COMMIT_EDITMSG
  3. 1 0
      AdvSecurityGit/HEAD
  4. 13 0
      AdvSecurityGit/config
  5. 1 0
      AdvSecurityGit/description
  6. 15 0
      AdvSecurityGit/hooks/applypatch-msg.sample
  7. 24 0
      AdvSecurityGit/hooks/commit-msg.sample
  8. 174 0
      AdvSecurityGit/hooks/fsmonitor-watchman.sample
  9. 8 0
      AdvSecurityGit/hooks/post-update.sample
  10. 14 0
      AdvSecurityGit/hooks/pre-applypatch.sample
  11. 49 0
      AdvSecurityGit/hooks/pre-commit.sample
  12. 13 0
      AdvSecurityGit/hooks/pre-merge-commit.sample
  13. 53 0
      AdvSecurityGit/hooks/pre-push.sample
  14. 169 0
      AdvSecurityGit/hooks/pre-rebase.sample
  15. 24 0
      AdvSecurityGit/hooks/pre-receive.sample
  16. 42 0
      AdvSecurityGit/hooks/prepare-commit-msg.sample
  17. 78 0
      AdvSecurityGit/hooks/push-to-checkout.sample
  18. 77 0
      AdvSecurityGit/hooks/sendemail-validate.sample
  19. 128 0
      AdvSecurityGit/hooks/update.sample
  20. BIN
      AdvSecurityGit/index
  21. 6 0
      AdvSecurityGit/info/exclude
  22. 6 0
      AdvSecurityGit/logs/HEAD
  23. 6 0
      AdvSecurityGit/logs/refs/heads/DockerEBUS
  24. 6 0
      AdvSecurityGit/logs/refs/remotes/origin/DockerEBUS
  25. BIN
      AdvSecurityGit/objects/00/02d242d7ab8f20e0de9240723109dd588f1feb
  26. BIN
      AdvSecurityGit/objects/00/0364c3d26193164ae1ca2a0de90778ff236473
  27. BIN
      AdvSecurityGit/objects/00/1c072db22a6d53dd69a79ced2865c33dafec31
  28. BIN
      AdvSecurityGit/objects/00/22e9a1745f81c4b500f0091e7d4ecba51b9b7c
  29. BIN
      AdvSecurityGit/objects/00/2772ae8d79721cddec92321d91513072a404a9
  30. BIN
      AdvSecurityGit/objects/00/27df235fa98d2fbd89cc61ff53219ffb83f9a1
  31. BIN
      AdvSecurityGit/objects/00/2a799c107cbbe62904b66090b3119c08ab7eb9
  32. BIN
      AdvSecurityGit/objects/00/33ec542b0ad8db51346a37d5e709cb7383a5a0
  33. BIN
      AdvSecurityGit/objects/00/342ef0ae9c9ed581ebeb837147e8c9f6d12358
  34. BIN
      AdvSecurityGit/objects/00/37b8910af714679a0bfc812e84f615e68a1e5e
  35. BIN
      AdvSecurityGit/objects/00/390f1cfd58707aca53f8dec74dc7b842985f40
  36. BIN
      AdvSecurityGit/objects/00/3cffed25a623627cd80f5b9b55c068b1b2d06f
  37. BIN
      AdvSecurityGit/objects/00/4acba6257ffbeca02969db2b24f44ea34238ab
  38. BIN
      AdvSecurityGit/objects/00/52448480892b0a5d85377d7b0b7ab3d84994a0
  39. BIN
      AdvSecurityGit/objects/00/56b19be45de123297c2b4d4161859301f878be
  40. BIN
      AdvSecurityGit/objects/00/76a2d98d2c5cacbf306be47b5dfbbae372e90d
  41. BIN
      AdvSecurityGit/objects/00/76fca14449cf1e491003c8008fe81b07fa8340
  42. BIN
      AdvSecurityGit/objects/00/77a235cd225464dd4b0c82bfd54f9bbc683779
  43. BIN
      AdvSecurityGit/objects/00/795998f43263dd15a4b0dec504599449cf8b9f
  44. BIN
      AdvSecurityGit/objects/00/7b3f4132b592550ea922cefa1530ae610e857d
  45. 1 0
      AdvSecurityGit/objects/00/7b4a89e1bd07d688a0d320d58e552f967b42cd
  46. BIN
      AdvSecurityGit/objects/00/7ce20ccba408880ef6486553b5b511165b3886
  47. BIN
      AdvSecurityGit/objects/00/7dea8a40cbcc8148fbbccf356aa1a70beee72b
  48. BIN
      AdvSecurityGit/objects/00/82014dc9c3d6d4242f5b8e07c2efecc1faa1e0
  49. BIN
      AdvSecurityGit/objects/00/83bcdbfd20ccc90cc18e3414373706d5e94e79
  50. BIN
      AdvSecurityGit/objects/00/9e9730ca6ab01ae44b251ca8fb0cdc03db6189
  51. BIN
      AdvSecurityGit/objects/00/a07e983cd4234cebc35be2847078a42422e972
  52. BIN
      AdvSecurityGit/objects/00/a6b41bc4351d1563af0b8de22c4620f3b8c9c6
  53. BIN
      AdvSecurityGit/objects/00/af6a8710d9b6848c1d7f07a87cd131b37d9bc1
  54. BIN
      AdvSecurityGit/objects/00/b6f84aa8f243fb2bf4f96b8a4c7d6581f744d8
  55. BIN
      AdvSecurityGit/objects/00/bfd330679f35935bc2d0f1462998eb81b64550
  56. BIN
      AdvSecurityGit/objects/00/c822ee4933d0ed5afeec0912eaa454434ebf04
  57. 7 0
      AdvSecurityGit/objects/00/e50f9b6ea55a2d4d8dd3944af2f5f41f639c40
  58. BIN
      AdvSecurityGit/objects/00/eb45bc45f248eaa571de9377e0dfe2a327cfa3
  59. BIN
      AdvSecurityGit/objects/00/ebf77933f0c5455a5a130b6da4a0666f55b2d7
  60. BIN
      AdvSecurityGit/objects/00/f87545ebb51775b48ba832c52488d8ed9da312
  61. BIN
      AdvSecurityGit/objects/00/fe6cd36502867949aaab5fabd9bf1cb4c81008
  62. BIN
      AdvSecurityGit/objects/01/0e65f3b0c8a8abbbfc6ce0df8113a7f8943b9b
  63. BIN
      AdvSecurityGit/objects/01/20645fb2a7c31c5c545fd9e4b0ecfce81d29cb
  64. BIN
      AdvSecurityGit/objects/01/2eab27f3643322ab73ded026e61f93f3474caa
  65. BIN
      AdvSecurityGit/objects/01/2ff19e88667f50bb0f6547131e4ed4b1b787cb
  66. BIN
      AdvSecurityGit/objects/01/31c6398925b04d558f4d369081a69aab8a89e3
  67. BIN
      AdvSecurityGit/objects/01/353bcdd0d2ff3d2722b8e034bdf1b9c5bbe4f8
  68. BIN
      AdvSecurityGit/objects/01/3a75ab63bff1460ca49871bb515d2018837f04
  69. 5 0
      AdvSecurityGit/objects/01/3ccf9f2d08c1152f6004bdc2c531cc447f6bd8
  70. BIN
      AdvSecurityGit/objects/01/4b332b916649044b1f4d8da2dfbec202c99545
  71. BIN
      AdvSecurityGit/objects/01/524eba0435969e5245311550d1bfcb77075307
  72. BIN
      AdvSecurityGit/objects/01/54eeda23494f113a37f8520051b09444663d04
  73. BIN
      AdvSecurityGit/objects/01/555f6c4bf8bb179c4a0008cebff927ed7f97e1
  74. BIN
      AdvSecurityGit/objects/01/58724223fbdfc83962d89188de8f3874691678
  75. BIN
      AdvSecurityGit/objects/01/6259b7089b7f4af3e1a6e640e8040f89872ed1
  76. BIN
      AdvSecurityGit/objects/01/65d8dcc325423579be2345b1cd224d98bba2d2
  77. BIN
      AdvSecurityGit/objects/01/6991743278c4fb01e775c7e7f545ab8001dae8
  78. BIN
      AdvSecurityGit/objects/01/6ebc96091ed625588684084d468981b7261540
  79. BIN
      AdvSecurityGit/objects/01/77a62dca274f97e2cdfb74b589dc88309dd160
  80. BIN
      AdvSecurityGit/objects/01/79f8126af747bcb510cd8c7bb2350a7dde0ed9
  81. 1 0
      AdvSecurityGit/objects/01/85b8d3adceb0e797d077856b01b51bfff5aaa9
  82. BIN
      AdvSecurityGit/objects/01/8d3bfb474f7286b5531f8dd4b4de1b9a126620
  83. BIN
      AdvSecurityGit/objects/01/9115b8a5957b5bc635c6314b073de633bbc47f
  84. BIN
      AdvSecurityGit/objects/01/9c7e979c0e5ecbfee80ee60cdcff1cd03a5625
  85. BIN
      AdvSecurityGit/objects/01/a48f62a6fc4d304b6306280185d0b261b34077
  86. BIN
      AdvSecurityGit/objects/01/a793c84675ed9b879bf08bb2233b94a066583b
  87. BIN
      AdvSecurityGit/objects/01/b5dcb8df5d5baeb799cfd3eda35c2e09403899
  88. BIN
      AdvSecurityGit/objects/01/bb06c4dbb9325802e43c9d6844dcbbc47c4e6d
  89. BIN
      AdvSecurityGit/objects/01/d0803e5c4a7005e44ea2d06da791457b4b2384
  90. BIN
      AdvSecurityGit/objects/01/d3ed542a8a18f330558a577cafbf49d28530cf
  91. BIN
      AdvSecurityGit/objects/01/daf56f015f3c2c4c5a1854a476098a941467f2
  92. BIN
      AdvSecurityGit/objects/01/de891a154f4a5cba9eee1f3cf380736c4bc520
  93. BIN
      AdvSecurityGit/objects/01/e2a038d4745b4cec400a5909fbbe701cbbb5d2
  94. BIN
      AdvSecurityGit/objects/01/e437949afa7f7711c5494c169b74758679494a
  95. BIN
      AdvSecurityGit/objects/01/e7aff1b53b3619971064beb93ad7d2470d7c8e
  96. BIN
      AdvSecurityGit/objects/01/ec9a29a1c115c7f1e3813b7cd75eb5697c6799
  97. BIN
      AdvSecurityGit/objects/01/ee307a71d844cbebb2f2c3b1df5fc06096d1e1
  98. BIN
      AdvSecurityGit/objects/01/f47a3c71ea647d8cfd7557ed6ad9b1f46a37bd
  99. BIN
      AdvSecurityGit/objects/01/f681713af36707eb11cc82f938ad615fc41c08
  100. BIN
      AdvSecurityGit/objects/01/f981acec9bac26971ef2bbd6559ef466ef52c1

+ 1 - 0
.gitignore

@@ -21,6 +21,7 @@ bld/
 [Bb]in/
 [Oo]bj/
 [Ll]og/
+OriginGit/
 
 # Visual Studio 2015 cache/options directory
 .vs/

+ 1 - 0
AdvSecurityGit/COMMIT_EDITMSG

@@ -0,0 +1 @@
+Sync updates from DockerEBUS in general repo(Commit SHA:d44462c)to security repo

+ 1 - 0
AdvSecurityGit/HEAD

@@ -0,0 +1 @@
+ref: refs/heads/DockerEBUS

+ 13 - 0
AdvSecurityGit/config

@@ -0,0 +1,13 @@
+[core]
+	repositoryformatversion = 0
+	filemode = false
+	bare = false
+	logallrefupdates = true
+	symlinks = false
+	ignorecase = true
+[remote "origin"]
+	url = https://ZerovaSD@dev.azure.com/ZerovaSD/Code%20Security/_git/EVCB_OCPP.Common
+	fetch = +refs/heads/*:refs/remotes/origin/*
+[branch "DockerEBUS"]
+	remote = origin
+	merge = refs/heads/DockerEBUS

+ 1 - 0
AdvSecurityGit/description

@@ -0,0 +1 @@
+Unnamed repository; edit this file 'description' to name the repository.

+ 15 - 0
AdvSecurityGit/hooks/applypatch-msg.sample

@@ -0,0 +1,15 @@
+#!/bin/sh
+#
+# An example hook script to check the commit log message taken by
+# applypatch from an e-mail message.
+#
+# The hook should exit with non-zero status after issuing an
+# appropriate message if it wants to stop the commit.  The hook is
+# allowed to edit the commit message file.
+#
+# To enable this hook, rename this file to "applypatch-msg".
+
+. git-sh-setup
+commitmsg="$(git rev-parse --git-path hooks/commit-msg)"
+test -x "$commitmsg" && exec "$commitmsg" ${1+"$@"}
+:

+ 24 - 0
AdvSecurityGit/hooks/commit-msg.sample

@@ -0,0 +1,24 @@
+#!/bin/sh
+#
+# An example hook script to check the commit log message.
+# Called by "git commit" with one argument, the name of the file
+# that has the commit message.  The hook should exit with non-zero
+# status after issuing an appropriate message if it wants to stop the
+# commit.  The hook is allowed to edit the commit message file.
+#
+# To enable this hook, rename this file to "commit-msg".
+
+# Uncomment the below to add a Signed-off-by line to the message.
+# Doing this in a hook is a bad idea in general, but the prepare-commit-msg
+# hook is more suited to it.
+#
+# SOB=$(git var GIT_AUTHOR_IDENT | sed -n 's/^\(.*>\).*$/Signed-off-by: \1/p')
+# grep -qs "^$SOB" "$1" || echo "$SOB" >> "$1"
+
+# This example catches duplicate Signed-off-by lines.
+
+test "" = "$(grep '^Signed-off-by: ' "$1" |
+	 sort | uniq -c | sed -e '/^[ 	]*1[ 	]/d')" || {
+	echo >&2 Duplicate Signed-off-by lines.
+	exit 1
+}

+ 174 - 0
AdvSecurityGit/hooks/fsmonitor-watchman.sample

@@ -0,0 +1,174 @@
+#!/usr/bin/perl
+
+use strict;
+use warnings;
+use IPC::Open2;
+
+# An example hook script to integrate Watchman
+# (https://facebook.github.io/watchman/) with git to speed up detecting
+# new and modified files.
+#
+# The hook is passed a version (currently 2) and last update token
+# formatted as a string and outputs to stdout a new update token and
+# all files that have been modified since the update token. Paths must
+# be relative to the root of the working tree and separated by a single NUL.
+#
+# To enable this hook, rename this file to "query-watchman" and set
+# 'git config core.fsmonitor .git/hooks/query-watchman'
+#
+my ($version, $last_update_token) = @ARGV;
+
+# Uncomment for debugging
+# print STDERR "$0 $version $last_update_token\n";
+
+# Check the hook interface version
+if ($version ne 2) {
+	die "Unsupported query-fsmonitor hook version '$version'.\n" .
+	    "Falling back to scanning...\n";
+}
+
+my $git_work_tree = get_working_dir();
+
+my $retry = 1;
+
+my $json_pkg;
+eval {
+	require JSON::XS;
+	$json_pkg = "JSON::XS";
+	1;
+} or do {
+	require JSON::PP;
+	$json_pkg = "JSON::PP";
+};
+
+launch_watchman();
+
+sub launch_watchman {
+	my $o = watchman_query();
+	if (is_work_tree_watched($o)) {
+		output_result($o->{clock}, @{$o->{files}});
+	}
+}
+
+sub output_result {
+	my ($clockid, @files) = @_;
+
+	# Uncomment for debugging watchman output
+	# open (my $fh, ">", ".git/watchman-output.out");
+	# binmode $fh, ":utf8";
+	# print $fh "$clockid\n@files\n";
+	# close $fh;
+
+	binmode STDOUT, ":utf8";
+	print $clockid;
+	print "\0";
+	local $, = "\0";
+	print @files;
+}
+
+sub watchman_clock {
+	my $response = qx/watchman clock "$git_work_tree"/;
+	die "Failed to get clock id on '$git_work_tree'.\n" .
+		"Falling back to scanning...\n" if $? != 0;
+
+	return $json_pkg->new->utf8->decode($response);
+}
+
+sub watchman_query {
+	my $pid = open2(\*CHLD_OUT, \*CHLD_IN, 'watchman -j --no-pretty')
+	or die "open2() failed: $!\n" .
+	"Falling back to scanning...\n";
+
+	# In the query expression below we're asking for names of files that
+	# changed since $last_update_token but not from the .git folder.
+	#
+	# To accomplish this, we're using the "since" generator to use the
+	# recency index to select candidate nodes and "fields" to limit the
+	# output to file names only. Then we're using the "expression" term to
+	# further constrain the results.
+	my $last_update_line = "";
+	if (substr($last_update_token, 0, 1) eq "c") {
+		$last_update_token = "\"$last_update_token\"";
+		$last_update_line = qq[\n"since": $last_update_token,];
+	}
+	my $query = <<"	END";
+		["query", "$git_work_tree", {$last_update_line
+			"fields": ["name"],
+			"expression": ["not", ["dirname", ".git"]]
+		}]
+	END
+
+	# Uncomment for debugging the watchman query
+	# open (my $fh, ">", ".git/watchman-query.json");
+	# print $fh $query;
+	# close $fh;
+
+	print CHLD_IN $query;
+	close CHLD_IN;
+	my $response = do {local $/; <CHLD_OUT>};
+
+	# Uncomment for debugging the watch response
+	# open ($fh, ">", ".git/watchman-response.json");
+	# print $fh $response;
+	# close $fh;
+
+	die "Watchman: command returned no output.\n" .
+	"Falling back to scanning...\n" if $response eq "";
+	die "Watchman: command returned invalid output: $response\n" .
+	"Falling back to scanning...\n" unless $response =~ /^\{/;
+
+	return $json_pkg->new->utf8->decode($response);
+}
+
+sub is_work_tree_watched {
+	my ($output) = @_;
+	my $error = $output->{error};
+	if ($retry > 0 and $error and $error =~ m/unable to resolve root .* directory (.*) is not watched/) {
+		$retry--;
+		my $response = qx/watchman watch "$git_work_tree"/;
+		die "Failed to make watchman watch '$git_work_tree'.\n" .
+		    "Falling back to scanning...\n" if $? != 0;
+		$output = $json_pkg->new->utf8->decode($response);
+		$error = $output->{error};
+		die "Watchman: $error.\n" .
+		"Falling back to scanning...\n" if $error;
+
+		# Uncomment for debugging watchman output
+		# open (my $fh, ">", ".git/watchman-output.out");
+		# close $fh;
+
+		# Watchman will always return all files on the first query so
+		# return the fast "everything is dirty" flag to git and do the
+		# Watchman query just to get it over with now so we won't pay
+		# the cost in git to look up each individual file.
+		my $o = watchman_clock();
+		$error = $output->{error};
+
+		die "Watchman: $error.\n" .
+		"Falling back to scanning...\n" if $error;
+
+		output_result($o->{clock}, ("/"));
+		$last_update_token = $o->{clock};
+
+		eval { launch_watchman() };
+		return 0;
+	}
+
+	die "Watchman: $error.\n" .
+	"Falling back to scanning...\n" if $error;
+
+	return 1;
+}
+
+sub get_working_dir {
+	my $working_dir;
+	if ($^O =~ 'msys' || $^O =~ 'cygwin') {
+		$working_dir = Win32::GetCwd();
+		$working_dir =~ tr/\\/\//;
+	} else {
+		require Cwd;
+		$working_dir = Cwd::cwd();
+	}
+
+	return $working_dir;
+}

+ 8 - 0
AdvSecurityGit/hooks/post-update.sample

@@ -0,0 +1,8 @@
+#!/bin/sh
+#
+# An example hook script to prepare a packed repository for use over
+# dumb transports.
+#
+# To enable this hook, rename this file to "post-update".
+
+exec git update-server-info

+ 14 - 0
AdvSecurityGit/hooks/pre-applypatch.sample

@@ -0,0 +1,14 @@
+#!/bin/sh
+#
+# An example hook script to verify what is about to be committed
+# by applypatch from an e-mail message.
+#
+# The hook should exit with non-zero status after issuing an
+# appropriate message if it wants to stop the commit.
+#
+# To enable this hook, rename this file to "pre-applypatch".
+
+. git-sh-setup
+precommit="$(git rev-parse --git-path hooks/pre-commit)"
+test -x "$precommit" && exec "$precommit" ${1+"$@"}
+:

+ 49 - 0
AdvSecurityGit/hooks/pre-commit.sample

@@ -0,0 +1,49 @@
+#!/bin/sh
+#
+# An example hook script to verify what is about to be committed.
+# Called by "git commit" with no arguments.  The hook should
+# exit with non-zero status after issuing an appropriate message if
+# it wants to stop the commit.
+#
+# To enable this hook, rename this file to "pre-commit".
+
+if git rev-parse --verify HEAD >/dev/null 2>&1
+then
+	against=HEAD
+else
+	# Initial commit: diff against an empty tree object
+	against=$(git hash-object -t tree /dev/null)
+fi
+
+# If you want to allow non-ASCII filenames set this variable to true.
+allownonascii=$(git config --type=bool hooks.allownonascii)
+
+# Redirect output to stderr.
+exec 1>&2
+
+# Cross platform projects tend to avoid non-ASCII filenames; prevent
+# them from being added to the repository. We exploit the fact that the
+# printable range starts at the space character and ends with tilde.
+if [ "$allownonascii" != "true" ] &&
+	# Note that the use of brackets around a tr range is ok here, (it's
+	# even required, for portability to Solaris 10's /usr/bin/tr), since
+	# the square bracket bytes happen to fall in the designated range.
+	test $(git diff-index --cached --name-only --diff-filter=A -z $against |
+	  LC_ALL=C tr -d '[ -~]\0' | wc -c) != 0
+then
+	cat <<\EOF
+Error: Attempt to add a non-ASCII file name.
+
+This can cause problems if you want to work with people on other platforms.
+
+To be portable it is advisable to rename the file.
+
+If you know what you are doing you can disable this check using:
+
+  git config hooks.allownonascii true
+EOF
+	exit 1
+fi
+
+# If there are whitespace errors, print the offending file names and fail.
+exec git diff-index --check --cached $against --

+ 13 - 0
AdvSecurityGit/hooks/pre-merge-commit.sample

@@ -0,0 +1,13 @@
+#!/bin/sh
+#
+# An example hook script to verify what is about to be committed.
+# Called by "git merge" with no arguments.  The hook should
+# exit with non-zero status after issuing an appropriate message to
+# stderr if it wants to stop the merge commit.
+#
+# To enable this hook, rename this file to "pre-merge-commit".
+
+. git-sh-setup
+test -x "$GIT_DIR/hooks/pre-commit" &&
+        exec "$GIT_DIR/hooks/pre-commit"
+:

+ 53 - 0
AdvSecurityGit/hooks/pre-push.sample

@@ -0,0 +1,53 @@
+#!/bin/sh
+
+# An example hook script to verify what is about to be pushed.  Called by "git
+# push" after it has checked the remote status, but before anything has been
+# pushed.  If this script exits with a non-zero status nothing will be pushed.
+#
+# This hook is called with the following parameters:
+#
+# $1 -- Name of the remote to which the push is being done
+# $2 -- URL to which the push is being done
+#
+# If pushing without using a named remote those arguments will be equal.
+#
+# Information about the commits which are being pushed is supplied as lines to
+# the standard input in the form:
+#
+#   <local ref> <local oid> <remote ref> <remote oid>
+#
+# This sample shows how to prevent push of commits where the log message starts
+# with "WIP" (work in progress).
+
+remote="$1"
+url="$2"
+
+zero=$(git hash-object --stdin </dev/null | tr '[0-9a-f]' '0')
+
+while read local_ref local_oid remote_ref remote_oid
+do
+	if test "$local_oid" = "$zero"
+	then
+		# Handle delete
+		:
+	else
+		if test "$remote_oid" = "$zero"
+		then
+			# New branch, examine all commits
+			range="$local_oid"
+		else
+			# Update to existing branch, examine new commits
+			range="$remote_oid..$local_oid"
+		fi
+
+		# Check for WIP commit
+		commit=$(git rev-list -n 1 --grep '^WIP' "$range")
+		if test -n "$commit"
+		then
+			echo >&2 "Found WIP commit in $local_ref, not pushing"
+			exit 1
+		fi
+	fi
+done
+
+exit 0

+ 169 - 0
AdvSecurityGit/hooks/pre-rebase.sample

@@ -0,0 +1,169 @@
+#!/bin/sh
+#
+# Copyright (c) 2006, 2008 Junio C Hamano
+#
+# The "pre-rebase" hook is run just before "git rebase" starts doing
+# its job, and can prevent the command from running by exiting with
+# non-zero status.
+#
+# The hook is called with the following parameters:
+#
+# $1 -- the upstream the series was forked from.
+# $2 -- the branch being rebased (or empty when rebasing the current branch).
+#
+# This sample shows how to prevent topic branches that are already
+# merged to 'next' branch from getting rebased, because allowing it
+# would result in rebasing already published history.
+
+publish=next
+basebranch="$1"
+if test "$#" = 2
+then
+	topic="refs/heads/$2"
+else
+	topic=`git symbolic-ref HEAD` ||
+	exit 0 ;# we do not interrupt rebasing detached HEAD
+fi
+
+case "$topic" in
+refs/heads/??/*)
+	;;
+*)
+	exit 0 ;# we do not interrupt others.
+	;;
+esac
+
+# Now we are dealing with a topic branch being rebased
+# on top of master.  Is it OK to rebase it?
+
+# Does the topic really exist?
+git show-ref -q "$topic" || {
+	echo >&2 "No such branch $topic"
+	exit 1
+}
+
+# Is topic fully merged to master?
+not_in_master=`git rev-list --pretty=oneline ^master "$topic"`
+if test -z "$not_in_master"
+then
+	echo >&2 "$topic is fully merged to master; better remove it."
+	exit 1 ;# we could allow it, but there is no point.
+fi
+
+# Is topic ever merged to next?  If so you should not be rebasing it.
+only_next_1=`git rev-list ^master "^$topic" ${publish} | sort`
+only_next_2=`git rev-list ^master           ${publish} | sort`
+if test "$only_next_1" = "$only_next_2"
+then
+	not_in_topic=`git rev-list "^$topic" master`
+	if test -z "$not_in_topic"
+	then
+		echo >&2 "$topic is already up to date with master"
+		exit 1 ;# we could allow it, but there is no point.
+	else
+		exit 0
+	fi
+else
+	not_in_next=`git rev-list --pretty=oneline ^${publish} "$topic"`
+	/usr/bin/perl -e '
+		my $topic = $ARGV[0];
+		my $msg = "* $topic has commits already merged to public branch:\n";
+		my (%not_in_next) = map {
+			/^([0-9a-f]+) /;
+			($1 => 1);
+		} split(/\n/, $ARGV[1]);
+		for my $elem (map {
+				/^([0-9a-f]+) (.*)$/;
+				[$1 => $2];
+			} split(/\n/, $ARGV[2])) {
+			if (!exists $not_in_next{$elem->[0]}) {
+				if ($msg) {
+					print STDERR $msg;
+					undef $msg;
+				}
+				print STDERR " $elem->[1]\n";
+			}
+		}
+	' "$topic" "$not_in_next" "$not_in_master"
+	exit 1
+fi
+
+<<\DOC_END
+
+This sample hook safeguards topic branches that have been
+published from being rewound.
+
+The workflow assumed here is:
+
+ * Once a topic branch forks from "master", "master" is never
+   merged into it again (either directly or indirectly).
+
+ * Once a topic branch is fully cooked and merged into "master",
+   it is deleted.  If you need to build on top of it to correct
+   earlier mistakes, a new topic branch is created by forking at
+   the tip of the "master".  This is not strictly necessary, but
+   it makes it easier to keep your history simple.
+
+ * Whenever you need to test or publish your changes to topic
+   branches, merge them into "next" branch.
+
+The script, being an example, hardcodes the publish branch name
+to be "next", but it is trivial to make it configurable via
+$GIT_DIR/config mechanism.
+
+With this workflow, you would want to know:
+
+(1) ... if a topic branch has ever been merged to "next".  Young
+    topic branches can have stupid mistakes you would rather
+    clean up before publishing, and things that have not been
+    merged into other branches can be easily rebased without
+    affecting other people.  But once it is published, you would
+    not want to rewind it.
+
+(2) ... if a topic branch has been fully merged to "master".
+    Then you can delete it.  More importantly, you should not
+    build on top of it -- other people may already want to
+    change things related to the topic as patches against your
+    "master", so if you need further changes, it is better to
+    fork the topic (perhaps with the same name) afresh from the
+    tip of "master".
+
+Let's look at this example:
+
+		   o---o---o---o---o---o---o---o---o---o "next"
+		  /       /           /           /
+		 /   a---a---b A     /           /
+		/   /               /           /
+	       /   /   c---c---c---c B         /
+	      /   /   /             \         /
+	     /   /   /   b---b C     \       /
+	    /   /   /   /             \     /
+    ---o---o---o---o---o---o---o---o---o---o---o "master"
+
+
+A, B and C are topic branches.
+
+ * A has one fix since it was merged up to "next".
+
+ * B has finished.  It has been fully merged up to "master" and "next",
+   and is ready to be deleted.
+
+ * C has not merged to "next" at all.
+
+We would want to allow C to be rebased, refuse A, and encourage
+B to be deleted.
+
+To compute (1):
+
+	git rev-list ^master ^topic next
+	git rev-list ^master        next
+
+	if these match, topic has not merged in next at all.
+
+To compute (2):
+
+	git rev-list master..topic
+
+	if this is empty, it is fully merged to "master".
+
+DOC_END

+ 24 - 0
AdvSecurityGit/hooks/pre-receive.sample

@@ -0,0 +1,24 @@
+#!/bin/sh
+#
+# An example hook script to make use of push options.
+# The example simply echoes all push options that start with 'echoback='
+# and rejects all pushes when the "reject" push option is used.
+#
+# To enable this hook, rename this file to "pre-receive".
+
+if test -n "$GIT_PUSH_OPTION_COUNT"
+then
+	i=0
+	while test "$i" -lt "$GIT_PUSH_OPTION_COUNT"
+	do
+		eval "value=\$GIT_PUSH_OPTION_$i"
+		case "$value" in
+		echoback=*)
+			echo "echo from the pre-receive-hook: ${value#*=}" >&2
+			;;
+		reject)
+			exit 1
+		esac
+		i=$((i + 1))
+	done
+fi

+ 42 - 0
AdvSecurityGit/hooks/prepare-commit-msg.sample

@@ -0,0 +1,42 @@
+#!/bin/sh
+#
+# An example hook script to prepare the commit log message.
+# Called by "git commit" with the name of the file that has the
+# commit message, followed by the description of the commit
+# message's source.  The hook's purpose is to edit the commit
+# message file.  If the hook fails with a non-zero status,
+# the commit is aborted.
+#
+# To enable this hook, rename this file to "prepare-commit-msg".
+
+# This hook includes three examples. The first one removes the
+# "# Please enter the commit message..." help message.
+#
+# The second includes the output of "git diff --name-status -r"
+# into the message, just before the "git status" output.  It is
+# commented because it doesn't cope with --amend or with squashed
+# commits.
+#
+# The third example adds a Signed-off-by line to the message, that can
+# still be edited.  This is rarely a good idea.
+
+COMMIT_MSG_FILE=$1
+COMMIT_SOURCE=$2
+SHA1=$3
+
+/usr/bin/perl -i.bak -ne 'print unless(m/^. Please enter the commit message/..m/^#$/)' "$COMMIT_MSG_FILE"
+
+# case "$COMMIT_SOURCE,$SHA1" in
+#  ,|template,)
+#    /usr/bin/perl -i.bak -pe '
+#       print "\n" . `git diff --cached --name-status -r`
+# 	 if /^#/ && $first++ == 0' "$COMMIT_MSG_FILE" ;;
+#  *) ;;
+# esac
+
+# SOB=$(git var GIT_COMMITTER_IDENT | sed -n 's/^\(.*>\).*$/Signed-off-by: \1/p')
+# git interpret-trailers --in-place --trailer "$SOB" "$COMMIT_MSG_FILE"
+# if test -z "$COMMIT_SOURCE"
+# then
+#   /usr/bin/perl -i.bak -pe 'print "\n" if !$first_line++' "$COMMIT_MSG_FILE"
+# fi

+ 78 - 0
AdvSecurityGit/hooks/push-to-checkout.sample

@@ -0,0 +1,78 @@
+#!/bin/sh
+
+# An example hook script to update a checked-out tree on a git push.
+#
+# This hook is invoked by git-receive-pack(1) when it reacts to git
+# push and updates reference(s) in its repository, and when the push
+# tries to update the branch that is currently checked out and the
+# receive.denyCurrentBranch configuration variable is set to
+# updateInstead.
+#
+# By default, such a push is refused if the working tree and the index
+# of the remote repository has any difference from the currently
+# checked out commit; when both the working tree and the index match
+# the current commit, they are updated to match the newly pushed tip
+# of the branch. This hook is to be used to override the default
+# behaviour; however the code below reimplements the default behaviour
+# as a starting point for convenient modification.
+#
+# The hook receives the commit with which the tip of the current
+# branch is going to be updated:
+commit=$1
+
+# It can exit with a non-zero status to refuse the push (when it does
+# so, it must not modify the index or the working tree).
+die () {
+	echo >&2 "$*"
+	exit 1
+}
+
+# Or it can make any necessary changes to the working tree and to the
+# index to bring them to the desired state when the tip of the current
+# branch is updated to the new commit, and exit with a zero status.
+#
+# For example, the hook can simply run git read-tree -u -m HEAD "$1"
+# in order to emulate git fetch that is run in the reverse direction
+# with git push, as the two-tree form of git read-tree -u -m is
+# essentially the same as git switch or git checkout that switches
+# branches while keeping the local changes in the working tree that do
+# not interfere with the difference between the branches.
+
+# The below is a more-or-less exact translation to shell of the C code
+# for the default behaviour for git's push-to-checkout hook defined in
+# the push_to_deploy() function in builtin/receive-pack.c.
+#
+# Note that the hook will be executed from the repository directory,
+# not from the working tree, so if you want to perform operations on
+# the working tree, you will have to adapt your code accordingly, e.g.
+# by adding "cd .." or using relative paths.
+
+if ! git update-index -q --ignore-submodules --refresh
+then
+	die "Up-to-date check failed"
+fi
+
+if ! git diff-files --quiet --ignore-submodules --
+then
+	die "Working directory has unstaged changes"
+fi
+
+# This is a rough translation of:
+#
+#   head_has_history() ? "HEAD" : EMPTY_TREE_SHA1_HEX
+if git cat-file -e HEAD 2>/dev/null
+then
+	head=HEAD
+else
+	head=$(git hash-object -t tree --stdin </dev/null)
+fi
+
+if ! git diff-index --quiet --cached --ignore-submodules $head --
+then
+	die "Working directory has staged changes"
+fi
+
+if ! git read-tree -u -m "$commit"
+then
+	die "Could not update working tree to new HEAD"
+fi

+ 77 - 0
AdvSecurityGit/hooks/sendemail-validate.sample

@@ -0,0 +1,77 @@
+#!/bin/sh
+
+# An example hook script to validate a patch (and/or patch series) before
+# sending it via email.
+#
+# The hook should exit with non-zero status after issuing an appropriate
+# message if it wants to prevent the email(s) from being sent.
+#
+# To enable this hook, rename this file to "sendemail-validate".
+#
+# By default, it will only check that the patch(es) can be applied on top of
+# the default upstream branch without conflicts in a secondary worktree. After
+# validation (successful or not) of the last patch of a series, the worktree
+# will be deleted.
+#
+# The following config variables can be set to change the default remote and
+# remote ref that are used to apply the patches against:
+#
+#   sendemail.validateRemote (default: origin)
+#   sendemail.validateRemoteRef (default: HEAD)
+#
+# Replace the TODO placeholders with appropriate checks according to your
+# needs.
+
+validate_cover_letter () {
+	file="$1"
+	# TODO: Replace with appropriate checks (e.g. spell checking).
+	true
+}
+
+validate_patch () {
+	file="$1"
+	# Ensure that the patch applies without conflicts.
+	git am -3 "$file" || return
+	# TODO: Replace with appropriate checks for this patch
+	# (e.g. checkpatch.pl).
+	true
+}
+
+validate_series () {
+	# TODO: Replace with appropriate checks for the whole series
+	# (e.g. quick build, coding style checks, etc.).
+	true
+}
+
+# main -------------------------------------------------------------------------
+
+if test "$GIT_SENDEMAIL_FILE_COUNTER" = 1
+then
+	remote=$(git config --default origin --get sendemail.validateRemote) &&
+	ref=$(git config --default HEAD --get sendemail.validateRemoteRef) &&
+	worktree=$(mktemp --tmpdir -d sendemail-validate.XXXXXXX) &&
+	git worktree add -fd --checkout "$worktree" "refs/remotes/$remote/$ref" &&
+	git config --replace-all sendemail.validateWorktree "$worktree"
+else
+	worktree=$(git config --get sendemail.validateWorktree)
+fi || {
+	echo "sendemail-validate: error: failed to prepare worktree" >&2
+	exit 1
+}
+
+unset GIT_DIR GIT_WORK_TREE
+cd "$worktree" &&
+
+if grep -q "^diff --git " "$1"
+then
+	validate_patch "$1"
+else
+	validate_cover_letter "$1"
+fi &&
+
+if test "$GIT_SENDEMAIL_FILE_COUNTER" = "$GIT_SENDEMAIL_FILE_TOTAL"
+then
+	git config --unset-all sendemail.validateWorktree &&
+	trap 'git worktree remove -ff "$worktree"' EXIT &&
+	validate_series
+fi

+ 128 - 0
AdvSecurityGit/hooks/update.sample

@@ -0,0 +1,128 @@
+#!/bin/sh
+#
+# An example hook script to block unannotated tags from entering.
+# Called by "git receive-pack" with arguments: refname sha1-old sha1-new
+#
+# To enable this hook, rename this file to "update".
+#
+# Config
+# ------
+# hooks.allowunannotated
+#   This boolean sets whether unannotated tags will be allowed into the
+#   repository.  By default they won't be.
+# hooks.allowdeletetag
+#   This boolean sets whether deleting tags will be allowed in the
+#   repository.  By default they won't be.
+# hooks.allowmodifytag
+#   This boolean sets whether a tag may be modified after creation. By default
+#   it won't be.
+# hooks.allowdeletebranch
+#   This boolean sets whether deleting branches will be allowed in the
+#   repository.  By default they won't be.
+# hooks.denycreatebranch
+#   This boolean sets whether remotely creating branches will be denied
+#   in the repository.  By default this is allowed.
+#
+
+# --- Command line
+refname="$1"
+oldrev="$2"
+newrev="$3"
+
+# --- Safety check
+if [ -z "$GIT_DIR" ]; then
+	echo "Don't run this script from the command line." >&2
+	echo " (if you want, you could supply GIT_DIR then run" >&2
+	echo "  $0 <ref> <oldrev> <newrev>)" >&2
+	exit 1
+fi
+
+if [ -z "$refname" -o -z "$oldrev" -o -z "$newrev" ]; then
+	echo "usage: $0 <ref> <oldrev> <newrev>" >&2
+	exit 1
+fi
+
+# --- Config
+allowunannotated=$(git config --type=bool hooks.allowunannotated)
+allowdeletebranch=$(git config --type=bool hooks.allowdeletebranch)
+denycreatebranch=$(git config --type=bool hooks.denycreatebranch)
+allowdeletetag=$(git config --type=bool hooks.allowdeletetag)
+allowmodifytag=$(git config --type=bool hooks.allowmodifytag)
+
+# check for no description
+projectdesc=$(sed -e '1q' "$GIT_DIR/description")
+case "$projectdesc" in
+"Unnamed repository"* | "")
+	echo "*** Project description file hasn't been set" >&2
+	exit 1
+	;;
+esac
+
+# --- Check types
+# if $newrev is 0000...0000, it's a commit to delete a ref.
+zero=$(git hash-object --stdin </dev/null | tr '[0-9a-f]' '0')
+if [ "$newrev" = "$zero" ]; then
+	newrev_type=delete
+else
+	newrev_type=$(git cat-file -t $newrev)
+fi
+
+case "$refname","$newrev_type" in
+	refs/tags/*,commit)
+		# un-annotated tag
+		short_refname=${refname##refs/tags/}
+		if [ "$allowunannotated" != "true" ]; then
+			echo "*** The un-annotated tag, $short_refname, is not allowed in this repository" >&2
+			echo "*** Use 'git tag [ -a | -s ]' for tags you want to propagate." >&2
+			exit 1
+		fi
+		;;
+	refs/tags/*,delete)
+		# delete tag
+		if [ "$allowdeletetag" != "true" ]; then
+			echo "*** Deleting a tag is not allowed in this repository" >&2
+			exit 1
+		fi
+		;;
+	refs/tags/*,tag)
+		# annotated tag
+		if [ "$allowmodifytag" != "true" ] && git rev-parse $refname > /dev/null 2>&1
+		then
+			echo "*** Tag '$refname' already exists." >&2
+			echo "*** Modifying a tag is not allowed in this repository." >&2
+			exit 1
+		fi
+		;;
+	refs/heads/*,commit)
+		# branch
+		if [ "$oldrev" = "$zero" -a "$denycreatebranch" = "true" ]; then
+			echo "*** Creating a branch is not allowed in this repository" >&2
+			exit 1
+		fi
+		;;
+	refs/heads/*,delete)
+		# delete branch
+		if [ "$allowdeletebranch" != "true" ]; then
+			echo "*** Deleting a branch is not allowed in this repository" >&2
+			exit 1
+		fi
+		;;
+	refs/remotes/*,commit)
+		# tracking branch
+		;;
+	refs/remotes/*,delete)
+		# delete tracking branch
+		if [ "$allowdeletebranch" != "true" ]; then
+			echo "*** Deleting a tracking branch is not allowed in this repository" >&2
+			exit 1
+		fi
+		;;
+	*)
+		# Anything else (is there anything else?)
+		echo "*** Update hook: unknown type of update to ref $refname of type $newrev_type" >&2
+		exit 1
+		;;
+esac
+
+# --- Finished
+exit 0

BIN
AdvSecurityGit/index


+ 6 - 0
AdvSecurityGit/info/exclude

@@ -0,0 +1,6 @@
+# git ls-files --others --exclude-from=.git/info/exclude
+# Lines that start with '#' are comments.
+# For a project mostly in C, the following would be a good set of
+# exclude patterns (uncomment them if you want to use them):
+# *.[oa]
+# *~

+ 6 - 0
AdvSecurityGit/logs/HEAD

@@ -0,0 +1,6 @@
+0000000000000000000000000000000000000000 6407de91c447d5ae820fce3afbd944f925534d59 Jessica Tseng <jessica_tseng@zerovatech.com> 1731294806 +0800	commit (initial): git init
+6407de91c447d5ae820fce3afbd944f925534d59 0eea30108860e6faaf98ae0ac647db17fede3cb5 Jessica Tseng <jessica_tseng@zerovatech.com> 1731296283 +0800	commit: Sync updates from DockerEBUS in general repo(Commit SHA:abb7800)to security repo
+0eea30108860e6faaf98ae0ac647db17fede3cb5 e431c99b80bb65e7bde6bf2090281e8d1e3471e7 Jessica Tseng <jessica_tseng@zerovatech.com> 1731305277 +0800	commit: Sync updates from DockerEBUS in general repo(Commit SHA:1886081)to security repo
+e431c99b80bb65e7bde6bf2090281e8d1e3471e7 0e6ea5fa9209c8ce9e2391fed92290c1ebd6a926 Jessica Tseng <jessica_tseng@zerovatech.com> 1731401406 +0800	commit: git init
+0e6ea5fa9209c8ce9e2391fed92290c1ebd6a926 c10a48c6fc5518065c2db360b5692dda019c8d8a Jessica Tseng <jessica_tseng@zerovatech.com> 1731401510 +0800	commit: Remove directory OriginGit from version control
+c10a48c6fc5518065c2db360b5692dda019c8d8a d8614c5d2dfd279d09ba3bf7d19adbc2ba7598b8 Jessica Tseng <jessica_tseng@zerovatech.com> 1731401594 +0800	commit: Sync updates from DockerEBUS in general repo(Commit SHA:d44462c)to security repo

+ 6 - 0
AdvSecurityGit/logs/refs/heads/DockerEBUS

@@ -0,0 +1,6 @@
+0000000000000000000000000000000000000000 6407de91c447d5ae820fce3afbd944f925534d59 Jessica Tseng <jessica_tseng@zerovatech.com> 1731294806 +0800	commit (initial): git init
+6407de91c447d5ae820fce3afbd944f925534d59 0eea30108860e6faaf98ae0ac647db17fede3cb5 Jessica Tseng <jessica_tseng@zerovatech.com> 1731296283 +0800	commit: Sync updates from DockerEBUS in general repo(Commit SHA:abb7800)to security repo
+0eea30108860e6faaf98ae0ac647db17fede3cb5 e431c99b80bb65e7bde6bf2090281e8d1e3471e7 Jessica Tseng <jessica_tseng@zerovatech.com> 1731305277 +0800	commit: Sync updates from DockerEBUS in general repo(Commit SHA:1886081)to security repo
+e431c99b80bb65e7bde6bf2090281e8d1e3471e7 0e6ea5fa9209c8ce9e2391fed92290c1ebd6a926 Jessica Tseng <jessica_tseng@zerovatech.com> 1731401406 +0800	commit: git init
+0e6ea5fa9209c8ce9e2391fed92290c1ebd6a926 c10a48c6fc5518065c2db360b5692dda019c8d8a Jessica Tseng <jessica_tseng@zerovatech.com> 1731401510 +0800	commit: Remove directory OriginGit from version control
+c10a48c6fc5518065c2db360b5692dda019c8d8a d8614c5d2dfd279d09ba3bf7d19adbc2ba7598b8 Jessica Tseng <jessica_tseng@zerovatech.com> 1731401594 +0800	commit: Sync updates from DockerEBUS in general repo(Commit SHA:d44462c)to security repo

+ 6 - 0
AdvSecurityGit/logs/refs/remotes/origin/DockerEBUS

@@ -0,0 +1,6 @@
+0000000000000000000000000000000000000000 6407de91c447d5ae820fce3afbd944f925534d59 Jessica Tseng <jessica_tseng@zerovatech.com> 1731294857 +0800	update by push
+6407de91c447d5ae820fce3afbd944f925534d59 0eea30108860e6faaf98ae0ac647db17fede3cb5 Jessica Tseng <jessica_tseng@zerovatech.com> 1731296298 +0800	update by push
+0eea30108860e6faaf98ae0ac647db17fede3cb5 e431c99b80bb65e7bde6bf2090281e8d1e3471e7 Jessica Tseng <jessica_tseng@zerovatech.com> 1731305294 +0800	update by push
+e431c99b80bb65e7bde6bf2090281e8d1e3471e7 0e6ea5fa9209c8ce9e2391fed92290c1ebd6a926 Jessica Tseng <jessica_tseng@zerovatech.com> 1731401459 +0800	update by push
+0e6ea5fa9209c8ce9e2391fed92290c1ebd6a926 c10a48c6fc5518065c2db360b5692dda019c8d8a Jessica Tseng <jessica_tseng@zerovatech.com> 1731401518 +0800	update by push
+c10a48c6fc5518065c2db360b5692dda019c8d8a d8614c5d2dfd279d09ba3bf7d19adbc2ba7598b8 Jessica Tseng <jessica_tseng@zerovatech.com> 1731401596 +0800	update by push

BIN
AdvSecurityGit/objects/00/02d242d7ab8f20e0de9240723109dd588f1feb


BIN
AdvSecurityGit/objects/00/0364c3d26193164ae1ca2a0de90778ff236473


BIN
AdvSecurityGit/objects/00/1c072db22a6d53dd69a79ced2865c33dafec31


BIN
AdvSecurityGit/objects/00/22e9a1745f81c4b500f0091e7d4ecba51b9b7c


BIN
AdvSecurityGit/objects/00/2772ae8d79721cddec92321d91513072a404a9


BIN
AdvSecurityGit/objects/00/27df235fa98d2fbd89cc61ff53219ffb83f9a1


BIN
AdvSecurityGit/objects/00/2a799c107cbbe62904b66090b3119c08ab7eb9


BIN
AdvSecurityGit/objects/00/33ec542b0ad8db51346a37d5e709cb7383a5a0


BIN
AdvSecurityGit/objects/00/342ef0ae9c9ed581ebeb837147e8c9f6d12358


BIN
AdvSecurityGit/objects/00/37b8910af714679a0bfc812e84f615e68a1e5e


BIN
AdvSecurityGit/objects/00/390f1cfd58707aca53f8dec74dc7b842985f40


BIN
AdvSecurityGit/objects/00/3cffed25a623627cd80f5b9b55c068b1b2d06f


BIN
AdvSecurityGit/objects/00/4acba6257ffbeca02969db2b24f44ea34238ab


BIN
AdvSecurityGit/objects/00/52448480892b0a5d85377d7b0b7ab3d84994a0


BIN
AdvSecurityGit/objects/00/56b19be45de123297c2b4d4161859301f878be


BIN
AdvSecurityGit/objects/00/76a2d98d2c5cacbf306be47b5dfbbae372e90d


BIN
AdvSecurityGit/objects/00/76fca14449cf1e491003c8008fe81b07fa8340


BIN
AdvSecurityGit/objects/00/77a235cd225464dd4b0c82bfd54f9bbc683779


BIN
AdvSecurityGit/objects/00/795998f43263dd15a4b0dec504599449cf8b9f


BIN
AdvSecurityGit/objects/00/7b3f4132b592550ea922cefa1530ae610e857d


+ 1 - 0
AdvSecurityGit/objects/00/7b4a89e1bd07d688a0d320d58e552f967b42cd

@@ -0,0 +1 @@
+x+)JMU03c040031QHI64IM366·0NL33305MLL1MN266333I5°HL3²La°è7ˆ´]U(xdoÞ¿NÏË¥ëK¸û;

BIN
AdvSecurityGit/objects/00/7ce20ccba408880ef6486553b5b511165b3886


BIN
AdvSecurityGit/objects/00/7dea8a40cbcc8148fbbccf356aa1a70beee72b


BIN
AdvSecurityGit/objects/00/82014dc9c3d6d4242f5b8e07c2efecc1faa1e0


BIN
AdvSecurityGit/objects/00/83bcdbfd20ccc90cc18e3414373706d5e94e79


BIN
AdvSecurityGit/objects/00/9e9730ca6ab01ae44b251ca8fb0cdc03db6189


BIN
AdvSecurityGit/objects/00/a07e983cd4234cebc35be2847078a42422e972


BIN
AdvSecurityGit/objects/00/a6b41bc4351d1563af0b8de22c4620f3b8c9c6


BIN
AdvSecurityGit/objects/00/af6a8710d9b6848c1d7f07a87cd131b37d9bc1


BIN
AdvSecurityGit/objects/00/b6f84aa8f243fb2bf4f96b8a4c7d6581f744d8


BIN
AdvSecurityGit/objects/00/bfd330679f35935bc2d0f1462998eb81b64550


BIN
AdvSecurityGit/objects/00/c822ee4933d0ed5afeec0912eaa454434ebf04


+ 7 - 0
AdvSecurityGit/objects/00/e50f9b6ea55a2d4d8dd3944af2f5f41f639c40

@@ -0,0 +1,7 @@
+x┘RMs⌡0МY©┌{г▄э ╦иt&ЖxJ °i14: ЫВ▒l═u╕7iъ╬ЩxШ
+щAй⌠/{ЬщУY@и╬nщ┐▒#Y╧х╠г÷╗|┌SЛ:Ы┼}h√Я≈зT;,as%А
+тgЙ┌ХЦЪP	┤╠)п▐С┌У╘2╗Ф╝3v;жZМяюdd9┌R╗Л*т"Вёж+тЕ┤╥=╢╡
+╖яС
+б8╫)Sеё(FQRйJ
+P*▒ni
+6дQ(Б∙С╙²YHI▌мЁ⌡°╨ъ╛и#·@╬]Yb≈≥tj{▓oц─M║в%l©EЭ╬ж8В╤≤шЫZк░}╣┼Эhк╝oют]зРШх┌iР║л╪эОШ А╙+┬НбЭ©ryуУfI!┤Ям4бstOyгЫМ≈	÷аЁC╛_]∙©Ы╚└<╣н╩╠≈Х'+9c╘┬Eb= U,≤Pi■ M═▄9▐ДM╡Е[╙(╧К ╕6C^╥р┴ОDЭ(ЦЩЬ)z╧ЁСФ╞VЗ*жФw╢'╡@L∙╜╣М"Я
█7▄⌠wиG0√

BIN
AdvSecurityGit/objects/00/eb45bc45f248eaa571de9377e0dfe2a327cfa3


BIN
AdvSecurityGit/objects/00/ebf77933f0c5455a5a130b6da4a0666f55b2d7


BIN
AdvSecurityGit/objects/00/f87545ebb51775b48ba832c52488d8ed9da312


BIN
AdvSecurityGit/objects/00/fe6cd36502867949aaab5fabd9bf1cb4c81008


BIN
AdvSecurityGit/objects/01/0e65f3b0c8a8abbbfc6ce0df8113a7f8943b9b


BIN
AdvSecurityGit/objects/01/20645fb2a7c31c5c545fd9e4b0ecfce81d29cb


BIN
AdvSecurityGit/objects/01/2eab27f3643322ab73ded026e61f93f3474caa


BIN
AdvSecurityGit/objects/01/2ff19e88667f50bb0f6547131e4ed4b1b787cb


BIN
AdvSecurityGit/objects/01/31c6398925b04d558f4d369081a69aab8a89e3


BIN
AdvSecurityGit/objects/01/353bcdd0d2ff3d2722b8e034bdf1b9c5bbe4f8


BIN
AdvSecurityGit/objects/01/3a75ab63bff1460ca49871bb515d2018837f04


+ 5 - 0
AdvSecurityGit/objects/01/3ccf9f2d08c1152f6004bdc2c531cc447f6bd8

@@ -0,0 +1,5 @@
+x∙TMoс@ЕЛ_1гD╙U┬╢─B((┬р╗q{╘Zш⌠dИz7щ╚Mё\░z╙╦"!ШХ│_S═'ЧК▐8uр┌ПаЁСчл⌡}КP≥жО?|pОВЕВ■╓б<fёиьEFoxExk©СЛщN╖вС{":DЖВX*иИн▄m$C$©÷├аd╪хЛO┬1≥Ц┼/©c■б┬╔╚М©D█VF+иьhт╪mbTЧsа╒╜╣a▒┐√▓_K}╢
+П└≈C#▀"v╡Щ@пАщR^═Ютf
+<-╓╠┬VFR	Н▀чтw█сPи"%┬`цьga9╟B⌠хУНБQ┼дП╨Еk▌°zЫЦи_А█f∙^Tн─ыун▀юЦР┘ЭшiЭюТы╨Q4 сlяцAФ├НP;io╚УRЕюy╔)РЁш╛Jm╣Z╟Ii▓;yR▀^²²]╧ЭqЯЯвГ╞█КOГWГ??|[_Хи║╜lY\j~
+▒яз╧гьnЪ[©²РхXy Ш╨q╜╧му╨ы.I▀qё╜■9чJф<)FGnйlSlч5!b╦т`╫э┼йL|g$Л0;°пЁf Rбб	П▀└·qС─│╠Y╟Fm⌡9/╪ГWэ%s/╣cCш{Щ +А╤2+°■К5й[├3В;м{.qQ)b.║╬MoIё═vH■`7Р┘+Й.╥Х╗├│P└╥ЗВ&О╬P2vtЪb+С▄У;≥┐vбВнi
IZ█гP.╦?Wгhv?≥|╜ИS╔ж
+Cэl);■3oФЩу╝╩+

BIN
AdvSecurityGit/objects/01/4b332b916649044b1f4d8da2dfbec202c99545


BIN
AdvSecurityGit/objects/01/524eba0435969e5245311550d1bfcb77075307


BIN
AdvSecurityGit/objects/01/54eeda23494f113a37f8520051b09444663d04


BIN
AdvSecurityGit/objects/01/555f6c4bf8bb179c4a0008cebff927ed7f97e1


BIN
AdvSecurityGit/objects/01/58724223fbdfc83962d89188de8f3874691678


BIN
AdvSecurityGit/objects/01/6259b7089b7f4af3e1a6e640e8040f89872ed1


BIN
AdvSecurityGit/objects/01/65d8dcc325423579be2345b1cd224d98bba2d2


BIN
AdvSecurityGit/objects/01/6991743278c4fb01e775c7e7f545ab8001dae8


BIN
AdvSecurityGit/objects/01/6ebc96091ed625588684084d468981b7261540


BIN
AdvSecurityGit/objects/01/77a62dca274f97e2cdfb74b589dc88309dd160


BIN
AdvSecurityGit/objects/01/79f8126af747bcb510cd8c7bb2350a7dde0ed9


+ 1 - 0
AdvSecurityGit/objects/01/85b8d3adceb0e797d077856b01b51bfff5aaa9

@@ -0,0 +1 @@
+xe�AjÃ0E»Ö)t€"(…PÙÔmB !›nËXYr=‰	>Y9R®PÙ.m°g5óæÿ3…qž½<Ü.×@ÚîxÖ�ÇrÎî'‘8cPzí,‰Z¬µ)>´ý¡O~Œö5‚Š6":Ðœ1%RùûgòúµMÒT¤ èʼn`‡$²PäM…ÄΌǪBa´ähCÉ—º.�PcæÁê׃¨®-yˆÁÕâé±_uðÍ­q PMÙtTOyü×ÊàÝ4x@÷›ñù¯¼þsï›–µìŠÝu%

BIN
AdvSecurityGit/objects/01/8d3bfb474f7286b5531f8dd4b4de1b9a126620


BIN
AdvSecurityGit/objects/01/9115b8a5957b5bc635c6314b073de633bbc47f


BIN
AdvSecurityGit/objects/01/9c7e979c0e5ecbfee80ee60cdcff1cd03a5625


BIN
AdvSecurityGit/objects/01/a48f62a6fc4d304b6306280185d0b261b34077


BIN
AdvSecurityGit/objects/01/a793c84675ed9b879bf08bb2233b94a066583b


BIN
AdvSecurityGit/objects/01/b5dcb8df5d5baeb799cfd3eda35c2e09403899


BIN
AdvSecurityGit/objects/01/bb06c4dbb9325802e43c9d6844dcbbc47c4e6d


BIN
AdvSecurityGit/objects/01/d0803e5c4a7005e44ea2d06da791457b4b2384


BIN
AdvSecurityGit/objects/01/d3ed542a8a18f330558a577cafbf49d28530cf


BIN
AdvSecurityGit/objects/01/daf56f015f3c2c4c5a1854a476098a941467f2


BIN
AdvSecurityGit/objects/01/de891a154f4a5cba9eee1f3cf380736c4bc520


BIN
AdvSecurityGit/objects/01/e2a038d4745b4cec400a5909fbbe701cbbb5d2


BIN
AdvSecurityGit/objects/01/e437949afa7f7711c5494c169b74758679494a


BIN
AdvSecurityGit/objects/01/e7aff1b53b3619971064beb93ad7d2470d7c8e


BIN
AdvSecurityGit/objects/01/ec9a29a1c115c7f1e3813b7cd75eb5697c6799


BIN
AdvSecurityGit/objects/01/ee307a71d844cbebb2f2c3b1df5fc06096d1e1


BIN
AdvSecurityGit/objects/01/f47a3c71ea647d8cfd7557ed6ad9b1f46a37bd


BIN
AdvSecurityGit/objects/01/f681713af36707eb11cc82f938ad615fc41c08


BIN
AdvSecurityGit/objects/01/f981acec9bac26971ef2bbd6559ef466ef52c1


Daži faili netika attēloti, jo izmaiņu fails ir pārāk liels