12 Commits 04c17ffcc9 ... fc1c0ea8d3

Auteur SHA1 Bericht Datum
  shayne_lo fc1c0ea8d3 fix enter user id / password by env variable 3 maanden geleden
  Jessica Tseng 7d039ebb1a Sync updates from DockerEBUS in general repo(Commit SHA:d44462c)to security repo 4 maanden geleden
  Jessica Tseng d44462c774 sync advancedsecurity git data 4 maanden geleden
  Jessica Tseng bd21c470a3 Sync updates from DockerEBUS in general repo(Commit SHA:1886081)to security repo 4 maanden geleden
  Jessica Tseng 1886081f38 Clear the event after build 4 maanden geleden
  Jessica Tseng 07f9849fb9 Sync updates from DockerEBUS in general repo(Commit SHA:abb7800)to security repo 4 maanden geleden
  Jessica Tseng abb7800cfb Add advancedsecurity feature 4 maanden geleden
  Jessica Tseng eeedf388ef Add advancedsecurity feature 4 maanden geleden
  Robert 43a1222b51 add webdb online log db apilog db 8 maanden geleden
  Robert 28aa628542 allow datatransfer vendor id empty 9 maanden geleden
  Robert 54d391da5f change OccurenceConstraintViolation Description 10 maanden geleden
  Robert ce563ed1ca 1. Add the field "FinishedOn" on MachineError table 10 maanden geleden
100 gewijzigde bestanden met toevoegingen van 923 en 0 verwijderingen
  1. 1 0
      .gitignore
  2. 1 0
      AdvSecurityGit/COMMIT_EDITMSG
  3. 1 0
      AdvSecurityGit/HEAD
  4. 13 0
      AdvSecurityGit/config
  5. 1 0
      AdvSecurityGit/description
  6. 15 0
      AdvSecurityGit/hooks/applypatch-msg.sample
  7. 24 0
      AdvSecurityGit/hooks/commit-msg.sample
  8. 174 0
      AdvSecurityGit/hooks/fsmonitor-watchman.sample
  9. 8 0
      AdvSecurityGit/hooks/post-update.sample
  10. 14 0
      AdvSecurityGit/hooks/pre-applypatch.sample
  11. 49 0
      AdvSecurityGit/hooks/pre-commit.sample
  12. 13 0
      AdvSecurityGit/hooks/pre-merge-commit.sample
  13. 53 0
      AdvSecurityGit/hooks/pre-push.sample
  14. 169 0
      AdvSecurityGit/hooks/pre-rebase.sample
  15. 24 0
      AdvSecurityGit/hooks/pre-receive.sample
  16. 42 0
      AdvSecurityGit/hooks/prepare-commit-msg.sample
  17. 78 0
      AdvSecurityGit/hooks/push-to-checkout.sample
  18. 77 0
      AdvSecurityGit/hooks/sendemail-validate.sample
  19. 128 0
      AdvSecurityGit/hooks/update.sample
  20. BIN
      AdvSecurityGit/index
  21. 6 0
      AdvSecurityGit/info/exclude
  22. 6 0
      AdvSecurityGit/logs/HEAD
  23. 6 0
      AdvSecurityGit/logs/refs/heads/DockerEBUS
  24. 6 0
      AdvSecurityGit/logs/refs/remotes/origin/DockerEBUS
  25. BIN
      AdvSecurityGit/objects/00/02d242d7ab8f20e0de9240723109dd588f1feb
  26. BIN
      AdvSecurityGit/objects/00/0364c3d26193164ae1ca2a0de90778ff236473
  27. BIN
      AdvSecurityGit/objects/00/1c072db22a6d53dd69a79ced2865c33dafec31
  28. BIN
      AdvSecurityGit/objects/00/22e9a1745f81c4b500f0091e7d4ecba51b9b7c
  29. BIN
      AdvSecurityGit/objects/00/2772ae8d79721cddec92321d91513072a404a9
  30. BIN
      AdvSecurityGit/objects/00/27df235fa98d2fbd89cc61ff53219ffb83f9a1
  31. BIN
      AdvSecurityGit/objects/00/2a799c107cbbe62904b66090b3119c08ab7eb9
  32. BIN
      AdvSecurityGit/objects/00/33ec542b0ad8db51346a37d5e709cb7383a5a0
  33. BIN
      AdvSecurityGit/objects/00/342ef0ae9c9ed581ebeb837147e8c9f6d12358
  34. BIN
      AdvSecurityGit/objects/00/37b8910af714679a0bfc812e84f615e68a1e5e
  35. BIN
      AdvSecurityGit/objects/00/390f1cfd58707aca53f8dec74dc7b842985f40
  36. BIN
      AdvSecurityGit/objects/00/3cffed25a623627cd80f5b9b55c068b1b2d06f
  37. BIN
      AdvSecurityGit/objects/00/4acba6257ffbeca02969db2b24f44ea34238ab
  38. BIN
      AdvSecurityGit/objects/00/52448480892b0a5d85377d7b0b7ab3d84994a0
  39. BIN
      AdvSecurityGit/objects/00/56b19be45de123297c2b4d4161859301f878be
  40. BIN
      AdvSecurityGit/objects/00/76a2d98d2c5cacbf306be47b5dfbbae372e90d
  41. BIN
      AdvSecurityGit/objects/00/76fca14449cf1e491003c8008fe81b07fa8340
  42. BIN
      AdvSecurityGit/objects/00/77a235cd225464dd4b0c82bfd54f9bbc683779
  43. BIN
      AdvSecurityGit/objects/00/795998f43263dd15a4b0dec504599449cf8b9f
  44. BIN
      AdvSecurityGit/objects/00/7b3f4132b592550ea922cefa1530ae610e857d
  45. 1 0
      AdvSecurityGit/objects/00/7b4a89e1bd07d688a0d320d58e552f967b42cd
  46. BIN
      AdvSecurityGit/objects/00/7ce20ccba408880ef6486553b5b511165b3886
  47. BIN
      AdvSecurityGit/objects/00/7dea8a40cbcc8148fbbccf356aa1a70beee72b
  48. BIN
      AdvSecurityGit/objects/00/82014dc9c3d6d4242f5b8e07c2efecc1faa1e0
  49. BIN
      AdvSecurityGit/objects/00/83bcdbfd20ccc90cc18e3414373706d5e94e79
  50. BIN
      AdvSecurityGit/objects/00/9e9730ca6ab01ae44b251ca8fb0cdc03db6189
  51. BIN
      AdvSecurityGit/objects/00/a07e983cd4234cebc35be2847078a42422e972
  52. BIN
      AdvSecurityGit/objects/00/a6b41bc4351d1563af0b8de22c4620f3b8c9c6
  53. BIN
      AdvSecurityGit/objects/00/af6a8710d9b6848c1d7f07a87cd131b37d9bc1
  54. BIN
      AdvSecurityGit/objects/00/b6f84aa8f243fb2bf4f96b8a4c7d6581f744d8
  55. BIN
      AdvSecurityGit/objects/00/bfd330679f35935bc2d0f1462998eb81b64550
  56. BIN
      AdvSecurityGit/objects/00/c822ee4933d0ed5afeec0912eaa454434ebf04
  57. 7 0
      AdvSecurityGit/objects/00/e50f9b6ea55a2d4d8dd3944af2f5f41f639c40
  58. BIN
      AdvSecurityGit/objects/00/eb45bc45f248eaa571de9377e0dfe2a327cfa3
  59. BIN
      AdvSecurityGit/objects/00/ebf77933f0c5455a5a130b6da4a0666f55b2d7
  60. BIN
      AdvSecurityGit/objects/00/f87545ebb51775b48ba832c52488d8ed9da312
  61. BIN
      AdvSecurityGit/objects/00/fe6cd36502867949aaab5fabd9bf1cb4c81008
  62. BIN
      AdvSecurityGit/objects/01/0e65f3b0c8a8abbbfc6ce0df8113a7f8943b9b
  63. BIN
      AdvSecurityGit/objects/01/20645fb2a7c31c5c545fd9e4b0ecfce81d29cb
  64. BIN
      AdvSecurityGit/objects/01/2eab27f3643322ab73ded026e61f93f3474caa
  65. BIN
      AdvSecurityGit/objects/01/2ff19e88667f50bb0f6547131e4ed4b1b787cb
  66. BIN
      AdvSecurityGit/objects/01/31c6398925b04d558f4d369081a69aab8a89e3
  67. BIN
      AdvSecurityGit/objects/01/353bcdd0d2ff3d2722b8e034bdf1b9c5bbe4f8
  68. BIN
      AdvSecurityGit/objects/01/3a75ab63bff1460ca49871bb515d2018837f04
  69. 5 0
      AdvSecurityGit/objects/01/3ccf9f2d08c1152f6004bdc2c531cc447f6bd8
  70. BIN
      AdvSecurityGit/objects/01/4b332b916649044b1f4d8da2dfbec202c99545
  71. BIN
      AdvSecurityGit/objects/01/524eba0435969e5245311550d1bfcb77075307
  72. BIN
      AdvSecurityGit/objects/01/54eeda23494f113a37f8520051b09444663d04
  73. BIN
      AdvSecurityGit/objects/01/555f6c4bf8bb179c4a0008cebff927ed7f97e1
  74. BIN
      AdvSecurityGit/objects/01/58724223fbdfc83962d89188de8f3874691678
  75. BIN
      AdvSecurityGit/objects/01/6259b7089b7f4af3e1a6e640e8040f89872ed1
  76. BIN
      AdvSecurityGit/objects/01/65d8dcc325423579be2345b1cd224d98bba2d2
  77. BIN
      AdvSecurityGit/objects/01/6991743278c4fb01e775c7e7f545ab8001dae8
  78. BIN
      AdvSecurityGit/objects/01/6ebc96091ed625588684084d468981b7261540
  79. BIN
      AdvSecurityGit/objects/01/77a62dca274f97e2cdfb74b589dc88309dd160
  80. BIN
      AdvSecurityGit/objects/01/79f8126af747bcb510cd8c7bb2350a7dde0ed9
  81. 1 0
      AdvSecurityGit/objects/01/85b8d3adceb0e797d077856b01b51bfff5aaa9
  82. BIN
      AdvSecurityGit/objects/01/8d3bfb474f7286b5531f8dd4b4de1b9a126620
  83. BIN
      AdvSecurityGit/objects/01/9115b8a5957b5bc635c6314b073de633bbc47f
  84. BIN
      AdvSecurityGit/objects/01/9c7e979c0e5ecbfee80ee60cdcff1cd03a5625
  85. BIN
      AdvSecurityGit/objects/01/a48f62a6fc4d304b6306280185d0b261b34077
  86. BIN
      AdvSecurityGit/objects/01/a793c84675ed9b879bf08bb2233b94a066583b
  87. BIN
      AdvSecurityGit/objects/01/b5dcb8df5d5baeb799cfd3eda35c2e09403899
  88. BIN
      AdvSecurityGit/objects/01/bb06c4dbb9325802e43c9d6844dcbbc47c4e6d
  89. BIN
      AdvSecurityGit/objects/01/d0803e5c4a7005e44ea2d06da791457b4b2384
  90. BIN
      AdvSecurityGit/objects/01/d3ed542a8a18f330558a577cafbf49d28530cf
  91. BIN
      AdvSecurityGit/objects/01/daf56f015f3c2c4c5a1854a476098a941467f2
  92. BIN
      AdvSecurityGit/objects/01/de891a154f4a5cba9eee1f3cf380736c4bc520
  93. BIN
      AdvSecurityGit/objects/01/e2a038d4745b4cec400a5909fbbe701cbbb5d2
  94. BIN
      AdvSecurityGit/objects/01/e437949afa7f7711c5494c169b74758679494a
  95. BIN
      AdvSecurityGit/objects/01/e7aff1b53b3619971064beb93ad7d2470d7c8e
  96. BIN
      AdvSecurityGit/objects/01/ec9a29a1c115c7f1e3813b7cd75eb5697c6799
  97. BIN
      AdvSecurityGit/objects/01/ee307a71d844cbebb2f2c3b1df5fc06096d1e1
  98. BIN
      AdvSecurityGit/objects/01/f47a3c71ea647d8cfd7557ed6ad9b1f46a37bd
  99. BIN
      AdvSecurityGit/objects/01/f681713af36707eb11cc82f938ad615fc41c08
  100. BIN
      AdvSecurityGit/objects/01/f981acec9bac26971ef2bbd6559ef466ef52c1

+ 1 - 0
.gitignore

@@ -21,6 +21,7 @@ bld/
 [Bb]in/
 [Oo]bj/
 [Ll]og/
+OriginGit/
 
 # Visual Studio 2015 cache/options directory
 .vs/

+ 1 - 0
AdvSecurityGit/COMMIT_EDITMSG

@@ -0,0 +1 @@
+Sync updates from DockerEBUS in general repo(Commit SHA:d44462c)to security repo

+ 1 - 0
AdvSecurityGit/HEAD

@@ -0,0 +1 @@
+ref: refs/heads/DockerEBUS

+ 13 - 0
AdvSecurityGit/config

@@ -0,0 +1,13 @@
+[core]
+	repositoryformatversion = 0
+	filemode = false
+	bare = false
+	logallrefupdates = true
+	symlinks = false
+	ignorecase = true
+[remote "origin"]
+	url = https://ZerovaSD@dev.azure.com/ZerovaSD/Code%20Security/_git/EVCB_OCPP.Common
+	fetch = +refs/heads/*:refs/remotes/origin/*
+[branch "DockerEBUS"]
+	remote = origin
+	merge = refs/heads/DockerEBUS

+ 1 - 0
AdvSecurityGit/description

@@ -0,0 +1 @@
+Unnamed repository; edit this file 'description' to name the repository.

+ 15 - 0
AdvSecurityGit/hooks/applypatch-msg.sample

@@ -0,0 +1,15 @@
+#!/bin/sh
+#
+# An example hook script to check the commit log message taken by
+# applypatch from an e-mail message.
+#
+# The hook should exit with non-zero status after issuing an
+# appropriate message if it wants to stop the commit.  The hook is
+# allowed to edit the commit message file.
+#
+# To enable this hook, rename this file to "applypatch-msg".
+
+. git-sh-setup
+commitmsg="$(git rev-parse --git-path hooks/commit-msg)"
+test -x "$commitmsg" && exec "$commitmsg" ${1+"$@"}
+:

+ 24 - 0
AdvSecurityGit/hooks/commit-msg.sample

@@ -0,0 +1,24 @@
+#!/bin/sh
+#
+# An example hook script to check the commit log message.
+# Called by "git commit" with one argument, the name of the file
+# that has the commit message.  The hook should exit with non-zero
+# status after issuing an appropriate message if it wants to stop the
+# commit.  The hook is allowed to edit the commit message file.
+#
+# To enable this hook, rename this file to "commit-msg".
+
+# Uncomment the below to add a Signed-off-by line to the message.
+# Doing this in a hook is a bad idea in general, but the prepare-commit-msg
+# hook is more suited to it.
+#
+# SOB=$(git var GIT_AUTHOR_IDENT | sed -n 's/^\(.*>\).*$/Signed-off-by: \1/p')
+# grep -qs "^$SOB" "$1" || echo "$SOB" >> "$1"
+
+# This example catches duplicate Signed-off-by lines.
+
+test "" = "$(grep '^Signed-off-by: ' "$1" |
+	 sort | uniq -c | sed -e '/^[ 	]*1[ 	]/d')" || {
+	echo >&2 Duplicate Signed-off-by lines.
+	exit 1
+}

+ 174 - 0
AdvSecurityGit/hooks/fsmonitor-watchman.sample

@@ -0,0 +1,174 @@
+#!/usr/bin/perl
+
+use strict;
+use warnings;
+use IPC::Open2;
+
+# An example hook script to integrate Watchman
+# (https://facebook.github.io/watchman/) with git to speed up detecting
+# new and modified files.
+#
+# The hook is passed a version (currently 2) and last update token
+# formatted as a string and outputs to stdout a new update token and
+# all files that have been modified since the update token. Paths must
+# be relative to the root of the working tree and separated by a single NUL.
+#
+# To enable this hook, rename this file to "query-watchman" and set
+# 'git config core.fsmonitor .git/hooks/query-watchman'
+#
+my ($version, $last_update_token) = @ARGV;
+
+# Uncomment for debugging
+# print STDERR "$0 $version $last_update_token\n";
+
+# Check the hook interface version
+if ($version ne 2) {
+	die "Unsupported query-fsmonitor hook version '$version'.\n" .
+	    "Falling back to scanning...\n";
+}
+
+my $git_work_tree = get_working_dir();
+
+my $retry = 1;
+
+my $json_pkg;
+eval {
+	require JSON::XS;
+	$json_pkg = "JSON::XS";
+	1;
+} or do {
+	require JSON::PP;
+	$json_pkg = "JSON::PP";
+};
+
+launch_watchman();
+
+sub launch_watchman {
+	my $o = watchman_query();
+	if (is_work_tree_watched($o)) {
+		output_result($o->{clock}, @{$o->{files}});
+	}
+}
+
+sub output_result {
+	my ($clockid, @files) = @_;
+
+	# Uncomment for debugging watchman output
+	# open (my $fh, ">", ".git/watchman-output.out");
+	# binmode $fh, ":utf8";
+	# print $fh "$clockid\n@files\n";
+	# close $fh;
+
+	binmode STDOUT, ":utf8";
+	print $clockid;
+	print "\0";
+	local $, = "\0";
+	print @files;
+}
+
+sub watchman_clock {
+	my $response = qx/watchman clock "$git_work_tree"/;
+	die "Failed to get clock id on '$git_work_tree'.\n" .
+		"Falling back to scanning...\n" if $? != 0;
+
+	return $json_pkg->new->utf8->decode($response);
+}
+
+sub watchman_query {
+	my $pid = open2(\*CHLD_OUT, \*CHLD_IN, 'watchman -j --no-pretty')
+	or die "open2() failed: $!\n" .
+	"Falling back to scanning...\n";
+
+	# In the query expression below we're asking for names of files that
+	# changed since $last_update_token but not from the .git folder.
+	#
+	# To accomplish this, we're using the "since" generator to use the
+	# recency index to select candidate nodes and "fields" to limit the
+	# output to file names only. Then we're using the "expression" term to
+	# further constrain the results.
+	my $last_update_line = "";
+	if (substr($last_update_token, 0, 1) eq "c") {
+		$last_update_token = "\"$last_update_token\"";
+		$last_update_line = qq[\n"since": $last_update_token,];
+	}
+	my $query = <<"	END";
+		["query", "$git_work_tree", {$last_update_line
+			"fields": ["name"],
+			"expression": ["not", ["dirname", ".git"]]
+		}]
+	END
+
+	# Uncomment for debugging the watchman query
+	# open (my $fh, ">", ".git/watchman-query.json");
+	# print $fh $query;
+	# close $fh;
+
+	print CHLD_IN $query;
+	close CHLD_IN;
+	my $response = do {local $/; <CHLD_OUT>};
+
+	# Uncomment for debugging the watch response
+	# open ($fh, ">", ".git/watchman-response.json");
+	# print $fh $response;
+	# close $fh;
+
+	die "Watchman: command returned no output.\n" .
+	"Falling back to scanning...\n" if $response eq "";
+	die "Watchman: command returned invalid output: $response\n" .
+	"Falling back to scanning...\n" unless $response =~ /^\{/;
+
+	return $json_pkg->new->utf8->decode($response);
+}
+
+sub is_work_tree_watched {
+	my ($output) = @_;
+	my $error = $output->{error};
+	if ($retry > 0 and $error and $error =~ m/unable to resolve root .* directory (.*) is not watched/) {
+		$retry--;
+		my $response = qx/watchman watch "$git_work_tree"/;
+		die "Failed to make watchman watch '$git_work_tree'.\n" .
+		    "Falling back to scanning...\n" if $? != 0;
+		$output = $json_pkg->new->utf8->decode($response);
+		$error = $output->{error};
+		die "Watchman: $error.\n" .
+		"Falling back to scanning...\n" if $error;
+
+		# Uncomment for debugging watchman output
+		# open (my $fh, ">", ".git/watchman-output.out");
+		# close $fh;
+
+		# Watchman will always return all files on the first query so
+		# return the fast "everything is dirty" flag to git and do the
+		# Watchman query just to get it over with now so we won't pay
+		# the cost in git to look up each individual file.
+		my $o = watchman_clock();
+		$error = $output->{error};
+
+		die "Watchman: $error.\n" .
+		"Falling back to scanning...\n" if $error;
+
+		output_result($o->{clock}, ("/"));
+		$last_update_token = $o->{clock};
+
+		eval { launch_watchman() };
+		return 0;
+	}
+
+	die "Watchman: $error.\n" .
+	"Falling back to scanning...\n" if $error;
+
+	return 1;
+}
+
+sub get_working_dir {
+	my $working_dir;
+	if ($^O =~ 'msys' || $^O =~ 'cygwin') {
+		$working_dir = Win32::GetCwd();
+		$working_dir =~ tr/\\/\//;
+	} else {
+		require Cwd;
+		$working_dir = Cwd::cwd();
+	}
+
+	return $working_dir;
+}

+ 8 - 0
AdvSecurityGit/hooks/post-update.sample

@@ -0,0 +1,8 @@
+#!/bin/sh
+#
+# An example hook script to prepare a packed repository for use over
+# dumb transports.
+#
+# To enable this hook, rename this file to "post-update".
+
+exec git update-server-info

+ 14 - 0
AdvSecurityGit/hooks/pre-applypatch.sample

@@ -0,0 +1,14 @@
+#!/bin/sh
+#
+# An example hook script to verify what is about to be committed
+# by applypatch from an e-mail message.
+#
+# The hook should exit with non-zero status after issuing an
+# appropriate message if it wants to stop the commit.
+#
+# To enable this hook, rename this file to "pre-applypatch".
+
+. git-sh-setup
+precommit="$(git rev-parse --git-path hooks/pre-commit)"
+test -x "$precommit" && exec "$precommit" ${1+"$@"}
+:

+ 49 - 0
AdvSecurityGit/hooks/pre-commit.sample

@@ -0,0 +1,49 @@
+#!/bin/sh
+#
+# An example hook script to verify what is about to be committed.
+# Called by "git commit" with no arguments.  The hook should
+# exit with non-zero status after issuing an appropriate message if
+# it wants to stop the commit.
+#
+# To enable this hook, rename this file to "pre-commit".
+
+if git rev-parse --verify HEAD >/dev/null 2>&1
+then
+	against=HEAD
+else
+	# Initial commit: diff against an empty tree object
+	against=$(git hash-object -t tree /dev/null)
+fi
+
+# If you want to allow non-ASCII filenames set this variable to true.
+allownonascii=$(git config --type=bool hooks.allownonascii)
+
+# Redirect output to stderr.
+exec 1>&2
+
+# Cross platform projects tend to avoid non-ASCII filenames; prevent
+# them from being added to the repository. We exploit the fact that the
+# printable range starts at the space character and ends with tilde.
+if [ "$allownonascii" != "true" ] &&
+	# Note that the use of brackets around a tr range is ok here, (it's
+	# even required, for portability to Solaris 10's /usr/bin/tr), since
+	# the square bracket bytes happen to fall in the designated range.
+	test $(git diff-index --cached --name-only --diff-filter=A -z $against |
+	  LC_ALL=C tr -d '[ -~]\0' | wc -c) != 0
+then
+	cat <<\EOF
+Error: Attempt to add a non-ASCII file name.
+
+This can cause problems if you want to work with people on other platforms.
+
+To be portable it is advisable to rename the file.
+
+If you know what you are doing you can disable this check using:
+
+  git config hooks.allownonascii true
+EOF
+	exit 1
+fi
+
+# If there are whitespace errors, print the offending file names and fail.
+exec git diff-index --check --cached $against --

+ 13 - 0
AdvSecurityGit/hooks/pre-merge-commit.sample

@@ -0,0 +1,13 @@
+#!/bin/sh
+#
+# An example hook script to verify what is about to be committed.
+# Called by "git merge" with no arguments.  The hook should
+# exit with non-zero status after issuing an appropriate message to
+# stderr if it wants to stop the merge commit.
+#
+# To enable this hook, rename this file to "pre-merge-commit".
+
+. git-sh-setup
+test -x "$GIT_DIR/hooks/pre-commit" &&
+        exec "$GIT_DIR/hooks/pre-commit"
+:

+ 53 - 0
AdvSecurityGit/hooks/pre-push.sample

@@ -0,0 +1,53 @@
+#!/bin/sh
+
+# An example hook script to verify what is about to be pushed.  Called by "git
+# push" after it has checked the remote status, but before anything has been
+# pushed.  If this script exits with a non-zero status nothing will be pushed.
+#
+# This hook is called with the following parameters:
+#
+# $1 -- Name of the remote to which the push is being done
+# $2 -- URL to which the push is being done
+#
+# If pushing without using a named remote those arguments will be equal.
+#
+# Information about the commits which are being pushed is supplied as lines to
+# the standard input in the form:
+#
+#   <local ref> <local oid> <remote ref> <remote oid>
+#
+# This sample shows how to prevent push of commits where the log message starts
+# with "WIP" (work in progress).
+
+remote="$1"
+url="$2"
+
+zero=$(git hash-object --stdin </dev/null | tr '[0-9a-f]' '0')
+
+while read local_ref local_oid remote_ref remote_oid
+do
+	if test "$local_oid" = "$zero"
+	then
+		# Handle delete
+		:
+	else
+		if test "$remote_oid" = "$zero"
+		then
+			# New branch, examine all commits
+			range="$local_oid"
+		else
+			# Update to existing branch, examine new commits
+			range="$remote_oid..$local_oid"
+		fi
+
+		# Check for WIP commit
+		commit=$(git rev-list -n 1 --grep '^WIP' "$range")
+		if test -n "$commit"
+		then
+			echo >&2 "Found WIP commit in $local_ref, not pushing"
+			exit 1
+		fi
+	fi
+done
+
+exit 0

+ 169 - 0
AdvSecurityGit/hooks/pre-rebase.sample

@@ -0,0 +1,169 @@
+#!/bin/sh
+#
+# Copyright (c) 2006, 2008 Junio C Hamano
+#
+# The "pre-rebase" hook is run just before "git rebase" starts doing
+# its job, and can prevent the command from running by exiting with
+# non-zero status.
+#
+# The hook is called with the following parameters:
+#
+# $1 -- the upstream the series was forked from.
+# $2 -- the branch being rebased (or empty when rebasing the current branch).
+#
+# This sample shows how to prevent topic branches that are already
+# merged to 'next' branch from getting rebased, because allowing it
+# would result in rebasing already published history.
+
+publish=next
+basebranch="$1"
+if test "$#" = 2
+then
+	topic="refs/heads/$2"
+else
+	topic=`git symbolic-ref HEAD` ||
+	exit 0 ;# we do not interrupt rebasing detached HEAD
+fi
+
+case "$topic" in
+refs/heads/??/*)
+	;;
+*)
+	exit 0 ;# we do not interrupt others.
+	;;
+esac
+
+# Now we are dealing with a topic branch being rebased
+# on top of master.  Is it OK to rebase it?
+
+# Does the topic really exist?
+git show-ref -q "$topic" || {
+	echo >&2 "No such branch $topic"
+	exit 1
+}
+
+# Is topic fully merged to master?
+not_in_master=`git rev-list --pretty=oneline ^master "$topic"`
+if test -z "$not_in_master"
+then
+	echo >&2 "$topic is fully merged to master; better remove it."
+	exit 1 ;# we could allow it, but there is no point.
+fi
+
+# Is topic ever merged to next?  If so you should not be rebasing it.
+only_next_1=`git rev-list ^master "^$topic" ${publish} | sort`
+only_next_2=`git rev-list ^master           ${publish} | sort`
+if test "$only_next_1" = "$only_next_2"
+then
+	not_in_topic=`git rev-list "^$topic" master`
+	if test -z "$not_in_topic"
+	then
+		echo >&2 "$topic is already up to date with master"
+		exit 1 ;# we could allow it, but there is no point.
+	else
+		exit 0
+	fi
+else
+	not_in_next=`git rev-list --pretty=oneline ^${publish} "$topic"`
+	/usr/bin/perl -e '
+		my $topic = $ARGV[0];
+		my $msg = "* $topic has commits already merged to public branch:\n";
+		my (%not_in_next) = map {
+			/^([0-9a-f]+) /;
+			($1 => 1);
+		} split(/\n/, $ARGV[1]);
+		for my $elem (map {
+				/^([0-9a-f]+) (.*)$/;
+				[$1 => $2];
+			} split(/\n/, $ARGV[2])) {
+			if (!exists $not_in_next{$elem->[0]}) {
+				if ($msg) {
+					print STDERR $msg;
+					undef $msg;
+				}
+				print STDERR " $elem->[1]\n";
+			}
+		}
+	' "$topic" "$not_in_next" "$not_in_master"
+	exit 1
+fi
+
+<<\DOC_END
+
+This sample hook safeguards topic branches that have been
+published from being rewound.
+
+The workflow assumed here is:
+
+ * Once a topic branch forks from "master", "master" is never
+   merged into it again (either directly or indirectly).
+
+ * Once a topic branch is fully cooked and merged into "master",
+   it is deleted.  If you need to build on top of it to correct
+   earlier mistakes, a new topic branch is created by forking at
+   the tip of the "master".  This is not strictly necessary, but
+   it makes it easier to keep your history simple.
+
+ * Whenever you need to test or publish your changes to topic
+   branches, merge them into "next" branch.
+
+The script, being an example, hardcodes the publish branch name
+to be "next", but it is trivial to make it configurable via
+$GIT_DIR/config mechanism.
+
+With this workflow, you would want to know:
+
+(1) ... if a topic branch has ever been merged to "next".  Young
+    topic branches can have stupid mistakes you would rather
+    clean up before publishing, and things that have not been
+    merged into other branches can be easily rebased without
+    affecting other people.  But once it is published, you would
+    not want to rewind it.
+
+(2) ... if a topic branch has been fully merged to "master".
+    Then you can delete it.  More importantly, you should not
+    build on top of it -- other people may already want to
+    change things related to the topic as patches against your
+    "master", so if you need further changes, it is better to
+    fork the topic (perhaps with the same name) afresh from the
+    tip of "master".
+
+Let's look at this example:
+
+		   o---o---o---o---o---o---o---o---o---o "next"
+		  /       /           /           /
+		 /   a---a---b A     /           /
+		/   /               /           /
+	       /   /   c---c---c---c B         /
+	      /   /   /             \         /
+	     /   /   /   b---b C     \       /
+	    /   /   /   /             \     /
+    ---o---o---o---o---o---o---o---o---o---o---o "master"
+
+
+A, B and C are topic branches.
+
+ * A has one fix since it was merged up to "next".
+
+ * B has finished.  It has been fully merged up to "master" and "next",
+   and is ready to be deleted.
+
+ * C has not merged to "next" at all.
+
+We would want to allow C to be rebased, refuse A, and encourage
+B to be deleted.
+
+To compute (1):
+
+	git rev-list ^master ^topic next
+	git rev-list ^master        next
+
+	if these match, topic has not merged in next at all.
+
+To compute (2):
+
+	git rev-list master..topic
+
+	if this is empty, it is fully merged to "master".
+
+DOC_END

+ 24 - 0
AdvSecurityGit/hooks/pre-receive.sample

@@ -0,0 +1,24 @@
+#!/bin/sh
+#
+# An example hook script to make use of push options.
+# The example simply echoes all push options that start with 'echoback='
+# and rejects all pushes when the "reject" push option is used.
+#
+# To enable this hook, rename this file to "pre-receive".
+
+if test -n "$GIT_PUSH_OPTION_COUNT"
+then
+	i=0
+	while test "$i" -lt "$GIT_PUSH_OPTION_COUNT"
+	do
+		eval "value=\$GIT_PUSH_OPTION_$i"
+		case "$value" in
+		echoback=*)
+			echo "echo from the pre-receive-hook: ${value#*=}" >&2
+			;;
+		reject)
+			exit 1
+		esac
+		i=$((i + 1))
+	done
+fi

+ 42 - 0
AdvSecurityGit/hooks/prepare-commit-msg.sample

@@ -0,0 +1,42 @@
+#!/bin/sh
+#
+# An example hook script to prepare the commit log message.
+# Called by "git commit" with the name of the file that has the
+# commit message, followed by the description of the commit
+# message's source.  The hook's purpose is to edit the commit
+# message file.  If the hook fails with a non-zero status,
+# the commit is aborted.
+#
+# To enable this hook, rename this file to "prepare-commit-msg".
+
+# This hook includes three examples. The first one removes the
+# "# Please enter the commit message..." help message.
+#
+# The second includes the output of "git diff --name-status -r"
+# into the message, just before the "git status" output.  It is
+# commented because it doesn't cope with --amend or with squashed
+# commits.
+#
+# The third example adds a Signed-off-by line to the message, that can
+# still be edited.  This is rarely a good idea.
+
+COMMIT_MSG_FILE=$1
+COMMIT_SOURCE=$2
+SHA1=$3
+
+/usr/bin/perl -i.bak -ne 'print unless(m/^. Please enter the commit message/..m/^#$/)' "$COMMIT_MSG_FILE"
+
+# case "$COMMIT_SOURCE,$SHA1" in
+#  ,|template,)
+#    /usr/bin/perl -i.bak -pe '
+#       print "\n" . `git diff --cached --name-status -r`
+# 	 if /^#/ && $first++ == 0' "$COMMIT_MSG_FILE" ;;
+#  *) ;;
+# esac
+
+# SOB=$(git var GIT_COMMITTER_IDENT | sed -n 's/^\(.*>\).*$/Signed-off-by: \1/p')
+# git interpret-trailers --in-place --trailer "$SOB" "$COMMIT_MSG_FILE"
+# if test -z "$COMMIT_SOURCE"
+# then
+#   /usr/bin/perl -i.bak -pe 'print "\n" if !$first_line++' "$COMMIT_MSG_FILE"
+# fi

+ 78 - 0
AdvSecurityGit/hooks/push-to-checkout.sample

@@ -0,0 +1,78 @@
+#!/bin/sh
+
+# An example hook script to update a checked-out tree on a git push.
+#
+# This hook is invoked by git-receive-pack(1) when it reacts to git
+# push and updates reference(s) in its repository, and when the push
+# tries to update the branch that is currently checked out and the
+# receive.denyCurrentBranch configuration variable is set to
+# updateInstead.
+#
+# By default, such a push is refused if the working tree and the index
+# of the remote repository has any difference from the currently
+# checked out commit; when both the working tree and the index match
+# the current commit, they are updated to match the newly pushed tip
+# of the branch. This hook is to be used to override the default
+# behaviour; however the code below reimplements the default behaviour
+# as a starting point for convenient modification.
+#
+# The hook receives the commit with which the tip of the current
+# branch is going to be updated:
+commit=$1
+
+# It can exit with a non-zero status to refuse the push (when it does
+# so, it must not modify the index or the working tree).
+die () {
+	echo >&2 "$*"
+	exit 1
+}
+
+# Or it can make any necessary changes to the working tree and to the
+# index to bring them to the desired state when the tip of the current
+# branch is updated to the new commit, and exit with a zero status.
+#
+# For example, the hook can simply run git read-tree -u -m HEAD "$1"
+# in order to emulate git fetch that is run in the reverse direction
+# with git push, as the two-tree form of git read-tree -u -m is
+# essentially the same as git switch or git checkout that switches
+# branches while keeping the local changes in the working tree that do
+# not interfere with the difference between the branches.
+
+# The below is a more-or-less exact translation to shell of the C code
+# for the default behaviour for git's push-to-checkout hook defined in
+# the push_to_deploy() function in builtin/receive-pack.c.
+#
+# Note that the hook will be executed from the repository directory,
+# not from the working tree, so if you want to perform operations on
+# the working tree, you will have to adapt your code accordingly, e.g.
+# by adding "cd .." or using relative paths.
+
+if ! git update-index -q --ignore-submodules --refresh
+then
+	die "Up-to-date check failed"
+fi
+
+if ! git diff-files --quiet --ignore-submodules --
+then
+	die "Working directory has unstaged changes"
+fi
+
+# This is a rough translation of:
+#
+#   head_has_history() ? "HEAD" : EMPTY_TREE_SHA1_HEX
+if git cat-file -e HEAD 2>/dev/null
+then
+	head=HEAD
+else
+	head=$(git hash-object -t tree --stdin </dev/null)
+fi
+
+if ! git diff-index --quiet --cached --ignore-submodules $head --
+then
+	die "Working directory has staged changes"
+fi
+
+if ! git read-tree -u -m "$commit"
+then
+	die "Could not update working tree to new HEAD"
+fi

+ 77 - 0
AdvSecurityGit/hooks/sendemail-validate.sample

@@ -0,0 +1,77 @@
+#!/bin/sh
+
+# An example hook script to validate a patch (and/or patch series) before
+# sending it via email.
+#
+# The hook should exit with non-zero status after issuing an appropriate
+# message if it wants to prevent the email(s) from being sent.
+#
+# To enable this hook, rename this file to "sendemail-validate".
+#
+# By default, it will only check that the patch(es) can be applied on top of
+# the default upstream branch without conflicts in a secondary worktree. After
+# validation (successful or not) of the last patch of a series, the worktree
+# will be deleted.
+#
+# The following config variables can be set to change the default remote and
+# remote ref that are used to apply the patches against:
+#
+#   sendemail.validateRemote (default: origin)
+#   sendemail.validateRemoteRef (default: HEAD)
+#
+# Replace the TODO placeholders with appropriate checks according to your
+# needs.
+
+validate_cover_letter () {
+	file="$1"
+	# TODO: Replace with appropriate checks (e.g. spell checking).
+	true
+}
+
+validate_patch () {
+	file="$1"
+	# Ensure that the patch applies without conflicts.
+	git am -3 "$file" || return
+	# TODO: Replace with appropriate checks for this patch
+	# (e.g. checkpatch.pl).
+	true
+}
+
+validate_series () {
+	# TODO: Replace with appropriate checks for the whole series
+	# (e.g. quick build, coding style checks, etc.).
+	true
+}
+
+# main -------------------------------------------------------------------------
+
+if test "$GIT_SENDEMAIL_FILE_COUNTER" = 1
+then
+	remote=$(git config --default origin --get sendemail.validateRemote) &&
+	ref=$(git config --default HEAD --get sendemail.validateRemoteRef) &&
+	worktree=$(mktemp --tmpdir -d sendemail-validate.XXXXXXX) &&
+	git worktree add -fd --checkout "$worktree" "refs/remotes/$remote/$ref" &&
+	git config --replace-all sendemail.validateWorktree "$worktree"
+else
+	worktree=$(git config --get sendemail.validateWorktree)
+fi || {
+	echo "sendemail-validate: error: failed to prepare worktree" >&2
+	exit 1
+}
+
+unset GIT_DIR GIT_WORK_TREE
+cd "$worktree" &&
+
+if grep -q "^diff --git " "$1"
+then
+	validate_patch "$1"
+else
+	validate_cover_letter "$1"
+fi &&
+
+if test "$GIT_SENDEMAIL_FILE_COUNTER" = "$GIT_SENDEMAIL_FILE_TOTAL"
+then
+	git config --unset-all sendemail.validateWorktree &&
+	trap 'git worktree remove -ff "$worktree"' EXIT &&
+	validate_series
+fi

+ 128 - 0
AdvSecurityGit/hooks/update.sample

@@ -0,0 +1,128 @@
+#!/bin/sh
+#
+# An example hook script to block unannotated tags from entering.
+# Called by "git receive-pack" with arguments: refname sha1-old sha1-new
+#
+# To enable this hook, rename this file to "update".
+#
+# Config
+# ------
+# hooks.allowunannotated
+#   This boolean sets whether unannotated tags will be allowed into the
+#   repository.  By default they won't be.
+# hooks.allowdeletetag
+#   This boolean sets whether deleting tags will be allowed in the
+#   repository.  By default they won't be.
+# hooks.allowmodifytag
+#   This boolean sets whether a tag may be modified after creation. By default
+#   it won't be.
+# hooks.allowdeletebranch
+#   This boolean sets whether deleting branches will be allowed in the
+#   repository.  By default they won't be.
+# hooks.denycreatebranch
+#   This boolean sets whether remotely creating branches will be denied
+#   in the repository.  By default this is allowed.
+#
+
+# --- Command line
+refname="$1"
+oldrev="$2"
+newrev="$3"
+
+# --- Safety check
+if [ -z "$GIT_DIR" ]; then
+	echo "Don't run this script from the command line." >&2
+	echo " (if you want, you could supply GIT_DIR then run" >&2
+	echo "  $0 <ref> <oldrev> <newrev>)" >&2
+	exit 1
+fi
+
+if [ -z "$refname" -o -z "$oldrev" -o -z "$newrev" ]; then
+	echo "usage: $0 <ref> <oldrev> <newrev>" >&2
+	exit 1
+fi
+
+# --- Config
+allowunannotated=$(git config --type=bool hooks.allowunannotated)
+allowdeletebranch=$(git config --type=bool hooks.allowdeletebranch)
+denycreatebranch=$(git config --type=bool hooks.denycreatebranch)
+allowdeletetag=$(git config --type=bool hooks.allowdeletetag)
+allowmodifytag=$(git config --type=bool hooks.allowmodifytag)
+
+# check for no description
+projectdesc=$(sed -e '1q' "$GIT_DIR/description")
+case "$projectdesc" in
+"Unnamed repository"* | "")
+	echo "*** Project description file hasn't been set" >&2
+	exit 1
+	;;
+esac
+
+# --- Check types
+# if $newrev is 0000...0000, it's a commit to delete a ref.
+zero=$(git hash-object --stdin </dev/null | tr '[0-9a-f]' '0')
+if [ "$newrev" = "$zero" ]; then
+	newrev_type=delete
+else
+	newrev_type=$(git cat-file -t $newrev)
+fi
+
+case "$refname","$newrev_type" in
+	refs/tags/*,commit)
+		# un-annotated tag
+		short_refname=${refname##refs/tags/}
+		if [ "$allowunannotated" != "true" ]; then
+			echo "*** The un-annotated tag, $short_refname, is not allowed in this repository" >&2
+			echo "*** Use 'git tag [ -a | -s ]' for tags you want to propagate." >&2
+			exit 1
+		fi
+		;;
+	refs/tags/*,delete)
+		# delete tag
+		if [ "$allowdeletetag" != "true" ]; then
+			echo "*** Deleting a tag is not allowed in this repository" >&2
+			exit 1
+		fi
+		;;
+	refs/tags/*,tag)
+		# annotated tag
+		if [ "$allowmodifytag" != "true" ] && git rev-parse $refname > /dev/null 2>&1
+		then
+			echo "*** Tag '$refname' already exists." >&2
+			echo "*** Modifying a tag is not allowed in this repository." >&2
+			exit 1
+		fi
+		;;
+	refs/heads/*,commit)
+		# branch
+		if [ "$oldrev" = "$zero" -a "$denycreatebranch" = "true" ]; then
+			echo "*** Creating a branch is not allowed in this repository" >&2
+			exit 1
+		fi
+		;;
+	refs/heads/*,delete)
+		# delete branch
+		if [ "$allowdeletebranch" != "true" ]; then
+			echo "*** Deleting a branch is not allowed in this repository" >&2
+			exit 1
+		fi
+		;;
+	refs/remotes/*,commit)
+		# tracking branch
+		;;
+	refs/remotes/*,delete)
+		# delete tracking branch
+		if [ "$allowdeletebranch" != "true" ]; then
+			echo "*** Deleting a tracking branch is not allowed in this repository" >&2
+			exit 1
+		fi
+		;;
+	*)
+		# Anything else (is there anything else?)
+		echo "*** Update hook: unknown type of update to ref $refname of type $newrev_type" >&2
+		exit 1
+		;;
+esac
+
+# --- Finished
+exit 0

BIN
AdvSecurityGit/index


+ 6 - 0
AdvSecurityGit/info/exclude

@@ -0,0 +1,6 @@
+# git ls-files --others --exclude-from=.git/info/exclude
+# Lines that start with '#' are comments.
+# For a project mostly in C, the following would be a good set of
+# exclude patterns (uncomment them if you want to use them):
+# *.[oa]
+# *~

+ 6 - 0
AdvSecurityGit/logs/HEAD

@@ -0,0 +1,6 @@
+0000000000000000000000000000000000000000 6407de91c447d5ae820fce3afbd944f925534d59 Jessica Tseng <jessica_tseng@zerovatech.com> 1731294806 +0800	commit (initial): git init
+6407de91c447d5ae820fce3afbd944f925534d59 0eea30108860e6faaf98ae0ac647db17fede3cb5 Jessica Tseng <jessica_tseng@zerovatech.com> 1731296283 +0800	commit: Sync updates from DockerEBUS in general repo(Commit SHA:abb7800)to security repo
+0eea30108860e6faaf98ae0ac647db17fede3cb5 e431c99b80bb65e7bde6bf2090281e8d1e3471e7 Jessica Tseng <jessica_tseng@zerovatech.com> 1731305277 +0800	commit: Sync updates from DockerEBUS in general repo(Commit SHA:1886081)to security repo
+e431c99b80bb65e7bde6bf2090281e8d1e3471e7 0e6ea5fa9209c8ce9e2391fed92290c1ebd6a926 Jessica Tseng <jessica_tseng@zerovatech.com> 1731401406 +0800	commit: git init
+0e6ea5fa9209c8ce9e2391fed92290c1ebd6a926 c10a48c6fc5518065c2db360b5692dda019c8d8a Jessica Tseng <jessica_tseng@zerovatech.com> 1731401510 +0800	commit: Remove directory OriginGit from version control
+c10a48c6fc5518065c2db360b5692dda019c8d8a d8614c5d2dfd279d09ba3bf7d19adbc2ba7598b8 Jessica Tseng <jessica_tseng@zerovatech.com> 1731401594 +0800	commit: Sync updates from DockerEBUS in general repo(Commit SHA:d44462c)to security repo

+ 6 - 0
AdvSecurityGit/logs/refs/heads/DockerEBUS

@@ -0,0 +1,6 @@
+0000000000000000000000000000000000000000 6407de91c447d5ae820fce3afbd944f925534d59 Jessica Tseng <jessica_tseng@zerovatech.com> 1731294806 +0800	commit (initial): git init
+6407de91c447d5ae820fce3afbd944f925534d59 0eea30108860e6faaf98ae0ac647db17fede3cb5 Jessica Tseng <jessica_tseng@zerovatech.com> 1731296283 +0800	commit: Sync updates from DockerEBUS in general repo(Commit SHA:abb7800)to security repo
+0eea30108860e6faaf98ae0ac647db17fede3cb5 e431c99b80bb65e7bde6bf2090281e8d1e3471e7 Jessica Tseng <jessica_tseng@zerovatech.com> 1731305277 +0800	commit: Sync updates from DockerEBUS in general repo(Commit SHA:1886081)to security repo
+e431c99b80bb65e7bde6bf2090281e8d1e3471e7 0e6ea5fa9209c8ce9e2391fed92290c1ebd6a926 Jessica Tseng <jessica_tseng@zerovatech.com> 1731401406 +0800	commit: git init
+0e6ea5fa9209c8ce9e2391fed92290c1ebd6a926 c10a48c6fc5518065c2db360b5692dda019c8d8a Jessica Tseng <jessica_tseng@zerovatech.com> 1731401510 +0800	commit: Remove directory OriginGit from version control
+c10a48c6fc5518065c2db360b5692dda019c8d8a d8614c5d2dfd279d09ba3bf7d19adbc2ba7598b8 Jessica Tseng <jessica_tseng@zerovatech.com> 1731401594 +0800	commit: Sync updates from DockerEBUS in general repo(Commit SHA:d44462c)to security repo

+ 6 - 0
AdvSecurityGit/logs/refs/remotes/origin/DockerEBUS

@@ -0,0 +1,6 @@
+0000000000000000000000000000000000000000 6407de91c447d5ae820fce3afbd944f925534d59 Jessica Tseng <jessica_tseng@zerovatech.com> 1731294857 +0800	update by push
+6407de91c447d5ae820fce3afbd944f925534d59 0eea30108860e6faaf98ae0ac647db17fede3cb5 Jessica Tseng <jessica_tseng@zerovatech.com> 1731296298 +0800	update by push
+0eea30108860e6faaf98ae0ac647db17fede3cb5 e431c99b80bb65e7bde6bf2090281e8d1e3471e7 Jessica Tseng <jessica_tseng@zerovatech.com> 1731305294 +0800	update by push
+e431c99b80bb65e7bde6bf2090281e8d1e3471e7 0e6ea5fa9209c8ce9e2391fed92290c1ebd6a926 Jessica Tseng <jessica_tseng@zerovatech.com> 1731401459 +0800	update by push
+0e6ea5fa9209c8ce9e2391fed92290c1ebd6a926 c10a48c6fc5518065c2db360b5692dda019c8d8a Jessica Tseng <jessica_tseng@zerovatech.com> 1731401518 +0800	update by push
+c10a48c6fc5518065c2db360b5692dda019c8d8a d8614c5d2dfd279d09ba3bf7d19adbc2ba7598b8 Jessica Tseng <jessica_tseng@zerovatech.com> 1731401596 +0800	update by push

BIN
AdvSecurityGit/objects/00/02d242d7ab8f20e0de9240723109dd588f1feb


BIN
AdvSecurityGit/objects/00/0364c3d26193164ae1ca2a0de90778ff236473


BIN
AdvSecurityGit/objects/00/1c072db22a6d53dd69a79ced2865c33dafec31


BIN
AdvSecurityGit/objects/00/22e9a1745f81c4b500f0091e7d4ecba51b9b7c


BIN
AdvSecurityGit/objects/00/2772ae8d79721cddec92321d91513072a404a9


BIN
AdvSecurityGit/objects/00/27df235fa98d2fbd89cc61ff53219ffb83f9a1


BIN
AdvSecurityGit/objects/00/2a799c107cbbe62904b66090b3119c08ab7eb9


BIN
AdvSecurityGit/objects/00/33ec542b0ad8db51346a37d5e709cb7383a5a0


BIN
AdvSecurityGit/objects/00/342ef0ae9c9ed581ebeb837147e8c9f6d12358


BIN
AdvSecurityGit/objects/00/37b8910af714679a0bfc812e84f615e68a1e5e


BIN
AdvSecurityGit/objects/00/390f1cfd58707aca53f8dec74dc7b842985f40


BIN
AdvSecurityGit/objects/00/3cffed25a623627cd80f5b9b55c068b1b2d06f


BIN
AdvSecurityGit/objects/00/4acba6257ffbeca02969db2b24f44ea34238ab


BIN
AdvSecurityGit/objects/00/52448480892b0a5d85377d7b0b7ab3d84994a0


BIN
AdvSecurityGit/objects/00/56b19be45de123297c2b4d4161859301f878be


BIN
AdvSecurityGit/objects/00/76a2d98d2c5cacbf306be47b5dfbbae372e90d


BIN
AdvSecurityGit/objects/00/76fca14449cf1e491003c8008fe81b07fa8340


BIN
AdvSecurityGit/objects/00/77a235cd225464dd4b0c82bfd54f9bbc683779


BIN
AdvSecurityGit/objects/00/795998f43263dd15a4b0dec504599449cf8b9f


BIN
AdvSecurityGit/objects/00/7b3f4132b592550ea922cefa1530ae610e857d


+ 1 - 0
AdvSecurityGit/objects/00/7b4a89e1bd07d688a0d320d58e552f967b42cd

@@ -0,0 +1 @@
+x+)JMU03c040031QHI64IM366·0NL33305MLL1MN266333I5°HL3²La°è7ˆ´]U(xdoÞ¿NÏË¥ëK¸û;

BIN
AdvSecurityGit/objects/00/7ce20ccba408880ef6486553b5b511165b3886


BIN
AdvSecurityGit/objects/00/7dea8a40cbcc8148fbbccf356aa1a70beee72b


BIN
AdvSecurityGit/objects/00/82014dc9c3d6d4242f5b8e07c2efecc1faa1e0


BIN
AdvSecurityGit/objects/00/83bcdbfd20ccc90cc18e3414373706d5e94e79


BIN
AdvSecurityGit/objects/00/9e9730ca6ab01ae44b251ca8fb0cdc03db6189


BIN
AdvSecurityGit/objects/00/a07e983cd4234cebc35be2847078a42422e972


BIN
AdvSecurityGit/objects/00/a6b41bc4351d1563af0b8de22c4620f3b8c9c6


BIN
AdvSecurityGit/objects/00/af6a8710d9b6848c1d7f07a87cd131b37d9bc1


BIN
AdvSecurityGit/objects/00/b6f84aa8f243fb2bf4f96b8a4c7d6581f744d8


BIN
AdvSecurityGit/objects/00/bfd330679f35935bc2d0f1462998eb81b64550


BIN
AdvSecurityGit/objects/00/c822ee4933d0ed5afeec0912eaa454434ebf04


+ 7 - 0
AdvSecurityGit/objects/00/e50f9b6ea55a2d4d8dd3944af2f5f41f639c40

@@ -0,0 +1,7 @@
+x┘RMs⌡0МY©┌{г▄э ╦иt&ЖxJ °i14: ЫВ▒l═u╕7iъ╬ЩxШ
+щAй⌠/{ЬщУY@и╬nщ┐▒#Y╧х╠г÷╗|┌SЛ:Ы┼}h√Я≈зT;,as%А
+тgЙ┌ХЦЪP	┤╠)п▐С┌У╘2╗Ф╝3v;жZМяюdd9┌R╗Л*т"Вёж+тЕ┤╥=╢╡
+╖яС
+б8╫)Sеё(FQRйJ
+P*▒ni
+6дQ(Б∙С╙²YHI▌мЁ⌡°╨ъ╛и#·@╬]Yb≈≥tj{▓oц─M║в%l©EЭ╬ж8В╤≤шЫZк░}╣┼Эhк╝oют]зРШх┌iР║л╪эОШ А╙+┬НбЭ©ryуУfI!┤Ям4бstOyгЫМ≈	÷аЁC╛_]∙©Ы╚└<╣н╩╠≈Х'+9c╘┬Eb= U,≤Pi■ M═▄9▐ДM╡Е[╙(╧К ╕6C^╥р┴ОDЭ(ЦЩЬ)z╧ЁСФ╞VЗ*жФw╢'╡@L∙╜╣М"Я
█7▄⌠wиG0√

BIN
AdvSecurityGit/objects/00/eb45bc45f248eaa571de9377e0dfe2a327cfa3


BIN
AdvSecurityGit/objects/00/ebf77933f0c5455a5a130b6da4a0666f55b2d7


BIN
AdvSecurityGit/objects/00/f87545ebb51775b48ba832c52488d8ed9da312


BIN
AdvSecurityGit/objects/00/fe6cd36502867949aaab5fabd9bf1cb4c81008


BIN
AdvSecurityGit/objects/01/0e65f3b0c8a8abbbfc6ce0df8113a7f8943b9b


BIN
AdvSecurityGit/objects/01/20645fb2a7c31c5c545fd9e4b0ecfce81d29cb


BIN
AdvSecurityGit/objects/01/2eab27f3643322ab73ded026e61f93f3474caa


BIN
AdvSecurityGit/objects/01/2ff19e88667f50bb0f6547131e4ed4b1b787cb


BIN
AdvSecurityGit/objects/01/31c6398925b04d558f4d369081a69aab8a89e3


BIN
AdvSecurityGit/objects/01/353bcdd0d2ff3d2722b8e034bdf1b9c5bbe4f8


BIN
AdvSecurityGit/objects/01/3a75ab63bff1460ca49871bb515d2018837f04


+ 5 - 0
AdvSecurityGit/objects/01/3ccf9f2d08c1152f6004bdc2c531cc447f6bd8

@@ -0,0 +1,5 @@
+x∙TMoс@ЕЛ_1гD╙U┬╢─B((┬р╗q{╘Zш⌠dИz7щ╚Mё\░z╙╦"!ШХ│_S═'ЧК▐8uр┌ПаЁСчл⌡}КP≥жО?|pОВЕВ■╓б<fёиьEFoxExk©СЛщN╖вС{":DЖВX*иИн▄m$C$©÷├аd╪хЛO┬1≥Ц┼/©c■б┬╔╚М©D█VF+иьhт╪mbTЧsа╒╜╣a▒┐√▓_K}╢
+П└≈C#▀"v╡Щ@пАщR^═Ютf
+<-╓╠┬VFR	Н▀чтw█сPи"%┬`цьga9╟B⌠хУНБQ┼дП╨Еk▌°zЫЦи_А█f∙^Tн─ыун▀юЦР┘ЭшiЭюТы╨Q4 сlяцAФ├НP;io╚УRЕюy╔)РЁш╛Jm╣Z╟Ii▓;yR▀^²²]╧ЭqЯЯвГ╞█КOГWГ??|[_Хи║╜lY\j~
+▒яз╧гьnЪ[©²РхXy Ш╨q╜╧му╨ы.I▀qё╜■9чJф<)FGnйlSlч5!b╦т`╫э┼йL|g$Л0;°пЁf Rбб	П▀└·qС─│╠Y╟Fm⌡9/╪ГWэ%s/╣cCш{Щ +А╤2+°■К5й[├3В;м{.qQ)b.║╬MoIё═vH■`7Р┘+Й.╥Х╗├│P└╥ЗВ&О╬P2vtЪb+С▄У;≥┐vбВнi
IZ█гP.╦?Wгhv?≥|╜ИS╔ж
+Cэl);■3oФЩу╝╩+

BIN
AdvSecurityGit/objects/01/4b332b916649044b1f4d8da2dfbec202c99545


BIN
AdvSecurityGit/objects/01/524eba0435969e5245311550d1bfcb77075307


BIN
AdvSecurityGit/objects/01/54eeda23494f113a37f8520051b09444663d04


BIN
AdvSecurityGit/objects/01/555f6c4bf8bb179c4a0008cebff927ed7f97e1


BIN
AdvSecurityGit/objects/01/58724223fbdfc83962d89188de8f3874691678


BIN
AdvSecurityGit/objects/01/6259b7089b7f4af3e1a6e640e8040f89872ed1


BIN
AdvSecurityGit/objects/01/65d8dcc325423579be2345b1cd224d98bba2d2


BIN
AdvSecurityGit/objects/01/6991743278c4fb01e775c7e7f545ab8001dae8


BIN
AdvSecurityGit/objects/01/6ebc96091ed625588684084d468981b7261540


BIN
AdvSecurityGit/objects/01/77a62dca274f97e2cdfb74b589dc88309dd160


BIN
AdvSecurityGit/objects/01/79f8126af747bcb510cd8c7bb2350a7dde0ed9


+ 1 - 0
AdvSecurityGit/objects/01/85b8d3adceb0e797d077856b01b51bfff5aaa9

@@ -0,0 +1 @@
+xe�AjÃ0E»Ö)t€"(…PÙÔmB !›nËXYr=‰	>Y9R®PÙ.m°g5óæÿ3…qž½<Ü.×@ÚîxÖ�ÇrÎî'‘8cPzí,‰Z¬µ)>´ý¡O~Œö5‚Š6":Ðœ1%RùûgòúµMÒT¤ èʼn`‡$²PäM…ÄΌǪBa´ähCÉ—º.�PcæÁê׃¨®-yˆÁÕâé±_uðÍ­q PMÙtTOyü×ÊàÝ4x@÷›ñù¯¼þsï›–µìŠÝu%

BIN
AdvSecurityGit/objects/01/8d3bfb474f7286b5531f8dd4b4de1b9a126620


BIN
AdvSecurityGit/objects/01/9115b8a5957b5bc635c6314b073de633bbc47f


BIN
AdvSecurityGit/objects/01/9c7e979c0e5ecbfee80ee60cdcff1cd03a5625


BIN
AdvSecurityGit/objects/01/a48f62a6fc4d304b6306280185d0b261b34077


BIN
AdvSecurityGit/objects/01/a793c84675ed9b879bf08bb2233b94a066583b


BIN
AdvSecurityGit/objects/01/b5dcb8df5d5baeb799cfd3eda35c2e09403899


BIN
AdvSecurityGit/objects/01/bb06c4dbb9325802e43c9d6844dcbbc47c4e6d


BIN
AdvSecurityGit/objects/01/d0803e5c4a7005e44ea2d06da791457b4b2384


BIN
AdvSecurityGit/objects/01/d3ed542a8a18f330558a577cafbf49d28530cf


BIN
AdvSecurityGit/objects/01/daf56f015f3c2c4c5a1854a476098a941467f2


BIN
AdvSecurityGit/objects/01/de891a154f4a5cba9eee1f3cf380736c4bc520


BIN
AdvSecurityGit/objects/01/e2a038d4745b4cec400a5909fbbe701cbbb5d2


BIN
AdvSecurityGit/objects/01/e437949afa7f7711c5494c169b74758679494a


BIN
AdvSecurityGit/objects/01/e7aff1b53b3619971064beb93ad7d2470d7c8e


BIN
AdvSecurityGit/objects/01/ec9a29a1c115c7f1e3813b7cd75eb5697c6799


BIN
AdvSecurityGit/objects/01/ee307a71d844cbebb2f2c3b1df5fc06096d1e1


BIN
AdvSecurityGit/objects/01/f47a3c71ea647d8cfd7557ed6ad9b1f46a37bd


BIN
AdvSecurityGit/objects/01/f681713af36707eb11cc82f938ad615fc41c08


BIN
AdvSecurityGit/objects/01/f981acec9bac26971ef2bbd6559ef466ef52c1


Some files were not shown because too many files changed in this diff