GuardianUnivalle-Benito-Yucra 0.1.38__tar.gz → 0.1.39__tar.gz
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of GuardianUnivalle-Benito-Yucra might be problematic. Click here for more details.
- guardianunivalle_benito_yucra-0.1.39/GuardianUnivalle_Benito_Yucra/detectores/detector_sql.py +124 -0
- {guardianunivalle_benito_yucra-0.1.38 → guardianunivalle_benito_yucra-0.1.39}/GuardianUnivalle_Benito_Yucra.egg-info/PKG-INFO +1 -1
- {guardianunivalle_benito_yucra-0.1.38 → guardianunivalle_benito_yucra-0.1.39}/PKG-INFO +1 -1
- {guardianunivalle_benito_yucra-0.1.38 → guardianunivalle_benito_yucra-0.1.39}/pyproject.toml +1 -1
- guardianunivalle_benito_yucra-0.1.38/GuardianUnivalle_Benito_Yucra/detectores/detector_sql.py +0 -187
- {guardianunivalle_benito_yucra-0.1.38 → guardianunivalle_benito_yucra-0.1.39}/GuardianUnivalle_Benito_Yucra/__init__.py +0 -0
- {guardianunivalle_benito_yucra-0.1.38 → guardianunivalle_benito_yucra-0.1.39}/GuardianUnivalle_Benito_Yucra/auditoria/registro_auditoria.py +0 -0
- {guardianunivalle_benito_yucra-0.1.38 → guardianunivalle_benito_yucra-0.1.39}/GuardianUnivalle_Benito_Yucra/criptografia/cifrado_aead.py +0 -0
- {guardianunivalle_benito_yucra-0.1.38 → guardianunivalle_benito_yucra-0.1.39}/GuardianUnivalle_Benito_Yucra/criptografia/intercambio_claves.py +0 -0
- {guardianunivalle_benito_yucra-0.1.38 → guardianunivalle_benito_yucra-0.1.39}/GuardianUnivalle_Benito_Yucra/criptografia/kdf.py +0 -0
- {guardianunivalle_benito_yucra-0.1.38 → guardianunivalle_benito_yucra-0.1.39}/GuardianUnivalle_Benito_Yucra/detectores/detector_csrf.py +0 -0
- {guardianunivalle_benito_yucra-0.1.38 → guardianunivalle_benito_yucra-0.1.39}/GuardianUnivalle_Benito_Yucra/detectores/detector_dos.py +0 -0
- {guardianunivalle_benito_yucra-0.1.38 → guardianunivalle_benito_yucra-0.1.39}/GuardianUnivalle_Benito_Yucra/detectores/detector_keylogger.py +0 -0
- {guardianunivalle_benito_yucra-0.1.38 → guardianunivalle_benito_yucra-0.1.39}/GuardianUnivalle_Benito_Yucra/detectores/detector_xss.py +0 -0
- {guardianunivalle_benito_yucra-0.1.38 → guardianunivalle_benito_yucra-0.1.39}/GuardianUnivalle_Benito_Yucra/middleware_web/middleware_web.py +0 -0
- {guardianunivalle_benito_yucra-0.1.38 → guardianunivalle_benito_yucra-0.1.39}/GuardianUnivalle_Benito_Yucra/mitigacion/limitador_peticion.py +0 -0
- {guardianunivalle_benito_yucra-0.1.38 → guardianunivalle_benito_yucra-0.1.39}/GuardianUnivalle_Benito_Yucra/mitigacion/lista_bloqueo.py +0 -0
- {guardianunivalle_benito_yucra-0.1.38 → guardianunivalle_benito_yucra-0.1.39}/GuardianUnivalle_Benito_Yucra/puntuacion/puntuacion_amenaza.py +0 -0
- {guardianunivalle_benito_yucra-0.1.38 → guardianunivalle_benito_yucra-0.1.39}/GuardianUnivalle_Benito_Yucra/utilidades.py +0 -0
- {guardianunivalle_benito_yucra-0.1.38 → guardianunivalle_benito_yucra-0.1.39}/GuardianUnivalle_Benito_Yucra.egg-info/SOURCES.txt +0 -0
- {guardianunivalle_benito_yucra-0.1.38 → guardianunivalle_benito_yucra-0.1.39}/GuardianUnivalle_Benito_Yucra.egg-info/dependency_links.txt +0 -0
- {guardianunivalle_benito_yucra-0.1.38 → guardianunivalle_benito_yucra-0.1.39}/GuardianUnivalle_Benito_Yucra.egg-info/requires.txt +0 -0
- {guardianunivalle_benito_yucra-0.1.38 → guardianunivalle_benito_yucra-0.1.39}/GuardianUnivalle_Benito_Yucra.egg-info/top_level.txt +0 -0
- {guardianunivalle_benito_yucra-0.1.38 → guardianunivalle_benito_yucra-0.1.39}/LICENSE +0 -0
- {guardianunivalle_benito_yucra-0.1.38 → guardianunivalle_benito_yucra-0.1.39}/README.md +0 -0
- {guardianunivalle_benito_yucra-0.1.38 → guardianunivalle_benito_yucra-0.1.39}/setup.cfg +0 -0
|
@@ -0,0 +1,124 @@
|
|
|
1
|
+
# sql_defense.py
|
|
2
|
+
# sql_defense.py - versión robusta y precisa
|
|
3
|
+
import json
|
|
4
|
+
import logging
|
|
5
|
+
import re
|
|
6
|
+
from django.utils.deprecation import MiddlewareMixin
|
|
7
|
+
from django.conf import settings
|
|
8
|
+
|
|
9
|
+
logger = logging.getLogger("sqlidefense")
|
|
10
|
+
logger.setLevel(logging.INFO)
|
|
11
|
+
if not logger.handlers:
|
|
12
|
+
handler = logging.StreamHandler()
|
|
13
|
+
handler.setFormatter(logging.Formatter("%(asctime)s - %(levelname)s - %(message)s"))
|
|
14
|
+
logger.addHandler(handler)
|
|
15
|
+
|
|
16
|
+
# Patrones organizados por nivel de severidad
|
|
17
|
+
SQL_PATTERNS = [
|
|
18
|
+
# Ataques fuertes (bloqueo inmediato)
|
|
19
|
+
(re.compile(r"\bunion\b\s+(all\s+)?\bselect\b", re.I), "Uso de UNION SELECT", 0.7),
|
|
20
|
+
(re.compile(r"\bor\b\s+'?\d+'?\s*=\s*'?\d+'?", re.I), "Tautología OR 1=1", 0.6),
|
|
21
|
+
(re.compile(r"\bselect\b.+\bfrom\b", re.I), "Consulta SQL SELECT-FROM", 0.5),
|
|
22
|
+
(re.compile(r"(--|#|/\*|\*/)", re.I), "Comentario SQL sospechoso", 0.4),
|
|
23
|
+
(re.compile(r"\b(drop|truncate|delete|insert|update)\b", re.I), "Manipulación SQL", 0.5),
|
|
24
|
+
(re.compile(r"exec\s*\(", re.I), "Ejecución de procedimiento almacenado", 0.6),
|
|
25
|
+
]
|
|
26
|
+
|
|
27
|
+
# Campos que deben ser analizados con cuidado o ignorados
|
|
28
|
+
IGNORED_FIELDS = ["password", "csrfmiddlewaretoken", "token", "auth"]
|
|
29
|
+
|
|
30
|
+
def get_client_ip(request):
|
|
31
|
+
x_forwarded_for = request.META.get("HTTP_X_FORWARDED_FOR")
|
|
32
|
+
if x_forwarded_for:
|
|
33
|
+
return x_forwarded_for.split(",")[0].strip()
|
|
34
|
+
return request.META.get("REMOTE_ADDR", "")
|
|
35
|
+
|
|
36
|
+
def extract_body(request):
|
|
37
|
+
try:
|
|
38
|
+
if "application/json" in request.META.get("CONTENT_TYPE", ""):
|
|
39
|
+
data = json.loads(request.body.decode("utf-8") or "{}")
|
|
40
|
+
else:
|
|
41
|
+
data = request.POST.dict() or {}
|
|
42
|
+
except Exception:
|
|
43
|
+
data = {}
|
|
44
|
+
return data
|
|
45
|
+
|
|
46
|
+
def detect_sql_injection(value: str):
|
|
47
|
+
score_total = 0.0
|
|
48
|
+
descripciones = []
|
|
49
|
+
matches = []
|
|
50
|
+
|
|
51
|
+
for pattern, desc, weight in SQL_PATTERNS:
|
|
52
|
+
if pattern.search(value):
|
|
53
|
+
score_total += weight
|
|
54
|
+
descripciones.append(desc)
|
|
55
|
+
matches.append(pattern.pattern)
|
|
56
|
+
|
|
57
|
+
return score_total, descripciones, matches
|
|
58
|
+
|
|
59
|
+
class SQLIDefenseMiddleware(MiddlewareMixin):
|
|
60
|
+
def process_request(self, request):
|
|
61
|
+
client_ip = get_client_ip(request)
|
|
62
|
+
trusted_ips = getattr(settings, "SQLI_DEFENSE_TRUSTED_IPS", [])
|
|
63
|
+
|
|
64
|
+
if client_ip in trusted_ips:
|
|
65
|
+
return None
|
|
66
|
+
|
|
67
|
+
data = extract_body(request)
|
|
68
|
+
score = 0.0
|
|
69
|
+
all_desc = []
|
|
70
|
+
all_matches = []
|
|
71
|
+
|
|
72
|
+
for key, value in data.items():
|
|
73
|
+
if not isinstance(value, str):
|
|
74
|
+
continue
|
|
75
|
+
if key.lower() in IGNORED_FIELDS:
|
|
76
|
+
continue # No analizar contraseñas ni tokens
|
|
77
|
+
|
|
78
|
+
s, desc, matches = detect_sql_injection(value)
|
|
79
|
+
score += s
|
|
80
|
+
all_desc.extend(desc)
|
|
81
|
+
all_matches.extend(matches)
|
|
82
|
+
|
|
83
|
+
if score == 0:
|
|
84
|
+
return None # nada sospechoso
|
|
85
|
+
|
|
86
|
+
logger.warning(
|
|
87
|
+
f"[SQLiDetect] IP={client_ip} Score={score:.2f} Desc={all_desc} Campos={list(data.keys())}"
|
|
88
|
+
)
|
|
89
|
+
|
|
90
|
+
# Guardamos info en request
|
|
91
|
+
request.sql_attack_info = {
|
|
92
|
+
"ip": client_ip,
|
|
93
|
+
"tipos": ["SQLi"],
|
|
94
|
+
"descripcion": all_desc,
|
|
95
|
+
"score": round(score, 2),
|
|
96
|
+
}
|
|
97
|
+
|
|
98
|
+
# Bloqueamos solo si supera umbral de riesgo
|
|
99
|
+
if score >= 0.7:
|
|
100
|
+
from django.http import JsonResponse
|
|
101
|
+
return JsonResponse(
|
|
102
|
+
{"error": "Posible ataque de inyección SQL detectado. Solicitud bloqueada."},
|
|
103
|
+
status=403
|
|
104
|
+
)
|
|
105
|
+
|
|
106
|
+
|
|
107
|
+
# =====================================================
|
|
108
|
+
# === INFORMACIÓN EXTRA ===
|
|
109
|
+
# =====================================================
|
|
110
|
+
"""
|
|
111
|
+
Algoritmos relacionados:
|
|
112
|
+
- Se recomienda almacenar logs SQLi cifrados (AES-GCM)
|
|
113
|
+
para proteger evidencia de intentos maliciosos.
|
|
114
|
+
|
|
115
|
+
Cálculo de puntaje de amenaza:
|
|
116
|
+
S_sqli = w_sqli * detecciones_sqli
|
|
117
|
+
Ejemplo: S_sqli = 0.4 * 3 = 1.2
|
|
118
|
+
|
|
119
|
+
Integración:
|
|
120
|
+
Este middleware puede combinarse con:
|
|
121
|
+
- CSRFDefenseMiddleware
|
|
122
|
+
- XSSDefenseMiddleware
|
|
123
|
+
para calcular un score total de amenaza y decidir bloqueo.
|
|
124
|
+
"""
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
Metadata-Version: 2.4
|
|
2
2
|
Name: GuardianUnivalle-Benito-Yucra
|
|
3
|
-
Version: 0.1.
|
|
3
|
+
Version: 0.1.39
|
|
4
4
|
Summary: Middleware y detectores de seguridad (SQLi, XSS, CSRF, DoS, Keylogger) para Django/Flask
|
|
5
5
|
Author-email: Andres Benito Calle Yucra <benitoandrescalle035@gmail.com>
|
|
6
6
|
License: MIT
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
Metadata-Version: 2.4
|
|
2
2
|
Name: GuardianUnivalle-Benito-Yucra
|
|
3
|
-
Version: 0.1.
|
|
3
|
+
Version: 0.1.39
|
|
4
4
|
Summary: Middleware y detectores de seguridad (SQLi, XSS, CSRF, DoS, Keylogger) para Django/Flask
|
|
5
5
|
Author-email: Andres Benito Calle Yucra <benitoandrescalle035@gmail.com>
|
|
6
6
|
License: MIT
|
{guardianunivalle_benito_yucra-0.1.38 → guardianunivalle_benito_yucra-0.1.39}/pyproject.toml
RENAMED
|
@@ -4,7 +4,7 @@ build-backend = "setuptools.build_meta"
|
|
|
4
4
|
|
|
5
5
|
[project]
|
|
6
6
|
name = "GuardianUnivalle-Benito-Yucra" # usar mayúsculas consistente
|
|
7
|
-
version = "0.1.
|
|
7
|
+
version = "0.1.39"
|
|
8
8
|
description = "Middleware y detectores de seguridad (SQLi, XSS, CSRF, DoS, Keylogger) para Django/Flask"
|
|
9
9
|
authors = [
|
|
10
10
|
{ name = "Andres Benito Calle Yucra", email = "benitoandrescalle035@gmail.com" }
|
guardianunivalle_benito_yucra-0.1.38/GuardianUnivalle_Benito_Yucra/detectores/detector_sql.py
DELETED
|
@@ -1,187 +0,0 @@
|
|
|
1
|
-
# sql_defense.py
|
|
2
|
-
from __future__ import annotations
|
|
3
|
-
import json
|
|
4
|
-
import logging
|
|
5
|
-
import re
|
|
6
|
-
from typing import List, Tuple
|
|
7
|
-
from django.conf import settings
|
|
8
|
-
from django.utils.deprecation import MiddlewareMixin
|
|
9
|
-
|
|
10
|
-
# =====================================================
|
|
11
|
-
# === CONFIGURACIÓN DEL LOGGER ===
|
|
12
|
-
# =====================================================
|
|
13
|
-
logger = logging.getLogger("sqlidefense")
|
|
14
|
-
logger.setLevel(logging.INFO)
|
|
15
|
-
if not logger.handlers:
|
|
16
|
-
handler = logging.StreamHandler()
|
|
17
|
-
handler.setFormatter(logging.Formatter("%(asctime)s - %(levelname)s - %(message)s"))
|
|
18
|
-
logger.addHandler(handler)
|
|
19
|
-
|
|
20
|
-
|
|
21
|
-
# =====================================================
|
|
22
|
-
# === PATRONES DE DETECCIÓN DE SQLi ===
|
|
23
|
-
# =====================================================
|
|
24
|
-
SQLI_PATTERNS: List[Tuple[re.Pattern, str]] = [
|
|
25
|
-
# Inyección clásica con UNION SELECT
|
|
26
|
-
(re.compile(r"\bunion\b\s+(all\s+)?\bselect\b", re.I), "Uso de UNION SELECT"),
|
|
27
|
-
# Combinaciones OR/AND en consultas WHERE
|
|
28
|
-
(
|
|
29
|
-
re.compile(r"\bselect\b.*\bfrom\b.*\bwhere\b.*\b(or|and)\b.*=", re.I),
|
|
30
|
-
"SELECT con OR/AND",
|
|
31
|
-
),
|
|
32
|
-
# Comparaciones tautológicas (1=1)
|
|
33
|
-
(
|
|
34
|
-
re.compile(r"\b(or|and)\s+\d+\s*=\s*\d+", re.I),
|
|
35
|
-
"Expresión tautológica OR/AND 1=1",
|
|
36
|
-
),
|
|
37
|
-
# Manipulación de tablas
|
|
38
|
-
(
|
|
39
|
-
re.compile(r"\b(drop|truncate|delete|insert|update)\b", re.I),
|
|
40
|
-
"Comando de manipulación de tabla",
|
|
41
|
-
),
|
|
42
|
-
# Comentarios sospechosos o terminadores
|
|
43
|
-
(re.compile(r"(--|#|;)", re.I), "Comentario o terminador sospechoso"),
|
|
44
|
-
# Ejecución directa de procedimientos
|
|
45
|
-
(re.compile(r"exec\s*\(", re.I), "Ejecución de procedimiento almacenado"),
|
|
46
|
-
# Subconsultas y SELECT anidados sospechosos
|
|
47
|
-
(re.compile(r"\(\s*select\b.*\)", re.I), "Subconsulta sospechosa"),
|
|
48
|
-
]
|
|
49
|
-
|
|
50
|
-
|
|
51
|
-
# =====================================================
|
|
52
|
-
# === FUNCIONES AUXILIARES SQLi ===
|
|
53
|
-
# =====================================================
|
|
54
|
-
def extract_payload_text(request) -> str:
|
|
55
|
-
"""
|
|
56
|
-
Extrae texto de interés desde el cuerpo, querystring,
|
|
57
|
-
encabezados y referencias para analizar posible SQLi.
|
|
58
|
-
"""
|
|
59
|
-
parts: List[str] = []
|
|
60
|
-
|
|
61
|
-
try:
|
|
62
|
-
content_type = request.META.get("CONTENT_TYPE", "")
|
|
63
|
-
if "application/json" in content_type:
|
|
64
|
-
data = json.loads(request.body.decode("utf-8") or "{}")
|
|
65
|
-
parts.append(json.dumps(data))
|
|
66
|
-
else:
|
|
67
|
-
body = request.body.decode("utf-8", errors="ignore")
|
|
68
|
-
if body:
|
|
69
|
-
parts.append(body)
|
|
70
|
-
except Exception:
|
|
71
|
-
pass
|
|
72
|
-
|
|
73
|
-
qs = request.META.get("QUERY_STRING", "")
|
|
74
|
-
if qs:
|
|
75
|
-
parts.append(qs)
|
|
76
|
-
|
|
77
|
-
parts.append(request.META.get("HTTP_USER_AGENT", ""))
|
|
78
|
-
parts.append(request.META.get("HTTP_REFERER", ""))
|
|
79
|
-
|
|
80
|
-
return " ".join([p for p in parts if p])
|
|
81
|
-
|
|
82
|
-
|
|
83
|
-
def detect_sql_attack(text: str) -> Tuple[bool, List[str]]:
|
|
84
|
-
"""
|
|
85
|
-
Recorre el texto buscando patrones típicos de inyección SQL.
|
|
86
|
-
Retorna (True, lista_de_descripciones) si se detecta algún patrón.
|
|
87
|
-
"""
|
|
88
|
-
descripcion: List[str] = []
|
|
89
|
-
|
|
90
|
-
for patt, msg in SQLI_PATTERNS:
|
|
91
|
-
if patt.search(text):
|
|
92
|
-
descripcion.append(msg)
|
|
93
|
-
|
|
94
|
-
return (len(descripcion) > 0, descripcion)
|
|
95
|
-
|
|
96
|
-
|
|
97
|
-
def get_client_ip(request) -> str:
|
|
98
|
-
"""
|
|
99
|
-
Obtiene la IP real del cliente considerando X-Forwarded-For.
|
|
100
|
-
"""
|
|
101
|
-
x_forwarded_for = request.META.get("HTTP_X_FORWARDED_FOR")
|
|
102
|
-
if x_forwarded_for:
|
|
103
|
-
return x_forwarded_for.split(",")[0].strip()
|
|
104
|
-
return request.META.get("REMOTE_ADDR", "")
|
|
105
|
-
|
|
106
|
-
|
|
107
|
-
# =====================================================
|
|
108
|
-
# === MIDDLEWARE DE DEFENSA SQLi ===
|
|
109
|
-
# =====================================================
|
|
110
|
-
class SQLIDefenseMiddleware(MiddlewareMixin):
|
|
111
|
-
"""
|
|
112
|
-
Middleware profesional de detección de inyección SQL.
|
|
113
|
-
- Detecta patrones en parámetros, cuerpo y cabeceras.
|
|
114
|
-
- No bloquea directamente; marca el intento para auditoría.
|
|
115
|
-
"""
|
|
116
|
-
|
|
117
|
-
def process_request(self, request):
|
|
118
|
-
# ---------------------------------------------
|
|
119
|
-
# 1. Filtrar IPs confiables
|
|
120
|
-
# ---------------------------------------------
|
|
121
|
-
client_ip = get_client_ip(request)
|
|
122
|
-
trusted_ips: List[str] = getattr(settings, "SQLI_DEFENSE_TRUSTED_IPS", [])
|
|
123
|
-
if client_ip in trusted_ips:
|
|
124
|
-
return None
|
|
125
|
-
|
|
126
|
-
# ---------------------------------------------
|
|
127
|
-
# 2. Extraer payload de la solicitud
|
|
128
|
-
# ---------------------------------------------
|
|
129
|
-
payload = extract_payload_text(request)
|
|
130
|
-
if not payload:
|
|
131
|
-
return None
|
|
132
|
-
|
|
133
|
-
# ---------------------------------------------
|
|
134
|
-
# 3. Analizar contenido en busca de patrones SQLi
|
|
135
|
-
# ---------------------------------------------
|
|
136
|
-
flagged, descripcion = detect_sql_attack(payload)
|
|
137
|
-
if not flagged:
|
|
138
|
-
return None
|
|
139
|
-
|
|
140
|
-
# ---------------------------------------------
|
|
141
|
-
# 4. Calcular puntaje de amenaza S_sqli
|
|
142
|
-
# ---------------------------------------------
|
|
143
|
-
w_sqli = getattr(settings, "SQLI_DEFENSE_WEIGHT", 0.4)
|
|
144
|
-
detecciones_sqli = len(descripcion)
|
|
145
|
-
s_sqli = w_sqli * detecciones_sqli
|
|
146
|
-
|
|
147
|
-
# ---------------------------------------------
|
|
148
|
-
# 5. Registrar e informar el intento
|
|
149
|
-
# ---------------------------------------------
|
|
150
|
-
logger.warning(
|
|
151
|
-
"Inyección SQL detectada desde IP %s: %s ; payload: %.200s ; score: %.2f",
|
|
152
|
-
client_ip,
|
|
153
|
-
descripcion,
|
|
154
|
-
payload,
|
|
155
|
-
s_sqli,
|
|
156
|
-
)
|
|
157
|
-
|
|
158
|
-
# Marcar información del ataque para el sistema de auditoría
|
|
159
|
-
request.sql_attack_info = {
|
|
160
|
-
"ip": client_ip,
|
|
161
|
-
"tipos": ["SQLi"],
|
|
162
|
-
"descripcion": descripcion,
|
|
163
|
-
"payload": payload,
|
|
164
|
-
"score": s_sqli,
|
|
165
|
-
}
|
|
166
|
-
|
|
167
|
-
return None
|
|
168
|
-
|
|
169
|
-
|
|
170
|
-
# =====================================================
|
|
171
|
-
# === INFORMACIÓN EXTRA ===
|
|
172
|
-
# =====================================================
|
|
173
|
-
"""
|
|
174
|
-
Algoritmos relacionados:
|
|
175
|
-
- Se recomienda almacenar logs SQLi cifrados (AES-GCM)
|
|
176
|
-
para proteger evidencia de intentos maliciosos.
|
|
177
|
-
|
|
178
|
-
Cálculo de puntaje de amenaza:
|
|
179
|
-
S_sqli = w_sqli * detecciones_sqli
|
|
180
|
-
Ejemplo: S_sqli = 0.4 * 3 = 1.2
|
|
181
|
-
|
|
182
|
-
Integración:
|
|
183
|
-
Este middleware puede combinarse con:
|
|
184
|
-
- CSRFDefenseMiddleware
|
|
185
|
-
- XSSDefenseMiddleware
|
|
186
|
-
para calcular un score total de amenaza y decidir bloqueo.
|
|
187
|
-
"""
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|