aiwaf 0.1.9.1.6__py3-none-any.whl → 0.1.9.1.8__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of aiwaf might be problematic. Click here for more details.
- aiwaf/__init__.py +1 -1
- aiwaf/management/commands/aiwaf_reset.py +58 -17
- aiwaf/management/commands/clear_blacklist.py +66 -0
- aiwaf/middleware.py +60 -9
- aiwaf/storage.py +39 -0
- {aiwaf-0.1.9.1.6.dist-info → aiwaf-0.1.9.1.8.dist-info}/METADATA +1 -1
- {aiwaf-0.1.9.1.6.dist-info → aiwaf-0.1.9.1.8.dist-info}/RECORD +10 -9
- {aiwaf-0.1.9.1.6.dist-info → aiwaf-0.1.9.1.8.dist-info}/WHEEL +0 -0
- {aiwaf-0.1.9.1.6.dist-info → aiwaf-0.1.9.1.8.dist-info}/licenses/LICENSE +0 -0
- {aiwaf-0.1.9.1.6.dist-info → aiwaf-0.1.9.1.8.dist-info}/top_level.txt +0 -0
aiwaf/__init__.py
CHANGED
|
@@ -1,5 +1,6 @@
|
|
|
1
1
|
from django.core.management.base import BaseCommand
|
|
2
2
|
from aiwaf.storage import get_blacklist_store, get_exemption_store
|
|
3
|
+
import sys
|
|
3
4
|
|
|
4
5
|
class Command(BaseCommand):
|
|
5
6
|
help = 'Reset AI-WAF by clearing all blacklist and exemption (whitelist) entries'
|
|
@@ -26,12 +27,29 @@ class Command(BaseCommand):
|
|
|
26
27
|
exemptions_only = options['exemptions_only']
|
|
27
28
|
confirm = options['confirm']
|
|
28
29
|
|
|
29
|
-
|
|
30
|
-
|
|
30
|
+
try:
|
|
31
|
+
blacklist_store = get_blacklist_store()
|
|
32
|
+
exemption_store = get_exemption_store()
|
|
33
|
+
except Exception as e:
|
|
34
|
+
self.stdout.write(self.style.ERROR(f'Error initializing stores: {e}'))
|
|
35
|
+
return
|
|
31
36
|
|
|
32
|
-
# Count current entries
|
|
33
|
-
|
|
34
|
-
|
|
37
|
+
# Count current entries safely
|
|
38
|
+
try:
|
|
39
|
+
blacklist_entries = blacklist_store.get_all()
|
|
40
|
+
blacklist_count = len(blacklist_entries)
|
|
41
|
+
except Exception as e:
|
|
42
|
+
self.stdout.write(self.style.WARNING(f'Warning: Could not count blacklist entries: {e}'))
|
|
43
|
+
blacklist_count = 0
|
|
44
|
+
blacklist_entries = []
|
|
45
|
+
|
|
46
|
+
try:
|
|
47
|
+
exemption_entries = exemption_store.get_all()
|
|
48
|
+
exemption_count = len(exemption_entries)
|
|
49
|
+
except Exception as e:
|
|
50
|
+
self.stdout.write(self.style.WARNING(f'Warning: Could not count exemption entries: {e}'))
|
|
51
|
+
exemption_count = 0
|
|
52
|
+
exemption_entries = []
|
|
35
53
|
|
|
36
54
|
if blacklist_only and exemptions_only:
|
|
37
55
|
self.stdout.write(self.style.ERROR('Cannot use both --blacklist-only and --exemptions-only flags'))
|
|
@@ -55,29 +73,47 @@ class Command(BaseCommand):
|
|
|
55
73
|
self.stdout.write(f"AI-WAF Reset: {action}")
|
|
56
74
|
|
|
57
75
|
if not confirm:
|
|
58
|
-
|
|
59
|
-
|
|
60
|
-
|
|
76
|
+
try:
|
|
77
|
+
response = input("Are you sure you want to proceed? [y/N]: ")
|
|
78
|
+
if response.lower() not in ['y', 'yes']:
|
|
79
|
+
self.stdout.write(self.style.WARNING('Operation cancelled'))
|
|
80
|
+
return
|
|
81
|
+
except (EOFError, KeyboardInterrupt):
|
|
82
|
+
self.stdout.write(self.style.WARNING('\nOperation cancelled'))
|
|
61
83
|
return
|
|
62
84
|
|
|
63
85
|
# Perform the reset
|
|
64
|
-
deleted_counts = {'blacklist': 0, 'exemptions': 0}
|
|
86
|
+
deleted_counts = {'blacklist': 0, 'exemptions': 0, 'errors': []}
|
|
65
87
|
|
|
66
88
|
if clear_blacklist:
|
|
67
89
|
# Clear blacklist entries
|
|
68
|
-
|
|
69
|
-
|
|
70
|
-
|
|
71
|
-
|
|
90
|
+
try:
|
|
91
|
+
for entry in blacklist_entries:
|
|
92
|
+
try:
|
|
93
|
+
blacklist_store.remove_ip(entry['ip_address'])
|
|
94
|
+
deleted_counts['blacklist'] += 1
|
|
95
|
+
except Exception as e:
|
|
96
|
+
deleted_counts['errors'].append(f"Error removing blacklist IP {entry.get('ip_address', 'unknown')}: {e}")
|
|
97
|
+
except Exception as e:
|
|
98
|
+
deleted_counts['errors'].append(f"Error clearing blacklist: {e}")
|
|
72
99
|
|
|
73
100
|
if clear_exemptions:
|
|
74
101
|
# Clear exemption entries
|
|
75
|
-
|
|
76
|
-
|
|
77
|
-
|
|
78
|
-
|
|
102
|
+
try:
|
|
103
|
+
for entry in exemption_entries:
|
|
104
|
+
try:
|
|
105
|
+
exemption_store.remove_ip(entry['ip_address'])
|
|
106
|
+
deleted_counts['exemptions'] += 1
|
|
107
|
+
except Exception as e:
|
|
108
|
+
deleted_counts['errors'].append(f"Error removing exemption IP {entry.get('ip_address', 'unknown')}: {e}")
|
|
109
|
+
except Exception as e:
|
|
110
|
+
deleted_counts['errors'].append(f"Error clearing exemptions: {e}")
|
|
79
111
|
|
|
80
112
|
# Report results
|
|
113
|
+
if deleted_counts['errors']:
|
|
114
|
+
for error in deleted_counts['errors']:
|
|
115
|
+
self.stdout.write(self.style.WARNING(f"⚠️ {error}"))
|
|
116
|
+
|
|
81
117
|
if clear_blacklist and clear_exemptions:
|
|
82
118
|
self.stdout.write(
|
|
83
119
|
self.style.SUCCESS(
|
|
@@ -93,3 +129,8 @@ class Command(BaseCommand):
|
|
|
93
129
|
self.stdout.write(
|
|
94
130
|
self.style.SUCCESS(f"✅ Exemptions cleared: Deleted {deleted_counts['exemptions']} entries")
|
|
95
131
|
)
|
|
132
|
+
|
|
133
|
+
if deleted_counts['errors']:
|
|
134
|
+
self.stdout.write(
|
|
135
|
+
self.style.WARNING(f"⚠️ Completed with {len(deleted_counts['errors'])} errors (see above)")
|
|
136
|
+
)
|
|
@@ -0,0 +1,66 @@
|
|
|
1
|
+
from django.core.management.base import BaseCommand
|
|
2
|
+
from aiwaf.storage import get_blacklist_store
|
|
3
|
+
|
|
4
|
+
class Command(BaseCommand):
|
|
5
|
+
help = 'Clear all blacklist entries (fast method)'
|
|
6
|
+
|
|
7
|
+
def add_arguments(self, parser):
|
|
8
|
+
parser.add_argument(
|
|
9
|
+
'--confirm',
|
|
10
|
+
action='store_true',
|
|
11
|
+
help='Skip confirmation prompt'
|
|
12
|
+
)
|
|
13
|
+
|
|
14
|
+
def handle(self, *args, **options):
|
|
15
|
+
confirm = options['confirm']
|
|
16
|
+
|
|
17
|
+
try:
|
|
18
|
+
blacklist_store = get_blacklist_store()
|
|
19
|
+
except Exception as e:
|
|
20
|
+
self.stdout.write(self.style.ERROR(f'Error initializing blacklist store: {e}'))
|
|
21
|
+
return
|
|
22
|
+
|
|
23
|
+
# Count current entries safely
|
|
24
|
+
try:
|
|
25
|
+
blacklist_entries = blacklist_store.get_all()
|
|
26
|
+
blacklist_count = len(blacklist_entries)
|
|
27
|
+
except Exception as e:
|
|
28
|
+
self.stdout.write(self.style.WARNING(f'Warning: Could not count blacklist entries: {e}'))
|
|
29
|
+
# Try to get count using clear_all method which returns count
|
|
30
|
+
blacklist_count = "unknown number of"
|
|
31
|
+
|
|
32
|
+
# Show what will be cleared
|
|
33
|
+
self.stdout.write(f"Clear Blacklist: Will remove {blacklist_count} blacklist entries")
|
|
34
|
+
|
|
35
|
+
if not confirm:
|
|
36
|
+
try:
|
|
37
|
+
response = input("Are you sure you want to proceed? [y/N]: ")
|
|
38
|
+
if response.lower() not in ['y', 'yes']:
|
|
39
|
+
self.stdout.write(self.style.WARNING('Operation cancelled'))
|
|
40
|
+
return
|
|
41
|
+
except (EOFError, KeyboardInterrupt):
|
|
42
|
+
self.stdout.write(self.style.WARNING('\nOperation cancelled'))
|
|
43
|
+
return
|
|
44
|
+
|
|
45
|
+
# Perform the reset using clear_all for better performance
|
|
46
|
+
try:
|
|
47
|
+
if hasattr(blacklist_store, 'clear_all'):
|
|
48
|
+
deleted_count = blacklist_store.clear_all()
|
|
49
|
+
self.stdout.write(
|
|
50
|
+
self.style.SUCCESS(f"✅ Blacklist cleared: Deleted {deleted_count} entries")
|
|
51
|
+
)
|
|
52
|
+
else:
|
|
53
|
+
# Fallback to individual deletion
|
|
54
|
+
deleted_count = 0
|
|
55
|
+
for entry in blacklist_entries:
|
|
56
|
+
try:
|
|
57
|
+
blacklist_store.remove_ip(entry['ip_address'])
|
|
58
|
+
deleted_count += 1
|
|
59
|
+
except Exception as e:
|
|
60
|
+
self.stdout.write(self.style.WARNING(f"⚠️ Error removing IP {entry.get('ip_address', 'unknown')}: {e}"))
|
|
61
|
+
|
|
62
|
+
self.stdout.write(
|
|
63
|
+
self.style.SUCCESS(f"✅ Blacklist cleared: Deleted {deleted_count} entries")
|
|
64
|
+
)
|
|
65
|
+
except Exception as e:
|
|
66
|
+
self.stdout.write(self.style.ERROR(f'Error clearing blacklist: {e}'))
|
aiwaf/middleware.py
CHANGED
|
@@ -17,7 +17,7 @@ from django.urls import get_resolver
|
|
|
17
17
|
from .trainer import STATIC_KW, STATUS_IDX, path_exists_in_django
|
|
18
18
|
from .blacklist_manager import BlacklistManager
|
|
19
19
|
from .models import IPExemption
|
|
20
|
-
from .utils import is_exempt, get_ip, is_ip_exempted
|
|
20
|
+
from .utils import is_exempt, get_ip, is_ip_exempted, is_exempt_path
|
|
21
21
|
from .storage import get_keyword_store
|
|
22
22
|
|
|
23
23
|
MODEL_PATH = getattr(
|
|
@@ -191,10 +191,12 @@ class AIAnomalyMiddleware(MiddlewareMixin):
|
|
|
191
191
|
key = f"aiwaf:{ip}"
|
|
192
192
|
data = cache.get(key, [])
|
|
193
193
|
path_len = len(request.path)
|
|
194
|
-
|
|
194
|
+
|
|
195
|
+
# Use the same scoring logic as trainer.py
|
|
196
|
+
known_path = path_exists_in_django(request.path)
|
|
197
|
+
kw_hits = 0
|
|
198
|
+
if not known_path and not is_exempt_path(request.path):
|
|
195
199
|
kw_hits = sum(1 for kw in STATIC_KW if kw in request.path.lower())
|
|
196
|
-
else:
|
|
197
|
-
kw_hits = 0
|
|
198
200
|
|
|
199
201
|
resp_time = now - getattr(request, "_start_time", now)
|
|
200
202
|
status_code = str(response.status_code)
|
|
@@ -206,11 +208,60 @@ class AIAnomalyMiddleware(MiddlewareMixin):
|
|
|
206
208
|
|
|
207
209
|
# Only use AI model if it's available
|
|
208
210
|
if self.model is not None and self.model.predict(X)[0] == -1:
|
|
209
|
-
#
|
|
210
|
-
|
|
211
|
-
#
|
|
212
|
-
if
|
|
213
|
-
|
|
211
|
+
# AI detected anomaly - but analyze patterns before blocking (like trainer.py)
|
|
212
|
+
|
|
213
|
+
# Get recent behavior data for this IP to make intelligent blocking decision
|
|
214
|
+
recent_data = [d for d in data if now - d[0] <= 300] # Last 5 minutes
|
|
215
|
+
|
|
216
|
+
if recent_data:
|
|
217
|
+
# Calculate behavior metrics similar to trainer.py
|
|
218
|
+
recent_kw_hits = []
|
|
219
|
+
recent_404s = 0
|
|
220
|
+
recent_burst_counts = []
|
|
221
|
+
|
|
222
|
+
for entry_time, entry_path, entry_status, entry_resp_time in recent_data:
|
|
223
|
+
# Calculate keyword hits for this entry
|
|
224
|
+
entry_known_path = path_exists_in_django(entry_path)
|
|
225
|
+
entry_kw_hits = 0
|
|
226
|
+
if not entry_known_path and not is_exempt_path(entry_path):
|
|
227
|
+
entry_kw_hits = sum(1 for kw in STATIC_KW if kw in entry_path.lower())
|
|
228
|
+
recent_kw_hits.append(entry_kw_hits)
|
|
229
|
+
|
|
230
|
+
# Count 404s
|
|
231
|
+
if entry_status == 404:
|
|
232
|
+
recent_404s += 1
|
|
233
|
+
|
|
234
|
+
# Calculate burst for this entry (requests within 10 seconds)
|
|
235
|
+
entry_burst = sum(1 for (t, _, _, _) in recent_data if abs(entry_time - t) <= 10)
|
|
236
|
+
recent_burst_counts.append(entry_burst)
|
|
237
|
+
|
|
238
|
+
# Calculate averages and maximums
|
|
239
|
+
avg_kw_hits = sum(recent_kw_hits) / len(recent_kw_hits) if recent_kw_hits else 0
|
|
240
|
+
max_404s = recent_404s
|
|
241
|
+
avg_burst = sum(recent_burst_counts) / len(recent_burst_counts) if recent_burst_counts else 0
|
|
242
|
+
total_requests = len(recent_data)
|
|
243
|
+
|
|
244
|
+
# Don't block if it looks like legitimate behavior (same thresholds as trainer.py):
|
|
245
|
+
if (
|
|
246
|
+
avg_kw_hits < 2 and # Not hitting many malicious keywords
|
|
247
|
+
max_404s < 10 and # Not excessive 404s
|
|
248
|
+
avg_burst < 15 and # Not excessive burst activity
|
|
249
|
+
total_requests < 100 # Not excessive total requests
|
|
250
|
+
):
|
|
251
|
+
# Anomalous but looks legitimate - don't block
|
|
252
|
+
pass
|
|
253
|
+
else:
|
|
254
|
+
# Block if it shows clear signs of malicious behavior
|
|
255
|
+
BlacklistManager.block(ip, f"AI anomaly + suspicious patterns (kw:{avg_kw_hits:.1f}, 404s:{max_404s}, burst:{avg_burst:.1f})")
|
|
256
|
+
# Check if actually blocked (exempted IPs won't be blocked)
|
|
257
|
+
if BlacklistManager.is_blocked(ip):
|
|
258
|
+
return JsonResponse({"error": "blocked"}, status=403)
|
|
259
|
+
else:
|
|
260
|
+
# No recent data to analyze - be more conservative, only block on very suspicious current request
|
|
261
|
+
if kw_hits >= 2 or status_idx == STATUS_IDX.index("404"):
|
|
262
|
+
BlacklistManager.block(ip, "AI anomaly + immediate suspicious behavior")
|
|
263
|
+
if BlacklistManager.is_blocked(ip):
|
|
264
|
+
return JsonResponse({"error": "blocked"}, status=403)
|
|
214
265
|
|
|
215
266
|
data.append((now, request.path, response.status_code, resp_time))
|
|
216
267
|
data = [d for d in data if now - d[0] < self.WINDOW]
|
aiwaf/storage.py
CHANGED
|
@@ -132,6 +132,31 @@ class ModelBlacklistStore:
|
|
|
132
132
|
except Exception:
|
|
133
133
|
return []
|
|
134
134
|
|
|
135
|
+
@staticmethod
|
|
136
|
+
def get_all():
|
|
137
|
+
"""Get all blacklist entries as dictionaries"""
|
|
138
|
+
_import_models()
|
|
139
|
+
if BlacklistEntry is None:
|
|
140
|
+
return []
|
|
141
|
+
try:
|
|
142
|
+
return list(BlacklistEntry.objects.values('ip_address', 'reason', 'created_at'))
|
|
143
|
+
except Exception:
|
|
144
|
+
return []
|
|
145
|
+
|
|
146
|
+
@staticmethod
|
|
147
|
+
def clear_all():
|
|
148
|
+
"""Clear all blacklist entries"""
|
|
149
|
+
_import_models()
|
|
150
|
+
if BlacklistEntry is None:
|
|
151
|
+
return 0
|
|
152
|
+
try:
|
|
153
|
+
count = BlacklistEntry.objects.count()
|
|
154
|
+
BlacklistEntry.objects.all().delete()
|
|
155
|
+
return count
|
|
156
|
+
except Exception as e:
|
|
157
|
+
print(f"Error clearing all blacklist entries: {e}")
|
|
158
|
+
return 0
|
|
159
|
+
|
|
135
160
|
class ModelExemptionStore:
|
|
136
161
|
@staticmethod
|
|
137
162
|
def is_exempted(ip):
|
|
@@ -192,6 +217,20 @@ class ModelExemptionStore:
|
|
|
192
217
|
except Exception:
|
|
193
218
|
return []
|
|
194
219
|
|
|
220
|
+
@staticmethod
|
|
221
|
+
def clear_all():
|
|
222
|
+
"""Clear all exemption entries"""
|
|
223
|
+
_import_models()
|
|
224
|
+
if IPExemption is None:
|
|
225
|
+
return 0
|
|
226
|
+
try:
|
|
227
|
+
count = IPExemption.objects.count()
|
|
228
|
+
IPExemption.objects.all().delete()
|
|
229
|
+
return count
|
|
230
|
+
except Exception as e:
|
|
231
|
+
print(f"Error clearing all exemption entries: {e}")
|
|
232
|
+
return 0
|
|
233
|
+
|
|
195
234
|
class ModelKeywordStore:
|
|
196
235
|
@staticmethod
|
|
197
236
|
def add_keyword(keyword, count=1):
|
|
@@ -1,11 +1,11 @@
|
|
|
1
|
-
aiwaf/__init__.py,sha256=
|
|
1
|
+
aiwaf/__init__.py,sha256=6Skp_JeKxRpqn9klnS2qAtRKuXdwAMCdNd6OVq8AKyk,220
|
|
2
2
|
aiwaf/apps.py,sha256=nCez-Ptlv2kaEk5HenA8b1pATz1VfhrHP1344gwcY1A,142
|
|
3
3
|
aiwaf/blacklist_manager.py,sha256=LYCeKFB-7e_C6Bg2WeFJWFIIQlrfRMPuGp30ivrnhQY,1196
|
|
4
4
|
aiwaf/decorators.py,sha256=IUKOdM_gdroffImRZep1g1wT6gNqD10zGwcp28hsJCs,825
|
|
5
|
-
aiwaf/middleware.py,sha256=
|
|
5
|
+
aiwaf/middleware.py,sha256=EMAQA_Gnz0jv4nevlognT921ZeBEro13J_DSv_mQ3Dw,15482
|
|
6
6
|
aiwaf/middleware_logger.py,sha256=LWZVDAnjh6CGESirA8eMbhGgJKB7lVDGRQqVroH95Lo,4742
|
|
7
7
|
aiwaf/models.py,sha256=vQxgY19BDVMjoO903UNrTZC1pNoLltMU6wbyWPoAEns,2719
|
|
8
|
-
aiwaf/storage.py,sha256=
|
|
8
|
+
aiwaf/storage.py,sha256=UlCk-j0xtiEPlC7RFHGz811Dh-GP-Ce5ZSuKQp_GY2k,9565
|
|
9
9
|
aiwaf/trainer.py,sha256=1RPjWVOdGQ3qSrjFopw8HKu7THVTMvF4nNYouij6i_A,10685
|
|
10
10
|
aiwaf/utils.py,sha256=BJk5vJCYdGPl_4QQiknjhCbkzv5HZCXgFcBJDMJpHok,3390
|
|
11
11
|
aiwaf/management/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
|
@@ -14,8 +14,9 @@ aiwaf/management/commands/add_exemption.py,sha256=U_ByfJw1EstAZ8DaSoRb97IGwYzXs0
|
|
|
14
14
|
aiwaf/management/commands/add_ipexemption.py,sha256=sSf3d9hGK9RqqlBYkCrnrd8KZWGT-derSpoWnEY4H60,952
|
|
15
15
|
aiwaf/management/commands/aiwaf_diagnose.py,sha256=nXFRhq66N4QC3e4scYJ2sUngJce-0yDxtBO3R2BllRM,6134
|
|
16
16
|
aiwaf/management/commands/aiwaf_logging.py,sha256=FCIqULn2tii2vD9VxL7vk3PV4k4vr7kaA00KyaCExYY,7692
|
|
17
|
-
aiwaf/management/commands/aiwaf_reset.py,sha256=
|
|
17
|
+
aiwaf/management/commands/aiwaf_reset.py,sha256=wG7EcdPqkxmjF2ivQOmZ7swuvHVJ_OVLgOEijGLvmFs,5586
|
|
18
18
|
aiwaf/management/commands/check_dependencies.py,sha256=GOZl00pDwW2cJjDvIaCeB3yWxmeYcJDRTIpmOTLvy2c,37204
|
|
19
|
+
aiwaf/management/commands/clear_blacklist.py,sha256=Tisedg0EVlc3E01mA3hBZQorwMzc5j1cns-oYshja0g,2770
|
|
19
20
|
aiwaf/management/commands/clear_cache.py,sha256=cdnuTgxkhKLqT_6k6yTcEBlREovNRQxAE51ceXlGYMA,647
|
|
20
21
|
aiwaf/management/commands/debug_csv.py,sha256=Lddqp37mIn0zdvHf4GbuNTWYyJ5h8bumDcGmFSAioi0,6801
|
|
21
22
|
aiwaf/management/commands/detect_and_train.py,sha256=-o-LZ7QZ5GeJPCekryox1DGXKMmFEkwwrcDsiM166K0,269
|
|
@@ -27,8 +28,8 @@ aiwaf/management/commands/test_exemption_fix.py,sha256=ngyGaHUCmQQ6y--6j4q1viZJt
|
|
|
27
28
|
aiwaf/resources/model.pkl,sha256=5t6h9BX8yoh2xct85MXOO60jdlWyg1APskUOW0jZE1Y,1288265
|
|
28
29
|
aiwaf/templatetags/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
|
29
30
|
aiwaf/templatetags/aiwaf_tags.py,sha256=XXfb7Tl4DjU3Sc40GbqdaqOEtKTUKELBEk58u83wBNw,357
|
|
30
|
-
aiwaf-0.1.9.1.
|
|
31
|
-
aiwaf-0.1.9.1.
|
|
32
|
-
aiwaf-0.1.9.1.
|
|
33
|
-
aiwaf-0.1.9.1.
|
|
34
|
-
aiwaf-0.1.9.1.
|
|
31
|
+
aiwaf-0.1.9.1.8.dist-info/licenses/LICENSE,sha256=Ir8PX4dxgAcdB0wqNPIkw84fzIIRKE75NoUil9RX0QU,1069
|
|
32
|
+
aiwaf-0.1.9.1.8.dist-info/METADATA,sha256=MaHb3s4la_-tR6UZ5ht5-jbdvu6PO8mZavNYktvGVMM,22145
|
|
33
|
+
aiwaf-0.1.9.1.8.dist-info/WHEEL,sha256=_zCd3N1l69ArxyTb8rzEoP9TpbYXkqRFSNOD5OuxnTs,91
|
|
34
|
+
aiwaf-0.1.9.1.8.dist-info/top_level.txt,sha256=kU6EyjobT6UPCxuWpI_BvcHDG0I2tMgKaPlWzVxe2xI,6
|
|
35
|
+
aiwaf-0.1.9.1.8.dist-info/RECORD,,
|
|
File without changes
|
|
File without changes
|
|
File without changes
|