From 8649781c59422ac51cfc0421c2e05b7ca273220a Mon Sep 17 00:00:00 2001 From: jefferyq2 <168150414+jefferyq2@users.noreply.github.com> Date: Thu, 30 May 2024 19:58:12 -0400 Subject: [PATCH 01/12] Create dotnet-desktop.yml --- .github/workflows/dotnet-desktop.yml | 115 +++++++++++++++++++++++++++ 1 file changed, 115 insertions(+) create mode 100644 .github/workflows/dotnet-desktop.yml diff --git a/.github/workflows/dotnet-desktop.yml b/.github/workflows/dotnet-desktop.yml new file mode 100644 index 0000000..e718dd9 --- /dev/null +++ b/.github/workflows/dotnet-desktop.yml @@ -0,0 +1,115 @@ +# This workflow uses actions that are not certified by GitHub. +# They are provided by a third-party and are governed by +# separate terms of service, privacy policy, and support +# documentation. + +# This workflow will build, test, sign and package a WPF or Windows Forms desktop application +# built on .NET Core. +# To learn how to migrate your existing application to .NET Core, +# refer to https://docs.microsoft.com/en-us/dotnet/desktop-wpf/migration/convert-project-from-net-framework +# +# To configure this workflow: +# +# 1. Configure environment variables +# GitHub sets default environment variables for every workflow run. +# Replace the variables relative to your project in the "env" section below. +# +# 2. Signing +# Generate a signing certificate in the Windows Application +# Packaging Project or add an existing signing certificate to the project. +# Next, use PowerShell to encode the .pfx file using Base64 encoding +# by running the following Powershell script to generate the output string: +# +# $pfx_cert = Get-Content '.\SigningCertificate.pfx' -Encoding Byte +# [System.Convert]::ToBase64String($pfx_cert) | Out-File 'SigningCertificate_Encoded.txt' +# +# Open the output file, SigningCertificate_Encoded.txt, and copy the +# string inside. Then, add the string to the repo as a GitHub secret +# and name it "Base64_Encoded_Pfx." +# For more information on how to configure your signing certificate for +# this workflow, refer to https://github.com/microsoft/github-actions-for-desktop-apps#signing +# +# Finally, add the signing certificate password to the repo as a secret and name it "Pfx_Key". +# See "Build the Windows Application Packaging project" below to see how the secret is used. +# +# For more information on GitHub Actions, refer to https://github.com/features/actions +# For a complete CI/CD sample to get started with GitHub Action workflows for Desktop Applications, +# refer to https://github.com/microsoft/github-actions-for-desktop-apps + +name: .NET Core Desktop + +on: + push: + branches: [ "master" ] + pull_request: + branches: [ "master" ] + +jobs: + + build: + + strategy: + matrix: + configuration: [Debug, Release] + + runs-on: windows-latest # For a list of available runner types, refer to + # https://help.github.com/en/actions/reference/workflow-syntax-for-github-actions#jobsjob_idruns-on + + env: + Solution_Name: your-solution-name # Replace with your solution name, i.e. MyWpfApp.sln. + Test_Project_Path: your-test-project-path # Replace with the path to your test project, i.e. MyWpfApp.Tests\MyWpfApp.Tests.csproj. + Wap_Project_Directory: your-wap-project-directory-name # Replace with the Wap project directory relative to the solution, i.e. MyWpfApp.Package. + Wap_Project_Path: your-wap-project-path # Replace with the path to your Wap project, i.e. MyWpf.App.Package\MyWpfApp.Package.wapproj. + + steps: + - name: Checkout + uses: actions/checkout@v4 + with: + fetch-depth: 0 + + # Install the .NET Core workload + - name: Install .NET Core + uses: actions/setup-dotnet@v4 + with: + dotnet-version: 8.0.x + + # Add MSBuild to the PATH: https://github.com/microsoft/setup-msbuild + - name: Setup MSBuild.exe + uses: microsoft/setup-msbuild@v2 + + # Execute all unit tests in the solution + - name: Execute unit tests + run: dotnet test + + # Restore the application to populate the obj folder with RuntimeIdentifiers + - name: Restore the application + run: msbuild $env:Solution_Name /t:Restore /p:Configuration=$env:Configuration + env: + Configuration: ${{ matrix.configuration }} + + # Decode the base 64 encoded pfx and save the Signing_Certificate + - name: Decode the pfx + run: | + $pfx_cert_byte = [System.Convert]::FromBase64String("${{ secrets.Base64_Encoded_Pfx }}") + $certificatePath = Join-Path -Path $env:Wap_Project_Directory -ChildPath GitHubActionsWorkflow.pfx + [IO.File]::WriteAllBytes("$certificatePath", $pfx_cert_byte) + + # Create the app package by building and packaging the Windows Application Packaging project + - name: Create the app package + run: msbuild $env:Wap_Project_Path /p:Configuration=$env:Configuration /p:UapAppxPackageBuildMode=$env:Appx_Package_Build_Mode /p:AppxBundle=$env:Appx_Bundle /p:PackageCertificateKeyFile=GitHubActionsWorkflow.pfx /p:PackageCertificatePassword=${{ secrets.Pfx_Key }} + env: + Appx_Bundle: Always + Appx_Bundle_Platforms: x86|x64 + Appx_Package_Build_Mode: StoreUpload + Configuration: ${{ matrix.configuration }} + + # Remove the pfx + - name: Remove the pfx + run: Remove-Item -path $env:Wap_Project_Directory\GitHubActionsWorkflow.pfx + + # Upload the MSIX package: https://github.com/marketplace/actions/upload-a-build-artifact + - name: Upload build artifacts + uses: actions/upload-artifact@v3 + with: + name: MSIX Package + path: ${{ env.Wap_Project_Directory }}\AppPackages From 8ace77a13a6f20387b5b4ff96ce52f0f72459fb0 Mon Sep 17 00:00:00 2001 From: jefferyq2 <168150414+jefferyq2@users.noreply.github.com> Date: Thu, 30 May 2024 19:58:26 -0400 Subject: [PATCH 02/12] Create terraform.yml --- .github/workflows/terraform.yml | 93 +++++++++++++++++++++++++++++++++ 1 file changed, 93 insertions(+) create mode 100644 .github/workflows/terraform.yml diff --git a/.github/workflows/terraform.yml b/.github/workflows/terraform.yml new file mode 100644 index 0000000..9f9704f --- /dev/null +++ b/.github/workflows/terraform.yml @@ -0,0 +1,93 @@ +# This workflow installs the latest version of Terraform CLI and configures the Terraform CLI configuration file +# with an API token for Terraform Cloud (app.terraform.io). On pull request events, this workflow will run +# `terraform init`, `terraform fmt`, and `terraform plan` (speculative plan via Terraform Cloud). On push events +# to the "master" branch, `terraform apply` will be executed. +# +# Documentation for `hashicorp/setup-terraform` is located here: https://github.com/hashicorp/setup-terraform +# +# To use this workflow, you will need to complete the following setup steps. +# +# 1. Create a `main.tf` file in the root of this repository with the `remote` backend and one or more resources defined. +# Example `main.tf`: +# # The configuration for the `remote` backend. +# terraform { +# backend "remote" { +# # The name of your Terraform Cloud organization. +# organization = "example-organization" +# +# # The name of the Terraform Cloud workspace to store Terraform state files in. +# workspaces { +# name = "example-workspace" +# } +# } +# } +# +# # An example resource that does nothing. +# resource "null_resource" "example" { +# triggers = { +# value = "A example resource that does nothing!" +# } +# } +# +# +# 2. Generate a Terraform Cloud user API token and store it as a GitHub secret (e.g. TF_API_TOKEN) on this repository. +# Documentation: +# - https://www.terraform.io/docs/cloud/users-teams-organizations/api-tokens.html +# - https://help.github.com/en/actions/configuring-and-managing-workflows/creating-and-storing-encrypted-secrets +# +# 3. Reference the GitHub secret in step using the `hashicorp/setup-terraform` GitHub Action. +# Example: +# - name: Setup Terraform +# uses: hashicorp/setup-terraform@v1 +# with: +# cli_config_credentials_token: ${{ secrets.TF_API_TOKEN }} + +name: 'Terraform' + +on: + push: + branches: [ "master" ] + pull_request: + +permissions: + contents: read + +jobs: + terraform: + name: 'Terraform' + runs-on: ubuntu-latest + environment: production + + # Use the Bash shell regardless whether the GitHub Actions runner is ubuntu-latest, macos-latest, or windows-latest + defaults: + run: + shell: bash + + steps: + # Checkout the repository to the GitHub Actions runner + - name: Checkout + uses: actions/checkout@v4 + + # Install the latest version of Terraform CLI and configure the Terraform CLI configuration file with a Terraform Cloud user API token + - name: Setup Terraform + uses: hashicorp/setup-terraform@v1 + with: + cli_config_credentials_token: ${{ secrets.TF_API_TOKEN }} + + # Initialize a new or existing Terraform working directory by creating initial files, loading any remote state, downloading modules, etc. + - name: Terraform Init + run: terraform init + + # Checks that all Terraform configuration files adhere to a canonical format + - name: Terraform Format + run: terraform fmt -check + + # Generates an execution plan for Terraform + - name: Terraform Plan + run: terraform plan -input=false + + # On push to "master", build or change infrastructure according to Terraform configuration files + # Note: It is recommended to set up a required "strict" status check in your repository for "Terraform Cloud". See the documentation on "strict" required status checks for more information: https://help.github.com/en/github/administering-a-repository/types-of-required-status-checks + - name: Terraform Apply + if: github.ref == 'refs/heads/"master"' && github.event_name == 'push' + run: terraform apply -auto-approve -input=false From e2fec7f3bbbe951f107fa5e04d2e5c9760ffda87 Mon Sep 17 00:00:00 2001 From: jefferyq2 <168150414+jefferyq2@users.noreply.github.com> Date: Thu, 30 May 2024 19:58:42 -0400 Subject: [PATCH 03/12] Create codeql.yml --- .github/workflows/codeql.yml | 93 ++++++++++++++++++++++++++++++++++++ 1 file changed, 93 insertions(+) create mode 100644 .github/workflows/codeql.yml diff --git a/.github/workflows/codeql.yml b/.github/workflows/codeql.yml new file mode 100644 index 0000000..5792c66 --- /dev/null +++ b/.github/workflows/codeql.yml @@ -0,0 +1,93 @@ +# For most projects, this workflow file will not need changing; you simply need +# to commit it to your repository. +# +# You may wish to alter this file to override the set of languages analyzed, +# or to provide custom queries or build logic. +# +# ******** NOTE ******** +# We have attempted to detect the languages in your repository. Please check +# the `language` matrix defined below to confirm you have the correct set of +# supported CodeQL languages. +# +name: "CodeQL" + +on: + push: + branches: [ "master" ] + pull_request: + branches: [ "master" ] + schedule: + - cron: '41 13 * * 4' + +jobs: + analyze: + name: Analyze (${{ matrix.language }}) + # Runner size impacts CodeQL analysis time. To learn more, please see: + # - https://gh.io/recommended-hardware-resources-for-running-codeql + # - https://gh.io/supported-runners-and-hardware-resources + # - https://gh.io/using-larger-runners (GitHub.com only) + # Consider using larger runners or machines with greater resources for possible analysis time improvements. + runs-on: ${{ (matrix.language == 'swift' && 'macos-latest') || 'ubuntu-latest' }} + timeout-minutes: ${{ (matrix.language == 'swift' && 120) || 360 }} + permissions: + # required for all workflows + security-events: write + + # required to fetch internal or private CodeQL packs + packages: read + + # only required for workflows in private repositories + actions: read + contents: read + + strategy: + fail-fast: false + matrix: + include: + - language: csharp + build-mode: autobuild + # CodeQL supports the following values keywords for 'language': 'c-cpp', 'csharp', 'go', 'java-kotlin', 'javascript-typescript', 'python', 'ruby', 'swift' + # Use `c-cpp` to analyze code written in C, C++ or both + # Use 'java-kotlin' to analyze code written in Java, Kotlin or both + # Use 'javascript-typescript' to analyze code written in JavaScript, TypeScript or both + # To learn more about changing the languages that are analyzed or customizing the build mode for your analysis, + # see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/customizing-your-advanced-setup-for-code-scanning. + # If you are analyzing a compiled language, you can modify the 'build-mode' for that language to customize how + # your codebase is analyzed, see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/codeql-code-scanning-for-compiled-languages + steps: + - name: Checkout repository + uses: actions/checkout@v4 + + # Initializes the CodeQL tools for scanning. + - name: Initialize CodeQL + uses: github/codeql-action/init@v3 + with: + languages: ${{ matrix.language }} + build-mode: ${{ matrix.build-mode }} + # If you wish to specify custom queries, you can do so here or in a config file. + # By default, queries listed here will override any specified in a config file. + # Prefix the list here with "+" to use these queries and those in the config file. + + # For more details on CodeQL's query packs, refer to: https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs + # queries: security-extended,security-and-quality + + # If the analyze step fails for one of the languages you are analyzing with + # "We were unable to automatically build your code", modify the matrix above + # to set the build mode to "manual" for that language. Then modify this step + # to build your code. + # ℹī¸ Command-line programs to run using the OS shell. + # 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun + - if: matrix.build-mode == 'manual' + shell: bash + run: | + echo 'If you are using a "manual" build mode for one or more of the' \ + 'languages you are analyzing, replace this with the commands to build' \ + 'your code, for example:' + echo ' make bootstrap' + echo ' make release' + exit 1 + + - name: Perform CodeQL Analysis + uses: github/codeql-action/analyze@v3 + with: + category: "/language:${{matrix.language}}" From c4ededc5823091fa57141e040663abaec961f0af Mon Sep 17 00:00:00 2001 From: jefferyq2 <168150414+jefferyq2@users.noreply.github.com> Date: Thu, 30 May 2024 19:58:58 -0400 Subject: [PATCH 04/12] Create dotnet.yml --- .github/workflows/dotnet.yml | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 .github/workflows/dotnet.yml diff --git a/.github/workflows/dotnet.yml b/.github/workflows/dotnet.yml new file mode 100644 index 0000000..c62b908 --- /dev/null +++ b/.github/workflows/dotnet.yml @@ -0,0 +1,28 @@ +# This workflow will build a .NET project +# For more information see: https://docs.github.com/en/actions/automating-builds-and-tests/building-and-testing-net + +name: .NET + +on: + push: + branches: [ "master" ] + pull_request: + branches: [ "master" ] + +jobs: + build: + + runs-on: ubuntu-latest + + steps: + - uses: actions/checkout@v4 + - name: Setup .NET + uses: actions/setup-dotnet@v4 + with: + dotnet-version: 8.0.x + - name: Restore dependencies + run: dotnet restore + - name: Build + run: dotnet build --no-restore + - name: Test + run: dotnet test --no-build --verbosity normal From a086eac615e1c82412fba80de0eaf36acd7f77e8 Mon Sep 17 00:00:00 2001 From: jefferyq2 <168150414+jefferyq2@users.noreply.github.com> Date: Thu, 30 May 2024 19:59:13 -0400 Subject: [PATCH 05/12] Create manual.yml --- .github/workflows/manual.yml | 32 ++++++++++++++++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 .github/workflows/manual.yml diff --git a/.github/workflows/manual.yml b/.github/workflows/manual.yml new file mode 100644 index 0000000..11b2e35 --- /dev/null +++ b/.github/workflows/manual.yml @@ -0,0 +1,32 @@ +# This is a basic workflow that is manually triggered + +name: Manual workflow + +# Controls when the action will run. Workflow runs when manually triggered using the UI +# or API. +on: + workflow_dispatch: + # Inputs the workflow accepts. + inputs: + name: + # Friendly description to be shown in the UI instead of 'name' + description: 'Person to greet' + # Default value if no value is explicitly provided + default: 'World' + # Input has to be provided for the workflow to run + required: true + # The data type of the input + type: string + +# A workflow run is made up of one or more jobs that can run sequentially or in parallel +jobs: + # This workflow contains a single job called "greet" + greet: + # The type of runner that the job will run on + runs-on: ubuntu-latest + + # Steps represent a sequence of tasks that will be executed as part of the job + steps: + # Runs a single command using the runners shell + - name: Send greeting + run: echo "Hello ${{ inputs.name }}" From 3589baabde8ed44a08ec2519dc0ca1192cf2a6ec Mon Sep 17 00:00:00 2001 From: jefferyq2 <168150414+jefferyq2@users.noreply.github.com> Date: Thu, 30 May 2024 19:59:29 -0400 Subject: [PATCH 06/12] Create static.yml --- .github/workflows/static.yml | 43 ++++++++++++++++++++++++++++++++++++ 1 file changed, 43 insertions(+) create mode 100644 .github/workflows/static.yml diff --git a/.github/workflows/static.yml b/.github/workflows/static.yml new file mode 100644 index 0000000..0ba8230 --- /dev/null +++ b/.github/workflows/static.yml @@ -0,0 +1,43 @@ +# Simple workflow for deploying static content to GitHub Pages +name: Deploy static content to Pages + +on: + # Runs on pushes targeting the default branch + push: + branches: ["master"] + + # Allows you to run this workflow manually from the Actions tab + workflow_dispatch: + +# Sets permissions of the GITHUB_TOKEN to allow deployment to GitHub Pages +permissions: + contents: read + pages: write + id-token: write + +# Allow only one concurrent deployment, skipping runs queued between the run in-progress and latest queued. +# However, do NOT cancel in-progress runs as we want to allow these production deployments to complete. +concurrency: + group: "pages" + cancel-in-progress: false + +jobs: + # Single deploy job since we're just deploying + deploy: + environment: + name: github-pages + url: ${{ steps.deployment.outputs.page_url }} + runs-on: ubuntu-latest + steps: + - name: Checkout + uses: actions/checkout@v4 + - name: Setup Pages + uses: actions/configure-pages@v5 + - name: Upload artifact + uses: actions/upload-pages-artifact@v3 + with: + # Upload entire repository + path: '.' + - name: Deploy to GitHub Pages + id: deployment + uses: actions/deploy-pages@v4 From 9fd6c0f28c4f21b8babf7da749fda25e5b1d8891 Mon Sep 17 00:00:00 2001 From: Jeffery Queen Date: Thu, 30 May 2024 20:00:15 -0400 Subject: [PATCH 07/12] From 5b12be03de02ec86defece9f29d5e6bcae0de71e Mon Sep 17 00:00:00 2001 From: Jeffery Queen Date: Thu, 30 May 2024 20:00:21 -0400 Subject: [PATCH 08/12] From 621f7e59351645500e91925bf32ba61443ca88f4 Mon Sep 17 00:00:00 2001 From: Jeffery Queen Date: Thu, 30 May 2024 20:00:28 -0400 Subject: [PATCH 09/12] From 42c093dace62acb4f58d3019f4707943dac6a58c Mon Sep 17 00:00:00 2001 From: Jeffery Queen Date: Thu, 30 May 2024 20:01:01 -0400 Subject: [PATCH 10/12] From 3e53ebd5d19600613e0b2274e4e0f2cd7f8b92f7 Mon Sep 17 00:00:00 2001 From: jefferyq2 Date: Mon, 30 Sep 2024 08:05:59 -0700 Subject: [PATCH 11/12] jq --- .DS_Store | Bin 0 -> 6148 bytes ACMESharp/.DS_Store | Bin 0 -> 12292 bytes ci/.DS_Store | Bin 0 -> 6148 bytes 3 files changed, 0 insertions(+), 0 deletions(-) create mode 100644 .DS_Store create mode 100644 ACMESharp/.DS_Store create mode 100644 ci/.DS_Store diff --git a/.DS_Store b/.DS_Store new file mode 100644 index 0000000000000000000000000000000000000000..074abd56ff1a465fcae5cd338243d716fe488029 GIT binary patch literal 6148 zcmeHKJxc>Y5Pho=&uEcCL_y(-)IuQGdeNjz5u%8lCIP<^E^5T~N*hZ>v9J`ato;Gj z{se1(g)_Sw-Sv``A~FNJ?`}SJW?#6SEC983)+zuw009lgOqQkr!gd}h8MB&MLd9#e z_X_o9-07w~MIj6b1AmbL{&q81#vTsP^S0rBZ?cD2(H#9)$E|6&msgK^=X%D_#DP}@T2FnwoBKYWU)bKz zxpj=2@u$tpgE!7IfgbHRMjNMIw&LoRZ*_CdWoP>Pb>iL3gFU?bMQI)U1N@Ru&t?gx z4azJG2m`{v7Xy4ggftiGDtpCH zCY|M!FBO&Aac z{uKi%Q?8fSXiK)YrZ&gDHl(pbgN6MPgF1vJ+m7`Ex8ivkTF4gi17Tz_F-RH``6Hld LkVzQ$RR%r*_W7G} literal 0 HcmV?d00001 diff --git a/ACMESharp/.DS_Store b/ACMESharp/.DS_Store new file mode 100644 index 0000000000000000000000000000000000000000..1ec50cdc4489138170bcc6ce79203345c8821444 GIT binary patch literal 12292 zcmeI2&ubGw6vyATHckCms;JnaQACQ+Vy$?NHI<6iRs$83YV8lS+BU(oiii?K^q>d- zgkDAP;z7`Z2f>q958|a>6pMQEpa=0gv&rPWB-`$8Rur9u-M7rndo%B|Z)bLX5Rua} zH{M0mPDF8>N;a>?>q;Z;n?HtkuD2w|Ul$WC^I*Mnb)J=P{7rN48ndz)s z+&t;JWT!LZsnMy-C{p8XXIEaN{qA#nwFE2yOTZGa1pYe$s_(@SFYE8!RC~1qEP?-; zfNCESIF(EmWZsp!>A*$(!mH=%7hWH@$2dTzB?>ZGka<^XRp@9{NLSS<3^5#69q9>` z9Wq&vc~`pX(hR}xurKE&22pid>oMmsfH{pm!7|pcak>1Q&$ES3Z4ZxY zK1-ItXGQ$#2tVRU<;VJ^{Gbk+#XL=pW`#%ee$u}t_w8QNynCPJaxa5x3xAyl%HPc% z{+7>Cd3b(%EQ}4#;AMBb82^Fm!fDiErwW%%KDl%v-$_c#c=*-_DgiBUCLy)Wl}*8s78J*A zzB#7o7~0N$5LENTy^uM&CP|+7QoBXY^4(X%vc`IHn$cO6Jazlk8i3~tHeuuRoIOwe+A?BNU^yp{? z|DxBhOGN$E&!Xon8zY^00Y<^+vOH{aevjG>zXR(&O<+A#r7|fI&;oZ z+ZLR|wj&;U#w6=8HP;&aJNK~7dEaj_bC(g?FSR4aKAZiJ+;n`p<0PU6_=%%kt^fCW z@Bh=8?8OqW1pZ9|&Wcnz)dSxOYwHzWsWzW>}@Ji+{dv|p9cK%hw?3)qg zO*12p?P-@v{OSsN_?YkDslD3F@AS3KuMwXY>wGqQw9h}`^G%EaW55{rYYd=fvn2b1 zHW~xQfH6=rz~2WCWekdyVElAoh%ErH4|5dExtHJ=uNV|7L99TWgaRehX^Y_`9CojM zL9r5)aB|vwI6c{EhvMSt*xyHYazW5WW55__Gq59%L$3c9+x!1^kUbd##=yT~!1dEf zI>sw$ZSA}q*IEy~gtD+-C0K`G5=$|BxfCBkqrmQY0t||kAS@93BM@n@!5H{a2HpWh C^-o0r literal 0 HcmV?d00001 From 6dd489b76d249d5b948339d5855a33565b623804 Mon Sep 17 00:00:00 2001 From: jefferyq2 Date: Tue, 1 Oct 2024 11:43:49 -0700 Subject: [PATCH 12/12] jq --- .DS_Store | Bin 6148 -> 6148 bytes ACMESharp/.DS_Store | Bin 12292 -> 12292 bytes ACMESharp/ACMESharp-test/.DS_Store | Bin 0 -> 6148 bytes .../.DS_Store | Bin 0 -> 6148 bytes ACMESharp/ACMESharp.POSH-test/.DS_Store | Bin 0 -> 6148 bytes ACMESharp/ACMESharp.POSH/.DS_Store | Bin 0 -> 8196 bytes ACMESharp/ACMESharp.Providers-test/.DS_Store | Bin 0 -> 6148 bytes .../ACMESharp.Providers.CloudFlare/.DS_Store | Bin 0 -> 6148 bytes ACMESharp/ACMESharp.Vault/.DS_Store | Bin 0 -> 6148 bytes ACMESharp/ACMESharp/.DS_Store | Bin 0 -> 8196 bytes ci/.DS_Store | Bin 6148 -> 6148 bytes 11 files changed, 0 insertions(+), 0 deletions(-) create mode 100644 ACMESharp/ACMESharp-test/.DS_Store create mode 100644 ACMESharp/ACMESharp.PKI.Providers.OpenSslCli/.DS_Store create mode 100644 ACMESharp/ACMESharp.POSH-test/.DS_Store create mode 100644 ACMESharp/ACMESharp.POSH/.DS_Store create mode 100644 ACMESharp/ACMESharp.Providers-test/.DS_Store create mode 100644 ACMESharp/ACMESharp.Providers.CloudFlare/.DS_Store create mode 100644 ACMESharp/ACMESharp.Vault/.DS_Store create mode 100644 ACMESharp/ACMESharp/.DS_Store diff --git a/.DS_Store b/.DS_Store index 074abd56ff1a465fcae5cd338243d716fe488029..c05451099e0835c6f6d2d72b7503dc41df4747ac 100644 GIT binary patch delta 417 zcmZoMXfc@J&nU4mU^g?P#AF^8srocG1_lNe20ey!hD?T%+qwyDijAXG=Ln$$>7M~%;3x5$`H(uF`18*ZSpJ@KBl#$lmD@ZO+LWF!^Y&W z1Zd~vKP(cHUmBsW930`1C$O=1j&GdjENzcArsk+5V^@r aY(Z>2VM{?4M6t=hm^Ey_H?wp6_L5 zDvlC!n(QIQ!v^R2Gcz(UO#TNHekT^k@ue7Q-9IrGA%uUBgqe%Vg!C%+0f8cQHXDbaIq}3XIvJ z(89K2!hDcoK1DqQQ)zOFVh>x~Ot6fVk`c%n1os<<+**(fC>5Aa&Q(@M;h$B$%qDvf zVy2qwNyqnoMc5-lBRb&SW9&?;H!BgCf!6Y|7#U&{x zKZ${X0aH`9ygT+(}HaZIfff9E5W7UEoe?dIeS- zCFV5QLyU(F&h=+zc)&3EA5i$6SRBXgcOX^A9DxEZLJ0pL2|G=GBffwwn(Y%u?I@F#gEBYIlHJ7wjnK(a3Mw#W zi$V)q9VaW$T3|HkA(%>&QxtpH)(L@StdxvE)*!gwI96+bWI(CFbaJk;G7A5!@?|zw z2Z)(!u9N#!*aZ+_iXy=}*++E`Ti8D~u>ERb2&UKMEow*DdW1m9V{)B(6qLF7p1K?> Rs^P?&!2vN27|jpFRRHx3>URJD diff --git a/ACMESharp/ACMESharp-test/.DS_Store b/ACMESharp/ACMESharp-test/.DS_Store new file mode 100644 index 0000000000000000000000000000000000000000..0c487ccc93d0abaa64073f696639323768d64120 GIT binary patch literal 6148 zcmeHKOHRW;47E#y0tnG1%eg|AunJY!BUNIJ`U^-63BP?#fY`F)He7?N@I1CkLt1r* z0NIk~O+5C*d6UF5M8w0V>42zDL@89Tw})np$hc@ndS;P9j&s~lu_y+kNmbSzZ#Vo# z24wAaX+jm<(wsW$cl7anysYwkyr{;or^WNz$?4_$S=VQ})u+B*eNSF61?|%X-6NBl zX23^eGoy$0`;@$H@>|X8@NSvc+BwVWE5B{N?L6f>ad8Hm0cYUPGk}^ck{&2}>kK#p z&cKoZ`9B1xU}o4T#$N}Tcmx0@Fh@Z@?va2&48Y8=QG^A;8Vb}IPAgvGQ&nu z!-?aaF^}Du?S#U%L*o$Li8DoSodIW{&A^Uc_ND%xZ$AIGgZ#=Fa0dPr1Dxcee27P~ y+S++IskH%m1r-s$MsXQ}PAtXnl~Q~RjRJd+4lpxp6k&n*Mj+DQjWh704159-Mo?e? literal 0 HcmV?d00001 diff --git a/ACMESharp/ACMESharp.PKI.Providers.OpenSslCli/.DS_Store b/ACMESharp/ACMESharp.PKI.Providers.OpenSslCli/.DS_Store new file mode 100644 index 0000000000000000000000000000000000000000..7bbca18932fb9316d09142ebbeb2ec1472cc4706 GIT binary patch literal 6148 zcmeHKJxc>Y5Pci3IJJqL<$<+ew9@JfXD;`!MVPZ2%!vu(i!*iO9I=l3*&}@Z$xl2e) zf9=qP!`PKMk6+pN8;Y^3(;iuOnAoAV%78M^ zWMIoZwx#}GtiJy@gY-!mPzL@L113m%NtY@4+PaXO)Y^!8O%)Np+Tk>W9b1a&E2Vg! aYK8VlI>gvx?T{9V{s>qav{42&%D@-J_F%~X literal 0 HcmV?d00001 diff --git a/ACMESharp/ACMESharp.POSH-test/.DS_Store b/ACMESharp/ACMESharp.POSH-test/.DS_Store new file mode 100644 index 0000000000000000000000000000000000000000..40fc8e0affe6ad1d657c48d60443012010681f68 GIT binary patch literal 6148 zcmeHKJ5Iwu5S=wiWIjboN^=8JLS-V;P$5N7qa=tR#ab&s?<3GtaRRPD#UX+!mq+N=;f-}U+3@@RUCpba=T{Hl@s!KXC8atv4Rc-^8lNBW)<@3bK=IlIgxO6h9 zpn6q66$lmBk<%g1|L5KN|FB5UQ~_1sUnyXE*(4j|mi*k>x;dU}6SNyNHqI*rs}dZz hsTjFD6(6EGLpFxJ?0MWtAm3r0f-e&+s5Cl11u-;n0m||S}ON+)r0X=<4X+V=v+_4oS1sd z9XdLUqr-U5##boDdM7Wj<}j&49aRBUU{nFA-Jhe5HEf_6)$et@MZ5c<*51u}eMg-A zG}*eBH5xnJY=>6WtrwTCR<^#@Z)5D;lhNM~BU+Zg=1Svl;v-Jb!6A-ufJ`vXrhaiB zZkXH8JT9xSnhs=JxAlk=um*!))%xh~u~CHjQ20 z7iAo?_+-{^7;mr|#<%jVh%d4js9SCk`xgiFAWz2<-VEzi{SvQ+{$KwH{1^OCk8+FH zzs>(CHhEW;@wTi(JmFK?8Gc49=ZvJ(E{y5>SrOA1+krZ_*~W3sh)xwMB++%_Q>uLq z*TQ(-T@~>Z+)$yi_1Nz=^!qQ;Yf}XtOo1nE=Xt6Bo8#~QAI!gQtO}?C|6T!8X|x-w zjKkN~BN0ihov?4SOB1`?p`~!Jkq$==S7xHR>cJN}n2n&QY6sVzWM-0|**n|0{hLxg* z6URGa9=kK!359Kk#v!^Br;6S>1I|E`fdjqlN&Uaveg1C-`IR%^4E!qwxSNf$5gy5E xYwO{p)&}S;R7CtL#X1C?Sc>5*rMM4`0(+1SFg2_cVS)HYAkyHCGw`Dfd;(;|Pci@i literal 0 HcmV?d00001 diff --git a/ACMESharp/ACMESharp.Providers.CloudFlare/.DS_Store b/ACMESharp/ACMESharp.Providers.CloudFlare/.DS_Store new file mode 100644 index 0000000000000000000000000000000000000000..92fad68983d76e0703f8c3ee3b7515fae65a1ed5 GIT binary patch literal 6148 zcmeHK!A`?440T2k1uhdOj`@Wh*{MwBOvNNlJD{-%Cbdenv3tLTkKwy`wxhCADse)9 zY{_}4V<+xQR5wKAX8YBIXiP*YlyP*5<_qC*)}D-_g$JF?v8FA((1zBu>v@~uH!{F` zcSZ&FEl`bpYxl2wn#>I?I12Bu&D8d498Vb}<7q1vj!(sQ)FN@eH zYB)Jr8S})IUA&<YmEV8pv%CKK90Hm-wfaXyFvD33>X9diUF78^L&O^ zinX=(a$IXY^a0AkevM)qf{v78_;M+}go?oKxdY51Hj1!7>_r7Rs75K{&g*gBRelrSPystRjWT0W#ysmjO15QzzX0weqvehxDd zLgJlmf}Nz42_bYR*)KWY*)K1RuO=eZz8W@(8bnk>V+`u(DvZaum2AO!)__XSktCVo zKC9qpR-DUi`#tAYIj75TUaZfP_iI|QJg>o!-`=#yvUOV><#K$eKYhN(iuqiI-$(lV z`phq&o>s5$tLojkV=kAQFz1rzx(uqu{dF^5SL|mBpk}kxRt-uo3Wx%tK&}Aq4F|d(F0z;zH0h-D%9zKl ztn3Lz>DA#6bvUWWp!A}EDBvrwXl@%^|MzE~|NSJn69q(pf2Dv5;%?l=BiY(odN{7N tAzB}ejpH(dIt86A$NGXx@j99|jD>swj4Wmb;ep8?0WE`cqQI{z@BxLhtv~<( literal 0 HcmV?d00001 diff --git a/ACMESharp/ACMESharp/.DS_Store b/ACMESharp/ACMESharp/.DS_Store new file mode 100644 index 0000000000000000000000000000000000000000..e991c6c4c0080771f141cdfbeb86e9645b77d13b GIT binary patch literal 8196 zcmeHMzi$&U82y~w5MZDJ33cNnq)JRsu>jMhTqFvjM1&s_QwXgBQbMA%pt2nsGZG6E z5`_gZGgApR{s$z6?wuHUpY8hm^_;LF6zs_Uu702M-aX&N=PMDZm8a{=M2ke!K;^h_ z3{9Xg&b3l%w&y&e!gw0=mpczf!*L}uc0>oF1JQx#Ky)BF@UJ+4HJeLg%DQjR*hUAU z1OKH1{QHoia?ETjOw>OeX!I5UF+sO3I9}ib#MH*j#==A(D9Q{)G((l$Vkk2l{i)5% zY%EMP!%5lAhqBDd?ogCw$M>f?om6IGY@-9wfvN+%cTcEESLg<{s1FDOmRHvNQs3TbyUzUi^x&O*>+Hu2C$yh}NA7zHG zMccF``I^5ppGJJXz4soUMN7UaD*4_rUqV;uHa>01cyiyze9kW)9j6=XpJfP_yeab@ zp;dZ9o3up_Xn@ZKO{9VoJad68U(5Z^PD?Pe^kR0V)YoQx30afm%Ms4YT(}5z(rJC)$M0^eE_|CySZ^!vFP(=lwS%r^+Z$cv) z^A(A!^KsRSWCHeJp0DM_DW_#hZt2ONa)nOw@R86Rt!^NlIrjnD9OmoE&pJIGUTO&8 zlDEKD+IN(E<@!dbqS?-!kx!1wucHak=5>$1LB=F5S)Ih{q`|F@>U z|DUguj%O1chzUKul(|`l`GyDp*SrtT